| Acronym | Answer | % Correct |
|---|---|---|
| AI | Artificial Intelligence | 64%
|
| AP | Access Point | 57%
|
| ARP | Address Resolution Protocol | 57%
|
| AES | Advanced Encryption Standard | 57%
|
| ARO | Annualized Rate of Occurrence | 57%
|
| AV | Antivirus | 57%
|
| BIOS | Basic Input/Output System | 57%
|
| BGP | Border Gateway Protocol | 57%
|
| CA | Certificate Authority | 57%
|
| DHCP | Dynamic Host Configuration Protocol | 57%
|
| LAN | Local Area Network | 57%
|
| ACL | Access Control List | 50%
|
| API | Application Programming Interface | 50%
|
| AAA | Authentication, Authorization, and Accounting | 50%
|
| BYOD | Bring Your Own Device | 50%
|
| CCTV | Closed-circuit Television | 50%
|
| CIA | Confidentiality, Integrity, Availability | 50%
|
| DNS | Domain Name System | 50%
|
| FTP | File Transfer Protocol | 50%
|
| OS | Operating System | 50%
|
| APT | Advanced Persistent Threat | 43%
|
| ALE | Annualized Loss Expectancy | 43%
|
| AH | Authentication Header | 43%
|
| BASH | Bourne Again Shell | 43%
|
| BCP | Business Continuity Planning | 43%
|
| CIO | Chief Information Officer | 43%
|
| DoS | Denial of Service | 43%
|
| HDD | Hard Disk Drive | 43%
|
| HTTP | Hypertext Transfer Protocol | 43%
|
| HTTPS | Hypertext Transfer Protocol Secure | 43%
|
| NGFW | Next-generation Firewall | 43%
|
| NDA | Non-disclosure Agreement | 43%
|
| OSPF | Open Shortest Path First | 43%
|
| OSINT | Open-source Intelligence | 43%
|
| OTA | Over the Air | 43%
|
| P2P | Peer to Peer | 43%
|
| SaaS | Software as a Service | 43%
|
| ATT&CK | Adversarial Tactics, Techniques, and Common Knowledge | 36%
|
| BIA | Business Impact Analysis | 36%
|
| CHAP | Challenge Handshake Authentication Protocol | 36%
|
| CBC | Cipher Block Chaining | 36%
|
| CASB | Cloud Access Security Broker | 36%
|
| CERT | Computer Emergency Response Team | 36%
|
| CMS | Content Management System | 36%
|
| CAR | Corrective Action Report | 36%
|
| CSRF | XSRF | Cross-site Request Forgery | 36%
|
| XSS | Cross-site Scripting | 36%
|
| DLL | Dynamic Link Library | 36%
|
| IP | Internet Protocol | 36%
|
| OID | Object Identifier | 36%
|
| OCSP | Online Certificate Status Protocol | 36%
|
| OAuth | Open Authorization | 36%
|
| PHI | Personal Health Information | 36%
|
| PaaS | Platform as a Service | 36%
|
| PPP | Point-to-Point Protocol | 36%
|
| POP | Post Office Protocol | 36%
|
| PGP | Pretty Good Privacy | 36%
|
| SLA | Service-level Agreement | 36%
|
| ASLR | Address Space Layout Randomization | 29%
|
| BPDU | Bridge Protocol Data Unit | 29%
|
| BPA | Business Partners Agreement | 29%
|
| CRL | Certificate Revocation List | 29%
|
| CFB | Cipher Feedback | 29%
|
| CIRT | Computer Incident Response Team | 29%
|
| COOP | Continuity of Operation Planning | 29%
|
| CTM | Counter Mode | 29%
|
| CCMP | Counter Mode/CBC-MAC Protocol | 29%
|
| CRC | Cyclical Redundancy Check | 29%
|
| DLP | Data Loss Prevention | 29%
|
| DSL | Digital Subscriber Line | 29%
|
| ECB | Electronic Code Book | 29%
|
| ECC | Elliptic Curve Cryptography | 29%
|
| EAP | Extensible Authentication Protocol | 29%
|
| GCM | Galois Counter Mode | 29%
|
| HA | High Availability | 29%
|
| HTML | Hypertext Markup Language | 29%
|
| IaaS | Infrastructure as a Service | 29%
|
| IoT | Internet of Things | 29%
|
| MOA | Memorandum of Agreement | 29%
|
| MOU | Memorandum of Understanding | 29%
|
| MFA | Multifactor Authentication | 29%
|
| NTP | Network Time Protocol | 29%
|
| OT | Operational Technology | 29%
|
| PKI | Public Key Infrastructure | 29%
|
| RFID | Radio Frequency Identifier | 29%
|
| RPO | Recovery Point Objective | 29%
|
| RTO | Recovery Time Objective | 29%
|
| ROI | Return on Investment | 29%
|
| RSA | Rivest, Shamir, & Adleman | 29%
|
| RBAC | Role-based Access Control | 29%
|
| SSH | Secure Shell | 29%
|
| SAN | Storage Area Network | 29%
|
| USB | Universal Serial Bus | 29%
|
| VLAN | Virtual Local Area Network | 29%
|
| VM | Virtual Machine | 29%
|
| WAP | Wireless Access Point | 29%
|
| AIS | Automated Indicator Sharing | 21%
|
| CSR | Certificate Signing Request | 21%
|
| CSO | Chief Security Officer | 21%
|
| CYOD | Choose Your Own Device | 21%
|
| COPE | Corporate Owned, Personally Enabled | 21%
|
| DHE | Diffie-Hellman Ephemeral | 21%
|
| DES | Digital Encryption Standard | 21%
|
| DAC | Discretionary Access Control | 21%
|
| DDoS | Distributed Denial of Service | 21%
|
| ESN | Electronic Serial Number | 21%
|
| EDR | Endpoint Detection and Response | 21%
|
| ERP | Enterprise Resource Planning | 21%
|
| IPSec | Internet Protocol Security | 21%
|
| MAC | Mandatory Access Control | 21%
|
| MTTR | Mean Time to Recover | 21%
|
| MAC | Media Access Control | 21%
|
| NAC | Network Access Control | 21%
|
| NTFS | New Technology File System | 21%
|
| NTLM | New Technology LAN Manager | 21%
|
| PAP | Password Authentication Protocol | 21%
|
| PED | Personal Electronic Device | 21%
|
| PII | Personally Identifiable Information | 21%
|
| P12 | PKCS #12 | 21%
|
| PAT | Port Address Translation | 21%
|
| PUP | Potentially Unwanted Program | 21%
|
| PDU | Power Distribution Unit | 21%
|
| PAM | Privileged Access Management | 21%
|
| PAC | Proxy Auto Configuration | 21%
|
| RTOS | Real-time Operating System | 21%
|
| RDP | Remote Desktop Protocol | 21%
|
| SDN | Software-defined Networking | 21%
|
| SDK | Software Development Kit | 21%
|
| UDP | User Datagram Protocol | 21%
|
| WO | Work Order | 21%
|
| CSU | Channel Service Unit | 14%
|
| CTO | Chief Technology Officer | 14%
|
| CSP | Cloud Service Provider | 14%
|
| CVE | Common Vulnerability Enumeration | 14%
|
| CVSS | Common Vulnerability Scoring System | 14%
|
| CP | Contingency Planning | 14%
|
| DBA | Database Administrator | 14%
|
| DNAT | Destination Network Address Translation | 14%
|
| DSA | Digital Signature Algorithm | 14%
|
| DKIM | DomainKeys Identified Mail | 14%
|
| EFS | Encrypted File System | 14%
|
| XOR | Exclusive Or | 14%
|
| XML | Extensible Markup Language | 14%
|
| FACL | File System Access Control List | 14%
|
| GPU | Graphics Processing Unit | 14%
|
| GPO | Group Policy Object | 14%
|
| HVAC | Heating, ventilation, and air conditioning | 14%
|
| ISP | Internet Service Provider | 14%
|
| IDS | Intrusion Detection System | 14%
|
| IPS | Intrusion Prevention System | 14%
|
| L2TP | Layer 2 Tunneling Protocol | 14%
|
| LDAP | Lightweight Directory Access Protocol | 14%
|
| ML | Machine Learning | 14%
|
| MTBF | Mean Time Between Failures | 14%
|
| MTTF | Mean Time to Failure | 14%
|
| MD5 | Message Digest 5 | 14%
|
| MAN | Metropolitan Area Network | 14%
|
| MSCHAP | Microsoft Challenge Handshake Authentication Protocol | 14%
|
| MFD | Multifunction Device | 14%
|
| MFP | Multifunction Printer | 14%
|
| NIST | National Institute of Standards & Technology | 14%
|
| NFC | Near Field Communication | 14%
|
| OVAL | Open Vulnerability Assessment Language | 14%
|
| PFS | Perfect Forward Secrecy | 14%
|
| PIV | Personal Identity Verification | 14%
|
| POTS | Plain Old Telephone Service | 14%
|
| PPTP | Point-to-Point Tunneling Protocol | 14%
|
| PEM | Privacy Enhanced Mail | 14%
|
| PEAP | Protected Extensible Authentication Protocol | 14%
|
| RTP | Real-time Transport Protocol | 14%
|
| RAID | Redundant Array of Inexpensive Disks | 14%
|
| RA | Registration Authority | 14%
|
| RAT | Remote Access Trojan | 14%
|
| RTBH | Remotely Triggered Black Hole | 14%
|
| SASE | Secure Access Service Edge | 14%
|
| SAE | Simultaneous Authentication of Equals | 14%
|
| SLE | Single Loss Expectancy | 14%
|
| SSO | Single Sign-on | 14%
|
| SSD | Solid State Drive | 14%
|
| SQL | Structured Query Language | 14%
|
| TLS | Transport Layer Security | 14%
|
| URL | Universal Resource Locator | 14%
|
| VPN | Virtual Private Network | 14%
|
| VoIP | Voice over IP | 14%
|
| WAF | Web Application Firewall | 14%
|
| CAPTCHA | Completely Automated Public Turing Test to Tell Computers and Humans Apart | 7%
|
| DEP | Data Execution Prevention | 7%
|
| DPO | Data Privacy Officer | 7%
|
| DRP | Disaster Recovery Plan | 7%
|
| DMARC | Domain Message Authentication Reporting and Conformance | 7%
|
| ECDHE | Elliptic Curve Diffie-Hellman Ephemeral | 7%
|
| ECDSA | Elliptic Curve Digital Signature Algorithm | 7%
|
| XDR | Extended Detection and Response | 7%
|
| FRR | False Rejection Rate | 7%
|
| FPGA | Field Programmable Gate Array | 7%
|
| FDE | Full Disk Encryption | 7%
|
| GDPR | General Data Protection Regulation | 7%
|
| GPS | Global Positioning System | 7%
|
| HSM | Hardware Security Module | 7%
|
| HMAC | Hash-based Message Authentication Code | 7%
|
| HOTP | HMAC-based One-time Password | 7%
|
| HIDS | Host-based Intrusion Detection System | 7%
|
| HIPS | Host-based Intrusion Prevention System | 7%
|
| IR | Incident Response | 7%
|
| IRP | Incident Response Plan | 7%
|
| IoC | Indicators of Compromise | 7%
|
| ICS | Industrial Control Systems | 7%
|
| IM | Instant Messaging | 7%
|
| IEEE | Institute of Electrical and Electronics Engineers | 7%
|
| ISO | International Standards Organization | 7%
|
| ICMP | Internet Control Message Protocol | 7%
|
| IKE | Internet Key Exchange | 7%
|
| IMAP | Internet Message Access Protocol | 7%
|
| KDC | Key Distribution Center | 7%
|
| KEK | Key Encryption Key | 7%
|
| LEAP | Lightweight Extensible Authentication Protocol | 7%
|
| MDF | Main Distribution Frame | 7%
|
| MSSP | Managed Security Service Provider | 7%
|
| MSP | Managed Service Provider | 7%
|
| MBR | Master Boot Record | 7%
|
| MSA | Master Service Agreement | 7%
|
| MTU | Maximum Transmission Unit | 7%
|
| MAC | Message Authentication Code | 7%
|
| MDM | Mobile Device Management | 7%
|
| MMS | Multimedia Message Service | 7%
|
| NIDS | Network-based Intrusion Detection System | 7%
|
| NIPS | Network-based Intrusion Prevention System | 7%
|
| PCAP | Packet Capture | 7%
|
| PAM | Pluggable Authentication Modules | 7%
|
| PSK | Pre-shared Key | 7%
|
| PBX | Private Branch Exchange | 7%
|
| PKCS | Public Key Cryptography Standards | 7%
|
| RAD | Rapid Application Development | 7%
|
| RA | Recovery Agent | 7%
|
| RAS | Remote Access Server | 7%
|
| RC4 | Rivest Cipher version 4 | 7%
|
| RBAC | Rule-based Access Control | 7%
|
| SHA | Secure Hashing Algorithm | 7%
|
| SHTTP | Secure Hypertext Transfer Protocol | 7%
|
| S/MIME | Secure/Multipurpose Internet Mail Extensions | 7%
|
| SSL | Secure Sockets Layer | 7%
|
| SAML | Security Assertions Markup Language | 7%
|
| SCAP | Security Content Automation Protocol | 7%
|
| SED | Self-encrypting Drives | 7%
|
| SMS | Short Message Service | 7%
|
| SCEP | Simple Certificate Enrollment Protocol | 7%
|
| SMTP | Simple Mail Transfer Protocol | 7%
|
| SMTPS | Simple Mail Transfer Protocol Secure | 7%
|
| SOAP | Simple Object Access Protocol | 7%
|
| SDLC | Software Development Lifecycle | 7%
|
| SOW | Statement of Work | 7%
|
| SIM | Subscriber Identity Module | 7%
|
| SCADA | Supervisory Control and Data Acquisition | 7%
|
| TTP | Tactics, Techniques, and Procedures | 7%
|
| TKIP | Temporal Key Integrity Protocol | 7%
|
| TGT | Ticket Granting Ticket | 7%
|
| TOTP | Time-based One-time Password | 7%
|
| TOC | Time-of-check | 7%
|
| TOU | Time-of-use | 7%
|
| TSIG | Transaction Signature | 7%
|
| TCP/IP | Transmission Control Protocol/Internet Protocol | 7%
|
| TPM | Trusted Platform Module | 7%
|
| URI | Uniform Resource Identifier | 7%
|
| UAV | Unmanned Aerial Vehicle | 7%
|
| UTP | Unshielded Twisted Pair | 7%
|
| UAT | User Acceptance Testing | 7%
|
| VTC | Video Teleconferencing | 7%
|
| VPC | Virtual Private Cloud | 7%
|
| WPA | Wi-Fi Protected Access | 7%
|
| WPS | Wi-Fi Protected Setup | 7%
|
| WEP | Wired Equivalent Privacy | 7%
|
| WIDS | Wireless Intrusion Detection System | 7%
|
| WIPS | Wireless Intrusion Prevention System | 7%
|
| ESP | Encapsulated Security Payload | 0%
|
| FIM | File Integrity Management | 0%
|
| GRE | Generic Routing Encapsulation | 0%
|
| GPG | Gnu Privacy Guard | 0%
|
| IAM | Identity and Access Management | 0%
|
| IdP | Identity Provider | 0%
|
| ISSO | Information Systems Security Officer | 0%
|
| IaC | Infrastructure as Code | 0%
|
| IV | Initialization Vector | 0%
|
| IDF | Intermediate Distribution Frame | 0%
|
| IDEA | International Data Encryption Algorithm | 0%
|
| IRC | Internet Relay Chat | 0%
|
| MaaS | Monitoring as a Service | 0%
|
| MPLS | Multi-protocol Label Switching | 0%
|
| NAT | Network Address Translation | 0%
|
| PTZ | Pan-tilt-zoom | 0%
|
| PBKDF2 | Password-based Key Derivation Function 2 | 0%
|
| PCI DSS | Payment Card Industry Data Security Standard | 0%
|
| RIPEMD | RACE Integrity Primitives Evaluation Message Digest | 0%
|
| RADIUS | Remote Authentication Dial-in User Service | 0%
|
| RACE | Research and Development in Advanced Communications Technologies in Europe | 0%
|
| FTPS | SFTP | Secured File Transfer Protocol | 0%
|
| SRTP | Secure Real-Time Protocol | 0%
|
| SWG | Secure Web Gateway | 0%
|
| SELinux | Security-enhanced Linux | 0%
|
| SIEM | Security Information and Event Management | 0%
|
| SOC | Security Operations Center | 0%
|
| SOAR | Security Orchestration, Automation, Response | 0%
|
| SPF | Sender Policy Framework | 0%
|
| SNMP | Simple Network Management Protocol | 0%
|
| SD-WAN | Software-defined Wide Area Network | 0%
|
| SDLM | Software Development Lifecycle Methodology | 0%
|
| SPIM | Spam over Internet Messaging | 0%
|
| SQLi | SQL Injection | 0%
|
| SEH | Structured Exception Handler | 0%
|
| STIX | Structured Threat Information eXchange | 0%
|
| SAN | Subject Alternative Name | 0%
|
| SoC | System on Chip | 0%
|
| TACACS+ | Terminal Access Controller Access Control System | 0%
|
| TAXII | Trusted Automated eXchange of Indicator Information | 0%
|
| UEM | Unified Endpoint Management | 0%
|
| UEFI | Unified Extensible Firmware Interface | 0%
|
| UTM | Unified Threat Management | 0%
|
| UPS | Uninterruptable Power Supply | 0%
|
| USB OTG | USB On the Go | 0%
|
| VLSM | Variable Length Subnet Masking | 0%
|
| VDE | Virtual Desktop Environment | 0%
|
| VDI | Virtual Desktop Infrastructure | 0%
|
| VBA | Visual Basic | 0%
|
| WTLS | Wireless TLS | 0%
|