ACRONYM LIBRARY

CompTIA's full acronym list for SY0-701, searchable and filterable by domain.

430 ACRONYMS TOTAL
ACRONYMEXPANSIONDOM
CIAConfidentiality, Integrity, Availability1
AAAAuthentication, Authorization, Accounting1
AUPAcceptable Use Policy1
CABChange Advisory Board1
RFCRequest for Change1
CMDBConfiguration Management Database1
AESAdvanced Encryption Standard1
AES-256Advanced Encryption Standard 256-bit1
DESData Encryption Standard1
3DESTriple Data Encryption Standard1
RSARivest, Shamir, Adleman1
ECCElliptic Curve Cryptography1
DHDiffie-Hellman1
DHEDiffie-Hellman Ephemeral1
ECDHEElliptic Curve Diffie-Hellman Ephemeral1
ECDSAElliptic Curve Digital Signature Algorithm1
DSADigital Signature Algorithm1
SHASecure Hash Algorithm1
MD5Message Digest 51
HMACHash-based Message Authentication Code1
RIPEMDRACE Integrity Primitives Evaluation Message Digest1
PKIPublic Key Infrastructure1
CACertificate Authority1
RARegistration Authority1
CRLCertificate Revocation List1
OCSPOnline Certificate Status Protocol1
CSRCertificate Signing Request1
SANSubject Alternative Name1
DVDomain Validation1
OVOrganization Validation1
EVExtended Validation1
SCEPSimple Certificate Enrollment Protocol1
HSMHardware Security Module1
TPMTrusted Platform Module1
KEKKey Encryption Key1
KDCKey Distribution Center1
PFSPerfect Forward Secrecy1
PBKDF2Password-Based Key Derivation Function 21
CBCCipher Block Chaining1
GCMGalois/Counter Mode1
CTMCounter Mode1
ECBElectronic Codebook1
CFBCipher Feedback1
CCMPCounter Mode/CBC-MAC Protocol1
TKIPTemporal Key Integrity Protocol1
RC4Rivest Cipher 41
IVInitialization Vector1
XORExclusive OR1
ROT13Rotate by 13 Places1
PSKPre-Shared Key1
PKCSPublic Key Cryptography Standards1
PEMPrivacy Enhanced Mail1
DERDistinguished Encoding Rules1
PFXPersonal Information Exchange1
P12PKCS #121
P7BPKCS #71
CERCertificate File1
FDEFull Disk Encryption1
SEDSelf-Encrypting Drive1
EFSEncrypting File System1
SAESimultaneous Authentication of Equals1
APTAdvanced Persistent Threat2
IOCIndicator of Compromise2
IOAIndicator of Attack2
TTPTactics, Techniques, and Procedures2
ATT&CKAdversarial Tactics, Techniques & Common Knowledge2
CVECommon Vulnerabilities and Exposures2
CVSSCommon Vulnerability Scoring System2
CPECommon Platform Enumeration2
RATRemote Access Trojan2
PUPPotentially Unwanted Program2
C2Command and Control2
DDoSDistributed Denial of Service2
DoSDenial of Service2
MITMMan-in-the-Middle2
XSSCross-Site Scripting2
CSRFCross-Site Request Forgery2
XSRFCross-Site Request Forgery2
SQLiSQL Injection2
XXEXML External Entity2
SSRFServer-Side Request Forgery2
TOCTOUTime of Check, Time of Use2
TOCTime of Check2
TOUTime of Use2
DLLDynamic Link Library2
SEHStructured Exception Handler2
ASLRAddress Space Layout Randomization2
DEPData Execution Prevention2
NXNo Execute2
ROPReturn-Oriented Programming2
BECBusiness Email Compromise2
SPIMSpam over Instant Messaging2
OSINTOpen Source Intelligence2
VLANVirtual Local Area Network2
ACLAccess Control List2
ACEAccess Control Entry2
FACLFile System Access Control List2
OWASPOpen Web Application Security Project2
CAPTCHACompletely Automated Public Turing Test to Tell Computers and Humans Apart2
AIArtificial Intelligence2
MLMachine Learning2
IaaSInfrastructure as a Service3
PaaSPlatform as a Service3
SaaSSoftware as a Service3
XaaSAnything as a Service3
SECaaSSecurity as a Service3
DaaSDesktop as a Service3
MaaSMonitoring as a Service3
IaCInfrastructure as Code3
SDNSoftware-Defined Networking3
SDVSoftware-Defined Visibility3
SASESecure Access Service Edge3
SD-WANSoftware-Defined Wide Area Network3
VPNVirtual Private Network3
IPSecInternet Protocol Security3
IKEInternet Key Exchange3
ESPEncapsulating Security Payload3
AHAuthentication Header3
L2TPLayer 2 Tunneling Protocol3
PPTPPoint-to-Point Tunneling Protocol3
PPPPoint-to-Point Protocol3
GREGeneric Routing Encapsulation3
TLSTransport Layer Security3
SSLSecure Sockets Layer3
SHTTPSecure Hypertext Transfer Protocol3
SSHSecure Shell3
SCPSecure Copy Protocol3
SFTPSSH File Transfer Protocol3
FTPSFTP Secure3
SRTPSecure Real-Time Transport Protocol3
SMTPSSimple Mail Transfer Protocol Secure3
LDAPSLightweight Directory Access Protocol over SSL3
SNMPv3Simple Network Management Protocol version 33
DMZDemilitarized Zone3
WAFWeb Application Firewall3
NGFWNext-Generation Firewall3
UTMUnified Threat Management3
IDSIntrusion Detection System3
IPSIntrusion Prevention System3
NIDSNetwork Intrusion Detection System3
NIPSNetwork Intrusion Prevention System3
HIDSHost Intrusion Detection System3
HIPSHost Intrusion Prevention System3
DLPData Loss Prevention3
DRMDigital Rights Management3
IRMInformation Rights Management3
RAIDRedundant Array of Independent Disks3
SAN (storage)Storage Area Network3
UPSUninterruptible Power Supply3
PDUPower Distribution Unit3
HVACHeating, Ventilation, and Air Conditioning3
CCTVClosed-Circuit Television3
PTZPan-Tilt-Zoom3
RTORecovery Time Objective3
RPORecovery Point Objective3
MTBFMean Time Between Failures3
MTTFMean Time to Failure3
MTTRMean Time to Repair3
SPOFSingle Point of Failure3
HAHigh Availability3
DRaaSDisaster Recovery as a Service3
COOPContinuity of Operations Plan3
SCADASupervisory Control and Data Acquisition3
ICSIndustrial Control System3
RTOSReal-Time Operating System3
FPGAField-Programmable Gate Array3
SoCSystem on Chip3
IoTInternet of Things3
OTOperational Technology3
VDIVirtual Desktop Infrastructure3
VDEVirtual Desktop Environment3
VPCVirtual Private Cloud3
SIEMSecurity Information and Event Management4
SOARSecurity Orchestration, Automation, and Response4
EDREndpoint Detection and Response4
XDRExtended Detection and Response4
MDRManaged Detection and Response4
NACNetwork Access Control4
MDMMobile Device Management4
MAMMobile Application Management4
UEMUnified Endpoint Management4
BYODBring Your Own Device4
COPECorporate-Owned, Personally Enabled4
CYODChoose Your Own Device4
WPA3Wi-Fi Protected Access 34
WPAWi-Fi Protected Access4
WEPWired Equivalent Privacy4
WPSWi-Fi Protected Setup4
WIDSWireless Intrusion Detection System4
WIPSWireless Intrusion Prevention System4
SSIDService Set Identifier4
WAPWireless Access Point4
EAPExtensible Authentication Protocol4
EAP-TLSEAP Transport Layer Security4
EAP-TTLSEAP Tunneled Transport Layer Security4
EAP-FASTEAP Flexible Authentication via Secure Tunneling4
LEAPLightweight Extensible Authentication Protocol4
PEAPProtected Extensible Authentication Protocol4
CHAPChallenge-Handshake Authentication Protocol4
MS-CHAPMicrosoft Challenge-Handshake Authentication Protocol4
PAPPassword Authentication Protocol4
RADIUSRemote Authentication Dial-In User Service4
TACACS+Terminal Access Controller Access-Control System Plus4
LDAPLightweight Directory Access Protocol4
SSOSingle Sign-On4
SAMLSecurity Assertion Markup Language4
OAuthOpen Authorization4
OIDCOpenID Connect4
OpenIDOpen Identification4
IdPIdentity Provider4
MFAMulti-Factor Authentication4
TOTPTime-based One-Time Password4
HOTPHMAC-based One-Time Password4
FIDO2Fast Identity Online 24
PIVPersonal Identity Verification4
PAMPrivileged Access Management4
JITJust-In-Time4
JEAJust-Enough-Access4
RBACRole-Based Access Control4
ABACAttribute-Based Access Control4
MACMandatory Access Control4
DACDiscretionary Access Control4
GPOGroup Policy Object4
SPFSender Policy Framework4
DKIMDomainKeys Identified Mail4
DMARCDomain-based Message Authentication, Reporting & Conformance4
FIMFile Integrity Monitoring4
SNMPSimple Network Management Protocol4
STIXStructured Threat Information eXpression4
TAXIITrusted Automated eXchange of Indicator Information4
AISAutomated Indicator Sharing4
IRIncident Response4
IRPIncident Response Plan4
CSIRTComputer Security Incident Response Team4
CIRTComputer Incident Response Team4
CERTComputer Emergency Response Team4
SELinuxSecurity-Enhanced Linux4
DNSSECDomain Name System Security Extensions4
SASTStatic Application Security Testing4
DASTDynamic Application Security Testing4
SCASoftware Composition Analysis4
SDLCSoftware Development Life Cycle4
SDKSoftware Development Kit4
SCAPSecurity Content Automation Protocol4
XCCDFExtensible Configuration Checklist Description Format4
OVALOpen Vulnerability and Assessment Language4
ASVApproved Scanning Vendor4
PCAPPacket Capture4
FARFalse Acceptance Rate4
FRRFalse Rejection Rate4
TGTTicket-Granting Ticket4
IAMIdentity and Access Management4
GRCGovernance, Risk, and Compliance5
CISOChief Information Security Officer5
CIOChief Information Officer5
CTOChief Technology Officer5
CSOChief Security Officer5
ISSOInformation Systems Security Officer5
DPOData Protection Officer5
DBADatabase Administrator5
BIABusiness Impact Analysis5
BCPBusiness Continuity Plan5
DRPDisaster Recovery Plan5
CPContingency Planning5
ALEAnnualized Loss Expectancy5
SLESingle Loss Expectancy5
AROAnnualized Rate of Occurrence5
AV (risk)Asset Value5
EFExposure Factor5
ROIReturn on Investment5
KRIKey Risk Indicator5
RMFRisk Management Framework5
SLAService Level Agreement5
MOUMemorandum of Understanding5
MOAMemorandum of Agreement5
MSAMaster Service Agreement5
SOWStatement of Work5
NDANon-Disclosure Agreement5
DPAData Processing Agreement5
BPABusiness Partners Agreement5
ISAInterconnection Security Agreement5
MSPManaged Service Provider5
MSSPManaged Security Service Provider5
CARCorrective Action Report5
GDPRGeneral Data Protection Regulation5
HIPAAHealth Insurance Portability and Accountability Act5
PCI-DSSPayment Card Industry Data Security Standard5
SOXSarbanes-Oxley Act5
GLBAGramm-Leach-Bliley Act5
FERPAFamily Educational Rights and Privacy Act5
CCPACalifornia Consumer Privacy Act5
NISTNational Institute of Standards and Technology5
CSFCybersecurity Framework5
ISOInternational Organization for Standardization5
CISCenter for Internet Security5
COBITControl Objectives for Information and Related Technologies5
SOC (audit)System and Organization Controls5
SOC (ops)Security Operations Center5
PIIPersonally Identifiable Information5
PHIProtected Health Information5
PIAPrivacy Impact Assessment5
UATUser Acceptance Testing5
CBTComputer-Based Training5
OPSECOperational Security5
DNSDomain Name System--
TSIGTransaction Signature--
DHCPDynamic Host Configuration Protocol--
HTTPHypertext Transfer Protocol--
HTTPSHypertext Transfer Protocol Secure--
HTMLHypertext Markup Language--
XMLExtensible Markup Language--
SQLStructured Query Language--
SOAPSimple Object Access Protocol--
FTPFile Transfer Protocol--
SMTPSimple Mail Transfer Protocol--
IMAPInternet Message Access Protocol--
POP3Post Office Protocol 3--
RDPRemote Desktop Protocol--
SMBServer Message Block--
NTPNetwork Time Protocol--
ARPAddress Resolution Protocol--
TCPTransmission Control Protocol--
UDPUser Datagram Protocol--
ICMPInternet Control Message Protocol--
IGMPInternet Group Management Protocol--
IPInternet Protocol--
IPv4Internet Protocol version 4--
IPv6Internet Protocol version 6--
NATNetwork Address Translation--
DNATDestination Network Address Translation--
PATPort Address Translation--
BGPBorder Gateway Protocol--
OSPFOpen Shortest Path First--
MPLSMultiprotocol Label Switching--
BPDUBridge Protocol Data Unit--
RSTPRapid Spanning Tree Protocol--
RTBHRemotely Triggered Black Hole--
MAC (addr)Media Access Control Address--
APIApplication Programming Interface--
RESTRepresentational State Transfer--
RTPReal-Time Transport Protocol--
VoIPVoice over IP--
PBXPrivate Branch Exchange--
POTSPlain Old Telephone Service--
SIMSubscriber Identity Module--
SMSShort Message Service--
MMSMultimedia Messaging Service--
NFCNear Field Communication--
RFIDRadio Frequency Identification--
GPSGlobal Positioning System--
IR (port)Infrared--
USBUniversal Serial Bus--
USB OTGUSB On-The-Go--
VMVirtual Machine--
OSOperating System--
CPUCentral Processing Unit--
GPUGraphics Processing Unit--
RAMRandom Access Memory--
SSDSolid State Drive--
HDDHard Disk Drive--
MBRMaster Boot Record--
NICNetwork Interface Card--
BIOSBasic Input/Output System--
UEFIUnified Extensible Firmware Interface--
ADActive Directory--
OUOrganizational Unit--
LANLocal Area Network--
MANMetropolitan Area Network--
DSLDigital Subscriber Line--
ISPInternet Service Provider--
MTUMaximum Transmission Unit--
UTPUnshielded Twisted Pair--
EMIElectromagnetic Interference--
RFIRadio Frequency Interference--
IDFIntermediate Distribution Frame--
MDFMain Distribution Frame--
CSPCloud Service Provider--
CASBCloud Access Security Broker--
CSPMCloud Security Posture Management--
CNAPPCloud-Native Application Protection Platform--
CWPPCloud Workload Protection Platform--
ZTNAZero Trust Network Access--
IAPIdentity-Aware Proxy--
SWGSecure Web Gateway--
FWaaSFirewall as a Service--
mTLSMutual TLS--
JWTJSON Web Token--
STIGSecurity Technical Implementation Guide--
GPGGNU Privacy Guard--
PGPPretty Good Privacy--
S/MIMESecure/Multipurpose Internet Mail Extensions--
NTLMNT LAN Manager--
NTFSNew Technology File System--
MABMAC Authentication Bypass--
PMFProtected Management Frames--
IEEEInstitute of Electrical and Electronics Engineers--
OSIOpen Systems Interconnection--
ASCIIAmerican Standard Code for Information Interchange--
CRCCyclic Redundancy Check--
ITInformation Technology--
OIDObject Identifier--
PINPersonal Identification Number--
URIUniform Resource Identifier--
URLUniform Resource Locator--
APAccess Point--
ESNElectronic Serial Number--
PEDPersonal Electronic Device--
MFDMulti-Function Device--
IoCIndicator of Compromise--
IMInstant Messaging--
IRCInternet Relay Chat--
VTCVideo Teleconference--
P2PPeer-to-Peer--
OTAOver-the-Air--
UAVUnmanned Aerial Vehicle--
ERPEnterprise Resource Planning--
CMSContent Management System--
RASRemote Access Server--
PACProxy Auto-Configuration--
BASHBourne Again Shell--
WBCWhite-Box Cryptography--
eBPFExtended Berkeley Packet Filter--
JA3JA3 TLS Fingerprint--
AV (software)Antivirus--
CSUChannel Service Unit--
WTLSWireless Transport Layer Security--
VBAVisual Basic for Applications--
VLSMVariable Length Subnet Masking--
WOWork Order--
IDEAInternational Data Encryption Algorithm--