Professor Messer Practice Exams Flashcards
(52 cards)
SPF
Sender Policy Framework: An email authentication method designed to detect forging sender addresses during the delivery of the email.
NAC
Network Access Control: A way to limit network access to only authorized users.
DMARC
Domain Message Authentication Reporting and Conformance: An email authentication protocol designed to give email domain owners the ability to protect their domain from unauthorized use, commonly known as email spoofing.
DKIM
DomainKeys Identified Mail: An email method designed to detect forged sender addresses in emails.
UTM
Unified Threat Manager: A comprehensive solution that has evolved from traditional firewall solutions into a product that can perform multiple security functions within one single system.
Federation
Allows members of one organization to authenticate using the credentials of another organization.
802.1X
A network access control using EAP over Ethernet.
EAP
Extensible Authentication Protocol: An authentication framework frequently used in wireless networks.
SSO
Single Sign-on: A property of access control of multiple related, yet independent, software systems. With this property, a user logs in with a single ID and password to gain access to any of several related systems.
MTBF
Mean Time Between Failures: The average time between system failures.
RTO
Recovery Time Objective: The time within which a business process must be restored after an incident.
MTTR
Mean Time to Repair: The average time taken to repair a failed component or system.
RPO
Recovery Point Objective: describes the minimum data or operational state required to categorize a system as recovered.
SLA
Service Level Agreement: Defines the level and quality of service expected from the vendor.
SOW
Statement of Work: Specifies the particular services a vendor will deliver in a specific instance.
MOA
Memorandum of Agreement: Documents outlining mutual understandings, goals, and responsibilities but might not be legally binding.
NDA
Non‐disclosure Agreement: Binds the vendor to confidentiality, ensuring that organizational secrets or proprietary information isn’t disclosed.
COPE
Corporate Owned, Personally Enabled: A business strategy for managing mobile devices that allows employees to use corporate‐owned IT devices for personal use.
MDM
Mobile Device Management: A type of security software used by an IT department to monitor, manage, and secure employees’ mobile devices that are deployed across multiple mobile service providers and across multiple mobile operating systems being used in the organization.
WPA3
Wi-Fi Protected Access 3: An encryption protocol for 802.11 wireless networking.
PSK
Pre-Shared Key: A wireless configuration option that allows everyone on the network to use the same access key or password when connecting to the wireless network.
MFA
Multifactor Authentication: The use of multiple types of authentication checks.
CYOD
Choose Your Own Device: Allows the user to pick the make and model of their device.
SASE
Secure Access Service Edge: A next-generation VPN technology designed to optimize the process of secure communication to cloud services.