PT 1 CompTIA Network+ Acronym Review

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/38

flashcard set

Earn XP

Description and Tags

Question-and-answer flashcards covering 39 key CompTIA Network+ acronyms from the lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

39 Terms

1
New cards

What does the acronym AAAA represent in network security and what does each "A" stand for?

Authentication, Authorization, Accounting, Auditing – four core security functions that verify identity, grant permissions, track activity, and examine logs for issues.

2
New cards

In firewall or router configurations, what is an ACL?

Access Control List – a rule set that permits or denies network traffic based on criteria such as IP, port, or protocol.

3
New cards

Which encryption standard is referred to by the acronym AES?

Advanced Encryption Standard – a strong symmetric cipher used globally, e.g., in VPNs and Wi-Fi security.

4
New cards

Within IPsec, what service is provided by the AH protocol?

Authentication Header – supplies data integrity and authentication for IP packets.

5
New cards

What networking device is denoted by AP?

Access Point – hardware that connects wireless clients to a wired LAN.

6
New cards

In fiber optics, what does APC describe and why is it used?

Angled Physical Contact – a connector with an angled cut that minimizes signal reflection and loss.

7
New cards

When a host self-assigns an address in the 169.254.x.x range, which feature is at work?

Automatic Private Internet Protocol Addressing (APIPA) – used when a DHCP server is unreachable.

8
New cards

Which protocol translates IP addresses to MAC addresses on a local network?

Address Resolution Protocol (ARP).

9
New cards

What document, abbreviated AUP, defines acceptable behavior on an organization’s network?

Acceptable Use Policy – outlines permitted and prohibited activities for users.

10
New cards

Which inter-domain routing protocol used by ISPs is known as BGP?

Border Gateway Protocol – exchanges routing information between large autonomous systems.

11
New cards

What type of coaxial connector is abbreviated BNC?

British Naval Connector / Bayonet Neill-Concelman – a bayonet-style connector for coax cable.

12
New cards

In corporate policy, what does BYOD stand for and why is it significant?

Bring Your Own Device – allows employee-owned devices on the network, introducing extra security concerns.

13
New cards

Which switch table that maps MAC addresses to ports is called CAM?

Content Addressable Memory table – accelerates frame forwarding by storing MAC-to-port mappings.

14
New cards

What does CAN denote in networking topologies?

Campus Area Network – interconnects multiple buildings in a limited geographic area such as a university.

15
New cards

Which wireless multiple-access method is abbreviated CDMA?

Code Division Multiple Access – uses unique codes so multiple signals share the same frequency band.

16
New cards

In cybersecurity, what does the CIA triad stand for?

Confidentiality, Integrity, Availability – three foundational security principles.

17
New cards

What addressing method does CIDR describe?

Classless Inter-Domain Routing – uses variable-length subnet masks for efficient IP allocation.

18
New cards

What interface is referred to as CLI?

Command-Line Interface – a text-based way to interact with systems and devices.

19
New cards

Which DNS record type is indicated by CNAME?

Canonical Name – maps an alias host name to the true or canonical domain name.

20
New cards

What central component of a computer is abbreviated CPU?

Central Processing Unit – executes program instructions and controls computer operations.

21
New cards

Which error-detection method is known as CRC?

Cyclic Redundancy Check – verifies data integrity in transmissions.

22
New cards

In Wi-Fi, what mechanism is CSMA/CA, and what does it prevent?

Carrier-Sense Multiple Access with Collision Avoidance – listens before transmitting to avoid wireless collisions.

23
New cards

On Ethernet, what does CSMA/CD accomplish?

Carrier-Sense Multiple Access with Collision Detection – detects and resolves collisions on wired networks.

24
New cards

What device does CSU refer to, and what is its role?

Channel Service Unit – interfaces digital carrier lines (e.g., T1) with customer equipment like routers.

25
New cards

What is stored in the CVE database?

Common Vulnerabilities and Exposures – publicly known cybersecurity flaws identified by unique IDs.

26
New cards

Which fiber-optic method is termed CWDM?

Coarse Wavelength Division Multiplexing – transmits several light wavelengths through a single fiber at lower cost.

27
New cards

In cloud computing, what service model is DaaS?

Desktop as a Service – delivers virtual desktops to users over the internet.

28
New cards

What unit of measure is abbreviated dB?

Decibel – a logarithmic unit expressing relative power or signal strength.

29
New cards

A large-scale attack from multiple sources overwhelming a target is known as what?

Distributed Denial-of-Service (DDoS).

30
New cards

Which protocol automatically assigns IP addresses and network details to hosts?

Dynamic Host Configuration Protocol (DHCP).

31
New cards

What security technology is DLP?

Data Loss Prevention – monitors and blocks unauthorized transmission of sensitive data.

32
New cards

Which system translates domain names into IP addresses?

Domain Name System (DNS).

33
New cards

A single-source flood that disables a service is what type of attack?

Denial-of-Service (DoS).

34
New cards

Which broadband technology uses ordinary telephone lines for simultaneous voice and data?

Digital Subscriber Line (DSL).

35
New cards

Partnering with a CSU, what does a DSU do?

Data Service Unit – converts digital signals for routing equipment; together, CSU/DSU connect to carrier lines.

36
New cards

What high-capacity fiber technique is abbreviated DWDM?

Dense Wavelength Division Multiplexing – packs many tightly spaced wavelengths onto one fiber for massive bandwidth.

37
New cards

In wireless and VPN authentication, what does EAP stand for?

Extensible Authentication Protocol – a flexible framework supporting multiple authentication methods.

38
New cards

Which organization, abbreviated EIA, develops electronics and telecom standards?

Electronic Industries Association.

39
New cards

Which Cisco proprietary routing protocol is known as EIGRP?

Enhanced Interior Gateway Routing Protocol – quickly calculates efficient paths within an autonomous system.