CompTia Security Acronyms Flashcards

Memorize CompTia Security 601 Acronyms (360 cards)

1
Q

3DES

A

Triple Digital Encryption Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA

A

Authentication, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ABAC

A

Attribute-based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AES256

A

Advanced Encryption Standards 256bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AH

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AIS

A

Automated Indicator Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ALE

A

Annualized Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AP

A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ARO

A

Annualized Rate of Occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ASLR

A

Address Space Layout Randomization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ASP

A

Active Server Pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ATT&CK

A

Adversarial Tactics, Techniques, and Common Knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

AUP

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

AV

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

BASH

A

Bourne Again Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BCP

A

Business Continuity Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BGP

A

Border Gateway Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BIA

A

Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BIOS

A

Basic Input/Output System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
BPA
Business Partnership Agreement
26
BPDU
Bridge Protocol Data Unit
27
BSSID
Basic Service Set Identifier
28
BYOD
Bring Your Own Device
29
CA
Certificate Authority
30
CAC
Common Access Card
31
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart
32
CAR
Corrective Action Report
33
CASB
Cloud Access Security Broker
34
CBC
Cipher Block Chaining
35
CBT
Computer-based Training
36
CCMP
Counter-Mode/CBC-MAC Protocol
37
CCTV
Closed-Circuit Television
38
CERT
Computer Emergency Response Team
39
CFB
Cipher Feedback
40
CHAP
Challenge-Handshake Authentication Protocol
41
CIO
Chief Information Officer
42
CIRT
Computer Incident Response Team
43
CIS
Center for Internet Security
44
CMS
Content Management System
45
CN
Common Name
46
COOP
Continuity of Operations Planning
47
COPE
Corporate-owned Personally Enabled
48
CP
Contingency Planning
49
CRC
Cyclic Redundancy Check
50
CRL
Certificate Revocation List
51
CSA
Cloud Security Alliance
52
CSIRT
Computer Security Incident Response Team
53
CSO
Chief Security Officer
54
CSP
Cloud Service Provider
55
CSR
Certificate Signing Request
56
CSRF
Cross-Site Request Forgery
57
CSU
Channel Service Unit
58
CTM
Counter-Mode
59
CTO
Chief Technology Officer
60
CVE
Common Vulnerabilities and Exposures
61
CVSS
Common Vulnerability Scoring System
62
CYOD
Choose Your Own Device
63
DAC
Discretionary Access Control
64
DBA
Database Administrator
65
DDoS
Distributed Denial-of-Service
66
DEP
Data Execution Prevention
67
DER
Distinguished Encoding Rules
68
DES
Data Encryption Standard
69
DHCP
Dynamic Host Configuration Protocol
70
DHE
Diffie-Hellman Ephemeral
71
DKIM
Domain Keys Identified Mail
72
DLL
Dynamic Link Library
73
DLP
Data Loss Prevention
74
DMARC
Domain Message Authentication Reporting and Conformance
75
DMZ
Demilitarized Zone
76
DNAT
Destination Network Address Transaction
77
DNS
Domain Name System
78
DNSSEC
Domain Name System Security Extensions
79
DoS
Denial-of-Service
80
DPO
Data Protection Officer
81
DRP
Disaster Recovery Plan
82
DSA
Digital Signature Algorithm
83
DSL
Digital Subscriber Line
84
EAP
Extensible Authentication Protocol
85
ECB
Electronic Code Book
86
ECC
Elliptic-curve Cryptography
87
ECDHE
Elliptic-curve Diffie-Hellman Ephemeral
88
ECDSA
Elliptic-curve Digital Signature Algorithm
89
EDR
Endpoint Detection and Response
90
EFS
Encrypted File System
91
EIP
Extended Instruction Pointer
92
EOL
End of Life
93
EOS
End of Service
94
ERP
Enterprise Resource Planning
95
ESN
Electronic Serial Number
96
ESP
Encapsulating Security Payload
97
ESSID
Extended Service Set Identifier
98
FACL
File System Access Control List
99
FDE
Full Disk Encryption
100
FIM
File Integrity Monitoring
101
FPGA
Field Programmable Gate Array
102
FRR
False Rejection Rate
103
FTP
File Transfer Protocol
104
FTPS
Secured File Transfer Protocol
105
GCM
Galois/Counter Mode
106
GDPR
General Data Protection Regulation
107
GPG
GNU Privacy Guard
108
GPO
Group Policy Object
109
GPS
Global Positioning System
110
GPU
Graphics Processing Unit
111
GRE
Generic Routing Encapsulation
112
HA
High Availability
113
HDD
Hard Disk Drive
114
HIDS
Host-based Intrusion Detection System
115
HIPS
Host-based Intrusion Prevention System
116
HMAC
Hash-based Message Authentication Code
117
HOTP
HMAC-based One-time Password
118
HSM
Hardware Security Module
119
HSMaaS
Hardware Security Module as a Service
120
HTML
Hypertext Markup Language
121
HTTP
Hypertext Transfer Protocol
122
HTTPS
Hypertext Transfer Protocol Secure
123
HVAC
Heating, Ventilation, Air Conditioning
124
IaaS
Infrastructure as a Service
125
IAM
Identity and Access Management
126
ICMP
Internet Control Message Protocol
127
ICS
Industrial Control Systems
128
IDEA
International Data Encryption Algorithm
129
IDF
Intermediate Distribution Frame
130
IdP
Identity Provider
131
IDS
Intrusion Detection System
132
IEEE
Institute of Electrical and Electronics Engineers
133
IKE
Internet Key Exchange
134
IM
Instant Messaging
135
IMAP4
Internet Message Access Protocol v4
136
IoC
Indicators of Compromise
137
IoT
Internet of Things
138
IP
Internet Protocol
139
IPS
Intrusion Prevention System
140
IPSec
Internet Protocol Security
141
IR
Incident Response
142
IRC
Internet Relay Chat
143
IRP
Incident Response Plan
144
ISA
Interconnection Security Agreement
145
ISFW
Internal Segmentation Firewall
146
ISO
International Organization for Standardization
147
ISP
Internet Service Provider
148
ISSO
Information Systems Security Officer
149
ITCP
IT Contingency Plan
150
IV
Initialization Vector
151
KDC
Key Distribution Center
152
KEK
Key Encryption Key
153
L2TP
Layer 2 Tunneling Protocol
154
LAN
Local Area Network
155
LDAP
Lightweight Directory Access Protocol
156
LEAP
Lightweight Extensible Authentication Protocol
157
MaaS
Monitoring as a Service
158
MAC
Media Access Control
159
MAM
Mobile Application Management
160
MAN
Metropolitan Area Network
161
MBR
Master Boot Record
162
MD5
Message Digest 5
163
MDF
Main Distribution Frame
164
MDM
Mobile Device Management
165
MFA
Multifactor Authentication
166
MFD
Multifunction Device
167
MFP
Multifunction Printer
168
MITM
Man-in-the-Middle
169
ML
Machine Learning
170
MMS
Multimedia Message Service
171
MOA
Memorandum of Agreement
172
MOU
Memorandum of Understanding
173
MPLS
Multiprotocol Label Switching
174
MSA
Measurement Systems Analysis
175
MSCHAP
Microsoft Challenge Handshake Authentication Protocol
176
MSP
Managed Service Provider
177
MSSP
Managed Security Service Provider
178
MTBF
Mean Time Between Failures
179
MTTF
Mean Time to Failure
180
MTTR
Mean Time to Repair
181
MTU
Maximum Transmission Unit
182
NAC
Network Access Control
183
NAS
Network-attached Storage
184
NAT
Network Address Translation
185
NDA
Non-disclosure Agreement
186
NFC
Near-field Communication
187
NFV
Network Function Virtualization
188
NGFW
Next-generation Firewall
189
NG-SWG
Next-generation Secure Web Gateway
190
NIC
Network Interface Card
191
NIDS
Network-based Intrusion Detection System
192
NIPS
Network-based Intrusion Prevention System
193
NIST
National Institute of Standards & Technology
194
NOC
Network Operations Center
195
NTFS
New Technology File System
196
NTLM
New Technology LAN Manager
197
NTP
Network Time Protocol
198
OAUTH
Open Authentication
199
OCSP
Online Certificate Status Protocol
200
OID
Object Identifier
201
OS
Operating System
202
OSI
Open Systems Interconnection
203
OSINT
Open-source Intelligence
204
OSPF
Open Shortest Path First
205
OT
Operational Technology
206
OTA
Over-The-Air
207
OTG
On-The-Go
208
OVAL
Open Vulnerability and Assessment Language
209
OWASP
Open Web Application Security Project
210
P12
PKCS #12
211
P2P
Peer-to-Peer
212
PaaS
Platform as a Service
213
PAC
Proxy Auto Configuration
214
PAM
Privileged Access Management
215
PAM
Pluggable Authentication Modules
216
PAP
Password Authentication Protocol
217
PAT
Port Address Translation
218
PBKDF2
Password-based Key Derivation Function 2
219
PBX
Private Branch Exchange
220
PCAP
Packet Capture
221
PCI DSS
Payment Card Industry Data Security Standard
222
PDU
Power Distribution Unit
223
PE
Portable Executable
224
PEAP
Protected Extensible Authentication Protocol
225
PED
Portable Electronic Device
226
PEM
Privacy Enhanced Mail
227
PFS
Perfect Forward Secrecy
228
PGP
Pretty Good Privacy
229
PHI
Personal Health Information
230
PII
Personally Identifiable Information
231
PIN
Personal Identification Number
232
PIV
Personal Identity Verification
233
PKCS
Public Key Cryptography Standards
234
PKI
Public Key Infrastructure
235
PoC
Proof of Concept
236
POP
Post Office Protocol
237
POTS
Plain Old Telephone Service
238
PPP
Point-to-Point Protocol
239
PPTP
Point-to-Point Tunneling Protocol
240
PSK
Pre-shared Key
241
PTZ
Pan-Tilt-Zoom
242
PUP
Potentially Unwanted Program
243
QA
Quality Assurance
244
QoS
Quality of Service
245
PUP
Potentially Unwanted Program
246
RA
Registration Authority
247
RAD
Rapid Application Development
248
RADIUS
Remote Authentication Dial-in User Service
249
RAID
Redundant Array of Inexpensive Disks
250
RAM
Random Access Memory
251
RAS
Remote Access Server
252
RAT
Remote Access Trojan
253
RC4
Rivest Cipher version 4
254
RCS
Rich Communication Services
255
RFC
Request for Comments
256
RFID
Radio Frequency Identifier
257
RIPEMD
RACE Integrity Primitives Evaluation Message Digest
258
ROI
Return on Investment
259
RPO
Recovery Point Objective
260
RSA
Rivest, Shamir, & Adleman
261
RTBH
Remotely Triggered Black Hole
262
RTO
Recovery Time Objective
263
RTOS
Real-time Operating System
264
RTP
Real-time Transport Protocol
265
S/MIME
Secure/Multipurpose Internet Mail Extensions
266
SaaS
Software as a Service
267
SAE
Simultaneous Authentication of Equals
268
SAML
Security Assertions Markup Language
269
SCADA
Supervisory Control and Data Acquisition
270
SCAP
Security Content Automation Protocol
271
SCEP
Simple Certificate Enrollment Protocol
272
SDK
Software Development Kit
273
SDLC
Software Development Life Cycle
274
SDLM
Software Development Life-cycle Methodology
275
SDN
Software-defined Networking
276
SDP
Service Delivery Platform
277
SDV
Software-defined Visibility
278
SED
Self-Encrypting Drives
279
SEH
Structured Exception Handling
280
SFTP
SSH File Transfer Protocol
281
SHA
Secure Hashing Algorithm
282
S-HTTP
Secure Hypertext Transfer Protocol
283
SIEM
Security Information and Event Management
284
SIM
Subscriber Identity Module
285
SIP
Session Initiation Protocol
286
SLA
Service-level Agreement
287
SLE
Single Loss Expectancy
288
SMB
Server Message Block
289
S/MIME
Secure/Multipurpose Internet Mail Extensions
290
SMS
Short Message Service
291
SMTP
Simple Mail Transfer Protocol
292
SMTPS
Simple Mail Transfer Protocol Secure
293
SNMP
Simple Network Management Protocol
294
SOAP
Simple Object Access Protocol
295
SOAR
Security Orchestration, Automation, Response
296
SoC
System on Chip
297
SOC
Security Operations Center
298
SPF
Sender Policy Framework
299
SPIM
Spam over Internet Messaging
300
SQL
Structured Query Language
301
SQLi
SQL Injection
302
SRTP
Secure Real-time Transport Protocol
303
SSD
Solid State Drive
304
SSH
Secure Shell
305
SSID
Service Set Identifier
306
SSL
Secure Sockets Layer
307
SSO
Single Sign-on
308
STIX
Structured Threat Information eXpression
309
STP
Shielded Twisted Pair
310
SWG
Secure Web Gateway
311
TACACS+
Terminal Access Controller Access Control System
312
TAXII
Trusted Automated eXchange of Indicator Information
313
TCP/IP
Transmission Control Protocol/Internet Protocol
314
TGT
Ticket Granting Ticket
315
TKIP
Temporal Key Integrity Protocol
316
TLS
Transport Layer Security
317
TOTP
Time-based One Time Password
318
TPM
Trusted Platform Module
319
TSIG
Transaction Signature
320
TTP
Tactics, Techniques, and Procedures
321
UAT
User Acceptance Testing
322
UAV
Unmanned Aerial Vehicle
323
UDP
User Datagram Protocol
324
UEBA
User and Entity Behavior Analytics
325
UEFI
Unified Extensible Firmware Interface
326
UEM
Unified Endpoint Management
327
UPS
Uninterruptable Power Supply
328
URI
Uniform Resource Identifier
329
URL
Universal Resource Locator
330
USB
Universal Serial Bus
331
USB OTG
USB On-The-Go
332
UTM
Unified Threat Management
333
UTP
Unshielded Twisted Pair
334
VBA
Visual Basic
335
VDE
Virtual Desktop Environment
336
VDI
Virtual Desktop Infrastructure
337
VLAN
Virtual Local Area Network
338
VLSM
Variable-length Subnet Masking
339
VM
Virtual Machine
340
VoIP
Voice over IP
341
VPC
Virtual Private Cloud
342
VPN
Virtual Private Network
343
VTC
Video Teleconferencing
344
WAF
Web Application Firewall
345
WAP
Wireless Access Point
346
WEP
Wired Equivalent Privacy
347
WIDS
Wireless Intrusion Detection System
348
WIPS
Wireless Intrusion Prevention System
349
WORM
Write Once Read Many
350
WPA
WiFi Protected Access
351
WPS
WiFi Protected Setup
352
WTLS
Wireless TLS
353
XaaS
Anything as a Service
354
XML
Extensible Markup Language
355
XOR
Exclusive Or
356
XSRF
Cross-site Request Forgery
357
XSS
Cross-site Scripting
358
AD
Active Directory
359
AI
Artificial Intelligence
360