1/161
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
A
Address. Refers to an identifier for a networked device, typically an IP address.
ACL
Access Control List. A set of rules used to control network traffic and restrict access to resources.
AH
Authentication Header. A component of IPSec that provides connectionless integrity and authentication.
AP
Access Point. A device that allows wireless devices to connect to a wired network.
API
Application Programming Interface. A set of routines and tools for building software applications.
APIPA
Automatic Private Internet Protocol Addressing. Assigns an IP address automatically when DHCP fails.
ARP
Address Resolution Protocol. Resolves IP addresses to MAC (hardware) addresses on a local network.
AUP
Acceptable Use Policy. A document outlining permitted uses of a network or system.
BGP
Border Gateway Protocol. A path vector routing protocol used between autonomous systems on the Internet.
BNC
Bayonet Neill–Concelman. A coaxial cable connector used in older network setups.
BSSID
Basic Service Set Identifier. The MAC address of a wireless access point in a Wi-Fi network.
BYOD
Bring Your Own Device. A policy allowing personal devices to be used for work purposes.
CAM
Content-addressable Memory. Memory in switches that maps MAC addresses to physical ports.
CDN
Content Delivery Network. A network of servers used to distribute web content closer to users.
CDP
Cisco Discovery Protocol. A proprietary protocol used by Cisco devices to share information with directly connected devices.
CIA
Confidentiality, Integrity, and Availability. A core concept in information security.
CIDR
Classless Inter-domain Routing. A method for allocating IP addresses and routing that allows for variable-length subnet masks.
CLI
Command-line Interface. A text-based interface used to operate software or devices.
CNAME
Canonical Name. A DNS record that maps one domain name to another.
CPU
Central Processing Unit. The primary component of a computer that processes instructions.
CRC
Cyclic Redundancy Check. A method of detecting errors in data transmission.
DAC
Direct Attach Copper. A type of cable used to connect network equipment directly using copper wiring.
DAS
Direct-attached Storage. Digital storage directly attached to a computer or server without a network.
DCI
Data Center Interconnect. Technology used to connect and transport data between data centers.
DDoS
Distributed Denial-of-service. An attack that overwhelms a system with traffic from multiple sources.
DHCP
Dynamic Host Configuration Protocol. A network service that automatically assigns IP addresses to devices.
DLP
Data Loss Prevention. A strategy to prevent sensitive data from being lost, misused, or accessed by unauthorized users.
DNS
Domain Name System. Translates domain names (like google.com) into IP addresses.
DNSSEC
Domain Name System Security Extensions. Adds security to DNS to protect against spoofing.
DoH
DNS over Hypertext Transfer Protocol Secure. Encrypts DNS queries using HTTPS.
DoS
Denial-of-service. An attack that disrupts service by overwhelming a system with requests.
DoT
DNS over Transport Layer Security. A security protocol that encrypts DNS traffic using TLS.
DR
Disaster Recovery. A plan and process for restoring systems after a disruptive event.
EAPoL
Extensible Authentication Protocol over LAN. Used in network access control for authentication.
EIGRP
Enhanced Interior Gateway Routing Protocol. A Cisco-proprietary dynamic routing protocol.
EOL
End-of-life. A status indicating a product is no longer supported or manufactured.
EOS
End-of-support. A status indicating a product no longer receives updates or fixes.
ESP
Encapsulating Security Payload. An IPSec protocol that provides encryption, authentication, and integrity.
ESSID
Extended Service Set Identifier. The name of a Wi-Fi network, including multiple access points.
EULA
End User License Agreement. A legal contract between software provider and user.
FC
Fibre Channel. A high-speed network technology primarily used to connect data storage.
FHRP
First Hop Redundancy Protocol. Ensures network availability by providing backup routers.
FTP
File Transfer Protocol. A protocol used to transfer files between a client and server over a network.
GDPR
General Data Protection Regulation. A European law regulating data protection and privacy.
GRE
Generic Routing Encapsulation. A tunneling protocol used to encapsulate a wide variety of network layer protocols.
GUI
Graphical User Interface. A user interface that includes graphical elements, such as windows and icons.
HTTP
Hypertext Transfer Protocol. The foundation of data communication for the web.
HTTPS
Hypertext Transfer Protocol Secure. A secure version of HTTP that uses TLS/SSL encryption.
IaaS
Infrastructure as a Service. A cloud computing model that provides virtualized computing resources over the internet.
IaC
Infrastructure as Code. Managing infrastructure using machine-readable configuration files.
IAM
Identity and Access Management. A framework for managing digital identities and access rights.
ICMP
Internet Control Message Protocol. Used for sending error messages and operational information.
ICS
Industrial Control System. Systems used to control industrial processes like manufacturing.
IDF
Intermediate Distribution Frame. A cable rack that connects and manages telecommunications wiring.
IDS
Intrusion Detection System. A device or software that monitors network traffic for suspicious activity.
IoT
Internet of Things. A network of physical objects connected to the internet that collect and share data.
IIoT
Industrial Internet of Things. IoT technology used in industrial environments.
IKE
Internet Key Exchange. A protocol used to set up a security association in the IPSec protocol suite.
IP
Internet Protocol. The primary network layer protocol for delivering packets of data across networks.
IPAM
Internet Protocol Address Management. A method for planning and managing IP address space.
IPS
Intrusion Prevention System. Monitors network traffic and can take action to block threats.
IPSec
Internet Protocol Security. A suite of protocols for securing IP communications through encryption and authentication.
IS-IS
Intermediate System to Intermediate System. A link-state routing protocol used in large networks.
LACP
Link Aggregation Control Protocol. Combines multiple physical links into one logical link for increased bandwidth.
LAN
Local Area Network. A network that connects devices within a limited geographic area.
LC
Local Connector. A type of fiber-optic connector.
LDAP
Lightweight Directory Access Protocol. A protocol used to access and manage directory services.
LDAPS
Lightweight Directory Access Protocol over SSL. A secure version of LDAP.
LLDP
Link Layer Discovery Protocol. A vendor-neutral protocol used by devices to advertise identity and capabilities.
MAC
Media Access Control. A unique identifier assigned to network interfaces for communication on a network.
MDF
Main Distribution Frame. The central point of a network where external lines connect to internal equipment.
MDIX
Medium Dependent Interface Crossover. Automatically switches transmit and receive pins on Ethernet ports.
MFA
Multifactor Authentication. An authentication method requiring more than one form of verification.
MIB
Management Information Base. A database used for managing devices in a network using SNMP.
MPO
Multifiber Push On. A fiber-optic connector used for high-density connections.
MTBF
Mean Time Between Failure. The average time between failures of a system.
MTTR
Mean Time To Repair. The average time taken to repair a failed component or system.
MTU
Maximum Transmission Unit. The largest size of a packet that can be transmitted over a network medium.
MX
Mail Exchange. A DNS record that specifies a mail server responsible for receiving email.
NAC
Network Access Control. Enforces policies for network access and security.
NAS
Network-attached Storage. A dedicated file storage device connected to a network.
NAT
Network Address Translation. Modifies IP address information in packet headers while in transit.
NFV
Network Functions Virtualization. Uses virtualization to manage network functions via software.
NIC
Network Interface Card. A hardware component that connects a computer to a network.
NS
Name Server. A DNS server that responds to queries for domain names.
NTP
Network Time Protocol. Synchronizes clocks of networked computers.
NTS
Network Time Security. Provides cryptographic authentication for time synchronization protocols like NTP.
OS
Operating System. The software that manages hardware and software resources on a device.
OSPF
Open Shortest Path First. A link-state routing protocol used within large enterprise networks.
OSI
Open Systems Interconnection. A conceptual model that standardizes network communication in seven layers.
OT
Operational Technology. Hardware and software that monitors or controls industrial equipment.
PaaS
Platform as a Service. A cloud computing service that provides a platform for developing applications.
PAT
Port Address Translation. A type of NAT that maps multiple private IPs to a single public IP using ports.
PCI DSS
Payment Card Industry Data Security Standards. Security standards for organizations that handle cardholder data.
PDU
Power Distribution Unit. Distributes electric power to servers and networking equipment.
PKI
Public Key Infrastructure. A system for creating, managing, and revoking digital certificates.
PoE
Power over Ethernet. Delivers power and data over the same Ethernet cable.
PSK
Pre-shared Key. A shared password used to establish a secure network connection.
PTP
Precision Time Protocol. A protocol used to synchronize clocks throughout a computer network.
PTR
Pointer. A DNS record that maps an IP address to a domain name (reverse of an A record).