Busy. Please wait.

show password
Forgot Password?

Don't have an account?  Sign up 

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.

Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Remove ads
Don't know
remaining cards
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
restart all cards

Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Net+ & Sec+ Acronyms

Network+ & Security+ Acronyms

3DES Triple DES
AAA Authentication, Authorization, and Accounting
AC Alternating Current
ACL Access Control List
ACS Access Control Server
ADSL Asymmetric Digital Subscriber Line
AES Advanced Encryption Standard
AH Authentication Header
AHP Authentication Header Protocol
ALE Annualized Loss Expectancy
ALG Application Level Gateway
ANS Authoritative Name Server
ANSI American National Standards Institute
AP Access Point
APC Angled Physical Contact
API Application Programming Interface
APIPA Automatic Private IP Addressing
APT Advanced Persistent Threat
ARO Annualized Rate of Occurrence
ARP Address Resolution Protocol
AS Authentication Server
AS Autonomous System
ASLR Address Space Layout Randomization
ASP Application Service Provider
ATM Asynchronous Transfer Mode
AUI Connector Attachment Unit Interface Connector
B Channel Bearer Channel
BCP Business Continuity Planning
BDR Backup Designated Router
BERT Bit Error Rate Test
BGP Border Gateway Protocol
BIOS Basic Input/Output System
BOOTP Bootstrap Protocol
BPA Business Partners Agreement
BPDU Bridge Protocol Data Unit
BPL Broadband over Powerlines
BPS Bits Per Second
BRI Basic Rate Interface
BSS Basic Service Set
BSSID Basic Service Set Identifier
BYOD Bring Your Own Device
CA Certificate Authority
CAB Files Cabinet Files
CAC Common Access Card
CAM Table Content Addressable Memory Table
CAN Campus Area Network
CAN Controller Area Network
CAPTCHA Completely Automated Public Turing test to tell Computers and Humans Apart
CAR Corrective Action Report
CARP Common Address Redundancy Protocol
CCITT Comité Consutatif Internationale Téléphonique et Télégraphique
CCMP Counter Mode with Cipher Block Chaining Message Authentication Code Protocol
CCTV Closed-Circuit Television
CDS/DSU Channel Service Unit/Data Service Unit
CERT Computer Emergency Response Team
CFB Cipher Feedback
CGI Common Gateway Interface
CHAP Challenge Handshake Authentication Protocol
CIA/AIC Confidentiality, Integrity, Availability
CIDR Classless Inter Domain Routing
CIFS Common Internet File System
CIO Chief Information Officer
CIRT Computer Incident Response Team
CMS Content Management System
CNAME Canonical Name Record
COOP Continuity Of Operation Planning
COPPA Children'S Online Privacy Protection Act
CoS Class of Service
CPE Customer-Premises Equipment
CRC Cyclic Redundancy Check
CRL Certificate Revocation List
CRM Customer Relationship Management
CSMA/CA Carrier Sense Multiple Access with Collision Avoidance
CSMA/CD Carrier Sense Multiple Access with Collision Detection
CSO Chief Security Officer
CSP Cloud Service Provider
CSR Certificate Signing Request
CSU Channel Service Unit
CTO Chief Technology Officer
CWDM Coarse Wavelength Division Multiplexing
D Channel Delta Channel
DAC Discretionary Access Control
DAI Dynamic ARP Inspection
Db Decibel
DBA Database Administrator
DC Direct Current
DCE Data Communications Equipment
DCF Distributed Coordination Function
DCS Distributed Control System
DDNS Dynamic DNS
DDoS Distributed Denial of Service
DDoS Attack Distributed Denial of Service Attack
DEP Data Execution Prevention
DES Data Encryption Standard
DET Directory Entry Table
DFS Distributed File System
DHCP Dynamic Host Configuration Protocol
DiffServ Differentiated Services
DIG Domain Information Groper
DLL Dynamic Link Library
DLP Data Loss Prevention
DMZ Demilitarized Zone
DNAT Destination Network Address Translation
DNS Domain Name System
DNSBLs DNS Blacklists
DOCSIS Data Over Cable Service Interface Specification
DoS Denial of Service
DoS Attack Denial of Service Attack
DR Designated Router
DS Distribution System
DS1 Digital Signal 1
DSA Digital Signature Algorithm
DSH Digital Signal Hierarchy
DSL Digital Subscriber Line
DSLAM DSL Access Multiplexer
DSP Digital Signal Processor
DSSS Direct Sequence Spread Spectrum
DSU Data Service Unit
DTE Data Termination Equipment
DVM Digital Volt Meter
DWDM Dense Wavelength Division Multiplexing
EAP Extensible Authentication Protocol
EAPoIP Extensible Authentication Protocol over IP
EAPOL Extensible Authentication Protocol over LAN
EAP-TLS Extensible Authentication Protocol with Transport Layer Security
EAP-TTLS Extensible Authentication Protocol with Tunneled Transport Layer Security
ECC Elliptic Key Cryptography
ECDHE Elliptic Curve Diffie-Hellman Exchange
ECDSA Elliptic Curve Digital Signature Algorithm
EDAC Error Detection and Correction
EDB External Data Bus
EDC Error Detection Code
EEPROM Electrically Erasable Programmable Read–Only Memory
EFS Encrypting File System
EGP Exterior Gateway Protocol
EIA Electronic Industries Alliance
EIGRP Enhanced Interior Gateway Routing Protocol
E-mail Electronic Mail
EMI Electromagnetic Interference
EoP Ethernet Over Power
ERP Enterprise Resource Planning
ES Edge System
ESD Electrostatic Discharge
ESN Electronic Serial Number
ESP Encapsulating Security Payload
ESP Protocol Encapsulating Security Payload Protocol
ESS Extended Service Set
ESSID Extended Service Set Identifier
EUI-48 Extended Unique Identifier, 48-bit
EUI-64 Extended Unique Identifier, 64-bit
FACL File system Access Control List
FAT File Allocation Table
FC Face Contact
FC Fibre Channel
FCC Federal Communications Commission
FCrDNS Forward Confirmed reverse DNS
FCS Frame Check Sequence
FDDI Fiber Distributed Data Interface
FDE Full Disk Encryption
FDM Frequency Division Multiplexing
FEXT Far-End Crosstalk
FHSS Frequency Hopping Spread Spectrum
FQDN Fully Qualified Domain Name
FRR False Rejection Rate
FTP File Transfer Protocol
GBIC Gigabit Interface Converter
GCM Galois Counter Mode
GFS Grandfather, Father, Son
GIF Graphics Interchange Format
GLBA Gramm–Leach–Bliley Act
GPG GNU Privacy Guard
GPO Group Policy Object
GPS Global Positioning System
GPU Graphic Processing Unit
GRE Generic Routing Encapsulation
HCC Horizontal cross-connect
HDD Hard Disk Drive
HEC HDMI Ethernet Channel
Hex Hexadecimal
HIDS Host Intrusion Detection Systems
HIPAA Health Insurance Portability And Accountability Act
HIPS Host-based IPS
HMAC Hashed Message Authentication Code
HMI Human Machine Interface
HOTP HMAC-based One Time Password
HSM Hardware Security Module
HSPA+ Evolved High-Speed Packet Access
HSRP Hot Standby Router Protocol
HTML Hypertext Markup Language
HTTP Hypertext Transfer Protocol
HTTPS Hypertext Transfer Protocol over SSL
HVAC Heating, Ventilating, and Air Conditioning
IA Information Assurance
IaaS Infrastructure as a Service
IANA Internet Assigned Number Authority
IAS Internet Authentication Service
IBSS Independent Basic Service Set
ICA Independent Computing Architecture
ICANN Internet Corporation for Assigned Names and Numbers
ICC Intermediate Cross-connect
ICMP Internet Control Message Protocol
ICS Industrial Control Server
ICS Internet Connection Sharing
IDEA International Data Encryption Algorithm
IDF Intermediate Distribution Frame
IdP Identity Provider
IDS Intrusion Detection System
IEEE Institute of Electrical and Electronics Engineers
IETF Internet Engineering Task Force
IFG Interframe Gap
IFS Interframe Space
IGMP Internet Group Management Protocol
IGP Interior Gateway Protocol
IGRP Interior Gateway Routing Protocol
IIS Internet Information Services
IKE Internet Key Exchange
ILM Information Lifecycle Management
IMAP4 Internet Message Access Protocol
IoT Internet of Things
IP Internet Protocol
IPS Intrusion Prevention System
IPSec Internet Protocol Security
IPv4 Internet Protocol Version 4
IPv6 Internet Protocol Version 6
IRC Internet Relay Chat
IRP Incident Response Policy
ISA Interconnection Security Agreement
ISATAP Intra-Site Automatic Tunnel Addressing Protocol
iSCSI Internet Small Computer System Interface
ISDN Integrated Services Digital Network
IS-IS Intermediate System to Intermediate System
ISOC International Organization for Standardization
iSOC Internet Society
ISP Internet Service Provider
ISSO Information Systems Security Officer
IT Information Technology
ITCP IT Contingency Plan
ITU International Telecommunication Union
IV Initialization Vector
JBOD Just a Bunch of Disks
JPEG Joint Photographic Experts Group
Kbps Kilobits Per Second
KDC Key Distribution Center
KEK Key Encryption Key
KHMAC Key Hashing for Message Authentication Code
KHz Kilohertz
L2TP Layer 2 Tunneling Protocol
LACP Link Aggregation Control Protocol
LAN Local Area Network
LC Local Connector
LDAP Lightweight Directory Access Protocol
LEAP Lightweight Extensible Authentication Protocol
LED Light Emitting Diode
LFM Log File Monitor
LLC Logical Link Control
LTE Long Term Evolution
MaaS Monitoring as a Service
MAC Mandatory Access Control
MAC Media Access Control
MAC Message Authentication Code
MAC Address Media Access Control Address
MAN Metropolitan Area Network
MB Megabyte
MBSA Microsoft Baseline Security Analyzer
MCC Main cross-connect
MD5 Message-Digest Algorithm Version 5
MDF Main Distribution Frame
MGCP Media Gateway Control Protocol
MHz Megahertz
MIB Management Information Base
MIME Multipurpose Internet Mail Extensions
MIMO Multiple In/Multiple Out
MMC Microsoft Management Console
MME MME (Mesh Made Easy)
MMF Multimode Fiber
Modem Modulator-Demodulator
MOU Memorandum of Understanding
MPLS Multiprotocol Label Switching
MPPE Microsoft Point-to-Point Encryption
MSA Multisource Agreement
MSCHAP Microsoft Challenge Handshake Authentication Protocol
MSDS Material Safety Data Sheet
MTBF Mean Time Between Failures
mtr My Traceroute
MT-RJ Mechanical Transfer Registered Jack
MTSO Mobile Telecommunications Switching Office
MTTF Mean Time To Failure
MTTR Mean Time To Recover
MTU Maximum Transmission Unit
MUX Multiplexer
MX Mail Exchange
MX Record Mail Exchange Record
NaaS Network as a Service
NAC Network Access Control
NAC Network Address Control
NAS Network Access Server
NAS Network Attached Storage
NAT Network Address Translation
NDA Non-Disclosure Agreement
NetBEUI NetBIOS Extended User Interface
NetBIOS Network Basic Input/Output System
NEXT Near-End Crosstalk
NFC Near Field Communication
NFS Network File System
NIC Network Interface Card
NIDS Network Intrusion Detection System
NIPS Network-based IPS
NIST National Institute of Standards and Technology
NIU Network Interface Unit
NMS Network Management Software
NMS Network Management Station
NNI Network-to-Network Interface
NNTP Network News Transfer Protocol
NOS Network Operating System
NRZ Non-Return to Zero
NRZI Non-Return to Zero Inverted
NS Name Server
ns Nanosecond
NT Network Termination
NTFS New Technology File System
NTLM New Technology LAN Manager
NTP Network Time Protocol
NTU Network Termination Unit
NX No Execute
OAUTH Open Authorization
OCSP Online Certificate Status Protocol
OCx Optical Carrier x
OEM Original Equipment Manufacturer
OLA Open License Agreement
OS Operating System
OSI Open Systems Interconnection
OSI Model Open Systems Interconnection Reference Model
OSPF Open Shortest Path First
OTDR Optical Time-Domain Reflectometer
OTP One Time Pad
OUI Organizationally Unique Identifier
OVAL Open Vulnerability Assessment Language
P2P Peer to Peer
PaaS Platform as a Service
PAC Proxy Auto Configuration
PAM Pluggable Authentication Modules
PAN Personal Area Network
PAP Password Authentication Protocol
PAT Port Address Translation
PBKDF2 Password-Based Key Derivation Function 2
PBX Private Branch Exchange
PCAP Packet Capture
PDH Plesiochronous Digital Hierarchy
PDoS Attack Permanent DoS Attack
PEAP Protected Extensible Authentication Protocol
PED Personal Electronic Device
PFS Perfect Forward Secrecy
PGP Pretty Good Privacy
PII Personally Identifiable Information
PIV Personal Identity Verification
PKI Public Key Infrastructure
POD Ping Of Death
PoE Power over Ethernet
PON Passive Optical Network
POP Point of Presence
POP3 Post Office Protocol version 3
POTS Plain Old Telephone Service
PPP Point-to-Point Protocol
PPTP Point-to-Point Tunneling Protocol
PROM Programmable Read–Only Memory
PSK Pre-Shared Key
PSTN Public Switched Telephone Network
PTR Pointer
PTZ Pan-Tilt-Zoom
PVC Permanent Virtual Circuit
PVC Polyvinyl Chloride
QoS Quality of Service
RA Recovery Agent
RA Registration Authority
RAD Rapid Application Development
RADIUS Remote Authentication Dial-In User Service
RAID Redundant Array of Inexpensive Disks
RAID 1 Redundant Array of Independent Disks 1
RAID 5 Redundant Array of Independent Disks 5
RARP Reverse Address Resolution Protocol
RAS Remote Access Services
RBAC Role–Based Access Control
RC4 RSA Variable Key Size Encryption Algorithm
RDP Remote Desktop Protocol
RF Radio Frequency
RFB Remote Framebuffer
RFI Radio Frequency Interference
RIP Routing Information Protocol
RIPEMD RACE Integrity Primitives Evaluation Message Digest
ROI Return On Investment
RPO Recovery Point Objectives
RSA Rivest, Shamir and Adleman
RTBH Filtering Remote Triggered Black Hole Filtering
RTO Recovery Time Objectives
RTP Real-time Transport Protocol
S/MIME Secure/Multipurpose Internet Mail Extensions
SA Security Association
SaaS Software as a Service
SAML Security Assertions Markup Language
SAN Storage Area Network
Sarbox Sarbanes–Oxley Act
SC Subscriber Connector or Standard Connector
SCADA System Control and Data Acquisition
SCAP Security Content Automation Protocol
SCEP Simple Certificate Enrollment Protocol
SCP Secure Copy Protocol
SCSI Small Computer System Interface
SDH Synchronous Digital Hierarchy
SDLC Systems Development Life Cycle
SDLM Software Development Life Cycle Methodology
SEH Structured Exception Handler
SFP Small Form Factor Pluggable
SFTP Secured File Transfer Protocol
SHA Secure Hash Algorithm
SHTTP Secure Hypertext Transfer Protocol
SIEM Security Information and Event Management
SIM Subscriber Identity Module
SIV System Integrity Verifier
SLA Service Level Agreement
SLE Single Loss Expectancy
SMA Sub Multi Assembly or Sub Miniature type A
SMB Server Message Block
SMB Protocol Server Message Block Protocol
SMS Short Message Service
SMTP Simple Mail Transfer Protocol
SNIPS System and Network Integrated Polling Software
SNMP Simple Network Management Protocol
SOA Start of Authority
SOAP Simple Object Access Protocol
SoD Separation of Duties
SOHO Small office/home office
SONET Synchronous Optical Network
SPA Security Posture Assessments
SPI Security Parameters Index
SPI Stateful Packet Inspection
SPIM Spam over Internet Messaging
SQL Structured Query Language
SRV Service Locator
SSD Solid State Drive
SSH Secure Shell
SSID Service Set Identifier
SSL Secure Sockets Layer
SSL VPN Secure Socket Layer VPN
SSO Single Sign-On
SSTP Secure Socket Tunneling Protocol
ST Straight Tip
STA Station
Static NAT Static Network Address Translation
STP Shielded Twisted Pair
STP Spanning-Tree Protocol
SVC Switched Virtual Circuit
TA Terminal Adapters
TACACS Terminal Access Controller Access Control System
TACACS+ Terminal Access Controller Access Control System Plus
TCP Transmission Control Protocol
TCP/IP Transmission Control Protocol/Internet Protocol
TCSEC Trusted Computer System Evaluation Criteria
TDM Time-Division Multiplexing
TDR Time-Domain Reflectometer
TE Terminal Equipment
TFTP Trivial File Transfer Protocol
TGT Ticket Granting Ticket
TIA Telecommunications Industry Association
TIFF Tagged Image File Format
TKIP Temporal Key Integrity Protocol
TLS Transport Layer Security
TOTP Time-based One-Time Password
TPM Trusted Platform Module
TSIG Transaction Signature
TTL Time To Live
TTS Transaction Tracking System
UAC User Account Control
UAT User Acceptance Testing
UDP User Datagram Protocol
UEFI Unified Extensible Firmware Interface
UNI User-to-Network Interface
UPS Uninterruptible Power Supply
UR L Universal Resource Locator
URI Uniform Resource Identifier
USB Universal Serial Bus
UTM Unified Threat Management
UTP Unshielded Twisted Pair
VCC Vertical Cross-Connect
VDI Virtualization Desktop Infrastructure
VER Voltage Event Recorder
VLAN Virtual LAN
VLAN Hopping Virtual Local Area Network Hopping
VLSM Variable Length Subnet Mask
VM Virtual Machine
VNC Virtual Network Computing
VoIP Voice over IP
VPN Virtual Private Network
VSAT Very Small Aperture Terminal
VTC Video Teleconferencing
VTP VLAN Trunking Protocol
WAF Web-Application Firewall
WAN Wide Area Network
WAP Wireless Access Point
Web Proxy HTTP Proxy
WEP Wired Equivalent Privacy
WIDS Wireless Intrusion Detection System
WiMAX Worldwide Interoperability for Microwave Access
WINS Windows Internet Naming Service
WIPS Wireless Intrusion Prevention System
WLAN Wireless Local Area Network
WPA Wi-Fi Protected Access
WPA2 Wi-Fi Protected Access v2
WPAN Wireless Personal Area Network
WPS WiFi Protected Setup
WTLS Wireless TLS
WWAN Wireless Wide Area Network
XML Extensible Markup Language
XSRF Cross-Site Request Forgery
XSS Cross-Site Scripting
Zerconf Zero Configuration Networking
Created by: ccman1