CompTIA Study Materials
AWS Study Materials
AWS Certified Developer Associate AWS Certified Developer Associate
AWS Certified Developer Associate DVA-C02
AWS Certified Solutions Architect Associate AWS Certified Solutions Architect Associate
AWS Certified Solutions Architect Associate SAA-C03
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900

CompTIA Cloud+ CV0-003 All Acronyms Flashcards

AcronymDefinition
HRISHuman Resources Information System
HTTPSHypertext Transfer Protocol Secure
I/OInput/Output
IaaSInfrastructure as a Service
IaCInfrastructure as Code
IAMIdentity and Access Management
ICMPInternet Control Management Protocol
IDSIntrusion Detection System
IFCPInternet Fibre Channel Protocol
IGRPInterior Gateway Routing Protocol
IOPSInput/Output Operations Per Second
IoTInternet of Things
IPInternet Protocol
IPAMIP Address Management
IPCInstructions Per Cycle
IPMIIntelligent Platform Management Interface
IPSIntrusion Prevention System
IPSecIP Security
IQNiSCSI Qualified Name
iSCSIInternet Small Computer System Interface
ISNSInternet Storage Name Service
ISPInternet Service Provider
JBODJust a Bunch Of Disks
JSONJavaScript Object Notation
KVMKeyboard Video Mouse
L2TPLayer 2 Tunneling Protocol
LANLocal Area Network
LDAPLightweight Directory Access Protocol
LTSLong-Term Support
LUNLogical Unit Number
MACMandatory Access Control
MBRMaster Boot Record
MDFMain Distribution Facility
MFAMulti-Factor Authentication
MLMachine Learning
MPIOMultiPath I/O
MPLSMultiprotocol Label Switching
MSPManaged Service Provider
MFTPManaged File Transfer Protocol
MTBFMean Time Between Failure
MTTFMean Time To Failure
MTTRMean Time To Repair
MTUMaximum Transmission Unit
NACNetwork Access Control
NASNetwork Attached Storage
NATNetwork Address Translation
NFSNetwork File System
NFVNetwork Function Virtualization
NICNetwork Interface Controller
NIDSNetwork Intrusion Detection System
NIPSNetwork-based Intrusion Prevention System
NISNetwork Information Service
NOCNetwork Operations Center
NPIVN_Port ID Virtualization
NSName Server
NTFSNew Technology File System
NTPNetwork Time Protocol
NTSNetwork Time Security
NVGRENetwork Virtualization using Generic Routing Encapsulation
NVMeNon-Volatile Memory Express
NVMe-oFNVMe over Fabrics
ODBCOpen Database Connectivity
OLAOperational Level Agreement
OSOperating System
OSIOpen Systems Interconnection
OSPFOpen Shortest Path First
P2PPhysical to Physical
P2VPhysical to Virtual
PaaSPlatform as a Service
PAMPrivileged Access Management
PATPort Address Translation
PBXPrivate (or Public) Branch Exchange
PCIPeripheral Component Interconnect
PCIePeripheral Component Interconnect Express
PIIPersonally Identifiable Information
PITPoint-in-Time (backup or snapshot)
PKIPublic Key Infrastructure
PPTPPoint-to-point Tunneling Protocol
QAQuality Assurance
QoSQuality of Service
RAIDRedundant Array of Independent/Inexpensive Disks
RAMRandom Access Memory
RBACRole-Based Access Control
RDPRemote Desktop Protocol
ReFSResilient File System
RESTRepresentational State Transfer
RPORecovery Point Objective
RTORecovery Time Objectives
SaaSSoftware as a Service
SAMLSecurity Assertion Markup Language
SANStorage Area Network
SASSerial Attached SCSI
SATASerial Advanced Technology Attachment
SCPSession Control Protocol
SCSISmall Computer System Interface
SDLCSoftware Development Life Cycle
SDNSoftware-Defined Network
SDSSoftware-Defined Storage
SDWANSoftware-defined Wide-Area Network
SFTPSecure FTP
SHASecure Hash Algorithm
SIEMSecurity Information and Event Management
SIPSession Initiation Protocol
SLAService Level Agreement
SMBServer Message Block
SMTSimultaneous Multi-Threading
SMTPSimple Mail Transfer Protocol
SNMPSimple Network Management Protocol
SOAStart of Authority
SOAPSimple Object Access Protocol
SoCSystem-on-Chip
SPFSender Protection Framework
SQLStructured Query Language
SRESite Reliability Engineer
SR-IOVSingle-Root Input/ Output Virtualization
SSDSolid State Disk
SSHSecure Shell
SSLSecure Sockets Layer
SSOSingle Sign-On
STTStateless Transport Tunneling
TCOTotal Cost of Operations
TCPTransmission Control Protocol
TKIPTemporal Key Integrity Protocol
TLSTransport Layer Security
TPMTrusted Platform Module
TTLTime to Live
UATUser Acceptance Testing
UDPUniversal Datagram Protocol
UPSUniversal Power Supply
URLUniform Resource Locator
V2PVirtual to Physical
V2VVirtual to Virtual
vADCVirtual ADC
VATVirtual Allocation Table
vCPUVirtual CPU
VDIVirtual Desktop Infrastructure
vGPUVirtual Graphics Processing Unit
VHDVirtual Hard Disk
VLANVirtual LAN
VMVirtual Machine
VMFSVirtual Machine File System
VNCVirtual Network Computing
vNICVirtual NIC
VoIPVoice over IP
VPCVirtual Private Cloud
VPNVirtual Private Network
vRAMVirtual RAM
vSANVirtual SAN
vSwitchVirtual Switch
VTLVirtual Tape Library
VXLANVirtual extensible LAN
WAFWeb Application Firewall
WANWide Area Network
WMIWindows Management Implementation
WWNNWorld Wide Node Name
WWPNWorld Wide Port Name
XaaSanything as a Service
XSSCross-site Scripting
YAMLYet Another Markup Language
ZFSZ File System
Front
PIT
Click the card to flip
Back
Point-in-Time (backup or snapshot)
Front
QoS
Back
Quality of Service
Front
PAT
Back
Port Address Translation
Front
WWNN
Back
World Wide Node Name
Front
KVM
Back
Keyboard Video Mouse
Front
SAML
Back
Security Assertion Markup Language
Front
SCSI
Back
Small Computer System Interface
Front
SFTP
Back
Secure FTP
Front
VAT
Back
Virtual Allocation Table
Front
PKI
Back
Public Key Infrastructure
Front
QA
Back
Quality Assurance
Front
WMI
Back
Windows Management Implementation
Front
SIEM
Back
Security Information and Event Management
Front
OLA
Back
Operational Level Agreement
Front
vGPU
Back
Virtual Graphics Processing Unit
Front
JBOD
Back
Just a Bunch Of Disks
Front
vRAM
Back
Virtual RAM
Front
SSL
Back
Secure Sockets Layer
Front
XaaS
Back
anything as a Service
Front
MDF
Back
Main Distribution Facility
Front
MPIO
Back
MultiPath I/O
Front
UPS
Back
Universal Power Supply
Front
V2P
Back
Virtual to Physical
Front
VHD
Back
Virtual Hard Disk
Front
VPN
Back
Virtual Private Network
Front
WWPN
Back
World Wide Port Name
Front
STT
Back
Stateless Transport Tunneling
Front
IPC
Back
Instructions Per Cycle
Front
OSI
Back
Open Systems Interconnection
Front
VM
Back
Virtual Machine
Front
XSS
Back
Cross-site Scripting
Front
LAN
Back
Local Area Network
Front
TCO
Back
Total Cost of Operations
Front
TKIP
Back
Temporal Key Integrity Protocol
Front
NTP
Back
Network Time Protocol
Front
SMB
Back
Server Message Block
Front
HTTPS
Back
Hypertext Transfer Protocol Secure
Front
IPAM
Back
IP Address Management
Front
PaaS
Back
Platform as a Service
Front
UAT
Back
User Acceptance Testing
Front
REST
Back
Representational State Transfer
Front
NIC
Back
Network Interface Controller
Front
PAM
Back
Privileged Access Management
Front
SAS
Back
Serial Attached SCSI
Front
HRIS
Back
Human Resources Information System
Front
IOPS
Back
Input/Output Operations Per Second
Front
IoT
Back
Internet of Things
Front
MFA
Back
Multi-Factor Authentication
Front
P2V
Back
Physical to Virtual
Front
URL
Back
Uniform Resource Locator
Front
I/O
Back
Input/Output
Front
ReFS
Back
Resilient File System
Front
IAM
Back
Identity and Access Management
Front
MPLS
Back
Multiprotocol Label Switching
Front
TLS
Back
Transport Layer Security
Front
IQN
Back
iSCSI Qualified Name
Front
ISP
Back
Internet Service Provider
Front
RPO
Back
Recovery Point Objective
Front
SIP
Back
Session Initiation Protocol
Front
NFS
Back
Network File System
Front
TCP
Back
Transmission Control Protocol
Front
PCIe
Back
Peripheral Component Interconnect Express
Front
ODBC
Back
Open Database Connectivity
Front
V2V
Back
Virtual to Virtual
Front
NAC
Back
Network Access Control
Front
WAF
Back
Web Application Firewall
Front
ISNS
Back
Internet Storage Name Service
Front
SATA
Back
Serial Advanced Technology Attachment
Front
SSH
Back
Secure Shell
Front
UDP
Back
Universal Datagram Protocol
Front
ZFS
Back
Z File System
Front
SDS
Back
Software-Defined Storage
Front
WAN
Back
Wide Area Network
Front
VDI
Back
Virtual Desktop Infrastructure
Front
IP
Back
Internet Protocol
Front
iSCSI
Back
Internet Small Computer System Interface
Front
TTL
Back
Time to Live
Front
RBAC
Back
Role-Based Access Control
Front
IaC
Back
Infrastructure as Code
Front
ML
Back
Machine Learning
Front
NVGRE
Back
Network Virtualization using Generic Routing Encapsulation
Front
OS
Back
Operating System
Front
SLA
Back
Service Level Agreement
Front
VPC
Back
Virtual Private Cloud
Front
IPS
Back
Intrusion Prevention System
Front
NS
Back
Name Server
Front
SDWAN
Back
Software-defined Wide-Area Network
Front
RDP
Back
Remote Desktop Protocol
Front
IPSec
Back
IP Security
Front
OSPF
Back
Open Shortest Path First
Front
RAM
Back
Random Access Memory
Front
SQL
Back
Structured Query Language
Front
NAS
Back
Network Attached Storage
Front
LDAP
Back
Lightweight Directory Access Protocol
Front
RTO
Back
Recovery Time Objectives
Front
LUN
Back
Logical Unit Number
Front
SaaS
Back
Software as a Service
Front
NAT
Back
Network Address Translation
Front
NTFS
Back
New Technology File System
Front
SOAP
Back
Simple Object Access Protocol
Front
YAML
Back
Yet Another Markup Language
Front
NVMe
Back
Non-Volatile Memory Express
Front
MAC
Back
Mandatory Access Control
Front
PCI
Back
Peripheral Component Interconnect
Front
vSwitch
Back
Virtual Switch
Front
IGRP
Back
Interior Gateway Routing Protocol
Front
MTTF
Back
Mean Time To Failure
Front
NVMe-oF
Back
NVMe over Fabrics
Front
SDN
Back
Software-Defined Network
Front
IaaS
Back
Infrastructure as a Service
Front
LTS
Back
Long-Term Support
Front
SPF
Back
Sender Protection Framework
Front
TPM
Back
Trusted Platform Module
Front
VTL
Back
Virtual Tape Library
Front
NOC
Back
Network Operations Center
Front
SMTP
Back
Simple Mail Transfer Protocol
Front
MTBF
Back
Mean Time Between Failure
Front
SHA
Back
Secure Hash Algorithm
Front
RAID
Back
Redundant Array of Independent/Inexpensive Disks
Front
NFV
Back
Network Function Virtualization
Front
SCP
Back
Session Control Protocol
Front
MBR
Back
Master Boot Record
Front
NIDS
Back
Network Intrusion Detection System
Front
SDLC
Back
Software Development Life Cycle
Front
SSD
Back
Solid State Disk
Front
VMFS
Back
Virtual Machine File System
Front
VoIP
Back
Voice over IP
Front
JSON
Back
JavaScript Object Notation
Front
MTU
Back
Maximum Transmission Unit
Front
vCPU
Back
Virtual CPU
Front
vNIC
Back
Virtual NIC
Front
PBX
Back
Private (or Public) Branch Exchange
Front
PPTP
Back
Point-to-point Tunneling Protocol
Front
IDS
Back
Intrusion Detection System
Front
SOA
Back
Start of Authority
Front
NIPS
Back
Network-based Intrusion Prevention System
Front
SSO
Back
Single Sign-On
Front
SR-IOV
Back
Single-Root Input/ Output Virtualization
Front
IPMI
Back
Intelligent Platform Management Interface
Front
vSAN
Back
Virtual SAN
Front
NIS
Back
Network Information Service
Front
L2TP
Back
Layer 2 Tunneling Protocol
Front
SoC
Back
System-on-Chip
Front
NTS
Back
Network Time Security
Front
SMT
Back
Simultaneous Multi-Threading
Front
MFTP
Back
Managed File Transfer Protocol
Front
SRE
Back
Site Reliability Engineer
Front
IFCP
Back
Internet Fibre Channel Protocol
Front
SNMP
Back
Simple Network Management Protocol
Front
VNC
Back
Virtual Network Computing
Front
VXLAN
Back
Virtual extensible LAN
Front
MSP
Back
Managed Service Provider
Front
MTTR
Back
Mean Time To Repair
Front
ICMP
Back
Internet Control Management Protocol
Front
SAN
Back
Storage Area Network
Front
VLAN
Back
Virtual LAN
Front
P2P
Back
Physical to Physical
Front
PII
Back
Personally Identifiable Information
Front
NPIV
Back
N_Port ID Virtualization
Front
vADC
Back
Virtual ADC
1/160