CompTIA Security+ SY0-401 Acronyms Flashcards


Set Details Share
created 10 years ago by Jenowen
5,731 views
Acronyms from the CompTIA SY0-401 Security+ Objectives.
Grade levels:
Professional
Subjects:
comptia, security, sec+
show moreless
Page to share:
Embed this setcancel
COPY
code changes based on your size selection
Size:
X
Show:

1

3DES

Triple Digital Encryption Standard

2

AAA

Authentication, Authorization, and Accounting

3

ACL

Access Control List

4

AES

Advanced Encryption Standard

5

AES256

Advanced Encryption Standards 256bit

6

AH

Authentication Header

7

ALE

Annualized Loss Expectancy

8

AP

Access Point

9

API

Application Programming Interface

10

ASP

Application Service Provider

11

ARO

Annualized Rate of Occurrence

12

ARP

Address Resolution Protocol

13

AUP

Acceptable Use Policy

14

BAC

Business Availability Center

15

BCP

Business Continuity Planning

16

BIA

Business Impact Analysis

17

BIOS

Basic Input / Output System

18

BPA

Business Partners Agreement

19

BYOD

Bring Your Own Device

20

CA

Certificate Authority

21

CAC

Common Access Card

22

CAN

Controller Area Network

23

CAPTCHA

Completely Automated Public Turning Test to Tell

24

Computers

and Humans Apart

25

CAR

Corrective Action Report

26

CCMP

CounterMode/CBCMac Protocol

27

CCTV

Closedcircuit television

28

CERT

Computer Emergency Response Team

29

CHAP

Challenge Handshake Authentication Protocol

30

CIO

Chief Information Officer

31

CIRT

Computer Incident Response Team

32

COOP

Continuity of Operation Planning

33

CP

Contingency Planning

34

CRC

Cyclical Redundancy Check

35

CRL

Certification Revocation List

36

CSR

Control Status Register

37

CSU

Channel Service Unit

38

CTO

Chief Technology Officer

39

DAC

Discretionary Access Control

40

DBADatabase

Administrator

41

DDOS

Distributed Denial of Service

42

DEP

Data Execution Prevention

43

DES

Digital Encryption Standard

44

DHCP

Dynamic Host Configuration Protocol

45

DHE

DataHandling Electronics

46

DHE

DiffieHellman Ephemeral

47

DLL

Dynamic Link Library

48

DLP

Data Loss Prevention

49

DMZ

Demilitarized Zone

50

DNAT

Destination Network Address Transaction

51

DNS

Domain Name Service (Server)

52

DOS

Denial of Service

53

DRP

Disaster Recovery Plan

54

DSA

Digital Signature Algorithm

55

DSL

Digital Subscriber line

56

DSU

Data Service Unit

57

EAP

Extensible Authentication Protocol

58

ECC

Elliptic Curve Cryptography

59

ECDHE

Elliptic Curve DiffieHellman Ephemeral

60

EFS

Encrypted File System

61

EMI

Electromagnetic Interference

62

ESN

Electronic Serial Number

63

ESP

Encapsulated Security Payload

64

FACL

File System Access Control List

65

FDEFull

Disk Encryption

66

FTP

File Transfer Protocol

67

FTPS

Secured File Transfer Protocol

68

GPG

Global Property Guide

69

GPO

Group Policy Object

70

GPS

Global Positioning System

71

GPU

Graphic Processing Unit

72

GRE

Generic Routing Encapsulation

73

HDD

Hard Disk Drive

74

HIDS

Host Based Intrusion Detection System

75

HIPS

Host Based Intrusion Prevention System

76

HMAC

Hashed Message Authentication Code

77

HOTP

HMAC based One Time Password

78

HSM

Hardware Security Module

79

HTTP

Hypertext Transfer Protocol

80

HTTPS

Hypertext Transfer Protocol over SSL

81

HVAC

Heating, Ventilation Air Conditioning

82

IaaS

Infrastructure as a Service

83

ICMP

Internet Control Message Protocol

84

ID

Identification

85

IDS

Intrusion Detection System

86

IKE

Internet Key Exchange

87

IM

Instant messaging

88

IMAP4

Internet Message Access Protocol v4

89

IP

Internet Protocol

90

IPSEC

Internet Protocol Security

91

IRIncident

Response

92

IRC

Internet Relay Chat

93

IRP

Incident Response Procedure

94

ISA

Interconnection Security Agreement

95

ISP

Internet Service Provider

96

ISSO

Information Systems Security Officer

97

ITCP

IT Contingency Plan

98

IV

Initialization Vector

99

JBODJust

a Bunch of Disks

100

KDC

Key Distribution Center

101

L2TP

Layer 2 Tunneling Protocol

102

LAN

Local Area Network

103

LDAP

Lightweight Directory Access Protocol

104

LEAP

Lightweight Extensible Authentication Protocol

105

MaaS

Monitoring as a Service

106

MAC

Mandatory Access Control / Media Access Control

107

MAC

Message Authentication Code

108

MAN

Metropolitan Area Network

109

MBR

Master Boot Record

110

MD5

Message Digest 5

111

MOU

Memorandum of Understanding

112

MPLS

MultiProtocol Layer Switch

113

MSCHAP

Microsoft Challenge Handshake Authentication Protocol

114

MTBF

Mean Time Between Failures

115

MTTR

Mean Time to Recover

116

MTTF

Mean Time to Failure

117

MTU

Maximum Transmission Unit

118

NAC

Network Access Control

119

NAT

Network Address Translation

120

NDA

NonDisclosure Agreement

121

NFCNear

Field Communication

122

NIDS

Network Based Intrusion Detection System

123

NIPS

Network Based Intrusion Prevention System

124

NIST

National Institute of Standards & Technology

125

NOS

Network Operating System

126

NTFS

New Technology File System

127

NTLM

New Technology LANMAN

128

NTP

Network Time Protocol

129

OCSP

Online Certificate Status Protocol

130

OLA

Open License Agreement

131

OS

Operating System

132

OVAL

Open Vulnerability Assessment Language

133

P2P

Peer to Peer

134

PACProxy

Auto Configuration

135

PAM

Pluggable Authentication Modules

136

PAP

Password Authentication Protocol

137

PAT

Port Address Translation

138

PBKDF2

Password Based Key Derivation Function 2

139

PBX

Private Branch Exchange

140

PCAP

Packet Capture

141

PEAP

Protected Extensible Authentication Protocol

142

PED

Personal Electronic Device

143

PGP

Pretty Good Privacy

144

PII

Personally Identifiable Information

145

PIV

Personal Identity Verification

146

PKI

Public Key Infrastructure

147

POTS

Plain Old Telephone Service

148

PPP

Pointtopoint Protocol

149

PPTP

Point to Point Tunneling Protocol

150

PSK

PreShared Key

151

PTZ

PanTiltZoom

152

RA

Recovery Agent

153

RAD

Rapid application development

154

RADIUS

Remote Authentication Dialin User Server

155

RAID

Redundant Array of Inexpensive Disks

156

RAS

Remote Access Server

157

RBAC

Role Based Access Control

158

RBAC

Rule Based Access Control

159

RC4

RSA Variable Key Size Encryption Algorithm

160

RIPEMD

RACE Integrity Primitives Evaluation Message Digest

161

ROI

Return of Investment

162

RPO

Recovery Point Objective

163

RSA

Rivest, Shamir, & Adleman

164

RTO

Recovery Time Objective

165

RTP

RealTime Transport Protocol

166

S/MIME

Secure / Multipurpose Internet Mail Extensions

167

SAML

Security Assertions Markup Language

168

SaaS

Software as a Service

169

SAN

Storage Area Network

170

SCADA

System Control and Data Acquisition

171

SCAP

Security Content Automation Protocol

172

SCEP

Simple Certificate Enrollment Protocol

173

SCSI

Small Computer System Interface

174

SDLC

Software Development Life Cycle

175

SDLM

Software Development Life Cycle Methodology

176

SEH

Structured Exception Handler

177

SHA

Secure Hashing Algorithm

178

SFTP

Secured File Transfer Protocol

179

SHTTP

Secure Hypertext Transfer Protocol

180

SIEM

Security Information and Event Management

181

SIM

Subscriber Identity Module

182

SLA

Service Level Agreement

183

SLE

Single Loss Expectancy

184

SMS

Short Message Service

185

SMTP

Simple Mail Transfer Protocol

186

SNMP

Simple Network Management Protocol

187

SOAP

Simple Object Access Point

188

SONET

Synchronous Optical Network Technologies

189

SPIM

Spam over Internet Messaging

190

SQL

Structured Query Language

191

SSD

Solid State Drive

192

SSH

Secure Shell

193

SSL

Secure Sockets Layer

194

SSO

Single Sign On

195

STP

Shielded Twisted Pair

196

TACACS+

Terminal Access Controller Access Control System

197

TCP/IP

Transmission Control Protocol / Internet Protocol

198

TGTTicket

Granting Ticket

199

TKIP

Temporal Key Integrity Protocol

200

TLS

Transport Layer Security

201

TOTP

TimeBased OneTime Password

202

TPM

Trusted Platform Module

203

TSIG

Transaction Signature

204

UAT

User Acceptance Testing

205

UEFI

Unified Extensible Firmware Interface

206

UDP

User Datagram Protocol

207

UPS

Uninterruptable Power Supply

208

URI

Uniform Resource Identifier

209

URL

Universal Resource Locator

210

USB

Universal Serial Bus

211

UTM

Unified Threat Management

212

UTP

Unshielded Twisted Pair

213

VDI

Virtualization Desktop Infrastructure

214

VLAN

Virtual Local Area Network

215

VoIP

Voice over IP

216

VPN

Virtual Private Network

217

VTC

Video Teleconferencing

218

WAF

WebApplication Firewall

219

WAP

Wireless Access Point

220

WEP

Wired Equivalent Privacy

221

WIDS

Wireless Intrusion Detection System

222

WIPS

Wireless Intrusion Prevention System

223

WPA

Wireless Protected Access

224

WPA2

WiFi Protected Access 2

225

WPS

WiFi Protected Setup

226

WTLS

Wireless TLS

227

XML

Extensible Markup Language

228

XSRF

CrossSite Request Forgery

229

XSS

CrossSite Scripting