acronym list Flashcards

1
Q

AAAA

A

Authentication, Authorization,
Accounting, Auditing -
maps a domain name to the ipv6 of the computer hosting the domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ACL

A

Access Control List - a list of access control entries that are rules to specifies what users are granted access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AES

A

Advanced Encryption Standard - a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology in 2001

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AH

A

Authentication Header - verifies origin of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AP

A

access point - a device that creates a wireless local area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

APC

A

Angled Physical Contact - an 8°ange in fiber connection that minimizing back reflection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

APIPA

A

Automatic Private Internet Protocol Addressing - enables computers to automatically self-configure an IP address and subnet mask when their DHCP server isn’t reachable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ARP

A

Address Resolution Protocol - is a protocol or procedure that connects an ever-changing Internet Protocol (IP) address to a fixed physical machine address, also known as a media access control (MAC) address, in a local-area network (LAN).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AUP

A

Acceptable Use Policy - a set of rules applied by the owner, creator or administrator of a computer network website, or service. That restricts the ways in which the network, website or system may be used and sets guidelines as to how it should be used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

BGP

A

Border Gateway Protocol - a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems on the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

BNC

A

British Naval Connector/Bayonet Neill-Concelman - a miniature quick connect/disconnect radio frequency connector used for coaxial cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

BYOD

A

Bring Your Own Device - refers to being allowed to use one’s personally owned device, rather than being required to use an officially provided device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CAM

A

Content Addressable Memory (table) - special type of computer memory used in certain very-high-speed searching applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CAN

A

Campus Area Network- is a computer network made up of an interconnection of local area networks within a limited geographical area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CDMA

A

Code Division Multiple Access - 2g cellular network allows users to share same bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CIA

A

Confidentiality, Integrity, and Availability - cia triad,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CIDR

A

Classless Inter-Domain Routing - slowed routing table growth is a short hand for subneting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CLI

A

Command-Line Interface - interface to receive commands from a user in the form of lines of text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CNAME

A

Canonical Name - record in the Domain Name System that maps one domain name to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

CPU

A

Central Processing Unit - brain of the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

CRC

A

Cyclic Redundancy Check - an error-detecting code commonly used in digital networks and storage devices to detect accidental changes to digital data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

CSMA/CA

A

Carrier-Sense Multiple Access with Collision Avoidance - a wireless network multiple access method in which carrier sensing is used, but nodes attempt to avoid collisions by beginning transmission only after the channel is sensed to be “idle”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CSMA/CD

A

Carrier-Sense Multiple Access with Collision Detection - A wired method of controlling multi-access computer networks in which each station on the network senses traffic and waits for it to clear before sending a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

CSU

A

Channel Service Unit - a line bridging device for use with T-carrier, which. is used to perform loopback testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
CVE
Common Vulnerabilities and Exposures - provides a reference method for publicly known information-security vulnerabilities and exposures.
26
CWDM
Coarse Wavelength Division Multiplexing - combines multiple signals at various wavelengths for simultaneous transmission over fiber cables.
27
DaaS
Desktop as a Service - cloud computing offering where a service provider delivers virtual desktops to end users over the Internet,
28
dB
decibel - unit of measurement equal to one tenth of a bel (B). It expresses the ratio of two values of a power or root-power
29
DHCP
Dynamic Host Configuration Protocol(67,68)- is a network management protocol used on Internet Protocol networks for automatically assigning IP addresses
30
DLP
Data Loss Prevention- refers to solutions and policies
31
DNS
Domain Name System(53) - hierarchical and distributed naming system for computers
32
DoS
Denial-of-Service - an attack meant to shut down a machine or network, making it inaccessible to its intended users
33
DSL
Digital Subscriber Line- technologies that are used to transmit digital data over telephone lines.
34
DSU
Data Service Unit - piece of telecommunications circuit terminating equipment that transforms digital data between telephone company lines and local equipment
35
DWDM
Dense Wavelength Division Multiplexing - optical fiber multiplexing technology that is used to increase the bandwidth of existing fiber networks
36
EAP
Extensible Authentication Protocol - a protocol for wireless networks that expands the authentication methods used by the Point-to-Point Protocol 802.1x
37
EIA
Electronic Industries Association - They developed standards to ensure the equipment of different manufacturers was compatible and interchangeable.
38
EIGRP
Enhanced Interior Gateway Routing Protocol - a network protocol that enables routers to exchange information more efficiently than earlier network protocols
39
EIRP
Effective Isotropic Radiated Power - a calculation used to estimate the radiated output power of an isotropic antenna. transmit strength + antenna gain - cable loss
40
ESP
Encapsulating Security Payload - a member of the Internet Protocol Security (IPsec) set of protocols that encrypt and authenticate the packets of data between computers using a Virtual Private Network (VPN)
41
EUI-64
Extended Unique Identifier - a method we can use to automatically configure IPv6 host addresses
42
FCoE
Fiber Channel over Ethernet - a computer network technology that encapsulates Fiber Channel frames over Ethernet networks
43
FHRP
First Hop Redundancy Protocol - used to prevent network failure at a default gateway. This is achieved by configuring multiple routers with the same IP address and Mac address, thus presenting an illusion of a single virtual router to the hosts in a Local Area Network (LAN).
44
FTP
File Transfer Protocol - (ports 20/21) - a standard communication protocol used for the transfer of computer files from a server to a client
45
GBIC
Gigabit Interface Converter - a standard for transceivers, first defined in 1995 and commonly used with Gigabit Ethernet and Fibre Channel for some time
46
GRE
Generic Routing Encapsulation - tunneling protocol developed by Cisco Systems that can encapsulate a wide variety of network layer protocols inside virtual point-to-point links or point-to-multipoint links over an Internet Protocol network.
47
GSM
Global System for Mobile Communications - standard developed by the European Telecommunications Standards Institute to describe the protocols for second-generation digital cellular networks used by atnt and t mobile
48
HA
High Availability - elimination of single points of failure to enable applications to continue to operate even if one of the IT components it depends on, such as a server, fails
49
HDMI
High-Definition Multimedia Interface - audio/video interface for transmitting uncompressed video data and compressed or uncompressed digital audio data
50
HIDS
Host Intrusion Detection System - intrusion detection system that monitors the computer infrastructure on which it is installed, analyzing traffic and logging malicious behavior.
51
HIPS
Host Intrusion Prevention System - protects your system from malware and unwanted activity attempting to negatively affect your computer.
52
HTTP
Hypertext Transfer Protocol(80) - an application layer protocol in the Internet protocol suite model for distributed, collaborative, hypermedia information systems.
53
HTTPS
Hypertext Transfer Protocol secure(433) -a protocol that secures communication and data transfer between a user's web browser and a website
54
HVAC
Heating, Ventilation, and Air Conditioning
55
IaaS
Infrastructure as a Service - cloud computing that provides virtualized computing resources over the internet.
56
IBSS
Independent Basic Server Set - an ad hoc, independent, self-contained network with station-to-station traffic flowing directly, receiving data transmitted by another station, and only filtering traffic based on the MAC address
57
ICMP
Internet Control Message Protocol - supporting protocol in the Internet protocol suite. It is used by network devices, including routers, to send error messages and operational information
58
ICS
Industrial Control System - electronic control system and associated instrumentation used for industrial process control
59
IDF
Intermediate Distribution Frame - extension of a MDF used for telephone exchange central office
60
IDS
Intrusion Detection System - a monitoring system that detects suspicious activities and generates alerts when they are detected
61
IGMP
Internet Group Management Protocol - communications protocol used by hosts and adjacent routers on IPv4 networks to establish multicast group
62
IMAP
Internet Message Access Protocol(143) - protocol used by email clients to retrieve email messages from a mail server over a TCP/IP connection
63
IoT
Internet of Things - describes physical objects with sensors, processing ability, software and other technologies that connect and exchange data. examples alexa, thermostats, door bells, light bulbs
64
IP
Internet Protocol - network layer (layer 4) communications protocol in the Internet protocol suite for relaying datagrams across network boundaries
65
IPS
Intrusion Prevention System - a network security tool (which can be a hardware device or software) that continuously monitors a network for malicious activity and takes action to prevent it, including reporting, blocking, or dropping it, when it does occur.
66
IPSec
Internet Protocol Security - a secure network protocol suite that authenticates and encrypts packets of data to provide secure encrypted communication between two computers over an Internet Protocol network. It is used in virtual private networks.
67
IPv4
Internet Protocol version 4 - 32 bit fourth version of the Internet Protocol. It is one of the core protocols of standards-based internetworking methods in the Internet and other packet-switched networks
68
IPv6
Internet Protocol version 6 - 128 bit
69
iSCSI
Internet Small Computer Systems Interface - an Internet Protocol-based storage networking standard for linking data storage facilities. carrying SCSI commands over a TCP/IP network.
70
ISP
Internet Service Provider - a company that provides subscribers with access to the internet.
71
LACP
Link Aggregation Control Protocol - one element of an IEEE specification (802.3ad) bundling individual links on a network to promote better performance outcomes
72
LAN
Local Area Network - a computer network that interconnects computers within a limited area such as a residence
73
LC
Local Connector - one of the most common fiber optic connectors.
74
LDAP
Lightweight Directory Access Protocol(389) - an open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information
75
LDAPS
Lightweight Directory Access Protocol (over SSL)(636) - secure version of LDAP
76
LED
Light-Emitting Diode - a semiconductor device that emits light when current flows through it.
77
LLDP
Link Layer Discovery Protocol - a vendor-neutral link layer protocol used by network devices for advertising their identity, capabilities, and neighbors on a local area network
78
LTE
Long-Term Evolution - (4G) wireless standard that provides increased network capacity and speed for cellphones
79
MAC
Media Access Control/Medium Access Control - layer that controls the hardware responsible for interaction with the wired, optical or wireless transmission medium. The MAC sublayer and the logical link control sublayer together make up the data link layer(layer 2).
80
MAN
Metropolitan Area Network - a computer network that connects computers within a metropolitan area
81
MDF
Main Distribution Frame - a signal distribution frame for connecting equipment
82
MDIX
Medium Dependent Interface Crossover - automatically detects the required cable connection type and configures the connection appropriately
83
MFA
Multifactor Authentication - a multi-step account login process that requires users to enter more information than just a password.
84
mGRE
Multipoint Generic Routing Encapsulation - a tunneling protocol can encapsulate a wide variety of network layer protocols inside virtual point-to-point links or point-to-multipoint links over an Internet Protocol network.
85
MIB
Management Information Base - a Simple Network Management Protocol (SNMP) flat-file, nonrelational database that describes devices being monitored.
86
MIMO
Multiple Input, Multiple Output - a 4g wireless tech is an antenna technology for wireless communications in which multiple antennas are used at both the source and receiver
87
MU-MIMO
Multiuser - Multiple Input, Multiple Output - a 5g wireless tech allows a WiFi router to communicate with multiple devices simultaneously
88
MOU
Memorandum of Understanding - an agreement between two or more parties outlined in a formal document. It is not legally binding
89
MPLS
Multiprotocol Label Switching - a routing technique in telecommunications networks that directs data from one node to the next based on labels
90
MSS
Maximum Segment Size - the largest amount of data, specified in bytes, that a computer or communications device can handle in a single, unfragmented piece.
91
MTBF
Mean Time Between Failure - the predicted elapsed time between inherent failures of a mechanical or electronic system during normal system. You want this to be as high as possible
92
MT-RJ
Mechanical Transfer - Registered Jack - a type of connector used in fiber optic cabling.
93
MTTR
Mean Time to Repair - the average time it takes to repair a system . you want this to be as low as possible
94
MTU
Maximum Transmission Unit - the largest packet or frame size, specified in octets (eight-bit bytes) that can be sent in a packet- or frame-based network.
95
MX
Mail Exchange - record specifies the mail server responsible for accepting email messages its not an ip address its a name
96
NAC
Network Access Control - a security solution that enforces policy on devices that access networks to increase network visibility and reduce risk.
97
NAS
Network Attached Storage - file-level computer data storage server connected to a computer network providing data access
98
NAT
Network Address Translation - the process of mapping an internet protocol (IP) address to another by changing the header of IP packets while in transit via a router
99
NDA
Non-Disclosure Agreement - a legally binding contract that establishes a confidential relationship. The party or parties signing the agreement agree that sensitive information they may obtain will not be made available to any others.
100
NDP
Neighbor Discovery Protocol - a protocol of the Internet protocol suite used with Internet Protocol Version 6. allows different nodes on the same link to advertise their existence to their neighbors
101
NFV
Network Function Virtualization - the replacement of network appliance hardware with virtual machines. The virtual machines use a hypervisor to run
102
NGFW
Next-Generation Firewall - filter traffic and apply complex rules based on application.
103
NIC
Network Interface Card - a computer hardware component that connects a computer to a computer network.
104
NIDS
Network Intrusion Detection System - attempt to detect cyber attacks, malware, denial of service (DoS) attacks or port scans on a computer network
105
NIPS
Network Intrusion Prevention System - a type of network security software that detects malicious activity on a network, reports information about said activity, and takes steps to block or stop the activity from occurring automatically.
106
NS
Name Server - a server that stores the DNS records, such as address (A, AAAA) records, name server (NS) records, and mail exchanger (MX) records
107
NTP
Network Time Protocol - a networking protocol for clock synchronization between computer systems over packet-switched
108
OID
Object Identifier - an identifier mechanism standardized by the International Telecommunication Union and ISO/IEC for naming any object, concept, or "thing" with a globally unambiguous persistent name
109
OSI
Open Systems Interconnection - 7 layer model created by the International Organization for Standardization
110
OSPF
Open Shortest Path First - a link-state routing protocol that was developed for IP networks. Large, scalable routing protocoL
111
OTDR
Optical Time Domain Reflectometer - a precision instrument used to locate events or faults along a fiber link, typically within an optical communications network.
112
PaaS
Platform as a Service - No servers, no software, enables software developers to build, run, and manage software applications
113
PAN
Personal Area Network - Your own private network Bluetooth, IR, NFC
114
PAT
Port Address Translation - an extension of Network Address Translation (NAT) that permits multiple devices on a LAN to be mapped to a single public IP address
115
PC
Personal Computer -
116
PDU
Power Distribution Unit - a device for controlling electrical power in a data center. The most basic PDUs are large power strips
117
PoE
Power over Ethernet - describes any of several standards or ad hoc systems that pass electric power along with data on twisted-pair Ethernet cabling.
118
POP3
Post Office Protocol version 3 (110) - is used to allow a workstation to retrieve mail that the server is holding for it
119
PSK
Pre-Shared Key - basically just a shared secret or password that is used to authenticate an individual attempting to join a wireless network
120
PTR
Pointer Record - The reverse of an A or AAAA record provides the domain name associated with an IP address.
121
QoS
Quality of Service - the description or measurement of the overall performance of a service,
122
QSFP
Quad Small Form-factor Pluggable- network transceivers 4-channel SFP = Four 1 Gbit/s = 4 Gbit/s supports Ethernet, Fiber Channel, InfiniBand and SONET/SDH
123
RA
Router Advertisements - used for IPv6 auto-configuration and routing. messages are sent by the router periodically and in response to solicitations
124
RADIUS
Remote Authentication Dial-In User Service - networking protocol that provides centralized authentication, authorization, and accounting management for users who connect and use a network service.
125
RAID
Redundant Array of Inexpensive (or Independent) Disks - data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.
126
RDP
Remote Desktop Protocol(3389) - developed by Microsoft Corporation which provides a user with a graphical interface to connect to another computer over a network connection.
127
RF
Radio Frequency - oscillation rate of an alternating electric current or voltage or of a magnetic, electric or electromagnetic field
128
RFC
Request for Comment - a formal document from the Internet Engineering Task Force
129
RFID
Radio Frequency Identification - uses radio waves to identify people or objects. reads information contained in a wireless device or “tag” from a distance without making any physical contact
130
RG
Radio Guide - is the original military specification for coaxial cables. The RG number refers to the cable's diameter. RG-6, RG-59, and RG-11 are fairly common
131
RIP
Routing Internet Protocol - distance-vector routing protocol. send all or a portion of their routing tables in routing-update messages to their neighbors.
132
RJ
Registered Jack - a standardized telecommunication network interface for connecting voice and data equipment to a service provided rj11 found in old telephones rj45 found on most ethernet cables
133
RPO
Recovery Point Objective - the maximum acceptable amount of data loss after an unplanned data-loss incident, expressed as an amount of time.
134
RSSI
Received Signal Strength Indication - a measurement of how well your device can hear a signal from an access point or router
135
RTO
Recovery Time Objective - The overall length of time an information system's components can be in the recovery phase before negatively impacting the organization's mission or mission/business processes.
136
RTSP
Real Time Streaming Protocol - an application-level network protocol designed for multiplexing and packetizing multimedia transport
137
SaaS
Software as a Service - software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted. google docs, sheets,
138
SAN
Storage Area Network - high-speed network that provides network access to storage devices.
139
SC
Standard Connector/Subscriber Connector - A fiber-optic cable connector that uses a push-pull latching mechanism similar to common audio and video cables
140
SCADA
Supervisory Control and Data Acquisition - is a system that aims to monitor and control field devices at your remote sites.
141
SCP
Secure Copy Protocol(22) - is a means of securely transferring computer files between a local host and a remote host or between two remote hosts.
142
SDN
Software-Defined Network - enables dynamic, programmatically efficient network configuration in order to improve network performance and monitoring
143
SDWAN
Software-Defined WAN - a wide area network that uses software-defined network technology, such as communicating over the Internet using overlay tunnels which are encrypted when destined for internal organization locations.
144
SFP
Small Form-factor Pluggable - a compact, hot-pluggable network interface module format used for both telecommunication and data communications applications.
145
SFTP
Secure File Transfer Protocol(22) - SSH File Transfer Protocol is a network protocol that provides file access, file transfer, and file management over any reliable data stream
146
SIEM
Security Information and Event Management - a field within the field of computer security, where software products and services combine security information management and security event management.
147
SIP
Session Initiation Protocol(5060, 5061) - a signaling protocol used for initiating, maintaining, and terminating communication sessions that include voice, video and messaging applications.
148
SLA
Service Level Agreement - contract between a service provider and its customers that documents what services the provider will furnish and defines the service standards the provider is obligated to meet.
149
SLAAC
Stateless Address Auto-Configuration - the process that IPv6 nodes (hosts or routers) use to automatically configure IPv6 addresses for interfaces.
150
SMB
Server Message Block(445) - a client-server communication protocol used for sharing access to files, printers, serial ports
151
SMTP
Simple Mail Transfer Protocol(587) - Internet standard communication protocol for electronic mail transmission. Mail servers and other message transfer agents use SMTP to send and receive mail messages.
152
SNMP
Simple Network Management Protocol - an Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behaviour.
153
SOA
Start of Authority - resource record in the Domain Name System containing administrative information about the zone, especially regarding zone transfers
154
SOHO
Small Office Home Office - refers to the category of business or cottage industry that involves from 1 to 10 workers.
155
SPAN
Switched Port Analyzer - which is sometimes called port mirroring or port monitoring, selects network traffic for analysis by a network analyzer.
156
SQL
Structured Query Language - a programming language for storing and processing information in a relational database.
157
SRV
Service Record - a specification of data in the Domain Name System defining the location, i.e., the hostname and port number, of servers for specified services.
158
SSD
Solid-State Drive - a solid-state storage device that uses integrated circuit assemblies to store data persistently,
159
SSH
Secure Shell(22) - a cryptographic network protocol for operating network services securely over an unsecured network. Its most notable applications are remote login and command-line execution.
160
SSID
Service Set Identifier - a sequence of characters that uniquely names a Wi-Fi network. An SSID is sometimes referred to as a network name.
161
SSL
Secure Sockets Layer(443) - a cryptographic protocol designed to provide communications security over a computer network. The protocol is widely used in applications such as email, instant messaging, and voice over IP,(replaced by TLS)
162
SSO
Single Sign-On - an authentication scheme that allows a user to log in with a single ID to any of several related, yet independent, software systems.
163
ST
Straight Tip or Snap Twist - is a connector used in fiber-optic cables that utilizes a bayonet-style plug and socket
164
STP
Spanning Tree Protocol - a network protocol that builds a loop-free logical topology for Ethernet networks prevent bridge loops
165
SYSLOG
System Log - linux a protocol that computer systems use to send event data logs to a central location for storage
166
TACACS+
Terminal Access Controller Access Control System Plus(49) - refers to a family of related protocols handling remote authentication and related services for network access control through a centralized server.
167
TAP
Terminal Access Point - an external network device that enables port mirroring and creates copies of traffic for use by various monitoring devices
168
TCP
Transmission Control Protocol - 3 way handshake layer 4 protocol
169
TFTP
Trivial File Transfer Protocol - a simple lockstep File Transfer Protocol which allows a client to get a file from or put a file onto a remote host.
170
TIA/EIA
Telecommunications Industry Association/Electronic Industries Alliance - structured cabling standards define how to design, build, and manage a cabling system that is structured,
171
TKIP
Temporal Key Integrity Protocol - a security protocol used in the IEEE 802.11 wireless networking standard.
172
TLS
Transport Layer Security(443) - cryptographic protocol designed to provide communications security over a computer network. (replaced SSL)
173
TTL
Time to Live - a value for the period of time that a packet, or data, should exist on a computer or network before being discarded.
174
TX/RX
Transmit and Receive
175
UDP
User Datagram Protocol - layer 4 UDP does not require prior communication to set up communication channels or data paths
176
UPC
Ultra-Physical Contact - It is an improvement of the PC fiber connector with a better surface finish after an extended polishing
177
UPS
Uninterruptible Power Supply - a back up battery that takes over when power goes out
178
URL
Uniform Resource Locator - a reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it
179
USB
Universal Serial Bus - an industry standard that establishes specifications for cables, connectors and protocols for connection,
180
UTM
Unified Threat Management - when multiple security features or services are combined into a single device within your network.
181
UTP
Unshielded Twister Pair - a ubiquitous type of copper cabling used in telephone wiring and local area networks (LANs). has no foil sheilding
182
VIP
Virtual IP - IP addresses that are not tethered to particular machines.
183
VLAN
Virtual Local Area Network - a logical overlay network that groups together a subset of devices that share a physical LAN, isolating the traffic for each group.
184
VM
Virtual Machine - a compute resource that uses software instead of a physical computer to run programs and deploy apps.
185
VNC
Virtual Network Computing - a graphical desktop-sharing system that uses the Remote Frame Buffer protocol (RFB) to remotely control another computer.
186
VNIC
virtual Network Interface Card - virtual network interfaces that are based on the physical network interface cards of a host.
187
VoIP
Voice over Internet Protocol(5060) - is a method and group of technologies for the delivery of voice communications and multimedia sessions over Internet
188
VPN
Virtual Private Network - a mechanism for creating a secure connection between a computing device and a computer network, or between two networks
189
VRRP
Virtual Router Redundancy Protocol - a computer networking protocol that provides for automatic assignment of available Internet Protocol (IP) routers to participating hosts
190
vSwitch
Virtual Switch - allows virtual machines created on Hyper-V hosts to communicate with other computers.
191
WAN
Wide Area Network - the technology that connects your offices, data centers, cloud applications, and cloud storage together.
192
WAP
Wireless Access Point - An access point is a device that creates a wireless local area network,
193
WDM
Wavelength Division Multiplexing - a fiber-optic transmission technique that enables the use of multiple light wavelengths
194
WEP
Wired Equivalent Privacy - a security algorithm for 802.11 wireless networks. encrypting data transmitted over the WLAN
195
WLAN
Wireless Local Area Network -a wireless computer network that links two or more devices using wireless communication to form a local area network within a limited area such as a home,
196
WPA
WiFi Protected Access - a security standard for computing devices equipped with wireless internet connections.
197
WPS
Wi-Fi Protected Setup - allows the owner of Wi-Fi privileges to block other users from using their household Wi-Fi. The owner can also allow people to use Wi-Fi. This can be changed by pressing the WPS button on the home router.