SY0-501 Acronyms Flashcards

1
Q

3DES

A

Triple Digital Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA

A

Authentication, Authorization, & Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ABAC

A

Attribute-based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AES256

A

Advanced Encryption Standard 256bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AH

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ALE

A

Annualized Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AP

A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ARO

A

Annualized Rate of Occurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ASLR

A

Address Space Layout Randomization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ASP

A

Application Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AUP

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

AV

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

BAC

A

Business Availability Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

BCP

A

Business Continuity Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

BIA

A

Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BIOS

A

Basic Input/Output System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BPA

A

Business Partners Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BPDU

A

Bridge Protocol Data Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BYOD

A

Bring Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
CA
Certificate Authority
26
CAC
Common Access Card
27
CAN
Controller Area Network
28
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart
29
CAR
Corrective Action Report
30
CBC
Cipher Block Chaining
31
CCMP
Counter-Mode/CBC -Mac Protocol
32
CCTV
Closed Circuit Television
33
CER
Cross-over Error Rate
34
CERT
Computer Emergency Response Team
35
CFB
Cipher Feedback
36
CHAP
Challenge Handshake Authentication Protocol
37
CIO
Chief Information Officer
38
CIRT
Computer Incident Response Team
39
CMS
Content Management System
40
COOP
Continuity of Operations Plan
41
COPE
Corporate-Owned, Personally Enabled
42
CP
Contingency Planning
43
CRC
Cyclical Redundancy Check
44
CRL
Certificate Revocation List
45
CSIRT
Computer Security Incident Response Team
46
CSO
Chief Security Officer
47
CSP
Cloud Service Provider
48
CSR
Certificate Signing Request
49
CSRF
Cross-site Request Forgery
50
CSU
Channel Service Unit
51
CTM
Counter-mode
52
CTO
Chief Technology Officer
53
CTR
Counter
54
CYOD
Choose Your Own Device
55
DAC
Discretionary Access Control
56
DBA
Database Administrator
57
DDoS
Distributed Denial of Service
58
DEP
Data Execution Prevention
59
DER
Distinguished Encoding Rules
60
DES
Digital Encryption Standard
61
DFIR
Digital Forensics and Investigation Response
62
DHCP
Dynamic Host Configuration Protocol
63
DHE
Data Handling Electronics
64
DLL
Dynamic Link Library
65
DLP
Data Loss Prevention
66
DMZ
Demilitarized Zone
67
DNAT
Destination Network Address Transaction
68
IDEA
International Data Encryption Algorithm
69
DNS
Domain Name Service
70
IDF
Intermediate Distribution Frame
71
DoS
Denial of Service
72
DRP
Disaster Recovery Plan
73
DSA
Digital Signature Algorithm
74
DSL
Digital Subscriber Line
75
DSU
Data Service Unit
76
EAP
Extensible Authentication Protocol
77
ECB
Electronic Code Book
78
ECC
Elliptic Curve Cryptography
79
ECHDE
Elliptic Curve Diffie-Hellman Ephemeral
80
ECDSA
Elliptic Curve Digital Signature Algorithm
81
EFS
Encrypted File System
82
EMI
Electromagnetic Interference
83
EMP
Electro Magnetic Pulse
84
ERP
Enterprise Resource Planning
85
ESN
Electronic Serial Number
86
ESP
Encapsulated Security Payload
87
EF
Exposure Factor
88
FACL
File System Access Control List
89
FAR
False Acceptance Rate
90
FDE
Full Disk Encryption
91
FRR
False Rejection Rate
92
FTP
File Transfer Protocol
93
FTPS
File Transfer Protocol Secure
94
GCM
Galois Counter Mode
95
GPG
Gnu Privacy Guard
96
GPO
Group Policy Object
97
GPS
Global Positioning System
98
GPU
Graphic Processing Unit
99
GRE
Generic Routing Encapsulation
100
HA
High Availability
101
HDD
Hard Disk Drive
102
HIDS
Host-based Intrusion Detection System
103
HIPS
Host-based Intrusion Prevention System
104
HMAC
Hash Message Authentication Code
105
HOTP
HMAC-based One Time Password
106
HSM
Hardware Security Module
107
HTML
Hyper Text Markup Language
108
HTTP
Hyper Text Transfer Protocol
109
HTTPS
Hyper Text Transfer Protocol Secure
110
HVAC
Heating, Ventilation, and Air Conditioning
111
IaaS
Infrastructure as a Service
112
ICMP
Internet Control Message Protocol
113
ICS
Industrial Control Systems
114
ID
Identificaiton
115
IdP
Identity Provider
116
IDS
Intrusion Detection System
117
IEEE
Institute of Electrical and Electronic Engineers
118
IIS
Internet Information System
119
IKE
Internet Key Exchange
120
IM
Instant Message
121
IMAPv4
Internet Message Access Protocol v4
122
IoT
Internet of Things
123
IP
Internet Protocol
124
IPSec
Internet Protocol Security
125
IR
Incident Response
126
IRC
Internet Relay Chat
127
IRP
Incident Response Plan
128
ISA
Interconnection Security Agreement
129
ISP
Internet Service Provider
130
ISSO
Information Systems Security Officer
131
ITCP
IT Contingency Plan
132
IV
Initialization Vector
133
KDC
Key Distribution Center
134
KEK
Key Encryption Key
135
L2TP
Layer 2 Tunneling Protocol
136
LAN
Local Access Network
137
LDAP
Lightweight Directory Access Protocol
138
LEAP
Lightweight Extensible Authentication Protocol
139
MaaS
Monitoring as a Service
140
MAC - Access
Mandatory Access Control
141
MAC - PC
Media Access Control
142
MAC - Crypt
Message Authentication Code
143
MAN
Metropolitan Area Network
144
MBR
Master Boot Record
145
MD5
Message Digest 5
146
MFG
Main Distribution Frame
147
MDM
Mobile Device Management
148
MFA
Multi-Factor Authentication
149
MFD
Multi-Function Device
150
MITM
Man-in-the-Middle
151
MMS
Multimedia Message Service
152
MOA
Memorandum of Agreement
153
MOU
Memorandum of Understanding
154
MPLS
Multi-protocol Label Switching
155
MSCHAP
Microsoft Challenge Handshake Authentication Protocol
156
MSP
Managed Service Provider
157
MTBF
Mean Time Between Failures
158
MTTF
Mean Time to Failure
159
MTTR
Mean Time to Repair/Recover
160
MTU
Maximum Transmission Unit
161
NAC
Network Access Control
162
NAT
Network Address Translation
163
NDA
Non-disclosure Agreement
164
NFC
Near Field Communication
165
NGAC
Next Generation Access Control
166
NIDS
Network Intrusion Detection System
167
NIPS
Network Intrusion Prevention System
168
NIST
National Institute of Standards & Technology
169
NTFS
New Technology File System
170
NTLM
New Technology LAN Manager
171
NTP
Network Time Protocol
172
OAUTH
Open Authorization
173
OCSP
Online Certificate Status Protocol
174
OID
Object Identifier
175
OS
Operating System
176
OTA
Over The Air
177
OVAL
Open Vulnerability Assessment Language
178
P12
PKCS #12
179
P2P
Peer to Peer
180
PaaS
Platform as a Service
181
PAC
Proxy Auto Configuration
182
PAM
Pluggable Authentication Modules
183
PAP
Password Authentication Protocol
184
PAT
Port Address Translation
185
PBKDF2
Password-based Key Derivation Function 2
186
PBX
Privacy Branch Exchange
187
PCAP
Packet Capture
188
PEAP
Protected Extensible Authentication Protocol
189
PED
Personal Electronic Device
190
PEM
Privacy-enhanced Electronic Mail
191
PFS
Perfect Forward Secrecy
192
PFX
Personal Exchange Format
193
PGP
Pretty Good Privacy
194
PHI
Personal Health Information
195
PII
Personally Identifiable Information
196
PIV
Personal Identity Verification
197
PKI
Public Key Infrastructure
198
POODLE
Padding Oracle on Downgrade Legacy Encryption
199
POP
Post Office Protocol
200
POTS
Plain Old Telephone Service
201
PPP
Point-to-Point Protocol
202
PPTP
Point-to-Point Tunneling Protocol
203
PSK
Pre-Shared Key
204
PTZ
Pan-Tilt-Zoom
205
RA
Registration Authority
206
RAD
Rapid Application Development
207
RADIUS
Remote Authentication Dial-In User Server
208
RAID
Redundant Array of Inexpensive Disks
209
RAS
Remote Access Server
210
RAT
Remote Access Trojan
211
RBAC - Control
Role-based Access Control
212
RBAC - Firewall
Rule-based Access Control
213
RC4
Rivest Cipher Version 4
214
RDP
Remote Desktop Protocol
215
RFID
Radio Frequency Identifier
216
RIPEMD
RACE Integrity Primitives Evaluation Message Digest
217
ROI
Return on Investment
218
RMF
Risk Management Framework
219
RPO
Recovery Point Objective
220
RSA
Rivest, Shamir, & Adleman
221
RTBH
Remotely Triggered Black Hole
222
RTO
Recovery Time Objective
223
RTOS
Real TIme Operating System
224
RTP
Real-time Transport Protocol
225
S/MIME
Secure/Multipurpose Internet Mail Extensions
226
SaaS
Software as a Service
227
SAML
Security Assertion Markup Language
228
SAN
Storage Area Network
229
SCADA
System Control and Data Acquistion
230
SCAP
Security Content Automatation Protocol
231
SCEP
Simple Certificate Enrollment Protocol
232
SCP
Secure Copy
233
SCSI
Small Computer System Interface
234
SDK
Software Development Kit
235
SDLC
Software Development Life Cycle
236
SDLM
Software Development Life Cycle Methodology
237
SDN
Software Defined Network
238
SED
Self-encrypted Drive
239
SEH
Structured Exception Handler
240
SFTP
Secured File Transfer Protocol
241
SHA
Secure Hashing Algorithm
242
SHTTP
Secure Hyper Text Transfer Protocol
243
SIEM
Security Information and Event Management
244
SIM
Subscriber Identity Module
245
SLA
Service Level Agreement
246
SLE
Single Loss Expectancy
247
SMB
Server Message Block
248
SMS
Short Message Block
249
SMTP
Simple Mail Transfer Protocol
250
SMTPS
Simple Mail Transfer Protocol Secure
251
SNMP
Simple Network Management Protocol
252
SOAP
Simple Object Access Protocol
253
SoC
System on Chip
254
SPF
Sender Policy Framework
255
SPIM
Spam over Instant Messaging
256
SPoF
Single Point of Failure
257
SQL
Structured Query Language
258
SRTP
Secure Real-Time Protocol
259
SSD
Solid State Drive
260
SSH
Secure Shell
261
SSID
Service Set Identifier
262
SSL
Secure Sockets Layer
263
SSO
Single Sign On
264
STP
Shielded Twisted Pair
265
TACACS+
Terminal Access Controller Access Control System Plus
266
TCP/IP
Transmission Control Protocol / Internet Protocol
267
TGT
Ticket Granting Ticket
268
TKIP
Temporal Key Integrity Protocol
269
TLS
Transport Layer Security
270
TOTP
Time-based One Time Password
271
TPM
Trusted Platform Module
272
TSIG
Transaction Signature
273
UAT
User Acceptance Testing
274
UAV
Unmanned Aerial Vehicle
275
UDP
User Datagram Protocol
276
UEFI
Unified Extensible Firmware Interface
277
UPS
Uninterruptable Power Supply
278
URI
Uniform Resource Identifier
279
URL
Universal Resource Locator
280
USB
Universal Serial Bus
281
USB OTG
USB On The Go
282
UTM
Unified Threat Management
283
UTP
Unshielded Twisted Pair
284
VDE
Virtual Desktop Environment
285
VDI
Virtual Desktop Infrastructure
286
VLAN
Virtual Local Area Network
287
VLSM
Variable Length SUbnet Masking
288
VM
Virtual Machine
289
VoIP
Voice over Internet Protocol
290
VPN
Virtual Private Network
291
VTC
Video Teleconferencing
292
WAF
Web Application Firewall
293
WAP
Wireless Access Point
294
WEP
Wired Equivalent Privacy
295
WIDS
Wireless Intrusion Detection System
296
WIPS
Wireless Intrusion Prevention System
297
WORM
Write Once Read Many
298
WPA
WiFi Protected Access
299
WPA2
WiFi Protected Access 2
300
WPS
WiFi Protected Setup
301
WTLS
Wireless TLS
302
XML
Extensible Markup Language
303
XOR
Exclusive OR
304
XSRF
Cross-site Request Forgery
305
XSS
Cross-site Scripting