Networking Acronyms Flashcards

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAAA

A

Authentication, Authorisation, Accounting, Auditing

A framework used to control and track access within a computer network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ACL

A

Access Control List

A list of permissions associated with a system resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AES

A

Advanced Encryption Standard

A specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology in 2001.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AH

A

Authentication Header

A deprecated IPsec security protocol that provides integrity protection (but not confidentiality) for packet headers and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AP

A

Access Point

Allows for wireless devices to connect to a wired network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

APC

A

Angled Physical Contact

A type of fiber connector that minimizes backreflection due to a 5° to 15° angle-polish applied to end faces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

APIPA

A

Automatic Private Internet Protocol Addressing

Allows devices to automatically assign IP addresses to themselves when they cannot get an IP address from a DHCP server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ARP

A

Address Resolution Protocol

Used for discovering the link layer address, such as a MAC address, associated with a given internet layer address, typically an IPv4 address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AUP

A

Acceptable Use Policy

Set of rules applied by the owner, creator or administrator of a computer network, website, or service that restricts the ways in which the network, website or system may be used and sets guidelines as to how it should be used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

BGP

A

Border Gateway Protocol

Determines route based on paths, network policies, or configured rule-set.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

BNC

A

British Naval Connector/ Bayonet Neill-Concelman

A miniature quick connect/disconnect radio frequency connector used for coaxial cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CAM

A

Content Addressable Memory (table)

Special type of computer memory used in certain very-high-speed searching applications. It is also known as associative memory or associative storage and compares input search data against a table of stored data, and returns the address of matching data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CAN

A

Campus Area Network

Network that spans a limited geographical area. Done so within an educational or corporate environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CDMA

A

Code Division Multiple Access

A form of cellular standards/service. Everyone communicates at the same time. Each call uses a different code. The codes are used to filter each call on the receiving side.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CIA

A

Confidentiality, Integrity, Availability

Forms the CIA Triad which is the basis for the development of security and encryption systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CIDR

A

Classless Inter-Domain Routing

A method for allocating IP addresses and for IP routing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CLI

A

Command-Line Interface

A text-based interface where you can input commands that interact with a computer’s operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CNAME

A

Canonical Name

A type of DNS record that maps an alias name to a true or canonical domain name (i.e www.example.com and example.com yield same result).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

CRC

A

Cyclical Redundancy Check

An error-detecting code commonly used in digital networks and storage devices to detect accidental changes to digital data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

CSMA/CA

A

Carrier-Sense Multiple Access with Collision Avoidance

A network multiple access method in which carrier sensing is used, but nodes attempt to avoid collisions by beginning transmission only after the channel is sensed to be “idle”. Effective BEFORE a collision and utilised in most/all WIFI communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

CSMA/CD

A

Carrier-Sense Multiple Access with Collision Detection

A medium access control method used most notably in early Ethernet technology for local area networking. It uses carrier-sensing to defer transmissions until no other stations are transmitting. More used for standard ethernet/cabled communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CSU

A

Channel Service Unit

A hardware device that converts a digital data frame from the communications technology used on a local area network (LAN) into a frame appropriate to a wide-area network (WAN) and vice versa.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

CVE

A

Common Vulnerabilities and Exposures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

CWDM

A

Coarse Wavelength Division Multiplexing

Allows data streams to be sent simultaneously over a single optical fiber network. For shorter distances (than DWDM).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

DaaS

A

Desktop as a Service

Software technology that separates the desktop environment and associated application software from the physical client device that is used to access it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

DHCP

A

Dynamic Host Configuration Protocol

Used to automate the process of configuring devices on IP networks, thus allowing them to use network services such as DNS, NTP, and any communication protocol based on UDP or TCP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

DSL

A

Digital Subscriber Line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

DoS/ DDoS

A

Denial of Service/ Distributed Denial of Service

DoS is cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. DDoS is a malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

DSL

A

Digital Subscriber Line

Family of technologies that are used to transmit digital data over telephone lines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

DSU

A

Data Service Unit

A piece of telecommunications circuit terminating equipment that transforms digital data between telephone company lines and local equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

DWDM

A

Dense Wavelength Division Multiplexing

Allows data streams to be sent simultaneously over a single optical fiber network. Longer distances (over CWDM).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

EAP

A

Extensible Authentication Protocol

Used to pass the authentication information between the supplicant (the Wi-Fi workstation) and the authentication server (Microsoft IAS or other). The EAP type actually handles and defines the authentication. Requires server to have certificate. 802.1x.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

EIGRP

A

Enhanced Interior Gateway Routing Protocol

A network protocol that enables routers to exchange information more efficiently than earlier network protocols, such as Interior Gateway Routing Protocol (IGRP) or Border Gateway Protocol (BGP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

EIRP

A

Effective Isotropic Radiated Power

A calculation used to estimate the radiated output power of an isotropic antenna.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

ESP

A

Encapsulating Security Payload

A member of the Internet Protocol Security (IPsec) set of protocols that encrypt and authenticate the packets of data between computers using a Virtual Private Network (VPN).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

EUI

A

Extended Unique Identifier

Allows a host to assign itself a unique 64-Bit IP Version 6 interface identifier (EUI-64) i.e IPv6 address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

FCoE

A

Fibre Channel over Ethernet

Encapsulates Fibre Channel frames over Ethernet networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

FHRP

A

First Hop Redundancy Protocol

Designed to provide redundancy to the gateway router within the organization’s network by the use of a virtual IP address and virtual MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

GBIC

A

Gigabit Interface Converter

Standard for transceivers, first defined in 1995 and commonly used with Gigabit Ethernet and Fibre Channel for some time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

GRE

A

Generic Routing Encapsulation

Tunneling protocol developed by Cisco Systems that can encapsulate a wide variety of network layer protocols inside virtual point-to-point links or point-to-multipoint links over an Internet Protocol network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

GSM

A

Global Systems for Mobile Communication

Standard developed by the European Telecommunications Standards Institute to describe the protocols for second-generation digital cellular networks used by mobile devices such as mobile phones and tablets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

HVAC

A

Heating, Ventilation and Air Conditioning

Used in server rooms and rack rooms to ensure no damage/failure to systems. Document/tags outline specifications and minimum baselines for performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

IaaS

A

Infrastructure as a Service

Delivers IT infrastructure like compute, storage, and network resources on a pay-as-you-go basis over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

ICMP

A

Internet Control Message Protocol

A protocol that devices within a network use to communicate problems with data transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

ICS

A

Industrial Control System

Focuses on ensuring the security and safe function of industrial control system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

IDF

A

Intermediate Distribution Frame

A distribution frame in a central office or customer premises, which cross connects the user cable media to individual user line circuits and may serve as a distribution point for multipair cables from the main distribution frame (MDF) or combined distribution frame (CDF) to individual cables connected to equipment in areas remote from these frames. A strategic distribution point. Common in medium to large size enterprises.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

IDS

A

Intruder Detection System

Used to detect suspicious activity to catch hackers before damage is done to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

IGMP

A

Internet Group Management Protocol

A protocol that allows several devices to share one IP address so they can all receive the same data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

IMAP

A

Internet Message Access Protocol

Used by email clients to retrieve email messages from a mail server over a TCP/IP connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

IoT

A

Internet of Things

The collective network of connected devices and the technology that facilitates communication between devices and the cloud, as well as between the devices themselves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

IP

A

Internet Protocol

A set of rules for communication over the internet, such as sending mail, streaming video, or connecting to a website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

IPS

A

Intruder Prevention System

Used to detect suspicious activity to catch and prevent hackers from accessing/disrupting a network. IDS only detects, IPS actively prevents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

IPSEC

A

Internet Protocol Security

Set of communication rules or protocols for setting up secure connections over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

IPv4

A

Internet Protocol v 4

Fourth version of the Internet Protocol. It is one of the core protocols of standards-based internet-working methods in the Internet and other packet-switched networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

IPv6

A

Internet Protocol v 6

Most recent version of the Internet Protocol, providing an identification and location system for computers on networks and routing traffic across the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

iSCSI

A

Internet Small Computer Systems Interface

A transport layer protocol that describes how Small Computer System Interface (SCSI) packets should be transported over a TCP/IP network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

LACP

A

Link Aggregation Control Protocol

One element of an IEEE specification (802.3ad) that provides guidance on the practice of link aggregation for data connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

LC

A

Local Connector

Designed as a push-pull connector that locks in place with a latch to secure the cable. Used in Fibre optic cabling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

LDAP

A

Lightweight Directory Access Protocol

Accessing and maintaining distributed directory information services over an Internet Protocol network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

LDAPS

A

Lightweight Directory Access Protocol (over SSL)

Accessing and maintaining distributed directory information services over an Internet Protocol network using SSL to secure connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

LTE

A

Long-Term Evolution

A fourth-generation (4G) wireless standard that provides increased network capacity and speed for cellphones and other cellular devices compared with third-generation (3G) technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

MAC

A

Media Access Control/Medium Access Control

A unique identifier assigned to a network interface controller for use as a network address in communications within a network segment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

MAN

A

Metropolitan Area Network

A computer network that connects computers within a metropolitan area, which could be a single large city, multiple cities and towns, or any given large area with multiple buildings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

MDF

A

Main Distribution Frame

The primary hub or demarcation point that interconnects private or public IT and telecommunication lines coming into a building to an internal network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

MDIX

A

Medium Dependent Interface Crossover

A type of Ethernet port connection that uses twisted-pair cabling to link two networked devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

mGRE

A

Multipoint Generic Routing Encapsulation

Used to connect multiple remote sites through a VPN. Uses hub and spoke topology to encapsulate and forward packets from one remote site to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

MIB

A

Management Information Base

A Simple Network Management Protocol (SNMP) flat-file, nonrelational database that describes devices being monitored.

69
Q

MIMO

A

Multiple Input Multiple Output

A wireless technology that uses multiple transmitters and receivers to transfer more data at the same time.

70
Q

MU-MIMO

A

Multiuser- Multiple Input Multiple Output

A wireless technology that allows a single access point (AP) to transmit data to multiple devices simultaneously.

71
Q

MOU

A

Memorandum of Understanding

A formal agreement that outlines plans for a common line of action between two or more parties.

72
Q

MPLS

A

Multiprotocol Label Switching

A networking technology that routes traffic using the shortest path based on labels, rather than network addresses.

73
Q

MTBF

A

Mean Time Between Failure

The average time between repairable failures of a technology product.

74
Q

MT-RJ

A

Mechanical Transfer- Registered Jack

A connector used for fiber optic cables, particularly useful in small-sized devices.

75
Q

MTTR

A

Mean Time to Repair

The average time it takes to recover from a product or system failure.

76
Q

MTU

A

Maximum Transmission Unit

A measurement of the largest data packet a device can accept via an internet connection.

77
Q

MX

A

Mail Exchange

An MX record routes emails to specified mail servers, pointing to the IP addresses of a mail server’s domain.

78
Q

NAC

A

Network Access Control

The process of restricting unauthorized users and devices from gaining access to a corporate or private network.

79
Q

NAS

A

Network Attached Storage

A file-dedicated storage device that makes data continuously available for employees to collaborate effectively over a network.

80
Q

NAT

A

Network Address Translation

A way to map multiple private addresses inside a local network to a public IP address.

81
Q

NDA

A

Non-Disclosure Agreement

A legal document which sets rules and principles for the confidentiality of the information to be exchanged.

82
Q

NFV

A

Network Function Virtualisation

A way to reduce cost and accelerate service deployment for network operators by decoupling functions from dedicated hardware.

83
Q

NGFW

A

Next-Generation Firewall

Third generation of firewall technology, combining a traditional firewall with other network device filtering functions.

84
Q

NIC

A

Network Interface Card

A hardware component installed on a computer so it can connect to a network.

85
Q

NS

A

Name Server

A computer application that implements a network service for providing responses to queries against a directory service.

86
Q

NTP

A

Network Time Protocol

A protocol that allows the synchronization of system clocks.

87
Q

OID

A

Object Identifiers

Uniquely identify managed objects in a MIB hierarchy.

88
Q

OSI

A

Open Systems Interconnection

A conceptual model that provides a common basis for the coordination of standards development.

89
Q

OSPF

A

Open Shortest Path First

A link-state routing protocol used to find the best path between the source and destination router.

90
Q

OTDR

A

Optical Time Domain Reflector

A data networking device that allows technicians to test and maintain the fiber quality in a fiber optic network.

91
Q

PaaS

A

Platform as a Service

A complete development and deployment environment in the cloud.

92
Q

PAN

A

Personal Area Network

Connects electronic devices within a user’s immediate area.

93
Q

PAT

A

Port Address Translation

A type of network address translation that maps a network’s private internal IPv4 addresses to a single public IP address.

94
Q

PDU

A

Power Distribution Unit

A device fitted with multiple outputs designed to distribute electric power.

95
Q

PoE

A

Power over Ethernet

A technique for delivering DC power to devices over copper Ethernet cabling.

96
Q

POP3

A

Post Office Protocol Version 3

Supports one-way email synchronization, allowing users to download emails from a server to a client.

97
Q

PSK

A

Pre-shared Key

Means that a password is being used as the key to activate the secure network.

98
Q

PTR

A

Pointer Record

Provides the domain name associated with an IP address.

99
Q

QoS

A

Quality of Service

The use of mechanisms or technologies that work on a network to control traffic and ensure the performance of critical applications.

100
Q

QSFP

A

Quad small Form-factor Pluggable

Type of compact, hot-swappable transceiver supporting various standards.

101
Q

RA

A

Router Advertisements

Used for IPv6 auto-configuration and routing.

102
Q

RADIUS

A

Remote Authentication Dial-In User Service

A networking protocol that authorizes and authenticates users who access a remote network over UDP.

103
Q

RAID

A

Redundant Array of Inexpensive (or Independent) Disks

Organizes the I/O operations across multiple drives to deliver certain benefits to users — all within a single system.

104
Q

RDP

A

Remote Desktop Protocol

A secure network communication protocol offered by Microsoft, allows users to execute remote operations on other computers.

105
Q

RF

A

Radio Frequency

106
Q

RFC

A

Request For Comment

A publication in a series from the principal technical development and standards-setting bodies for the Internet, most prominently the Internet Engineering Task Force.

107
Q

RG

A

Radio Guide

108
Q

RPO

A

Recovery Point Objective

Describes the interval of time that might pass during a disruption before the quantity of data lost during that period exceeds the Business Continuity Plan’s maximum allowable threshold or “tolerance.”

109
Q

RIP

A

Routing Internet Protocol

A distance vector protocol that uses hop count as its primary metric. RIP defines how routers should share information when moving traffic among an interconnected group of local area networks.

110
Q

RJ

A

Registered Jack

Consists of the jack construction and wiring pattern of a standardized physical network interface to connect telecommunications or data equipment to a service provided by local exchange carrier or long distance carrier.

111
Q

RSSI

A

Received Signal Strength Indication

A measurement of how well your device can hear a signal from an access point or router. It’s a value that is useful for determining if you have enough signal to get a good wireless connection.

112
Q

RTO

A

Recovery Time Objective

The maximum acceptable amount of time for restoring a network or application and regaining access to data after an unplanned disruption.

113
Q

RTSP

A

Real Time Streaming Protocol

An application-level network communication system that transfers real-time data from multimedia to an endpoint device by communicating directly with the server streaming the data.

114
Q

SaaS

A

Software as a Service

A software distribution model in which a cloud provider hosts applications and makes them available to end users over the internet.

115
Q

SAN

A

Storage Area Network

A network of storage devices that can be accessed by multiple servers or computers, providing a shared pool of storage space. Each computer on the network can access storage on the SAN as though they were local disks connected directly to the computer.

116
Q

SC

A

Standard Connector/Subscriber Connector

Fiber-optic cable connector that uses a push-pull latching mechanism similar to common audio and video cables.

117
Q

SCADA

A

Supervisory Control and Data Acquisition

A system of software and hardware elements that allows industrial organizations to control industrial processes locally or at remote locations, monitor, gather, and process real-time data.

118
Q

SDN

A

Software-Defined Network

An approach to networking that uses software-based controllers or application programming interfaces (APIs) to communicate with underlying hardware infrastructure and direct traffic on a network.

119
Q

SDWAN

A

Software-Defined Wide Area Network

A type of networking technology that uses software-defined networking (SDN) principles to manage and optimize the performance of wide area networks (WANs).

120
Q

SFP

A

Small Form-factor Pluggable

A slot on a network device or computer into which small form-factor pluggable (SFP) transceivers are inserted.

121
Q

SFTP

A

Secure File Transfer Protocol

A network protocol for securely accessing, transferring and managing large files and sensitive data.

122
Q

SIEM

A

Security Information and Event Management

A software solution that aggregates and analyzes activity from many different resources across your entire IT infrastructure. SIEM collects security data from network devices, servers, domain controllers, and more.

123
Q

SIP

A

Session Initiation Protocol

A signaling protocol used for initiating, maintaining, modifying and terminating real-time communications sessions between Internet Protocol (IP) devices.

124
Q

SLA

A

Service Level Agreement

A document that outlines a commitment between a service provider and a client, including details of the service, the standards the provider must adhere to, and the metrics to measure the performance.

125
Q

SLAAC

A

Stateless Address Auto-Configuration

A mechanism that enables each host on the network to auto-configure a unique IPv6 address without any device keeping track of which address is assigned to which node.

126
Q

SMB

A

Server Message Block

A network file sharing protocol that allows applications on a computer to read and write to files and to request services from server programs in a computer network.

127
Q

SMTP

A

Simple Mail Transfer Protocol

A messaging protocol governing electronic-mail transmission in Transmission Control Protocol/Internet Protocol (TCP/IP) networks.

128
Q

SNMP

A

Simple Network Management Protocol

Collects, organizes, and sends data from various devices for network monitoring assisting with fault identification and isolation.

129
Q

SNMP Trap

A

Simple Network Management Protocol Trap

A type of SNMP protocol data unit (PDU). Unlike other PDU types, with an SNMP trap, an agent can send an unrequested message to the manager to notify about an important event.

130
Q

SOA

A

State of Authority

DNS ‘start of authority’ (SOA) record stores important information about a domain or zone such as the email address of the administrator, when the domain was last updated, and how long the server should wait between refreshes. All DNS zones need an SOA record in order to conform to IETF standards.

131
Q

SOHO

A

Small Office Home Office

Type of local area or LAN network connection designed for small businesses.

132
Q

SQL

A

Structured Query Language

A programming language for storing and processing information in a relational database. A relational database stores information in tabular form, with rows and columns representing different data attributes and the various relationships between the data values.

133
Q

SRV

A

Service Record

A Domain Name System (DNS) resource record. It’s used to identify computers hosting specific services. SRV resource records are used to locate domain controllers for Active Directory.

134
Q

SSD

A

Solid-State Drive

135
Q

SSH

A

Secure Shell

A network communication protocol that enables two computers to communicate.

136
Q

SSID

A

Service Set Identifier

A sequence of characters that uniquely names a Wi-Fi network. An SSID is sometimes referred to as a network name.

137
Q

SSL

A

Secure Socket Layer

An encryption security protocol. Transport Layer Security, or TLS, has replaced SSL.

138
Q

SSO

A

Single Sign-On

An identification method that enables users to log in to multiple applications and websites with one set of credentials.

139
Q

ST

A

Straight Tip or Snap Twist

A connector used in fiber-optic cables that utilizes a bayonet-style plug and socket. It has become the de facto standard for commercial wirings.

140
Q

STP

A

Spanning Tree Protocol

A Layer 2 protocol that runs on bridges and switches. The specification for STP is IEEE 802.1D. The main purpose of STP is to ensure that you do not create loops when you have redundant paths in your network.

141
Q

SYSLOG

A

System Log

A way network devices can use a standard message format to communicate with a logging server. It was designed specifically to make it easy to monitor network devices.

142
Q

TACACS+

A

Terminal Access Controller Access Control Systems Plus

A family of related protocols handling remote authentication and related services for network access control through a centralized server. More secure than RADIUS.

143
Q

TCP

A

Transmission Control Protocol

A communications standard that enables application programs and computing devices to exchange messages over a network. It is designed to send packets across the internet and ensure the successful delivery of data and messages over networks.

144
Q

TFTP

A

Trivial File Transfer Protocol

A simple lockstep File Transfer Protocol which allows a client to get a file from or put a file onto a remote host using UDP.

145
Q

TIA/EIA

A

Telecommunications Industry Association/Electronic Industries Alliance

The standards body that creates the Physical layer specifications for Ethernet.

146
Q

TKIP

A

Temporal Key Integrity Protocol

Encryption method. TKIP provides per-packet key mixing a message integrity and re-keying mechanism. Deprecated.

147
Q

TLS

A

Transport Layer Security

Encrypts data sent over the Internet to ensure that eavesdroppers and hackers are unable to see what you transmit which is particularly useful for private and sensitive information such as passwords, credit card numbers, and personal correspondence. Superseded SSL.

148
Q

TTL

A

Time To Live

The amount of time or “hops” that a packet is set to exist inside a network before being discarded by a router.

149
Q

TX/RX

A

Transmit and Receive

150
Q

UDP

A

User Datagram Protocol

A communication protocol used across the Internet for especially time-sensitive transmissions such as video playback or DNS lookups. It speeds up communications by not formally establishing a connection before data is transferred.

151
Q

UPC

A

Ultra-Physical Contact

An improvement of the PC fiber connector with a better surface finish after an extended polishing and the return loss is better than PC structure, nearly -50dB or higher.

152
Q

UPS

A

Uninterruptible Power Supply

Device that allows a computer to keep running for at least a short time when incoming power is interrupted/power to the premises is not available.

153
Q

URL

A

Uniform Resource Locator

The address of a given unique resource on the Web.

154
Q

USB

A

Universal Serial Bus

Tiered star network with one host (master) and several devices (slaves).

155
Q

UTP

A

Unshielded Twisted Pair

A ubiquitous type of copper cabling used in telephone wiring and local area networks (LANs).

156
Q

VIP

A

Virtual IP

An IP address that is shared by both members of a HA server pool on the same subnet.

157
Q

VLAN

A

Virtual Local Area Network

A virtualized connection that connects multiple devices and network nodes from different LANs into one logical network.

158
Q

VM

A

Virtual Machine

A digital version of a physical computer that requires maintenance such as updates and system monitoring.

159
Q

VNC

A

Virtual Network Computing

A cross-platform screen sharing system that allows remote control of another computer.

160
Q

vNIC

A

Virtual Network Interface Card

Represents the configuration of a VM connected to a network.

161
Q

VoIP

A

Voice over Internet Protocol

A technology that allows you to make voice calls using a broadband Internet connection.

162
Q

VPN

A

Virtual Private Network

An encrypted connection over the Internet from a device to a network.

163
Q

VRRP

A

Virtual Router Redundancy Protocol

An IP routing redundancy protocol designed for transparent failover at the first-hop IP router.

164
Q

WAN

A

Wide Area Network

The technology that connects your offices, data centers, cloud applications, and cloud storage together.

165
Q

WAP

A

Wireless Access Point

A networking device that allows wireless-capable devices to connect to a wired network.

166
Q

WDM

A

Wavelength Division Multiplexing

A technology that increases bandwidth by allowing different data streams at different frequencies to be sent simultaneously over a single optical fiber network.

167
Q

WLAN

A

Wireless Local Area Network

Group of colocated computers or other devices that form a network based on radio transmissions.

168
Q

WPA

A

WIFI Protected Access

A security standard for computing devices with wireless internet connections.