CompTIA Study Materials
AWS Study Materials
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900

CompTIA Security+ SY0-701 All Acronyms Flashcards

FrontBack
ACLAccess Control List
CYODChoose Your Own Device
XORExclusive Or
CTMCounter Mode
DESDigital Encryption Standard
PCAPPacket Capture
ROIReturn on Investment
LDAPLightweight Directory Access Protocol
MOUMemorandum of Understanding
MTBFMean Time Between Failures
NGFWNext-generation Firewall
SLAService-level Agreement
CIAConfidentiality, Integrity, Availability
CVSSCommon Vulnerability Scoring System
VPCVirtual Private Cloud
PPPPoint-to-Point Protocol
PEDPersonal Electronic Device
SPIMSpam over Internet Messaging
CFBCipher Feedback
RADRapid Application Development
RTBHRemotely Triggered Black Hole
PATPort Address Translation
RARegistration Authority
GPOGroup Policy Object
P12PKCS #12
WPSWi-Fi Protected Setup
LEAPLightweight Extensible Authentication Protocol
NTPNetwork Time Protocol
AES-256Advanced Encryption Standards 256-bit
TCP/IPTransmission Control Protocol/Internet Protocol
WOWork Order
ESPEncapsulated Security Payload
XDRExtended Detection and Response
DSADigital Signature Algorithm
L2TPLayer 2 Tunneling Protocol
NDANon-disclosure Agreement
SSLSecure Sockets Layer
ECDHEElliptic Curve Diffie-Hellman Ephemeral
IdPIdentity Provider
SAESimultaneous Authentication of Equals
TAXIITrusted Automated eXchange of Indicator Information
EFSEncrypted File System
SDLMSoftware Development Lifecycle Methodology
SQLStructured Query Language
ASLRAddress Space Layout Randomization
CERTComputer Emergency Response Team
MTUMaximum Transmission Unit
PAPPassword Authentication Protocol
PBXPrivate Branch Exchange
PGPPretty Good Privacy
SELinux Security-enhanced Linux
APAccess Point
ARPAddress Resolution Protocol
BASHBourne Again Shell
CSOChief Security Officer
UTMUnified Threat Management
BYODBring Your Own Device
CSRCertificate Signing Request
DLPData Loss Prevention
HIDSHost-based Intrusion Detection System
OTAOver the Air
RACEResearch and Development in Advanced Communications Technologies in Europe
RTORecovery Time Objective
URLUniversal Resource Locator
PUPPotentially Unwanted Program
UEFIUnified Extensible Firmware Interface
BPDUBridge Protocol Data Unit
CHAPChallenge Handshake Authentication Protocol
RTOSReal-time Operating System
MOAMemorandum of Agreement
SHASecure Hashing Algorithm
SOWStatement of Work
PaaSPlatform as a Service
WEPWired Equivalent Privacy
DoSDenial of Service
IoTInternet of Things
PIIPersonally Identifiable Information
POTSPlain Old Telephone Service
XSSCross-site Scripting
AAAAuthentication, Authorization, and Accounting
ISPInternet Service Provider
PDUPower Distribution Unit
VBAVisual Basic
CARCorrective Action Report
HVACHeating, Ventilation Air Conditioning
MDFMain Distribution Frame
STIXStructured Threat Information eXchange
TOUTime-of-use
SMTPSSimple Mail Transfer Protocol Secure
SNMPSimple Network Management Protocol
CSUChannel Service Unit
HIPSHost-based Intrusion Prevention System
VLANVirtual Local Area Network
ALEAnnualized Loss Expectancy
AVAntivirus
MTTFMean Time to Failure
POPPost Office Protocol
IRCInternet Relay Chat
OVALOpen Vulnerability Assessment Language
IDEAInternational Data Encryption Algorithm
RFIDRadio Frequency Identifier
TTPTactics, Techniques, and Procedures
GCMGalois Counter Mode
IPInternet Protocol
IVInitialization Vector
AESAdvanced Encryption Standard
NTFSNew Technology File System
ECDSAElliptic Curve Digital Signature Algorithm
PKIPublic Key Infrastructure
UATUser Acceptance Testing
WIDSWireless Intrusion Detection System
WPAWi-Fi Protected Access
BIOSBasic Input/Output System
DRPDisaster Recovery Plan
OSINTOpen-source Intelligence
MFDMultifunction Device
NIPSNetwork-based Intrusion Prevention System
RASRemote Access Server
AHAuthentication Header
GDPRGeneral Data Protection Regulation
IKEInternet Key Exchange
OSPFOpen Shortest Path First
PHIPersonal Health Information
PPTPPoint-to-Point Tunneling Protocol
BCPBusiness Continuity Planning
DHEDiffie-Hellman Ephemeral
ESNElectronic Serial Number
RPORecovery Point Objective
SOCSecurity Operations Center
GPUGraphics Processing Unit
IAMIdentity and Access Management
IPSIntrusion Prevention System
PTZPan-tilt-zoom
SMSShort Message Service
IMInstant Messaging
OIDObject Identifier
SRTPSecure Real-Time Protocol
APIApplication Programming Interface
DBADatabase Administrator
DNSDomain Name System
SMTPSimple Mail Transfer Protocol
SSDSolid State Drive
SSOSingle Sign-on
RIPEMDRACE Integrity Primitives Evaluation Message Digest
SQLiSQL Injection
CRLCertificate Revocation List
DEPData Execution Prevention
MaaSMonitoring as a Service
OSOperating System
WAPWireless Access Point
CMSContent Management System
HTTPSHypertext Transfer Protocol Secure
SoCSystem on Chip
COPECorporate Owned, Personally Enabled
MTTRMean Time to Recover
VMVirtual Machine
VTCVideo Teleconferencing
AIArtificial Intelligence
IoCIndicators of Compromise
RAIDRedundant Array of Inexpensive Disks
CCMPCounter Mode/CBC-MAC Protocol
CCTVClosed-circuit Television
FTPSSecured File Transfer Protocol
SEDSelf-encrypting Drives
VDEVirtual Desktop Environment
XMLExtensible Markup Language
CIOChief Information Officer
ECCElliptic Curve Cryptography
ICSIndustrial Control Systems
PFSPerfect Forward Secrecy
RSARivest, Shamir, & Adleman
TPMTrusted Platform Module
DHCPDynamic Host Configuration Protocol
DNATDestination Network Address Translation
MSCHAPMicrosoft Challenge Handshake
SCAPSecurity Content Automation Protocol
PEMPrivacy Enhanced Mail
AISAutomated Indicator Sharing
MLMachine Learning
DMARCDomain Message Authentication Reporting and Conformance
ERPEnterprise Resource Planning
MANMetropolitan Area Network
NACNetwork Access Control
UTPUnshielded Twisted Pair
VPNVirtual Private Network
TLSTransport Layer Security
IDFIntermediate Distribution Frame
MACMessage Authentication Code
PEAPProtected Extensible Authentication Protocol
ATT&CKAdversarial Tactics, Techniques, and Common Knowledge
SDLCSoftware Development Lifecycle
BGPBorder Gateway Protocol
KDCKey Distribution Center
SAMLSecurity Assertions Markup Language
OAUTHOpen Authorization
SIMSubscriber Identity Module
AUPAcceptable Use Policy
CACertificate Authority
PCIDSS Payment Card Industry Data Security Standard
WTLSWireless TLS
USBOTG USB On the Go
VDIVirtual Desktop Infrastructure
RATRemote Access Trojan
UAVUnmanned Aerial Vehicle
IPSecInternet Protocol Security
MMSMultimedia Message Service
RBACRule-based Access Control
SOARSecurity Orchestration, Automation, Response
TKIPTemporal Key Integrity Protocol
ISSOInformation Systems Security Officer
MBRMaster Boot Record
MPLSMulti-protocol Label Switching
SPFSender Policy Framework
URIUniform Resource Identifier
BIABusiness Impact Analysis
TGTTicket Granting Ticket
S/MIMESecure/Multipurpose Internet Mail Extensions
SANSubject Alternative Name
APTAdvanced Persistent Threat
ISOInternational Standards Organization
LANLocal Area Network
ECBElectronic Code Book
GPSGlobal Positioning System
IRPIncident Response Plan
NISTNational Institute of Standards & Technology
CAPTCHACompletely Automated Public Turing Test to Tell Computers and Humans Apart
IaCInfrastructure as Code
PBKDF2Password-based Key Derivation Function 2
DDoSDistributed Denial of Service
SFTPSecured File Transfer Protocol
IRIncident Response
MD5Message Digest 5
CVECommon Vulnerability Enumeration
HOTPHMAC-based One-time Password
KEKKey Encryption Key
OTOperational Technology
SWGSecure Web Gateway
GREGeneric Routing Encapsulation
RADIUSRemote Authentication Dial-in User Service
HSMHardware Security Module
TOTPTime-based One-time Password
CRCCyclical Redundancy Check
P2PPeer to Peer
SDKSoftware Development Kit
TOCTime-of-check
VoIPVoice over IP
BPABusiness Partners Agreement
DACDiscretionary Access Control
FIMFile Integrity Management
PSKPre-shared Key
RTPReal-time Transport Protocol
TSIGTransaction Signature
CSRFCross-site Request Forgery
NIDSNetwork-based Intrusion Detection System
SIEMSecurity Information and Event Management
XSRFCross-site Request Forgery
SASESecure Access Service Edge
HTTPHypertext Transfer Protocol
PIVPersonal Identity Verification
SEHStructured Exception Handler
MSAMaster Service Agreement
RDPRemote Desktop Protocol
SCADASupervisory Control and Data Acquisition
EAPExtensible Authentication Protocol
OCSPOnline Certificate Status Protocol
SaaSSoftware as a Service
SD-WANSoftware-defined Wide Area Network
SOAPSimple Object Access Protocol
UEMUnified Endpoint Management
WAFWeb Application Firewall
CTOChief Technology Officer
FRRFalse Rejection Rate
WIPSWireless Intrusion Prevention System
FACLFile System Access Control List
HDDHard Disk Drive
PAMPluggable Authentication Modules
RC4Rivest Cipher version 4
TACACS+Terminal Access Controller Access Control System
FTPFile Transfer Protocol
MDMMobile Device Management
NATNetwork Address Translation
DPOData Privacy Officer
MSPManaged Service Provider
HAHigh Availability
UDPUser Datagram Protocol
SHTTPSecure Hypertext Transfer Protocol
CSPCloud Service Provider
PKCSPublic Key Cryptography Standards
SLESingle Loss Expectancy
SSHSecure Shell
EDREndpoint Detection and Response
GPGGnu Privacy Guard
ICMPInternet Control Message Protocol
DLLDynamic Link Library
FDEFull Disk Encryption
IEEEInstitute of Electrical and Electronics Engineers
CBCCipher Block Chaining
COOPContinuity of Operation Planning
IMAPInternet Message Access Protocol
SCEPSimple Certificate Enrollment Protocol
SDNSoftware-defined Networking
DKIMDomainKeys Identified Mail
AuthenticationProtocol
NFCNear Field Communication
NTLMNew Technology LAN Manager
VLSMVariable Length Subnet Masking
AROAnnualized Rate of Occurrence
FPGAField Programmable Gate Array
CASBCloud Access Security Broker
DSLDigital Subscriber Line
MSSPManaged Security Service Provider
PACProxy Auto Configuration
CIRTComputer Incident Response Team
CPContingency Planning
HTMLHypertext Markup Language
HMACHashed Message Authentication Code
IaaSInfrastructure as a Service
IDSIntrusion Detection System
MFAMultifactor Authentication
MFPMultifunction Printer
UPSUninterruptable Power Supply