CompTIA Study Materials
AWS Study Materials
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900

CompTIA Security+ SY0-701 All Acronyms Flashcards

FrontBack
HOTPHMAC-based One-time Password
HTMLHypertext Markup Language
OTAOver the Air
VDIVirtual Desktop Infrastructure
VoIPVoice over IP
STIXStructured Threat Information eXchange
RACEResearch and Development in Advanced Communications Technologies in Europe
SQLStructured Query Language
SQLiSQL Injection
TGTTicket Granting Ticket
UAVUnmanned Aerial Vehicle
WIDSWireless Intrusion Detection System
CIOChief Information Officer
COOPContinuity of Operation Planning
CVECommon Vulnerability Enumeration
XMLExtensible Markup Language
DHCPDynamic Host Configuration Protocol
LDAPLightweight Directory Access Protocol
POTSPlain Old Telephone Service
RIPEMDRACE Integrity Primitives Evaluation Message Digest
SHTTPSecure Hypertext Transfer Protocol
TTPTactics, Techniques, and Procedures
AuthenticationProtocol
BIOSBasic Input/Output System
ECCElliptic Curve Cryptography
HIPSHost-based Intrusion Prevention System
RATRemote Access Trojan
RTBHRemotely Triggered Black Hole
WTLSWireless TLS
MDMMobile Device Management
NACNetwork Access Control
XSSCross-site Scripting
PKCSPublic Key Cryptography Standards
SDNSoftware-defined Networking
APIApplication Programming Interface
SASESecure Access Service Edge
SIEMSecurity Information and Event Management
SoCSystem on Chip
UEMUnified Endpoint Management
URIUniform Resource Identifier
AROAnnualized Rate of Occurrence
RPORecovery Point Objective
RSARivest, Shamir, & Adleman
SNMPSimple Network Management Protocol
FDEFull Disk Encryption
SSDSolid State Drive
UTPUnshielded Twisted Pair
VBAVisual Basic
XSRFCross-site Request Forgery
DoSDenial of Service
GCMGalois Counter Mode
IDFIntermediate Distribution Frame
MSPManaged Service Provider
OSPFOpen Shortest Path First
UATUser Acceptance Testing
IAMIdentity and Access Management
IMAPInternet Message Access Protocol
IPSecInternet Protocol Security
SFTPSecured File Transfer Protocol
DHEDiffie-Hellman Ephemeral
OAUTHOpen Authorization
DNSDomain Name System
SPFSender Policy Framework
UPSUninterruptable Power Supply
ISPInternet Service Provider
RADIUSRemote Authentication Dial-in User Service
SaaSSoftware as a Service
CAPTCHACompletely Automated Public Turing Test to Tell Computers and Humans Apart
MTTRMean Time to Recover
DKIMDomainKeys Identified Mail
HTTPSHypertext Transfer Protocol Secure
IRPIncident Response Plan
MSAMaster Service Agreement
OTOperational Technology
GPSGlobal Positioning System
KDCKey Distribution Center
PCAPPacket Capture
VLANVirtual Local Area Network
RTORecovery Time Objective
URLUniversal Resource Locator
XORExclusive Or
FPGAField Programmable Gate Array
IMInstant Messaging
P2PPeer to Peer
TCP/IPTransmission Control Protocol/Internet Protocol
TOTPTime-based One-time Password
DNATDestination Network Address Translation
NTLMNew Technology LAN Manager
PPTPPoint-to-Point Tunneling Protocol
VPNVirtual Private Network
CIRTComputer Incident Response Team
MFAMultifactor Authentication
VPCVirtual Private Cloud
CVSSCommon Vulnerability Scoring System
GPUGraphics Processing Unit
IaaSInfrastructure as a Service
SDLMSoftware Development Lifecycle Methodology
ATT&CKAdversarial Tactics, Techniques, and Common Knowledge
SOCSecurity Operations Center
CHAPChallenge Handshake Authentication Protocol
NIPSNetwork-based Intrusion Prevention System
PATPort Address Translation
DRPDisaster Recovery Plan
EDREndpoint Detection and Response
PCIDSS Payment Card Industry Data Security Standard
EAPExtensible Authentication Protocol
HVACHeating, Ventilation Air Conditioning
OSOperating System
TPMTrusted Platform Module
UDPUser Datagram Protocol
ISOInternational Standards Organization
NTFSNew Technology File System
CSOChief Security Officer
CERTComputer Emergency Response Team
PPPPoint-to-Point Protocol
BCPBusiness Continuity Planning
IDSIntrusion Detection System
TKIPTemporal Key Integrity Protocol
DBADatabase Administrator
DEPData Execution Prevention
ESPEncapsulated Security Payload
MTUMaximum Transmission Unit
RBACRule-based Access Control
RTOSReal-time Operating System
SCEPSimple Certificate Enrollment Protocol
SEDSelf-encrypting Drives
UTMUnified Threat Management
XDRExtended Detection and Response
ALEAnnualized Loss Expectancy
CSUChannel Service Unit
FTPSSecured File Transfer Protocol
AAAAuthentication, Authorization, and Accounting
CASBCloud Access Security Broker
CRLCertificate Revocation List
FTPFile Transfer Protocol
DACDiscretionary Access Control
MACMessage Authentication Code
TSIGTransaction Signature
FIMFile Integrity Management
CIAConfidentiality, Integrity, Availability
HMACHashed Message Authentication Code
PDUPower Distribution Unit
SDKSoftware Development Kit
ECDSAElliptic Curve Digital Signature Algorithm
PIVPersonal Identity Verification
CARCorrective Action Report
TAXIITrusted Automated eXchange of Indicator Information
TACACS+Terminal Access Controller Access Control System
WPSWi-Fi Protected Setup
HTTPHypertext Transfer Protocol
L2TPLayer 2 Tunneling Protocol
PFSPerfect Forward Secrecy
RDPRemote Desktop Protocol
HSMHardware Security Module
PTZPan-tilt-zoom
RADRapid Application Development
CBCCipher Block Chaining
PBKDF2Password-based Key Derivation Function 2
PKIPublic Key Infrastructure
RC4Rivest Cipher version 4
WAFWeb Application Firewall
AISAutomated Indicator Sharing
VLSMVariable Length Subnet Masking
CCTVClosed-circuit Television
ERPEnterprise Resource Planning
OSINTOpen-source Intelligence
WEPWired Equivalent Privacy
IEEEInstitute of Electrical and Electronics Engineers
OVALOpen Vulnerability Assessment Language
PEDPersonal Electronic Device
PSKPre-shared Key
SIMSubscriber Identity Module
TOCTime-of-check
WAPWireless Access Point
CSPCloud Service Provider
TLSTransport Layer Security
WIPSWireless Intrusion Prevention System
BGPBorder Gateway Protocol
ICMPInternet Control Message Protocol
PaaSPlatform as a Service
SSOSingle Sign-on
WPAWi-Fi Protected Access
IVInitialization Vector
MTBFMean Time Between Failures
CSRCertificate Signing Request
IPInternet Protocol
IPSIntrusion Prevention System
DSLDigital Subscriber Line
MaaSMonitoring as a Service
NISTNational Institute of Standards & Technology
OIDObject Identifier
SDLCSoftware Development Lifecycle
SLAService-level Agreement
MSSPManaged Security Service Provider
SD-WANSoftware-defined Wide Area Network
MFDMultifunction Device
WOWork Order
APAccess Point
IDEAInternational Data Encryption Algorithm
IKEInternet Key Exchange
SAESimultaneous Authentication of Equals
SWGSecure Web Gateway
CMSContent Management System
ISSOInformation Systems Security Officer
MBRMaster Boot Record
GDPRGeneral Data Protection Regulation
COPECorporate Owned, Personally Enabled
DMARCDomain Message Authentication Reporting and Conformance
AIArtificial Intelligence
BIABusiness Impact Analysis
ESNElectronic Serial Number
SMTPSimple Mail Transfer Protocol
AVAntivirus
PBXPrivate Branch Exchange
SCADASupervisory Control and Data Acquisition
BPDUBridge Protocol Data Unit
FRRFalse Rejection Rate
MD5Message Digest 5
MFPMultifunction Printer
RFIDRadio Frequency Identifier
MTTFMean Time to Failure
NIDSNetwork-based Intrusion Detection System
RAIDRedundant Array of Inexpensive Disks
SOAPSimple Object Access Protocol
CPContingency Planning
ECDHEElliptic Curve Diffie-Hellman Ephemeral
MLMachine Learning
RARegistration Authority
RTPReal-time Transport Protocol
SOARSecurity Orchestration, Automation, Response
ECBElectronic Code Book
PAPPassword Authentication Protocol
EFSEncrypted File System
ICSIndustrial Control Systems
NFCNear Field Communication
NGFWNext-generation Firewall
PGPPretty Good Privacy
APTAdvanced Persistent Threat
NDANon-disclosure Agreement
SCAPSecurity Content Automation Protocol
SSHSecure Shell
AESAdvanced Encryption Standard
AUPAcceptable Use Policy
IRIncident Response
MOAMemorandum of Agreement
SHASecure Hashing Algorithm
ASLRAddress Space Layout Randomization
BPABusiness Partners Agreement
CACertificate Authority
IaCInfrastructure as Code
KEKKey Encryption Key
SOWStatement of Work
TOUTime-of-use
AES-256Advanced Encryption Standards 256-bit
IRCInternet Relay Chat
HDDHard Disk Drive
SEHStructured Exception Handler
SMTPSSimple Mail Transfer Protocol Secure
GREGeneric Routing Encapsulation
PIIPersonally Identifiable Information
SANSubject Alternative Name
CTOChief Technology Officer
OCSPOnline Certificate Status Protocol
CSRFCross-site Request Forgery
NATNetwork Address Translation
SAMLSecurity Assertions Markup Language
SRTPSecure Real-Time Protocol
ACLAccess Control List
PAMPluggable Authentication Modules
S/MIMESecure/Multipurpose Internet Mail Extensions
GPOGroup Policy Object
HAHigh Availability
MANMetropolitan Area Network
ROIReturn on Investment
LEAPLightweight Extensible Authentication Protocol
PEMPrivacy Enhanced Mail
SLESingle Loss Expectancy
USBOTG USB On the Go
SSLSecure Sockets Layer
MDFMain Distribution Frame
POPPost Office Protocol
VDEVirtual Desktop Environment
FACLFile System Access Control List
VTCVideo Teleconferencing
IoCIndicators of Compromise
LANLocal Area Network
PEAPProtected Extensible Authentication Protocol
CCMPCounter Mode/CBC-MAC Protocol
CTMCounter Mode
CYODChoose Your Own Device
UEFIUnified Extensible Firmware Interface
DESDigital Encryption Standard
PUPPotentially Unwanted Program
AHAuthentication Header
CFBCipher Feedback
DSADigital Signature Algorithm
PHIPersonal Health Information
VMVirtual Machine
DDoSDistributed Denial of Service
MMSMultimedia Message Service
MPLSMulti-protocol Label Switching
BASHBourne Again Shell
BYODBring Your Own Device
CRCCyclical Redundancy Check
GPGGnu Privacy Guard
HIDSHost-based Intrusion Detection System
MSCHAPMicrosoft Challenge Handshake
NTPNetwork Time Protocol
P12PKCS #12
PACProxy Auto Configuration
IoTInternet of Things
DLLDynamic Link Library
IdPIdentity Provider
SPIMSpam over Internet Messaging
MOUMemorandum of Understanding
DLPData Loss Prevention
RASRemote Access Server
SELinux Security-enhanced Linux
ARPAddress Resolution Protocol
DPOData Privacy Officer
SMSShort Message Service