V, W, X Flashcards

1
Q

VA

A

Vulnerability assessment

An operational defense designed to proactively discover
flaws, incorrect configurations and outdated
applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

VDE

A

Virtual Desktop Environment

Hosting a desktop operating system on a centralized
server and allowing users to remotely access it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

VDI

A

Virtual Desktop Infrastructure

Hosting a desktop operating system on a centralized
server and allowing users to remotely access it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

VLAN

A

Virtual Local Area Network

A technology for isolating and nodes attached to
switches into various groups to enhance performance
and create isolation-based security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

VLSM

A

Variable-length Subnet Masking

An IP network masking technique that does not require
full bytes in each position of the mask.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

VM

A

Virtual Machine

The implementation of an operating system within an
application running on top of another host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

VoIP

A

Voice over IP

Converting analog sound into packet eyes data for
efficient transport over the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

VPC

A

Virtual Private Cloud

An implementation of cloud computing where in the
cloud service provider reserves resources for particular
group or customer, providing isolation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

VPN

A

Virtual Private Network

The transmission of information in a protected form
over potentially hostile mediums.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

VTC

A

Video Teleconferencing

Video or audio conductivity between remote sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

WAF

A

Web Application Firewall

A filtering device designed to perform deep content
inspection to identify application threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

WAP

A

Wireless Access Point

The hub of communication in a radio-based data
network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

WEP

A

Wired Equivalent Privacy

The now deprecated authentication and confidentiality
measures used by 802.11 networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

WIDS

A

Wireless Intrusion Detection System

This is an intrusion sensor that looks for 802.11-related
threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WIPS

A

Wireless Intrusion Prevention System

This is an intrusion sensor that stops 802.11-related
threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

WORM

A

Write Once Read Many

One-way writing of logs and performance data.

17
Q

Worm

A

Massive propagation messages

Self-propagating malicious software that floods a
network, causing a denial of service.

18
Q

WPA

A

WiFi Protected Access

The predecessor to WPA/2 that implemented TKIP.

19
Q

WPA2

A

WiFi Protected Access 2

The successor to WPA that incorporates AES-CCMP.

20
Q

WPS

A

WiFi Protected Setup

New clients may gain access by pushing a button.

21
Q

XaaS

A

Anything as a Service

A broad term that refers to accessing any type of
service, large or small, via the Internet and it is
commonly associated with cloud computing.

22
Q

x.509v3

A

Schema of identification document.

Definition and structure for server, host, and personal
identification.

23
Q

XML

A

Extensible Markup Language

A text-based language that defines the encoding of
documents and data so that it is both human readable
and machine readable, commonly associated with web
services.

24
Q

XOR

A

Exclusive Or

A mathematical bit -wise operation, commonly
employed in encryption.

25
Q

XSRF

A

Cross-site Request Forgery

An attack wherein a message is spoofed from a user to a
trusted site.