click below
click below
Normal Size Small Size show me how
Security+ 401 Acro
All Acronyms recommended for Security+ 401 exam
| Question | Answer |
|---|---|
| 3DES | 6.2 : Triple Digital Encryption Standard |
| 802.1x | 1.2 : Authenticate and Secure wireless and wired LANs |
| AAA | : Authentication, Authorization and Accounting |
| ACL | 5.2 : Access Control List |
| AES | 6.2 : Advanced Encryption Standard |
| AES256 | 6.2 : Advanced Encryption Standards 256-bit |
| AH | : Authentication Header |
| ALE | 2.1 : Annualized Loss Expectancy |
| AP | : Access Point |
| API | 3.6 : Application Programming Interface |
| APT | 2.1 : Advanced Persistent Threat |
| ARO | 2.1 : Annualized Rate of Occurrence |
| ARP | 1.4 : Address Resolution Protocol |
| ASLR | : Address Space Layout Randomization |
| ASP | : Application Service Provider |
| AUP | 2.1 : Acceptable Use Policy |
| AV | 4.3 : Antivirus |
| BAC | 2.8 : Business Availability Center |
| BCP | 2.8 : Business Continuity Planning |
| BIA | 2.8 : Business Impact Analysis |
| BIOS | : Basic Input/Output System |
| BPA | 2.2 : Business Partners Agreement |
| BPDU | : Bridge Protocol Data Unit |
| BYOD | 4.2 : Bring Your Own Device |
| CA | 6.3 : Certificate Authority |
| CAC | 5.2 : Common Access Card |
| CAN | 1.1 : Controller Area Network |
| CAPTCHA | 5.2 : Completely Automated Public Turing test to tell Computers and Humans Apart |
| CAR | : Corrective Action Report |
| CCMP | 1.5 : Counter-mode/CBC-MAC Protocol |
| CCTV | 2.8 : Closed-Circuit Television |
| CERT | 2.5 : Computer Emergency Response Team |
| CFB | : Cipher Feedback |
| CHAP | 5.2 : Challenge Handshake Authentication Protocol |
| CIO | : Chief Information Officer |
| CIRT | 2.5 : Computer Incident Response Team |
| CMS | : Content Management System |
| COOP | 2.8 : Continuity Of Operation Planning |
| CP | 2.8 : Contingency Planning |
| CRC | : Cyclical Redundancy Check |
| CRL | 6.3 : Certificate Revocation List |
| CRM | : Customer Relationship Management |
| CSO | : Chief Security Officer |
| CSP | 1.3 : Cloud Service Provider |
| CSR | 6.3 : Certificate Signing Request |
| CSRF | 3.5 : Cross-Site Request Forgery |
| CSU | : Channel Service Unit |
| CTO | : Chief Technology Officer |
| DAC | 5.2 : Discretionary Access Control |
| DBA | : Database Administrator |
| DDoS | 3.2 : Distributed Denial of Service |
| DEP | : Data Execution Prevention |
| DES | 6.2 : Digital Encryption Standard |
| DHCP | 1.4 : Dynamic Host Configuration Protocol |
| DHE | 6.2 : Data-Handling Electronics |
| DHE | 6.2 : Diffie-Hellman Ephemeral |
| DLL | : Dynamic Link Library |
| DLP | 2.3 : Data Loss Prevention |
| DMZ | 1.3 : Demilitarized Zone |
| DNAT | 1.3 : Destination Network Address Transaction |
| DNS | 1.4 : Domain Name Service (Server) |
| DoS | 3.2 : Denial of Service |
| DRP | 2.8 : Disaster Recovery Plan |
| DSA | 6.2 : Digital Signature Algorithm |
| DSL | : Digital Subscriber Line |
| DSU | : Data Service Unit |
| EAP | 1.5 : Extensible Authentication Protocol |
| ECC | 6.1 : Elliptic Curve Cryptography |
| ECDHE | 6.2 : Elliptic Curve Diffie-Hellman Exchange |
| ECDSA | 6.1 : Elliptic Curve Digital Signature Algorithm |
| EFS | : Encrypted File System |
| EMI | : Electromagnetic Interference |
| ERP | : Enterprise Resource Planning |
| ESN | : Electronic Serial Number |
| ESP | : Encapsulated Security Payload |
| FACL | : File system Access Control List |
| FCoE | 1.4 : Fibre Channel over Ethernet |
| FDE | 4.4 : Full Disk Encryption |
| FQDN | : Fully Qualified Domain Name |
| FRR | : FALSE Rejection Rate |
| FTP | 1.4 : File Transfer Protocol |
| FTPS | 1.4 : Secured File Transfer Protocol |
| GCM | : Galois Counter Mode |
| GPG | 6.2 : GNU Privacy Guard |
| GPO | 5.3 : Group Policy Object |
| GPS | 4.2 : Global Positioning System |
| GPU | : Graphic Processing Unit |
| GRE | : Generic Routing Encapsulation |
| HA | 2.8 : High Availability |
| HDD | : Hard Disk Drive |
| HIDS | 4.3 : Host-based Intrusion Detection System |
| HIPS | 4.3 : Host-based Intrusion Prevention System |
| HMAC | 6.2 : Hashed Message Authentication Code |
| HOTP | 5.2 : HMAC-based One Time Password |
| HSM | 4.4 : Hardware Security Module |
| HSRP | : Hot Standby Router Protocol |
| HTML | 1.4 : Hypertext Markup Language |
| HTTP | 1.4 : Hypertext Transfer Protocol |
| HTTPS | 1.4 : Hypertext Transfer Protocol over SSL |
| HVAC | 2.7 : Heating, Ventilation and Air Conditioning |
| IaaS | 1.3 : Infrastructure as a Service |
| ICMP | 1.4 : Internet Control Message Protocol |
| ICS | : Industrial Control Systems |
| ID | : Identification |
| IDEA | : International Data Encryption Algorithm |
| IDF | : Intermediate Distribution Frame |
| IdP | : Identity Provider |
| IDS | 1.1 : Intrusion Detection System |
| IKE | 6.1 : Internet Key Exchange |
| IM | : Instant Messaging |
| IMAP4 | 1.4 : Internet Message Access Protocol v4 |
| IoT | : Internet of Things |
| IP | : Internet Protocol |
| IPS | 1.1 : Intrusion Prevention System |
| IPSec | 1.4 : Internet Protocol Security |
| IPv4 | 1.4 : IP version 4 (x.x.x.x) |
| IPv6 | 1.4 : IP version 6 (FE80:FF00:FF00:FF00:FF00:FF00:FF00:FF00) |
| IR | 2.5 : Incident Response |
| IRC | 1.4 : Internet Relay Chat |
| IRP | 2.5 : Incident Response Procedure |
| ISA | 2.2 : Interconnection Security Agreement |
| iSCSI | 1.4 : Internet Small Computer System Interface (TCP based Storage Area Network) |
| ISP | : Internet Service Provider |
| ISSO | : Information Systems Security Officer |
| ITCP | 2.8 : IT Contingency Plan |
| IV | : Initialization Vector |
| JBOD | : Just a Bunch Of Disks |
| KDC | 5.1 : Key Distribution Center |
| KEK | : Key Encryption Key |
| L2TP | : Layer 2 Tunneling Protocol |
| LAN | 1.1 : Local Area Network |
| LDAP | 5.1 : Lightweight Directory Access Protocol |
| LEAP | 1.5 : Lightweight Extensible Authentication Protocol |
| MaaS | 1.3 : Monitoring as a Service |
| MAC | 2.9 or : Mandatory Access Control or Media Access Control or Message Authentication Code |
| MAN | 1.1 : Metropolitan Area Network |
| MBR | 4.4 : Master Boot Record |
| MD5 | 6.2 : Message Digest 5 |
| MDF | : Main Distribution Frame |
| MITM | 3.2 : Man-In-The-Middle |
| MOU | 2.2 : Memorandum Of Understanding |
| MPLS | : Multi-Protocol Layer Switch |
| MSCHAP | 5.3 : Microsoft Challenge Handshake Authentication Protocol |
| MTBF | 2.1 : Mean Time Between Failures |
| MTTF | 2.1 : Mean Time To Failure |
| MTTR | 2.1 : Mean Time To Recover |
| MTU | : Maximum Transmission Unit |
| NAC | 1.3 : Network Access Control |
| NAT | 1.3 : Network Address Translation |
| NDA | 2.2 : Non-Disclosure Agreement |
| NFC | 3.4 : Near Field Communication |
| NIDS | 3.6 : Network-based Intrusion Detection System |
| NIPS | 3.6 : Network-based Intrusion Prevention System |
| NIST | : National Institute of Standards and Technology |
| NOS | 1.1 : Network Operating System |
| NTFS | : New Technology File System |
| NTLM | 6.2 : New Technology LANMAN |
| NTP | 1.1 : Network Time Protocol |
| OAUTH | 1.5 : Open Authorization |
| OCSP | 6.3 : Online Certificate Status Protocol |
| OLA | 2.2 : Open License Agreement |
| OS | : Operating System |
| OVAL | : Open Vulnerability Assessment Language |
| P2P | : Peer to Peer |
| PaaS | 1.3 : Platform as a Service |
| PAC | : Proxy Auto Configuration |
| PAM | : Pluggable Authentication Modules |
| PAP | 5.2 : Password Authentication Protocol |
| PAT | : Port Address Translation |
| PBKDF2 | 6.2 : Password-Based Key Derivation Function 2 |
| PBX | : Private Branch Exchange |
| PCAP | : Packet Capture |
| PEAP | 1.5 : Protected Extensible Authentication Protocol |
| PED | : Personal Electronic Device |
| PFS | : Perfect Forward Secrecy |
| PGP | : Pretty Good Privacy |
| PII | : Personally Identifiable Information |
| PIV | : Personal Identity Verification |
| PKI | 6.3 : Public Key Infrastructure |
| POTS | : Plain Old Telephone Service |
| PPP | : Point-to-Point Protocol |
| PPTP | : Point-to-Point Tunneling Protocol |
| PSK | : Pre-Shared Key |
| PTZ | : Pan-Tilt-Zoom |
| RA | : Recovery Agent |
| RA | : Registration Authority |
| RAD | : Rapid Application Development |
| RADIUS | 5.1 : Remote Authentication Dial-In User Server |
| RAID | : Redundant Array of Inexpensive Disks |
| RAS | : Remote Access Server |
| RBAC | : Role-Based Access Control |
| RBAC | : Rule-Based Access Control |
| RC4 | 6.2 : RSA Variable Key Size Encryption Algorithm |
| RDP | 1.4 : Remote Desktop Protocol |
| RIPEMD | 6.2 : RACE Integrity Primitives Evaluation Message Digest |
| ROI | : Return On Investment |
| RPO | : Recovery Point Objective |
| RSA | 6.2 : Rivest, Shamir and Adleman |
| RTBH | : Remote Triggered Black Hole |
| RTO | : Recovery Time Objective |
| RTP | : Real-time Transport Protocol |
| S/MIME | 1.4 : Secure/Multipurpose Internet Mail Extensions |
| SaaS | 1.3 : Software as a Service |
| SAML | 5.1 : Security Assertions Markup Language |
| SAN | 4.4 : Storage Area Network |
| SCADA | 4.5 : System Control and Data Acquisition |
| SCAP | : Security Content Automation Protocol |
| SCEP | : Simple Certificate Enrollment Protocol |
| SCP | 1.4 : Secure Copy |
| SCSI | : Small Computer System Interface |
| SDLC | : Software Development Life Cycle |
| SDLM | : Software Development Life Cycle Methodology |
| SEH | : Structured Exception Handler |
| SFTP | 1.4 : Secured File Transfer Protocol |
| SHA | : Secure Hashing Algorithm |
| SHTTP | 1.4 : Secure Hypertext Transfer Protocol |
| SIEM | : Security Information and Event Management |
| SIM | : Subscriber Identity Module |
| SLA | 2.2 : Service Level Agreement |
| SLE | 2.1 : Single Loss Expectancy |
| SMS | : Short Message Service |
| SMTP | 1.4 : Simple Mail Transfer Protocol |
| SMTPS | 1.4 : Simple Mail Transfer Protocol Secure |
| SNMP | 1.4 : Simple Network Management Protocol |
| SOAP | : Simple Object Access Protocol |
| SONET | : Synchronous Optical Network Technologies |
| SPIM | 3.2 : Spam over Internet Messaging |
| SQL | : Structured Query Language |
| SSD | : Solid State Drive |
| SSH | 1.4 : Secure Shell |
| SSL | 1.4 : Secure Sockets Layer |
| SSO | : Single Sign-On |
| STP | : Shielded Twisted Pair or Spanning Tree Protocol |
| TACACS+ | 5.1 : Terminal Access Controller Access control system |
| TCP/IP | 1.4 : Transmission Control Protocol/Internet Protocol |
| Telnet | 1.4 : Unsecured remote access terminal emulator replaced with SSH |
| TFTP | 1.4 : Trivial File Transfer Protocol |
| TGT | : Ticket Granting Ticket |
| TKIP | 1.5 : Temporal Key Integrity Protocol |
| TLS | 1.4 : Transport Layer Security |
| TOTP | 5.2 : Time-based One-Time Password |
| TPM | 4.4 : Trusted Platform Module |
| TSIG | : Transaction Signature |
| UAT | : User Acceptance Testing |
| UDP | : User Datagram Protocol |
| UEFI | : Unified Extensible Firmware Interface |
| UPS | : Uninterruptable Power Supply |
| URI | : Uniform Resource Identifier |
| URL | : Universal Resource Locator |
| USB | : Universal Serial Bus |
| UTM | : Unified Threat Management |
| UTP | : Unshielded Twisted Pair |
| VDI | : Virtualization Desktop Infrastructure |
| VLAN | 1.3 : Virtual Local Area Network |
| VLSM | : Variable Length Subnet Masking |
| VM | : Virtual Machine |
| VoIP | : Voice over IP |
| VPN | : Virtual Private Network |
| VTC | : Video Teleconferencing |
| WAF | : Web-Application Firewall |
| WAP | : Wireless Access Point |
| WEP | 1.5 : Wired Equivalent Privacy |
| WIDS | 3.6 : Wireless Intrusion Detection System |
| WIPS | 3.6 : Wireless Intrusion Prevention System |
| WPA | 1.5 : WiFi Protected Access |
| WPA2 | 1.5 : WiFi Protected Access 2 |
| WPS | : WiFi Protected Setup |
| WTLS | : Wireless TLS |
| XML | : Extensible Markup Language |
| XSRF | 3.5 : Cross-Site Request Forgery |
| XSS | 3.5 : Cross-Site Scripting |