Skip to content
Quickbytes Education
  • Home
  • About
  • Discover & Learn
    • Articles
    • Glossary
  • Login

Home » Glossary » CompTIA Security+

CompTIA Security+

0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

0-9

3-Leg Perimeter

802.1X

A

Acceptable Use Policy (AUP)

Access Control List (ACL)

Accounting

Address Resolution Protocol (ARP)

Advanced Encryption Standard (AES)

Advanced Persistent Threat (APT)

Adware

Antivirus

AP Isolation

Application Blacklisting

Asymmetric Key Algorithm

Attack Vector

Authentication

Authorization

B

Border Gateway Protocol (BGP)

Botnet

Bourne Again Shell (Bash)

Bring Your Own Device (BYOD)

Business Continuity Planning (BCP)

Business Impact Analysis (BIA)

C

CAPTCHA

Center for Internet Security (CIS)

Certificate Authority (CA)

Certificate Revocation List (CRL)

Certificate Signing Request (CSR)

Challenge-Handshake Authentication Protocol (CHAP)

Chief Information Officer (CIO)

Common Vulnerabilities and Exposures (CVE)

Corrective Action Report (CAR)

Cross-Site Request Forgery (CSRF)

D

Data Encryption Standard (DES)

Data Loss Prevention (DLP)

Demilitarized Zone (DMZ)

Discretionary Access Control (DAC)

Distributed Denial-of-Service (DDoS)

Domain Keys Identified Mail (DKIM)

H

Hash

Hoax

M

Malware

Multifactor Authentication (MFA)

P

Pharming

Phishing

R

Rootkit

S

Shoulder Surfing

Spam

Spyware

T

Tailgating

Time Bomb

Triple Data Encryption Standard (3DES)

V

Vishing

Vulnerability

W

Whaling

© 2026  Quickbytes Education Privacy PolicyTerms of Use