Networking Acronyms

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

An ______ is commonly used to manage network permissions and access rights, specifying which users or groups have access to particular resources.

Access Control List

The ______ field is an integral part of an IP packet, ensuring that packets do not loop indefinitely on a network.

Time to Live

Organizations use a(n) ______ to outline the rules and acceptable behaviors of its users when using the organization's network and internet resources.

Acceptable Use Policy

Used to automate IP configuration, a ______ server assigns IP addresses, subnet masks, default gateways, and DNS server addresses to devices on a network.

<p>Dynamic Host Configuration Protocol</p> Signup and view all the answers

A ______ is a protocol that allows network devices to discover each other, which is especially useful in large networks with many interconnected devices.

<p>Link Layer Discovery Protocol</p> Signup and view all the answers

In virtualization, a ______ provides a logical, isolated network segment within a physical network, enabling different groups of devices to communicate as if they are on their own dedicated network.

<p>Virtual Local Area Network</p> Signup and view all the answers

The ______ protocol is a method used to automatically assign IP addresses to devices on a network without the need for a DHCP server.

<p>Stateless Address Autoconfiguration</p> Signup and view all the answers

Acting as a virtual firewall, a ______ inspects network traffic and applies security policies to protect a network, allowing for centralized security management.

<p>Unified Threat Management</p> Signup and view all the answers

When an organization needs to protect sensitive data and requires users to verify their identity using multiple methods, they would impliment ______.

<p>Multifactor Authentication</p> Signup and view all the answers

A ______ is a storage architecture that allows you to attach storage directly to a server.

<p>Direct-attached Storage</p> Signup and view all the answers

The purpose of a ______ is to inspect network traffic for malicious activity, whereas a ______ blocks malicious activity from reaching the network.

<p>Intrusion Detection System</p> Signup and view all the answers

A ______ is a system that connects computer systems and devices in a limited geographical area such as an office.

<p>Local Area Network</p> Signup and view all the answers

The job of a ______ is to translate domain names to IP addresses, enabling users to access websites and other network resources using easy-to-remember names.

<p>Domain Name System</p> Signup and view all the answers

A ______ is a system that provides centralized authentication, authorization, and accounting for users accessing a network.

<p>Remote Authentication Dial-in User Service</p> Signup and view all the answers

A ______ is an agreement between a service provider and a customer that specifies the level of service to be provided.

<p>Service-level Agreement</p> Signup and view all the answers

A ______ is a security protocol that encrypts data transmitted over a network and is mainly used to secure web traffic.

<p>Secure Socket Layer</p> Signup and view all the answers

The term ______ describes the practice of managing and automating infrastructure through code rather than manual processes.

<p>Infrastructure as Code</p> Signup and view all the answers

A ______ is a process where a network device translates a private IP address to a public IP address, allowing multiple devices on a private network to share a single public IP address.

<p>Network Address Translation</p> Signup and view all the answers

A ______ is a network security concept centered on the belief that organizations should not automatically trust anything inside or outside its perimeters and instead must verify anything and everything trying to connect to its systems before granting access.

<p>Zero Trust Architecture</p> Signup and view all the answers

A ______ vulnerability can allow a threat actor to overwhelm a system by exhausting its resources.

<p>Denial-of-service</p> Signup and view all the answers

The purpose of ______ is to examine past security events for identification of trends, suspicious activity, and security incidents.

<p>Security Information and Event Management</p> Signup and view all the answers

A ______ is a network that is geographically dispersed.

<p>Wide Area Network</p> Signup and view all the answers

A ______ takes advantage of a combination of software-defined networking (SDN) principles to manage the WAN.

<p>Software-defined Wide Area Network</p> Signup and view all the answers

A ______ is used for identifying and tracking objects using radio waves. Commonly used in retail, supply chain, and access control systems.

<p>Radio Frequency Identifier</p> Signup and view all the answers

A framework known as ______ is a collection of industry standards with requirements for security management, policies, procedures, network architecture, software design and other critical protective measures.

<p>Payment Card Industry Data Security Standards</p> Signup and view all the answers

A ______ is a technology that allows for transmitting electrical power along with data on Ethernet cabling.

<p>Power over Ethernet</p> Signup and view all the answers

The use of ______ provides protection for data crossing untrusted networks, ensuring data integrity, authentication, and confidentiality.

<p>Internet Protocol Security</p> Signup and view all the answers

Utilizing a ______ ensures the continuous operation of critical systems during power outages, providing backup power and protecting equipment from voltage surges and fluctuations.

<p>Uninterruptible Power Supply</p> Signup and view all the answers

Remote access solutions often rely on the ______ as it creates a secure, encrypted connection over the internet, protecting data transmitted between a user's device and a private network.

<p>Virtual Private Network</p> Signup and view all the answers

Centralized authentication and authorization for network devices is often achieved through ______, streamlining user management and improving security across the network infrastructure.

<p>Terminal Access Controller Access Control System Plus</p> Signup and view all the answers

The cloud computing model known as ______ provides virtualized computing resources over the internet.

<p>Infrastructure as a Service</p> Signup and view all the answers

The cloud computing model known as ______ removes the need for organizations to manage the underlying infrastructure, focusing instead on application development and deployment.

<p>Platform as a Service</p> Signup and view all the answers

A ______ architecture provides a framework that unifies network and security services in the cloud, offering simplified management, enhanced security, and optimized connectivity for distributed workforces.

<p>Secure Access Service Edge</p> Signup and view all the answers

The purpose of ______ is to keep sensitive data safe from being lost, stolen, or misused.

<p>Data Loss Prevention</p> Signup and view all the answers

The goal of ______ is to minimize downtime and data loss in case of disasters.

<p>Disaster Recovery</p> Signup and view all the answers

To verify identity using a fingerprint scan, facial recognition or a one-time code sent to a mobile device, you would use ______.

<p>Multifactor Authentication</p> Signup and view all the answers

A common routing protocol called ______ is used by routers within an autonomous system to exchange routing information, determining the best paths for data to travel across a network.

<p>Open Shortest Path First</p> Signup and view all the answers

In cloud computing, ______ offers on-demand access to software applications over the internet, eliminating the need for local installation and maintenance.

<p>Software as a Service</p> Signup and view all the answers

A ______ is a unique identifier assigned to a wireless network, allowing wireless devices to connect to the correct network.

<p>Service Set Identifier</p> Signup and view all the answers

A ______ policy helps ensure that employees use technology and network assets responsibly.

<p>Acceptable Use Policy</p> Signup and view all the answers

Flashcards

ACL (Access Control List)

A list of rules that determine which users or groups are granted access to objects and the operations allowed on given objects.

AH (Authentication Header)

A header used in IPSec to provide authentication and integrity for network packets.

AP (Access Point)

A device that allows wireless devices to connect to a wired network using Wi-Fi.

API (Application Programming Interface)

A set of rules and specifications that software programs can follow to communicate with each other.

Signup and view all the flashcards

APIPA (Automatic Private Internet Protocol Addressing)

A feature in Windows that automatically assigns an IP address to a computer when a DHCP server is not available.

Signup and view all the flashcards

ARP (Address Resolution Protocol)

A protocol used to map an IP address to a physical MAC address in a local network.

Signup and view all the flashcards

AUP (Acceptable Use Policy)

A document stipulating constraints and practices that a user must adhere to for access to a corporate network or the Internet.

Signup and view all the flashcards

BGP (Border Gateway Protocol)

A standardized exterior gateway protocol designed to exchange routing and reachability information between autonomous systems (AS) on the Internet

Signup and view all the flashcards

BNC (Bayonet Neill–Concelman)

A type of connector used with coaxial cable such as in Ethernet 10BASE2 networks.

Signup and view all the flashcards

BSSID (Basic Service Set Identifier)

The unique identifier for a wireless network. It's the MAC address of the access point.

Signup and view all the flashcards

BYOD (Bring Your Own Device)

Policy allowing employees to use their personal mobile devices for work.

Signup and view all the flashcards

CAM (Content-addressable Memory)

A special type of memory used in high-speed searching applications, where the memory returns the address of the location based on the content.

Signup and view all the flashcards

CDN (Content Delivery Network)

A geographically distributed group of servers which work together to provide fast delivery of Internet content.

Signup and view all the flashcards

CDP (Cisco Discovery Protocol)

A Cisco proprietary Layer 2 protocol used to gather information about directly connected Cisco devices.

Signup and view all the flashcards

CIA (Confidentiality, Integrity, and Availability)

A security model that ensures data is kept private, not altered without authorization, and available when needed.

Signup and view all the flashcards

CIDR (Classless Inter-domain Routing)

An IP addressing scheme that improves upon the older classful network addressing architecture. It allows for more efficient allocation of IP addresses.

Signup and view all the flashcards

CLI (Command-line Interface)

A text-based interface used to operate a device by typing in commands.

Signup and view all the flashcards

CNAME (Canonical Name)

A type of DNS record that maps an alias hostname to a canonical hostname.

Signup and view all the flashcards

CPU (Central Processing Unit)

The primary component of a computer that processes instructions.

Signup and view all the flashcards

CRC (Cyclic Redundancy Check)

An error-detecting code commonly used in digital networks and storage devices to detect accidental changes to raw data.

Signup and view all the flashcards

DAC (Direct Attach Copper)

A type of cable that transmits digital data signals.

Signup and view all the flashcards

DAS (Direct-attached Storage)

Digital storage directly attached to a server or computer.

Signup and view all the flashcards

DCI (Data Center Interconnect)

High-bandwidth, low-latency connections that link geographically disparate data centers.

Signup and view all the flashcards

DDoS (Distributed Denial-of-service)

A cyber-attack where the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

Signup and view all the flashcards

DHCP (Dynamic Host Configuration Protocol)

A network protocol that enables a server to automatically assign an IP address to a computer from a defined range of numbers configured for a given network.

Signup and view all the flashcards

DLP (Data Loss Prevention)

Measures implemented to prevent sensitive information from leaving an organization.

Signup and view all the flashcards

DNS (Domain Name System)

The phonebook of the Internet. It translates domain names to IP addresses.

Signup and view all the flashcards

DNSSEC (Domain Name System Security Extensions)

A suite of extensions to DNS which provides authentication of DNS data, preventing attackers from manipulating or poisoning DNS data.

Signup and view all the flashcards

DoH (DNS over Hypertext Transfer Protocol Secure)

A security protocol that encrypts DNS queries over HTTPS, increasing privacy and security.

Signup and view all the flashcards

DoS (Denial-of-service)

A type of cyber attack in which a malicious user attempts to make a computer resource unavailable to its intended users.

Signup and view all the flashcards

DoT (DNS over Transport Layer Security)

A security protocol that encrypts DNS queries over TLS, which increases privacy and security.

Signup and view all the flashcards

DR (Disaster Recovery)

The process by which an organization recovers access to their software, data, and hardware that are needed to resume critical business functions after a disaster.

Signup and view all the flashcards

EAPoL (Extensible Authentication Protocol over LAN)

An authentication protocol used in wireless networks, which transports the EAP frames over a LAN.

Signup and view all the flashcards

EIGRP (Enhanced Interior Gateway Routing Protocol)

An enhanced distance-vector routing protocol used on a computer network for automating routing decisions and configuration.

Signup and view all the flashcards

EOL (End-of-life)

When a product is no longer being produced or offered for sale.

Signup and view all the flashcards

EOS (End-of-support)

The date after which a product is no longer supported with updates or patches.

Signup and view all the flashcards

ESP (Encapsulating Security Payload)

A protocol within IPSec that provides encryption and authentication.

Signup and view all the flashcards

ESSID (Extended Service Set Identifier)

A unique identifier that wireless network devices use to establish and maintain connectivity in an extended service set. This allows users to roam between access points.

Signup and view all the flashcards

EULA (End User License Agreement)

A legal agreement between a software application provider and the end user.

Signup and view all the flashcards

Study Notes

  • ACL: Access Control List.
  • AH: Authentication Header.
  • AP: Access Point.
  • API: Application Programming Interface.
  • APIPA: Automatic Private Internet Protocol Addressing.
  • ARP: Address Resolution Protocol.
  • AUP: Acceptable Use Policy.
  • BGP: Border Gateway Protocol.
  • BNC: Bayonet Neill–Concelman.
  • BSSID: Basic Service Set Identifier.
  • BYOD: Bring Your Own Device.
  • CAM: Content-addressable Memory.
  • CDN: Content Delivery Network.
  • CDP: Cisco Discovery Protocol.
  • CIA: Confidentiality, Integrity, and Availability.
  • CIDR: Classless Inter-domain Routing.
  • CLI: Command-line Interface.
  • CNAME: Canonical Name.
  • CPU: Central Processing Unit.
  • CRC: Cyclic Redundancy Check.
  • DAC: Direct Attach Copper.
  • DAS: Direct-attached Storage.
  • DCI: Data Center Interconnect.
  • DDoS: Distributed Denial-of-service.
  • DHCP: Dynamic Host Configuration Protocol.
  • DLP: Data Loss Prevention.
  • DNS: Domain Name System.
  • DNSSEC: Domain Name System Security Extensions.
  • DoH: DNS over Hypertext Transfer Protocol Secure.
  • DoS: Denial-of-service.
  • DoT: DNS over Transport Layer Security.
  • DR: Disaster Recovery.
  • EAPoL: Extensible Authentication Protocol over LAN.
  • EIGRP: Enhanced Interior Gateway Routing Protocol.
  • EOL: End-of-life.
  • EOS: End-of-support.
  • ESP: Encapsulating Security Payload.
  • ESSID: Extended Service Set Identifier.
  • EULA: End User License Agreement.
  • FC: Fibre Channel.
  • FHRP: First Hop Redundancy Protocol.
  • FTP: File Transfer Protocol.
  • GDPR: General Data Protection Regulation.
  • GRE: Generic Routing Encapsulation.
  • GUI: Graphical User Interface.
  • HTTP: Hypertext Transfer Protocol.
  • HTTPS: Hypertext Transfer Protocol Secure.
  • IaaS: Infrastructure as a Service.
  • IaC: Infrastructure as Code.
  • IAM: Identity and Access Management.
  • ICMP: Internet Control Message Protocol.
  • ICS: Industrial Control System.
  • IDF: Intermediate Distribution Frame.
  • IDS: Intrusion Detection System.
  • IoT: Internet of Things.
  • IIoT: Industrial Internet of Things.
  • IKE: Internet Key Exchange.
  • IP: Internet Protocol.
  • IPAM: Internet Protocol Address Management.
  • IPS: Intrusion Prevention System.
  • IPSec: Internet Protocol Security.
  • IS-IS: Intermediate System to Intermediate System.
  • LACP: Link Aggregation Control Protocol.
  • LAN: Local Area Network.
  • LC: Local Connector.
  • LDAP: Lightweight Directory Access Protocol.
  • LDAPS: Lightweight Directory Access Protocol over SSL.
  • LLDP: Link Layer Discovery Protocol.
  • MAC: Media Access Control.
  • MDF: Main Distribution Frame.
  • MDIX: Medium Dependent Interface Crossover.
  • MFA: Multifactor Authentication.
  • MIB: Management Information Base.
  • MPO: Multifiber Push On.
  • MTBF: Mean Time Between Failure.
  • MTTR: Mean Time To Repair.
  • MTU: Maximum Transmission Unit.
  • MX: Mail Exchange.
  • NAC: Network Access Control.
  • NAS: Network-attached Storage.
  • NAT: Network Address Translation.
  • NFV: Network Functions Virtualization.
  • NIC: Network Interface Cards.
  • NS: Name Server.
  • NTP: Network Time Protocol.
  • NTS: Network Time Security.
  • OS: Operating System.
  • OSPF: Open Shortest Path First.
  • OSI: Open Systems Interconnection.
  • OT: Operational Technology.
  • PaaS: Platform as a Service.
  • PAT: Port Address Translation.
  • PCI DSS: Payment Card Industry Data Security Standards.
  • PDU: Power Distribution Unit.
  • PKI: Public Key Infrastructure.
  • PoE: Power over Ethernet.
  • PSK: Pre-shared Key.
  • PTP: Precision Time Protocol.
  • PTR: Pointer.
  • QoS: Quality of Service.
  • QSFP: Quad Small Form-factor Pluggable.
  • RADIUS: Remote Authentication Dial-in User Service.
  • RDP: Remote Desktop Protocol.
  • RFID: Radio Frequency Identifier.
  • RIP: Routing Information Protocol.
  • RJ: Registered Jack.
  • RPO: Recovery Point Objective.
  • RSTP: Rapid Spanning Tree Protocol.
  • RTO: Recovery Time Objective.
  • RX: Receiver.
  • SaaS: Software as a Service.
  • SAML: Security Assertion Markup Language.
  • SAN: Storage Area Network.
  • SASE: Secure Access Service Edge.
  • SC: Subscriber Connector.
  • SCADA: Supervisory Control and Data Acquisition.
  • SDN: Software-defined Network.
  • SD-WAN: Software-defined Wide Area Network.
  • SFP: Small Form-factor Pluggable.
  • SFTP: Secure File Transfer Protocol.
  • SIP: Session Initiation Protocol.
  • SIEM: Security Information and Event Management.
  • SLA: Service-level Agreement.
  • SLAAC: Stateless Address Autoconfiguration.
  • SMB: Server Message Block.
  • SMTP: Simple Mail Transfer Protocol.
  • SMTPS: Simple Mail Transfer Protocol Secure.
  • SNMP: Simple Network Management Protocol.
  • SOA: Start of Authority.
  • SQL: Structured Query Language.
  • SSE: Security Service Edge.
  • SSH: Secure Shell.
  • SSID: Service Set Identifier.
  • SSL: Secure Socket Layer.
  • SSO: Single Sign-on.
  • ST: Straight Tip.
  • STP: Shielded Twisted Pair.
  • SVI: Switch Virtual Interface.
  • TACAS+: Terminal Access Controller Access Control System Plus.
  • TCP: Transmission Control Protocol.
  • TFTP: Trivial File Transfer Protocol.
  • TTL: Time to Live.
  • TX: Transmitter.
  • TXT: Text.
  • UDP: User Datagram Protocol.
  • UPS: Uninterruptible Power Supply.
  • URL: Uniform Resource Locator.
  • USB: Universal Serial Bus.
  • UTM: Unified Threat Management.
  • UTP: Unshielded Twisted Pair.
  • VIP: Virtual IP.
  • VLAN: Virtual Local Area Network.
  • VLSM: Variable Length Subnet Mask.
  • VoIP: Voice over IP.
  • VPC: Virtual Private Cloud.
  • VPN: Virtual Private Network.
  • WAN: Wide Area Network.
  • WPA: Wi-Fi Protected Access.
  • WPS: Wi-Fi Protected Setup.
  • VXLAN: Virtual Extensible LAN.
  • ZTA: Zero Trust Architecture.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Networking Acronyms Quiz
15 questions
Networking Protocols and Acronyms Quiz
5 questions
Cybersecurity and Networking Acronyms
6 questions
Sigles de télécommunications
10 questions
Use Quizgecko on...
Browser
Browser