Glossary Search By Letter A B C D E F G H I J K L M N O P Q R S T U V W X Y Z C Cache Poisoning 63859279-25B9-409C-A268-0CB7178CFDD0 D DNS Fast Flux 63859279-25B9-409C-A268-0CB7178CFDD0 DNSSEC 63859279-25B9-409C-A268-0CB7178CFDD0 DDNS 63859279-25B9-409C-A268-0CB7178CFDD0 DNS Sinkhole 63859279-25B9-409C-A268-0CB7178CFDD0 DNS Flood Attack 63859279-25B9-409C-A268-0CB7178CFDD0 DNS 63859279-25B9-409C-A268-0CB7178CFDD0 DHCP 63859279-25B9-409C-A268-0CB7178CFDD0 DDI 63859279-25B9-409C-A268-0CB7178CFDD0 DHCP Fingerprinting 63859279-25B9-409C-A268-0CB7178CFDD0 DDOS attack 63859279-25B9-409C-A268-0CB7178CFDD0 DHCP Option 63859279-25B9-409C-A268-0CB7178CFDD0 DNS tunneling 63859279-25B9-409C-A268-0CB7178CFDD0 DNS TXT Record 63859279-25B9-409C-A268-0CB7178CFDD0 DNS TTL 63859279-25B9-409C-A268-0CB7178CFDD0 DHCP Lease 63859279-25B9-409C-A268-0CB7178CFDD0 DNS over HTTPS 63859279-25B9-409C-A268-0CB7178CFDD0 Domain Generation Algorithms (DGA) 63859279-25B9-409C-A268-0CB7178CFDD0 F FQDN 63859279-25B9-409C-A268-0CB7178CFDD0 G GSLB 63859279-25B9-409C-A268-0CB7178CFDD0 I Infrastructure as Code 63859279-25B9-409C-A268-0CB7178CFDD0 IaC 63859279-25B9-409C-A268-0CB7178CFDD0 IPv6 63859279-25B9-409C-A268-0CB7178CFDD0 IPv4 63859279-25B9-409C-A268-0CB7178CFDD0 IPAM 63859279-25B9-409C-A268-0CB7178CFDD0 N Network Automation 63859279-25B9-409C-A268-0CB7178CFDD0 NetSecOps 63859279-25B9-409C-A268-0CB7178CFDD0 P Passive DNS 63859279-25B9-409C-A268-0CB7178CFDD0 R Recursive DNS 63859279-25B9-409C-A268-0CB7178CFDD0 Related Terminology 63859279-25B9-409C-A268-0CB7178CFDD0 S SDN 63859279-25B9-409C-A268-0CB7178CFDD0 SD-WAN 63859279-25B9-409C-A268-0CB7178CFDD0 SASE 63859279-25B9-409C-A268-0CB7178CFDD0 T Top-Level Domain 63859279-25B9-409C-A268-0CB7178CFDD0 Simplify & Secure Your Network When our goal is to help companies face the challenges of modern infrastructures and digital transformation, actions speak louder than words. Request A Demo