Acronyms "T, U, V" Flashcards

1
Q

TACAS+

A

Terminal Access Controller Access Control System

  • Port 49
  • Authentication protocol used for remote communication with any server in a UNIX network or terminals
  • Uses allow/deny mechanisms with auth keys that correspond to usernames and passwords
  • Primarily used for device administration, but can technically be used for some network management
  • Encrypts the entire packet
  • Separates authentication and authorization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

TAXII

A

Trusted Automated eXchange of Indicator Information

  • Aims to enable robust, secure, and high-volume exchanges of cyber threat information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

TCP/IP

A

Transmission Control Protocol / Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TGT

A

Ticket Granting Ticket

  • Files created by the key distribution center (KDC) portion of the Kerberos authentication protocol
  • Used to grant users access to network resources
  • Once the user has the TGT, they use it to obtain a service ticket from the Ticket Granting Service (TGS), at which point the user is granted access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

TKIP

A

Temporal Key Integrity Protocol

  • Security protocol used in IEEE 802.11 wireless networking standard
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TLS

A

Transport Layer Security

  • Successor of deprecated SSL
  • Provides secure communications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TOTP

A

Time-based One Time Password

  • String of dynamic digits of code who change values based on time
  • Used for MFA
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TPM

A

Trusted Platform Module

  • Dedicated microcontroller/chip designed to secure hardware with integrated crypto keys
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TSIG

A

Transaction Signature

Computer-networking protocol, primarily enables DNS to authenticate updates to a DNS database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

TTP

A

Tactics, Techniques, Procedures

  • Behaviors, methods, tools, and strategies that cyber threat actors and hackers use to plan and execute cyber attacks on business networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

UAT

A

User Acceptance Testing

  • Last phase of the software testing process
  • Actual software users test the software to make sure it can handle necessary, real-world tasks and scenarios, according to specifications
  • Aka User Acceptability Testing or End-User testing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

UAV

A

Unmanned Aerial Vehicle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

UDP

A

User Datagram Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

UEFI

A

Unified Extensible Firmware Interface

  • Specification that defines a software interface between an OS and platform firmware
  • Replaces the legacy BIOS firmware interface, but provides legacy BIOS services
  • UEFI can support remote diagnostics and repair of computers, even if no OS is installed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

UEM

A

Unified Endpoint Management

  • Allows you to manage, secure, and deploy resources and apps on any device from a single console
  • Goes beyond just MDM since it can also control PCs, or IoT devices, for example
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

UPS

A

Un-iterruptable Power Supply

  • Provides an emergency power to a load in the event of power failure
17
Q

URI

A

Uniform Resource Identifier

  • Identifier for a specific resource
  • Used in some URL’s
18
Q

URL

A

Universal Resource Locator

  • All URLs are URIs, but not all URIs are URLs
  • If the protocol (http, https, ftp, etc) is present or implied, then it’s a URL
19
Q

USB

A

Universal Serial Bus

20
Q

USB OTG

A

USB On The Go

  • Allows USB devices to act as a host, allowing other USB devices to attack to them
  • Those devices can then switch back and forth between the roles of host and device
  • For example, a phone may read from the removal media as the host, but then act as a mass storage device
21
Q

UTM

A

Unified Threat Management

  • When a single hardware or software provides multiple security functions
  • This is in contrast of having individual solutions for each security function
22
Q

UTP

A

Unshielded Twisted Pair

23
Q

VBA

A

Visual Basic

  • Event-driven programming language from Microsoft
24
Q

VDE

A

Virtual Desktop Environment

25
Q

VDI

A

Virtual Desktop Infrastructure

  • When the desktop and application software is separated from the hardware
26
Q

VLAN

A

Virtual Local Area Network

  • A partitioned and isolated part of a LAN created with logic (not physical separation
27
Q

VLSM

A

Variable Length Subnet Masking

  • A design where subnets can have varying sizes
28
Q

VM

A

Virtual Machine

29
Q

VoIP

A

Voice Over IP

30
Q

VPC

A

Virtual Private Cloud

  • On-demand pool of shared resources in a public cloud environment
  • Provides isolation between organization and resources
  • Lets you essentially carve out a piece of the public cloud to host your private resources
31
Q

VPN

A

Virtual Private Network

  • Encrypted connection over the Internet from a device to a network
  • Helps ensure that you can communicate with remote systems securely and prevents eavesdropping on the traffic
32
Q

VTC

A

Video Teleconferencing