CompTIA Study Materials
AWS Study Materials
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900

CompTIA Security+ SY0-701 All Acronyms Flashcards

FrontBack
AHAuthentication Header
CTMCounter Mode
DPOData Privacy Officer
HIDSHost-based Intrusion Detection System
AVAntivirus
L2TPLayer 2 Tunneling Protocol
NIDSNetwork-based Intrusion Detection System
ICMPInternet Control Message Protocol
ISOInternational Standards Organization
IMAPInternet Message Access Protocol
SSHSecure Shell
MFAMultifactor Authentication
NTPNetwork Time Protocol
RBACRule-based Access Control
XMLExtensible Markup Language
IaCInfrastructure as Code
NGFWNext-generation Firewall
RSARivest, Shamir, & Adleman
CSRCertificate Signing Request
DSLDigital Subscriber Line
HTMLHypertext Markup Language
PBXPrivate Branch Exchange
SaaSSoftware as a Service
TTPTactics, Techniques, and Procedures
VLSMVariable Length Subnet Masking
CIAConfidentiality, Integrity, Availability
IaaSInfrastructure as a Service
MLMachine Learning
MSSPManaged Security Service Provider
MTTFMean Time to Failure
PEAPProtected Extensible Authentication Protocol
RFIDRadio Frequency Identifier
VLANVirtual Local Area Network
MTBFMean Time Between Failures
CACertificate Authority
CSPCloud Service Provider
IRIncident Response
RACEResearch and Development in Advanced Communications Technologies in Europe
SDLMSoftware Development Lifecycle Methodology
WPAWi-Fi Protected Access
DRPDisaster Recovery Plan
FACLFile System Access Control List
RADIUSRemote Authentication Dial-in User Service
UEFIUnified Extensible Firmware Interface
MFDMultifunction Device
P2PPeer to Peer
PFSPerfect Forward Secrecy
SIMSubscriber Identity Module
WTLSWireless TLS
RTBHRemotely Triggered Black Hole
SSOSingle Sign-on
WIDSWireless Intrusion Detection System
CFBCipher Feedback
PPPPoint-to-Point Protocol
SDNSoftware-defined Networking
CSRFCross-site Request Forgery
PDUPower Distribution Unit
SEDSelf-encrypting Drives
VDIVirtual Desktop Infrastructure
PAPPassword Authentication Protocol
SCAPSecurity Content Automation Protocol
WPSWi-Fi Protected Setup
BPABusiness Partners Agreement
HMACHashed Message Authentication Code
RDPRemote Desktop Protocol
ATT&CKAdversarial Tactics, Techniques, and Common Knowledge
DSADigital Signature Algorithm
HTTPHypertext Transfer Protocol
RAIDRedundant Array of Inexpensive Disks
VDEVirtual Desktop Environment
DLLDynamic Link Library
MOAMemorandum of Agreement
NACNetwork Access Control
SMTPSSimple Mail Transfer Protocol Secure
TACACS+Terminal Access Controller Access Control System
GCMGalois Counter Mode
GPSGlobal Positioning System
HIPSHost-based Intrusion Prevention System
MaaSMonitoring as a Service
NIPSNetwork-based Intrusion Prevention System
USBOTG USB On the Go
UDPUser Datagram Protocol
POPPost Office Protocol
KDCKey Distribution Center
SMSShort Message Service
TSIGTransaction Signature
ECBElectronic Code Book
ESNElectronic Serial Number
RTOSReal-time Operating System
WAPWireless Access Point
XORExclusive Or
BGPBorder Gateway Protocol
NFCNear Field Communication
SIEMSecurity Information and Event Management
HVACHeating, Ventilation Air Conditioning
PIIPersonally Identifiable Information
VBAVisual Basic
PIVPersonal Identity Verification
SOAPSimple Object Access Protocol
DNSDomain Name System
RTORecovery Time Objective
CBCCipher Block Chaining
CRCCyclical Redundancy Check
IoTInternet of Things
SQLiSQL Injection
MANMetropolitan Area Network
NATNetwork Address Translation
PPTPPoint-to-Point Tunneling Protocol
RATRemote Access Trojan
OVALOpen Vulnerability Assessment Language
VPNVirtual Private Network
AAAAuthentication, Authorization, and Accounting
APAccess Point
EDREndpoint Detection and Response
FTPSSecured File Transfer Protocol
IPSecInternet Protocol Security
DLPData Loss Prevention
FTPFile Transfer Protocol
LDAPLightweight Directory Access Protocol
GPUGraphics Processing Unit
SPIMSpam over Internet Messaging
VPCVirtual Private Cloud
XSRFCross-site Request Forgery
AROAnnualized Rate of Occurrence
OCSPOnline Certificate Status Protocol
P12PKCS #12
VMVirtual Machine
APIApplication Programming Interface
DHCPDynamic Host Configuration Protocol
MTTRMean Time to Recover
IDSIntrusion Detection System
SDKSoftware Development Kit
SRTPSecure Real-Time Protocol
FPGAField Programmable Gate Array
TAXIITrusted Automated eXchange of Indicator Information
DESDigital Encryption Standard
OTAOver the Air
PSKPre-shared Key
SHASecure Hashing Algorithm
PHIPersonal Health Information
BYODBring Your Own Device
ECDHEElliptic Curve Diffie-Hellman Ephemeral
SoCSystem on Chip
BASHBourne Again Shell
CVSSCommon Vulnerability Scoring System
HSMHardware Security Module
ISPInternet Service Provider
MDMMobile Device Management
IoCIndicators of Compromise
SLESingle Loss Expectancy
OSINTOpen-source Intelligence
SQLStructured Query Language
WEPWired Equivalent Privacy
DDoSDistributed Denial of Service
SNMPSimple Network Management Protocol
CRLCertificate Revocation List
DBADatabase Administrator
GREGeneric Routing Encapsulation
S/MIMESecure/Multipurpose Internet Mail Extensions
UTMUnified Threat Management
DHEDiffie-Hellman Ephemeral
HOTPHMAC-based One-time Password
ICSIndustrial Control Systems
IPSIntrusion Prevention System
ISSOInformation Systems Security Officer
AuthenticationProtocol
RARegistration Authority
SOCSecurity Operations Center
TKIPTemporal Key Integrity Protocol
URIUniform Resource Identifier
BCPBusiness Continuity Planning
CHAPChallenge Handshake Authentication Protocol
DoSDenial of Service
ERPEnterprise Resource Planning
SSDSolid State Drive
BPDUBridge Protocol Data Unit
GPGGnu Privacy Guard
RADRapid Application Development
RTPReal-time Transport Protocol
SOARSecurity Orchestration, Automation, Response
AES-256Advanced Encryption Standards 256-bit
APTAdvanced Persistent Threat
CIOChief Information Officer
IdPIdentity Provider
SOWStatement of Work
CMSContent Management System
MSCHAPMicrosoft Challenge Handshake
NTLMNew Technology LAN Manager
PKCSPublic Key Cryptography Standards
RASRemote Access Server
TLSTransport Layer Security
KEKKey Encryption Key
UATUser Acceptance Testing
SPFSender Policy Framework
UEMUnified Endpoint Management
IMInstant Messaging
PGPPretty Good Privacy
SMTPSimple Mail Transfer Protocol
CIRTComputer Incident Response Team
COPECorporate Owned, Personally Enabled
WIPSWireless Intrusion Prevention System
SHTTPSecure Hypertext Transfer Protocol
TPMTrusted Platform Module
MBRMaster Boot Record
MFPMultifunction Printer
OSPFOpen Shortest Path First
PAMPluggable Authentication Modules
DEPData Execution Prevention
MDFMain Distribution Frame
TOTPTime-based One-time Password
TOUTime-of-use
DMARCDomain Message Authentication Reporting and Conformance
ECCElliptic Curve Cryptography
ECDSAElliptic Curve Digital Signature Algorithm
CCTVClosed-circuit Television
NDANon-disclosure Agreement
BIOSBasic Input/Output System
CASBCloud Access Security Broker
HTTPSHypertext Transfer Protocol Secure
IAMIdentity and Access Management
IDEAInternational Data Encryption Algorithm
ASLRAddress Space Layout Randomization
CARCorrective Action Report
CPContingency Planning
CVECommon Vulnerability Enumeration
IKEInternet Key Exchange
IEEEInstitute of Electrical and Electronics Engineers
MD5Message Digest 5
XDRExtended Detection and Response
CSUChannel Service Unit
CCMPCounter Mode/CBC-MAC Protocol
COOPContinuity of Operation Planning
GDPRGeneral Data Protection Regulation
NTFSNew Technology File System
AIArtificial Intelligence
SELinux Security-enhanced Linux
OSOperating System
UAVUnmanned Aerial Vehicle
CAPTCHACompletely Automated Public Turing Test to Tell Computers and Humans Apart
ESPEncapsulated Security Payload
HDDHard Disk Drive
PCIDSS Payment Card Industry Data Security Standard
PUPPotentially Unwanted Program
SCEPSimple Certificate Enrollment Protocol
FDEFull Disk Encryption
FRRFalse Rejection Rate
GPOGroup Policy Object
TCP/IPTransmission Control Protocol/Internet Protocol
UTPUnshielded Twisted Pair
CSOChief Security Officer
WOWork Order
XSSCross-site Scripting
ARPAddress Resolution Protocol
BIABusiness Impact Analysis
FIMFile Integrity Management
LEAPLightweight Extensible Authentication Protocol
PCAPPacket Capture
OAUTHOpen Authorization
SAMLSecurity Assertions Markup Language
SDLCSoftware Development Lifecycle
MACMessage Authentication Code
MTUMaximum Transmission Unit
NISTNational Institute of Standards & Technology
PBKDF2Password-based Key Derivation Function 2
PEDPersonal Electronic Device
RPORecovery Point Objective
SD-WANSoftware-defined Wide Area Network
PEMPrivacy Enhanced Mail
PKIPublic Key Infrastructure
RC4Rivest Cipher version 4
SAESimultaneous Authentication of Equals
TOCTime-of-check
IRPIncident Response Plan
SANSubject Alternative Name
SLAService-level Agreement
UPSUninterruptable Power Supply
PATPort Address Translation
AISAutomated Indicator Sharing
CERTComputer Emergency Response Team
MSPManaged Service Provider
PTZPan-tilt-zoom
CYODChoose Your Own Device
MSAMaster Service Agreement
SASESecure Access Service Edge
AUPAcceptable Use Policy
RIPEMDRACE Integrity Primitives Evaluation Message Digest
TGTTicket Granting Ticket
VoIPVoice over IP
ALEAnnualized Loss Expectancy
DACDiscretionary Access Control
IPInternet Protocol
EAPExtensible Authentication Protocol
PaaSPlatform as a Service
POTSPlain Old Telephone Service
SEHStructured Exception Handler
URLUniversal Resource Locator
VTCVideo Teleconferencing
DNATDestination Network Address Translation
IVInitialization Vector
MMSMultimedia Message Service
MOUMemorandum of Understanding
MPLSMulti-protocol Label Switching
SCADASupervisory Control and Data Acquisition
SWGSecure Web Gateway
PACProxy Auto Configuration
STIXStructured Threat Information eXchange
IDFIntermediate Distribution Frame
IRCInternet Relay Chat
OTOperational Technology
DKIMDomainKeys Identified Mail
EFSEncrypted File System
LANLocal Area Network
SFTPSecured File Transfer Protocol
SSLSecure Sockets Layer
ACLAccess Control List
OIDObject Identifier
AESAdvanced Encryption Standard
WAFWeb Application Firewall
CTOChief Technology Officer
HAHigh Availability
ROIReturn on Investment