Glossary Flashcards
Designed for moderate power requirements. This type of AC power is normally used in households.
One phase power
Unit of height measurement for racks and rack mounted equipment 1U equals 1 3/4-in
1U
Third generation wireless telecommunications network
3G
Designed for demanding power requirements. This type of AC power is normally used in industrial environments and data centers
Three phase power
4th generation wireless telecommunications network speeds are faster than 3G and it supports more broadband applications
4G
An IPv6 transition technology that allows IPv6 traffic over the IPv4 internet. Routers on both ends must support IPv6 and each must have an IPv6 address configured on its internal surface
6to4
Domain name service (DNS) record type that resolves fully qualified domain names FQDNs to IPv4 addresses.
A record
DNS record type that resolves FQDNs to IPv6 addresses
AAAA
A list of entities such as users and groups that are granted or denied permission to access a resource such as a file
Access control list (ACL)
Microsoft’s lightweight directory access protocol (LDAP) compliant network database containing objects such as users, groups and computers. The database is replicated between domain controller servers and is used for authentication, centralized Group Policy settings, and storage of some network application configurations including DNS (domain name service) and activation keys.
Active directory domain services
(AD DS)
Microsoft’s Identify Federation Solution used for web Single Sign On (SSO). ADFS can be configured with user and device claim types that are consumed by trusting applications. Claims are digitally signed by ADFS using a private key; trusting applications verify the signature with the related public key.
Active Directory Federation Services (ADFS)
A symmetric block cipher available in 128 bit, 192 bit and 256 bit cypher strengths. It supersedes the data encryption standard (DES).
Advance Encryption Standard (AES)
A magnetic tape storage medium used with tape backup and archiving systems
Advanced Intelligent Tape (AIT)
A 32 bit and 64 bit multi-core processor type used in small computing devices such as smartphones.
Advanced RISC machine (ARM)
A type of network that does not have a connection to the internet, either wirelessly or using a wired connection. This isolated network can be used for testing purposes or highly sensitive networks
Air-gapped network
A type of power that uses small variations in voltage and current. It is available from power outlets and consumed by power supplies.
Alternating Current (AC)
AMDs virtualization firmware support that is required by some type 1 and type 2 hypervisors
AMD virtualization (AMD-V)
Similar to multi-casting, this IPv6 transmission method attempts to find the nearest receiver of a multicast group.
Anycast
A server configured to serve a specific business need beyond core functionality, such as generic file server or database server.
Application Server
A data replication method in which a delay occurs after the initial data right before the secondary right takes place.
Asynchronous replication
A self-assigned unique LAN IPv4 address that Windows devices use when the Dynamic Host Configuration Protocol (DHCP) server is unreachable. APIPA devices can communicate only with other APIPA devices on the LAN.
Automatic Private IP Address (APIPA)
An IT service configuration, normally for load balancing, that can add virtual machines (scaling out) or remove virtual machines (scaling in) based on a schedule or metric threshold configuration.
Auto scaling
A term used to describe installation or disaster recovery scenarios in which a computer system has no operating system installed.
Bare metal
An interface between server management tools and the physical server hardware being managed. The BMC also monitors the state of servers and is often used with blade servers.
Baseboard management controller (BMC)
Used with disk array controllers, upon restart, for data not yet written to the disk. It is cached data (not lost during a power cycle) so the data gets written to disk.
Battery-backed write caching
Numeric system consisting of zeros and ones
Binary
Uses a personal identifying characteristic for proof of identity such as a fingerprint or retinal scan
Biometric authentication
Basic input-output system; the firmware instructions embedded on a motherboard that provide basic hardware functionality, including the initial Power On Self-Test (POST) sequence when the machine is powered on.
BIOS
Microsoft’s disk volume encryption tool. Although it can be used without the Trusted Platform Module (TPM), it is designed to use TPM functionality.
BitLocker
Blade servers (essentially server motherboards) are placed into a blade enclosure, which is mounted into a rack. Since each blade does not have its own cooling, networking and power, this is supplied through this type of enclosure.
Blade enclosure
A thin server that is placed into a blade enclosure that provides cooling, networking and power. These servers increase server density and data centers compared to traditional rack mounted and tower servers.
Blade server
A group of infected computers under centralized malicious user control. The malicious user can provide instructions for the group of computers much like an army general ordering soldiers to attack an adversary.
Botnet
The policy that enables people to bring their own personal computing devices into a business or corporate environment. Using mobile devices, the company often exercises control over business apps, settings and data on the device in a separate logical device partition that can be selectively wiped, while leaving personal apps settings and data intact.
Bring your own device (BYOD)
A standard way to measure heat output of computing equipment which can be used to determine cooling requirements for an HVAC system.
British thermal units (BTUs)
A transmission received by all network nodes on the LAN. Network broadcasts can apply at the hardware or software level. Routers do not forward broadcasts by default.
Broadcast
An exploit that provides more data than the programmer intended in memory, which can lead to remote escalation attacks. Secure coding practices can prevent this from happening.
Buffer overflow
Buses are sets of conductors that carry data (bits) around the computer and a computer consists of various buses. The size of this is commonly 32 or 64 bits.
Bus Width
Proactive planning which ensures that business operations continue when negative incidents occur. The plan is not as detailed or specific as a disaster recovery plan.
Business continuity plan (BCP)
Identifies the degree and scope of impact on a business when negative incidents occur. This enables easier prioritization of assets that require protection from threats.
Business impact analysis (BIA)
In equipment racks, a folding arm that holds cables. When rack equipment is slid out on rack rails, the arm extends to provide longer cable lengths.
Cable management arm
A small amount of high-speed memory used to fetch recent instructions or data.
Cache
Category 3 copper wire network cabling that is designed to support up to 10 megabytes per second
Cat 3
Category 5 copper wire network cabling that is designed to support up to 100 megabytes per second. Also called 100Base-T or Fast Ethernet.
Cat5
Category 5 copper wire network cabling that is designed to support up to 1000 megabytes per second or one gigabyte per second. Also called 1000Base-T or gigabit ethernet.
CAT5e
Category 6 copper wire network cabling that is designed to support up to 10 gigabytes per second. It is more resistant to interference than CAT5 and has more twists per foot in the cable. Also called 10G Base-T, longer cable distances (approximately 60 to 100 meters) can be run at one gigabyte per second.
Cat6
Category 7 copper wire network cabling that is designed to support up to 10 GB per second and uses individual wire pair shielding which makes it useful in environments with high electromagnetic interference (EMI).
CAT7
A microprocessor chip on a motherboard that carries out instructions within the system. Modern chips consist of multiple logical cores within a single physical chip.
Central Processing Unit (CPU)
Issuer of digital security certificates in a public key infrastructure (PKI). Companies can create their own CAs or use certificates issued from trusted third party CAs.
Certificate Authority (CA)
Also called a snapshot, this takes a point in time picture of virtual machine settings and data disks. This can also refer to disk volume snapshots which copy only disk blocks changed since the previous snapshot.
Checkpoint (or snapshot)
An algorithm used for encryption, decryption, or hashing mathematical operations.
Cipher
A short hand way of referring to the number of bits in a network mask. For example, /24 can be used to represent 255.255.255.0.
Classless Inter-Domain Routing (CIDR)
Defines a relationship between the external CPU bus speed (Megahertz) versus the internal CPU speed (Gigahertz)
Clock multiplier
Pooled computing resources that can be self-provisioned rapidly, usually over the internet. IT resource usage is metered so that consumers pay for only what they use. This type of computing resource must be available anywhere, any time, and on any device.
The Cloud
Complementary metal oxide semiconductor; battery-powered firmware used to retain hardware settings available in the BIOS.
CMOS
In data centers, these areas feed cool air to equipment intake fans to manage airflow for equipment and for cost optimization.
Cold aisle
An alternate data center space that can be used in the event of a disaster to the original site. The site has power and communications links but no computing equipment, staff or data.
Cold site
A memory characteristic that defines how long it takes for requested memory content to leave the actual memory chip on its way to the bus.
Column Access Strobe (CAS) latency
A server under malicious user control that provides instructions to hosts infected with malware. Infected hosts (zombies) or collections of zombies (botnets), periodically contact this server for instructions.
Command and Control (C&C or C2)
The standard UNIX print server software components are referred to as this.
Common Unix Printing System (CUPS)
A cloud deployment model adhering to the five NIST cloud computing characteristics (on-demand self-service, broad network access, resource pooling, rapid elasticity or expansion, and measured service) that provides IT services to groups with the same computing needs such as government agencies or specific industries.
Community Cloud
A small storage card used in devices such as cameras and audio recorders, similar to an SD card. The device being used determines whether SD cards or this type of storage must be used.
Compact Flash
A microprocessor design used in larger non-mobile computing devices such as desktops and servers. This type of chip is designed not for energy efficiency, but for performance.
Complex Instruction Set Computing (CISC)
Supported by encryption, this describes the prevention of disclosure of sensitive information to unauthorized users.
Confidentiality
Real-time replication (synchronous) which is often used for data between data centers.
Continuous Data Protection (CDP)
Server expansion card that combines Ethernet and Fiber Channel functionalities.
Converged Network Adapter (CNA)
High-speed memory used to keep recently executed data or CPU instructions readily available for subsequent use.
CPU cache
Cable used to link two network computing devices directly together, where receive and transmit wires are reversed on either end. This type of cable can also be required by older network equipment, such as linking two old ethernet switches together.
Cross-over cable
This describes interference caused by electronic signals on adjacent wires. It can be reduced with wire shielding and by twisting wire pairs together a specific amount of times per foot. The more twists per foot, the less this will occur.
Cross-talk
Components provided under warranty by a vendor that are installed by the customer.
Customer Replaceable Units (CRUs)
A background process on a Unix or Linux system not tied to a user session. Examples include the sshd _____ for remote management and the syslogd _____ for logging.
Daemon
A facility dedicated to housing computing equipment. Special designs enforce security, control HVAC, improve resistance to floods, fire and earthquakes and have backup power and communication solutions.
Data Center
A Microsoft Windows Performance Monitor configuration that enables the addition of multiple metrics that can be scheduled to monitor hosts for a period of time. Useful for establishing Windows host performance baselines.
Data Collector Set (DCS)
A storage mechanism designed to save storage space by removing redundant data blocks.
Data Deduplication
A solution that prevents sensitive data from leaving the organization or prevents intellectual property from becoming available to unauthorized users.
Data Loss Prevention (DLP)
An expansion circuit board that gets plugged into a motherboard. Unlike a normal expansion card, this type of card has direct access to CPU and memory resources.
Daughter card