Server+ Acro PART 2

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/74

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

75 Terms

1
New cards

PCI

(Peripheral Component Interconnect): A computer bus for attaching hardware devices in a computer.

2
New cards

PCI DSS

(Payment Card Industry Data Security Standard): A security standard created by the Payment Card Industry Security Standards Council (PCI SSC)

3
New cards

PCIe

(Peripheral Component Interconnect Express): Is a high-speed serial computer expansion bus standard designed to replace the older PCI, PCI-X, and AGP bus standards.

4
New cards

PCI-X

(Peripheral Component Interconnect Extended): A type of system bus and interface standard, has higher bandwidth than the traditional PCI

5
New cards

PDU

(Power Distribution Unit): A device designed to provide power to devices that require power, and may or may not support remote monitoring and access.

6
New cards

PII

(Personally Identifiable Information): Information about individuals that can be used to trace a person's identity, such as a full name, birthdate, biometric data, and identifying numbers such as a Social Security number (SSN). Organizations have an obligation to protect PII and often identify procedures for handling and retaining PII in data policies.

7
New cards

PKI

(Public Key Infrastructure): Group of technologies used to request, create, manage, store, distribute, and revoke digital certificates. Certificates are an important part of asymmetric encryption. Certificates include public keys along with details on the owner of the certificate and on the CA that issued the certificate. Certificate owners share their public key by sharing a copy of their certificate.

8
New cards

POST

(Power-On Self-Test): checks hardware at startup.

9
New cards

PSU

(Power Supply Unit): Distributes power to all of the computer's different components.

10
New cards

PXE

(Preboot Execution Environment): Allows computer to load OS from a server.

11
New cards

QSFP

(Quad-Small Form Factor Pluggable): Contains four channels. Transmission speeds of 4x4GBps. Can support 4 10GB Ethernet.

12
New cards

RADIUS

(Remote Authentication Dial-in User Server): a networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for users who connect and use a network service. It operates on a client/server model, where a network access server (NAS), acting as the RADIUS client, communicates with a central RADIUS server to authenticate and authorize user access

13
New cards

RAID

(Redundant Array of Inexpensive/Integrated Disks): A data storage virtualization technology that combines multiple physical data storage components into one or more logical units for the purposes of data redundancy, performance improvement, or both.

14
New cards

RAM

(Random Access Memory): Temporary memory. RAM is expandable, and resides on the motherboard.

15
New cards

RAS

(Remote Access Server): Any combination of hardware and software providing the ability to log onto a network from a distant location.

16
New cards

RDP

(Remote Desktop Protocol): A proprietary protocol developed by Microsoft that provides a user with a graphical interface to connect to another computer over a network connection. TCP 3389

17
New cards

ReFS

(Resilient File System): A Windows filing system that was first introduced in Windows Server 2012. It was designed to eventually replace NTFS.

18
New cards

RFC

(Request for Comments): Documents are how standards and protocols are defined and published for all to see on the IETF website.

19
New cards

RFID

(Radio Frequency Identification): Tags/microchips are everywhere . Inside these tiny tags is a predetermined code which can be read by an RFID reader. These are used in credit cards, badges, passports, pet tracking just to name a few

20
New cards

RIS

(Remote Installation Services): Ability to download a windows OS installation across network.

21
New cards

RJ45

(Registered Jack 45): A common connector or plug used on the end of the network cable.

22
New cards

RPM

(Rotations Per Minute): Self-explanatory

23
New cards

RPO

(Recovery Point Objective): A Recovery Point Objective identifies a point in time where data loss is acceptable. It is related to the RTO and the BIA often includes both RTOs and RPOs.

24
New cards

RTO

(Recovery Time Objective): An RTO identifies the maximum amount of time it can take to restore a system after an outage. It is related to the RPO and the BIA often includes both RTOs and RPOs.

25
New cards

SAN

(Storage Area Network): A specialized network of high-speed storage devices.

26
New cards

SAS

(Serial Attached SCSI): A point-to-point serial protocol used to transfer data to and from computer-storage devices such as hard disk drives, solid-state drives, and tape drives

27
New cards

SATA

(Serial ATA): A computer bus interface that connects host bus adapters to mass storage devices such as hard disk drives, optical drives, and solid-state drives

28
New cards

SC

(Standard Connector): A type of fiber-optic cable connector that uses a push-pull latching mechanism and features a 2.5mm ceramic ferrule for precise fiber alignment, commonly used in telecommunications, datacoms, and FTTx applications

29
New cards

SCCM

(System Center Configuration Management): A software management tool developed by Microsoft designed to automate the deployment, management, and monitoring of devices within an organization.

30
New cards

SCP

(Secure Copy Protocol):

One of the first SSH-enabled programs to appear after the introduction of SSH. SCP was one of the first protocols used to transfer data securely between two hosts and thus might have replaced FTP. SCP works well but lacks features such as a directory listing.

31
New cards

SCSI

(Small Computer System Interface): Set of standards used to connect peripherals to computers. Commonly used for SCSI hard disks and/ or tape drives.

32
New cards

SD

(Secure Digital): A proprietary, non-volatile flash memory card format developed by the SD Association (SDA) for use in portable electronic devices

33
New cards

SELinux

(Security-Enhanced Linux): An operating system platform that prevents malicious or suspicious code from executing on both Linux and Unix systems. It is one of the few operating systems that use the MAC model.

34
New cards

SFP

(Small Form-factor Pluggable):

- Transmission speeds up to 1GB

- Replaces the GBIC

- Greater port density

35
New cards

SFTP

Secure File Transfer Protocol. An extension of Secure Shell (SSH) using SSH to transmit the files in an encrypted format. SFTP transmits data using TCP port 22.

36
New cards

SLA

(Service Level Agreement): An agreement between a company and a vendor that stipulates performance expectations, such as minimum uptime and maximum downtime levels.

37
New cards

SMTP

(Simple Mail Transfer Protocol): The main protocol used to send electronic mail from server to server on the Internet. TCP 25

38
New cards

SNMP

Simple Network Management Protocol. Used to collect system information from a remote computer. UDP 161,162

39
New cards

SQL

(Structured Query Language): Language for database management

40
New cards

SSD

(Solid State Drive): A storage device that typically uses flash memory to store data, instructions, and info

41
New cards

SSH

(Secure Shell): A network protocol for secure transfer of data between computers. TCP 22

42
New cards

SSL

(Secure Sockets Layer): Used to encrypt traffic on the wire. SSL is used with HTTPS to encrypt HTTP traffic on the Internet using both symmetric and asymmetric encryption algorithms. SSL uses port 443 when encrypting HTTPS traffic.

43
New cards

SSO

(Single Sign-On): Authentication method where users can access multiple resources on a network using a single account. SSO can provide central authentication against a federated database for different operating systems.

44
New cards

ST

(Straight Tip): A type of fiber-optic cable connector that uses a bayonet-style plug and socket mechanism to secure the connection

45
New cards

TACACS

(Terminal Access Controller Access-Control System): An older remote authentication protocol that was commonly used in UNIX networks. TACACS + is more commonly used.

46
New cards

TCP

(Transmission Control Protocol): Provides reliable, ordered, and error-checked delivery of a stream of packets on the internet. TCP is tightly linked with IP and usually seen as TCP/IP in writing.

47
New cards

TCP/IP

(Transmission Control Protocol/Internet Protocol): Protocol that connects computers to the Internet. Tells computers how to exchange information over the Internet.

48
New cards

TFTP

(Trivial File Transfer Protocol): Used to transfer small amounts of data with UDP port 69. In contrast, FTP is used to transfer larger files using TCP ports 20 and 21.

49
New cards

TLS

(Transport Layer Security): Used to encrypt traffic on the wire. TLS is the replacement for SSL and like SSL, it uses certificates issued by CAs. PEAP-TLS uses TLS to encrypt the authentication process and PEAP-TLS requires a CA to issue certificates.

50
New cards

UAC

(User Account Control): Informs you when a program makes a change that requires administrator-level permission, also adjusts the permission level of your user accounts

51
New cards

UDP

(User Datagram Protocol): Used instead of TCP when guaranteed delivery of each packet is not necessary. UDP uses a best-effort delivery mechanism. CONNECTIONLESS

52
New cards

UEFI

(Unified Extensible Firmware Interface): A method used to boot some systems and intended to replace Basic Input/Output System (BIOS) firmware.

53
New cards

UID

(Unit Identification): A numeric or alphanumeric string assigned to a single entity within a system to ensure it can be uniquely identified, accessed, updated, and interacted with

54
New cards

UPS

(Uninterrupted Power Supply): Backup power system which powers a computer if the mains electricity fails.

55
New cards

URL

(Uniform Resource Locator): A location or address identifying where documents can be found on the Internet; a Web address

56
New cards

USB

(Universal Serial Bus): A type of connection used to attach devices such as flash drives, scanners, cameras, and printers to a computer.

57
New cards

UUID

(Universally Unique Identifier): A 128-bit label used to uniquely identify objects or entities in computer systems, designed to be unique across both space and time without requiring a central registration authority

58
New cards

VBS

(Visual Basic Script): Windows application scripting

59
New cards

VLAN

(Virtual Local Area Network): A VLAN can logically group several different computers together, or logically separate computers, without regard to their physical location. It is possible to create multiple VLANs with a single switch.

60
New cards

VM

(Virtual Machine): A virtual system hosted on a physical system. A physical server can host multiple VMs as servers. Virtualization can reduce the footprint of an organization's server room or datacenter, and helps eliminate wasted resources. It also helps reduce the amount of physical equipment, reducing overall physical security requirements. A VM escape is an attack that allows an attacker to access the host system from within the virtual system.

61
New cards

VMFS

(VMware File System):

local block devices

- local disks or SAN

-vMotion and fail over require SAN

62
New cards

VNC

(Virtual Network Computing): It is a cross-platform screen sharing system that was created to remotely control another computer. This means that a computer's screen, keyboard, and mouse can be used from a distance by a remote user from a secondary device as though they were sitting right in front of it.

63
New cards

vNIC

(Virtual Network Interface Card): This virtual component permits a VM to connect to a network

64
New cards

VoIP

(Voice Over IP): A group of technologies used to transmit voice over IP networks. Vishing is a form of phishing that sometimes uses VoIP.

65
New cards

VPN

(Virtual Private Network): Provides access to a private network over a public network such as the Internet. VPN concentrators provide VPN access to large groups of users.

66
New cards

VSS

(Volume Shadow Service): A Microsoft Windows service that allows backup applications to create consistent snapshots, known as shadow copies, of files and volumes, even if they are locked or in use by other programs

67
New cards

VT

(Virtualization Technology): The process of creating a virtual version of a physical resource, such as a server, storage device, network, or operating system, using software to simulate the functionality of hardware

68
New cards

WDS

(Windows Deployment Services): A server technology from Microsoft for network-based installation of Windows operating systems. It is the successor to Remote Installation Services. WDS is intended to be used for remotely deploying Windows 8, windows 10.

69
New cards

WINS

(Windows Internet Name Service): Method sometimes used by Server versions of Windows to dynamically match NetBIOS computer names to their IP addresses (NetBIOS name resolution).

70
New cards

WMI

(Windows Management Instrumentation): Is Microsoft's implementation of WS-Management in Windows which allows systems to access or exchange management information across a common network

71
New cards

WOL

(Wake on LAN): A networking standard that allows a computer to be turned on or awakened from a low-power state, such as sleep, hibernation, or a fully powered-off state, by a network message

72
New cards

WWNN

(Worldwide Node Name):

Used to physically identify FC network adapters

73
New cards

WWPN

(Worldwide Port Name):

Used to physically identify FC node ports

74
New cards

XD

(Execute Disable): A hardware-based security feature present in most modern computer processors, designed to prevent malicious code from executing in specific areas of memory

75
New cards

ZFS

Z File System): Combined file system and logical volume manager designed by Sun Microsystems that provides protection against data corruption and support for high-storage