SYO-701 Acronyms Flashcards

1
Q

AAA

A

Authentication, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AES-256

A

Advanced Encryption Standards 256-bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AH

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AI

A

Artificial Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AIS

A

Automated Indicator Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ALE

A

Annualized Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AP

A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ARO

A

Annualized Rate of Occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ASLR

A

Address Space Layout Randomization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ATT&CK

A

Adversarial Tactics, Techniques, and Common Knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AUP

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

AV

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

BASH

A

Bourne Again Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

BCP

A

Business Continuity Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

BGP

A

Border Gateway Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BIA

A

Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BIOS

A

Basic Input/Output System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BPA

A

Business Partners Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BPDU

A

Bridge Protocol Data Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
BYOD
Bring Your Own Device
26
CA
Certificate Authority
27
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart
28
CAR
Corrective Action Report
29
CASB
Cloud Access Security Broker
30
CBC
Cipher Block Chaining
31
CCMP
Counter Mode/CBC-MAC Protocol
32
CCTV
Closed-circuit Television
33
CERT
Computer Emergency Response Team
34
CFB
Cipher Feedback
35
CHAP
Challenge Handshake Authentication Protocol
36
CIA
Confidentiality, Integrity, Availability
37
CIO
Chief Information Officer
38
CIRT
Computer Incident Response Team
39
CMS
Content Management System
40
COOP
Continuity of Operation Planning
41
COPE
Corporate Owned, Personally Enabled
42
CP
Contingency Planning
43
CRC
Cyclical Redundancy Check
44
CRL
Certificate Revocation List
45
CSO
Chief Security Officer
46
CSP
Cloud Service Provider
47
CSR
Certificate Signing Request
48
CSRF
Cross-site Request Forgery
49
CSU
Channel Service Unit
50
CTM
Counter Mode
51
CTO
Chief Technology Officer
52
CVE
Common Vulnerability Enumeration
53
CVSS
Common Vulnerability Scoring System
54
CYOD
Choose Your Own Device
55
DAC
Discretionary Access Control
56
DBA
Database Administrator
57
DDoS
Distributed Denial of Service
58
DEP
Data Execution Prevention
59
DES
Digital Encryption Standard
60
DHCP
Dynamic Host Configuration Protocol
61
DHE
Diffie-Hellman Ephemeral
62
DKIM
DomainKeys Identified Mail
63
DLL
Dynamic Link Library
64
DLP
Data Loss Prevention
65
DMARC
Domain Message Authentication Reporting and Conformance
66
DNAT
Destination Network Address Translation
67
DNS
Domain Name System
68
DoS
Denial of Service
69
DPO
Data Privacy Officer
70
DRP
Disaster Recovery Plan
71
DSA
Digital Signature Algorithm
72
DSL
Digital Subscriber Line
73
EAP
Extensible Authentication Protocol
74
ECB
Electronic Code Book
75
ECDHE
Elliptic Curve Diffie-Hellman Ephemeral
75
ECC
Elliptic Curve Cryptography
76
ECDSA
Elliptic Curve Digital Signature Algorithm
77
EDR
Endpoint Detection and Response
78
EFS
Encrypted File System
79
ERP
Enterprise Resource Planning
80
ESN
Electronic Serial Number
81
ESP
Encapsulated Security Payload
82
FACL
File System Access Control List
83
FDE
Full Disk Encryption
84
FIM
File Integrity Management
85
FPGA
Field Programmable Gate Array
86
FRR
False Rejection Rate
87
FTP
File Transfer Protocol
88
FTPS
Secured File Transfer Protocol
89
GCM
Galois Counter Mode
90
GDPR
General Data Protection Regulation
91
GPG
Gnu Privacy Guard
92
GPO
Group Policy Object
93
GPS
Global Positioning System
94
GPU
Graphics Processing Unit
95
GRE
Generic Routing Encapsulation
96
HA
High Availability
97
HDD
Hard Disk Drive
98
HIDS
Host-based Intrusion Detection System
99
HIPS
Host-based Intrusion Prevention System
100
HMAC
Hashed Message Authentication Code
101
HOTP
HMAC-based One-time Password
102
HSM
Hardware Security Module
103
HTML
Hypertext Markup Language
104
HTTP
Hypertext Transfer Protocol
105
HTTPS
Hypertext Transfer Protocol Secure
106
IaaS
Infrastructure as a Service
107
IaC
Infrastructure as Code
108
IAM
Identity and Access Management
109
ICMP
Internet Control Message Protocol
110
ICS
Industrial Control Systems
111
IDEA
International Data Encryption Algorithm
112
IDF
Intermediate Distribution Frame
113
IdP
Identity Provider
114
IDS
Intrusion Detection System
115
IEEE
Institute of Electrical and Electronics Engineers
116
IKE
Internet Key Exchange
117
IM
Instant Messaging
118
IMAP
Internet Message Access Protocol
119
IoC
Indicators of Compromise
120
IoT
Internet of Things
121
IP
Internet Protocol
122
IPS
Intrusion Prevent System
123
IPSec
Internet Protocol Security
124
IR
Incident Response
125
IRC
Internet Relay Chat
126
IRP
Incident Response Plan
127
ISO
International Standards Organization
128
ISP
Internet Service Provider
129
ISSO
Information Systems Security Officer
130
IV
Initialization Vector
131
KDC
Key Distribution Center
132
KEK
Key Encryption Key
133
L2TP
Layer 2 Tunneling Protocol
134
LAN
Local Area Network
135
LDAP
Lightweight Directory Access Protocol
136
LEAP
Lightweight Extensible Authentication Protocol
137
MaaS
Monitoring as a Service
138
MAC (3 potential acronyms)
1. Mandatory Access Control 2. Media Access Control 3. Message Authentication Code
139
MAN
Metropolitan Area Network
140
MBR
Master Boot Record
141
MD5
Message Digest 5
142
MDF
Main Distribution Frame
143
MDM
Mobile Device Management
144
MFA
Multifactor Authentication
145
MFD
Multifunction Device
146
MFP
Multifunction Printer
147
ML
Machine Learning
148
MMS
Multimedia Message Service
149
MOA
Memorandum of Agreement
150
MOU
Memorandum of Understanding
151
MPLS
Multi-protocol Label Switching
152
MSA
Master Service Agreement
153
MSCHAP
Microsoft Challenge Handshake Authentication Protocol
154
MSP
Managed Service Provider
155
MSSP
Managed Security Service Provider
156
MTBF
Mean Time Between Failures
157
MTTF
Mean Time to Failure
158
MTTR
Mean Time to Recover
159
MTU
Maximum Transmission Unit
160
NAC
Network Access Control
161
NAT
Network Address Translation
162
NDA
Non-disclosure Agreement
163
NFC
Near Field Communication
164
NGFW
Next-generation Firewall
165
NIDS
Network-based Intrusion Detection System
166
NIPS
Network-based Intrusion Prevention System
167
NIST
National Institute of Standards & Technology
168
NTFS
New Technology File System
169
NTLM
New Technology LAN Manager
170
NTP
Network Time Protocol
171
OAUTH
Open Authorization
172
OCSP
Online Certificate Status Protocol
173
OID
Object Identifier
174
OS
Operating System
175
OSINT
Open-source Intelligence
176
OSPF
Open Shortest Path First
177
OT
Operation Technology
178
OTA
Over the Air
179
OVAL
Open Vulnerability Assessment Language
180
P12
PKCS #12
181
P2P
Peer to Peer
182
PaaS
Platform as a Service
183
PAC
Proxy Auto Configuration
184
PAM (2 possible acronyms)
1. Privileged Access Management 2. Pluggable Authentication Protocol
185
PAP
Password Authentication Protocol
186
PAT
Port Address Translation
187
PBKDF2
Password-based Key Derivation Function 2
188
PBX
Private Branch Exchange
189
PCAP
Packet Capture
190
PCI DSS
Payment Card Industry Data Security
191
PDU
Power Distribution Unit
192
PEAP
Protected Extensible Authentication Protocol
193
PED
Personal Electronic Device
194
PEM
Privacy Enhanced Mail
195
PFS
Perfect Forward Secrecy
196
PGP
Pretty Good Privacy
197
PHI
Personal Health Information
198
PII
Personally Identifiable Information
199
PIV
Personal Identity Verification
200
PKCS
Public Key Cryptography Standards
201
PKI
Public Key Infrastructure
202
POP
Post Office Protocol
203
POTS
Plain Old Telephone Service
204
PPP
Point-to-Point Protocol
205
PPTP
Point-to-Point Tunneling Protocol
206
PSK
Pre-shared Key
207
PTZ
Pan-tilt-zoom
208
PUP
Potentially Unwanted Program
209
RA (2 possible acronyms)
1. Recovery Agent 2. Registration Authority
210
RACE
Research and Development in Advanced Communications Technologies in Europe
211
RAD
Rapid Application Development
212
RADIUS
Remote Authentication Dial-in User Service
213
RAID
Redundant Array of Inexpensive Disks
214
RAS
Remote Access Server
215
RAT
Remote Access Trojan
216
RBAC
Rule/Role-based Access Control
217
RC4
Rivest Cipher version 4
218
RDP
Remote Desktop Protocol
219
RFID
Radio Frequency Identifier
220
RIPEMD
RACE Integrity Primitives Evaluation Message Digest
221
ROI
Rate on Investment
222
RPO
Recovery Point Objective
223
RSA
Rivest, Shamir, & Adleman
224
RTBH
Remotely Triggered Black Hole
225
RTO
Recovery Time Objective
226
RTOS
Real-time Operating System
227
RTP
Real-time Transport Protocol
228
S-MIME
Secure/Multipurpose Internet Mail Extensions
229
SaaS
Software as a Service
230
SAE
Simultaneous Authentication of Equals
231
SAML
Security Assertions Markup Language
232
SAN (2 possible acronyms)
1. Storage Area Network 2. Subject Alternative Name
233
SASE
Secure Access Service Edge
234
SCADA
Supervisory Control and Data Acquisition
235
SCAP
Security Content Automation Protocol
236
SCEP
Simple Certificate Enrollment Protocol
237
SD-WAN
Software-defined Wide Area Network
238
SDK
Software Development Kit
239
SDLC
Software Development Lifecycle
240
SDLM
Software Development Lifecycle Methodology
241
SDN
Software-defined Networking
242
SE Linux
Security-enhanced Linux
243
SED
Self-encrypting Drives
244
SEH
Structured Exception Handler
245
SFTP
Secured File Transfer Protocol
246
SHA
Secure Hashing Algorithm
247
SHTTP
Secure Hypertext Transfer Protocol
248
SIEM
Security Information and Event Management
249
SIM
Subscriber Identity Module
250
SLA
Service-level Agreement
251
SLE
Single Loss Expectancy
252
SMS
Short Message Service
253
SMTP
Simple Mail Transfer Protocol
254
SMTPS
Simple Mail Transfer Protocol Secure
255
SNMP
Simple Network Management Protocol
256
SOAP
Simple Object Access Protocol
257
SOAR
Security Orchestration, Automation, Response
258
SoC
System on Chip
259
SOC
Security Operations Center
260
SOW
Statement of Work
261
SPF
Sender Policy Framework
262
SPIM
Spam over Internet Messaging
263
SQL
Structured Query Language
264
SQLi
SQL Injection
265
SRTP
Secure Real-Time Protocol
266
SSD
Solid State Drive
267
SSH
Secure Shell
268
SSL
Secure Sockets Layer
269
SSO
Single Sign-on
270
STIX
Structured Threat Information eXchange
271
SWG
Secure Web Gateway
272
TACACS+
Terminal Access Controller Access Control System
273
TAXII
Trusted Automated eXchange of Indicator Information
274
TCP/IP
Transmission Control Protocol/Internet Protocol
275
TGT
Ticket Granting Ticket
276
TKIP
Temporal Key Integrity Protocol
277
TLS
Transport Layer Security
278
TOC
Time-of-check
279
TOTP
Time-based One-time Password
280
TOU
Time-of-use
281
TPM
Trusted Platform Module
282
TTP
Tactics, Techniques, and Procedures
283
TSIG
Transaction Signature
284
UAT
User Acceptance Testing
285
UAV
Unmanned Aerial Vehicle
286
UDP
User Datagram Protocol
287
UEFI
Unified Extensible Firmware Interface
288
UEM
Unified Endpoint Management
289
UPS
Uninterruptible Power Supply
290
URI
Uniform Resource Identifier
291
URL
Universal Resource Locator
292
USB
Universal Serial Bus
293
USB OTG
USB On the Go
294
UTM
Unified Threat Management
295
UTP
Unshielded Twisted Pair
296
VBA
Visual Basic
297
VDE
Virtual Desktop Environment
298
VDI
Virtual Desktop Infrastructure
299
VLAN
Virtual Local Area Network
300
VLSM
Variable Length Subnet Masking
301
VM
Virtual Machine
302
VoIP
Voice over IP
303
VPC
Virtual Private Cloud
304
VPN
Virtual Private Network
305
VTC
Video-Teleconferencing
306
WAF
Web Application Firewall
307
WAP
Wireless Access Point
308
WEP
Wired Equivalent Privacy
309
WIDS
Wireless Intrusion Detection System
310
WIPS
Wireless Intrusion Prevention System
311
WO
Work Order
312
WPA
Wi-Fi Protected Access
313
WPS
Wi-Fi Protected Setup
314
WTLS
Wireless TLS
315
XDR
Extended Detection and Response
316
XML
Extensible Markup Language
317
XOR
Exclusive Or
318
XSRF
Cross-site Request Forgery
319
XSS
Cross-site Scripting