Acronyms Flashcards

1
Q

3DES

A

Triple Data Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA

A

Authentication, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ABAC

A

Attribute Based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AD

A

Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AES256

A

Advanced Encryption Standard 256-bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AH

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AI

A

Artificial Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AIS

A

Automated Indicator Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ALE

A

Annualized Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AP

A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ARO

A

Annualized Rate of Occurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ASLR

A

Address Space Layout Randomization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

ASP

A

Active Server Pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

ATT&CK

A

Adversarial Tactics, Techniques, and Common Knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

AUP

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

AV

A

Anti-virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BASH

A

Bourne Again Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BCP

A

Business Continuity Principle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BGP

A

Border Gateway Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
BIA
Business Impact Analysis
26
BIOS
Basic Input/Output System
27
BPA
Business Partnership Agreement
28
BPDU
Bridge Protocol Data Unit
29
BSSID
Basic Service Set Identifier
30
BYOD
Bring Your Own Device
31
CA
Certificate Authority
32
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart
33
CAR
Corrective Action Report
34
CASB
Cloud Access Security Broker
35
CBC
Cipher Block Chaining
36
CBT
Computer-based Training
37
CCMP
Counter-Mode/CBC-MAC Protocol
38
CCTV
Closed-Circuit Television
39
CERT
Computer Emergency Response Team
40
CFB
Cipher Feedback
41
CHAP
Challenge-Handshake Authentication Protocol
42
CIO
Chief Information Officer
43
CIRT
Computer Incident Response Team
44
CIS
Center for Internet Security
45
CMS
Content Management System
46
CN
Common Name
47
COOP
Continuity of Operations Planning
48
COPE
Corporate-owned Personally Enabled
49
CP
Contingency Plan
50
CRC
Cyclic Redundancy Check
51
CRL
Certificate Revocation List
52
CSA
Cloud Security Alliance
53
CSIRT
Computer Security Incident Response Team
54
CSO
Chief Security Officer
55
CSP
Cloud Service Provider
56
CSR
Certificate Signing Request
57
CSRF
Cross-Site Request Forgery
58
CSU
Channel Service Unit
59
CTM
Counter-Mode
60
CTO
Chief Technology Officer
61
CVE
Common Vulnerabilities and Exposures
62
CVSS
Common Vulnerability Scoring System
63
CYOD
Choose Your Own Device
64
DAC
Discretionary Access Control
65
DBA
Database Administrator
66
DDoS
Distributed Denial-of-Service
67
DEP
Data Execution Prevention
68
DER
Distinguished Encoding Rules
69
DES
Data Encryption Standard
70
DHCP
Dynamic Host Configuration Protocol
71
DHE
Diffie-Hellman Ephemeral
72
DKIM
Domain Keys Identified Mail
73
DLL
Dynamic-link Library
74
DLP
Data Loss Prevention
75
DMARC
Domain Message Authentication Reporting and Conformance
76
DNAT
Destination Network Address Transaction
77
DNS
Domain Name System
78
DNSSEC
Domain Name System Security Extensions
79
DoS
Denial-of-Service
80
DPO
Data Protection Officer
81
DRP
Disaster Recovery Plan
82
DSA
Digital Signature Algorithm
83
DSL
Digital Subscriber Line
84
EAP
Extensible Authentication Protocol
85
ECB
Electronic Code Book
86
ECC
Elliptic-curve Cryptography
87
ECDHE
Elliptic-curve Diffie-Hellman Ephemeral
88
ECDSA
Elliptic-curve Digital Signature Algorithm
89
EDR
Endpoint Detection and Response
90
EFS
Encrypted File System
91
EIP
Extended Instruction Pointer
92
EOL
End of Life
93
EOS
End of Service
94
ERP
Enterprise Resource Planning
95
ESN
Electronic Serial Number
96
ESP
Encapsulating Security Payload
97
ESSID
Extended Service Set Identifier
98
FACL
File System Access Control List
99
FDE
Full Disk Encryption
100
FIM
File Integrity Monitoring
101
FPGA
Field Programmable Gate Array
102
FRR
False Rejection Rate
103
FTP
File Transfer Protocol
104
FTPS
Secured File Transfer Protocol
105
GCM
Galois/Counter Mode
106
GDPR
General Data Protection Regulation
107
GPG
GNU Privacy Guard
108
GPO
Group Policy Object
109
GPS
Global Positioning System
110
GPU
Graphics Processing Unit
111
GRE
Generic Routing Encapsulation
112
HA
High Availability
113
HDD
Hard Disk Drive
114
HIPS
Host-based Intrusion Prevention System
115
HIDS
Host-based Intrusion Detective System
116
HMAC
Hash-based Message Authentication Code
117
HOTP
HMAC-based One-time Password
118
HSMaaS
Hardware Security Module as a Service
119
HSM
Hardware Security Module
120
HTML
Hypertext Markup Language
121
HTTP
Hypertext Transfer Protocol
122
HTTPS
Hypertext Transfer Protocol Secure
123
HVAC
Heating, Ventilation, Air Conditioning
124
IaaS
Infrastructure as a Service
125
IAM
Identity and Access Management
126
ICMP
Internet Control Message Protocol
127
ICS
Industial Control System
128
IDEA
International Data Encryption Algorithm
129
IDF
Intermediate Distribution Frame
130
IdP
Identity Provider
131
IDS
Intrusion Detection System
132
IEEE
Institute of Electrical and Electronics Engineers
133
IKE
Internet Key Exchange
134
IM
Instant Messaging
135
IMAP4
Internet Message Access Protocol v4
136
IoC
Indicators of Compromise
137
IoT
Internet of Things
138
IP
Internet Protocol
139
IPS
Intrusion Prevention System
140
IPSec
Internet Protocol Security
141
IR
Incident Response
142
IRC
Internet Relay Chat
143
IRP
Incident Response Plan
144
ISA
Interconnection Security Agreement
145
ISFW
Internal Segmentation Firewall
146
ISO
International Organization for Standardization
147
ISP
Internet Service Provider
148
ISSO
Information Systems Security Officer
149
ITCP
IT Contingency Plan
150
IV
Initialization Vector
151
KDC
Key Distribution Center
152
KEK
Key Encryption Key
153
L2TP
Layer 2 Tunneling Protocol
154
LAN
Local Area Network
155
LDAP
Lightweight Directory Access Protocol
156
LEAP
Lightweight Extensible Authentication Protocol
157
MaaS
Monitoring as a Service
158
MAC
Media Access Control
159
MAM
Mobile Application Management
160
MAN
Metropolitan Area Network
161
MBR
Master Boot Record
162
MD5
Message Digest 5
163
MDF
Main Distribution Frame
164
MDM
Mobile Device Management
165
MFA
Multifactor Authentication
166
MFD
Multifunction Device
167
MFP
Multifunction Printer
168
ML
Machine Learning
169
MMS
Multimedia Message Service
170
MOA
Memoradum of Agreement
171
MOU
Memorandum of Understanding
172
MPLS
Multi-Protocol Label Switching
173
MSA
Measurement Systems Analysis
174
MS-CHAP
Microsoft Challenge-Handshake Authentication Protocol
175
MSP
Managed Service Provider
176
MSSP
Managed Security Service Provider
177
MTBF
Mean Time Between Failures
178
MTTR
Mean Time to Repair
179
MTU
Maximum Transmission Unit
180
NAC
Network Access Control
181
NAS
Network-attached Storage
182
NAT
Network Address Translation
183
NDA
Non-disclosure Agreement
184
NFC
Near-field Communication
185
NFV
Network Function Virtualization
186
NGFW
Next-generation Firewall
187
NG-SWG
Next-generation Secure Web Gateway
188
NIC
Network Interface Card
189
NIDS
Network-based Intrusion Detection System
190
NIPS
Network-based Intrusion Prevention System
191
NIST
National Institute of Standards & Technology
192
NOC
Network Operations Center
193
NTFS
New Technology File System
194
NTLM
New Technology LAN Manager
195
NTP
Network Time Protocol
196
OCSP
Online Certification Status Protocol
197
OID
Object Indentifier
198
OS
Operating System
199
OSI
Open System Interconnection
200
OSINT
Open Source Intelligence
201
OSPF
Open Shortest Path First
202
OT
Operational Technology
203
OTA
Over-The-Air
204
OTG
On-The-Go
205
OVAL
Open Vulnerability and Assessment Language
206
OWASP
Open Web Application Security Project
207
P12
PKCS #12
208
P2P
Peer-to-Peer
209
PaaS
Platform as a Service
210
PAC
Proxy Auto Configuration
211
PAM (2 possible answers)
- Privileged Access Management - Pluggable Authentication Modules
212
PAP
Password Authentication Protocol
213
PAT
Port Address Translation
214
PBKDF2
Password-based Key Derivation Function 2
215
PBX
Private Branch Exchange
216
PCAP
Packet Capture
217
PCI DSS
Payment Card Industry Data Security Standard
218
PDU
Power Distribution Unit
219
PE
Portable Executable
220
PEAP
Protected Extensible Authentication Protocol
221
PED
Portable Electronic Device
222
PEM
Privacy Enhanced Mail
223
PFS
Perfect Forward Secrecy
224
PGP
Pretty Good Privacy
225
PHI
Personal Health Information
226
PII
Personally Identifiable Information
227
PIN
Personal Identification Number
228
PIV
Personal Identity Verification
229
PKCS
Public Key Cryptography Standards
230
PKI
Public Key Infrastructure
231
PoC
Proof of Concept
232
POP
Post Office Protocol
233
POTS
Plain Old Telephone Service
234
PPP
Point-to-Point Protocol
235
PPTP
Point-to-Point Tunneling Protocol
236
PSK
Preshared Key
237
PTZ
Pan-Tilt-Zoom
238
PUP
Potentially Unwanted Program
239
QA
Quality Assurance
240
QoS
Quality of Service
241
RA
Registration Authority
242
RAD
Rapid Application Development
243
RADIUS
Remote Authentication Dial-in User Service
244
RAID
Redundant Array of Inexpensive Disks
245
RAM
Random Access Memory
246
RAS
Remote Access Server
247
RAT
Remote Access Trojan
248
RC4
Rivest Cipher version 4
249
RCS
Rich Communication Services
250
RFC
Request for Comments
251
RFID
Radio Frequency Identification
252
RIPEMD
RACE Integrity Primitives Evaluation Message Digest
253
ROI
Return on Investment
254
RPO
Recovery Point Objective
255
RSA
Rivest, Shamir, & Adleman
256
RTBH
Remotely Triggered Black Hole
257
RTO
Recovery Time Objective
258
RTOS
Real-time Operating System
259
RTP
Real-time Transport Protocol
260
S/MIME
Secure/Multipurpose Internet Mail Extensions
261
SaaS
Software as a Service
262
SAE
Simultaneous Authentication of Equals
263
SAML
Security Assertions Markup Language
264
SCADA
Supervisory Control and Data Acquisition
265
SCAP
Security Content Automation Protocol
266
SCEP
Simple Certificate Enrollment Protocol
267
SDK
Software Development Kit
268
SDLC
Software Development Life Cycle
269
SDLM
Software Development Life Cycle Methodology
270
SDN
Software-defined Networking
271
SDP
Service Delivery Platform
272
SDV
Software-defined Visibility
273
SED
Self-Encrypting Drives
274
SEH
Structured Exception Handling
275
SFTP
SSH File Transfer Protocol
276
SHA
Secure Hashing Algorithm
277
SIEM
Security Information and Event Management
278
SIM
Subscriber Identity Module
279
SIP
Session Initiation Protocol
280
SLA
Service-level Agreement
281
SLE
Single Loss Expectancy
282
SMB
Server Message Block
283
S/MIME
Secure/Multipurpose Internet Mail Extensions
284
SMS
Short Message Service
285
SMTP
Simple Mail Transfer Protocol
286
SMTPS
Simple Mail Transfer Protocol Secure
287
SNMP
Simple Network Management Protocol
288
SOAP
Simple Object Access Protocol
289
SOAR
Security Orchestration, Automation, Response
290
SoC
System on Chip
291
SOC
Security Operations Center
292
SPF
Sender Policy Framework
293
SPIM
Spam over Instant Messaging
294
SQL
Structured Query Language
295
SQLi
SQL Injection
296
SRTP
Secure Real-time Transport Protocol
297
SSD
Solid State Drive
298
SSH
Secure Shell
299
SSID
Service Set Identifier
300
SSL
Secure Sockets Layer
301
SSO
Single Sign-on
302
STIX
Structured Threat Information eXpression
303
STP
Shielded Twisted Pair
304
SWG
Secure Web Gateway
305
TACACS+
Terminal Access Controller Access Control System
306
TAXII
Trusted Automated eXchange of Intelligence Information
307
TCP/IP
Transmission Control Protocol/Internet Protocol
308
TGT
Ticket Granting Ticket
309
TKIP
Temporal Key Integrity Protocol
310
TLS
Transport Layer Security
311
TOTP
Time-based One Time Password
312
TPM
Trusted Platform Module
313
TSIG
Transaction Signature
314
TTP
Tactics, Techniques, and Procedures
315
UAT
User Acceptance Testing
316
UDP
User Datagram Protocol
317
UEBA
User and Entity Behavior Analytics
318
UEFI
Unified Extensible Firmware Interface
319
UEM
Unified Endpoint Management
320
UPS
Uninterruptible Power Supply
321
URI
Uniform Resource Identifier
322
URL
Universal Resource Locator
323
USB
Universal Serial Bus
324
USB OTG
USB On-The-Go
325
UTM
Unified Threat Management
326
UTP
Unshielded Twisted Pair
327
VBA
Visual Basic for Applications
328
VDE
Virtual Desktop Environment
329
VDI
Virtual Desktop Infrastructure
330
VLAN
Virtual Local Area Network
331
VLSM
Variable-length Subnet Masking
332
VM
Virtual Machine
333
VoIP
Voice over IP
334
VPC
Virtual Private Cloud
335
VPN
Virtual Private Network
336
VTC
Video Teleconferencing
337
WAF
Web Application Firewall
338
WAP
Wireless Access Point
339
WEP
Wired Equivalent Privacy
340
WIDS
Wireless Intrusion Detection System
341
WIPS
Wireless Intrusion Prevention System
342
WORM
Write Once Read Many
343
WPA
WiFi Protected Access
344
WPS
WiFi Protected Setup
345
XaaS
Anything as a Service
346
XML
Extensible Markup Language
347
XOR
Exclusive OR
348
XSRF
Cross-site Request Forgery
349
XSS
Cross-site Scripting