Acronyms (Page 9) - Reverse Flashcards
A tunneling protocol used to support virtual private networks (VPNs).
L2TP
Layer 2 Tunneling Protocol
A network that connects computers within a limited area such as a residence, school, laboratory, university campus or office building.
LAN
Local Area Network
An open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol network.
LDAP
Lightweight Directory Access Protocol
A proprietary wireless LAN authentication method developed by Cisco Systems.
LEAP
Lightweight Extensible Authentication Protocol
A type of cloud service that involves the use of remote monitoring tools to manage and monitor the infrastructure of a company.
MaaS
Monitoring as a Service
A type of access control in which the operating system constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target.
MAC
Mandatory Access Control
A unique identifier assigned to a network interface controller for use as a network address in communications within a network segment.
MAC
Media Access Control
A short piece of information used to authenticate a message and to provide integrity and authenticity assurances on the message.
MAC
Message Authentication Code
A network that interconnects users with computer resources in a geographic area or region larger than that covered by even a large local area network (LAN) but smaller than the area covered by a wide area network (WAN).
MAN
Metropolitan Area Network
A special type of boot sector at the very beginning of a partitioned computer mass storage devices.
MBR
Master Boot Record
A widely used cryptographic hash function that produces a 128-bit (16-byte) hash value.
MD5
Message Digest 5
A signal distribution frame for connecting equipment (inside plant) to cables and subscriber carrier equipment (outside plant).
MDF
Main Distribution Frame
A type of security software used by an IT department to monitor, manage, and secure employees’ mobile devices that are deployed across multiple mobile service providers and across multiple mobile operating systems being used in the organization.
MDM
Mobile Device Management
An electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence to an authentication mechanism.
MFA
Multifactor Authentication