Acroynms Flashcards

(74 cards)

1
Q

What does ACL stand for?

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does AES stand for?

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does AES-256 stand for?

A

Advanced Encryption Standards 256-bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does APT stand for?

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does BCP stand for?

A

Business Continuity Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does BYOD stand for?

A

Bring Your Own Device BYOD (Bring Your Own Device) is a policy or practice that allows employees to use their personal devices—like smartphones, tablets, and laptops—for work-related tasks and to access corporate resources.

While BYOD can increase productivity and flexibility, it also introduces security challenges, such as:
• Loss of control over the device
• Risk of data leakage
• Inconsistent patch management
• Greater exposure to malware or compromised networks

To manage these risks, organizations often implement:
• Mobile Device Management (MDM)
• Mobile Application Management (MAM)
• Remote wipe capabilities
• Containerization (separating personal and corporate data on the same device)
• Strong security policies (e.g., password enforcement, encryption)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does CA stand for?

A

Certificate Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does CIA stand for?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does CIRT stand for?

A

Computer Incident Response Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does CMS stand for?

A

Content Management System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does DDoS stand for?

A

Distributed Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does DHCP stand for?

A

Dynamic Host Configuration Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does DMARC stand for?

A

Domain Message Authentication Reporting and Conformance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does DNS stand for?

A

Domain Name System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does EAP stand for?

A

Extensible Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does GDPR stand for?

A

General Data Protection Regulation GDPR (General Data Protection Regulation) is a data protection law enacted by the European Union (EU) that went into effect on May 25, 2018. It is designed to protect the privacy and personal data of individuals within the EU and the European Economic Area (EEA).

Key principles of GDPR include:
• Lawfulness, fairness, and transparency
• Purpose limitation (data collected for a specific reason)
• Data minimization (collect only what’s necessary)
• Accuracy
• Storage limitation
• Integrity and confidentiality (security)
• Accountability

It gives individuals (called data subjects) rights over their personal data, such as:
• Right to be informed
• Right of access
• Right to rectification
• Right to erasure (also known as the “right to be forgotten”)
• Right to data portability

Organizations that fail to comply can face heavy fines—up to €20 million or 4% of global annual turnover, whichever is greater.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does HIDS stand for?

A

Host-based Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does IAM stand for?

A

Identity and Access Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does IPS stand for?

A

Intrusion Prevention System
IPS stands for Intrusion Prevention System. It is a network security technology that actively monitors traffic for malicious activity and can automatically take action to block or prevent those threats. It’s like a security guard that not only detects threats but also shuts them down in real time.

IPS is closely related to IDS (Intrusion Detection System), but the key difference is that while IDS only alerts, IPS detects and takes preventive action (like dropping packets, blocking IPs, or resetting connections).

IPS can be deployed in:
• Network-based (NIPS) – Monitors traffic across the network.
• Host-based (HIPS) – Monitors activity on individual systems.

  1. What You Need to Know for the Security+ Exam
    • IPS vs IDS:
    • IDS = Detects and alerts (passive).
    • IPS = Prevents and blocks (active).
    • Placement: IPS is usually inline, meaning it sits directly in the path of network traffic and can stop malicious packets before they reach their destination.
    • Techniques Used:
    • Signature-based detection – Matches patterns of known threats.
    • Anomaly-based detection – Detects deviations from normal behavior.
    • Policy-based detection – Enforces specific rules or policies.
    • Common Actions an IPS might take:
    • Drop malicious packets.
    • Block source IP addresses.
    • Reset connections.
    • Generate alerts/logs.
    • Security+ Exam Tips:
    • Be able to differentiate between IDS and IPS in scenarios.
    • Know that IPS is proactive and requires careful configuration to avoid blocking legitimate traffic (false positives).
    • Be familiar with the types (NIPS, HIPS) and detection methods.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does IoT stand for?

A

Internet of Things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does MFA stand for?

A

Multifactor Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What does NAT stand for?

A

Network Address Translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does OSINT stand for?

A

Open-source Intelligence OSINT (Open Source Intelligence) refers to the process of collecting and analyzing publicly available information to produce actionable intelligence. This data can come from a variety of legal and publicly accessible sources, such as:
• Social media platforms
• News articles and press releases
• Government publications
• Search engines
• Online forums
• WHOIS databases
• Public code repositories (like GitHub)

OSINT is widely used in cybersecurity, threat intelligence, and penetration testing to gather information about targets, identify vulnerabilities, and assess risks—all without hacking or unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does PaaS stand for?

A

Platform as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What does PKI stand for?
Public Key Infrastructure
26
What does RAID stand for?
Redundant Array of Inexpensive Disks
27
What does RDP stand for?
Remote Desktop Protocol
28
What does SaaS stand for?
Software as a Service
29
What does SIEM stand for?
Security Information and Event Management
30
What does SLA stand for?
Service-level Agreement
31
What does SOC stand for?
Security Operations Center
32
What does SSL stand for?
Secure Sockets Layer SSL (Secure Sockets Layer) is a cryptographic protocol designed to provide secure communication over a computer network, especially the internet. It works by encrypting the data that is transmitted between a client (like a web browser) and a server, ensuring confidentiality, data integrity, and authentication. SSL uses both symmetric and asymmetric encryption: • Asymmetric encryption is used during the initial handshake to securely exchange keys. • Symmetric encryption is used after the handshake for fast, secure data transmission. SSL certificates, issued by Certificate Authorities (CAs), authenticate the server and initiate the encrypted session. Note: SSL has been deprecated in favor of TLS (Transport Layer Security), which is more secure. However, the term “SSL” is still commonly used when referring to secure connections (like “SSL certificates”), even when TLS is technically in use. ⸻ 2. What You Need to Know for the Security+ Exam: • SSL is deprecated—know that TLS is the modern replacement. • Understand the purpose of SSL/TLS: to provide secure communication via encryption and authentication. • Be familiar with where it’s used: • HTTPS (SSL/TLS over HTTP) • Email protocols like SMTPS, IMAPS, POP3S • Know the difference between SSL/TLS and other encryption protocols (e.g., IPsec, SSH). • You may be asked to: • Identify SSL as an outdated protocol still used in naming (e.g., “SSL certificate”) • Choose TLS over SSL when asked about best practices • Recognize ports commonly associated with SSL/TLS: • HTTPS (Port 443) • SMTPS (Port 465) • Know how the SSL/TLS handshake works at a high level (asymmetric key exchange, then symmetric encryption).
33
What does TTP stand for?
Tactics, Techniques, and Procedures
34
What does UDP stand for?
User Datagram Protocol
35
What does VPN stand for?
Virtual Private Network
36
What does WAF stand for?
Web Application Firewall
37
What does XML stand for?
Extensible Markup Language
38
What does ACL stand for?
Access Control List General Overview of the Concept: ACL (Access Control List) is a security mechanism that defines which users or system processes are granted access to objects, as well as what operations are allowed on those objects. Think of it like a permissions list tied to a resource (e.g., file, folder, network device). There are two main types: • File system ACLs – Determine permissions for files and directories (e.g., read, write, execute). • Network ACLs – Used in firewalls and routers to filter traffic based on criteria like IP addresses, ports, or protocols. ACLs operate based on a top-down evaluation—rules are processed in order, and the first match determines the action (allow or deny). ⸻ 2. What You Need to Know for the Security+ Exam: • Definition: ACL is a list that controls who can access what and how. • Know the difference between: • Discretionary Access Control (DAC) where users can modify ACLs • Mandatory Access Control (MAC) where ACLs are fixed by policy • In network security, understand how ACLs are used to permit or deny traffic based on: • Source/destination IP address • Port number • Protocol • Recognize how ACLs are implemented in: • Routers • Firewalls • Operating systems • You might be asked to: • Interpret basic ACL rules • Identify use cases for ACLs in securing a network • Compare ACLs with other access control mechanisms (e.g., RBAC, ABAC)
39
What does AES stand for?
Advanced Encryption Standard
40
What does AES-256 stand for?
Advanced Encryption Standards 256-bit
41
What does APT stand for?
Advanced Persistent Threat
42
What does BCP stand for?
Business Continuity Planning GDPR (General Data Protection Regulation) is a data protection law enacted by the European Union (EU) that went into effect on May 25, 2018. It is designed to protect the privacy and personal data of individuals within the EU and the European Economic Area (EEA). Key principles of GDPR include: • Lawfulness, fairness, and transparency • Purpose limitation (data collected for a specific reason) • Data minimization (collect only what’s necessary) • Accuracy • Storage limitation • Integrity and confidentiality (security) • Accountability It gives individuals (called data subjects) rights over their personal data, such as: • Right to be informed • Right of access • Right to rectification • Right to erasure (also known as the “right to be forgotten”) • Right to data portability Organizations that fail to comply can face heavy fines—up to €20 million or 4% of global annual turnover, whichever is greater.
43
What does BYOD stand for?
Bring Your Own Device
44
What does CA stand for?
Certificate Authority
45
What does CIA stand for?
Confidentiality, Integrity, Availability
46
What does CIRT stand for?
Computer Incident Response Team
47
What does CMS stand for?
Content Management System
48
What does DDoS stand for?
Distributed Denial of Service DDoS stands for Distributed Denial of Service. It’s a type of cyberattack where multiple compromised systems (often part of a botnet) flood a target (like a server, website, or network) with massive amounts of traffic, overwhelming its resources and making it unavailable to legitimate users. Unlike a regular DoS (Denial of Service) attack that comes from one source, DDoS attacks come from many sources simultaneously, making them much harder to block. Common types of DDoS attacks include: • Volumetric Attacks (e.g., UDP floods, ICMP floods) – Consume bandwidth. • Protocol Attacks (e.g., SYN floods) – Exploit weaknesses in layer 3 and 4 protocols. • Application Layer Attacks (e.g., HTTP floods) – Target specific web apps/services. ⸻ 2. What You Need to Know for the Security+ Exam • DDoS = multiple sources; DoS = single source. • Common DDoS techniques: • Botnets – A network of infected devices controlled by an attacker. • Amplification – Exploiting protocols (like DNS or NTP) to increase the size of traffic directed at the target. • Reflection – Spoofing the victim’s IP so that third-party servers send traffic to the victim. • Indicators of DDoS: • Unusually high traffic. • Service slowdowns or outages. • Logs showing massive connections from multiple IPs. • Mitigation Techniques: • Rate limiting – Throttling the number of requests. • Geo-blocking or IP blacklisting. • Web Application Firewalls (WAF). • Content Delivery Networks (CDNs) – Can help absorb attack traffic. • DDoS mitigation services – e.g., Cloudflare, Akamai. • Exam Tip: • If a question mentions flooding a system, traffic from many locations, or botnets, it’s likely referring to a DDoS attack. • Know the difference between volumetric, protocol, and application-level attack
49
What does DHCP stand for?
Dynamic Host Configuration Protocol
50
What does DMARC stand for?
Domain Message Authentication Reporting and Conformance
51
What does DNS stand for?
Domain Name System
52
What does EAP stand for?
Extensible Authentication Protocol
53
What does GDPR stand for?
General Data Protection Regulation
54
What does HIDS stand for?
Host-based Intrusion Detection System
55
What does IAM stand for?
Identity and Access Management
56
What does IPS stand for?
Intrusion Prevention System
57
What does IoT stand for?
Internet of Things
58
What does MFA stand for?
Multifactor Authentication
59
What does NAT stand for?
Network Address Translation
60
What does OSINT stand for?
Open-source Intelligence
61
What does PaaS stand for?
Platform as a Service
62
What does PKI stand for?
Public Key Infrastructure
63
What does RAID stand for?
Redundant Array of Inexpensive Disks
64
What does RDP stand for?
Remote Desktop Protocol
65
What does SaaS stand for?
Software as a Service
66
What does SIEM stand for?
Security Information and Event Management
67
What does SLA stand for?
Service-level Agreement
68
What does SOC stand for?
Security Operations Center
69
What does SSL stand for?
Secure Sockets Layer
70
What does TTP stand for?
Tactics, Techniques, and Procedures
71
What does UDP stand for?
User Datagram Protocol
72
What does VPN stand for?
Virtual Private Network
73
What does WAF stand for?
Web Application Firewall
74
What does XML stand for?
Extensible Markup Language