Bash, the Crucial Exams Chat Bot
AI Bot
CompTIA PenTest+ PT0-002 All Acronyms Flashcards
SQL
Statement of Work
Time to Live
SLA
Service-level Agreement
Virtual Local Area Network
Structured Query Language
RFC
SOW
TTL
VLAN
Request for Comment
Front | Back |
AAA | Authentication, Authorization and Accounting |
ACL | Access Control List |
AES | Advanced Encryption Standard |
AP | Access Point |
API | Application Programming Interface |
APT | Advanced Persistent Threat |
ARP | Address Resolution Protocol |
AS2 | Applicability Statement 2 |
BeEF | Browser Exploitation Framework |
BLE | Bluetooth Low Energy |
BSSID | Basic Service Set Identifiers |
CA | Certificate Authority |
CAPEC | Common Attack Pattern Enumeration and Classification |
CLI | Command-Line Interface |
CSRF | Cross-Site Request Forgery |
CSV | Comma-Separated Values |
CVE | Common Vulnerabilities and Exposures |
CVSS | Common Vulnerability Scoring Systems |
CWE | Common Weakness Enumeration |
DB | Database |
DDoS | Distributed Denial-of-Service |
DHCP | Dynamic Host Configuration Protocol |
DLL | Dynamic Link Library |
DLP | Data Loss Prevention |
DNS | Domain Name System |
DNSSEC | Domain Name System Security Extensions |
EAP | Extensible Authentication Protocol |
FOCA | Fingerprinting Organization with Collected Archives |
FTP | File Transfer Protocol |
FTPS | File Transfer Protocol Secure |
GDB | GNU Debugger |
GDPR | General Data Protection Regulation |
GPU | Graphics Processing Unit |
HTTP | Hypertext Transfer Protocol |
HTTPS | Hypertext Transfer Protocol Secure |
IaaS | Infrastructure as a Service |
IAM | Identity and Access Management |
ICMP | Internet Control Message Protocol |
ICS | Industrial Control System |
IDA | Interactive Disassembler |
IDS | Intrusion Detection System |
IIoT | Industrial Internet of Things |
IMEIs | International Mobile Equipment Identity |
IoT | Internet of Things |
IP | Internet Protocol |
IPMI | Intelligent Platform Management Interface |
IPS | Intrusion Prevention System |
ISO | International Organization for Standardization |
ISP | Internet Service Provider |
ISSAF | Information Systems Security Assessment Framework |
JSON | JavaScript Object Notation |
LAN | Local Area Network |
LDAP | Lightweight Directory Access Protocol |
LLMNR | Link-Local Multicast Name Resolution |
LSASS | Local Security Authority Subsystem Service |
MAC | Media Access Control |
MDM | Mobile Device Management |
MobSF | Mobile Security Framework |
MOU | Memorandum of Understanding |
MSA | Master Service Agreement |
MX | Mail Exchange |
NAC | Network Access Control |
NBT-NS | NetBIOS Name Service |
NDA | Non-disclosure Agreement |
NFC | Near-Field Communication |
NIST | National Institute of Standards and Technology |
NIST SP | National Institute of Standards and Technology Special Publication |
NS | Name Server |
NSE | Nmap Scripting Engine |
NTLM | New Technology LAN Manager |
NTP | Network Time Protocol |
OS | Operating System |
OSINT | Open-source Intelligence |
OSSTMM | Open-source Security Testing Methodology Manual |
OWASP | Open Web Application Security Project |
PBKDF2 | Password-Based Key Deviation Function 2 |
PCI DSS | Payment Card Industry Data Security Standard |
PHP | Hypertextm Preprocessor |
PII | Personal Identifiable Information |
PKI | Public Key Infrastructure |
PLC | Programmable Logic Controller |
PS | PowerShell |
PSK | Pre-Shared Key |
PTES | Penetration Testing Execution Standard |
RAT | Remote Access Trojan |
RDP | Remote Desktop Protocol |
RF | Radio Frequency |
RFC | Request for Comment |
RFID | Radio-Frequency Identification |
ROE | Rules of Engagement |
S/MIME | Secure/Multipurpose Internet Mail Extensions |
SCADA | Supervisory Control and Data Acquisition |
SCAP | Security Content Automation Protocol |
SDK | Software Development Kit |
SDLC | Software Development Life Cycle |
SDR | Software-defined Radio |
SET | Social Engineering Toolkit |
SGID | Set Group ID |
SIEM | Security Information and Event Management |
SIP | Session Initiation Protocol |
SLA | Service-level Agreement |
SMB | Server Message Block |
SMS | Short Message Service |
SMTP | Simple Mail Transfer Protocol |
SNMP | Simple Network Management Protocol |
SOC | Security Operations Center |
SOW | Statement of Work |
SQL | Structured Query Language |
SSD | Solid-State Drive |
SSH | Secure Shell |
SSHD | Solid-State Hybrid Drive |
SSID | Service Set Identifier |
SSL | Secure Sockets Layer |
SSO | Single Sign-On |
SUID | Set User ID |
TCP | Transmission Control Protocol |
TKIP | Temporal Key Integrity Protocol |
TLS | Transport Layer Security |
TTL | Time to Live |
TTPs | Tactics, Techniques and Procedures |
UDP | User Datagram Protocol |
URI | Uniform Resource Identifier |
URL | Uniform Resource Locator |
USB | Universal Serial Bus |
UTF | Unicode Transformation Format |
VAS | Vulnerability Assessment Scanner |
VLAN | Virtual Local Area Network |
VM | Virtual Machine |
VoIP | Voice over Internet Protocol |
VPN | Virtual Private Network |
VPS | Virtual Private Server |
WAF | Web Application Firewall |
WEP | Wired Equivalent Privacy |
WiGLE | Wireless Geographic Logging Engine |
WinRM | Windows Remote Management |
WMI | Windows Management Instrumentation |
WPA | Wi-Fi Protected Access |
WPS | Wi-Fi Protected Setup |
XML-RPC | Extensible Markup Language-Remote Procedure Call |
XSS | Cross-Site Scripting |
ZAP | Zed Attack Proxy |
Front
PS
Click the card to flip
Back
PowerShell
Front
SMS
Back
Short Message Service
Front
IDA
Back
Interactive Disassembler
Front
OS
Back
Operating System
Front
DB
Back
Database
Front
FTP
Back
File Transfer Protocol
Front
MDM
Back
Mobile Device Management
Front
SNMP
Back
Simple Network Management Protocol
Front
AES
Back
Advanced Encryption Standard
Front
SET
Back
Social Engineering Toolkit
Front
WiGLE
Back
Wireless Geographic Logging Engine
Front
AAA
Back
Authentication, Authorization and Accounting
Front
DLP
Back
Data Loss Prevention
Front
OWASP
Back
Open Web Application Security Project
Front
SSO
Back
Single Sign-On
Front
RFC
Back
Request for Comment
Front
URL
Back
Uniform Resource Locator
Front
OSINT
Back
Open-source Intelligence
Front
WPS
Back
Wi-Fi Protected Setup
Front
MAC
Back
Media Access Control
Front
MSA
Back
Master Service Agreement
Front
LDAP
Back
Lightweight Directory Access Protocol
Front
NIST
Back
National Institute of Standards and Technology
Front
SQL
Back
Structured Query Language
Front
IAM
Back
Identity and Access Management
Front
AP
Back
Access Point
Front
CSV
Back
Comma-Separated Values
Front
GDB
Back
GNU Debugger
Front
PLC
Back
Programmable Logic Controller
Front
ARP
Back
Address Resolution Protocol
Front
CLI
Back
Command-Line Interface
Front
RF
Back
Radio Frequency
Front
TKIP
Back
Temporal Key Integrity Protocol
Front
IoT
Back
Internet of Things
Front
VoIP
Back
Voice over Internet Protocol
Front
OSSTMM
Back
Open-source Security Testing Methodology Manual
Front
SCADA
Back
Supervisory Control and Data Acquisition
Front
SMB
Back
Server Message Block
Front
PCI DSS
Back
Payment Card Industry Data Security Standard
Front
WPA
Back
Wi-Fi Protected Access
Front
SSL
Back
Secure Sockets Layer
Front
BSSID
Back
Basic Service Set Identifiers
Front
HTTPS
Back
Hypertext Transfer Protocol Secure
Front
MX
Back
Mail Exchange
Front
SMTP
Back
Simple Mail Transfer Protocol
Front
PBKDF2
Back
Password-Based Key Deviation Function 2
Front
ACL
Back
Access Control List
Front
MobSF
Back
Mobile Security Framework
Front
PSK
Back
Pre-Shared Key
Front
ISO
Back
International Organization for Standardization
Front
ISSAF
Back
Information Systems Security Assessment Framework
Front
MOU
Back
Memorandum of Understanding
Front
SLA
Back
Service-level Agreement
Front
NDA
Back
Non-disclosure Agreement
Front
SUID
Back
Set User ID
Front
NTLM
Back
New Technology LAN Manager
Front
ROE
Back
Rules of Engagement
Front
TTPs
Back
Tactics, Techniques and Procedures
Front
API
Back
Application Programming Interface
Front
DNS
Back
Domain Name System
Front
UTF
Back
Unicode Transformation Format
Front
CA
Back
Certificate Authority
Front
FOCA
Back
Fingerprinting Organization with Collected Archives
Front
SDLC
Back
Software Development Life Cycle
Front
SOC
Back
Security Operations Center
Front
TCP
Back
Transmission Control Protocol
Front
DHCP
Back
Dynamic Host Configuration Protocol
Front
SSID
Back
Service Set Identifier
Front
S/MIME
Back
Secure/Multipurpose Internet Mail Extensions
Front
SDK
Back
Software Development Kit
Front
SOW
Back
Statement of Work
Front
XSS
Back
Cross-Site Scripting
Front
WAF
Back
Web Application Firewall
Front
LSASS
Back
Local Security Authority Subsystem Service
Front
UDP
Back
User Datagram Protocol
Front
USB
Back
Universal Serial Bus
Front
SIEM
Back
Security Information and Event Management
Front
SGID
Back
Set Group ID
Front
TTL
Back
Time to Live
Front
DDoS
Back
Distributed Denial-of-Service
Front
EAP
Back
Extensible Authentication Protocol
Front
PKI
Back
Public Key Infrastructure
Front
SDR
Back
Software-defined Radio
Front
LAN
Back
Local Area Network
Front
NS
Back
Name Server
Front
WMI
Back
Windows Management Instrumentation
Front
SSD
Back
Solid-State Drive
Front
VPS
Back
Virtual Private Server
Front
BLE
Back
Bluetooth Low Energy
Front
VPN
Back
Virtual Private Network
Front
GPU
Back
Graphics Processing Unit
Front
SSH
Back
Secure Shell
Front
GDPR
Back
General Data Protection Regulation
Front
VM
Back
Virtual Machine
Front
SIP
Back
Session Initiation Protocol
Front
CSRF
Back
Cross-Site Request Forgery
Front
ISP
Back
Internet Service Provider
Front
WEP
Back
Wired Equivalent Privacy
Front
PII
Back
Personal Identifiable Information
Front
CVE
Back
Common Vulnerabilities and Exposures
Front
LLMNR
Back
Link-Local Multicast Name Resolution
Front
NBT-NS
Back
NetBIOS Name Service
Front
JSON
Back
JavaScript Object Notation
Front
DLL
Back
Dynamic Link Library
Front
VLAN
Back
Virtual Local Area Network
Front
BeEF
Back
Browser Exploitation Framework
Front
NTP
Back
Network Time Protocol
Front
ZAP
Back
Zed Attack Proxy
Front
TLS
Back
Transport Layer Security
Front
URI
Back
Uniform Resource Identifier
Front
FTPS
Back
File Transfer Protocol Secure
Front
SSHD
Back
Solid-State Hybrid Drive
Front
AS2
Back
Applicability Statement 2
Front
PHP
Back
Hypertextm Preprocessor
Front
NAC
Back
Network Access Control
Front
NSE
Back
Nmap Scripting Engine
Front
NIST SP
Back
National Institute of Standards and Technology Special Publication
Front
WinRM
Back
Windows Remote Management
Front
CAPEC
Back
Common Attack Pattern Enumeration and Classification
Front
HTTP
Back
Hypertext Transfer Protocol
Front
ICMP
Back
Internet Control Message Protocol
Front
IPMI
Back
Intelligent Platform Management Interface
Front
APT
Back
Advanced Persistent Threat
Front
IDS
Back
Intrusion Detection System
Front
IPS
Back
Intrusion Prevention System
Front
RAT
Back
Remote Access Trojan
Front
CWE
Back
Common Weakness Enumeration
Front
DNSSEC
Back
Domain Name System Security Extensions
Front
SCAP
Back
Security Content Automation Protocol
Front
IP
Back
Internet Protocol
Front
NFC
Back
Near-Field Communication
Front
PTES
Back
Penetration Testing Execution Standard
Front
RDP
Back
Remote Desktop Protocol
Front
RFID
Back
Radio-Frequency Identification
Front
XML-RPC
Back
Extensible Markup Language-Remote Procedure Call
Front
CVSS
Back
Common Vulnerability Scoring Systems
Front
IaaS
Back
Infrastructure as a Service
Front
ICS
Back
Industrial Control System
Front
IMEIs
Back
International Mobile Equipment Identity
Front
VAS
Back
Vulnerability Assessment Scanner
Front
IIoT
Back
Industrial Internet of Things
1/141
This deck includes all acronyms from the official PTO-002 Exam Objectives.