| AAA |
Authentication, Authorization, and |
| ACL |
Access Control List |
| AES |
Advanced Encryption Standard |
| AES-256 |
Advanced Encryption Standards 256-bit |
| AH |
Authentication Header |
| AI |
Artificial Intelligence |
| AIS |
Automated Indicator Sharing |
| ALE |
Annualized Loss Expectancy |
| AP |
Access Point |
| API |
Application Programming Interface |
| APT |
Advanced Persistent Threat |
| ARO |
Annualized Rate of Occurrence |
| ARP |
Address Resolution Protocol |
| ASLR |
Address Space Layout Randomization |
| AUP |
Acceptable Use Policy |
| AV |
Antivirus |
| BASH |
Bourne Again Shell |
| BCP |
Business Continuity Planning |
| BGP |
Border Gateway Protocol |
| BIA |
Business Impact Analysis |
| BIOS |
Basic Input/Output System |
| BPA |
Business Partners Agreement |
| BPDU |
Bridge Protocol Data Unit |
| BYOD |
Bring Your Own Device |
| CA |
Certi˜cate Authority |
| CAPTCHA |
Completely Automated Public Turing Test to |
| CAR |
Corrective Action Report |
| CASB |
Cloud Access Security Broker |
| CBC |
Cipher Block Chaining |
| CCMP |
Counter Mode/CBC-MAC Protocol |
| CCTV |
Closed-circuit Television |
| CERT |
Computer Emergency Response Team |
| CFB |
Cipher Feedback |
| CHAP |
Challenge Handshake Authentication |
| CIA |
Con˜dentiality, Integrity, Availability |
| CIO |
Chief Information O˚cer |
| CIRT |
Computer Incident Response Team |
| CMS |
Content Management System |
| COOP |
Continuity of Operation Planning |
| COPE |
Corporate Owned, Personally Enabled |
| CP |
Contingency Planning |
| CRC |
Cyclical Redundancy Check |
| CRL |
Certi˜cate Revocation List |
| CSO |
Chief Security O˚cer |
| CSP |
Cloud Service Provider |
| CSR |
Certi˜cate Signing Request |
| CSRF |
Cross-site Request Forgery |
| CSU |
Channel Service Unit |
| CTM |
Counter Mode |
| CTO |
Chief Technology O˚cer |
| CVE |
Common Vulnerability Enumeration |
| CVSS |
Common Vulnerability Scoring System |
| CYOD |
Choose Your Own Device |
| DAC |
Discretionary Access Control |
| DBA |
Database Administrator |
| DEP |
Data Execution Prevention |
| DES |
Digital Encryption Standard |
| DHCP |
Dynamic Host Con˜guration Protocol |
| DHE |
Di˚e-Hellman Ephemeral |
| DKIM |
DomainKeys Identi˜ed Mail |
| DLL |
Dynamic Link Library |
| DLP |
Data Loss Prevention |
| DMARC |
Domain Message Authentication Reporting |
| DNAT |
Destination Network Address Translation |
| DNS |
Domain Name System |
| DOMAIN |
PERCENTAGE OF EXAMINATION |
| DPO |
Data Privacy O˚cer |
| DRP |
Disaster Recovery Plan |
| DSA |
Digital Signature Algorithm |
| DSL |
Digital Subscriber Line |
| EAP |
Extensible Authentication Protocol |
| ECB |
Electronic Code Book |
| ECC |
Elliptic Curve Cryptography |
| ECDHE |
Elliptic Curve Di˚e-Hellman Ephemeral |
| ECDSA |
Elliptic Curve Digital Signature Algorithm |
| EDR |
Endpoint Detection and Response |
| EFS |
Encrypted File System |
| ERP |
Enterprise Resource Planning |
| ESN |
Electronic Serial Number |
| ESP |
Encapsulated Security Payload |
| EXAM |
NUMBER: SY0-701 |
| FACL |
File System Access Control List |
| FDE |
Full Disk Encryption |
| FIM |
File Integrity Management |
| FPGA |
Field Programmable G ate Array |
| FRR |
False Rejection Rate |
| FTP |
File Transfer Protocol |
| FTPS |
Secured File Transfer Protocol |
| GCM |
G alois Counter Mode |
| GDPR |
General Data Protection Regulation |
| GPG |
Gnu Privacy Guard |
| GPO |
Group Policy Object |
| GPS |
Global Positioning System |
| GPU |
Graphics Processing Unit |
| GRE |
Generic Routing Encapsulation |
| HA |
High Availability |
| HDD |
Hard Disk Drive |
| HIDS |
Host-based Intrusion Detection System |
| HIPS |
Host-based Intrusion Prevention System |
| HMAC |
Hashed Message Authentication Code |
| HOTP |
HMAC-based One-time Password |
| HSM |
Hardware Security Module |
| HTML |
Hypertext Markup Language |
| HTTP |
Hypertext Transfer Protocol |
| HTTPS |
Hypertext Transfer Protocol Secure |
| HVAC |
Heating, Ventilation Air Conditioning |
| IAM |
Identity and Access Management |
| ICMP |
Internet Control Message Protocol |
| ICS |
Industrial Control Systems |
| IDEA |
International Data Encryption Algorithm |
| IDF |
Intermediate Distribution Frame |
| IDS |
Intrusion Detection System |
| IEEE |
Institute of Electrical and Electronics |
| IKE |
Internet Key Exchange |
| IM |
Instant Messaging |
| IMAP |
Internet Message Access Protocol |
| IP |
Internet Protocol |
| IPS |
Intrusion Prevention System |
| IR |
Incident Response |
| IRC |
Internet Relay Chat |
| IRP |
Incident Response Plan |
| ISO |
International Standards Organization |
| ISP |
Internet Service Provider |
| ISSO |
Information Systems Security O˚cer |
| IV |
Initialization Vector |
| KDC |
Key Distribution Center |
| KEK |
Key Encryption Key |
| L2TP |
Layer 2 Tunneling Protocol |
| LAN |
Local Area Network |
| LDAP |
Lightweight Directory Access Protocol |
| LEAP |
Lightweight Extensible Authentication |
| MAC |
Mandatory Access Control |
| MAN |
Metropolitan Area Network |
| MBR |
Master Boot Record |
| MD5 |
Message Digest 5 |
| MDF |
Main Distribution Frame |
| MDM |
Mobile Device Management |
| MFA |
Multifactor Authentication |
| MFD |
Multifunction Device |
| MFP |
Multifunction Printer |
| ML |
Machine Learning |
| MMS |
Multimedia Message Service |
| MOA |
Memorandum of Agreement |
| MOU |
Memorandum of Understanding |
| MPLS |
Multi-protocol Label Switching |
| MSA |
Master Service Agreement |
| MSCHAP |
Microsoft Challenge Handshake |
| MSP |
Managed Service Provider |
| MSSP |
Managed Security Service Provider |
| MTBF |
Mean Time Between Failures |
| MTTF |
Mean Time to Failure |
| MTTR |
Mean Time to Recover |
| MTU |
Maximum Transmission Unit |
| NAC |
Network Access Control |
| NAT |
Network Address Translation |
| NDA |
Non-disclosure Agreement |
| NFC |
Near Field Communication |
| NGFW |
Next-generation Firewall |
| NIDS |
Network-based Intrusion Detection System |
| NIPS |
Network-based Intrusion Prevention System |
| NIST |
National Institute of Standards & Technology |
| NTFS |
New Technology File System |
| NTLM |
New Technology LAN Manager |
| NTP |
Network Time Protocol |
| OAUTH |
Open Authorization |
| OCSP |
Online Certi˜cate Status Protocol |
| OID |
Object Identi˜er |
| OS |
Operating System |
| OSINT |
Open-source Intelligence |
| OSPF |
Open Shortest Path First |
| OT |
Operational Technology |
| OTA |
Over the Air |
| OVAL |
Open Vulnerability Assessment Language |
| P12 |
PKCS #12 |
| P2P |
Peer to Peer |
| PAC |
Proxy Auto Con˜guration |
| PAM |
Privileged Access Management |
| PAP |
Password Authentication Protocol |
| PAT |
Port Address Translation |
| PBKDF2 |
Password-based Key Derivation Function 2 |
| PBX |
Private Branch Exchange |
| PCAP |
Packet Capture |
| PCI |
DSS |
| PDU |
Power Distribution Unit |
| PEAP |
Protected Extensible Authentication |
| PED |
Personal Electronic Device |
| PEM |
Privacy Enhanced Mail |
| PFS |
Perfect Forward Secrecy |
| PGP |
Pretty Good Privacy |
| PHI |
Personal Health Information |
| PII |
Personally Identi˜able Information |
| PIV |
Personal Identity Veri˜cation |
| PKCS |
P ublic Key Cryptography Standards |
| PKI |
P ublic Key Infrastructure |
| PLEASE |
NOTE |
| POP |
Post O˚ce Protocol |
| POTS |
Plain Old Telephone Service |
| PPP |
Point-to-Point Protocol |
| PPTP |
Point-to-Point Tunneling Protocol |
| PSK |
Pre-shared Key |
| PTZ |
Pan-tilt-zoom |
| PUP |
Potentially Unwanted Program |
| RA |
Recovery Agent |
| RACE |
Research and Development in Advanced |
| RAD |
Rapid Application Development |
| RADIUS |
Remote Authentication Dial-in User Service |
| RAID |
Redundant Array of Inexpensive Disks |
| RAS |
Remote Access Server |
| RAT |
Remote Access Trojan |
| RBAC |
Role-based Access Control |
| RC4 |
Rivest Cipher version 4 |
| RDP |
Remote Desktop Protocol |
| RFID |
Radio Frequency Identi˜er |
| RIPEMD |
RACE Integrity Primitives Evaluation |
| ROI |
Return on Investment |
| RPO |
Recovery Point Objective |
| RSA |
Rivest, Shamir, & Adleman |
| RTBH |
Remotely Triggered Black Hole |
| RTO |
Recovery Time Objective |
| RTOS |
Real-time Operating System |
| RTP |
Real-time Transport Protocol |
| S/MIME |
Secure/Multipurpose Internet Mail |
| SAE |
Simultaneous Authentication of Equals |
| SAML |
Security Assertions Markup Language |
| SAN |
Storage Area Network |
| SASE |
Secure Access Service Edge |
| SCADA |
Supervisory Control and Data Acquisition |
| SCAP |
Security Content Automation Protocol |
| SCEP |
Simple Certi˜cate Enrollment Protocol |
| SD-WAN |
Software-de˜ned Wide Area Network |
| SDK |
Software Development Kit |
| SDLC |
Software Development Lifecycle |
| SDLM |
Software Development Lifecycle |
| SDN |
Software-de˜ned Networking |
| SE |
Linux |
| SED |
Self-encrypting Drives |
| SEH |
Structured Exception Handler |
| SFTP |
Secured File Transfer Protocol |
| SHA |
Secure Hashing Algorithm |
| SHTTP |
Secure Hypertext Transfer Protocol |
| SIEM |
Security Information and Event Management |
| SIM |
Subscriber Identity Module |
| SLA |
Service-level Agreement |
| SLE |
Single Loss Expectancy |
| SMS |
Short Message Service |
| SMTP |
Simple Mail Transfer Protocol |
| SMTPS |
Simple Mail Transfer Protocol Secure |
| SNMP |
Simple Network Management Protocol |
| SOAP |
Simple Object Access Protocol |
| SOAR |
Security Orchestration, Automation, |
| SOC |
Security Operations Center |
| SOW |
Statement of Work |
| SPF |
Sender Policy Framework |
| SPIM |
Spam over Internet Messaging |
| SQL |
Structured Query Language |
| SRTP |
Secure Real-Time Protocol |
| SSD |
Solid State Drive |
| SSH |
Secure Shell |
| SSL |
Secure Sockets Layer |
| SSO |
Single Sign-on |
| STIX |
Structured Threat Information eXchange |
| SWG |
Secure Web G ateway |
| SY0-701 |
Number of questions |
| TACACS+ |
Terminal Access Controller Access Control |
| TAXII |
Trusted Automated eXchange of Indicator |
| TCP/IP |
Transmission Control Protocol/Internet |
| TEST |
DETAILS |
| TGT |
Ticket Granting Ticket |
| TI |
A S ecurity+ certi˜cati o n exam w ill certi fy the succe s s f ul
candidate has the |
| TIA |
Security+ |
| TKIP |
Temporal Key Integrity Protocol |
| TLS |
Transport Layer Security |
| TOC |
Time-of-check |
| TOTP |
Time-based One-time Password |
| TOU |
Time-of-use |
| TPM |
Trusted Platform Module |
| TSIG |
Transaction Signature |
| TTP |
Tactics, Techniques, and Procedures |
| UAT |
User Acceptance Testing |
| UAV |
Unmanned Aerial Vehicle |
| UDP |
User Datagram Protocol |
| UEFI |
Uni˜ed Extensible Firmware Interface |
| UEM |
Uni˜ed Endpoint Management |
| UPS |
Uninterruptable Power Supply |
| URI |
Uniform Resource Identi˜er |
| URL |
Universal Resource Locator |
| USB |
Universal Serial Bus |
| UTM |
Uni˜ed Threat Management |
| UTP |
Unshielded Twisted Pair |
| VBA |
Visual Basic |
| VDE |
Virtual Desktop Environment |
| VDI |
Virtual Desktop Infrastructure |
| VLAN |
Virtual Local Area Network |
| VLSM |
Variable Length Subnet Masking |
| VM |
Virtual Machine |
| VPC |
Virtual Private Cloud |
| VPN |
Virtual Private Network |
| VTC |
Video Teleconferencing |
| WAF |
Web Application Firewall |
| WAP |
Wireless Access Point |
| WEP |
Wired Equivalent Privacy |
| WIDS |
Wireless Intrusion Detection System |
| WIPS |
Wireless Intrusion Prevention System |
| WO |
Work Order |
| WPA |
Wi-Fi Protected Access |
| WPS |
Wi-Fi Protected Setup |
| WTLS |
Wireless TLS |
| XDR |
Extended Detection and Response |
| XML |
Extensible Markup Language |
| XOR |
Exclusive Or |
| XSRF |
Cross-site Request Forgery |
| XSS |
Cross-site Scripting |