vocab for net+ n09

0.0(0)
studied byStudied by 0 people
0.0(0)
call with kaiCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/161

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 12:55 PM on 4/4/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

162 Terms

1
New cards

A

Address. Refers to an identifier for a networked device, typically an IP address.

2
New cards

ACL

Access Control List. A set of rules used to control network traffic and restrict access to resources.

3
New cards

AH

Authentication Header. A component of IPSec that provides connectionless integrity and authentication.

4
New cards

AP

Access Point. A device that allows wireless devices to connect to a wired network.

5
New cards

API

Application Programming Interface. A set of routines and tools for building software applications.

6
New cards

APIPA

Automatic Private Internet Protocol Addressing. Assigns an IP address automatically when DHCP fails.

7
New cards

ARP

Address Resolution Protocol. Resolves IP addresses to MAC (hardware) addresses on a local network.

8
New cards

AUP

Acceptable Use Policy. A document outlining permitted uses of a network or system.

9
New cards

BGP

Border Gateway Protocol. A path vector routing protocol used between autonomous systems on the Internet.

10
New cards

BNC

Bayonet Neill–Concelman. A coaxial cable connector used in older network setups.

11
New cards

BSSID

Basic Service Set Identifier. The MAC address of a wireless access point in a Wi-Fi network.

12
New cards

BYOD

Bring Your Own Device. A policy allowing personal devices to be used for work purposes.

13
New cards

CAM

Content-addressable Memory. Memory in switches that maps MAC addresses to physical ports.

14
New cards

CDN

Content Delivery Network. A network of servers used to distribute web content closer to users.

15
New cards

CDP

Cisco Discovery Protocol. A proprietary protocol used by Cisco devices to share information with directly connected devices.

16
New cards

CIA

Confidentiality, Integrity, and Availability. A core concept in information security.

17
New cards

CIDR

Classless Inter-domain Routing. A method for allocating IP addresses and routing that allows for variable-length subnet masks.

18
New cards

CLI

Command-line Interface. A text-based interface used to operate software or devices.

19
New cards

CNAME

Canonical Name. A DNS record that maps one domain name to another.

20
New cards

CPU

Central Processing Unit. The primary component of a computer that processes instructions.

21
New cards

CRC

Cyclic Redundancy Check. A method of detecting errors in data transmission.

22
New cards

DAC

Direct Attach Copper. A type of cable used to connect network equipment directly using copper wiring.

23
New cards

DAS

Direct-attached Storage. Digital storage directly attached to a computer or server without a network.

24
New cards

DCI

Data Center Interconnect. Technology used to connect and transport data between data centers.

25
New cards

DDoS

Distributed Denial-of-service. An attack that overwhelms a system with traffic from multiple sources.

26
New cards

DHCP

Dynamic Host Configuration Protocol. A network service that automatically assigns IP addresses to devices.

27
New cards

DLP

Data Loss Prevention. A strategy to prevent sensitive data from being lost, misused, or accessed by unauthorized users.

28
New cards

DNS

Domain Name System. Translates domain names (like google.com) into IP addresses.

29
New cards

DNSSEC

Domain Name System Security Extensions. Adds security to DNS to protect against spoofing.

30
New cards

DoH

DNS over Hypertext Transfer Protocol Secure. Encrypts DNS queries using HTTPS.

31
New cards

DoS

Denial-of-service. An attack that disrupts service by overwhelming a system with requests.

32
New cards

DoT

DNS over Transport Layer Security. A security protocol that encrypts DNS traffic using TLS.

33
New cards

DR

Disaster Recovery. A plan and process for restoring systems after a disruptive event.

34
New cards

EAPoL

Extensible Authentication Protocol over LAN. Used in network access control for authentication.

35
New cards

EIGRP

Enhanced Interior Gateway Routing Protocol. A Cisco-proprietary dynamic routing protocol.

36
New cards

EOL

End-of-life. A status indicating a product is no longer supported or manufactured.

37
New cards

EOS

End-of-support. A status indicating a product no longer receives updates or fixes.

38
New cards

ESP

Encapsulating Security Payload. An IPSec protocol that provides encryption, authentication, and integrity.

39
New cards

ESSID

Extended Service Set Identifier. The name of a Wi-Fi network, including multiple access points.

40
New cards

EULA

End User License Agreement. A legal contract between software provider and user.

41
New cards

FC

Fibre Channel. A high-speed network technology primarily used to connect data storage.

42
New cards

FHRP

First Hop Redundancy Protocol. Ensures network availability by providing backup routers.

43
New cards

FTP

File Transfer Protocol. A protocol used to transfer files between a client and server over a network.

44
New cards

GDPR

General Data Protection Regulation. A European law regulating data protection and privacy.

45
New cards

GRE

Generic Routing Encapsulation. A tunneling protocol used to encapsulate a wide variety of network layer protocols.

46
New cards

GUI

Graphical User Interface. A user interface that includes graphical elements, such as windows and icons.

47
New cards

HTTP

Hypertext Transfer Protocol. The foundation of data communication for the web.

48
New cards

HTTPS

Hypertext Transfer Protocol Secure. A secure version of HTTP that uses TLS/SSL encryption.

49
New cards

IaaS

Infrastructure as a Service. A cloud computing model that provides virtualized computing resources over the internet.

50
New cards

IaC

Infrastructure as Code. Managing infrastructure using machine-readable configuration files.

51
New cards

IAM

Identity and Access Management. A framework for managing digital identities and access rights.

52
New cards

ICMP

Internet Control Message Protocol. Used for sending error messages and operational information.

53
New cards

ICS

Industrial Control System. Systems used to control industrial processes like manufacturing.

54
New cards

IDF

Intermediate Distribution Frame. A cable rack that connects and manages telecommunications wiring.

55
New cards

IDS

Intrusion Detection System. A device or software that monitors network traffic for suspicious activity.

56
New cards

IoT

Internet of Things. A network of physical objects connected to the internet that collect and share data.

57
New cards

IIoT

Industrial Internet of Things. IoT technology used in industrial environments.

58
New cards

IKE

Internet Key Exchange. A protocol used to set up a security association in the IPSec protocol suite.

59
New cards

IP

Internet Protocol. The primary network layer protocol for delivering packets of data across networks.

60
New cards

IPAM

Internet Protocol Address Management. A method for planning and managing IP address space.

61
New cards

IPS

Intrusion Prevention System. Monitors network traffic and can take action to block threats.

62
New cards

IPSec

Internet Protocol Security. A suite of protocols for securing IP communications through encryption and authentication.

63
New cards

IS-IS

Intermediate System to Intermediate System. A link-state routing protocol used in large networks.

64
New cards

LACP

Link Aggregation Control Protocol. Combines multiple physical links into one logical link for increased bandwidth.

65
New cards

LAN

Local Area Network. A network that connects devices within a limited geographic area.

66
New cards

LC

Local Connector. A type of fiber-optic connector.

67
New cards

LDAP

Lightweight Directory Access Protocol. A protocol used to access and manage directory services.

68
New cards

LDAPS

Lightweight Directory Access Protocol over SSL. A secure version of LDAP.

69
New cards

LLDP

Link Layer Discovery Protocol. A vendor-neutral protocol used by devices to advertise identity and capabilities.

70
New cards

MAC

Media Access Control. A unique identifier assigned to network interfaces for communication on a network.

71
New cards

MDF

Main Distribution Frame. The central point of a network where external lines connect to internal equipment.

72
New cards

MDIX

Medium Dependent Interface Crossover. Automatically switches transmit and receive pins on Ethernet ports.

73
New cards

MFA

Multifactor Authentication. An authentication method requiring more than one form of verification.

74
New cards

MIB

Management Information Base. A database used for managing devices in a network using SNMP.

75
New cards

MPO

Multifiber Push On. A fiber-optic connector used for high-density connections.

76
New cards

MTBF

Mean Time Between Failure. The average time between failures of a system.

77
New cards

MTTR

Mean Time To Repair. The average time taken to repair a failed component or system.

78
New cards

MTU

Maximum Transmission Unit. The largest size of a packet that can be transmitted over a network medium.

79
New cards

MX

Mail Exchange. A DNS record that specifies a mail server responsible for receiving email.

80
New cards

NAC

Network Access Control. Enforces policies for network access and security.

81
New cards

NAS

Network-attached Storage. A dedicated file storage device connected to a network.

82
New cards

NAT

Network Address Translation. Modifies IP address information in packet headers while in transit.

83
New cards

NFV

Network Functions Virtualization. Uses virtualization to manage network functions via software.

84
New cards

NIC

Network Interface Card. A hardware component that connects a computer to a network.

85
New cards

NS

Name Server. A DNS server that responds to queries for domain names.

86
New cards

NTP

Network Time Protocol. Synchronizes clocks of networked computers.

87
New cards

NTS

Network Time Security. Provides cryptographic authentication for time synchronization protocols like NTP.

88
New cards

OS

Operating System. The software that manages hardware and software resources on a device.

89
New cards

OSPF

Open Shortest Path First. A link-state routing protocol used within large enterprise networks.

90
New cards

OSI

Open Systems Interconnection. A conceptual model that standardizes network communication in seven layers.

91
New cards

OT

Operational Technology. Hardware and software that monitors or controls industrial equipment.

92
New cards

PaaS

Platform as a Service. A cloud computing service that provides a platform for developing applications.

93
New cards

PAT

Port Address Translation. A type of NAT that maps multiple private IPs to a single public IP using ports.

94
New cards

PCI DSS

Payment Card Industry Data Security Standards. Security standards for organizations that handle cardholder data.

95
New cards

PDU

Power Distribution Unit. Distributes electric power to servers and networking equipment.

96
New cards

PKI

Public Key Infrastructure. A system for creating, managing, and revoking digital certificates.

97
New cards

PoE

Power over Ethernet. Delivers power and data over the same Ethernet cable.

98
New cards

PSK

Pre-shared Key. A shared password used to establish a secure network connection.

99
New cards

PTP

Precision Time Protocol. A protocol used to synchronize clocks throughout a computer network.

100
New cards

PTR

Pointer. A DNS record that maps an IP address to a domain name (reverse of an A record).