Objectives Acronyms Flashcards

1
Q

Accronym

A

Meaning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3DES

A

Triple Digital Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AAA

A

Authentication, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ABAC

A

Attribute-based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AES256

A

Advanced Encryption Standards 256bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AH

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ALE

A

Annualized Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AP

A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ARO

A

Annualized Rate of Occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ASLR

A

Address Space Layout Randomization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ASP

A

Application Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

AUP

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

AV

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

AV

A

Asset Value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

BAC

A

Business Availability Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BCP

A

Business Continuity Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BIA

A

Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BIOS

A

Basic Input/Output System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BPA

A

Business Partners Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
BPDU
Bridge Protocol Data Unit
26
BYOD
Bring Your Own Device
27
CA
Certificate Authority
28
CAC
Common Access Card
29
CAN
Controller Area Network
30
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart
31
CAR
Corrective Action Report
32
CASB
Cloud Access Security Broker
33
CBC
Cipher Block Chaining
34
CCMP
Counter-Mode/CBC-Mac Protocol
35
CCTV
Closed-circuit Television
36
CER
Certificate
37
CER
Cross-over Error Rate
38
CERT
Computer Emergency Response Team
39
CFB
Cipher Feedback
40
CHAP
Challenge Handshake Authentication Protocol
41
CIO
Chief Information Officer
42
CIRT
Computer Incident Response Team
43
CMS
Content Management System
44
COOP
Continuity of Operations Plan
45
COPE
Corporate Owned, Personally Enabled
46
CP
Contingency Planning
47
CRC
Cyclical Redundancy Check
48
CRL
Certificate Revocation List
49
CSIRT
Computer Security Incident Response Team
50
CSO
Chief Security Officer
51
CSP
Cloud Service Provider
52
CSR
Certificate Signing Request
53
CSRF
Cross-site Request Forgery
54
CSU
Channel Service Unit
55
CTM
Counter-Mode
56
CTO
Chief Technology Officer
57
CTR
Counter
58
CYOD
Choose Your Own Device
59
DAC
Discretionary Access Control
60
DBA
Database Administrator
61
DDoS
Distributed Denial of Service
62
DEP
Data Execution Prevention
63
DER
Distinguished Encoding Rules
64
DES
Digital Encryption Standard
65
DFIR
Digital Forensics and Investigation Response
66
DHCP
Dynamic Host Configuration Protocol
67
DHE
Data-Handling Electronics
68
DHE
Diffie-Hellman Ephemeral
69
DLL
Dynamic Link Library
70
DLP
Data Loss Prevention
71
DMZ
Demilitarized Zone
72
DNAT
Destination Network Address Transaction
73
DNS
Domain Name Service (Server)
74
DoS
Denial of Service
75
DRP
Disaster Recovery Plan
76
DSA
Digital Signature Algorithm
77
DSL
Digital Subscriber Line
78
DSU
Data Service Unit
79
EAP
Extensible Authentication Protocol
80
ECB
Electronic Code Book
81
ECC
Elliptic Curve Cryptography
82
ECDHE
Elliptic Curve Diffie-Hellman Ephemeral
83
ECDSA
Elliptic Curve Digital Signature Algorithm
84
EF
Exposure Factor
85
EFS
Encrypted File System
86
EMI
Electromagnetic Interference
87
EMP
Electro Magnetic Pulse
88
EOL
End of Life
89
ERP
Enterprise Resource Planning
90
ESN
Electronic Serial Number
91
ESP
Encapsulated Security Payload
92
EULA
End User License Agreement
93
FACL
File System Access Control List
94
FAR
False Acceptance Rate
95
FDE
Full Disk Encryption
96
FRR
False Rejection Rate
97
FTP
File Transfer Protocol
98
FTPS
Secured File Transfer Protocol
99
GCM
Galois Counter Mode
100
GPG
Gnu Privacy Guard
101
GPO
Group Policy Object
102
GPS
Global Positioning System
103
GPU
Graphic Processing Unit
104
GRE
Generic Routing Encapsulation
105
HA
High Availability
106
HDD
Hard Disk Drive
107
HIDS
Host-based Intrusion Detection System
108
HIPS
Host-based Intrusion Prevention System
109
HMAC
Hashed Message Authentication Code
110
HOTP
HMAC-based One-Time Password
111
HSM
Hardware Security Module
112
HTML
Hypertext Markup Language
113
HTTP
Hypertext Transfer Protocol
114
HTTPS
Hypertext Transfer Protocol over SSL/TLS
115
HVAC
Heating, Ventilation and Air Conditioning
116
IaaS
Infrastructure as a Service
117
ICMP
Internet Control Message Protocol
118
ICS
Industrial Control Systems
119
ID
Identification
120
IDEA
International Data Encryption Algorithm
121
IDF
Intermediate Distribution Frame
122
IdP
Identity Provider
123
IDS
Intrusion Detection System
124
IEEE
Institute of Electrical and Electronic Engineers
125
IIS
Internet Information System
126
IKE
Internet Key Exchange
127
IM
Instant Messaging
128
IMAP4
Internet Message Access Protocol v4
129
IoT
Internet of Things
130
IP
Internet Protocol
131
IPSec
Internet Protocol Security
132
IR
Incident Response
133
IR
Infrared
134
IRC
Internet Relay Chat
135
IRP
Incident Response Plan
136
ISA
Interconnection Security Agreement
137
ISP
Internet Service Provider
138
ISSO
Information Systems Security Officer
139
ITCP
IT Contingency Plan
140
IV
Initialization Vector
141
KDC
Key Distribution Center
142
KEK
Key Encryption Key
143
L2TP
Layer 2 Tunneling Protocol
144
LAN
Local Area Network
145
LDAP
Lightweight Directory Access Protocol
146
LEAP
Lightweight Extensible Authentication Protocol
147
MaaS
Monitoring as a Service
148
MAC
Mandatory Access Control
149
MAC
Media Access Control
150
MAC
Message Authentication Code
151
MAN
Metropolitan Area Network
152
MBR
Master Boot Record
153
MD5
Message Digest 5
154
MDF
Main Distribution Frame
155
MDM
Mobile Device Management
156
MFA
Multifactor Authentication
157
MFD
Multi-function Device
158
MIME
Multipurpose Internet Mail Exchange
159
MITM
Man-in-the-Middle
160
MMS
Multimedia Message Service
161
MOA
Memorandum of Agreement
162
MOTD
Message of the Day
163
MOU
Memorandum of Understanding
164
MPLS
Multi-Protocol Label Switching
165
MSCHAP
Microsoft Challenge Handshake Authentication Protocol
166
MSP
Managed Service Provider
167
MTBF
Mean Time Between Failures
168
MTTF
Mean Time to Failure
169
MTTR
Mean Time to Recover or Mean Time to Repair
170
MTU
Maximum Transmission Unit
171
NAC
Network Access Control
172
NAT
Network Address Translation
173
NDA
Non-disclosure Agreement
174
NFC
Near Field Communication
175
NGAC
Next Generation Access Control
176
NIDS
Network-based Intrusion Detection System
177
NIPS
Network-based Intrusion Prevention System
178
NIST
National Institute of Standards & Technology
179
NTFS
New Technology File System
180
NTLM
New Technology LAN Manager
181
NTP
Network Time Protocol
182
OAUTH
Open Authorization
183
OCSP
Online Certificate Status Protocol
184
OID
Object Identifier
185
OS
Operating System
186
OTA
Over The Air
187
OVAL
Open Vulnerability Assessment Language
188
P12
PKCS #12
189
P2P
Peer to Peer
190
PaaS
Platform as a Service
191
PAC
Proxy Auto Configuration
192
PAM
Pluggable Authentication Modules
193
PAP
Password Authentication Protocol
194
PAT
Port Address Translation
195
PBKDF2
Password-based Key Derivation Function 2
196
PBX
Private Branch Exchange
197
PCAP
Packet Capture
198
PEAP
Protected Extensible Authentication Protocol
199
PED
Personal Electronic Device
200
PEM
Privacy-enhanced Electronic Mail
201
PFS
Perfect Forward Secrecy
202
PFX
Personal Exchange Format
203
PGP
Pretty Good Privacy
204
PHI
Personal Health Information
205
PII
Personally Identifiable Information
206
PIV
Personal Identity Verification
207
PKI
Public Key Infrastructure
208
POODLE
Padding Oracle on Downgrade Legacy Encryption
209
POP
Post Office Protocol
210
POTS
Plain Old Telephone Service
211
PPP
Point-to-Point Protocol
212
PPTP
Point-to-Point Tunneling Protocol
213
PSK
Pre-shared Key
214
PTZ
Pan-Tilt-Zoom
215
RA
Recovery Agent
216
RA
Registration Authority
217
RAD
Rapid Application Development
218
RADIUS
Remote Authentication Dial-in User Server
219
RAID
Redundant Array of Inexpensive Disks
220
RAS
Remote Access Server
221
RAT
Remote Access Trojan
222
RBAC
Role-based Access Control
223
RBAC
Rule-based Access Control
224
RC4
Rivest Cipher version 4
225
RDP
Remote Desktop Protocol
226
REST
Representational State Transfer
227
RFID
Radio Frequency Identifier
228
RIPEMD
RACE Integrity Primitives Evaluation Message Digest
229
ROI
Return on Investment
230
RMF
Risk Management Framework
231
RPO
Recovery Point Objective
232
RSA
Rivest, Shamir, & Adleman
233
RTBH
Remotely Triggered Black Hole
234
RTO
Recovery Time Objective
235
RTOS
Real-time Operating System
236
RTP
Real-time Transport Protocol
237
S/MIME
Secure/Multipurpose Internet Mail Extensions
238
SaaS
Software as a Service
239
SAML
Security Assertions Markup Language
240
SAN
Storage Area Network
241
SAN
Subject Alternative Name
242
SCADA
System Control and Data Acquisition
243
SCAP
Security Content Automation Protocol
244
SCEP
Simple Certificate Enrollment Protocol
245
SCP
Secure Copy
246
SCSI
Small Computer System Interface
247
SDK
Software Development Kit
248
SDLC
Software Development Life Cycle
249
SDLM
Software Development Life Cycle Methodology
250
SDN
Software Defined Network
251
SED
Self-encrypting Drive
252
SEH
Structured Exception Handler
253
SFTP
Secured File Transfer Protocol
254
SHA
Secure Hashing Algorithm
255
SHTTP
Secure Hypertext Transfer Protocol
256
SIEM
Security Information and Event Management
257
SIM
Subscriber Identity Module
258
SIP
Session Initiation Protocol
259
SIPS
Session Initiation Protocol Secure
260
SLA
Service Level Agreement
261
SLE
Single Loss Expectancy
262
SMB
Server Message Block
263
SMS
Short Message Service
264
SMTP
Simple Mail Transfer Protocol
265
SMTPS
Simple Mail Transfer Protocol Secure
266
SNMP
Simple Network Management Protocol
267
SOAP
Simple Object Access Protocol
268
SoC
System on Chip
269
SPF
Sender Policy Framework
270
SPIM
Spam over Internet Messaging
271
SPoF
Single Point of Failure
272
SQL
Structured Query Language
273
SRTP
Secure Real-Time Protocol
274
SSD
Solid State Drive
275
SSH
Secure Shell
276
SSID
Service Set Identifier
277
SSL
Secure Sockets Layer
278
SSO
Single Sign-on
279
SSP
System Security Plan
280
STP
Shielded Twisted Pair
281
TACACS+
Terminal Access Controller Access Control System Plus
282
TCO
Total Cost of Ownership
283
TCP/IP
Transmission Control Protocol/Internet Protocol
284
TGT
Ticket Granting Ticket
285
TKIP
Temporal Key Integrity Protocol
286
TLS
Transport Layer Security
287
TOTP
Time-based One-time Password
288
TPM
Trusted Platform Module
289
TSIG
Transaction Signature
290
UAT
User Acceptance Testing
291
UAV
Unmanned Aerial Vehicle
292
UDP
User Datagram Protocol
293
UEFI
Unified Extensible Firmware Interface
294
UPS
Uninterruptable Power Supply
295
URI
Uniform Resource Identifier
296
URL
Universal Resource Locator
297
USB
Universal Serial Bus
298
USB OTG
USB On The Go
299
UTM
Unified Threat Management
300
UTP
Unshielded Twisted Pair
301
VDE
Virtual Desktop Environment
302
VDI
Virtual Desktop Infrastructure
303
VLAN
Virtual Local Area Network
304
VLSM
Variable Length Subnet Masking
305
VM
Virtual Machine
306
VoIP
Voice over IP
307
VPN
Virtual Private Network
308
VTC
Video Teleconferencing
309
WAF
Web Application Firewall
310
WAP
Wireless Access Point
311
WEP
Wired Equivalent Privacy
312
WIDS
Wireless Intrusion Detection System
313
WIPS
Wireless Intrusion Prevention System
314
WORM
Write Once Read Many
315
WPA
WiFi Protected Access
316
WPA2
WiFi Protected Access 2
317
WPS
WiFi Protected Setup
318
WTLS
Wireless TLS
319
XML
Extensible Markup Language
320
XOR
Exclusive Or
321
XSRF
Cross-site Request Forgery
322
XSS
Cross-site Scripting