Networking Fundamentals Part 2 (Week5)

¡Supera tus tareas y exámenes ahora con Quizwiz!

____ are important information to know for cloud migration because countries and states have different laws for data protection. Target hosts Business continuity Baselines Legal restrictions

Legal restrictions

____ projection involves predicting one or more network capacities based on the current network parameters and multiplying those capacities by some constant. Multiplicative Addictive Linear Geometric

Linear

In a wide area connectivity map, mobile or wireless sites are indicated by circles containing the letter ____. A X E M

M

A database that holds the information about all managed network devices.

MIB (Management Information Base)

____ is a proprietary traffic monitoring protocol from Cisco that tracks all IP traffic crossing any interface where it is enabled) NetFlow SNMP IP TCP

NetFlow

____ testers have a display that graphically shows a network segment and all the devices attached to it. Cable Electrical Connector Network

Network

The cloud migration strategy ____ can also be called do-nothing. Retain Rehost Repurchase Refactor

Retain

An isolated environment where you can experiment with changes or potentially dangerous software without exposing sensitive resources to risk of damage.

Sandboxing

Software resources or services running on a network that are outside the knowledge or oversight of the IT department.

Shadow IT

____ is an industry standard created by the Internet Engineering Task Force and designed originally to manage Internet components. Transport Control Protocol (TCP) Simple Network Management Protocol (SNMP) Simple Mail Transfer Protocol (SMTP) Internet Control Message Protocol (ICMP)

Simple Network Management Protocol (SNMP)

There are ___ phases in the process of cloud migration. 5 3 4 6

5

____ involves the creation of mathematical equations to calculate various network values. Linear projection Benchmarking Analytical modeling Computer simulation

Analytical modeling

A study used to compare current conditions with desired conditions of a network system.

Gap Analysis

Creating a(n) ____________________ for an existing computer network involves measuring and recording a network's state of operation over a given period of time.

Baseline

____ involves generating system statistics under a controlled environment and then comparing those statistics against known measurements. Benchmarking Linear projection Analytical modeling Computer simulation

Benchmarking

A document requesting that vendors submit a proposal for a product or service that the customer wants to purchase.

RFP (Request For Proposal)

The streamlining and built-in repetition of the application lifecycle, along with the increased collaboration between the teams working on an app.

DevOps

The advantage of using a ____ is that it can mimic conditions that would be extremely difficult, if not impossible, to create on a real network. computer simulation benchmark time projection linear projection

computer simulation

One technique used to model a corporation's network environment is to create ____. connectivity maps dots model link shadows node approaches

connectivity maps

It is called ____ when a NIC transmits continuously but does not send valid data) macaw jabber flood nicker

jabber

To examine the nodes in a wide area connectivity map in more detail, an analyst can expand each individual site into a ____ area connectivity map. local universal personal world

local

A ____ map can show how individual workstations or groups of workstations are clustered with switches, routers, hubs, and server farms. local area detailed connectivity wide area connectivity local area overview connectivity metropolitan area connectivity

local area detailed connectivity

Change ____ consists of carefully defined processes to evaluate the need for a change, the cost of the change, a plan for making the change with minimal disruption, and a backup plan if the change does not work as expected) evaluation analysis assessment management

management

When a company is evaluating a project's ____ feasibility, the company must ask: Will the proposed system produce the expected results? time financial technical operational

operational

A ____ is an isolated environment where you can experiment with changes or potentially dangerous software without exposing sensitive resources to risk of damage. safe box testbox fenced box sandbox

sandbox

When a company is evaluating a project's ____ feasibility, the company must ask: Can the proposed system be designed, built, tested, and installed in an amount of time that all parties find reasonable and to which they can agree? time operational financial technical

time

Three different modeling techniques can be used: ____ area connectivity maps, metropolitan area connectivity maps, and local area connectivity maps. wide world universal personal

wide


Conjuntos de estudio relacionados

Ch. 8 - Skin Integrity and Wound Care

View Set

Nutrition - Ch. 19 -- Nutrition for Patients with Diabetes Mellitus

View Set

Life And Health Insurance Chapter 8

View Set

CISA All Difficulty Correct Protection of Information Assets Questions

View Set

Security+ Network Security Fundamentals Chapter 12

View Set

Econ 3311 - Money & Banking - Practice Exam # 2

View Set

Entrepreneurship I: Final Practice - Unit 4

View Set