M Flashcards

(27 cards)

1
Q

MaaS

A

Monitoring as a Service

The staging of general purpose or security management
systems on the cloud that manage local agent-based
systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

MAC

A

Media Access Control

This is typified by a network interface card, along with
its unique burned in identifying number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

MAC

A

Mandatory Access Control

A strict form of access control that prevents subjects
from accessing objects above their security level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

MAC

A

Message Authentication Code

A small piece of information sent along with a message
that validates the sender.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MAM

A

Mobile Application Management

Management software designed to allow an enterprise to
maintain control over its mobile devices, smart phones
and tablets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

MAN

A

Metropolitan Area Network

A general description of a technology that allows access
across entire municipal areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Mantrap

A

Screening area

An access point to a physical organization designed to
regulate inbound and outbound access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

MBR

A

Master Boot Record

A pointer to an area on the disk where initial loading
information is stored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

MD5

A

Message Digest 5

One of the oldest hashing algorithms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

MDF

A

Main Distribution Frame

This is the centralized connection point between
intermediate distribution frames and the outside world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

MDM

A

Mobile Device Management

Software that centrally controls the security aspects and
configuration of smart phones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

MFA

A

Multi-Factor Authentication

Requiring the use of two or more of location, something
you know, have, are or do.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

MFD

A

Multifunction Device

Office equipment, typically a printer, that is able to fax,
photocopy and scan documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

MFP

A

Multifunction Printer

A printer that can fax, photocopy and scan documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

MITM

A

Man-in-the-Middle

An attacker insinuates itself between a client and a
server, observing or modifying communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

MITM

A

Man in the middle

On-Path attack wherein a node listens to and takes over
a conversation by insinuating itself in the stream of
communication.

17
Q

ML

A

Machine Learning

A component of artificial intelligence that enables a
system to learn, adapt and improve based upon inputs
without having to be reprogrammed.

18
Q

MMS

A

Multimedia Message Service

A protocol intended to facilitate multimedia transfer
over SMS.

19
Q

MOA

A

Memorandum of Agreement

This is a document that describes the cooperative work
to be taken together by two parties toward an objective.

20
Q

MOU

A

Memorandum of Understanding

This provides terms and details necessary for two
parties to work together.

21
Q

MPLS

A

Multi-protocol Label Switching

This is used by WAN providers to quickly forward data
using short and discrete labels, rather than complex
network addresses.

22
Q

MSCHAP

A

Microsoft Challenge
Handshake Authentication
Protocol

Uses an initial handshake to create a nonce added to the
hashed ID and secret to create varying outputs.

23
Q

MSP

A

Managed Service Provider

A specialty provider of IT services management
contracted by a client.

24
Q

MSSP

A

Managed Security Service Provider

A contracted service wherein an outside party manages,
monitors and maintains security services, including
firewalls, intrusion detection, virtual private networks
and end point security.

25
MTBF
Mean Time Between Failures The estimation as to how often serious errors occur, typically measured in thousands of hours.
26
MTTR
Mean Time to Recover or Mean Time to Repair A standard recovery statistic indicating swiftness of DRP responses.
27
MTU
Maximum Transmission Unit The maximum number of bytes allowed within a datalink technology.