N Flashcards

1
Q

NAC

A

Network Access Control

A technology primarily used for local access control
that may involve MAC addresses and 802.1x.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

NAS

A

Network-attached Storage

File oriented storage of computer information across the
network on a central device that may be using multiple
storage media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NAT

A

Network Address Translation

This is commonly implemented by firewalls and is used
to remap address space on the inside to one or several
addresses on the outside edge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

NDA

A

Non-disclosure Agreement

A legally binding agreement, compelling parties to not
reveal information to others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NFC

A

Near Field Communication

This is a short range wireless technology, commonly
used for payment systems and person-to-person data
exchanges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NFV

A

Network Function Virtualization

An architectural concept that utilizes virtual machines
and virtual infrastructures to connect and manage
networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NGFW

A

Next-generation Firewall

Considered a third-generation technology, this type of
firewall implements multiple security measures, such as
filtering, VPN, social media monitoring and more to
provide protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NG-SWG

A

Next-generation Secure Web Gateway

A cloud-based defensive measure designed to protect
users from web-based threats and to provide
enforcement of corporate policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NIC

A

Network Interface Card

The layer 2 device that physically connects a system to
a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NIDS

A

Network-based Intrusion Detection System

The technology used to scan, packet data for threats and
exploits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

NIPS

A

Network-based Intrusion Prevention System

A technology that identifies and stops attacks by
inspecting network information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

NIST

A

National Institute of
Standards & Technology

A government group that publishes recommendations
and standards, many related to IT security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

NOC

A

Network Operations Center

IT network management, monitoring and control are
performed here.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NOP

A

No operation

A common element in memory corruption attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NTFS

A

New Technology File System

The file system used by Windows that incorporates
multilevel security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

NTP

A

Network Time Protocol

A UDP protocol designed to synchronize time across a
network.

17
Q

NTP

A

Network Time Protocol

This protocol is necessary to support Kerberos and its
requirement for close chronograph management.