Computer Terms Flashcards
Nutanix Block
a Nutanix rackable unit containing up to four nodes
Nutanix Node
the foundational unit for a Nutanix cluster. Each node runs a standard hypervisor (ESXi, Hyper-V, and AHV) contains processors, memory, network interfaces, and local storage (SSDs and HDDs)
Nutanix AOS
Acropolis Operating System. Also known as Nutanix Acropolis. This is the Nutanix OS that runs on top of AHV in our case. It can also run on top of ESXi and Hyper V
Nutanix AHV
Acropolis Hyper Visor. Is the Hypervisor part of Acropolis Operating System
Nutanix CVM
Controller Virtual Machine. This is the AOS VM that is run on each node to control it and manage it and the cluster.
Nutanix DSF
Distributed Storage Fabric. A distributed system that pools storage resources and provides storage platform capabilities such as snapshots, disaster recovery, compression, erasure coding, and more. Nodes work together across a 10 GbE network to form a Nutanix cluster and the DSF
Nutanix AMF
The Acropolis App Mobility Fabric (AMF) is a collection of powerful technologies that allows applications and data to move freely between runtime environments, providing high availability, disaster recovery, VM placement and intelligent resource scheduling across hypervisors while also simplifying VM migration between hypervisors.
Nutanix Prism
Management interface to the CVMs, DSF and AMF
EDR related to security
Endpoint Detection and Response
MDR related to security
Managed Detection and Response
DLP related to security
Data Lost Prevention
FedRAMP related to security
Federal Risk and Authorization Management Program
What is Federal Risk and Authorization Management Program (FedRAMP)
a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services
APTs related to security
Advanced Persistent Threat
RMM and PSA used by IT service providers
Remote Monitoring and Management and Professional Services Automation
What is Zero-Knowledge Encryption
When no one, except you (not even the cloud service provider), can access your secured cloud data.
MDM related to mobile security
Mobile Device Management
MTD related to mobile security
Mobile Treat Defence
INL CCE
Idaho National Laboratory (INL) developed the Consequence-driven Cyber-informed Engineering (CCE) methodology to provide public and private organizations with steps to work collaboratively and establish a working relationship to protect critical infrastructure and other national assets.
SIEM Solution related to Networks
Security Incident & Event Management
What is the name given to the Master Server the manages Active Directory on a network
FSMO stands for Flexible Single Master Operations. There are five FSMO roles in Active Directory:
Schema Master: The schema master domain controller controls all updates and modifications to the schema.
Domain Naming Master: The domain naming master domain controller controls the addition or removal of domains in the forest.
Infrastructure Master: The infrastructure master is responsible for updating references from objects in its domain to objects in other domains.
Relative ID (RID) Master: The RID master is responsible for processing RID pool requests from all domain controllers in a particular domain.
PDC Emulator: The PDC emulator is a domain controller that advertises itself as the primary domain controller (PDC) to workstations, member servers, and domain controllers that are running earlier versions of Windows.