CompTIA Sec+ SY0-701 Acronyms V3 Flashcards
MTTR
Mean Time to Recover
Definition: MTTR is a metric used to measure the average time it takes to restore a system, service, or component to full functionality after a failure or disruption occurs.
Scenario: A cloud service provider tracks the MTTR for its data centers to assess the effectiveness of its incident response and recovery processes. MTTR values help the provider identify bottlenecks, streamline recovery workflows, and minimize service downtime to meet service level agreements (SLAs) and maintain customer satisfaction.
MTU
Maximum Transmission Unit
Definition: MTU is the maximum size of a data packet or frame that can be transmitted over a network medium without fragmentation.
Scenario: A network administrator adjusts the MTU settings on routers and switches to optimize network performance and reduce packet overhead. By configuring appropriate MTU values based on network topology and link characteristics, the administrator ensures efficient data transmission, minimizes packet loss, and mitigates network congestion.
NAC
Network Access Control
Definition: NAC is a security technology that enforces policy-based controls to regulate access to network resources and devices based on the identity, security posture, and compliance status of users and endpoints.
Scenario: An enterprise deploys NAC solutions to authenticate users and devices connecting to its corporate network, enforce security policies, and remediate non-compliant endpoints. NAC platforms integrate with identity management systems, endpoint security agents, and network infrastructure to dynamically assess and enforce access controls, reducing the risk of unauthorized access and data breaches.
NAT
Network Address Translation
Definition: NAT is a technique used to modify network address information in IP packet headers as they pass through a router or firewall, enabling multiple devices within a private network to share a single public IP address for internet access.
Scenario: A home router performs NAT to allow multiple devices, such as smartphones, laptops, and smart TVs, to access the internet using a single public IP address assigned by the internet service provider (ISP). NAT translates private IP addresses used within the home network to the public IP address assigned by the ISP, enabling communication with external servers and services on the internet while preserving network security and privacy.
NDA
Non-disclosure Agreement
Definition: NDA is a legal contract or agreement between parties that outlines confidential information shared during business transactions, partnerships, or employment relationships, imposing restrictions on disclosure, use, and protection of sensitive data.
Scenario: Two companies enter into an NDA before discussing proprietary technologies, trade secrets, or business strategies during merger negotiations or collaborative research projects. The NDA prohibits parties from disclosing confidential information to third parties or using it for unauthorized purposes, ensuring confidentiality, trust, and intellectual property protection throughout the business relationship.
NFC
Near Field Communication
Definition: NFC is a short-range wireless communication technology that enables devices to establish peer-to-peer connections and exchange data by bringing them into close proximity (within a few centimeters) without requiring physical contact.
Scenario: A commuter uses an NFC-enabled smartphone to make contactless payments for public transportation fares by tapping the device on an NFC-enabled ticket reader. NFC technology facilitates secure and convenient transactions for mobile payments, ticketing, access control, and information sharing in various applications, including public transit, retail, and hospitality sectors.
NGFW
Next-generation Firewall
Definition: NGFW is an advanced network security appliance or software solution that integrates traditional firewall capabilities with additional security features such as intrusion prevention, application control, deep packet inspection, and threat intelligence.
Scenario: A large enterprise deploys NGFW appliances at network perimeter and internal segments to enforce security policies, block malicious traffic, and detect advanced threats targeting corporate assets and sensitive data. NGFWs provide granular visibility, control, and protection against evolving cyber threats and application-layer attacks, enhancing network security posture and compliance with industry regulations.
NIDS
Network-based Intrusion Detection System
Definition: NIDS is a security technology that monitors network traffic for signs of suspicious activity, unauthorized access attempts, and known attack patterns to detect and alert security personnel about potential security threats and vulnerabilities.
Scenario: A university deploys NIDS sensors at strategic points within its campus network to analyze incoming and outgoing traffic, identify anomalous behavior, and detect network-based attacks such as port scanning, denial-of-service (DoS), and malware propagation. NIDS alerts security analysts to investigate and mitigate security incidents, protecting sensitive research data, academic resources, and network infrastructure from cyber threats and intrusions.
NIPS
Network-based Intrusion Prevention System
Definition: NIPS is a security technology that goes beyond intrusion detection by actively blocking or mitigating malicious activities and network-based attacks in real-time, helping organizations proactively defend against cyber threats and prevent security breaches.
Scenario: A financial institution deploys NIPS appliances at critical network chokepoints to inspect inbound and outbound traffic, detect known and zero-day exploits, and enforce security policies to prevent unauthorized access, data exfiltration, and malware infections. NIPS solutions use signature-based detection, behavioral analysis, and threat intelligence feeds to identify and block suspicious traffic patterns and malicious payloads, reducing the risk of network compromises and data breaches.
NIST
National Institute of Standards & Technology
Definition: NIST is a federal agency within the United States Department of Commerce responsible for developing and promoting standards, guidelines, and best practices to enhance cybersecurity, technology innovation, and industrial competitiveness.
Scenario: A software development company follows NIST cybersecurity frameworks and guidelines to secure its software products, protect customer data, and achieve compliance with industry standards and regulatory requirements. NIST publications provide valuable resources, reference materials, and risk management frameworks to help organizations assess cybersecurity risks, implement effective controls, and improve resilience against cyber threats and vulnerabilities.
NTFS
New Technology File System
Definition: NTFS is the default file system used by the Windows operating system to manage and organize files and directories stored on hard disk drives (HDDs), solid-state drives (SSDs), and other storage devices, offering advanced features such as file compression, encryption, and access control.
Scenario: A system administrator formats a new hard drive with the NTFS file system to store critical business data, system files, and user profiles on a Windows server. NTFS supports file-level security permissions, disk quotas, and journaling capabilities, providing robust data protection, fault tolerance, and storage efficiency for enterprise environments.
NTLM
New Technology LAN Manager
Definition: NTLM is a proprietary authentication protocol developed by Microsoft for secure authentication and single sign-on (SSO) across Windows-based networks and systems.
Scenario: A user logs in to a Windows domain using NTLM authentication to access network resources, shared folders, and enterprise applications hosted on Microsoft servers. NTLM protocols authenticate users by hashing and encrypting credentials passed between client and server, verifying user identities and authorizing access to protected resources based on Active Directory permissions and group policies.
NTP
Network Time Protocol
Definition: NTP is a networking protocol used to synchronize system clocks and maintain accurate timekeeping across computer systems, servers, and network devices within a distributed computing environment.
Scenario: A network administrator configures NTP servers to provide accurate time synchronization for critical servers, routers, and switches deployed across an enterprise network. NTP clients periodically synchronize their system clocks with authoritative NTP servers, ensuring consistent time references, event logging, and authentication services for network operations, monitoring, and troubleshooting activities.
OAUTH
Open Authorization
Definition: OAuth is an open standard authorization protocol that allows users to grant third-party applications limited access to their resources without sharing their credentials directly, enabling secure and delegated access to protected data and services.
Scenario: A social media platform implements OAuth for user authentication and authorization, allowing third-party developers to build and integrate applications that access user profiles, photos, and social connections. OAuth enables users to authorize applications using access tokens and consent screens, maintaining control over their data privacy and security while enabling seamless integration with external services and APIs.
OCSP
Online Certificate Status Protocol
Definition: OCSP is an internet protocol used to check the revocation status of digital certificates in real-time by querying certificate authorities (CAs) or OCSP responders, enabling clients to verify the validity and trustworthiness of SSL/TLS certificates during secure communications.
Scenario: A web browser verifies the validity of an SSL certificate presented by a secure website by sending an OCSP request to the certificate issuer’s OCSP responder. The OCSP responder checks the certificate’s status (valid, revoked, or unknown) and sends a signed response back to the browser, allowing the client to make informed decisions about trusting the website’s digital certificate and establishing a secure connection over HTTPS.
OID
Object Identifier
- Definition: OID is a unique alphanumeric string used to identify objects, classes, attributes, and other entities in various information systems and network protocols, such as X.500 directories, SNMP (Simple Network Management Protocol), and digital certificates.
- Scenario: A software developer assigns OIDs to custom objects and attributes in a directory service schema to uniquely identify and manage organizational resources, user accounts, and access controls. OIDs provide a hierarchical naming structure for globally-unique identifiers, facilitating interoperability and standardization across diverse IT environments and data models.
OS
Operating System
- Definition: An operating system (OS) is system software that manages computer hardware resources and provides essential services and interfaces for running applications, executing system processes, and coordinating user interactions.
- Scenario: A user interacts with a desktop computer running a Windows operating system to browse the internet, edit documents, and play multimedia content. The OS provides an intuitive graphical user interface (GUI), device drivers, file management utilities, and system services to facilitate user productivity, software installation, and hardware compatibility on the computer platform.
OSINT
Open-source Intelligence
- Definition: OSINT refers to the collection, analysis, and dissemination of publicly available information from open sources such as social media platforms, websites, public records, and online forums to gather insights and intelligence about individuals, organizations, events, and threats.
- Scenario: A cybersecurity analyst monitors social media channels, news websites, and online forums to gather OSINT about emerging cyber threats, hacker forums, and data breaches affecting the organization’s industry vertical. OSINT sources provide valuable context, threat indicators, and early warnings to help security teams assess risks, prioritize incident response, and strengthen defenses against cyber attacks.
OSPF
Open Shortest Path First
- Definition: OSPF is a routing protocol used to calculate the shortest path and exchange routing information between routers within an autonomous system (AS) based on link-state advertisements (LSAs) and Dijkstra’s shortest path algorithm.
- Scenario: A network engineer configures OSPF on routers to dynamically discover network topologies, compute optimal routes, and exchange routing updates based on link-state changes and network traffic demands. OSPF routers build and maintain a synchronized view of the network topology, facilitating efficient packet forwarding, load balancing, and fault tolerance in large-scale enterprise networks and service provider environments.
OT
Operational Technology
- Definition: OT refers to hardware and software systems used to monitor, control, and automate physical processes, industrial machinery, and critical infrastructure components in sectors such as manufacturing, energy, transportation, and utilities.
- Scenario: An energy company deploys OT systems to manage power generation, distribution, and grid operations, leveraging sensors, SCADA (Supervisory Control and Data Acquisition) systems, and programmable logic controllers (PLCs) to monitor equipment performance, optimize energy efficiency, and ensure grid stability. OT technologies bridge the gap between IT (Information Technology) and operational environments, enabling real-time monitoring, process optimization, and predictive maintenance in industrial settings.
OTA
Over the Air
- Definition: OTA refers to wireless communication methods used to deliver software updates, firmware patches, configuration changes, and media content to mobile devices, IoT (Internet of Things) devices, and embedded systems over cellular networks, Wi-Fi, or satellite links.
- Scenario: A smartphone manufacturer releases an OTA software update to fix security vulnerabilities, improve device performance, and introduce new features to users’ smartphones without requiring physical connections or manual intervention. OTA updates are delivered seamlessly over the air, ensuring timely deployment, minimal disruption, and widespread adoption of software patches and enhancements across diverse device ecosystems.
OVAL
Open Vulnerability Assessment Language
- Definition: OVAL is an XML-based language used to describe and exchange information about security vulnerabilities, software flaws, and configuration issues in IT systems, enabling automated vulnerability assessment, remediation, and compliance auditing across heterogeneous environments.
- Scenario: A cybersecurity team uses OVAL-compliant tools and scanners to assess and prioritize vulnerabilities in network infrastructure, servers, and endpoints based on Common Vulnerabilities and Exposures (CVE) identifiers and OVAL definitions. OVAL assessments provide standardized vulnerability data, severity ratings, and remediation guidance to help organizations identify and mitigate security risks effectively.
P12
PKCS #12
- Definition: P12, also known as PKCS #12, is a file format used to store and transport cryptographic keys, digital certificates, and private key pairs securely, typically protected by password-based encryption algorithms.
- Scenario: A user exports a PKCS #12 file from a web browser after generating a digital certificate and private key for secure email communication. The P12 file contains the user’s digital identity credentials, including the X.509 certificate and corresponding private key, encrypted with a passphrase to prevent unauthorized access and ensure confidentiality during storage and transmission.
P2P
Peer to Peer
- Definition: P2P is a decentralized network architecture that enables direct communication and resource sharing between individual nodes or endpoints without the need for centralized servers or intermediaries.
- Scenario: Users exchange files, share media content, and collaborate on distributed projects using P2P file-sharing networks and applications such as BitTorrent, eDonkey, and decentralized blockchain networks. P2P architectures leverage peer-to-peer protocols and distributed algorithms to facilitate data transfer, content discovery, and content delivery across geographically dispersed nodes, promoting scalability, fault tolerance, and user autonomy in decentralized ecosystems.
PaaS
Platform as a Service
- Definition: PaaS is a cloud computing model that provides developers with on-demand access to platform-level resources, tools, and runtime environments for building, deploying, and managing applications without the complexity of infrastructure management.
- Scenario: A software development team leverages a PaaS platform such as Microsoft Azure App Service or Google App Engine to develop, test, and deploy web applications, mobile apps, and APIs without provisioning or managing underlying servers, databases, and middleware components. PaaS offerings offer scalability, flexibility, and productivity gains by abstracting infrastructure complexities and automating application lifecycle management tasks in the cloud.
PAM (1)
Privileged Access Management
- Definition: PAM is a cybersecurity discipline and set of technologies designed to control, monitor, and audit privileged user access to critical systems, sensitive data, and administrative resources, mitigating insider threats and enforcing least privilege principles.
- Scenario: An IT administrator implements a PAM solution to manage and rotate privileged account credentials, enforce granular access controls, and record user activities during privileged sessions on servers, databases, and cloud environments. PAM solutions integrate with identity management systems, multi-factor authentication (MFA) tools, and security information and event management (SIEM) platforms to strengthen access controls, reduce security risks, and achieve compliance with regulatory requirements.
PAC
Proxy Auto Configuration
- Definition: PAC is a configuration file or script used by web browsers and network clients to automatically select and configure proxy servers and network settings based on predefined rules, network conditions, and user preferences.
- Scenario: An organization deploys a PAC file on its corporate network to route web traffic through proxy servers, filter content, and enforce security policies for internet access and browsing activities. PAC scripts use JavaScript functions and conditional logic to evaluate client requests and determine optimal proxy server selections, enhancing network performance, privacy, and compliance with acceptable use policies.
PAM (2)
Pluggable Authentication Modules
- Definition: PAM is a modular authentication framework used in Unix-like operating systems to provide flexible authentication mechanisms, support multiple authentication methods, and enforce security policies for user login, password management, and session authentication.
- Scenario: A Linux system administrator configures PAM modules to authenticate users, enforce password policies, and authorize system access based on user credentials, group memberships, and access control rules defined in the PAM configuration files. PAM modules support various authentication methods such as passwords, public keys, biometrics, and one-time passwords (OTP), enabling seamless integration with external authentication providers and identity management systems.
PAP
Password Authentication Protocol
- Definition: PAP is an authentication protocol used in legacy network environments to transmit user credentials, such as usernames and passwords, in plaintext over network connections, posing security risks and vulnerabilities to interception and eavesdropping attacks.
- Scenario: A remote user dials into a network access server (NAS) using a modem and authenticates via PAP to establish a dial-up connection to the corporate network. PAP protocols exchange user credentials in clear text format, making them susceptible to network sniffing, man-in-the-middle (MitM) attacks, and password interception, highlighting security weaknesses inherent in legacy authentication methods.
PAT
Port Address Translation
- Definition: PAT is a type of network address translation (NAT) technique used to map multiple private IP addresses to a single public IP address by dynamically assigning unique port numbers to each outgoing network connection, enabling network address reuse and conserving public IPv4 address space.
- Scenario: A home router implements PAT to allow multiple devices, such as smartphones, laptops, and smart TVs, to share a single public IP address assigned by the internet service provider (ISP) for internet access. PAT assigns unique port numbers to each internal device’s network sessions, maintaining session state and enabling bidirectional communication with external servers and services across the internet.
PBKDF2
Password-based Key Derivation Function 2
- Definition: PBKDF2 is a key derivation function commonly used to derive cryptographic keys from passwords or passphrase-based inputs by applying multiple iterations of a pseudorandom function, such as HMAC-SHA1, SHA-256, or SHA-512.
- Scenario: A cryptographic application uses PBKDF2 to derive encryption keys from user passwords before storing sensitive data or generating digital signatures to protect data confidentiality and integrity. PBKDF2 algorithms strengthen password-based security by introducing computational complexity, salt values, and iteration counts, making brute-force attacks and password cracking attempts more time-consuming and resource-intensive for attackers.
PBX
Private Branch Exchange
- Definition: PBX is a private telephone system used within an organization or enterprise to manage internal and external voice communication by routing calls, handling extensions, and providing telephony features such as voicemail, call forwarding, and conference calling.
- Scenario: A large corporation installs a PBX system to streamline internal communication among employees across different departments and office locations. The PBX allows users to make calls within the organization using extension numbers, access voicemail services, and transfer calls between departments, enhancing productivity and collaboration in the workplace.
PCAP
Packet Capture
- Definition: PCAP is a file format used to store network packet capture data collected by network monitoring and analysis tools, allowing cybersecurity professionals to inspect, analyze, and troubleshoot network traffic for security threats, performance issues, and protocol errors.
- Scenario: A network administrator uses Wireshark, a popular packet capture tool, to capture and analyze network traffic on a corporate network segment. Wireshark saves captured packets in PCAP format, enabling deep packet inspection, protocol analysis, and forensic investigation of network communication patterns, anomalies, and security incidents.
PCI DSS
Payment Card Industry Data Security Standard
- Definition: PCI DSS is a set of security standards and compliance requirements established by the Payment Card Industry Security Standards Council (PCI SSC) to protect cardholder data, prevent payment card fraud, and ensure secure payment processing environments for merchants, service providers, and financial institutions.
- Scenario: An online retailer implements PCI DSS controls and security measures to secure credit card transactions, safeguard cardholder data, and comply with industry regulations and contractual obligations. PCI DSS requirements include encryption, access controls, vulnerability management, and regular security assessments to mitigate risks and maintain trust in electronic payment systems.