Security+ Acronyms Flashcards
part 1 (34 cards)
What does AAA stand for?
Authentication, Authorization, and Accounting
AAA is a framework for controlling access to computer resources.
What is an ACL?
Access Control List
An ACL is a list that defines permissions for users or groups to access resources.
What does AES stand for?
Advanced Encryption Standard
AES is a symmetric encryption algorithm widely used for securing data.
What is the key size of AES-256?
256-bit
AES-256 uses a key size of 256 bits for encryption, providing a high level of security.
What does AH stand for?
Authentication Header
AH is a protocol used to provide connectionless integrity and authentication for IP packets.
What does AI represent?
Artificial Intelligence
AI refers to the simulation of human intelligence in machines.
What is the purpose of AIS?
Automated Indicator Sharing
AIS enables organizations to share cyber threat information automatically.
What does ALE stand for?
Annualized Loss Expectancy
ALE is a calculation used to estimate the expected annual loss from a risk.
What does AP stand for in networking?
Access Point
An AP is a device that allows wireless devices to connect to a wired network.
What is an API?
Application Programming Interface
An API is a set of rules and tools for building software applications.
What does APT stand for?
Advanced Persistent Threat
APT refers to a prolonged and targeted cyber attack where an intruder gains access to a network.
What does ARO represent?
Annualized Rate of Occurrence
ARO estimates how often a risk is expected to occur within a year.
What is the function of ARP?
Address Resolution Protocol
ARP is used to map an IP address to a MAC address in a local area network.
What does ASLR stand for?
Address Space Layout Randomization
ASLR is a security technique that randomizes memory addresses to prevent exploitation.
What does ATT&CK stand for?
Adversarial Tactics, Techniques, and Common Knowledge
ATT&CK is a knowledge base for tracking adversary behavior in cybersecurity.
What is an AUP?
Acceptable Use Policy
AUP outlines the acceptable behaviors and practices for using an organization’s IT resources.
What does AV stand for?
Antivirus
AV software is designed to detect and eliminate malware on computers.
What is BASH?
Bourne Again Shell
BASH is a command-line interface and scripting language for Unix-based systems.
What does BCP stand for?
Business Continuity Planning
BCP involves creating systems of prevention and recovery to deal with potential threats to a company.
What does BGP stand for?
Border Gateway Protocol
BGP is a standardized exterior gateway protocol used to exchange routing information between autonomous systems on the internet.
What is a BIA?
Business Impact Analysis
BIA identifies the effects of disruptions on business operations.
What does BIOS stand for?
Basic Input/Output System
BIOS is firmware that initializes hardware during the booting process of a computer.
What does BPA stand for?
Business Partners Agreement
BPA outlines the terms and conditions of a partnership between organizations.
What is a BPDU?
Bridge Protocol Data Unit
BPDU is a message exchanged across the switches in a network to maintain the spanning tree protocol.