CompTIA Study Materials
AWS Study Materials
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900

CompTIA Security+ SY0-701 All Acronyms Flashcards

FrontBack
CIAConfidentiality, Integrity, Availability
IoCIndicators of Compromise
BPDUBridge Protocol Data Unit
IPInternet Protocol
NTPNetwork Time Protocol
PAMPluggable Authentication Modules
CYODChoose Your Own Device
SHTTPSecure Hypertext Transfer Protocol
GCMGalois Counter Mode
MTBFMean Time Between Failures
VPNVirtual Private Network
CHAPChallenge Handshake Authentication Protocol
NATNetwork Address Translation
PaaSPlatform as a Service
SPIMSpam over Internet Messaging
ICMPInternet Control Message Protocol
PCAPPacket Capture
SRTPSecure Real-Time Protocol
WOWork Order
AHAuthentication Header
GPOGroup Policy Object
IdPIdentity Provider
P12PKCS #12
SAMLSecurity Assertions Markup Language
SDLCSoftware Development Lifecycle
WAPWireless Access Point
DESDigital Encryption Standard
SCAPSecurity Content Automation Protocol
APAccess Point
IRPIncident Response Plan
EDREndpoint Detection and Response
GDPRGeneral Data Protection Regulation
SELinux Security-enhanced Linux
DLLDynamic Link Library
PDUPower Distribution Unit
SoCSystem on Chip
ARPAddress Resolution Protocol
ERPEnterprise Resource Planning
IDEAInternational Data Encryption Algorithm
MSPManaged Service Provider
PPTPPoint-to-Point Tunneling Protocol
SEHStructured Exception Handler
TTPTactics, Techniques, and Procedures
CAPTCHACompletely Automated Public Turing Test to Tell Computers and Humans Apart
DEPData Execution Prevention
ISSOInformation Systems Security Officer
SNMPSimple Network Management Protocol
DRPDisaster Recovery Plan
CPContingency Planning
IDFIntermediate Distribution Frame
AISAutomated Indicator Sharing
ECCElliptic Curve Cryptography
GREGeneric Routing Encapsulation
XMLExtensible Markup Language
BCPBusiness Continuity Planning
PEMPrivacy Enhanced Mail
AIArtificial Intelligence
PCIDSS Payment Card Industry Data Security Standard
RADRapid Application Development
CASBCloud Access Security Broker
GPGGnu Privacy Guard
NTFSNew Technology File System
RAIDRedundant Array of Inexpensive Disks
WTLSWireless TLS
AESAdvanced Encryption Standard
FPGAField Programmable Gate Array
HAHigh Availability
DNATDestination Network Address Translation
HIPSHost-based Intrusion Prevention System
NGFWNext-generation Firewall
RASRemote Access Server
VDEVirtual Desktop Environment
VTCVideo Teleconferencing
BYODBring Your Own Device
IaaSInfrastructure as a Service
MTUMaximum Transmission Unit
SQLStructured Query Language
NACNetwork Access Control
P2PPeer to Peer
WAFWeb Application Firewall
WPSWi-Fi Protected Setup
BGPBorder Gateway Protocol
HTTPHypertext Transfer Protocol
WIPSWireless Intrusion Prevention System
MACMessage Authentication Code
PATPort Address Translation
SDNSoftware-defined Networking
VBAVisual Basic
SQLiSQL Injection
GPUGraphics Processing Unit
VLANVirtual Local Area Network
MD5Message Digest 5
OCSPOnline Certificate Status Protocol
RARegistration Authority
TOUTime-of-use
UATUser Acceptance Testing
AUPAcceptable Use Policy
DBADatabase Administrator
MDMMobile Device Management
RDPRemote Desktop Protocol
MPLSMulti-protocol Label Switching
UEMUnified Endpoint Management
CFBCipher Feedback
SOAPSimple Object Access Protocol
SOCSecurity Operations Center
UAVUnmanned Aerial Vehicle
DNSDomain Name System
FIMFile Integrity Management
HIDSHost-based Intrusion Detection System
IDSIntrusion Detection System
MSSPManaged Security Service Provider
SIEMSecurity Information and Event Management
SMTPSSimple Mail Transfer Protocol Secure
RTOSReal-time Operating System
SASESecure Access Service Edge
TACACS+Terminal Access Controller Access Control System
CVSSCommon Vulnerability Scoring System
FACLFile System Access Control List
PBXPrivate Branch Exchange
TLSTransport Layer Security
AVAntivirus
OAUTHOpen Authorization
PEDPersonal Electronic Device
SCADASupervisory Control and Data Acquisition
AES-256Advanced Encryption Standards 256-bit
NISTNational Institute of Standards & Technology
POTSPlain Old Telephone Service
XORExclusive Or
IPSIntrusion Prevention System
POPPost Office Protocol
TOCTime-of-check
ACLAccess Control List
DKIMDomainKeys Identified Mail
DLPData Loss Prevention
RFIDRadio Frequency Identifier
ALEAnnualized Loss Expectancy
CCMPCounter Mode/CBC-MAC Protocol
TKIPTemporal Key Integrity Protocol
FTPFile Transfer Protocol
IaCInfrastructure as Code
NTLMNew Technology LAN Manager
OVALOpen Vulnerability Assessment Language
UTPUnshielded Twisted Pair
XSSCross-site Scripting
CSRFCross-site Request Forgery
MLMachine Learning
OSOperating System
SWGSecure Web Gateway
CSOChief Security Officer
DMARCDomain Message Authentication Reporting and Conformance
ESPEncapsulated Security Payload
PUPPotentially Unwanted Program
SDLMSoftware Development Lifecycle Methodology
CVECommon Vulnerability Enumeration
ICSIndustrial Control Systems
RTPReal-time Transport Protocol
MaaSMonitoring as a Service
PGPPretty Good Privacy
PKIPublic Key Infrastructure
SAESimultaneous Authentication of Equals
SCEPSimple Certificate Enrollment Protocol
DDoSDistributed Denial of Service
MTTRMean Time to Recover
OTAOver the Air
USBOTG USB On the Go
VPCVirtual Private Cloud
LANLocal Area Network
OSINTOpen-source Intelligence
SEDSelf-encrypting Drives
CBCCipher Block Chaining
RTBHRemotely Triggered Black Hole
CARCorrective Action Report
CCTVClosed-circuit Television
CTOChief Technology Officer
KDCKey Distribution Center
XSRFCross-site Request Forgery
CIOChief Information Officer
RTORecovery Time Objective
SLESingle Loss Expectancy
PIVPersonal Identity Verification
SSLSecure Sockets Layer
DHCPDynamic Host Configuration Protocol
IoTInternet of Things
LDAPLightweight Directory Access Protocol
TCP/IPTransmission Control Protocol/Internet Protocol
DSADigital Signature Algorithm
ECDSAElliptic Curve Digital Signature Algorithm
IAMIdentity and Access Management
MOUMemorandum of Understanding
NDANon-disclosure Agreement
PIIPersonally Identifiable Information
RACEResearch and Development in Advanced Communications Technologies in Europe
BIOSBasic Input/Output System
FDEFull Disk Encryption
HVACHeating, Ventilation Air Conditioning
PACProxy Auto Configuration
RPORecovery Point Objective
CRLCertificate Revocation List
DHEDiffie-Hellman Ephemeral
DSLDigital Subscriber Line
IMAPInternet Message Access Protocol
SIMSubscriber Identity Module
SSDSolid State Drive
MOAMemorandum of Agreement
PAPPassword Authentication Protocol
PFSPerfect Forward Secrecy
UTMUnified Threat Management
SSOSingle Sign-on
VMVirtual Machine
VoIPVoice over IP
EAPExtensible Authentication Protocol
MSAMaster Service Agreement
SSHSecure Shell
RIPEMDRACE Integrity Primitives Evaluation Message Digest
COPECorporate Owned, Personally Enabled
FRRFalse Rejection Rate
ESNElectronic Serial Number
RADIUSRemote Authentication Dial-in User Service
URIUniform Resource Identifier
CTMCounter Mode
VLSMVariable Length Subnet Masking
DACDiscretionary Access Control
DPOData Privacy Officer
ECBElectronic Code Book
ISPInternet Service Provider
MDFMain Distribution Frame
SaaSSoftware as a Service
IEEEInstitute of Electrical and Electronics Engineers
IRCInternet Relay Chat
PPPPoint-to-Point Protocol
SMSShort Message Service
EFSEncrypted File System
PTZPan-tilt-zoom
ISOInternational Standards Organization
NIPSNetwork-based Intrusion Prevention System
PHIPersonal Health Information
WPAWi-Fi Protected Access
CERTComputer Emergency Response Team
DoSDenial of Service
TPMTrusted Platform Module
HTMLHypertext Markup Language
NFCNear Field Communication
BASHBourne Again Shell
MSCHAPMicrosoft Challenge Handshake
PSKPre-shared Key
TOTPTime-based One-time Password
IMInstant Messaging
MMSMultimedia Message Service
SFTPSecured File Transfer Protocol
ATT&CKAdversarial Tactics, Techniques, and Common Knowledge
CRCCyclical Redundancy Check
MFPMultifunction Printer
OIDObject Identifier
UPSUninterruptable Power Supply
SDKSoftware Development Kit
SMTPSimple Mail Transfer Protocol
SOARSecurity Orchestration, Automation, Response
FTPSSecured File Transfer Protocol
IVInitialization Vector
NIDSNetwork-based Intrusion Detection System
OTOperational Technology
TSIGTransaction Signature
APTAdvanced Persistent Threat
CIRTComputer Incident Response Team
HSMHardware Security Module
SANSubject Alternative Name
RSARivest, Shamir, & Adleman
SOWStatement of Work
WEPWired Equivalent Privacy
CMSContent Management System
ECDHEElliptic Curve Diffie-Hellman Ephemeral
IRIncident Response
MFDMultifunction Device
OSPFOpen Shortest Path First
PKCSPublic Key Cryptography Standards
UEFIUnified Extensible Firmware Interface
PBKDF2Password-based Key Derivation Function 2
TGTTicket Granting Ticket
AAAAuthentication, Authorization, and Accounting
L2TPLayer 2 Tunneling Protocol
URLUniversal Resource Locator
CACertificate Authority
HDDHard Disk Drive
MTTFMean Time to Failure
RBACRule-based Access Control
STIXStructured Threat Information eXchange
UDPUser Datagram Protocol
XDRExtended Detection and Response
WIDSWireless Intrusion Detection System
MANMetropolitan Area Network
TAXIITrusted Automated eXchange of Indicator Information
VDIVirtual Desktop Infrastructure
CSRCertificate Signing Request
HMACHashed Message Authentication Code
KEKKey Encryption Key
LEAPLightweight Extensible Authentication Protocol
AuthenticationProtocol
S/MIMESecure/Multipurpose Internet Mail Extensions
BIABusiness Impact Analysis
HOTPHMAC-based One-time Password
PEAPProtected Extensible Authentication Protocol
IPSecInternet Protocol Security
RATRemote Access Trojan
SPFSender Policy Framework
APIApplication Programming Interface
BPABusiness Partners Agreement
COOPContinuity of Operation Planning
CSPCloud Service Provider
RC4Rivest Cipher version 4
SLAService-level Agreement
AROAnnualized Rate of Occurrence
HTTPSHypertext Transfer Protocol Secure
ASLRAddress Space Layout Randomization
CSUChannel Service Unit
GPSGlobal Positioning System
MFAMultifactor Authentication
SD-WANSoftware-defined Wide Area Network
SHASecure Hashing Algorithm
IKEInternet Key Exchange
MBRMaster Boot Record
ROIReturn on Investment