Day 16 Flashcards
This is a multifunction firewall system, commonly supporting VPN, NAT, antivirus, spam filtering, intrusion detection and content filtering.
UTM
Unified Threat Management
Commonly known as four-pair, in ubiquitous use for data networking wired connections.
UTP
Unshielded Twisted Pair
An operational defense designed to proactively discover flaws, incorrect configurations and outdated applications.
VA
Vulnerability assessment
Hosting a desktop operating system on a centralized server and allowing users to remotely access it.
VDE
Virtual Desktop Environment
Hosting a desktop operating system on a centralized server and allowing users to remotely access it.
VDI
Virtual Desktop Infrastructure
A technology for isolating and nodes attached to switches into various groups to enhance performance and create isolation-based security.
VLAN
Virtual Local Area Network
An IP network masking technique that does not require full bytes in each position of the mask.
VLSM
Variable-length Subnet Masking
The implementation of an operating system within an application running on top of another host.
VM
Virtual Machine
Converting analog sound into packet eyes data for efficient transport over the Internet.
VoIP
Voice over IP
An implementation of cloud computing where in the cloud service provider reserves resources for particular group or customer, providing isolation.
VPC
Virtual Private Cloud
The transmission of information in a protected form over potentially hostile mediums.
VPN
Virtual Private Network
Video or audio conductivity between remote sites.
VTC
Video Teleconferencing
A filtering device designed to perform deep content inspection to identify application threats.
WAF
Web Application Firewall
The hub of communication in a radio-based data network.
WAP
Wireless Access Point
The now deprecated authentication and confidentiality measures used by 802.11 networks.
WEP
Wired Equivalent Privacy
This is an intrusion sensor that looks for 802.11-related threats.
WIDS
Wireless Intrusion Detection System
This is an intrusion sensor that stops 802.11-related threats.
WIPS
Wireless Intrusion Prevention System
One-way writing of logs and performance data.
WORM
Write Once Read Many
Self-propagating malicious software that floods a network, causing a denial of service.
Worm
Massive propagation messages
The predecessor to WPA/2 that implemented TKIP.
WPA
WiFi Protected Access
The successor to WPA that incorporates AES-CCMP.
WPA2
WiFi Protected Access 2
New clients may gain access by pushing a button.
WPS
WiFi Protected Setup
A broad term that refers to accessing any type of service, large or small, via the Internet and it is commonly associated with cloud computing.
XaaS
Anything as a Service
Definition and structure for server, host, and personal identification.
x.509v3
Schema of identification document.
A text-based language that defines the encoding of documents and data so that it is both human readable and machine readable, commonly associated with web services.
XML
Extensible Markup Language
A mathematical bit -wise operation, commonly employed in encryption.
XOR
Exclusive Or
An attack wherein a message is spoofed from a user to a trusted site.
XSRF
Cross-site Request Forgery
Web application attack that relies on malicious user, script input to steal information from other users.
XSS
Cross-site Scripting