This class was created by Brainscape user Tony T. Visit their profile to learn more about the creator.

Decks in this class (32)

Day 1
3des,
Standard for controlling access t...,
The principle of verifying identi...
27  cards
Day 1 Reversed
3des,
Standard for controlling access t...,
The principle of verifying identi...
27  cards
Day 2
Firmware based initialization cod...,
Technology commonly used to commu...,
The orderly planning for and mana...
25  cards
Day 2 Reversed
Firmware based initialization cod...,
Technology commonly used to commu...,
The orderly planning for and mana...
25  cards
Day 3
Commonly used by routers and has ...,
The most senior official in an or...,
A group that investigates and res...
26  cards
Day 3 Reversed
Commonly used by routers and has ...,
The most senior official in an or...,
A group that investigates and res...
26  cards
Day 4
An empirical scheme for rating vu...,
In this mode of control and acqui...,
The creator has all control over ...
25  cards
Day 4 Reversed
An empirical scheme for rating vu...,
In this mode of control and acqui...,
The creator has all control over ...
25  cards
Day 5
An algorithm created by the nsa t...,
Dsl digital subscriber line,
Eap extensible authentication pro...
27  cards
Day 5 Reversed
An algorithm created by the nsa t...,
Dsl digital subscriber line,
Eap extensible authentication pro...
27  cards
Day 6
Useful for protecting packet data...,
A law from the european union tha...,
The free incarnation of a popular...
27  cards
Day 6 Reversed
Useful for protecting packet data...,
A law from the european union tha...,
The free incarnation of a popular...
27  cards
Day 7
This is a symmetric cipher that i...,
The wiring panels linked by riser...,
A service that contain subjects a...
28  cards
Day 7 Reversed
This is a symmetric cipher that i...,
The wiring panels linked by riser...,
A service that contain subjects a...
28  cards
Day 8
Protects a private or secret key ...,
Filter and forward data at the ma...,
Supports vpn site to site connect...
28  cards
Day 8 Reversed
Protects a private or secret key ...,
Filter and forward data at the ma...,
Supports vpn site to site connect...
27  cards
Day 9
This is used by wan providers to ...,
Uses an initial handshake to crea...,
A specialty provider of it servic...
24  cards
Day 9 Reversed
This is used by wan providers to ...,
Uses an initial handshake to crea...,
A specialty provider of it servic...
24  cards
Day 10
This protocol is used by the clie...,
This is a value commonly associat...,
The software on a system initiall...
24  cards
Day 10 COPY
This protocol is used by the clie...,
This is a value commonly associat...,
The software on a system initiall...
24  cards
Day 11
A nongovernmental security standa...,
This is a multiple output device ...,
This is a format for code run by ...
26  cards
Day 11 COPY
A nongovernmental security standa...,
This is a multiple output device ...,
This is a format for code run by ...
26  cards
Day 12
The property of a camera to be ab...,
The monitoring and control functi...,
A networking function that seeks ...
26  cards
Day 12 COPY
The property of a camera to be ab...,
The monitoring and control functi...,
A networking function that seeks ...
26  cards
Day 13
These are operating systems that ...,
One of several protocols used for...,
The standard form of messaging wi...
26  cards
Day 13 COPY
These are operating systems that ...,
One of several protocols used for...,
The standard form of messaging wi...
26  cards
Day 14
An agreement on the characteristi...,
The value of an asset multiplied ...,
This is a core microsoft protocol...
25  cards
Day 14 COPY
An agreement on the characteristi...,
The value of an asset multiplied ...,
This is a core microsoft protocol...
25  cards
Day 15
The obfuscation of information wi...,
Four pairs of wires wrapped in fo...,
The use of a single value to hide...
27  cards
Day 15 COPY
The obfuscation of information wi...,
Four pairs of wires wrapped in fo...,
The use of a single value to hide...
27  cards
Day 16
This is a multifunction firewall ...,
Commonly known as four pair in ub...,
An operational defense designed t...
28  cards
Day 16 COPY
This is a multifunction firewall ...,
Commonly known as four pair in ub...,
An operational defense designed t...
28  cards

More about
Sec+ Acronyms

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Tony T's Sec+ Acronyms flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Sec+
  • 16 decks
  • 936 flashcards
  • 337 learners
Decks: Ch 1 5, Sec Vista, Ch 6 7 8, And more!
Sec+
  • 23 decks
  • 1252 flashcards
  • 37 learners
Decks: Lesson 1, Lesson 2, Lesson 3, And more!
Sec+
  • 30 decks
  • 732 flashcards
  • 88 learners
Decks: 26 50, 51 75, 76 100, And more!
Comptia SEC+
  • 27 decks
  • 1865 flashcards
  • 12 learners
Decks: Section 22 Virtualization And Cloud Comp, Section 23 Secure Application Developmen, Section 24 Authentication And Authorizat, And more!
Make Flashcards