COMP TIA Acronyms 3 Flashcards
Is a way to send message on mobile devices, which include media objects
Multimedia Message Service (MMS)
A document written between parties to cooperatively work together on an agreed upon project or meet an agreed upon objective
Memorandum a Agreement (MOA)
Is a routing technique in telecommunications networks that directs data from one node to the next based on labels rather than network addresses
Multiprotocol Label Switching (MPLS)
A statistical tool that can be used to assess data quality
Measurement Systems Analysis (MSA)
An identity checking protocol that periodically re-authenticates the user during an online session
Microsoft Challenge-Handshake (MS-CHAP)
A type of computer communications protocol or cryptographic protocol specifically designed for transfer of authentication data between two entities
Authentication Protocol
Delivers services, such as network application, infrastructure and security, via ongoing and regular support and active administration on customers premises, in the MSP’s data center (hosting) or in a third-party data center
Managed Service Provider (MSP)
Offers network security services to an organization
Managed Security Service Provider (MSSP)
A measure of the reliability of a system or component
Mean Time Between Failures (MTBF)
Is a maintenance metric that measures the average amount of time a non-repairable asset operates before it fails
Mean Time to Failure (MTTF)
Is the average time it takes to repair a system (Usually technical or mechanical) It includes both the repair time and any testing time
Mean Time to Repair (MTTR)
The largest size frame or packet- in bytes or octets (eight-bit bytes) that can be transmitted across a data link
Maximum Transmission Unit (MTU)
The process restricting unauthorized users and devices from gaining access to a corporate or private network
Network Access Control (NAC)
Is dedicated file storage that enables multiple users and heterogenous client devices to retrieve data from centralized disk capacity
Network Attached Storage (NAS)
It’s a way to map multiple private addresses inside a local network to a public IP address before transferring the information onto the internet
Network Address Translation (NAT)
A legal document which sets rules and principles for the confidentiality of the information to be exchanged
Non-Disclosure Agreement (NDA)
Allows devices within a few centimeters of each other to exchange information wirelessly
Near-Field Communication (NFC)
The replacement of network appliance hardware with virtual machines
Network Function Virtualization (NFV)
A security appliance that processes network traffic and applies rules to block potentially dangerous traffic
Next Generation Firewall (NGFW)
Inspects all web traffic entering or leaving an IT environment and monitors the web activity of users and endpoint devices
Next-Generation Secure Web Gateway (NGFW)
A hardware component typically a circuit board or chip, installed on a computer so it can connect to a network
Network Interface Card (NIC)
Provide Continuous network monitoring across on-premise and cloud infrastructure to detect malicious activity like policy violations, lateral movement or date exfiltration
Network-Based Intrusion Detection System (NIDS)
Which is installed at strategic points to monitor all network traffic and scan for threats
Network-Based Intrusion Prevention System (NIPS)
Is a centralized location where IT teams can continuously monitor the performance and health of a network
Network Operations Center (NOC)
Is a journaling file system that stores metadata through the use of a partition boot sector, a master file table, and system files
New Technology File System (NTFS)
Is an outdated challenge-response authentication protocol from Microsoft
New Technology LAN Manager (NTLM)
Is a networking protocol for clock synchronization between computer systems over a packet-switched, variable-latency data networks
Network Time Protocol (NTP)
That certificate authorities (CAs) use to determine the status of secure sockets
Online Certificate Status Protocol (OCSP)
Mechanism standardized by the International Telecommunication Unit (ITU) and ISO/IEC for naming object, concept, or “thing” with a globally unambiguous persistent name
Object Identifier (OID)
Protects systems and data from worms, malware, threats, ransomware, backdoor, intrusions, viruses etc.
Operating System (OS)
A concept model created by the International Organization for Standardization which enables diverse communication systems to communicate using standard protocols
Open Systems Interconnections (OSI)
Is the insight gained from processing and analyzing public data sources such as broadcast TV and radio, social media, and websites
Open-Source Intelligence (OSINT)
A routing protocol for Internet Protocol Networks (IIP)
Open Shortest Path First (OSPF)
Is the hardware and software that monitors and controls devices, processes, and infrastructure, and is used in industrial settings
Operational Technology (OT)
Is an international, information security, community standard to promote open and publicly available security content, and to standardize the transfer of this information across the entire spectrum of security tools and services
Open Vulnerability and Assessment Language (OVAL)
Is an international non-profit organization dedicated to web application security
Open Web Application Security Project (OWASP)
Defines an archive file format for storing many cryptography objects as a single file
PKCS #12 (P12)
Is complete cloud environment that includes everything developers need to build, run, and manage applications- from servers an operating systems to all the networking, storage, middleware, tools and more
Platform as a Service (PaaS)
Defines how web browsers and other user agents can automatically choose the appropriate proxy servers (access method) for fetching a given URL
Proxy Auto Configuration (PAC)
Identity security solution that helps protect organizations against cyberthreats by monitoring, detecting, and preventing unauthorized privileged access to critical resources
Privileged Access Management (PAM)
A mechanism to integrate multiple low-level authentication schemes into a high-level application programming interface (API)
Plugged Authentication Modules (PAM)
Provides a simple method for the peer to establish its identity using a two-way handshake
Password Authentication Protocol (PAP)
A type of network address translation (NAT) that maps a networks private internal (IPv4) addresses to a single public IP address
Port Address Translation (PAT)
Is typically used for deriving a cryptographic key from a password
Password Based Key Derivation Function 2 (PBKDF2)