M Flashcards

1
Q

MaaS

A

Monitoring as a Service

An IT service model that allows a third-party provider to monitor a company’s systems and networks. It’s a cloud-based framework that can be used to deploy monitoring functions for various applications and services in the cloud.

This monitors performance, availability, and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

MAC (3)

A

Mandatory Access Control
Media Access Control
Message Authentication Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Mandatory Access Control

A

A model of access control where the operating system provides users with access based on data confidentiality and user clearance levels. In this model, access is granted on a need-to-know basis: users must prove their need for information before gaining access.

This is ONE OF THE MOST SECURE access control models.

This model is non-discretionary, meaning that the owner of the file/folder does not have authority over who can access it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Media Access Control

A

A network data transfer policy that determines how data transmits through a regular network cable.

It is responsible for moving data packets from one NIC to another, across a shared transmission medium. Physical addressing is handled at the MAC sublayer. MAC is also handled at this layer.

This protocol exists to ease data packets’ transfer between two computers and ensure no collision or simultaneous data transit occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Message Authentication Code

A

AKA tag

A short piece of information appended to a message that is used for authenticating and integrity-checking the message. It also verifies that the message does not contain any harmful code. This is done via cryptography.

They can be stored on HSMs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

MAN

A

Metropolitan Area Network

Smaller than a WAN, but larger than a LAN.

A computer network that connects computers within a metropolitan area, which could be a single large city, multiple cities and towns, or any given large area with multiple buildings.

MANs do not have to be in urban areas; the term “metropolitan” implies the size of the network, not the demographics of the area that it serves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

MBR

A

Master Boot Record

The information in the first sector of a hard disk or a removable drive. It identifies how and where the system’s OS is located in order to be booted (loaded) into the computer’s main storage or RAM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

MD5

A

Message Digest 5

A cryptographic hash function algorithm that takes the message as input of any length and changes it into a fixed-length message of 16 bytes.

The output of MD5 (Digest size) is always 128 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

MDF

A

Main Distribution Frame

The primary hub or demarcation point that interconnects private or public IT and telecommunication lines coming into a building to an internal network via any number of intermediate distribution frames (IDFs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

MDM

A

Mobile Device Management

A security software that lets your business implement policies to secure, monitor, and manage your end-user mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

MFA

A

Multifactor Authentication

A cybersecurity security solution that requires users to verify their identity using more than one method to log in to an account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

MFD

A

Multifunction Device

An MFD may act as a combination of some or all of the following devices: printer, copier, scanner, fax, and e-mail.

An office machine which incorporates the functionality of multiple devices in one and generally provides centralized document management/distribution/production in an office setting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

MFP

A

Multifunction Printer

A piece of office equipment that serves the primary purpose of copying and printing documents. They also scans, emails, faxes, browses the internet, and can print straight from the display panel, similar to a computer.

These machines pose a cybersecurity concern because they can contain sensitive data and are often connected to office networks without proper security protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ML

A

Machine Learning

A branch of AI that uses algorithms trained on data sets to create models that help machines perform tasks that humans would normally do. These tasks can include analyzing data, categorizing images, or predicting price fluctuations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

MMS

A

Multimedia Message Service

The standard way of sending messages that include multimedia content, such as text, graphics, photos, audio, and video clips, to and from a mobile phone over a cellular network. MMS is built using the same technology as SMS (Short Message Service) but allows for more than just text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

MOA

A

Memorandum of Agreement

This document is a legally-binding contract.

A document written between parties to cooperatively work together on an agreed upon project or meet an agreed upon objective. It details the obligations and commitments of the parties and allocates and minimizes each party’s risks.

MOAs must contain, but are not limited to:
a listing of the parties involved;
a purpose/statement of work;
terms and conditions;
appropriate bilateral signatures;
duration of agreement; and
any payment terms or special provisions as applicable.

17
Q

MOU

A

Memorandum of Understanding

This document is NOT legally-binding.

An MOU expresses a convergence of will between the parties, indicating an intended common line of action. It is a more formal than a verbal or “hand-shake” agreement but generally lacks the binding power of a contract. MOUs do not require any party to commit funds or other resources. The MOU does not create duties or legally enforceable liabilities or obligations for any party nor does it establish a standard of care attributable to the activities associated with the subject of the agreement.

MOUs should contain the following provisions:
a listing of the parties involved;
a purpose;
terms and conditions;
appropriate bilateral signatures;
duration of the agreement; and
any special provisions as applicable.

18
Q

MPLS

A

Multi-Protocol Label Switching

A networking technology that routes traffic using the shortest path based on “labels”, rather than network addresses to handle forwarding over private WANs. This is a scalable and protocol-independent solution.

In standard IP routing, the packets of data contain no routing information beyond the target/destination IP address where the packet is being sent. Therefore, every router along a particular packet’s journey must make an independent forwarding decision based on the packet’s network-layer header. This is bad for performance.

Instead, packets are grouped into classes with the same characteristics (such as destination or service class), which are then handled in the same way on an MPLS network.

19
Q

MSA

A

Master Service Agreement

A legal contract that establishes the terms and conditions for a business relationship–current and future activities and responsibilities–between two or more parties. MSAs are often used for long-term, ongoing relationships, such as client/vendor interactions, government contracts, and union negotiations.

20
Q

MSCHAP

A

Microsoft Challenge Handshake Authentication Protocol

A password-based authentication protocol that uses a challenge-response method. It’s used in a variety of network communication scenarios, including:

PPTP-based VPNs
RADIUS servers
EAP

21
Q

MSP

A

Managed Service Provider

An organization that provides IT help and administration to businesses. they may also provide some security services, but they are mainly focused on IT and administration.

22
Q

MSSP

A

Managed Security Service Provider

An organization that provides cybersecurity services to businesses. They may also provide some IT services, but mainly in the realm of security.

23
Q

MTBF

A

Mean Time Between Failures

The average time between repairable failures of a technology product. The metric is used to track both the availability and reliability of a product. The higher the time between failure, the more reliable the system.

24
Q

MTTF

A

Mean Time to Failure

The average amount of time a non-repairable asset operates before it fails.

25
Q

MTTR

A

Mean Time to Recover

The average time it takes to recover from a system, equipment, or process failure, from the time it fails until it’s fully operational again. This includes the time it takes to detect and diagnose the issue, as well as fix the problem.

It’s also known as mean time to restore, mean time to repair, or mean time to resolve.

26
Q

MTU

A

Maximum Transmission Unit

A measurement in bytes of the largest data packets that a network-connected device can accept.