Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Network+ & Security+ Acronyms

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Term
Definition
3DES   Triple DES  
🗑
AAA   Authentication, Authorization, and Accounting  
🗑
AC   Alternating Current  
🗑
ACL   Access Control List  
🗑
ACS   Access Control Server  
🗑
ADSL   Asymmetric Digital Subscriber Line  
🗑
AES   Advanced Encryption Standard  
🗑
AH   Authentication Header  
🗑
AHP   Authentication Header Protocol  
🗑
ALE   Annualized Loss Expectancy  
🗑
ALG   Application Level Gateway  
🗑
ANS   Authoritative Name Server  
🗑
ANSI   American National Standards Institute  
🗑
AP   Access Point  
🗑
APC   Angled Physical Contact  
🗑
API   Application Programming Interface  
🗑
APIPA   Automatic Private IP Addressing  
🗑
APT   Advanced Persistent Threat  
🗑
ARO   Annualized Rate of Occurrence  
🗑
ARP   Address Resolution Protocol  
🗑
AS   Authentication Server  
🗑
AS   Autonomous System  
🗑
ASLR   Address Space Layout Randomization  
🗑
ASP   Application Service Provider  
🗑
ATM   Asynchronous Transfer Mode  
🗑
AUI Connector   Attachment Unit Interface Connector  
🗑
B Channel   Bearer Channel  
🗑
BCP   Business Continuity Planning  
🗑
BDR   Backup Designated Router  
🗑
BERT   Bit Error Rate Test  
🗑
BGP   Border Gateway Protocol  
🗑
BIOS   Basic Input/Output System  
🗑
BOOTP   Bootstrap Protocol  
🗑
BPA   Business Partners Agreement  
🗑
BPDU   Bridge Protocol Data Unit  
🗑
BPL   Broadband over Powerlines  
🗑
BPS   Bits Per Second  
🗑
BRI   Basic Rate Interface  
🗑
BSS   Basic Service Set  
🗑
BSSID   Basic Service Set Identifier  
🗑
BYOD   Bring Your Own Device  
🗑
CA   Certificate Authority  
🗑
CAB Files   Cabinet Files  
🗑
CAC   Common Access Card  
🗑
CAM Table   Content Addressable Memory Table  
🗑
CAN   Campus Area Network  
🗑
CAN   Controller Area Network  
🗑
CAPTCHA   Completely Automated Public Turing test to tell Computers and Humans Apart  
🗑
CAR   Corrective Action Report  
🗑
CARP   Common Address Redundancy Protocol  
🗑
CCITT   Comité Consutatif Internationale Téléphonique et Télégraphique  
🗑
CCMP   Counter Mode with Cipher Block Chaining Message Authentication Code Protocol  
🗑
CCTV   Closed-Circuit Television  
🗑
CDS/DSU   Channel Service Unit/Data Service Unit  
🗑
CERT   Computer Emergency Response Team  
🗑
CFB   Cipher Feedback  
🗑
CGI   Common Gateway Interface  
🗑
CHAP   Challenge Handshake Authentication Protocol  
🗑
CIA/AIC   Confidentiality, Integrity, Availability  
🗑
CIDR   Classless Inter Domain Routing  
🗑
CIFS   Common Internet File System  
🗑
CIO   Chief Information Officer  
🗑
CIRT   Computer Incident Response Team  
🗑
CMS   Content Management System  
🗑
CNAME   Canonical Name Record  
🗑
COOP   Continuity Of Operation Planning  
🗑
COPPA   Children'S Online Privacy Protection Act  
🗑
CoS   Class of Service  
🗑
CPE   Customer-Premises Equipment  
🗑
CRC   Cyclic Redundancy Check  
🗑
CRL   Certificate Revocation List  
🗑
CRM   Customer Relationship Management  
🗑
CSMA/CA   Carrier Sense Multiple Access with Collision Avoidance  
🗑
CSMA/CD   Carrier Sense Multiple Access with Collision Detection  
🗑
CSO   Chief Security Officer  
🗑
CSP   Cloud Service Provider  
🗑
CSR   Certificate Signing Request  
🗑
CSU   Channel Service Unit  
🗑
CTO   Chief Technology Officer  
🗑
CWDM   Coarse Wavelength Division Multiplexing  
🗑
D Channel   Delta Channel  
🗑
DAC   Discretionary Access Control  
🗑
DAI   Dynamic ARP Inspection  
🗑
Db   Decibel  
🗑
DBA   Database Administrator  
🗑
DC   Direct Current  
🗑
DCE   Data Communications Equipment  
🗑
DCF   Distributed Coordination Function  
🗑
DCS   Distributed Control System  
🗑
DDNS   Dynamic DNS  
🗑
DDoS   Distributed Denial of Service  
🗑
DDoS Attack   Distributed Denial of Service Attack  
🗑
DEP   Data Execution Prevention  
🗑
DES   Data Encryption Standard  
🗑
DET   Directory Entry Table  
🗑
DFS   Distributed File System  
🗑
DHCP   Dynamic Host Configuration Protocol  
🗑
DiffServ   Differentiated Services  
🗑
DIG   Domain Information Groper  
🗑
DLL   Dynamic Link Library  
🗑
DLP   Data Loss Prevention  
🗑
DMZ   Demilitarized Zone  
🗑
DNAT   Destination Network Address Translation  
🗑
DNS   Domain Name System  
🗑
DNSBLs   DNS Blacklists  
🗑
DOCSIS   Data Over Cable Service Interface Specification  
🗑
DoS   Denial of Service  
🗑
DoS Attack   Denial of Service Attack  
🗑
DR   Designated Router  
🗑
DS   Distribution System  
🗑
DS1   Digital Signal 1  
🗑
DSA   Digital Signature Algorithm  
🗑
DSH   Digital Signal Hierarchy  
🗑
DSL   Digital Subscriber Line  
🗑
DSLAM   DSL Access Multiplexer  
🗑
DSP   Digital Signal Processor  
🗑
DSSS   Direct Sequence Spread Spectrum  
🗑
DSU   Data Service Unit  
🗑
DTE   Data Termination Equipment  
🗑
DVM   Digital Volt Meter  
🗑
DWDM   Dense Wavelength Division Multiplexing  
🗑
EAP   Extensible Authentication Protocol  
🗑
EAPoIP   Extensible Authentication Protocol over IP  
🗑
EAPOL   Extensible Authentication Protocol over LAN  
🗑
EAP-TLS   Extensible Authentication Protocol with Transport Layer Security  
🗑
EAP-TTLS   Extensible Authentication Protocol with Tunneled Transport Layer Security  
🗑
ECC   Elliptic Key Cryptography  
🗑
ECDHE   Elliptic Curve Diffie-Hellman Exchange  
🗑
ECDSA   Elliptic Curve Digital Signature Algorithm  
🗑
EDAC   Error Detection and Correction  
🗑
EDB   External Data Bus  
🗑
EDC   Error Detection Code  
🗑
EEPROM   Electrically Erasable Programmable Read–Only Memory  
🗑
EFS   Encrypting File System  
🗑
EGP   Exterior Gateway Protocol  
🗑
EIA   Electronic Industries Alliance  
🗑
EIGRP   Enhanced Interior Gateway Routing Protocol  
🗑
E-mail   Electronic Mail  
🗑
EMI   Electromagnetic Interference  
🗑
EoP   Ethernet Over Power  
🗑
ERP   Enterprise Resource Planning  
🗑
ES   Edge System  
🗑
ESD   Electrostatic Discharge  
🗑
ESN   Electronic Serial Number  
🗑
ESP   Encapsulating Security Payload  
🗑
ESP Protocol   Encapsulating Security Payload Protocol  
🗑
ESS   Extended Service Set  
🗑
ESSID   Extended Service Set Identifier  
🗑
EUI-48   Extended Unique Identifier, 48-bit  
🗑
EUI-64   Extended Unique Identifier, 64-bit  
🗑
FACL   File system Access Control List  
🗑
FAT   File Allocation Table  
🗑
FC   Face Contact  
🗑
FC   Fibre Channel  
🗑
FCC   Federal Communications Commission  
🗑
FCrDNS   Forward Confirmed reverse DNS  
🗑
FCS   Frame Check Sequence  
🗑
FDDI   Fiber Distributed Data Interface  
🗑
FDE   Full Disk Encryption  
🗑
FDM   Frequency Division Multiplexing  
🗑
FEXT   Far-End Crosstalk  
🗑
FHSS   Frequency Hopping Spread Spectrum  
🗑
FQDN   Fully Qualified Domain Name  
🗑
FRR   False Rejection Rate  
🗑
FTP   File Transfer Protocol  
🗑
GBIC   Gigabit Interface Converter  
🗑
GCM   Galois Counter Mode  
🗑
GFS   Grandfather, Father, Son  
🗑
GIF   Graphics Interchange Format  
🗑
GLBA   Gramm–Leach–Bliley Act  
🗑
GPG   GNU Privacy Guard  
🗑
GPO   Group Policy Object  
🗑
GPS   Global Positioning System  
🗑
GPU   Graphic Processing Unit  
🗑
GRE   Generic Routing Encapsulation  
🗑
HCC   Horizontal cross-connect  
🗑
HDD   Hard Disk Drive  
🗑
HEC   HDMI Ethernet Channel  
🗑
Hex   Hexadecimal  
🗑
HIDS   Host Intrusion Detection Systems  
🗑
HIPAA   Health Insurance Portability And Accountability Act  
🗑
HIPS   Host-based IPS  
🗑
HMAC   Hashed Message Authentication Code  
🗑
HMI   Human Machine Interface  
🗑
HOTP   HMAC-based One Time Password  
🗑
HSM   Hardware Security Module  
🗑
HSPA+   Evolved High-Speed Packet Access  
🗑
HSRP   Hot Standby Router Protocol  
🗑
HTML   Hypertext Markup Language  
🗑
HTTP   Hypertext Transfer Protocol  
🗑
HTTPS   Hypertext Transfer Protocol over SSL  
🗑
HVAC   Heating, Ventilating, and Air Conditioning  
🗑
IA   Information Assurance  
🗑
IaaS   Infrastructure as a Service  
🗑
IANA   Internet Assigned Number Authority  
🗑
IAS   Internet Authentication Service  
🗑
IBSS   Independent Basic Service Set  
🗑
ICA   Independent Computing Architecture  
🗑
ICANN   Internet Corporation for Assigned Names and Numbers  
🗑
ICC   Intermediate Cross-connect  
🗑
ICMP   Internet Control Message Protocol  
🗑
ICS   Industrial Control Server  
🗑
ICS   Internet Connection Sharing  
🗑
IDEA   International Data Encryption Algorithm  
🗑
IDF   Intermediate Distribution Frame  
🗑
IdP   Identity Provider  
🗑
IDS   Intrusion Detection System  
🗑
IEEE   Institute of Electrical and Electronics Engineers  
🗑
IETF   Internet Engineering Task Force  
🗑
IFG   Interframe Gap  
🗑
IFS   Interframe Space  
🗑
IGMP   Internet Group Management Protocol  
🗑
IGP   Interior Gateway Protocol  
🗑
IGRP   Interior Gateway Routing Protocol  
🗑
IIS   Internet Information Services  
🗑
IKE   Internet Key Exchange  
🗑
ILM   Information Lifecycle Management  
🗑
IMAP4   Internet Message Access Protocol  
🗑
IoT   Internet of Things  
🗑
IP   Internet Protocol  
🗑
IPS   Intrusion Prevention System  
🗑
IPSec   Internet Protocol Security  
🗑
IPv4   Internet Protocol Version 4  
🗑
IPv6   Internet Protocol Version 6  
🗑
IRC   Internet Relay Chat  
🗑
IRP   Incident Response Policy  
🗑
ISA   Interconnection Security Agreement  
🗑
ISATAP   Intra-Site Automatic Tunnel Addressing Protocol  
🗑
iSCSI   Internet Small Computer System Interface  
🗑
ISDN   Integrated Services Digital Network  
🗑
IS-IS   Intermediate System to Intermediate System  
🗑
ISOC   International Organization for Standardization  
🗑
iSOC   Internet Society  
🗑
ISP   Internet Service Provider  
🗑
ISSO   Information Systems Security Officer  
🗑
IT   Information Technology  
🗑
ITCP   IT Contingency Plan  
🗑
ITU   International Telecommunication Union  
🗑
IV   Initialization Vector  
🗑
JBOD   Just a Bunch of Disks  
🗑
JPEG   Joint Photographic Experts Group  
🗑
Kbps   Kilobits Per Second  
🗑
KDC   Key Distribution Center  
🗑
KEK   Key Encryption Key  
🗑
KHMAC   Key Hashing for Message Authentication Code  
🗑
KHz   Kilohertz  
🗑
L2TP   Layer 2 Tunneling Protocol  
🗑
LACP   Link Aggregation Control Protocol  
🗑
LAN   Local Area Network  
🗑
LC   Local Connector  
🗑
LDAP   Lightweight Directory Access Protocol  
🗑
LEAP   Lightweight Extensible Authentication Protocol  
🗑
LED   Light Emitting Diode  
🗑
LFM   Log File Monitor  
🗑
LLC   Logical Link Control  
🗑
LTE   Long Term Evolution  
🗑
MaaS   Monitoring as a Service  
🗑
MAC   Mandatory Access Control  
🗑
MAC   Media Access Control  
🗑
MAC   Message Authentication Code  
🗑
MAC Address   Media Access Control Address  
🗑
MAN   Metropolitan Area Network  
🗑
MB   Megabyte  
🗑
MBSA   Microsoft Baseline Security Analyzer  
🗑
MCC   Main cross-connect  
🗑
MD5   Message-Digest Algorithm Version 5  
🗑
MDF   Main Distribution Frame  
🗑
MGCP   Media Gateway Control Protocol  
🗑
MHz   Megahertz  
🗑
MIB   Management Information Base  
🗑
MIME   Multipurpose Internet Mail Extensions  
🗑
MIMO   Multiple In/Multiple Out  
🗑
MMC   Microsoft Management Console  
🗑
MME   MME (Mesh Made Easy)  
🗑
MMF   Multimode Fiber  
🗑
Modem   Modulator-Demodulator  
🗑
MOU   Memorandum of Understanding  
🗑
MPLS   Multiprotocol Label Switching  
🗑
MPPE   Microsoft Point-to-Point Encryption  
🗑
MSA   Multisource Agreement  
🗑
MSCHAP   Microsoft Challenge Handshake Authentication Protocol  
🗑
MSDS   Material Safety Data Sheet  
🗑
MTBF   Mean Time Between Failures  
🗑
mtr   My Traceroute  
🗑
MT-RJ   Mechanical Transfer Registered Jack  
🗑
MTSO   Mobile Telecommunications Switching Office  
🗑
MTTF   Mean Time To Failure  
🗑
MTTR   Mean Time To Recover  
🗑
MTU   Maximum Transmission Unit  
🗑
MUX   Multiplexer  
🗑
MX   Mail Exchange  
🗑
MX Record   Mail Exchange Record  
🗑
NaaS   Network as a Service  
🗑
NAC   Network Access Control  
🗑
NAC   Network Address Control  
🗑
NAS   Network Access Server  
🗑
NAS   Network Attached Storage  
🗑
NAT   Network Address Translation  
🗑
NDA   Non-Disclosure Agreement  
🗑
NetBEUI   NetBIOS Extended User Interface  
🗑
NetBIOS   Network Basic Input/Output System  
🗑
NetBT   NetBIOS over TCP/IP  
🗑
NEXT   Near-End Crosstalk  
🗑
NFC   Near Field Communication  
🗑
NFS   Network File System  
🗑
NIC   Network Interface Card  
🗑
NIDS   Network Intrusion Detection System  
🗑
NIPS   Network-based IPS  
🗑
NIST   National Institute of Standards and Technology  
🗑
NIU   Network Interface Unit  
🗑
NMS   Network Management Software  
🗑
NMS   Network Management Station  
🗑
NNI   Network-to-Network Interface  
🗑
NNTP   Network News Transfer Protocol  
🗑
NOS   Network Operating System  
🗑
NRZ   Non-Return to Zero  
🗑
NRZI   Non-Return to Zero Inverted  
🗑
NS   Name Server  
🗑
ns   Nanosecond  
🗑
NT   Network Termination  
🗑
NTFS   New Technology File System  
🗑
NTLM   New Technology LAN Manager  
🗑
NTP   Network Time Protocol  
🗑
NTU   Network Termination Unit  
🗑
NX   No Execute  
🗑
OAUTH   Open Authorization  
🗑
OCSP   Online Certificate Status Protocol  
🗑
OCx   Optical Carrier x  
🗑
OEM   Original Equipment Manufacturer  
🗑
OLA   Open License Agreement  
🗑
OS   Operating System  
🗑
OSI   Open Systems Interconnection  
🗑
OSI Model   Open Systems Interconnection Reference Model  
🗑
OSPF   Open Shortest Path First  
🗑
OTDR   Optical Time-Domain Reflectometer  
🗑
OTP   One Time Pad  
🗑
OUI   Organizationally Unique Identifier  
🗑
OVAL   Open Vulnerability Assessment Language  
🗑
P2P   Peer to Peer  
🗑
PaaS   Platform as a Service  
🗑
PAC   Proxy Auto Configuration  
🗑
PAM   Pluggable Authentication Modules  
🗑
PAN   Personal Area Network  
🗑
PAP   Password Authentication Protocol  
🗑
PAT   Port Address Translation  
🗑
PBKDF2   Password-Based Key Derivation Function 2  
🗑
PBX   Private Branch Exchange  
🗑
PCAP   Packet Capture  
🗑
PDH   Plesiochronous Digital Hierarchy  
🗑
PDoS Attack   Permanent DoS Attack  
🗑
PEAP   Protected Extensible Authentication Protocol  
🗑
PED   Personal Electronic Device  
🗑
PFS   Perfect Forward Secrecy  
🗑
PGP   Pretty Good Privacy  
🗑
PII   Personally Identifiable Information  
🗑
PIV   Personal Identity Verification  
🗑
PKI   Public Key Infrastructure  
🗑
POD   Ping Of Death  
🗑
PoE   Power over Ethernet  
🗑
PON   Passive Optical Network  
🗑
POP   Point of Presence  
🗑
POP3   Post Office Protocol version 3  
🗑
POTS   Plain Old Telephone Service  
🗑
PPP   Point-to-Point Protocol  
🗑
PPTP   Point-to-Point Tunneling Protocol  
🗑
PROM   Programmable Read–Only Memory  
🗑
PSK   Pre-Shared Key  
🗑
PSTN   Public Switched Telephone Network  
🗑
PTR   Pointer  
🗑
PTZ   Pan-Tilt-Zoom  
🗑
PVC   Permanent Virtual Circuit  
🗑
PVC   Polyvinyl Chloride  
🗑
QoS   Quality of Service  
🗑
RA   Recovery Agent  
🗑
RA   Registration Authority  
🗑
RAD   Rapid Application Development  
🗑
RADIUS   Remote Authentication Dial-In User Service  
🗑
RAID   Redundant Array of Inexpensive Disks  
🗑
RAID 1   Redundant Array of Independent Disks 1  
🗑
RAID 5   Redundant Array of Independent Disks 5  
🗑
RARP   Reverse Address Resolution Protocol  
🗑
RAS   Remote Access Services  
🗑
RBAC   Role–Based Access Control  
🗑
RC4   RSA Variable Key Size Encryption Algorithm  
🗑
RDP   Remote Desktop Protocol  
🗑
RF   Radio Frequency  
🗑
RFB   Remote Framebuffer  
🗑
RFI   Radio Frequency Interference  
🗑
RIP   Routing Information Protocol  
🗑
RIPEMD RACE   Integrity Primitives Evaluation Message Digest  
🗑
ROI   Return On Investment  
🗑
RPO   Recovery Point Objectives  
🗑
RSA   Rivest, Shamir and Adleman  
🗑
RTBH Filtering   Remote Triggered Black Hole Filtering  
🗑
RTO   Recovery Time Objectives  
🗑
RTP   Real-time Transport Protocol  
🗑
S/MIME   Secure/Multipurpose Internet Mail Extensions  
🗑
SA   Security Association  
🗑
SaaS   Software as a Service  
🗑
SAML   Security Assertions Markup Language  
🗑
SAN   Storage Area Network  
🗑
Sarbox   Sarbanes–Oxley Act  
🗑
SC   Subscriber Connector or Standard Connector  
🗑
SCADA   System Control and Data Acquisition  
🗑
SCAP   Security Content Automation Protocol  
🗑
SCEP   Simple Certificate Enrollment Protocol  
🗑
SCP   Secure Copy Protocol  
🗑
SCSI   Small Computer System Interface  
🗑
SDH   Synchronous Digital Hierarchy  
🗑
SDLC   Systems Development Life Cycle  
🗑
SDLM   Software Development Life Cycle Methodology  
🗑
SEH   Structured Exception Handler  
🗑
SFP   Small Form Factor Pluggable  
🗑
SFTP   Secured File Transfer Protocol  
🗑
SHA   Secure Hash Algorithm  
🗑
SHTTP   Secure Hypertext Transfer Protocol  
🗑
SIEM   Security Information and Event Management  
🗑
SIM   Subscriber Identity Module  
🗑
SIV   System Integrity Verifier  
🗑
SLA   Service Level Agreement  
🗑
SLE   Single Loss Expectancy  
🗑
SMA   Sub Multi Assembly or Sub Miniature type A  
🗑
SMB   Server Message Block  
🗑
SMB Protocol   Server Message Block Protocol  
🗑
SMS   Short Message Service  
🗑
SMTP   Simple Mail Transfer Protocol  
🗑
SNIPS   System and Network Integrated Polling Software  
🗑
SNMP   Simple Network Management Protocol  
🗑
SOA   Start of Authority  
🗑
SOAP   Simple Object Access Protocol  
🗑
SoD   Separation of Duties  
🗑
SOHO   Small office/home office  
🗑
SONET   Synchronous Optical Network  
🗑
SPA   Security Posture Assessments  
🗑
SPI   Security Parameters Index  
🗑
SPI   Stateful Packet Inspection  
🗑
SPIM   Spam over Internet Messaging  
🗑
SQL   Structured Query Language  
🗑
SRV   Service Locator  
🗑
SSD   Solid State Drive  
🗑
SSH   Secure Shell  
🗑
SSID   Service Set Identifier  
🗑
SSL   Secure Sockets Layer  
🗑
SSL VPN   Secure Socket Layer VPN  
🗑
SSO   Single Sign-On  
🗑
SSTP   Secure Socket Tunneling Protocol  
🗑
ST   Straight Tip  
🗑
STA   Station  
🗑
Static NAT   Static Network Address Translation  
🗑
STP   Shielded Twisted Pair  
🗑
STP   Spanning-Tree Protocol  
🗑
SVC   Switched Virtual Circuit  
🗑
TA   Terminal Adapters  
🗑
TACACS   Terminal Access Controller Access Control System  
🗑
TACACS+   Terminal Access Controller Access Control System Plus  
🗑
TCP   Transmission Control Protocol  
🗑
TCP/IP   Transmission Control Protocol/Internet Protocol  
🗑
TCSEC   Trusted Computer System Evaluation Criteria  
🗑
TDM   Time-Division Multiplexing  
🗑
TDR   Time-Domain Reflectometer  
🗑
TE   Terminal Equipment  
🗑
TFTP   Trivial File Transfer Protocol  
🗑
TGT   Ticket Granting Ticket  
🗑
TIA   Telecommunications Industry Association  
🗑
TIFF   Tagged Image File Format  
🗑
TKIP   Temporal Key Integrity Protocol  
🗑
TLS   Transport Layer Security  
🗑
TOTP   Time-based One-Time Password  
🗑
TPM   Trusted Platform Module  
🗑
TSIG   Transaction Signature  
🗑
TTL   Time To Live  
🗑
TTS   Transaction Tracking System  
🗑
UAC   User Account Control  
🗑
UAT   User Acceptance Testing  
🗑
UDP   User Datagram Protocol  
🗑
UEFI   Unified Extensible Firmware Interface  
🗑
UNI   User-to-Network Interface  
🗑
UPS   Uninterruptible Power Supply  
🗑
UR   L Universal Resource Locator  
🗑
URI   Uniform Resource Identifier  
🗑
USB   Universal Serial Bus  
🗑
UTM   Unified Threat Management  
🗑
UTP   Unshielded Twisted Pair  
🗑
VCC   Vertical Cross-Connect  
🗑
VDI   Virtualization Desktop Infrastructure  
🗑
VER   Voltage Event Recorder  
🗑
VLAN   Virtual LAN  
🗑
VLAN Hopping   Virtual Local Area Network Hopping  
🗑
VLSM   Variable Length Subnet Mask  
🗑
VM   Virtual Machine  
🗑
VNC   Virtual Network Computing  
🗑
VoIP   Voice over IP  
🗑
VPN   Virtual Private Network  
🗑
VSAT   Very Small Aperture Terminal  
🗑
VTC   Video Teleconferencing  
🗑
VTP   VLAN Trunking Protocol  
🗑
WAF   Web-Application Firewall  
🗑
WAN   Wide Area Network  
🗑
WAP   Wireless Access Point  
🗑
Web Proxy   HTTP Proxy  
🗑
WEP   Wired Equivalent Privacy  
🗑
WIDS   Wireless Intrusion Detection System  
🗑
WiMAX   Worldwide Interoperability for Microwave Access  
🗑
WINS   Windows Internet Naming Service  
🗑
WIPS   Wireless Intrusion Prevention System  
🗑
WLAN   Wireless Local Area Network  
🗑
WPA   Wi-Fi Protected Access  
🗑
WPA2   Wi-Fi Protected Access v2  
🗑
WPAN   Wireless Personal Area Network  
🗑
WPS   WiFi Protected Setup  
🗑
WTLS   Wireless TLS  
🗑
WWAN   Wireless Wide Area Network  
🗑
XML   Extensible Markup Language  
🗑
XSRF   Cross-Site Request Forgery  
🗑
XSS   Cross-Site Scripting  
🗑
Zerconf   Zero Configuration Networking  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: ccman1
Popular Computers sets