Untitled Flashcards Set

CompTIA Security+ SY0-701 Acronym List

The following is a list of acronyms that appears on the CompTIA Security+

SY0-701 exam. Candidates are encouraged to review the complete

list and attain a working knowledge of all listed acronyms as part of a

comprehensive exam preparation program.

Acronym Spelled Out

AAA Authentication, Authorization, and

Accounting

ACL Access Control List

AES Advanced Encryption Standard

AES-256 Advanced Encryption Standards 256-bit

AH Authentication Header

AI Artificial Intelligence

AIS Automated Indicator Sharing

ALE Annualized Loss Expectancy

AP Access Point

API Application Programming Interface

APT Advanced Persistent Threat

ARO Annualized Rate of Occurrence

ARP Address Resolution Protocol

ASLR Address Space Layout Randomization

ATT&CK Adversarial Tactics, Techniques, and

Common Knowledge

AUP Acceptable Use Policy

AV Antivirus

BASH Bourne Again Shell

BCP Business Continuity Planning

BGP Border Gateway Protocol

BIA Business Impact Analysis

BIOS Basic Input/Output System

BPA Business Partners Agreement

BPDU Bridge Protocol Data Unit

BYOD Bring Your Own Device

CA Certificate Authority

CAPTCHA Completely Automated Public Turing Test to

Tell Computers and Humans Apart

CAR Corrective Action Report

CASB Cloud Access Security Broker

CBC Cipher Block Chaining

CCMP Counter Mode/CBC-MAC Protocol

CCTV Closed-circuit Television

CERT Computer Emergency Response Team

CFB Cipher Feedback

Acronym Spelled Out

CHAP Challenge Handshake Authentication

Protocol

CIA Confidentiality, Integrity, Availability

CIO Chief Information Officer

CIRT Computer Incident Response Team

CMS Content Management System

COOP Continuity of Operation Planning

COPE Corporate Owned, Personally Enabled

CP Contingency Planning

CRC Cyclical Redundancy Check

CRL Certificate Revocation List

CSO Chief Security Officer

CSP Cloud Service Provider

CSR Certificate Signing Request

CSRF Cross-site Request Forgery

CSU Channel Service Unit

CTM Counter Mode

CTO Chief Technology Officer

CVE Common Vulnerability Enumeration

CVSS Common Vulnerability Scoring System

CYOD Choose Your Own Device

DAC Discretionary Access Control

DBA Database Administrator

DDoS Distributed Denial of Service

DEP Data Execution Prevention

DES Digital Encryption Standard

DHCP Dynamic Host Configuration Protocol

DHE Diffie-Hellman Ephemeral

DKIM DomainKeys Identified Mail

DLL Dynamic Link Library

DLP Data Loss Prevention

DMARC Domain Message Authentication Reporting

and Conformance

DNAT Destination Network Address Translation

DNS Domain Name System

DoS Denial of Service

DPO Data Privacy Officer

CompTIA Security+ SY0-701 Certification Exam: Exam Objectives Version 5.0

Copyright © 2023 CompTIA, Inc. All rights reserved.Acronym Spelled Out

Acronym Spelled Out

DRP Disaster Recovery Plan

IEEE Institute of Electrical and Electronics

DSA Digital Signature Algorithm

Engineers

DSL Digital Subscriber Line

IKE Internet Key Exchange

EAP Extensible Authentication Protocol

IM Instant Messaging

ECB Electronic Code Book

IMAP Internet Message Access Protocol

ECC Elliptic Curve Cryptography

IoC Indicators of Compromise

ECDHE Elliptic Curve Diffie-Hellman Ephemeral

IoT Internet of Things

ECDSA Elliptic Curve Digital Signature Algorithm

IP Internet Protocol

EDR Endpoint Detection and Response

IPS Intrusion Prevention System

EFS Encrypted File System

IPSec Internet Protocol Security

ERP Enterprise Resource Planning

IR Incident Response

ESN Electronic Serial Number

IRC Internet Relay Chat

ESP Encapsulated Security Payload

IRP Incident Response Plan

FACL File System Access Control List

ISO International Standards Organization

FDE Full Disk Encryption

ISP Internet Service Provider

FIM File Integrity Management

ISSO Information Systems Security Officer

FPGA Field Programmable Gate Array

IV Initialization Vector

FRR False Rejection Rate

KDC Key Distribution Center

FTP File Transfer Protocol

KEK Key Encryption Key

FTPS Secured File Transfer Protocol

L2TP Layer 2 Tunneling Protocol

GCM Galois Counter Mode

LAN Local Area Network

GDPR General Data Protection Regulation

LDAP Lightweight Directory Access Protocol

GPG Gnu Privacy Guard

LEAP Lightweight Extensible Authentication

GPO Group Policy Object

Protocol

GPS Global Positioning System

MaaS Monitoring as a Service

GPU Graphics Processing Unit

MAC Mandatory Access Control

GRE Generic Routing Encapsulation

MAC Media Access Control

HA High Availability

MAC Message Authentication Code

HDD Hard Disk Drive

MAN Metropolitan Area Network

HIDS Host-based Intrusion Detection System

MBR Master Boot Record

HIPS Host-based Intrusion Prevention System

MD5 Message Digest 5

HMAC Hashed Message Authentication Code

MDF Main Distribution Frame

HOTP HMAC-based One-time Password

MDM Mobile Device Management

HSM Hardware Security Module

MFA Multifactor Authentication

HTML Hypertext Markup Language

MFD Multifunction Device

HTTP Hypertext Transfer Protocol

MFP Multifunction Printer

HTTPS Hypertext Transfer Protocol Secure

ML Machine Learning

HVAC Heating, Ventilation Air Conditioning

MMS Multimedia Message Service

IaaS Infrastructure as a Service

MOA Memorandum of Agreement

IaC Infrastructure as Code

MOU Memorandum of Understanding

IAM Identity and Access Management

MPLS Multi-protocol Label Switching

ICMP Internet Control Message Protocol

MSA Master Service Agreement

ICS Industrial Control Systems

MSCHAP Microsoft Challenge Handshake

IDEA International Data Encryption Algorithm

Authentication Protocol

IDF Intermediate Distribution Frame

MSP Managed Service Provider

IdP Identity Provider

MSSP Managed Security Service Provider

IDS Intrusion Detection System

MTBF Mean Time Between Failures

MTTF Mean Time to Failure

CompTIA Security+ SY0-701 Certification Exam: Exam Objectives Version 5.0

Copyright © 2023 CompTIA, Inc. All rights reserved.Acronym Spelled Out

Acronym Spelled Out

MTTR Mean Time to Recover

PKI Public Key Infrastructure

MTU Maximum Transmission Unit

POP Post Office Protocol

NAC Network Access Control

POTS Plain Old Telephone Service

NAT Network Address Translation

PPP Point-to-Point Protocol

NDA Non-disclosure Agreement

PPTP Point-to-Point Tunneling Protocol

NFC Near Field Communication

PSK Pre-shared Key

NGFW Next-generation Firewall

PTZ Pan-tilt-zoom

NIDS Network-based Intrusion Detection System

PUP Potentially Unwanted Program

NIPS Network-based Intrusion Prevention System

RA Recovery Agent

NIST National Institute of Standards & Technology

RA Registration Authority

NTFS New Technology File System

RACE Research and Development in Advanced

NTLM New Technology LAN Manager

Communications Technologies in Europe

NTP Network Time Protocol

RAD Rapid Application Development

OAUTH Open Authorization

RADIUS Remote Authentication Dial-in User Service

OCSP Online Certificate Status Protocol

RAID Redundant Array of Inexpensive Disks

OID Object Identifier

RAS Remote Access Server

OS Operating System

RAT Remote Access Trojan

OSINT Open-source Intelligence

RBAC Role-based Access Control

OSPF Open Shortest Path First

RBAC Rule-based Access Control

OT Operational Technology

RC4 Rivest Cipher version 4

OTA Over the Air

RDP Remote Desktop Protocol

OVAL Open Vulnerability Assessment Language

RFID Radio Frequency Identifier

P12 PKCS #12

RIPEMD RACE Integrity Primitives Evaluation

P2P Peer to Peer

Message Digest

PaaS PAC Platform as a Service

Proxy Auto Configuration

ROI RPO Return on Investment

Recovery Point Objective

PAM Privileged Access Management

RSA Rivest, Shamir, & Adleman

PAM Pluggable Authentication Modules

RTBH Remotely Triggered Black Hole

PAP Password Authentication Protocol

RTO Recovery Time Objective

PAT Port Address Translation

RTOS Real-time Operating System

PBKDF2 Password-based Key Derivation Function 2

RTP Real-time Transport Protocol

PBX PCAP Private Branch Exchange

Packet Capture

S/MIME Secure/Multipurpose Internet Mail

Extensions

PCI DSS Payment Card Industry Data Security

SaaS Software as a Service

Standard

SAE Simultaneous Authentication of Equals

PDU Power Distribution Unit

SAML Security Assertions Markup Language

PEAP Protected Extensible Authentication

Protocol

SAN SAN Storage Area Network

Subject Alternative Name

PED Personal Electronic Device

SASE Secure Access Service Edge

PEM Privacy Enhanced Mail

SCADA Supervisory Control and Data Acquisition

PFS Perfect Forward Secrecy

SCAP Security Content Automation Protocol

PGP Pretty Good Privacy

SCEP Simple Certificate Enrollment Protocol

PHI Personal Health Information

SD-WAN Software-defined Wide Area Network

PII Personally Identifiable Information

SDK Software Development Kit

PIV Personal Identity Verification

SDLC Software Development Lifecycle

PKCS Public Key Cryptography Standards

SDLM Software Development Lifecycle

Methodology

CompTIA Security+ SY0-701 Certification Exam: Exam Objectives Version 5.0

Copyright © 2023 CompTIA, Inc. All rights reserved.Acronym Spelled Out

Acronym Spelled Out

SDN Software-defined Networking

TOTP Time-based One-time Password

SE Linux Security-enhanced Linux

TOU Time-of-use

SED Self-encrypting Drives

TPM Trusted Platform Module

SEH Structured Exception Handler

TTP Tactics, Techniques, and Procedures

SFTP Secured File Transfer Protocol

TSIG Transaction Signature

SHA Secure Hashing Algorithm

UAT User Acceptance Testing

SHTTP Secure Hypertext Transfer Protocol

UAV Unmanned Aerial Vehicle

SIEM Security Information and Event Management

UDP User Datagram Protocol

SIM Subscriber Identity Module

UEFI Unified Extensible Firmware Interface

SLA Service-level Agreement

UEM Unified Endpoint Management

SLE Single Loss Expectancy

UPS Uninterruptable Power Supply

SMS Short Message Service

URI Uniform Resource Identifier

SMTP Simple Mail Transfer Protocol

URL Universal Resource Locator

SMTPS Simple Mail Transfer Protocol Secure

USB Universal Serial Bus

SNMP Simple Network Management Protocol

USB OTG USB On the Go

SOAP Simple Object Access Protocol

UTM Unified Threat Management

SOAR Security Orchestration, Automation,

UTP Unshielded Twisted Pair

Response

VBA Visual Basic

SoC System on Chip

VDE Virtual Desktop Environment

SOC Security Operations Center

VDI Virtual Desktop Infrastructure

SOW Statement of Work

VLAN Virtual Local Area Network

SPF Sender Policy Framework

VLSM Variable Length Subnet Masking

SPIM Spam over Internet Messaging

VM Virtual Machine

SQL Structured Query Language

VoIP Voice over IP

SQLi SQL Injection

VPC Virtual Private Cloud

SRTP Secure Real-Time Protocol

VPN Virtual Private Network

SSD Solid State Drive

VTC Video Teleconferencing

SSH Secure Shell

WAF Web Application Firewall

SSL Secure Sockets Layer

WAP Wireless Access Point

SSO Single Sign-on

WEP Wired Equivalent Privacy

STIX Structured Threat Information eXchange

WIDS Wireless Intrusion Detection System

SWG Secure Web Gateway

WIPS Wireless Intrusion Prevention System

TACACS+ Terminal Access Controller Access Control

WO Work Order

System

WPA Wi-Fi Protected Access

TAXII Trusted Automated eXchange of Indicator

Information

WPS WTLS Wi-Fi Protected Setup

Wireless TLS

TCP/IP Transmission Control Protocol/Internet

XDR Extended Detection and Response

Protocol

XML Extensible Markup Language

TGT Ticket Granting Ticket

XOR Exclusive Or

TKIP Temporal Key Integrity Protocol

XSRF Cross-site Request Forgery

TLS Transport Layer Security

TOC Time-of-check

XSS Cross-site Scripting

robot