COMP TIA Acronyms 3 Flashcards

1
Q

Is a way to send message on mobile devices, which include media objects

A

Multimedia Message Service (MMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A document written between parties to cooperatively work together on an agreed upon project or meet an agreed upon objective

A

Memorandum a Agreement (MOA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Is a routing technique in telecommunications networks that directs data from one node to the next based on labels rather than network addresses

A

Multiprotocol Label Switching (MPLS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A statistical tool that can be used to assess data quality

A

Measurement Systems Analysis (MSA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An identity checking protocol that periodically re-authenticates the user during an online session

A

Microsoft Challenge-Handshake (MS-CHAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A type of computer communications protocol or cryptographic protocol specifically designed for transfer of authentication data between two entities

A

Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Delivers services, such as network application, infrastructure and security, via ongoing and regular support and active administration on customers premises, in the MSP’s data center (hosting) or in a third-party data center

A

Managed Service Provider (MSP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Offers network security services to an organization

A

Managed Security Service Provider (MSSP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A measure of the reliability of a system or component

A

Mean Time Between Failures (MTBF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Is a maintenance metric that measures the average amount of time a non-repairable asset operates before it fails

A

Mean Time to Failure (MTTF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Is the average time it takes to repair a system (Usually technical or mechanical) It includes both the repair time and any testing time

A

Mean Time to Repair (MTTR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The largest size frame or packet- in bytes or octets (eight-bit bytes) that can be transmitted across a data link

A

Maximum Transmission Unit (MTU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The process restricting unauthorized users and devices from gaining access to a corporate or private network

A

Network Access Control (NAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Is dedicated file storage that enables multiple users and heterogenous client devices to retrieve data from centralized disk capacity

A

Network Attached Storage (NAS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

It’s a way to map multiple private addresses inside a local network to a public IP address before transferring the information onto the internet

A

Network Address Translation (NAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A legal document which sets rules and principles for the confidentiality of the information to be exchanged

A

Non-Disclosure Agreement (NDA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Allows devices within a few centimeters of each other to exchange information wirelessly

A

Near-Field Communication (NFC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The replacement of network appliance hardware with virtual machines

A

Network Function Virtualization (NFV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A security appliance that processes network traffic and applies rules to block potentially dangerous traffic

A

Next Generation Firewall (NGFW)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Inspects all web traffic entering or leaving an IT environment and monitors the web activity of users and endpoint devices

A

Next-Generation Secure Web Gateway (NGFW)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A hardware component typically a circuit board or chip, installed on a computer so it can connect to a network

A

Network Interface Card (NIC)

22
Q

Provide Continuous network monitoring across on-premise and cloud infrastructure to detect malicious activity like policy violations, lateral movement or date exfiltration

A

Network-Based Intrusion Detection System (NIDS)

23
Q

Which is installed at strategic points to monitor all network traffic and scan for threats

A

Network-Based Intrusion Prevention System (NIPS)

24
Q

Is a centralized location where IT teams can continuously monitor the performance and health of a network

A

Network Operations Center (NOC)

25
Is a journaling file system that stores metadata through the use of a partition boot sector, a master file table, and system files
New Technology File System (NTFS)
26
Is an outdated challenge-response authentication protocol from Microsoft
New Technology LAN Manager (NTLM)
27
Is a networking protocol for clock synchronization between computer systems over a packet-switched, variable-latency data networks
Network Time Protocol (NTP)
28
That certificate authorities (CAs) use to determine the status of secure sockets
Online Certificate Status Protocol (OCSP)
29
Mechanism standardized by the International Telecommunication Unit (ITU) and ISO/IEC for naming object, concept, or "thing" with a globally unambiguous persistent name
Object Identifier (OID)
30
Protects systems and data from worms, malware, threats, ransomware, backdoor, intrusions, viruses etc.
Operating System (OS)
31
A concept model created by the International Organization for Standardization which enables diverse communication systems to communicate using standard protocols
Open Systems Interconnections (OSI)
32
Is the insight gained from processing and analyzing public data sources such as broadcast TV and radio, social media, and websites
Open-Source Intelligence (OSINT)
33
A routing protocol for Internet Protocol Networks (IIP)
Open Shortest Path First (OSPF)
34
Is the hardware and software that monitors and controls devices, processes, and infrastructure, and is used in industrial settings
Operational Technology (OT)
35
Is an international, information security, community standard to promote open and publicly available security content, and to standardize the transfer of this information across the entire spectrum of security tools and services
Open Vulnerability and Assessment Language (OVAL)
36
Is an international non-profit organization dedicated to web application security
Open Web Application Security Project (OWASP)
37
Defines an archive file format for storing many cryptography objects as a single file
PKCS #12 (P12)
38
Is complete cloud environment that includes everything developers need to build, run, and manage applications- from servers an operating systems to all the networking, storage, middleware, tools and more
Platform as a Service (PaaS)
39
Defines how web browsers and other user agents can automatically choose the appropriate proxy servers (access method) for fetching a given URL
Proxy Auto Configuration (PAC)
40
Identity security solution that helps protect organizations against cyberthreats by monitoring, detecting, and preventing unauthorized privileged access to critical resources
Privileged Access Management (PAM)
41
A mechanism to integrate multiple low-level authentication schemes into a high-level application programming interface (API)
Plugged Authentication Modules (PAM)
42
Provides a simple method for the peer to establish its identity using a two-way handshake
Password Authentication Protocol (PAP)
43
A type of network address translation (NAT) that maps a networks private internal (IPv4) addresses to a single public IP address
Port Address Translation (PAT)
44
Is typically used for deriving a cryptographic key from a password
Password Based Key Derivation Function 2 (PBKDF2)
45
46
47
48
49
50