NET+ Acronyms - Review Flashcards
AAAA?
Authentication, Authorization, Accounting, Auditing
- used to control and track access within a Network.
ACL?
Access Control List
- rules/permissions that specifies what an authenticated user may do on a shared resource.
AES?
Advanced Encryption Standard
- specification for the encryption of electronic data
- is a symmetric Key Encryption and is not used for Key Exchanges but for Key Encryption.
AH?
Authentication Header
- provides data origin authentication, data integrity, and replay protection
AP?
Access Point
- device that creates a Wireless Local Area Network (WLAN) that you can connect to.
APC?
Angled Physical Contact
- Fiber connector ends that are more rounded an the PC finish giving greater contact between the glass surfaces.
- Minimizes back reflection.
APIPA?
Automatic Private IP Addressing
- a feature of Windows-based OS that automatically assign an IP address to itself when there’s no DHCP Server available to perform that function.
- Range: 169.254.0.1 to 169.254.255.254
APT?
Advanced Persistent Threat
- a type of threat actor that can obtain, maintain, and diversify access to Network Systems using exploits and malware.
ARP?
Address Resolution Protocol
- for mapping a dynamic IP address to a physical machine address (MAC) in a Local Area Network (LAN).
AUP?
Acceptable Use Policy
- a document stipulating constraints and practices that a user must agree to for access to a corporate Network, the Internet, or other corporate resources
BGP?
Border Gateway Protocol
- Standardized Exterior Gateway Protocol (EGP) designed to exchange routing and reachability information among Autonomous systems (AS) on the Internet.
BNC?
British Naval Connector
Bayonet Neill–Concelman
- connector that features two bayonet lugs on the female connector, mating is fully achieved with a quarter turn of the coupling nut.
BYOD?
Bring Your Own Device
- lets employees use their existing portable devices at work.
CAM?
Content Addressable Memory (Table)
- special type of computer memory used in certain very-high speed searching applications.
- also known as associative memory or associative storage
CAN?
Campus Area Network
- network installed in a medium-sized space spanning multiple buildings
CARP?
Common Address Redundancy Protocol
- is an open standard that creats a redundancy group to share an IP Address
CDMA?
Code Division Multiple Access
- early cellular telephone technology that used a spread spectrum form of transmission that was totally incompatible with GSM TDMA.
CIA?
Confidentiality, Integrity, Availability
- 3 goals that are widely considered the foundations of the IT Security trade.
- known as the CIA triad
CIDR?
Classless Inter-Domain Routing
- basis of allocating and routing classless addresses, not restricting subnet masks to /8, /16, or /24, which classful addressing did.
CLI?
Command Line Interface
CNAME?
CNAME
- A DNS record acts like an alias and holds a Frequently Qualified Domain Name (FQDN), not an IP address.
CoS?
Class of Service
- implements packet tagging in a LAN.
- tags the different types of traffic, such as video streaming or VoIP.
- the tag is a value between 0 and 8, with 0 being the highest priority
CPU?
Central Processing Unit
CRC?
Cyclic Redundancy Check
- a mathematical method used to check for errors in long streams of transmitted data with high accuracy.
- found in the Frame Check Sequence (FCS)
CSMA/CA?
Carrier-Sense Multiple Access with Collision Avoidance
- Access method used only on Wireless Networks.
- they first listen for traffic, if the transmitting host does not hear any traffic, it will transmit its frame.
- it will then listen for an acknowledgement frame from the receiving host before it sends.
- if the transmitting host does not hear the acknowledgement, it will wait for a randomly determined period of time and try again.
CSMA/CD?
Carrier-Sense Multiple Access with Collision Detection
- obsolete access method that Ethernet systems used in wired LAN technologies, enabling frames of data to flow through the network and ultimately reach address locations.
- hosts first listened to hear if there was any data on the wire.
- if there was none, the hosts sent out data.
- if a collision occurred, then both hosts waited for a randomly determined time period before retransmitting the data.
- Full-Duplex Ethernet made CSMA/CD obsolete.
CSU?
Channel Service Unit
- piece of equipment that connects a T-carrier leased line from the telephone company to a customer’s equipment.
- also known as Data Service Unit (DSU)
CVE?
Common Vulnerabilities and Exposures
- a database that many vulnerability scanners use to find software that needs to be updated or replaced.
- is an element of the Security Content Automation Protocol (SCAP) that provides a standard nomenclature for describing security flaws or vulnerabilities.
CWDM?
Coarse Wavelength Division Multiplexing
- relies on multiple wavelengths of light to carry a fast signal over long distances.
DaaS?
Desktop as a Service
- cloud computing service that enables a user or organization to virtualize user workstations and manage them as flexibly as other cloud resources.
- virtualized desktop
dB?
Decibel
- a unit of measurement for signal loss in Networking
- applies to both electrical signals in copper and light signals in fiber cables.
DDoS?
Distributed Denial-of-Service
- multicomputer assault on a Network resource that attempts, with sheer overwhelming quantity of requests, to prevent regular users from receiving services (denial) from the resource.
- can be used to crash systems
- usually executed using botnets consisting of compromised systems referred to as zombies
DHCP?
Dynamic Host Configuration Protocol
- automatically assigns an IP address whenever a computer connects to the Network.
- UDP Port 67 & 68
- Dynamic/Pooled = Leased Times
- DHCP Reservations are assigned by MAC Address through the DHCP Server
DLP?
Data Loss Prevention
- can mean alot of things, from redundant hardware and backups, to access levels to data.
- DLP policy takes into consideration many of these factors and helps minimize the risk of loss or theft of essential company data.
DNS?
Domain Name Service
- resolves Frequently Qualified Domain Names (FQDN) to IP addresses
- TCP/UDP Port 53
- TCP = for large transfers
DoS?
Denial-of-Service
- is a targeted attack on a server or servers that provides some form of service on the Internet with the goal of making the service unable to process any incoming requests.
DSL?
Digital Subscriber Line
- fully digital dedicated (no phone number) connection.
DSU?
Data Service Unit
- piece of equipment that connects a T-carrier leased line from the telephone company to a customer’s equipment.
- also known as Channel Service Unit (CSU)
DWDM?
Dense Wavelength Division Multiplexing
- enables an individual single-mode fiber to carry multiple signals by giving each signal a different wavelength.
EAP?
Extensible Authentication Protocol
- developed to create a single standard to allow two devices to authenticate.
EAP-PSK (Pre-Shared Key):
- Nothing more than a shared secret code over AES encryption. Easily the most popular form of Authentication used in Wireless Networks.
EAP-TLS
- EAP with Transport Layer Security, defines the use of a RADIUS Server as well as mutual authentication, requiring certificates on both the server and every client.
- Very robust, but the client-side certificate requirement is an administrative challenge.
- Only used in Wireless
EAP-TTLS
- Tunneled TLS, can use a single server-side certificate, common for more secure Wireless Networks.
EAP-MS-CHAPv2
- Commonly known as Protected EAP (PEAP), uses a password function and is encrypted with TLS.
- The most common implementation of EAP
EAP-MD5
- Uses MD5 hashes for transfer of authentication credentials.
- Weak and the least used of all the versions of EAP.
LEAP
- Lightweight EAP
- Used almost exclusively by Cisco wireless products.
- Combination of MS-CHAP authentication between a Wireless Client and a RADIUS Server
EAP-FAST
- Flexible Authentication via Secure Tunneling
- Cisco’s replacement for LEAP.
- All current OS support EAP-FAST with the right software installed.
EIA?
Electronic Industries Association
- ceased operations in 2011 but groups like Telecommunications Industry Association (TIA) maintain the structured cabling standards.
- TIA/EIA 568A (Green+White and Green in the first 2 slots.)
- TIA/EIA 568B (Orange+White and Orange in the first 2 slots.)
EIGRP?
Enhanced Interior Gateway Routing Protocol
- Cisco proprietary
- has aspects of both distance vector and link state protocols, known as a Hybrid.
- advanced distance vector protocol
EIRP?
Effective Isotropic Radiated Power
- measures the relative signal strength coming out of a directional antenna, comparing the “strong” end signal with an omnidirectional antenna.
ESP?
Encapsulating Security Payload
- encrypts the TCP segment, thus providing confidentiality as well as integrity and authentication.
EUI?
Extended Unique Identifier
- Just another name for MAC Addresses.
- Originally the IEEE called MAC Addresses MAC-48, which simply meant that the MAC Address is 48 Bits.
- EUI is the current term for this naming/numbering space (EUI-48)
FCoE?
Fiber Channel over Ethernet
- New development for Fiber Channel, makes Fiber more flexible within a local wired network, log-distance FC is still clumsy without expensive cabling and hardware.
FHRP?
First Hop Redundancy Protocol
- method of ensuring high data availability by taking multiple routers and grouping them into a virtual router with a single virtual IP address that clients use as a default gateway.
- Common FHRP Protocols: Virtual Router Redundancy Protocol (VRRP) and Cisco’s proprietary Hot Standby Router Protocol (HSRP) and Gateway Load Balancing Protocol (GLBP).
FTP?
File Transfer Protocol
- TCP Port 20 = Active Mode/Data
- TCP Port 21 = Control Process
- SFTP = Secure File Transfer Protocol
- TFTP = Trivial File Transfer Protocol
GBIC?
Gigabit Interface Converter
- standard for modular ports in Gigabit Ethernet Switches and other hardware.
- swappable modules to help convert cabling types
GRE?
Generic Routing Encapsulation
- Cisco-developed, paired with IPsec for encryption.
- GRE can be used to make point-to-point tunnel connections that carry all sorts of traffic over Layer 3, including multicast and IPv6 traffic.
- multipoint GRE (mGRE) protocol for dynamically configured tunnels and tunnels to go to multiple destinations.
GSM?
Global System for Mobile Communications
- standard developed by the European Telecommunications Standards Institute (ETSI) to describe the protocols for second-generation (2G) digital cellular networks used by mobile devices such as mobile phones and tablets.
HA?
High Availability
- term used to describe techniques for keeping datacenter infrastructure up and running and handling potential disasters
HDMI?
High-Definition Multimedia Interface
HSRP?
Hot Standby Router Protocol
- is a Cisco standard similar to Common Address Redundancy Protocol (CARP)
HTTP?
Hypertext Transfer Protocol
- TCP Port 80
HTTPS?
Hypertext Transfer Protocol Secure (Over SSL/TLS)
- TCP Port 443 over TLS/SSL Encryption
- TLS = Transport Layer Security
- SSL = Secure Socket Layer
HVAC?
Heating, Ventilation, and Air Conditioning
IaaS?
Infrastructure as a Service
- Large-scale global infrastructure providers like AWS enable you to set up and tear down infrastructure, building blocks, On-Demand.
- Charges what you use.
- Bottom layer of the Service Levels cake.
ICMP?
Internet Control Message Protocol
- works at Layer 3 (Network)
- handles low-level housekeeping tasks such as host unreachable messages and router advertisements.
- ping utility works by sending a single ICMP message called an echo request to an IP address you specify
ICS?
Industrial Control System
- controls machines with sensors and actuators connected to an ICS server for the purpose of Control and Monitoring.
IDF?
Intermediate Distribution Frame
- where all the horizontal runs from all the work areas come together.
IDS?
Intrusion Detection System
- an application (often running on a dedicated IDS Box) that inspects packets, looking for active intrusions.
- functions inside a network
- knows how to find attacks that a firewall might miss, such as viruses, illegal logon attempts, and other well-known attacks.
- can discover internal threats
- promiscuous mode - inspects a copy of every packet on a network
IGMP?
Internet Group Management Protocol
- enables routers to communicate with hosts and switches to determine a “group” membership
IMAP?
Internet Message Access Protocol
- Receives Email and also has Management Features included in it.
- TCP Port 143
- TCP Port 993 over TLS Encryption
IoT?
Internet of Things
- describes the huge variety of devices you can access and control via the Internet (dicounting personal computers, routers, and servers) and devices that connect directly to Internet Resources.
- Smart Devices
IP?
Internet Protocol
- is the primary logical addressing protocol for TCP/IP.
IPAM?
Internet Protocol (IP) Address Management
- refers to a method of IP scanning, IP addressing tracking, and managing the information associated with a network’s Internet Protocol address space and IPAM system.
- IPAM simplifies and automates the administration of many tasks involved in IP space management, including writing DNS records and configuring DHCP settings.
- additional functionality, such as controlling reservations in DHCP as well as other data aggregation and reporting capability
IPSec?
Internet Protocol Security
- an authentication and encryption protocol suite that works at the Network (Layer 3) layer of the OSI Model
- Encryptions the IP Packet by encapsulating the inner packet.
IPv4?
Internet Protocol version 4
- 4 values ranging from 0 to 255, separated by 3 periods.
- each of the 4 sections are known as octets
- 32 bit address
- ex: 192.168.1.1
IPv6?
Internet Protocol version 6
- Created to eventually replace IPv4
- Solves the problem that IPv4 ran out of addresses a long time ago.
- 128 bit address
- uses link local addresing for communicating on local networks
- doesn’t use octets like IPv4
- colon separates 8 quartets or hextets.
- hexadecimal between 0 and f
- ex: 2001:0DB8:0000:0000:0800:200C:00CF:1234
- Shorthand ex: 2001:DB8::800:200C:CF:1234
ISAKMP?
Internet Security Association Key Management Protocol
- used in IPSec, which is commonly used in securing the Key Exchange during the establishment of a Client-to-Server VPN connection.
iSCSI?
Internet Small Computer System Interface
- is built on top of TCP/IP, enabling devices that use the SCSI protocol to communicate across existing networks using cheap, readily available hardware.
IS-IS?
Intermediate System to Intermediate System
- Intermediate System to Intermediate System is a routing protocol designed to move information efficiently within a computer network, a group of physically connected computers or similar devices.
- It accomplishes this by determining the best route for data through a packet switching network.
ISP?
Internet Service Provider
LACP?
Link Aggregation Control Protocol
- controls how multiple network devices send and receive data as a single connection.
- IEEE Standard 802.3ad
LAN?
Local Area Network
LC?
Local Connector
- LC connector
- very popular, particularly in the US, many fiber experts consider the LC-type connector to be the predominant fiber connector.
- “Little Connector”