CompTIA Study Materials
AWS Study Materials
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900

CompTIA Security+ SY0-701 All Acronyms Flashcards

FrontBack
OIDObject Identifier
XORExclusive Or
CSOChief Security Officer
L2TPLayer 2 Tunneling Protocol
WPSWi-Fi Protected Setup
CIOChief Information Officer
AESAdvanced Encryption Standard
CASBCloud Access Security Broker
CERTComputer Emergency Response Team
CVECommon Vulnerability Enumeration
HTTPHypertext Transfer Protocol
OCSPOnline Certificate Status Protocol
RTPReal-time Transport Protocol
STIXStructured Threat Information eXchange
UEMUnified Endpoint Management
ECCElliptic Curve Cryptography
PUPPotentially Unwanted Program
ISOInternational Standards Organization
PGPPretty Good Privacy
AIArtificial Intelligence
SIEMSecurity Information and Event Management
DSLDigital Subscriber Line
MOUMemorandum of Understanding
SMTPSSimple Mail Transfer Protocol Secure
TCP/IPTransmission Control Protocol/Internet Protocol
NIDSNetwork-based Intrusion Detection System
SDLMSoftware Development Lifecycle Methodology
TAXIITrusted Automated eXchange of Indicator Information
WTLSWireless TLS
DESDigital Encryption Standard
GPUGraphics Processing Unit
SSDSolid State Drive
IdPIdentity Provider
PaaSPlatform as a Service
PKCSPublic Key Cryptography Standards
APTAdvanced Persistent Threat
MSSPManaged Security Service Provider
DKIMDomainKeys Identified Mail
S/MIMESecure/Multipurpose Internet Mail Extensions
SIMSubscriber Identity Module
HAHigh Availability
MD5Message Digest 5
UPSUninterruptable Power Supply
CSUChannel Service Unit
GCMGalois Counter Mode
MFDMultifunction Device
NISTNational Institute of Standards & Technology
SNMPSimple Network Management Protocol
ALEAnnualized Loss Expectancy
KDCKey Distribution Center
PFSPerfect Forward Secrecy
TLSTransport Layer Security
XSSCross-site Scripting
DNSDomain Name System
IoCIndicators of Compromise
PPTPPoint-to-Point Tunneling Protocol
WIDSWireless Intrusion Detection System
KEKKey Encryption Key
SCAPSecurity Content Automation Protocol
ROIReturn on Investment
RTOSReal-time Operating System
CPContingency Planning
EDREndpoint Detection and Response
NIPSNetwork-based Intrusion Prevention System
OSINTOpen-source Intelligence
TOUTime-of-use
BPDUBridge Protocol Data Unit
MaaSMonitoring as a Service
XMLExtensible Markup Language
HIPSHost-based Intrusion Prevention System
PATPort Address Translation
UDPUser Datagram Protocol
CIRTComputer Incident Response Team
IVInitialization Vector
MPLSMulti-protocol Label Switching
NTPNetwork Time Protocol
XSRFCross-site Request Forgery
EAPExtensible Authentication Protocol
MACMessage Authentication Code
NATNetwork Address Translation
RATRemote Access Trojan
TOCTime-of-check
NACNetwork Access Control
PEDPersonal Electronic Device
DHCPDynamic Host Configuration Protocol
MTTFMean Time to Failure
RADRapid Application Development
RBACRule-based Access Control
SSOSingle Sign-on
ECDSAElliptic Curve Digital Signature Algorithm
FTPSSecured File Transfer Protocol
HTMLHypertext Markup Language
HTTPSHypertext Transfer Protocol Secure
MFAMultifactor Authentication
MSPManaged Service Provider
SANSubject Alternative Name
CSRCertificate Signing Request
DEPData Execution Prevention
IaCInfrastructure as Code
RIPEMDRACE Integrity Primitives Evaluation Message Digest
MTUMaximum Transmission Unit
RSARivest, Shamir, & Adleman
GPSGlobal Positioning System
LEAPLightweight Extensible Authentication Protocol
DDoSDistributed Denial of Service
MLMachine Learning
PAMPluggable Authentication Modules
PKIPublic Key Infrastructure
BIOSBasic Input/Output System
PEMPrivacy Enhanced Mail
SFTPSecured File Transfer Protocol
CRCCyclical Redundancy Check
CRLCertificate Revocation List
DACDiscretionary Access Control
GPOGroup Policy Object
GREGeneric Routing Encapsulation
SSLSecure Sockets Layer
DRPDisaster Recovery Plan
ESNElectronic Serial Number
SQLiSQL Injection
OSOperating System
SPFSender Policy Framework
URLUniversal Resource Locator
CTOChief Technology Officer
UTMUnified Threat Management
IDFIntermediate Distribution Frame
P2PPeer to Peer
RFIDRadio Frequency Identifier
RTBHRemotely Triggered Black Hole
SMTPSimple Mail Transfer Protocol
WAPWireless Access Point
NDANon-disclosure Agreement
PIVPersonal Identity Verification
SDLCSoftware Development Lifecycle
TGTTicket Granting Ticket
WOWork Order
UAVUnmanned Aerial Vehicle
APIApplication Programming Interface
IRCInternet Relay Chat
TKIPTemporal Key Integrity Protocol
VTCVideo Teleconferencing
WAFWeb Application Firewall
DBADatabase Administrator
FPGAField Programmable Gate Array
NTLMNew Technology LAN Manager
POTSPlain Old Telephone Service
SAMLSecurity Assertions Markup Language
VLANVirtual Local Area Network
VMVirtual Machine
GDPRGeneral Data Protection Regulation
CSRFCross-site Request Forgery
MTTRMean Time to Recover
SCADASupervisory Control and Data Acquisition
TTPTactics, Techniques, and Procedures
BASHBourne Again Shell
ECDHEElliptic Curve Diffie-Hellman Ephemeral
OVALOpen Vulnerability Assessment Language
SOCSecurity Operations Center
SOARSecurity Orchestration, Automation, Response
TSIGTransaction Signature
ERPEnterprise Resource Planning
SDNSoftware-defined Networking
SELinux Security-enhanced Linux
USBOTG USB On the Go
VPNVirtual Private Network
SoCSystem on Chip
VBAVisual Basic
PACProxy Auto Configuration
RAIDRedundant Array of Inexpensive Disks
VDIVirtual Desktop Infrastructure
NGFWNext-generation Firewall
SPIMSpam over Internet Messaging
VDEVirtual Desktop Environment
CCTVClosed-circuit Television
PBKDF2Password-based Key Derivation Function 2
MSAMaster Service Agreement
MTBFMean Time Between Failures
UATUser Acceptance Testing
IRPIncident Response Plan
SMSShort Message Service
AISAutomated Indicator Sharing
HIDSHost-based Intrusion Detection System
VPCVirtual Private Cloud
AROAnnualized Rate of Occurrence
AVAntivirus
COOPContinuity of Operation Planning
FIMFile Integrity Management
HSMHardware Security Module
IoTInternet of Things
DSADigital Signature Algorithm
PCIDSS Payment Card Industry Data Security Standard
MDMMobile Device Management
HDDHard Disk Drive
SAESimultaneous Authentication of Equals
VoIPVoice over IP
AES-256Advanced Encryption Standards 256-bit
EFSEncrypted File System
PTZPan-tilt-zoom
TACACS+Terminal Access Controller Access Control System
DNATDestination Network Address Translation
DoSDenial of Service
MBRMaster Boot Record
ARPAddress Resolution Protocol
CFBCipher Feedback
MMSMultimedia Message Service
SEHStructured Exception Handler
ESPEncapsulated Security Payload
NFCNear Field Communication
RADIUSRemote Authentication Dial-in User Service
SRTPSecure Real-Time Protocol
CHAPChallenge Handshake Authentication Protocol
PPPPoint-to-Point Protocol
RTORecovery Time Objective
SDKSoftware Development Kit
ATT&CKAdversarial Tactics, Techniques, and Common Knowledge
LDAPLightweight Directory Access Protocol
DLPData Loss Prevention
GPGGnu Privacy Guard
ISPInternet Service Provider
POPPost Office Protocol
RPORecovery Point Objective
AAAAuthentication, Authorization, and Accounting
APAccess Point
COPECorporate Owned, Personally Enabled
ICSIndustrial Control Systems
SLESingle Loss Expectancy
TOTPTime-based One-time Password
XDRExtended Detection and Response
BPABusiness Partners Agreement
HOTPHMAC-based One-time Password
ISSOInformation Systems Security Officer
OAUTHOpen Authorization
DHEDiffie-Hellman Ephemeral
IaaSInfrastructure as a Service
DLLDynamic Link Library
FACLFile System Access Control List
CAPTCHACompletely Automated Public Turing Test to Tell Computers and Humans Apart
DPOData Privacy Officer
UEFIUnified Extensible Firmware Interface
VLSMVariable Length Subnet Masking
HMACHashed Message Authentication Code
IEEEInstitute of Electrical and Electronics Engineers
RC4Rivest Cipher version 4
BCPBusiness Continuity Planning
CTMCounter Mode
RACEResearch and Development in Advanced Communications Technologies in Europe
WPAWi-Fi Protected Access
IAMIdentity and Access Management
IMAPInternet Message Access Protocol
OTAOver the Air
SHTTPSecure Hypertext Transfer Protocol
CARCorrective Action Report
MOAMemorandum of Agreement
SOWStatement of Work
WEPWired Equivalent Privacy
SaaSSoftware as a Service
SCEPSimple Certificate Enrollment Protocol
SWGSecure Web Gateway
UTPUnshielded Twisted Pair
PCAPPacket Capture
BGPBorder Gateway Protocol
IPInternet Protocol
PHIPersonal Health Information
SHASecure Hashing Algorithm
CVSSCommon Vulnerability Scoring System
AuthenticationProtocol
OSPFOpen Shortest Path First
PEAPProtected Extensible Authentication Protocol
SD-WANSoftware-defined Wide Area Network
DMARCDomain Message Authentication Reporting and Conformance
IKEInternet Key Exchange
PAPPassword Authentication Protocol
FRRFalse Rejection Rate
OTOperational Technology
IPSIntrusion Prevention System
PDUPower Distribution Unit
AHAuthentication Header
CSPCloud Service Provider
WIPSWireless Intrusion Prevention System
MANMetropolitan Area Network
CBCCipher Block Chaining
CIAConfidentiality, Integrity, Availability
MSCHAPMicrosoft Challenge Handshake
P12PKCS #12
SASESecure Access Service Edge
FDEFull Disk Encryption
SEDSelf-encrypting Drives
SLAService-level Agreement
MFPMultifunction Printer
URIUniform Resource Identifier
ACLAccess Control List
FTPFile Transfer Protocol
RASRemote Access Server
ECBElectronic Code Book
IPSecInternet Protocol Security
PSKPre-shared Key
RARegistration Authority
CACertificate Authority
CCMPCounter Mode/CBC-MAC Protocol
IDEAInternational Data Encryption Algorithm
PIIPersonally Identifiable Information
AUPAcceptable Use Policy
IDSIntrusion Detection System
SSHSecure Shell
ASLRAddress Space Layout Randomization
CYODChoose Your Own Device
IMInstant Messaging
LANLocal Area Network
PBXPrivate Branch Exchange
BIABusiness Impact Analysis
CMSContent Management System
ICMPInternet Control Message Protocol
IRIncident Response
BYODBring Your Own Device
MDFMain Distribution Frame
NTFSNew Technology File System
RDPRemote Desktop Protocol
TPMTrusted Platform Module
HVACHeating, Ventilation Air Conditioning
SOAPSimple Object Access Protocol
SQLStructured Query Language