Comptia A+ Acronyms Flashcards
ADF
Automatic Document Feeder
feature in printers that takes several pages at once and feeds them in
ARM
Advanced RISC machine
company that makes CPUs
ATA
Advanced Tech Attachment
standard physical interface for connecting storage devices
ATM
Asynchronous Transfer Mode
standard for internet traffic
AUP
Acceptable Use Policy
rules applied by admin for corporate and educational internet use
CDFS
Compact Disk File System
CDMA
Code Division Multiple Access
channel access method for radio waves, allows several users to share a band of frequencies
CIFS
Common Internet File System
Online file sharing. Like SMB and not used all that often.
CRL
Certificate of Revocation List
list of website certificates that have expired & can’t be trusted
DDoS
Distributed Denial of Services
attack on server by flooding it with traffic
DKIM
Domain Keys Identified Mail
digital signature for email, like needing signature for receiving mail
DMA
Direct Memory Access
certain hardware is able to access the memory by itself without the CPU
DMARC
Domain Based Message Authentication, Reporting, & Conformance
builds on DKIM protocols, protects from fraud
DoS
Denial of Services
attack on server to make it unavailable
EFS
Encrypting File Services
EMI
Electromagnetic Interference
EULA
End User License Agreement
FSB
Front Side Bus
carries data between CPU and memory controller hub AKA northbridge
GFS
Grandfather Father Son
longterm retention policy, backup memory
GPT
GUID Partition Table
standard layout for storage devices
GSM
Global System for Mobile Communications
alternative to CDMA. GSM uses SIM cards
HAL
Hardware Abstraction Layer
bootcode like stuff that provides programming that allows the OS to interact with hardware
HAV
Hardware Assisted Virtualization
full virtualization using help from hardware from host processors
HCL
Hardware Compatibility List
database of hardware models and their compatibility with a certain operating system
HDCP
High Bandwidth Digital Content Protection
HSM
Hardware Security Module
device that safeguards and manages secrets, performs encryption and decryption functions
ICR
Intelligent Character Recognition
used to extract handwritten text from image
IDE
Integrated Drive Electronics
parallel ATA, standard interface for connecting a motherboard to storage devices such as hard drives and CD-ROM/DVD drives
IDS
Intrusion Detection System
device or software application that monitors a network or systems for malicious activity or policy violations
IOPS
Input Output Operations per Second
performance measurement used to characterize computer storage devices like hard disk drives, solid state drives, and storage area networks
IPS
Intrusion Prevention System
monitors a network or systems for malicious activity or policy violations
IPSec
Internet Protocol Security
secure network protocol suite that authenticates and encrypts packets of data
IrDA
Infrared Data Association
provides specifications for a complete set of protocols for wireless infrared communications
IRP
Incident Response Plan
document that outlines an organization’s procedures, steps, and responsibilities of its incident response program
ISO
International Organization for Standardization
ITX
Information Technology Extended
small motherboard form factor
KB
Knowledge Base
self-serve online library of information about a product, service, department, or topic
KVM
Keyboard Video Mouse
hardware device that allows a user to control multiple computers from one or more sets of keyboards, video monitors, and mice
LC
Lucent Connector
fiber optic connector
MFD
Multifunction Device
office machine that prints, copies, blah blah blah
MMC
Microsoft Management Console
provides system administrators and advanced users an interface for configuring and monitoring the system
MOU
Memorandum of Understanding
a contract
MSDS
Material Safety Data Sheet
MSRA
Microsoft Remote Assistance
based on RDP
MX
Mail Exchange
indicates how mail should be transferred according to SMTP
NAC
Network Access Control
process of restricting unauthorized users and devices from gaining access to a corporate or private network
NTFS
New Technology File System
proprietary journaling file system developed by Microsoft
OCR
Optical Character Recognition
process that converts an image of text into a machine-readable text
PE
Preinstallation Environment
lightweight version of Windows
PII
Personally Identifiable Information
PKI
Public Key Infrastructure
governs the issuance of digital certificates to protect sensitive data, provide unique digital identities for users
PPP
Point to Point Protocol
TCP/IP protocol that is used to connect one computer system to another
RADIUS
Remote Authentication Dial-in User Service
networking protocol that provides centralized authentication, authorization, and accounting
RMM
Remote Monitoring and Management
process of supervising and controlling IT systems by means of locally installed agents that can be accessed by a management service provider
RTO
Recovery Time Objective
the maximum acceptable time that an application, computer, network, or system can be down after an unexpected disaster, failure, or comparable event takes place
SAS
Serial Attached SCSI (small computer system interface)
point-to-point serial protocol that moves data to and from computer-storage devices such as hard disk drives and tape drives
SC
Subscriber Connector
fiber optic connector
SCADA
Supervisory Control and Data Acquisition
ability to perform a supervisory operation over a variety of other proprietary devices (in manufacturing field)
SCP
Secure Copy Protection
process of protecting files and folders from being copied without proper authorization to any device in the same network
SCSI
Small Computer System Interface
cable
SDN
Software Defined Networking
SIMM
Single Inline Memory Module
SPF
Sender Policy Framework
email authentication method that helps to identify the mail servers that are allowed to send email for a given domain
SQL
Structured Query Language
programming language for storing and processing information in a relational database
SSO
Single Sign On
authentication scheme that allows a user to log in with a single ID to any of several related, yet independent, software systems
ST
Straight Tip
STP
Shielded Twisted Pair
TACACS
Terminal Access Controller Access-Control System
a security protocol that provides centralized validation of users who are attempting to gain access to a router or NAS
TFTP
Trivial File Transfer Protocol
TPM
Trusted Platform Module
international standard for a secure cryptoprocessor
UAC
User Account Control
windows feature
UNC
Universal Naming Convention
a network resource name for a share point on a workstation
UPnP
Universal Plug & Play
networking protocols that permits networked devices, such as personal computers, printers, Internet gateways, Wi-Fi access points and mobile devices to seamlessly discover each other’s presence on the network and establish functional network services
UPS
Uninterruptible Power Supply
provide backup power, protecting equipment from damage in the event of grid power failure
UTM
Unified Threat Management
when multiple security features or services are combined into a single device within your network
UTP
Unshielded Twisted Pair
VDI
Virtual Desktop Infrastructure
WMN
Wireless Mesh Network
XSS
Cross-site Scripting
type of injection, in which malicious scripts are injected into otherwise benign and trusted websites