Acronyms Flashcards
AAAA
Authentication, authorization, accounting, auditing
ACL
Access Control List
AES
Advanced Encryption Standard
-symmetric key encryption (not used for key exchanges)
AH
Authentication Header
AP
Access Point
APC
Angled Physical Contact
APIPA
Automatic Private Internet Protocol Addressing
ARP
Address Resolution Protocol
-creates binding between IP address and MAC address inside LAN
-arp table sets on routers and switches so data can be moved through routers with ip and then transferred to mac on the switch of right network and sent to client.
AUP
Acceptable Use Policy
BGP
Border Gateway Protocol
BNC
British Naval Connector/Bayonet Neill-Concelman
BYOD
Bring Your Own Device
CAM
Content Addressable Memory (table)
CAN
Campus Area Network
CDMA
Code Devision Media Access
Do not use SIM cards
Provider manage handset
Requires each subscriber device to use a code to key the modulation of their signal
CIA
Confidentiality, Integrity, and Availability
CIDR
Classless Inter-Domain Routing
CLI
Command Line Interface
CNAME
Canonical Name
CPU
Central Processing Unit
CRC
Cyclic Redundancy Check
CSMA/CA
Carrier-Sense Multiple Access with Collision Avoidance
CSU
Channel Service Unit
CVE
Common Vulnerabilities and Exposures
CWDM
Coarse Wavelength Division Multiplexing
DaaS
Desktop as a Service
dB
Decibel
DDoS
Distributed Denial of Service
-multiple attackers asking one victim for services
DHCP
Dynamic Host Configuration Protocol
DLP
Data Loss Prevention
DNS
Domain Name System
DoS
Denial of Service
-1 machine floods a victim with requests for services
-tcp syn flood (tcp handshakes that never completed by masking server send syn ack to a spoofed ips
-Smurf attack (icmp flood): attacker sends ping to subnet broadcast with spoofed source ip set to be the ip of the victim server
DSL
Digital Subscriber Line
DSU
Data Service Unit
DWDM
Dense Wavelength Devision Multiplexing
EAP
Extensible Authentication Protocol
-uses different mechanisms of authentication
EIA
Electronic Industries Association
EIGRP
Enhance Interior Gateway Routing Protocol
EIRP
Effective Isotropic Radiated Power
ESP
Encapsulating Security Protocol
EUI
Extended Unique Identifier
FCoE
Fibre Channel over Ethernet
FHRP
First Hop Redundancy Protocol
FTP
File Transfer Protocol
GBIC
Gigabit Interface Converter
GRE
Generic Routing Encapsulation
-tunneling protocol / does not provide encryption
-think of ferry encapsulate car over water
GSM
Global System for Mobile Communication
-use TDMA (time division multiple access)
-subscribers can use SIM card on an unlocked handset
HA
High Availability
HDMI
High Definition Multimedia Interface
HTTP
Hypertext Transfer Protocol
HTTPS
Hypertext Transfer Protocol Secure
HVAC
Heating, Ventilation and Air Conditioning
IaaS
Infrastructure as a Service
Microsoft’s azure virtual machines
Amazon’s elastic compute cloud
ICMP
Internet Control Message Protocol
ICS
Industrial Control System
IDF
Intermediate Distribution Frame
IDS
Intrusion Detection System
IGMP
Internet Group Management Protocol
IMAP
Internet Message Access Protocol
IoT
Internet of Things
IP
Internet Protocol
IPS
Intrusion Prevention System
-uses bits of patterns called data signatures to identify common network attacks
IPSec
Internet Protocol Security
-used in securing key exchange during establishment of client to server vpn connection
-uses ISAKMP
IPv4
Internet Protocol version 4
IPv6
Internet Protocol version 6
iSCSI
Internet Small Computer Systems Interface
ISP
Internet Service Provider
LACP
Link Aggregation Control Protocol
LAN
Local Area Network
LC
Logic Connector
LDAP
Lightweight Directory Access Protocol
LDAPS
Lightweight Directory Access Protocol (over SSL)
LED
Light-Emitting Diode
LTE
Long-Term Evolution
-converged 4G standard supported by both GSM and CDMA network providers, but the network providers must install SIM card on the phone
MAC
Media Access Control / Medium Access Control
MAN
Metropolitan Area Network
MDF
Main Distribution Frame
MDIX
Medium Dependent Interface Crossover
MIB
Management Information Base
-collection of definitions which define the properties of the managed object within the device to be managed.
MIMO
Multiple Input, Multiple Output
MU-MIMO
Multiuser - Multiple Input, Multiple Output
MOU
Memorandum of Understanding
MPLS
Multiprotocol Label Switching
MTBF
Mean Time Between Failure
MT-RJ
Mechanical Transfer - Registered Jack
MTTR
Mean Time To Repair
MTU
Maximum Transmission Unit
MX
Mail Exchange
NAC
Network Access Control
-ensure device is scanned to determine state of security prior to being allowed network access
NAS
Network Attached Storage
NDA
Non-Disclosure Agreement
NFV
Network Function Virtualization
-way to reduce cost and accelerate service deployment for network operators by decoupling functions like a firewall or encryption from dedicated hardware and moving them to virtual servers.
NGFW
Next Generation Firewall
NIC
Network Interface Card
NS
Name Server
NTP
Network Time Protocol
OID
Object Identifier
OSI
Open Systems Interconnection
OSPF
Open Shortest Path First
OTDR
Optical Time Domain Reflectometer
PaaS
Platform as a Service
SQL database is an example
PAN
Personal Area Network
PAT
Post Address Translation
PDU
Power Distribution Unit
PoE
Power over Ethernet
POP3
Post Office Protocol version 3
PSK
Pre-Shared Key
PTR
Pointer Record
QoS
Quality of Service
QSFP
Quad Small Form-Factor Pluggable
RA
Router Advertisements
RADIUS
Remote Authentication Dial-In User Service
-802.1x standard uses RADIUS for authentication
RAID
Redundant Array of Independent Disks
RDP
Remote Desktop Protocol
RF
Radio Frequency
RFC
Request for Conner
RG
Radio Guide
RJ
Registered Jack
RPO
Recovery Point Objective
RTSP
Real Time Streaming Protocol
SaaS
Software as a Service
I.e 0365
SAN
Storage Area Network
SC
Standard Connector/ Subscriber Connector
SCADA
Supervisory Control and Data Acquisition
SDN
Software-Defined Network
SDWAN
Software-Defined WAN
SFP
Small Form-factor Pluggable
SFTP
Secure File Transfer Protocol
SIEM
Security Information and Event Management
SIP
Session Initiation Protocol
SLA
Service Level Agreement
SLAAC
Stateless Address Auto-Configuration
SMB
Server Message Block
SMTP
Simple Mail Transfer Protocol
SOA
State of Authority
SOHO
Small Office Home Office
SQL
Structured Query Language
SRV
Service Record
SSD
Solid State Drive
SSH
Secure Shell
SSID
Service Set Identifier
SSO
Single Sign-On
ST
Straight Tip or Snap Twist
STP
Spanning Tree Protocol
Syslog
System Log
TACACS+
Terminal Access Controller Access Control System Plus
-uses 802.1x protocol
TCP
Transmission Control Protocol
TFTP
Trivial File Transfer Protocol
TIA / EIA
Telecommunications Industry Association / Electronics Industries Alliance
TKIP
Temporal Key Integrity Protocol
-encryption protocol included in 802.11i standard for wireless LANs (WLANs)
TLS
Transport Layer Security
TTL
Time To Live
TX/RX
Transmit and Receive
UDP
User Datagram Protocol
UPC
Ultra-Physical Contact
UPS
Uninterruptible Power Supply
URL
Uniform Resource Locator
USB
Universal Serial Bus
UTP
Unshielded Twisted Pair
VIP
Virtual IP
VLAN
Virtual Local Area Network
VM
Virtual Machine
VNC
Virtual Network Computing
vNIC
virtual Network Interface Card
VoIP
Voice over Internet Protocol
VPN
Virtual Private Network
WAN
Wide Area Network
WAP
Wireless Access Point
WDM
Wavelength Devision Multiplexing
WLAN
Wireless Local Area Network
WPA
WiFi Protected Access
EAP-MD5
Variant of Extensible authentication protocol
-uses passwords and the challenge handshake
-one way authentication process so you must use long and strong passwords
EAP-TLS
-variant of extensible authentication protocol
-uses public key infrastructure
-mutual authentication
-use digital certificates instead of passwords
EAP-TTLS
-variant of extensible authentication protocol
-uses digital certificate on server and password on client
-more secure than md5, but less than TLS variant
EAP-FAST
EAP Flexible Authentication via Secure Tunneling
-protected access credentials instead of a certificate to establish mutual connection
PEAP
Protected EAP
-uses server certificates and AD database to authenticate password from client
MITM
Man in the Middle attack
DNS poisoning
Attacker manipulates vulnerabilities in dns to reroute traffic to fake version of a site
DNSSEC
Secure DNS
Uses encrypted digital signatures when passing dns information between servers to protect from poisoning.
ISAKMP
Internet Security Association and Key Management Protocol
-key protocol in IPsec architecture
-common framework for agreeing to the format of security associations (SA) attributes and for negotiating, modifying, and deleting SAs.
—there may be many key exchange protocols with different security properties, ISAKMP provides common framework
VLSM
Variable-Length Subnet Masking
-allows subnets of various sizes
-would not be able to use /25, /27, etc