Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
48 Cards in this Set
- Front
- Back
- 3rd side (hint)
3DES |
Triple Data Encryption Standard |
|
|
AAA |
Authentication, Authorization, Accounting |
|
|
ACE |
Access Control Entry |
|
|
ACL |
Access Control List |
|
|
AES |
Advanced Encryption Standard |
|
|
AH |
Authentication Header |
|
|
ALE |
Annual Loss Expectancy |
|
|
AP |
Access Point |
|
|
API |
Application Programming Interface |
|
|
APT |
Advanced Persistent Threat |
|
|
ARO |
Annual Rate of Occurrence |
|
|
ARP |
Address Resolution Protocol |
|
|
ASCII |
American Standard Code for Information Interchange |
Code used to display characters |
|
ASP |
Application Service Provider |
Provides an application as a service over a network. |
|
AUP |
Acceptable Use Policy |
|
|
BAC |
Business Availability Center |
An application that shows availability and performance of applications used or provided by a business. |
|
BCP |
Business Continuity Plan |
|
|
BIA |
Business Impact Analysis |
|
|
BIND |
Berkeley Internet Name Domain |
DNS software that runs on Linux and Unix servers. |
|
BIOS |
Basic Input/Output System |
|
|
BPA |
Business Partners Agreement |
|
|
BYOD |
Bring Your Own Device |
|
|
CA |
Certificate Authority |
|
|
CAC |
Common Access Card |
|
|
CAN |
Controller Area Network |
|
|
CAR |
Corrective Action Report |
|
|
CCMP |
Counter mode with Cipher block chaining Message authentication code Protocol |
|
|
CERT |
Computer Emergency Response Team |
|
|
CHAP |
Challenge Handshake Authentication Protocol |
|
|
CIA |
Confidentiality, Integrity, and Availability |
|
|
CIRT |
Computer Incident Response Team |
|
|
CVE |
Common Vulnerabilities and Exposures |
|
|
DAC |
Discretionary Access Control |
|
|
DACL |
Discretionary Access Control List |
|
|
DEP |
Data Execution Prevention |
|
|
DES |
Data Encryption Standard |
|
|
DHCP |
Dynamic Host Configuration Protocol |
|
|
DLL |
Dynamic Link Library |
|
|
DLP |
Data Loss Prevention |
|
|
DRP |
Disaster Recovery Plan |
|
|
EAP |
Extensible Authentication Protocol |
|
|
EFS |
Encrypting File System |
|
|
ESP |
Encapsulating Security Protocol |
|
|
GPG |
GNU Privacy Guard |
|
|
HMAC |
Hash-based Message Authentication Code |
|
|
HOTP |
HMAC-based One-Time Password |
|
|
IaaS |
Infrastructure as a Service |
|
|
ICMP |
Internet Control Message Protocol |
|