• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/172

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

172 Cards in this Set

  • Front
  • Back

A Record

IPv4(public) to IPv4(local)

AAAA

IPv6 to Local IPv4

DNAME

alias for name and sub Name

Cname

alias of name

ACL

Access control list


List of permissions attached to an object

ADSL

Asymmetric Digital Subscriber Line

Sevices that uses POTS to send signal over copper wire

AES

Advanced Encryption Standard

specification for the encryptionof electronic data

AH

Authentication Header (AH) is a protocol and part of the Internet Protocol Security (IPsec) protocol suite, which authenticates the origin of IP packets (datagrams) and guarantees the integrity of the data

AP

Access Point

APC

Angle Polished Connector

Fiber optic terminator

APIPA

Automatic Private Internet Protocol Addressing DHCP clients can automatically self-configure an IP address and subnet mask when a DHCP server isn't available.

APT

Advanced Persistent Protocol

ARP

Address Resolution Protocol

IP to MAC address resolution

AM

Amplitude Modulation most commonly for transmitting information via a radio carrier wave ulation

ARIN

American Registry for internet numbers


is the nonprofit corporation responsible for managing Internet number resources

AS

Autonomous System

is a collection of connected Internet Protocol (IP) routing prefixes under the control of one or more network operators on behalf of a single administrative entity or domain that presents a common, clearly defined routing policy to the Internet.

ASP

Application service provider-business providing computer-based services to customers over a network

ATM

Asynchronous Transfer Mode- dedicated-connection switching technology that organizes digital data into 53-byte cell units and transmits them over a physical medium using digital signal technology

BERT

Bit-Error Rate Test-testing method for digital communication circuits that uses predetermined stress patterns consisting of a sequence of logical ones and zeros generated by a test pattern generator.


BGP

Border Gateway Protocol-exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the Internet

BNC

British Naval Connector / Bayonet Niell-Concelman-a miniature quick connect/disconnect radio frequency connector used for coaxial cable

BootP

Boot Protocol /Bootstrap Protocol- automatically assign an IP address to network devices from a configuration server

BPDU

Bridge Protocol Data Unit- frames that contain information about the Spanning tree protocol (STP).

BRI

Basic Rate Interface- The BRI configuration provides 2 bearer channels (B channels) at 64 kbit/s each and 1 data channel (D channel) at 16 kbit/s.

BSSID

Basic Service Set Identifier -set consisting of all the devices associated with a consumer or enterprise IEEE 802.11 wireless local area network (WLAN).

CAM

Channel Access Method- allows several terminals connected to the same multi-point transmission medium to transmit over it and to share its capacity

CARP

Common Address Redundancy Protocol- allows multiple hosts on the same local area network to share a set of IP addresses


CHAP


MS-CHAP

Challenge Handshake Authentication Protocol-authenticates a user or network host to an authenticating entity. That entity may be, for example, an Internet service provider

CIDR

Classless inter domain routing

CSMA/CA

Carrier Sense Multiple Access / Collision Avoidance- a network multiple access method in which carrier sensing is used, but nodes attempt to avoid collisions by transmitting only when the channel is sensed to be "idle". When they do transmit, nodes transmit their packet data in its entirety.802.11

CSMA/CD

Carrier Sense Multiple Access / Collision Detection- It uses a carrier sensing scheme in which a transmitting data station detects other signals while transmitting a frame, and stops transmitting that frame, transmits a jam signal, and then waits for a random time interval before trying to resend the frame.[1]

CSU

Channel Service Unit- is used to perform loopback testing


DHCP

Dynamic Host Configuration Protocol- dynamically distributing network configuration parameters, such as IP addresses for interfaces and services.


DLC

Data Link Control- is the service provided by the data link layer.

DMZ

Demilitarized Zone-contains and exposes an organization's external-facing services to a usually larger and untrusted network, usually the Internet. The purpose of a DMZ is to add an additional layer of security to an organization's local area network (LAN)


DNS

Domain Name Service-naming system for computers, services, or any resource connected to the Internet or a private network


DOCSIS

Data-Over-Cable Service Interface Specification-is an international telecommunications standard that permits the addition of high-bandwidth data transfer to an existing cable TV (CATV) system


DOS

Denial of Service-an attempt to make a machine or network resource unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet.


DDOS

Distributed Denial of Service- the attack source is more than one, often thousands of, unique IP addresses.


DSL

Digital Subscriber Line- transmit digital data over telephone lines

DSSS

Direct Sequence Spread Spectrum- This spreading of the transmitted signal over a large bandwidth make the resulting wideband signal appear as a noise signal which allows greater resistance to intentional and unintentional interference with the transmitted signal.

DSU

Data Service Unit- piece of telecommunications circuit terminating equipment that transforms digital data between telephone company lines and local equipment

DWDM

Dense Wavelength Division Multiplexing- multiplexes a number of optical carrier signals onto a single optical fiber by using different wavelengths (i.e., colors) of laser light.

E1

E-Carrier Level - 2.048 Mbit/s

EAP

Extensible Authentication Protocol-is an authentication framework frequently used in wireless networks and point-to-point connections.

EDNS

Extension Mechanisms for DNS- specification for expanding the size of several parameters of the Domain Name System protocol which had size restrictions that the Internet engineering community deemed too limited for increasing functionality of the protocol

EGP

Exterior Gateway Protocol obsolete routing protocol protocol for exchanging routing information between two neighbor gateway host

EIGRP

Enhanced Interior Gateway Routing Protocol- advanced distance-vector routing protocol that is used on a computer network to help automate routing decisions and configuration. The protocol was designed by Cisco Systems.

EMI

Electromagnetic Interference- is a disturbance generated by an external source that affects an electrical circuit by electromagnetic induction, electrostatic coupling, or conduction


ESD

Electrostatic Discharge-sudden flow of electricity between two electrically charged objects caused by contact, an electrical short, or dielectric breakdown

ESSID

Extended Service Set Identifier- is one or more interconnected basic service sets (BSSs) and their associated LANs

ESP

Encapsulated security packets- protocol within the IPSec for providing authentication, integrity and confidentially of network packets data/payload in IPv4 and IPv6 networks


FDDI

Fiber Distributed Data Interface- FDDI provides a 100 Mbit/s optical standard for data transmission in local area network that can extend in range up to 200 kilometers (120 mi). Although FDDI logical topology is a ring-based token network, it did not use the IEEE 802.5 token ring protocol as its basis; instead, its protocol was derived from the IEEE 802.4 token bus timed token protocol

FDM

Frequency Division Multiplexing- is a technique by which the total bandwidth available in a communication medium is divided into a series of non-overlapping frequency sub-bands, each of which is used to carry a separate signal

FHSS

Frequency Hopping Spread Spectrum-a method of transmitting radio signals by rapidly switching a carrier among many frequency channels, using a pseudorandom sequence known to both transmitter and receiver. It is used as a multiple access method in the frequency-hopping code division multiple access (FH-CDMA) scheme.

FQDN

Fully Qualified Domain Name- domain name that specifies its exact location in the tree hierarchy of the Domain Name System

FTP

File Transfer Protocol- protocol used to transfer computer files between a client and server on a computer network

FPTS

File Transfer Protocol Security-

GBIC

Gigabit Interface Converter- standard for transceivers, commonly used with Gigabit Ethernet and fibre channel in the 2000s

Gbps

Giga bits per second

GPG

GNU Privacy Guard- free software replacement for Symantec's PGP cryptographic software suite

HDLC

High-Level Data Link Control-High-Level Data Link Control is a bit-oriented code-transparent synchronous data link layer protocol developed by the International Organization for Standardization

HIDS

Host Intrusion Detection System- A host-based intrusion detection system (HIDS) is an intrusion detection system that monitors and analyzes the internals of a computing system as well as (in some cases) the network packets on its network interfaces (just like a network-based intrusion detection system (NIDS) would do

HIPS

Host Intrusion Prevention System- network security appliances that monitor network and/or system activities for malicious activity

HSPA

High Speed Packet Access- High-Speed Downlink Packet Access is an enhanced 3G mobile-telephony communications protocol in the High-Speed Packet Access family, also dubbed 3.5G, 3G+, or Turbo 3G, which allows networks based on Universal Mobile Telecommunications System to have higher data speeds and capacity.

HSRP

Hot Standby Router Protocol- Cisco proprietary redundancy protocol for establishing a fault-tolerant default gateway, and has been described in detail in RFC 2281

HTTP

HTTP is the foundation of data communication for the World Wide Web. Hypertext is structured text that uses logical links (hyperlinks) between nodes containing text.

Hz

Hertz

IANA

Internet Assigned Numbers Authority

ICA

Independent Computer Architecture- Windows presentation services protocol

ICANN

Internet Corporation for Assigned Names and Numbers

ICMP

Internet Control Message Protocol- used by network devices, like routers, to send error messages indicating, for example, that a requested service is not available or that a host or router could not be reached.

ICS

Internet Connection Sharing- the use of a device with Internet access such as 3G cellular service, broadband via Ethernet, or other Internet gateway as an access point for other devices.

IDF

Intermediate Distribution Frame -An Intermediate Distribution Frame (IDF) is a free-standing or wall mounted rack for wiring or cable from a Main Distribution Frame (MDF) - also called the Combined Distribution Frame (CDF) - and leading to individual cables for each piece of equipment such as workstations, personal computers and other end-user devices

IDS

Intrusion Detection System- monitors network or system activities for malicious activities or policy violations and produces electronic reports to a management station

IEEE

Institute of Electrical and Electronics Engineers

IGMP

Internet Group Multicast Protocol- communications protocol used by hosts and adjacent routers on IPv4 networks to establish multicast group memberships. IGMP is an integral part of IP multicast.

IGP

Interior Gateway Protocol- exchanging routing information between gateways (commonly routers) within an autonomous system (for example, a system of corporate local area networks).

IIS

Internet Information Services- an extensible web server created by Microsoft for use with Windows NT family

IKE

Internet Key Exchange- is the protocol used to set up a security association (SA) in the IPsec protocol suite

IMAP4

Internet Message Access Protocol- version 4- protocol used by e-mail clients to retrieve e-mail messages from a mail server over a TCP/IP connection
InterNIC
Internet Network Information Center- primarily responsible for domain name allocations and X.500 directory services

IP

Internet Protocol-The main protocol for relaying data between networks

IPS

Intrusion Prevention System-The main functions of intrusion prevention systems are to identify malicious activity, log information about this activity, attempt to block/stop it, and report it

IPSec

Internet Protocol Security- communications by authenticating and encrypting each IP packet of a communication session

ISAKMP

Internet Security Association and Key Management Protocol-for establishing Security Associations (SA) and cryptographic keys in an Internet environment

ISDN

Integrated Services Digital Network- communication standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network

ISP

Internet Service Provider

IV

Initialization Vector-is a fixed-size input to a cryptographic primitive that is typically required to be random or pseudorandom

Kbps

Kilobits per second

L2F

Layer 2 Forwarding- is a tunneling protocol developed by Cisco Systems, Inc. to establish virtual private network connections over the Internet. L2F does not provide encryption or confidentiality by itself; It relies on the protocol being tunneled to provide privacy.

L2TP

Layer 2 Tunneling Protocol (L2TP)- is a tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery of services by ISPs

LACP

Link Aggregation Control Protocol (LACP)- is a protocol for the collective handling of multiple physical ports that can be seen as a single channel for network traffic purposes

LAN

local area network (LAN)-is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, or office building

LC

fiber optic connector

LDAP

Lightweight Directory Access Protocol- is an open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network

LEC

Local Exchange Carrier- is a regulatory term in telecommunications for the local telephone company

LED

A light-emitting diode (LED)- is a two-lead semiconductor light source

LLC

logical link control (LLC)- data communication protocol layer is the upper sublayer of the data link layer (layer 2) of the seven-layer OSI model.

MAC

media access control (MAC)- layer is the lower sublayer of the data link layer (layer 2) of the seven-layer OSI model

Mbps

Megabits per second

MBps

Megabits per second

MDF

MDF is a termination point within the local telephone exchange where exchange equipment and terminations of local loops are connected by jumper wires at the MDF

MDI

medium dependent interface (MDI)- describes the interface (both physical and electrical) in a computer network from a physical layer implementation to the physical medium used to carry the transmission

MDIX

Ethernet over twisted pair also defines a medium dependent interface crossover (MDI-X) interface

MIB

management information base (MIB)- is a database used for managing the entities in a communication network

MIMO

multiple-input and multiple-output, or MIMO, is a method for multiplying the capacity of a radio link using multiple transmit and receive antennas to exploit multipath propagation

MMF

Multi-mode optical fiber is a type of optical fiber mostly used for communication over short distances, such as within a building or on a campus. Typical multimode links have data rates of 10 Mbit/s to 10 Gbit/s over link lengths of up to 600 meters (2000 feet) — more than sufficient for the majority of premises applications

MPLS

Multiprotocol Label Switching (MPLS) is a type of data-carrying technique for high-performance telecommunications networks that directs data from one network node to the next based on short path labels rather than long network addresses, avoiding complex lookups in a routing table

MX

mail exchanger record (MX record) is a type of resource record in the Domain Name System that specifies a mail server responsible for accepting email messages on behalf of a recipient's domain, and a preference value used to prioritize mail delivery if multiple mail servers are available

NAC

Network Access Control is an approach to computer security that attempts to unify endpoint security technology, user or system authentication and network security enforcement

NaaS

Network as a service (NaaS) describes services for network transport connectivity. NaaS involves the optimization of resource allocations by considering network and computing resources as a unified whole

NAS

Network-attached storage is a file-level computer data storage server connected to a computer network providing data access to a group of clients

SAN

A SAN typically has its own network of storage devices that are generally not accessible through the local area network (LAN) by other devices

NAT

Network address translation (NAT) is a methodology of remapping one IP address space into another by modifying network address information in Internet Protocol (IP) datagram packet headers while they are in transit across a traffic routing device

NCP

Network Control Protocol NCP allowed users to access and use computers and devices at remote locations and to transmit files between computers
NetBEUI
also known y the name NetBIOS frame (NBF) protocol thanks to its frame format formalization. Because NetBEUI is an improved kind of NetBIOS, it is also by default strictly an API and does not serve as a networking protocol.
NetBIOS
NetBIOS /ˈnɛtbʌɪ.ɒs/ is an acronym for Network Basic Input/Output System. It provides services related to the session layer of the OSI model allowing applications on separate computers to communicate over a local area network. As strictly an API, NetBIOS is not a networking protocol.

NFS

Network File System (NFS) is a distributed file system protocol originally developed by Sun Microsystems in 1984, allowing a user on a client computer to access files over a computer network much like local storage is accessed

NIC

network interface controller (NIC, also known as a network interface card, network adapter, LAN adapter or physical network interface, and by similar terms) is a computer hardware component that connects a computer to a computer network.

NNTP

Network News Transfer Protocol (NNTP) is an application protocol used for transporting Usenet news articles (netnews) between news

NTP

networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks

OTDR

injects a series of optical pulses into the fiber under test and extracts, from the same end of the fiber, light that is scattered (Rayleigh backscatter) or reflected back from points along the fiber

PAP

password authentication protocol (PAP) is an authentication protocol that uses a password. PAP is used by Point to Point Protocol to validate users before allowing them access to server resources. Almost all network operating system remote servers support PAP.

PDU

protocol data unit has the following meanings: Information that is delivered as a unit among peer entities of a network and that may contain control information, such as address information, or user data. In a layered system, a unit of data which is specified in a protocol of a given layer and which consists of protocol-control information and possibly user data of that layer

PKI

public key infrastructure (PKI) is a set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption

PoE

Power over ethernet

POP3

Post Office Protocol (POP) is an application-layer Internet standard protocol used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection.[

POTS

Plain old telephone service (POTS) is voice-grade telephone service employing analog signal transmission over copper loops

PPP

Point-to-Point Protocol (PPP) is a data link protocol used to establish a direct connection between two nodes

PPPoE

Point-to-Point Protocol over Ethernet (PPPoE) is a network protocol for encapsulating PPP frames inside Ethernet frames

PPTP

Point-to-Point Tunneling Protocol (PPTP) is a method for implementing virtual private networks. PPTP uses a control channel over TCP and a GRE tunnel operating to encapsulate PPP packets

PRI

Primary Rate Interface (PRI) is a telecommunications interface standard used on an Integrated Services Digital Network (ISDN) for carrying multiple DS0 voice and data transmissions between the network and a user

PSTN

public switched telephone network (PSTN) is the aggregate of the world's circuit-switched telephone networks that are operated by national, regional, or local telephony operators, providing infrastructure and services for public telecommunication

QoS

Quality of service (QoS) is the overall performance of a telephony or computer network, particularly the performance seen by the users of the network. To quantitatively measure quality of service, several related aspects of the network service are often considered, such as error rates, bit rate, throughput, transmission delay, availability

RADIUS

Remote Authentication Dial-In User Service (RADIUS) is a networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA or Triple A) management for users who connect and use a network service.

RARP

Reverse Address Resolution Protocol (RARP) is an obsolete computer networking protocol used by a client computer to request its Internet Protocol (IPv4) address from a computer network, when all it has available is its link layer or hardware address, such as a MAC address.

RAS

Remote Access Service (RAS) provides remote access capabilities to client applications on computers running Windows

RDP

Remote Desktop Protocol is a proprietary protocol developed by Microsoft, which provides a user with a graphical interface to connect to another computer over a network connection

RIP RIPv2

Routing Information Protocol (RIP) is one of the oldest distance-vector routing protocols which employ the hop count as a routing metric. RIP prevents routing loops by implementing a limit on the number of hops allowed in a path from source to destination. The maximum number of hops allowed for RIP is 15, which limits the size of networks that RIP can support.

RSA

RSA is an Internet encryption and authentication system that uses an algorithm developed in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman.

RTP

Real-time Transport Protocol (RTP) is a network protocol for delivering audio and video over IP networks.

RTSP

Real Time Streaming Protocol (RTSP) is a network control protocol designed for use in entertainment and communications systems to control streaming media servers. The protocol is used for establishing and controlling media sessions between end points.

SCP

Secure copy or SCP is a means of securely transferring computer files between a local host and a remote host or between two remote hosts. It is based on the Secure Shell (SSH) protocol.

SDSL

SDSL is a rate-adaptive digital subscriber line (DSL) variant with T1/E1-like data rates (T1: 1.544 Mbit/s, E1: 2.048 Mbit/s). It runs over one pair of copper wires, with a maximum range of 10,000 feet (3,000 m). It cannot co-exist with a conventional voice service on the same pair as it takes over the entire bandwidth.[1]

SFTP

SSH File Transfer Protocol (also Secure File Transfer Protocol, or SFTP) is a network protocol that provides file access, file transfer, and file management over any reliable data stream. It was designed by the Internet Engineering Task Force (IETF) as an extension of the Secure Shell protocol (SSH) version 2.0 to provide secure file transfer capabilities.

SIP

Session Initiation Protocol (SIP) is a communications protocol for signaling and controlling multimedia communication sessions.

SLIP

Serial Line Internet Protocol (also SLIP) is an encapsulation of the Internet Protocol designed to work over serial ports and modem connections

SMF

single-mode optical fiber (SMF) is an optical fiber designed to carry light only directly down the fiber-the transverse mode

SMPT

Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (email) transmission

SOA

SOA record is a Start of Authority. Every domain must have a Start of Authority record at the cutover point where the domain is delegated from its parent domain

SOHO

Small Office / Home Office

SONET

Synchronous Optical Networking (SONET) and Synchronous Digital Hierarchy (SDH) are standardized protocols that transfer multiple digital bit streams synchronously over optical fiber using lasers or highly coherent light from light-emitting diodes (LEDs

SSH

Secure Shell, or SSH, is a cryptographic (encrypted) network protocol operating at layer 7 of the OSI Model to allow remote login and other network services to operate securely over an unsecured network

SSL

cryptographic protocols designed to provide communications security over a computer network

STP

Spanning Tree Protocol (STP) is a network protocol that ensures a loop-free topology for Ethernet networks
TACACS
Terminal Access Controller Access-Control System (TACACS, usually pronounced like tack-axe) refers to a family of related protocols handling remote authentication and related services for networked access control through a centralized server

TCP

TCP provides reliable, ordered, and error-checked delivery of a stream of octets between applications running on hosts communicating over an IP network

TDM

Time-division multiplexing (TDM) is a method of transmitting and receiving independent signals over a common signal path by means of synchronized switches at each end of the transmission line so that each signal appears on the line only a fraction of time in an alternating pattern

TFTP

Trivial File Transfer Protocol (TFTP) is a simple, lockstep, File Transfer Protocol which allows a client to get from or put a file onto a remote host. One of its primary uses is in the early stages of nodes booting from a local area network

TKIP

Temporal Key Integrity Protocol or TKIP /tiːˈkɪp/ was a stopgap security protocol used in the IEEE 802.11 wireless networking standard

TLS

Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), both of which are frequently referred to as 'SSL', are cryptographic protocols designed to provide communications security over a computer network.

TTL

Time to live

UDP

UDP uses a simple connectionless transmission model with a minimum of protocol mechanism. It has no handshaking dialogues, and thus exposes the user's program to any unreliability of the underlying network protocol

URL

A uniform resource locator is a specific character string that constitutes a reference to a resource. Most web browsers display the URL of a web page above the page in an address bar

VLAN

A virtual LAN (VLAN) is any broadcast domain that is partitioned and isolated in a computer network at the data link layer (OSI layer 2).

VoIP

Voice over IP (VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Other terms commonly associated with VoIP are IP telephony, Internet telephony, broadband telephony, and broadband phone service.

VPN


A virtual private network (VPN) extends a private network across a public network or internet

VRRP

Virtual Router Redundancy Protocol (VRRP) is a computer networking protocol that provides for automatic assignment of available Internet Protocol (IP) routers to participating hosts. This increases the availability and reliability of routing paths via automatic default gateway selections on an IP subnetwork.

VTP

VLAN Trunking Protocol (VTP) is a Cisco proprietary protocol that propagates the definition of Virtual Local Area Networks (VLAN) on the whole local area network

WINS

Windows Internet Name Service (WINS) is Microsoft's implementation of NetBIOS Name Service (NBNS), a name server and service for NetBIOS computer names. Effectively, WINS is to NetBIOS names what DNS is to domain names — a central mapping of host names to network addresses.

WLAN

Wireless Local Area Network