Acronyms Flashcards

1
Q

ACL

A

Access Control List - Rules typically applied to router interfaces, which specify permitted and denied
traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AH

A

Authentication Header - An IPsec protocol that provides authentication and integrity services. However, it does not provide encryption services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AP

A

Access Point - a networking hardware device that allows other Wi-Fi devices to connect to a wired network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

API

A

Application Programming Interface - a system of tools and resources in an operating system, enabling developers to create software applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

APIPA

A

Automatic Private IP Addressing - Allows a networked device to self-assign an IP address from the 169.254.0.0/ 16 network; address is only usable on the device’s local subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ARP

A

Address Resolution Protocol - An ARP request is a broadcast asking for the MAC address corresponding to a known IP address. An ARP reply contains the requested MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AUP

A

Acceptable Use Policy - Identifies what users of a network are and are not allowed to do on that
network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

BGP

A

Border Gateway Protocol - a path-vector routing protocol, meaning that it can use as its metric the number of autonomous system hops that must be transited to reach a destination network, as opposed to the number of required router hops; considered to
be the routing protocol that runs the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

BNC

A

Bayonet Neill-Concelman - a type of connector for coaxial cables that allows for quick connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

BSSID

A

Basic Service Set Identifier - it’s the MAC (Media Access Control) physical address of the access point or wireless router that is used to connect to the WiFi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

BYOD

A

Bring Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CAM

A

Content - Addressable Memory - a special type of computer memory used in certain very-high-speed searching applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CDN

A

Content Delivery Network - a network of interconnected servers that speeds up webpage loading for data-heavy applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CDP

A

Cisco Discovery Protocol - a Cisco-proprietary protocol that allows Cisco devices to communicate and share information about each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CIA

A

Confidentiality Integrity Availability - protecting information from unauthorized access (confidentiality), ensuring data accuracy and consistency (integrity), and guaranteeing timely access to information when needed (availability)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CIDR

A

Classless Inter-Domain Routing - allows network routers to route data packets to the respective device based on the indicated subnet. Instead of classifying the IP address based on classes, routers retrieve the network and host address as specified by the CIDR suffix.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CLI

A

Command Line Interface - a means of interacting with a computer program by inputting lines of text called command lines; CMD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CNAME

A

Canonical Name - a type of resource record in the Domain Name System that maps one domain name to another; convenient when running multiple services from a single IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CPU

A

Central Processing Unit - the primary processor in a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

CRC

A

Cyclic Redundancy Check - a mathematical method that detects errors in data transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

DAC

A

Direct Attach Copper - a twinax copper cable that connects directly the ports (or line cards) within active equipment, such as switches, routers, servers or data storage devices, in a data network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

DAS

A

Direct - Attached Storage - digital storage directly attached to the computer accessing it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

DCI

A

Data Center Interconnect - a network that connects data centers to share data and resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

DDoS

A

Distributed Denial of Service - a cyberattack that floods a target with traffic from many different sources to overwhelm its resources and disrupt services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

DHCP

A

Dynamic Host Configuration Protocol - a system for assigning Internet Protocol (IP) addresses to each network device (known as a host) on an organization’s network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

DLP

A

Data Loss Prevention - a cybersecurity strategy that protects sensitive data from unauthorized access, use, or transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

DNS

A

Domain Name System - a system that translates domain names into IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

DNSSEC

A

Domain Name System Security Extensions - a feature of the Domain Name System (DNS) that authenticates responses to domain name lookups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

DoH

A

DNS over HTTPS - a protocol for performing remote Domain Name System (DNS) resolution via the HTTPS protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

DoS

A

Denial of Service - a cyberattack that floods a target with traffic from a single source to overwhelm its resources and disrupt services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

DoT

A

DNS over Transport Layer Security - a network security protocol for encrypting and wrapping Domain Name System (DNS) queries and answers via the Transport Layer Security (TLS) protocol; to increase user privacy and security by preventing eavesdropping and manipulation of DNS data via man-in-the-middle attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

DR

A

Disaster Recovery - an organization’s ability to restore access and functionality to IT infrastructure after a disaster event, whether natural or caused by human action (or error)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

EAPoL

A

Extensible Authentication Protocol over LAN - a network port authentication protocol used in IEEE 802.1X (Port Based Network Access Control) developed to give a generic network sign-on to access network resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

EIGRP

A

Enhanced Interior Gateway Routing Protocol - a network protocol that enables routers to exchange information more efficiently than earlier network protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

EOL

A

End of Life

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

EOS

A

End of Support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

ESP

A

Encapsulating Security Payload - provides origin authenticity through source authentication, data integrity through hash functions and confidentiality through encryption protection for IP packets; also supports encryption-only and authentication-only configurations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

ESSID

A

Extended Service Set Identifier - a wireless network, created by multiple access points, which appears to users as a single, seamless network, such as a network covering a home or office that is too large for reliable coverage by a single access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

EULA

A

End User License Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

FC

A

Fiber Channel - a high-speed data transfer protocol providing in-order, lossless delivery of raw block data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

FHRP

A

First Hop Redundancy Protocol - a computer networking protocol which is designed to protect the default gateway used on a subnetwork by allowing two or more routers to provide backup for that address; in the event of failure of an active router, the backup router will take over the address, usually within a few seconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

FTP

A

File Transfer Protocol - a standard network protocol used for the transfer of files from one host to another over a TCP-based network, such as the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

GDPR

A

General Data Protection Regulation - a European Union regulation on information privacy in the European Union and the European Economic Area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

GRE

A

Generic Routing Encapsulation - a tunneling protocol developed by Cisco Systems that can encapsulate a wide variety of network layer protocols inside virtual point-to-point links or point-to-multipoint links over an Internet Protocol network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

GUI

A

Graphical User Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

HTTP

A

Hypertext Transfer Protocol - an application layer protocol in the Internet protocol suite model for distributed, collaborative, hypermedia information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

HTTPS

A

Hypertext Transfer Protocol Secure - an extension of the Hypertext Transfer Protocol (HTTP). It uses encryption for secure communication over a computer network, and is widely used on the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

IaaS

A

Infrastructure as a Service - a cloud computing model that provides on-demand access to computing resources such as servers, storage, networking, and virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

IaC

A

Infrastructure as Code - the ability to provision and support your computing infrastructure using code instead of manual processes and settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

IAM

A

Identity and Access Management - a framework of policies and technologies to ensure that the right users have the appropriate access to technology resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

ICMP

A

Internet Control Message Protocol - is used for reporting errors and performing network diagnostics. In the error reporting process, ICMP sends messages from the receiver to the sender when data does not come though as it should.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

ICS

A

Industrial Control System - the structured network design used to connect and manage industrial automation devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

IDF

A

Intermediate Distribution Frame - a distribution frame in a central office or customer premises, which cross connects the user cable media to individual user line circuits and may serve as a distribution point for multipair cables from the main distribution frame (MDF) or combined distribution frame (CDF) to individual cables connected to equipment in areas remote from these frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

IDS

A

Intrusion Detection System - a network security tool that monitors network traffic and devices for known malicious activity, suspicious activity or security policy violations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

IoT

A

Internet of Things - devices with sensors, processing ability, software and other technologies that connect and exchange data with other devices and systems over the Internet or other communication networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

IIoT

A

Industrial Internet of Things - the use of smart sensors, actuators and other devices, such as radio frequency identification tags, to enhance manufacturing and industrial processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

IKE

A

Internet Key Exchange - the protocol used to set up a security association (SA) in the IPsec protocol suite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

IP

A

Internet Protocol - the network layer communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

IPAM

A

Internet Protocol Address Management - a methodology implemented in computer software for planning and managing the assignment and use of IP addresses and closely related resources of a computer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

IPS

A

Intrusion Prevention System - network security appliances that monitor network or system activities for malicious activity; main functions are to identify malicious activity, log information about this activity, report it and attempt to block or stop it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

IPSec

A

Internet Protocol Security - a secure network protocol suite that authenticates and encrypts packets of data to provide secure encrypted communication between two computers over an Internet Protocol network; used in virtual private networks (VPNs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

IS-IS

A

Intermediate System to Intermediate System - a routing protocol designed to move information efficiently within a computer network, a group of physically connected computers or similar devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

LACP

A

Link Aggregation Control Protocol - a standards-based method to control the bundling of several physical network links together to form a logical channel for increased bandwidth and redundancy purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

LAN

A

Local Area Network - a collection of devices connected together in one physical location, such as a building, office, or home

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

LC

A

Local Connector - Fiber Connector; most common; Square body with tabs, often paired.

66
Q

LDAP

A

Lightweight Directory Access Protocol - a vendor-neutral software protocol used to lookup information or devices within a network

67
Q

LDAPS

A

Lightweight Directory Access Protocol over SSL - a secure version of LDAP that encrypts communication between clients and servers

68
Q

LLDP

A

Link Layer Discovery Protocol - a layer 2 neighbor discovery protocol that allows devices to advertise device information to their directly connected peers/neighbors

69
Q

MAC

A

Media Access Control - a unique identifier assigned to a network interface controller (NIC) for use as a network address in communications within a network segment

70
Q

MDF

A

Main Distribution Frame - a signal distribution frame for connecting equipment (inside plant) to cables and subscriber carrier equipment (outside plant)

71
Q

MDIX

A

Medium Dependent Interface Crossover - the interface (both physical and electrical/optical) in a computer network from a physical-layer implementation to the physical medium used to carry the transmission

72
Q

MFA

A

Multifactor Authentication - an electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence (or factors) to an authentication mechanism; AKA 2FA (2 Factor Authentication)

73
Q

MIB

A

Management Information Base - a database used for managing the entities in a communication network

74
Q

MPO

A

Multifiber Push On - a fiber optic connector that combines multiple optical fibers into one interface

75
Q

MTBF

A

Mean Time Between Failure - a measure of the reliability of a system or component; the average time that a system or component will operate before it fails

76
Q

MTTR

A

Mean Time To Repair - the average time it takes to recover from a product or system failure; from the time the system or product fails to the time that it becomes fully operational again

77
Q

MTU

A

Maximum Transmission Unit - the largest packet or frame size, specified in octets (eight-bit bytes) that can be sent in a packet- or frame-based network

78
Q

MX

A

Mail Exchange - involves the use of DNS records and the transport pipeline to route emails to authorized mail servers

79
Q

NAC

A

Network Access Control - a security method that controls who and what can access a network

80
Q

NAS

A

Network Attached Storage - a file-level computer data storage server connected to a computer network providing data access to a different group of clients

81
Q

NAT

A

Network Address Translation - a method of mapping an IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device

82
Q

NFV

A

Network Functions Virtualization - a network architecture concept that leverages IT virtualization technologies to virtualize entire classes of network node functions into building blocks that may connect, or chain together, to create and deliver communication services

83
Q

NIC

A

Network Interface Card - a computer hardware component that connects a computer to a computer network

84
Q

NS

A

Name Server - a computer application that implements a network service for providing responses to queries against a directory service

85
Q

NTP

A

Network Time Protocol - a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks

86
Q

NTS

A

Network Time Security - a secure version of NTP

87
Q

OS

A

Operating System

88
Q

OSPF

A

Open Shortest Path First - a routing protocol for Internet Protocol (IP) networks; gathers link state information from available routers and constructs a topology map of the network to compute the shortest path to the destination IP address

89
Q

OSI

A

Open Systems Interconnection - a reference model from the International Organization for Standardization (ISO) that “provides a common basis for the coordination of standards development for the purpose of systems interconnection.” 7 Layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application

90
Q

OT

A

Operational Technology - hardware and software that detects or causes a change, through the direct monitoring and/or control of industrial equipment, assets, processes and events

91
Q

PaaS

A

Platform as a Service - a cloud computing service model where users provision, instantiate, run and manage a modular bundle of a computing platform and applications, without the complexity of building and maintaining the infrastructure associated with developing and launching application(s), and to allow developers to create, develop, and package such software bundles

92
Q

PAT

A

Port Address Translation - a network technology that allows multiple devices to share a single public IP address

93
Q

PCI DSS

A

Payment Card Industry Data Security Standards - a set of guidelines that help organizations protect cardholder data

94
Q

PDU

A

Power Distribution Unit - a device fitted with multiple outputs designed to distribute electric power, especially to racks of computers and networking equipment located within a data center

95
Q

PKI

A

Public Key Infrastructure - a framework of tools, policies, and procedures that help secure digital communications; uses public-key cryptography to authenticate users and devices, and to encrypt and decrypt data

96
Q

PoE

A

Power over Ethernet - allows a single cable to provide both a data connection and enough electricity to power networked devices such as wireless access points (WAPs), IP cameras and VoIP phones

97
Q

PSK

A

Pre-Shared Key - a shared secret which was previously shared between the two parties using some secure channel before it needs to be used

98
Q

PTP

A

Precision Time Protocol - a protocol for clock synchronization throughout a computer network with relatively high precision and therefore potentially high accuracy

99
Q

PTR

A

Pointer - a variation of the sequence-to-sequence model with attention. Instead of translating one sequence into another, they yield a succession of pointers to the elements of the input series

100
Q

QoS

A

Quality of Service - the use of mechanisms or technologies that work on a network to control traffic and ensure the performance of critical applications with limited network capacity

101
Q

QSFP

A

Quad Small Form-factor Pluggable - a high-speed cable and transceiver that moves data between networking devices

102
Q

RADIUS

A

Remote Authentication Dial-In User Service - a networking protocol that provides centralized authentication, authorization, and accounting (AAA) management for users who connect and use a network service

103
Q

RDP

A

Remote Desktop Protocol - a proprietary protocol developed by Microsoft Corporation which provides a user with a graphical interface to connect to another computer over a network connection

104
Q

RFID

A

Radio Frequency Identifier - uses electromagnetic fields to automatically identify and track tags attached to objects

105
Q

RIP

A

Routing Information Protocol - a network protocol that helps routers exchange information about network topology; small to medium networks, max hop count of 15

106
Q

RJ

A

Registered Jack - a standardized telecommunication network interface for connecting voice and data equipment to a computer service provided by a local exchange carrier or long distance carrier

107
Q

RPO

A

Recovery Point Objective - the maximum acceptable interval during which transactional data is lost from an IT service

108
Q

RSTP

A

Rapid Spanning Tree Protocol - provides significantly faster spanning tree convergence after a topology change, introducing new convergence behaviors and bridge port roles to accomplish this

109
Q

RTO

A

Recovery Time Objective - the maximum acceptable amount of time for restoring a network or application and regaining access to data after an unplanned disruption

110
Q

RX

A

Receiver - a circuit that accepts signals from a transmission medium (which can be wireless or wired) and decodes or translates them into a form that can drive local circuits

111
Q

SaaS

A

Software as a Service - a cloud computing service model where the provider offers use of application software to a client and manages all needed physical and software resources

112
Q

SAML

A

Security Assertion Markup Language - an open standard for exchanging authentication and authorization data between parties, in particular, between an identity provider and a service provider

113
Q

SAN

A

Storage Area Network - a specialized, high-speed network that provides network access to storage devices

114
Q

SASE

A

Secure Access Service Edge - technology used to deliver wide area network (WAN) and security controls as a cloud computing service directly to the source of connection (user, device, Internet of things (IoT) device, or edge computing location) rather than a data center

115
Q

SC

A

Subscriber Connector - larger fiber connector with push-pull locking

116
Q

SCADA

A

Supervisory Control And Data Acquisition - a control system architecture comprising computers, networked data communications and graphical user interfaces for high-level supervision of machines and processes; covers sensors and other devices, such as programmable logic controllers, which interface with process plant or machinery

117
Q

SDN

A

Software Defined Network - an approach to network management that uses abstraction to enable dynamic and programmatically efficient network configuration to create grouping and segmentation while improving network performance and monitoring in a manner more akin to cloud computing than to traditional network management

118
Q

SD-WAN

A

Software-Defined Wide Area Network - a wide area network that uses software-defined networking technology, such as communicating over the Internet using overlay tunnels

119
Q

SFP

A

Small Form-factor Pluggable - a compact, hot-pluggable network interface module format used for both telecommunication and data communications applications

120
Q

SFTP

A

Secure File Transfer Protocol - a network protocol for securely accessing, transferring and managing large files and sensitive data

121
Q

SIP

A

Session Initiation Protocol - a signaling protocol used for initiating, maintaining, and terminating communication sessions that include voice, video and messaging applications

122
Q

SIEM

A

Security Information & Event Management - a field within computer security that combines security information management (SIM) and security event management (SEM) to enable real-time analysis of security alerts generated by applications and network hardware

123
Q

SLA

A

Service Level Agreement - an agreement between a service provider and a customer

124
Q

SLAAC

A

Stateless Address Auto Configuration - can automatically configure IPv6 host parameters on an IPv6 host without the need for manual configuration or a DHCP server

125
Q

SMB

A

Server Message Block - a communication protocol used to share files, printers, serial ports, and miscellaneous communications between nodes on a network

126
Q

SMTP

A

Simple Mail Transfer Protocol - an Internet standard communication protocol for electronic mail transmission

127
Q

SMTPS

A

Simple Mail Transfer Protocol Secure - a method for securing the SMTP using transport layer security

128
Q

SNMP

A

Simple Network Management Protocol - an Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior

129
Q

SOA

A

Start of Authority - a type of resource record in the Domain Name System (DNS) containing administrative information about the zone, especially regarding zone transfers

130
Q

SQL

A

Structured Query Language - a domain-specific language used to manage data

131
Q

SSE

A

Security Service Edge - a collection of SASE security services that can be implemented together with network services, like SD-WAN, to provide a complete solution

132
Q

SSH

A

Secure Shell - a cryptographic network protocol for operating network services securely over an unsecured network

133
Q

SSID

A

Service Set Identifier - a sequence of characters that uniquely names a Wi-Fi network;

134
Q

SSL

A

Secure Socket Layer - a security protocol that encrypts data sent between a server and a client

135
Q

SSO

A

Single Sign On - an authentication scheme that allows a user to log in with a single ID to any of several related, yet independent, software systems

136
Q

ST

A

Straight Tip - A fiber-optic cable connector that uses a bayonet plug and socket

137
Q

STP

A

Shielded Twisted Pair - a type of communications cable in which two conductors of a single circuit are twisted together for the purposes of improving electromagnetic compatibility with an electrically conductive barrier to attenuate electromagnetic waves external to the shield

138
Q

SVI

A

Switch Virtual Interface - a virtual routed interface that connects a VLAN on the device to the Layer 3 router engine on the same device

139
Q

TACACS+

A

Terminal Access Controller Access Control System Plus - a network security protocol that authenticates, authorizes, and accounts for users accessing a network

140
Q

TCP

A

Transmission Control Protocol - a standard protocol on the internet that ensures the reliable transmission of data between devices on a network

141
Q

TFTP

A

Trivial File Transfer Protocol - a simple high-level protocol for transferring data servers use to boot diskless workstations, X-terminals, and routers by using User Data Protocol (UDP)

142
Q

TTL

A

Time to Live - a mechanism which limits the lifespan or lifetime of data in a computer or network

143
Q

TX

A

Transmitter - an electronic device which produces radio waves with an antenna with the purpose of signal transmission up to a radio receiver

144
Q

TXT

145
Q

UDP

A

User Datagram Protocol - a connectionless protocol meaning that messages are sent without negotiating a connection and that UDP does not keep track of what it has sent

146
Q

UPS

A

Uninterruptible Power Supply

147
Q

URL

A

Uniform Resource Locator - a reference to a resource that specifies its location on a computer network and a mechanism for retrieving it; www.example.com

148
Q

USB

A

Universal Serial Bus

149
Q

UTM

A

Unified Threat Management - a network security system that combines multiple security features into a single device

150
Q

UTP

A

Unshielded Twisted Pair - a type of communications cable in which two conductors of a single circuit are twisted together for the purposes of improving electromagnetic compatibility

151
Q

VIP

A

Virtual Internet Protocol - an IP address that does not correspond to a physical network interface

152
Q

VLAN

A

Virtual Local Area Network - a virtualized connection that connects multiple devices and network nodes from different LANs into one logical network

153
Q

VLSM

A

Variable Length Subnet Mask - a computer networking technique to divide an IP network into subnets with different subnet masks

154
Q

VoIP

A

Voice over Internet Protocol - a technology that allows you to make voice calls using a broadband Internet connection instead of a regular (or analog) phone line

155
Q

VPC

A

Virtual Private Cloud - an on-demand configurable pool of shared resources allocated within a public cloud environment, providing a certain level of isolation between the different organizations using the resources

156
Q

VPN

A

Virtual Private Network - a network architecture for virtually extending a private network (i.e. any computer network which is not the public Internet) across one or multiple other networks which are either untrusted (as they are not controlled by the entity aiming to implement the VPN) or need to be isolated (thus making the lower network invisible or not directly usable)

157
Q

VXLAN

A

Virtual Extensible Local Area Network - a network virtualization technology that uses a VLAN-like encapsulation technique to encapsulate OSI layer 2 Ethernet frames within layer 4 UDP datagrams

158
Q

WAN

A

Wide Area Network

159
Q

WPA

A

Wi-fi Protected Access - a security standard that protects wireless networks by encrypting data and authenticating users

160
Q

WPS

A

Wi-fi Protected Setup - a feature that lets devices connect to a Wi-Fi network without entering a password

161
Q

ZTA

A

Zero Trust Architecture - an enterprise cybersecurity architecture that is based on zero trust principles and designed to prevent data breaches and limit internal lateral movement