Bash, the Crucial Exams Chat Bot
AI Bot
CompTIA PenTest+ PT0-003 All Acronyms Flashcards
CompTIA PenTest+ PT0-003 (V3) Flashcards
| Front | Back |
| AD | Active Directory |
| ADB | Android Debug Bridge |
| AI | Artificial Intelligence |
| AP | Access Point |
| API | Application Programming Interface |
| APT | Advanced Persistent Threat |
| BAS | Breach and Attack Simulation |
| BeEF | Browser Exploitation Framework |
| BGP | Border Gateway Protocol |
| BIA | Business Intelligence Analytics |
| C2 | Command and Control |
| CGI | Common Gateway Interface |
| CI/CD | Continuous Integration/Continuous Delivery |
| CIDR | Classless Inter-domain Routing |
| CLI | Command-line Interface |
| CME | CrackMapExec |
| CNAME | Canonical Name |
| COFF | Common Object File Format |
| CREST | Council of Registered Ethical Security Testers |
| CSRF | Cross-site Request Forgery |
| CVE | Common Vulnerabilities and Exposures |
| CVSS | Common Vulnerability Scoring System |
| CWE | Common Weakness Enumeration |
| DAST | Dynamic Application Security Testing |
| DCOM | Distributed Component Object Model |
| DDos | Distributed Denial of Service |
| DMARC | Domain-based Message Authentication, Reporting, and Conformance |
| DNS | Domain Name System |
| DoS | Denial of Service |
| DREAD | Damage potential, Reproducibility, Exploitability, Affected users, Discoverability |
| DROWN | Decrypting RSA with Obsolete and Weakened Encryption |
| EFSRPC | Encrypting File System Remote Protocol |
| ELF | Executable and Linkable Format |
| EPSS | Exploit Prediction Scoring System |
| EXIF | Exchangeable Image File Format |
| FQDN | Fully Qualified Domain Name |
| FTP | File Transfer Protocol |
| GIF | Graphic Interchange Format |
| HID | Host-based Intrusion Detection |
| HSTS | HTTP Strict Transport Security |
| HTML | Hypertext Markup Language |
| HTTP | Hypertext Transfer Protocol |
| HTTPS | Hypertext Transfer Protocol Secure |
| IaC | Infrastructure as Code |
| IAM | Identity and Access Management |
| IAST | Interactive Application Security Testing |
| ICMP | Internet Control Message Protocol |
| ICS | Industrial Control System |
| IDOR | Insecure Direct Object Reference |
| IdP | Identity Provider |
| IDS | Intrusion Detection System |
| IGRP | Interior Gateway Routing Protocol |
| IoT | Internet of Things |
| IP | Internet Protocol |
| IPS | Intrusion Prevention System |
| ISE | Integrated Scripting Environment |
| JWT | JSON Web Token |
| KDC | Key Distribution Center |
| KRBTGT | Kerberos Ticket Granting Ticket |
| LDAP | Lightweight Directory Access Protocol |
| LFI | Local File Inclusion |
| LLMNR | Link-local Multicast Name Resolution |
| LOLBins | Living off the Land Binaries |
| LPD | Line Printer Daemon |
| LSASS | Local Security Authority Subsystem Service |
| MAC | Media Access Control |
| MASVS | Mobile Application Security Verification Standard |
| MFA | Multifactor Authentication |
| MIB | Management Information Base |
| MMS | Multimedia Messaging Service |
| MSA | Master Services Agreement |
| MX | Mail Exchange |
| NDA | Non-disclosure Agreement |
| NFC | Near-field Communication |
| NSE | Nmap Scripting Engine |
| NTLM | New Technology LAN Manager |
| OCTAVE | Operationally Critical Threat, Asset, and Vulnerability Evaluation |
| OIDC | OpenID Connect |
| OpenVAS | Open Vulnerability Assessment Scanner |
| OS | Operating System |
| OSINT | Open-source Intelligence |
| OSSTMM | Open-source Security Testing Methodology Manual |
| OT | Operational Technology |
| OWASP | Open Worldwide Application Security Project |
| PTES | Penetration Testing Execution Standard |
| PWS | Performance Work Statement |
| QC | Quality Control |
| RCE | Remote Code Execution |
| RDP | Remote Desktop Protocol |
| RFI | Remote File Inclusion |
| RFID | Radio Frequency Identification |
| RIP | Routing Information Protocol |
| RPC | Remote Procedure Call |
| SaaS | Software as a Service |
| SAM | Security Account Manager |
| SAML | Security Assertion Markup Language |
| SAST | Static Application Security Testing |
| SCA | Software Composition Analysis |
| SCADA | Supervisory Control and Data Acquisition |
| SDK | Software Development Kit |
| SDLC | Software Development Life Cycle |
| SDR | Software-defined Radio |
| SET | Social Engineering Toolkit |
| SIEM | Security Information and Event Management |
| SMB | Server Message Block |
| SMS | Short Message Service |
| SNMP | Simple Network Management Protocol |
| SOA | Start of Authority |
| SOC | Security Operations Center |
| SoW | Statement of Work |
| SPN | Service Principal Name |
| SQL | Structured Query Language |
| SQLi | Structured Query Language Injection |
| SSH | Secure Shell |
| SSID | Service Set Identifier |
| SSL | Secure Socket Layer |
| SSO | Single Sign-on |
| SSRF | Server-side Request Forgery |
| STRIDE | Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege |
| TCP | Transmission Control Protocol |
| TGS | Ticket Granting Service |
| TLS | Transport Layer Security |
| ToS | Terms of Service |
| TTP | Techniques, Tactics, Procedures |
| UDP | User Datagram Protocol |
| URL | Uniform Resource Locator |
| USB | Universal Serial Bus |
| VLAN | Virtual Local Area Network |
| VNC | Virtual Network Computing |
| VPN | Virtual Private Network |
| WAF | Web Application Firewall |
| WinRM | Windows Remote Management |
| WLAN | Wireless Local Area Network |
| WMI | Windows Management Instrumentation |
| WPAD | Web Proxy Auto Discovery |
| WPS | Wi-Fi Protected Setup |
| XSS | Cross-site Scripting |
| ZAP | Zed Attack Proxy |
Includes all acronyms and their definitions that are on the official PenTest+ PT0-003 exam objectives.