Security+ Acronym Flashcards

(244 cards)

1
Q

3DES

A

Triple Digital Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA

A

Authentication, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AES256

A

Advanced Encryption Standards 256bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AH

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ALE

A

Annualized Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AP

A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ASP

A

Application Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ARO

A

Annualized Rate of Occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

AUP

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

BAC

A

Business Availability Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

BCP

A

Business Continuity Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

BIA

A

Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

BIOS

A

Basic Input / Output System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

BPA

A

Business Partners Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

BPDU

A

Bridge Protocol Data Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

BYOD

A

Bring Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

CA

A

Certificate Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

CAC

A

Common Access Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CAN

A

Controller Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

CAPTCHA

A

Completely Automated Public Turing Test to Tell Computers and Humans Apart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
CAR
Corrective Action Report
26
CCMP
Counter-Mode/CBC-Mac Protocol
27
CCTV
Closed-circuit television
28
CERT
Computer Emergency Response Team
29
CFB
Cipher Feedback
30
CHAP
Challenge Handshake Authentication Protocol
31
CIO
Chief Information Officer
32
CIRT
Computer Incident Response Team
33
CMS
Content Management System
34
COOP
Continuity of Operation Planning
35
CP
Contingency Planning
36
CRC
Cyclical Redundancy Check
37
CRL
Certificate Revocation List
38
CSP
Cloud Service Provider
39
CSR
Control Status Register
40
CSRF
Cross-Site Request Forgery
41
CSU
Channel Service Unit
42
CTO
Chief Technology Officer
43
DAC
Discretionary Access Control
44
DBA
Database Administrator
45
DDOS
Distributed Denial of Service
46
DEP
Data Execution Prevention
47
DES
Digital Encryption Standard
48
DHCP
Dynamic Host Configuration Protocol
49
DHE
Data-Handling Electronics | Diffie-Hellman Ephemeral
50
DLL
Dynamic Link Library
51
DLP
Data Loss Prevention
52
DMZ
Demilitarized Zone
53
DNAT
Destination Network Address Transaction
54
DNS
Domain Name Service (Server)
55
DOS
Denial of Service
56
DRP
Disaster Recovery Plan
57
DSA
Digital Signature Algorithm
58
DSL
Digital Subscriber line
59
DSU
Data Service Unit
60
EAP
Extensible Authentication Protocol
61
ECC
Elliptic Curve Cryptography
62
ECDHE
Elliptic Curve Diffie-Hellman Exchange
63
ECDSA
Elliptic Curve Digital Signature Algorithm
64
EFS
Encrypted File System
65
EMI
Electromagnetic Interference
66
ESN
Electronic Serial Number
67
ESP
Encapsulated Security Payload
68
FACL
File System Access Control List
69
FDE
Full Disk Encryption
70
FTP
File Transfer Protocol
71
FTPS
Secured File Transfer Protocol
72
GCM
Galois Counter Mode
73
GPG
Gnu Privacy Guard
74
GPO
Group Policy Object
75
GPS
Global Positioning System
76
GPU
Graphic Processing Unit
77
GRE
Generic Routing Encapsulation
78
HDD
Hard Disk Drive
79
HIDS
Host Based Intrusion Detection System
80
HIPS
Host Based Intrusion Prevention System
81
HMAC
Hashed Message Authentication Code
82
HOTP
HMAC based One Time Password
83
HSM
Hardware Security Module
84
HTML
HyperText Markup Language
85
HTTP
Hypertext Transfer Protocol
86
HTTPS
Hypertext Transfer Protocol over SSL
87
HVAC
Heating, Ventilation Air Conditioning
88
IaaS
Infrastructure as a Service
89
ICMP
Internet Control Message Protocol
90
ICS
Industrial Control Systems
91
ID
Identification
92
IDF
Intermeidate Distribution Frame
93
IdP
Identity Provider
94
IDS
Intrusion Detection System
95
IKE
Internet Key Exchange
96
IM
Instant messaging
97
IMAP4
Internet Message Access Protocol v4
98
IP
Internet Protocol
99
IPSEC
Internet Protocol Security
100
IR
Incident Response
101
IRC
Internet Relay Chat
102
IRP
Incident Response Procedure
103
ISA
Interconnection Security Agreement
104
ISP
Internet Service Provider
105
ISSO
Information Systems Security Officer
106
ITCP
IT Contingency Plan
107
IV
Initialization Vector
108
JBOD
Just a Bunch of Disks
109
KDC
Key Distribution Center
110
KEK
Key Encryption Key
111
L2TP
Layer 2 Tunneling Protocol
112
LAN
Local Area Network
113
LDAP
Lightweight Directory Access Protocol
114
LEAP
Lightweight Extensible Authentication Protocol
115
MaaS
Monitoring as a Service
116
MAC
Mandatory Access Control / Media Access Control | Message Authentication Code
117
MAN
Metropolitan Area Network
118
MBR
Master Boot Record
119
MD5
Message Digest 5
120
MDF
Main Distribution Frame
121
MITM
Man-in-the-Middle
122
MOU
Memorandum of Understanding
123
MPLS
Multi-Protocol Layer Switch
124
MSCHAP
Microsoft Challenge Handshake Authentication Protocol
125
MTBF
Mean Time Between Failures
126
MTTR
Mean Time to Recover
127
MTTF
Mean Time to Failure
128
MTU
Maximum Transmission Unit
129
NAC
Network Access Control
130
NAT
Network Address Translation
131
NDA
Non-Disclosure Agreement
132
NFC
Near Field Communication
133
NIDS
Network Based Intrusion Detection System
134
NIPS
Network Based Intrusion Prevention System
135
NIST
National Institute of Standards & Technology
136
NOS
Network Operating System
137
NTFS
New Technology File System
138
NTLM
New Technology LANMAN
139
NTP
Network Time Protocol
140
OAUTH
Open Authorization
141
OCSP
Online Certificate Status Protocol
142
OLA
Open License Agreement
143
OS
Operating System
144
OVAL
Open Vulnerability Assessment Language
145
P2P
Peer to Peer
146
PAC
Proxy Auto Configuration
147
PAM
Pluggable Authentication Modules
148
PAP
Password Authentication Protocol
149
PAT
Port Address Translation
150
PBKDF2
Password Based Key Derivation Function 2
151
PBX
Private Branch Exchange
152
PCAP
Packet Capture
153
PEAP
Protected Extensible Authentication Protocol
154
PED
Personal Electronic Device
155
PFS
Perfect Forward Secrecy
156
PGP
Pretty Good Privacy
157
PII
Personally Identifiable Information
158
PIV
Personal Identity Verification
159
PKI
Public Key Infrastructure
160
POTS
Plain Old Telephone Service
161
PPP
Point-to-point Protocol
162
PPTP
Point to Point Tunneling Protocol
163
PSK
Pre-Shared Key
164
PTZ
Pan-Tilt-Zoom
165
RA
Recovery Agent
166
RA
Registration Authority
167
RAD
Rapid application development
168
RADIUS
Remote Authentication Dial-in User Server
169
RAID
Redundant Array of Inexpensive Disks
170
RAS
Remote Access Server
171
RBAC
Role Based Access Control | Rule Based Access Control
172
RC4
RSA Variable Key Size Encryption Algorithm
173
RIPEMD
RACE Integrity Primitives Evaluation Message Digest
174
ROI
Return of Investment
175
RPO
Recovery Point Objective
176
RSA
Rivest, Shamir, & Adleman
177
RTO
Recovery Time Objective
178
RTP
Real-Time Transport Protocol
179
S/MIME
Secure / Multipurpose Internet Mail Extensions
180
SAML
Security Assertions Markup Language
181
SaaS
Software as a Service
182
SAN
Storage Area Network
183
SCADA
System Control and Data Acquisition
184
SCAP
Security Content Automation Protocol
185
SCEP
Simple Certificate Enrollment Protocol
186
SCSI
Small Computer System Interface
187
SDLC
Software Development Life Cycle
188
SDLM
Software Development Life Cycle Methodology
189
SEH
Structured Exception Handler
190
SHA
Secure Hashing Algorithm
191
SFTP
Secured File Transfer Protocol
192
SHTTP
Secure Hypertext Transfer Protocol
193
SIEM
Security Information and Event Management
194
SIM
Subscriber Identity Module
195
SLA
Service Level Agreement
196
SLE
Single Loss Expectancy
197
SMS
Short Message Service
198
SMTP
Simple Mail Transfer Protocol
199
SMTPS
Simple Mail Transfer Protocol Secure
200
SNMP
Simple Network Management Protocol
201
SOAP
Simple Object Access Protocol
202
SONET
Synchronous Optical Network Technologies
203
SPIM
Spam over Internet Messaging
204
SQL
Structured Query Language
205
SSD
Solid State Drive
206
SSH
Secure Shell
207
SSL
Secure Sockets Layer
208
SSO
Single Sign On
209
STP
Shielded Twisted Pair
210
TACACS+
Terminal Access Controller Access Control System
211
TCP/IP
Transmission Control Protocol / Internet Protocol
212
TGT
Ticket Granting Ticket
213
TKIP
Temporal Key Integrity Protocol
214
TLS
Transport Layer Security
215
TOTP
Time-Based One-Time Password
216
TPM
Trusted Platform Module
217
TSIG
Transaction Signature
218
UAT
User Acceptance Testing
219
UEFI
Unified Extensible Firmware Interface
220
UDP
User Datagram Protocol
221
UPS
Uninterruptable Power Supply
222
URI
Uniform Resource Identifier
223
URL
Universal Resource Locator
224
USB
Universal Serial Bus
225
UTM
Unified Threat Management
226
UTP
Unshielded Twisted Pair
227
VDI
Virtualization Desktop Infrastructure
228
VLAN
Virtual Local Area Network
229
VLSM
Variable Length Subnet Masking
230
VoIP
Voice over IP
231
VPN
Virtual Private Network
232
VTC
Video Teleconferencing
233
WAF
Web-Application Firewall
234
WAP
Wireless Access Point
235
WEP
Wired Equivalent Privacy
236
WIDS
Wireless Intrusion Detection System
237
WIPS
Wireless Intrusion Prevention System
238
WPA
Wireless Protected Access
239
WPA2
WiFi Protected Access 2
240
WPS
WiFi Protected Setup
241
WTLS
Wireless TLS
242
XML
Extensible Markup Language
243
XSRF
Cross-Site Request Forgery
244
XSS
Cross-Site Scripting