Bash, the Crucial Exams Chat Bot
AI Bot
CompTIA PenTest+ PT0-002 All Acronyms Flashcards
CompTIA PenTest+ PT0-002 Flashcards
Study our CompTIA PenTest+ PT0-002 All Acronyms flashcards for the CompTIA PenTest+ PT0-002 exam with 141+ flashcards. View as flashcards, a searchable table, or as a fun matching game.

| Front | Back |
| AAA | Authentication, Authorization and Accounting |
| ACL | Access Control List |
| AES | Advanced Encryption Standard |
| AP | Access Point |
| API | Application Programming Interface |
| APT | Advanced Persistent Threat |
| ARP | Address Resolution Protocol |
| AS2 | Applicability Statement 2 |
| BeEF | Browser Exploitation Framework |
| BLE | Bluetooth Low Energy |
| BSSID | Basic Service Set Identifiers |
| CA | Certificate Authority |
| CAPEC | Common Attack Pattern Enumeration and Classification |
| CLI | Command-Line Interface |
| CSRF | Cross-Site Request Forgery |
| CSV | Comma-Separated Values |
| CVE | Common Vulnerabilities and Exposures |
| CVSS | Common Vulnerability Scoring Systems |
| CWE | Common Weakness Enumeration |
| DB | Database |
| DDoS | Distributed Denial-of-Service |
| DHCP | Dynamic Host Configuration Protocol |
| DLL | Dynamic Link Library |
| DLP | Data Loss Prevention |
| DNS | Domain Name System |
| DNSSEC | Domain Name System Security Extensions |
| EAP | Extensible Authentication Protocol |
| FOCA | Fingerprinting Organization with Collected Archives |
| FTP | File Transfer Protocol |
| FTPS | File Transfer Protocol Secure |
| GDB | GNU Debugger |
| GDPR | General Data Protection Regulation |
| GPU | Graphics Processing Unit |
| HTTP | Hypertext Transfer Protocol |
| HTTPS | Hypertext Transfer Protocol Secure |
| IaaS | Infrastructure as a Service |
| IAM | Identity and Access Management |
| ICMP | Internet Control Message Protocol |
| ICS | Industrial Control System |
| IDA | Interactive Disassembler |
| IDS | Intrusion Detection System |
| IIoT | Industrial Internet of Things |
| IMEIs | International Mobile Equipment Identity |
| IoT | Internet of Things |
| IP | Internet Protocol |
| IPMI | Intelligent Platform Management Interface |
| IPS | Intrusion Prevention System |
| ISO | International Organization for Standardization |
| ISP | Internet Service Provider |
| ISSAF | Information Systems Security Assessment Framework |
| JSON | JavaScript Object Notation |
| LAN | Local Area Network |
| LDAP | Lightweight Directory Access Protocol |
| LLMNR | Link-Local Multicast Name Resolution |
| LSASS | Local Security Authority Subsystem Service |
| MAC | Media Access Control |
| MDM | Mobile Device Management |
| MobSF | Mobile Security Framework |
| MOU | Memorandum of Understanding |
| MSA | Master Service Agreement |
| MX | Mail Exchange |
| NAC | Network Access Control |
| NBT-NS | NetBIOS Name Service |
| NDA | Non-disclosure Agreement |
| NFC | Near-Field Communication |
| NIST | National Institute of Standards and Technology |
| NIST SP | National Institute of Standards and Technology Special Publication |
| NS | Name Server |
| NSE | Nmap Scripting Engine |
| NTLM | New Technology LAN Manager |
| NTP | Network Time Protocol |
| OS | Operating System |
| OSINT | Open-source Intelligence |
| OSSTMM | Open-source Security Testing Methodology Manual |
| OWASP | Open Web Application Security Project |
| PBKDF2 | Password-Based Key Deviation Function 2 |
| PCI DSS | Payment Card Industry Data Security Standard |
| PHP | Hypertextm Preprocessor |
| PII | Personal Identifiable Information |
| PKI | Public Key Infrastructure |
| PLC | Programmable Logic Controller |
| PS | PowerShell |
| PSK | Pre-Shared Key |
| PTES | Penetration Testing Execution Standard |
| RAT | Remote Access Trojan |
| RDP | Remote Desktop Protocol |
| RF | Radio Frequency |
| RFC | Request for Comment |
| RFID | Radio-Frequency Identification |
| ROE | Rules of Engagement |
| S/MIME | Secure/Multipurpose Internet Mail Extensions |
| SCADA | Supervisory Control and Data Acquisition |
| SCAP | Security Content Automation Protocol |
| SDK | Software Development Kit |
| SDLC | Software Development Life Cycle |
| SDR | Software-defined Radio |
| SET | Social Engineering Toolkit |
| SGID | Set Group ID |
| SIEM | Security Information and Event Management |
| SIP | Session Initiation Protocol |
| SLA | Service-level Agreement |
| SMB | Server Message Block |
| SMS | Short Message Service |
| SMTP | Simple Mail Transfer Protocol |
| SNMP | Simple Network Management Protocol |
| SOC | Security Operations Center |
| SOW | Statement of Work |
| SQL | Structured Query Language |
| SSD | Solid-State Drive |
| SSH | Secure Shell |
| SSHD | Solid-State Hybrid Drive |
| SSID | Service Set Identifier |
| SSL | Secure Sockets Layer |
| SSO | Single Sign-On |
| SUID | Set User ID |
| TCP | Transmission Control Protocol |
| TKIP | Temporal Key Integrity Protocol |
| TLS | Transport Layer Security |
| TTL | Time to Live |
| TTPs | Tactics, Techniques and Procedures |
| UDP | User Datagram Protocol |
| URI | Uniform Resource Identifier |
| URL | Uniform Resource Locator |
| USB | Universal Serial Bus |
| UTF | Unicode Transformation Format |
| VAS | Vulnerability Assessment Scanner |
| VLAN | Virtual Local Area Network |
| VM | Virtual Machine |
| VoIP | Voice over Internet Protocol |
| VPN | Virtual Private Network |
| VPS | Virtual Private Server |
| WAF | Web Application Firewall |
| WEP | Wired Equivalent Privacy |
| WiGLE | Wireless Geographic Logging Engine |
| WinRM | Windows Remote Management |
| WMI | Windows Management Instrumentation |
| WPA | Wi-Fi Protected Access |
| WPS | Wi-Fi Protected Setup |
| XML-RPC | Extensible Markup Language-Remote Procedure Call |
| XSS | Cross-Site Scripting |
| ZAP | Zed Attack Proxy |