401 Security+ Acronyms

humilaxo's version from 2015-12-01 19:31


Question Answer
Involved in buffer OverFlowsSEH - Structured Exception Handler
Handle emergenciesIRP - Incident Response Procedure
Log in AidHOTP - HMAC Based One Time Password
Coordinate VPNISA - Interconnection Security Agreement
Fall-Back DirectionITCP - IT Contingency Plan
Like RAIDJBOD - Just a Bunch of Disks
Used with 802.1xLEAP - Lightweight Extensible Authentication Protocol
Cloud ServicesMaaS - Monitoring as a Service
Master Boot RecordMBR
Refines dutiesMOU - Memorandum of Understanding
Pay with a cell phoneNFC - Near Field Communication
Auto configures for proxyPAC - Proxy auto configuration
Key StretchingPBKDF2 - Password based key derivation function 2
WiresharkPCAP - Packet capture
Movable VideoPTZ - Pan-Tilt-Zoom
Development StyleRAD - Rapid Application Development
3rd Party AuthenticationSAML - Security Assertions Markup Language
Industrial ControlsSCADA - System/supervisory control and data acquisition
Disk does not SpinSSD - Solid State Drive
Limited time secretTOTP - Time-based One-Time Password
Approved for UseUAT - User Acceptance Testing
Part of the BIOSUEFI - Unified extensible firmware interface
All in one interfaceUTM - Unified Threat Management
A Group of official FixesSP - Service Pack
Causes problems with UTPEMI/RFI - Electromagnetic Interference and Radio Frequency Interference
The next Internet Protocol VersionIPv6
Cost of one CompromiseSLE - compromise and its associated costs is referred to as the single loss expectancy.
Frequency of attackARO - Annualized rate of occurrence
Bulk messages over chat protocolsSPIM - Correct answer is SPam over instant messaging
Cost of attacks in a given yearALE - Annualized Loss Expectancy
Associated with Vulnerability scanningOVAL - Open vulnerability assessment language
Wireless NetworkWLAN - Wireless Local area Network
Used to prior to AES3DES - Data Encryption Standard /112-bit.
Limits access to objectsACL - Access Control List
Protocol header that provides IntegrityAH - Authentication Header
Secures Emails / not used by PKIPGP - Pretty Good Privacy
Tunneling protocol that does not encrypt the inner packet or payloadL2TP -
Allows firing an employee for misuseAUP - Authorized Use Policy
A Group of VictimsZombies / Bots
Core of a computer SystemBIOS - Basic Input Output System
Associated with Physical control and defenseCCTV - Closed-Circuit Television
Certificate PublishingCA - Certificate Authority
Finds IP Addresses ARP - Address Resolution protocol
Credentials that are not acceptableCRL - Certificate Revocation List
BOTS and zombies perform thisDDoS - Distributed Denial of Service
Involves 56-bits in its operationDES - Data Encryption stardard
Involves 256-bits in its operationAES - Advance Encryption Standard
Automatic addressDHCP - Dynamic Host Configuration Protocol
Regulates intranet Ingress/egressNAC - Network Access Control
Perimeter NetworkDMZ - Demilitarized Zone
Finds addressesDNS - Zoom Domain name services
Destruction, damage or lose of UseDoS - Denial of Service
AuthenticatesEAP - Extensible Authentication Protocol
Public Key Algorithm / Involves Curves and GeometryECC - Elliptical curve Cryptography
Clear Text operationFTP - File Transfer protocol
Handles detection of problems on one hostHIDS - Host Intrusion Detection Systems
Public-key encryption Algorithm / Factoring large prime numbersRSA - Rivest-Shamir-Adleman
Retrieves EmailPOP - Post Office Protocol
Manage Directory AccessLDAP - Lightweight Directory Access Protocol
unwanted file Transfers / Software that allows distributed file sharing and searchesP2P - Peer-to-Peer
Use it to get the internetISP - Internet service provider
Used by KerberosKDC - Key Distribution Center
Tunneling protocolL2TP - Layer 2 Tunneling Protocol
Secures EmailSMIME - Secure multipurpose Internet mail extension
Hashing with 160 to 256 bitsSHA1/SHA2 - Secure Hash Algorithm
Fault ToleranceRAID - Redundant Array of inexpensive Disks
Central to phone SystemsPBX - Private Branch Exchange
A secure alternative to telnetSSH - Secure Shell
Nearly the same as SSLTLS - Transport Layer Security
Makes Log-on EasySSO - Single Sign-On
Defends against eavesdroppers and interference from heavy machinerySTP - Shielded Twisted Pair
Its function is like that of RADIUSTACACS - Terminal Access controller Access Control System
An Improvement used by the successor to WEP / WPA- RelatedTKIP - Temporal key Integrity Protocol
Handles power issuesUPS - Uninterruptible power supply
Vulnerable to InterferenceUTP - Unshielded Twisted-Pair
Facilitates TelephonyVOIP - Voice over internet Protocol
Used by Extranet Partners / Collection of isolated network segments, linked together via switchesVPN - Virtual Private network
OwnershipDAC - Discretionary Access Control
Uses 128 BitsMD5 - Message Digest algorithm 5
A Replay DefenseMSCHAP - Microsoft created version of Challenge handshake Authentication Protocol
Monitors a networkNIDS - Network Intrusion Detection System
Uses a QuarantineAV - Anti-Virus
Older MS Authentication LANMAN - Local Area Network MANager
Newer MS AuthenticationNTLM - NT LAN Manager
A Way of forwarding EmailRelay
Requires Special handlingPII - Personally Identifiable Information
Ownership and management of keysPKI - Public Key Infrastructure
Header for Encrypted dataESP - Encapsulating Security Payload
Clear Text AuthenticationPAP - Password Authentication Protocol
Needed by a KDC and ClientCorrect Time
Uses a Realm or DomainKerberos
A Promise of performanceSLA - Service level Agreement
Competes with SMIME AlternativePGP
The System Determines accessMAC - Mandatory Access Control
Used by WEPRC4 - Rivest Cipher 4
SSLV2 problemMITM - Man In The Middle
Hardware private Key storageTPM - Trusted Platform Modules
Sent by a Server when you connect to TCP/443X.509
802.1xEAP - Extensible authentication protocol
Programming languageHTML - HyperText Markup Language
Unbreakable EncryptionOTP - One-Time Pad
A Way to secretly place or hide filesADS - Alternate Data Streams
Wireless protocols802.11
Authenticates access to ports / LEAP802.1x
A Chat protocol often used by BOTS and zombiesIRC - Internet Relay Chat
A server flaw that processes malicious URL's and sends unwanted code to clientsXSS -


Question Answer
GRE/L2TP and a network method of inserting one packet within another, commonly associated with VPN'sTunnel protocol
Secures a network for telecommutersIPSec
Controls BOTs Control Center
Layer 1Cabling and media
Layer 2Bridges and switches
Layer 3Routers / IP
Layer 4TCP - Transmission Control Protocol
Layer 7ALG
Bridges and Switches are Layer 2
TCP 3-way handshakeSYN, SYN/ACK, ACK
Works up to layer 7ALG & WAF
Relatively Slow system of encryption that usues dual keysAsymmetric Key Encryption
Hierarchical Infrastructure for managing and organizing common items and network resourcesDirectory Services
Crackin System that exhausts every possible combination of keys to identify passwords/SecretsBrute Force Attack
A collection of Decoy systemsHoneyNet
Recurrent brower popups or email that tracks and distracts usersAd-ware
Attacker code that hides activitiesRootkit
A way to forwarding SpamOpen Relay
An AP created by Rebellious users