1/38
Question-and-answer flashcards covering 39 key CompTIA Network+ acronyms from the lecture notes.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What does the acronym AAAA represent in network security and what does each "A" stand for?
Authentication, Authorization, Accounting, Auditing – four core security functions that verify identity, grant permissions, track activity, and examine logs for issues.
In firewall or router configurations, what is an ACL?
Access Control List – a rule set that permits or denies network traffic based on criteria such as IP, port, or protocol.
Which encryption standard is referred to by the acronym AES?
Advanced Encryption Standard – a strong symmetric cipher used globally, e.g., in VPNs and Wi-Fi security.
Within IPsec, what service is provided by the AH protocol?
Authentication Header – supplies data integrity and authentication for IP packets.
What networking device is denoted by AP?
Access Point – hardware that connects wireless clients to a wired LAN.
In fiber optics, what does APC describe and why is it used?
Angled Physical Contact – a connector with an angled cut that minimizes signal reflection and loss.
When a host self-assigns an address in the 169.254.x.x range, which feature is at work?
Automatic Private Internet Protocol Addressing (APIPA) – used when a DHCP server is unreachable.
Which protocol translates IP addresses to MAC addresses on a local network?
Address Resolution Protocol (ARP).
What document, abbreviated AUP, defines acceptable behavior on an organization’s network?
Acceptable Use Policy – outlines permitted and prohibited activities for users.
Which inter-domain routing protocol used by ISPs is known as BGP?
Border Gateway Protocol – exchanges routing information between large autonomous systems.
What type of coaxial connector is abbreviated BNC?
British Naval Connector / Bayonet Neill-Concelman – a bayonet-style connector for coax cable.
In corporate policy, what does BYOD stand for and why is it significant?
Bring Your Own Device – allows employee-owned devices on the network, introducing extra security concerns.
Which switch table that maps MAC addresses to ports is called CAM?
Content Addressable Memory table – accelerates frame forwarding by storing MAC-to-port mappings.
What does CAN denote in networking topologies?
Campus Area Network – interconnects multiple buildings in a limited geographic area such as a university.
Which wireless multiple-access method is abbreviated CDMA?
Code Division Multiple Access – uses unique codes so multiple signals share the same frequency band.
In cybersecurity, what does the CIA triad stand for?
Confidentiality, Integrity, Availability – three foundational security principles.
What addressing method does CIDR describe?
Classless Inter-Domain Routing – uses variable-length subnet masks for efficient IP allocation.
What interface is referred to as CLI?
Command-Line Interface – a text-based way to interact with systems and devices.
Which DNS record type is indicated by CNAME?
Canonical Name – maps an alias host name to the true or canonical domain name.
What central component of a computer is abbreviated CPU?
Central Processing Unit – executes program instructions and controls computer operations.
Which error-detection method is known as CRC?
Cyclic Redundancy Check – verifies data integrity in transmissions.
In Wi-Fi, what mechanism is CSMA/CA, and what does it prevent?
Carrier-Sense Multiple Access with Collision Avoidance – listens before transmitting to avoid wireless collisions.
On Ethernet, what does CSMA/CD accomplish?
Carrier-Sense Multiple Access with Collision Detection – detects and resolves collisions on wired networks.
What device does CSU refer to, and what is its role?
Channel Service Unit – interfaces digital carrier lines (e.g., T1) with customer equipment like routers.
What is stored in the CVE database?
Common Vulnerabilities and Exposures – publicly known cybersecurity flaws identified by unique IDs.
Which fiber-optic method is termed CWDM?
Coarse Wavelength Division Multiplexing – transmits several light wavelengths through a single fiber at lower cost.
In cloud computing, what service model is DaaS?
Desktop as a Service – delivers virtual desktops to users over the internet.
What unit of measure is abbreviated dB?
Decibel – a logarithmic unit expressing relative power or signal strength.
A large-scale attack from multiple sources overwhelming a target is known as what?
Distributed Denial-of-Service (DDoS).
Which protocol automatically assigns IP addresses and network details to hosts?
Dynamic Host Configuration Protocol (DHCP).
What security technology is DLP?
Data Loss Prevention – monitors and blocks unauthorized transmission of sensitive data.
Which system translates domain names into IP addresses?
Domain Name System (DNS).
A single-source flood that disables a service is what type of attack?
Denial-of-Service (DoS).
Which broadband technology uses ordinary telephone lines for simultaneous voice and data?
Digital Subscriber Line (DSL).
Partnering with a CSU, what does a DSU do?
Data Service Unit – converts digital signals for routing equipment; together, CSU/DSU connect to carrier lines.
What high-capacity fiber technique is abbreviated DWDM?
Dense Wavelength Division Multiplexing – packs many tightly spaced wavelengths onto one fiber for massive bandwidth.
In wireless and VPN authentication, what does EAP stand for?
Extensible Authentication Protocol – a flexible framework supporting multiple authentication methods.
Which organization, abbreviated EIA, develops electronics and telecom standards?
Electronic Industries Association.
Which Cisco proprietary routing protocol is known as EIGRP?
Enhanced Interior Gateway Routing Protocol – quickly calculates efficient paths within an autonomous system.