CompTIA Study Materials
AWS Study Materials
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900

CompTIA Security+ SY0-701 All Acronyms Flashcards

FrontBack
SIEMSecurity Information and Event Management
DoSDenial of Service
PKCSPublic Key Cryptography Standards
PPTPPoint-to-Point Tunneling Protocol
SAESimultaneous Authentication of Equals
SFTPSecured File Transfer Protocol
SHASecure Hashing Algorithm
TTPTactics, Techniques, and Procedures
L2TPLayer 2 Tunneling Protocol
MSPManaged Service Provider
P12PKCS #12
HDDHard Disk Drive
HVACHeating, Ventilation Air Conditioning
NACNetwork Access Control
URIUniform Resource Identifier
APIApplication Programming Interface
CYODChoose Your Own Device
DSLDigital Subscriber Line
ECBElectronic Code Book
IoCIndicators of Compromise
IRIncident Response
PATPort Address Translation
GCMGalois Counter Mode
IaCInfrastructure as Code
ESPEncapsulated Security Payload
MLMachine Learning
OVALOpen Vulnerability Assessment Language
PBKDF2Password-based Key Derivation Function 2
WPAWi-Fi Protected Access
CMSContent Management System
MTUMaximum Transmission Unit
NGFWNext-generation Firewall
DNSDomain Name System
OSPFOpen Shortest Path First
RTOSReal-time Operating System
SOARSecurity Orchestration, Automation, Response
XORExclusive Or
BPDUBridge Protocol Data Unit
PHIPersonal Health Information
CIOChief Information Officer
OTOperational Technology
SLESingle Loss Expectancy
AVAntivirus
NIPSNetwork-based Intrusion Prevention System
AuthenticationProtocol
TSIGTransaction Signature
SPFSender Policy Framework
UTMUnified Threat Management
APTAdvanced Persistent Threat
GPGGnu Privacy Guard
GREGeneric Routing Encapsulation
LEAPLightweight Extensible Authentication Protocol
S/MIMESecure/Multipurpose Internet Mail Extensions
ASLRAddress Space Layout Randomization
CASBCloud Access Security Broker
BIOSBasic Input/Output System
OIDObject Identifier
POPPost Office Protocol
HIPSHost-based Intrusion Prevention System
CSRFCross-site Request Forgery
IDEAInternational Data Encryption Algorithm
ESNElectronic Serial Number
HTTPHypertext Transfer Protocol
OSINTOpen-source Intelligence
OTAOver the Air
SSHSecure Shell
DLPData Loss Prevention
EDREndpoint Detection and Response
MTTFMean Time to Failure
URLUniversal Resource Locator
BIABusiness Impact Analysis
WIPSWireless Intrusion Prevention System
NTPNetwork Time Protocol
SDLCSoftware Development Lifecycle
SQLiSQL Injection
XSRFCross-site Request Forgery
MFDMultifunction Device
PBXPrivate Branch Exchange
SCAPSecurity Content Automation Protocol
SRTPSecure Real-Time Protocol
SSDSolid State Drive
CARCorrective Action Report
IdPIdentity Provider
ISPInternet Service Provider
NFCNear Field Communication
CSUChannel Service Unit
MSSPManaged Security Service Provider
NTFSNew Technology File System
PFSPerfect Forward Secrecy
WIDSWireless Intrusion Detection System
ATT&CKAdversarial Tactics, Techniques, and Common Knowledge
DACDiscretionary Access Control
MDFMain Distribution Frame
SEDSelf-encrypting Drives
HSMHardware Security Module
MOUMemorandum of Understanding
PSKPre-shared Key
RTBHRemotely Triggered Black Hole
SANSubject Alternative Name
SCEPSimple Certificate Enrollment Protocol
VTCVideo Teleconferencing
WAPWireless Access Point
NDANon-disclosure Agreement
TACACS+Terminal Access Controller Access Control System
MTTRMean Time to Recover
SCADASupervisory Control and Data Acquisition
CCTVClosed-circuit Television
USBOTG USB On the Go
WOWork Order
CHAPChallenge Handshake Authentication Protocol
DEPData Execution Prevention
GPOGroup Policy Object
IaaSInfrastructure as a Service
MFAMultifactor Authentication
PaaSPlatform as a Service
PAPPassword Authentication Protocol
SMTPSimple Mail Transfer Protocol
SWGSecure Web Gateway
TGTTicket Granting Ticket
WAFWeb Application Firewall
ARPAddress Resolution Protocol
COOPContinuity of Operation Planning
FRRFalse Rejection Rate
GPUGraphics Processing Unit
OCSPOnline Certificate Status Protocol
PAMPluggable Authentication Modules
STIXStructured Threat Information eXchange
NISTNational Institute of Standards & Technology
OAUTHOpen Authorization
ECCElliptic Curve Cryptography
SD-WANSoftware-defined Wide Area Network
SMTPSSimple Mail Transfer Protocol Secure
DKIMDomainKeys Identified Mail
MDMMobile Device Management
CERTComputer Emergency Response Team
EAPExtensible Authentication Protocol
UAVUnmanned Aerial Vehicle
VPCVirtual Private Cloud
TPMTrusted Platform Module
CIAConfidentiality, Integrity, Availability
IAMIdentity and Access Management
MMSMultimedia Message Service
CPContingency Planning
CRCCyclical Redundancy Check
FTPSSecured File Transfer Protocol
ICSIndustrial Control Systems
PPPPoint-to-Point Protocol
RTPReal-time Transport Protocol
SOCSecurity Operations Center
XMLExtensible Markup Language
CVSSCommon Vulnerability Scoring System
MSAMaster Service Agreement
TOTPTime-based One-time Password
AISAutomated Indicator Sharing
DDoSDistributed Denial of Service
DESDigital Encryption Standard
CAPTCHACompletely Automated Public Turing Test to Tell Computers and Humans Apart
GPSGlobal Positioning System
PCIDSS Payment Card Industry Data Security Standard
PUPPotentially Unwanted Program
WEPWired Equivalent Privacy
MFPMultifunction Printer
SAMLSecurity Assertions Markup Language
RAIDRedundant Array of Inexpensive Disks
RDPRemote Desktop Protocol
RTORecovery Time Objective
SDLMSoftware Development Lifecycle Methodology
TLSTransport Layer Security
CIRTComputer Incident Response Team
P2PPeer to Peer
PCAPPacket Capture
ALEAnnualized Loss Expectancy
FDEFull Disk Encryption
LDAPLightweight Directory Access Protocol
MTBFMean Time Between Failures
OSOperating System
PACProxy Auto Configuration
PKIPublic Key Infrastructure
SaaSSoftware as a Service
SoCSystem on Chip
PEDPersonal Electronic Device
VDIVirtual Desktop Infrastructure
HAHigh Availability
SNMPSimple Network Management Protocol
SPIMSpam over Internet Messaging
UEMUnified Endpoint Management
ACLAccess Control List
DHCPDynamic Host Configuration Protocol
DMARCDomain Message Authentication Reporting and Conformance
MBRMaster Boot Record
BGPBorder Gateway Protocol
ICMPInternet Control Message Protocol
IRCInternet Relay Chat
POTSPlain Old Telephone Service
RACEResearch and Development in Advanced Communications Technologies in Europe
VDEVirtual Desktop Environment
VoIPVoice over IP
FACLFile System Access Control List
UDPUser Datagram Protocol
VMVirtual Machine
AES-256Advanced Encryption Standards 256-bit
DSADigital Signature Algorithm
TCP/IPTransmission Control Protocol/Internet Protocol
IEEEInstitute of Electrical and Electronics Engineers
RFIDRadio Frequency Identifier
IPSIntrusion Prevention System
KDCKey Distribution Center
MSCHAPMicrosoft Challenge Handshake
AESAdvanced Encryption Standard
IKEInternet Key Exchange
PTZPan-tilt-zoom
RC4Rivest Cipher version 4
IDSIntrusion Detection System
IVInitialization Vector
AIArtificial Intelligence
PIIPersonally Identifiable Information
COPECorporate Owned, Personally Enabled
DLLDynamic Link Library
SASESecure Access Service Edge
SMSShort Message Service
SOAPSimple Object Access Protocol
CTMCounter Mode
EFSEncrypted File System
IMInstant Messaging
ISSOInformation Systems Security Officer
IMAPInternet Message Access Protocol
IPInternet Protocol
SHTTPSecure Hypertext Transfer Protocol
SOWStatement of Work
XSSCross-site Scripting
ERPEnterprise Resource Planning
GDPRGeneral Data Protection Regulation
MOAMemorandum of Agreement
RASRemote Access Server
SEHStructured Exception Handler
BASHBourne Again Shell
BPABusiness Partners Agreement
HMACHashed Message Authentication Code
IDFIntermediate Distribution Frame
PDUPower Distribution Unit
CSOChief Security Officer
IoTInternet of Things
RADRapid Application Development
CRLCertificate Revocation List
CSRCertificate Signing Request
IPSecInternet Protocol Security
SELinux Security-enhanced Linux
UTPUnshielded Twisted Pair
HIDSHost-based Intrusion Detection System
SQLStructured Query Language
WTLSWireless TLS
APAccess Point
DPOData Privacy Officer
LANLocal Area Network
PGPPretty Good Privacy
CACertificate Authority
CSPCloud Service Provider
TOCTime-of-check
XDRExtended Detection and Response
ECDSAElliptic Curve Digital Signature Algorithm
TAXIITrusted Automated eXchange of Indicator Information
VLANVirtual Local Area Network
FTPFile Transfer Protocol
MANMetropolitan Area Network
UPSUninterruptable Power Supply
MACMessage Authentication Code
CBCCipher Block Chaining
PEMPrivacy Enhanced Mail
VLSMVariable Length Subnet Masking
DRPDisaster Recovery Plan
FIMFile Integrity Management
MaaSMonitoring as a Service
NATNetwork Address Translation
RBACRule-based Access Control
TOUTime-of-use
AROAnnualized Rate of Occurrence
CVECommon Vulnerability Enumeration
ISOInternational Standards Organization
NIDSNetwork-based Intrusion Detection System
RARegistration Authority
DBADatabase Administrator
MD5Message Digest 5
RPORecovery Point Objective
SDNSoftware-defined Networking
CFBCipher Feedback
DHEDiffie-Hellman Ephemeral
ECDHEElliptic Curve Diffie-Hellman Ephemeral
AHAuthentication Header
HTMLHypertext Markup Language
PIVPersonal Identity Verification
SLAService-level Agreement
AAAAuthentication, Authorization, and Accounting
TKIPTemporal Key Integrity Protocol
VBAVisual Basic
CTOChief Technology Officer
MPLSMulti-protocol Label Switching
NTLMNew Technology LAN Manager
RATRemote Access Trojan
RSARivest, Shamir, & Adleman
SIMSubscriber Identity Module
RIPEMDRACE Integrity Primitives Evaluation Message Digest
SDKSoftware Development Kit
SSOSingle Sign-on
AUPAcceptable Use Policy
DNATDestination Network Address Translation
FPGAField Programmable Gate Array
HOTPHMAC-based One-time Password
ROIReturn on Investment
SSLSecure Sockets Layer
UATUser Acceptance Testing
VPNVirtual Private Network
BCPBusiness Continuity Planning
KEKKey Encryption Key
PEAPProtected Extensible Authentication Protocol
BYODBring Your Own Device
CCMPCounter Mode/CBC-MAC Protocol
HTTPSHypertext Transfer Protocol Secure
IRPIncident Response Plan
RADIUSRemote Authentication Dial-in User Service
UEFIUnified Extensible Firmware Interface
WPSWi-Fi Protected Setup