Bash, the Crucial Exams Chat Bot
AI Bot

CompTIA SecurityX CAS-005 All Acronyms  Flashcards

CompTIA SecurityX CAS-005 (V5) Flashcards

FrontBack
ABACAttribute-based Access Control
ACLAccess Control List
ACMEAutomated Certificate Management Environment
AEADAuthenticated Encryption with Associated Data
AIArtificial Intelligence
APIApplication Programming Interface
APTAdvanced Persistent Threat
AQLAriel Query Language
ATT&CK"Adversarial Tactics, Techniques, and Common Knowledge"
BEASTBrowser Exploit against SSL/TLS
BIOSBasic Input/Output System
BYODBring Your Own Device
C2Command and Control
CACertificate Authority
CA/RACertificate Authority/Registration Authority
CAPECCommon Attack Pattern Enumeration and Classification
CASBCloud Access Security Broker
CBCCipher Block Chaining
CCPACalifornia Consumer Privacy Act
CDNContent Delivery Network
CI/CDContinuous Integration/Continuous Deployment
CISCenter for Internet Security
CMDBConfiguration Database Management
CNAMECanonical Name
COBITControl Objectives for Information and Related Technologies
COPPAChildren’s Online Privacy Act
COSOCommittee of Sponsoring Organizations of the Treadway Commission
CPECommon Platform Enumeration
CPUCentral Processing Unit
CRLCertificate Revocation List
CRMCustomer Relationship Manager
CSACloud Security Alliance
CSPMCloud Security Posture Management
CSRCertificate Signing Request
CSRFCross-site Request Forgery
CVECommon Vulnerabilities and Exposures
CVSSCommon Vulnerability Scoring System
CWPPCloud Workload Protection Platform
D3FEND"Detection, Denial, and Disruption Framework Empowering Network Defense"
DACDiscretionary Access Control
DASTDynamic Application Security Testing
DDoSDistributed Denial of Service
DHCPDynamic Host Configuration Protocol
DKIMDomain Keys Identified Mail
DLPData Loss Prevention
DMADigital Markets Act
DMARCDomain-based Message Authentication Reporting and Conformance
DNSDomain Name System
DNSSECDomain Name System Security Extensions
DORADigital Operational Resilience Act
DoSDenial of Service
EAPExtensible Authentication Protocol
ECCElliptic Curve Cryptography
EDREndpoint Detection Response
EMIElectromagnetic Interference
EMPElectromagnetic Pulse
EOLEnd-of-life
FASTFlexible Authentication via Secure Tunneling
FDEFull Disk Encryption
FIDOFast Identity Online
GDPRGeneral Data Protection Regulation
GPOGroup Policy Objects
GRC"Governance, Risk, and Compliance"
HIPS/HIDSHost-based Intrusion Protection System/Host-based Detection System
HKLMHkey_Local_Machine
HSMHardware Security Module
HSTSHTTP Strict Transport Security
HTTPHypertext Transfer Protocol
HTTPSHypertext Transfer Protocol Secure
HVACHeating Ventilation and Air Conditioning
IaCInfrastructure as Code
IAMIdentity and Access Management
IASTInteractive Application Security Testing
ICSIndustrial Control System
IDEIntegrated Development Environment
IDSIntrusion Detection System
IEEEInstitute for Electrical and Electronics Engineers
IISInternet Information Services
IKEInternet Key Exchange
IoCIndicator of Compromise
IoTInternet of Things
IPSIntrusion Prevention System
ISACInformation Sharing and Analysis Centers
ISO/IECInternational Organization for Standardization/International Electrotechnical Commission
ISPInternet Service Provider
ITILInformation Technology Infrastructure Library
JSONJavaScript Object Notation
JTAGJoint Test Action Group
LANLocal Area Network
LDAPLightweight Directory Access Protocol
LGPDGeneral Data Protection Law
LLMLarge Language Model
MACMandatory Access Control
MDMMobile Device Management
MFAMultifactor Authentication
MIMEMultipurpose Internet Mail Extensions
MXMail Exchange
NACNetwork Access Control
NFSNetwork File System
NIDSNetwork-based Intrusion Detection System
NIPSNetwork-based Intrusion Prevention System
NIST CSFNational Institute of Standards and Technology Cybersecurity Framework
NTLMNew Technology LAN Manager
OAuthOpen Authorization
OCSPOnline Certificate Status Protocol
OEMOriginal Equipment Manufacturer
OSOperating System
OSINTOpen-source Intelligence
OTOperational Technology
OTPOne-time Password
OVALOpen Vulnerability Assessment Language
OWASPOpen Web Application Security Project
PaaSPlatform as a Service
PAMPrivileged Access Management
PCI DSSPayment Card Industry Data Security Standard
PEAPProtected Extensible Authentication Protocol
PIIPersonally Identifiable Information
PKIPublic Key Infrastructure
PQCPost-quantum Cryptography
PTRPointer Record
QAQuality Assurance
RACI"Responsible, Accountable, Consulted, and Informed"
RADIUSRemote Authentication Dial-in User Service
RASPRuntime Application Self-protection
RATRemote Access Trojan
RCERemote Code Execution
RDPRemote Desktop Protocol
RESTRepresentational State Transfer
RFRadio Frequency
RPORecovery Point Objective
RSARivest-Shamir-Aldeman Encryption Algorithm
RTORecovery Time Objective
S/MIMESecure/Multipurpose Internet Mail Extensions
SaaSSoftware as a Service
SAESimultaneous Authentication of Equals
SAMLSecurity Assertions Markup Language
SANStorage Area Network
SASESecure Access Service Edge
SASTStatic Application Security Testing
SBoMSoftware Bill of Materials
SCASoftware Composition Analysis
SCADASupervisory Control and Data Acquisition
SCAPSecurity Content Automation Protocol
SCCMSystem Center Configuration Management
SCEPSimple Certificate Enrollment Protocol
SCHANNELSecure Channel
SD-WANSoftware-defined Wide Area Network
SDKSoftware Development Kit
SDLCSoftware Development Life Cycle
SDNSoftware-defined Network
SDRSoftware-defined Radio
SEDSelf-encrypting Drive
SIEMSecurity Information Event Management
SLAService-level Agreement
SOAService-oriented Architecture
SOAR"Security Orchestration, Automation, and Response"
SoCSystem-on-Chip
SOCSecurity Operations Center
SOC 2System and Organization Controls 2
SPFSender Policy Framework
SSDSolid-state Drive
SSHSecure Shell
SSLSecure Sockets Layer
SSOSingle Sign-on
STIXStructured Threat Information eXchange
STRIDE"Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service and Elevation of Privilege"
TAXIITrusted Automated Exchange of Indicator Information
TIPThreat Intelligence Platforms
TLSTransport Layer Security
TOCTOU"Time of Check, Time of Use"
TOML"Tom’s Obvious, Minimal Language"
TPMTrusted Platform Module
TTPs"Tactics, Techniques, and Procedures"
UBAUser Behavior Analytics
UDPUser Datagram Protocol
UEBAUser & Entity Behavior Analytics
UEFIUnified Extensible Firmware Interface
USBUniversal Serial Bus
VDIVirtual Desktop Environment
VLANVirtual Local Area Network
VPNVirtual Private Network
vTPMVirtual Trusted Platform Module
WAFWeb Application Firewall
WIPSWireless Intrusion Prevention System
WLANWireless Local Area Newtork
XCCDFExtensible Configuration Checklist Description Format
XDRExtended Detection and Response
XMLExtensible Markup Language
XSSCross-site Scripting
YAMLYet Another Markup Language
YARAYet Another Recursive Acronym
Every acronym included in the CompTIA SecurityX CAS-005 exam objectives.
Share on...
Follow us on...