acronym list Flashcards

1
Q

AAAA

A

Authentication, Authorization,
Accounting, Auditing -
maps a domain name to the ipv6 of the computer hosting the domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ACL

A

Access Control List - a list of access control entries that are rules to specifies what users are granted access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AES

A

Advanced Encryption Standard - a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology in 2001

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AH

A

Authentication Header - verifies origin of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AP

A

access point - a device that creates a wireless local area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

APC

A

Angled Physical Contact - an 8°ange in fiber connection that minimizing back reflection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

APIPA

A

Automatic Private Internet Protocol Addressing - enables computers to automatically self-configure an IP address and subnet mask when their DHCP server isn’t reachable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ARP

A

Address Resolution Protocol - is a protocol or procedure that connects an ever-changing Internet Protocol (IP) address to a fixed physical machine address, also known as a media access control (MAC) address, in a local-area network (LAN).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AUP

A

Acceptable Use Policy - a set of rules applied by the owner, creator or administrator of a computer network website, or service. That restricts the ways in which the network, website or system may be used and sets guidelines as to how it should be used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

BGP

A

Border Gateway Protocol - a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems on the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

BNC

A

British Naval Connector/Bayonet Neill-Concelman - a miniature quick connect/disconnect radio frequency connector used for coaxial cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

BYOD

A

Bring Your Own Device - refers to being allowed to use one’s personally owned device, rather than being required to use an officially provided device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CAM

A

Content Addressable Memory (table) - special type of computer memory used in certain very-high-speed searching applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CAN

A

Campus Area Network- is a computer network made up of an interconnection of local area networks within a limited geographical area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CDMA

A

Code Division Multiple Access - 2g cellular network allows users to share same bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CIA

A

Confidentiality, Integrity, and Availability - cia triad,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CIDR

A

Classless Inter-Domain Routing - slowed routing table growth is a short hand for subneting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CLI

A

Command-Line Interface - interface to receive commands from a user in the form of lines of text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CNAME

A

Canonical Name - record in the Domain Name System that maps one domain name to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

CPU

A

Central Processing Unit - brain of the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

CRC

A

Cyclic Redundancy Check - an error-detecting code commonly used in digital networks and storage devices to detect accidental changes to digital data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

CSMA/CA

A

Carrier-Sense Multiple Access with Collision Avoidance - a wireless network multiple access method in which carrier sensing is used, but nodes attempt to avoid collisions by beginning transmission only after the channel is sensed to be “idle”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CSMA/CD

A

Carrier-Sense Multiple Access with Collision Detection - A wired method of controlling multi-access computer networks in which each station on the network senses traffic and waits for it to clear before sending a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

CSU

A

Channel Service Unit - a line bridging device for use with T-carrier, which. is used to perform loopback testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

CVE

A

Common Vulnerabilities and Exposures - provides a reference method for publicly known information-security vulnerabilities and exposures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

CWDM

A

Coarse Wavelength Division Multiplexing - combines multiple signals at various wavelengths for simultaneous transmission over fiber cables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

DaaS

A

Desktop as a Service - cloud computing offering where a service provider delivers virtual desktops to end users over the Internet,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

dB

A

decibel - unit of measurement equal to one tenth of a bel (B). It expresses the ratio of two values of a power or root-power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

DHCP

A

Dynamic Host Configuration Protocol(67,68)- is a network management protocol used on Internet Protocol networks for automatically assigning IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

DLP

A

Data Loss Prevention- refers to solutions and policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

DNS

A

Domain Name System(53) - hierarchical and distributed naming system for computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

DoS

A

Denial-of-Service - an attack meant to shut down a machine or network, making it inaccessible to its intended users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

DSL

A

Digital Subscriber Line- technologies that are used to transmit digital data over telephone lines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

DSU

A

Data Service Unit - piece of telecommunications circuit terminating equipment that transforms digital data between telephone company lines and local equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

DWDM

A

Dense Wavelength Division Multiplexing - optical fiber multiplexing technology that is used to increase the bandwidth of existing fiber networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

EAP

A

Extensible Authentication Protocol - a protocol for wireless networks that expands the authentication methods used by the Point-to-Point Protocol 802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

EIA

A

Electronic Industries Association - They developed standards to ensure the equipment of different manufacturers was compatible and interchangeable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

EIGRP

A

Enhanced Interior Gateway Routing Protocol - a network protocol that enables routers to exchange information more efficiently than earlier network protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

EIRP

A

Effective Isotropic Radiated Power - a calculation used to estimate the radiated output power of an isotropic antenna. transmit strength + antenna gain - cable loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

ESP

A

Encapsulating Security Payload - a member of the Internet Protocol Security (IPsec) set of protocols that encrypt and authenticate the packets of data between computers using a Virtual Private Network (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

EUI-64

A

Extended Unique Identifier - a method we can use to automatically configure IPv6 host addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

FCoE

A

Fiber Channel over Ethernet - a computer network technology that encapsulates Fiber Channel frames over Ethernet networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

FHRP

A

First Hop Redundancy Protocol - used to prevent network failure at a default gateway. This is achieved by configuring multiple routers with the same IP address and Mac address, thus presenting an illusion of a single virtual router to the hosts in a Local Area Network (LAN).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

FTP

A

File Transfer Protocol - (ports 20/21) - a standard communication protocol used for the transfer of computer files from a server to a client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

GBIC

A

Gigabit Interface Converter - a standard for transceivers, first defined in 1995 and commonly used with Gigabit Ethernet and Fibre Channel for some time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

GRE

A

Generic Routing Encapsulation - tunneling protocol developed by Cisco Systems that can encapsulate a wide variety of network layer protocols inside virtual point-to-point links or point-to-multipoint links over an Internet Protocol network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

GSM

A

Global System for Mobile Communications - standard developed by the European Telecommunications Standards Institute to describe the protocols for second-generation digital cellular networks used by atnt and t mobile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

HA

A

High Availability - elimination of single points of failure to enable applications to continue to operate even if one of the IT components it depends on, such as a server, fails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

HDMI

A

High-Definition Multimedia Interface - audio/video interface for transmitting uncompressed video data and compressed or uncompressed digital audio data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

HIDS

A

Host Intrusion Detection System - intrusion detection system that monitors the computer infrastructure on which it is installed, analyzing traffic and logging malicious behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

HIPS

A

Host Intrusion Prevention System - protects your system from malware and unwanted activity attempting to negatively affect your computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

HTTP

A

Hypertext Transfer Protocol(80) - an application layer protocol in the Internet protocol suite model for distributed, collaborative, hypermedia information systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

HTTPS

A

Hypertext Transfer Protocol secure(433) -a protocol that secures communication and data transfer between a user’s web browser and a website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

HVAC

A

Heating, Ventilation, and Air Conditioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

IaaS

A

Infrastructure as a Service - cloud computing that provides virtualized computing resources over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

IBSS

A

Independent Basic Server Set - an ad hoc, independent, self-contained network with station-to-station traffic flowing directly, receiving data transmitted by another station, and only filtering traffic based on the MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

ICMP

A

Internet Control Message Protocol - supporting protocol in the Internet protocol suite. It is used by network devices, including routers, to send error messages and operational information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

ICS

A

Industrial Control System - electronic control system and associated instrumentation used for industrial process control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

IDF

A

Intermediate Distribution Frame - extension of a MDF used for telephone exchange central office

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

IDS

A

Intrusion Detection System - a monitoring system that detects suspicious activities and generates alerts when they are detected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

IGMP

A

Internet Group Management Protocol - communications protocol used by hosts and adjacent routers on IPv4 networks to establish multicast group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

IMAP

A

Internet Message Access Protocol(143) - protocol used by email clients to retrieve email messages from a mail server over a TCP/IP connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

IoT

A

Internet of Things - describes physical objects with sensors, processing ability, software and other technologies that connect and exchange data. examples alexa, thermostats, door bells, light bulbs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

IP

A

Internet Protocol - network layer (layer 4) communications protocol in the Internet protocol suite for relaying datagrams across network boundaries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

IPS

A

Intrusion Prevention System - a network security tool (which can be a hardware device or software) that continuously monitors a network for malicious activity and takes action to prevent it, including reporting, blocking, or dropping it, when it does occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

IPSec

A

Internet Protocol Security - a secure network protocol suite that authenticates and encrypts packets of data to provide secure encrypted communication between two computers over an Internet Protocol network. It is used in virtual private networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

IPv4

A

Internet Protocol version 4 - 32 bit fourth version of the Internet Protocol. It is one of the core protocols of standards-based internetworking methods in the Internet and other packet-switched networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

IPv6

A

Internet Protocol version 6 - 128 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

iSCSI

A

Internet Small Computer Systems Interface - an Internet Protocol-based storage networking standard for linking data storage facilities. carrying SCSI commands over a TCP/IP network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

ISP

A

Internet Service Provider - a company that provides subscribers with access to the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

LACP

A

Link Aggregation Control Protocol - one element of an IEEE specification (802.3ad) bundling individual links on a network to promote better performance outcomes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

LAN

A

Local Area Network - a computer network that interconnects computers within a limited area such as a residence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

LC

A

Local Connector - one of the most common fiber optic connectors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

LDAP

A

Lightweight Directory Access Protocol(389) - an open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

LDAPS

A

Lightweight Directory Access Protocol (over SSL)(636) - secure version of LDAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

LED

A

Light-Emitting Diode - a semiconductor device that emits light when current flows through it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

LLDP

A

Link Layer Discovery Protocol - a vendor-neutral link layer protocol used by network devices for advertising their identity, capabilities, and neighbors on a local area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

LTE

A

Long-Term Evolution - (4G) wireless standard that provides increased network capacity and speed for cellphones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

MAC

A

Media Access Control/Medium Access Control - layer that controls the hardware responsible for interaction with the wired, optical or wireless transmission medium. The MAC sublayer and the logical link control sublayer together make up the data link layer(layer 2).

80
Q

MAN

A

Metropolitan Area Network - a computer network that connects computers within a metropolitan area

81
Q

MDF

A

Main Distribution Frame - a signal distribution frame for connecting equipment

82
Q

MDIX

A

Medium Dependent Interface Crossover - automatically detects the required cable connection type and configures the connection appropriately

83
Q

MFA

A

Multifactor Authentication - a multi-step account login process that requires users to enter more information than just a password.

84
Q

mGRE

A

Multipoint Generic Routing Encapsulation - a tunneling protocol can encapsulate a wide variety of network layer protocols inside virtual point-to-point links or point-to-multipoint links over an Internet Protocol network.

85
Q

MIB

A

Management Information Base - a Simple Network Management Protocol (SNMP) flat-file, nonrelational database that describes devices being monitored.

86
Q

MIMO

A

Multiple Input, Multiple Output - a 4g wireless tech is an antenna technology for wireless communications in which multiple antennas are used at both the source and receiver

87
Q

MU-MIMO

A

Multiuser - Multiple Input, Multiple Output - a 5g wireless tech allows a WiFi router to communicate with multiple devices simultaneously

88
Q

MOU

A

Memorandum of Understanding - an agreement between two or more parties outlined in a formal document. It is not legally binding

89
Q

MPLS

A

Multiprotocol Label Switching - a routing technique in telecommunications networks that directs data from one node to the next based on labels

90
Q

MSS

A

Maximum Segment Size - the largest amount of data, specified in bytes, that a computer or communications device can handle in a single, unfragmented piece.

91
Q

MTBF

A

Mean Time Between Failure - the predicted elapsed time between inherent failures of a mechanical or electronic system during normal system. You want this to be as high as possible

92
Q

MT-RJ

A

Mechanical Transfer - Registered Jack - a type of connector used in fiber optic cabling.

93
Q

MTTR

A

Mean Time to Repair - the average time it takes to repair a system . you want this to be as low as possible

94
Q

MTU

A

Maximum Transmission Unit - the largest packet or frame size, specified in octets (eight-bit bytes) that can be sent in a packet- or frame-based network.

95
Q

MX

A

Mail Exchange - record specifies the mail server responsible for accepting email messages its not an ip address its a name

96
Q

NAC

A

Network Access Control - a security solution that enforces policy on devices that access networks to increase network visibility and reduce risk.

97
Q

NAS

A

Network Attached Storage - file-level computer data storage server connected to a computer network providing data access

98
Q

NAT

A

Network Address Translation - the process of mapping an internet protocol (IP) address to another by changing the header of IP packets while in transit via a router

99
Q

NDA

A

Non-Disclosure Agreement - a legally binding contract that establishes a confidential relationship. The party or parties signing the agreement agree that sensitive information they may obtain will not be made available to any others.

100
Q

NDP

A

Neighbor Discovery Protocol - a protocol of the Internet protocol suite used with Internet Protocol Version 6. allows different nodes on the same link to advertise their existence to their neighbors

101
Q

NFV

A

Network Function Virtualization - the replacement of network appliance hardware with virtual machines. The virtual machines use a hypervisor to run

102
Q

NGFW

A

Next-Generation Firewall - filter traffic and apply complex rules based on application.

103
Q

NIC

A

Network Interface Card - a computer hardware component that connects a computer to a computer network.

104
Q

NIDS

A

Network Intrusion Detection System - attempt to detect cyber attacks, malware, denial of service (DoS) attacks or port scans on a computer network

105
Q

NIPS

A

Network Intrusion Prevention System - a type of network security software that detects malicious activity on a network, reports information about said activity, and takes steps to block or stop the activity from occurring automatically.

106
Q

NS

A

Name Server - a server that stores the DNS records, such as address (A, AAAA) records, name server (NS) records, and mail exchanger (MX) records

107
Q

NTP

A

Network Time Protocol - a networking protocol for clock synchronization between computer systems over packet-switched

108
Q

OID

A

Object Identifier - an identifier mechanism standardized by the International Telecommunication Union and ISO/IEC for naming any object, concept, or “thing” with a globally unambiguous persistent name

109
Q

OSI

A

Open Systems Interconnection - 7 layer model created by the International Organization for Standardization

110
Q

OSPF

A

Open Shortest Path First - a link-state routing protocol that was developed for IP networks. Large, scalable routing protocoL

111
Q

OTDR

A

Optical Time Domain Reflectometer - a precision instrument used to locate events or faults along a fiber link, typically within an optical communications network.

112
Q

PaaS

A

Platform as a Service - No servers, no software,
enables software developers to build, run, and manage software applications

113
Q

PAN

A

Personal Area Network - Your own private network Bluetooth, IR, NFC

114
Q

PAT

A

Port Address Translation - an extension of Network Address Translation (NAT) that permits multiple devices on a LAN to be mapped to a single public IP address

115
Q

PC

A

Personal Computer -

116
Q

PDU

A

Power Distribution Unit - a device for controlling electrical power in a data center. The most basic PDUs are large power strips

117
Q

PoE

A

Power over Ethernet - describes any of several standards or ad hoc systems that pass electric power along with data on twisted-pair Ethernet cabling.

118
Q

POP3

A

Post Office Protocol version 3 (110) - is used to allow a workstation to retrieve mail that the server is holding for it

119
Q

PSK

A

Pre-Shared Key - basically just a shared secret or password that is used to authenticate an individual attempting to join a wireless network

120
Q

PTR

A

Pointer Record - The reverse of an A or AAAA record provides the domain name associated with an IP address.

121
Q

QoS

A

Quality of Service - the description or measurement of the overall performance of a service,

122
Q

QSFP

A

Quad Small Form-factor Pluggable- network transceivers 4-channel SFP = Four 1 Gbit/s = 4 Gbit/s supports Ethernet, Fiber Channel, InfiniBand and SONET/SDH

123
Q

RA

A

Router Advertisements - used for IPv6 auto-configuration and routing. messages are sent by the router periodically and in response to solicitations

124
Q

RADIUS

A

Remote Authentication Dial-In User Service - networking protocol that provides centralized authentication, authorization, and accounting management for users who connect and use a network service.

125
Q

RAID

A

Redundant Array of Inexpensive
(or Independent) Disks - data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.

126
Q

RDP

A

Remote Desktop Protocol(3389) - developed by Microsoft Corporation which provides a user with a graphical interface to connect to another computer over a network connection.

127
Q

RF

A

Radio Frequency - oscillation rate of an alternating electric current or voltage or of a magnetic, electric or electromagnetic field

128
Q

RFC

A

Request for Comment - a formal document from the Internet Engineering Task Force

129
Q

RFID

A

Radio Frequency Identification - uses radio waves to identify people or objects. reads information contained in a wireless device or “tag” from a distance without making any physical contact

130
Q

RG

A

Radio Guide - is the original military specification for coaxial cables. The RG number refers to the cable’s diameter.
RG-6, RG-59, and RG-11 are fairly common

131
Q

RIP

A

Routing Internet Protocol - distance-vector routing protocol. send all or a portion of their routing tables in routing-update messages to their neighbors.

132
Q

RJ

A

Registered Jack - a standardized telecommunication network interface for connecting voice and data equipment to a service provided
rj11 found in old telephones
rj45 found on most ethernet cables

133
Q

RPO

A

Recovery Point Objective - the maximum acceptable amount of data loss after an unplanned data-loss incident, expressed as an amount of time.

134
Q

RSSI

A

Received Signal Strength Indication - a measurement of how well your device can hear a signal from an access point or router

135
Q

RTO

A

Recovery Time Objective - The overall length of time an information system’s components can be in the recovery phase before negatively impacting the organization’s mission or mission/business processes.

136
Q

RTSP

A

Real Time Streaming Protocol - an application-level network protocol designed for multiplexing and packetizing multimedia transport

137
Q

SaaS

A

Software as a Service - software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted. google docs, sheets,

138
Q

SAN

A

Storage Area Network - high-speed network that provides network access to storage devices.

139
Q

SC

A

Standard Connector/Subscriber Connector - A fiber-optic cable connector that uses a push-pull latching mechanism similar to common audio and video cables

140
Q

SCADA

A

Supervisory Control and Data Acquisition - is a system that aims to monitor and control field devices at your remote sites.

141
Q

SCP

A

Secure Copy Protocol(22) - is a means of securely transferring computer files between a local host and a remote host or between two remote hosts.

142
Q

SDN

A

Software-Defined Network - enables dynamic, programmatically efficient network configuration in order to improve network performance and monitoring

143
Q

SDWAN

A

Software-Defined WAN - a wide area network that uses software-defined network technology, such as communicating over the Internet using overlay tunnels which are encrypted when destined for internal organization locations.

144
Q

SFP

A

Small Form-factor Pluggable - a compact, hot-pluggable network interface module format used for both telecommunication and data communications applications.

145
Q

SFTP

A

Secure File Transfer Protocol(22) - SSH File Transfer Protocol is a network protocol that provides file access, file transfer, and file management over any reliable data stream

146
Q

SIEM

A

Security Information and Event Management - a field within the field of computer security, where software products and services combine security information management and security event management.

147
Q

SIP

A

Session Initiation Protocol(5060, 5061) - a signaling protocol used for initiating, maintaining, and terminating communication sessions that include voice, video and messaging applications.

148
Q

SLA

A

Service Level Agreement - contract between a service provider and its customers that documents what services the provider will furnish and defines the service standards the provider is obligated to meet.

149
Q

SLAAC

A

Stateless Address Auto-Configuration - the process that IPv6 nodes (hosts or routers) use to automatically configure IPv6 addresses for interfaces.

150
Q

SMB

A

Server Message Block(445) - a client-server communication protocol used for sharing access to files, printers, serial ports

151
Q

SMTP

A

Simple Mail Transfer Protocol(587) - Internet standard communication protocol for electronic mail transmission. Mail servers and other message transfer agents use SMTP to send and receive mail messages.

152
Q

SNMP

A

Simple Network Management Protocol - an Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behaviour.

153
Q

SOA

A

Start of Authority - resource record in the Domain Name System containing administrative information about the zone, especially regarding zone transfers

154
Q

SOHO

A

Small Office Home Office - refers to the category of business or cottage industry that involves from 1 to 10 workers.

155
Q

SPAN

A

Switched Port Analyzer - which is sometimes called port mirroring or port monitoring, selects network traffic for analysis by a network analyzer.

156
Q

SQL

A

Structured Query Language - a programming language for storing and processing information in a relational database.

157
Q

SRV

A

Service Record - a specification of data in the Domain Name System defining the location, i.e., the hostname and port number, of servers for specified services.

158
Q

SSD

A

Solid-State Drive - a solid-state storage device that uses integrated circuit assemblies to store data persistently,

159
Q

SSH

A

Secure Shell(22) - a cryptographic network protocol for operating network services securely over an unsecured network. Its most notable applications are remote login and command-line execution.

160
Q

SSID

A

Service Set Identifier - a sequence of characters that uniquely names a Wi-Fi network. An SSID is sometimes referred to as a network name.

161
Q

SSL

A

Secure Sockets Layer(443) - a cryptographic protocol designed to provide communications security over a computer network. The protocol is widely used in applications such as email, instant messaging, and voice over IP,(replaced by TLS)

162
Q

SSO

A

Single Sign-On - an authentication scheme that allows a user to log in with a single ID to any of several related, yet independent, software systems.

163
Q

ST

A

Straight Tip or Snap Twist - is a connector used in fiber-optic cables that utilizes a bayonet-style plug and socket

164
Q

STP

A

Spanning Tree Protocol - a network protocol that builds a loop-free logical topology for Ethernet networks prevent bridge loops

165
Q

SYSLOG

A

System Log - linux a protocol that computer systems use to send event data logs to a central location for storage

166
Q

TACACS+

A

Terminal Access Controller Access
Control System Plus(49) - refers to a family of related protocols handling remote authentication and related services for network access control through a centralized server.

167
Q

TAP

A

Terminal Access Point - an external network device that enables port mirroring and creates copies of traffic for use by various monitoring devices

168
Q

TCP

A

Transmission Control Protocol - 3 way handshake layer 4 protocol

169
Q

TFTP

A

Trivial File Transfer Protocol - a simple lockstep File Transfer Protocol which allows a client to get a file from or put a file onto a remote host.

170
Q

TIA/EIA

A

Telecommunications Industry
Association/Electronic Industries Alliance - structured cabling standards define how to design, build, and manage a cabling system that is structured,

171
Q

TKIP

A

Temporal Key Integrity Protocol - a security protocol used in the IEEE 802.11 wireless networking standard.

172
Q

TLS

A

Transport Layer Security(443) - cryptographic protocol designed to provide communications security over a computer network. (replaced SSL)

173
Q

TTL

A

Time to Live - a value for the period of time that a packet, or data, should exist on a computer or network before being discarded.

174
Q

TX/RX

A

Transmit and Receive

175
Q

UDP

A

User Datagram Protocol - layer 4 UDP does not require prior communication to set up communication channels or data paths

176
Q

UPC

A

Ultra-Physical Contact - It is an improvement of the PC fiber connector with a better surface finish after an extended polishing

177
Q

UPS

A

Uninterruptible Power Supply - a back up battery that takes over when power goes out

178
Q

URL

A

Uniform Resource Locator - a reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it

179
Q

USB

A

Universal Serial Bus - an industry standard that establishes specifications for cables, connectors and protocols for connection,

180
Q

UTM

A

Unified Threat Management - when multiple security features or services are combined into a single device within your network.

181
Q

UTP

A

Unshielded Twister Pair - a ubiquitous type of copper cabling used in telephone wiring and local area networks (LANs). has no foil sheilding

182
Q

VIP

A

Virtual IP - IP addresses that are not tethered to particular machines.

183
Q

VLAN

A

Virtual Local Area Network - a logical overlay network that groups together a subset of devices that share a physical LAN, isolating the traffic for each group.

184
Q

VM

A

Virtual Machine - a compute resource that uses software instead of a physical computer to run programs and deploy apps.

185
Q

VNC

A

Virtual Network Computing - a graphical desktop-sharing system that uses the Remote Frame Buffer protocol (RFB) to remotely control another computer.

186
Q

VNIC

A

virtual Network Interface Card - virtual network interfaces that are based on the physical network interface cards of a host.

187
Q

VoIP

A

Voice over Internet Protocol(5060) - is a method and group of technologies for the delivery of voice communications and multimedia sessions over Internet

188
Q

VPN

A

Virtual Private Network - a mechanism for creating a secure connection between a computing device and a computer network, or between two networks

189
Q

VRRP

A

Virtual Router Redundancy Protocol - a computer networking protocol that provides for automatic assignment of available Internet Protocol (IP) routers to participating hosts

190
Q

vSwitch

A

Virtual Switch - allows virtual machines created on Hyper-V hosts to communicate with other computers.

191
Q

WAN

A

Wide Area Network - the technology that connects your offices, data centers, cloud applications, and cloud storage together.

192
Q

WAP

A

Wireless Access Point - An access point is a device that creates a wireless local area network,

193
Q

WDM

A

Wavelength Division Multiplexing - a fiber-optic transmission technique that enables the use of multiple light wavelengths

194
Q

WEP

A

Wired Equivalent Privacy - a security algorithm for 802.11 wireless networks. encrypting data transmitted over the WLAN

195
Q

WLAN

A

Wireless Local Area Network -a wireless computer network that links two or more devices using wireless communication to form a local area network within a limited area such as a home,

196
Q

WPA

A

WiFi Protected Access - a security standard for computing devices equipped with wireless internet connections.

197
Q

WPS

A

Wi-Fi Protected Setup - allows the owner of Wi-Fi privileges to block other users from using their household Wi-Fi. The owner can also allow people to use Wi-Fi. This can be changed by pressing the WPS button on the home router.