Network+/Acronyms
Appearance
< Network+
Acronym | Full name |
---|---|
A | Address |
ACL | Access Control List |
AH | Authentication Header |
AP | Access Point |
API | Application Programming Interface |
APIPA | Automatic Private Internet Protocol Addressing |
ARP | Address Resolution Protocol |
AUP | Acceptable Use Policy |
BGP | Border Gateway Protocol |
BNC | Bayonet Neill–Concelman |
BSSID | Basic Service Set Identifier |
BYOD | Bring Your Own Device |
CAM | Content-addressable Memory |
CDN | Content Delivery Network |
CDP | Cisco Discovery Protocol |
CIA | Confidentiality, Integrity, and Availability |
CIDR | Classless Inter-domain Routing |
CLI | Command-line Interface |
CNAME | Canonical Name |
CPU | Central Processing Unit |
CRC | Cyclic Redundancy Check |
DAC | Direct Attach Copper |
DAS | Direct-attached Storage |
DCI | Data Center Interconnect |
DDoS | Distributed Denial-of-service |
DHCP | Dynamic Host Configuration Protocol |
DLP | Data Loss Prevention |
DNS | Domain Name System |
DNSSEC | Domain Name System Security Extensions |
DoH | DNS over Hypertext Transfer Protocol Secure |
DoS | Denial-of-service |
DoT | DNS over Transport Layer Security |
DR | Disaster Recovery |
EAPoL | Extensible Authentication Protocol over LAN |
EIGRP | Enhanced Interior Gateway Routing Protocol |
EOL | End-of-life |
EOS | End-of-support |
ESP | Encapsulating Security Payload |
ESSID | Extended Service Set Identifier |
EULA | End User License Agreement |
FC | Fibre Channel |
FHRP | First Hop Redundancy Protocol |
FTP | File Transfer Protocol |
GDPR | General Data Protection Regulation |
GRE | Generic Routing Encapsulation |
GUI | Graphical User Interface |
HTTP | Hypertext Transfer Protocol |
HTTPS | Hypertext Transfer Protocol Secure |
IaaS | Infrastructure as a Service |
IaC | Infrastructure as Code |
IAM | Identity and Access Management |
ICMP | Internet Control Message Protocol |
ICS | Industrial Control System |
IDF | Intermediate Distribution Frame |
IDS | Intrusion Detection System |
IoT | Internet of Things |
IIoT | Industrial Internet of Things |
IKE | Internet Key Exchange |
IP | Internet Protocol |
IPAM | Internet Protocol Address Management |
IPS | Intrusion Prevention System |
IPSec | Internet Protocol Security |
IS-IS | Intermediate System to Intermediate System |
LACP | Link Aggregation Control Protocol |
LAN | Local Area Network |
LC | Local Connector |
LDAP | Lightweight Directory Access Protocol |
LDAPS | Lightweight Directory Access Protocol over SSL |
LLDP | Link Layer Discovery Protocol |
MAC | Media Access Control |
MDF | Main Distribution Frame |
MDIX | Medium Dependent Interface Crossover |
MFA | Multifactor Authentication |
MIB | Management Information Base |
MPO | Multifiber Push On |
MTBF | Mean Time Between Failure |
MTTR | Mean Time To Repair |
MTU | Maximum Transmission Unit |
MX | Mail Exchange |
NAC | Network Access Control |
NAS | Network-attached Storage |
NAT | Network Address Translation |
NFV | Network Functions Virtualization |
NIC | Network Interface Cards |
NS | Name Server |
NTP | Network Time Protocol |
NTS | Network Time Security |
OS | Operating System |
OSPF | Open Shortest Path First |
OSI | Open Systems Interconnection |
OT | Operational Technology |
PaaS | Platform as a Service |
PAT | Port Address Translation |
PCI | DSS Payment Card Industry Data Security Standards |
PDU | Power Distribution Unit |
PKI | Public Key Infrastructure |
PoE | Power over Ethernet |
PSK | Pre-shared Key |
PTP | Precision Time Protocol |
PTR | Pointer |
QoS | Quality of Service |
QSFP | Quad Small Form-factor Pluggable |
RADIUS | Remote Authentication Dial-in User Service |
RDP | Remote Desktop Protocol |
RFID | Radio Frequency Identifier |
RIP | Routing Information Protocol |
RJ | Registered Jack |
RPO | Recovery Point Objective |
RSTP | Rapid Spanning Tree Protocol |
RTO | Recovery Time Objective |
RX | Receiver |
SaaS | Software as a Service |
SAML | Security Assertion Markup Language |
SAN | Storage Area Network |
SASE | Secure Access Service Edge |
SC | Subscriber Connector |
SCADA | Supervisory Control and Data Acquisition |
SDN | Software-defined Network |
SD-WAN | Software-defined Wide Area Network |
SFP | Small Form-factor Pluggable |
SFTP | Secure File Transfer Protocol |
SIP | Session Initiation Protocol |
SIEM | Security Information and Event Management |
SLA | Service-level Agreement |
SLAAC | Stateless Address Autoconfiguration |
SMB | Server Message Block |
SMTP | Simple Mail Transfer Protocol |
SMTPS | Simple Mail Transfer Protocol Secure |
SNMP | Simple Network Management Protocol |
SOA | Start of Authority |
SQL | Structured Query Language |
SSE | Security Service Edge |
SSH | Secure Shell |
SSID | Service Set Identifier |
SSL | Secure Socket Layer |
SSO | Single Sign-on |
ST | Straight Tip |
STP | Shielded Twisted Pair |
SVI | Switch Virtual Interface |
TACAS+ | Terminal Access Controller Access Control System Plus |
TCP | Transmission Control Protocol |
TFTP | Trivial File Transfer Protocol |
TTL | Time to Live |
TX | Transmitter |
TXT | Text |
UDP | User Datagram Protocol |
UPS | Uninterruptible Power Supply |
URL | Uniform Resource Locator |
USB | Universal Serial Bus |
UTM | Unified Threat Management |
UTP | Unshielded Twisted Pair |
VIP | Virtual IP |
VLAN | Virtual Local Area Network |
VLSM | Variable Length Subnet Mask |
VoIP | Voice over IP |
VPC | Virtual Private Cloud |
VPN | Virtual Private Network |
WAN | Wide Area Network |
WPA | Wi-Fi Protected Access |
WPS | Wi-Fi Protected Setup |
VXLAN | Virtual Extensible LAN |
ZTA | Zero Trust Architecture |