V, W, X Flashcards
VA
Vulnerability assessment
An operational defense designed to proactively discover
flaws, incorrect configurations and outdated
applications.
VDE
Virtual Desktop Environment
Hosting a desktop operating system on a centralized
server and allowing users to remotely access it.
VDI
Virtual Desktop Infrastructure
Hosting a desktop operating system on a centralized
server and allowing users to remotely access it.
VLAN
Virtual Local Area Network
A technology for isolating and nodes attached to
switches into various groups to enhance performance
and create isolation-based security.
VLSM
Variable-length Subnet Masking
An IP network masking technique that does not require
full bytes in each position of the mask.
VM
Virtual Machine
The implementation of an operating system within an
application running on top of another host.
VoIP
Voice over IP
Converting analog sound into packet eyes data for
efficient transport over the Internet.
VPC
Virtual Private Cloud
An implementation of cloud computing where in the
cloud service provider reserves resources for particular
group or customer, providing isolation.
VPN
Virtual Private Network
The transmission of information in a protected form
over potentially hostile mediums.
VTC
Video Teleconferencing
Video or audio conductivity between remote sites.
WAF
Web Application Firewall
A filtering device designed to perform deep content
inspection to identify application threats.
WAP
Wireless Access Point
The hub of communication in a radio-based data
network.
WEP
Wired Equivalent Privacy
The now deprecated authentication and confidentiality
measures used by 802.11 networks.
WIDS
Wireless Intrusion Detection System
This is an intrusion sensor that looks for 802.11-related
threats.
WIPS
Wireless Intrusion Prevention System
This is an intrusion sensor that stops 802.11-related
threats.
WORM
Write Once Read Many
One-way writing of logs and performance data.
Worm
Massive propagation messages
Self-propagating malicious software that floods a
network, causing a denial of service.
WPA
WiFi Protected Access
The predecessor to WPA/2 that implemented TKIP.
WPA2
WiFi Protected Access 2
The successor to WPA that incorporates AES-CCMP.
WPS
WiFi Protected Setup
New clients may gain access by pushing a button.
XaaS
Anything as a Service
A broad term that refers to accessing any type of
service, large or small, via the Internet and it is
commonly associated with cloud computing.
x.509v3
Schema of identification document.
Definition and structure for server, host, and personal
identification.
XML
Extensible Markup Language
A text-based language that defines the encoding of
documents and data so that it is both human readable
and machine readable, commonly associated with web
services.
XOR
Exclusive Or
A mathematical bit -wise operation, commonly
employed in encryption.
XSRF
Cross-site Request Forgery
An attack wherein a message is spoofed from a user to a
trusted site.