AAA - Authentication, Authorization, and Accounting , ACL - Access Control List, AES/AES-256 - Advanced Encryption Standard/ Advanced Encryption Standard- 256 bit, WEP - Wired Equivalent Privacy , AH - Authentication Header, Ai - Artificial Intelligence, AIS - Automated Indicator Sharing, ALE - Annualized Loss Expectancy, AP - Access Point, API - Application Programming Interface, APT - Advanced Persistent Threat, ASLR - Address Space Layout Randomization, ATT&CK - Adversarial Tactics, Techniques, and Common Knowledge, AUP - Acceptable Use Policy, AV - Antivirus, BASH - Bourne Again Shell, BCP - Business Continuity Planning, BGP - Border Gateway Protocol, BIA - Business Impact Analysis, BIOS - Basic Input/Output System, BPA - Business Partners Agreement, BDPU - Bridge Protocol Data Unit, BYOD - Bring Your Own Device, CA - Certificate Authority, CAPTCHA - Completely Automated Public Trusting Test to Tell Computers and Humans Apart, CAR - Corrective Action Report, CASB - Cloud Access Security Broker, CBC - Cypher Block Chaining, CCMP - Counter Mode/CBC-MAC Protocol, CCTV - Closed-circuit Television, CERT - Computer Emergency Response Team, CFB - Cypher Feedback, CHAP - Challenge Handshake Authentication Protocol, CIA - Confidentiality, Integrity, Availability , CIO - Chief Information Officer, CIRT - Computer Incident Response Team, CMS - Content Management System, COOP - Continuity of Operation Planning, COPE - Corporate Owned, Personally Enabled, CP - Contingency Planning, CRC - Cyclical Redundancy Check, CRL - Certificate Revocation List, CSO - Chief Security Officer, CSP - Cloud Service Provider, CSR - Certificate Signing Request, CSRF - Cross-site Request Forgery, CSU - Channel Service Unit, CTM - Counter Mode, CTO - Chief Technology Officer, CVE - Common Vulnerability Enumeration, CVSS - Common Vulnerability Scoring System, CYOD - Choose Your Own Device, DAC - Discretionary Access Control, DBA - Database Administrator, DDoS - Distributed Denial of Service, DEP - Data Execution Prevention, DES - Defense Encryption Standard, DHCP - Dynamic Host Configuration Protocol , DHE - Diffie-Hellman Ephemeral, DKIM - DomainKeys Identified Mail, DLL - Dynamic Link Library, DLP - Data Loss Prevention, DMARC - Domain Message Authentication Reporting and Conformance, DNAT - Destination Network Address Translation, DNS - Domain Name System, DoS - Denial of Service, DPO - Data Privacy Officer, WAP - Wireless Access Point, WAF - Web Application Firewall, VTC - Video Teleconferencing , VPN/ VPC - Virtual Private Network/ Virtual Private Cloud, VoIP - Voice over IP, VM - Virtual Machine, VLSM - Variable Length Subnet Masking, VLAN - Virtual Local Area Network, VDI/VDE - Virtual Desktop Infrastructure/ Virtual Desktop Environment, VBA - Visual Basic, UTP - Unshielded Twisted Pair, UTM - Unified Threat Management, USB OTG - USB On the Go, USB - Universal Serial Bus, URL - Universal Resource Locator, URI - Uniform Resource Identifier, UPS - Uninterruptible Power Supply , UEM - Unified Endpoint Management , UEFI - Unified Extensible Firmware Interface, UDP - User Datagram Protocol, UAV - Unmanned Aerial Vehicle , UAT - User Acceptance Testing, TSIG - Transaction Signature , TTP - Tactics, Techniques, and Procedures , TPM - Trusted Platform Module, TOU - Time-of-use, TOTP - Time-based One-time Password, TOC - Time-of-check, TLS - Transport Layer Security, TKIP - Temporal Key Integrity Protocol, TGT - Ticket Granting Ticket , TCP/IP - Transmission Control Protocol/ Internet Protocol , TAXII - Trusted Automated eXchange of Indicator Information,

CompTIA Sec+ SY0-701 Acronym List Pt. 1

Leaderboard

Flash cards is an open-ended template. It does not generate scores for a leaderboard.

Visual style

Options

Switch template

Continue editing: ?