ACRONYMS Flashcards

Get familiar with the important acronyms of Security plus exam

1
Q

AAA

A

Authentication Authorization and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AES-256

A

Advanced Encryption Standards 256-bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AH

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AI

A

Artificial Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AIS

A

Automated Indicator Sharing

Automated Indicator Sharing (AIS) is a system where cybersecurity organizations automatically share information about cyber threats with each other. This real-time exchange of data helps everyone identify and defend against attacks faster and more effectively. It’s like a neighborhood watch program, but for cyber threats.
Cybersecurity and Infrastructure Security Agency (CISA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ALE

A

Annualized Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AP

A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ARO

A

Annualized Rate of Occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ASLR

A

Address Space Layout Randomization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ATT&CK

A

Adversarial Tactics Techniques and Common Knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AUP

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

AV

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

BASH

A

Bourne Again Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

BCP

A

Business Continuity Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

BGP

A

Border Gateway Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BIA

A

Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BIOS

A

Basic Input/Output System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BPA

A

Business Partners Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BPDU

A

Bridge Protocol Data Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
BYOD
Bring Your Own Device
26
CA
Certificate Authority
27
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart
28
CAR
Corrective Action Report
29
CASB
Cloud Access Security Broker
30
CBC
Cipher Block Chaining Cipher Block Chaining (CBC) is a way to encrypt information in chunks. Each chunk is scrambled with the key, and then also linked to the previous chunk with a special operation. This chaining effect makes decryption rely on all the previous blocks, improving security compared to simpler encryption methods.
31
CCMP
Counter Mode CBC-MAC Protocol
32
CCTV
Closed-circuit Television
33
CERT
Computer Emergency Response Team
34
CFB
Cipher Feedback
35
CHAP
Challenge Handshake Authentication Protocol
36
CIA
Confidentiality Integrity Availability
37
CIO
Chief Information Officer
38
CIRT
Computer Incident Response Team
39
CMS
Content Management System
40
COOP
Continuity of Operation Planning
41
COPE
Corporate-Owned, Personally Enabled
42
CP
Contingency Planning
43
CRC
Cyclical Redundancy Check
44
CRL
Certificate Revocation List
45
CSO
Chief Security Officer
46
CSP
Cloud Service Provider
47
CSR
Certificate Signing Request
48
CSRF
Cross-site Request Forgery
49
CSU
Channel Service Unit
50
CTM
Counter Mode
51
CTO
Chief Technology Officer
52
CVE
Common Vulnerability Enumeration
53
CVSS
Common Vulnerability Scoring System
54
CYOD
Choose Your Own Device
55
DAC
Discretionary Access Control
56
DBA
Database Administrator
57
DDoS
Distributed Denial of Service
58
DEP
Data Execution Prevention
59
DES
Digital Encryption Standard
60
DHCP
Dynamic Host Configuration Protocol
61
DHE
Diffie-Hellman Ephemeral
62
DKIM
DomainKeys Identified Mail
63
DLL
Dynamic Link Library
64
DLP
Data Loss Prevention
65
DMARC
Domain Message Authentication Reporting and Conformance
66
DNAT
Destination Network Address Translation
67
DNS
Domain Name System
68
DoS
Denial of Service
69
DPO
Data Privacy Officer
70
DRP
Disaster Recovery Plan
71
DSA
Digital Signature Algorithm
72
DSL
Digital Subscriber Line
73
EAP
Extensible Authentication Protocol
74
ECB
Electronic Code Book
75
ECC
Elliptic Curve Cryptography
76
ECDHE
Elliptic Curve Diffie-Hellman Ephemeral
77
ECDSA
Elliptic Curve Digital Signature Algorithm
78
EDR
Endpoint Detection and Response
79
EFS
Encrypted File System
80
ERP
Enterprise Resource Planning
81
ESN
Electronic Serial Number
82
ESP
Encapsulated Security Payload
83
FACL
File System Access Control List
84
FDE
Full Disk Encryption
85
FIM
File Integrity Management
86
FPGA
Field Programmable Gate Array
87
FRR
False Rejection Rate
88
FTP
File Transfer Protocol
89
FTPS
Secured File Transfer Protocol
90
GCM
Galois Counter Mode
91
GDPR
General Data Protection Regulation
92
GPG
Gnu Privacy Guard
93
GPO
Group Policy Object
94
GPS
Global Positioning System
95
GPU
Graphics Processing Unit
96
GRE
Generic Routing Encapsulation
97
HA
High Availability
98
HDD
Hard Disk Drive
99
HIDS
Host-based Intrusion Detection System
100
HIPS
Host-based Intrusion Prevention System
101
HMAC
Hashed Message Authentication Code
102
HOTP
HMAC-based One-time Password
103
HSM
Hardware Security Module
104
HTML
Hypertext Markup Language
105
HTTP
Hypertext Transfer Protocol
106
HTTPS
Hypertext Transfer Protocol Secure
107
HVAC
Heating, Ventilation, and Air Conditioning
108
IaaS
Infrastructure as a Service
109
IaC
Infrastructure as Code
110
IAM
Identity and Access Management
111
ICMP
Internet Control Message Protocol
112
ICS
Industrial Control Systems
113
IDEA
International Data Encryption Algorithm
114
IDF
Intermediate Distribution Frame
115
IdP
Identity Provider
116
IDS
Intrusion Detection System
117
IEEE
Institute of Electrical and Electronics Engineers
118
IKE
Internet Key Exchange
119
IM
Instant Messaging
120
IMAP
Internet Message Access Protocol
121
IoC
Indicators of Compromise
122
IoT
Internet of Things
123
IP
Internet Protocol
124
IPS
Intrusion Prevention System
125
IPSec
Internet Protocol Security
126
IR
Incident Response
127
IRC
Internet Relay Chat
128
IRP
Incident Response Plan
129
ISO
International Standards Organization
130
ISP
Internet Service Provider
131
ISSO
Information Systems Security Officer
132
IV
Initialization Vector
133
KDC
Key Distribution Center
134
KEK
Key Encryption Key
135
L2TP
Layer 2 Tunneling Protocol
136
LAN
Local Area Network
137
LDAP
Lightweight Directory Access Protocol
138
LEAP
Lightweight Extensible Authentication rotocol
139
MaaS
Monitoring as a Service
140
MAC
Mandatory Access Control
141
MAC
Media Access Control
142
MAC
Message Authentication Code
143
MAN
Metropolitan Area Network
144
MBR
Master Boot Record
145
MD5
Message Digest 5
146
MDF
Main Distribution Frame
147
MDM
Mobile Device Management
148
MFA
Multifactor Authentication
149
MFD
Multifunction Device
150
MFP
Multifunction Printer
151
ML
Machine Learning
152
MMS
Multimedia Message Service
153
MOA
Memorandum of Agreement
154
MOU
Memorandum of Understanding
155
MPLS
Multi-protocol Label Switching
156
MSA
Master Service Agreement
157
MSCHAP
Microsoft Challenge Handshake uthentication Protocol
158
MSP
Managed Service Provider
159
MSSP
Managed Security Service Provider
160
MTBF
Mean Time Between Failures
161
MTTF
Mean Time to Failure
162
MTTR
Mean Time to Recover
163
MTU
Maximum Transmission Unit
164
NAC
Network Access Control
165
NAT
Network Address Translation
166
NDA
Non-disclosure Agreement
167
NFC
Near Field Communication
168
NGFW
Next-generation Firewall
169
NIDS
Network-based Intrusion Detection System
170
NIPS
Network-based Intrusion Prevention System
171
NIST
National Institute of Standards & Technology
172
NTFS
New Technology File System
173
NTLM
New Technology LAN Manager
174
NTP
Network Time Protocol
175
OAUTH
Open Authorization
176
OCSP
Online Certificate Status Protocol
177
OID
Object Identifier
178
OS
Operating System
179
OSINT
Open-source Intelligence
180
OSPF
Open Shortest Path First
181
OT
Operational Technology
182
OTA
Over the Air
183
OVAL
Open Vulnerability Assessment Language
184
P12
PKCS #12
185
P2P
Peer to Peer
186
PaaS
Platform as a Service
187
PAC
Proxy Auto Configuration
188
PAM
Privileged Access Management
189
PAM
Pluggable Authentication Modules
190
PAP
Password Authentication Protocol
191
PAT
Port Address Translation
192
PBKDF2
Password-based Key Derivation Function 2
193
PBX
Private Branch Exchange
194
PCAP
Packet Capture
195
PCIDSS
Payment Card Industry Data Security Standard
196
PDU
Power Distribution Unit
197
PEAP
Protected Extensible Authentication Protocol
198
PED
Personal Electronic Device
199
PEM
Privacy Enhanced Mail
200
PFS
Perfect Forward Secrecy
201
PGP
Pretty Good Privacy
202
PHI
Personal Health Information
203
PII
Personally Identifiable Information
204
PIV
Personal Identity Verification
205
PKCS
Public Key Cryptography Standards
206
PKI
Public Key Infrastructure
207
POP
Post Office Protocol
208
POTS
Plain Old Telephone Service
209
PPP
Point-to-Point Protocol
210
PPTP
Point-to-Point Tunneling Protocol
211
PSK
Pre-shared Key
212
PTZ
Pan-tilt-zoom
213
PUP
Potentially Unwanted Program RA Recovery Agent
214
RA
Registration Authority
215
RACE
Research and Development in Advanced Communications Technologies in Europe
216
RAD
Rapid Application Development
217
RADIUS
Remote Authentication Dial-in User Service
218
RAID
Redundant Array of Inexpensive Disks
219
RAS
Remote Access Server
220
RAT
Remote Access Trojan
221
RBAC
Role-based Access Control
222
RBAC
Rule-based Access Control
223
RC4
Rivest Cipher version 4
224
RDP
Remote Desktop Protocol
225
RFID
Radio Frequency Identifier
226
RIPEMD
RACE Integrity Primitives Evaluation Message Digest
227
ROI
Return on Investment
228
RPO
Recovery Point Objective
229
RSA
Rivest–Shamir–Adleman
230
RTBH
Remotely Triggered Black Hole
231
RTO
Recovery Time Objective
232
RTOS
Real-time Operating System
233
RTP
Real-time Transport Protocol
234
S/MIME
Secure/Multipurpose Internet Mail Extensions
235
SaaS
Software as a Service
236
SAE
Simultaneous Authentication of Equals
237
SAML
Security Assertions Markup Language
238
SAN
Storage Area Network
239
SAN
Subject Alternative Name
240
SASE
Secure Access Service Edge
241
SCADA
Supervisory Control and Data Acquisition
242
SCAP
Security Content Automation Protocol
243
SCEP
Simple Certificate Enrollment Protocol
244
SD-WAN
Software-defined Wide Area Network
245
SDK
Software Development Kit
246
SDLC
Software Development Lifecycle
247
SDLM
Software Development Lifecycle Methodology
248
SDN
Software-defined Networking
249
SE Linux
Security-enhanced Linux
250
SED
Self-encrypting Drives
251
SEH
Structured Exception Handler
252
SFTP
Secured File Transfer Protocol
253
SHA
Secure Hashing Algorithm
254
SHTTP
Secure Hypertext Transfer Protocol
255
SIEM
Security Information and Event Management
256
SIM
Subscriber Identity Module
257
SLA
Service-level **Agreement**
258
SLE
Single Loss Expectancy
259
SMS
Short Message Service
260
SMTP
Simple Mail Transfer Protocol
261
SMTPS
Simple Mail Transfer Protocol Secure
262
SNMP
Simple Network Management Protocol
263
SOAP
Simple Object Access Protocol
264
SOAR
Security Orchestration Automation and Response
265
SoC
System on Chip
266
SOC
Security Operations Center
267
SOW
Statement of Work
268
SPF
Sender Policy Framework
269
SPIM
Spam over Internet Messaging
270
SQL
Structured Query Language
271
SQLi
SQL Injection
272
SRTP
Secure Real-Time Protocol
273
SSD
Solid State Drive
274
SSH
Secure Shell
275
SSL
Secure Sockets Layer
276
SSO
Single Sign-on
277
STIX
Structured Threat Information eXchange
278
SWG
Secure Web Gateway
279
TACACS+
Terminal Access Controller Access Control ystem
280
TAXII
Trusted Automated eXchange of Indicator Information
281
TCP/IP
Transmission Control Protocol/Internet rotocol
282
TGT
Ticket Granting Ticket
283
TKIP
Temporal Key Integrity Protocol
284
TLS
Transport Layer Security
285
TOC
Time-of-check
286
TOTP
Time-based One-time Password
287
TOU
Time-of-use
288
TPM
Trusted Platform Module
289
TTP
Tactics Techniques and Procedures
290
TSIG
Transaction Signature
291
UAT
User Acceptance Testing
292
UAV
Unmanned Aerial Vehicle
293
UDP
User Datagram Protocol
294
UEFI
Unified Extensible Firmware Interface
295
UEM
Unified Endpoint Management
296
UPS
ninterruptable Power Supply
297
URI
Uniform Resource Identifier
298
URL
Universal Resource Locator
299
USB
Universal Serial Bus
300
USB
OTG USB On the Go
301
UTM
Unified Threat Management
302
UTP
Unshielded Twisted Pair
303
VBA
Visual Basic
304
VDE
Virtual Desktop Environment
305
VDI
Virtual Desktop Infrastructure
306
VLAN
Virtual Local Area Network
307
VLSM
Variable Length Subnet Masking
308
VM
Virtual Machine
309
VoIP
Voice over IP
310
VPC
Virtual Private Cloud
311
VPN
Virtual Private Network
312
VTC
Video Teleconferencing
313
WAF
Web Application Firewall
314
WAP
Wireless Access Point
315
WEP
Wired Equivalent Privacy
316
WIDS
Wireless Intrusion Detection System
317
WIPS
Wireless Intrusion Prevention System
318
WO
Work Order
319
WPA
Wi-Fi Protected Access
320
WPS
Wi-Fi Protected Setup
321
WTLS
Wireless TLS
322
XDR
Extended Detection and Response
323
XML
Extensible Markup Language
324
XOR
Exclusive Or
325
XSRF
Cross-site Request Forgery
326
XSS
Cross-site Scripting