N Flashcards

1
Q

NAC

A

Network Access Control

The process of restricting unauthorized users and devices from gaining access to a corporate or private network. NAC ensures that only users who are authenticated and devices that are AUTHORIZED AND COMPLIANT with security policies can enter the network.

It can deny network access to noncompliant devices, place them in a quarantined area, or give them only restricted access to computing resources, thus keeping insecure nodes from infecting the network.

It can also manage network guests through a guest management portal. It evaluates security policy compliance by user type, device type, and OS. It mitigates network threats by enforcing security policies that block, isolate, and repair noncompliant machines without administrator attention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

NAT

A

Network Address Translation

A way to map multiple private addresses inside a local network to a single public IP address before transferring the information onto the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NDA

A

Non-Disclosure Agreement

A legal agreement which defines information that the parties wish to protect from dissemination and outlines restrictions on use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

NFC

A

Near Field Communication

A short-range wireless technology that lets NFC-enabled devices communicate with each other.

It allows your phone to act as a transit pass or credit card, quickly transfer data, or instantly pair with Bluetooth devices like headphones and speakers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NGFW

A

Next-Generation Firewall

A network security device that provides capabilities beyond a traditional, stateful firewall.

While a traditional firewall typically provides stateful inspection of incoming and outgoing network traffic, a next-generation firewall includes additional features like application awareness and control, integrated intrusion prevention, and cloud-delivered threat intelligence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NIDS

A

Network-based Intrusion Detection System

A device or a program that monitors a given system or a network for malicious activity or policy violations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NIPS

A

Network-based Intrusion Prevention System

A type of network security software that detects malicious activity on a network, reports information about said activity, and automatically blocks or terminates the activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NIST

A

National Institute of Standards and Technology

A United States government laboratory that works to develop, test, and recommend best practices for federal agencies, and other organizations relating to things such as online security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NTFS

A

New Technology Filesystem

A process that the Windows NT operating system uses for storing, organizing, and finding files on a hard disk efficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NTLM

A

New Technology LAN Manager

This legacy technology has been replaced by Kerberos as the default authentication protocol. It is mainly only used to maintain compatibility with legacy clients and servers.

A suite of security protocols offered by Microsoft to authenticate users’ identity and protect the integrity and confidentiality of their activity.

A single sign on (SSO) tool that relies on a challenge-response protocol to confirm the user without requiring them to submit a password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

NTP

A

Network Time Protocol

An internet protocol used to synchronize with computer clock time sources in a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly