Sec+ Acronyms Flashcards

1
Q

3DES

A

Triple Data Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA

A

Authentication, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ABAC

A

Attribute-based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AD

A

Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AES256

A

Advanced Encryption Standard 256-bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AH

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AI

A

Artificial Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AIS

A

Automated Indicator Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ALE

A

Annualized Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AP

A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ARO

A

Annualized Rate of Occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ASLR

A

Address Space Layout Randomization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

ASP

A

Active Server Pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

ATT&CK

A

Adversarial Tactics, Techniques, and Common Knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

AUP

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

AV

A

AntiVirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BASH

A

Bourne Again Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BCP

A

Business Continuity Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BGP

A

Border Gateway Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
BIA
Business Impact Analysis
26
BIOS
Basic Input/Output System
27
BPA
Business Partnership Agreement
28
BPDU
Bridge Protocol Data Unit
29
BSSID
Basic Service Set Identifier
30
BYOD
Bring Your Own Device
31
CA
Certificate Authority
32
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart
33
CAR
Corrective Action Report
34
CASB
Cloud Access Security Broker
35
CBC
Cipher Block Chaining
36
CBT
Computer-Based Training
37
CCMP
Counter-Mode/CBC-MAC Protocol
38
CCTV
Closed-Circuit Television
39
CERT
Computer Emergency Response Team
40
CFB
Cipher Feedback
41
CHAP
Challenge-Handshake Authentication Protocol
42
CI/CD
Continuous Integration/Continuous Delivery
43
CIO
Chief Information Officer
44
CIRT
Computer Incident Response Team
45
CIS
Center for Internet Security
46
CMDB
Configuration Management System Database
47
CMS
Content Management System
48
CN
Common Name
49
COOP
Continuity of Operations Planning
50
COPE
Corporate-Owned Personally Enabled
51
CP
Contingency Planning
52
CPU
Central Processing Unit
53
CRC
Cyclic Redundancy Check
54
CRL
Certificate Revocation List
55
CSA
Cloud Security Alliance
56
CSIRT
Computer Security Incident Response Team
57
CSO
Chief Security Officer
58
CSP
Cloud Service Provider
59
CSR
Certificate Signing Request
60
CSRF
Cross-Site Request Forgery
61
CSU
Channel Service Unit
62
CTM
Counter-Mode
63
CTO
Chief Technology Officer
64
CVE
Common Vulnerabilities and Exposures
65
CVSS
Common Vulnerabilities Scoring System
66
CYOD
Choose Your Own Device
67
DAC
Discretionary Access Control
68
DBA
DataBase Administratior
69
DDoS
Distributed Denial of Service
70
DEP
Data Execution Prevention
71
DER
Distinguished Encoding Rules
72
DES
Data Encryption Standard
73
DHCP
Dynamic Host Configuration Protocol
74
DHE
Diffie-Hellman Ephemeral
75
DKIM
Domain Keys Identified Mail
76
DLL
Dynamic-Link Library
77
DLP
Data Loss Prevention
78
DMARC
Domian Message Authentication Reporting and Conformance
79
DNAT
Destination Network Address Translation
80
DNS
Domain Name System
81
DNSSEC
Domain Name System Security Extensions
82
DoS
Denial-of-Service
83
DPO
Data Protection Officer
84
DRP
Disaster Recovery Plan
85
DSA
Digital Subscriber Line
86
EAP
Extensible Authentication Protocol
87
ECB
Electronic Code book
88
ECC
Elliptic-Curve Cryptography
89
ECDHE
Elliptic-Curve Diffie-Hellman Ephemeral
90
ECDSA
Elliptic-Curve Digital Signature Algorithm
91
EDR
Endpoint Detection and Response
92
EFS
Encrypted File System
93
EIP
Extended Instruction Pointer
94
EOL
End Of Life
95
EOS
End Of Service
96
ERP
Enterprise Resource Planning
97
ESN
Electronic Serial Number
98
ESP
Encapsulating Security Payload
99
ESSID
Extended Service Set Identifier
100
FACL
File System Access Control List
101
FDE
Full Disk Encryption
102
FIM
File Integrity Monitoring
103
FPGA
Field Programmable Gate Array
104
FRR
False Rejection Rate
105
FTP
File Transfer Protocol
106
FTPS
Secured file Transfer Protocol
107
GCM
Galois/Counter Mode
108
GDPR
General Data Protection Regulation
109
GPG
GNU Privacy Guard
110
GPO
Group Policy Object
111
GPS
Global Positioning System
112
GPU
Graphic Processing unit
113
GRE
Generic Routing Encapsulation
114
HA
High Availablity
115
HDD
Hard Disk Drive
116
HIDS
Host-based Intrusion Detection System
117
HIPS
Host-based Intrusion Prevention System
118
HMAC
Hash-based Message Authentication Code
119
HOTP
HMAC-based One-Time Password
120
HSM
Hardware Security Module
121
HSMaaS
Hardware Security Module as a Service
122
HTML
Hypertext Markup Language
123
HTTPS
Hypertext Markup Language Secure
124
HVAC
Heating, Ventilation, Air Conditioning
125
IaaS
Infrastructure as a Service
126
IAM
Identity Control Message Protocol
127
ICS
Industrial Control Systems
128
IDEA
International Data Encryption Algorithm
129
IDF
Intermediate Distribution Frame
130
IdP
Identity Provider
131
IDS
Intrusion Detection System
132
IEEE
Institute of Electrical and Electronic Engineers
133
IKE
Internet Key Exchange
134
IM
Instant Messaging
135
IMAP4
Internet Message Access Protocol v4
136
IoC
Indicator of Compromise
137
IoT
Internet of Things
138
IP
Internet Protocol
139
IPS
Intrusion Prevention System
140
IPSec
Internet Protocol Security
141
IR
Incident Response
142
IRC
Internet Relay Chat
143
IRP
Incident Response Plan
144
ISA
Interconnection Security Agreement
145
ISFW
Internal Segmentation Firewall
146
ISO
International Organization for Standardization
147
ISP
Internet Service Provider
148
ISSO
Information Systems Security Officer
149
ITCP
IT Contingency Plan
150
IV
Initialization Vector
151
JSON
JavaScript Object Notation
152
KDC
Key Distribution Center
153
KEK
Key Encryption Key
154
L2TP
Layer 2 tunneling Protocol
155
LAN
Local Area Network
156
LDAP
Lightweight Directory Access Protocol
157
LEAP
Lightweight Extensible Authentication Protocol
158
MaaS
Monitoring as a Service
159
MAC
Media Access Control
160
MAM
Mobile Application Management
161
MAN
Metropolitan Area Network
162
MBR
Master Boot Record
163
MD5
Message Digest 5
164
MDF
Main Distribution Frame
165
MDM
Mobile Device Management
166
MFA
Multifactor Authentication
167
MFD
Multifunction Device
168
MFP
Multifunction Printer
169
ML
Machine Learning
170
MMS
Multimedia Message Service
171
MOA
Memorandum Of Agreement
172
MOU
Memorandum of Understanding
173
MPLS
Multiprotocol Label Switching
174
MSA
Measurement Systems Analysis
175
MS-CHAP
Microsoft Challenge-Handshake Authentication Protocol
176
MSP
Managed Service Provider
177
MSSP
Managed Security Service Provider
178
MTBF
Mean Time to Failure
179
MTTR
Mean Time To Repair
180
MTU
Maximum Transmission Unit
181
NAC
Network-attached Storage
182
NAS
Network-attached Storage
183
NAT
Network Address Translation
184
NDA
Non-disclosure Agreement
185
NFC
Near-Field Communication
186
NFV
Network Function Virtualization
187
NGFW
Next-Generation Firewall
188
NG-SWG
Next-generation Secure Web Gateway
189
NIC
Network Interface Card
190
NIDS
Network-based Intrusion Detection System
191
NIPS
Network-based Intrusion Prevention System
192
NIST
National Institute of Standards & Technology
193
NOC
Network Operations Center
194
NTFS
New Technology File System
195
NTLM
New Technology LAN Manager
196
N
197
TP
Network Time Protocol
198
NTPSec
Network Time Protocol Secure
199
OCSP
Online Certificate Status Protocol
200
OID
Object Identifier
201
OS
Operating System
202
OSI
Open Systems Interconnection
203
OSINT
Open Source Intelligence
204
OSPF
Open Shortest Path First
205
OT
Operational Technology
206
OTA
Over-The-Air
207
OTG
On-The-Go
208
OVAL
Open Vulnerability And Assessment Language
209
OWASP
Open Web Application Security Project
210
P12
PKCS #12
211
P2P
Peer-To-Peer
212
PaaS
Platform as a Service
213
PAC
Proxy Auto Configuration
214
PAM
Privileged Access Management
215
PAM
Pluggable Authentication Modules
216
PAP
Password Authentication Protocol
217
PAT
Port Address Translation
218
PBKDF2
Password-based Key Derivation Function 2
219
PBX
Private Branch Exchange
220
PCAP
Packet Capture
221
PCI DSS
Payment Card Industry Data Security Standard
222
PDU
Power Distribution Unit
223
PE
Portable Executable
224
PEAP
Protected Extensible Authentication Protocol
225
PED
Portable Electronic Device
226
PEM
Privacy Enhanced Mail
227
PFS
Perfect Forward Secrecy
228
PGP
Pretty Good Privacy
229
PHI
Personal Health Information
230
PII
Personally Identifiable information
231
PIN
Personal Identification Number
232
PIV
Personal Identity Verification
233
PKCS
Public Key Cryptography Standards
234
PKI
Public Key Infrastructire
235
PoC
Proof of Concept
236
POP
Post Office Protocol
237
POTS
Plain Old Telephone Service
238
PPP
Point-to-Point Protocol
239
PPTP
Point-to-Point tunneling Protocol
240
PSK
Preshared Key
241
PTZ
Pan-Tilt-Zoom
242
PUP
Potentially Unwanted Program
243
QA
Quality Assurance
244
QoS
Quality of Service
245
RA
Registration Authority
246
RAD
Rapid Application Development
247
RADIUS
Remote Authentication Dial-in User Service
248
RAID
Redundant Array of Independent Disks
249
RAM
Random Access Memory
250
RAS
Remote Access Server
251
RAT
Remote Access Trojan
252
RC4
Rivest Cipher version 4
253
RCS
Rich Communication Services
254
RDP
Remote Desktop Protocol
255
RFC
Request for Comments
256
RFI
Remote File Inculsion
257
RFID
Radio Frequency Identification
258
RIPEMD
RACE Integrity Primitives Evaluation Message Digest
259
ROI
Return On Investment
260
RPO
Recovery Point Objective
261
RSA
Rivest, Shamir, & Adleman
262
RTBH
Remotely Triggered Black Hole
263
RTO
Recovery Time Objective
264
RTOS
Real-Time Operating System
265
RTP
Real-Time Transport Protocol
266
S/MIME
Secure/ Multipurpose Internet Mail Extensions
267
SaaS
Software as a Service
268
SAE
Simultaneous Authentication of Equals
269
SAML
Security Assertions Markup Language
270
SAN
Storage Area Network
271
SCADA
Supervisory Control and Data Acquistion
272
SCAP
Security Content Automation Protocol
273
SCEP
Simple Certificate Enrollment Protocol
274
SDK
Software Development Kit
275
SDLC
Software Development Life Cycle
276
SDLM
Software Development Life-cycle Methodology
277
SDN
Software-defined Networking
278
SDP
Service Delivery Platform
279
SDV
Software-defined Visibility
280
SED
Self-Encrypting Drives
281
SEH
Structured Expection Handling
282
SFTP
SSH File Transfer Protocol
283
SHA
Secure Hashing Algorithm
284
SIEM
Security Information and Event Managment
285
SIM
Subscriber Identity Module
286
SIP
Session Initiation Protocol
287
SLA
Service-Level Agreement
288
SLE
Single Loss Expectancy
289
SMB
Server Message Block
290
S/MIME
Secure/Multipurpose Internet Mail Extensions
291
SMS
Short Message Service
292
SMTP
Simple Mail Transfer Protocol
293
SMTPS
Simple Mail Transfer Protocol Secure
294
SNMP
Simple Network Management Protocol
295
SOAP
Simple Object Access Protocol
296
SOAR
Security Orchestration, Automation, Response
297
SoC
System on Chip
298
SOC
Security Operations Center
299
SOX
Sarbanes Oxley Act
300
SPF
Sender Policy Framework
301
SPIM
Spam over Instant Messaging
302
SQL
Structured Query Language
303
SQLi
SQL injection
304
SRTP
Secure Real-time Transport Protocol
305
SSD
Solid State Drive
306
SSH
Secure Shell
307
SSID
Service Set Identifier
308
SSL
Secure Sockets Layer
309
SSO
Single Sign-On
310
SSRF
Server-Side Request Forgery
311
STIX
Structured Threat Information eXpression
312
STP
Shielded Twister Pair
313
SWG
Secure Web Gateway
314
TACACS+
Terminal Access Controller Access Control System
315
TAXII
Trusted Automated eXchange of Intelligence Information
316
TCP
Transmission Control Protocol
317
TCP/IP
Transmission Control Protocol/Internet Protocol
318
TGT
Ticket Granting Ticket
319
TKIP
Temporal Key Integrity Protocol
320
TLS
Transport Layer Security
321
TOTP
Time-based One Time Password
322
TPM
Trusted Platform Module
323
TSIG
Transaction Signature
324
TTP
Tactics, Techniques, and Procedures
325
UAT
User Acceptance Testing
326
UDP
User Datagram Protocol
327
UEBA
User and Entity Behavior Analytics
328
UEFI
Unified Extensible Firmware Interface
329
UEM
Unified Endpoint Management
330
UPS
Uninterruptible Power Supply
331
URI
Uniform Resource Identifier
332
URL
Universal Resource Locator
333
USB
Universal Serial Bus
334
USB OTG
USB On-The-Go
335
UTM
Unified Threat Management
336
UTP
Unshielded Twisted Pair
337
VBA
Visual Basic for Applications
338
VDE
Virtual Desktop Environment
339
VDI
Virtual Desktop Infrastructure
340
VLAN
Virtual Local Area Network
341
VLSM
Variable-length Subnet Masking
342
VM
Virtual Machine
343
VoIP
Voice over IP
344
VPC
Virtual Private Cloud
345
VPN
Virtual Private Network
346
VTC
Video Teleconferencing
347
WAF
Web Application Firewall
348
WAP
Wireless Access Point
349
WEP
Wired Equivalent Privacy
350
WIDS
Wireless Intrusion Detection System
351
WLAN
Wireless Local Area Network
352
WORM
Write Once Read Many
353
WPA
WiFi Protected Access
354
WPS
WiFi Protected Setup
355
XaaS
Anything as a Service
356
XML
Extensible Markup Language
357
XOR
Exclusive OR
358
XSRF
Cross-site Request Forgery
359
XSS
Cross-site Scripting