Some Acronyms
ACCom Called
Say What?
Are you Sure?
Please Stop
100

VLAN

What is a method of segmenting a network at the Data Link Layer (2) of the OSI model, typically on a switch.

100

WPA2 - Enterprise

What is a type of wireless network encryption that uses a RADIUS server to authenticate a user with a directory service such as AD after the device authenticates with the wifi access point. 

100

WIPS

What is Wireless Intrusion Prevention System, an inline wireless network security device that monitors suspicious wifi traffic and reacts in real time to block suspicious traffic.

100

3389

What port does Remote Desktop Protocol use to connect remote computing sessions? 

100

ACL

What is an Access Control List? 

Implemented on a router to filter network traffic based on a set of rules. 

In DAC, it is the access permissions assigned to a resource by the owner. 

200

VDE

What is a Virtual Desktop Environment, a virtual machine that runs a desktop operating system such as Windows 10.

200

25

What is the port used by email servers to transfer messages, Simple Mail Transfer Protocol is the associated protocol.

200

EMI

What is Electromagnetic Interference? A byproduct of  electrical systems that causes interference with other nearby systems. Can cause unexpected wifi network problems. 

200

802.11ac

What is the Wi-Fi protocol that only works in the 5Ghz frequency range and can combine channels to increase throughput. Supports speeds up to 1300 Mbps. 

200

APT

What is Advanced Persistent Threat? An attack method that maintains access to a compromised resource for a long period of time. Bot is a good example. 

300

XSS

What is Cross Site Scripting, a web application attack that takes advantage of scripting and input validation vulnerabilities in a web site. 

300

53

What is the port used by DNS?

300

BCP

What is a Business Continuity Plan? The plan a business has to maintain business operations after an incident. 

300

POP/S

What is Post Office Protocol, an email protocol used to deliver email to users. Uses port 110 for unsecured and 995 for secure POP. 

300

COPE

What is Corporate Owned, Personally Enabled? A mobile device management model where the organization issues a corporate device to an employee and allows the employee some freedom of configuration on the device while maintaining device supervision and management. 

400
S/MIME

What is Secure/Multipurpose Mail Extensions, an email encryption standard that adds digital certificates and PKI to traditional email communications. 

400

AUP

What is an Acceptable Use Policy? A policy used by an organization to define the rules of user behavior while using organizational computing resources.  Normally signed by the user before they can access organizational computing systems. 

400

CIA (triad, not cooking school)

What is Confidentiality, Integrity, and Availability? Basic principles of security control for access, change or integrity of data, and whether data is available for use. 

400

EAP

What is Extensible Authentication Protocol? A wireless authentication protocol that enables systems to use hardware based identifiers such as fingerprint scanners for authentication. 
400

20/21

What ports does File Transfer Protocol use? 

500

HTTPS

What is Hyper-Text Transfer Protocol Secure? Uses port 443 to secure a connection between a web browser and the web server. 

500

AH

What is Authentication Header? An IPSec protocol that authenticates the origin of transmitted data and protects against replay attacks. 

500

ABAC

What is Attribute Based Access Control? An access control technique that evaluates attributes a subject has to determine if access can be granted. 
500

BIA

What is Business Impact Analysis? A process that identifies risks to an organization and determines the possible effects of those risks on business processes. 

500

AES

What is Advanced Encryption Standard? A symmetric block cypher algorithm. 

M
e
n
u