ACRONYMS Flashcards

Get familiar with the important acronyms of Security plus exam

1
Q

AAA

A

Authentication Authorization and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AES-256

A

Advanced Encryption Standards 256-bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AH

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AI

A

Artificial Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AIS

A

Automated Indicator Sharing

Automated Indicator Sharing (AIS) is a system where cybersecurity organizations automatically share information about cyber threats with each other. This real-time exchange of data helps everyone identify and defend against attacks faster and more effectively. It’s like a neighborhood watch program, but for cyber threats.
Cybersecurity and Infrastructure Security Agency (CISA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ALE

A

Annualized Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AP

A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ARO

A

Annualized Rate of Occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ASLR

A

Address Space Layout Randomization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ATT&CK

A

Adversarial Tactics Techniques and Common Knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AUP

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

AV

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

BASH

A

Bourne Again Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

BCP

A

Business Continuity Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

BGP

A

Border Gateway Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BIA

A

Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BIOS

A

Basic Input/Output System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BPA

A

Business Partners Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BPDU

A

Bridge Protocol Data Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

BYOD

A

Bring Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

CA

A

Certificate Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

CAPTCHA

A

Completely Automated Public Turing Test to Tell Computers and Humans Apart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

CAR

A

Corrective Action Report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

CASB

A

Cloud Access Security Broker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

CBC

A

Cipher Block Chaining

Cipher Block Chaining (CBC) is a way to encrypt information in chunks. Each chunk is scrambled with the key, and then also linked to the previous chunk with a special operation. This chaining effect makes decryption rely on all the previous blocks, improving security compared to simpler encryption methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

CCMP

A

Counter Mode/CBC-MAC Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

CCTV

A

Closed-circuit Television

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

CERT

A

Computer Emergency Response Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

CFB

A

Cipher Feedback

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

CHAP

A

Challenge Handshake Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

CIA

A

Confidentiality Integrity Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

CIO

A

Chief Information Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

CIRT

A

Computer Incident Response Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

CMS

A

Content Management System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

COOP

A

Continuity of Operation Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

COPE

A

Corporate-Owned, Personally Enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

CP

A

Contingency Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

CRC

A

Cyclical Redundancy Check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

CRL

A

Certificate Revocation List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

CSO

A

Chief Security Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

CSP

A

Cloud Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

CSR

A

Certificate Signing Request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

CSRF

A

Cross-site Request Forgery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

CSU

A

Channel Service Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

CTM

A

Counter Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

CTO

A

Chief Technology Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

CVE

A

Common Vulnerability Enumeration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

CVSS

A

Common Vulnerability Scoring System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

CYOD

A

Choose Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

DAC

A

Discretionary Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

DBA

A

Database Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

DDoS

A

Distributed Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

DEP

A

Data Execution Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

DES

A

Digital Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

DHCP

A

Dynamic Host Configuration Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

DHE

A

Diffie-Hellman Ephemeral

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

DKIM

A

DomainKeys Identified Mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

DLL

A

Dynamic Link Library

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

DLP

A

Data Loss Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

DMARC

A

Domain Message Authentication Reporting and Conformance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

DNAT

A

Destination Network Address Translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

DNS

A

Domain Name System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

DoS

A

Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

DPO

A

Data Privacy Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

DRP

A

Disaster Recovery Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

DSA

A

Digital Signature Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

DSL

A

Digital Subscriber Line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

EAP

A

Extensible Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

ECB

A

Electronic Code Book

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

ECC

A

Elliptic Curve Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

ECDHE

A

Elliptic Curve Diffie-Hellman Ephemeral

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

ECDSA

A

Elliptic Curve Digital Signature Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

EDR

A

Endpoint Detection and Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

EFS

A

Encrypted File System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

ERP

A

Enterprise Resource Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

ESN

A

Electronic Serial Number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

ESP

A

Encapsulated Security Payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

FACL

A

File System Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

FDE

A

Full Disk Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

FIM

A

File Integrity Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

FPGA

A

Field Programmable Gate Array

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

FRR

A

False Rejection Rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

FTP

A

File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

FTPS

A

Secured File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

GCM

A

Galois Counter Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

GDPR

A

General Data Protection Regulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

GPG

A

Gnu Privacy Guard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

GPO

A

Group Policy Object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

GPS

A

Global Positioning System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

GPU

A

Graphics Processing Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

GRE

A

Generic Routing Encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

HA

A

High Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

HDD

A

Hard Disk Drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

HIDS

A

Host-based Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

HIPS

A

Host-based Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

HMAC

A

Hashed Message Authentication Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

HOTP

A

HMAC-based One-time Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

HSM

A

Hardware Security Module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

HTML

A

Hypertext Markup Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

HTTP

A

Hypertext Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

HTTPS

A

Hypertext Transfer Protocol Secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

HVAC

A

Heating, Ventilation, and Air Conditioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

IaaS

A

Infrastructure as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

IaC

A

Infrastructure as Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

IAM

A

Identity and Access Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

ICMP

A

Internet Control Message Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

ICS

A

Industrial Control Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

IDEA

A

International Data Encryption Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

IDF

A

Intermediate Distribution Frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

IdP

A

Identity Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

IDS

A

Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

IEEE

A

Institute of Electrical and Electronics Engineers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

IKE

A

Internet Key Exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

IM

A

Instant Messaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

IMAP

A

Internet Message Access Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

IoC

A

Indicators of Compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

IoT

A

Internet of Things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

IP

A

Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

IPS

A

Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

IPSec

A

Internet Protocol Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

IR

A

Incident Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

IRC

A

Internet Relay Chat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

IRP

A

Incident Response Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

ISO

A

International Standards Organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

ISP

A

Internet Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

ISSO

A

Information Systems Security Officer

132
Q

IV

A

Initialization Vector

133
Q

KDC

A

Key Distribution Center

134
Q

KEK

A

Key Encryption Key

135
Q

L2TP

A

Layer 2 Tunneling Protocol

136
Q

LAN

A

Local Area Network

137
Q

LDAP

A

Lightweight Directory Access Protocol

138
Q

LEAP

A

Lightweight Extensible Authentication rotocol

139
Q

MaaS

A

Monitoring as a Service

140
Q

MAC

A

Mandatory Access Control

141
Q

MAC

A

Media Access Control

142
Q

MAC

A

Message Authentication Code

143
Q

MAN

A

Metropolitan Area Network

144
Q

MBR

A

Master Boot Record

145
Q

MD5

A

Message Digest 5

146
Q

MDF

A

Main Distribution Frame

147
Q

MDM

A

Mobile Device Management

148
Q

MFA

A

Multifactor Authentication

149
Q

MFD

A

Multifunction Device

150
Q

MFP

A

Multifunction Printer

151
Q

ML

A

Machine Learning

152
Q

MMS

A

Multimedia Message Service

153
Q

MOA

A

Memorandum of Agreement

154
Q

MOU

A

Memorandum of Understanding

155
Q

MPLS

A

Multi-protocol Label Switching

156
Q

MSA

A

Master Service Agreement

157
Q

MSCHAP

A

Microsoft Challenge Handshake uthentication Protocol

158
Q

MSP

A

Managed Service Provider

159
Q

MSSP

A

Managed Security Service Provider

160
Q

MTBF

A

Mean Time Between Failures

161
Q

MTTF

A

Mean Time to Failure

162
Q

MTTR

A

Mean Time to Recover

163
Q

MTU

A

Maximum Transmission Unit

164
Q

NAC

A

Network Access Control

165
Q

NAT

A

Network Address Translation

166
Q

NDA

A

Non-disclosure Agreement

167
Q

NFC

A

Near Field Communication

168
Q

NGFW

A

Next-generation Firewall

169
Q

NIDS

A

Network-based Intrusion Detection System

170
Q

NIPS

A

Network-based Intrusion Prevention System

171
Q

NIST

A

National Institute of Standards & Technology

172
Q

NTFS

A

New Technology File System

173
Q

NTLM

A

New Technology LAN Manager

174
Q

NTP

A

Network Time Protocol

175
Q

OAUTH

A

Open Authorization

176
Q

OCSP

A

Online Certificate Status Protocol

177
Q

OID

A

Object Identifier

178
Q

OS

A

Operating System

179
Q

OSINT

A

Open-source Intelligence

180
Q

OSPF

A

Open Shortest Path First

181
Q

OT

A

Operational Technology

182
Q

OTA

A

Over the Air

183
Q

OVAL

A

Open Vulnerability Assessment Language

184
Q

P12

A

PKCS #12

185
Q

P2P

A

Peer to Peer

186
Q

PaaS

A

Platform as a Service

187
Q

PAC

A

Proxy Auto Configuration

188
Q

PAM

A

Privileged Access Management

189
Q

PAM

A

Pluggable Authentication Modules

190
Q

PAP

A

Password Authentication Protocol

191
Q

PAT

A

Port Address Translation

192
Q

PBKDF2

A

Password-based Key Derivation Function 2

193
Q

PBX

A

Private Branch Exchange

194
Q

PCAP

A

Packet Capture

195
Q

PCIDSS

A

Payment Card Industry Data Security Standard

196
Q

PDU

A

Power Distribution Unit

197
Q

PEAP

A

Protected Extensible Authentication Protocol

198
Q

PED

A

Personal Electronic Device

199
Q

PEM

A

Privacy Enhanced Mail

200
Q

PFS

A

Perfect Forward Secrecy

201
Q

PGP

A

Pretty Good Privacy

202
Q

PHI

A

Personal Health Information

203
Q

PII

A

Personally Identifiable Information

204
Q

PIV

A

Personal Identity Verification

205
Q

PKCS

A

Public Key Cryptography Standards

206
Q

PKI

A

Public Key Infrastructure

207
Q

POP

A

Post Office Protocol

208
Q

POTS

A

Plain Old Telephone Service

209
Q

PPP

A

Point-to-Point Protocol

210
Q

PPTP

A

Point-to-Point Tunneling Protocol

211
Q

PSK

A

Pre-shared Key

212
Q

PTZ

A

Pan-tilt-zoom

213
Q

PUP

A

Potentially Unwanted Program RA Recovery Agent

214
Q

RA

A

Registration Authority

215
Q

RACE

A

Research and Development in Advanced Communications Technologies in Europe

216
Q

RAD

A

Rapid Application Development

217
Q

RADIUS

A

Remote Authentication Dial-in User Service

218
Q

RAID

A

Redundant Array of Inexpensive Disks

219
Q

RAS

A

Remote Access Server

220
Q

RAT

A

Remote Access Trojan

221
Q

RBAC

A

Role-based Access Control

222
Q

RBAC

A

Rule-based Access Control

223
Q

RC4

A

Rivest Cipher version 4

224
Q

RDP

A

Remote Desktop Protocol

225
Q

RFID

A

Radio Frequency Identifier

226
Q

RIPEMD

A

RACE Integrity Primitives Evaluation Message Digest

227
Q

ROI

A

Return on Investment

228
Q

RPO

A

Recovery Point Objective

229
Q

RSA

A

Rivest–Shamir–Adleman

230
Q

RTBH

A

Remotely Triggered Black Hole

231
Q

RTO

A

Recovery Time Objective

232
Q

RTOS

A

Real-time Operating System

233
Q

RTP

A

Real-time Transport Protocol

234
Q

S/MIME

A

Secure/Multipurpose Internet Mail Extensions

235
Q

SaaS

A

Software as a Service

236
Q

SAE

A

Simultaneous Authentication of Equals

237
Q

SAML

A

Security Assertions Markup Language

238
Q

SAN

A

Storage Area Network

239
Q

SAN

A

Subject Alternative Name

240
Q

SASE

A

Secure Access Service Edge

241
Q

SCADA

A

Supervisory Control and Data Acquisition

242
Q

SCAP

A

Security Content Automation Protocol

243
Q

SCEP

A

Simple Certificate Enrollment Protocol

244
Q

SD-WAN

A

Software-defined Wide Area Network

245
Q

SDK

A

Software Development Kit

246
Q

SDLC

A

Software Development Lifecycle

247
Q

SDLM

A

Software Development Lifecycle Methodology

248
Q

SDN

A

Software-defined Networking

249
Q

SE Linux

A

Security-enhanced Linux

250
Q

SED

A

Self-encrypting Drives

251
Q

SEH

A

Structured Exception Handler

252
Q

SFTP

A

Secured File Transfer Protocol

253
Q

SHA

A

Secure Hashing Algorithm

254
Q

SHTTP

A

Secure Hypertext Transfer Protocol

255
Q

SIEM

A

Security Information and Event Management

256
Q

SIM

A

Subscriber Identity Module

257
Q

SLA

A

Service-level Agreement

258
Q

SLE

A

Single Loss Expectancy

259
Q

SMS

A

Short Message Service

260
Q

SMTP

A

Simple Mail Transfer Protocol

261
Q

SMTPS

A

Simple Mail Transfer Protocol Secure

262
Q

SNMP

A

Simple Network Management Protocol

263
Q

SOAP

A

Simple Object Access Protocol

264
Q

SOAR

A

Security Orchestration Automation and Response

265
Q

SoC

A

System on Chip

266
Q

SOC

A

Security Operations Center

267
Q

SOW

A

Statement of Work

268
Q

SPF

A

Sender Policy Framework

269
Q

SPIM

A

Spam over Internet Messaging

270
Q

SQL

A

Structured Query Language

271
Q

SQLi

A

SQL Injection

272
Q

SRTP

A

Secure Real-Time Protocol

273
Q

SSD

A

Solid State Drive

274
Q

SSH

A

Secure Shell

275
Q

SSL

A

Secure Sockets Layer

276
Q

SSO

A

Single Sign-on

277
Q

STIX

A

Structured Threat Information eXchange

278
Q

SWG

A

Secure Web Gateway

279
Q

TACACS+

A

Terminal Access Controller Access Control ystem

280
Q

TAXII

A

Trusted Automated eXchange of Indicator nformation

281
Q

TCP/IP

A

Transmission Control Protocol/Internet rotocol

282
Q

TGT

A

Ticket Granting Ticket

283
Q

TKIP

A

Temporal Key Integrity Protocol

284
Q

TLS

A

Transport Layer Security

285
Q

TOC

A

Time-of-check

286
Q

TOTP

A

Time-based One-time Password

287
Q

TOU

A

Time-of-use

288
Q

TPM

A

Trusted Platform Module

289
Q

TTP

A

Tactics Techniques and Procedures

290
Q

TSIG

A

Transaction Signature

291
Q

UAT

A

User Acceptance Testing

292
Q

UAV

A

Unmanned Aerial Vehicle

293
Q

UDP

A

User Datagram Protocol

294
Q

UEFI

A

Unified Extensible Firmware Interface

295
Q

UEM

A

Unified Endpoint Management

296
Q

UPS

A

ninterruptable Power Supply

297
Q

URI

A

Uniform Resource Identifier

298
Q

URL

A

Universal Resource Locator

299
Q

USB

A

Universal Serial Bus

300
Q

USB

A

OTG USB On the Go

301
Q

UTM

A

Unified Threat Management

302
Q

UTP

A

Unshielded Twisted Pair

303
Q

VBA

A

Visual Basic

304
Q

VDE

A

Virtual Desktop Environment

305
Q

VDI

A

Virtual Desktop Infrastructure

306
Q

VLAN

A

Virtual Local Area Network

307
Q

VLSM

A

Variable Length Subnet Masking

308
Q

VM

A

Virtual Machine

309
Q

VoIP

A

Voice over IP

310
Q

VPC

A

Virtual Private Cloud

311
Q

VPN

A

Virtual Private Network

312
Q

VTC

A

Video Teleconferencing

313
Q

WAF

A

Web Application Firewall

314
Q

WAP

A

Wireless Access Point

315
Q

WEP

A

Wired Equivalent Privacy

316
Q

WIDS

A

Wireless Intrusion Detection System

317
Q

WIPS

A

Wireless Intrusion Prevention System

318
Q

WO

A

Work Order

319
Q

WPA

A

Wi-Fi Protected Access

320
Q

WPS

A

Wi-Fi Protected Setup

321
Q

WTLS

A

Wireless TLS

322
Q

XDR

A

Extended Detection and Response

323
Q

XML

A

Extensible Markup Language

324
Q

XOR

A

Exclusive Or

325
Q

XSRF

A

Cross-site Request Forgery

326
Q

XSS

A

Cross-site Scripting