Comp TIA Flashcards

1
Q

AAA

A

Authentication, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AES-256

A

Advanced Encryption Standards 256-bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AH

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AI

A

Artificial Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AIS

A

Automated Indicator Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ALE

A

Annualized Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AP

A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ARO

A

Annualized Rate of Occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ASLR

A

Address Space Layout Randomization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ATT&CK

A

Adversarial Tactics, Techniques, and Common Knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AUP

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

AV

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

BASH

A

Bourne Again Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

BCP

A

Business Continuity Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

BGP

A

Border Gateway Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BIA

A

Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BIOS

A

Basic Input/Output System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BPA

A

Business Partners Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BPDU

A

Bridge Protocol Data Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
BYOD
Bring Your Own Device
26
CA
Certificate Authority
27
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart
28
CAR
Corrective Action Report
29
CASB
Cloud Access Security Broker
30
CBC
Cipher Block Chaining
31
CCMP
Counter Mode/CBC-MAC Protocol
32
CCTV
Closed-circuit Television
33
CERT
Computer Emergency Response Team
34
CFB
Cipher Feedback
35
CHAP
Challenge Handshake Authentication Protocol
36
CIA
Confidentiality, Integrity, Availability
37
CIO
Chief Information Officer
38
CIRT
Computer Incident Response Team
39
CMS
Content Management System
40
COOP
Continuity of Operation Planning
41
COPE
Corporate Owned, Personally Enabled
42
CP
Contingency Planning
43
CRC
Cyclical Redundancy Check
44
CRL
Certificate Revocation List
45
CSO
Chief Security Officer
46
CSP
Cloud Service Provider
47
CSR
Certificate Signing Request
48
CSRF
Cross-site Request Forgery
49
CSU
Channel Service Unit
50
CTM
Counter Mode
51
CTO
Chief Technology Officer
52
CVE
Common Vulnerability Enumeration
53
CVSS
Common Vulnerability Scoring System
54
CYOD
Choose Your Own Device
55
DAC
Discretionary Access Control
56
DBA
Database Administrator
57
DDoS
Distributed Denial of Service
58
DEP
Data Execution Prevention
59
DES
Digital Encryption Standard
60
DHCP
Dynamic Host Configuration Protocol
61
DHE
Diffie-Hellman Ephemeral
62
DKIM
DomainKeys Identified Mail
63
DLL
Dynamic Link Library
64
DLP
Data Loss Prevention
65
DMARC
Domain Message Authentication Reporting and Conformance
66
DNAT
Destination Network Address Translation
67
DNS
Domain Name System
68
DoS
Denial of Service
69
DPO
Data Privacy Officer
70
DRP
Disaster Recovery Plan
71
DSA
Digital Signature Algorithm
72
DSL
Digital Subscriber Line
73
EAP
Extensible Authentication Protocol
74
ECB
Electronic Code Book
75
ECC
Elliptic Curve Cryptography
76
ECDHE
Elliptic Curve Diffie-Hellman Ephemeral
77
ECDSA
Elliptic Curve Digital Signature Algorithm
78
EDR
Endpoint Detection and Response
79
EFS
Encrypted File System
80
ERP
Enterprise Resource Planning
81
ESN
Electronic Serial Number
82
ESP
Encapsulated Security Payload
83
FACL
File System Access Control List
84
FDE
Full Disk Encryption
85
FIM
File Integrity Management
86
FPGA
Field Programmable Gate Array
87
FRR
False Rejection Rate
88
FTP
File Transfer Protocol
89
FTPS
Secured File Transfer Protocol
90
GCM
Galois Counter Mode
91
GDPR
General Data Protection Regulation
92
GPG
Gnu Privacy Guard
93
GPO
Group Policy Object
94
GPS
Global Positioning System
95
HDD
Hard Disk Drive
96
HIDS
Host-based Intrusion Detection System
97
HIPS
Host-based Intrusion Prevention System
98
HMAC
Hashed Message Authentication Code
99
HOTP
HMAC-based One-time Password
100
HSM
Hardware Security Module
101
HTML
Hypertext Markup Language
102
HTTP
Hypertext Transfer Protocol
103
HTTPS
Hypertext Transfer Protocol Secure
104
HVAC
Heating, Ventilation Air Conditioning
105
IaaS
Infrastructure as a Service
106
IaC
Infrastructure as Code
107
IAM
Identity and Access Management
108
ICMP
Internet Control Message Protocol
109
IDS
Intrusion Detection System
110
IEEE
Institute of Electrical and Electronics Engineers
111
IKE
Internet Key Exchange
112
IM
Instant Messaging
113
IMAP
Internet Message Access Protocol
114
IoC
Indicators of Compromise
115
IoT
Internet of Things
116
IP
Internet Protocol
117
IR
Incident Response
118
IV
Initialization Vector
119
LEAP
Lightweight Extensible Authentication Protocol
120
MaaS
Monitoring as a Service
121
MAC
Mandatory Access Control
122
MAC
Media Access Control
123
MAC
Message Authentication Code
124
MAN
Metropolitan Area Network
125
MBR
Master Boot Record
126
MD5
Message Digest 5
127
MDF
Main Distribution Frame
128
MDM
Mobile Device Management
129
MFA
Multifactor Authentication
130
MFD
Multifunction Device
131
MFP
Multifunction Printer
132
ML
Machine Learning
133
MMS
Multimedia Message Service
134
MOA
Memorandum of Agreement
135
MOU
Memorandum of Understanding
136
MPLS
Multi-protocol Label Switching
137
MSA
Master Service Agreement
138
MSCHAP
Microsoft Challenge Handshake Authentication Protocol
139
MSP
Managed Service Provider
140
MSSP
Managed Security Service Provider
141
MTBF
Mean Time Between Failures
142
MTTF
Mean Time to Failure
143
MTTR
Mean Time to Recover
144
MTU
Maximum Transmission Unit
145
NAC
Network Access Control
146
NAT
Network Address Translation
147
NDA
Non-disclosure Agreement
148
NFC
Near Field Communication
149
NGFW
Next-generation Firewall
150
NIDS
Network-based Intrusion Detection System
151
NIPS
Network-based Intrusion Prevention System
152
NIST
National Institute of Standards & Technology
153
NTFS
New Technology File System
154
NTLM
New Technology LAN Manager
155
NTP
Network Time Protocol
156
OAUTH
Open Authorization
157
OCSP
Online Certificate Status Protocol
158
OID
Object Identifier
159
OS
Operating System
160
OSINT
Open-source Intelligence
161
OSPF
Open Shortest Path First
162
OTA
Over the Air
163
OVAL
Open Vulnerability Assessment Language
164
P12
PKCS #12
165
P2P
Peer to Peer
166
PaaS
Platform as a Service
167
PAC
Proxy Auto Configuration
168
PAM
Privileged Access Management
169
PAM
Pluggable Authentication Modules
170
PAP
Password Authentication Protocol
171
PAT
Port Address Translation
172
PBKDF2
Password-based Key Derivation Function 2
173
PBX
Private Branch Exchange
174
PCAP
Packet Capture
175
PCI DSS
Payment Card Industry Data Security Standard
176
PDU
Power Distribution Unit
177
PEAP
Protected Extensible Authentication Protocol
178
PED
Personal Electronic Device
179
PEM
Privacy Enhanced Mail
180
PFS
Perfect Forward Secrecy
181
PGP
Pretty Good Privacy
182
PHI
Personal Health Information
183
PII
Personally Identifiable Information
184
PKI
Public Key Infrastructure
185
POP
Post Office Protocol
186
POTS
Plain Old Telephone Service
187
PPP
Point-to-Point Protocol
188
PPTP
Point-to-Point Tunneling Protocol
189
PSK
Pre-shared Key
190
PTZ
Pan-tilt-zoom
191
PUP
Potentially Unwanted Program
192
RA
Recovery Agent
193
RACE
Registration Authority
194
PIV
Personal Identity Verification
195
PKCS
Public Key Cryptography Standards
196
RAD
Rapid Application Development
197
RADIUS
Remote Authentication Dial-in User Service
198
RAID
Redundant Array of Inexpensive Disks
199
RAS
Remote Access Server
200
RAT
Remote Access Trojan
201
RBAC
Role-based Access Control
202
RBAC
Rule-based Access Control
203
RC4
Rivest Cipher version 4
204
RDP
Remote Desktop Protocol
205
RFID
Radio Frequency Identifier
206
RIPEMD
RACE Integrity Primitives Evaluation Message Digest
207
ROI
Return on Investment
208
RPO
Recovery Point Objective
209
RSA
Rivest, Shamir, & Adleman
210
RTBH
Remotely Triggered Black Hole
211
RTO
Recovery Time Objective
212
RTOS
Real-time Operating System
213
RTP
Real-time Transport Protocol
214
S/MIME
Secure/Multipurpose Internet Mail Extensions
215
SaaS
Software as a Service
216
SAE
Simultaneous Authentication of Equals
217
SAML
Security Assertions Markup Language
218
SAN
Storage Area Network
219
SAN
Subject Alternative Name
220
SASE
Secure Access Service Edge
221
SCADA
Supervisory Control and Data Acquisition
222
SCAP
Security Content Automation Protocol
223
SCEP
Simple Certificate Enrollment Protocol
224
SD-WAN
Software-defined Wide Area Network
225
SDK
Software Development Kit
226
SDLC
Software Development Lifecycle
227
SDLM
Software Development Lifecycle Methodology
228
SDN
Software-defined Networking
229
SE Linux
Security-enhanced Linux
230
SED
Self-encrypting Drives
231
SEH
Structured Exception Handler
232
SFTP
Secured File Transfer Protocol
233
SHA
Secure Hashing Algorithm
234
SHTTP
Secure Hypertext Transfer Protocol
235
SIEM
Security Information and Event Management
236
SIM
Subscriber Identity Module
237
SLA
Service-level Agreement
238
SLE
Single Loss Expectancy
239
SMS
Short Message Service
240
SMTP
Simple Mail Transfer Protocol
241
SMTPS
Simple Mail Transfer Protocol Secure
242
SNMP
Simple Network Management Protocol
243
SOAP
Simple Object Access Protocol
244
SOAR
Security Orchestration, Automation, Response
245
SoC
System on Chip
246
SOC
Security Operations Center
247
SOW
Statement of Work
248
SPF
Sender Policy Framework
249
SPIM
Spam over Internet Messaging
250
SQL
Structured Query Language
251
SQLi
SQL Injection
252
SRTP
Secure Real-Time Protocol
253
SSD
Solid State Drive
254
SSH
Secure Shell
255
SSL
Secure Sockets Layer
256
SSO
Single Sign-on
257
STIX
Structured Threat Information eXchange
258
SWG
Secure Web Gateway
259
TACACS+
Terminal Access Controller Access Control System
260
TAXII
Trusted Automated eXchange of Indicator Information
261
TCP/IP
Transmission Control Protocol/Internet Protocol
262
TGT
Ticket Granting Ticket
263
TKIP
Temporal Key Integrity Protocol
264
TLS
Transport Layer Security
265
TOC
Time-of-check
266
TOTP
Time-based One-time Password
267
TOU
Time-of-use
268
TPM
Trusted Platform Module
269
TTP
Tactics, Techniques, and Procedures
270
TSIG
Transaction Signature
271
UAT
User Acceptance Testing
272
UAV
Unmanned Aerial Vehicle
273
UDP
User Datagram Protocol
274
UEFI
Unified Extensible Firmware Interface
275
UEM
Unified Endpoint Management
276
UPS
Uninterruptable Power Supply
277
URI
Uniform Resource Identifier
278
URL
Universal Resource Locator
279
USB
Universal Serial Bus
280
UTM
Unified Threat Management
281
UTP
Unshielded Twisted Pair
282
VBA
Visual Basic
283
VDE
Virtual Desktop Environment
284
VDI
Virtual Desktop Infrastructure
285
VLAN
Virtual Local Area Network
286
VLSM
Variable Length Subnet Masking
287
VM
Virtual Machine
288
VoIP
Voice over IP
289
VPC
Virtual Private Cloud
290
VPN
Virtual Private Network
291
VTC
Video Teleconferencing
292
WAF
Web Application Firewall
293
WAP
Wireless Access Point
294
WEP
Wired Equivalent Privacy
295
WIDS
Wireless Intrusion Detection System
296
WIPS
Wireless Intrusion Prevention System
297
WO
Work Order
298
WPA
Wi-Fi Protected Access
299
WPS
Wi-Fi Protected Setup
300
WTLS
Wireless TLS
301
XDR
Extended Detection and Response
302
XML
Extensible Markup Language
303
XOR
Exclusive Or
304
XSRF
Cross-site Request Forgery
305
XSS
Cross-site Scripting