CompTIA CySA+ - Acronym List Flashcards

1
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AV

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

BC

A

Business Continuity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

BCP

A

Business Continuity Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

BGP

A

Border Gateway Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

BIA

A

Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

C2

A

Command and Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CA

A

Certificate Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CASB

A

Cloud Access Security Broker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CDN

A

Content Delivery Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CERT

A

Computer Emergency Response Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CHD

A

Cardholder Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CI/CD

A

Continuous Integration and Continuous Delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CIS

A

Center for Internet Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

COBIT

A

Control Objectives for Information and Related Technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CSIRT

A

Cybersecurity Incident Response Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

CSRF

A

Cross-site Request Forgery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

CVE

A

Common Vulnerabilities and Exposures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

CVSS

A

Common Vulnerability Scoring System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

DDoS

A

Distributed Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

DKIM

A

Domain Keys Identified Mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
DLP
Data Loss Prevention
26
DMARC
Domain-based Message Authentication, Reporting and Conformance
27
DNS
Domain Name Service
28
DoS
Denial of Service
29
DR
Disaster Recovery
30
EDR
Endpoint Detection and Response
31
FIM
File Integrity Monitoring
32
FTP
File Transfer Protocol
33
GDB
GNU Debugger
34
GPO
Group Policy Objects
35
HIDS
Host-based Intrusion Detection System
36
HIPS
Host-based Intrusion Prevention System
37
HTTP
Hypertext Transfer Protocol
38
HTTPS
Hypertext Transfer Protocol Secure
39
IaaS
Infrastructure as a Service
40
ICMP
Internet Control Message Protocol
41
ICS
Industrial Control Systems
42
IDS
Intrusion Detection System
43
IoC
Indicators of Compromise
44
IP
Internet Protocol
45
IPS
Intrusion Prevention System
46
IR
Incident Response
47
ISO
International Organization for Standardization
48
IT
Information Technology
49
ITIL
Information Technology Infrastructure Library
50
JSON
JavaScript Object Notation
51
KPI
Key Performance Indicator
52
LAN
Local Area Network
53
LDAPS
Lightweight Directory Access Protocol
54
LFI
Local File Inclusion
55
LOI
Letter of Intent
56
MAC
Media Access Control
57
MFA
Multifactor Authentication
58
MOU
Memorandum of Understanding
59
MSF
Metasploit Framework
60
MSP
Managed Service Provider
61
MSSP
Managed Security Service Provider
62
MTTD
Mean Time to Detect
63
MTTR
Mean Time to Repair
64
NAC
Network Access Control
65
NDA
Non-disclosure Agreement
66
NGFW
Next-generation Firewall
67
NIDS
Network-based Intrusion Detection System
68
NTP
Network Time Protocol
69
OpenVAS
Open Vulnerability Assessment Scanner
70
OS
Operating System
71
OSSTMM
Open Source Security Testing Methodology Manual
72
OT
Operational Technology
73
OWASP
Open Web Application Security Project
74
PAM
Privileged Access Management
75
PCI DSS
Payment Card Industry Data Security Standard
76
PHP
Hypertext Preprocessor
77
PID
Process Identifier
78
PII
Personally Identifiable Information
79
PKI
Public Key Infrastructure
80
PLC
Programmable Logic Controller
81
POC
Proof of Concept
82
RCE
Remote Code Execution
83
RDP
Remote Desktop Protocol
84
REST
Representational State Transfer
85
RFI
Remote File Inclusion
86
RXSS
Reflected Cross-site Scripting
87
SaaS
Software as a Service
88
SAML
Security Assertion Markup Language
89
SASE
Secure Access Secure Edge
90
SCADA
Supervisory Control and Data Acquisition
91
SDLC
Software Development Life Cycle
92
SDN
Software-defined Networking
93
SFTP
Secure File Transfer Protocol
94
SIEM
Security Information and Event Management
95
SLA
Service-level Agreement
96
SLO
Service-level Objective
97
SMB
Server Message Block
98
SMTP
Simple Mail Transfer Protocol
99
SNMP
Simple Network Management Protocol
100
SOAR
Security Orchestration Automation and Response
101
SOC
Security Operations Center
102
SPF
Sender Policy Framework
103
SQL
Structured Query Languge
104
SSL
Secure Sockets Layer
105
SSO
Single Sign-on
106
SSRF
Server-side Request Forgery
107
STIX
Structured Threat Information Expression
108
SWG
Secure Web Gateway
109
TCP
Transmission Control Protocol
110
TFTP
Trivial File Transfer Protocol
111
TLS
Transport Layer Security
112
TRACE
Trade Reporting and Compliance Engine
113
TTP
Tactics, Techniques and Procedures
114
UEBA
User and Entity Behavior Analytics
115
URI
Uniform Resource Identifier
116
URL
Uniform Resource Locator
117
USB
Universal Serial Bus
118
VLAN
Virtual LAN
119
VM
Virtual Machine
120
VPN
Virtual Private Network
121
WAF
Web Application Firewall
122
WAN
Wide Area Network
123
XDR
Extended Detection Response
124
XML
Extensible Markup Language
125
XSS
Cross-site Scripting
126
XXE
XML External Entity
127
ZAP
Zed Attack Proxy
128
ZTNA
Zero Trust Network Access