V, W, X Flashcards
VA
Vulnerability assessment
An operational defense designed to proactively discover
flaws, incorrect configurations and outdated
applications.
VDE
Virtual Desktop Environment
Hosting a desktop operating system on a centralized
server and allowing users to remotely access it.
VDI
Virtual Desktop Infrastructure
Hosting a desktop operating system on a centralized
server and allowing users to remotely access it.
VLAN
Virtual Local Area Network
A technology for isolating and nodes attached to
switches into various groups to enhance performance
and create isolation-based security.
VLSM
Variable-length Subnet Masking
An IP network masking technique that does not require
full bytes in each position of the mask.
VM
Virtual Machine
The implementation of an operating system within an
application running on top of another host.
VoIP
Voice over IP
Converting analog sound into packet eyes data for
efficient transport over the Internet.
VPC
Virtual Private Cloud
An implementation of cloud computing where in the
cloud service provider reserves resources for particular
group or customer, providing isolation.
VPN
Virtual Private Network
The transmission of information in a protected form
over potentially hostile mediums.
VTC
Video Teleconferencing
Video or audio conductivity between remote sites.
WAF
Web Application Firewall
A filtering device designed to perform deep content
inspection to identify application threats.
WAP
Wireless Access Point
The hub of communication in a radio-based data
network.
WEP
Wired Equivalent Privacy
The now deprecated authentication and confidentiality
measures used by 802.11 networks.
WIDS
Wireless Intrusion Detection System
This is an intrusion sensor that looks for 802.11-related
threats.
WIPS
Wireless Intrusion Prevention System
This is an intrusion sensor that stops 802.11-related
threats.