Security+ 601 Acronyms Flashcards

1
Q

3DES

A

Triple Data Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA

A

Authentication, Authorization, Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ABAC

A

Attribute-based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AD

A

Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AES256

A

Advanced Encryption Standard 256bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AH

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AI

A

Artifial Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AIS

A

Automated Indicator Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ALE

A

Annualized Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AP

A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ARO

A

Annualized Rate of Occurence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ASLR

A

Address Space Layout Randomization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

ASP

A

Active Server Pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

ATT&CK

A

Adversarial Tactics, Techniques and Common Knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

AUP

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BCP

A

Business Continuity Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BGP

A

Border Gateway Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BIA

A

Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

AV

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
BASH
Bourne Again Shell
26
BIOS
Basic Input Output Systems
27
BPA
Business Partnership AGreement
28
BPDU
Bridge Protocol Data Unit
29
BSSID
Basic Service Set Identifier
30
BYOD
Bring Your Own Device
31
CA
Certificate Authority
32
CAPTCHA
Completely Automated Public Turning Test to Tell Computers and Humans Apart
33
CAR
Corrective Action Report
34
CASB
Cloud Access Security Broker
35
CBC
Ciper Block Chaining
36
CCMP
Counter-Mode/CBC-MAC Protocol
37
CCTV
Closed Circuit Television
38
CERT
Computer Emergency Response Team
39
CFB
Cipher Feedback
40
CHAP
Challange-Handshake Authentication Protocol
41
CIO
Chief Information Officer
42
CIRT
Computer Incident Response Team
43
CIS
Center for Internet Security
44
CMS
Content Management System
45
CN
Common Name
46
COOP
Continuity of Operations Planning
47
COPE
Coporate-owned Personally Enabled
48
CP
Contingency Planning
49
CRC
Cyclic Redundancy Check
50
CSP
Cloud Service Provider
51
CSR
Certificate Signing Request
52
CSRF
Cross-Site Request Forgery
53
CSU
Channel Service Unit
54
CTM
Counter-Mode
55
CTO
Chief Technology Officer
56
CVE
Common Vulnerabilities and Exposures
57
CVSS
Common Vulnerability Scoring System
58
CYOD
Choose Your Own Device
59
DAC
Discretionary Access Control
60
DBA
Database Administrator
61
DDoS
Distributed Denial of Service
62
DEP
Data Execution Prevention
63
DER
Distinguised Encoding Rules
64
DES
Data Encryption Standard
65
DHCP
Dynamic Host Configuration Protocol
66
DHE
Diffie-Hellman Ephemeral
67
DKIM
Domain Keys Identified Mail
68
DLL
Dynamic-link Library
69
DLP
Data Loss Prevention
70
DMARC
Domain Message Authentication Reporting and Conformance
71
DNAT
Destination Network Address Translation
72
DNS
Domain Name System
73
DNSSEC
Domain Name System Security Extension
74
DoS
Denial of Service
75
DPO
Data Protection Officer
76
DRP
Disaster Recovery Plan
77
DSA
Digital Signature Algorithm
78
DSL
Digital Subscriber Line
79
EAP
Extensible Authentication Protocol
80
ECB
Electronic Code Book
81
ECC
Elliptic-curve Cryptography
82
ECDHE
Elliptic-curve Diffie-Hellman Ephemeral
83
ECDSA
Elliptic-curve Digital Signature Algorithm
84
EDR
Endpoint Detection and Response
85
EFS
Encrypted File System
86
EIP
Extended Instructions Pointer
87
EOL
End of Life
88
EOS
End of Service
89
ERP
Enterprise Resource Planning
90
ESN
Electronic Serial Number
91
ESP
Encapsulation Security Payload
92
ESSID
Extended Service Set Identifier
93
FACL
File-system Access Control List
94
FDE
Full Disk Encryption
95
FIM
File Integrity Monitoring
96
FPGA
Field Programmable Gate Array
97
FRR
False Rejection Rate
98
FTP
File Transfer Protocol
99
FTPS
File Transport Protocol Secure
100
GCM
Galois/Counter Mode
101
GDPR
General Data Protection Regulation
102
GPG
GNU Privacy Guard
103
GPO
Group Policy Object
104
GPS
Global Positioning System
105
GPU
Graphics Processing Unit
106
GRE
Generic Routing Encapsulation
107
HA
High Availability
108
HDD
Hard Disk Drive
109
HIDS
Host-based Intrusion Detection System
110
HIPS
Host-based Intrusion Prevention System
111
HMAC
Hash-based Message Authentication Code
112
HOTP
HMAC based One-time Password
113
HSM
Hardware Security Module
114
HSMaaS
Hardware Security Module as a Service
115
HTML
Hypertext Markup Language
116
HTTP
Hyper Text Transfer Protocol
117
HTTPS
Hyper Text Transfer Protocol Secure
118
HVAC
Heating, Ventilation, Airconditioning
119
IaaS
Infrastructure as a Service
120
IAM
Identity and Access Management
121
ICMP
Internet Control Message Protocol
122
ICS
Industrial Control Systems
123
IDEA
International Data Encryption Algorithm
124
IDF
Intermediate Distribution Frame
125
IdP
Identity Provider
126
IDS
Intrusion Detection System
127
IEEE
Institute of Electrical and Electronics Engineers
128
IKE
Internet Key Exchange
129
IM
Instant Messaging
130
IMAP4
Internet Message Access Protocol v4
131
IoC
Indicators of Compromise
132
IoT
Internet of Things
133
IP
Internet Protocol
134
IPS
Intrusion Prevention System
135
IPsec
Internet Protocol Security
136
IR
Incident Response
137
IRC
Incident Relay Chat
138
IRP
Incident Response Plan
139
ISA
Interconnection Security Agreement
140
ISFW
Internal Segmentation Firewall
141
ISO
International Organization for Standardization
142
ISP
Internet Service Provider
143
ISSO
Information Systems Security Officer
144
ITCP
IT Contingency Plan
145
IV
Initialization Vector
146
KDC
Key Distribution Center
147
KEK
Key Encryption Key
148
L2TP
Layer 2 Tunneling Protocol
149
LAN
Local Area Network
150
LDAP
Lightweight Directory Access Protocol
151
LEAP
Lightweight Extensible Authentication Protocol
152
MaaS
Monitoring as a Service
153
MAC
Media Access Control
154
MAM
Mobile Application Management
155
MAN
Metropolitan Area Network
156
MBR
Master Boot Record
157
MD5
Message Digest 5
158
MDF
Main Distribution Frame
159
MDM
Mobile Device Management
160
MFA
Multifactor Authentication
161
MFP
Multifunction Printer
162
ML
Machine Learning
163
MMS
Multimedia Message Service
164
MOA
Memorandum of Agreement
165
MOU
Memorandum of Understanding
166
MPLS
Multiprotocol Label Switching
167
MSA
Measurement Systems Analysis
168
MS-CHAP
Microsoft Challange-Handshake Authentication Protocol
169
MSP
Managed Service Provider
170
MTBF
Mean Time Between Failures
171
MTTF
Mean Time to Failure
172
MTTR
Mean Time to Repair
173
MTU
Maximum Transmission Unit
174
NAC
Network Access Control
175
NAS
Network-attached Storage
176
NAT
Network Address Translation
177
NDA
Non-disclousre Agreement
178
NFC
Near Field Communication
179
NFV
Network Function Virtualization
180
NGFW
Next Generation Firewall
181
NG-SWG
Next Generation Secure Web Gateway
182
NIC
Network Internet Card
183
NIDS
Network-based Intrusion Detection System
184
NIPS
Network-based Intrusion Prevention System
185
NIST
National Institute of Standards & Technology
186
NOC
Network Operations Center
187
NTFS
New Technology File System
188
NTLM
New Technology LAN Manager
189
NTP
Network Time Protocol
190
OCSP
Online Certificate Status Protocol
191
OID
Object Identifier
192
OS
Operating System
193
OSI
Open Systems Interconnection
194
OSINT
Open Source Intelligence
195
OSPF
Open Shortest Path First
196
OT
Operational Technology
197
OTA
Over the Air
198
OTG
On The Go
199
OVAL
Open Vulnerability and Assessment Language
200
OWASP
Open Web Application Security Project
201
P12
PKCS#12 | (Public Key Cryptography Standard #12) encryption
202
P2P
Peer to Peer
203
PaaS
Platform as a Service
204
PAC
Proxy Auto Configuration
205
PAM
Privileged Access Management or Pluggable Authentication Modules
206
PAM
Pluggable Authentication Modules or Privileged Access Management
207
PAP
Password Authentication Protocol
208
PAT
Port Address Translation
209
PBKDF2
Password-based Key Derivation Function 2
210
PBX
Private Branch Exchange
211
PCAP
Packet Capture
212
PCI DSS
Payment Card Industry Data Security Standard
213
PDU
Power Distribution Unit
214
PE
Portable Executable
215
PEAP
Protected Extensible Authentication Protocol
216
PED
Portable Electronic Device
217
PEM
Privacy Enhanced Mail
218
PFS
Perfect Forward Secrecy
219
PGP
Pretty Good Privacy
220
PHI
Personal Health Information
221
PII
Personal Identifiable Information
222
PIN
Personal Identification Number
223
PIV
Personal Identity Verification
224
PKCS
Public Key Cryptography Standards
225
PKI
Public Key Infrastructure
226
PoC
Proof of Concept
227
POP
Post Office Protocol
228
POTS
Plain Old Telephone Service
229
PPP
Point to Point Protocol
230
PPTP
Point to Point Tunneling Protocol
231
PSK
Pre Shared Key
232
PTZ
Pan Tilt Zoom
233
PUP
Potentially Unwanted Program
234
QA
Quality Assuarance
235
QOS
Quality of Service
236
RA
Registration Authority
237
RAD
Rapid Application Development
238
RADIUS
Remote Authentication Dial-in User Service
239
RAID
Redundant Array of Inexpensive Disks
240
RAM
Random Access Memory
241
RAS
Remote Access Server
242
RAT
Remote Access Trojan
243
RC4
Rivest Cipher v4
244
RCS
Rich Communication Services
245
RFC
Request for Comments
246
RFID
Radio Frequency Identification
247
RIPEMD
RACE Integrity Primitives Evaluation Message Digest
248
ROI
Return of Investment
249
RPO
Recovery Point Objective
250
RSA
Rivset, Shamir, & Adleman
251
RTBH
Remotely Triggered Black Hole
252
RTO
Recovery Time Objective
253
RTOS
Real-time Operating System
254
RTP
Real-time Transport Protocol
255
S/MIME
Secure/Multipurpose Internet Mail Extension
256
SaaS
Software as a Service
257
SAE
Simultaneous Authentication of Equals
258
SAML
Security Assertions Markup Language
259
SCADA
Supervisory Control and Data Acquisition
260
SCAP
Security Content Automation Protocol
261
SCEP
Simple Certificate Enrollment Protocol
262
SDK
Software Development Kit
263
SDLC
Software Development Life Cycle
264
SDLM
Software Development Life-cycle Methodology
265
SDN
Software Defined Networking
266
SDP
Service Delivery Platform
267
SDV
Software-defined Visibility
268
SED
Self-Encrypting Drives
269
SEH
Structured Exception Handling
270
SFTP
SSH File Transfer Protocol
271
SHA
Secure Hashing Algorithm
272
SIEM
Security Information and Event Management
273
SIM
Subscriber Identity Module
274
SIP
Session Initiation Protocol
275
SLA
Sevice LEvel Agreement
276
SLE
Single Loss Expectancy
277
SMB
Server Message Block
278
S/MIME
Secure/Multipurpose Internet Mail Extension
279
SMS
Short Message Service
280
SMTP
Simple Mail Transfer Protocol
281
SMTPS
Simple Mail Transfer Protocol Secure
282
SNMP
Simple Network Management Protocol
283
SOAR
Security Orchestration, Automation, Response
284
SoC
System on Chip
285
SOC
Security Operations Center
286
SPF
Sender Policy Framework
287
SPIM
Spam over Instant Messaging
288
SQL
Structured Query Language
289
SQLi
Structured Query Language injection
290
SRTP
Secure Real-time Transport Protocol
291
SSD
Solid State Drive
292
SSH
Secure Shell
293
SSID
Service Set Identifier
294
SSL
Secure Socket Layer
295
SSO
Single Sign-on
296
STIX
Structured Threat Information eXpression
297
TCP/IP
Transmission Control PRotocol / Internet Protocol
298
TGT
Ticket Granting Ticket
299
TKIP
Temporal Key Integrity Protocol
300
TLS
Transport Layer Security
301
TOTP
Time-based One Time Password
302
TPM
Trusted Platform Module
303
TSIG
Transaction Signature
304
TTP
Tactics, Techniques, and Procedures
305
UAT
User Acceptance Testing
306
UDP
User Datagram Protocol
307
UEBA
User and Entity Behavior Analytics
308
UEFI
Unified Extensible Firmware Interface
309
UEM
Unified Endpoint Management
310
UPS
Uninterruptible Power Supply
311
URI
Uniform Resource Identifier
312
URL
Univeral Resouce Locator
313
USB OTG
USB ON-THE-GO
314
UTM
Universal Threat Management
315
USB
Universal Serial Bus
316
UTP
Unshielded Twisted Pair
317
VBA
Visual Basic for Applications
318
VDE
Virtual Desktop Environment
319
VDI
Virtual Desktop Infrastructure
320
VLAN
Virtual Local Area Network
321
VLSM
Variable-length Subnet Masking
322
VM
Virtual Machine
323
VoIP
Voice over IP
324
VPC
Virtual Private Cloud
325
VPN
Virtual Private Network
326
VTC
Video Teleconferencing
327
WAF
Web Application Firewall
328
WAP
Wireless Access Point
329
WEP
Wired Equivalent Privacy
330
WIDS
Wireless Intrusion Detection System
331
WIPS
Wireless Intrusion Prevention System
332
WORM
Write Once Read MAny
333
WPA
WiFi Protected Access
334
WPS
WiFi Protected Setup
335
XaaS
Anything as a Service
336
XML
Extensible Markup Language
337
XOR
Exclusive OR
338
XSRF
Cross-site Request Forgery
339
XSS
Cross-site Scripting
340
TAXII
Trusted Automated eXchange of Intelligence Information