1/46
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Asset inventory
A comprehensive list of all the assets belonging to or used by an organization, tangible and intangible
IPAM
IP address management
SLA
Service-level agreement
Wireless survey/heat map
Visualization for analyzing and mapping Wi-Fi signal coverage and strength in an area
OS
Operating system
EOL
End-of-life
EOS
End-of-support
MIB
Management information base
SIEM
Security information and event management
SNMP
Simple Network Management Protocol
High availability
Continued operational performance with minimal downtime
Active-active
Multiple active components share the workload and can handle failures by redistributing traffic
Active-passive
Relying on a primary, active component backed up by a secondary, standby component
Tabletop exercise
Discussion-based activity where participants simulate a disaster or emergency to test and improve plans, policies, and procedures
Validation test
“Does this product do what the user needs it to do?”
DR
Disaster recovery
RPO
Recovery point objective
RTO
Recovery time objective
MTTR
Mean time to repair
MTBF
Mean time between failures
BCP
Business Continuity Plan
Cold site
Power, networking capability, and cooling; no servers or storage
Warm site
Cold site plus storage hardware; still requires data transportation
Hot site
Fully functional backup site with important data mirrored to it
Dynamic addressing
Automatic assignment of IP addresses to devices on a network typically using DHCP
Name resolution
Conversion of human-readable domain names into the corresponding IP addresses using DNS
SLAAC
Stateless address autoconfiguration
DNSSEC
Domain Name Security Extensions
NTS
Network Time Security
PTP
Precision Time Protocol
DoH
DNS over HTTPS
DoT
DNS over TLS
Hosts file
Map hostnames to IP addresses using records such as A, AAAA, CNAME, etc.
A
IPv4 address
AAAA
IPv6 address
CNAME
Canonical name
MX
Mail exchange
TXT
Text
NS
Nameserver
PTR
Pointer
Clientless
Remote users can securely access enterprise resources without traditional client software
Split tunnel
Partial encryption of traffic
Full tunnel
Encryption of all traffic
Jump box/host
Secure intermediary server for accessing and managing devices in a separate network
In-band management
Same network infrastructure for data traffic and management
Out-of-band management
Using a separate, dedicated network for management
GUI
Graphical user interface