Acroynm Definitions Flashcards

(33 cards)

1
Q

Helps protect email domains from unauthorized use, such as email spoofing.

A

DMARC (Domain based message authentication reporting and conformance)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Provides a way to validate all digitally signed messages from a specific email server.

A

DKIM (Domain Keys Identified Mail)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A list of all authorized mail servers for a specific domain

A

SPF (sender policy framework)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A way to limit network access to only authorized users.

A

NAC (network access control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Connects local area networks across large distances using controlling software that works with a variety of networking hardware. (Cloud based)

A

SD-WAN (software defined networking in a wide area network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A formal document where both sides agree to a broad set of goals and objectives associated with the partnership.

A

MOA (memorandum of agreement)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Provided as a formal contract between two parties that documents the minimum terms for service provided.

A

SLA (service level agreement)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A detailed list of items to be completed as part of an overall project deliverables.

A

SOW (statement of work)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A confidentiality agreement between parties.

A

NDA (Non disclosure agreement)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A prediction of how often a repairable system will fail

A

MTBF (mean time between failures)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define a set of objectives needed to restore a particular service level.

A

RTO (Recovery Time Objectives)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The amount of time it takes to repair a component.

A

MTTR (mean time to restore) (repair)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describes the minimum data or operational state required to categorize a system as recovered.

A

RPO (recovery point objective)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An authentication framework commonly associated with network access control

A

EAP (extensible authentication protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Watches traffic flow across the network

A

UTM (unified threat manager)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The address system of the Internet and has the core function of delivering packets of information from a source device to a target device.

A

IP (Internet Protocol)

17
Q

Handles packet ordering and error checking

A

TCP (Transmission control protocol)

18
Q

The collection of Internet connected gadgets such as cameras, refrigerators, and smart speakers

A

IoT (internet of things)

19
Q

Used to diagnose network issues over the Internet

A

ICMP (Internet control message protocol)

20
Q

A transport layer communication protocol, a very common protocol for voice and video traffic

A

UDP (user datagram protocol)

21
Q

A trusted entity that issues digital certificates to verify the identity of websites, email, addresses, companies, or individuals.

A

CA (certificate authority)

22
Q

A list of digital certificates that have been revoked by the certificate authority that issues them before their expiration date

A

CRL (certificate revocation list)

23
Q

A specially formatted encrypted message sent from a secure sockets layer (SSL) digital certificate applicant to a certificate authority

A

CSR (certificate signing request)

24
Q

An Internet protocol that certificate authorities use to determine the status of secure sockets layer/transport layer security (SSL/TLS) certificates

A

OCSP (online certificate status protocol)

25
An OS that guarantees real time applications a certain capability within a specified deadline
RTOS (real time operating system)
26
A system of devices, networks, and controls that work together to manage industrial processes
ICS (industrial control system)
27
An approach to network management that enables dynamic and programmatically efficient network configuration to improve network performance and monitoring in a manner more akin to cloud computing than to traditional network management
SDN (software defined networking)
28
A security solution that identifies and helps prevent unsafe or inappropriate sharing, transfer, or use of sensitive data
DLP (data loss prevention)
29
A systems ability to operate continuously, with minimal or no downtime, and at a high level of performance
HA (High Availability)
30
Hardened, tamper resistant hardware devices that secure cryptographic processes by generating, protecting, and managing keys used for encrypting and decrypting data and creating digital signatures and certificates
HSM (Hardware security module)
31
A security program that monitors a single device for suspicious activity and prevents threats to the device’s integrity
HIPS (host based intrusion prevention system)
32
A method of managing user access to systems, networks, or resources based on their role within an organization
RBAC (Role based access control)
33
The practice of collecting and analyzing publicly available data to produce actionable intelligence
OSINT (open source intelligence)