Acronyms (Page 17) - Reverse Flashcards

1
Q

A document routinely employed in the field of project management. It defines project-specific activities, deliverables, and timelines for a vendor providing services to the client.

A

SOW

Statement of Work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An email authentication method designed to detect forging sender addresses during the delivery of the email.

A

SPF

Sender Policy Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Unsolicited messages sent via an instant messaing (IM) system.

A

SPIM

Spam over Internet Messaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A domain-specific language used in programming and designed for managing data held in a relational database management system.

A

SQL

Structured Query Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A code injection technique used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution.

A

SQLi

SQL Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A storage device containing nonvolatile flash memory, used in place of a hard disk because of its much greater speed.

A

SSD

Solid State Drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A profile of the Real-Time Transport Protocol (RTP) intended to provide encryption, message authentication, and integrity, and replay protection to the RTP data in both unicast and multicast applications.

A

SRTP

Secure Real-Time Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A cryptographic network protocol for establishing an encrypted link between a web server and a browser.

A

SSH

Secure Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The standard security technology for establishing an encrypted link between a web server and a browser.

A

SSL

Secure Sockets Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A property of access control of multiple related, yet independent, software systems. With this property, a user logs in with a single ID and password to gain access to any of several related systems.

A

SSO

Single Sign-on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A language and serialization format used to exchange cyber threat intelligence.

A

STIX

Structured Threat Information eXchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Solutions that filter unwanted software/malware from user-initiated web/internet traffic and enforce corporate and regulatory policy compliance.

A

SWG

Secure Web Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A security application that provides centralized validation of users attempting to gain access to a router or network access server.

A

TACACS+

Terminal Access Controller Access Control Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An application layer protocol for the communication of cyber threat information in a simple and scalable manner.

A

TAXII

Trusted Automated eXchange of Indicator Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A set of communication protocols used to interconnect network devices on the internet.

A

TCP/IP

Transmission Control Protocol/Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A part of the Kerberos protocol used for authenticating requests for service tickets within the network.

A

TGT

Ticket Granting Ticket

17
Q

A security protocol used in the IEEE 802.11 wireless networking standard.

A

TKIP

Temporal Key Integrity Protocol