• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/89

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

89 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)

ESP

Encapsulating Security Payloads (Packets)

Provides confidentiality, data-origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic-flow confidentiality.

ESSID

Extended Service Set Identifier

Each set of wireless devices communicating directly with each other is called a basic service set (BSS). Several BSSs can be joined together to form one logical WLAN segment, referred to as...

EUI

Extended Unique Identifier

The IEEE trademarked name for a MAC address.

FC

Fibre Channel

A high-speed network technology (commonly running at 2-, 4-, 8- and 16-gigabit per second rates) primarily used to connect computer data storage.

FDM

Frequency Division Multiplexing

A technique by which the total bandwidth available in acommunication medium is divided into a series of non-overlapping frequency sub-bands, each of which is used to carry a separate signal. This allows a single transmission medium such as the radio spectrum, a cable or optical fiber to be shared by multiple independent signals.

FHSS

Frequency Hopping Spread Spectrum

A method of transmitting radio signals by rapidly switching a carrier among many frequency channels, using a pseudorandomsequence known to both transmitter and receiver.

FM

Frequency Modulation

The encoding ofinformation in a carrier wave by varying the instantaneous frequency of the wave.

FQDN

Fully Qualified Domain Name

Specifies its exact location in the tree hierarchy of the Domain Name System (DNS). It specifies all domain levels, including the top-level domain and the root zone.

FTP

File Transfer Protocol

Used to transfer computer files between a client and server on a computer network.

FTPS

File Transfer Protocol Security

An extension to the commonly used File Transfer Protocol (FTP) that adds support for the Transport Layer Security (TLS) and the Secure Sockets Layer(SSL) cryptographic protocols.

GBIC

Gigabit Interface Converter

A standard for transceivers, commonly used with Gigabit Ethernet and fibre channel in the 2000s. By offering a standard, hot swappable electrical interface, one gigabit port can support a wide range of physical media, from copper to long-wave single-mode optical fiber, at lengths of hundreds of kilometers.

Gbps

Gigabits Per Second

GPG

GNU Privacy Guard

A free software replacement for Symantec's PGPcryptographic software suite.

GRE

Generic Routing Encapsulation

A tunneling protocol developed by Cisco Systems that can encapsulate a wide variety of network layer protocols inside virtual point-to-point links over an Internet Protocolnetwork.

GSM

Global System for Mobile communications

A standard developed by the European Telecommunications Standards Institute (ETSI) to describe the protocols for second-generation (2G) digital cellular networks used by mobile phones, first deployed in Finland in July 1991. As of 2014 it has become the default global standard for mobile communications - with over 90% market share, operating in over 219 countries and territories.

HDLC

High-level Data Link Control

A bit-oriented code-transparent synchronous data link layer protocol developed by the (ISO).

HDMI

High Definition Multimedia Interface

A proprietary audio/video interface for transferring uncompressed video data and compressed or uncompressed digital audiodata from an HDMI-compliant source device, such as a display controller, to a compatiblecomputer monitor, video projector, digital television, or digital audio device.

HIDS

Host Intrusion Detection System

An intrusion detection system that monitors and analyzes the internals of a computing system as well as (in some cases) the network packets on its network interfaces (just like a network-based intrusion detection system (NIDS) would do).[1] This was the first type of intrusion detection software to have been designed, with the original target system being the mainframe computer where outside interaction was infrequent.[

HIPS

Host Intrusion Prevention System

An installed software package which monitors a single host for suspicious activity by analyzing events occurring within that host.

HSPA

High-speed Packet Access

An amalgamation of two protocols, (HSDPA) and (HSUPA), that extends and improves the performance of existing 3G mobile telecommunication networks utilizing the WCDMA protocols.

HSRP

Hot Standby Router Protocol

Establishes a framework between network routers in order to achieve default gateway failover if the primary gateway becomes inaccessible, in close association with a rapid-converging routing protocol like EIGRP or OSPF.

HT

High Throughput

Gigabit Ethernet has this.

HTTP

Hypertext Transfer Protocol

TCP port 80

HVAC

Heating Ventilation and Air Conditioning

The technology of indoor and vehicular environmental comfort. Its goal is to provide thermal comfort and acceptableindoor air quality. HVAC system design is a subdiscipline of mechanical engineering, based on the principles of thermodynamics,fluid mechanics, and heat transfer.Refrigeration is sometimes added to the field's abbreviation as HVAC&R or HVACR, (heating,ventilating and air-conditioning & Refrigeration) or ventilating is dropped as in HACR (such as the designation of HACR-ratedcircuit breakers).

Hz

Hertz

One cycle per second.

IaaS

Infrastructure as a Service

Online services that abstract the user from the details of infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc.

IANA

Internet Assigned Numbers Authority

A department of ICANN, a nonprofit private American corporation that oversees global IP address allocation, autonomous system number allocation, root zonemanagement in the Domain Name System (DNS), media types, and other Internet Protocol-related symbols and numbers.

ICA

Independent Computer Architecture

Has the unique ability to separate the application's logic from the user interface at the server and transport it to the client over standard network protocols-IPX, SPX, NetBEUI, TCP/IP and PPP-and over popular network connections-asynchronous, dial-up, ISDN, Frame Relay and ATM.

ICANN

Internet Corporation for Assigned Names and Numbers

A nonprofit organization that is responsible for coordinating the maintenance and methodologies of several databases, with unique identifiers, related to the namespaces of the Internet - and thereby, ensuring the network's stable and secure operation.

ICMP

Internet Control Message Protocol

One of the main protocols of the internet protocol suite. It is used by network devices, like routers, to send error messages indicating, for example, that a requested service is not available or that a host or router could not be reached. ICMP can also be used to relay query messages.

ICS

Internet Connection Sharing or Industrial Control System

The use of a device with Internet access such as 3G cellular service, broadband via Ethernet, or other Internet gateway as an access point for other devices.


OR


A general term that encompasses several types of control systems used in industrial production, including supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and other smaller control system configurations such as programmable logic controllers (PLC) often found in the industrial sectors and critical infrastructures.

IDF

Intermediate Distribution Frame

Cross-connects the user cable media to individual user line circuits and may serve as a distribution point for multipair cables from the main DF or combined DF to individual cables connected to equipment in areas remote from these frames.

IDS

Intrusion Detection System

A device or software application that monitors network or system for malicious activities or policy violations and produces electronic reports to a management station.

IEEE

Institute of Electrical and Electronics Engineers

A professional association with its corporate office in New York City and its operations center in Piscataway, New Jersey. It was formed in 1963 from the amalgamation of theAmerican Institute of Electrical Engineers and the Institute of Radio Engineers. Today, it is the world's largest association of technical professionals with more than 400,000 members in chapters around the world. Its objectives are the educational and technical advancement of electrical and electronic engineering, telecommunications, computer engineering and allied disciplines.

IGMP

Internet Group Multicast Protocol

Multicast or management?

IGP

Interior Gateway Protocol

A type of protocol used for exchanging routing information between gateways (commonly routers) within an autonomous system (for example, a system of corporate local area networks). This routing information can then be used to route network-layer protocols like IP.

IKE

Internet Key Exchange

(IKE orIKEv2) is the protocol used to set up a security association (SA) in the IPsec protocol suite. IKE builds upon the Oakley protocol and ISAKMP. IKE uses X.509 certificates for authentication - either pre-shared or distributed using DNS (preferably with DNSSEC) and a Diffie–Hellman key exchange- to set up a shared session secret from which cryptographic keys are derived. In addition, a security policy for every peer which will connect must be manually maintained.

IMAP4

Internet Message Access Protocol version 4

An email protocol which is sometimes used instead of the POP3 protocol. With IMAP4 email is stored on the mail server and can be accessed from any IMAP4 email client on the network. With POP3 email is downloaded to the mail client where it is accessed.

InterNIC

Internet Network Information Center

(NIC), also known as InterNIC from 1993 until 1998, was the internet governing body primarily responsible for domain name allocations and X.500 directory services. From its inception in 1972 until October 1, 1991, it was run by the Stanford Research Institute (now known asSRI International), and led by Jake Feinler. From October 1991 until September 18, 1998, it was run by Network Solutions. Thereafter, the responsibility was assumed by the Internet Corporation for Assigned Names and Numbers (ICANN).

IP

Internet Protocol

The principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet. IP has the task of delivering packets from the source host to the destination host solely based on the IP addresses in the packet headers. For this purpose, IP defines packet structures that encapsulate the data to be delivered. It also defines addressing methods that are used to label the datagram with source and destination information.

IPS

Intrusion Prevention System

Are network security appliances that monitor network and/or system activities for malicious activity. The main functions of intrusion prevention systems are to identify malicious activity, log information about this activity, attempt to block/stop it, and report it.

IPsec

Internet Protocol Security

A protocol suite for secure Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. IPsec includes protocols for establishing mutual authentication between agents at the beginning of the session and negotiation of cryptographic keys to be used during the session.

IPv4

Internet Protocol version 4

IPv4 is a connectionless protocol for use on packet-switched networks. It operates on a best effort delivery model, in that it does not guarantee delivery, nor does it assure proper sequencing or avoidance of duplicate delivery. These aspects, including data integrity, are addressed by an upper layer transport protocol, such as the Transmission Control Protocol (TCP).

IPv6

Internet Protocol version 6

By 1998, the Internet Engineering Task Force (IETF) had formalized the successor protocol. IPv6 uses a 128-bit address, theoretically allowing 2128, or approximately 3.4×1038 addresses.

ISAKMP

Internet Security Association and Key Management Protocol

A protocol defined by RFC 2408 for establishingSecurity Associations (SA) and cryptographic keys in an Internet environment. ISAKMP only provides a framework for authentication and key exchange and is designed to be key exchange independent; protocols such asInternet Key Exchange and Kerberized Internet Negotiation of Keys provide authenticated keying material for use with ISAKMP. For example: IKE describes a protocol using part of Oakley and part of SKEME in conjunction with ISAKMP to obtain authenticated keying material for use with ISAKMP, and for other security associations such as AH and ESP for the IETF IPsec DOI.

ISDN

Integrated Services Digital Network

A set of communication standardsfor simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network.

IS-IS

Intermediate System to Intermediate System

A routing protocol designed to move information efficiently within a computer network, a group of physically connected computers or similar devices. It accomplishes this by determining the best route for datagrams through a packet-switched network.

ISP

Internet Service Provider

An organization that provides services for accessing, using, the Internet. Internet service providers may be organized in various forms, such as commercial, community-owned, non-profit, or otherwise privately owned.Internet services typically provided by ISPs include Internet access, Internet transit,domain name registration, web hosting,Usenet service, and colocation.

IT

Information Technology

Is the application of computers to store, retrieve, transmit and manipulate data,[1] often in the context of a business or other enterprise.[2] IT is considered a subset of information and communications technology (ICT).

ITS

Intelligent Transportation System

Advanced applications which, without embodying intelligence as such, aim to provide innovative services relating to different modes of transport and traffic management and enable various users to be better informed and make safer, more coordinated, and 'smarter' use of transport networks.

IV

Initialization Vector

Or starting variable (SV)[1]is a fixed-size input to a cryptographic primitive that is typically required to berandom or pseudorandom. Randomization is crucial for encryption schemes to achievesemantic security, a property whereby repeated usage of the scheme under the same key does not allow an attacker to infer relationships between segments of the encrypted message. For block ciphers, the use of an IV is described by so-called modes of operation. Randomization is also required for other primitives, such as universal hash functions and message authentication codesbased thereof.

Kbps

Kilobits Per Second

KVM (switch)

Keyboard Video Mouse

A hardware device that allows a user to control multiple computers from one or more[1] sets of keyboards, video monitors, andmice. Although multiple computers are connected to the KVM, typically a smaller number of computers can be controlled at any given time. Modern devices have also added the ability to share other peripherals like USBdevices and audio.

L2F

Layer 2 Forwarding

Is a tunneling protocol developed by Cisco Systems, Inc. to establish virtual private network connections over the Internet. L2F does not provideencryption or confidentiality by itself; It relies on the protocol being tunneled to provideprivacy. L2F was specifically designed to tunnel Point-to-Point Protocol (PPP) traffic.

L2TP

Layer 2 Tunneling Protocol

A tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery of services by ISPs. It does not provide any encryption or confidentiality by itself. Rather, it relies on an encryption protocol that it passes within the tunnel to provide privacy.

LACP

Link Aggregation Control Protocol

Provides a method to control the bundling of several physical ports together to form a single logical channel. LACP allows a network device to negotiate an automatic bundling of links by sending LACP packets to the peer (directly connected device that also implements LACP).

LAN

Local Area Network

A group of computers and associated devices that share a common communications line or wireless link to a server. Typically, a LAN encompasses computers and peripherals connected to a server within a small geographicarea such as an office building or home.

LC

Local Connector

LDAP

Lightweight Directory Access Protocol

A directory service protocol that runs on a layer above the TCP/IP stack. It provides a mechanism used to connect to, search, and modify Internet directories. The LDAP directory service is based on a client-server model.

LEC

Local Exchange Connector

LED

Light Emitting Diode

LLC

Logical Link Control

The upper sublayer of the data link layer (layer 2) of the seven-layer OSI model. The LLC sublayer provides multiplexing mechanisms that make it possible for several network protocols (IP, IPX, Decnet and Appletalk) to coexist within a multipoint network and to be transported over the same network medium. It can also provide flow control and automatic repeat request (ARQ) error management mechanisms.

LTE

Long Term Evolution

A standard for wireless communication of high-speed data for mobile phones and data terminals. It is based on the GSM/EDGE and UMTS/HSPAnetwork technologies, increasing the capacity and speed using a different radio interface together with core network improvements.

LWAPP

Light Weight Access Point Protocol

MAC

Media Access Control or Medium Access Control

The lower sublayer of the data link layer (layer 2) of the seven-layer OSI model. The MAC sublayer provides addressing and channel accesscontrol mechanisms that make it possible for several terminals or network nodes to communicate within a multiple accessnetwork that incorporates a shared medium, e.g. an Ethernet network. The hardware that implements the MAC is referred to as a media access controller.

MAN

Metropolitan Area Network

A computer network larger than a local area network, covering an area of a few city blocks to the area of an entire city, possibly also including the surrounding areas.

Mbps

Megabits per second

MBps

Megabytes per second

MDF

Main Distribution Frame

A signal distribution framefor connecting equipment (inside plant) to cables and subscriber carrier equipment (outside plant). The MDF is a termination point within the local telephone exchangewhere exchange equipment and terminations of local loops are connected by jumper wires at the MDF.

MDE

Media Dependent Interface

MDIX

Media Dependent Interface Crossover

The interface (both physical and electrical) in a computer network from a physical layer implementation to the physical medium used to carry the transmission.

MGCP

Media Gateway Control Protocol

A signaling and call control communications protocol used in Voice over IP (VoIP) systems. It implements the media gateway control protocol architecture for controlling media gateways on Internet Protocol (IP) networks connected to the public switched telephone network (PSTN). The protocol is a successor to the Simple Gateway Control Protocol (SGCP) and the Internet Protocol Device Control (IPDC).

MIB

Management Information Base

A database used for managing the entities in a communication network. Most often associated with the Simple Network Management Protocol (SNMP), the term is also used more generically in contexts such as in OSI/ISO Network management model.

MIBS

Management Information Bases

MIMO

Multiple Input Multiple Output

A method for multiplying the capacity of a radio link using multiple transmit and receive antennas to exploit multipath propagation. MIMO has become an essential element of wireless communication standards including IEEE 802.11n (Wi-Fi), IEEE 802.11ac (Wi-Fi), HSPA+ (3G), WiMAX (4G), and Long Term Evolution (4G). More recently, MIMO has been applied to power-line communication for 3-wire installations as part of ITU G.hn standard and HomePlug AV2 specification.

MLA

Master License Agreement

MLA

Multilateral Agreement

MMF

Multimode Fiber

A type of optical fiber mostly used for communication over short distances, such as within a building or on a campus. Typical multimode links have data rates of 10 Mbit/s to 10 Gbit/s over link lengths of up to 600 meters (2000 feet) — more than sufficient for the majority of premises applications.

MOU

Memorandum Of Understanding

Describes a bilateral or multilateral agreement between two or more parties. It expresses a convergence of will between the parties, indicating an intended common line of action. It is often used in cases where parties either do not imply a legal commitment or in situations where the parties cannot create a legally enforceable agreement. It is a more formal alternative to a gentlemen's agreement.

MPLS

Multi-Protocol Label Switching

A type of data-carrying technique for high-performance telecommunications networks that directs data from one network node to the next based on short path labels rather than long network addresses, avoiding complex lookups in a routing table.

MS-CHAP

Microsoft Challenge Handshake Authentication Protocol

Used as one authentication option in Microsoft's implementation of the PPTP protocol for virtual private networks. It is also used as an authentication option with RADIUS[2] servers which are used for WiFisecurity using the WPA-Enterprise protocol. It is further used as the main authentication option of the Protected Extensible Authentication Protocol (PEAP).

MSA

Master Service Agreement

A contract reached between parties, in which the parties agree to most of the terms that will govern future transactions or future agreements. A master agreement permits the parties to quickly negotiate future transactions or agreements, because they can rely on the terms of the master agreement, so that the same terms need not be repetitively negotiated, and to negotiate only the deal-specific terms.

MSDS

Material Safety Data Sheet

An important component ofproduct stewardship and occupational safety and health. and spill-handling procedures. SDS formats can vary from source to source within a country depending on national requirements.

MT-RJ

Mechanical Transfer-Registered Jack

A type of fiber connector.

MTU

Maximum Transmission Unit

The largest size packet or frame, specified in octets (eight-bit bytes), that can be sent in a packet- or frame-based network such as the Internet.

MUMIMO

Multiple User Multiple Input Multiple Output

A set of multiple-input and multiple-outputtechnologies for wireless communication, in which a set of users or wireless terminals, each with one or more antennas, communicate with each other.

MX

Mail Exchanger

A type of resource record in the Domain Name System that specifies a mail server responsible for accepting email messages on behalf of a recipient's domain, and a preference value used to prioritize mail delivery if multiple mail servers are available.

NAC

Network Access Control

An approach to computer security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security enforcement.

NAS

Network Attached Storage

A file-levelcomputer data storage server connected to a computer network providing data access to a heterogeneous group of clients.