Acronyms Flashcards

1
Q

AUP

A

Acceptable Use Policy: A policy that identifies what users of a network are and are not allowed to do on that network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ACL

A

Access Control List: Rules typically applied to router interfaces to specify permitted and denied traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A

A

Address: A DNS record that maps a hostname to and IPV4 Address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ARP

A

Adress Resolution Protocol: (request) A broadcast asking for the MAC address corresponding to a known IP address. An ARP (reply) contains the requested MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AES

A

Advanced Encryption Standard: A symmetric block cipher implemented in hardware and software that protects sensitive or confidential data through encryption. AES offers various levels of strength.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

APC

A

Angled Phy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AD

A

Administrative Distance: A routing protocol’s index of believability. Routing protocols with a smaller AD are considered more believable than routing protocols with a higher AD.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

APIPA

A

Automatic Private IP Addressing: A feature that allows a networked device to self assign an IP address from the 169.254.0.0/16 network. This address is usable only on the device’s local subnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

BGP

A

Border Gateway Protocol: A path-vector routing protocol that can use as its metric the number of autonomous system hops that must be transited to reach a destination network, as opposed to the number of required router hops. Considered to be the protocol that runs the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CAN

A

Campus are network: An interconnection of networks located in nearby buildings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CSMA/CD

A

Carrier-sense multiple access with collision detection: A media access control method used on an Ethernet network to help prevent collisions from occurring and to recover if collisions do occur. CSMA/CD is only needed on half-duplex connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CIDR

A

Classless interdomain Routing: A process that involves shortening a classful subnet mask by removing right-justified 1s from a classful mask. As a result, CIDR allows contiguous classful networks to be aggregated. Sometimes called route aggregation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CDMA

A

Code-division multiple access: A technology that allows several transmitters to send information simultaneously over a single communication channel so that several users can share a band of frequencies. Used as the access method in many mobile phone standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CWDM

A

Courses wavelength division multiplexing: A technology that allows up to 18 channels to be connected over a dark fiber pair.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DaaS

A

Data as a service: A cloud-based service that uses software tools for working with data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DoS

A

Denial of Service: A type of attack that floods a system with an excessive amount of traffic or requests, consuming the system’s processing resources and preventing the system from responding to many legitimate requests.

17
Q

DWDM

A

Dense wavelength-division multiplexing: An optical multiplexing technology used to increase bandwidth over existing fiber networks. DVDM works by combining and transmitting multiple signals simultaneously at different wavelengths on the same fiber.

18
Q

DSL

A

Digital subscriber line: A group of technologies that provide highspeed data transmission over existing telephone wiring.

19
Q

DRP

A

Disaster Recovery Plan: A documented process to execute an organization’s disaster recovery process.

20
Q

DDoS

A

Distributed denial-of-service: An attack that can increase the amount of traffic flooded to a target system. Specifically, an attacker compromises multiple systems, and those compromised systems, called zombies, can be instructed by the attacker to simultaneously launch a DDoS attack against a target system.

21
Q

DAI

A

Dynamic ARP Inspection: a feature that ensures that MAC addresses coordinate to the Layer 3 addresses as they should.

22
Q

DNS

A

Domain Name System: A system that resolves a domain name to a corresponding IP address.

23
Q

DHCP

A

Dynamic Host Configuration Protocol: A protocol that dynamically assigns IP address information to network devices.

24
Q

ESP

A

Encapsulating Security Payload: An IPsec protocol that provides authentication, integrity, and encryption services.

25
Q

EIGRP

A

Enhanced Interior Gateway Routing Protocol: A Cisco-proprietary protocol that is popular in Cisco-only networks but less popular in mixed-vendor networks.

26
Q

EGP

A

Exterior Gateway Protocol: A routing protocol that operates between autonomous systems, which are networks under different administrative control. BGP is the only EGP in widespread use today.