IT Acronyms
A-Z glossary of acronyms commonly seen on CompTIA and other IT certification exams.
Showing 88 of 88 acronyms
| Acronym | Full Name |
|---|---|
| AAA | Authentication, Authorization, and Accounting |
| ACL | Access Control List |
| AES | Advanced Encryption Standard |
| AP | Access Point |
| API | Application Programming Interface |
| ARP | Address Resolution Protocol |
| BGP | Border Gateway Protocol |
| BIOS | Basic Input/Output System |
| CA | Certificate Authority |
| CIDR | Classless Inter-Domain Routing |
| CIA | Confidentiality, Integrity, Availability |
| CLI | Command-Line Interface |
| CPU | Central Processing Unit |
| CRL | Certificate Revocation List |
| DDoS | Distributed Denial of Service |
| DHCP | Dynamic Host Configuration Protocol |
| DLP | Data Loss Prevention |
| DMZ | Demilitarized Zone |
| DNS | Domain Name System |
| DoS | Denial of Service |
| EAP | Extensible Authentication Protocol |
| FTP | File Transfer Protocol |
| GPO | Group Policy Object |
| GUI | Graphical User Interface |
| HIDS | Host-based Intrusion Detection System |
| HTTP | Hypertext Transfer Protocol |
| HTTPS | Hypertext Transfer Protocol Secure |
| IaaS | Infrastructure as a Service |
| ICMP | Internet Control Message Protocol |
| IDS | Intrusion Detection System |
| IMAP | Internet Message Access Protocol |
| IoT | Internet of Things |
| IP | Internet Protocol |
| IPS | Intrusion Prevention System |
| IPSec | Internet Protocol Security |
| KDC | Key Distribution Center |
| LDAP | Lightweight Directory Access Protocol |
| MAC | Media Access Control |
| MFA | Multi-Factor Authentication |
| MITM | Man-in-the-Middle |
| MTU | Maximum Transmission Unit |
| NAC | Network Access Control |
| NAT | Network Address Translation |
| NDA | Non-Disclosure Agreement |
| NIDS | Network-based Intrusion Detection System |
| NTP | Network Time Protocol |
| OCSP | Online Certificate Status Protocol |
| OSI | Open Systems Interconnection |
| OSPF | Open Shortest Path First |
| OU | Organizational Unit |
| PaaS | Platform as a Service |
| PAM | Privileged Access Management |
| PII | Personally Identifiable Information |
| PKI | Public Key Infrastructure |
| POP3 | Post Office Protocol v3 |
| PSK | Pre-Shared Key |
| RAID | Redundant Array of Independent Disks |
| RDP | Remote Desktop Protocol |
| RPO | Recovery Point Objective |
| RTO | Recovery Time Objective |
| SaaS | Software as a Service |
| SCP | Secure Copy Protocol |
| SFTP | SSH File Transfer Protocol |
| SIEM | Security Information and Event Management |
| SLA | Service Level Agreement |
| SMTP | Simple Mail Transfer Protocol |
| SNMP | Simple Network Management Protocol |
| SOAR | Security Orchestration, Automation, and Response |
| SOC | Security Operations Center |
| SSH | Secure Shell |
| SSID | Service Set Identifier |
| SSL | Secure Sockets Layer |
| STP | Spanning Tree Protocol |
| TCP | Transmission Control Protocol |
| TFTP | Trivial File Transfer Protocol |
| TLS | Transport Layer Security |
| TPM | Trusted Platform Module |
| UDP | User Datagram Protocol |
| UEFI | Unified Extensible Firmware Interface |
| UPS | Uninterruptible Power Supply |
| UTM | Unified Threat Management |
| VLAN | Virtual Local Area Network |
| VM | Virtual Machine |
| VPN | Virtual Private Network |
| WAF | Web Application Firewall |
| WPA | Wi-Fi Protected Access |
| XSS | Cross-Site Scripting |
| ZTNA | Zero Trust Network Access |