Server+ Acro PART 1

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/98

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

99 Terms

1
New cards

ACL

(Access Control List): A list of rules used to grant access to a resource. In NTFS, a list of ACEs makes up the ACL for a resource. In a firewall, an ACL identifies traffic that is allowed or blocked based on IP addresses, networks, ports, and some protocols (using the protocol ID).

2
New cards

AD

(Active Directory): Active Directory (AD) is a directory service developed by Microsoft for Windows domain networks, serving as a centralized repository for managing and organizing network resources. It stores information about users, computers, groups, printers, and other network objects, providing a hierarchical structure to simplify administration.

3
New cards

APIPA

(Automatic Private IP Address): A Windows function that provides a DHCP fail-safe autoconfiguration address that protects the computer from system failure.

4
New cards

BCP

(Business Continuity Plan): A plan that helps an organization predict and plan for potential outages of critical services or functions. It includes disaster recovery elements that provide the steps used to return critical functions to operation after an outage. A BIA is a part of a BCP and the BIA drives decisions to create redundancies such as failover clusters or alternate sites.

5
New cards

BIA

(Business Impact Analysis): The BIA identifies critical business or mission requirements and includes elements such as Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs), but it doesn't identify solutions.

6
New cards

BIOS

(Basic Input/ Output System): A computer's firmware used to manipulate different settings such as the date and time, boot drive, and access password.

7
New cards

BSOD

(Blue Screen of Death): An error screen which appears on a Windows PC after a fatal system error.

8
New cards

CIDR

(Classless Inter-Domain Routing):

-Technique supported by the BGP4 protocol and based on route aggregation.

-CIDR enables a router to group routes together to reduce the quantity of routing information carried by the core routers.

-With CIDR, a group of IP networks appear to be a single entity to networks outside of the group.

9
New cards

CIFS

(Common Internet File): A network file-sharing protocol that allows users to access, read, write, and manage files on remote servers as if they were stored locally on their own device. It is a public, cross-platform technology based on the Server Message Block (SMB) protocol, originally developed by Microsoft, and is used to facilitate file sharing and access to resources like printers over a network.

10
New cards

CIMC

(Cisco Integrated Management Controller): A management controller embedded in the system board of Cisco UCS C-Series rack servers. It provides a dedicated management interface for initial configuration, remote access, and monitoring of the server, operating independently on a separate ARM-based processor

11
New cards

CLI

(Command Line Interface): An interface that enables the user to interact with the operating system by entering commands and optional arguments.

12
New cards

CMOS

(Complementary Metal Oxide Semiconductors): Are a basic unit used to construct integrated circuits.

13
New cards

COOP

(Continuity of Operation Planning): Effort for agencies to make sure they can continue operations during a wide range of emergencies

Requires planning for various types of events such as natural or human-caused disasters.

14
New cards

CPU

(Central Processing Unit): The key component of a computer system, which contains the circuitry necessary to interpret and execute program instructions

15
New cards

CRU

(Customer Replaceable Unit): A hardware component that can be replaced by a non-technical person, such as the end user or company personnel, without requiring specialist tools or technical training

16
New cards

DAS

(Direct Attached Storage): A digital storage system that connects directly to a personal computer, workstation, or server without being attached to a network.

17
New cards

DC

(Domain Controller): A server that provides critical services such as authentication, authorization, and password management for a Microsoft Windows network by running the Active Directory Domain Services

18
New cards

DDoS

(Distributed Denial of Service):

-Consists of sending a lot of requests to a server at the same time. This can overload the server's network bandwidth.

-Causes a temporary inability to reach the targeted server so other users of that server are denied service.

19
New cards

DHCP

Dynamic Host Configuration Protocol. A service used to dynamically assign TCP/IP configuration information to clients. DHCP is often used to assign IP addresses, subnet masks, default gateways, DNS server addresses, and much more. UDP 67/68

20
New cards

DLP

(Data Loss Prevention): A group of technologies used to prevent data loss. They can block the use of USB devices, monitor outgoing email to detect and block unauthorized data transfers, and monitor data stored in the cloud.

21
New cards

DLT

(Digital Linear Tape): Previously called Compac Tape. A magnetic tape data storage technology developed by Digital Equipment Corporation (DEC) from 1984 onwards.

22
New cards

DMZ

(Demilitarized Zone): A perimeter network or screened subnet, is a physical or logical subnetwork that separates an organization's internal local-area network (LAN) from untrusted external networks, typically the internet

23
New cards

DNS

(Domain Name System): The service that translates URLs to IP addresses. TCP 53

24
New cards

DR

(Disaster Recovery): Strategies and processes for recovering from catastrophic events affecting IT systems.

25
New cards

ECC

(Error Checking and Correction): Error checking and correction refers to the process of detecting and correcting errors that occur during data transmission or storage.

26
New cards

EFS

(Encrypting File System): A feature within NTFS on Windows systems that supports encrypting individual files or folders for confidentiality.

27
New cards

eSATA

(External Serial Advanced Technology Attachment): A modern type of connector for attaching external hard disks

28
New cards

ESD

(Electrostatic Discharge): Release of static electricity. ESD can damage equipment and low humidity causes a higher incidence of electrostatic discharge (ESD). High humidity can cause condensation on the equipment, which causes water damage.

29
New cards

FAT

(File Allocation Table): A file system developed by Microsoft for managing files on storage devices like hard drives and USB flash drives

30
New cards

FCoE

(Fibre Channel Over Ethernet): A networking protocol that is not routable at the IP layer and thus cannot work across large networks

31
New cards

FQDN

(Fully Qualified Domain Name): Consists of a host ID and domain name

32
New cards

FRU

(Field Replaceable Unit): is A hardware component, circuit board, part, or assembly designed to be easily removed and replaced by a user or technician at the location where the system is deployed, without needing to send the entire product or system to a repair facility

33
New cards

FTP

(File Transfer Protocol): uses a TCP-based network to pass files from host to host. TCP 20, 21

34
New cards

FTPS

File Transfer Protocol Secure): Transfers files SECURELY using encryption, unlike FTP. TCP 989, 990

35
New cards

GFS

(Grandfather Father Son): A backup rotation scheme in which three sets of backup tapes must be defined—usually they are daily, weekly, and monthly, which correspond to son, father, and grandfather.

36
New cards

GPO

(Group Policy Object): A collection of settings that define what a system will look like and how it will behave for a defined group of users. You can think of GPO as policy documents that apply their settings to the computers and users within their control.

37
New cards

GUID Partition Table

(GPT): A modern standard for the layout of partition tables on physical storage devices like hard disk drives and solid-state drives

38
New cards

GPU

(Graphics Processing Unit): Controls the manipulation and display of graphics on a display device

39
New cards

GUI

(Graphical User Interface): Currently the dominant method for designing human-computer interaction. Using graphics instead of code to implement instructions between the computer and user.

40
New cards

HBA

(Host Bus Adapter): Connects a host system (the computer) to other network and storage devices.

41
New cards

HCL

(Hardware Compatibility List): A list of computer hardware (typically including many types of peripheral devices) that is compatible with a particular operating system or device management software.

42
New cards

HIDS

(Host Intrusion Detection System): An IDS that sits on one specific host and watches it. HIDS is commonly used to refer to anything that protects a host, and there are also HIDS specific products available. OSSEC is a popular open source HIDS.

43
New cards

HIPS

Host-based Intrusion Prevention System): An extension of a host-based IDS. Designed to react in real time to catch an attack in action and PREVENT it.

44
New cards

HTTP

(Hyper Text Transfer Protocol): The protocol used for transmitting web pages over the Internet, TCP 80

45
New cards

HTTPS

(Hypertext Transfer Protocol Secure): The encrypted version of HTTP, TCP 443

46
New cards

HVAC

Heating, Ventilation, Air Conditioning): A physical security control that increases availability by regulating airflow within data centers and server rooms.

47
New cards

IDF

(Intermediate Distribution Frame):

Extension of the MDF - A strategic distribution point • Connects the users to the network - Uplinks from the MDF - Workgroup switches - Other local resources • Common in medium to large organizations - Users are geographically diverse

48
New cards

iDRAC

(Integrated Dell Remote Access Control): A baseboard management controller (BMC) built into Dell PowerEdge servers, designed for secure local and remote server management

49
New cards

IDS

(Intrusion Detection System): A software and/or hardware system that scans, audits, and monitors the security infrastructure for signs of attacks in progress.

50
New cards

IIS

(Internet Information Services): A Microsoft Windows web server. IIS comes free with Microsoft Windows Server products.

51
New cards

iLO

(Integrated Lights Out): A proprietary embedded server management technology developed by Hewlett Packard Enterprise (HPE) that provides out-of-band management capabilities for servers. It allows IT administrators to remotely monitor, manage, and maintain servers from any location through a dedicated web-based interface, even when the main server operating system is offline or unresponsive

52
New cards

IMAP4

(Internet Message Access Protocol v4): Used to store e-mail on servers and allow clients to manage their e-mail on the server. IMAP4 uses port 143.

53
New cards

Intel-VT

9Intel Virtualization Technology): A suite of hardware extensions designed to improve the efficiency and security of virtualization on Intel platforms. It encompasses several specific technologies, each serving a distinct purpose.

54
New cards

IOPS

(Input/Output Operations Per Second): A common performance measurement used to benchmark computer storage devices like hard disk drives

55
New cards

IP

(Internet Protocol): The main delivery system for information over the Internet

56
New cards

IP KVM

(Internet Protocol Keyboard-Video-Mouse): Uses Internet Protocol (IP) to transport keyboard, video, and mouse (KVM) signals from a remote computer or server to a local workstation or control center over a network

57
New cards

IPMI

(The Intelligent Platform Management Interface): A set of computer interface specifications for an autonomous computer subsystem that provides management and monitoring capabilities independently of the host system's CPU, firmware (BIOS or UEFI) and operating system

58
New cards

IPS

(Intrusion Prevention System): A preventative control that will stop an attack in progress. It is similar to an active IDS except that it's placed in line with traffic. An IPS can actively monitor data streams, detect malicious content, and stop attacks in progress.

59
New cards

IPSEC

(Internet Protocol Security): Used to encrypt traffic on the wire and can operate in both tunnel mode and transport mode. It uses tunnel mode for VPN traffic. IPsec is built into IPv6, but can also work with IPv4 and it includes both AH and ESP. AH provides authentication and integrity, and ESP provides confidentiality, integrity, and authentication. IPsec uses port 500 for IKE with VPN connections.

60
New cards

IPv6

The Internet Protocol Version 6): Provides a large number of new addresses to route Internet traffic, using "from" and "to" addresses written as colon-hexadecimal notation, such as "fe80::42:acff:feaa:1bf0".

61
New cards

iSCSI

(Internetworking Small Computer System Interface): A lower-cost alternative to traditional SANs. It supports sending traditional SCSI commands over an IP network.

62
New cards

ISO

(International Standards Organization): Develops and publishes international standards in technical and nontechnical fields (this case IT standards).

63
New cards

JBOD

(Just a Bunch of Disks): Disks installed on a computer but not as a RAID.

64
New cards

KVM

(Keyboard, Video, Mouse): Use many computers with a single keyboard, video display, and mouse

65
New cards

LAN

(Local Area Network): A geographic network that covers a relatively small geographic area such as a building or a small campus - no more than a mile distance between computers

66
New cards

LC

(Lucent Connector/Little Connector): A miniaturized version of the fiber-optic SC connector

67
New cards

LCD

Liquid Crystal Display): A type of computer monitor that uses technology that displays text and images by passing electricity through a liquid crystal solution sandwiched between two magnetic sheets.

68
New cards

LDAP

(Lightweight Directory Access Protocol): Language used to communicate with directories such as Microsoft's Active Directory. It provides a central location to manage user accounts and other directory objects. LDAP uses port 389 when unencrypted and port 636 when encrypted.

69
New cards

LED

(Light Emitting Diode): An electronic device that conducts current in one direction only and illuminates when it is conducting.

70
New cards

LTO

(Linear Tape Open): Also known as the LTO Ultrium format, is a magnetic tape data storage technology used for backup, data archiving, and data transfer

71
New cards

LUN

(Logical Unit Number): Used to identify a logical unit, often used to refer to a logical disk.

72
New cards

LVM

(Logical Volume Management): Sys admin tools to manage dynamic partitions

73
New cards

MAC

(Media Access Control): A network protocol that manages how devices access and use a shared communication medium, such as a wired or wireless network, to prevent data collisions and ensure efficient data transmission. - Layer 2

- Unique for each system, the fingerprint of a device

74
New cards

MBR

(Master Boot Record): An area on a hard disk in its first sector. When the BIOS boots a system, it looks at the MBR for instructions and information on how to boot the disk and load the operating system. Some malware tries to hide here.

75
New cards

MDF

(Main Distribution Frame): A hardware rack that holds networking equipment to provide connections from public lines coming into the physical building generally from the ISP, to all the IDFs located what a medical facility

76
New cards

MFA

(Multi-Factor Authentication): Another way to authenticate/verify your identity when logging on or trying to access a system.

77
New cards

MIB

(Management Information Base): A data set that defines the criteria that can be retrieved and set on a device using SNMP

78
New cards

MMC

(Microsoft Management Console): Used to build custom consoles so one can effectively administer a computer.

79
New cards

MRU

(Most Recently Used): Lists of recently used programs or opened files

80
New cards

MTBF

(Mean Time Between Failures): A metric that provides a measure of a system's reliability and is usually represented in hours. The MTBF identifies the average time between failures.

81
New cards

MTTR

(Mean Time To Recover): A metric that identifies the average time it takes to restore a failed system. Organizations that have maintenance contracts often specify the MTTR as a part of the contract.

82
New cards

NAC

(Network Access Control): Inspects clients for health and can restrict network access to unhealthy clients to a remediation network. Clients run agents and these agents report status to a NAC server. NAC is used for VPN and internal clients. MAC filtering is a form of NAC.

83
New cards

NAS

(Network Attached Storage): A Specialized file server that is designed and dedicated to support only data storage needs.

84
New cards

NAT

Network Address Translation): A service that translates public IP addresses to private and private IP addresses to public. It hides addresses on an internal network. Also allows for multiple IP's to be used simultaneously avoiding exhaustion of IPs

85
New cards

NetBIOS

(Network Basic Input/Output System): An operating system-level API that allows applications on computers to communicate with each other over a local area network (LAN). UDP 137,138. TCP 139

86
New cards

NFS

(Network File System): Is a client/server application that lets a computer user view and optionally store and update file on a remote computer as though they were on the user's own computer. The user's system needs to have an NFS client and the other computer needs the NFS server.

87
New cards

NIC

(Network Interface Card): A piece of hardware that allows a computer to connect to a network.

88
New cards

NIDS

(Network Intrusion Detection System): For monitoring traffic within a specific network. Can scan and analyze threats.

89
New cards

NIST

(National Institute of Standards and Technology): Its mission is to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology

90
New cards

NLB

(Network Load Balancing): A technique used to distribute network traffic across multiple servers or virtual machines within a cluster to prevent overloading any single host, thereby improving application performance, reliability, and scalability

91
New cards

NOS

(Network Operation System): Specialized software designed to manage and control network resources, facilitating communication and collaboration among all connected devices on a network, such as desktops, laptops, servers, and printers

92
New cards

NTFS

(New Technology File System): A file system used in Microsoft operating systems that provides security. NTFS uses the DAC model.

93
New cards

NTP

(Network Time Protocol. Protocol): Used to synchronize computer times, UDP 123

94
New cards

OEM

(Original Equipment Manufacturer): Buys the product and "rebrands" to sell as their own with warranty

95
New cards

OS

(Operating System): Windows, Apple IOS, and Linux are examples.

96
New cards

OTP

(One-Time Password): A password that is generated for use in one specific session and becomes invalid after the session ends.

97
New cards

OU

(Organizational Unit): A container object used to organize objects in Active Directory. Allows for delegation of control and the ability to link GPOs.

98
New cards

P2V

(Physical To Virtual): Taking a server that is running an OS and Apps and migrating it to a VM on a hypervisor.

May require reinstalling the OS, application, and datafiles onto a new VM from scratch.

99
New cards

PAT

Port Address Translation. a type of network address translation (NAT) that allows multiple devices on a private network to share a single public IP address by using unique port numbers to distinguish between different connections.