Look up 350+ acronyms from CompTIA Security+ (SY0-701), Network+ (N10-009), and A+ (220-1101/1102) exam objectives. Search by acronym, full name, or definition.
361 results
| Acronym | Full Name | Definition | Exam | Objective |
|---|---|---|---|---|
| AAA | Authentication, Authorization, and Accounting | Security framework that controls who can access resources, what they can do, and tracks their activity. | Security+Network+ | 4.6 |
| ACL | Access Control List | A set of rules that filters network traffic or defines permissions for accessing system resources. | Security+Network+ | 4.5 |
| AD | Active Directory | Microsoft directory service for managing users, computers, and resources in a Windows domain environment. | Security+A+ | 4.6 |
| AES | Advanced Encryption Standard | Symmetric block cipher using 128, 192, or 256-bit keys; the current standard for encrypting data at rest and in transit. | Security+Network+ | 1.4 |
| AH | Authentication Header | IPSec protocol providing data integrity and origin authentication but not encryption. | Security+Network+ | 1.4 |
| AIS | Automated Indicator Sharing | DHS service enabling real-time exchange of machine-readable cyber threat indicators between organizations. | Security+ | 2.3 |
| ALE | Annualized Loss Expectancy | Expected monetary loss from a risk per year, calculated as SLE multiplied by ARO. | Security+ | 5.4 |
| AP | Access Point | Network device that allows wireless clients to connect to a wired network. | Network+A+ | |
| APIPA | Automatic Private IP Addressing | Self-assigned IP address in the 169.254.x.x range when a DHCP server is unavailable. | Network+A+ | 1.4 |
| APT | Advanced Persistent Threat | Sophisticated, long-term cyberattack where an intruder gains and maintains unauthorized access, typically state-sponsored. | Security+ | 2.1 |
| ARO | Annualized Rate of Occurrence | Estimated frequency of a threat occurring within a single year, used in quantitative risk analysis. | Security+ | 5.4 |
| ARP | Address Resolution Protocol | Layer 2 protocol that maps an IP address to a MAC address on a local network segment. | Security+Network+A+ | 1.1 |
| ASLR | Address Space Layout Randomization | OS security technique that randomizes memory addresses used by processes to prevent buffer overflow exploits. | Security+ | 2.4 |
| ATT&CK | Adversarial Tactics, Techniques, and Common Knowledge | MITRE framework cataloging known adversary behaviors and tactics used in cyber intrusions. | Security+ | 2.3 |
| AUP | Acceptable Use Policy | Organizational policy defining permitted and prohibited uses of IT systems and data. | Security+ | 5.1 |
| BCP | Business Continuity Planning | Process of creating plans to ensure critical business functions continue during and after a disaster. | Security+ | 5.4 |
| BGP | Border Gateway Protocol | Path-vector exterior gateway protocol used to exchange routing information between autonomous systems on the internet. | Security+Network+ | 1.1 |
| BIOS | Basic Input/Output System | Legacy firmware interface that initializes hardware during boot and provides runtime services for the OS. | A+ | 1.1 |
| BPA | Business Partnership Agreement | Legal document defining terms, responsibilities, and expectations between business partners. | Security+ | 5.1 |
| BPDU | Bridge Protocol Data Unit | STP frame exchanged between switches to detect and prevent loops in bridged networks. | Network+ | 2.1 |
| BYOD | Bring Your Own Device | Policy allowing employees to use personal devices to access organizational resources and data. | Security+ | 3.3 |
| CA | Certificate Authority | Trusted entity that issues, manages, and revokes digital certificates within a PKI hierarchy. | Security+ | 1.4 |
| CAPTCHA | Completely Automated Public Turing test to tell Computers and Humans Apart | Challenge-response test used to determine whether a user is human, preventing automated bot abuse. | Security+ | 2.4 |
| CASB | Cloud Access Security Broker | Security policy enforcement point between cloud consumers and providers, enforcing enterprise security policies. | Security+ | 3.3 |
| CCMP | Counter Mode with Cipher Block Chaining Message Authentication Code Protocol | AES-based encryption protocol used in WPA2 to provide confidentiality, integrity, and authentication for wireless frames. | Security+Network+ | 1.4 |
Practice with 1,500+ human-written questions, AI explanations, and RPG-style gamification. Free to start.