Security+ Acronyms Flashcards

Exam Prep (48 cards)

1
Q

AAA - Authentication, Authorization, and Accounting

A

Access control framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ABAC

A

Attribute-Based Access Control — evaluates attributes for access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ACL

A

Access Control List — permissions tied to resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AES

A

Advanced Encryption Standard — symmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

APT

A

Advanced Persistent Threat — long-term targeted attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

BCP

A

Business Continuity Plan — ensures operations after disruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

BIA

A

Business Impact Analysis — identifies critical functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

BYOD

A

Bring Your Own Device — policy for personal devices at work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CA

A

Certificate Authority — issues digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CIA

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CRL

A

Certificate Revocation List — list of revoked certs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CSRF

A

Cross-Site Request Forgery — web attack exploiting trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DAC

A

Discretionary Access Control — owner-based access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DDoS

A

Distributed Denial of Service — flood of traffic attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DLP

A

Data Loss Prevention — prevents data exfiltration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DNS

A

Domain Name System — resolves domain to IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DRP

A

Disaster Recovery Plan — restores systems after failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

EDR

A

Endpoint Detection and Response — detects endpoint threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

HIPS

A

Host-based Intrusion Prevention System — blocks host attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

IAM

A

Identity and Access Management — manages digital identities

21
Q

IPS

A

Intrusion Prevention System — detects and blocks attacks

22
Q

MFA

A

Multi-Factor Authentication — requires multiple factors

23
Q

NAC

A

Network Access Control — controls device access to network

24
Q

NAT

A

Network Address Translation — hides internal IPs

25
OCSP
Online Certificate Status Protocol — checks cert validity
26
OSINT
Open-Source Intelligence — gathers public threat info
27
OT
Operational Technology — controls industrial systems
28
PII
Personally Identifiable Information — sensitive user data
29
PKI
Public Key Infrastructure — framework for certs and keys
30
RADIUS
Remote Authentication Dial-In User Service — AAA protocol
31
RTO
Recovery Time Objective — max downtime allowed
32
RPO
Recovery Point Objective — max acceptable data loss
33
RBAC
Role-Based Access Control — access via job roles
34
SaaS
Software as a Service — cloud delivery model
35
SCADA
Supervisory Control and Data Acquisition — ICS systems
36
SDN
Software-Defined Networking — programmable networking
37
SIEM
Security Information and Event Management — log correlation
38
SLA
Service Level Agreement — defines service expectations
39
SLE
Single Loss Expectancy — expected loss from one event
40
SSO
Single Sign-On — single login for multiple systems
41
TACACS+
Terminal Access Controller Access Control System Plus — AAA protocol
42
TLS
Transport Layer Security — encrypts communication
43
TPM
Trusted Platform Module — hardware key storage
44
UTM
Unified Threat Management — consolidated security device
45
VM
Virtual Machine — isolated computing instance
46
VPN
Virtual Private Network — secure network tunnel
47
XDR
Extended Detection and Response — unified threat response
48
XSS
Cross-Site Scripting — web injection attack