• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/48

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

48 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)

3DES

Triple Data Encryption Standard

AAA

Authentication, Authorization, Accounting

ACE

Access Control Entry

ACL

Access Control List

AES

Advanced Encryption Standard

AH

Authentication Header

ALE

Annual Loss Expectancy

AP

Access Point

API

Application Programming Interface

APT

Advanced Persistent Threat

ARO

Annual Rate of Occurrence

ARP

Address Resolution Protocol

ASCII

American Standard Code for Information Interchange

Code used to display characters

ASP

Application Service Provider

Provides an application as a service over a network.

AUP

Acceptable Use Policy

BAC

Business Availability Center

An application that shows availability and performance of applications used or provided by a business.

BCP

Business Continuity Plan

BIA

Business Impact Analysis

BIND

Berkeley Internet Name Domain

DNS software that runs on Linux and Unix servers.

BIOS

Basic Input/Output System

BPA

Business Partners Agreement

BYOD

Bring Your Own Device

CA

Certificate Authority

CAC

Common Access Card

CAN

Controller Area Network

CAR

Corrective Action Report

CCMP

Counter mode with Cipher block chaining Message authentication code Protocol

CERT

Computer Emergency Response Team

CHAP

Challenge Handshake Authentication Protocol

CIA

Confidentiality, Integrity, and Availability

CIRT

Computer Incident Response Team

CVE

Common Vulnerabilities and Exposures

DAC

Discretionary Access Control

DACL

Discretionary Access Control List

DEP

Data Execution Prevention

DES

Data Encryption Standard

DHCP

Dynamic Host Configuration Protocol

DLL

Dynamic Link Library

DLP

Data Loss Prevention

DRP

Disaster Recovery Plan

EAP

Extensible Authentication Protocol

EFS

Encrypting File System

ESP

Encapsulating Security Protocol

GPG

GNU Privacy Guard

HMAC

Hash-based Message Authentication Code

HOTP

HMAC-based One-Time Password

IaaS

Infrastructure as a Service

ICMP

Internet Control Message Protocol