1/74
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
PCI
(Peripheral Component Interconnect): A computer bus for attaching hardware devices in a computer.
PCI DSS
(Payment Card Industry Data Security Standard): A security standard created by the Payment Card Industry Security Standards Council (PCI SSC)
PCIe
(Peripheral Component Interconnect Express): Is a high-speed serial computer expansion bus standard designed to replace the older PCI, PCI-X, and AGP bus standards.
PCI-X
(Peripheral Component Interconnect Extended): A type of system bus and interface standard, has higher bandwidth than the traditional PCI
PDU
(Power Distribution Unit): A device designed to provide power to devices that require power, and may or may not support remote monitoring and access.
PII
(Personally Identifiable Information): Information about individuals that can be used to trace a person's identity, such as a full name, birthdate, biometric data, and identifying numbers such as a Social Security number (SSN). Organizations have an obligation to protect PII and often identify procedures for handling and retaining PII in data policies.
PKI
(Public Key Infrastructure): Group of technologies used to request, create, manage, store, distribute, and revoke digital certificates. Certificates are an important part of asymmetric encryption. Certificates include public keys along with details on the owner of the certificate and on the CA that issued the certificate. Certificate owners share their public key by sharing a copy of their certificate.
POST
(Power-On Self-Test): checks hardware at startup.
PSU
(Power Supply Unit): Distributes power to all of the computer's different components.
PXE
(Preboot Execution Environment): Allows computer to load OS from a server.
QSFP
(Quad-Small Form Factor Pluggable): Contains four channels. Transmission speeds of 4x4GBps. Can support 4 10GB Ethernet.
RADIUS
(Remote Authentication Dial-in User Server): a networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for users who connect and use a network service. It operates on a client/server model, where a network access server (NAS), acting as the RADIUS client, communicates with a central RADIUS server to authenticate and authorize user access
RAID
(Redundant Array of Inexpensive/Integrated Disks): A data storage virtualization technology that combines multiple physical data storage components into one or more logical units for the purposes of data redundancy, performance improvement, or both.
RAM
(Random Access Memory): Temporary memory. RAM is expandable, and resides on the motherboard.
RAS
(Remote Access Server): Any combination of hardware and software providing the ability to log onto a network from a distant location.
RDP
(Remote Desktop Protocol): A proprietary protocol developed by Microsoft that provides a user with a graphical interface to connect to another computer over a network connection. TCP 3389
ReFS
(Resilient File System): A Windows filing system that was first introduced in Windows Server 2012. It was designed to eventually replace NTFS.
RFC
(Request for Comments): Documents are how standards and protocols are defined and published for all to see on the IETF website.
RFID
(Radio Frequency Identification): Tags/microchips are everywhere . Inside these tiny tags is a predetermined code which can be read by an RFID reader. These are used in credit cards, badges, passports, pet tracking just to name a few
RIS
(Remote Installation Services): Ability to download a windows OS installation across network.
RJ45
(Registered Jack 45): A common connector or plug used on the end of the network cable.
RPM
(Rotations Per Minute): Self-explanatory
RPO
(Recovery Point Objective): A Recovery Point Objective identifies a point in time where data loss is acceptable. It is related to the RTO and the BIA often includes both RTOs and RPOs.
RTO
(Recovery Time Objective): An RTO identifies the maximum amount of time it can take to restore a system after an outage. It is related to the RPO and the BIA often includes both RTOs and RPOs.
SAN
(Storage Area Network): A specialized network of high-speed storage devices.
SAS
(Serial Attached SCSI): A point-to-point serial protocol used to transfer data to and from computer-storage devices such as hard disk drives, solid-state drives, and tape drives
SATA
(Serial ATA): A computer bus interface that connects host bus adapters to mass storage devices such as hard disk drives, optical drives, and solid-state drives
SC
(Standard Connector): A type of fiber-optic cable connector that uses a push-pull latching mechanism and features a 2.5mm ceramic ferrule for precise fiber alignment, commonly used in telecommunications, datacoms, and FTTx applications
SCCM
(System Center Configuration Management): A software management tool developed by Microsoft designed to automate the deployment, management, and monitoring of devices within an organization.
SCP
(Secure Copy Protocol):
One of the first SSH-enabled programs to appear after the introduction of SSH. SCP was one of the first protocols used to transfer data securely between two hosts and thus might have replaced FTP. SCP works well but lacks features such as a directory listing.
SCSI
(Small Computer System Interface): Set of standards used to connect peripherals to computers. Commonly used for SCSI hard disks and/ or tape drives.
SD
(Secure Digital): A proprietary, non-volatile flash memory card format developed by the SD Association (SDA) for use in portable electronic devices
SELinux
(Security-Enhanced Linux): An operating system platform that prevents malicious or suspicious code from executing on both Linux and Unix systems. It is one of the few operating systems that use the MAC model.
SFP
(Small Form-factor Pluggable):
- Transmission speeds up to 1GB
- Replaces the GBIC
- Greater port density
SFTP
Secure File Transfer Protocol. An extension of Secure Shell (SSH) using SSH to transmit the files in an encrypted format. SFTP transmits data using TCP port 22.
SLA
(Service Level Agreement): An agreement between a company and a vendor that stipulates performance expectations, such as minimum uptime and maximum downtime levels.
SMTP
(Simple Mail Transfer Protocol): The main protocol used to send electronic mail from server to server on the Internet. TCP 25
SNMP
Simple Network Management Protocol. Used to collect system information from a remote computer. UDP 161,162
SQL
(Structured Query Language): Language for database management
SSD
(Solid State Drive): A storage device that typically uses flash memory to store data, instructions, and info
SSH
(Secure Shell): A network protocol for secure transfer of data between computers. TCP 22
SSL
(Secure Sockets Layer): Used to encrypt traffic on the wire. SSL is used with HTTPS to encrypt HTTP traffic on the Internet using both symmetric and asymmetric encryption algorithms. SSL uses port 443 when encrypting HTTPS traffic.
SSO
(Single Sign-On): Authentication method where users can access multiple resources on a network using a single account. SSO can provide central authentication against a federated database for different operating systems.
ST
(Straight Tip): A type of fiber-optic cable connector that uses a bayonet-style plug and socket mechanism to secure the connection
TACACS
(Terminal Access Controller Access-Control System): An older remote authentication protocol that was commonly used in UNIX networks. TACACS + is more commonly used.
TCP
(Transmission Control Protocol): Provides reliable, ordered, and error-checked delivery of a stream of packets on the internet. TCP is tightly linked with IP and usually seen as TCP/IP in writing.
TCP/IP
(Transmission Control Protocol/Internet Protocol): Protocol that connects computers to the Internet. Tells computers how to exchange information over the Internet.
TFTP
(Trivial File Transfer Protocol): Used to transfer small amounts of data with UDP port 69. In contrast, FTP is used to transfer larger files using TCP ports 20 and 21.
TLS
(Transport Layer Security): Used to encrypt traffic on the wire. TLS is the replacement for SSL and like SSL, it uses certificates issued by CAs. PEAP-TLS uses TLS to encrypt the authentication process and PEAP-TLS requires a CA to issue certificates.
UAC
(User Account Control): Informs you when a program makes a change that requires administrator-level permission, also adjusts the permission level of your user accounts
UDP
(User Datagram Protocol): Used instead of TCP when guaranteed delivery of each packet is not necessary. UDP uses a best-effort delivery mechanism. CONNECTIONLESS
UEFI
(Unified Extensible Firmware Interface): A method used to boot some systems and intended to replace Basic Input/Output System (BIOS) firmware.
UID
(Unit Identification): A numeric or alphanumeric string assigned to a single entity within a system to ensure it can be uniquely identified, accessed, updated, and interacted with
UPS
(Uninterrupted Power Supply): Backup power system which powers a computer if the mains electricity fails.
URL
(Uniform Resource Locator): A location or address identifying where documents can be found on the Internet; a Web address
USB
(Universal Serial Bus): A type of connection used to attach devices such as flash drives, scanners, cameras, and printers to a computer.
UUID
(Universally Unique Identifier): A 128-bit label used to uniquely identify objects or entities in computer systems, designed to be unique across both space and time without requiring a central registration authority
VBS
(Visual Basic Script): Windows application scripting
VLAN
(Virtual Local Area Network): A VLAN can logically group several different computers together, or logically separate computers, without regard to their physical location. It is possible to create multiple VLANs with a single switch.
VM
(Virtual Machine): A virtual system hosted on a physical system. A physical server can host multiple VMs as servers. Virtualization can reduce the footprint of an organization's server room or datacenter, and helps eliminate wasted resources. It also helps reduce the amount of physical equipment, reducing overall physical security requirements. A VM escape is an attack that allows an attacker to access the host system from within the virtual system.
VMFS
(VMware File System):
local block devices
- local disks or SAN
-vMotion and fail over require SAN
VNC
(Virtual Network Computing): It is a cross-platform screen sharing system that was created to remotely control another computer. This means that a computer's screen, keyboard, and mouse can be used from a distance by a remote user from a secondary device as though they were sitting right in front of it.
vNIC
(Virtual Network Interface Card): This virtual component permits a VM to connect to a network
VoIP
(Voice Over IP): A group of technologies used to transmit voice over IP networks. Vishing is a form of phishing that sometimes uses VoIP.
VPN
(Virtual Private Network): Provides access to a private network over a public network such as the Internet. VPN concentrators provide VPN access to large groups of users.
VSS
(Volume Shadow Service): A Microsoft Windows service that allows backup applications to create consistent snapshots, known as shadow copies, of files and volumes, even if they are locked or in use by other programs
VT
(Virtualization Technology): The process of creating a virtual version of a physical resource, such as a server, storage device, network, or operating system, using software to simulate the functionality of hardware
WDS
(Windows Deployment Services): A server technology from Microsoft for network-based installation of Windows operating systems. It is the successor to Remote Installation Services. WDS is intended to be used for remotely deploying Windows 8, windows 10.
WINS
(Windows Internet Name Service): Method sometimes used by Server versions of Windows to dynamically match NetBIOS computer names to their IP addresses (NetBIOS name resolution).
WMI
(Windows Management Instrumentation): Is Microsoft's implementation of WS-Management in Windows which allows systems to access or exchange management information across a common network
WOL
(Wake on LAN): A networking standard that allows a computer to be turned on or awakened from a low-power state, such as sleep, hibernation, or a fully powered-off state, by a network message
WWNN
(Worldwide Node Name):
Used to physically identify FC network adapters
WWPN
(Worldwide Port Name):
Used to physically identify FC node ports
XD
(Execute Disable): A hardware-based security feature present in most modern computer processors, designed to prevent malicious code from executing in specific areas of memory
ZFS
Z File System): Combined file system and logical volume manager designed by Sun Microsystems that provides protection against data corruption and support for high-storage