CompTIA 1002 Acronyms Flashcards
ACL
Access Control List
A list of rules used to grant access to a resource. An ACL identifies traffic that is allowed or blocked based on IP addresses, networks, ports, and some protocols.
AES
Advanced Encryption Standard
A symmetric algorithm used to encrypt data and provide confidentiality.
AUP
Acceptable Use Policy
Rules or guidelines for the proper use of technology or digital devices within an organization.
BIOS
Basic Input/ Output System
A computer’s firmware used to manipulate different settings such as the date and time, boot drive, and access password.
BYOD
Bring your Own Device
A policy allowing employees to connect personally owned devices, such as tablets and smartphones, to a company network.
CD-ROM
Compact Disc-Read-Only Memory
CDFS
Compact Disc File System
a file system type used on CDs.
CPU
Central Processing Unit
The key component of a computer system, which contains the circuitry necessary to interpret and execute program instructions
DDoS
Distributed Denial of Service
An attack that attempts to make an online service, like a website, unavailable by overwhelming it with a flood of traffic from many computers.
DHCP
Dynamic Host Configuration Protocol
A service used to dynamically assign IP addresses, subnet masks, default gateways, DNS server addresses, and other configurations to clients.
DLP
Data Loss Prevention
a system that identifies, monitors, and protects data to prevent it from unauthorized use, modification, or destruction
DNS
Domain Name Service
Converts a human-friendly hostname (such as www.google.com) into a computer-friendly IP address (such as 192.168.1.1)
DoS
Denial of Service
An interruption in an authorized user’s access to a computer network, typically one caused with malicious intent.
DVD
Digital Versatile Disc
EFS
Encrypting File System
A feature within NTFS on Windows systems that supports encrypting individual files or folders for confidentiality.
EMI
Electromagnetic Interference
Electromagnetic interference caused by such things as motors, power lines, and fluorescent lights.
EULA
End User License Agreement
The contract between a user and a company selling software for installation on the user’s computer.
ext2/ext3/ext4
Extended File System
File system Used by Linux
FAT
File Allocation Table
Table used by the operating system (OS) to manage files on hard drives and other computer systems
FAT32
32-bit File Allocation Table
An older partition type that is not commonly used anymore. it is mainly used on devices like USB flash drives to make them compatible between computers running different operating systems (Window/Linux/MacOS)
FTP
File Transfer Protocol
A format and set of rules for transferring files from a host to a remote computer.
GUI
Graphical User Interface
Interface that relies on graphics to communicate with the user (example: Microsoft Windows)
GPS
Global Positioning System
A system that determines accurately the precise position of something on earth
GSM
Global System for Mobile Communications
a 2G standard for cellular transmissions
HDD
Hard Disk Drive
HTML
Hypertext Markup Language
The authoring language used to create documents on the World Wide Web.
HTTP
HyperText Transfer Protocol
The protocol used for transmitting web pages over the Internet
HTTPS
Hypertext Transfer Protocol Secure
Encrypts HTTP traffic with SSL or TLS using port 443.
I/O
Input/Output
IDS
Intrusion Detection System
A detective control used to detect attacks when they occur, but does not automatically take measures to prevent the attack.
IP
Internet Protocol
The main delivery system for information over the Internet
IPConfig
Internet Protocol Configuration
A command line tool n Microsoft Windows that displays all current TCP/IP network configuration values and settings.
IPS
Intrusion Prevention System
A preventative control that will stop an attack in progress.
IPSec
Internet Protocol Security
Used to encrypt data in transit
IR
Infrared
IRP
Incident Response Plan
The procedures documented in an incident response policy.
ISP
Internet Service Provider
A company that provides access to the Internet.
JBoD
Just a Bunch of Disks
Disks installed on a computer but not as a RAID.
KVM
Keyboard, Video, and Mouse
Use many computers with a single keyboard, video display, and mouse
LAN
Local Area Network
A geographic network that covers a relatively small geographic area such as a building or a small campus - no more than a mile distance between computers
LDAP
Lightweight Directory Access Protocol
Language used to communicate with directories such as Microsoft’s Active Directory
MAC
Media Access Control
A network data transfer policy that determines how data is transmitted between two computer terminals through a network cable.
MBR
Master Boot Record
An area on a hard disk in its first sector. When the BIOS boots a system, it looks at the MBR for instructions and information on how to boot the disk and load the operating system.
MBSA
Microsoft Baseline Security Analyzer
Software developed and used by Microsoft to check the security of an operating system by assessing missing security updates and less secure areas of the operating system.
MDM
Mobile Device Management
A group of applications and/or technologies used to manage mobile devices. MDM tools can monitor mobile devices and ensure they are compliance with security policies.
MSConfig
Microsoft Configuration
Enables users to configure a system’s boot files and critical system files. It is an executable file which runs the Windows System Configuration Utility.
MSDS
Material Safety Data Sheet
Contains information on the possible health effects of exposure to chemicals
NAC
Network Access Control
Inspects clients for health and can restrict network access to unhealthy (missing updates, using an outdated operating system, etc) clients to a remediation network.
NAS
Network Attached Storage
A storage device that is directly attached to the network and is used to supply file-based storage services to other computers on the network.
NAT
Network Address Translation
A service that translates public IP addresses to private and private IP addresses to public. It hides addresses on an internal network.
NetBIOS
Networked Basic Input/Output System
A legacy system that was the predecessor to using host names to identify devices on networks.
NIC
Network Interface Card
A piece of hardware that allows a computer to connect to a network.
NTFS
New Technology File System
A file system used in Microsoft operating systems that provides security.
OS
Operating System
PC
Personal Computer
PE
Pre-Installation Environment
Windows Pre-Installation Environment is a lightweight version of Windows used for the deployment of PCs, workstations, and servers
PII
Personally Identifiable Information.
Information about individuals that can be used to trace a person’s identity, such as a full name, birthdate, biometric data, and identifying numbers such as a Social Security number (SSN).
PHI
Personal Health Information
Information about an individual held by parties that are involved in the healthcare and billing process.
a.k.a. (Protected Health Information)
PKI
Public Key Infrastructure
Group of technologies used to request, create, manage, store, distribute, and revoke digital certificates.
PnP
Plug-and-play
Technology that allows a computer to automatically configure the devices that connect to it.
PXE
Preboot Execution Environment
Allows computer to load an operating system from a server.
QoS
Quality of Service
Gives specific traffic precedence over other traffic on networks.
RADIUS
Remote Authentication Dial-In User Server
RAID
Redundant Array of Independent/Inexpensive Disks
A hard disk drive where data is written across multiple disks as if they were a single disk.
RAM
Random Access Memory
Temporary memory. RAM is expandable, and resides on the motherboard.
RDP
Remote Desktop Protocol
Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft which provides a user with a graphical interface to connect to another computer over a network connection
RFID
Radio Frequency Identification
Tags/microchips that contain a predetermined code which can be read by an RFID reader. These are used in credit cards, badges, passports, pet tracking just to name a few
ROM
Read Only Memory
Permanent instructions that cannot be changed easily
SAN
Storage Area Network
A specialized network of high-speed storage devices.
SFC
System File Checker
Command used to verify and repair system files.
SOHO
Small Office/Home Office
SSH
Secure Shell
Network protocol for secure transfer of data between computers.
SSID
Service Set Identifier
Identifies the name of a wireless network.
SSL
Secure Sockets Layer
A security protocol that uses encryption to establish a secure connection between a computer and a Web server.
SSO
Single Sign-On
TACACS+
Terminal Access Controller Access-Control System Plus
TCP/IP
Transmission Control Protocol/Internet Protocol
A set of standards that control how data is sent across networks including the internet.
UAC
User Account Control
Informs you when a program makes a change that requires administrator-level permission, also adjusts the permission level of your user accounts.
UEFI
Unified Extensible Firmware Interface
The extensible successor to the BIOS that features support for a vast array of systems and platforms by allowing access to system resources to access additional software modules.
UPnP
Universal Plug and Play
Enables network-ready devices to discover each other automatically.
UPS
Uninterruptible Power Supply
A battery backup system that provides fault tolerance for power and can protect against power fluctuations.
URL
Uniform Resource Locator
Also called a web address.
VM
Virtual Machine
VoIP
Voice over Internet Protocol
a phone connection through a personal computer with any type of broadband Internet connection.
VPN
Virtual Private Network
Provides access to a private network over a public network such as the Internet.
WAP
Wireless Access Point
Provides access to a wired network to wireless clients.
WEP
Wired Equivalent Privacy
An older encryption algorithm used to protect data on Wi-Fi Networks. Weak security and no longer used.
WiFi
Wireless Fidelity
It is similar to Bluetooth in that it is used to exchange data, but the signals can travel further distances.
WLAN
Wireless Local Area Network
Network connected wirelessly.
WPA
Wireless Protected Access
WPA2
WiFi Protected Access 2
More permanent upgrade to WEP and uses AES technology. Currently WP2 is the standard wireless security type.
WPS
WiFi Protected Setup
Allows users to configure a wireless network without typing in the passphrase.
(Can be done by pressing buttons or by entering a PIN)
GPT
GUID Partition Table
A newer partition type that is used to create drives larger than 2 TB.