Bash, the Crucial Exams Chat Bot
AI Bot

CompTIA PenTest+ PT0-002 All Acronyms Flashcards

SQL
Statement of Work
Time to Live
SLA
Service-level Agreement
Virtual Local Area Network
Structured Query Language
RFC
SOW
TTL
VLAN
Request for Comment
FrontBack
AAAAuthentication, Authorization and Accounting
ACLAccess Control List
AESAdvanced Encryption Standard
APAccess Point
APIApplication Programming Interface
APTAdvanced Persistent Threat
ARPAddress Resolution Protocol
AS2Applicability Statement 2
BeEFBrowser Exploitation Framework
BLEBluetooth Low Energy
BSSIDBasic Service Set Identifiers
CACertificate Authority
CAPECCommon Attack Pattern Enumeration and Classification
CLICommand-Line Interface
CSRFCross-Site Request Forgery
CSVComma-Separated Values
CVECommon Vulnerabilities and Exposures
CVSSCommon Vulnerability Scoring Systems
CWECommon Weakness Enumeration
DBDatabase
DDoSDistributed Denial-of-Service
DHCPDynamic Host Configuration Protocol
DLLDynamic Link Library
DLPData Loss Prevention
DNSDomain Name System
DNSSECDomain Name System Security Extensions
EAPExtensible Authentication Protocol
FOCAFingerprinting Organization with Collected Archives
FTPFile Transfer Protocol
FTPSFile Transfer Protocol Secure
GDBGNU Debugger
GDPRGeneral Data Protection Regulation
GPUGraphics Processing Unit
HTTPHypertext Transfer Protocol
HTTPSHypertext Transfer Protocol Secure
IaaSInfrastructure as a Service
IAMIdentity and Access Management
ICMPInternet Control Message Protocol
ICSIndustrial Control System
IDAInteractive Disassembler
IDSIntrusion Detection System
IIoTIndustrial Internet of Things
IMEIsInternational Mobile Equipment Identity
IoTInternet of Things
IPInternet Protocol
IPMIIntelligent Platform Management Interface
IPSIntrusion Prevention System
ISOInternational Organization for Standardization
ISPInternet Service Provider
ISSAFInformation Systems Security Assessment Framework
JSONJavaScript Object Notation
LANLocal Area Network
LDAPLightweight Directory Access Protocol
LLMNRLink-Local Multicast Name Resolution
LSASSLocal Security Authority Subsystem Service
MACMedia Access Control
MDMMobile Device Management
MobSFMobile Security Framework
MOUMemorandum of Understanding
MSAMaster Service Agreement
MXMail Exchange
NACNetwork Access Control
NBT-NSNetBIOS Name Service
NDANon-disclosure Agreement
NFCNear-Field Communication
NISTNational Institute of Standards and Technology
NIST SPNational Institute of Standards and Technology Special Publication
NSName Server
NSENmap Scripting Engine
NTLMNew Technology LAN Manager
NTPNetwork Time Protocol
OSOperating System
OSINTOpen-source Intelligence
OSSTMMOpen-source Security Testing Methodology Manual
OWASPOpen Web Application Security Project
PBKDF2Password-Based Key Deviation Function 2
PCI DSSPayment Card Industry Data Security Standard
PHPHypertextm Preprocessor
PIIPersonal Identifiable Information
PKIPublic Key Infrastructure
PLCProgrammable Logic Controller
PSPowerShell
PSKPre-Shared Key
PTESPenetration Testing Execution Standard
RATRemote Access Trojan
RDPRemote Desktop Protocol
RFRadio Frequency
RFCRequest for Comment
RFIDRadio-Frequency Identification
ROERules of Engagement
S/MIMESecure/Multipurpose Internet Mail Extensions
SCADASupervisory Control and Data Acquisition
SCAPSecurity Content Automation Protocol
SDKSoftware Development Kit
SDLCSoftware Development Life Cycle
SDRSoftware-defined Radio
SETSocial Engineering Toolkit
SGIDSet Group ID
SIEMSecurity Information and Event Management
SIPSession Initiation Protocol
SLAService-level Agreement
SMBServer Message Block
SMSShort Message Service
SMTPSimple Mail Transfer Protocol
SNMPSimple Network Management Protocol
SOCSecurity Operations Center
SOWStatement of Work
SQLStructured Query Language
SSDSolid-State Drive
SSHSecure Shell
SSHDSolid-State Hybrid Drive
SSIDService Set Identifier
SSLSecure Sockets Layer
SSOSingle Sign-On
SUIDSet User ID
TCPTransmission Control Protocol
TKIPTemporal Key Integrity Protocol
TLSTransport Layer Security
TTLTime to Live
TTPsTactics, Techniques and Procedures
UDPUser Datagram Protocol
URIUniform Resource Identifier
URLUniform Resource Locator
USBUniversal Serial Bus
UTFUnicode Transformation Format
VASVulnerability Assessment Scanner
VLANVirtual Local Area Network
VMVirtual Machine
VoIPVoice over Internet Protocol
VPNVirtual Private Network
VPSVirtual Private Server
WAFWeb Application Firewall
WEPWired Equivalent Privacy
WiGLEWireless Geographic Logging Engine
WinRMWindows Remote Management
WMIWindows Management Instrumentation
WPAWi-Fi Protected Access
WPSWi-Fi Protected Setup
XML-RPCExtensible Markup Language-Remote Procedure Call
XSSCross-Site Scripting
ZAPZed Attack Proxy
Front
PS
Click the card to flip
Back
PowerShell
Front
SMS
Back
Short Message Service
Front
IDA
Back
Interactive Disassembler
Front
OS
Back
Operating System
Front
DB
Back
Database
Front
FTP
Back
File Transfer Protocol
Front
MDM
Back
Mobile Device Management
Front
SNMP
Back
Simple Network Management Protocol
Front
AES
Back
Advanced Encryption Standard
Front
SET
Back
Social Engineering Toolkit
Front
WiGLE
Back
Wireless Geographic Logging Engine
Front
AAA
Back
Authentication, Authorization and Accounting
Front
DLP
Back
Data Loss Prevention
Front
OWASP
Back
Open Web Application Security Project
Front
SSO
Back
Single Sign-On
Front
RFC
Back
Request for Comment
Front
URL
Back
Uniform Resource Locator
Front
OSINT
Back
Open-source Intelligence
Front
WPS
Back
Wi-Fi Protected Setup
Front
MAC
Back
Media Access Control
Front
MSA
Back
Master Service Agreement
Front
LDAP
Back
Lightweight Directory Access Protocol
Front
NIST
Back
National Institute of Standards and Technology
Front
SQL
Back
Structured Query Language
Front
IAM
Back
Identity and Access Management
Front
AP
Back
Access Point
Front
CSV
Back
Comma-Separated Values
Front
GDB
Back
GNU Debugger
Front
PLC
Back
Programmable Logic Controller
Front
ARP
Back
Address Resolution Protocol
Front
CLI
Back
Command-Line Interface
Front
RF
Back
Radio Frequency
Front
TKIP
Back
Temporal Key Integrity Protocol
Front
IoT
Back
Internet of Things
Front
VoIP
Back
Voice over Internet Protocol
Front
OSSTMM
Back
Open-source Security Testing Methodology Manual
Front
SCADA
Back
Supervisory Control and Data Acquisition
Front
SMB
Back
Server Message Block
Front
PCI DSS
Back
Payment Card Industry Data Security Standard
Front
WPA
Back
Wi-Fi Protected Access
Front
SSL
Back
Secure Sockets Layer
Front
BSSID
Back
Basic Service Set Identifiers
Front
HTTPS
Back
Hypertext Transfer Protocol Secure
Front
MX
Back
Mail Exchange
Front
SMTP
Back
Simple Mail Transfer Protocol
Front
PBKDF2
Back
Password-Based Key Deviation Function 2
Front
ACL
Back
Access Control List
Front
MobSF
Back
Mobile Security Framework
Front
PSK
Back
Pre-Shared Key
Front
ISO
Back
International Organization for Standardization
Front
ISSAF
Back
Information Systems Security Assessment Framework
Front
MOU
Back
Memorandum of Understanding
Front
SLA
Back
Service-level Agreement
Front
NDA
Back
Non-disclosure Agreement
Front
SUID
Back
Set User ID
Front
NTLM
Back
New Technology LAN Manager
Front
ROE
Back
Rules of Engagement
Front
TTPs
Back
Tactics, Techniques and Procedures
Front
API
Back
Application Programming Interface
Front
DNS
Back
Domain Name System
Front
UTF
Back
Unicode Transformation Format
Front
CA
Back
Certificate Authority
Front
FOCA
Back
Fingerprinting Organization with Collected Archives
Front
SDLC
Back
Software Development Life Cycle
Front
SOC
Back
Security Operations Center
Front
TCP
Back
Transmission Control Protocol
Front
DHCP
Back
Dynamic Host Configuration Protocol
Front
SSID
Back
Service Set Identifier
Front
S/MIME
Back
Secure/Multipurpose Internet Mail Extensions
Front
SDK
Back
Software Development Kit
Front
SOW
Back
Statement of Work
Front
XSS
Back
Cross-Site Scripting
Front
WAF
Back
Web Application Firewall
Front
LSASS
Back
Local Security Authority Subsystem Service
Front
UDP
Back
User Datagram Protocol
Front
USB
Back
Universal Serial Bus
Front
SIEM
Back
Security Information and Event Management
Front
SGID
Back
Set Group ID
Front
TTL
Back
Time to Live
Front
DDoS
Back
Distributed Denial-of-Service
Front
EAP
Back
Extensible Authentication Protocol
Front
PKI
Back
Public Key Infrastructure
Front
SDR
Back
Software-defined Radio
Front
LAN
Back
Local Area Network
Front
NS
Back
Name Server
Front
WMI
Back
Windows Management Instrumentation
Front
SSD
Back
Solid-State Drive
Front
VPS
Back
Virtual Private Server
Front
BLE
Back
Bluetooth Low Energy
Front
VPN
Back
Virtual Private Network
Front
GPU
Back
Graphics Processing Unit
Front
SSH
Back
Secure Shell
Front
GDPR
Back
General Data Protection Regulation
Front
VM
Back
Virtual Machine
Front
SIP
Back
Session Initiation Protocol
Front
CSRF
Back
Cross-Site Request Forgery
Front
ISP
Back
Internet Service Provider
Front
WEP
Back
Wired Equivalent Privacy
Front
PII
Back
Personal Identifiable Information
Front
CVE
Back
Common Vulnerabilities and Exposures
Front
LLMNR
Back
Link-Local Multicast Name Resolution
Front
NBT-NS
Back
NetBIOS Name Service
Front
JSON
Back
JavaScript Object Notation
Front
DLL
Back
Dynamic Link Library
Front
VLAN
Back
Virtual Local Area Network
Front
BeEF
Back
Browser Exploitation Framework
Front
NTP
Back
Network Time Protocol
Front
ZAP
Back
Zed Attack Proxy
Front
TLS
Back
Transport Layer Security
Front
URI
Back
Uniform Resource Identifier
Front
FTPS
Back
File Transfer Protocol Secure
Front
SSHD
Back
Solid-State Hybrid Drive
Front
AS2
Back
Applicability Statement 2
Front
PHP
Back
Hypertextm Preprocessor
Front
NAC
Back
Network Access Control
Front
NSE
Back
Nmap Scripting Engine
Front
NIST SP
Back
National Institute of Standards and Technology Special Publication
Front
WinRM
Back
Windows Remote Management
Front
CAPEC
Back
Common Attack Pattern Enumeration and Classification
Front
HTTP
Back
Hypertext Transfer Protocol
Front
ICMP
Back
Internet Control Message Protocol
Front
IPMI
Back
Intelligent Platform Management Interface
Front
APT
Back
Advanced Persistent Threat
Front
IDS
Back
Intrusion Detection System
Front
IPS
Back
Intrusion Prevention System
Front
RAT
Back
Remote Access Trojan
Front
CWE
Back
Common Weakness Enumeration
Front
DNSSEC
Back
Domain Name System Security Extensions
Front
SCAP
Back
Security Content Automation Protocol
Front
IP
Back
Internet Protocol
Front
NFC
Back
Near-Field Communication
Front
PTES
Back
Penetration Testing Execution Standard
Front
RDP
Back
Remote Desktop Protocol
Front
RFID
Back
Radio-Frequency Identification
Front
XML-RPC
Back
Extensible Markup Language-Remote Procedure Call
Front
CVSS
Back
Common Vulnerability Scoring Systems
Front
IaaS
Back
Infrastructure as a Service
Front
ICS
Back
Industrial Control System
Front
IMEIs
Back
International Mobile Equipment Identity
Front
VAS
Back
Vulnerability Assessment Scanner
Front
IIoT
Back
Industrial Internet of Things
1/141
This deck includes all acronyms from the official PTO-002 Exam Objectives.
Share on...
Follow us on...