CompTIA Sec+ SY0-701 Acronyms V3 Flashcards
MTTR
Mean Time to Recover
Definition: MTTR is a metric used to measure the average time it takes to restore a system, service, or component to full functionality after a failure or disruption occurs.
Scenario: A cloud service provider tracks the MTTR for its data centers to assess the effectiveness of its incident response and recovery processes. MTTR values help the provider identify bottlenecks, streamline recovery workflows, and minimize service downtime to meet service level agreements (SLAs) and maintain customer satisfaction.
MTU
Maximum Transmission Unit
Definition: MTU is the maximum size of a data packet or frame that can be transmitted over a network medium without fragmentation.
Scenario: A network administrator adjusts the MTU settings on routers and switches to optimize network performance and reduce packet overhead. By configuring appropriate MTU values based on network topology and link characteristics, the administrator ensures efficient data transmission, minimizes packet loss, and mitigates network congestion.
NAC
Network Access Control
Definition: NAC is a security technology that enforces policy-based controls to regulate access to network resources and devices based on the identity, security posture, and compliance status of users and endpoints.
Scenario: An enterprise deploys NAC solutions to authenticate users and devices connecting to its corporate network, enforce security policies, and remediate non-compliant endpoints. NAC platforms integrate with identity management systems, endpoint security agents, and network infrastructure to dynamically assess and enforce access controls, reducing the risk of unauthorized access and data breaches.
NAT
Network Address Translation
Definition: NAT is a technique used to modify network address information in IP packet headers as they pass through a router or firewall, enabling multiple devices within a private network to share a single public IP address for internet access.
Scenario: A home router performs NAT to allow multiple devices, such as smartphones, laptops, and smart TVs, to access the internet using a single public IP address assigned by the internet service provider (ISP). NAT translates private IP addresses used within the home network to the public IP address assigned by the ISP, enabling communication with external servers and services on the internet while preserving network security and privacy.
NDA
Non-disclosure Agreement
Definition: NDA is a legal contract or agreement between parties that outlines confidential information shared during business transactions, partnerships, or employment relationships, imposing restrictions on disclosure, use, and protection of sensitive data.
Scenario: Two companies enter into an NDA before discussing proprietary technologies, trade secrets, or business strategies during merger negotiations or collaborative research projects. The NDA prohibits parties from disclosing confidential information to third parties or using it for unauthorized purposes, ensuring confidentiality, trust, and intellectual property protection throughout the business relationship.
NFC
Near Field Communication
Definition: NFC is a short-range wireless communication technology that enables devices to establish peer-to-peer connections and exchange data by bringing them into close proximity (within a few centimeters) without requiring physical contact.
Scenario: A commuter uses an NFC-enabled smartphone to make contactless payments for public transportation fares by tapping the device on an NFC-enabled ticket reader. NFC technology facilitates secure and convenient transactions for mobile payments, ticketing, access control, and information sharing in various applications, including public transit, retail, and hospitality sectors.
NGFW
Next-generation Firewall
Definition: NGFW is an advanced network security appliance or software solution that integrates traditional firewall capabilities with additional security features such as intrusion prevention, application control, deep packet inspection, and threat intelligence.
Scenario: A large enterprise deploys NGFW appliances at network perimeter and internal segments to enforce security policies, block malicious traffic, and detect advanced threats targeting corporate assets and sensitive data. NGFWs provide granular visibility, control, and protection against evolving cyber threats and application-layer attacks, enhancing network security posture and compliance with industry regulations.
NIDS
Network-based Intrusion Detection System
Definition: NIDS is a security technology that monitors network traffic for signs of suspicious activity, unauthorized access attempts, and known attack patterns to detect and alert security personnel about potential security threats and vulnerabilities.
Scenario: A university deploys NIDS sensors at strategic points within its campus network to analyze incoming and outgoing traffic, identify anomalous behavior, and detect network-based attacks such as port scanning, denial-of-service (DoS), and malware propagation. NIDS alerts security analysts to investigate and mitigate security incidents, protecting sensitive research data, academic resources, and network infrastructure from cyber threats and intrusions.
NIPS
Network-based Intrusion Prevention System
Definition: NIPS is a security technology that goes beyond intrusion detection by actively blocking or mitigating malicious activities and network-based attacks in real-time, helping organizations proactively defend against cyber threats and prevent security breaches.
Scenario: A financial institution deploys NIPS appliances at critical network chokepoints to inspect inbound and outbound traffic, detect known and zero-day exploits, and enforce security policies to prevent unauthorized access, data exfiltration, and malware infections. NIPS solutions use signature-based detection, behavioral analysis, and threat intelligence feeds to identify and block suspicious traffic patterns and malicious payloads, reducing the risk of network compromises and data breaches.
NIST
National Institute of Standards & Technology
Definition: NIST is a federal agency within the United States Department of Commerce responsible for developing and promoting standards, guidelines, and best practices to enhance cybersecurity, technology innovation, and industrial competitiveness.
Scenario: A software development company follows NIST cybersecurity frameworks and guidelines to secure its software products, protect customer data, and achieve compliance with industry standards and regulatory requirements. NIST publications provide valuable resources, reference materials, and risk management frameworks to help organizations assess cybersecurity risks, implement effective controls, and improve resilience against cyber threats and vulnerabilities.
NTFS
New Technology File System
Definition: NTFS is the default file system used by the Windows operating system to manage and organize files and directories stored on hard disk drives (HDDs), solid-state drives (SSDs), and other storage devices, offering advanced features such as file compression, encryption, and access control.
Scenario: A system administrator formats a new hard drive with the NTFS file system to store critical business data, system files, and user profiles on a Windows server. NTFS supports file-level security permissions, disk quotas, and journaling capabilities, providing robust data protection, fault tolerance, and storage efficiency for enterprise environments.
NTLM
New Technology LAN Manager
Definition: NTLM is a proprietary authentication protocol developed by Microsoft for secure authentication and single sign-on (SSO) across Windows-based networks and systems.
Scenario: A user logs in to a Windows domain using NTLM authentication to access network resources, shared folders, and enterprise applications hosted on Microsoft servers. NTLM protocols authenticate users by hashing and encrypting credentials passed between client and server, verifying user identities and authorizing access to protected resources based on Active Directory permissions and group policies.
NTP
Network Time Protocol
Definition: NTP is a networking protocol used to synchronize system clocks and maintain accurate timekeeping across computer systems, servers, and network devices within a distributed computing environment.
Scenario: A network administrator configures NTP servers to provide accurate time synchronization for critical servers, routers, and switches deployed across an enterprise network. NTP clients periodically synchronize their system clocks with authoritative NTP servers, ensuring consistent time references, event logging, and authentication services for network operations, monitoring, and troubleshooting activities.
OAUTH
Open Authorization
Definition: OAuth is an open standard authorization protocol that allows users to grant third-party applications limited access to their resources without sharing their credentials directly, enabling secure and delegated access to protected data and services.
Scenario: A social media platform implements OAuth for user authentication and authorization, allowing third-party developers to build and integrate applications that access user profiles, photos, and social connections. OAuth enables users to authorize applications using access tokens and consent screens, maintaining control over their data privacy and security while enabling seamless integration with external services and APIs.
OCSP
Online Certificate Status Protocol
Definition: OCSP is an internet protocol used to check the revocation status of digital certificates in real-time by querying certificate authorities (CAs) or OCSP responders, enabling clients to verify the validity and trustworthiness of SSL/TLS certificates during secure communications.
Scenario: A web browser verifies the validity of an SSL certificate presented by a secure website by sending an OCSP request to the certificate issuer’s OCSP responder. The OCSP responder checks the certificate’s status (valid, revoked, or unknown) and sends a signed response back to the browser, allowing the client to make informed decisions about trusting the website’s digital certificate and establishing a secure connection over HTTPS.
OID
Object Identifier
- Definition: OID is a unique alphanumeric string used to identify objects, classes, attributes, and other entities in various information systems and network protocols, such as X.500 directories, SNMP (Simple Network Management Protocol), and digital certificates.
- Scenario: A software developer assigns OIDs to custom objects and attributes in a directory service schema to uniquely identify and manage organizational resources, user accounts, and access controls. OIDs provide a hierarchical naming structure for globally-unique identifiers, facilitating interoperability and standardization across diverse IT environments and data models.
OS
Operating System
- Definition: An operating system (OS) is system software that manages computer hardware resources and provides essential services and interfaces for running applications, executing system processes, and coordinating user interactions.
- Scenario: A user interacts with a desktop computer running a Windows operating system to browse the internet, edit documents, and play multimedia content. The OS provides an intuitive graphical user interface (GUI), device drivers, file management utilities, and system services to facilitate user productivity, software installation, and hardware compatibility on the computer platform.
OSINT
Open-source Intelligence
- Definition: OSINT refers to the collection, analysis, and dissemination of publicly available information from open sources such as social media platforms, websites, public records, and online forums to gather insights and intelligence about individuals, organizations, events, and threats.
- Scenario: A cybersecurity analyst monitors social media channels, news websites, and online forums to gather OSINT about emerging cyber threats, hacker forums, and data breaches affecting the organization’s industry vertical. OSINT sources provide valuable context, threat indicators, and early warnings to help security teams assess risks, prioritize incident response, and strengthen defenses against cyber attacks.
OSPF
Open Shortest Path First
- Definition: OSPF is a routing protocol used to calculate the shortest path and exchange routing information between routers within an autonomous system (AS) based on link-state advertisements (LSAs) and Dijkstra’s shortest path algorithm.
- Scenario: A network engineer configures OSPF on routers to dynamically discover network topologies, compute optimal routes, and exchange routing updates based on link-state changes and network traffic demands. OSPF routers build and maintain a synchronized view of the network topology, facilitating efficient packet forwarding, load balancing, and fault tolerance in large-scale enterprise networks and service provider environments.
OT
Operational Technology
- Definition: OT refers to hardware and software systems used to monitor, control, and automate physical processes, industrial machinery, and critical infrastructure components in sectors such as manufacturing, energy, transportation, and utilities.
- Scenario: An energy company deploys OT systems to manage power generation, distribution, and grid operations, leveraging sensors, SCADA (Supervisory Control and Data Acquisition) systems, and programmable logic controllers (PLCs) to monitor equipment performance, optimize energy efficiency, and ensure grid stability. OT technologies bridge the gap between IT (Information Technology) and operational environments, enabling real-time monitoring, process optimization, and predictive maintenance in industrial settings.
OTA
Over the Air
- Definition: OTA refers to wireless communication methods used to deliver software updates, firmware patches, configuration changes, and media content to mobile devices, IoT (Internet of Things) devices, and embedded systems over cellular networks, Wi-Fi, or satellite links.
- Scenario: A smartphone manufacturer releases an OTA software update to fix security vulnerabilities, improve device performance, and introduce new features to users’ smartphones without requiring physical connections or manual intervention. OTA updates are delivered seamlessly over the air, ensuring timely deployment, minimal disruption, and widespread adoption of software patches and enhancements across diverse device ecosystems.
OVAL
Open Vulnerability Assessment Language
- Definition: OVAL is an XML-based language used to describe and exchange information about security vulnerabilities, software flaws, and configuration issues in IT systems, enabling automated vulnerability assessment, remediation, and compliance auditing across heterogeneous environments.
- Scenario: A cybersecurity team uses OVAL-compliant tools and scanners to assess and prioritize vulnerabilities in network infrastructure, servers, and endpoints based on Common Vulnerabilities and Exposures (CVE) identifiers and OVAL definitions. OVAL assessments provide standardized vulnerability data, severity ratings, and remediation guidance to help organizations identify and mitigate security risks effectively.
P12
PKCS #12
- Definition: P12, also known as PKCS #12, is a file format used to store and transport cryptographic keys, digital certificates, and private key pairs securely, typically protected by password-based encryption algorithms.
- Scenario: A user exports a PKCS #12 file from a web browser after generating a digital certificate and private key for secure email communication. The P12 file contains the user’s digital identity credentials, including the X.509 certificate and corresponding private key, encrypted with a passphrase to prevent unauthorized access and ensure confidentiality during storage and transmission.
P2P
Peer to Peer
- Definition: P2P is a decentralized network architecture that enables direct communication and resource sharing between individual nodes or endpoints without the need for centralized servers or intermediaries.
- Scenario: Users exchange files, share media content, and collaborate on distributed projects using P2P file-sharing networks and applications such as BitTorrent, eDonkey, and decentralized blockchain networks. P2P architectures leverage peer-to-peer protocols and distributed algorithms to facilitate data transfer, content discovery, and content delivery across geographically dispersed nodes, promoting scalability, fault tolerance, and user autonomy in decentralized ecosystems.