Acronyms Flashcards

1
Q

3DES - I was thinking of using triple DES but went with AES instead.

A

Triple Digital Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA - When setting up a new network my buddy asked about the AAA controls used at my company.

A

Authentication, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ABAC - ABAC has emerged as the next-gen technology for secure access to business-critical data.

A

Attribute-based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AES256

A

Advanced Encryption Standard 256bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AH

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AI

A

Artificial Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AIS - AIS is a service the Cybersecurity and Infrastructure Security Agency (CISA) provides to enable real-time exchange of machine-readable cyber threat indicators and defensive measures between public and private-sector organizations.

A

Automated Indicator Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ALE - ALE is a total dollar amount that is assigned to a specific threat type, multiplied by the annual rate of expected occurrence.

A

Annualized Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AP

A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ARO

A

Annualized Rate of Occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ASLR

A

Address Space Layout Randomization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ASP - ASP was Microsoft’ alternative to Common Gateway Interface (CGI) scripts and Java Server Pages (JSPs), ASP is now obsolete and replaced with ASP.NET.

A

Active Server Page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

ATT&CK

A

Adversarial Tactics, Techniques, and Common Knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

AUP

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

AV

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BASH

A

Bourne Again Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BCP

A

Business Continually Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BGP

A

Border Gateway Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BIA

A

Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

BIOS

A

Basic Input/Output System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

BPA - Refer to the BPA to verify your responsibility to the partnership.

A

Business Partnership Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

BPDU - A BPDU contains information regarding ports, switches, port priority and addresses.

A

Bridge Protocol Data Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

BYOD

A

Bring Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

CA

A

Certificate Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

CAC

A

Common Access Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

CAPTCHA

A

Completely Automated Public Turing Test to Tell Computers and Humans Apart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

CAR

A

Corrective Action Report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

CASB - In the Gartner Magic Quadrant for CASB, McAfee was a Leader, their cloud business is now Skyhigh Security.

A

Cloud Access Security Broker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

CBC

A

Cipher Block Chaining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

CBT

A

Computer-based Training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

CCMP

A

Counter-Mode/CBC-Mac Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

CCTV

A

Closed-Circuit Television

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

CERT

A

Computer Emergency Response Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

CFB - An old Federal encryption approach.

A

Cipher Feedback

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

CHAP - CHAP is an authentication scheme originally used by Point-to-Point Protocol (PPP) servers to validate the identity of remote clients. Outdated

A

Challenge Handshake Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

CIO

A

Chief Information Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

CIRT

A

Computer Incident Response Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

CIS

A

Center for Internet Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

CMS

A

Content Management System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

COOP

A

Continuity of Operation Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

COPE

A

Corporate Owned Personal Enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

CP

A

Contingency Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

CRC

A

Cyclical Redundancy Check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

CRL

A

Certificate Revocation List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

CSO

A

Chief Security Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

CSP

A

Cloud Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

CSR

A

Certificate Signing Request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

CSRF

A

Cross-Site Request Forgery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

CSU

A

Channel Service Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

CTM

A

Counter-Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

CTO

A

Chief Technology Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

CVE

A

Common Vulnerabilities and Exposures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

CVSS

A

Common Vulnerability Scoring System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

CYOD

A

Choose Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

DAC

A

Discretionary Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

DBA

A

Database Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

DDoS - A DDoS attack on the NHL Web site took it off the air for several days.

A

Distributed Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

DEP

A

Data Execution Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

DER

A

Distinguished Encoding Rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

DES

A

Digital Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

DHCP

A

Dynamic Host Configuration Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

DHE

A

Diffie-Hellman Ephemeral

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

DKIM

A

Domain Keys Identified Mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

DDL

A

Dynamic Link Library

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

DLP - A well-defined organization-wide DLP approach is likely to work better than ad hoc approaches within individual departments.

A

Data Loss Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

DMARC

A

Domain Message Authentication Reporting and Conformance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

DMZ

A

Demilitarized Zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

DNAT

A

Destination Network Address Transaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

DNS

A

Domain Name Service (Server)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

DNSSEC

A

Domain Name System Security Extensions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

DoS

A

Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

DPO

A

Data Privacy Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

DRP

A

Disaster Recovery Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

DSA

A

Digital Signature Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

DSL

A

Digital Subscriber Line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

EAP

A

Extensible Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

ECB

A

Electronic Code Book

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

ECC

A

Elliptic Curve Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

ECDHE

A

Elliptic Curve Diffie-Hellman Ephemeral

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

ECDSA

A

Elliptic Curve Digital Signature Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

EDR

A

Endpoint Detection and Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

EFS

A

Encrypted File System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

EOL

A

End of Life

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

EOS

A

End of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

ERP - Businesses employ ERP for various reasons, such as expanding, reducing costs, and improving operations.

A

Enterprise Resource Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

ESN

A

Electronic Serial Number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

ESP

A

Encapsulated Security Payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

FAAS

A

Function As A Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

FACL

A

File System Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

FDE

A

Full Disk Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

FPGA

A

Field Programmable Gate Array

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

FRR

A

False Rejection Rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

FTP

A

File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

FTPS

A

Secured File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

GCM

A

Galois Counter Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

GDPR

A

General Data Protection Regulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

GPG

A

Gnu Privacy Guard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

GPO

A

Group Policy Object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

GPS

A

Global Positioning System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

GPU

A

Graphics Processing Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

GRE

A

Generic Routing Encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

HA

A

High Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

HDD

A

Hard Disk Drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

HIDS

A

Host-Based Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

HIPS

A

Host-Based Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

HMAC

A

Hashed Message Authentication Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

HOTP

A

HMAC based One Time Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

HSM

A

Hardware Security Module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

HTML

A

HyperText Markup Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

HTTP

A

Hypertext Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

HTTPS

A

Hypertext Transfer Protocol over SSL/TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

HVAC

A

Heating, Ventilation, Air Conditioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

IaaS

A

Infrastructure as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

ICMP

A

Internet Control Message Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

ICS

A

Industrial Control Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

IDEA

A

International Data Encryption Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

IDF

A

Intermediate Distribution Frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

IdP

A

Identity Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

IDS

A

Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

IEEE

A

Institute of Electrical and Electronics Engineers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

IKE

A

Internet Key Exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

IM

A

Instant Messaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

IMAP4

A

Internet Message Access Protocol v4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

IoC

A

Indicators of Compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

IoT

A

Internet of Things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

IP

A

Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

IPSec

A

Internet Protocol Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

IR

A

Incident Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

IRC

A

Internet Relay Chat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

IRP

A

Incident Response Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

ISO

A

International Organization for Standardization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

ISP

A

Internet Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

ISSO

A

Information Systems Security Officer

139
Q

ITCP

A

IT Contingency Plan

140
Q

IV

A

Initialization Vector

141
Q

KDC

A

Key Distribution Center

142
Q

KEK

A

Key Encryption Key

143
Q

L2TP

A

Layer 2 Tunneling Protocol

144
Q

LAN

A

Local Area Network

145
Q

LDAP - LDAP servers are capable of replicating data either through push or pull methods.

A

Lightweight Directory Access Protocol

146
Q

LEAP

A

Lightweight Extensible Authentication Protocol

147
Q

MaaS

A

Monitoring as a Service

148
Q

MAC man

A

Mandatory Access Control

149
Q

MAC med

A

Media Access Control

150
Q

MAC mes

A

Message Authentication Code

151
Q

MAM

A

Mobile Application Management

152
Q

MAN

A

Metropolitan Area Network

153
Q

MBR

A

Master Boot Record

154
Q

MD5

A

Message Digest 5

155
Q

MDF

A

Main Distribution Frame

156
Q

MDM - IT administrators configure policies through the MDM server’s management console, and the server then pushes those policies over the air to the MDM agent on the device.

A

Mobile Device Management

157
Q

MFA - IT regulatory standards for access to federal government systems require the use of MFA to access sensitive IT resources.

A

Multifactor Authentication

158
Q

MFD

A

Multi-Function Device

159
Q

MFP

A

Multi-Function Printer

160
Q

MITM

A

Man in the Middle

161
Q

ML

A

Machine Learning

162
Q

MMS

A

Multimedia Message Service

163
Q

MOA

A

Memorandum of Agreement

164
Q

MOU

A

Memorandum of Understanding

165
Q

MPLS

A

Multi-Protocol Label Switching

166
Q

MSA

A

Measurement Systems Analysis

167
Q

MSCHAP

A

Microsoft Challenge Handshake Authentication Protocol

168
Q

MSP

A

Managed Service Provider

169
Q

MSSP

A

Managed Security Service Provider

170
Q

MTBF

A

Mean Time Between Failures

171
Q

MTTF

A

Mean Time to Failure

172
Q

MTTR

A

Mean Time to Recover

173
Q

MTU

A

Maximum Transmission Unit

174
Q

NAC

A

Network Access Control

175
Q

NAS

A

Network Attached Storage

176
Q

NAT

A

Network Address Translation

177
Q

NDA

A

Non-Disclosure Agreement

178
Q

NFC

A

Near Field Communication

179
Q

NFV

A

Network Functions Virtualization

180
Q

NIC

A

Network Interface Card

181
Q

NIDS

A

Network Based Intrusion Detection System

182
Q

NIPS

A

Network Based Intrusion Prevention System

183
Q

NIST - The NIST cybersecurity framework provides a structured and organized process that helps you to evaluate your security program and prioritize the next steps to enhance your cybersecurity posture.

A

National Institute of Standards & Technology

184
Q

NTFS

A

New Technology File System

185
Q

NTLM - Windows NTLM is an outmoded challenge-response authentication protocol from Microsoft, till in use though succeeded by Kerberos.

A

New Technology LAN Manager

186
Q

NTP

A

Network Time Protocol

187
Q

OAUTH

A

Open Authorization

188
Q

OCSP

A

Online Certification Status Protocol

189
Q

OID

A

Object Identifier

190
Q

OS

A

Operating System

191
Q

OSI - OSI is a reference model for how applications communicate over a networking or telecommunications systems as seven layers, each with its own function.

A

Open Systems Interconnection

192
Q

OSINT

A

Open Source Intelligence

193
Q

OSPF

A

Open Shortest Path First

194
Q

OT - We need to update our OT firmware along with the routers and modems.

A

Operational Technology

195
Q

OTA

A

Over The Air

196
Q

OTG

A

On The Go

197
Q

OVAL

A

Open Vulnerability Assessment Language

198
Q

OWASP

A

Open Web Application Security Project

199
Q

P12

A

PKCS #12

200
Q

P2P

A

Peer to Peer

201
Q

PaaS

A

Platform as a Service

202
Q

PAC

A

Proxy Auto Configuration

203
Q

PAM pri

A

Privileged Access Management

204
Q

PAM plu

A

Pluggable Authentication Modules

205
Q

PAP

A

Password Authentication Protocol

206
Q

PAT

A

Port Address Translation

207
Q

PBKDF2

A

Password Based Key Derivation Function 2

208
Q

PBX

A

Private Branch Exchange

209
Q

PCAP

A

Packet Capture

210
Q

PCI DDS

A

Payment Card Industry Data Security Standard

211
Q

PDU

A

Power Distribution Unit

212
Q

PEAP

A

Protected Extensible Authentication Protocol

213
Q

PED

A

Personal Electronic Device

214
Q

PEM

A

Privacy Enhanced Mail

215
Q

PFS

A

Perfect Forward Secrecy

216
Q

PFX

A

Personal Information Exchange

217
Q

PGP

A

Pretty Good Privacy

218
Q

PHI

A

Personal Health Information

219
Q

PII

A

Personally Identifiable Information

220
Q

PIV

A

Personal Identity Verification

221
Q

PKCS

A

Public Key Cryptography Standards

222
Q

PKI

A

Public Key Infrastructure

223
Q

POP

A

Post Office Protocol

224
Q

POTS

A

Plain Old Telephone Service

225
Q

PPP

A

Point-to-Point Protocol

226
Q

PPTP - Poptop or PPTP is an obsolete method for implementing virtual private networks.

A

Point-to-Point Tunneling Protocol

227
Q

PSK

A

Pre-Shared Key

228
Q

PTZ

A

Pan-Tilt-Zoom

229
Q

QA

A

Quality Assurance

230
Q

QoS

A

Quality of Service

231
Q

PUP

A

Potentially Unwanted Program

232
Q

RA

A

Recovery Agent

233
Q

RA

A

Registration Authority

234
Q

RACE

A

Research and Development in Advanced Communications Technologies in Europe

235
Q

RAD

A

Rapid Application Development

236
Q

RADIUS

A

Remote Authentication Dial-in User Server

237
Q

RAID

A

Redundant Array of Inexpensive Disks

238
Q

RAM

A

Random Access Memory

239
Q

RAS

A

Remote Access Server

240
Q

RAT

A

Remote Access Trojan

241
Q

RC4

A

Rivest Cipher version 4

242
Q

RCS

A

Rich Communication Services

243
Q

RFC

A

Request for Comments

244
Q

RFID

A

Radio Frequency Identifier

245
Q

RIPEMD

A

RACE Integrity Primitives Evaluation Message Digest

246
Q

ROI

A

Return on Investment

247
Q

RPO

A

Recovery Point Objective

248
Q

RSA

A

Rivest, Shamir, & Adleman

249
Q

RTBH - RTBH is a very common technique used by many service providers and large enterprises to protect against DDOS attacks.

A

Remote Triggered Black Hole

250
Q

RTO

A

Recovery Time Objective

251
Q

RTOS

A

Real-Time Operating System

252
Q

RTP

A

Real-Time Transport Protocol

253
Q

S/MIME

A

Secure/Multipurpose Internet Mail Extensions

254
Q

SaaS

A

Software as a Service

255
Q

SAE

A

Simultaneous Authentication of Equals

256
Q

SAML

A

Security Assertions Markup Language

257
Q

SAN

A

Storage Area Network

258
Q

SAN

A

Subject Alternative Name

259
Q

SCADA

A

System Control and Data Acquisition

260
Q

SCAP

A

Security Content Automation Protocol

261
Q

SCEP

A

Simple Certificate Enrollment Protocol

262
Q

SDK

A

Software Development Kit

263
Q

SDLC

A

Software Development Life Cycle

264
Q

SDLM

A

Software Development Life-cycle Methodology

265
Q

SDN

A

Software Defined Networking

266
Q

SDV

A

Software Defined Visibility

267
Q

SED

A

Self-Encrypting Drives

268
Q

SEH

A

Structured Exception Handler

269
Q

SFTP

A

Secured File Transfer Protocol

270
Q

SHA

A

Secure Hashing Algorithm

271
Q

SHTTP

A

Secure Hypertext Transfer Protocol

272
Q

SIEM

A

Security Information and Event Management

273
Q

SIM

A

Subscriber Identity Module

274
Q

SIP

A

Session Initiation Protocol

275
Q

SLA

A

Service Level Agreement

276
Q

SLE

A

Single Loss Expectancy

277
Q

S/MIME

A

Secure/Multipurpose Internet Mail Exchanger

278
Q

SMS

A

Short Message Service

279
Q

SMTP

A

Simple Mail Transfer Protocol

280
Q

SMTPS

A

Simple Mail Transfer Protocol Secure

281
Q

SNMP

A

Simple network Management Protocol

282
Q

SOAP

A

Simple Object Access Protocol

283
Q

SOAR

A

Security Orchestration, Automation, Response

284
Q

SoC

A

System on Chip

285
Q

SOC

A

Security Operations Center

286
Q

SPF

A

Sender Policy Framework

287
Q

SPIM

A

Spam over Internet Messaging

288
Q

SQL

A

Structured Query Language

289
Q

SQLi

A

SQL Injection

290
Q

SRTP

A

Secure Real-Time Protocol

291
Q

SSD

A

Solid State Drive

292
Q

SSH

A

Secure Shell

293
Q

SSL - Your Bank uses SSL to protect your online transactions.

A

Secure Sockets Layer

294
Q

SSO

A

Single Sign On

295
Q

STIX

A

Structured Threat Information eXchange

296
Q

STP

A

Shielded Twisted Pair

297
Q

SWG

A

Secure Web Gateway

298
Q

TACACS+

A

Terminal Access Controller Access Control System

299
Q

TAXII

A

Trusted Automated eXchange of Indicator Information

300
Q

TCP/IP

A

Transmission Control Protocol/Internet Protocol

301
Q

TGT

A

Ticket Granting Ticket

302
Q

TKIP

A

Temporal Key Integrity Protocol

303
Q

TLS

A

Transport Layer Security

304
Q

TOTP

A

Time-based One Time Password

305
Q

TPM

A

Trusted Platform Module

306
Q

TSIG

A

Transaction Signature

307
Q

TTP

A

Tactics, Techniques, and Procedures

308
Q

UAT

A

User Acceptance Testing

309
Q

UAV

A

Unmanned Aerial Vehicle

310
Q

UDP

A

User Datagram Protocol

311
Q

UEFI

A

Unified Extensible Firmware Interface

312
Q

UEM

A

Unified Endpoint Management

313
Q

UPS

A

Uninterruptable Power Supply

314
Q

URI

A

Uniform Resource Identifier

315
Q

URL

A

Universal Resource Locator

316
Q

USB

A

Universal Serial Bus

317
Q

USB OTG

A

USB On The Go

318
Q

UTM - UTM eliminates the need for sprawling standalone products and simplifies security visibility and management.

A

Unified Threat Management

319
Q

UTP

A

Unshielded Twisted Pair

320
Q

VBA

A

Visual Basic

321
Q

VDE

A

Virtual Desktop Environment

322
Q

VDI

A

Virtual Desktop Infrastructure

323
Q

VLAN

A

Virtual Local Area Network

324
Q

VLSM

A

Variable Length Subnet Masking

325
Q

VM

A

Virtual Machine

326
Q

VoIP

A

Voice over IP

327
Q

VPC

A

Virtual Private Cloud

328
Q

VPN

A

Virtual Private Network

329
Q

VTC

A

Video Teleconferencing

330
Q

WAF

A

Web Application Firewall

331
Q

WAP

A

Wireless Access Point

332
Q

WEP

A

Wired Equivalent Privacy

333
Q

WIDS

A

Wireless Intrusion Detection System

334
Q

WIPS

A

Wireless Intrusion Prevention System

335
Q

WORM

A

Write Once Read Many

336
Q

WPA

A

WiFi Protected Access

337
Q

WPS

A

WiFi Protected Setup

338
Q

WTLS

A

Wireless TLS

339
Q

XaaS

A

Anything as a Service

340
Q

XML

A

Extensible Markup Language

341
Q

XOR

A

Exclusive Or

342
Q

XSRF

A

Cross-Site Request Forgery

343
Q

XSS

A

Cross-Site Scripting