COMP TIA Acronyms 3 Flashcards

1
Q

Is a way to send message on mobile devices, which include media objects

A

Multimedia Message Service (MMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A document written between parties to cooperatively work together on an agreed upon project or meet an agreed upon objective

A

Memorandum a Agreement (MOA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Is a routing technique in telecommunications networks that directs data from one node to the next based on labels rather than network addresses

A

Multiprotocol Label Switching (MPLS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A statistical tool that can be used to assess data quality

A

Measurement Systems Analysis (MSA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An identity checking protocol that periodically re-authenticates the user during an online session

A

Microsoft Challenge-Handshake (MS-CHAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A type of computer communications protocol or cryptographic protocol specifically designed for transfer of authentication data between two entities

A

Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Delivers services, such as network application, infrastructure and security, via ongoing and regular support and active administration on customers premises, in the MSP’s data center (hosting) or in a third-party data center

A

Managed Service Provider (MSP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Offers network security services to an organization

A

Managed Security Service Provider (MSSP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A measure of the reliability of a system or component

A

Mean Time Between Failures (MTBF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Is a maintenance metric that measures the average amount of time a non-repairable asset operates before it fails

A

Mean Time to Failure (MTTF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Is the average time it takes to repair a system (Usually technical or mechanical) It includes both the repair time and any testing time

A

Mean Time to Repair (MTTR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The largest size frame or packet- in bytes or octets (eight-bit bytes) that can be transmitted across a data link

A

Maximum Transmission Unit (MTU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The process restricting unauthorized users and devices from gaining access to a corporate or private network

A

Network Access Control (NAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Is dedicated file storage that enables multiple users and heterogenous client devices to retrieve data from centralized disk capacity

A

Network Attached Storage (NAS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

It’s a way to map multiple private addresses inside a local network to a public IP address before transferring the information onto the internet

A

Network Address Translation (NAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A legal document which sets rules and principles for the confidentiality of the information to be exchanged

A

Non-Disclosure Agreement (NDA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Allows devices within a few centimeters of each other to exchange information wirelessly

A

Near-Field Communication (NFC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The replacement of network appliance hardware with virtual machines

A

Network Function Virtualization (NFV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A security appliance that processes network traffic and applies rules to block potentially dangerous traffic

A

Next Generation Firewall (NGFW)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Inspects all web traffic entering or leaving an IT environment and monitors the web activity of users and endpoint devices

A

Next-Generation Secure Web Gateway (NGFW)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A hardware component typically a circuit board or chip, installed on a computer so it can connect to a network

A

Network Interface Card (NIC)

22
Q

Provide Continuous network monitoring across on-premise and cloud infrastructure to detect malicious activity like policy violations, lateral movement or date exfiltration

A

Network-Based Intrusion Detection System (NIDS)

23
Q

Which is installed at strategic points to monitor all network traffic and scan for threats

A

Network-Based Intrusion Prevention System (NIPS)

24
Q

Is a centralized location where IT teams can continuously monitor the performance and health of a network

A

Network Operations Center (NOC)

25
Q

Is a journaling file system that stores metadata through the use of a partition boot sector, a master file table, and system files

A

New Technology File System (NTFS)

26
Q

Is an outdated challenge-response authentication protocol from Microsoft

A

New Technology LAN Manager (NTLM)

27
Q

Is a networking protocol for clock synchronization between computer systems over a packet-switched, variable-latency data networks

A

Network Time Protocol (NTP)

28
Q

That certificate authorities (CAs) use to determine the status of secure sockets

A

Online Certificate Status Protocol (OCSP)

29
Q

Mechanism standardized by the International Telecommunication Unit (ITU) and ISO/IEC for naming object, concept, or “thing” with a globally unambiguous persistent name

A

Object Identifier (OID)

30
Q

Protects systems and data from worms, malware, threats, ransomware, backdoor, intrusions, viruses etc.

A

Operating System (OS)

31
Q

A concept model created by the International Organization for Standardization which enables diverse communication systems to communicate using standard protocols

A

Open Systems Interconnections (OSI)

32
Q

Is the insight gained from processing and analyzing public data sources such as broadcast TV and radio, social media, and websites

A

Open-Source Intelligence (OSINT)

33
Q

A routing protocol for Internet Protocol Networks (IIP)

A

Open Shortest Path First (OSPF)

34
Q

Is the hardware and software that monitors and controls devices, processes, and infrastructure, and is used in industrial settings

A

Operational Technology (OT)

35
Q

Is an international, information security, community standard to promote open and publicly available security content, and to standardize the transfer of this information across the entire spectrum of security tools and services

A

Open Vulnerability and Assessment Language (OVAL)

36
Q

Is an international non-profit organization dedicated to web application security

A

Open Web Application Security Project (OWASP)

37
Q

Defines an archive file format for storing many cryptography objects as a single file

A

PKCS #12 (P12)

38
Q

Is complete cloud environment that includes everything developers need to build, run, and manage applications- from servers an operating systems to all the networking, storage, middleware, tools and more

A

Platform as a Service (PaaS)

39
Q

Defines how web browsers and other user agents can automatically choose the appropriate proxy servers (access method) for fetching a given URL

A

Proxy Auto Configuration (PAC)

40
Q

Identity security solution that helps protect organizations against cyberthreats by monitoring, detecting, and preventing unauthorized privileged access to critical resources

A

Privileged Access Management (PAM)

41
Q

A mechanism to integrate multiple low-level authentication schemes into a high-level application programming interface (API)

A

Plugged Authentication Modules (PAM)

42
Q

Provides a simple method for the peer to establish its identity using a two-way handshake

A

Password Authentication Protocol (PAP)

43
Q

A type of network address translation (NAT) that maps a networks private internal (IPv4) addresses to a single public IP address

A

Port Address Translation (PAT)

44
Q

Is typically used for deriving a cryptographic key from a password

A

Password Based Key Derivation Function 2 (PBKDF2)

45
Q
A
46
Q
A
47
Q
A
48
Q
A
49
Q
A
50
Q
A