Busy. Please wait.
or

show password
Forgot Password?

Don't have an account?  Sign up 
or

Username is available taken
show password

why


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Remove Ads
Don't know
Know
remaining cards
Save
0:01
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
Retries:
restart all cards




share
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

ACRONYMS

SEC+

QuestionAnswer
PAT Port Address Translation An extension to NAT that permits multiple devices on a LAN to be mapped to a single public IP address.
ISP Internet Service Provider
LAN Local Area Network
ACL Access Control Lists
NIPS Network-based intrusion prevention system
HIPS Host-based intrusion prevention system
HIDS Host-based intrusion detection system
IDS Intrusion detection system
IDPS Intrusion detection and prevention systems
CISO Chief Information Security Officer
DMZ Demilitarized Zone
CTO Chief Technical Officer
PSK Pre-Shared Key
ACK Acknowledge
SYN Synchronize
URI Unifiorm Resource Identifier
FDE Full Disk Encryption
FQDN Fully Qualified Domain Name
UTM Unified Threat Management
NGFW Next Generation Firewall
WAF Web Application Firewall
XSS Cross-site scripting
SEH Structured Exception Handler
UDP User Datagram Protocol
SSH Secure Shell
TFTP Trivial File Transfer Protocol
VLAN Virtual local area network
FTP File Transfer Protocol
VDI Virtualization Desktop Infrastructure
RADIUS Remote Access Dial-In User Service
CA Certificate Authority
PNAC Port-based Network Access Control
EAP Extensible Authentication Protocol
TACACS + Terminal Access Controller Access-Control System Plus
NAC Network Access Control
WEP Wired Equivalent Privacy
MaaS Monitoring-as-a-Service
SaaS Software as a Service
IaaS Infrastructure as a Service
PaaS Platform as a Service
XaaS Anything-as-a-Service
SFTP Secure File Transfer Protocol
SHTTP Secure Hypertext Transfer Protocol
SCP Secure Copy
SAN Storage Area Network
AUP Acceptable use policies
CSO Chief Security Officer
AV Asset Value
EF Exposure Factor
GPS Global Positioning System
TPM Trusted Platform Module
RPO Recovery point objective
MTTR Mean Time To Recover
MTBF Mean time between failures
MOU Memorandum of Understanding
ISA Interconnection Security Agreement
SLA Service Level Agreement
BPA Business Partner Agreement
EFS Encrypting File System
CEO Chief Executive Officer
DLP Data Loss Prevention
EMI Electromagnetic Interference
HSM Hardware Security Module
CRL Certification Revocation List
TPM Trusted Platform Module
OOV Order of Volatility
NTP Network Time Protocol
DDoS Distributed Denial of Service
CERT Computer Emergency Response Team
NIST National Institute of Standards and Technology
NSRL National Software Reference Library
RAM Random Access Memory
RAID Redundant Array of Inexpensive Disks
MD5 Message Digest 5
PII Personally Identifiable Information
VTY Virtual Terminal lines
P2P Peer-to-peer
RTO Recovery Time Objective
RA Recovery Agent
RFID Radio Frequency Identification
ALE Annualized Loss Expectancy
SLE Single Loss Expectancy
ARO Annualized Rate of Occurrence
AV Asset Value
EF Exposure Factor
BIA Business Impact Analysis
DAC Discretionary Access Control
ROI Return of/on Investment
RPO Recovery Point Objective
HA High Availability
SHA Secure Hash Algorithm
HMAC Hash-based Message Authentication Code
ISSO Information Systems Security Officer
MD Message Digest Algorithm
PKI Public Key Infrastructure
RA Registration Authority
AP Access Point
API Application Programming Interface
ASP Application Service Provider
ARP Address Resolution Protocol
BAC Business Availability Center
BCP Business Continuity Planning
BIOS Basic Input / Output System
BYOD Bring Your Own Device
CAC Common Access Card
CAN Controller Area Network
CAPTCHA Completely Automated Public Turing Test to Tell Computers and Humans Apart
CAR Corrective Action Report
CCMP Counter-Mode/CBC-Mac Protocol
CCTV Closed-Circuit Television
CHAP Challenge Handshake Authentication Protocol
CIO Chief Information Officer
CIRT Computer Incident Response Team
COOP Continuity of Operation Planning
CP Contingency Planning
CRC Cyclical Redundancy Check
CSR Control Status Register
CSU Channel service Unit
DBA Database Administrator
DEP Data Execution Prevention
DES Digital Encryption Standard
DHCP Dynamic Host Configuration Protocol
DHE Data Handling Electronics
DHE Diffie-Hellman Ephemeral
DLL Dynamic Link Library
DNAT Destination Network Address Transaction
DNS Domain Name Service (Server)
DOS Denial of Service
DRP Disaster Recovery Plan
DSA Digital Signature Algorithm
DSL Digital Subscriber Line
DSU Data Service Unit
ECC Elliptic Curve Cryptography
ECDHE Elliptic Curve Diffie-Hellman Ephemeral
ESN Electronic Serial Number
ESP Encapsulated Security Payload
FACL File System Access Control List
FTPS Secured File Transfer Protocol
GPG Gnu Privacy Guard
GPO Group Policy Object
GPU Graphic Processing Unit
GRE Generic Routing Encapsulation
HDD Hard Disk Drive
HOTP HMAC based One Time Password
HTML HyperText Markup Language
HTTP HyperText Transfer Protocol
HTTPS HyperText Transfer Protocol over SSL
HVAC Heating, Ventilation Air Conditioning
ICMP Internet Control Message Protocol
ID Identification
IKE Internet Key Exchange
IM Instant Messaging
IMAP4 Internet message Access Protocol v4
IP Internet Protocol
IPSEC Internet Protocol Security
IR Incident Response
IRC Internet Relay Chat
IRP Incident Response Procedure
ITCP IT Contingency Plan
IV Intitialization Vector
JBOD Just a Bunch of Disks
KDC Key Distribution Center
L2TP Layer 2 Tunneling Protocol
LDAP Lightweight Directory Access Protocol
LEAP Lightweight Extensible Authentication Protocol
MAC Mandatory Access Control/ Media Access Control
MAC Message Authentication Code
MAN Metropolitan Area Network
MBR Master Boot Record
MOU Memorandum of Understanding
MPLS Multi-Protocol Layer Switch
MSCHAP Microsoft challenge Handshake Authentication Protocol
MTBF Mean Time Between Failures
MTTF Mean Time to Failure
MTU Maximum Transmission Unit
NDA Non-Disclosure Agreement
NFC Near Field Communication
NIDS Network Based Intrusion Detection System
NOS Network Operating System
NTFS New Technology File System
NTLM New Technology LANMAN
NTP Network Time Protocol
OCSP Online Certificate Status Protocol
OLA Open License Agreement
OS Operating System
OVAL Open vulnerability Assessment Language
PAC Proxy Auto Configuration
PAM Pluggable Authentication Modules
PAP Password Authentication Protocol
PBKDF2 Password Based Key Derivation Function 2
PBX Private Branch Exchange
PCAP Packet capture
PEAP Protected Extensible Authentication Protocol
PED Personal Electronic Device
PGP Pretty Good Privacy
PIV Personal Identity verification
POTS Plain Old Telephone Service
PPP Point to Point Protocol
PPTP Point to Point Tunneling Protocol
PTZ Pan-Tilt-Zoom
RAD Rapid Application Development
RAS Remote Access Server
RBAC Role Based Access Control
RC4 RSA Variable Key Size Encryption Algorithm
RIPEMD RACE Integrity Primitives Evaluation Message digest
RSA Rivest, Shamir, & Aldeman
RTP Real-Time Transport Protocol
S/MIME Secure/Multipurpose Internet Mail Extensions
SAML Security Assertions Markup Language
SMS Short Message Service
SMTP Simple Mail Transfer Protocol
SNMP Simple Network Management Protocol
SOAP Simple Object Access Protocol
SONET Synchronized Optical Network Technologies
SPIM Spam over Internet messaging
SQL Structured Query Language
SSD Solid State Drive
SSL Secure sockets Layer
SSO Single Sign On
STP Shielded Twisted Pair
TCP/IP Transmission control Protocol/ Internet Protocol
TGT Ticket Granting System
TKIP Temporal Key Integrity Protocol
TLS Transport Layer Security
TOTP Time-Based one-Time Password
TSIG Transaction Signature
UAT User Acceptance Testing
UEFI Unified Extensible Firmware Interface
UPS Uninterruptable Power Supply
URL Universal Resource Locator
USB Universal Serial Bus
UTM Unified Threat Management
UTP Unshielded Twisted Pair
VoIP Voice over IP
VPN Virtual Private Network
VTC Video Teleconferencing
WAP Wireless Access Point
WIDS Wireless Intrusion Detection System
WIPS Wireless Intrusion Prevention System
WPA Wireless Protected Access
WPA2 WiFi Protected Setup
WTLS Wireless TLS
XML Extensible Markup Language
XSRF Cross-Site Request Forgery
XSS Cross-Site Scripting
3DES Triple Digital Encryption Standard
AAA Authentication, Authorization, Accounting
AES Advanced Encryption Standard
AES256 Advanced Encryption Standards 256 bit
AH Authentication Header
AP Access Point
Created by: fir.keep.secure