Day 8 Flashcards
Protects a private or secret key from unauthorized access or disclosure.
KEK
Key Encryption Key
Filter and forward data at the MAC layer.
L2 Device
Switch
Supports VPN site to site connections but does not encrypt.
L2TP
Layer 2 Tunneling Protocol
This is an infrastructure device that interconnects networks and can span different technologies.
L3 Device
Router
A network composed of relatively short-range protocols that facilitate swift transfer of information.
LAN
Local Area Network
This is a protocol designed to work with AD or NDS information from a tree.
LDAP
Lightweight Directory Access Protocol
Commonly integrated with Cisco systems to facilitate centralized authentication.
LEAP
Lightweight Extensible Authentication Protocol
A category of malicious activity, wherein an authorized user adds unwanted instructions.
Logic Bomb
Insider alteration
The staging of general purpose or security management systems on the cloud that manage local agent-based systems.
MaaS
Monitoring as a Service
This is typified by a network interface card, along with its unique burned in identifying number.
MAC
Media Access Control
A strict form of access control that prevents subjects from accessing objects above their security level.
MAC
Mandatory Access Control
A small piece of information sent along with a message that validates the sender.
MAC
Message Authentication Code
Management software designed to allow an enterprise to maintain control over its mobile devices, smart phones and tablets.
MAM
Mobile Application Management
A general description of a technology that allows access across entire municipal areas.
MAN
Metropolitan Area Network
An access point to a physical organization designed to regulate inbound and outbound access.
Mantrap
Screening area