CompTIA Study Materials
AWS Study Materials
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900

CompTIA Security+ SY0-701 All Acronyms Flashcards

LEAPLightweight Extensible Authentication Protocol
PSKPre-shared Key
SHASecure Hashing Algorithm
URLUniversal Resource Locator
UTPUnshielded Twisted Pair
PIIPersonally Identifiable Information
SIEMSecurity Information and Event Management
SMSShort Message Service
AESAdvanced Encryption Standard
CACertificate Authority
ECDHEElliptic Curve Diffie-Hellman Ephemeral
PEDPersonal Electronic Device
RATRemote Access Trojan
SIMSubscriber Identity Module
IPSIntrusion Prevention System
DHCPDynamic Host Configuration Protocol
ECDSAElliptic Curve Digital Signature Algorithm
ERPEnterprise Resource Planning
FDEFull Disk Encryption
SOWStatement of Work
CYODChoose Your Own Device
EAPExtensible Authentication Protocol
RTBHRemotely Triggered Black Hole
SOCSecurity Operations Center
TAXIITrusted Automated eXchange of Indicator Information
MMSMultimedia Message Service
MSAMaster Service Agreement
BASHBourne Again Shell
CSRCertificate Signing Request
MD5Message Digest 5
ECCElliptic Curve Cryptography
FTPFile Transfer Protocol
BIOSBasic Input/Output System
ICSIndustrial Control Systems
L2TPLayer 2 Tunneling Protocol
RC4Rivest Cipher version 4
SWGSecure Web Gateway
HMACHashed Message Authentication Code
WOWork Order
IRPIncident Response Plan
PCIDSS Payment Card Industry Data Security Standard
VLANVirtual Local Area Network
WAPWireless Access Point
STIXStructured Threat Information eXchange
DBADatabase Administrator
FTPSSecured File Transfer Protocol
HTTPHypertext Transfer Protocol
POPPost Office Protocol
SANSubject Alternative Name
AHAuthentication Header
BIABusiness Impact Analysis
PBXPrivate Branch Exchange
PGPPretty Good Privacy
SEDSelf-encrypting Drives
HOTPHMAC-based One-time Password
ISSOInformation Systems Security Officer
MTTFMean Time to Failure
KEKKey Encryption Key
MDMMobile Device Management
UATUser Acceptance Testing
HIPSHost-based Intrusion Prevention System
RSARivest, Shamir, & Adleman
CAPTCHACompletely Automated Public Turing Test to Tell Computers and Humans Apart
DRPDisaster Recovery Plan
MBRMaster Boot Record
CRCCyclical Redundancy Check
DACDiscretionary Access Control
MTBFMean Time Between Failures
RDPRemote Desktop Protocol
RBACRule-based Access Control
FIMFile Integrity Management
SHTTPSecure Hypertext Transfer Protocol
DPOData Privacy Officer
IRIncident Response
PHIPersonal Health Information
IoTInternet of Things
MFDMultifunction Device
SLESingle Loss Expectancy
IaCInfrastructure as Code
TACACS+Terminal Access Controller Access Control System
MSPManaged Service Provider
SaaSSoftware as a Service
SOARSecurity Orchestration, Automation, Response
SCADASupervisory Control and Data Acquisition
DLPData Loss Prevention
IEEEInstitute of Electrical and Electronics Engineers
OVALOpen Vulnerability Assessment Language
PFSPerfect Forward Secrecy
DSLDigital Subscriber Line
NISTNational Institute of Standards & Technology
OSOperating System
MOUMemorandum of Understanding
VBAVisual Basic
CIOChief Information Officer
MDFMain Distribution Frame
MFPMultifunction Printer
MTTRMean Time to Recover
HDDHard Disk Drive
OIDObject Identifier
PCAPPacket Capture
IDFIntermediate Distribution Frame
RAIDRedundant Array of Inexpensive Disks
ARPAddress Resolution Protocol
ATT&CKAdversarial Tactics, Techniques, and Common Knowledge
DLLDynamic Link Library
ISOInternational Standards Organization
UDPUser Datagram Protocol
XORExclusive Or
FPGAField Programmable Gate Array
MTUMaximum Transmission Unit
NATNetwork Address Translation
NTPNetwork Time Protocol
NFCNear Field Communication
WIPSWireless Intrusion Prevention System
VDEVirtual Desktop Environment
CRLCertificate Revocation List
SPFSender Policy Framework
ALEAnnualized Loss Expectancy
CTOChief Technology Officer
DoSDenial of Service
ICMPInternet Control Message Protocol
IRCInternet Relay Chat
SNMPSimple Network Management Protocol
SRTPSecure Real-Time Protocol
WPAWi-Fi Protected Access
AAAAuthentication, Authorization, and Accounting
IMInstant Messaging
PAMPluggable Authentication Modules
PKCSPublic Key Cryptography Standards
TGTTicket Granting Ticket
CTMCounter Mode
DDoSDistributed Denial of Service
NDANon-disclosure Agreement
SMTPSSimple Mail Transfer Protocol Secure
OTAOver the Air
SoCSystem on Chip
CIRTComputer Incident Response Team
IKEInternet Key Exchange
NTFSNew Technology File System
SDKSoftware Development Kit
CBCCipher Block Chaining
RTOSReal-time Operating System
HIDSHost-based Intrusion Detection System
PATPort Address Translation
PDUPower Distribution Unit
SCAPSecurity Content Automation Protocol
EDREndpoint Detection and Response
LANLocal Area Network
RACEResearch and Development in Advanced Communications Technologies in Europe
XMLExtensible Markup Language
GREGeneric Routing Encapsulation
MACMessage Authentication Code
BPDUBridge Protocol Data Unit
CERTComputer Emergency Response Team
RASRemote Access Server
SPIMSpam over Internet Messaging
ASLRAddress Space Layout Randomization
BYODBring Your Own Device
CASBCloud Access Security Broker
DNATDestination Network Address Translation
HTMLHypertext Markup Language
ISPInternet Service Provider
SAMLSecurity Assertions Markup Language
COOPContinuity of Operation Planning
SCEPSimple Certificate Enrollment Protocol
SDLCSoftware Development Lifecycle
TCP/IPTransmission Control Protocol/Internet Protocol
CFBCipher Feedback
IPInternet Protocol
SQLiSQL Injection
UEFIUnified Extensible Firmware Interface
GPUGraphics Processing Unit
PAPPassword Authentication Protocol
POTSPlain Old Telephone Service
PEMPrivacy Enhanced Mail
S/MIMESecure/Multipurpose Internet Mail Extensions
SOAPSimple Object Access Protocol
APIApplication Programming Interface
PIVPersonal Identity Verification
SEHStructured Exception Handler
TOTPTime-based One-time Password
FRRFalse Rejection Rate
VPCVirtual Private Cloud
AROAnnualized Rate of Occurrence
IDSIntrusion Detection System
OAUTHOpen Authorization
OSINTOpen-source Intelligence
VLSMVariable Length Subnet Masking
UEMUnified Endpoint Management
MOAMemorandum of Agreement
URIUniform Resource Identifier
AUPAcceptable Use Policy
CHAPChallenge Handshake Authentication Protocol
CIAConfidentiality, Integrity, Availability
GPOGroup Policy Object
NACNetwork Access Control
SSDSolid State Drive
TLSTransport Layer Security
NTLMNew Technology LAN Manager
OCSPOnline Certificate Status Protocol
SDLMSoftware Development Lifecycle Methodology
ACLAccess Control List
CSRFCross-site Request Forgery
DESDigital Encryption Standard
NGFWNext-generation Firewall
ROIReturn on Investment
SSLSecure Sockets Layer
TTPTactics, Techniques, and Procedures
APAccess Point
BPABusiness Partners Agreement
GPSGlobal Positioning System
IAMIdentity and Access Management
NIPSNetwork-based Intrusion Prevention System
GCMGalois Counter Mode
WEPWired Equivalent Privacy
UTMUnified Threat Management
OSPFOpen Shortest Path First
PKIPublic Key Infrastructure
RTPReal-time Transport Protocol
PBKDF2Password-based Key Derivation Function 2
RADIUSRemote Authentication Dial-in User Service
WTLSWireless TLS
CSUChannel Service Unit
DNSDomain Name System
FACLFile System Access Control List
HSMHardware Security Module
MPLSMulti-protocol Label Switching
IdPIdentity Provider
RFIDRadio Frequency Identifier
RPORecovery Point Objective
SMTPSimple Mail Transfer Protocol
VoIPVoice over IP
AISAutomated Indicator Sharing
CSPCloud Service Provider
GPGGnu Privacy Guard
MFAMultifactor Authentication
PEAPProtected Extensible Authentication Protocol
TPMTrusted Platform Module
VPNVirtual Private Network
IVInitialization Vector
MaaSMonitoring as a Service
AIArtificial Intelligence
COPECorporate Owned, Personally Enabled
PPTPPoint-to-Point Tunneling Protocol
SLAService-level Agreement
IMAPInternet Message Access Protocol
MSCHAPMicrosoft Challenge Handshake
TKIPTemporal Key Integrity Protocol
TSIGTransaction Signature
MSSPManaged Security Service Provider
SAESimultaneous Authentication of Equals
BCPBusiness Continuity Planning
CARCorrective Action Report
HAHigh Availability
MLMachine Learning
PaaSPlatform as a Service
RADRapid Application Development
SDNSoftware-defined Networking
APTAdvanced Persistent Threat
WPSWi-Fi Protected Setup
DMARCDomain Message Authentication Reporting and Conformance
GDPRGeneral Data Protection Regulation
IaaSInfrastructure as a Service
RARegistration Authority
IPSecInternet Protocol Security
VTCVideo Teleconferencing
XDRExtended Detection and Response
AES-256Advanced Encryption Standards 256-bit
ESPEncapsulated Security Payload
PACProxy Auto Configuration
WIDSWireless Intrusion Detection System
OTOperational Technology
VDIVirtual Desktop Infrastructure
CSOChief Security Officer
DEPData Execution Prevention
IDEAInternational Data Encryption Algorithm
SELinux Security-enhanced Linux
NIDSNetwork-based Intrusion Detection System
SASESecure Access Service Edge
UAVUnmanned Aerial Vehicle
XSSCross-site Scripting
CVSSCommon Vulnerability Scoring System
ECBElectronic Code Book
SQLStructured Query Language
SSOSingle Sign-on
CCTVClosed-circuit Television
CPContingency Planning
ESNElectronic Serial Number
P2PPeer to Peer
BGPBorder Gateway Protocol
CCMPCounter Mode/CBC-MAC Protocol
DSADigital Signature Algorithm
KDCKey Distribution Center
P12PKCS #12
PPPPoint-to-Point Protocol
WAFWeb Application Firewall
DHEDiffie-Hellman Ephemeral
EFSEncrypted File System
HTTPSHypertext Transfer Protocol Secure
UPSUninterruptable Power Supply
MANMetropolitan Area Network
PUPPotentially Unwanted Program
SFTPSecured File Transfer Protocol
IoCIndicators of Compromise
SD-WANSoftware-defined Wide Area Network
CVECommon Vulnerability Enumeration
HVACHeating, Ventilation Air Conditioning
RTORecovery Time Objective
VMVirtual Machine
XSRFCross-site Request Forgery
CMSContent Management System
DKIMDomainKeys Identified Mail
LDAPLightweight Directory Access Protocol
RIPEMDRACE Integrity Primitives Evaluation Message Digest
SSHSecure Shell