Net+ Acronyms Flashcards
AAAA
Authentication, Authorisation, Accounting, Auditing
- a framework used to control and track access within a computer network
ACL
Access Control List
- a list of permissions associated with a system resource
AES
Advanced Encryption Standard
- a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology in 2001
AH
Authentication Header
- a deprecated IPsec security protocol that provides integrity protection (but not confidentiality) for packet headers and data
AP
Access Point
- allows for wireless devices to connect to a wired network
APC
Angled Physical Contact
- a type of fiber connector that minimizes backreflection due to a 5° to 15° angle-polish applied to end faces
APIPA
Automatic Private Internet Protocol Addressing
- allows devices to automatically assign IP addresses to themselves when they cannot get an IP address from a DHCP server
ARP
Address Resolution Protocol
- used for discovering the link layer address, such as a MAC address, associated with a given internet layer address, typically an IPv4 address
AUP
Acceptable Use Policy
- set of rules applied by the owner, creator or administrator of a computer network, website, or service that restricts the ways in which the network, website or system may be used and sets guidelines as to how it should be used
BGP
Border Gateway Protocol
- determines route based on paths, network policies, or
configured rule-set
BNC
British Naval Connector/ Bayonet Neill-Concelman
- a miniature quick connect/disconnect radio frequency connector used for coaxial cable
CAM
Content Addressable Memory (table)
- special type of computer memory used in certain very-high-speed searching applications. It is also known as associative memory or associative storage and compares input search data against a table of stored data, and returns the address of matching data
CAN
Campus Area Network
- network that spans a limited geographical area. Done so within an educational or corporate environment
CDMA
Code Division Multiple Access
- a form of cellular standards/service. Everyone communicates at the same time. Each call uses a different code. The codes are used to filter each call on the receiving side
CIA
Confidentiality, Integrity, Availability
- Forms the CIA Triad which is the basis for the development of security and encryption systems
CIDR
Classless Inter-Domain Routing
- a method for allocating IP addresses and for IP routing
CLI
Command-Line Interface
- a text-based interface where you can input commands that interact with a computer’s operating system
CNAME
Canonical Name
- a type of DNS record that maps an alias name to a true or canonical domain name (i.e www.example.com and example.com yield same result)
CRC
Cyclical Redundancy Check
- an error-detecting code commonly used in digital networks and storage devices to detect accidental changes to digital data
-
CSMA/CA
Carrier-Sense Multiple Access with Collision Avoidance
- a network multiple access method in which carrier sensing is used, but nodes attempt to avoid collisions by beginning transmission only after the channel is sensed to be “idle”. Effective BEFORE a collision and utilised in most/all WIFI communication
CSMA/CD
Carrier-Sense Multiple Access with Collision Detection
- a medium access control method used most notably in early Ethernet technology for local area networking. It uses carrier-sensing to defer transmissions until no other stations are transmitting. More used for standard ethernet/cabled communication
CSU
Channel Service Unit
- a hardware device that converts a digital data frame from the communications technology used on a local area network (LAN) into a frame appropriate to a wide-area network (WAN) and vice versa
CVE
Common Vulnerabilities and Exposures
CWDM
Coarse Wavelength Division Multiplexing
- allows data streams to be sent simultaneously over a single optical fiber network. For shorter distances (than DWDM)
DaaS
Desktop as a Service
- software technology that separates the desktop environment and associated application software from the physical client device that is used to access it
DHCP
Dynamic Host Configuration Protocol
- used to automate the process of configuring devices on IP networks, thus allowing them to use network services such as DNS, NTP, and any communication protocol based on UDP or TCP.
DSL
Digital Subscriber Line
DoS/ DDoS
Denial of Service/ Distributed Denial of Service
- DoS is cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. DDoS is a malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.
DSL
Digital Subscriber Line
- family of technologies that are used to transmit digital data over telephone lines
DSU
Data Service Unit
- a piece of telecommunications circuit terminating equipment that transforms digital data between telephone company lines and local equipmen
DWDM
Dense Wavelength Division Multiplexing
-allows data streams to be sent simultaneously over a single optical fiber network. Longer distances (over CWDM)
EAP
Extensible Authentication Protocol
- used to pass the authentication information between the supplicant (the Wi-Fi workstation) and the authentication server (Microsoft IAS or other). The EAP type actually handles and defines the authentication. Requires server to have certificate. 802.1x
EIGRP
Enhanced Interior Gateway Routing Protocol
- a network protocol that enables routers to exchange information more efficiently than earlier network protocols, such as Interior Gateway Routing Protocol (IGRP) or Border Gateway Protocol (BGP)
EIRP
Effective Isotropic Radiated Power
- a calculation used to estimate the radiated output power of an isotropic antenna
ESP
Encapsulating Security Payload
- a member of the Internet Protocol Security (IPsec) set of protocols that encrypt and authenticate the packets of data between computers using a Virtual Private Network (VPN)
EUI
Extended Unique Identifier
- allows a host to assign iteslf a unique 64-Bit IP Version 6 interface identifier (EUI-64) i.e IPv6 address
FCoE
Fibre Channel over Ethernet
- encapsulates Fibre Channel frames over Ethernet networks
FHRP
First Hop Redundancy Protocol
- designed to provide redundancy to the gateway router within the organization’s network by the use of a virtual IP address and virtual MAC address
GBIC
Gigabit Interface Converter
- standard for transceivers, first defined in 1995 and commonly used with Gigabit Ethernet and Fibre Channel for some time
GRE
Generic Routing Encapsulation
- tunneling protocol developed by Cisco Systems that can encapsulate a wide variety of network layer protocols inside virtual point-to-point links or point-to-multipoint links over an Internet Protocol network
GSM
Global Systems for Mobile Communication
- standard developed by the European Telecommunications Standards Institute to describe the protocols for second-generation digital cellular networks used by mobile devices such as mobile phones and tablets
HVAC
Heating, Ventilation and Air Conditioning
- used in server rooms and rack rooms to ensure no damage/failure to systems. Document/tags outline specifications and minimum baselines for performance
IaaS
Infrastructure as a Service
- delivers IT infrastructure like compute, storage, and network resources on a pay-as-you-go basis over the internet
ICMP
Internet Control Message Protocol
- a protocol that devices within a network use to communicate problems with data transmission
ICS
Industrial Control System
- focuses on ensuring the security and safe function of industrial control system
IDF
Intermediate Distribution Frame
- a distribution frame in a central office or customer premises, which cross connects the user cable media to individual user line circuits and may serve as a distribution point for multipair cables from the main distribution frame (MDF) or combined distribution frame (CDF) to individual cables connected to equipment in areas remote from these frames. A strategic distribution point. Common in medium to large size enterprises
IDS
Intruder Detection System
- used to detect suspicious activity to catch hackers before damage is done to the network
IGMP
Internet Group Management Protocol
- a protocol that allows several devices to share one IP address so they can all receive the same data
IMAP
Internet Message Access Protocol
- used by email clients to retrieve email messages from a mail server over a TCP/IP connection
IoT
Internet of Things
- the collective network of connected devices and the technology that facilitates communication between devices and the cloud, as well as between the devices themselves
IP
Internet Protocol
- a set of rules for communication over the internet, such as sending mail, streaming video, or connecting to a website
IPS
Intruder Prevention System
- used to detect suspicious activity to catch AND PREVENT hackers from accessing/disrupting a network. IDS only detects, IPS actively prevents
IPSEC
Internet Protocol Security
- set of communication rules or protocols for setting up secure connections over a network
IPv4
Internet Protocol v 4
- fourth version of the Internet Protocol. It is one of the core protocols of standards-based internet-working methods in the Internet and other packet-switched network
IPv6
Internet Protocol v 6
- most recent version of the Internet Protocol, the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet
iSCSI
Internet Small Computer Systems Interface
- a transport layer protocol that describes how Small Computer System Interface (SCSI) packets should be transported over a TCP/IP network
LACP
Link Aggregation Control Protocol
- one element of an IEEE specification (802.3ad) that provides guidance on the practice of link aggregation for data connections. Importantly, LACP typically applies to strategies that bundle individual links of Ethernet connections, and not wireless transfers. Link aggregation enables you to bundle several physical ports together to form a single logical channel (LAG)
LC
Local Connector
- designed as a push-pull connector that locks in place with a latch to secure the cable. Used in Fibre optic cabling
LDAP
Lightweight Directory Access Protocol
- accessing and maintaining distributed directory information services over an Internet Protocol network
LDAPS
Lightweight Directory Access Protocol (over SSL)
- accessing and maintaining distributed directory information services over an Internet Protocol network using SSL to secure connection
LTE
Long-Term Evolution
- a fourth-generation (4G) wireless standard that provides increased network capacity and speed for cellphones and other cellular devices compared with third-generation (3G) technology
MAC
Media Access Control/Medium Access Control
- a unique identifier assigned to a network interface controller for use as a network address in communications within a network segment
MAN
Metropolitan Area Network
- a computer network that connects computers within a metropolitan area, which could be a single large city, multiple cities and towns, or any given large area with multiple buildings
MDF
Main Distribution Frame
- the primary hub or demarcation point that interconnects private or public IT and telecommunication lines coming into a building to an internal network via any number of intermediate distribution frames (IDFs)
MDIX
Medium Dependent Interface Crossover
- a type of Ethernet port connection that uses twisted-pair cabling to link two networked devices
mGRE
Multipoint Generic Routing Encapsulation
- used to connect multiple remote sites through a VPN. Uses hub and spoke topology to encapsulate and forward packets from one remote site to another
MIB
Management Information Base
- a Simple Network Management Protocol (SNMP) flat-file, nonrelational database that describes devices being monitored. Network management platforms monitor nodes by reading the value of the managed resources in the MIB