Day 8 Reversed Flashcards
KEK
Key Encryption Key
Protects a private or secret key from unauthorized access or disclosure.
L2 Device
Switch
Filter and forward data at the MAC layer.
L2TP
Layer 2 Tunneling Protocol
Supports VPN site to site connections but does not encrypt.
L3 Device
Router
This is an infrastructure device that interconnects networks and can span different technologies.
LAN
Local Area Network
A network composed of relatively short-range protocols that facilitate swift transfer of information.
LDAP
Lightweight Directory Access Protocol
This is a protocol designed to work with AD or NDS information from a tree.
LEAP
Lightweight Extensible Authentication Protocol
Commonly integrated with Cisco systems to facilitate centralized authentication.
Logic Bomb
Insider alteration
A category of malicious activity, wherein an authorized user adds unwanted instructions.
MaaS
Monitoring as a Service
The staging of general purpose or security management systems on the cloud that manage local agent-based systems.
MAC
This is typified by a network interface card, along with its unique burned in identifying number.
Media Access Control
MAC
A strict form of access control that prevents subjects from accessing objects above their security level.
Mandatory Access Control
MAC
A small piece of information sent along with a message that validates the sender.
Message Authentication Code
MAM
Mobile Application Management
Management software designed to allow an enterprise to maintain control over its mobile devices, smart phones and tablets.
MAN
Metropolitan Area Network
A general description of a technology that allows access across entire municipal areas.
Mantrap
Screening area
An access point to a physical organization designed to regulate inbound and outbound access.