Acronyms x3 Flashcards

1
Q

PGP

A

Pretty Good Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PHI

A

Personal Health Infromation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PII

A

Personally Identifiable Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

PIV

A

Personal Identity Verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

PKI

A

Public Key Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

POODLE

A

Padding Oracle on Downgrade Legacy Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

POP

A

Post Office Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

POTS

A

Plain Old Telephone Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

PPP

A

Point to Point Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

PPTP

A

Point to Point Tunneling Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

PSK

A

Public Shared Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

PTZ

A

Pan Tilt Zoom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RA - 2 cases

A

Recovery Agent, Registration Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

RAD

A

Rapid Application Development

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RADIUS

A

Remote Authentication Dial In User Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

RAID

A

Redundant Array of Indexpensive Disks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

RAS

A

Remote Access Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

RAT

A

Remote Access Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

RBAC - 2 cases

A

Role/Rule-Based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

RC4

A

Rivest Cipher 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

RDP

A

Remote Desktop Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

RFID

A

Radio Frequency Identifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

RIPEMD

A

RACE Integrity Primitives Evaluation Message Digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

ROI

A

Return On Investment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
RMF
Risk Management Framework
26
RPO
Recovery Point Objective
27
RSA
Rivest, Shamir, and Adleman
28
RTBH
Remotely Triggered Black Hole
29
RTO
Recovery Time Objective
30
RTOS
Real Time Operating System
31
RTP
Real-Time Transport Protocol
32
RTOS
Real-Time Operating System
33
RTP
Real-Time Transport Protocol
34
S/MIME
Secure/Multi-purpose Internet Mail Exchange
35
SaaS
Software as a Service
36
SAML
Security Assertions Markup Language
37
SAN - 2 cases
Storage Area Network, Subject Alternative Name
38
SCADA
System Controller and Data Acquisition - a type of ICS that manages large scale, multi-site devices and equipment over a region
39
SCAP, not access
Security Content Automation Protocol
40
SCEP
Simple Certificate Enrollment Protocol
41
SCP
Secure Copy
42
SCSI
Small Computer System Interface
43
SDK
Software Development Kit
44
SDLC
Software Development Life Cycle
45
SDLM
Software Development Life-cycle Methodology
46
SDN
Software Defined Network
47
SED
Self Encrypting Device
48
SEH
Structured Exception Handler
49
SFTP
Secure File Transfer Protocol
50
SIEM
Security Information and Event Management
51
SIM
Subscriber Identity Module
52
SLA
Service Level Agreement
53
SLE
Single Loss Expectency
54
SMB
Server Message Block
55
SMS
Short Message Service- aka texting.
56
SMTP(s)
Simple Mail Transfer Protocol (secure)
57
SNMP
Simple Network Management Protocol
58
SOAP
Simple Object Access Protocol
59
SoC
System on Chip
60
SPF
Sender Policy Framework
61
SPIM
Spam over Internet Messaging
62
SPIT
Spam over Internet Telephone
63
SPoF
Single Point of Failure
64
SQL
Structured Query Language
65
SRTP
Secure Real Time transport Protocol
66
SSD
Solid State Device
67
SSH
Secure Shell
68
SSID
Service Set Identifier
69
SSL
Secure Socket Layer
70
SSO
Single Sign On
71
STP
Shielded Twisted Pair
72
TACACS+
Terminal Access Controller Access Control System
73
TCP/IP
Transmission Control Protocol/Internet Protocol
74
TGT
Ticket Granting Ticket
75
TKIP
Temporal Key Integrity Protocol; used in WPA to address vulnerabilities associated with WEP.
76
TLS
Transport Layer Security
77
TOTP
Time-based One Time Password
78
TPM
Trusted Platform Module
79
TSIG
Transaction Signature
80
UAT
User Acceptance Testing
81
UAV
Unmanned Aireal Vehicle
82
UDP
User Datagram Protocol
83
UEFI
Unified Extensible Firmware Interface
84
UPS
Uninterruptable Power Supply
85
URI, not indicator
Uniform Resource Identifier
86
URL
Universal Resource Locator
87
USB(otg)
Universal Serial Bus (on the go)
88
UTM
Unified Threat Management
89
UTP
Untwisted Pair
90
VDE
Virtual Desktop Environment
91
VDI
Virtual Desktop Infrastructure
92
VLAN
Virtual Local Area Network
93
VLSM
Variable Length Subnet Masking
94
VM
Virtual Machine
95
VTC
Video Teleconferencing
96
WAF
Web Application Firewall
97
WAP
Wireless Access Point
98
WEP
Wired Equivalent Privacy
99
WIDS
Wireless Intrusion Detection System
100
WIPS
Wireless Intrusion Prevention System
101
WORM
Write Once, Read Many
102
WPA(2)
Wifi Protected Access(version 2)
103
WPS
Wifi Protected Setup
104
WTLS
Wireless Transport Layer Security
105
XML
Extensible Markup Language
106
XOR
Exclusive or
107
XSRF
Cross Site Request Forgery
108
XSS
Cross Site Scripting
109
SOAR
Security Orchestration, Automation, and Response; specifically designed to react to security information and perform workflows across a variety of other systems.
110
TOC/TOU
Time of Check, Time of Use; timing based attack use to exploit RACE conditions
111
SWG
Secure Web Gateway: an on-premise or cloud-delivered network security service/ firewall.