Net+ Acronyms Flashcards

1
Q

AAAA

A

Authentication, Authorisation, Accounting, Auditing

  • a framework used to control and track access within a computer network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ACL

A

Access Control List

  • a list of permissions associated with a system resource
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AES

A

Advanced Encryption Standard

  • a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology in 2001
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AH

A

Authentication Header

  • a deprecated IPsec security protocol that provides integrity protection (but not confidentiality) for packet headers and data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AP

A

Access Point

  • allows for wireless devices to connect to a wired network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

APC

A

Angled Physical Contact

  • a type of fiber connector that minimizes backreflection due to a 5° to 15° angle-polish applied to end faces
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

APIPA

A

Automatic Private Internet Protocol Addressing

  • allows devices to automatically assign IP addresses to themselves when they cannot get an IP address from a DHCP server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ARP

A

Address Resolution Protocol

  • used for discovering the link layer address, such as a MAC address, associated with a given internet layer address, typically an IPv4 address
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AUP

A

Acceptable Use Policy

  • set of rules applied by the owner, creator or administrator of a computer network, website, or service that restricts the ways in which the network, website or system may be used and sets guidelines as to how it should be used
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

BGP

A

Border Gateway Protocol

  • determines route based on paths, network policies, or
    configured rule-set
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

BNC

A

British Naval Connector/ Bayonet Neill-Concelman

  • a miniature quick connect/disconnect radio frequency connector used for coaxial cable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CAM

A

Content Addressable Memory (table)

  • special type of computer memory used in certain very-high-speed searching applications. It is also known as associative memory or associative storage and compares input search data against a table of stored data, and returns the address of matching data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CAN

A

Campus Area Network

  • network that spans a limited geographical area. Done so within an educational or corporate environment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CDMA

A

Code Division Multiple Access

  • a form of cellular standards/service. Everyone communicates at the same time. Each call uses a different code. The codes are used to filter each call on the receiving side
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CIA

A

Confidentiality, Integrity, Availability

  • Forms the CIA Triad which is the basis for the development of security and encryption systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CIDR

A

Classless Inter-Domain Routing

  • a method for allocating IP addresses and for IP routing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CLI

A

Command-Line Interface

  • a text-based interface where you can input commands that interact with a computer’s operating system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CNAME

A

Canonical Name

  • a type of DNS record that maps an alias name to a true or canonical domain name (i.e www.example.com and example.com yield same result)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CRC

A

Cyclical Redundancy Check

  • an error-detecting code commonly used in digital networks and storage devices to detect accidental changes to digital data

-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

CSMA/CA

A

Carrier-Sense Multiple Access with Collision Avoidance

  • a network multiple access method in which carrier sensing is used, but nodes attempt to avoid collisions by beginning transmission only after the channel is sensed to be “idle”. Effective BEFORE a collision and utilised in most/all WIFI communication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

CSMA/CD

A

Carrier-Sense Multiple Access with Collision Detection

  • a medium access control method used most notably in early Ethernet technology for local area networking. It uses carrier-sensing to defer transmissions until no other stations are transmitting. More used for standard ethernet/cabled communication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

CSU

A

Channel Service Unit

  • a hardware device that converts a digital data frame from the communications technology used on a local area network (LAN) into a frame appropriate to a wide-area network (WAN) and vice versa
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CVE

A

Common Vulnerabilities and Exposures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

CWDM

A

Coarse Wavelength Division Multiplexing

  • allows data streams to be sent simultaneously over a single optical fiber network. For shorter distances (than DWDM)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

DaaS

A

Desktop as a Service

  • software technology that separates the desktop environment and associated application software from the physical client device that is used to access it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

DHCP

A

Dynamic Host Configuration Protocol

  • used to automate the process of configuring devices on IP networks, thus allowing them to use network services such as DNS, NTP, and any communication protocol based on UDP or TCP.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

DSL

A

Digital Subscriber Line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

DoS/ DDoS

A

Denial of Service/ Distributed Denial of Service

  • DoS is cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. DDoS is a malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

DSL

A

Digital Subscriber Line

  • family of technologies that are used to transmit digital data over telephone lines
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

DSU

A

Data Service Unit

  • a piece of telecommunications circuit terminating equipment that transforms digital data between telephone company lines and local equipmen
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

DWDM

A

Dense Wavelength Division Multiplexing

-allows data streams to be sent simultaneously over a single optical fiber network. Longer distances (over CWDM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

EAP

A

Extensible Authentication Protocol

  • used to pass the authentication information between the supplicant (the Wi-Fi workstation) and the authentication server (Microsoft IAS or other). The EAP type actually handles and defines the authentication. Requires server to have certificate. 802.1x
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

EIGRP

A

Enhanced Interior Gateway Routing Protocol

  • a network protocol that enables routers to exchange information more efficiently than earlier network protocols, such as Interior Gateway Routing Protocol (IGRP) or Border Gateway Protocol (BGP)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

EIRP

A

Effective Isotropic Radiated Power

  • a calculation used to estimate the radiated output power of an isotropic antenna
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

ESP

A

Encapsulating Security Payload

  • a member of the Internet Protocol Security (IPsec) set of protocols that encrypt and authenticate the packets of data between computers using a Virtual Private Network (VPN)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

EUI

A

Extended Unique Identifier

  • allows a host to assign iteslf a unique 64-Bit IP Version 6 interface identifier (EUI-64) i.e IPv6 address
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

FCoE

A

Fibre Channel over Ethernet

  • encapsulates Fibre Channel frames over Ethernet networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

FHRP

A

First Hop Redundancy Protocol

  • designed to provide redundancy to the gateway router within the organization’s network by the use of a virtual IP address and virtual MAC address
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

GBIC

A

Gigabit Interface Converter

  • standard for transceivers, first defined in 1995 and commonly used with Gigabit Ethernet and Fibre Channel for some time
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

GRE

A

Generic Routing Encapsulation

  • tunneling protocol developed by Cisco Systems that can encapsulate a wide variety of network layer protocols inside virtual point-to-point links or point-to-multipoint links over an Internet Protocol network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

GSM

A

Global Systems for Mobile Communication

  • standard developed by the European Telecommunications Standards Institute to describe the protocols for second-generation digital cellular networks used by mobile devices such as mobile phones and tablets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

HVAC

A

Heating, Ventilation and Air Conditioning

  • used in server rooms and rack rooms to ensure no damage/failure to systems. Document/tags outline specifications and minimum baselines for performance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

IaaS

A

Infrastructure as a Service

  • delivers IT infrastructure like compute, storage, and network resources on a pay-as-you-go basis over the internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

ICMP

A

Internet Control Message Protocol

  • a protocol that devices within a network use to communicate problems with data transmission
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

ICS

A

Industrial Control System

  • focuses on ensuring the security and safe function of industrial control system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

IDF

A

Intermediate Distribution Frame

  • a distribution frame in a central office or customer premises, which cross connects the user cable media to individual user line circuits and may serve as a distribution point for multipair cables from the main distribution frame (MDF) or combined distribution frame (CDF) to individual cables connected to equipment in areas remote from these frames. A strategic distribution point. Common in medium to large size enterprises
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

IDS

A

Intruder Detection System

  • used to detect suspicious activity to catch hackers before damage is done to the network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

IGMP

A

Internet Group Management Protocol

  • a protocol that allows several devices to share one IP address so they can all receive the same data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

IMAP

A

Internet Message Access Protocol

  • used by email clients to retrieve email messages from a mail server over a TCP/IP connection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

IoT

A

Internet of Things

  • the collective network of connected devices and the technology that facilitates communication between devices and the cloud, as well as between the devices themselves
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

IP

A

Internet Protocol

  • a set of rules for communication over the internet, such as sending mail, streaming video, or connecting to a website
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

IPS

A

Intruder Prevention System

  • used to detect suspicious activity to catch AND PREVENT hackers from accessing/disrupting a network. IDS only detects, IPS actively prevents
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

IPSEC

A

Internet Protocol Security

  • set of communication rules or protocols for setting up secure connections over a network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

IPv4

A

Internet Protocol v 4

  • fourth version of the Internet Protocol. It is one of the core protocols of standards-based internet-working methods in the Internet and other packet-switched network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

IPv6

A

Internet Protocol v 6

  • most recent version of the Internet Protocol, the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

iSCSI

A

Internet Small Computer Systems Interface

  • a transport layer protocol that describes how Small Computer System Interface (SCSI) packets should be transported over a TCP/IP network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

LACP

A

Link Aggregation Control Protocol

  • one element of an IEEE specification (802.3ad) that provides guidance on the practice of link aggregation for data connections. Importantly, LACP typically applies to strategies that bundle individual links of Ethernet connections, and not wireless transfers. Link aggregation enables you to bundle several physical ports together to form a single logical channel (LAG)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

LC

A

Local Connector

  • designed as a push-pull connector that locks in place with a latch to secure the cable. Used in Fibre optic cabling
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

LDAP

A

Lightweight Directory Access Protocol

  • accessing and maintaining distributed directory information services over an Internet Protocol network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

LDAPS

A

Lightweight Directory Access Protocol (over SSL)

  • accessing and maintaining distributed directory information services over an Internet Protocol network using SSL to secure connection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

LTE

A

Long-Term Evolution

  • a fourth-generation (4G) wireless standard that provides increased network capacity and speed for cellphones and other cellular devices compared with third-generation (3G) technology
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

MAC

A

Media Access Control/Medium Access Control

  • a unique identifier assigned to a network interface controller for use as a network address in communications within a network segment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

MAN

A

Metropolitan Area Network

  • a computer network that connects computers within a metropolitan area, which could be a single large city, multiple cities and towns, or any given large area with multiple buildings
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

MDF

A

Main Distribution Frame

  • the primary hub or demarcation point that interconnects private or public IT and telecommunication lines coming into a building to an internal network via any number of intermediate distribution frames (IDFs)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

MDIX

A

Medium Dependent Interface Crossover

  • a type of Ethernet port connection that uses twisted-pair cabling to link two networked devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

mGRE

A

Multipoint Generic Routing Encapsulation

  • used to connect multiple remote sites through a VPN. Uses hub and spoke topology to encapsulate and forward packets from one remote site to another
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

MIB

A

Management Information Base

  • a Simple Network Management Protocol (SNMP) flat-file, nonrelational database that describes devices being monitored. Network management platforms monitor nodes by reading the value of the managed resources in the MIB
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

MIMO

A

Multiple Input Multiple Output

  • a wireless technology that uses multiple transmitters and receivers to transfer more data at the same time
69
Q

MU-MIMO

A

Multiuser- Multiple Input Multiple Output

  • a wireless technology that was introduced in the 802.11ac Wave 2 (Wi-Fi 5) standard. It allows a single access point (AP) to transmit data to multiple devices simultaneously
70
Q

MOU

A

Memorandum of Understanding

  • a formal agreement that outlines plans for a common line of action between two or more parties
71
Q

MPLS

A

Multiprotocol Label Switching

  • a networking technology that routes traffic using the shortest path based on “labels,” rather than network addresses, to handle forwarding over private wide area networks. A.K.A pre-planned route rather than Operates below Network layer but above Data link layer. MPLS header added to packets for router to be able to determine which path packets will take
72
Q

MTBF

A

Mean Time Between Failure

  • the average time between repairable failures of a technology product. The metric is used to track both the availability and reliability of a product. The higher the time between failure, the more reliable the system
73
Q

MT-RJ

A

Mechanical Transfer- Registered Jack

  • a connector used for fiber optic cables. They are very small in size and hence are particularly useful in small-sized devices
74
Q

MTTR

A

Mean Time to Repair

  • the average time it takes to recover from a product or system failure. This includes the full time of the outage—from the time the system or product fails to the time that it becomes fully operational again
75
Q

MTU

A

Maximum Transmission Unit

  • a measurement (typically in bytes) of the largest data packet a device can accept via an internet connection
76
Q

MX

A

Mail Exchange

  • An MX record, or mail exchange record, is a DNS record that routes emails to specified mail servers. MX records essentially point to the IP addresses of a mail server’s domain. MX records are especially useful for users who host or lease an email because it differentiates web and email servers
77
Q

NAC

A

Network Access Control

  • the process of restricting unauthorized users and devices from gaining access to a corporate or private network
78
Q

NAS

A

Network Attached Storage

  • a file-dedicated storage device that makes data continuously available for employees to collaborate effectively over a network
79
Q

NAT

A

Network Address Translation

  • a way to map multiple private addresses inside a local network to a public IP address before transferring the information onto the internet. Organizations that want multiple devices to employ a single IP address use NAT, as do most home routers
80
Q

NDA

A

Non-Disclosure Agreement

  • a legal document which sets rules and principles for the confidentiality of the information to be exchanged
81
Q

NFV

A

Network Function Virtualisation

  • a way to reduce cost and accelerate service deployment for network operators by decoupling functions like a firewall or encryption from dedicated hardware and moving them to virtual servers
82
Q

NGFW

A

Next-Generation Firewall

  • third generation of firewall technology, combining a traditional firewall with other network device filtering functions, such as an application firewall using in-line deep packet inspection, an intrusion prevention system
83
Q

NIC

A

Network Interface Card

  • a hardware component, typically a circuit board or chip, which is installed on a computer so it can connect to a network
84
Q

NS

A

Name Server

  • a computer application that implements a network service for providing responses to queries against a directory service
85
Q

NTP

A

Network Time Protocol

  • a protocol that allows the synchronization of system clocks (from desktops to servers)
86
Q

OID

A

Object Identifiers

  • uniquely identify managed objects in a MIB hierarchy. This can be depicted as a tree, the levels of which are assigned by different organizations
87
Q

OSI

A

Open Systems Interconnection

  • a conceptual model from the International Organization for Standardization that “provides a common basis for the coordination of standards development for the purpose of systems interconnection. Layers 1-7
88
Q

OSPF

A

Open Shortest Path First

  • a link-state routing protocol that is used to find the best path between the source and the destination router using its own Shortest Path First)
89
Q

OTDR

A

Optical Time Domain Reflector

  • a data networking device that allows technicians to test and maintain the fiber quality in a fiber optic and data network systems
90
Q

PaaS

A

Platform as a Service

  • a complete development and deployment environment in the cloud, with resources that enable you to deliver everything from simple cloud-based apps to sophisticated, cloud-enabled enterprise applications
91
Q

PAN

A

Personal Area Network

  • connects electronic devices within a user’s immediate area
92
Q

PAT

A

Port Address Translation

  • type of network address translation (NAT) that maps a network’s private internal IPv4 addresses to a single public IP address
93
Q

PDU

A

Power Distribution Unit

  • a device fitted with multiple outputs designed to distribute electric power, especially to racks of computers and networking equipment located within a data center
94
Q

PoE

A

Power over Ethernet

  • a technique for delivering DC power to devices over copper Ethernet cabling, eliminating the need for separate power supplies and outlets
95
Q

POP3

A

Post Office Protocol Version 3

  • supports one-way email synchronization, only allowing users to download emails from a server to a client
96
Q

PSK

A

Pre-shared Key

  • means that a password is being used as the “key” to activate the secure network
97
Q

PTR

A

Pointer Record

  • provides the domain name associated with an IP address
98
Q

QoS

A

Quality of Service

  • the use of mechanisms or technologies that work on a network to control traffic and ensure the performance of critical applications with limited network capacity
99
Q

QSFP

A

Quad small Form-factor Pluggable

  • type of compact, hot-swappable transceiver. It supports Ethernet, Fibre Channel, InfiniBand and SONET/SDH standards with different data rate options
100
Q

RA

A

Router Advertisements

  • used for IPv6 auto-configuration and routing. When enabled, messages are sent by the router periodically and in response to solicitations. A host uses the information to learn the prefixes and parameters for the local network
101
Q

RADIUS

A

Remote Authentication Dial- In User Service

  • a networking protocol that authorizes and authenticates users who access a remote network over UDP
102
Q

RAID

A

Redundant Array of Inexpensive (or Independent) Disks

  • organizes the I/O operations across multiple drives to deliver certain benefits to users — all within a single system
103
Q

RDP

A

Remote Desktop Protocol

  • a secure network communication protocol offered by Microsoft, allows users to execute remote operations on other computers
104
Q

RF

A

Radio Frequency

105
Q

RFC

A

Request For Comment

  • a publication in a series from the principal technical development and standards-setting bodies for the Internet, most prominently the Internet Engineering Task Force
106
Q

RG

A

Radio Guide

107
Q

RPO

A

Recovery Point Objective

  • describes the interval of time that might pass during a disruption before the quantity of data lost during that period exceeds the Business Continuity Plan’s maximum allowable threshold or “tolerance.”
108
Q

RIP

A

Routing Internet Protocol

  • a distance vector protocol that uses hop count as its primary metric. RIP defines how routers should share information when moving traffic among an interconnected group of local area networks
109
Q

RJ

A

Registered Jack

  • consists of the jack construction and wiring pattern of a standardized physical network interface to connect telecommunications or data equipment to a service provided by local exchange carrier or long distance carrier.
110
Q

RPO

A

Recovery Point Objective

  • describes the interval of time that might pass during a disruption before the quantity of data lost during that period exceeds the Business Continuity Plan’s maximum allowable threshold or “tolerance.”
111
Q

RSSI

A

Received Signal Strength Indication

  • a measurement of how well your device can hear a signal from an access point or router. It’s a value that is useful for determining if you have enough signal to get a good wireless connection
112
Q

RTO

A

Recovery Time Objective

  • the maximum acceptable amount of time for restoring a network or application and regaining access to data after an unplanned disruption
113
Q

RTSP

A

Real Time Streaming Protocol

  • an application-level network communication system that transfers real-time data from multimedia to an endpoint device by communicating directly with the server streaming the data
114
Q

SaaS

A

Software as a Service

  • a software distribution model in which a cloud provider hosts applications and makes them available to end users over the internet
115
Q

SAN

A

Storage Area Network

  • a network of storage devices that can be accessed by multiple servers or computers, providing a shared pool of storage space. Each computer on the network can access storage on the SAN as though they were local disks connected directly to the computer
116
Q

SC

A

Standard Connector/ Subscriber Connector

  • fiber-optic cable connector that uses a push-pull latching mechanism similar to common audio and video cables
117
Q

SCADA

A

Supervisory Control and Data Acquisition

  • a system of software and hardware elements that allows industrial organizations to: Control industrial processes locally or at remote locations. Monitor, gather, and process real-time data
118
Q

SDN

A

Software-Defined Network

  • an approach to networking that uses software-based controllers or application programming interfaces (APIs) to communicate with underlying hardware infrastructure and direct traffic on a network
119
Q

SDWAN

A

Software-Defined Wide Area Network

  • a type of networking technology that uses software-defined networking (SDN) principles to manage and optimize the performance of wide area networks (WANs)
120
Q

SFP

A

Small Form-factor Pluggable

  • a slot on a network device or computer into which small form-factor pluggable (SFP) transceivers are inserted
121
Q

SFTP

A

Secure File Transfer Protocol

  • a network protocol for securely accessing, transferring and managing large files and sensitive data
122
Q

SIEM

A

Security Information and Event Management

  • a software solution that aggregates and analyzes activity from many different resources across your entire IT infrastructure. SIEM collects security data from network devices, servers, domain controllers, and more
123
Q

SIP

A

Session Initiation Protocol

  • a signaling protocol used for initiating, maintaining, modifying and terminating real-time communications sessions between Internet Protocol (IP) devices
124
Q

SLA

A

Service Level Agreement

  • a document that outlines a commitment between a service provider and a client, including details of the service, the standards the provider must adhere to, and the metrics to measure the performance
125
Q

SLAAC

A

Stateless Address Auto-Configuration

  • a mechanism that enables each host on the network to auto-configure a unique IPv6 address without any device keeping track of which address is assigned to which node
126
Q

SMB

A

Server Message Block

  • a network file sharing protocol that allows applications on a computer to read and write to files and to request services from server programs in a computer network
127
Q

SMTP

A

Simple Mail Transfer Protocol

  • A messaging protocol governing electronic-mail transmission in Transmission Control Protocol/Internet Protocol (TCP/IP) networks
128
Q

SNMP

A

Simple Network Management Protocol

  • collects, organizes, and sends data from various devices for network monitoring assisting with fault identification and isolation
129
Q

SNMP Trap

A

Simple Network Management Protocol Trap

  • a type of SNMP protocol data unit (PDU). Unlike other PDU types, with an SNMP trap, an agent can send an unrequested message to the manager to notify about an important event
130
Q

SOA

A

State of Authority

  • DNS ‘start of authority’ (SOA) record stores important information about a domain or zone such as the email address of the administrator, when the domain was last updated, and how long the server should wait between refreshes. All DNS zones need an SOA record in order to conform to IETF standards
131
Q

SOHO

A

Small Office Home Office

  • type of local area or LAN network connection designed for small businesses
132
Q

SQL

A

Structured Query Language

  • a programming language for storing and processing information in a relational database. A relational database stores information in tabular form, with rows and columns representing different data attributes and the various relationships between the data values
133
Q

SRV

A

Service Record

  • a Domain Name System (DNS) resource record. It’s used to identify computers hosting specific services. SRV resource records are used to locate domain controllers for Active Directory
134
Q

SSD

A

Solid-State Drive

135
Q

SSH

A

Secure Shell

  • a network communication protocol that enables two computers to communicate
136
Q

SSID

A

Service Set Identifier

  • a sequence of characters that uniquely names a Wi-Fi network. An SSID is sometimes referred to as a network name
137
Q

SSL

A

Secure Socket Layer

  • an encryption security protocol. Transport Layer Security, or TLS, has replaced SSL
138
Q

SSO

A

Single Sign-On

  • an identification method that enables users to log in to multiple applications and websites with one set of credentials
139
Q

ST

A

Straight Tip or Snap Twist

  • a connector used in fiber-optic cables that utilizes a bayonet-style plug and socket. It has become the de facto standard for commercial wirings
140
Q

STP

A

Spanning Tree Protocol

  • a Layer 2 protocol that runs on bridges and switches. The specification for STP is IEEE 802.1D. The main purpose of STP is to ensure that you do not create loops when you have redundant paths in your network
141
Q

SYSLOG

A

System Log

  • a way network devices can use a standard message format to communicate with a logging server. It was designed specifically to make it easy to monitor network devices
142
Q

TACACS+

A

Terminal Access Controller Access Control Systems Plus

  • a family of related protocols handling remote authentication and related services for network access control through a centralized server. More secure than RADIUS
143
Q

TCP

A

Transmission Control Protocol

  • a communications standard that enables application programs and computing devices to exchange messages over a network. It is designed to send packets across the internet and ensure the successful delivery of data and messages over networks
144
Q

TFTP

A

Trivial File Transfer Protocol

  • a simple lockstep File Transfer Protocol which allows a client to get a file from or put a file onto a remote host using UDP
145
Q

TIA/EIA

A

Telecommunications Industry Association/ Electronic Industries Alliance

  • the standards body that creates the Physical layer specifications for Ethernet
146
Q

TKIP

A

Temporal Key Integrity Protocol

  • encryption method. TKIP provides per-packet key mixing a message integrity and re-keying mechanism. Deprecated
147
Q

TLS

A

Transport Layer Security

  • encrypts data sent over the Internet to ensure that eavesdroppers and hackers are unable to see what you transmit which is particularly useful for private and sensitive information such as passwords, credit card numbers, and personal correspondence. Superseded SSL
148
Q

TTL

A

Time To Live

  • the amount of time or “hops” that a packet is set to exist inside a network before being discarded by a router
149
Q

TX/RX

A

Transmit and Receive

150
Q

UDP

A

User Datagram Protocol

  • a communication protocol used across the Internet for especially time-sensitive transmissions such as video playback or DNS lookups. It speeds up communications by not formally establishing a connection before data is transferred
151
Q

UPC

A

Ultra-Physical Contact

  • an improvement of the PC fiber connector with a better surface finish after an extended polishing and the return loss is better than PC structure, nearly -50dB or higher
152
Q

UPS

A

Uninterruptible Power Supply

  • device that allows a computer to keep running for at least a short time when incoming power is interrupted/ power to the premises is not available. Will not resolve internal power supply issues (that would be a redundant power supply)
153
Q

URL

A

Uniform Resource Locator

  • the address of a given unique resource on the Web
154
Q

USB

A

Universal Serial Bus

  • tiered star network with one host (master) and several devices (slaves). The USB Host provides one attachment port. If more peripherals are required, connect a hub to the root port to provide additional connection ports
155
Q

UTP

A

Unshielded Twisted Pair

  • a ubiquitous type of copper cabling used in telephone wiring and local area networks (LANs)
156
Q

VIP

A

Virtual IP

  • n IP address that is shared by both members of a HA server pool on the same subnet
157
Q

VLAN

A

Virtual Local Area Network

  • a virtualized connection that connects multiple devices and network nodes from different LANs into one logical network
158
Q

VM

A

Virtual Machine

  • a digital version of a physical computer. Virtual machine software can run programs and operating systems, store data, connect to networks, and do other computing functions, and requires maintenance such as updates and system monitoring
159
Q

VNC

A

Virtual Network Computing

  • a cross-platform screen sharing system that was created to remotely control another computer. This means that a computer’s screen, keyboard, and mouse can be used from a distance by a remote user from a secondary device as though they were sitting right in front of it.
160
Q

vNIC

A

Virtual Network Interface Card

  • represents the configuration of a VM connected to a network
161
Q

VoIP

A

Voice over Internet Protocol

  • a technology that allows you to make voice calls using a broadband Internet connection instead of a regular (or analog) phone line
162
Q

VPN

A

Virtual Private Network

  • an encrypted connection over the Internet from a device to a network
163
Q

VRRP

A

Virtual Router Redundancy Protocol

  • an IP routing redundancy protocol designed to allow for transparent failover at the first-hop IP router. VRRP enables a group of routers to form a single virtual router . The LAN clients can then be configured with the virtual router as their default gateway
164
Q

WAN

A

Wide Area Network

  • the technology that connects your offices, data centers, cloud applications, and cloud storage together
165
Q

WAP

A

Wireless Access Point

  • a networking device that allows wireless-capable devices to connect to a wired network
166
Q

WDM

A

Wavelength Division Multiplexing

  • a technology that increases bandwidth by allowing different data streams at different frequencies to be sent simultaneously over a single optical fiber network
167
Q

WLAN

A

Wireless Local Area Network

  • group of colocated computers or other devices that form a network based on radio transmissions rather than wired connections
168
Q

WPA

A

WIFI Protected Access

  • a security standard for computing devices with wireless internet connections. It was developed by the Wi-Fi Alliance to provide better data encryption and user authentication than Wired Equivalent Privacy (WEP), which was the original Wi-Fi security standard