Cisco CCNA exam

SemSim.com: Making Cisco Certification (CCNA) Easy!

  SemSim.com: #1 Resource For Cisco Certification Exam Study
 CCNA [Home]
 Router Simulator
 Practice Exams
 Online Training
 Cram Sheets
 Customer Testimonials
 Study Center
   Study Guide
   Interactive Tutorials
   Articles
   Practice Questions
   Networking Tools
   Glossary
 Contact Us
 Site Map
Download FREE trial version
Buy the CCNA Router Simulator

Buy Now

Pass Your CCNA Exam The First Time!

CCNA Test Pass Guarantee

 
 
 

Glossary: CCNA & General Networking Terms 

 

A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z

VBS
Visual Basic Scriplet (Microsoft).
Veronica
A Gopher utility which effectively searches Gopher servers based on a user's list of keywords. The name was chosen to be a "mate" to another utility named "Archie." It later became an acronym for Very Easy Rodent Oriented Netwide Index to Computer Archives. See also: archie, Gopher. [Source: RFC1983]
virtual circuit
A network service which provides connection-oriented service regardless of the underlying network structure. See also: connection-oriented. [Source: RFC1392]
Virtual Private Network (VPN)
A client across a public network such as the Internet may appear to be part of a private network by encapsulating the private packets inside public packets which are routed in the normal way to a device (typically a firewall) on the private network which unpacks them and sends them on the private network, a process known as tunnelling. The tunnel can exist at the data link layer using Point to Point Tunnelling Protocol (PPTP) or the IETF standard Layer 2 Tunneling Protocol (L2TP) from RFC 2661, or at the IP layer using IETF-defined IP Security (IPsec) protocol extensions from RFC 2402 and RFC 2406. There should also be some form of authentication and authorisation, and encryption of at least the authentication process (and preferably data transfers too) so IPsec is the most desireable method.
virus
A program which replicates itself on computer systems by incorporating itself into other programs which are shared among computer systems. See also: Trojan Horse, worm. [Source: RFC1392]
VPN
See: Virtual Private Network
VTAS
Video Technology Advisory Service, a UKERNA service.

Return to TOP