CompTIA Security+ SY0-701 Acronym List
The following is a list of acronyms that appears on the CompTIA Security+
SY0-701 exam. Candidates are encouraged to review the complete
list and attain a working knowledge of all listed acronyms as part of a
comprehensive exam preparation program.
Acronym Spelled Out
AAA Authentication, Authorization, and
Accounting
ACL Access Control List
AES Advanced Encryption Standard
AES-256 Advanced Encryption Standards 256-bit
AH Authentication Header
AI Artificial Intelligence
AIS Automated Indicator Sharing
ALE Annualized Loss Expectancy
AP Access Point
API Application Programming Interface
APT Advanced Persistent Threat
ARO Annualized Rate of Occurrence
ARP Address Resolution Protocol
ASLR Address Space Layout Randomization
ATT&CK Adversarial Tactics, Techniques, and
Common Knowledge
AUP Acceptable Use Policy
AV Antivirus
BASH Bourne Again Shell
BCP Business Continuity Planning
BGP Border Gateway Protocol
BIA Business Impact Analysis
BIOS Basic Input/Output System
BPA Business Partners Agreement
BPDU Bridge Protocol Data Unit
BYOD Bring Your Own Device
CA Certificate Authority
CAPTCHA Completely Automated Public Turing Test to
Tell Computers and Humans Apart
CAR Corrective Action Report
CASB Cloud Access Security Broker
CBC Cipher Block Chaining
CCMP Counter Mode/CBC-MAC Protocol
CCTV Closed-circuit Television
CERT Computer Emergency Response Team
CFB Cipher Feedback
Acronym Spelled Out
CHAP Challenge Handshake Authentication
Protocol
CIA Confidentiality, Integrity, Availability
CIO Chief Information Officer
CIRT Computer Incident Response Team
CMS Content Management System
COOP Continuity of Operation Planning
COPE Corporate Owned, Personally Enabled
CP Contingency Planning
CRC Cyclical Redundancy Check
CRL Certificate Revocation List
CSO Chief Security Officer
CSP Cloud Service Provider
CSR Certificate Signing Request
CSRF Cross-site Request Forgery
CSU Channel Service Unit
CTM Counter Mode
CTO Chief Technology Officer
CVE Common Vulnerability Enumeration
CVSS Common Vulnerability Scoring System
CYOD Choose Your Own Device
DAC Discretionary Access Control
DBA Database Administrator
DDoS Distributed Denial of Service
DEP Data Execution Prevention
DES Digital Encryption Standard
DHCP Dynamic Host Configuration Protocol
DHE Diffie-Hellman Ephemeral
DKIM DomainKeys Identified Mail
DLL Dynamic Link Library
DLP Data Loss Prevention
DMARC Domain Message Authentication Reporting
and Conformance
DNAT Destination Network Address Translation
DNS Domain Name System
DoS Denial of Service
DPO Data Privacy Officer
CompTIA Security+ SY0-701 Certification Exam: Exam Objectives Version 5.0
Copyright © 2023 CompTIA, Inc. All rights reserved.Acronym Spelled Out
Acronym Spelled Out
DRP Disaster Recovery Plan
IEEE Institute of Electrical and Electronics
DSA Digital Signature Algorithm
Engineers
DSL Digital Subscriber Line
IKE Internet Key Exchange
EAP Extensible Authentication Protocol
IM Instant Messaging
ECB Electronic Code Book
IMAP Internet Message Access Protocol
ECC Elliptic Curve Cryptography
IoC Indicators of Compromise
ECDHE Elliptic Curve Diffie-Hellman Ephemeral
IoT Internet of Things
ECDSA Elliptic Curve Digital Signature Algorithm
IP Internet Protocol
EDR Endpoint Detection and Response
IPS Intrusion Prevention System
EFS Encrypted File System
IPSec Internet Protocol Security
ERP Enterprise Resource Planning
IR Incident Response
ESN Electronic Serial Number
IRC Internet Relay Chat
ESP Encapsulated Security Payload
IRP Incident Response Plan
FACL File System Access Control List
ISO International Standards Organization
FDE Full Disk Encryption
ISP Internet Service Provider
FIM File Integrity Management
ISSO Information Systems Security Officer
FPGA Field Programmable Gate Array
IV Initialization Vector
FRR False Rejection Rate
KDC Key Distribution Center
FTP File Transfer Protocol
KEK Key Encryption Key
FTPS Secured File Transfer Protocol
L2TP Layer 2 Tunneling Protocol
GCM Galois Counter Mode
LAN Local Area Network
GDPR General Data Protection Regulation
LDAP Lightweight Directory Access Protocol
GPG Gnu Privacy Guard
LEAP Lightweight Extensible Authentication
GPO Group Policy Object
Protocol
GPS Global Positioning System
MaaS Monitoring as a Service
GPU Graphics Processing Unit
MAC Mandatory Access Control
GRE Generic Routing Encapsulation
MAC Media Access Control
HA High Availability
MAC Message Authentication Code
HDD Hard Disk Drive
MAN Metropolitan Area Network
HIDS Host-based Intrusion Detection System
MBR Master Boot Record
HIPS Host-based Intrusion Prevention System
MD5 Message Digest 5
HMAC Hashed Message Authentication Code
MDF Main Distribution Frame
HOTP HMAC-based One-time Password
MDM Mobile Device Management
HSM Hardware Security Module
MFA Multifactor Authentication
HTML Hypertext Markup Language
MFD Multifunction Device
HTTP Hypertext Transfer Protocol
MFP Multifunction Printer
HTTPS Hypertext Transfer Protocol Secure
ML Machine Learning
HVAC Heating, Ventilation Air Conditioning
MMS Multimedia Message Service
IaaS Infrastructure as a Service
MOA Memorandum of Agreement
IaC Infrastructure as Code
MOU Memorandum of Understanding
IAM Identity and Access Management
MPLS Multi-protocol Label Switching
ICMP Internet Control Message Protocol
MSA Master Service Agreement
ICS Industrial Control Systems
MSCHAP Microsoft Challenge Handshake
IDEA International Data Encryption Algorithm
Authentication Protocol
IDF Intermediate Distribution Frame
MSP Managed Service Provider
IdP Identity Provider
MSSP Managed Security Service Provider
IDS Intrusion Detection System
MTBF Mean Time Between Failures
MTTF Mean Time to Failure
CompTIA Security+ SY0-701 Certification Exam: Exam Objectives Version 5.0
Copyright © 2023 CompTIA, Inc. All rights reserved.Acronym Spelled Out
Acronym Spelled Out
MTTR Mean Time to Recover
PKI Public Key Infrastructure
MTU Maximum Transmission Unit
POP Post Office Protocol
NAC Network Access Control
POTS Plain Old Telephone Service
NAT Network Address Translation
PPP Point-to-Point Protocol
NDA Non-disclosure Agreement
PPTP Point-to-Point Tunneling Protocol
NFC Near Field Communication
PSK Pre-shared Key
NGFW Next-generation Firewall
PTZ Pan-tilt-zoom
NIDS Network-based Intrusion Detection System
PUP Potentially Unwanted Program
NIPS Network-based Intrusion Prevention System
RA Recovery Agent
NIST National Institute of Standards & Technology
RA Registration Authority
NTFS New Technology File System
RACE Research and Development in Advanced
NTLM New Technology LAN Manager
Communications Technologies in Europe
NTP Network Time Protocol
RAD Rapid Application Development
OAUTH Open Authorization
RADIUS Remote Authentication Dial-in User Service
OCSP Online Certificate Status Protocol
RAID Redundant Array of Inexpensive Disks
OID Object Identifier
RAS Remote Access Server
OS Operating System
RAT Remote Access Trojan
OSINT Open-source Intelligence
RBAC Role-based Access Control
OSPF Open Shortest Path First
RBAC Rule-based Access Control
OT Operational Technology
RC4 Rivest Cipher version 4
OTA Over the Air
RDP Remote Desktop Protocol
OVAL Open Vulnerability Assessment Language
RFID Radio Frequency Identifier
P12 PKCS #12
RIPEMD RACE Integrity Primitives Evaluation
P2P Peer to Peer
Message Digest
PaaS PAC Platform as a Service
Proxy Auto Configuration
ROI RPO Return on Investment
Recovery Point Objective
PAM Privileged Access Management
RSA Rivest, Shamir, & Adleman
PAM Pluggable Authentication Modules
RTBH Remotely Triggered Black Hole
PAP Password Authentication Protocol
RTO Recovery Time Objective
PAT Port Address Translation
RTOS Real-time Operating System
PBKDF2 Password-based Key Derivation Function 2
RTP Real-time Transport Protocol
PBX PCAP Private Branch Exchange
Packet Capture
S/MIME Secure/Multipurpose Internet Mail
Extensions
PCI DSS Payment Card Industry Data Security
SaaS Software as a Service
Standard
SAE Simultaneous Authentication of Equals
PDU Power Distribution Unit
SAML Security Assertions Markup Language
PEAP Protected Extensible Authentication
Protocol
SAN SAN Storage Area Network
Subject Alternative Name
PED Personal Electronic Device
SASE Secure Access Service Edge
PEM Privacy Enhanced Mail
SCADA Supervisory Control and Data Acquisition
PFS Perfect Forward Secrecy
SCAP Security Content Automation Protocol
PGP Pretty Good Privacy
SCEP Simple Certificate Enrollment Protocol
PHI Personal Health Information
SD-WAN Software-defined Wide Area Network
PII Personally Identifiable Information
SDK Software Development Kit
PIV Personal Identity Verification
SDLC Software Development Lifecycle
PKCS Public Key Cryptography Standards
SDLM Software Development Lifecycle
Methodology
CompTIA Security+ SY0-701 Certification Exam: Exam Objectives Version 5.0
Copyright © 2023 CompTIA, Inc. All rights reserved.Acronym Spelled Out
Acronym Spelled Out
SDN Software-defined Networking
TOTP Time-based One-time Password
SE Linux Security-enhanced Linux
TOU Time-of-use
SED Self-encrypting Drives
TPM Trusted Platform Module
SEH Structured Exception Handler
TTP Tactics, Techniques, and Procedures
SFTP Secured File Transfer Protocol
TSIG Transaction Signature
SHA Secure Hashing Algorithm
UAT User Acceptance Testing
SHTTP Secure Hypertext Transfer Protocol
UAV Unmanned Aerial Vehicle
SIEM Security Information and Event Management
UDP User Datagram Protocol
SIM Subscriber Identity Module
UEFI Unified Extensible Firmware Interface
SLA Service-level Agreement
UEM Unified Endpoint Management
SLE Single Loss Expectancy
UPS Uninterruptable Power Supply
SMS Short Message Service
URI Uniform Resource Identifier
SMTP Simple Mail Transfer Protocol
URL Universal Resource Locator
SMTPS Simple Mail Transfer Protocol Secure
USB Universal Serial Bus
SNMP Simple Network Management Protocol
USB OTG USB On the Go
SOAP Simple Object Access Protocol
UTM Unified Threat Management
SOAR Security Orchestration, Automation,
UTP Unshielded Twisted Pair
Response
VBA Visual Basic
SoC System on Chip
VDE Virtual Desktop Environment
SOC Security Operations Center
VDI Virtual Desktop Infrastructure
SOW Statement of Work
VLAN Virtual Local Area Network
SPF Sender Policy Framework
VLSM Variable Length Subnet Masking
SPIM Spam over Internet Messaging
VM Virtual Machine
SQL Structured Query Language
VoIP Voice over IP
SQLi SQL Injection
VPC Virtual Private Cloud
SRTP Secure Real-Time Protocol
VPN Virtual Private Network
SSD Solid State Drive
VTC Video Teleconferencing
SSH Secure Shell
WAF Web Application Firewall
SSL Secure Sockets Layer
WAP Wireless Access Point
SSO Single Sign-on
WEP Wired Equivalent Privacy
STIX Structured Threat Information eXchange
WIDS Wireless Intrusion Detection System
SWG Secure Web Gateway
WIPS Wireless Intrusion Prevention System
TACACS+ Terminal Access Controller Access Control
WO Work Order
System
WPA Wi-Fi Protected Access
TAXII Trusted Automated eXchange of Indicator
Information
WPS WTLS Wi-Fi Protected Setup
Wireless TLS
TCP/IP Transmission Control Protocol/Internet
XDR Extended Detection and Response
Protocol
XML Extensible Markup Language
TGT Ticket Granting Ticket
XOR Exclusive Or
TKIP Temporal Key Integrity Protocol
XSRF Cross-site Request Forgery
TLS Transport Layer Security
TOC Time-of-check
XSS Cross-site Scripting