CompTia Acronyms Flashcards

(349 cards)

1
Q

AAA

A

Authentication, Authorization and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3DES

A

Triple data encryption standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ABAC

A

Attribute based access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ACL

A

Access control list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AD

A

Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AES256

A

Advanced Encryption Standards 256bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AH

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AI

A

Artificial Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AIS

A

Automated Indicator Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ALE

A

Annualized Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AP

A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ARO

A

Annualized Rate of Occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ASLR

A

Address Space Layout Randomization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

ASP

A

Active Server Pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

ATT&CK

A

Adversarial Tactics, Techniques,
and Common Knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

AUP

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

AV

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BASH

A

Bourne Again Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BCP

A

Business Continuity Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BGP

A

Border Gateway Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
BIA
Business Impact Analysis
26
BIOS
Basic Input/Output System
27
BPA
Business Partnership Agreement
28
BPDU
Bridge Protocol Data Unit
29
BSSID
Basic Service Set Identifier
30
BYOD
Bring Your Own Device
31
CA
Certificate Authority
32
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart
33
CAR
Corrective Action Report
34
CASB
Cloud Access Security Broker
35
CBC
Cipher Block Chaining
36
CBT
Computer-based Training
37
CCMP
Counter-Mode/CBC-MAC Protocol
38
CCTV
Closed-Circuit Television
39
CERT
Computer Emergency Response Team
40
CFB
Cipher Feedback
41
CHAP
Challenge-Handshake Authentication Protocol
42
CIO
Chief Information Officer
43
CIRT
Computer Incident Response Team
44
CIS
Center for Internet Security
45
CMS
Content Management System
46
CN
Common Name
47
COOP
Continuity of Operations Planning
48
COPE
Corporate-owned Personally Enabled
49
CP
Contingency Planning
50
CRC
Cyclic Redundancy Check
51
CRL
Certificate Revocation List
52
CSA
Cloud Security Alliance
53
CSIRT
Computer Security Incident Response Team
54
CSO
Chief Security Officer
55
CSP
Cloud Service Provider
56
CSRF
Cross-Site Request Forgery
57
CSU
Channel Service Unit
58
CTM
Counter-Mode
59
CTO
Chief Technology Officer
60
CVE
Common Vulnerabilities and Exposures
61
CVSS
Common Vulnerability Scoring System
62
CYOD
Choose Your Own Device
63
DAC
Discretionary Access Control
64
DBA
Database Administrator
65
DDoS
Distributed Denial-of-Service
66
DEP
Data Execution Prevention
67
DER
Distinguished Encoding Rules
68
DES
Data Encryption Standard
69
DHCP
Dynamic Host Configuration Protocol
70
DHE
Diffie-Hellman Ephemeral
71
DKIM
Domain Keys Identified Mail
72
DLL
Dynamic-link Library
73
DLP
Data Loss Prevention
74
DMARC
Domain Message Authentication Reporting and Conformance
75
DNAT
Destination Network Address Transaction
76
DNS
Domain Name System
77
DNSSEC
Domain Name System Security Extensions
78
DoS
Denial-of-Service
79
DPO
Data Protection Officer
80
DRP
Disaster Recovery Plan
81
DSA
Digital Signature Algorithm
82
DSL
Digital Subscriber Line
83
EAP
Extensible Authentication Protocol
84
ECB
Electronic Code Book
85
ECC
Elliptic-curve Cryptography
86
ECDHE
Elliptic-curve Diffie-Hellman Ephemeral
87
ECDSA
Elliptic-curve Digital Signature Algorithm
88
EDR
Endpoint Detection and Response
89
EFS
Encrypted File System
90
EIP
Extended Instruction Pointer
91
EOL
End of Life
92
EOS
End of Service
93
ERP
Enterprise Resource Planning
94
ESN
Electronic Serial Number
95
ESP
Encapsulating Security Payload
96
ESSID
Extended Service Set Identifier
97
FACL
File System Access Control List
98
FDE
Full Disk Encryption
99
FIM
File Integrity Monitoring
100
FPGA
Field Programmable Gate Array
101
FRR
False Rejection Rate
102
FTP
File Transfer Protocol
103
FTPS
Secured File Transfer Protocol
104
GCM
Galois/Counter Mode
105
GDPR
General Data Protection Regulation
106
GPG
GNU Privacy Guard
107
GPO
Group Policy Object
108
GPS
Global Positioning System
109
GPU
Graphics Processing Unit
110
GRE
Generic Routing Encapsulation
111
HA
High Availability
112
HDD
Hard Disk Drive
113
HIDS
Host-based Intrusion Detection System
114
HIPS
Host-based Intrusion Prevention System
115
HMAC
Hash-based Message Authentication Code
116
HOTP
HMAC-based One-time Password
117
HSM
Hardware Security Module
118
HSMaaS
Hardware Security Module as a Service
119
HTML
Hypertext Markup Language
120
HTTP
Hypertext Transfer Protocol
121
HTTPS
Hypertext Transfer Protocol Secure
122
HVAC
Heating, Ventilation, Air Conditioning
123
IaaS
Infrastructure as a Service
124
IAM
Identity and Access Management
125
ICMP
Internet Control Message Protocol
126
ICS
Industrial Control Systems
127
IDEA
International Data Encryption Algorithm
128
IDF
Intermediate Distribution Frame
129
IdP
Identity Provider
130
IDS
Intrusion Detection System
131
IEEE
Institute of Electrical and Electronics Engineers
132
IKE
Internet Key Exchange
133
IM
Instant Messaging
134
IMAP4
Internet Message Access Protocol v4
135
IoC
Indicators of Compromise
136
IoT
Internet of Things
137
IP
Internet Protocol
138
IPS
Intrusion Prevention System
139
IPSec
Internet Protocol Security
140
IR
Incident Response
141
IRC
Internet Relay Chat
142
IRP
Incident Response Plan
143
ISA
Interconnection Security Agreement
144
ISFW
Internal Segmentation Firewall
145
ISO
International Organization for Standardization
146
ISP
Internet Service Provider
147
ISSO
Information Systems Security Officer
148
ITCP
IT Contingency Plan
149
IV
Initialization Vector
150
KDC
Key Distribution Center
151
KEK
Key Encryption Key
152
L2TP
Layer 2 Tunneling Protocol
153
LAN
Local Area Network
154
LDAP
Lightweight Directory Access Protocol
155
LEAP
Lightweight Extensible Authentication Protocol
156
MaaS
Monitoring as a Service
157
MAC
Media Access Control
158
MAM
Mobile Application Management
159
MAN
Metropolitan Area Network
160
MBR
Master Boot Record
161
MD5
Message Digest 5
162
MDF
Main Distribution Frame
163
MDM
Mobile Device Management
164
MFA
Multifactor Authentication
165
MFD
Multifunction Device
166
MFP
Multifunction Printer
167
ML
Machine Learning
168
MMS
Multimedia Message Service
169
MOA
Memorandum of Agreement
170
MOU
Memorandum of Understanding
171
MPLS
Multiprotocol Label Switching
172
MSA
Measurement Systems Analysis
173
MS-CHAP
Microsoft Challenge-Handshake Authentication Protocol
174
MSP
Managed Service Provider
175
MSSP
Managed Security Service Provider
176
MTBF
Mean Time Between Failures
177
MTTF
Mean Time to Failure
178
MTTR
Mean Time to Repair
179
MTU
Maximum Transmission Unit
180
NAC
Network Access Control
181
NAS
Network-attached Storage
182
NAT
Network Address Translation
183
NDA
Non-disclosure Agreement
184
NFC
Near-field Communication
185
NFV
Network Function Virtualization
186
NGFW
Next-generation Firewall
187
NG-SWG
Next-generation Secure Web Gateway
188
NIC
Network Interface Card
189
NIDS
Network-based Intrusion Detection System
190
NIPS
Network-based Intrusion Prevention System
191
NIST
National Institute of Standards & Technology
192
NOC
Network Operations Center
193
NTFS
New Technology File System
194
NTLM
New Technology LAN Manager
195
NTP
Network Time Protocol
196
OCSP
Online Certificate Status Protocol
197
OID
Object Identifier
198
OS
Operating System
199
OSI
Open Systems Interconnection
200
OSINT
Open-source Intelligence
201
OSPF
Open Shortest Path First
202
OT
Operational Technology
203
OTA
Over-The-Air
204
OTG
On-The-Go
205
OVAL
Open Vulnerability and Assessment Language
206
OWASP
Open Web Application Security Project
207
P12
PKCS #12
208
P2P
Peer-to-Peer
209
PaaS
Platform as a Service
210
PAC
Proxy Auto Configuration
211
PAM
Privileged Access Management
212
PAM
Pluggable Authentication Modules
213
PAP
Password Authentication Protocol
214
PAT
Port Address Translation
215
PBKDF2
Password-based Key Derivation Function 2
216
PBX
Private Branch Exchange
217
PCAP
Packet Capture
218
PCI DSS
Payment Card Industry Data Security Standard
219
PDU
Power Distribution Unit
220
PE
Portable Executable
221
PEAP
Protected Extensible Authentication Protocol
222
PED
Portable Electronic Device
223
PEM
Privacy Enhanced Mail
224
PFS
Perfect Forward Secrecy
225
PGP
Pretty Good Privacy
226
PHI
Personal Health Information
227
PII
Personally Identifiable Information
228
PIN
Personal Identification Number
229
PIV
Personal Identity Verification
230
PKCS
Public Key Cryptography Standards
231
PKI
Public Key Infrastructure
232
PoC
Proof of Concept
233
POP
Post Office Protocol
234
POTS
Plain Old Telephone Service
235
PPP
Point-to-Point Protocol
236
PPTP
Point-to-Point Tunneling Protocol
237
PSK
Preshared Key
238
PTZ
Pan-Tilt-Zoom
239
PUP
Potentially Unwanted Program
240
QA
Quality Assurance
241
QoS
Quality of Service
242
RA
Registration Authority
243
RAD
Rapid Application Development
244
RADIUS
Remote Authentication Dial-in User Service
245
RAID
Redundant Array of Inexpensive Disks
246
RAM
Random Access Memory
247
RAS
Remote Access Server
248
RAT
Remote Access Trojan
249
RC4
Rivest Cipher version 4
250
RCS
Rich Communication Services
251
RFC
Request for Comments
252
RFID
Radio Frequency Identification
253
RIPEMD
RACE Integrity Primitives Evaluation Message Digest
254
ROI
Return on Investment
255
RPO
Recovery Point Objective
256
RSA
Rivest, Shamir, & Adleman
257
RTBH
Remotely Triggered Black Hole
258
RTO
Recovery Time Objective
259
RTOS
Real-time Operating System
260
RTP
Real-time Transport Protocol
261
S/MIME
Secure/Multipurpose Internet Mail Extensions
262
SaaS
Software as a Service
263
SAE
Simultaneous Authentication of Equals
264
SAML
Security Assertions Markup Language
265
SCADA
Supervisory Control and Data Acquisition
266
SCAP
Security Content Automation Protocol
267
SCEP
Simple Certificate Enrollment Protocol
268
SDK
Software Development Kit
269
SDLC
Software Development Life Cycle
270
SDLM
Software Development Life-cycle Methodology
271
SDN
Software-defined Networking
272
SDP
Service Delivery Platform
273
SDV
Software-defined Visibility
274
SED
Self-Encrypting Drives
275
SEH
Structured Exception Handling
276
SFTP
SSH File Transfer Protocol
277
SHA
Secure Hashing Algorithm
278
SIEM
Security Information and Event Management
279
SIM
Subscriber Identity Module
280
SIP
Session Initiation Protocol
281
SLA
Service-level Agreement
282
SLE
Single Loss Expectancy
283
SMB
Server Message Block
284
S/MIME
Secure/Multipurpose Internet Mail Extensions
285
SMS
Short Message Service
286
SMTP
Simple Mail Transfer Protocol
287
SMTPS
Simple Mail Transfer Protocol Secure
288
SNMP
Simple Network Management Protocol
289
SOAP
Simple Object Access Protocol
290
SOAR
Security Orchestration, Automation, Response
291
SoC
System on Chip
292
SOC
Security Operations Center
293
SPF
Sender Policy Framework
294
SPIM
Spam over Instant Messaging
295
SQL
Structured Query Language
296
SQLi
SQL Injection
297
SRTP
Secure Real-time Transport Protocol
298
SSD
Solid State Drive
299
SSH
Secure Shell
300
SSID
Service Set Identifier
301
SSL
Secure Sockets Layer
302
SSO
Single Sign-on
303
STIX
Structured Threat Information eXpression
304
STP
Shielded Twisted Pair
305
SWG
Secure Web Gateway
306
TACACS+
Terminal Access Controller Access Control System
307
TAXII
Trusted Automated eXchange of Intelligence Information
308
TCP/IP
Transmission Control Protocol/Internet Protocol
309
TGT
Ticket Granting Ticket
310
TKIP
Temporal Key Integrity Protocol
311
TLS
Transport Layer Security
312
TOTP
Time-based One Time Password
313
TPM
Trusted Platform Module
314
TSIG
Transaction Signature
315
TTP
Tactics, Techniques, and Procedures
316
UAT
User Acceptance Testing
317
UDP
User Datagram Protocol
318
UEBA
User and Entity Behavior Analytics
319
UEFI
Unified Extensible Firmware Interface
320
UEM
Unified Endpoint Management
321
UPS
Uninterruptible Power Supply
322
URI
Uniform Resource Identifier
323
URL
Universal Resource Locator
324
USB
Universal Serial Bus
325
USB OTG
USB On-The-Go
326
UTM
Unified Threat Management
327
UTP
Unshielded Twisted Pair
328
VBA
Visual Basic for Applications
329
VDE
Virtual Desktop Environment
330
VLAN
Virtual Local Area Network
331
VLSM
Variable-length Subnet Masking
332
VM
Virtual Machine
333
VoIP
Voice over IP
334
VPC
Virtual Private Cloud
335
VPN
Virtual Private Network
336
VTC
Video Teleconferencing
337
WAF
Web Application Firewall
338
WAP
Wireless Access Point
339
WEP
Wired Equivalent Privacy
340
WIDS
Wireless Intrusion Detection System
341
WIPS
Wireless Intrusion Prevention System
342
WORM
Write Once Read Many
343
WPA
WiFi Protected Access
344
WPS
WiFi Protected Setup
345
XaaS
Anything as a Service
346
XML
Extensible Markup Language
347
XOR
Exclusive OR
348
XSRF
Cross-site Request Forgery
349
XSS
Cross-site Scripting