Day 9 Reversed Flashcards

1
Q

MPLS

A

Multi-protocol Label Switching

This is used by WAN providers to quickly forward data using short and discrete labels, rather than complex network addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

MSCHAP

A

Microsoft Challenge Handshake Authentication Protocol

Uses an initial handshake to create a nonce added to the hashed ID and secret to create varying outputs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

MSP

A

Managed Service Provider

A specialty provider of IT services management contracted by a client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

MSSP

A

Managed Security Service Provider

A contracted service wherein an outside party manages, monitors and maintains security services, including firewalls, intrusion detection, virtual private networks
and end point security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MTBF

A

Mean Time Between Failures

The estimation as to how often serious errors occur, typically measured in thousands of hours.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

MTTR

A

Mean Time to Recover or Mean Time to Repair

A standard recovery statistic indicating swiftness of DRP responses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

MTU

A

Maximum Transmission Unit

The maximum number of bytes allowed within a datalink technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NAC

A

Network Access Control

A technology primarily used for local access control that may involve MAC addresses and 802.1x.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NAS

A

Network-attached Storage

File oriented storage of computer information across the network on a central device that may be using multiple storage media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NAT

A

Network Address Translation

This is commonly implemented by firewalls and is used to remap address space on the inside to one or several addresses on the outside edge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

NDA

A

Non-disclosure Agreement

A legally binding agreement, compelling parties to not reveal information to others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

NFC

A

Near Field Communication

This is a short range wireless technology, commonly used for payment systems and person-to-person data exchanges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

NFV

A

Network Function Virtualization

An architectural concept that utilizes virtual machines and virtual infrastructures to connect and manage networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NGFW

A

Next-generation Firewall

Considered a third-generation technology, this type of firewall implements multiple security measures, such as filtering, VPN, social media monitoring and more to
provide protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NG-SWG

A

Next-generation Secure Web Gateway

A cloud-based defensive measure designed to protect users from web-based threats and to provide enforcement of corporate policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

NIC

A

Network Interface Card

The layer 2 device that physically connects a system to a network.

17
Q

NIDS

A

Network-based Intrusion Detection System

The technology used to scan, packet data for threats and exploits.

18
Q

NIPS

A

Network-based Intrusion Prevention System

A technology that identifies and stops attacks by inspecting network information.

19
Q

NIST

A

National Institute of Standards & Technology

A government group that publishes recommendations and standards, many related to IT security.

20
Q

NOC

A

Network Operations Center

IT network management, monitoring and control are performed here.

21
Q

NOP

A

No operation

A common element in memory corruption attacks.

22
Q

NTFS

A

New Technology File System

The file system used by Windows that incorporates multilevel security.

23
Q

NTP

A

Network Time Protocol

A UDP protocol designed to synchronize time across a network.

This protocol is necessary to support Kerberos and its requirement for close chronograph management.

24
Q

OAUTH

A

Open Authorization

An authentication mechanism that allows secure delegated access.