Acronyms Flashcards

(181 cards)

1
Q

AAAA

A

Authentication, authorization, accounting, auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AES

A

Advanced Encryption Standard
-symmetric key encryption (not used for key exchanges)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AH

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AP

A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

APC

A

Angled Physical Contact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

APIPA

A

Automatic Private Internet Protocol Addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ARP

A

Address Resolution Protocol
-creates binding between IP address and MAC address inside LAN
-arp table sets on routers and switches so data can be moved through routers with ip and then transferred to mac on the switch of right network and sent to client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AUP

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

BGP

A

Border Gateway Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

BNC

A

British Naval Connector/Bayonet Neill-Concelman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

BYOD

A

Bring Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CAM

A

Content Addressable Memory (table)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CAN

A

Campus Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CDMA

A

Code Devision Media Access

Do not use SIM cards
Provider manage handset
Requires each subscriber device to use a code to key the modulation of their signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CIA

A

Confidentiality, Integrity, and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CIDR

A

Classless Inter-Domain Routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CLI

A

Command Line Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CNAME

A

Canonical Name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

CPU

A

Central Processing Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

CRC

A

Cyclic Redundancy Check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

CSMA/CA

A

Carrier-Sense Multiple Access with Collision Avoidance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CSU

A

Channel Service Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

CVE

A

Common Vulnerabilities and Exposures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
CWDM
Coarse Wavelength Division Multiplexing
26
DaaS
Desktop as a Service
27
dB
Decibel
28
DDoS
Distributed Denial of Service -multiple attackers asking one victim for services
29
DHCP
Dynamic Host Configuration Protocol
30
DLP
Data Loss Prevention
31
DNS
Domain Name System
32
DoS
Denial of Service -1 machine floods a victim with requests for services -tcp syn flood (tcp handshakes that never completed by masking server send syn ack to a spoofed ips -Smurf attack (icmp flood): attacker sends ping to subnet broadcast with spoofed source ip set to be the ip of the victim server
33
DSL
Digital Subscriber Line
34
DSU
Data Service Unit
35
DWDM
Dense Wavelength Devision Multiplexing
36
EAP
Extensible Authentication Protocol -uses different mechanisms of authentication
37
EIA
Electronic Industries Association
38
EIGRP
Enhance Interior Gateway Routing Protocol
39
EIRP
Effective Isotropic Radiated Power
40
ESP
Encapsulating Security Protocol
41
EUI
Extended Unique Identifier
42
FCoE
Fibre Channel over Ethernet
43
FHRP
First Hop Redundancy Protocol
44
FTP
File Transfer Protocol
45
GBIC
Gigabit Interface Converter
46
GRE
Generic Routing Encapsulation -tunneling protocol / does not provide encryption -think of ferry encapsulate car over water
47
GSM
Global System for Mobile Communication -use TDMA (time division multiple access) -subscribers can use SIM card on an unlocked handset
48
HA
High Availability
49
HDMI
High Definition Multimedia Interface
50
HTTP
Hypertext Transfer Protocol
51
HTTPS
Hypertext Transfer Protocol Secure
52
HVAC
Heating, Ventilation and Air Conditioning
53
IaaS
Infrastructure as a Service Microsoft’s azure virtual machines Amazon’s elastic compute cloud
54
ICMP
Internet Control Message Protocol
55
ICS
Industrial Control System
56
IDF
Intermediate Distribution Frame
57
IDS
Intrusion Detection System
58
IGMP
Internet Group Management Protocol
59
IMAP
Internet Message Access Protocol
60
IoT
Internet of Things
61
IP
Internet Protocol
62
IPS
Intrusion Prevention System -uses bits of patterns called data signatures to identify common network attacks
63
IPSec
Internet Protocol Security -used in securing key exchange during establishment of client to server vpn connection -uses ISAKMP
64
IPv4
Internet Protocol version 4
65
IPv6
Internet Protocol version 6
66
iSCSI
Internet Small Computer Systems Interface
67
ISP
Internet Service Provider
68
LACP
Link Aggregation Control Protocol
69
LAN
Local Area Network
70
LC
Logic Connector
71
LDAP
Lightweight Directory Access Protocol
72
LDAPS
Lightweight Directory Access Protocol (over SSL)
73
LED
Light-Emitting Diode
74
LTE
Long-Term Evolution -converged 4G standard supported by both GSM and CDMA network providers, but the network providers must install SIM card on the phone
75
MAC
Media Access Control / Medium Access Control
76
MAN
Metropolitan Area Network
77
MDF
Main Distribution Frame
78
MDIX
Medium Dependent Interface Crossover
79
MIB
Management Information Base -collection of definitions which define the properties of the managed object within the device to be managed.
80
MIMO
Multiple Input, Multiple Output
81
MU-MIMO
Multiuser - Multiple Input, Multiple Output
82
MOU
Memorandum of Understanding
83
MPLS
Multiprotocol Label Switching
84
MTBF
Mean Time Between Failure
85
MT-RJ
Mechanical Transfer - Registered Jack
86
MTTR
Mean Time To Repair
87
MTU
Maximum Transmission Unit
88
MX
Mail Exchange
89
NAC
Network Access Control -ensure device is scanned to determine state of security prior to being allowed network access
90
NAS
Network Attached Storage
91
NDA
Non-Disclosure Agreement
92
NFV
Network Function Virtualization -way to reduce cost and accelerate service deployment for network operators by decoupling functions like a firewall or encryption from dedicated hardware and moving them to virtual servers.
93
NGFW
Next Generation Firewall
94
NIC
Network Interface Card
95
NS
Name Server
96
NTP
Network Time Protocol
97
OID
Object Identifier
98
OSI
Open Systems Interconnection
99
OSPF
Open Shortest Path First
100
OTDR
Optical Time Domain Reflectometer
101
PaaS
Platform as a Service SQL database is an example
102
PAN
Personal Area Network
103
PAT
Post Address Translation
104
PDU
Power Distribution Unit
105
PoE
Power over Ethernet
106
POP3
Post Office Protocol version 3
107
PSK
Pre-Shared Key
108
PTR
Pointer Record
109
QoS
Quality of Service
110
QSFP
Quad Small Form-Factor Pluggable
111
RA
Router Advertisements
112
RADIUS
Remote Authentication Dial-In User Service -802.1x standard uses RADIUS for authentication
113
RAID
Redundant Array of Independent Disks
114
RDP
Remote Desktop Protocol
115
RF
Radio Frequency
116
RFC
Request for Conner
117
RG
Radio Guide
118
RJ
Registered Jack
119
RPO
Recovery Point Objective
120
RTSP
Real Time Streaming Protocol
121
SaaS
Software as a Service I.e 0365
122
SAN
Storage Area Network
123
SC
Standard Connector/ Subscriber Connector
124
SCADA
Supervisory Control and Data Acquisition
125
SDN
Software-Defined Network
126
SDWAN
Software-Defined WAN
127
SFP
Small Form-factor Pluggable
128
SFTP
Secure File Transfer Protocol
129
SIEM
Security Information and Event Management
130
SIP
Session Initiation Protocol
131
SLA
Service Level Agreement
132
SLAAC
Stateless Address Auto-Configuration
133
SMB
Server Message Block
134
SMTP
Simple Mail Transfer Protocol
135
SOA
State of Authority
136
SOHO
Small Office Home Office
137
SQL
Structured Query Language
138
SRV
Service Record
139
SSD
Solid State Drive
140
SSH
Secure Shell
141
SSID
Service Set Identifier
142
SSO
Single Sign-On
143
ST
Straight Tip or Snap Twist
144
STP
Spanning Tree Protocol
145
Syslog
System Log
146
TACACS+
Terminal Access Controller Access Control System Plus -uses 802.1x protocol
147
TCP
Transmission Control Protocol
148
TFTP
Trivial File Transfer Protocol
149
TIA / EIA
Telecommunications Industry Association / Electronics Industries Alliance
150
TKIP
Temporal Key Integrity Protocol -encryption protocol included in 802.11i standard for wireless LANs (WLANs)
151
TLS
Transport Layer Security
152
TTL
Time To Live
153
TX/RX
Transmit and Receive
154
UDP
User Datagram Protocol
155
UPC
Ultra-Physical Contact
156
UPS
Uninterruptible Power Supply
157
URL
Uniform Resource Locator
158
USB
Universal Serial Bus
159
UTP
Unshielded Twisted Pair
160
VIP
Virtual IP
161
VLAN
Virtual Local Area Network
162
VM
Virtual Machine
163
VNC
Virtual Network Computing
164
vNIC
virtual Network Interface Card
165
VoIP
Voice over Internet Protocol
166
VPN
Virtual Private Network
167
WAN
Wide Area Network
168
WAP
Wireless Access Point
169
WDM
Wavelength Devision Multiplexing
170
WLAN
Wireless Local Area Network
171
WPA
WiFi Protected Access
172
EAP-MD5
Variant of Extensible authentication protocol -uses passwords and the challenge handshake -one way authentication process so you must use long and strong passwords
173
EAP-TLS
-variant of extensible authentication protocol -uses public key infrastructure -mutual authentication -use digital certificates instead of passwords
174
EAP-TTLS
-variant of extensible authentication protocol -uses digital certificate on server and password on client -more secure than md5, but less than TLS variant
175
EAP-FAST
EAP Flexible Authentication via Secure Tunneling -protected access credentials instead of a certificate to establish mutual connection
176
PEAP
Protected EAP -uses server certificates and AD database to authenticate password from client
177
MITM
Man in the Middle attack
178
DNS poisoning
Attacker manipulates vulnerabilities in dns to reroute traffic to fake version of a site
179
DNSSEC
Secure DNS Uses encrypted digital signatures when passing dns information between servers to protect from poisoning.
180
ISAKMP
Internet Security Association and Key Management Protocol -key protocol in IPsec architecture -common framework for agreeing to the format of security associations (SA) attributes and for negotiating, modifying, and deleting SAs. —there may be many key exchange protocols with different security properties, ISAKMP provides common framework
181
VLSM
Variable-Length Subnet Masking -allows subnets of various sizes -would not be able to use /25, /27, etc