Security+ SYO-501 - Acronyms Flashcards

1
Q

3DES

A

Triple Digital Encryption Standard

About the name: AES applies the DES cipher algorithm three times to each data block. 
Type:  Symmetric-key block cipher
Key sizes: 168, 112 or 56 bits (keying option 1, 2, 3 respectively)
Block sizes: 64 bits
Rounds: 48 DES-equivalent rounds
Structure: Feistel network
First published: 1998 (ANS X9.52)
Retired:  2018 (replaced by AES)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA

A

Authentication, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ABAC

A

Attribute-Based Access Control

  • Defined by NIST 800-162
  • A logical access control methodology where authorization to perform a set of operations is determined by evaluating attributes associated with the subject, object, requested operations, and, in some cases, environment conditions against policy, rules, or relationships that describe the allowable operations for a given set of attributes.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AES

A

Advanced Encryption Standard

Original name: Rijndael
Type:  Symmetric-key block cipher
Key sizes: 128, 192 or 256 bits
Block sizes: 128 bits
Rounds: 10, 12 or 14 (depending on key size)
Designers: Vincent Rijmen, Joan Daemen
Structure: Substitution–permutation network
First published: 1998 (NIST)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AES256

A

Advanced Encryption Standard 256-bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AH

A

Authentication Header

IPsec is composed of two separate (mutually exclusive) protocols:Authentication Header (AH)andEncapsulating Security Payload (ESP). AH provides the authentication and integrity checking for data packets, and ESP provides encryption services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ALE

A

Annualized Loss Expectancy

$$$ how much loss you could expect in a year.
ALE = SLE x ARO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AP

A

Access Point

An AP works at Layer 2 (the data link layer) of the OSI model, and it can operate as a bridge connecting a standard wired network to wireless devices or as a router passing data transmissions from one access point to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

APT

A

Advanced Persistent Threat

Often nation-states (e.g. China). Hackers with skill , resources and TIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ARO

A

Annualized Rate of Occurrence

### the number of times an event is expected to occur each year
ALE = SLE x ARO
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ARP

A

Address Resolution Protocol

Protocol used to map known IP addresses to unknown physical addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ASLR

A

Address Space Layout Randomization

  • Randomizes the location where system executables are loaded into memory.
  • Therefore, it is a memory-protection process for operating systems (OSes) that guards against BUFFER-OVERLOW attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ASP

A

Application Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AUP

A

Acceptable Use Policy

defines what is and what is not acceptable activity, practice, or use for company equipment an resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

AV

A

Antivirus OR Asset Value (in $$)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

BAC

A

Business Availability Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

BCP

A

Business Continuity Planning

Assess organizational risks and create policies, plans, and procedures to minimize impact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

BIA

A

Business Impact Analysis

The process of performing risk assessment on business tasks and processes rather than on assets. The purpose of BIA is to determine the risks to business processes and design protective and recovery solutions. The goal is to maintain business continuity, prevent and/or minimize downtime, and prepare for fast recovery and restoration in the event of a disaster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BIOS

A

Basic Input/Output System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BPA

A

Business Partners Agreement

An agreement between partners in a business that outlines their responsibilities, obligations, and sharing of profits and losses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BPDU

A

Bridge Protocol Data Unit

Frames that contain information about the Spanning tree protocol. A switch sends BPDUs using a unique MAC address from its origin port and a multicast address as destination MAC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BYOD

A

Bring Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

RIP
BGP
OSPF

A

Routers usually communicate routing and other information using one of three standard protocols:

  • RIP - Routing Information Protocol
  • BGP - Border Gateway Protocol
  • OSPF - Open Shortest Path First
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

CA

A

Certificate Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

CAC

A

Common Access Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

CAN

A

Controller Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

CAPTCHA

A

Completely Automated Public Turing Test to Tell Computers and Humans Apart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

CAR

A

Corrective Action Report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

CASB

A

Cloud Access Security Broker

Security policy enforcement solution. Ensures proper security measures and ensures that they are implemented between a cloud solution and a customer organization. CASBsare on-premise or cloud-based security policy enforcement points. They exist between the cloud service users and the cloud service providers for the purpose of combining (and adding) enterprise security policies as resources are accessed.
The brokers can consolidate lots of different types of security policy enforcement (single sign-on, authorization, credential mapping, encryption, and so forth) while acting like a gatekeeper. They essentially allow the organization to extend the reach of their own security policies beyond the confines of their own infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

CBC

A

Cipher Block Chaining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

CCMP

A

Counter-Mode/CBC-Mac Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

CCTV

A

Closed-circuit TV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

CER

A

Certificate
OR
Cross-over Error Rate

Cross-over Error Rate. See Biometrics, FAR, and FRR. The point at which FRR and FAR are equal. Aim for a LOW CER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

CERT

A

Computer Emergency Response Team

Carnegie Mellon University standards for secure coding. CERT standards cover many of the same issues as OWASP, but they also have complete language-specific standards for Java, Perl, C, and C++ and exception handling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

CFB

A

Cipher Feedback

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

CHAP

A

Challenge Handshake Authentication Protocol

Authentication method supported by PPP (can be used by PPTP).

(1) user authenticates to the server;
(2) server directs the client to generate a random number (often a cryptographic hash) and send it to the server;
(3) server periodically challenges the client to reproduce the number/hash;
(4) if the client can’t, the server terminates the session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

CIO

A

Chief Information Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

CIRT

A

Computer Incident Response Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

CMS

A

Content Management System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

COOP

A

Continuity of Operations Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

COPE

A

Corporate Owned, Personally Enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

CP

A

Contingency Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

CRC

A

Cyclical Redundancy Check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

CRL

A

Certificate Revocation List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

CSIRT

A

Computer Security Incident Response Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

CSO

A

Chief Security Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

CSP

A

Cloud Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

CSR

A

Certificate Signing Request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

CSRF

A

Cross-site Request Forgery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

CSU

A

Channel Service Unit

See also DSU. Routers, in conjunction with achannel service unit/data service unit (CSU/DSU), are also used to translate from LAN framing to WAN framing (for example, a router that connects a 100BaseT network to a T1 network).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

CTM

A

Counter-Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

CTO

A

Chief Technology Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

CTR

A

Counter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

CYOD

A

Choose Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

DAC

A

Discretionary Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

DBA

A

Database Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

DDoS

A

Distributed Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

DEP

A

Data Execution Prevention

When an application tries to launch, the user must approve the execution before it can proceed or, at the least, the system logs when an application tries to launch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

DER

A

Distinguished Encoding Rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

DES

A

Digital Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

DFIR

A

Digital Forensics and Investigation Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

DHCP

A

Dynamic Host Configuration Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

DHE

A

Data-Handling Electronics
OR
Diffie-Hellman Ephemeral

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

DLL

A

Dynamic Link Library

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

DLP

A

Data Loss Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

DMZ

A

Demilitarized Zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

DNAT

A

Destination Network Address Transaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

DNS

A

Domain Name Service (Server)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

DoS

A

Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

DRP

A

Disaster Recovery Plan

Disaster recovery is an expansion of BCP. Basically, when business continuity is interrupted, a disaster has occurred.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

DSA

A

Digital Signature Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

DSL

A

Digital Subscriber Line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

DSU

A

Data Service Unit

See also CSU.
Routers, in conjunction with achannel service unit/data service unit (CSU/DSU), are also used to translate from LAN framing to WAN framing (for example, a router that connects a 100BaseT network to a T1 network).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Extensible Authentication Protocol

A

ECB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

EAP

A

Extensible Authentication Protocol

Authentication method supported by PPP (can be used by PPTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

ECB

A

Electronic Code Book

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

ECC

A

Elliptic Curve Cryptography

Asymmetric system designed to work with smaller processors (like hand-held devices)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

ECDHE

A

Elliptic Curve Diffie-Hellman Ephemeral

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

ECDSA

A

Elliptic Curve Digital Signature Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

EF

A

Exposure Factor

%%% the percentage of the asset value that is threatened with each threat occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

EFS

A

Encrypted File System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

EMI

A

Electromagnetic Interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

EMP

A

Electro Magnetic Pulse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

EOL

A

End of Life

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

ERP

A

Enterprise Resource Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

ESN

A

Electronic Serial Number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

ESP

A

Encapsulated Security Payload

IPsec is composed of two separate (mutually exclusive) protocols:Authentication Header (AH)andEncapsulating Security Payload (ESP). AH provides the authentication and integrity checking for data packets, and ESP provides encryption services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

EULA

A

End User License Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

FACL

A

File System Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

FAR

A

False Acceptance Rate

See Biometircs, FRR, and CER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

FDE

A

Full Disk Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

FRR

A

False Rejection Rate

See Biometrics, FAR and CER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

FTP

A

File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

FTPS

A

Secured File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

GCM

A

Galois Counter Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

GPG

A

Gnu Privacy Guard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

GPO

A

Group Policy Object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

GPS

A

Global Positioning System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

GPU

A

Graphic Processing Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

GRE

A

Generic Routing Encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

HA

A

High Availability

Refers to measures such as redundancy, failover, and mirroring, used to keep services and systems operational during an outage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

HDD

A

Hard Disk Drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

HIDS

A

Host-based Intrusion Detection System

IDS runs as software on a host system. Examines machine logs, system events and application interactions, but normally doesn’t monitor incoming network traffic. Popular on servers that use encrypted channels. See also HIPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

HIPS

A

Host-based Intrusion Prevention System

See HIDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

HMAC

A

Hashed Message Authentication Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

HOTP

A

HMAC-based One-Time Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

HSM

A

Hardware security module

Devices that handle digital keys. Performs a similar function as TPM. Aka PCSM, SAM, Hardware cryptographic device, or cryptographic module. Often a plug in device.

  • Provides encryption, digital signatures, hashing, and message authentication codes.
  • Manages cryptographic keys
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

HTML

A

Hypertext Markup Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

HTTP

A

Hypertext Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

HTTPS

A

Hypertext Transfer Protocol over SSL/TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

HVAC

A

Heating, Ventilation and Air Conditioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

IaaS

A

Infrastructure as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

ICMP

A

Internet Control Message Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

ICS

A

Industrial Control Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

ID

A

Identification OR Intrusion Detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

IDEA

A

International Data Encryption Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

IDF

A

Intermediate Distribution Frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

IdP

A

Identity Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

IDS

A

Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

IEEE

A

Institute of Electrical and Electronic Engineers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

IIS

A

Internet Information System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

IKE

A

Internet Key Exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

IMPA4

A

Internet Message Access Protocol v4

126
Q

IoT

A

Internet of Things

127
Q

IPS

A

Internet Protocol Security

128
Q

IRC

A

Internet Relay Chat

129
Q

IRP

A

Incident Response Plan

130
Q

ISA

A

Interconnection Security Agreement

131
Q

ISP

A

Internet Service Provider

132
Q

ISSO

A

Information Systems Security Officer

133
Q

ITCP

A

IT Contingency Plan

134
Q

IV

A

Initialization Vector

135
Q

KDC

A

Key Distribution Center

136
Q

KEK

A

Key Encryption Key

137
Q

L2TP

A

Layer 2 Tunneling Protocol

138
Q

LAN

A

Local Area Network

See also: CAN, MAN, SAN, WAN

139
Q

LDAP

A

Lightweight Directory Access Protocol

140
Q

LEAP

A

Lightweight Extensible Authentication Protocol

141
Q

MaaS

A

Monitoring as a Service

142
Q

MAC

A

Mandatory Access Control OR Media Access Control OR Message Authentication Code

143
Q

MAN

A

Metropolitan Area Network

144
Q

MBR

A

Master Boot Record

145
Q

MD5

A

Message Digest 5

146
Q

MDF

A

Master Distribution Frame

147
Q

MDM

A

Mobile Device Management

148
Q

MFA

A

Multifactor Authentication

149
Q

MFD

A

Multi-function Device

150
Q

MIME

A

Multipurpose Internet Mail Exchange

151
Q

MITM

A

Man-in-the-Middle

152
Q

MMS

A

Multimedia Message Service

153
Q

MOA

A

Memorandum of Agreement

154
Q

MOTD

A

Message of the Day

155
Q

MOU

A

Memorandum of Understanding

156
Q

MPLS

A

Multi-Protocol Label Switching

157
Q

MSCHAP

A

Microsoft Challenge Handshake Authentication Protocol

158
Q

MSP

A

Managed Service Provider

159
Q

MTBF

A

Mean Time Between Failures

160
Q

MTTF

A

Mean Time To Failure

161
Q

MTTR

A

Mean Time to Repair or Restore

162
Q

MTU

A

Maximum Transmission Unit

163
Q

NAC

A

Network Access Control

164
Q

NAT

A

Network Address Translation

165
Q

NDA

A

Nondisclosure Agreement

166
Q

NFC

A

Near Field Communication

167
Q

NGAC

A

Next Generation Access Control

168
Q

NIDS

A

Network-based Intrusion Detection System

169
Q

NIPS

A

Network-based Intrusion Prevention System

170
Q

NIST

A

National Institute of Standards & Technology

171
Q

NTFS

A

New Technology File System

172
Q

NTLM

A

New Technology LAN Manager

173
Q

NTP

A

Network Time Protocol

174
Q

OAUTH

A

Open Authorization

175
Q

OCSP

A

Online Certificate Status Protocol

176
Q

OID

A

Object Identifier

177
Q

OS

A

Operating System

178
Q

OTA

A

Over The Air

179
Q

OVAL

A

Open Vulnerability Assessment Language

180
Q

P12

A

PKCS #12

181
Q

P2P

A

Peer to Peer

182
Q

PaaS

A

Platform as a Service.

183
Q

PAC

A

Proxy Auto Configuration

184
Q

PAP

A

Password Authentication Protocol

185
Q

PAT

A

Port Address Translation

186
Q

PBKDF2

A

Password-based Key Derivation Function 2

Key Stretching Algorithm. Key stretching makes a possibly weak key, typically a password or passphrase, more secure against a brute-force attack by increasing the time it takes to test each possible key. PBKDF2 applies some function (like a hash or HMAC) to the password or passphrase along with Salt to produce a derived key. Bcrypt is another method of key stretching.

187
Q

PBX

A

Private Branch Exchange

188
Q

PCAP

A

Packet Capture

189
Q

PEAP

A

Protected Extensible Authentication Protocol

190
Q

PED

A

Personal Electronic Device

191
Q

PEM

A

Privacy-enhanced Electronic Mail

192
Q

PFS

A

Perfect Forward Secrecy

193
Q

PFX

A

Personal Exchange Format

194
Q

PGP

A

Pretty Good Privacy

195
Q

PHI

A

Personal Health Information

196
Q

PII

A

Personally Identifiable Information

197
Q

PKI

A

Public Key Infrastructure

198
Q

POODLE

A

Padding Oracle on Downgrade Legacy Encryption

199
Q

POP

A

Post Office Protocol

200
Q

POTS

A

Plain Old Telephone Service

201
Q

PPP

A

Point-to-Point Protocol

202
Q

PPTP

A

Point-to-Point Tunneling Protocol

203
Q

PSK

A

Pre-shared Key

204
Q

PTZ

A

Pan-Tilt-Zoom

205
Q

PVI

A

Personal Identity Verification

206
Q

RA

A

Recovery Agent OR Registration Authority

207
Q

RAD

A

Rapid Application Development

208
Q

RADIUS

A

Remote Authentication Dial-in User Server

209
Q

RAID

A

Rudundant Array of Independent/Inexpensive Disks

210
Q

RAS

A

Remote Access Server

211
Q

RAT

A

Remote Access Trojan

212
Q

RBAC

A

Role-based Access Control OR Rule-based Access Control

213
Q

RC4

A

Rivest Cipher version 4

214
Q

RDP

A

Remote Desktop Protocol

215
Q

REST

A

Representational State Transfer

216
Q

RFID

A

Radio Frequency Identifier

217
Q

RIPEMD

A

RACE Integrity Primitives Evaluation Message Digest

218
Q

RMF

A

Risk Management Framework

219
Q

ROI

A

Return on Investment

220
Q

RPO

A

Recovery Point Objective

221
Q

RSA

A

Rivest, Shamir, and Adleman

222
Q

RTBH

A

Remotely Triggered Black Hole

223
Q

RTO

A

Recovery Time Objective

224
Q

RTOS

A

Real-time Operating System

225
Q

RTP

A

Real-time Transport Protocol

226
Q

S/MIME

A

Secure/Multipurpose Internet Mail Extensions

227
Q

SaaS

A

Software as a Service

228
Q

SAML

A

Security Assertions Markup Language

229
Q

SAN

A

Storage Area Network

230
Q

SCADA

A

System/Supervisory Control and Data Acquisition

231
Q

SCAP

A

Security Content Automation Protocol

232
Q

SCEP

A

Simple Certificate Enrollment Protocol

233
Q

SCP

A

Secure Copy

234
Q

SCSI

A

Small Computer System Interface

235
Q

SDK

A

Software Development Kit

236
Q

SDLC

A

Software Development Life Cycle

237
Q

SDLM

A

Software Development Life Cycle Methodology

238
Q

SDN

A

Software-Defined Networking

239
Q

SDN

A

Software-Defined Networking

240
Q

SED

A

Self-encrypting drive

241
Q

SFTP

A

Secured File Transfer Protocol

242
Q

SHA

A

Secure Hashing Algorithm

243
Q

SHE

A

Structured Exception Handler

244
Q

SHTTP

A

Secure Hypertext Transfer Protocol

245
Q

SIEM

A

Security Information and Event Management

246
Q

SIM

A

Subscriber Identity Module

247
Q

SIPS

A

Session Initiation Protocol

248
Q

SIPS

A

Session Initiation Protocol Secure

249
Q

SLA

A

Service Level Agreement

250
Q

SLE

A

Single Loss Expectancy

251
Q

SMB

A

Server Message Block

252
Q

SMS

A

Short Message Service

253
Q

SMTP

A

Simple Mail Transfer Protocol

254
Q

SMTPS

A

Simple Mail Transfer Protocol Secure

255
Q

SNMP

A

Simple Network Management Protocol

256
Q

SOAP

A

Simple Object Access Protocol

257
Q

SoC

A

System on Chip

258
Q

SPF

A

Sender Policy Framework

259
Q

SPIM

A

Spam over Internet Messaging

260
Q

SPOF

A

Single Point of Failure

261
Q

SQL

A

Structured Query Language

262
Q

SRTP

A

Secure Real-Time Protocol

263
Q

SSD

A

Solid State Drive

264
Q

SSH

A

Secure Shell

265
Q

SSID

A

Service Set Identifier

266
Q

SSL

A

Secure Sockets Layer

267
Q

SSO

A

Single Sign-on

268
Q

SSP

A

System Security Plan

269
Q

STP

A

Shielded Twisted Pair OR Spanning Tree Protocol

270
Q

STP

A

Spanning Tree Protocol

271
Q

TACACS+

A

Terminal Access Controller Access Control System Plus

272
Q

TCO

A

Total Cost of Ownership

273
Q

TCP/IP

A

Transmission Control Protocol/Internet Protocol

274
Q

TGT

A

Ticket Granting Ticket

275
Q

TKIP

A

Temporal Key Integrity Protocol

276
Q

TLS

A

Transport Layer Security

277
Q

TOTP

A

Time-based One-time Password

278
Q

TPM

A

Trusted platform modules

279
Q

TSIG

A

Transaction Signature

280
Q

UAT

A

User Acceptance Testing

281
Q

UAV

A

Unmanned Aerial Vehicle

282
Q

UDP

A

User Datagram Protocol

283
Q

UEFI

A

Unified Extensible Firmware Interface

284
Q

UPS

A

Uninterruptible Power Supply

285
Q

URI

A

Uniform Resource Identifier

286
Q

URL

A

Universal Resource Locator

287
Q

USB

A

Universal Serial Bus

288
Q

USB OTG

A

USB On The Go

289
Q

UTM

A

Unified Threat Management

290
Q

UTP

A

Unshielded Twisted Pair

291
Q

VDE

A

Virtual Desktop Environment

292
Q

VDI

A

Virtual Desktop Infrastructure

293
Q

VLAN

A

Virtual Local Area Network

294
Q

VLSM

A

Variable Length Subnet Masking

295
Q

VM

A

Virtual Machine

296
Q

VoIP

A

Voice over IP

297
Q

VPN

A

Virtual Private Network

298
Q

VTC

A

Video Teleconferencing

299
Q

WAF

A

Web Application Firewall

300
Q

WAP

A

Wireless Access Point

301
Q

WEP

A

Wired Equivalent Privacy

302
Q

WIDS

A

Wireless Intrusion Detection System

303
Q

WIPS

A

Wireless Intrusion Prevention System

304
Q

WORM

A

Write Once Read Many

305
Q

WPA2

A

WiFi Protected Access 2

306
Q

WPS

A

WiFi Protected Setup

307
Q

WTLS

A

Wireless TLS

308
Q

XML

A

Extensible Markup Language

309
Q

XOR

A

Exclusive Or

310
Q

XSRF

A

Cross-site Request Forgery

311
Q

XSS

A

Cross-site Scripting