Final Exam Study Set

¡Supera tus tareas y exámenes ahora con Quizwiz!

emergency change

A change that must be introduced as soon as possible to repair an error in an IT service that has a high impact on the business.

software update

A change to software that you apply that corrects an existing problem or that introduces a feature.

Business Impact Analysis

A collection of information on a wide range of areas from recovery assumptions and critical business processes to interdependencies and critical staff that is then analysed to assess impact a disaster may have.

Hybrid Cloud

A combination of public and private clouds

PPP

A communications protocol that enables a workstation to connect to a server using a serial connection.

Open Ended Question

A complex question used to gather detailed information.

PAN(Personal Area Network)

A computer network used for communication among computer devices close to one person. Often uses Bluetooth.

DSCP (Differentiated Services)

A computer networking architecture that specifies a simple, scalable and coarse-grained mechanism for classifying and managing network traffic and providing quality of service (QoS) on modern IP networks.

Virus

A computer program designed to damage computer files.

Zero Client

A client computer that does not have an operating system and merely provides an interface between the user and the server.

NaaS

A cloud-based technology where organizations can offload their network infrastructure to a third-party.

Mission-critical

A computer system or application that is essential to the functioning of your business and its processes.

Incorrect Termination

A condition that occurs when the wires are not crimped in the correct order (Mismatched Standards/Crossovers).

DSLAM(Digital Subscriber Line Access Multiplexer)

A connectivity device located at a telecommunications carrier's office that aggregates multiple digital subscriber lines and connects them to a larger carrier or to the Internet backbone.

Heat Map

A diagram of signal strength in a Wi-Fi network.

E1

A digital carrier standard used in Europe that offers 30 channels and a maximum of 2.048 Mbps throughput.

E3

A digital carrier standard used in Europe that offers 480 channels and a maximum of 34.368-Mbps throughput.

T3

A digital carrier standard used in North America and most of Asia that provides 44.736 Mbps throughput and 672 channels for voice, data, video, or audio signals. Uses TDM over fiber.

DSL

A digital communication system designed to allow high speed data communication over existing telephone; network speed varies by provider

Incident

A disruption in service.

EMI/RFI

A disturbance generated by an external source that affects an electrical circuit by electromagnetic induction, electrostatic coupling, or conduction.

standard

A document that contains an agreed, repeatable way of doing something.

UPC(ultra physical contact)

A dome-shaped endface that aids in optimizing the connections between two jacketed fibers.

Electric Strike

A door unlocking device that is installed in the door jamb and that works in conjunction with a mechanical lock or latch mechanism. Requires power to be applied to unlock a door.

Application Firewall

A firewall that can control the traffic associated with specific services. Works all the way up to Layer 7 of the OSI model.

Dual-homed firewall

A firewall with two interfaces, one attached to the protected network and one attached to the unprotected network.

Network-based firewall

A firewall, generally hardware-based, that protects a network of computers as opposed to one computer.

LTE

A fourth-generation(4G) wireless broadband technology that was developed to allow GSM cellular technology to evolve to provide very high-speed Internet access.

PoE

802.3af. Provides power through the switch. Requires a special switch.

Sandboxing

: Isolating each guest OS from the others and restricting what resources they can access and what privileges they have.

Non-Persistent Agent

A "dissolvable" or portal-based agent. With this approach, a user clicks on a web link to download the agent, which authenticates the user and device, checks the endpoint for compliance, and allows access to the network if policy conditions are met. It then disappears until the user runs it again.

Network Access Control

A Cisco-sponsored industry initiative that uses the network infrastructure to enforce security policy compliance on all devices seeking to access network computing resources; thereby limiting damage from viruses and worms.

802.1x

A IEEE standard designed to enhance security of wireless networks by authenticating a user to a central authority.

RDP

A Microsoft protocol that allows a user to view and control the desktop of a remote computer. Uses TCP 3389.

Internet

A Packet Switching network.

Repeater

A Physical layer device that amplifies the signals it receives on one port and resends it on another port. Used to extend the distance of a network segment.

MPLS(Multi-Protocol Label Switching)

A QoS technique that replaces the IP datagram header with a label at the first router a data stream encounters.

CIDR /10

255.192.0.0

CIDR /21

255.255.248.0

Class C mask

255.255.255.0

CIDR /26

255.255.255.192

HTTPS

443

DNS

53

801.11g

54 Mb/s, 2.4 GHz, 1 MIMO stream, OFDM and DSSS modulation

# of hosts on Class B Network

65534

DHCP

67,68

TFTP

69

BPDU

A Spanning Tree Protocol initializing packet that is sent at definable intervals for the purpose of exchanging information among bridges/switches in networks.

TDR

A high-end instrument for testing the qualities of a cable. It works by issuing a signal on a cable and measuring the way in which the signal bounces back to the device. Copper.

Network Controllers

A highly available and scalable server role, and provides one application programming interface (API) that allows _____________ to communicate with the network, and a second API that allows you to communicate with ____________.

Peer to Peer

A network on which many of the computers function as both clients and servers. Lacks dedicated servers and server OS's.

Client/Server

A network that uses centrally administered computers, known as servers, to enable resource sharing for and to facilitate communication between the other computers on the network.

Physical Bus

A network topology in which a continuous length of cable connects one computer to another in daisy-chain fashion. There's no central interconnecting device.

Physical Star

A network topology that uses a central device, such as a hub or switch, to interconnect computers in a LAN. Each computer has a single length of cable going from its NIC to the central device. It's the most common physical topology in LANs.

Static NAT

A one to one mapping of an internal host to a public IP address.

Stakeholder

A person or group which has an interest in the process or result of a change initiative.

Call Center

A place where telephone calls are made or received in high volume for one or more customers.

Asset Disposal Plan

A plan that documents the timing of, and the costs associated with the disposal of assets.

Bottleneck

A point of congestion or blockage.

WAN Link

A point-to-point connection between two nodes on a WAN.

Trunk Port

A port on a switch configured to carry all data, regardless of VLAN number, between all switches in a LAN.

Access Control

A procedure to identify and/or admit personnel with proper security clearance and required access approval(s) to information or facilities using physical, electronic, and/or human controls.

Informal Site Survey

A site survey where the AP is deployed and tested using standard computer equipment.

Collision

A situation in which two or more packets are detected at the same time on an Ethernet network.

Key Fob

A small device containing a microchip used to generate unique passwords for logging on to a computer or a network.

patch server

A source of patches that can be used by your systems to perform patch analyses and from which they obtain the appropriate patches.

Jam signal

A special signal sent to all network nodes, alerting them that a data collision has occurred.

SONET

A standard in the US that defines a base date rate of 51.84 Mbps. Multiples of this rate are known as optical carrier (OC) levels, such as OC-3, OC-12, etc.

Web Services

A standardized way of integrating Web-based applications using the XML, SOAP, WSDL and UDDI open standards over an Internet protocol backbone.

q

Leave man page.

Firmware Updates

Like software, this is constantly being upgraded and remade by manufacturers in order to keep it up to date and compliant or add functionality.

Emergency Change Advisory Board (ECAB)

A sub-set of the Change Advisory Board who makes decisions about high impact Emergency Changes.

CCTV

A system of television cameras filming in shops and public places so that people can watch and protect those places.

Redundancy

A system of using multiple sources, devices or connections so that no single point of failure will completely stop the flow of information.

GRE

A tunneling protocol developed by Cisco Systems that can encapsulate a wide variety of network layer protocols inside virtual point-to-point links over an Internet Protocol network.

CAT1

A type of UTP Cabling that is rated for voice and not suitable for networking.

CAT3

A type of UTP Cabling that is rated up to 10 Mbps.

CAT2

A type of UTP Cabling that is rated up to 4 Mbps.

anomaly-based

Alerts the administrator or user, when anomalous traffic is detected. example: Suppose suddenly an exponential increase in TCP connection from 20 to 200.

CNAME

Alias. Name to A Record.

CSMA/CD

All Ethernet networks, independent of their speed or frame type, use this access method.

Network Address

All host bits set to 0(off)

Broadcast address

All host bits set to 1(on)

HIDS

An IDS used to monitor an individual server or workstation.

802.1x

An IEEE Standard for port-based Network Access Control.

IPSec

An IETF standard used to secure TCP/IP traffic. It can be implemented to provide integrity and confidentiality.

anycast

An IPv6 address assinged to more than one node.

Superscope

An administrative grouping of scopes that are used to support multiple, logical IP subnets on the same physical subnet. Superscopes contain a list of member scopes (or child scopes) that can be activated as a collection.

Log Managment

An approach to dealing with large volumes of computer-generated log messages (also known as audit records, audit trails, event-logs, etc.). Covers: log collection. centralized aggregation. long-term retention.

backup policy

An organization's procedures and rules for ensuring that adequate amounts and types of backups are made, including suitably frequent testing of the process for restoring the original production system from the backup copies.

Enterprise

An organizational unit, organization, or collection of organizations that share a set of common goals and collaborate to provide specific products or services to customers. A view of the entire network.

Rouge Access Point

An unauthorized access point to a wireless network.

patch

An update to software that corrects an existing problem or that introduces a feature.

live analysis

Analysis of a piece of digital media from within itself; often used to acquire data from RAM where this would be lost upon shutting down the device.

Network Management Software or Network Management System

Another term for SNMP manager software or hardware.

Crimper

Attaches connectors to cable

Social Engineering

Attacks that involve manipulating and tricking an individual into divulging confidential info to be used for fraudulent purposes.

Zero-day Attack

Attacks that take advantage of a newly discovered security hole before a patch is developed.

Something You Are

Authentication factor that relies on a physical characteristic (fingerprint, face, eye, palm)

Biometrics

Authentication technique using automated methods of recognizing a person based on a physiological or behavioral characteristic.

Contact

Avoid this with energized electrical circuits.

jewelry

Avoid wearing this when working with electricity.

Moisture

Avoid working with electricity an environments that have a high level of this.

Drop Cable

Connects node to drop.

ICMPv6

Diagnostics. Router discovery. Neighbor discovery.

SNMP OID (Object ID)

Consists of a series of numbers separated by decimal points. Each decimal point represents a leaf node in the tree structure of the MIB. Point to network objects stored in a database called the Management Information Base, often referred to as the "MIB".

Change Record

Contains all the details of a Change, documenting the lifecycle of a single Change.

Primary Server

Contains authoritative zone information.

CSMA/CA

Contention based media access. Avoids collisions by sending an "intent to transmit"

Incremental change

Continuous improvements made to the organization in an ongoing, adaptive manner. These are gradual changes to the current state.

IP Filter

Control access based on source/ destination IP address.

Micro-Segment

Creates a separate collision domain for every port.

Trouble Ticket:Terminate RJ-45 ends

Crimper

Noise

Data or interference that can trigger a false positive or obscure a true positive.

DOCIS

Data over Cable Service Interface Specification. The main link layer standard for transmitting data via a cable modem. Used by most vendors of HFC networks.

exhibit

Digital media seized for investigation.

Electrostatic discharge sensitive devices (ESDS)

Discrete device, integrated circuit or assembly that may be damaged by electrostatic fields or discharge encountered in routine handling, testing or transit.

Filter

Does not forwards the frame.

DHCP

Dynamic Addressing

Layer 2

DataLink

udp 67,68

Dynamic Host Configuration Protocol (DHCP)

49152 - 65535

Dynamic or Private Ports

Groundable point

Dedicated point which can be connected to EPA- ground.

ICMPv6 Informational Messages

Echo request. Echo Reply.

Ping

Echo. Layer 3 connectivity.

Security Awareness Training

Educates employees about corporate policies and procedures for working with information technology

Modem

Electronic equipment consisting of a device used to connect computers by a telephone line.

Issues with fiber splicing and termination

Fibers may be broken or cracked during cable jacket or buffer tube removal or fiber stripping. This may affect all fibers in the cable or buffer tube or just one fiber.

Plenum Cable

Fire resistant and non-toxic; it must be used when wiring above ceiling tiles. PVC cable cannot be used to wire above ceilings because it is toxic when burned. Rigid. Expensive.

Block,Allow,Log

Firewall rules.

Stateless Firewall

Firewall that does not check the content of the packet and does not validate the state of the connection. Packet Filter.

ATM Cell

Fixed length cell (frame) used to transmit data to reduce variability in transmission delay. 53 Bytes total w/ a 48 Byte payload.

<command> /?

Get command line help in Windows.

man <command>

Get help in Linux/Unix.

No Buffers Errors

Gives the number of received packets discarded because there was no space in the main system. Compare this with the ignored count. Broadcast storms on Ethernet networks and bursts of noise on serial lines are often responsible for these events.

Server Options

Global Options that are given to all clients unless over-ridden.

Honeynet

Group of systems/networks created to lure learn from unautorized intruders.

PKI

Group of technologies used to request, create, manage, store, distribute, and revoke digital certificates.

AH (Authentication Header)

Guarantees connectionless integrity and data origin authentication of IP packets. Further, it can optionally protect against replay attacks by using the sliding window technique and discarding old packets.

Site policy

Guidelines within an organization that control the rules and configurations of an IDS.

Omnidirectional antenna

Has a non-directional pattern (circular pattern) in a given plane with a directional pattern in any orthogonal plane.

HVAC

Heating, Ventilation, Air Conditioning.

Hash

Hexadecimal number generated from a string of text such that, no two different strings can produce the same.

IEEE 802.11a-ht/802.11g-ht

High Throughput wireless.

CAM Table

Holds all the MAC-addresses-to-port mappings on a switch. May be referred to as a MAC Address Table.

Wavelength

Horizontal distance between the crests or between the troughs of two adjacent waves. Fiber and analog.

HSRP

Hot Standby Routing Protocol (Cisco)

Ferrule

Housing, alignment, and mating sleeve of fiber end.

Accessibility

How easily the service desk can be reached by service desk staff, other employees of the company, and customers.

tcp 80

Hyper Text Transport Protocol (HTTP)

Rapid Spanning Tree

IEEE 802.1W. Supports fast convergence. Works using Hello times. Hellos are sent out every two seconds by default, and can respond to changes within three hello times. This allows for convergence due to a network change in six seconds.

802.1q

IEEE standard that specifies how VLAN and trunking information appear in frames and how switches and bridges interpret that information. Frames are tagged with VLAN information.

Virtual IP

IP addresses that can float between two or more physical network nodes. These IP addresses are used to provide redundancy for attached servers and VIPs.

ICMP

IP helper protocol, includes echo and echo reply

ARP

IP to MAC resolution

Issues with fiber install

Improper pulling techniques (such as not pulling the fiber cable by the strength member,) excess tension, tight bends under tension, kinking or even too many bends.

Community

In SNMP, a logical group of managed devices and NMSs in the same administrative domain.

Host operating system

In a hosted virtualization solution, the OS that the hypervisor runs on top of.

IGMP

Multicast group managment

Trouble Ticket: Measure voltage of outlet

Multimeter

netstat

Network statistics.

MAN

Network that interconnects users with computer resources in a geographic area or region larger than that covered by even a large local area network (LAN) but smaller than the area covered by a wide area network (WAN).

NIPS

Network-based. An IPS that monitors the network. An IPS can actively monitor data streams, detect malicious content, and stop attacks in progress.

NIDS

Network-based. IDS used to monitor a network. It can detect network-based attacks, such as smurf attacks. A NIDS cannot monitor encrypted traffic, and cannot monitor traffic on individual hosts.

DIAMETER

New version of RADIUS.

Broadcast

No longer supported by IPv6.

4

Number of allowed MIMO streams with 802.11n.

Link Status 1 (On)

OK to send packets.

Everyone

People in the organization that require security awareness training.

Layer 1

Physical

LAN(Local Area Network)

Private. Single location. High speed.

Error Prone, Time Consuming

Problems with static addressing

RFC 1817

RFC that recommended VLSM.

Directional antenna

Radiates its energy more effectively in one (or some) direction than others.

Secondary Server

Receives updates from the Primary Server.

eDiscovery

Refers to discovery in litigation or government investigations which deals with the exchange of information in electronic format (often referred to as electronically stored information or ESI).[1] These data are subject to local rules and agreed-upon processes, and are often reviewed for privilege and relevance before being turned over to opposing counsel.

Class D addresses

Reserved for multicast

Key Distribution Center (KDC)

Resides entirely on a single physical server (it often coincides with a single process) and can be logically considered divided into three parts: Database, Authentication Server (AS) and Ticket Granting Server (TGS).

IRP (Incident Response Policy)

Security policy that determines the actions that an organization will take following a confirmed or potential security breach.

Layer 4 PDU

Segment

Forward

Sends the frame to a port.

Flood

Sends the frame to all ports.

Layer 5

Session

SPB (Shortest Path Bridging)

Specified in the IEEE 802.1aq standard, is a computer networking technology intended to simplify the creation and configuration of networks, while enabling multipath routing.

FFFE

Stuffed in the middle of a MAC address to make an EUI-64 address.

tcp 23

Telnet

workaround

Temporarily circumventing or minimizing the impact of an incident.

First Hop Last Hop Protocols

Term used to describe the protocols used to connect to the providers network.

Off-boarding

The IAM processes surrounding the removal of an identity for an employee who has left the organization. The term may also be used to describe the restriction of certain access rights when an employee has changed roles within the organization.

WiMax

The IEEE designation is 802.16, and it has a range of 31 miles with bandwidth capabilities up to 70Mbps.

Network Baseline

The act of measuring and rating the performance of a network in real-time situations. Providing this requires testing and reporting of the physical connectivity, normal network utilization, protocol usage, peak network utilization, and average throughput of the network usage.

Baseline

The act of measuring and rating the performance of a network in real-time situations. This requires testing and reporting of the physical connectivity, normal network utilization, protocol usage, peak network utilization, and average throughput of the network usage.

Verify

The action we take on the implementation of the solution.

DNS Spoofing

The basic purpose of spoofing is to confuse a DNS server into giving out bad information.

Route Redistribution

Take a route from one routing protocol and inject it or distribute it into another protocol.

Agent

The code that authenticates the user and their device, and allows network access based on policies you define.

Patch Panel

The common cross connect method used inside an equipment room. Typical Patch Panels utilize 110 or Krone connectors (on the rear) to connect to the horizontal cabling and modular jacks on the front to connect to equipment via patch cords.

Access Point(AP)

The computer or network device that serves as an interface between wireless- equipped computers and the rest of the network.

Cross Connect

The connection method used between permanent cabling (inside the walls) and equipment. A patch cord is often used as the connection means.

Link Status

The current state of an interface.

PUBLIC

The default Community String in SMTP.

Detection Rate

The detection rate is defined as the number of intrusion instances detected by the system(True Positive) divided by the total number of intrusion instances present in the test set.

customer entitlement

The determination of whether the customer is authorized to receive support and, if so, the level of support the customer should receive.

Recovery Time Objective (RTO)

The duration of time and service level within which a business process must be restored after a disruption in order to avoid unacceptable losses. Begins when a disaster hits and does not end until all systems are up and running.

IS-IS

Link State protocol. Not as popular as OSPF.

traceroute

Linux tool for viewing the path the packet takes.

ifconfig

Linux/Unix address information

netstat -i

Linux/Unix command to view interface statistics.

dig

Linux/Unix tool for getting information from name servers(DNS).

ARP Cache Poisoning

Local attacks involving sending spoofed ARP responses on a LAN to the victim and/or gateway.

Console Port

Local interface used for terminal access.

Switch Console

Local, command-line access through a terminal emulation program. (Out-of-band management)

VLAN

Logical division of the network at Layer 2.

LR

Long Reach

Layer 2 Sublayer

MAC

Guest tools

Mechanisms within hosted virtualization solutions that allow a guest OS to access files, directories, the copy/paste buffer, and other resources on the host OS or another guest OS.

MS-CHAP

Microsoft's dominant variation of the CHAP protocol; it uses a slightly more advanced encryption protocol.

Behavior Based

Monitors for certain actions or conditions.

Signature Base

Monitors using pre-defined definitions/patterns. Like AV software.

Tailgating

More than one individual entering a secure area using one access card.

Discover

The first part of the DHCP process.

Identify the problem

The first step in the Troubleshooting Methodology

Acknowledge

The fourth part of the DHCP process.

Bluesnarfing

The gaining of unauthorized access through a Bluetooth connection.

Scope

The network ID.

Penetration Testing

The practice of testing a computer system, network or Web application to find vulnerabilities that an attacker could exploit.

Roaming

The process of a client moving an established Wi-Fi network association from one access point to another access point within the same Extended Service Set (ESS) without losing connection.

acquisition/imaging

The process of creating a duplicate copy of digital media for the purposes of examining it.

triage

The process of determining a customer's need and routing him or her to the appropriate support group.

Site Survey

The process of planning and designing a wireless network, to provide a wireless solution that will deliver the required wireless coverage, data rates, network capacity, roaming capability and Quality of Service (QoS).

Disaster Recovery

The process of restoring and maintaining the data, equipment, applications and other technical resources on which a business depends.

Forwarding

The process of sending a recursive query sent from a host to a resolver, to a second predetermined resolver.

Certification

The process of testing a biometric system to ensure that it meets certain performance criteria.

soft skills

The qualities that people need to deliver great service, such as active listening skills, verbal skills, customer service skills, problem-solving skills, temperament, teamwork skills, and writing skills.

CIR

The rate at which a Frame Relay network agrees to transfer information under normal conditions, averaged over a minimum increment of time.

Baud Rate

The rate at which signals on a wire may change.

Gain

The ratio of the power gain in a given direction to the power gain of a reference antenna in the same direction.

Logging

The recording of user requests made to the firewall.

Bounce

The reflection of a signal off objects like mirrors, windows, metal objects. Reduces range and performance.

Storage

The retention of encoded information over time.

iptables

The tables provided by the Linux kernel firewall and the chains and rules it stores.

De-encapsulation

The technique used by layered protocols in which a layer removes header information from the Protocol Data Unit (PDU) from the layer below.

Request

The third part of the DCHP process.

1,6,11

The three non-overlapping channels in the 2.4 GHz range.

Logical Bus

This topology is where all data transmissions are sent simultaneously to all nodes on the media.

NTP

Time Sync, udp 123

Event Viewer

Tool use to view Windows logs.

Interface Monitoring

Tools used to determine performance and health of the network.

System Log

Tracking file that logs events that are related to Windows Server 2003 operating system.

netflow, ntop

Traffic analyzers.

Voice VLAN

Transports digitized voice calls and signaling information, usually given a higher priority than data VLANs due to time-sensitivity of voice data.

udp 69

Trivial File Transfer Prorocol (TFTP)

Forward Chaining

Troubleshooting a problem from the source.

Host-to-Host VPN

Tunnel encrypted traffic from one host to another.

L2TP

Tunneling protocol used with VPNs. Commonly used with IPsec. Uses port 1701.

Buffer Overflow

Unchecked data which spills into another location in memory.

One to One transmission

Unicast

TELNET,HTTP,SLIP,FTP,TFTP,SNMPv1,SNMPv2

Unsecured protocols.

Driver Update

Updated device drivers for installed hardware.

Dynamic DNS

Updates DNS information automatically.

MDI-X Port

Used on Hub/Switch

MDI Port

Used on end node.

SNMP

Used to configure and monitor network resources.

DCS (Distributed Control System)

Used to control industrial processes such as electric power generation, oil and gas refineries, water and wastewater treatment, and chemical, food, and automotive production.

Routing Metric

Used to determine which route is the best route for a given network.

TLS (Transport Layer Security)

Used to encrypt traffic on the wire. Replacement for SSL and like SSL, it uses certificates.

TLS

Used to secure web protocols

PVC Cable

Used to surround twisted pair cabling. Gives of poisonous gases when it burns. Not formed tightly to the conductors it contains. Fire can travel within. Flexible. Inexpensive.

Throughput tester

Used to test the bandwidth and quality of a connection.

"::" Double Colon

Used to truncate an IPv6 address. Can only be used once.

Exploitation Tools

Used to verify that an actual vulnerability exists by exploiting it

digital media

Used within the fields to refer to the physical medium (such as a hard drive) or data storage device.

Reservations

Uses MAC address to allocate a specific address to a specific client.

Baseband

Uses a single fixed frequency to a send a signal that occupies the cable's entire carrying capacity.

Fiber Channel

Uses a switching fabric to connect storage LUNs to hosts

CHAP

Uses challenges and hash to autheticate.

Infrastructure Mode

Uses one or more concentrators(WAPs).

Three-factor Authentication

Using three different methods to authenticate a user.

Stateful Autoconfiguration

Via a DHCP server.

Stateless Autoconfiguration

Via neighbor discovery and router advertisements.

VRRP

Virtual Router Redundancy Protocol (IETF)

Graphing

Visual display of information or data.

SIP

VoIP connection

UC Device

VoIP phone

RTP

VoIP transport

HTTP

WWW, tcp port 80

TKIP

Was a stopgap security protocol used in the IEEE 802.11 wireless networking standard.

nonskid shoes

Wear these when you are lifting often or lifting potentially heavy objects.

Brute Force

With enough computing power trying all possible combinations.

Top-to-Bottom

Working through the OSI model from Application to Physical

Bottom-to-Top

Working through the OSI model from Physical to Application

MultiLayer Switch

Works at Layer 2 and 3

disk cloning

the process of copying the contents of one computer hard disk to another disk or to an image file for later recovery.

VLSM CIDR mask for 10 host network

/28

VLSM CIDR mask for 2 host network

/30

ACL

A set of rules that control traffic.

Exclusions

Addresses within a Pool/Scope that cannot be leased to clients.

Florescent Light Ballast

Source of EMI.

pathping

Windows command for running diagnostics on a connection.

netstat -e

Windows command to view interface statistics.

route print

Windows command to view the routing table.

netsh

Windows network shell. Used to view and configure TCP/IP settings on the system.

ipconfig

Windows tool for viewing address information.

tracert

Windows tool for viewing the path the datagram takes.

nslookup

Windows/Linux/Unix tool for getting information from name servers(DNS).

WAP

Wireless concentrator.

Class A address range

1.0.0.0 - 126.0.0.0

16,777,214

# of hosts on Class A Network

65534

# of hosts on Class B Network

254

# of hosts on Class C Network

10GBaseLR

10 Gb/s Ethernet over SMF. Max length 10 KM by spec (25 actual).

10GBaseER

10 Gb/s Ethernet over SMF. Max length 30 KM standard (40 engineered).

10GBaseT

10 Gb/s Ethernet over twisted pair. Max length 100 Meters

Class A Private Range

10.0.0.0/8

Interface Speed Setting

10/100/1000/auto

100BaseT

100 Mb/s Ethernet over twisted pair. Max length 100 Meters

1000BaseT

1000 Mb/s Ethernet over twisted pair. Max length 100 Meters

Class A mask

255.0.0.0

Abandoned Call

A call where the caller hangs up before an analyst answers.

VLSM CIDR mask for 16 host network

/27

CAT5e

*Gigabit Ethernet *Max speed: 350 Mbps (up to 1 Gbps)

VLSM CIDR mask for 1500 host network

/21

VLSM CIDR mask for 255 host network

/23

VLSM CIDR mask for 500 host network

/23

VLSM CIDR mask for 200 host network

/24

VLSM CIDR mask for 100 host network

/25

802.11b

11 Mb/s, 2.4 GHz, 1 MIMO stream, DSSS Modulation

POP3

110

MAC Address

12 digit Hexadecimal Layer 2 Address. First 6 digits are vendor ID.

NTP

123

loopback

127.0.0.1

Class B address range

128.0.0.0 - 191.255.255.255

IMAP

143

802.11n

150 Mb/s, 2.4/5 GHz, 4 MIMO streams, OFDM modulation

Management VLAN

A VLAN defined by the switch administrator as a means of accessing the management capabilities of a switch.

portal

A Web "supersite" that provides a variety of services such as a site search to locate pertinent articles and white papers, a product and services buyer's guide, a discussion or message board, event calendars, and publications.

incremental backup

A backup that only contains the files that have changed since the most recent backup (either full or incremental).

Legal Hold

A court order that suspends the processing of destruction or paper/electronic records. AKA preservation order, preservation notice, or litigation hold

differential backup

A cumulative backup of all changes made since the last full backup.

Electrical Hazard

A dangerous condition caused by equipment failure or contact with an energized conductor or circuit part. Hazards include shock, Arc-Fl ash, burns and arc-blast.

Management Information Base (MIB)

A data structure that describes SNMP network elements as a list of data objects.

Reference Test Cable

A known good cable used for diagnostics.

Dynamic Route

A learned route.

True Positive

A legitimate attack which triggers an IDS to produce an alarm.

T1

A level of service offered by the telephone companies over a T-carrier circuit that provides full-duplex transmissions at 1.544 Mbps, carrying digital voice, data, or video signals.

Best Practice

A proven way of completing a task to produce a near optimum result.

Brainstorming

A technique performed by a group of people and designed to generate a large number of ideas for solving a problem.

five whys

A technique that involves repeatedly asking the question "Why?" until the root cause of a problem is determined.

SNMP Object

A variable, a data structure, or a function, and as such, is a location in memory having a value and possibly referenced by an identifier.

Guest operating system

A virtual machine that runs an instance of an OS and its applications.

Physical Ring

All nodes are connected to one another in the shape of a ring or closed loop.

Physical Mesh

All nodes connected to one another.

FF02::1

All-nodes multicast address.

iptables

Allow a system administrator to alter the Linux kernel firewall. They can create rules determining whether a packet is dropped or accepted. Filters incoming, outgoing, and forwarding traffic.

digital signature

An electronic signature that can be used to ensure that a document has not been modified since the signature was applied.

Transmitter

An electronic unit that converts an electrical/binary signal to an optical signal using LEDs or lasers.

incident owner

An employee of the support organization who acts as a customer advocate and proactively ensures that a incident is resolved to the customer's satisfaction.

UPS

Battery backup that provides limited capabilities during power loss(minutes).

EIGRP

Cisco Advanced Distance Vector Protocol

Public Cloud

Cloud services that exist on the Internet offered to anyone and any business.

CDMA

Code Division Multiple Access. Assigns a unique code to each voice call or data transmission to uniquely identify it from all other transmissions sent over cell network. "spread spectrum" network, calls are spread throughout the entire RF band.

Protocol Analyzer

Collect real-time network traffic information.

CSMA/CA

Collision Avoidance. WiFi.

CSMA/CD

Collision Detection. Ethernet. Contention based.

Layer 7 PDU

Data

route del 10.0.0.0 mask 255.0.0.0 192.168.1.1

Delete a route.

Denial of Service (DOS)

Denies, degrades, or disrupts normal functionality of a system or network.

T, TX

Denotes twisted pair.

iSCSI

Ethernet-based shared storage protocol.

Layer 2 PDU

Frame

2000::/3

IPv6 Global (IANA) address.

ping -6

IPv6 ICMP echo request

FE80::/10

IPv6 Link Local address.

::1

IPv6 Loopback.

::

IPv6 Unspecified address. Used in source field of DHCP request datagram.

Network Closet

In each building or on each floor is a gathering place for wiring.

Multiplexing

In telecommunications, a technique that combines multiple messages or signals onto a single transmission channel.

Site Survey

In the context of wireless networking, an assessment of client requirements, facility characteristics, and coverage areas to determine an access point arrangement that will ensure reliable wireless connectivity within a given area.

Interface Errors

Includes runts, giants, no buffer, CRC, frame, overrun, and ignored counts.

tcp 143

Internet Message Access Protocol (IMAP)

Dialup

Internet access that connects using a telephone line and a MODEM.

Virtual PBX

Internet based PBX systems that enable organizations to outsource their PBX services (private branch exchange).

Physical

Layer 1

Hub

Layer 1 Device

NIC

Layer 1 Interface

/var/log/messages

Main Linux log file.

Application, Security, System

Main Windows logs.

Partitioning

Managing guest operating system access to hardware so that each guest OS can access its own resources but cannot encroach on the other guest OSs' resources or any resources not allocated for virtualization use.

Static

Manual Addressing.

b/s

Measure of network bandwidth.

B/s

Measure of storage throughput.

Access Control Mechanisms

Measures or procedures designed to prevent unauthorized access to protected information or facilities.

MUX

Multiplexer. Physical device.

Default Gateway

Must be configured on the switch if you will be managing it from remote networks.

DNS

Name Resolution, udp 53

A Record

Name to IP

AAAA Record

Name to IP(IPv6)

Change fatigue

Neither an acceptance nor rejection of change, but is the state of being overwhelmed and exhausted by the amount of change going on and unable to absorb any more.

Broadcast

One to All transmission

OCx

Optical carrier levels; defines the transmission speeds used in SONET/SDH.

Class Options

Options that are given to a group of specific clients in a specific pool. Can over-ride scope options.

Reservation Options

Options that are given to a specific client in a specific pool. Can over-ride vendor options.

Scope Options

Options that are given to all clients in a specific pool. Can over-ride server options.

Layer 3 PDU

Packet,Datagram

1 and 3,2 and 6

Pins that are crossed in a crossover cable.

Packet Sniffing

Process used by hackers to intercept data packets and analyze their content looking for information.

insulated soles

Proper footwear when working with electricity.

udp 161

Simple Network Management Protocol (SNMP)

SMF

Single Mode Fiber

Drop

Slang term used for each cabling span pulled from a telecommunications closet.

Snips

Small pair of scissors that you use to snip off cable ends.

Static shielding bags

These bags have a multi-layer design to provide a Faraday Cage effect, which blocks out external static electric fields. The inner layer is a static dissipative polyethylene surrounded by a layer of aluminum shielding. The next layer is made of polyester, with an outer layer made of a static dissipative coating. Protect components from static charges both inside and outside of the bag.

Anti-static bags

These bags prevent static build-up on the bag by dissipating static charges. Blue and pink are the industry's standard colors used to distinguish these bags.

Logs

These need to be monitored on all critical devices.

Newton's First Law of Motion

Things in motion continue to move in the same direction unless some effort is exerted upon them.

Serial Number Field

Third Field in an SOA record. Used by a secondary server to determine if it requires a zone transfer from the primary server. If the Secondary's Number is lower than the Primary's, then the secondary server knows that its records are out of date.

As-is state

This is the current situation in the organization.

0 - 1023

Well Known or System Ports

Collision

When 2 devices attempt to use the media at the same time this occurs.

False Rejection

When a biometric system fails to identify an enrollee or fails to verify the legitimate claimed identity of an enrollee.

Bluetooth

You want to use a wireless keyboard and mouse with your laptop computer. Which method should you choose?

SMTP

email, Server to Server and sending, tcp 25

POP3

email, downloads inbox, tcp 110

MAN(Metropolitan Area Network)

large computer networks usually spanning a city. They typically use wireless infrastructure or Optical fiber connections to link their sites.

127.0.0.1

loopback

RDP

3389

STP

4 Pair copper wire wire a foil sheath around it to resist EMI.

UTP

4 Pair copper wire. The most common type of cable used in bound LANs.

802.11a

54 Mb/s, 5 GHz, 1 MIMO stream, OFDM modulation

10GBaseSR

10 Gb/s Ethernet over MMF. Max length 400 meters.

10BaseT

10 Mb/s Ethernet over twisted pair. Max length 100 Meters

100BaseFX

100 Mb/s Ethernet over MMF. Max length 2000 meters.

SHA

A family of cryptographic hash functions published by the National Institute of Standards and Technology (NIST) as a U.S. Federal Information Processing Standard (FIPS)

Botnet

A group of compromised computers connected to a network such as the Internet that are used as part of a network that attacks other networks, usually for nefarious purposes.

Change Advisory Board (CAB)

A group of people that advises the Change Manager in the assessment, prioritization and scheduling of Changes.

Autonomous System

A group of routers under a single authority.

Asset Class

A grouping of assets of a similar nature and use.

Broadcast Domain

A logical network composed of all the computers and networking devices that can be reached by sending a frame to the data link layer broadcast address.

Formal Site Survey

A site survey where specialized equipment is used to determine optimal AP placement.

Collision

A situation in which two or more frames are detected at the same time on an Ethernet network.

Far-end Crosstalk

A measure of the unwanted signal coupling from a transmitter at the near-end into a neighboring pair measured at the far-end.

Multimeter

A measuring instrument for current, voltage, and resistance.

Packet Switching

A method of transmitting data in which messages are separated into packets that travel along the network separately, and then are reassembled in the proper order at the destination.

WAN

A telecommunications network or computer network that extends over a large geographical distance and is often established with leased telecommunication circuits.

Manager

A top-level master system (hardware or software) serving as the human interface to the network.

Hybrid Topology

A topology comprised of several topologies and combined into one network.

HTTP

80

Top Level Domain

Any zone owned by the root servers. You can also think of this as the first label in any domain name other than root.

Interference

Anything that gets in the way of clear communication.

Layer 7

Application

Something You Know

Authentication factor that relies on a piece of knowledge (password, PIN).

Something You Have

Authentication factor that relies on possession (FOB, Card, Cell Phone, Key)

SSO (Single Sign ON)

Authentication method where users can access multiple resources on a network using a single account.

Problems with NAT

Breaks End-to-End model. Inhibits End-to-End security. Some apps not friendly. Merging private networks.

Layer 2 Device

Bridge

All host bits set to 1(on)

Broadcast

One to All transmission

Broadcast

7 Days

Cisco default preferred lifetime (RAP).

30 Days

Cisco default valid lifetime (RAP).

VTP

Cisco proprietary Layer 2 protocol that enables a network manager to configure a single switch so that it propagates VLAN configuration information to other switches in the network.

ICA

Citrix remote presentation protocol. Uses TCP 1494.

10.0.0.0/8

Class A Private Range

1.0.0.0 - 126.0.0.0

Class A address range

255.0.0.0

Class A mask

172.16.0.0/12

Class B Private Range

128.0.0.0 - 191.255.255.255

Class B address range

255.255.0.0

Class B mask

192.0.0.0 - 223.255.255.255

Class C Address Range

192.168.0.0/16

Class C Private Range

255.255.255.0

Class C mask

224.0.0.0 - 239.255.255.255

Class D address range

Reserved for multicast

Class D addresses

240.0.0.0 - 255.255.255.255

Class E address range

Telnet

Clear text remote, tcp 23

FTP

Clear text, tcp 21,20, used to copy files

clear

Clear the screen in Linux.

cls

Clear the screen in Windows.

PAP

Cleartext authentication.

0.0.0.0

Client address before it has an address.

Operating system virtualization

A virtual implementation of the OS interface that can be used to run applications written for the same OS.

Application virtusalization

A virtual implementation of the application programming interface (API) that a running application expects to use.

Loopback

A virtual interface configured on the router, utilized for maintenance/management functions.

VLAN Interface

A virtual interface on a switch that we can assign a IP address to for remote management.

Disk image

A virtual representation of a real disk drive.

Hub and Spoke

A wan topology in which various branch offices are connected through a centralized hub or headquarters.

Change curve

A way of understanding and visually representing the level of an individual's confidence, morale and roll competence through a period of change. From its starting level, for most people it rises slightly, dips, rises again and levels out.

MSDS

A widely used abbreviation for Material Safety Data Sheet. A MSDS contains details of the hazards associated with a chemical, and gives information on its safe use.

MD5

A widely used cryptographic hash function producing a 128-bit (16-byte) hash value, typically expressed in text format as a 32 digit hexadecimal number.

169.254.x.x

APIPA address

Jumbo Frame

Allows for an MTU as high as 9198 bytes.​

Implicit Deny

An access control principle that maintains that if a condition is not explicitly met, it is to be rejected. Default for most firewalls.

Keyless Access Control

An access control system that controls access using something other than a key and a lock.

DDOS

An attack that uses hundreds or thousands of zombie computers in a botnet to flood a device with requests.

Duplicate Problem

An attempt to recreate the original incident that caused the service disruption.

VLAN hopping

An exploit that allows an attacker on a VLAN to gain access to traffic on other VLANs that would normally not be accessible.

Endpoint Device

Any machine that attempts to connect to or use the resources of a network. Also referred to as a host.

Out-of-band Management

Allows management outside of normal communications channels (not using network resources).

NAT

Allows private hosts to use a routable address.

Site-to-Site VPN

Allows remote site to securely communicate over public medium.

Network Segmentation

Allows you to control which systems can communicate with one another on the network. You can use VLANs and IP subnets to create this.

VoIP

Allows you to make voice calls over a computer network.

Runt Errors

Almost always caused by collisions. Any Ethernet packet that is less than 64 bytes.

computational forensics

Digital forensics with the use of artificial intelligence.

Presence

Open and extensible platform facilitates the highly secure exchange of ________ and instant messaging (IM) information between Cisco Unified Communications and other applications.

Bonding

Grouping two or more interfaces on a device for the purpose of them behaving as one interface. Provides increased bandwidth and redundancy.

128

IPv6 address bit length.

tracert -6

IPv6 path information.

Router Advertisement Data

Options. Prefix. Lifetime. Auto-configuration flag.

120 meters

Outdoor range 802.11a unlicensed.

140 meters

Outdoor range of 802.11b and g.

250 meters

Outdoor range of 802.11n.

5000 meters

Outdoor range of licensed 802.11a.

special handling

Patches with properties that indicate they must be installed in single-user mode. Also, patches that require you to restart the system after the patch has been applied are referred to as having special handling requirements.

Router

Layer 3 Device

Packet,Datagram,Routing

Layer 3 Keyword

Packet

Layer 3 PDU. Also called a Datagram

Transport

Layer 4

Reliability, Segment

Layer 4 Keyword

Session

Layer 5

Connection

Layer 5 Keyword

Presentation

Layer 6

Format

Layer 6 Keyword

Encyrption

Layer 6 Process(May be Layer 3 -ie: IPSec)

jpeg

Layer 6 example

Application

Layer 7

Service, User

Layer 7 Keyword

optional

Leading Zeros in an IPv6 address.

Persistent Agent

Lives on the end station, where it performs authentication and compliance checking before allowing network access.

Transport Mode

Only the payload of the IP packet is usually encrypted and/or authenticated.

Point to Point

Only two nodes on the network, commonly used to interconnect networks.

non-conducting handles

Only use only tools and equipment with these handles when working on electrical devices.

RIP

Open Distance Vector Protocol

OSPF

Open Link State Protocol

UDP

Connection-less, Unacknowledged

Wireless Bridge

Connects 2 segments at Layer 2.

CAN(Campus Area Network)

Connects LANs across a business campus. Owned and maintained by the business.

CSMA/CD

Contention based media access. Reacts to collisions by sending a jam signal.

Cable Certifier

Determines the precise performance of a cable, and then records it in graphical form for the customer records

Smoke Detector

Device that alerts people when there is smoke in the air.

Ad-hoc Mode

Device to Device connection.

Host Firewall

Software installed on a host and used to protect the host from network-based attacks.

host-based firewall

Software running on a single host that can restrict incoming and outgoing network activity for that host only.

Ticking System

Software to track incidents.

Crossover Cable

Special UTP cable used to connect hubs or to connect network cards without a hub. Cross- over cables reverse the sending and receiving wire pairs from one end to the other. Like device to Like Device connections.

Virtual Server

Technology that enables multiple operating systems to run concurrently on a single machine.

customer satisfaction

The difference between how a customer perceives he or she was treated and how the customer expects to be treated.

metrics

Performance measures.

Caching only Server

Performance only. Contains no zone information.

Lease

The duration the client is allocated the address.

Tunnel Mode

The entire original IP packet is encapsulated with a new packet header added.

Rollback Process

Predefined procedures for backing out of a change.

Layer 6

Presentation

SSID disable

Prevents dynamic discovery of Wifi network.

DHCP Snooping

Prevents rogue DHCP servers from impacting the network.

LACP

Protocol used with etherchannel/port bonding.

Private Cloud

Serves only one customer or organization and can be located on the customer's premises or off the customer's premises.

tcp 25

Simple Mail Transport Protocol(SMTP)

Posture Assessment

The evaluation of system security based on the applications and settings that a particular system is using.

Capture

The method of taking a biometric sample from the end user.

level two

The person or group that resolves incidents that are beyond the scope or authority (such as system access rights or permissions) of level one.

Demarc

The point at which one area of work, responsibility etc ends and another begins. Where the telco hardware intersects with the organization's.

Recovery Point Objective (RPO)

The point in time to which a firm must recover data as defined by the organisation. What an organisation determines is an "acceptable loss" in a disaster situation.

Enrollment Time

The time period a person must spend to have his/her biometric reference template successfully created.

Punch Down Tool

The tool used to install twisted pair cabling into patch panels and wiring closets. It forces the wire down into the insulation displacement connector.

Class C

The type of fire extinguisher used for electrical fires.

Determine if anything has changed

This is the most common root cause of incidents.

Man in the Middle

This type of network attack is when the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker.

Escalation

To raise an incident from one level to another, such as from level one to level two, to dedicate new or additional resources to the incident.

Electrostatic discharge (ESD)

Transfer of charge between bodies at different electrostatic potentials caused by direct contact or induced by electrostatic field.

Broadcast

Transmission type used by DHCP.

Layer 4

Transport

PPTP

Tunneling protocol used with VPNs. Uses TCP port 1723.

Administrative Distance (AD)

Used by routers when you have multiple sources of information about remote networks. They help routers determine which source is more trustworthy, and thus which routing protocol or source will actually populate the routing table.

Circuit Switching

Used by the public switched telephone network to send data over a physical end-to-end circuit.

Autonomous System Number

Used by various routing protocols. IANA allocates AS Numbers to Regional Internet Registries (RIRs). The RIRs further allocate or assign AS Numbers to network operators in line with RIR policies.

Lame Delegation

When an NS record points to an incorrect host.

False Negative

When no alarm is raised when an attack has taken place.

False Acceptance

When a biometric system incorrectly identifies an individual or incorrectly verifies an impostor against a claimed identity.

FTP Bounce

When a client running an FTP utility requests data from an FTP server, it specifies an IP address and port number that is not their own.

Virtual Desktop

When a firm runs an instance of a PC's software on another machine and simply delivers the image of what's executing to the remote device. Using virtualization, a single server can run dozens of PC's, simplifying backup, upgrade, security, and administration.

After Testing

When patches should be applied.

Fail Open

When the control fails, access be allowed.

Fail Close

When the control fails, access will be blocked.

Equal Error Rate

When the decision threshold of a system is set so that the proportion of false rejections will be approximately equal to the proportion of false acceptances.

Active Listening

When the listener participates in a conversation and gives the speaker a sense of confidence that he or she is being heard.

Fully Qualified Domain Name (FQDN)

A domain name that extends all the way back to root.

image

A duplicate copy of some digital media created as part of the forensic process.

Link State

A dynamic routing protocol algorithm that collects a list of all routers and their directly connected networks to build a map of the routing topology.

Distance Vector

A dynamic routing protocol algorithm that uses second hand information to build the routing table. Sometimes refered to as "routing by rumor."

Bastion Host

A strongly protected computer that is in a network protected by a firewall (or is part of a firewall) and is the only host (or one of only a few hosts) in the network that can be directly accessed from networks on the other side of the firewall.

Attacker or Intruder

An entity who tries to find a way to gain unauthorized access to information, inflict harm or engage in other malicious activities.

Near End Cross-talk

An error condition that can occur when connectors are attached to twisted pair cabling. Usually caused by crossed or crushed wire pairs. The error condition does not require that the wires be crushed so much that the conductors inside become exposed.

Speed/Duplex Mismatch

An error state that occurs when autonegotiation fails or ports on either end are configured differently.

False Positive

An event signaling an IDS to produce an alarm when no attack has taken place.

True Negative

An event when no attack has taken place and no detection is made.

Evil Twin

An exploit in which a rogue access point masquerades as a legitimate access point, using the same SSID and potentially other identical settings.

Electrostatic discharge shielding material

Barrier or enclosure that limits the passage of current and attenuates the energy resulting from an electrostatic discharge.

Cleaning

Before any testing, connectors should be cleaned carefully to ensure that no dirt is present on the end face of the connector ferrule as this will cause high loss and reflectance

Reconnaissance Tools

Begins with searches of internet databases including DNS registries,WHOIS databases, Google, on-line news sources, business postings, and many other on-line resources. This phase often includes print media as well, specifically electronically searchable archives that would be found at a college library or large public library

DTE(Data Terminal Equipment)

Can be a router, computer, or some other type of terminal; in all cases, it is a device at the user end of the network.

No Link Light

Can be caused by a fault in cable, port, NIC, or switch. Can also be caused by the Interface being disabled in the OS or BIOS.

Conduit

Circular raceway that cable is run inside. Conduit requirements are specified under appropriate electrical code.

CPU, Memory

Commonly monitored objects.

Unicast

Communication between a single sender and a single receiver over a network.

Half Duplex

Communication between two devices whereby transmission takes place in only one direction at a time.

Full Duplex

Communication that happens in two directions at the same time.

802.11b and 802.11g

Compatible technologies.

backup software

Computer software applications that are used for performing the backing up of data, i.e., the systematic generation of backup copies.

ethical behavior

Conduct that conforms to generally accepted or stated principles of right and wrong.

TFTP

Conection-less, udp 69 , used to transfer files

#ipv6 address 2001:db8:D1A5:C900::1/64

Configures interface with an address.

#ipv6 address autoconfig [default]

Configures stateless autoconfiguration on router.

integrated circuits

ESD can cause a range of harmful effects to these.

Implement the solution or escalate as necessary

Follows - Establish a plan of action to resolve the problem and identify potential effects

Test the theory to determine cause

Follows - Establish a theory of probable cause

Establish a theory of probable cause

Follows - Identify the problem

Verify full system functionality and, if applicable, implement preventative measure

Follows - Implement the solution or escalate as necessary

Establish a plan of action to resolve the problem and identify potential effects

Follows - Test the theory to determine cause

Document findings, actions and outcomes

Follows - Verify full system functionality and, if applicable, implement preventative measure

2^M

Formula for calculating the number of Networks where M is the number of borrowed bits.

2^N-2

Formula for calculating the number of hosts on a network where N is the number of host bits.

UC Gateway

Interconnects UC devices, servers, and systems.

full/half/auto

Interface duplex settings.

10/100/1000/auto

Interface speed settings.

EMI

Interference caused fields of energy.

ACCEPT, REJECT, CHALLENGE

Potential responses from the RADIUS server.

1024 - 49151

Registered or System Ports

ipconfig /release

Release dynamic(DHCP) address.

Statefull Firewall

Remembers active connections, allows only inbound TCP packets from those connections.

tcp 3389

Remote Desktop Protocol (RDP)

Simplify

Remove unnecessary elements when testing.

ipconfig /renew

Renew dynamic(DHCP) address lease.

WPA2

Replace both WEP and WPA. Uses Advanced Encryption Standard (AES) as the encryption method. Can use dynamic keys or pre-shared keys. 2007.

Authentication Server (AS)

Replies to the initial authentication request from the client. Issues a special ticket known as the Ticket Granting Ticket, or more briefly TGT.

Physical Network Diagram

Represent the physical layout of the network.

SNMP Get

Request to query for information on a network entity.

Trouble Ticket:Find distance to break in cable

TDR

False Alarm Rate

The number of 'normal' patterns classified as attacks(False Positive) divided by the total number of 'normal' patterns.

11

The number of allowed channels in the 2.4GHz range in North America.

Bit Rate

The number of bits transmitted per second.

14

The number of channels in the 2.4 GHz range.

12

The number of fields in a IPv4 header.

8

The number of fields in a IPv6 address.

Collision Errors

The number of messages retransmitted. The total number of these with respect to the total number of output packets should be around 0.1 percent or less.

3

The number of non-overlapping channels in the 2.4 GHz range.

40

The number of octets in the IPv6 header.

TTL

The number of seconds remaining on a cached record before it is purged.

level three

The person or group that resolves complex incidents that are beyond the scope of level two.

Two-factor Authentication

Using two different methods to authenticate a user.

Class C Private Range

192.168.0.0/16

DS3

28 DS1 + overhead 44.736Mb/s

Distance

A measure of length that defines the max run between two devices or repeaters for a standard.

Speed

A measure of potential throughput. Expressed in bits per second (b/s).

Mantrap

A device that monitors and controls two interlocking doors to a small room (a vestibule), designed to separate secure and non-secure areas.

Asset Condition

A measure of the health of an asset.

Card Reader

A device that retrieves information stored on an access card and transmits that information to a controller.

Router

A device that routes packets of data between two or more networks.

known error

A problem that has a documented root cause and a workaround.

DS1

1.544 Mbit/s (24 user channels). Used by T-1.

# of hosts on Class A Network

16,777,214

SNMP

161

APIPA address

169.254.x.x

Class B Private Range

172.16.0.0/12

Class C Address Range

192.0.0.0 - 223.255.255.255

Address and Mask

2 Required elements of an IP address

FTP Data

20

FTP Control

21

SSH

22

Class D address range

224.0.0.0 - 239.255.255.255

Telnet

23

Class E address range

240.0.0.0 - 255.255.255.255

SMTP

25

# of hosts on Class C Network

254

CIDR /12

255.240.0.0

CIDR /14

255.252.0.0

Class B mask

255.255.0.0

CIDR /17

255.255.128.0

CIDR /19

255.255.224.0

CIDR /27

255.255.255.224

CIDR /28

255.255.255.240

CIDR /29

255.255.255.248

CIDR /30

255.255.255.252

HSPA+

A 3G mobile wireless technology that uses MIMO and sophisticated encoding techniques to achieve a maximum 84 mbps downlink throughput and 11 mbps uplink throughput inits current release. Advances in more efficiently using limited channels and incorporating more antennas in MIMO promise to push the maximum downlink data rate to 336 mbps.

ATM

A Cell Switching network that can be used on the LAN(Backbone) and WAN. Suitable for Voice, Data, and Video.

Rollover Cable

A Cisco proprietary cable used to connect a computer system to a router or switch console port.

Certificate

A Data Record that contains the information as defined in the X.509 Format.

Change Schedule

A Document that lists all approved Change Proposals and Changes and their planned implementation dates.

CSU/DSU(Channel service unit/data service unit)

A Layer 1 device that connects your serial ports on your router to the provider's network and connects directly to the demarcation point (demark) or location.

Unmanaged Switch

A basic Layer 2 switch. This will work simply by plugging it in and connecting it. It is not configurable.

Packet Filter

A basic level of network access control that is based upon information contained in the IP packet header. Source/Destination: Address/Port: Incoming/Outgoing

Hand Geometry

A biometric access control technology that verifies a person's identity by using the variations in hand size, finger length, and finger thickness.

Signature Verification

A biometric identification method using a person's signature characteristics (writing speed, pen pressure, shape of loops, etc.) to identify that person.

decision tree

A branching structure of questions and possible answers designed to lead an analyst to a solution.

dashboard

A bright display that sends out visual and, in some cases, audible messages to service desk staff and to customer sites that have dashboards installed; also known as electronic reader board.

Patch Cable

A cable assembly with modular plugs on each end. Used for patching equipment to the patch panel in the equipment room and also used to connect to phones and computers at the drop.

Coaxial

A cable consisting of a core, inner conductor that is surrounding by an insulator, an outer cylindrical conductor.

T1 Crossover

A cable is used to connect two T1 CSU/DSU devices in a back-to-back configuration.

Thin Client

A client that relies on another host for the majority of processing and hard disk resources necessary to run applications and share files over the network.

Community Cloud

A cloud that is open only to specific organizations that have common concerns.

RG-6

A coaxial cable that uses F-type screw-on connectors. It is used for digital data, such as from a cable TV company.

Application Recovery

A component of Disaster Recovery that deals with the restoration of business system software and data, after the operating system environment has been restored or replaced.

Single Point of Failure

A component or entity in a system which, if it no longer functions, would adversely affect the entire system.

LAN

A computer network that interconnects computers within a limited area such as a residence, school, laboratory, or office building.

PAN

A computer network used for data transmission among devices such as computers, telephones and personal digital assistants.

Multilayer Switch

A computer networking device that switches on OSI layer 2 like an ordinary network switch and provides extra functions on higher OSI layers, like layer 3.

Critical Node

A computer system whose disruption or destruction immediately degrades the ability of an organization to command, control, or effectively conduct operations.

Honeypot

A computer, data, or network site that is designed to be enticing to crackers so as to detect, deflect, or counteract illegal activity.

Metro Ethernet

A data transfer service that can interconnect two businesses at any distance using standard 802.3 protocols.

Asset Database

A database containing asset related information.

SNMP MIBS

A database used for managing the entities in a communication network. Maps the OIDs on the device to fields.

Broadcast

A datagram or frame addressed to the all hosts address. Typically local.

Load Balancer

A dedicated network device that can direct/distribute requests to more than one server based on a variety of factors.

Worm

A destructive computer program that bores its way through a computer's files or through a computer's network.

Firewall

A device designed to prevent unauthorized access to your computer when connected to a network such as the Internet.

Conductor

A device designed to transmit electricity, heat, etc.

VPN Concentrator

A device that aggregates VPN connections. It is the entry point for VPN clients to the network.

MUX (Multiplexer)

A device that combine multiple signals for transmission over a single line. The signals are demultiplexed (DEMUX'd), or separated, at the receiving end.

Proximity Reader

A device that detects an emitted signal in order to identify the owner.

Media Converter

A device that enables networks or segments using different media to interconnect and exchange signals.

Network Sniffer

A device that has access to the signaling on the network cable.

Exit Alarm

A device that indicates (either audibly or silently) that a secure door has been forced opened.

Switch

A device that interconnects nodes on a network segment.

Antenna

A device that transmits and/or receives electromagnetic waves.

CSU/DSU(Channel service unit/digital service unit)

A device that understands the Layer 1 details of serial links installed by a telco and how to use a serial cable to communicate with networking equipment such as routers.

Content Filter

A device/program to screen and exclude from access or availability Web pages or e-mail that is deemed objectionable.

Electrical Safety Program

A documented program that identifies policies, procedures, principles and safe work practices to protect workers exposed to electrical energy.

Ether Channel/Bonding/Link Aggregation/Teaming

A feature in which up to eight parallel Ethernet segments between the same two devices, each using the same speed, can be combined to act as a single link for forwarding and Spanning Tree Protocol logic.

VLAN Pooling

A feature that enables you to group multiple wireless controller VLANs to load-balance sessions evenly.

Image

A file or directory that contains, at a minimum, the encapsulated components of a guest OS.

Vulnerability

A flaw or weakness that allows a threat agent to bypass security.

Satellite

A form of connectivity that has high latency but can be used from almost any location.

Bare metal virtualization

A form of full virtualization where the hypervisor runs directly on the underlying hardware, without a host operating system.

Hosted virtualization

A form of full virtualization where the hypervisor runs on top of a host OS.

Packet Shaper

A form of traffic shaping. The goal of traffic shaping is to delay metered traffic such that each packet complies with the relevant traffic contract. This is common in Quality of Service (QoS) implementations in which traffic must not exceed the administratively defined rate.

Full virtualization

A form of virtualization where one or more operating systems and the applications they contain are run on top of virtualized hardware.

Request for Change (RFC)

A formal request for a Change to be implemented. An RFC, specifying the details of the proposed Change, must be submitted to Change Management for every non-standard Change.

EAP

A framework to define additional authentication mechanisms other than username and password.

Industrial control system (ICS)

A general term that encompasses several types of control systems used in industrial production, including supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and other smaller control system configurations such as programmable logic controllers (PLC) often found in the industrial sectors and critical infrastructures.

Attenuation

A general term that refers to any reduction in the strength of a signal. A natural consequence of signal transmission over long distances.

SSL

A general-purpose protocol developed by Netscape for managing the encryption of information being transmitted over the Internet.

Token

A generic term for an authentication device.

RAS (Remote Access Server)

A generic term to describe the concentrator/end point for remote clients.

Pool

A group of addresses that can be leased to clients.

SNMP Agent

A hardware device or software program that reports to an SNMP manager.

Microwave

A high volume, long distance, point-to-point transmission in which microwaves are used to transmit signals through atmosphere from one transmission station to another.

Routing Table

A list of information about all known networks and the next hop for each network.

ACL

A list of rules used to grant access to a resource. In a firewall, it identifies traffic that is allowed or blocked based on IP addresses, networks, ports, and some protocols (using the protocol ID).

Cipher Lock

A lock controlled by touch screen, typically 5 to 10 digits that when pushed in the right combination the lock will releases and allows entry.

Application Log

A log that racks events that are related to applications running on the computer. Can be viewed using the Event Viewer utility.

Virtual Switch

A logically defined device that is created and managed by virtualization software and that operates at the Data Link layer. Ports on a ___ connect virtual machines with a network, whether virtual or physical, through the host's physical NIC.

Static Route

A manually created route.

Actuator

A manually operated or automatically controlled switch or sensor which initiates a signal that can be processed by an access control system.

Dynamic NAT and PAT

A many to one mapping used to give private clients access to public networks (Internet)

War Chalking

A mark on a building created by a war driver to specify where a hotspot exists. People "in the know" look for these marks to identify hotspots for their use.

Unified Voice Services

A marketing buzzword describing the integration of real-time, enterprise, communication services such as instant messaging (chat), presence information, voice (including IP telephony), mobility features (including extension mobility and single number reach), audio, web & video conferencing, fixed-mobile convergence (FMC), desktop sharing, data sharing (including web connected electronic interactive whiteboards), call control and speech recognition with non-real-time communication services such as unified messaging (integrated voicemail, e-mail, SMS and fax).

Insulator

A material that does not allow heat or electrons to move through it easily.

critical success factor

A measurable characteristic that must exist for something - such as a process, project or team - to be viewed as successful.

Benefit

A measurable improvement, resulting from change, which is considered advantageous by at least one stakeholder, and contributes to the overall organizational objectives.

MPLS(Multi Protocol Label Switching)

A mechanism for using a shared IP network to securely carry traffic from many, possibly unrelated systems while allowing for differentiated handling to ensure quality of service to critical or time sensitive applications.

SNMP Trap

A message that a network device sends to alert an SNMP manager about an event or a failure.

Paravirtualization

A method for a hypervisor to offer interfaces to a guest OS that the guest OS can use instead of the normal hardware interfaces.

backup rotation scheme

A method for effectively backing up data where multiple media are systematically moved from storage to usage in the backup process and back to storage. There are several different schemes. Each takes a different approach to balance the need for a long retention period with frequently backing up changes.

WPA

A method for encrypting data transmitted over wireless networks. Uses PSKs and TKIP.

Snapshot

A record of the state of a running image, generally captured as the differences between an image and the current state.

patch analysis

A method of checking a system to determine which patches are appropriate for the system.

MAC Filtering

A method of controlling access on a wired or wireless network by denying access to an device that their MAC address does not match one that is on a pre-approved list.

MAC Filtering

A method of controlling access on a wired or wireless network by denying access to an device that their MAC address does not match one that is on a pre-approved list. Layer 2.

OFDM

A method of encoding digital data on multiple carrier frequencies.

NAT

A method of mapping one or more private, reserved IP addresses to one or more public IP addresses.

Multicast

A method of sending Internet Protocol (IP) datagrams to a group of interested receivers in a single transmission.

root cause analysis

A methodical way of determining why problems occur and identifying ways to prevent them.

Cost

A metric that assigns a number to a interface to calculate route.

Latency

A metric that considers delay.

Bandwidth

A metric that considers the link speed in the path.

RTU (Remote Terminal Unit)

A microprocessor-controlled electronic device that interfaces objects in the physical world to a distributed control system or SCADA (supervisory control and data acquisition) system by transmitting telemetry data to a master system, and by using messages from the master supervisory system to control connected objects.

DSSM

A modulation technique. Carrier signals occur over the full bandwidth (spectrum) of a device's transmitting frequency.

Analog Modem

A modulator/demodulator device that allows computers to communicate with one another over existing phone lines.

Protocol Analyzer

A monitoring device or a computer with monitoring software that captures each packet to decode & analyze its contents. Also called a sniffer.

GAN(Global Area Network)

A network composed of different interconnected computer networks that cover an unlimited geographical area.

Protected network

A network segment or segments to which access is controlled.

Medianets

A network that is optimized for high-traffic video.

SAN

A network which provides access to consolidated, block level data storage.

COS (Class of Service)

A parameter used in data and voice protocols to differentiate the types of payloads contained in the packet being transmitted. The objective of such differentiation is generally associated with assigning priorities to the data payload or access levels to the telephone call.

nonstandard patch

A patch that cannot be installed by using normal procedures.

NESSUS

A penetration-testing tool from Tenable Security that performs sophisticated scans to discover information about hosts, ports, services, and software.

OTDR

A performance testing device for use with fiber-optic networks. It works by issuing a light-based signal on a fiber-optic cable and measuring the way in which the signal bounces back.

MAC Address

A permanent address given to each network interface card (NIC) at the factory. This address enables the device to access the network via a Level-2 protocol.

Customer

A person who buys products or services.

Enrollee

A person who has a biometric reference template on file.

Security Guard

A person who provides security checks on staff/ visitors on coming in and out of the organisation.

peer-to-peer support

A practice in which users bypass the formal support structure and seek assistance from their coworkers or someone in another department.

Standard Change

A pre-authorized change that is low risk, relatively common and follows a procedure or work instruction. Deploying a new desktop for example.

Business Recovery Team

A pre-identified group of individuals that is reponsible for maintaining and executing the recovery process.

Count to Infinity

A problem with Distance Vector Protocols that slows convergence and can cause routing loops., Problem that occurs in distance vector routing protocols where router slowly increases metric for a failed route unit it reaches maximum defined metric value.

Physical to Virtual(P2V)

A process in which an existing physical computer is converted into a virtual machine.

LWAPP

A protocol that can control multiple Wi-Fi wireless access points at once. This can reduce the amount of time spent on configuring, monitoring or troubleshooting a large network.

WPA cracking

A security exploit in which a hacker uses a program to discover a WPA key.

patch incompatibility

A rare situation where two patches cannot be on the same system.

WiMAX

A recent wireless technology that can deliver maximum speeds of up to 7 Mbps to your cell phone, home computer, or car. Stands for Worldwide Interoperability for Microwave Access.

Hot Site

A remote physical location where you can maintain copies of all of your critical systems, such as trading applications, data, and documents.

keystore

A repository of certificates and keys that is queried when you attempt to apply a signed patch.

Proxy

A request for a connection made on behalf of a host.

Query

A request for records of a certain name to be sent to a certain DNS server.

Recursive Query

A request from a host to a resolver to find data on other name servers.

Iterative query

A request, usually made by a resolver, for any information a server already has in memory for a certain domain name.

Notification of Change

A requirement to inform all stakeholders of a pending change whiten a given time interval.

Quarantine Network

A restricted network where hosts are place when they are not complient with NAC policies.

EGP (Exterior Gateway Protocol)

A routing protocol used between autonomous systems.

IGP (Interior Gateway Protocol)

A routing protocol used inside an autonomous system.

fuzzy logic

A searching technique that presents all possible solutions that are similar to the search criteria, even when conflicting information exists or no exact match is present.

WEP cracking

A security exploit in which a hacker uses a program to discover a WEP key.

Firewall

A security system consisting of a combination of hardware and software that limits the exposure of a computer or computer network to attack from crackers

customer satisfaction survey

A series of questions that ask customers to provide their perception of the support services being offered.

Audit server

A server that can determine the posture credentials of a host without relying on the presence of a PA on the host. The server must be able to determine the posture credentials of a host and act as a posture-validation server.

RADIUS Server

A server that offers centralized authentication services to a network's access server, VPN server, or wireless access point.

follow the sun

A service desk approach that enables an organization to provide 24-hour coverage by having regional service desks working only during the usual business hours for their location.

Relay Agent

A service the listens for DHCP broadcast request and forwards them via unicast to a DHCP server on another sunbet. Sometimes refered to as IP Helper or BootP Forwarder.

Keypad

A set of buttons or keys bearing digits, symbols and/or alphabetical letters placed in order.

VTC (VideoTeleconference)

A set of telecommunication technologies which allow two or more locations to communicate by simultaneous two-way video and audio transmissions. It has also been called 'visual collaboration' and is a type of groupware.

Alert/Alarm

A signal suggesting that a system has been or is being attacked.

Hop Count

A simple metric that only considers the number of routers in the path.

Closed Ended Question

A simple question that requires a simple answer(yes/no).

Virtual machine

A simulated environment created by virtualization.

centralized service desk

A single service desk that supports all of the technologies used by its customers.

Trunk

A single transmission channel between two points on the network: each point is either a switching center or a node (such as a telephone).

BGP

A standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the Internet.

SCADA (supervisory control and data acquisition)

A system for remote monitoring and control that operates with coded signals over communication channels

Business Continuity

A system of planning for, recovering and maintaining both the IT and business environments within an organisation regardless of the type of interruption. In addition to the IT infrastructure, it covers people, facilities, workplaces, equipment, business processes, and more.

customer surveying system

A system that is used to create and distribute questionnaires to customers and to collect and tabulate the results of their feedback.

Phishing

A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail

DWDM(Dense Wavelength Division Multiplexing)

A technology that allows multiple streams of information together on an optical fiber using different wavelengths of laser light to carry different signals. Also known as Wavelength Division Multiplexing (WDM).

PON(Passive Optical Network)

A telecommunications network that uses point-to-multipoint fiber to the premises in which unpowered optical splitters are used to enable a single optical fiber to serve multiple premises.

ISDN(Integrated Services Digital Network)

A telephone company service that transports data digitally over dial-up or dedicated lines.

Smart Jack

A termination for T-carrier wire pairs that is located at the customer demark and which functions as a connection protection and monitoring point.

Butt Set

A tool for accessing and testing a telephone company's local loop.

Cable Tester

A tool for testing if a cable can connect properly end-to-end and to determine if a cable has a short. These tools are available for a variety of cable types.

Network Firewall

A traffic filtering network device used to protect multiple systems within a network

Broadband

A transmission facility which has sufficient bandwidth to simultaneously carry multiple voice, video or data channels.

Broadband

A transmission technique that carries more than one type of transmission on the same medium, such as cable modem or DSL.

Shock

A trauma subjected to the body by electrical current. When personnel come in contact with energized conductors, it can result in current flowing through their body often causing serious injury or death.

Tri-homed firewall

A tri-homed firewalls connect three network segments with different network addresses. Typically, these would be protected, DMZ, and unprotected segments.

Straight-Through Cable

A twisted pair patch cable in which the wire terminations in both connectors follow the same scheme.

CAT5

A type of UTP Cabling that is rated up to 100 Mbps.

CAT6

A type of UTP Cabling that is rated up to 1000 Mbps and uses RJ-45 connectors.

CAT4

A type of UTP Cabling that is rated up to 16 Mbps.

Cable

A type of broadband internet connection that uses a television cable service provider to connect to the internet

RG-59

A type of coaxial cable characterized by a 75-ohm impedance and a 20 or 22 AW.

WLAN

A wireless computer network that links two or more devices using a wireless distribution method (often spread-spectrum or OFDM radio) within a limited area such as a home, school, computer laboratory, or office building.

Guest Network

A wireless router (or Wi-Fi router) feature that is designed to allow users to easily grant "visitor" access to your wireless Internet connection.

Split Pair

A wiring error where two wires of a twisted pair are instead connected using two wires from different pairs, potentially creating interference.

Reverse Zone

A zone whose purpose is the mapping of IP addresses to names.

TACACS+

AAA Service that uses TCP.

RADIUS

AAA Service that uses udp.

RADIUS, TACACS+

AAA authentication protocols used with 802.1x.

Looking Glass Site

Accessed remotely for the purpose of viewing routing information. Essentially, the server acts as a limited, read-only portal to routers of whatever organization is running the server.

TCP

Acknowledged, Connection Orientated

DORA

Acronym used to describe the DHCP process.

route add 10.0.0.0 mask 255.0.0.0 192.168.1.1

Add a route.

Options/Tags

Additional IP parameters that are passed to the client as part of the DHCP process.

NAC

Adds policies to the network for controlling access by devices and users. Policies may be based on device and/or user authentication and the status of endpoint configuration.

Full Control, Better Logging and Monitoring

Advantages to Manual Addressing

ARP Inspection

Allows a network administrator to intercept, log, and discard ARP packets with invalid MAC address to IP address bindings. When using a transparent firewall, you can protect devices in your network from a malicious device that tries to impersonate the default gateway by using this feature.

VPN

Allows a secure private connection over a public network, using an encrypted 'tunnel'. For example, a remote computer can securely connect to a LAN, as though it were physically connected.

Secure Area

Allows collection of evidence with minimal contamination.

Managed Switch

Allows configuration.

SSID enable

Allows dynamic discovery of Wifi network.

capacitors

Always discharge before working on.

Automated Attendant

An ACD feature that routes calls based on input provided by the caller through a touch-tone telephone.

SNMP Walk

An SNMP application that uses SNMP GETNEXT requests to query a network entity for a tree of information.

802.1X

An IEEE authentication protocol. Commonly used to authenticate a computer's access to a switch or wireless access point.

Route Aggregation

An alternate term for route summarization, which is a method used to minimize the number of routing tables required in an IP network.

antistatic wrist strap

An antistatic device used to safely ground a person working on very sensitive electronic equipment, to prevent the buildup of static electricity on their body, which can result in electrostatic discharge (ESD).

SDN

An approach to computer networking that allows network administrators to manage network services through abstraction of higher-level functionality.

Change management

An approach to moving organizations and their stakeholders, in an organized manner, from their current state to a desired future state.

SIEM

An approach to security management that seeks to provide a holistic view of an organization's information technology (IT) security.

Label

An appropriate group of written, printed or graphic information elements concerning a hazardous product, selected as relevant to the target sector(s), that is affixed to, printed on, or attached to the immediate container of a hazardous product, or to the outside packaging of a hazardous product.

Session Hijacking

An attack in which an attacker attempts to impersonate the user by using his session token.

Smurf Attack

An attack that broadcasts a ping (ICMP echo) request to all computers on the network yet changes the address from which the quest came to that of the target.

Kerberos

An authentication system developed by the MIT and used to verify the identity of networked users. Uses Tickets and is Time Sensitive.

Biometrics

An automated method of recognising a person based on physical characteristics. Among the features measured are face, fingerprints, hand geometry, iris and voice.

Fail-Secure

An electric lock that requires power to unlock. Also called fail-locked.

short

An electrical circuit that allows a current to travel along an unintended path, often where essentially no (or a very low) electrical impedance is encountered.

Inside Threat

An employee or contractor.

HIPS

An extension of a host-based IDS. Designed to react in real time to catch an attack in action.

DSL Modem

An external device that connects your computer to a DSL line.

Collision/Contention Domain

An group of ports that have competition for time on the wire. The risk of two nodes transmitting at the same time and causing collisions exist.

Badge

An identification card usually displaying a cardholder's photo, signature or other specific identifying characteristics.

Line of Sight

An imaginary straight line between two end points. The curvature of the earth can effect the total allowed distance.

Data Breach

An incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so

Open Circuit

An incomplete electrical circuit in which no current flows.

patch dependency

An instance where a patch depends on the existence of another patch on a system. A patch that depends on one or more patches can only be applied to a system when those other patches have already been applied.

superseded patch

An instance where a patch replaces another patch even if it has not already been applied to a system.

Themometer

An instrument that measures temperature.

Frame Relay

An international standard data-link protocol that defines the capabilities to create a frame-switched (packet-switched) service, allowing DTE devices (typically routers) to send data to many other devices using a single physical connection to the Frame Relay service.

Asset

An object (physical or intangible) that has an identifiable value.

Transceiver

An optical device that serves as both transmitter and receiver.

Giants Errors

Any Ethernet frame that is greater than 1518 bytes

Event

Any change of status in a managed object in the network.

SaaS

Applications provided over the Internet. Webmail is an example of a cloud-based technology.

ESD - protected area (EPA)

Area in which ESDS can be handled with accepted reduced risk of damage as a result of electrostatic discharge or fields.

Gather Infomation

Ask questions, collect error messages.

AAA

Authentication, Authorization, Accounting.

FE80 + MAC in EUI-64 format

Autoconfigured Link local address.

Dynamic

Automatic Addressing through DHCP

copy backup

Backs up the selected files, but does not mark the files as backed up (reset the archive bit).

full backup

Backup of all (selected) files on the system.

site-to-site backup

Backup, over the internet, to an offsite location under the user's control.

Trouble Ticket:Test analogue phone system

Butt Set

autonegotiation

Chooses optimal speed and duplex configuration

Trouble Ticket:Validate cable funtionality

Cable Certifier

Trouble Ticket:Test cable continuity

Cable Tester

Hardening

Changing the default settings to increase security.

NBMA (Nonbroadcast Multiaccess.)

Characterization of a type of Layer 2 network in which more than two device connect to the network, but the network does not allow broadcast frames to be sent to all devices on the network.

NBMA (Nonbroadcast Multiaccess)

Characterization of a type of Layer 2 network in which more than two device connect to the network, but the network does not allow broadcast frames to be sent to all devices on the network. Frame Relay uses this.

Port Mirroring/Spanning

Copies the traffic from one, a group, or all ports to a single port and disallows bidirectional traffic on that port. Used to view traffic on other ports in a switched environment.

IDF(Intermediate Distribution Frame)

Cross-connects the user cable media to individual user line circuits and may serve as a distribution point for multipair cables from the main distribution frame (MDF). Wiring Closest.

Hub to Hub

Crossover cable required.

Cellular WAN

Data communications over the cellular telecommunications networks.

Routing Loop

Data is forwarded back to the router that sent the data packets.

Encapsulation

Data is processed from the time an application creates it to the time it reaches the network medium. This process includes adding information such as addresses and ports.

backout data

Data that is created when a patch is applied to enable the system to return to its previous state if the patch is remove.

IDS

Detects/Passive Response

High Availability

Describes a system's ability to continue processing and functioning for a certain period of time - normally a very high percentage of time, for example 99.999%.

Neighbors

Describes routers that same a network ID.

Logical Topology

Describes the data flow on the network between the individual nodes

Hotspot

Designated locations where WiFi access is available.

WEP

Designed to provide wireless connections with the same security as wired connections. Has weaknesses: Static Pre-shared Keys (PSK). 1997.

255.255.255.255

Destination address of DHCP packets.

ICMPv6 Error Messages

Destination unreachable. packet to Big. Time Exceeded.

ipconfig /all

Detailed address information.

Forensics Report

Detailed report on evidence collected as part of the investigation.

Ticket Granting Server (TGS)

Distributes service tickets to clients with a valid TGT, guaranteeing the authenticity of the identity for obtaining the requested resource on the application servers.

Disconnect

Do this to the power source before servicing or repairing electrical equipment.

Chain of Custody

Documents that the evidence was under strict control at all times and no unauthorized person was given the opportunity to corrupt the evidence

tcp/udp 53

Domain Name Service (DNS)

Link Status 0 (Off)

Down, block packets.

capacitors

Drain these before working near them and keep the short circuit on the terminals during the work to prevent electrical shock.

War Driving

Driving around an area with a Wi-Fi-enabled computer or mobile device to find a Wi-Fi network to access and use without authorization.

#ipv6 unicast-routing

Enables IPv6 routing.

AES

Encryption standard used in WiFi.

Symmetric Cryptography

Encryption that uses a single key to encrypt and decrypt a message.

ER

Extended Reach

Demarc Extension

Extends the demarcation point from its original location to another location within the building. Typically consists of a single wire bundle that attaches to the existing demarc and supplies a termination point to a different location. You will need to install an extension to place the demarc into the IDF on your floor. You might need a demarc extension if your network occupies an upper floor of a building.

Critical Asset

Facilities, systems, and equipment which, if destroyed, degraded, or otherwise rendered unavailable, would affect the reliability or operability of the organization.

Failure to Acquire

Failure of a biometric system to capture and extract biometric data.

Spoofing

Faking the sending address of a transmission in order to gain illegal entry into a secure system.

Multimode Fiber

Fiber-optic that supports multiple concurrent communication signal. Commonly implemented in LAN solutions.

tcp 21

File Transfer Protocol - Control (FTP)

tcp 20

File Transfer Protocol - Data (FTP)

Interface Duplex Setting

Full,1/2, or auto

Sampling Size

General rule is always to use the largest sample possible.

BPL

High-speed Internet access delivered over the electrical grid. Home user LAN implementations support speeds of up to 200 Mb/s.

Singlemode Fiber

High-speed, high distance cable. Consists of one, sometimes two, strands of glass fiber. Transmitted end to end and pulsed to create communication. Up to 50 times more effective than multimode fiber.

bit 7 of the vendor OUI

Indicates scope of address. 0 for global. 1 for local.

one hand

If it is safe to do so, work with only one hand, keeping the other hand at your side or in your pocket, away from all conductive material. This precaution reduces the likelihood of accidents that result in current passing through the chest cavity.

Did it ever work?

If not, the answer may be related to problems with the initial configuration.

Logical Network Diagram

Illustrates the network architecture of a group of interconnected computers and other devices, such as printers, modems, switches, routers, and even mobile devices.

Remote Access VPN (Client-to-Site)

Implementation that allows users to gain secure access to the organization 's network resources. location to which the user is connecting has a VPN gateway, and users have software on their PC's that allow them to create secure connections

Remote Access VPN (Client-to-Site,Host-to-site)

Implementation that allows users to gain secure access to the organization 's network resources. location to which the user is connecting has a VPN gateway, and users have software on their PC's that allow them to create secure connections

Asymmetric Cryptography

In this Cryptography a Key Pair - Private and Public Key is used. Private Key is kept secret and the Public Key is Widely distributed.

Kerberos Realm

Indicates an authentication administrative domain.

Wireless Channel Utilization

Indicates how much 802.11 traffic the AP can "hear" on its channel, from all sources.

CRC Errors

Indicates that the checksum generated by the originating LAN station or far-end device does not match the checksum calculated from the data received. The presence of many of these errors but not many collisions is an indication of excessive noise.

35 meters

Indoor range of 802.11a and b.

38 meters

Indoor range of 802.11g.

70 meters

Indoor range of 802.11n.

ESS(Extended Service Set)

Infrastructure Mode with more than one WAPs.

BSS(Basic Service Set)

Infrastructure Mode with one WAP.

SRV Record

Intended to provide information on available services.

PTR Record

Ip to Name

Local or Global

Is the disruption affecting a single user or a group of users.

Certificate Authority (CA)

Issuer of the Digital Certificate. Also validates the Identity of the End-Entity that posseses the Digital Certificate.

Bend Radius

It is usually safe in assuming a minimum long-term low-stress radius not less than 15 times the cable diameter. Beside mechanical destruction, another reason why one should avoid excessive bending of fiber-optic cables is to minimize microbending and macrobending losses.

Environmental Monitoring

Keeping track of the changes in environmental factors. Temperature and humidity.

IPv6 Features

Larger address space. Simpler header. Security and mobility. Transaction richness.

bit

Layer 1 Keyword

Hub

Layer 1 Multiport Repeater

DataLink

Layer 2

Switch

Layer 2 Concentrator

Switch

Layer 2 Device

frame

Layer 2 Keyword

Frames

Layer 2 PDU

LLC

Layer 2 Sub-Layer

Network

Layer 3

Asset Inventory

List of assets containing sufficient information about the assets to physically locate and identify them.

NMAP

Network exploration tool and security / port scanner.

Goodput

Measures the usable data over a period of time.

Quantitative

Measures which indicate a level of performance and where the increase or decrease in these measures can be valued.

Qualitative

Measures which indicate a level of performance but which cannot be given a specific value.

QoS

Mechanisms to ensure that limited network resources are prioritized based on traffic content. Traffic Shaping.

CSMA/CA

Media access method used by WiFi. Avoids collisions by sending an intent to transmit before sending data.

Half-Duplex

Mode used by WiFi.

Partial Mesh

Most devices are connected to each other but not all and ones that aren't have to connect to others by going through others that are connected

WAN(Wide Area Network)

Multi location. Low Speed. Uses Public Teclo/Provider.

MMF

Multi-Mode Fiber

Hub

Multi-port repeater. Legacy Ethernet.

One to Many transmission

Multicast

SMNP

Network maganment, udp 161

nbtstat

Netbios name information.

Layer 3

Network

All host bits set to 0(off)

Network Address

udp 123

Network Time Protocol (NTP)

CAT6a

Newer CAT ratings of cable that is not yet the standard.

Security Log

One of the logs in Event Viewer. It records security events, such as when users enter incorrect passwords.

Point to Multipoint

One point has direct connections to a # of different points.

Multicast

One to Many transmission

Unicast

One to One transmission

Resource Record

One unit of data in the domain name system.

Qualified Person

One who has the skills and knowledge related to the construction and operation of the electrical equipment and installations and has received safety training to recognize and avoid the hazards involved.

Unicast

One-to-One communication.

DMZ

Part of a network on which you place servers that must be accessible by sources both outside and inside your network.

Egress

Passage through an opening in the exit direction, especially passage that leads out of a structure.

Logical Ring

Passes data transmissions from one node to the next, until it returns to the originator.

IEEE 802.3at

PoE+. Power over Ethernet+.

IEEE 802.3af

PoE. Power over Ethernet.

AUP

Policy that outlines the activities for which the computer and network may and may not be used.

APC(angled physical contact)

Polished at an eight degree angle, which reduces the amount of light reflected between the two connected fibers.

Auto-MDIX

Ports on newer network interfaces detect if the connection would require a crossover, and automatically chooses the MDI or MDIX configuration to properly match the other end of the link.

tcp 110

Post Office Protocol (POP3)

EIA/TIA

Produces guidelines for how network cable should be installed in commercial buildings.

IPS

Protects/Active Response

Socket

Protocol : Address : Port

Trouble Ticket:View network traffic

Protocol Analyzer

SSH

Protocol that administrates servers/routers/switches remotely and securely(22/tcp). Depreciates telnet(23/tcp)

SSH

Protocol that administrates servers/routers/switches remotely and securely.

PLC (Programmable logic controller)

Provide boolean logic operations, timers, and (in some models) continuous control. The proportional, integral, and/or differential gains of the _____ continuous control feature may be tuned to provide the desired tolerance as well as the rate of self-correction during process upsets. _____ are used extensively in process-based industries. ____ are computer-based solid-state devices that control industrial equipment and processes.

ESP (Encapsulating Security Payloads)

Provide confidentiality, data-origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic-flow confidentiality.

SA (Security Associations)

Provide the bundle of algorithms and data that provide the parameters necessary to AH and/or ESP operations.

DNS Server

Provides Name Resolution

PaaS

Provides OS and maybe server software.

ISAKMP

Provides a framework for authentication and key exchange.

Cable Modem

Provides high-speed Internet connections through the cable television network.

Neighbor Discovery

Provides same functionality as ARP. Use multicast.

WPA Enterprise

Requires an authentication server using Remote Authentication Dial-In User Service and the 802.1x authentication protocol.

DCE(Data Communication Equipment)

Provides timing services, WAN access - Provider end.

UC Servers

Provides unified communication service.

Access Point

Provides wireless communication to devices on a wireless network.

Grounding

Providing a path for electric charges to flow safely into the ground.

Trouble Ticket:Terminate cross connects to block

Punch Down Tool

ipconfig /flushdns

Purge host name cache.

categorization

Recording the type of incident being reported.

Default Gateway

Router Address

ICMP type 134

Router Advertisement Packet.

ICMP type 133

Router Solicitation Packet.

Channels

Routes of communication to and from the help desk, such as the telephone, voice mail, e-mail, and the Web.

AUP (Acceptable Use Policy )

Rules or guidelines for the proper use of technology or digital devices within an organization.

udp 161

SNMP port

udp 514

SYSLOG port

Gererator

Secondary power source that provides continuation of operations during power loss(hours/days).

tcp 22

Secure Shell (SSH)

SSH

Secure Shell, tcp 22, Linux and Cisco remote Management

tcp 443

Secure WEB (HTTPS)

HTTPS

Secure WWW, tcp 443

customer service

Services that ensure customers receive maximum value for the products or services they purchase.

customer support

Services that help a customer understand and benefit from a product's capabilities by answering questions, solving problems, and providing training.

Virtual Terminals

Session access points for simultaneous access to a Cisco device(ie telnet,ssh).

SR

Short Range

Ignored Errors

Shows the number of received packets ignored by the interface because the interface hardware ran low on internal buffers. These buffers are different from the system buffers mentioned previously in the buffer description. Broadcast storms and bursts of noise can cause the ignored count to be increased.

Absorption

Signal loss created by light energy turning into heat.

Discovery types

Solicitation and Advertisement.

Ticket

Something a client presents to an application server to demonstrate the authenticity of its identity.

standard patch

Standard patches are those that adhere to the OS patching specification and are installable by using the standard methods.

NSlookup

Standard tool for querying name servers in command line operating systems.

Knowledgebase

Stored repository of organized knowledge.

Computer to Switch

Straight through cable required.

SNMPv3

Supports strong authentication with MD5 or SHA, providing confidentiality (encryption) and data integrity of messages via DES or DES-256 encryption between agents and managers to provide an NMS get and trap information.

SDH

Synchronous Digital Hierarchy - Standardized multiplexing protocol that trnasfers multiple digital streams over fiber

MDF(Main Distribution Fame)

Terminates IDFs. Primary Distribution Point. Data Center.

Speed Test Site

Test how much traffic you can push through internet connection(website).

Testing

Test potential solutions one at a time.

Community String

Text string that acts as a password and is used to authenticate messages sent between a management station and a router containing a SNMP agent. The community string is sent in every packet between the manager and the agent.

SOA Record

The SOA is the first record in every properly configured zone. The SOA record contains information about the zone in a string of fields.

Escape

The act of breaking out of a guest OS to gain access to the hypervisor, other guest OSs, or the underlying host OS.

Caching

The act of recording authoritative response to resolver queries for future reference.

Test

The action we take on the theory of probable cause.

Physical Topology

The actual layout of network devices, wires, and cables.

On-boarding

The addition of a new employee to an organization's identity and access management (IAM) system. The term is also used if an employee changes roles within the organization and is granted new or expanded access privileges.

Next Hop

The address of the router that gets the information going to a particular network.

Bandwidth

The amount of data that can or is transmitted over a network in a given amount of time.

retention time

The amount of time in which a given set of data will remain available for restore.

Convergence

The amount of time it takes all routers to have up-to-date information (Steady State) after a change.

restore time

The amount of time required to bring a desired data set back from the backup media.

Macrobending

The attenuation associated with bending or wrapping the fiber. Light can leak out of fiber when the fiber is bent.

Vulnerability Scanning

The automated process of proactively identifying security vulnerabilities of computing systems in a network in order to determine if and where a system can be exploited and/or threatened.

Average Call Duration

The average length of time required to handle a call.

Average Wait Time

The average number of minutes a caller waits for an analyst after being placed in the queue by an ACD; also known as average queue time.

Campus

The buildings and grounds of a college, university, or large corporate facility.

Backbone Wiring

The cabling used between telecommunication closets, entrance facilities, equipment rooms, or buildings.

IaaS

The cloud provider manages the hardware including servers, storage, and networking components. The organization is responsible for all the software, including operating system (and virtualization software), database software, and its applications and data.

Modulation

The coding of information onto a carrier frequency, including on/off light source digital coding.

Asset Management

The combination of management, financial, economic, engineering and other practices applied to physical assets with the objective of providing the required level of service in the most cost effective manner.

UTM (Unified Threat Management)

The evolution of the traditional firewall into an all-inclusive security product able to perform multiple security functions within one single system: network firewalling, network intrusion prevention and gateway antivirus (AV), gateway anti-spam, VPN, content filtering, load balancing, data loss prevention and on-appliance reporting.

Virtual Wire

The firewall is installed transparently on a network segment by binding two ports together and should be used only when no switching or routing is needed.

Antenna pattern

The graphical representation of the radiation properties of the antenna as a function of space.

Logical partitioning

The hypervisor allowing multiple guest OSs to share the same physical resources.

Physical partitioning

The hypervisor assigning separate physical resources to each guest OS.

Risk Assessment

The identification and prioritization of potential business risk and disruptions based on severity and likelihood of occurrence.

level one

The initial point of contact for customers when they have an incident.

Incident Response

The initial response to a computer-related event that seeks to verify an incident, triage the incident, and gather necessary evidence while minimizing data and evidence loss.

Access port

The interface on a switch used for an end node. Devices connected to acces ports sre unaware of VLAN information

Baseline

The level of performance which is used for comparison after the change. This may just be past performance, but where other changes are going on this needs to be adjusted to take account of their impact.

In-band Management

The management of a network device "through" the network.

18,000 feet

The maximum distance between a user's demarc and the central office for all versions of DSL.

root cause

The most basic reason for an undesirable condition or problem, which, if eliminated or corrected, would prevent the problem from existing or occurring.

BIND

The most common DNS software of the internet. Ported to every flavor of Unix and Windows.

Ethernet

The most common LAN topology for bound media networks. Defined in the IEEE 802.3 standard.

100BaseTX

The most common implementation of 100BaseT. Uses 2 pairs.

100 meter

The most common specified maximum run length of twisted pair cable.

568B

The most common wiring standard for terminating UTP connections.

Area 0

The name of the Backbone Area in OSPF

TCP/IP Suite

The native protocol of the internet

Native VLAN

The one VLAN on an 802.1Q trunk for which the endpoints do not add the 4-byte 802.1Q tag when transmitting frames in that VLAN.

Wavelength

The optical term for frequency.

QoS

The overall performance of a telephony or computer network, particularly the performance seen by the users of the network.

First Responder

The people to respond to your emergency.

Abandon Rate Percent

The percentage of abandoned calls compared to the total number of calls received.

backup window

The period of time that a system is available to perform a backup procedure.

Communication channels

The routes used to pass messages, such as social media, email, verbal presentations, reports, etc.

Offer

The second part of the DHCP process.

Bluejacking

The sending of unsolicited messages over a Bluetooth connection.

Virtualization

The simulation of the software and/or hardware upon which other software runs.

Root Bridge

The single bridge/switch on a network selected by the Spanning Tree Protocol to provide the basis for all subsequent path calculations.

Horizontal Wiring

The span of cabling and connectors between the wiring closet and each drop. It is called horizontal because this type of wiring does not go up or down any floors of a building. Slang term is Run.

PPPoE

The standard for connecting home computers to an ISP via DSL or broadband cable.

IEEE 802.1W

The standard that defines Rapid Spanning Tree.

IEEE 802.1D

The standard that defines Spanning Tree.

Adjacency

The state that neighbor routers will form

Attempt

The submission of a biometric sample to a biometric system for identification or verification. A biometric system may allow more than one.

Endface

The surface area of the fiber optic ferrule where the optical fiber is centered and polished.

syslog

The system logging facility for Unix Systems. Used for local and remote logging.

slack space

The unused space at the end of a file in a file system that uses fixed size clusters (so if the file is smaller than the fixed block size then the unused space is simply left). Often contains deleted information from previous uses of the block.

Metropolitan Ethernet

The use of Carrier Ethernet technology in metropolitan area networks (MANs).

hashing

The use of functions (e.g. CRC, SHA1 or MD5) to verify that an "image" is identical to the source media.

MIMO

The use of multiple antennas at both the transmitter and receiver to improve communication performance.

Hypervisor

The virtualization component that manages the guest OSs on a host and controls the flow of instructions between the guest OSs and the physical hardware.

Multicast

Traffic to a group of interfaces.

Leading indicator

These are metrics which give an indication of the progress of the change initiative towards the future state performance levels.

Interface Resets

This can happen if packets queued for transmission were not sent within several seconds. On a serial line, this can be caused by a malfunctioning modem that is not supplying the transmit clock signal, or by a cable problem.

TDM

Time Division Multiplexing. A method of transmitting and receiving independent signals over a common signal path by means of synchronized switches at each end of the transmission line so that each signal appears on the line only a fraction of time in an alternating pattern.

Latency

Time it takes for a data packet to move across a network connection.

TTL

Time to Live. Present in packet header but not in frame header.

download

To copy one or more patches from a source of patches to the system where the patches are to be applied.

apply

To install a patch on a system.

Spanning Tree Protocol(STP)

To prevent Loops from forming on LAN because there are no TTL values in the Layer 2 frame header. IEEE 802.1D.

back out

To remove a patch from a system.

Trouble Ticket:Discover where drop terminates at patch panel

Toner Probe

WiFi Analyzer

Tool for checking/diagnosing issues on a wireless network.

Loop Back Plug

Tool for testing serial, parallel USB, fiber, network or other ports.

Toner Probe

Two devices used together to trace the end of a wire from a known endpoint to the termination point in the wiring closet.

Split Horizon and Poison Reverse

Two methods to combat Count to Infinity and Routing Loops.

RADIUS Client

Typically a network access server such as a Dial-up Sever, VPN server, or Wireless AP.

SSL VPN

Unlinke other VPN technologies, does not require any proprietary software. Uses a browser and secures data through SSL certificates. Considered firewall friendly because it uses port 443 which is commonly open.

1000BaseX

Used in industry to refer to gigabit Ethernet transmission over fiber.

route

View and modify routing table.

ipconfig /displaydns

View host name cache.

netstat -na

View socket information.

arp -a

View table of IP addresses resolved to MAC addresses.

netstat -r

View the routing table without the route command.

W

WAN

10GBaseSW

WAN. 10 Gb/s Ethernet over MMF. Max length 400 meters.

10GBaseLW

WAN. 10 Gb/s Ethernet over SMF. Max length 10 KM by spec (25 actual).

10GBaseEW

WAN.10 Gb/s Ethernet over SMF. Max length 30 KM standard (40 engineered).

SSID

Wifi network identifier. Case sensitive.

Maintenance Window

Windows assigned for the purposes of change, upgrades, patch management, and authorized downtime.

IMAP

email, works with mail on server, tcp 143

Patch Management

the process of regularly applying patches and updates to software used by the organization


Conjuntos de estudio relacionados

22 - Questions - Access Control Lists (ACL)

View Set

multiplicaciones/ multiplications

View Set

Chapter 23: Cardiovascular Alteration

View Set

8.5 Greatest Common Factor and Least Common Multiple

View Set