CompTIA Security+ SY0-701 All Acronyms Flashcards

FrontBack
DDoSDistributed Denial of Service
OSOperating System
FRRFalse Rejection Rate
ICMPInternet Control Message Protocol
URIUniform Resource Identifier
VBAVisual Basic
PBXPrivate Branch Exchange
SaaSSoftware as a Service
SDLCSoftware Development Lifecycle
BASHBourne Again Shell
IPSecInternet Protocol Security
NIPSNetwork-based Intrusion Prevention System
RFIDRadio Frequency Identifier
CSRFCross-site Request Forgery
DEPData Execution Prevention
IMInstant Messaging
NTFSNew Technology File System
PIIPersonally Identifiable Information
RTOSReal-time Operating System
CIRTComputer Incident Response Team
GPSGlobal Positioning System
HDDHard Disk Drive
MLMachine Learning
RACEResearch and Development in Advanced Communications Technologies in Europe
VDEVirtual Desktop Environment
VLANVirtual Local Area Network
ARPAddress Resolution Protocol
DHEDiffie-Hellman Ephemeral
FDEFull Disk Encryption
SAESimultaneous Authentication of Equals
EAPExtensible Authentication Protocol
IAMIdentity and Access Management
SIEMSecurity Information and Event Management
VMVirtual Machine
CHAPChallenge Handshake Authentication Protocol
DLPData Loss Prevention
IEEEInstitute of Electrical and Electronics Engineers
BIOSBasic Input/Output System
CFBCipher Feedback
CSOChief Security Officer
WPSWi-Fi Protected Setup
WTLSWireless TLS
RTORecovery Time Objective
SFTPSecured File Transfer Protocol
WAPWireless Access Point
CVECommon Vulnerability Enumeration
MDMMobile Device Management
OSPFOpen Shortest Path First
PPPPoint-to-Point Protocol
SMSShort Message Service
URLUniversal Resource Locator
VLSMVariable Length Subnet Masking
BIABusiness Impact Analysis
CTMCounter Mode
PSKPre-shared Key
SE LinuxSecurity-enhanced Linux
WPAWi-Fi Protected Access
CPContingency Planning
MTTFMean Time to Failure
SEHStructured Exception Handler
MaaSMonitoring as a Service
TPMTrusted Platform Module
USB OTGUSB On the Go
RATRemote Access Trojan
IoCIndicators of Compromise
OVALOpen Vulnerability Assessment Language
PPTPPoint-to-Point Tunneling Protocol
SLAService-level Agreement
WIPSWireless Intrusion Prevention System
NTPNetwork Time Protocol
SMTPSimple Mail Transfer Protocol
AESAdvanced Encryption Standard
DPOData Privacy Officer
ECBElectronic Code Book
CTOChief Technology Officer
ESPEncapsulated Security Payload
AUPAcceptable Use Policy
CCMPCounter Mode/CBC-MAC Protocol
HMACHashed Message Authentication Code
IoTInternet of Things
MPLSMulti-protocol Label Switching
RDPRemote Desktop Protocol
PEMPrivacy Enhanced Mail
PIVPersonal Identity Verification
GREGeneric Routing Encapsulation
HTMLHypertext Markup Language
P12PKCS #12
LEAPLightweight Extensible Authentication Protocol
APAccess Point
OTOperational Technology
PFSPerfect Forward Secrecy
SWGSecure Web Gateway
VoIPVoice over IP
NGFWNext-generation Firewall
SCADASupervisory Control and Data Acquisition
SSDSolid State Drive
UEMUnified Endpoint Management
KEKKey Encryption Key
MSSPManaged Security Service Provider
NIDSNetwork-based Intrusion Detection System
ROIReturn on Investment
TLSTransport Layer Security
DHCPDynamic Host Configuration Protocol
FIMFile Integrity Management
MFPMultifunction Printer
MSPManaged Service Provider
PUPPotentially Unwanted Program
UAVUnmanned Aerial Vehicle
SEDSelf-encrypting Drives
ASLRAddress Space Layout Randomization
CSRCertificate Signing Request
DACDiscretionary Access Control
HSMHardware Security Module
IRCInternet Relay Chat
LANLocal Area Network
MSAMaster Service Agreement
FTPSFile Transfer Protocol Secure
IRIncident Response
NTLMNew Technology LAN Manager
CMSContent Management System
SNMPSimple Network Management Protocol
BYODBring Your Own Device
IPSIntrusion Prevention System
PGPPretty Good Privacy
RAIDRedundant Array of Inexpensive Disks
SDLMSoftware Development Lifecycle Methodology
AuthenticationProtocol
TOCTime-of-check
UPSUninterruptable Power Supply
CACertificate Authority
MFDMultifunction Device
AISAutomated Indicator Sharing
MS-CHAPMicrosoft Challenge-Handshake Authentication Protocol
RADRapid Application Development
RTPReal-time Transport Protocol
SPFSender Policy Framework
S/MIMESecure/Multipurpose Internet Mail Extensions
SPIMSpam over Internet Messaging
UTMUnified Threat Management
CAPTCHACompletely Automated Public Turing Test to Tell Computers and Humans Apart
PHIPersonal Health Information
AVAntivirus
TOUTime-of-use
VPNVirtual Private Network
ECDSAElliptic Curve Digital Signature Algorithm
RC4Rivest Cipher version 4
DKIMDomainKeys Identified Mail
OSINTOpen-source Intelligence
IDFIntermediate Distribution Frame
IVInitialization Vector
MTTRMean Time to Recover
NFCNear Field Communication
RIPEMDRACE Integrity Primitives Evaluation Message Digest
SQLStructured Query Language
SRTPSecure Real-Time Protocol
SSHSecure Shell
TACACS+Terminal Access Controller Access Control System
TTPTactics, Techniques, and Procedures
HTTPSHypertext Transfer Protocol Secure
IPInternet Protocol
IRPIncident Response Plan
SDNSoftware-defined Networking
TSIGTransaction Signature
WOWork Order
POPPost Office Protocol
RASRemote Access Server
UATUser Acceptance Testing
VDIVirtual Desktop Infrastructure
APTAdvanced Persistent Threat
PAMPluggable Authentication Modules
PDUPower Distribution Unit
SoCSystem on Chip
DMARCDomain Message Authentication Reporting and Conformance
GPUGraphics Processing Unit
MTBFMean Time Between Failures
GPOGroup Policy Object
HAHigh Availability
IdPIdentity Provider
PKCSPublic Key Cryptography Standards
SCAPSecurity Content Automation Protocol
RBACRule-based Access Control
SHTTPSecure Hypertext Transfer Protocol
CARCorrective Action Report
CYODChoose Your Own Device
DoSDenial of Service
NISTNational Institute of Standards & Technology
PATPort Address Translation
CSUChannel Service Unit
FACLFile System Access Control List
L2TPLayer 2 Tunneling Protocol
MTUMaximum Transmission Unit
NATNetwork Address Translation
CASBCloud Access Security Broker
MOAMemorandum of Agreement
OTAOver the Air
SD-WANSoftware-defined Wide Area Network
SASESecure Access Service Edge
DESDigital Encryption Standard
PEAPProtected Extensible Authentication Protocol
MANMetropolitan Area Network
CRCCyclical Redundancy Check
SCEPSimple Certificate Enrollment Protocol
SLESingle Loss Expectancy
OIDObject Identifier
SIMSubscriber Identity Module
SOCSecurity Operations Center
TGTTicket Granting Ticket
COPECorporate Owned, Personally Enabled
PACProxy Auto Configuration
RSARivest, Shamir, & Adleman
SOWStatement of Work
HTTPHypertext Transfer Protocol
KDCKey Distribution Center
POTSPlain Old Telephone Service
SANSubject Alternative Name
CCTVClosed-circuit Television
GCMGalois Counter Mode
PCAPPacket Capture
SDKSoftware Development Kit
SQLiSQL Injection
WIDSWireless Intrusion Detection System
BPDUBridge Protocol Data Unit
COOPContinuity of Operation Planning
PBKDF2Password-based Key Derivation Function 2
SMTPSSimple Mail Transfer Protocol Secure
TOTPTime-based One-time Password
ISSOInformation Systems Security Officer
MFAMultifactor Authentication
AIArtificial Intelligence
CIOChief Information Officer
DSADigital Signature Algorithm
BCPBusiness Continuity Planning
BGPBorder Gateway Protocol
CERTComputer Emergency Response Team
XSSCross-site Scripting
CIAConfidentiality, Integrity, Availability
DNATDestination Network Address Translation
PaaSPlatform as a Service
PCIDSS Payment Card Industry Data Security Standard
AROAnnualized Rate of Occurrence
CSPCloud Service Provider
MDFMain Distribution Frame
OAUTHOpen Authorization
PTZPan-tilt-zoom
XDRExtended Detection and Response
DRPDisaster Recovery Plan
HOTPHMAC-based One-time Password
P2PPeer to Peer
AAAAuthentication, Authorization, and Accounting
ESNElectronic Serial Number
IMAPInternet Message Access Protocol
XMLExtensible Markup Language
BPABusiness Partners Agreement
MD5Message Digest 5
PKIPublic Key Infrastructure
XSRFCross-site Request Forgery
MMSMultimedia Message Service
VPCVirtual Private Cloud
DLLDynamic Link Library
EDREndpoint Detection and Response
ISOInternational Standards Organization
PEDPersonal Electronic Device
SOAPSimple Object Access Protocol
SSLSecure Sockets Layer
FPGAField Programmable Gate Array
VTCVideo Teleconferencing
ICSIndustrial Control Systems
IDEAInternational Data Encryption Algorithm
OCSPOnline Certificate Status Protocol
TCP/IPTransmission Control Protocol/Internet Protocol
UDPUser Datagram Protocol
MOUMemorandum of Understanding
AHAuthentication Header
GDPRGeneral Data Protection Regulation
RPORecovery Point Objective
UEFIUnified Extensible Firmware Interface
XORExclusive Or
TAXIITrusted Automated eXchange of Indicator Information
ACLAccess Control List
DSLDigital Subscriber Line
RTBHRemotely Triggered Black Hole
WEPWired Equivalent Privacy
ECCElliptic Curve Cryptography
WAFWeb Application Firewall
GPGGnu Privacy Guard
HIDSHost-based Intrusion Detection System
RARegistration Authority
DBADatabase Administrator
IDSIntrusion Detection System
RADIUSRemote Authentication Dial-in User Service
AES-256Advanced Encryption Standards 256-bit
CVSSCommon Vulnerability Scoring System
ERPEnterprise Resource Planning
FTPFile Transfer Protocol
MACMessage Authentication Code
SHASecure Hashing Algorithm
SSOSingle Sign-on
UTPUnshielded Twisted Pair
APIApplication Programming Interface
ATT&CKAdversarial Tactics, Techniques, and Common Knowledge
HIPSHost-based Intrusion Prevention System
HVACHeating, Ventilation Air Conditioning
DNSDomain Name System
LDAPLightweight Directory Access Protocol
NACNetwork Access Control
CBCCipher Block Chaining
ISPInternet Service Provider
SAMLSecurity Assertions Markup Language
STIXStructured Threat Information eXchange
CRLCertificate Revocation List
ALEAnnualized Loss Expectancy
PAPPassword Authentication Protocol
ECDHEElliptic Curve Diffie-Hellman Ephemeral
IaaSInfrastructure as a Service
IaCInfrastructure as Code
MBRMaster Boot Record
NDANon-disclosure Agreement
EFSEncrypted File System
IKEInternet Key Exchange
SOARSecurity Orchestration, Automation, Response
TKIPTemporal Key Integrity Protocol