• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/18

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

18 Cards in this Set

  • Front
  • Back

NAT

Network Address Translation


Hides internal hosts from the public network, uses an IP proxy, displays one IP address to the internet

VLAN

Virtual Local Area Network


NAC

Network Access Control


Makes security checks of users or actual connections made before sessions are initiated

PaaS

Platform as a Service


A cloud computing service, offering software, OS, and on demand computing

SaaS

Software as a Service


Web based applications, webmail

IaaS

Infrastructure as a Service


Networking and storage

PEAP

Protected Extensible Authentication Protocol - related to wireless authentication

WPA2

WiFi Protected Access 2 - most secure protocol for wireless networks

SLA

Service License Agreement

ICMP

Something

NAS

Something

RPO

Recovery point objective - defines acceptable data loss

MTTR

mean time to repair

MTBF

mean time between failure - average number of failures per million hours

ACL

Access control lists can be used to control the traffic that is allowed in or out of a network. They are usually included as part of a firewall, and they specifically will control the traffic.

OUs

Organizational Units

MAC

Mandatory access control (MAC) is strictest type of access control model that has permissions set by the system and uses security labels for object permissions. It is a well-defined model used primarily by the government.

SDLC

System development life cycle