100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CISMP ACRONYMS EXAM QUESTIONS AND ANSWERS WITH COMPLET SOLUTIONS RATED A++ $9.49   Add to cart

Exam (elaborations)

CISMP ACRONYMS EXAM QUESTIONS AND ANSWERS WITH COMPLET SOLUTIONS RATED A++

 5 views  0 purchase
  • Course
  • Institution

CISMP ACRONYMS EXAM QUESTIONS AND ANSWERS WITH COMPLET SOLUTIONS RATED A++ AAA Authentication, authorization, and accounting. A group of technologies used in remote access systems. Authentication verifies a user's identification. Authorization determines if a user should have access. Accountin...

[Show more]

Preview 2 out of 8  pages

  • October 14, 2024
  • 8
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
avatar-seller
CISMP ACRONYMS EXAM QUESTIONS AND ANSWERS

WITH COMPLET SOLUTIONS RATED A++

AAA

Authentication, authorization, and accounting.



A group of technologies used in remote access systems. Authentication verifies a user's

identification. Authorization determines if a user should have access. Accounting tracks

a user's access with logs.

ACL

Access control list.



A list of rules used to grant access to a resource. In NTFS, a list of ACEs makes up the

access control list for a resource. In a firewall, an access control list identifies traffic that

is allowed or blocked based on IP addresses, networks, ports, and some protocols

(using the protocol ID).

BYOD

Bring your own device.



A policy allowing employees to connect personally owned devices, such as tablets and

smartphones, to a company network. Data security is often a concern with such policies

and organizations often use VLANs to isolate mobile devices.

, CAWFE

IACIS Certified Advanced Windows Forensic Examiner

CIRT

Computer Incident Response Team.



A group of experts that respond to security incidents. Also known as CERT, SIRT, or

IRT.

DNS

Domain Name System



The Internet's system for converting alphabetic names into numeric IP addresses.

DoS

Denial of Service



an attack meant to shut down a machine or network, making it inaccessible to its

intended users

DRP

Disaster Recovery Planning



is a function of operational security which entails planning for a disruptive event. The

goal of this activity is to reduce the risk of financial loss and to enhance a company's

ability to recover from a disruptive event promptly. It's enacted during a major and very

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller NurseAdvocate. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $9.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

83750 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$9.49
  • (0)
  Add to cart