comptia_security_flashcards

(335 cards)

1
Q

Acronym

A

Full Name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA

A

Authentication, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DAC

A

Discretionary Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MAC

A

Mandatory Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RBAC

A

Role-based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

MFA

A

Multifactor Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SSO

A

Single Sign-on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

PAM

A

Privileged Access Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IAM

A

Identity and Access Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

LDAP

A

Lightweight Directory Access Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RADIUS

A

Remote Authentication Dial-in User Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TACACS+

A

Terminal Access Controller Access Control System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SAML

A

Security Assertions Markup Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

OAUTH

A

Open Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

AES-256

A

Advanced Encryption Standards 256-bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

DES

A

Digital Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

RSA

A

Rivest, Shamir, & Adleman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

ECC

A

Elliptic Curve Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

SHA

A

Secure Hashing Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

MD5

A

Message Digest 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

PKI

A

Public Key Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

CA

A

Certificate Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
HMAC
Hashed Message Authentication Code
26
PGP
Pretty Good Privacy
27
GPG
Gnu Privacy Guard
28
ECDHE
Elliptic Curve Diffie-Hellman Ephemeral
29
ECDSA
Elliptic Curve Digital Signature Algorithm
30
DHE
Diffie-Hellman Ephemeral
31
VPN
Virtual Private Network
32
IPSec
Internet Protocol Security
33
TLS
Transport Layer Security
34
SSL
Secure Sockets Layer
35
HTTPS
Hypertext Transfer Protocol Secure
36
SSH
Secure Shell
37
SFTP
Secured File Transfer Protocol
38
FTPS
Secured File Transfer Protocol
39
DNS
Domain Name System
40
DNSSEC
Domain Name System Security Extensions
41
NAT
Network Address Translation
42
VLAN
Virtual Local Area Network
43
VoIP
Voice over IP
44
SNMP
Simple Network Management Protocol
45
BGP
Border Gateway Protocol
46
WPA
Wi-Fi Protected Access
47
WEP
Wired Equivalent Privacy
48
WPS
Wi-Fi Protected Setup
49
WAP
Wireless Access Point
50
SSID
Service Set Identifier
51
EAP
Extensible Authentication Protocol
52
PEAP
Protected Extensible Authentication Protocol
53
LEAP
Lightweight Extensible Authentication Protocol
54
SIEM
Security Information and Event Management
55
SOAR
Security Orchestration, Automation, Response
56
IDS
Intrusion Detection System
57
IPS
Intrusion Prevention System
58
HIDS
Host-based Intrusion Detection System
59
NIDS
Network-based Intrusion Detection System
60
HIPS
Host-based Intrusion Prevention System
61
NIPS
Network-based Intrusion Prevention System
62
EDR
Endpoint Detection and Response
63
XDR
Extended Detection and Response
64
SOC
Security Operations Center
65
CERT
Computer Emergency Response Team
66
CIRT
Computer Incident Response Team
67
APT
Advanced Persistent Threat
68
DDoS
Distributed Denial of Service
69
DoS
Denial of Service
70
RAT
Remote Access Trojan
71
PUP
Potentially Unwanted Program
72
XSS
Cross-site Scripting
73
CSRF
Cross-site Request Forgery
74
XSRF
Cross-site Request Forgery
75
SQLi
SQL Injection
76
CVE
Common Vulnerability Enumeration
77
CVSS
Common Vulnerability Scoring System
78
IoC
Indicators of Compromise
79
CIA
Confidentiality, Integrity, Availability
80
NIST
National Institute of Standards & Technology
81
ISO
International Standards Organization
82
PCI DSS
Payment Card Industry Data Security Standard
83
GDPR
General Data Protection Regulation
84
HIPAA
Health Insurance Portability and Accountability Act
85
SOX
Sarbanes-Oxley Act
86
FISMA
Federal Information Security Management Act
87
CHAP
Challenge Handshake Authentication Protocol
88
PAP
Password Authentication Protocol
89
MSCHAP
Microsoft Challenge Handshake Authentication Protocol
90
NTLM
New Technology LAN Manager
91
Kerberos
Kerberos
92
HOTP
HMAC-based One-time Password
93
TOTP
Time-based One-time Password
94
SaaS
Software as a Service
95
PaaS
Platform as a Service
96
IaaS
Infrastructure as a Service
97
CASB
Cloud Access Security Broker
98
VDI
Virtual Desktop Infrastructure
99
VM
Virtual Machine
100
VPC
Virtual Private Cloud
101
SDN
Software-defined Networking
102
NFV
Network Functions Virtualization
103
MDM
Mobile Device Management
104
MAM
Mobile Application Management
105
BYOD
Bring Your Own Device
106
COPE
Corporate Owned, Personally Enabled
107
CYOD
Choose Your Own Device
108
DLP
Data Loss Prevention
109
FDE
Full Disk Encryption
110
EFS
Encrypted File System
111
SED
Self-encrypting Drives
112
PII
Personally Identifiable Information
113
PHI
Personal Health Information
114
TPM
Trusted Platform Module
115
HSM
Hardware Security Module
116
WAF
Web Application Firewall
117
NGFW
Next-generation Firewall
118
UTM
Unified Threat Management
119
NAC
Network Access Control
120
SASE
Secure Access Service Edge
121
SD-WAN
Software-defined Wide Area Network
122
SWG
Secure Web Gateway
123
IDS
Intrusion Detection System
124
SPF
Sender Policy Framework
125
DKIM
DomainKeys Identified Mail
126
DMARC
Domain Message Authentication Reporting and Conformance
127
S/MIME
Secure/Multipurpose Internet Mail Extensions
128
SMTP
Simple Mail Transfer Protocol
129
SMTPS
Simple Mail Transfer Protocol Secure
130
IMAP
Internet Message Access Protocol
131
POP
Post Office Protocol
132
BCP
Business Continuity Planning
133
DRP
Disaster Recovery Plan
134
RTO
Recovery Time Objective
135
RPO
Recovery Point Objective
136
MTBF
Mean Time Between Failures
137
MTTR
Mean Time to Recover
138
MTTF
Mean Time to Failure
139
COOP
Continuity of Operation Planning
140
BIA
Business Impact Analysis
141
HA
High Availability
142
AUP
Acceptable Use Policy
143
NDA
Non-disclosure Agreement
144
SLA
Service-level Agreement
145
MOU
Memorandum of Understanding
146
MOA
Memorandum of Agreement
147
BPA
Business Partners Agreement
148
SOW
Statement of Work
149
MSA
Master Service Agreement
150
OS
Operating System
151
BIOS
Basic Input/Output System
152
UEFI
Unified Extensible Firmware Interface
153
GPO
Group Policy Object
154
NTFS
New Technology File System
155
BASH
Bourne Again Shell
156
API
Application Programming Interface
157
SCAP
Security Content Automation Protocol
158
OVAL
Open Vulnerability Assessment Language
159
STIX
Structured Threat Information eXchange
160
TAXII
Trusted Automated eXchange of Indicator Information
161
OSINT
Open-source Intelligence
162
ATT&CK
Adversarial Tactics, Techniques, and Common Knowledge
163
TTP
Tactics, Techniques, and Procedures
164
SCADA
Supervisory Control and Data Acquisition
165
ICS
Industrial Control Systems
166
IoT
Internet of Things
167
OT
Operational Technology
168
RTOS
Real-time Operating System
169
CBC
Cipher Block Chaining
170
ECB
Electronic Code Book
171
GCM
Galois Counter Mode
172
CTM
Counter Mode
173
CFB
Cipher Feedback
174
CCMP
Counter Mode/CBC-MAC Protocol
175
DHCP
Dynamic Host Configuration Protocol
176
ARP
Address Resolution Protocol
177
ICMP
Internet Control Message Protocol
178
NTP
Network Time Protocol
179
GRE
Generic Routing Encapsulation
180
L2TP
Layer 2 Tunneling Protocol
181
PPTP
Point-to-Point Tunneling Protocol
182
PPP
Point-to-Point Protocol
183
CRL
Certificate Revocation List
184
OCSP
Online Certificate Status Protocol
185
CSR
Certificate Signing Request
186
PKCS
Public Key Cryptography Standards
187
P12
PKCS #12
188
PEM
Privacy Enhanced Mail
189
KDC
Key Distribution Center
190
KEK
Key Encryption Key
191
IV
Initialization Vector
192
RAID
Redundant Array of Inexpensive Disks
193
SAN
Storage Area Network
194
NAS
Network Attached Storage
195
SSD
Solid State Drive
196
HDD
Hard Disk Drive
197
VoIP
Voice over IP
198
RTP
Real-time Transport Protocol
199
SRTP
Secure Real-Time Protocol
200
SIP
Session Initiation Protocol
201
SMS
Short Message Service
202
MMS
Multimedia Message Service
203
IM
Instant Messaging
204
IRC
Internet Relay Chat
205
SDLC
Software Development Lifecycle
206
CI/CD
Continuous Integration/Continuous Deployment
207
SDK
Software Development Kit
208
API
Application Programming Interface
209
REST
Representational State Transfer
210
SOAP
Simple Object Access Protocol
211
JSON
JavaScript Object Notation
212
XML
Extensible Markup Language
213
CIO
Chief Information Officer
214
CISO
Chief Information Security Officer
215
CSO
Chief Security Officer
216
CTO
Chief Technology Officer
217
DPO
Data Privacy Officer
218
ISSO
Information Systems Security Officer
219
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart
220
ASLR
Address Space Layout Randomization
221
DEP
Data Execution Prevention
222
SEH
Structured Exception Handler
223
UAC
User Account Control
224
SELinux
Security-enhanced Linux
225
FPGA
Field Programmable Gate Array
226
GPU
Graphics Processing Unit
227
ESN
Electronic Serial Number
228
RFID
Radio Frequency Identifier
229
NFC
Near Field Communication
230
GPS
Global Positioning System
231
PTZ
Pan-tilt-zoom
232
CCTV
Closed-circuit Television
233
MPLS
Multi-protocol Label Switching
234
VLSM
Variable Length Subnet Masking
235
MTU
Maximum Transmission Unit
236
QoS
Quality of Service
237
SLA
Service-level Agreement
238
VLAN
Virtual Local Area Network
239
ESXi
Elastic Sky X Integrated
240
KVM
Kernel-based Virtual Machine
241
VDI
Virtual Desktop Infrastructure
242
FAT
File Allocation Table
243
exFAT
Extended File Allocation Table
244
NTFS
New Technology File System
245
ROI
Return on Investment
246
TCO
Total Cost of Ownership
247
SLE
Single Loss Expectancy
248
ALE
Annualized Loss Expectancy
249
ARO
Annualized Rate of Occurrence
250
OpenVPN
Open Virtual Private Network
251
WireGuard
WireGuard
252
IKE
Internet Key Exchange
253
AH
Authentication Header
254
ESP
Encapsulated Security Payload
255
HTML
Hypertext Markup Language
256
HTTP
Hypertext Transfer Protocol
257
URL
Universal Resource Locator
258
URI
Uniform Resource Identifier
259
FTP
File Transfer Protocol
260
BPDU
Bridge Protocol Data Unit
261
CRC
Cyclical Redundancy Check
262
DNAT
Destination Network Address Translation
263
PAT
Port Address Translation
264
TSIG
Transaction Signature
265
OID
Object Identifier
266
MDF
Main Distribution Frame
267
IDF
Intermediate Distribution Frame
268
UPS
Uninterruptable Power Supply
269
PDU
Power Distribution Unit
270
HVAC
Heating, Venetilation Air Conditioning
271
MFD
Multifunction Device
272
MFP
Multifunction Printer
273
PBX
Private Branch Exchange
274
POTS
Plain Old Telephone Service
275
DSL
Digital Subscriber Line
276
CSU
Channel Service Unit
277
UAV
Unmanned Aerial Vehicle
278
PED
Personal Electronic Device
279
USB
Universal Serial Bus
280
USB OTG
USB On the Go
281
VBA
Visual Basic
282
DLL
Dynamic Link Library
283
CAR
Corrective Action Report
284
WO
Work Order
285
ERP
Enterprise Resource Planning
286
CMS
Content Management System
287
DBA
Database Administrator
288
MSP
Managed Service Provider
289
MSSP
Managed Security Service Provider
290
MaaS
Monitoring as a Service
291
CP
Contingency Planning
292
IR
Incident Response
293
IRP
Incident Response Plan
294
UAT
User Acceptance Testing
295
RAD
Rapid Application Development
296
AI
Artificial Intelligence
297
ML
Machine Learning
298
AIS
Automated Indicator Sharing
299
TGT
Ticket Granting Ticket
300
TOC
Time-of-check
301
TOU
Time-of-use
302
SAE
Simultaneous Authentication of Equals
303
TKIP
Temporal Key Integrity Protocol
304
FIM
File Integrity Management
305
RA
Recovery Agent
306
RA
Registration Authority
307
PIV
Personal Identity Verification
308
PBKDF2
Password-based Key Derivation Function 2
309
PFS
Perfect Forward Secrecy
310
RC4
Rivest Cipher version 4
311
DSA
Digital Signature Algorithm
312
RIPEMD
RACE Integrity Primitives Evaluation Message Digest
313
RACE
Research and Development in Advanced Communications Technologies in Europe
314
IDEA
International Data Encryption Algorithm
315
SCEP
Simple Certificate Enrollment Protocol
316
VTC
Video Teleconferencing
317
RAS
Remote Access Server
318
RDP
Remote Desktop Protocol
319
SPIM
Spam over Internet Messaging
320
RTBH
Remotely Triggered Black Hole
321
WTLS
Wireless TLS
322
PCAP
Packet Capture
323
SoC
System on Chip
324
SDLM
Software Development Lifecycle Methodology
325
UEM
Unified Endpoint Management
326
LAN
Local Area Network
327
MAN
Metropolitan Area Network
328
P2P
Peer to Peer
329
ISP
Internet Service Provider
330
SIM
Subscriber Identity Module
331
OSINT
Open-source Intelligence
332
OSPF
Open Shortest Path First
333
OTA
Over the Air
334
PAC
Proxy Auto Configuration
335
XOR
Exclusive Or