• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/132

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

132 Cards in this Set

  • Front
  • Back

ACL

Access Control List

API

Application Programming Interface

APM

Application Performance Monitor

ATA

Advanced Technology Attachment

BCP

Bridge Control Protocol

BIA

Business Impact Analysis

BIOS

Basic Input/Output System

BMR

Bare Metal Restore

BPaaS

Business Process as a Service

BUN

Backup Network

C2C

Cloud to Cloud

C2D

Cloud to Database

CAB

Change Advisory Board

CAN

Campus Area Network

CaaS

Communication as a Service / Computing as a Service

CAS

Content Addressed Storage

CIIS

Client Integration Implementation Service

CMDB

Configuration Management Database

CNA

Converged Network Adapter

COLO

Co-Location

COOP

Continuity of Operations Plan

CRL

Certificate Revocation List

CRM

Customer Relationship Management

CSP

Content Service Provider

D2C

Datacenter to Cloud

DaaS

Data as a Service

DAC

Discretionary Access Control

DAS

Direct Attached Storage

DBaaS

Database as a Service

DBMS

Database Management Server

DCB

Datacenter Bridging

DHCP

Dynamic Host Configuration Protocol

DMZ

Demilitarized Zone

DNS

Domain Name Service

DRP

Disaster Recovery Plan

FC

Fibre Channel

FCIP

Fibre Channel over IP

FCoE

Fibre Channel over Ethernet

FTP

File Transfer Protocol

ftps

FTP over SSL

GPT

GUID Partition Table

GUI

Graphical User Interface

HA

High Availability

HAV

Hardware Assisted Virtualization

HBA

Host Bus Adapter

HTTPS

Hypertext Transfer Protocol Secure

IaaS

Infrastructure as a Service

ICMP

Internet Control Management Protocol

IDS

Intrusion Detection System

IFCP

Internet Fibre Channel Protocol

IPMI

Intelligent Platform Management Interface

IPS

Intrusion Protection system

IQN

Initiator Qualified Name

ISP

Internet Service Provider

iSCSI

Internet SCSI

ISNS

Internet Storage Name Service

JBOD

Just of bunch of Disks

KVM

Keyboard Video Mouse

L2TP

Layer 2 Tunneling Protocol

LAN

Local Area Network

LUN

Logical Unit Number

MAC

Mandatory Access Control

MAN

Metropolitan Area Network

MBR

Master Boot Record

MDF

Main Distribution Facility

MSP

Managed Service Provider

MTBF

Mean Time Between Failure


Amount of time that has elapsed between failures


Expressed in hours


Derived from uptime / downtime


Important for mission-critical components


If it is small value, it means if fails more often


Larger value means that it takes longer for the “thing” to fail


The SLA should contain MTBF metric

MTTF

Mean Time To Failure

MTTR

Mean Time To Recovery


Recover a system from failure


May mean how long it takes to recover


Determined by how long can you tolerate an outage?


Spelled out in SLA

MTU

Maximum Transmission Unit

NAS

Network Attached Storage

NFS

Network File System

NIS

Network Information Service

NNTP

Network News Transport Protocol

NOC

Network Operations Center

NPIV

N_Port ID Virtualization

OLA

Operational Level Agreement

OSD

Object Storage Device

P2P

Physical to Physical

P2V

Physical to Virtual

PaaS

Platform as a Service

PAT

Port Address Translation

PIT

Point-in-Time backup or snapshot

QA

Quality Assurance

RAID

Redundant Array of Inexpensive Disks


For most small- to midsize-business purposes, RAID 0, 1, 5 and in some cases 10 suffice for good fault tolerance and performance.

RBAC

Role-based Access Control

PBX

Public Branch Exchange

RDP

Remote Desktop Protocol

RIP

Routing Information Protocol

RPO

Recovery Point Objective


Determined from how much data loss can be tolerated?


Used in DR plans to determine backup strategy


E.g., if you have a 6 hour RPO, then your backups must be run every 6


hours to meet the RPO

RTO

Recovery Time Objective


System downtime metric


Restoration of a business process to normal operations


Determined by how long does it take to return to normal operations for an *entire* system.


May include multiple IT systems (i.e., app server, db server, web server)

A short RTO is better

Shorter RTOs = costs more

SaaS

Software as a Service

SAN

Storage Area Network

SAS

Serial Attached SCSI

SATA

Serial ATA

SCSI

Small Computer System Interface

SDLC

Software Development Life Cycle

SFTP

Secure FTP

SLA

Service Level Agreement

SNMP

Simple Network Management Protocol

SSD

Solid State Disk

SSH

Secure Shell

SSO

Single Sign-On

TCO

Total Cost of Operations/ Ownership

TTD

Technical Training Device

UAT

Universal Access Transceiver

UDP

Universal Diagram Protocol

UPS

Universal Power Supply

UTA

Universal Target Adapter

V2P

Virtual to Physical

V2V

Virtual to Virtual

VAT

Virtual Allocation Table

VCPU

Virtual CPU

VLAN

Virtual LAN

VM

Virtual Machine

VNIC

Virtual NIC

VPN

Virtual Private Network

VRAM

Virtual RAM

VSAN

Virtual SAN

Vswitch

Virtual Switch

VTL

Virtual Tape Library

WAN

Wide Area Network

WMI

Windows Management Implementation

WWNN

WorldWide Node Name

WWPN

WorldWide Port Name

XaaS

anything as a Service

RAID 0

- Used to boost a server's performance


- "disk striping"


- Data is written across multiple disks.


- two disks are required.


- Both software and hardware RAID support RAID 0


- Downside: no fault tolerance.

RAID 1

- fault-tolerant


- "disk mirroring"


- data is copied simultaneously, from one disk to another, creating a replica, or mirror.


- simplest way to implement fault tolerance


- low cost.


- Downside: slight drag on performance


- implemented through software or hardware.


- minimum of two disks are required hardware implementations. software RAID 1, data can be mirrored between volumes on a single disk.


- cuts total disk capacity in half

RAID 5

- most common RAID configuration for business servers/NAS devices


- provides better performance than mirroring as well as fault tolerance


- data and parity (which is additional data used for recovery) are striped across three or more disks. If a disk gets an error or starts to fail, data is recreated from this distributed data and parity block — automatically.


- Can suffer 1 drive failure - drive can be swapped with a new drive without shutting down the server and without user interruption


- Downside: performance hit to servers that perform a lot of write operations. Not ideal for databases for example.

RAID 6

- frequently used in enterprises.


- identical to RAID 5, except it uses one more parity block than RAID 5.


- Can suffer 2 drive failures

RAID 1+0 (RAID 10)

- combination of RAID 1 and 0


- combines the mirroring of RAID 1 with the striping of RAID 0


- gives the best performance


- costly, requiring twice as many disks as other RAID levels, for a minimum of four


- ideal for highly utilized database servers or any server that's performing many write operations (i.e., databases)


- implemented as hardware or software; general consensus is performance advantages are lost when you use software RAID

RAID 0+1

- mirrored array with segments that are RAID 0 arrays.


- implemented in specific infrastructures requiring high performance but not a high level of scalability.