Day 16 COPY Flashcards

1
Q

This is a multifunction firewall system, commonly supporting VPN, NAT, antivirus, spam filtering, intrusion detection and content filtering.

A

UTM

Unified Threat Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Commonly known as four-pair, in ubiquitous use for data networking wired connections.

A

UTP

Unshielded Twisted Pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An operational defense designed to proactively discover flaws, incorrect configurations and outdated applications.

A

VA

Vulnerability assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hosting a desktop operating system on a centralized server and allowing users to remotely access it.

A

VDE

Virtual Desktop Environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hosting a desktop operating system on a centralized server and allowing users to remotely access it.

A

VDI

Virtual Desktop Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A technology for isolating and nodes attached to switches into various groups to enhance performance and create isolation-based security.

A

VLAN

Virtual Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An IP network masking technique that does not require full bytes in each position of the mask.

A

VLSM

Variable-length Subnet Masking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The implementation of an operating system within an application running on top of another host.

A

VM

Virtual Machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Converting analog sound into packet eyes data for efficient transport over the Internet.

A

VoIP

Voice over IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An implementation of cloud computing where in the cloud service provider reserves resources for particular group or customer, providing isolation.

A

VPC

Virtual Private Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The transmission of information in a protected form over potentially hostile mediums.

A

VPN

Virtual Private Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Video or audio conductivity between remote sites.

A

VTC

Video Teleconferencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A filtering device designed to perform deep content inspection to identify application threats.

A

WAF

Web Application Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The hub of communication in a radio-based data network.

A

WAP

Wireless Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The now deprecated authentication and confidentiality measures used by 802.11 networks.

A

WEP

Wired Equivalent Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This is an intrusion sensor that looks for 802.11-related threats.

A

WIDS

Wireless Intrusion Detection System

17
Q

This is an intrusion sensor that stops 802.11-related threats.

A

WIPS

Wireless Intrusion Prevention System

18
Q

One-way writing of logs and performance data.

A

WORM

Write Once Read Many

19
Q

Self-propagating malicious software that floods a network, causing a denial of service.

A

Worm

Massive propagation messages

20
Q

The predecessor to WPA/2 that implemented TKIP.

A

WPA

WiFi Protected Access

21
Q

The successor to WPA that incorporates AES-CCMP.

A

WPA2

WiFi Protected Access 2

22
Q

New clients may gain access by pushing a button.

A

WPS

WiFi Protected Setup

23
Q

A broad term that refers to accessing any type of service, large or small, via the Internet and it is commonly associated with cloud computing.

A

XaaS

Anything as a Service

24
Q

Definition and structure for server, host, and personal identification.

A

x.509v3

Schema of identification document.

25
Q

A text-based language that defines the encoding of documents and data so that it is both human readable and machine readable, commonly associated with web services.

A

XML

Extensible Markup Language

26
Q

A mathematical bit -wise operation, commonly employed in encryption.

A

XOR

Exclusive Or

27
Q

An attack wherein a message is spoofed from a user to a trusted site.

A

XSRF

Cross-site Request Forgery

28
Q

Web application attack that relies on malicious user, script input to steal information from other users.

A

XSS

Cross-site Scripting