Term
What is the acronym for the type of computer security solution that allows to define and enforce network access policies? |
|
Definition
|
|
Term
What is the Protocol designed to secure WLAN data? |
|
Definition
WTLS: Wireless Transport Layer Security |
|
|
Term
|
Definition
|
|
Term
What is the acronym for sophisticated and prolonged cyberattacks often carried out by well-funded and organized groups? |
|
Definition
|
|
Term
What analyzes protocol behavior to monitor the entire network for suspicious traffic. Often is a dedicated network. |
|
Definition
|
|
Term
Give the acronym of the method for creating and verifying digital signatures |
|
Definition
DSA: Digital Signature Algorithm |
|
|
Term
What is the acronym for documentation outlining goals between two or more parties that's less formal? |
|
Definition
|
|
Term
|
Definition
Encapsulating Security Payload |
|
|
Term
What is the acronym for the mobile device deployment model in which employees select devices for work-related tasks |
|
Definition
|
|
Term
Give the acronym that is the Security Standard introduced to address issues with WEP |
|
Definition
WPA: WiFi Protected Access |
|
|
Term
Give the acronym that enables secure, real-time delivery of audio and video over an IP network |
|
Definition
|
|
Term
What is the acronym that defines a system designed to monitor unauthorized activities in WLANs |
|
Definition
|
|
Term
Give the acronym for the global standard development organization composed of different national standards bodies |
|
Definition
ISO: (The) International Organization for Standardization |
|
|
Term
What acronym is a service for organizations to create web applications? |
|
Definition
PaaS: Platform as a Service |
|
|
Term
A service provider hosts applications and makes them available to customers is what acronym? |
|
Definition
SaaS: Software as a Service |
|
|