Day 9 Flashcards

1
Q

This is used by WAN providers to quickly forward data using short and discrete labels, rather than complex network addresses.

A

MPLS

Multi-protocol Label Switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Uses an initial handshake to create a nonce added to the hashed ID and secret to create varying outputs.

A

MSCHAP

Microsoft Challenge Handshake Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A specialty provider of IT services management contracted by a client.

A

MSP

Managed Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A contracted service wherein an outside party manages, monitors and maintains security services, including firewalls, intrusion detection, virtual private networks
and end point security.

A

MSSP

Managed Security Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The estimation as to how often serious errors occur, typically measured in thousands of hours.

A

MTBF

Mean Time Between Failures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A standard recovery statistic indicating swiftness of DRP responses.

A

MTTR

Mean Time to Recover or Mean Time to Repair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The maximum number of bytes allowed within a datalink technology.

A

MTU

Maximum Transmission Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A technology primarily used for local access control that may involve MAC addresses and 802.1x.

A

NAC

Network Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

File oriented storage of computer information across the network on a central device that may be using multiple storage media.

A

NAS

Network-attached Storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This is commonly implemented by firewalls and is used to remap address space on the inside to one or several addresses on the outside edge.

A

NAT

Network Address Translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A legally binding agreement, compelling parties to not reveal information to others.

A

NDA

Non-disclosure Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This is a short range wireless technology, commonly used for payment systems and person-to-person data exchanges.

A

NFC

Near Field Communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An architectural concept that utilizes virtual machines and virtual infrastructures to connect and manage networks.

A

NFV

Network Function Virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Considered a third-generation technology, this type of firewall implements multiple security measures, such as filtering, VPN, social media monitoring and more to
provide protection.

A

NGFW

Next-generation Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A cloud-based defensive measure designed to protect users from web-based threats and to provide enforcement of corporate policies.

A

NG-SWG

Next-generation Secure Web Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The layer 2 device that physically connects a system to a network.

A

NIC

Network Interface Card

17
Q

The technology used to scan, packet data for threats and exploits.

A

NIDS

Network-based Intrusion Detection System

18
Q

A technology that identifies and stops attacks by inspecting network information.

A

NIPS

Network-based Intrusion Prevention System

19
Q

A government group that publishes recommendations and standards, many related to IT security.

A

NIST

National Institute of Standards & Technology

20
Q

IT network management, monitoring and control are performed here.

A

NOC

Network Operations Center

21
Q

A common element in memory corruption attacks.

A

NOP

No operation

22
Q

The file system used by Windows that incorporates multilevel security.

A

NTFS

New Technology File System

23
Q

A UDP protocol designed to synchronize time across a network.

This protocol is necessary to support Kerberos and its requirement for close chronograph management.

A

NTP

Network Time Protocol

24
Q

An authentication mechanism that allows secure delegated access.

A

OAUTH

Open Authorization