Acronyms Flashcards
3G
3rd-generation wireless data standard for cell phones and other mobile devices; max speed 168 Mbps
4G
popularly implemented as LTE (long term evolution) with theoretical download speeds of 300 Mbps
4to6
Internet connectivity technology that turn IPv4 into IPv6 to get to an IPv6 capable router
6in4
IPv6 tunneling stanard that can go through IPv4 Network Address Translation (NAT)
6to4
IPv6 tunneling protocol that doesn’t require a tunnel broker. Directly connect 2 routers that normally require public IPv4 address.
8P8C
8 position 8 contact; 4-pair connector used on the end of network cable— RJ45 connector
10 GbE
10 Gigabit Ethernet; very fast Ethernet designation, with a # of fiber-optic and copper standards
10Base2
last true bus-standard network where nodes connected to a common share length of coaxial cable
10BaseFL
Fiber-optic implementation of Ethernet that runs at 10Mbps using base-band signaling; max length is 2km
10BaseT
Ethernet LAN designed to run on UTP cabling; runs 10Mbps with base-band signaling; max length between NIC and hub is 100m
10GBaseER/10GBaseEW
10GbE stanard using 1500nm single-mode fiber; max length 40km
10GBaseLR/10GBaseLW
10 GbE standard using 1310-nm single-mode fiber; max length 10km
10GBaseSR/10GBaseSW
10 GbE standard using 850-nm multimode fiber; max lenth 300m.
10GBaseT
10 GbE stanard designed to un on Cat 6a UTP cabling; max length 100m
66 block
Patch panel used in telephone networks displaced by 110 blocks in networking
100BaseFX
Ethernet LAN designed to run on fiber-optic cabling; runs at 100Mbps with baseband signaling; max length 400m for half-duplex and 2km for full-duplex
100BaseT
Ethernet LAN designed to run on UTP cabling; runs at 100Mbps with baseband signaling; uses 2 pairs of wires on Cat 5 or better
100BaseT4
Ethernet LAN designed to run on UTP cabling; runs at 100 Mbps and uses 4-pair Cat 3 or better cabling; made obsolete by 100BaseT
100BaseTX
technically accurate but little used name for 100BaseT
110 block
aka 110-punchdown block; connection gridwork used to link UTP and STP cables behind RJ-45 patch panel
802 committee
IEEE committee responsible for all Ethernet standards
802.1X
port-authentication network access control mechanism for networks
802.3
Ethernet
802.3ab
IEEE standard for 1000BaseT
802.3z
umbrella IEEE standard for all versions of Gigabit Ethernet other than 1000BaseT
802.11a
wireless standard that operates in the frequency range of 5GHz and throughput of up to 54 Mbps
802.11ac
wireless standard that operates on frequency range of 5 GHz and throughput of up to 1 Gbps
802.11a-ht
technical terms for mixed mode 802.11a and 802.11g operation; both tech are simultaneously supported
802.11b
1st popular wireless standard operating at frequency range of 2.4 GHz and throughput of up to 11 Mbps
802.11g
older wireless standard that operates on 2.4 GHz band with max throughput of 54 Mbps; superseded by 802.11n
802.11g-ht
goes along with 802.11a-ht standard; mixed mode operation
802.11i
wireless standard that added security features
802.11n
increases transfer speeds and adds support for MIMO by using multiple antennas; can operate on 2.4 or 5 GHz frequency band with max throughput of 400 Mbps; superseded by 802.11ac
1000BaseCX
Gigabit Ethernet standard using copper cabling with max 25m distance
1000BaseLX
Gigabit Ethernet standard using single-mode fiber cabling with max 5km distance
1000BaseSX
Gigabit Ethernet standard using multimode fiber cabling and max 500m distance
1000BaseT
Gigabit Ethernet standard using Cat5e/6 UTP cabling with 100m max distance
1000BaseTX
short-lived gigabit-over-UTP standard form; simpler to implement than 1000BaseT but required Cat 6 cable
1000BaseX
umbrella Gigabit Ethernet standard; aka 802.3z
A records
DNS records that map host names to their IPv4 addresses
AAA
Authentication, Authorization, Accounting; security philosophy where computer trying to connect to a network must first present credentials in order to be authenticated
AAAA Records
DNS records that map host names to their IPv6 addresses
absorption
quality of building materials to reduce or eliminate Wi-fi signal
acceptable use policy
document that defines what a person may and may not do on an organization’s computers and network
access control
defines degree of permission granted to use a resource; from a switch pot to a particular file to a physical door in the building
ACL
access control list; defined list of permissions that a user can perform on a shared resource
ACS
Access Control Server; cisco program/process/server that makes decision to admit or deny a node based on posture assessment; directs access device to allow connection or redirection or denial
access port
regular port in switch that has been configured as part of VLAN; port that hosts connect to; opposite of a trunk port
Active Directory
form of directory services
activity light
LED on NIC, hub, or switch that blinks rapidly to show data transfers over network
ad hoc mode
each node is in direct contact with every other node in a decentralized free-for-all; similar to mesh topology
ANT+
Adaptive Network Technology; low-speed, high-power networking tech; used in place of Bluetooth (for smart phones and exercise machines)
ARP
Address Resolution Protocol; in TCP/IP suite used with command-line utility of same name to determine MAC address that goes with IP address
administrative accounts
specialized user accounts that have granted sufficient access rights and authority; some exist as default of system and have all authority throughout system
ADSL
asymmetric digital subscriber line; fully digital dedicated connection to telephone system that provides download speeds of 9 Mbps and upload of 1 Mbps
AES
Advanced Encryption Standard; block cipher created in late 1990s that uses a 128-bit block size and 128-, 192-. or 256-bit key size; practically uncrackable
adware
program that monitors types of web sites you frequent and targets ads to you
agent
software that runs within a client and reports client’s security characteristics to ACS to be approved or denied
agent-less
client that has its posture checked and presented by non-permanent software that executes as part of connection process; does not run directly within the client but on behalf of the client
aggregation
router hierarchy; every router under high router uses subnet of router’s existing routes
air gap
act of physically separating a network from every other network
Aircrack-ng
open source tool for penetration testing aspects of wireless networks
alert
proactive message sent from an SNMP manager as a result of a trap issued by agent; alert may be e-mail, SMS message, voicemail, or other
algorithm
set of rules for solving a problem given a # of steps
allow
permission for data or communication to pass through or access a resource; specific allowances are exceptions
ARIN
American Registry for Internet Numbers; parcels out IP addresses to large ISPs and major corporations in North America
amplification
aspect of DoS attack that makes a server do a lot of processing and responding
amplified DoS attack
sends a small amount of traffic to a service which produces a larger response that is sent to a spoofed IP address, overwhelming the victim machine
APC
Angled Physical Contact; Fiber-optic connector that make physical contact between 2 f-o cables; 8-degree angle to curved end, lowering signal loss
anti-malware program
software that attempts to block several types of threats to a client’ i.e. viruses, worms, and other unapproved software installations and executions
antivirus
software that attempts to prevent viruses from installing or executing on a client; some can try to remove or eradicate effects of a virus
anycast
method of addressing groups of computers as though they were one computer; gives computers the same IP address
Apache HTTP Server
open source HTTP server program that runs on a variety of operating systems
application log
tracks application events; i.e. opening and closing; different types record different events
API
Application Programming Interface; shared functions, subroutines, and libraries that allow programs on a machine to communicate with OS and other programs
application/context aware
Advanced feature of some firewalls where content of data is inspected to make sure it’s from appropriate application; bad packets are denied
approval process
1 or more decision makers consider a impact of change and funding; if the change, funding, and impact are acceptable the change is approved
archive
creation/storage of retrievable copies of electronic data for legal and functional purposes
archive bit
attribute of a file that shows whether the file has been backed up since the last change
Area ID
address assigned to routers in an OSPF (open shortest path first) network to prevent flooding beyond routers network
areas
groups of OSPF routers designed to maximize routing efficiency while keep broadcast traffic managed; assigned a 32-bit value
ARP cache poisoning
attacker associates his MAC address with someone else’s IP address so all traffic is sent to him first; sends out unsolicited ARPs which can be requests or replies
arping
command used to discover hosts on a network (like a ping) but replies on ARP rather than ICMP; only works in broadcast domain
asset disposal
reusing, repurposing, or recycling computing devices that follows system life cycle policies in organizations
asset management
managing each aspect of a network from documentation to performance to hardware
ADSL
asymmetric digital subscriber line; fully digital, dedicated connection to telephone system that provides download speeds of 9 Mbps and upload speeds of 1 Mbps
asymmetric-key algorithm
encryption method in which key used to encrypt a message and decrypt are different
ATM
Asynchronous Transfer Mode; network tech that runs at speeds between 25 and 622 Mbps using fiber-optic cabling or Cat 5 or better UTP
attenuation
degradation of signal over distance for networking cable
authentication
process that proves good data traffic truly came from where it says it originated by verifying send/receive users and computers
AS
Authentication Server; In Kerberos, a system that hands out Ticket-Granting Tickers to clients after comparing client hash to its own
authoritative DNS servers
DNS servers that hold IP addresses and names of systems for a particular domain called forward lookup zones; they also have reverse lookup zones
authoritative name servers
another name for authoritative DNS servers
authorization
step in AAA philosophy during which client’s permissions are decided upon
APIPA
networking feature in operating systems that enables DHCP clients to self-configure an IP address and subnet mask automatically when a DHCP server isn’t available
AS
Autonomous System; one or more networks that are governed by single protocol which provides routing for Internet backbone
back up
save important data in a secondary location as a safety precaution against loss of data
backup
archive of important data that disaster recovery team can retrieve in case of disaster
BDR
backup designated router; 2nd router set to take over is designated router fails
backup generator
onsite generator that provides electricity if the power fails
badge
card-shaped device used for authentication; something you have; a possession factor
bandwidth
piece of the spectrum occupied by some form of signal; higher the bandwidth, the faster the signal; when one user is occupying it, others must wait
bandwidth saturation
frequency of a band is filled to capacity
bandwidth speed tester
web sites for measuring an Internet connection throughput, download and upload
banner grabbing
malicious user gains access to open port and uses it to probe a host to gain info and access
baseband
digital signaling that has only 1 signal on the cable at a time; 1, 0, or idle
baseline
static image of a system’s performance when all elements are known to be working
basic NAT
translates a computer’s private or internal IP address to a global IP address
BRI
Basic Rate Interface; consists of 2 B channels which can carry voice or data at 64 Kbps and a D channel which carries setup, config, and data at 16 Kbps
BSSID
Basic Service Set Identifier; naming scheme in wireless networks
baud
one analog cycle on a telephone line
baud rate
number of bauds per second; early days of telephone data the baud rate was often analogous to bits per second; not true anymore
B channel
Bearer channel; type of ISDN channel that carries data and voice info using standard DS0 channels at 64 Kbps
BiDi transceiver
bidirectional transceiver; full-duplex fiber-optic connector that relies on wave division multiplexing to differentiate wave signals on a single fiber, creating single-strand fiber transmission
biometric
human physical characteristic that can be measured and saved as authentication in granting the user access to a network; i.e. fingerprints, facial scans, retinal scans, voice pattern recognition, and other
biometric devices
scan fingerprints, retinas, sound of voice to provide foolproof replacement for passwords
BERT
Bit Error Rate Test; end-to-end test that verifies a T-carrier connection
block
access that is denied to or from a resource; can be on a firewall, ACS, or other secure gateway
block cipher
encryption algorithm in which data is encrypted in chunks of a certain length; popular in wired networks
blocks
contiguous ranges of IP addresses that are assigned to organizations and end users by IANA
Bluejacking
process of sending unsolicited messages to another Bluetooth device
Bluesnarfing
use of weaknesses in Bluthtooth standard to steal info from other Bluetooth devices
BNC connector
used for 10Base2 coaxial cable; have to be locked into place by turning locking ring 90 degrees
BNC coupler
passive connector used to join 2 segments of coaxial cables that are terminated with BNC connectors
bonding
2 or more NICs in a system working together to act as a single NIC
BOOTP
Bootstrap Protocol; allows computers to discover and receive an IP address from a DHCP server prior to booting the OS
BGP-4
Border Gateway Protocol; exterior gateway routing protocol that enables groups of routers to share ino so that efficient, loop-free routes can be established
botnet
group of computers under control of 1 operator for malicious purposes
bottleneck
spot on a network where traffic slows precipitously
bounce
signal sent by one device taking many different paths to get to receiving systems
bps
bits per second; measurement of how fast data is moved across a transmission medium; Gigabit Ethernet moves 1,000,000,000 bps
bridge
device that connects 2 networks and passes traffic between them based on node address so that traffic between nodes on 1 network doesn’t appear on the other
bridge loop
negative situation in which bridging devices (i.e. switches) are installed in a loop configuration, continuously; switches using STP (Spanning Tree Protocol) prevent them by turning off loop ports
bridged connection
early type of DSL connection that made line function as if you snapped an Ethernet cable into your NIC
bridging loop
physical wiring of a cicuitous path between 2 or more switches causing them to loop
BYOD
Bring Your Own Device; users bring own network-enabled device to work; must use on-boarding and off-boarding technologies
broadband
analog signaling that sends multiple signals over cable at the same time; i.e. cable television; 0, 1, and idle states exist on multiple channels on same cable
broadcast
frame or packet addressed to all machines on a broadcast domain
broadcast address
address a NIC attaches to a frame when it wants every other NIC on the network to read it
broadcast domain
network of computers that will hear each other’s broadcasts; aka collision domain
broadcast storm
result of one or more devices sending a nonstop flurry of broadcast frames on the network
browser
software program specifically designed to retrieve, interpret, and display web pages
brute force
type of attack where every permutation of data is tried in an attempt to discover protected info; most commonly used on password cracking
buffer
component of fiber-optic cable that adds strength to the cable
building entrance
location where all cables from outside world enter the building
bus topology
network topology that uses a single bus cable that connects all of the computers in a line; must be terminated to prevent signal reflection
BCP
business continuity planning; process of defining steps to be taken in event of physical corporate crisis to continue operations; includes creation of documents to specify facilities, equipment, resources, personnel, and their roles
butt set
device that can tap into a 66 or 110 punchdown block to see if a line is working
byte
8 continuous bits; fundamental data unit of personal computers; storing equivalent of 1 character; basic unit of measurement for computer storage; counted in powers of 2
CAB files
cabinet files; compressed and used during Microsoft operating system installation to store smaller files such as device drivers
cable certifier
powerful cable testing device used by professional installers to test electrical characteristics of cable then generate certification report if it passes TIA/EIA standards
cable drop
location where cable comes out of wall to workstation
cable modem
bridge device that interconnects cable company’s DOCSIS service to user’s Ethernet network; cable modem is demarc in most locations
cable stripper
device that enables creation of UTP cables
cable tester
generic name for device that tests cables; continuity, electrical shorts, crossed wires, other electrical characteristics
cable tray
device for organizing cable runs in drop ceiling
cache
special area of RAM that stores frequently accessed data; number of applications that take advantage of the cache
cached lookup
list kept by DNS server of IP addresses it already resolved so it won’t have to re-resolve a FQDN that is already checked
cache-only DNS servers
do not have any forward lookup zones; resolve names of systems on Internet for network, but not responsible for telling other DNS servers names of clients
caching engine
server dedicated to storing cache info on your network; reduce overall network traffic dramatically
Cacti
popular network graphing program
CAN
campus area network; network installed in a medium-sized space spanning multiple buildings
CNAME
canonical name; less common type of DNS record that acts a computer’s alias
captive portal
Wi-fi network implementation used in facilities that directs attempts to connect to network to an internal Web page for that facility; used to force terms of service on users
capture file
file in which collected packets from a packet sniffer program are stored
card
generic term for anything that you can snap into an expansion slot
CSMA/CA
carrier sense multiple access with collision avoidance; access method used on wireless networks; before hosts send out info they first listen for traffic, if it’s free they send out a signal
CSMA/CD
carrier sense multiple access with collision detection; older Ethernet systems used in wired LAN technologies enabling frames of data to flow through network and reach address locations; if collision occurred they would have to resend
Cat 3
Category 3 wire; TIA/EIA standard for UTP wiring that can operate up to 16 Mbps
Cat 5
Category 5 wire; TIA/EIA standard for UTP wiring that can operate up to 100 Mbps
Cat 5e
Category 5e wire; TIA/EIA standard for UTP wiring with improved support for 100 Mbps using 2 pairs and 1000 Mbps using 4 pairs
Cat 6
Category 6 wire; TIA/EIA standard for UTP wiring with improved support for 1000 Mbps; supports 10 Gbps up to 55 meters
Cat 6a
Category 6a wire; TIA/EIA standard for UTP with support for 10 Gbps up to 100 meters
Cat 7
Category 7 wire; standard for UTP wiring with support for 10+ Gbps at 600 MHz max frequency
Cat rating
Category rating; grade assigned to cable to help network installers get right cable for right network technology; officially rated in MHz; indicating highest frequency bandwidth cable can handle
CCITT
Comite Consutatif Internationale Telephonique et Telegraphique; European standards body that established V standards for modems
central office
building that houses local exchanges and location where individual voice circuits come together
certificate
public encryption key signed with digital signature from a trusted 3rd party called certificate authority; key serves to validate identity of its holder when that person or company sends data to other parties
certifier
device that tests a cable to ensure that it can handle rated capacity
chain of custody
document used to track collection, handling, and transfer of evidence
CHAP
Challenge Handshake Authentication Protocol; remote access authentication protocol; serving system challenges remote client which must provide encrypted password
CRAM-MD5
Challenge-Response Authentication Mechanism-Message Digest 5; a tool for server authentication in SMTP servers
change management
process of initiating, approving, funding, implementing, and documenting significant changes to network
change management documentation
set of documents that defines procedures for changes to network
change management team
personnel who collect change requests, evaluate change, work with decision makers for approval, plan and implement approved changes, and document changes
change request
formal or informal document suggesting modification to some aspect of network or computing environment
channel
portion of wireless spectrum on which a particular wireless network operates; setting wireless networks to different channels enables separation of networks
channel bonding
wireless technology that enables wireless access points to use 2 channels for transmission
channel overlap
Drawback of 2.4 GHz wireless networks where channels shared some bandwidth with other channels; This is why only 3 2.4 GHz channels can be used in the US (1, 6, 11)
CSU/DSU
Channel Service Unit/Digital Service Unit; piece of equipment that connects a T-carrier leased line from telephone company to a customer’s equipment; line encoding and conditioning functions and has loopback function for testing
chat
multiparty, real-time text conversation; internet’s most popular version is known as Internet Relay Chat (IRC) which you converse in real-time.
checksum
simple error-detection method that adds a numerical value to each data packet; based on number of data bits in the packet; receiving node applies same formula to data and verifies numerical value is the same; if not data is corrupted and must be re-sent
CYOD
Choose your own device; deployment model where corporate employees select among catalog of approved mobile devices
cipher
series of complex and hard-to-reverse mathematics run on a string of ones and zeros in order to make a new set of seemingly meaningless ones and zeros
cipher lock
door unlocking system that uses a door handle, a latch, and a sequence of mechanical push buttons
ciphertext
output when cleartext is run through a cipher algorithm using a key
circuit switching
process for connecting 2 phones together on one circuit
Cisco IOS
Cisco’s proprietary operating system
cladding
part of a fiber-optic cable that makes the light reflect down the fiber
class license
contiguous chunk of IP addresses passed out by IANA (Internet Assigned Numbers Authority)