Networking Terms Flashcards
WEP
Wired Equivalent Privacy
Wired Equivalent Privacy
WEP is a type of security protocol that was commonly used to secure wireless networks.
SSH
Secure Shell
Secure Shell
A secure network protocol used to log into and execute commands on a remote system
FTP
File Transfer Protocol
File Transfer Protocol
A network protocol used to transfer files from one system to another
Simple Mail Transfer Protocol
A protocol used to send and receive emails
SMTP
Simple Mail Transfer Protocol
HTTP
Hyper Text Transfer Protcol
Hyper Text Transfer Protocol
A client-server protocol used to send and receive data over the internet
SMB
Server Message Block
Server Message Block
A protocol used to share files, printers, and other resources in a network
NFS
Network File System
Network File System
A protocol used to access files over a network
SNMP
Simple Network Management Protocol
Simple Network Management Protocol
A protocol used to manage network devices
WPA
Wifi Protected Access
Wifi Protected Access
WPA is a wireless security protocol that uses a password to protect wireless networks from unauthorized access.
TKIP
Temporal Key Integrity Protocol
Temporal Key Integrity Protocol
TKIP is also a security protocol used in wireless networks but less secure.
Network Time Protocol
It is used to synchronize the timing of computers on a network.
NTP
Network Time Protocol
VLAN
Virtual Local Area Network
Virtual Local Area Network
It is a way to segment a network into multiple logical networks.
VTP
VLAN Trunking Protocol
VLAN Trunking Protocol
VTP is a Layer 2 protocol that is used to establish and maintain a virtual LAN (VLAN) spanning multiple switches.
RIP
Routing Information Protocol
Routing Information Protocol
RIP is a distance-vector routing protocol used in local area networks (LANs) and wide area networks (WANs).
OSPF
Open Shortest Path First
Open Shortest Path First
It is an interior gateway protocol (IGP) for routing traffic within a single Autonomous System (AS) in an Internet Protocol (IP) network.
IGRP
Interior Gateway Routing Protocol
Interior Gateway Routing Protocol
IGRP is a Cisco proprietary interior gateway protocol designed for routing within autonomous systems.
EIGRP
Enhanced Interior Gateway Routing Protocol
Enhanced Interior Gateway Routing Protocol
It is an advanced distance-vector routing protocol that is used to route IP traffic within a network.
PGP
Pretty Good Privacy
Pretty Good Privacy
PGP is an encryption program that is used to secure emails, files, and other types of data.
NNTP
Network News Transfer Protocol
Network News Transfer Protocol
NNTP is a protocol used for distributing and retrieving messages in newsgroups across the internet.
HSRP
Hot Standby Router Protocol
CDP
Cisco Discovery Protocol
Cisco Discovery Protocol
It is a proprietary protocol developed by Cisco Systems that allows network administrators to discover and manage Cisco devices connected to the network.
Hot Standby Router Protocol
HSRP is a protocol used in Cisco routers to provide redundancy in the event of a router or other network device failure.
VRRP
Virtual Router Redundancy Protocol
STP
Spanning Tree Protocol
Virtual Router Redundancy Protocol
It is a protocol used to provide automatic assignment of available Internet Protocol (IP) routers to participating hosts.
Spanning Tree Protocol
STP is a network protocol used to ensure a loop-free topology in Layer 2 Ethernet networks.
TACACS
Terminal Access Controller Access- Control System
SIP
Session Initiation Protocol
Session Initiation Protocol
It is a signaling protocol used for establishing and terminating real-time voice, video and multimedia sessions over an IP network.
Terminal Access Controller Access-Control System
TACACS is a protocol that provides centralized authentication, authorization, and accounting for network access.
VOIP
Voice Over IP
Voice Over IP
VOIP is a technology that allows for telephone calls to be made over the internet.
EAP
Extensible Authentication Protocol
Extensible Authentication Protocol
EAP is a framework for authentication that supports multiple authentication methods, such as passwords, digital certificates, one-time passwords, and public-key authentication.
LEAP
Lightweight Extensible Authentication Protocol
Lightweight Extensible Authentication Protocol
LEAP is a proprietary wireless authentication protocol developed by Cisco Systems. It is based on the Extensible Authentication Protocol (EAP) used in the Point-to-Point Protocol (PPP).
PEAP
Protected Extensible Authentication Protocol
Protected Extensible Authentication Protocol
PEAP is a security protocol that provides an encrypted tunnel for wireless networks and other types of networks.
SMS
Systems Management Server
Systems Management Server
SMS is a systems management solution that helps organizations manage their networks, systems, and mobile devices.
MBSA
Microsoft Baseline Security Analyzer
Microsoft Baseline Security Analyzer
It is a free security tool from Microsoft that is used to detect potential security vulnerabilities in Windows computers, networks, and systems.
SCADA
Supervisory Control and Data Acquistion
Supervisory Control and Data Acquistion
It is a type of industrial control system that is used to monitor and control industrial processes, such as those in manufacturing, power generation, and water and waste treatment.
VPN
Virtual Private Network
Virtual Private Network
VPN is a technology that allows users to create a secure, encrypted connection to another network over the internet.
IPsec
Internet Protocol Security
Internet Protocol Security
IPsec is a protocol used to provide secure, encrypted communication over a network. It is commonly used in VPNs, or Virtual Private Networks, to create a secure tunnel between two devices.
Point-to-point Tunneling Protocol
It is a protocol used to create a secure, encrypted tunnel for remote access.
PPTP
Point-to-Point Tunneling Protocol
NAT
Network Address Translation
Network Address Translation
NAT is a technology that allows multiple devices on a private network to connect to the internet using a single public IP address. NAT works by translating the private IP addresses of devices on the network into a single public IP address, which is then used to connect to the internet.
CRLF
Carriage Return Line Feed
Carriage Return Line Feed
Combines two control characters to indicate the end of a line and a start of a new one for certain text file formats.
AJAX
Asynchronous JavaScript and XML
Asynchronous JavaScript and XML
Web development technique that allows creating dynamic web pages using JavaScript and XML/JSON.
ISAPI
Internet Server Application Programming Interface
Internet Server Application Programming Interface
Allows to create performance-oriented web extensions for web servers using a set of APIs.
URI
Uniform Resource Identifier
Uniform Resource Identifier
It is a syntax used to identify a resource on the Internet.
URL
Uniform Resource Locator
Uniform Resource Locator
Subset of URI that identifies a web page or another resource on the Internet, including the protocol and the domain name.
IKE
Internet Key Exchange
Internet Key Exchange
IKE is a protocol used to set up a secure connection between two computers. It is used in virtual private networks (VPNs) to provide authentication and encryption for data transmission, protecting the data from outside eavesdropping and tampering.
GRE
Generic Routing Encapsulation
Generic Routing Encapsulation
This protocol is used to encapsulate the data being transmitted within the VPN tunnel.
RSH
Remote Shell
Remote Shell
It is a program under Unix that allows executing commands and programs on a remote computer.