Security+ Aronym List Flashcards

1
Q

3DES

A

Triple digital encryption standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA

A

Authentication, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ABAC

A

Attribute-based access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ACL

A

Access control list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AES

A

Advance encryption standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AES256

A

Advance, encryption standards 256bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AH

A

Authentication header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AI

A

Artificial intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AIS

A

Automatic indicator sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ALE

A

Annual loss expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AP

A

Access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

API

A

Authentication programming interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

APT

A

Advance, persistent threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ARO

A

Annual rate of occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ARP

A

Address resolution protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ASLR

A

Address Space Layout Randomization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ASP

A

Active Sever Page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

ATT&CK

A

Adversarial Tactics, Techniques and Common Knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

AUP

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

AV

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BASH

A

Bourne Again Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BCP

A

Business Continuity Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BGP

A

Border Gateway Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BIA

A

Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
BIOS
Basic Input/Output System
26
BPA
Business Partnership Agreement
27
BPDU
Bridge Protocol Data Unit
28
BYOD
Bring Your Own Device
29
CA
Certificate Authority
30
CAC
Common Access Card
31
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart
32
CAR
Corrective Action Report
33
CASB
Cloud Access Security Broker
34
CBC
Cipher Block Chaining
35
CBT
Computer-based Training
36
CCMP
Counter-Mode / CBC-Mac Protocol
37
CCTV
Closed-Circuit Television
38
CERT
Computer Incident Response Team
39
CFB
Cipher Feedback
40
CHAP
Challenge Handshake Authentication Protocol
41
CIO
Chief Information Officer
42
CIRT
Computer Incident Response Team
43
CIS
Center for Internet Security
44
CMS
Content Management System
45
COOP
Continuity of operation Planning
46
COPE
Corporate Owned Personal Enabled
47
CP
Continuity Planning
48
CRC
Cyclical Redundancy Check
49
CRL
Certificate Revocation List
50
CSO
Chief Security Officer
51
CSP
Cloud Service Provider
52
CSR
Certificate Signing Request
53
CSRF
Cross-Site Request Forgery
54
CSU
Cannel Service Unit
55
CTM
Counter-Mode
56
CTO
Chief Technology Officer
57
CVE
Common Vulnerabilities and Exposures
58
CVSS
Common Vulnerability Scoring System
59
CYOD
Choose Your Own Device
60
DAC
Discretionary Access Control
61
DBA
Database Adminstrator
62
DDoS
Distributed Denial of Service
63
DEP
Data Execution Prevention
64
DER
Distinguished Encoding Rules
65
DES
Digital Encryption Standard
66
DHCP
Dynamic Host Configuration Protocol
67
DHE
Diffie-Hellman Ephemeral
68
DKIM
Domain keys Identified Mail
69
DLL
Dynamic Link Library
70
DLP
Data Loss Prevention
71
DMARC
Domain Message Authentication Reporting and Conformance
72
DMZ
Demilitarized Zone
73
DNAT
Destination Network Address Transaction
74
DNS
Domain Name Service (Server)
75
DNSSEC
Domain Name System Security Extensions
76
DoS
Denial Of Service
77
DPO
Data Privacy Officer
78
DRP
Disaster Recovery Plan
79
DSA
Digital Signature Algorithm
80
DSL
Digital Subscriber Line
81
EAP
Extensible Authentication Protocol
82
ECB
Electronic Code Book
83
ECC
Ecliptic Curve Cryptography
84
ECDHE
Elliptic Curve Diffie-Hellman Ephemeral
85
ECDSA
Elliptic Curve Digital Signature Algorithm
86
EDR
Endpoint Detection and Response
87
EFS
Encrypted File System
88
EOL
End of Life
89
EOS
End Of Service
90
ERP
Enterprise Resouces Planning
91
ESN
Electronic Seral Number
92
ESP
Encapsulated Security Payload
93
FACL
File System Access Control List
94
FDE
Full Disk Encryption
95
FPGA
Field Programmable Gate Array
96
FRR
False Rejection Rate
97
FTP
File Transfer protocol
98
FTPS
Secured File Transfer Protocol
99
GCM
Galois Counter Mode
100
GDPR
General Data Protection Regulation
101
GPG
Gnu Privacy Guard
102
GPO
Group Policy Object
103
GPS
Global Positioning System
104
GPU
Graphics Processing Unit
105
GRE
Generic Routing Encapsulation
106
HA
High Availability
107
HDD
Hard Disk Drive
108
HIDS
Host-Based Intrusion Detection System
109
HIPS
Host-Based Intrusion Prevention System
110
HMAC
Hashed Message Authentication Code
111
HOTP
HMAC-based One Time Password
112
HSM
Hardware Security Module
113
HTML
HyperText Markup Language
114
HTTP
HyperText Transfer Protocol
115
HTTPS
HyperText Transfer Protocol Over SSL/TLS
116
HVAC
Heating, Ventilation, Air Conditioning
117
IaaS
Infrastructure as a Service
118
ICMP
Internet Control Message Protocol
119
ICS
Industrial Control Systems
120
IDEA
International Data Encryption Algorithm
121
IDF
Intermediate Distribution Frame
122
IdP
Identity Provider
123
IDS
Intrusion Detection System
124
IEEE
Institute of Electrical and Electronics Engineers
125
IKE
Internet Key Exchange
126
IM
Instant Messaging
127
IMAP4
Internet Message Access Protocol v4
128
IoC
Indicators of Compromise
129
IoT
Internet of Things
130
IP
Internet Protocol
131
IPSec
Internet Protocol Security
132
IR
Incident Response
133
IRC
Internet Relay Chat
134
IRP
Incident Response Plan
135
ISO
International Organization for Standardization
136
ISP
Internet Service Provider
137
ISSO
Information Systems Security Officer
138
ITCP
IT Contingency Plan
139
IV
Initialization Vector
140
KDC
Key Distribution Center
141
KEK
Key Encryption Key
142
L2TP
Layer 2 Tunneling Protocol
143
LAN
Local Area Network
144
LDAP
Lightweight Directory Access Protocol
145
LEAP
Lightweight Extensible Authentication Protocol
146
MaaS
Monitoring as a Service
147