Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

SEC+

        Help!  

Question
Answer
PAT   Port Address Translation An extension to NAT that permits multiple devices on a LAN to be mapped to a single public IP address.  
🗑
ISP   Internet Service Provider  
🗑
LAN   Local Area Network  
🗑
ACL   Access Control Lists  
🗑
NIPS   Network-based intrusion prevention system  
🗑
HIPS   Host-based intrusion prevention system  
🗑
HIDS   Host-based intrusion detection system  
🗑
IDS   Intrusion detection system  
🗑
IDPS   Intrusion detection and prevention systems  
🗑
CISO   Chief Information Security Officer  
🗑
DMZ   Demilitarized Zone  
🗑
CTO   Chief Technical Officer  
🗑
PSK   Pre-Shared Key  
🗑
ACK   Acknowledge  
🗑
SYN   Synchronize  
🗑
URI   Unifiorm Resource Identifier  
🗑
FDE   Full Disk Encryption  
🗑
FQDN   Fully Qualified Domain Name  
🗑
UTM   Unified Threat Management  
🗑
NGFW   Next Generation Firewall  
🗑
WAF   Web Application Firewall  
🗑
XSS   Cross-site scripting  
🗑
SEH   Structured Exception Handler  
🗑
UDP   User Datagram Protocol  
🗑
SSH   Secure Shell  
🗑
TFTP   Trivial File Transfer Protocol  
🗑
VLAN   Virtual local area network  
🗑
FTP   File Transfer Protocol  
🗑
VDI   Virtualization Desktop Infrastructure  
🗑
RADIUS   Remote Access Dial-In User Service  
🗑
CA   Certificate Authority  
🗑
PNAC   Port-based Network Access Control  
🗑
EAP   Extensible Authentication Protocol  
🗑
TACACS +   Terminal Access Controller Access-Control System Plus  
🗑
NAC   Network Access Control  
🗑
WEP   Wired Equivalent Privacy  
🗑
MaaS   Monitoring-as-a-Service  
🗑
SaaS   Software as a Service  
🗑
IaaS   Infrastructure as a Service  
🗑
PaaS   Platform as a Service  
🗑
XaaS   Anything-as-a-Service  
🗑
SFTP   Secure File Transfer Protocol  
🗑
SHTTP   Secure Hypertext Transfer Protocol  
🗑
SCP   Secure Copy  
🗑
SAN   Storage Area Network  
🗑
AUP   Acceptable use policies  
🗑
CSO   Chief Security Officer  
🗑
AV   Asset Value  
🗑
EF   Exposure Factor  
🗑
GPS   Global Positioning System  
🗑
TPM   Trusted Platform Module  
🗑
RPO   Recovery point objective  
🗑
MTTR   Mean Time To Recover  
🗑
MTBF   Mean time between failures  
🗑
MOU   Memorandum of Understanding  
🗑
ISA   Interconnection Security Agreement  
🗑
SLA   Service Level Agreement  
🗑
BPA   Business Partner Agreement  
🗑
EFS   Encrypting File System  
🗑
CEO   Chief Executive Officer  
🗑
DLP   Data Loss Prevention  
🗑
EMI   Electromagnetic Interference  
🗑
HSM   Hardware Security Module  
🗑
CRL   Certification Revocation List  
🗑
TPM   Trusted Platform Module  
🗑
OOV   Order of Volatility  
🗑
NTP   Network Time Protocol  
🗑
DDoS   Distributed Denial of Service  
🗑
CERT   Computer Emergency Response Team  
🗑
NIST   National Institute of Standards and Technology  
🗑
NSRL   National Software Reference Library  
🗑
RAM   Random Access Memory  
🗑
RAID   Redundant Array of Inexpensive Disks  
🗑
MD5   Message Digest 5  
🗑
PII   Personally Identifiable Information  
🗑
VTY   Virtual Terminal lines  
🗑
P2P   Peer-to-peer  
🗑
RTO   Recovery Time Objective  
🗑
RA   Recovery Agent  
🗑
RFID   Radio Frequency Identification  
🗑
ALE   Annualized Loss Expectancy  
🗑
SLE   Single Loss Expectancy  
🗑
ARO   Annualized Rate of Occurrence  
🗑
AV   Asset Value  
🗑
EF   Exposure Factor  
🗑
BIA   Business Impact Analysis  
🗑
DAC   Discretionary Access Control  
🗑
ROI   Return of/on Investment  
🗑
RPO   Recovery Point Objective  
🗑
HA   High Availability  
🗑
SHA   Secure Hash Algorithm  
🗑
HMAC   Hash-based Message Authentication Code  
🗑
ISSO   Information Systems Security Officer  
🗑
MD   Message Digest Algorithm  
🗑
PKI   Public Key Infrastructure  
🗑
RA   Registration Authority  
🗑
AP   Access Point  
🗑
API   Application Programming Interface  
🗑
ASP   Application Service Provider  
🗑
ARP   Address Resolution Protocol  
🗑
BAC   Business Availability Center  
🗑
BCP   Business Continuity Planning  
🗑
BIOS   Basic Input / Output System  
🗑
BYOD   Bring Your Own Device  
🗑
CAC   Common Access Card  
🗑
CAN   Controller Area Network  
🗑
CAPTCHA   Completely Automated Public Turing Test to Tell Computers and Humans Apart  
🗑
CAR   Corrective Action Report  
🗑
CCMP   Counter-Mode/CBC-Mac Protocol  
🗑
CCTV   Closed-Circuit Television  
🗑
CHAP   Challenge Handshake Authentication Protocol  
🗑
CIO   Chief Information Officer  
🗑
CIRT   Computer Incident Response Team  
🗑
COOP   Continuity of Operation Planning  
🗑
CP   Contingency Planning  
🗑
CRC   Cyclical Redundancy Check  
🗑
CSR   Control Status Register  
🗑
CSU   Channel service Unit  
🗑
DBA   Database Administrator  
🗑
DEP   Data Execution Prevention  
🗑
DES   Digital Encryption Standard  
🗑
DHCP   Dynamic Host Configuration Protocol  
🗑
DHE   Data Handling Electronics  
🗑
DHE   Diffie-Hellman Ephemeral  
🗑
DLL   Dynamic Link Library  
🗑
DNAT   Destination Network Address Transaction  
🗑
DNS   Domain Name Service (Server)  
🗑
DOS   Denial of Service  
🗑
DRP   Disaster Recovery Plan  
🗑
DSA   Digital Signature Algorithm  
🗑
DSL   Digital Subscriber Line  
🗑
DSU   Data Service Unit  
🗑
ECC   Elliptic Curve Cryptography  
🗑
ECDHE   Elliptic Curve Diffie-Hellman Ephemeral  
🗑
ESN   Electronic Serial Number  
🗑
ESP   Encapsulated Security Payload  
🗑
FACL   File System Access Control List  
🗑
FTPS   Secured File Transfer Protocol  
🗑
GPG   Gnu Privacy Guard  
🗑
GPO   Group Policy Object  
🗑
GPU   Graphic Processing Unit  
🗑
GRE   Generic Routing Encapsulation  
🗑
HDD   Hard Disk Drive  
🗑
HOTP   HMAC based One Time Password  
🗑
HTML   HyperText Markup Language  
🗑
HTTP   HyperText Transfer Protocol  
🗑
HTTPS   HyperText Transfer Protocol over SSL  
🗑
HVAC   Heating, Ventilation Air Conditioning  
🗑
ICMP   Internet Control Message Protocol  
🗑
ID   Identification  
🗑
IKE   Internet Key Exchange  
🗑
IM   Instant Messaging  
🗑
IMAP4   Internet message Access Protocol v4  
🗑
IP   Internet Protocol  
🗑
IPSEC   Internet Protocol Security  
🗑
IR   Incident Response  
🗑
IRC   Internet Relay Chat  
🗑
IRP   Incident Response Procedure  
🗑
ITCP   IT Contingency Plan  
🗑
IV   Intitialization Vector  
🗑
JBOD   Just a Bunch of Disks  
🗑
KDC   Key Distribution Center  
🗑
L2TP   Layer 2 Tunneling Protocol  
🗑
LDAP   Lightweight Directory Access Protocol  
🗑
LEAP   Lightweight Extensible Authentication Protocol  
🗑
MAC   Mandatory Access Control/ Media Access Control  
🗑
MAC   Message Authentication Code  
🗑
MAN   Metropolitan Area Network  
🗑
MBR   Master Boot Record  
🗑
MOU   Memorandum of Understanding  
🗑
MPLS   Multi-Protocol Layer Switch  
🗑
MSCHAP   Microsoft challenge Handshake Authentication Protocol  
🗑
MTBF   Mean Time Between Failures  
🗑
MTTF   Mean Time to Failure  
🗑
MTU   Maximum Transmission Unit  
🗑
NDA   Non-Disclosure Agreement  
🗑
NFC   Near Field Communication  
🗑
NIDS   Network Based Intrusion Detection System  
🗑
NOS   Network Operating System  
🗑
NTFS   New Technology File System  
🗑
NTLM   New Technology LANMAN  
🗑
NTP   Network Time Protocol  
🗑
OCSP   Online Certificate Status Protocol  
🗑
OLA   Open License Agreement  
🗑
OS   Operating System  
🗑
OVAL   Open vulnerability Assessment Language  
🗑
PAC   Proxy Auto Configuration  
🗑
PAM   Pluggable Authentication Modules  
🗑
PAP   Password Authentication Protocol  
🗑
PBKDF2   Password Based Key Derivation Function 2  
🗑
PBX   Private Branch Exchange  
🗑
PCAP   Packet capture  
🗑
PEAP   Protected Extensible Authentication Protocol  
🗑
PED   Personal Electronic Device  
🗑
PGP   Pretty Good Privacy  
🗑
PIV   Personal Identity verification  
🗑
POTS   Plain Old Telephone Service  
🗑
PPP   Point to Point Protocol  
🗑
PPTP   Point to Point Tunneling Protocol  
🗑
PTZ   Pan-Tilt-Zoom  
🗑
RAD   Rapid Application Development  
🗑
RAS   Remote Access Server  
🗑
RBAC   Role Based Access Control  
🗑
RC4   RSA Variable Key Size Encryption Algorithm  
🗑
RIPEMD   RACE Integrity Primitives Evaluation Message digest  
🗑
RSA   Rivest, Shamir, & Aldeman  
🗑
RTP   Real-Time Transport Protocol  
🗑
S/MIME   Secure/Multipurpose Internet Mail Extensions  
🗑
SAML   Security Assertions Markup Language  
🗑
SMS   Short Message Service  
🗑
SMTP   Simple Mail Transfer Protocol  
🗑
SNMP   Simple Network Management Protocol  
🗑
SOAP   Simple Object Access Protocol  
🗑
SONET   Synchronized Optical Network Technologies  
🗑
SPIM   Spam over Internet messaging  
🗑
SQL   Structured Query Language  
🗑
SSD   Solid State Drive  
🗑
SSL   Secure sockets Layer  
🗑
SSO   Single Sign On  
🗑
STP   Shielded Twisted Pair  
🗑
TCP/IP   Transmission control Protocol/ Internet Protocol  
🗑
TGT   Ticket Granting System  
🗑
TKIP   Temporal Key Integrity Protocol  
🗑
TLS   Transport Layer Security  
🗑
TOTP   Time-Based one-Time Password  
🗑
TSIG   Transaction Signature  
🗑
UAT   User Acceptance Testing  
🗑
UEFI   Unified Extensible Firmware Interface  
🗑
UPS   Uninterruptable Power Supply  
🗑
URL   Universal Resource Locator  
🗑
USB   Universal Serial Bus  
🗑
UTM   Unified Threat Management  
🗑
UTP   Unshielded Twisted Pair  
🗑
VoIP   Voice over IP  
🗑
VPN   Virtual Private Network  
🗑
VTC   Video Teleconferencing  
🗑
WAP   Wireless Access Point  
🗑
WIDS   Wireless Intrusion Detection System  
🗑
WIPS   Wireless Intrusion Prevention System  
🗑
WPA   Wireless Protected Access  
🗑
WPA2   WiFi Protected Setup  
🗑
WTLS   Wireless TLS  
🗑
XML   Extensible Markup Language  
🗑
XSRF   Cross-Site Request Forgery  
🗑
XSS   Cross-Site Scripting  
🗑
3DES   Triple Digital Encryption Standard  
🗑
AAA   Authentication, Authorization, Accounting  
🗑
AES   Advanced Encryption Standard  
🗑
AES256   Advanced Encryption Standards 256 bit  
🗑
AH   Authentication Header  
🗑
AP   Access Point  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: fir.keep.secure
Popular Computers sets