Print Options

Card layout: ?

← Back to notecard set|Easy Notecards home page

Instructions for Side by Side Printing
  1. Print the notecards
  2. Fold each page in half along the solid vertical line
  3. Cut out the notecards by cutting along each horizontal dotted line
  4. Optional: Glue, tape or staple the ends of each notecard together
  1. Verify Front of pages is selected for Viewing and print the front of the notecards
  2. Select Back of pages for Viewing and print the back of the notecards
    NOTE: Since the back of the pages are printed in reverse order (last page is printed first), keep the pages in the same order as they were after Step 1. Also, be sure to feed the pages in the same direction as you did in Step 1.
  3. Cut out the notecards by cutting along each horizontal and vertical dotted line
To print: Ctrl+PPrint as a list

229 notecards = 58 pages (4 cards per page)

Viewing:

CompTIA Security+ SY0-401 Acronyms

front 1

3DES

back 1

Triple Digital Encryption Standard

front 2

AAA

back 2

Authentication, Authorization, and Accounting

front 3

ACL

back 3

Access Control List

front 4

AES

back 4

Advanced Encryption Standard

front 5

AES256

back 5

Advanced Encryption Standards 256bit

front 6

AH

back 6

Authentication Header

front 7

ALE

back 7

Annualized Loss Expectancy

front 8

AP

back 8

Access Point

front 9

API

back 9

Application Programming Interface

front 10

ASP

back 10

Application Service Provider

front 11

ARO

back 11

Annualized Rate of Occurrence

front 12

ARP

back 12

Address Resolution Protocol

front 13

AUP

back 13

Acceptable Use Policy

front 14

BAC

back 14

Business Availability Center

front 15

BCP

back 15

Business Continuity Planning

front 16

BIA

back 16

Business Impact Analysis

front 17

BIOS

back 17

Basic Input / Output System

front 18

BPA

back 18

Business Partners Agreement

front 19

BYOD

back 19

Bring Your Own Device

front 20

CA

back 20

Certificate Authority

front 21

CAC

back 21

Common Access Card

front 22

CAN

back 22

Controller Area Network

front 23

CAPTCHA

back 23

Completely Automated Public Turning Test to Tell

front 24

Computers

back 24

and Humans Apart

front 25

CAR

back 25

Corrective Action Report

front 26

CCMP

back 26

CounterMode/CBCMac Protocol

front 27

CCTV

back 27

Closedcircuit television

front 28

CERT

back 28

Computer Emergency Response Team

front 29

CHAP

back 29

Challenge Handshake Authentication Protocol

front 30

CIO

back 30

Chief Information Officer

front 31

CIRT

back 31

Computer Incident Response Team

front 32

COOP

back 32

Continuity of Operation Planning

front 33

CP

back 33

Contingency Planning

front 34

CRC

back 34

Cyclical Redundancy Check

front 35

CRL

back 35

Certification Revocation List

front 36

CSR

back 36

Control Status Register

front 37

CSU

back 37

Channel Service Unit

front 38

CTO

back 38

Chief Technology Officer

front 39

DAC

back 39

Discretionary Access Control

front 40

DBADatabase

back 40

Administrator

front 41

DDOS

back 41

Distributed Denial of Service

front 42

DEP

back 42

Data Execution Prevention

front 43

DES

back 43

Digital Encryption Standard

front 44

DHCP

back 44

Dynamic Host Configuration Protocol

front 45

DHE

back 45

DataHandling Electronics

front 46

DHE

back 46

DiffieHellman Ephemeral

front 47

DLL

back 47

Dynamic Link Library

front 48

DLP

back 48

Data Loss Prevention

front 49

DMZ

back 49

Demilitarized Zone

front 50

DNAT

back 50

Destination Network Address Transaction

front 51

DNS

back 51

Domain Name Service (Server)

front 52

DOS

back 52

Denial of Service

front 53

DRP

back 53

Disaster Recovery Plan

front 54

DSA

back 54

Digital Signature Algorithm

front 55

DSL

back 55

Digital Subscriber line

front 56

DSU

back 56

Data Service Unit

front 57

EAP

back 57

Extensible Authentication Protocol

front 58

ECC

back 58

Elliptic Curve Cryptography

front 59

ECDHE

back 59

Elliptic Curve DiffieHellman Ephemeral

front 60

EFS

back 60

Encrypted File System

front 61

EMI

back 61

Electromagnetic Interference

front 62

ESN

back 62

Electronic Serial Number

front 63

ESP

back 63

Encapsulated Security Payload

front 64

FACL

back 64

File System Access Control List

front 65

FDEFull

back 65

Disk Encryption

front 66

FTP

back 66

File Transfer Protocol

front 67

FTPS

back 67

Secured File Transfer Protocol

front 68

GPG

back 68

Global Property Guide

front 69

GPO

back 69

Group Policy Object

front 70

GPS

back 70

Global Positioning System

front 71

GPU

back 71

Graphic Processing Unit

front 72

GRE

back 72

Generic Routing Encapsulation

front 73

HDD

back 73

Hard Disk Drive

front 74

HIDS

back 74

Host Based Intrusion Detection System

front 75

HIPS

back 75

Host Based Intrusion Prevention System

front 76

HMAC

back 76

Hashed Message Authentication Code

front 77

HOTP

back 77

HMAC based One Time Password

front 78

HSM

back 78

Hardware Security Module

front 79

HTTP

back 79

Hypertext Transfer Protocol

front 80

HTTPS

back 80

Hypertext Transfer Protocol over SSL

front 81

HVAC

back 81

Heating, Ventilation Air Conditioning

front 82

IaaS

back 82

Infrastructure as a Service

front 83

ICMP

back 83

Internet Control Message Protocol

front 84

ID

back 84

Identification

front 85

IDS

back 85

Intrusion Detection System

front 86

IKE

back 86

Internet Key Exchange

front 87

IM

back 87

Instant messaging

front 88

IMAP4

back 88

Internet Message Access Protocol v4

front 89

IP

back 89

Internet Protocol

front 90

IPSEC

back 90

Internet Protocol Security

front 91

IRIncident

back 91

Response

front 92

IRC

back 92

Internet Relay Chat

front 93

IRP

back 93

Incident Response Procedure

front 94

ISA

back 94

Interconnection Security Agreement

front 95

ISP

back 95

Internet Service Provider

front 96

ISSO

back 96

Information Systems Security Officer

front 97

ITCP

back 97

IT Contingency Plan

front 98

IV

back 98

Initialization Vector

front 99

JBODJust

back 99

a Bunch of Disks

front 100

KDC

back 100

Key Distribution Center

front 101

L2TP

back 101

Layer 2 Tunneling Protocol

front 102

LAN

back 102

Local Area Network

front 103

LDAP

back 103

Lightweight Directory Access Protocol

front 104

LEAP

back 104

Lightweight Extensible Authentication Protocol

front 105

MaaS

back 105

Monitoring as a Service

front 106

MAC

back 106

Mandatory Access Control / Media Access Control

front 107

MAC

back 107

Message Authentication Code

front 108

MAN

back 108

Metropolitan Area Network

front 109

MBR

back 109

Master Boot Record

front 110

MD5

back 110

Message Digest 5

front 111

MOU

back 111

Memorandum of Understanding

front 112

MPLS

back 112

MultiProtocol Layer Switch

front 113

MSCHAP

back 113

Microsoft Challenge Handshake Authentication Protocol

front 114

MTBF

back 114

Mean Time Between Failures

front 115

MTTR

back 115

Mean Time to Recover

front 116

MTTF

back 116

Mean Time to Failure

front 117

MTU

back 117

Maximum Transmission Unit

front 118

NAC

back 118

Network Access Control

front 119

NAT

back 119

Network Address Translation

front 120

NDA

back 120

NonDisclosure Agreement

front 121

NFCNear

back 121

Field Communication

front 122

NIDS

back 122

Network Based Intrusion Detection System

front 123

NIPS

back 123

Network Based Intrusion Prevention System

front 124

NIST

back 124

National Institute of Standards & Technology

front 125

NOS

back 125

Network Operating System

front 126

NTFS

back 126

New Technology File System

front 127

NTLM

back 127

New Technology LANMAN

front 128

NTP

back 128

Network Time Protocol

front 129

OCSP

back 129

Online Certificate Status Protocol

front 130

OLA

back 130

Open License Agreement

front 131

OS

back 131

Operating System

front 132

OVAL

back 132

Open Vulnerability Assessment Language

front 133

P2P

back 133

Peer to Peer

front 134

PACProxy

back 134

Auto Configuration

front 135

PAM

back 135

Pluggable Authentication Modules

front 136

PAP

back 136

Password Authentication Protocol

front 137

PAT

back 137

Port Address Translation

front 138

PBKDF2

back 138

Password Based Key Derivation Function 2

front 139

PBX

back 139

Private Branch Exchange

front 140

PCAP

back 140

Packet Capture

front 141

PEAP

back 141

Protected Extensible Authentication Protocol

front 142

PED

back 142

Personal Electronic Device

front 143

PGP

back 143

Pretty Good Privacy

front 144

PII

back 144

Personally Identifiable Information

front 145

PIV

back 145

Personal Identity Verification

front 146

PKI

back 146

Public Key Infrastructure

front 147

POTS

back 147

Plain Old Telephone Service

front 148

PPP

back 148

Pointtopoint Protocol

front 149

PPTP

back 149

Point to Point Tunneling Protocol

front 150

PSK

back 150

PreShared Key

front 151

PTZ

back 151

PanTiltZoom

front 152

RA

back 152

Recovery Agent

front 153

RAD

back 153

Rapid application development

front 154

RADIUS

back 154

Remote Authentication Dialin User Server

front 155

RAID

back 155

Redundant Array of Inexpensive Disks

front 156

RAS

back 156

Remote Access Server

front 157

RBAC

back 157

Role Based Access Control

front 158

RBAC

back 158

Rule Based Access Control

front 159

RC4

back 159

RSA Variable Key Size Encryption Algorithm

front 160

RIPEMD

back 160

RACE Integrity Primitives Evaluation Message Digest

front 161

ROI

back 161

Return of Investment

front 162

RPO

back 162

Recovery Point Objective

front 163

RSA

back 163

Rivest, Shamir, & Adleman

front 164

RTO

back 164

Recovery Time Objective

front 165

RTP

back 165

RealTime Transport Protocol

front 166

S/MIME

back 166

Secure / Multipurpose Internet Mail Extensions

front 167

SAML

back 167

Security Assertions Markup Language

front 168

SaaS

back 168

Software as a Service

front 169

SAN

back 169

Storage Area Network

front 170

SCADA

back 170

System Control and Data Acquisition

front 171

SCAP

back 171

Security Content Automation Protocol

front 172

SCEP

back 172

Simple Certificate Enrollment Protocol

front 173

SCSI

back 173

Small Computer System Interface

front 174

SDLC

back 174

Software Development Life Cycle

front 175

SDLM

back 175

Software Development Life Cycle Methodology

front 176

SEH

back 176

Structured Exception Handler

front 177

SHA

back 177

Secure Hashing Algorithm

front 178

SFTP

back 178

Secured File Transfer Protocol

front 179

SHTTP

back 179

Secure Hypertext Transfer Protocol

front 180

SIEM

back 180

Security Information and Event Management

front 181

SIM

back 181

Subscriber Identity Module

front 182

SLA

back 182

Service Level Agreement

front 183

SLE

back 183

Single Loss Expectancy

front 184

SMS

back 184

Short Message Service

front 185

SMTP

back 185

Simple Mail Transfer Protocol

front 186

SNMP

back 186

Simple Network Management Protocol

front 187

SOAP

back 187

Simple Object Access Point

front 188

SONET

back 188

Synchronous Optical Network Technologies

front 189

SPIM

back 189

Spam over Internet Messaging

front 190

SQL

back 190

Structured Query Language

front 191

SSD

back 191

Solid State Drive

front 192

SSH

back 192

Secure Shell

front 193

SSL

back 193

Secure Sockets Layer

front 194

SSO

back 194

Single Sign On

front 195

STP

back 195

Shielded Twisted Pair

front 196

TACACS+

back 196

Terminal Access Controller Access Control System

front 197

TCP/IP

back 197

Transmission Control Protocol / Internet Protocol

front 198

TGTTicket

back 198

Granting Ticket

front 199

TKIP

back 199

Temporal Key Integrity Protocol

front 200

TLS

back 200

Transport Layer Security

front 201

TOTP

back 201

TimeBased OneTime Password

front 202

TPM

back 202

Trusted Platform Module

front 203

TSIG

back 203

Transaction Signature

front 204

UAT

back 204

User Acceptance Testing

front 205

UEFI

back 205

Unified Extensible Firmware Interface

front 206

UDP

back 206

User Datagram Protocol

front 207

UPS

back 207

Uninterruptable Power Supply

front 208

URI

back 208

Uniform Resource Identifier

front 209

URL

back 209

Universal Resource Locator

front 210

USB

back 210

Universal Serial Bus

front 211

UTM

back 211

Unified Threat Management

front 212

UTP

back 212

Unshielded Twisted Pair

front 213

VDI

back 213

Virtualization Desktop Infrastructure

front 214

VLAN

back 214

Virtual Local Area Network

front 215

VoIP

back 215

Voice over IP

front 216

VPN

back 216

Virtual Private Network

front 217

VTC

back 217

Video Teleconferencing

front 218

WAF

back 218

WebApplication Firewall

front 219

WAP

back 219

Wireless Access Point

front 220

WEP

back 220

Wired Equivalent Privacy

front 221

WIDS

back 221

Wireless Intrusion Detection System

front 222

WIPS

back 222

Wireless Intrusion Prevention System

front 223

WPA

back 223

Wireless Protected Access

front 224

WPA2

back 224

WiFi Protected Access 2

front 225

WPS

back 225

WiFi Protected Setup

front 226

WTLS

back 226

Wireless TLS

front 227

XML

back 227

Extensible Markup Language

front 228

XSRF

back 228

CrossSite Request Forgery

front 229

XSS

back 229

CrossSite Scripting