• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/150

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

150 Cards in this Set

  • Front
  • Back
3DES
Triple Digital Encryption Standard
AAA
Authentication, Authorization, and Accounting
ACL
Access Control List
AES
Advanced Encryption Standard
AES256
Advanced Encryption Standards 256bit
AH
Authentication Header
ALE
Annualized Loss Expectancy
AP
Access Point
ARO
Annualized Rate of Occurrence
ARP
Address Resolution Protocol
AUP
Acceptable Use Policy
BCP
Business Continuity Planning
BIOS
Basic Input / Output System
BOTS
Network Robots
CA
Certificate Authority
CAC
Common Access Card
CAN
Controller Area Network
CCMP
Counter-Mode/CBC- Mac Protocol
CCTV
Closed-circuit television
CERT
Computer Emergency Response Team
CHAP
Challenge Handshake Authentication Protocol
CIRT
Computer Incident Response Team
CRC
Cyclical Redundancy Check
CRL
Certification Revocation List
DAC
Discretionary Access Control
DDOS
Distributed Denial of Service
DEP
Data Execution Prevention
DES
Digital Encryption Standard
DHCP
Dynamic Host Configuration Protocol
DLL
Dynamic Link Library
DLP
Data Loss Prevention
DMZ
Demilitarized Zone
DNS
Domain Name Service (Server)
DOS
Denial of Service
DRP
Disaster Recovery Plan
DSA
Digital Signature Algorithm
EAP
Extensible Authentication Protocol
ECC
Elliptic Curve Cryptography
EFS
Encrypted File System
EMI
Electromagnetic Interference
ESP
Encapsulated Security Payload
FTP
File Transfer Protocol
GPU
Graphic Processing Unit
GRE
Generic Routing Encapsulation
HDD
Hard Disk Drive
HIDS
Host Based Intrusion Detection System
HIPS
Host Based Intrusion Prevention System
HMAC
Hashed Message Authentication Code
HSM
Hardware Security Module
HTTP
Hypertext Transfer Protocol
HTTPS
Hypertext Transfer Protocol over SSL
HVAC
Heating, Ventilation Air Conditioning
IaaS
Infrastructure as a Service
ICMP
Internet Control Message Protocol
ID
Identification
IKE
Internet Key Exchange
IM
Instant messaging
IMAP4
Internet Message Access Protocol v4
IP
Internet Protocol
IPSEC
Internet Protocol Security
IRC
Internet Relay Chat
ISP
Internet Service Provider
IV
Initialization Vector
KDC
Key Distribution Center
L2TP
Layer 2 Tunneling Protocol
LANMAN
Local Area Network Manager
LDAP
Lightweight Directory Access Protocol
LEAP
Lightweight Extensible Authentication Protocol
MAC
Mandatory Access Control / Media Access Control / Message Authentication Code
MAN
Metropolitan Area Network
MBR
Master Boot Record
MD5
Message Digest 5
MSCHAP
Microsoft Challenge Handshake Authentication Protocol
MTU
Maximum Transmission Unit
NAC
Network Access Control
NAT
Network Address Translation
NIDS
Network Based Intrusion Detection System
NIPS
Network Based Intrusion Prevention System
NIST
National Institute of Standards & Technology
NOS
Network Operating System
NTFS
New Technology File System
NTLM
New Technology LANMAN
NTP
Network Time Protocol
OS
Operating System
OVAL
Open Vulnerability Assessment Language
PAP
Password Authentication Protocol
PAT
Port Address Translation
PBX
Private Branch Exchange
PEAP
Protected Extensible Authentication Protocol
PED
Personal Electronic Device
PGP
Pretty Good Privacy
PII
Personally Identifiable Information
PKI
Public Key Infrastructure
POTS
Plain Old Telephone Service
PPP
Point-to- point Protocol
PPTP
Point to Point Tunneling Protocol
PSK
Pre-Shared Key
PTZ
Pan-Tilt- Zoom
RA
Recovery Agent
RAD
Rapid application development
RADIUS
Remote Authentication Dial-in User Server
RAID
Redundant Array of Inexpensive Disks
RAS
Remote Access Server
RBAC
Role Based Access Control
RuBAC
Rule Based Access Control
RSA
Rivest, Shamir, & Adleman
RTO
Recovery Time Objective
RTP
Real-Time Transport Protocol
S/MIME
Secure / Multipurpose internet Mail Extensions
SaaS
Software as a Service
SCAP
Security Content Automation Protocol
SCSI
Small Computer System Interface
SDLC
Software Development Life Cycle
SDLM
Software Development Life Cycle Methodology
SHA
Secure Hashing Algorithm
SHTTP
Secure Hypertext Transfer Protocol
SIM
Subscriber Identity Module
SLA
Service Level Agreement
SLE
Single Loss Expectancy
SMS
Short Message Service
SMTP
Simple Mail Transfer Protocol
SNMP
Simple Network Management Protocol
SONET
Synchronous Optical Network Technologies
SPIM
Spam over Internet Messaging
SSH
Secure Shell
SSL
Secure Sockets Layer
SSO
Single Sign On
STP
Shielded Twisted Pair
TACACS
Terminal Access Controller Access Control System
TCP/IP
Transmission Control Protocol / Internet Protocol
TKIP
Temporal Key Integrity Protocol
TLS
Transport Layer Security
TPM
Trusted Platform Module
UAT
User Acceptance Testing
UPS
Uninterruptable Power Supply
URL
Universal Resource Locator
USB
Universal Serial Bus
UTP
Unshielded Twisted Pair
VLAN
Virtual Local Area Network
VoIP
Voice over IP
VPN
Virtual Private Network
VTC
Video Teleconferencing
WAF
Web-Application Firewall
WAP
Wireless Access Point
WEP
Wired Equivalent Privacy
WIDS
Wireless Intrusion Detection System
WIPS
Wireless Intrusion Prevention System
WPA
Wireless Protected Access
XSRF
Cross-Site Request Forgery
XSS
Cross-Site Scripting