CompTIA Security+ SY0-701 Acronym List Review

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/277

flashcard set

Earn XP

Description and Tags

A comprehensive set of flashcards covering essential acronyms and their definitions from the CompTIA Security+ SY0-701 exam objectives.

Last updated 10:55 PM on 3/23/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

278 Terms

1
New cards

2FA

Two-factor Authentication

2
New cards

3DES

Triple Data Encryption Standard: Is an encryption standard that applies the DES cipher algorithm three times to each data block for more effective key length.

3
New cards

AAA

Authentication, Authorization, and Accounting

4
New cards

ACL

Access Control List

5
New cards

AES

Advanced Encryption Standard: A highly trusted encryption algorithm used to secure data by converting it into an unreadable format without the proper key. It is developed by the National Institute of Standards and Technology (NIST) in 2001.

6
New cards

AH

Authentication Header: An IPsec protocol that ensures data integrity and origin authentication for network packets without encryption. It adds a cryptographic hash to packets, protecting them from tampering and replay attacks.

7
New cards

AI

Artificial Intelligence

8
New cards

ALE

Annualized Loss Expectancy: A quantitative risk assessment metric calculating the expected yearly financial loss from a specific threat, defined as ALE = SLE (Single Loss Expectancy) × ARO (Annual Rate of Occurrence).

9
New cards

AP

Access Point

10
New cards

API

Application Programming Interface: A set of rules and protocols that enables different software applications to communicate and exchange data with each other.

11
New cards

APT

Advanced Persistent Threat

12
New cards

ARO

Annualized Rate of Occurrence: A key metric in quantitative risk assessment that measures the estimated frequency a specific threat or loss event will occur within a single year.

13
New cards

ARP

Address Resolution Protocol: A fundamental network layer 2 protocol that maps dynamic IP addresses to physical Machine Access Control (MAC) addresses, enabling devices to communicate on a local area network (LAN).

14
New cards

ASLR

Address Space Layout Randomization: A security technique that randomizes the memory locations of key data areas—stack, heap, and libraries—each time a program runs.

15
New cards

ATT&CK

Adversarial Tactics, Techniques, and Common Knowledge: A globally accessible, comprehensive knowledge base of cyber adversary behavior based on real-world observations.

16
New cards

AUP

Acceptable Use Policy

17
New cards

AV

Antivirus

18
New cards

BASH

Bourne Again Shell: A widely used Unix shell and command-line interpreter (created in 1989 for the GNU Project) that serves as the default interface for interacting with Linux and macOS operating systems.

19
New cards

BCP

Business Continuity Planning: A proactive, documented strategy outlining how an organization will maintain essential functions during and after disruptions like cyber-attacks, natural disasters, or pandemics.

20
New cards

BGP

Border Gateway Protocol: The standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the internet.

21
New cards

BIA

Business Impact Analysis: A systematic process that identifies and evaluates the potential effects of disruptions to critical business operations, such as natural disasters, cyberattacks, or supply chain failures.

22
New cards

BIOS

Basic Input/Output System

23
New cards

BYOD

Bring Your Own Device

24
New cards

CA

Certificate Authority: A trusted, third-party entity within a Public Key Infrastructure (PKI) that issues, signs, and manages digital certificates. These certificates validate the identity of websites, users, or devices, enabling encrypted HTTPS connections and preventing malicious interceptions.

25
New cards

CAPTCHA

Completely Automated Public Turing Test to Tell Computers and Humans Apart

26
New cards

CAR

Corrective Action Report: A formal document used to identify, analyze, and eliminate the root causes of non-conformities, defects, or undesirable incidents to prevent their recurrence.

27
New cards

CASB

Cloud Access Security Broker: A security policy enforcement point placed between cloud users and cloud service providers to secure data, manage risk, and ensure compliance.

28
New cards

CBC

Cipher Block Chaining: A symmetric block cipher mode of operation that enhances security by XORing each plaintext block with the previous ciphertext block before encryption.

29
New cards

CCTV

Closed-circuit Television

30
New cards

CERT

Computer Emergency Response Team

31
New cards

CFB

Cipher Feedback

32
New cards

CHAP

Challenge Handshake Authentication Protocol: A secure, three-way handshake method used by servers to verify the identity of a client (peer) without sending passwords in plain text.

33
New cards

CIA

Confidentiality, Integrity, Availability

34
New cards

CIO

Chief Information Officer

35
New cards

CIRT

Computer Incident Response Team

36
New cards

CMS

Content Management System: Software that enables users to create, manage, edit, and publish digital content on websites without requiring advanced coding or technical knowledge.

37
New cards

COBO

Corporate-owned, Business-only: Companies provide and manage their own devices for business purposes.

38
New cards

COOP

Continuity of Operation Planning

39
New cards

COPE

Corporate Owned, Personally Enabled: A device management model where companies provide smartphones or laptops for work, allowing employees limited personal use.

40
New cards

CP

Contingency Planning

41
New cards

CRC

Cyclical Redundancy Check

42
New cards

CRL

Certificate Revocation List

43
New cards

CSO

Chief Security Officer

44
New cards

CSP

Cloud Service Provider

45
New cards

CSRF

Cross-site Request Forgery: A web security vulnerability where an attacker tricks an authenticated user's browser into performing unwanted, unauthorized actions on a trusted website without their consent. It exploits automatic cookie submission to change state (e.g., passwords, funds).

46
New cards

CSU

Channel Service Unit: A digital interface device that connects a customer’s terminal equipment (e.g., routers) to a digital telephone line, such as a T1 or E1 line.

47
New cards

CTO

Chief Technology Officer

48
New cards

CVE

Common Vulnerability Enumeration: A community-driven MITRE Corporation maintained taxonomy that categorizes software and hardware security flaws.

49
New cards

CVSS

Common Vulnerability Scoring System: Ranks risks from None (0.0) to Critical (9.0–10.0), aiding in patch prioritization. The scale typically uses Low (0.1–3.9), Medium (4.0–6.9), and High (7.0–8.9) categories.

50
New cards

DAC

Discretionary Access Control: An access security policy where the owner of a resource (file, directory, or object) has full authority to determine who can access it and what privileges (read, write, execute) they have.

51
New cards

DDoS

Distributed Denial of Service

52
New cards

DEP

Data Execution Prevention: A system-level security feature in Windows (since XP SP2) that prevents malicious code from running in designated non-executable memory regions, such as the stack or heap.

53
New cards

DES

Digital Encryption Standard: A retired, symmetric-key block cipher developed by IBM in the early 1970s and adopted in 1977 to protect unclassified government data.

54
New cards

DHCP

Dynamic Host Configuration Protocol

55
New cards

DHE

Diffie-Hellman Ephemeral

56
New cards

DKIM

DomainKeys Identified Mail

57
New cards

DLL

Dynamic Link Library

58
New cards

DLP

Data Loss Prevention

59
New cards

DMARC

Domain Message Authentication Reporting and Conformance

60
New cards

DNS

Domain Name System

61
New cards

DNSSEC

Domain Name System Security Extensions

62
New cards

DoS

Denial of Service

63
New cards

DPO

Data Privacy Officer

64
New cards

DRP

Disaster Recovery Plan

65
New cards

DSA

Digital Signature Algorithm

66
New cards

DSL

Digital Subscriber Line

67
New cards

EAP

Extensible Authentication Protocol

68
New cards

ECB

Electronic Code Book

69
New cards

ECC

Elliptic Curve Cryptography

70
New cards

ECDHE

Elliptic Curve Diffie-Hellman Ephemeral

71
New cards

ECDSA

Elliptic Curve Digital Signature Algorithm

72
New cards

EDR

Endpoint Detection and Response

73
New cards

EFS

Encrypted File System

74
New cards

ERP

Enterprise Resource Planning

75
New cards

GPG

Gnu Privacy Guard

76
New cards

GPO

Group Policy Object

77
New cards

GPS

Global Positioning System

78
New cards

GPU

Graphics Processing Unit

79
New cards

GRE

Generic Routing Encapsulation

80
New cards

HA

High Availability

81
New cards

HIDS

Host-based Intrusion Detection System

82
New cards

HIPS

Host-based Intrusion Prevention System

83
New cards

HMAC

Hashed Message Authentication Code

84
New cards

HOTP

HMAC-based One-time Password

85
New cards

HSM

Hardware Security Module

86
New cards

HTTP

Hypertext Transfer Protocol

87
New cards

HTTPS

Hypertext Transfer Protocol Secure

88
New cards

IAS

Infrastructure as a Service

89
New cards

IoT

Internet of Things

90
New cards

IP

Internet Protocol

91
New cards

ISO

International Standards Organization

92
New cards

ISP

Internet Service Provider

93
New cards

MD5

Message Digest 5

94
New cards

MDF

Main Distribution Frame

95
New cards

MDM

Mobile Device Management

96
New cards

MFA

Multifactor Authentication

97
New cards

MFD

Multifunction Device

98
New cards

MFP

Multifunction Printer

99
New cards

ML

Machine Learning

100
New cards

MMS

Multimedia Message Service

Explore top notes

note
trftghgtrfgbhgt
Updated 395d ago
0.0(0)
note
Chemistry moles stuff
Updated 414d ago
0.0(0)
note
Geometry 1.1 - 1.4
Updated 947d ago
0.0(0)
note
Foundations of Government
Updated 1295d ago
0.0(0)
note
Carpal Tunnel Syndrome
Updated 1138d ago
0.0(0)
note
Education
Updated 1189d ago
0.0(0)
note
AP PSYCHOLOGY Unit 0
Updated 565d ago
0.0(0)
note
trftghgtrfgbhgt
Updated 395d ago
0.0(0)
note
Chemistry moles stuff
Updated 414d ago
0.0(0)
note
Geometry 1.1 - 1.4
Updated 947d ago
0.0(0)
note
Foundations of Government
Updated 1295d ago
0.0(0)
note
Carpal Tunnel Syndrome
Updated 1138d ago
0.0(0)
note
Education
Updated 1189d ago
0.0(0)
note
AP PSYCHOLOGY Unit 0
Updated 565d ago
0.0(0)

Explore top flashcards

flashcards
2B Verbos -car, -gar, -zar
41
Updated 1085d ago
0.0(0)
flashcards
BIO FINAL
177
Updated 1029d ago
0.0(0)
flashcards
big french quiz
30
Updated 387d ago
0.0(0)
flashcards
Exam 3 Study Guide
62
Updated 1211d ago
0.0(0)
flashcards
Physics Paper 1
225
Updated 567d ago
0.0(0)
flashcards
2B Verbos -car, -gar, -zar
41
Updated 1085d ago
0.0(0)
flashcards
BIO FINAL
177
Updated 1029d ago
0.0(0)
flashcards
big french quiz
30
Updated 387d ago
0.0(0)
flashcards
Exam 3 Study Guide
62
Updated 1211d ago
0.0(0)
flashcards
Physics Paper 1
225
Updated 567d ago
0.0(0)