Unfamiliar Acronyms Flashcards

1
Q

APT

A

Advanced Persistent Threat / Advanced Persistent Tool

An unauthorized person in a network, undetected, for an exceedingly long period of time. (e.g. Russia in our infrastructure after SolarWinds hack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ASIC

A

Application Specific Integrated Circuit

A specialized microchip designed to provide customized features to a specific application.

[Apparently used by Layer 3 Switches]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ASP

A

Application Service Provider

A business that provides software services (e.g. CRM, credit card processing) over a network (and the Internet) using standard protocol like HTTP. Has generally been replaced by SaaS, and differs from SaaS in the following ways:

  • ASPs try to focus on managing and hosting 3rd-party software, while SaaS vendors manage the software they have developed on their own.
  • ASPs provide more traditional client-server apps, requiring installation of “thin client” software on users’ PCs. On the other hand, SaaS rely solely on the Web and can be accessed via a web browser.
  • ASPs’ software architecture requires that, for each business, whereas SaaS solutions use multi-tenant architecture in which they serves multiple users and businesses.
  • ASPs don’t provide the same scalability and cost-saving as SaaS
  • ASP is basically a failed model [says one site]
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

BCP

A

Business Continuity Plan

A document that details how an organization intends to maintain business operations during a disaster.

i.e. The strategy for addressing potential threats to a company and creation of systems to aid in the prevention of threats and recovery from problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

BERT

A

Bit-Error Rate Test

A test to see the percentage of received bits of a data stream that has changed due to noise, interference, or other distortion.

BERT contains both a stress pattern generator (which can generate a variety of bit patterns) and an error detector (which is synchronized with the pattern generator and can determine the number of bit errors).

Unlike many other forms of testing, bit error rate, BER measures the full end to end performance of a system including the transmitter, receiver and the medium between the two.

[Pretty sure this is for Layer 1 testing]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

BLE

A

Bluetooth Low Energy (or Bluetooth LE)

Also called Bluetooth Smart, a new version of Bluetooth that provides a range comparable to the earlier version of Bluetooth, but that consumes less power.

A Bluetooth variant designed for use in IoT networks by battery-powered devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

BSSID

A

Basic Service Set Identifier

Identifier for a particular access point within a wireless LAN (WLAN). The MAC address of the AP is used as this identifier.

While an SSID (i.e. network name like ‘Mouse’) is sufficient for a WLAN with only one access point, when a WLAN contains multiple access points, the network needs a way to associate client traffic with a particular AP.

[See also ESSID]

Good overview: https://www.juniper.net/documentation/en_US/junos-space-apps/network-director3.7/topics/concept/wireless-ssid-bssid-essid.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CaaS

A

Communication as a Service

A service model in which communication services are provided virtually, such as VoIP or video conferencing.

e.g. Skype, Zoom, FaceTime, Facebook Messenger, Discord, Slack

[Ugh. Apparently also being used for Containers as a Service, like Kubernetes]

[See also DaaS, MaaS, and SECaaS]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CAM

A

Content Addressable Memory

A special kind of high-speed computer memory optimized for searching (rather than random access) often used in routers and switches for table lookup functions. (e.g. A switch stores its MAC address table in CAM.)

[Remember MAC / CAM related. In fact, MAC table often referred to as CAM table]
Also remember CAM v. RAM]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CARP

A

Common Address Redundancy Protocol

A protocol that enables multiple hosts on the same network to share a set of IP addresses and thus provides failover redundancy. It is commonly used with routers and firewalls and can provide load balancing.

A redundancy protocol that allows a number of devices to be grouped together to use a single virtual network interface among them.

[Remember Address Redundancy Protocol… but don’t get confused with ARP]

In some cases, you might have a set of IP addresses to share among multiple hosts. For example, if you have multiple routers that support multiple interfaces, and you want to interlace those routers as a fault-tolerant cluster, you would have a list of several IP addresses pointing to the cluster as a group. This is accomplished with CARP (Common Address Redundancy Protocol), which allows a pool of computers or interfaces to share
one or more IP addresses. This pool is known as a group of redundancy or redundancy group. When using CARP, one device, acting as the group master, receives requests for an IP address, then parcels out the requests to one of several devices in the group.

CARP is a free alternative to VRRP (Virtual Router Redundancy Protocol), or Cisco’s propriety version called HSRP (Hot Standby Routing Protocol). Although VRRP and HSRP function somewhat differently than CARP and are used solely for routers, the general idea is the same.

[See also: VRRP and HSRP]
[See also: GLBP]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CHAP

A

Challenge Handshake Authentication Protocol

A protocol that challenges a system to verify identity. CHAP is an improvement over Password Authentication Protocol (PAP) in which one-way hashing is incorporated into a three-way handshake. RFC 1334 applies to both PAP and CHAP.

An authentication protocol that operates over PPP and also encrypts usernames and passwords for transmission.

A remote-access authentication protocol used by PPP. [Sounds more like CHAP uses PPP??]

[Related to EAP, WiFi authentication]

[See also PAP and MS-CHAP]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CRAM-MD5

A

Challenge-Response Authentication Mechanism-Message Digest 5

An authentication mechanism built on the MD5 algorithm that provides some additional security when communicating over an unencrypted connection.

A challenge-response authentication mechanism.

N+ material is pretty vague on this, if even mentions at all. From website:

CRAM-MD5 is a widely used challenge-response mechanism that transfers hashed passwords instead of clear text passwords. It is official deprecated, initially in favor of first DIGEST-MD5 but today SCRAM-SHA-1. For insecure channels (e.g., when TLS is not used), it is has better properties than PLAIN since the unhashed password is not leaked. The disadvantage with hashed passwords is that the server cannot use normal authentication infrastructures such as PAM, because the server must have access to the unhashed password in order to validate every authentication attempt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CVE

A

Common Vulnerabilities and Exposure

Website that catalogs / indexes cybersecurity vulnerabilities. May be incorporated into security tools, etc.

https://cve.mitre.org/

[This was in Messer’s section on zero-day attacks, but I ignored it, thinking it wouldn’t be on test]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CVW

A

Collaborative Virtual Workspace

A software tool designed to support teams working across geographical distances.

An environment used for collaboration and interaction of participants that may be spread over large distances.

[May be set up as metaphorical “room” or “building” or “world.” You can access resources, chat room, etc. Was used by US military. MOOCs maybe?]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CWDM

A

Coarse Wave Division Multiplexing

One of the three types of multiplexing technologies used with fiber-optic cable (the other two being WDM and CWDM.)

[Note: Original WDM carries multiple light signals simultaneously by dividing a light beam into different wavelengths, or colors, on a single fiber. Like a prism. Originally only provided two wavelengths / channels per strand of fiber]

CWDM lowers cost by spacing frequency bands wider apart to allow for cheaper transceiver equipment. Coarse WDM multiplexers typically can support 4, 8, 16, or 18 channels per fiber. The effective distance of CWDM is more limited than DWDM because signal is not amplified.

An alternative to DWDM that is commonly used with television cable networks. The main thing to know about it is that it has relaxed stabilization requirements; thus, you can have vastly different speeds for download than upload.

[See also DWDM]

[Good write-up of these in Jill West book]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DaaS

A

Desktop as a Service

A service model in which desktop services, such as VDI, are provided virtually from a third-party provider, eliminating the need to build and manage your own infrastructure. [So basically, it’s operating system as a service?]

e.g. Citrix, Microsoft, Amazon, VMWare

VDI - Virtual desktop infrastructure (VDI) is a desktop virtualization technology wherein a desktop operating system, typically Microsoft Windows, runs and is managed in a data center. The virtual desktop image is delivered over a network to an endpoint device, which allows the user to interact with the operating system and its applications as if they were running locally. The endpoint may be a traditional PC, thin client device or a mobile device.

[Apparently also used for Data as a Service]

[See also CaaS, MaaS, and SECaaS]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DCS

A

Distributed Computer System or Distributed Control System

A computerized control system for a process or plant usually with many control loops, in which autonomous controllers are distributed throughout the system, but there is no central operator supervisory control. This is in contrast to systems that use centralized controllers; either discrete controllers located at a central control room or within a central computer. The DCS concept increases reliability and reduces installation costs by localizing control functions near the process plant, with remote monitoring and supervision.

Distributed control systems first emerged in large, high value, safety critical process industries, and were attractive because the DCS manufacturer would supply both the local control level and central supervisory equipment as an integrated package, thus reducing design integration risk. Today the functionality of SCADA and DCS systems are very similar, but DCS tends to be used on large continuous process plants where high reliability and security is important, and the control room is not geographically remote.

[See ICS and SCADA]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

DLR

A

Device Level Ring

A protocol that provides a means of detecting, managing, and recovering from faults in a ring-based topology network. If a failure occurs in the ring, the communication essentially turns around and starts traveling around the ring in the opposite direction, reaching their destination like nothing ever happened.
In short, it allows a system to tolerate a disconnect or failure without any consequences to performance and recover before the system even notices.

(‘Ring topology’ here does not refer to a backbone network ring of switches, but rather a ring that you would find inside of a cabinet with daisy-chained devices leveraging the dual Ethernet ports found on some pieces of hardware.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

DPI

A

Deep Packet Inspection

A type of data processing that inspects in detail the data being sent over a computer network, and may take actions such as alerting, blocking, re-routing, or logging it accordingly. Deep packet inspection is often used to baseline application behavior, analyze network usage, troubleshoot network performance, ensure that data is in the correct format, check for malicious code, eavesdropping, and internet censorship.

WireShark offers DPI. So do NGFW. Wiki says could be at Layer 2 and 3. Or could be Layers 2 to 7. One of my books emphasizes Layer 7.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

DR

A

Designated Router

An OSPF router intended to reduce network traffic by maintaining the complete routing database and then sending updates to the other routers on the shared network segment.

OR: In the context of OSPF, a router normally selected automatically to serve as a central collection point for routing information on a network.

[Is this really not in Messer notes?]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

DSSS v. FHSS

A

Direct Sequence Spread Spectrum v.
Frequency Hopping Spread Spectrum

[For short definitions, see bottom]

Two variations in the initial 802.11 wireless standard. These original standards are far too slow for modern networking needs and are no longer deployed.

Spread spectrum refers to the manner in which data signals travel through a radio frequency. With spread spectrum, data does not travel straight through a single RF band; this type of transmission is known as narrowband transmission. Spread spectrum, however, requires that data signals either alternate between carrier frequencies or constantly change their data pattern. Although the shortest distance between two points is a straight line (narrowband), spread spectrum is designed to trade bandwidth efficiency for reliability, integrity, and security. Spread-spectrum signal strategies use more bandwidth than in the case of narrowband transmission, but the trade-off is a data signal that is clearer and easier to detect.

Frequency-hopping spread-spectrum (FHSS) requires the use of narrowband signals that change frequencies in a predictable pattern. The term frequency hopping refers to data signals hopping between narrow channels. For example, consider the 2.4 GHz frequency band used by 802.11b/g. This range is divided into 70 narrow channels of 1 MHz each. Somewhere between 20 and several hundred milliseconds, the signal hops to a new channel following a predetermined cyclical pattern.

Because data signals using FHSS switch between RF bands, they have a strong resistance to interference and environmental factors. The FHSS signal strategy makes it well suited for installations designed to cover a large geographic area and where using directional antennas to minimize the influence of environmental factors is not possible.

FHSS is not the preferred spread-spectrum technology for today’s wireless standards. However, FHSS is used for some lesser-used standards and for cellular deployments for fixed broadband wireless access (BWA), where the use of DSSS (discussed next) is virtually impossible because of its limitations.

With DSSS transmissions, the signal is spread over a full transmission frequency spectrum. For every bit of data sent, a redundant bit pattern is also sent. This 32-bit pattern is called a chip. These redundant bits of data provide both security and delivery assurance. The reason transmissions are so safe and reliable is because the system sends so many redundant copies of the data, and only a single copy is required to have complete transmission of the data or information. DSSS can minimize the effects of interference and background noise.

As for a comparison between the two, DSSS has the advantage of providing better security and signal delivery than FHSS, but it is a sensitive technology, affected by many environmental factors.

SUMMARIES:

DSSS:

A modulation technique that, like other spread-spectrum technologies, distributes lower-level signals over several frequencies simultaneously.

Or:

A modulation technique in which the transmitted signal takes up more than the information signal that modulates the carrier or broadcast frequency. [Huh?]

-

FHSS:

A wireless signaling technique in which a signal jumps
between several different frequencies within a band
in a synchronization pattern known to the channel’s
receiver and transmitter.

OR

A multiple access method of transferring radio signals in the frequency-hopping code division multiple access (FH-CDMA) scheme. [Huh?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

DWDM

A

Dense Wavelength Division Multiplexing

One of the three types of multiplexing technologies used with fiber-optic cable (the other two being WDM and CWDM.)

[Note: Original WDM carries multiple light signals simultaneously by dividing a light beam into different wavelengths, or colors, on a single fiber. Like a prism. Originally only provided two wavelengths / channels per strand of fiber]

Increases the number of channels provided by normal WDM to between 80 and 320 channels. Dense WDM can be amplified en route and is typically used on high-bandwidth or long-distance WAN links, such as the connection between a large ISP and its (even larger) NSP (network service provider). [HOW??]

A form of multiplexing optical signals that replaces SONET/SDH regenerators with erbium doped fiber amplifiers (EDFAs) and can also amplify the signal and enable it to travel a greater distance. The main components of a DWDM system include the following:

Terminal multiplexer
Line repeaters
Terminal demultiplexer

[Huh??]

[Book says make you understand that DWDM works with SONET/SDH. So doesn’t replace them. Replaces something they used previously?]

[See also CWDM]

[Messer does mention this in passing. He said it’s a topology that may run under ethernet inside a provider’s network (Metropolitan-area Network). Not sure it made it into flashcards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

EBCDIC

A

Extended Binary Coded Decimal Interchange Code

A data format used by IBM mainframes? Makes no sense why this is included on text. Not mentioned in most of the books. Only place I see it mentioned is in references of it being converted to and from ASCII as an example of something that occurs that OSI Layer 6 (Presentation Layer.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

EDNS

A

Extension Mechanism for DNS

As specified by the Internet Engineering Task Force as RFC 2671, EDNS increases the size of the flags fields, return codes, and label types available in basic DNS

[Okay. But what’s the context / point??]

A mechanism that expands DNS parameters, thereby
increasing the protocol’s functionality.

From Meyers:

If you think about what DNS does, you can appreciate that it can be a big security issue. Simply querying a DNS server gives you a list of every computer name and IP address that it serves. This isn’t the kind of
information we want bad guys to have. The big fix is called DNS Security Extensions (DNSSEC). DNSSEC is an authorization and integrity protocol designed to prevent bad guys from impersonating legitimate DNS servers. It’s implemented through extension mechanisms for DNS (EDNS), a specification that expanded several parameter sizes but maintained backward compatibility with earlier DNS servers.

[Funny, because I was actually reading that EDNS opened door for amplified attacks?]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

ESD

A

Electrostatic Discharge

Commonly known as “static electricity.” The transfer of electrical charge between two bodies, such as when a technician touches a computer component.

Computer components are grounded inside a case, and computer power cables use three-prong plug (third prong is grounded).

Use ESD strap on wrist, or at least touch case before any component. Store sensitive components in antistatic bags.

[Not to be confused with EMI - Electromagnetic Interference]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

ESP

A

Encapsulated Security Payload

One of the two protocols used by IPSec. The other protocol is Authentication Header (AH).

AH provides authentication, integrity, and replay protection (but not confidentiality). Unlike ESP, AH also secures parts of the IP header of the packet (such as source / destination addresses).

ESP provides confidentiality, integrity, authentication. (Known as the “CIA Triad”). Also protect against replay attacks.

[Didn’t include AH in these flashcards, but probably should have. They’re also on the objectives]

[See also: SA, Security Associations]
[See also: Internet Key Exchange (IKE)]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

ESSID

A

Extended Service Set Identifier

Consists of all of the BSSIDs on a wireless LAN (WLAN). For all practical purposes, the ESSID identifies the same network as the SSID does. The term SSID is used most often.

[See also BSSID, which is just a unique identifier (i.e. MAC address) for individual access points]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

FDM

A

Frequency Division Multiplexing

One of the three common types of multiplexing used on copper lines (along with TDM and STDM).

Assigns different frequencies to create multiple frequency bands, each used by a subchannel, so that multiple signals can transmit on the line at the same time. Signals are modulated into different frequencies, then multiplexed to simultaneously travel over a single channel, and demultiplexed at the other end. Telephone companies once used FDM for all phone lines and now still use multiplex signals on residential phone lines for the last leg before entering a residence.

[Remember that multiplexing is a form of transmission that allows multiple signals to travel simultaneously over one medium. You put the streams together, and then have to separate them out again. i.e. demuxing]

[See also: TDM]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

GLBP

A

Gateway Load Balancing Protocol

A proprietary Cisco protocol that allows a pool of interfaces to share one or more IP addresses and also provides load balancing services.

A proprietary Cisco protocol that adds basic load-balancing functionality in an attempt to overcome the limitations of existing redundant router protocols.

[See also CARP]
[And maybe see also: VRRP and HSRP]

[Jesus Christ. What is the difference between all of these??]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

GPG

A

GNU Privacy Guard

An encryption software program that provides an alternative to PGP.

An IETF RFC 4880-compliant alternative to the PGP suite of cryptographic software.

If a Linux source file has been signed, you need to use the publisher’s public key and the gpg utility to verify the signature.

[Another one of those weird ones that are on acronym objectives, but aren’t really mentioned by any of the study material, and the context isn’t super clear]

[See also PGP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

GRE

A

Generic Routing Encapsulation

A Layer 3 protocol developed by Cisco that is used to transmit PPP, IP, and other kinds of messages through a tunnel. Like L2TP, GRE is used in conjunction with IPsec to increase the security of the transmissions.

A tunneling protocol developed by Cisco that is used to transmit PPP data frames through a VPN tunnel.

A routing encapsulation method that comes in a plain wrapper.

A common VPN tunneling protocol. See also:
PPTP, L2TP, OpenVPN, IKEv2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

HDLC

A

High-Level Data Link Control

A protocol that is widely used to transfer data over a serial digital line, such as T1 or ISDN. It performs the same framing and error detection functions as Ethernet but on a point-to-point link between two routers, rather than a shared access medium.

The Point-to-Point Protocol (PPP) is an adaptation of HDLC and forms the cornerstone of subscriber dial-up and broadband Internet access methods. It is defined by RFC 1661. PPP was developed for dial-up networking, but is still used over a variety of communications links, including DSL, SONET, and cellular.

A group of Layer 2 protocols that can provide either connection oriented or connectionless service for data transfer between nodes.

An ISO developed bit-oriented synchronous data link layer protocol used for point-to-point or point-to-multipoint connections. [Huh?]

[See also: PPP. Actually, it’s on acronym objectives but didn’t include it here. But maybe I should. It’s referenced repeatedly among these acronyms.]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

HSPA+

A

High-Speed Packet Access

A 3G mobile wireless technology released in 2008
that uses MIMO and sophisticated encoding techniques to achieve a maximum 168-Mbps downlink
throughput and 22-Mbps uplink throughput in its
current release.

Began as a 3G technology released in 2008 that uses MIMO and sophisticated encoding techniques to achieve a maximum 168 Mbps downlink throughput and 22 Mbps uplink throughput in its current release. To achieve such speeds, HSPA1 uses limited channels more efficiently and incorporates more antennas in MIMO transmission. However, faster and more flexible technologies, such as LTE, are overtaking HSPA+ in popularity. (LTE can theoretically acheive downlink data rates of up to 1 Gbps and uplink rates up to 100 Mbps. LTE currently fastest wireless broadband service in US.)

[The acronym objectives mention HSPA, but the books mention HSPA+. Sooo….]

[Compares to LTE (Long-Term Evolution), a 4G technology that uses a different access method than HSPA+.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

HSRP

A

Hot Standby Router Protocol

Cisco’s proprietary standard that assigns a virtual IP address to a group of routers. (CARP is a free alternative.)

While it is possible to configure hosts with multiple default gateways for fault tolerance, this does not work well in practice, as it requires a greater degree of complexity in the hosts’ routing algorithms than is typically implemented on an end system host.

To address this problem, Cisco developed the proprietary Hot Standby Router Protocol (HSRP), standardized in 1998 as RFC 2281. HSRP allows for multiple physical routers to serve as a single default gateway for a subnet. To do this, each router must
have an interface connected to the subnet, with its own unique MAC address and IP address. In addition, they also need to be configured to share a common virtual IP address and a common MAC address. The group of routers configured in this way is known as a standby group. They communicate among themselves using IP multicasts and choose an active router based on priorities configured by an administrator. The active router responds to any traffic sent to the virtual IP address. Of the remaining routers in the standby group, the router with the next highest priority is chosen as the
standby router. The standby router monitors the status of the active router and takes over the role if the active router becomes unavailable, also triggering the selection of a new standby router from the remaining routers in the group.

A Cisco proprietary protocol used for establishing redundant gateways.

[See also CARP and VRRP]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

HT

A

High Throughput

A feature of 802.11n for increased throughput on the network. The newer Very High Throughput (VHT) 802.11ac standard further increases network throughput.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Hz

A

Hertz

Equivalent to cycles per second, hertz is the unit of frequency defined as the number of cycles per second of a periodic phenomenon.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

ARIN v. IANA v. ICANN v. InterNIC

A

Jesus Christ. I still need to work on this. Not clear at all. Maybe look at Messer again

https://www.reddit.com/r/dns/comments/3eutoj/
stupid_question_what_is_the_difference_between/

ARIN - Regional Internet registry responsible for managing IPv4 and IPv6 IP number distribution for North American region, including US and Canada.

ICANN - Organization responsible for coordinating domain names and addresses.

The nonprofit corporation currently designated by the U.S. government to maintain and assign IP addresses.

IANA - Organization responsible for IP addresses, domain names, and protocol parameters. Some functions of IANA, such as domain name assignment, have been devolved into other organizations.

A nonprofit, U.S. government-funded group
that was established at the University of Southern
California and charged with managing IP address allocation and the Domain Name System. The
oversight for many of IANA’s functions was given
to ICANN in 1998; however, IANA continues to perform
Internet addressing and Domain Name System
administration.

InterNIC - Now known just as NIC (Network Information Center), this is the organization that was primarily responsible for domain name allocation.

More recently known as the NIC (Network
Information Center), a predecessor to ARIN in the
oversight and management of multiple Internet
resources, such as IP address allocation in North
America. [Looks like nowadays it mostly just provides reference docs and info about domain name registration]

[ICANN apparently operates InterNIC and IANA?]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

ICA

A

Independent Computer Architecture or Independent Computing Architecture

Citrix’s alternative to Microsoft Remote Desktop Protocol (RDP).

[See also: VNC. Not actually listed here]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

ICS

A

Internet Connection Sharing

The use of one device’s Internet connection to provide Internet connectivity to one or more other devices.

-

Also known simply as Internet sharing, the technique of enabling more than one computer to access the Internet simultaneously using a single Internet connection. When you use Internet sharing, you connect an entire LAN to the Internet using a single
public IP address.

ALTERNATE MEANING:

Industrial Control System

A general term used to describe industrial control systems such as supervisory control and data acquisition (SCADA) systems.

-

A group of networked computers used to manage a physical system of industrial processes.

-

The overall system that monitors and controls machines today is called an industrial control system (ICS).

An ICS has three basic components: input/output (I/O) functions on the machine, a controller, and the interface for the operator. Input and output work through sensors and actuators. Sensors monitor things like temperature,
for example, and the actuator makes changes that modify that temperature. The controller, some sort of computer, knows enough to manage the process,
such as “keep the temperature between 50 and 55 degrees Fahrenheit.” The operator watches some kind of monitor—the interface—and intervenes if necessary (Figure 17-11). Let’s scale this up to a factory and add a little more complexity…

As computing power went up and costs when down, it made much more sense to put smaller controllers directly on each machine, to distribute the computing load. This is a distributed control system (DCS). In a modern DCS, each of the local controllers connects (eventually) to a centralized controller—called the ICS server—where global changes can be made managed

[Meyers has great stuff on ICS v. DCS]

[See DCS and SCADA]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

IGMP

A

Internet Group Message Protocol

A Network layer protocol used on IPv4 networks to manage multicast transmissions.

A protocol in the TCP/IP suite that supports multicasting in a routed environment.

A protocol used for communication between devices within the same multicast group. IGMP provides a mechanism for systems to detect and make themselves aware of other systems in the same group.

[Not to be confused with ICMP]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

IKE

A

Internet Key Exchange

An IPsec protocol that uses X.509 certificates for authentication.

The Internet Key Exchange (IKE) protocol is the part of the IPSec protocol suite that handles authentication and key exchange, referred to as Security Associations (SA). IKE is also referred to as Internet Security Association and Key Management Protocol (ISAKMP). IKE negotiations use UDP port 500. The negotiations take place over two phases…

[Pengelly book has good stuff on this, and discusses IKE versus IKEv2]

IKEv2 - A component of the IPsec protocol suite, offers fast throughput and good stability when moving between wireless hotspots. It’s compatible with a wide variety of devices and is often recommended by VPN providers as the most secure option among the VPN protocols they support.

A common VPN tunneling protocol. See also:
PPTP, GRE, L2TP, OpenVPN, IKEv2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

ISAKMP

A

Internet Security Association and Key Management Protocol

Defined by RFC 2408, ISAKMP is a protocol typically used by IKE for key exchange.

One of two services in the key management phase of creating a secure IPsec connection. ISAKMP works within the IKE process to establish policies for managing the keys.

Pengelly says ISAKMP is synonym for IKE. Other books don’t seem to agree.

[See also: IKE]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

IS-IS

A

Intermediate System to Intermediate System

A link-state protocol that discovers the shortest path for data to travel using the shortest path first (SPF) algorithm. IS-IS routers distribute topology information to other routers, allowing them to make the best path decisions.

A link-state routing protocol that uses a bestpath
algorithm. IS-IS was originally codified by ISO,
which referred to routers as “intermediate systems,”
thus the protocol’s name.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

ITS

A

Intelligent Transportation System

A traffic management system intended for use in creating smart transportation networks.

[WTH. Only in one book, w/ a lame definition. What does this have to do with anything?]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

IV

A

Initialization Vector

A fixed-size input used in cryptography. The larger initialization vector, the more it increases the difficulty in cracking and minimizes the risk of replay.

The initial, arbitrary number used to randomize the encryption process.

WEP is subject to many types of WEP attacks. Hackers can easily crack WEP, for two reasons: the size of the encryption key and the way the key is updated. First, the WEP keys were never really 64- and 128-bit. WEP uses an encryption cipher called RC4. There’s nothing inherently wrong with RC4, but RC4 is a stream cipher and needs a little code to start the encryption
process, just like a water pump needs some water in the pump before it works. This extra code is stored in the key in the form of what’s called an initialization vector (IV). The IV with WEP is 24 bits, which means the encryption part of a WEP key is only 40-bit or 104-bit.

[Messer mentions in passing when discussing WPA replacing WEP. But not clear what it is.]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

KVM

A

Keyboard Video Mouse

A device that connects the equipment in a rack to a
single console to provide a central control portal for
all devices on the rack.

[Ahhh… now it makes sense. Jesus Christ, some of these books are almost useless in their definitions]

A device that allows one keyboard, one mouse, and one monitor to be used with multiple devices.

[By the way, these are the three things RDP lets you access remotely]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

L2TP

A

Layer 2 Tunneling Protocol

A VPN tunneling protocol based on technology developed by Cisco and standardized by the IETF. L2TP encapsulates PPP data in a similar manner to PPTP, but differs in a few key ways. Unlike PPTP,
L2TP is a standard accepted and used by multiple vendors, so it can connect a VPN that uses a mix of equipment types—for example, a Juniper router, a Cisco router, and a NETGEAR router. Also, L2TP can connect two routers, a router and a remote access server, or a client and a remote access server. Typically, L2TP is implemented with IPsec for security, and this L2TP/IPsec combination is considered secure and acceptable for most situations.

A common VPN tunneling protocol. See also:
PPTP, GRE, OpenVPN, IKEv2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

LACP

A

Link Aggregation Control Protocol

An IEEE specification that provides a control method of bundling several physical ports into one single channel.

A protocol currently defined by IEEE’s 802.1AX standard
that dynamically coordinates communications
between two hosts on aggregated connections.

Link aggregation means combining two or more separate cabled links into a single logical channel, referred to as an EtherChannel. From the host end, this can also be called NIC teaming; at the switch end, it can be called port aggregation. The term bonding is also widely substituted for aggregation. For example, a single network adapter and cable segment might support 1 Gbps; bonding this with another adapter
and cable segment gives a link of 2 Gbps. Link aggregation can also provide redundancy; if one link is broken, the connection is still maintained by the other (failover).

…802.3ad also defines the Link Aggregation Control Protocol (LACP), which can be used to detect configuration errors and recover from the failure of one of the physical links.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

LEC

A

Local Exchange Carrier

A term in the US for a local telephone company.

A regulatory term used in telephony to represent the local telephone provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

LLC

A

Logical Link Control

A sublayer of Layer 2 that is primarily concerned with multiplexing, flow and error control, and reliability.

(The other Layer 2 sublayer is the Media Access Control, or MAC, sublayer, which defines how multiple network interfaces share a single transmission medium. Handles logical topology (bus or ring); addressing, frame format, error checking.)

A division of the Data Link layer described by the IEEE.
It is responsible for establishing and maintaining a link between communicating devices for the transmission of frames.

A sublayer of the data link layer of the OSI model. The LLC layer provides an interface for network layer protocols and the MAC sublayer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

LLDP

A

Link Layer Discovery Protocol

A Layer 2 protocol used by nodes on a network to advertise their identity and capabilities.

A protocol used by network devices for advertising on an IEEE 802 local area network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

LSA

A

Link State Advertisements

A method of OSPF communication in which the router sends the local routing topology to all other local routers in the same OSPF area.

Routers use a Link State Advertisement (LSA) to update their routing tables. In a given area, routers exchange OSPF “hello” messages, both as a form of a keep-alive packet and in order to acquire neighbors with which to exchange routing information. These exchanges of routing information enable the routers to each build
a topological routing tree (a shortest path tree) and keep it up to date. The use of areas to subdivide the network minimizes the amount of routing traffic that must be passed around the network as a whole, improving convergence performance.

In the context of OSPF, a message type sent by routers to communicate information about the network’s topology.

53
Q

LWAPP

A

Light Weight Access Point Protocol

More commonly known as Lightweight, this is a protocol simplifying communication with multiple access points at the same time.

A wireless protocol created by Cisco that makes centralized wireless management possible.

To aid in the configuration of access points, you can use LWAPP. Access points using LWAPP require a controller to manage the configuration. This is part of the ease of configuration, as you can simply add/register an access point on the controller, and the controller takes care of the actual configuration of the access point for you. A stand-alone access point is known as a thick AP, whereas you can use LWAPP to configure what is known as a thin AP.

Any WAP that you can access directly and configure singularly via its own interface is called a thick client. A WAP that can only be configured by a
wireless controller is called a thin client. For years, these centralized configuration methods were proprietary for each wireless manufacturer, making for little or no cross-brand interoperability. This incompatibility in thin and thick clients was a common wireless issue back in the day. Today, most manufacturers use the Lightweight Access Point Protocol (LWAPP) to ensure interoperability. Given LWAPP’s broad acceptance, most WAPs will accept commands from any wireless controller.

54
Q

MaaS

A

Mobility as a Service - A service model in which public or shared transportation services are accessed virtually, such as through a phone app.

e.g. Uber, Lyft

Also known as TaaS - Transportation as a Service

55
Q

MDI v. MDIX

A

Media Dependent Interface or Medium Dependent Interface

A type of port found on Ethernet networking devices, such as hubs and switches, in which the wiring is straight through. MDI ports are sometimes called uplink ports. They are intended for use as connectivity points to other hubs and switches.

MDIX (media dependent interface crossover)

A type of port found on Ethernet networking devices in which the wiring is crossed so that the transmit line of one device becomes the receive line of the other. MDI-X is used to connect hubs and switches to client computers.

[Wait. This doesn’t really make sense. Cross-over is for DIFFERENT kinds of devices, right? Very confusing. Huh, it looks like you use a crossed port with a straight-through cable. And a straight-through port with a cross-over cable. WTF. Or maybe that’s wrong, too…. yeah, read below. I think you just always use a straight-through cable now]

Crossover cable is no longer required for this type of application, as many switches either have an uplink port for this purpose or can autodetect and select
between an uplink and straight-through connection. This is referred to as auto-MDI/MDI-X; MDI means Medium Dependent Interface and MDI-X means a crossover interface. All Gigabit Ethernet ports support auto-MDI/MDI-X.

[Related to MDI-X, as in the Auto-MDI-X feature that automatically recognizes straight-through or cross-over cables?]

56
Q

MLA

A

Master License Agreement / Multilateral Agreement

[Not to be confused with SLA]

57
Q

MLA

A

Master License Agreement / Multilateral Agreement

[Not to be confused with SLA]
[See also MSA]

58
Q

MMF

A

Multimode Fiber

[See also SMF - Single Mode Fiber]
[This is discussed, but Messer didn’t use acronym]

59
Q

MOU

A

Memorandum of Understanding

60
Q

MS-CHAP

A

Microsoft Challenge Handshake Authentication Protocol

[Related to EAP, WiFi authentication]

[See also MS-CHAP]

61
Q

MS-CHAP

A

Microsoft Challenge Handshake Authentication Protocol

[Related to EAP, WiFi authentication]

[See also CHAP] and PAP

62
Q

MSA

A

Master Service Agreement

[Not to be confused with SLA]
[See also MLA]

63
Q

MSDS

A

Material Safety Data Sheet

[Messer mentions in passing. Discusses how to handle toxic waste in things like batteries and printer toner. All components have these]

64
Q

NCP

A

Network Control Protocol

65
Q

NDR

A

Non-Delivery Receipt

[Not to be confused with NDA]

66
Q

NetBEUI

A

Network Basic Input/Output Exttended User Interface

[See also NetBIOS]

67
Q

NetBIOS

A

Network Basic Input/Output System

[Messer does talk about this in context of SMB. Kinda confusing]
[See also NetBEUI]

68
Q

NFS

A

Network File Service

69
Q

NNTP

A

Network News Transport Protocol

70
Q

OCSP

A

Online Certificate Status Protocol

71
Q

OID

A

Object Identifier

72
Q

OOB

A

Out of Band

[Messer doesn’t use acronym, but does talk about Out of Band Management of network devices. Like using a modem to access a router when the network is down. Also refers to emergency out of band patches in an OS]

73
Q

OUI

A

Organizationally Unique Identifier

First half of a MAC address that identifies manufacturer

[Messer does touch on this and it’s in my flashcards, but easy to miss]

74
Q

PAP

A

Password Authentication Protocol

[see also CHAP and MS-CHAP]

75
Q

PCM

A

Phase-Change Memory

76
Q

PDoS

A

Permanent Denial of Service

77
Q

PGP

A

Pretty Good Privacy

[See also: GPG]

78
Q

PPTP

A

Point-to-Point Tunneling Protocol

An older, Layer 2 protocol developed by Microsoft that encapsulates VPN data frames. It uses TCP segments at the Transport layer. PPTP supports the encryption, authentication, and access services provided by the VPN server; however, PPTP itself is outdated and is no
longer considered secure.

A common VPN tunneling protocol. See also:
GRE, L2TP, OpenVPN, IKEv2

[See also: PPP and PPoE]

79
Q

PTP

A

Point-to-Point

[As opposed to PPP - Point-to-Point Protocol]

80
Q

PVC

A

Permanent Virtual Circuit

[Not to be confused with Polyvinyl Chloride]
[See also - SVC - Switched Virtual Circuit]

81
Q

RARP

A

Reverse Address Resolution Protocol

82
Q

RAS

A

Remote Access Service

83
Q

RFI

A

Radio Frequency Interference

[See also EMI]

84
Q

RFP

A

Request for Proposal

85
Q

RG

A

Radio Guide

86
Q

RPO

A

Recovery Point Objective

[See also RTO]

87
Q

RSA

A

Rivest, Shamir, Adelman

88
Q

RSH

A

Remote Shell

[v. SSH?]

89
Q

RTO

A

Recovery Time Objective

[See also RPO]

90
Q

RTP

A

Real-Time Protocol

91
Q

RTSP

A

Real-Time Streaming Protocol

92
Q

RTT

A

Round Trip Time or Real Transfer Time

93
Q

SA

A

Security Association

The establishment of shared security attributes between two entities on a network to support secure communications between them. i.e. key exchange (I think)

[See also: Encapsulated Security Payload (ESP)]
[See also: Internet Key Exchange (IKE)]

94
Q

SCADA

A

Supervisory Control and Data Acquisition

[See ICS and DCS]

95
Q

SCP

A

Secure Copy Protocol

96
Q

SDLC

A

Software Development Life Cycle

97
Q

SDP

A

Session Description Protocol

98
Q

SECaaS

A

Security as a Service

A cloud delivered model for outsourcing cybersecurity services.

e.g. CloudFlare and Incapsula.

99
Q

SGCP

A

Simple Gateway Control Protocol

100
Q

SLAAC

A

Stateless Address Auto Configuration

Automatically configures an IP address [IPv6, I believe] without a DHCP server. Uses Neighbor Discovery Protocol (NDP)

[Messer mentions in passing]

101
Q

SLIP

A

Serial Line Internet Protocol

102
Q

SMF

A

Single-Mode Fiber

[See also MMF - Multimode Fiber]
[This is discussed, but Messer didn’t use acronym]

103
Q

SNR

A

Signal-to-Noise Ratio

104
Q

SNTP

A

Simple Network Time Protocol

[Different than NTP?]

105
Q

SOA

A

Start of Authority

106
Q

SOP

A

Standard Operating Procedure

107
Q

SOW

A

Statement of Work

108
Q

SPB

A

Shortest Path Bridging

109
Q

SPI

A

Stateful Packet Inspection

[Firewalls?]

110
Q

SPS

A

Standby Power Supply

[v. UPS - Uninterruptible Power Supply?]

111
Q

SVC

A

Switched Virtual Circuit

[See also PVC - Permanent Virtual Circuit]

112
Q

TA

A

Terminal Adaptor

113
Q

TDM

A

Time Division Multiplexing

One of the three common types of multiplexing used on copper lines (along with FDM and STDM).

Divides a channel into multiple intervals of time, or time slots. Time slots are reserved for their designated nodes regardless of whether the node has data to transmit. This can be inefficient if some nodes on the network rarely send data.

[Remember that multiplexing is a form of transmission that allows multiple signals to travel simultaneously over one medium. You put the streams together, and then have to separate them out again. i.e. demuxing]

[See also: FDM]
[Related to TDMA?]

114
Q

TMS

A

Transportation Management System

115
Q

TOS

A

Type of Service

[Not to be confused with Terms of Service]

116
Q

TPM

A

Trusted Platform Module

117
Q

UC

A

Unified Communications

118
Q

UNC

A

Universal Naming Convention

[Not to be confused with UTM - Unified Threat Management]

119
Q

VRF

A

Virtual Route Forwarding

120
Q

VRRP

A

Virtual Router Redundancy Protocol

[See also CARP]

121
Q

VTC

A

Virtual Teleconference

122
Q

VTP

A

VLAN Trunk Protocol

123
Q

WAF

A

Web Application Firewall

124
Q

WMS

A

Warehouse Management System

125
Q

WPS

A

WiFi Protected Setup

126
Q

WWN

A

World Wide Name

127
Q

XDSL

A

Extended Digital Subscriber Line

128
Q

XML

A

eXtensible Markup Language

129
Q

Zeroconf

A

Zero Configuration