AAA - Authentication, Authorization, and Accounting , ACL - Access Control List, AES/AES-256 - Advanced Encryption Standard/ Advanced Encryption Standard- 256 bit, WEP - Wired Equivalent Privacy , AH - Authentication Header, Ai - Artificial Intelligence, AIS - Automated Indicator Sharing, ALE - Annualized Loss Expectancy, AP - Access Point, API - Application Programming Interface, APT - Advanced Persistent Threat, ASLR - Address Space Layout Randomization, ATT&CK - Adversarial Tactics, Techniques, and Common Knowledge, AUP - Acceptable Use Policy, AV - Antivirus, BASH - Bourne Again Shell, BCP - Business Continuity Planning, BGP - Border Gateway Protocol, BIA - Business Impact Analysis, BIOS - Basic Input/Output System, BPA - Business Partners Agreement, BDPU - Bridge Protocol Data Unit, BYOD - Bring Your Own Device, CA - Certificate Authority, CAPTCHA - Completely Automated Public Trusting Test to Tell Computers and Humans Apart, CAR - Corrective Action Report, CASB - Cloud Access Security Broker, CBC - Cypher Block Chaining, CCMP - Counter Mode/CBC-MAC Protocol, CCTV - Closed-circuit Television, CERT - Computer Emergency Response Team, CFB - Cypher Feedback, CHAP - Challenge Handshake Authentication Protocol, CIA - Confidentiality, Integrity, Availability , CIO - Chief Information Officer, CIRT - Computer Incident Response Team, CMS - Content Management System, COOP - Continuity of Operation Planning, COPE - Corporate Owned, Personally Enabled, CP - Contingency Planning, CRC - Cyclical Redundancy Check, CRL - Certificate Revocation List, CSO - Chief Security Officer, CSP - Cloud Service Provider, CSR - Certificate Signing Request, CSRF - Cross-site Request Forgery, CSU - Channel Service Unit, CTM - Counter Mode, CTO - Chief Technology Officer, CVE - Common Vulnerability Enumeration, CVSS - Common Vulnerability Scoring System, CYOD - Choose Your Own Device, DAC - Discretionary Access Control, DBA - Database Administrator, DDoS - Distributed Denial of Service, DEP - Data Execution Prevention, DES - Defense Encryption Standard, DHCP - Dynamic Host Configuration Protocol , DHE - Diffie-Hellman Ephemeral, DKIM - DomainKeys Identified Mail, DLL - Dynamic Link Library, DLP - Data Loss Prevention, DMARC - Domain Message Authentication Reporting and Conformance, DNAT - Destination Network Address Translation, DNS - Domain Name System, DoS - Denial of Service, DPO - Data Privacy Officer, WAP - Wireless Access Point, WAF - Web Application Firewall, VTC - Video Teleconferencing , VPN/ VPC - Virtual Private Network/ Virtual Private Cloud, VoIP - Voice over IP, VM - Virtual Machine, VLSM - Variable Length Subnet Masking, VLAN - Virtual Local Area Network, VDI/VDE - Virtual Desktop Infrastructure/ Virtual Desktop Environment, VBA - Visual Basic, UTP - Unshielded Twisted Pair, UTM - Unified Threat Management, USB OTG - USB On the Go, USB - Universal Serial Bus, URL - Universal Resource Locator, URI - Uniform Resource Identifier, UPS - Uninterruptible Power Supply , UEM - Unified Endpoint Management , UEFI - Unified Extensible Firmware Interface, UDP - User Datagram Protocol, UAV - Unmanned Aerial Vehicle , UAT - User Acceptance Testing, TSIG - Transaction Signature , TTP - Tactics, Techniques, and Procedures , TPM - Trusted Platform Module, TOU - Time-of-use, TOTP - Time-based One-time Password, TOC - Time-of-check, TLS - Transport Layer Security, TKIP - Temporal Key Integrity Protocol, TGT - Ticket Granting Ticket , TCP/IP - Transmission Control Protocol/ Internet Protocol , TAXII - Trusted Automated eXchange of Indicator Information,
0%
CompTIA Sec+ SY0-701 Acronym List Pt. 1
Share
Share
Share
by
Taneisha8
College
CS
CompTIA Sec
Edit Content
Print
Embed
More
Assignments
Leaderboard
Flash cards
is an open-ended template. It does not generate scores for a leaderboard.
Log in required
Visual style
Fonts
Subscription required
Options
Switch template
Show all
More formats will appear as you play the activity.
Open results
Copy link
QR code
Delete
Continue editing:
?