Final Exam Study Set
emergency change
A change that must be introduced as soon as possible to repair an error in an IT service that has a high impact on the business.
software update
A change to software that you apply that corrects an existing problem or that introduces a feature.
Business Impact Analysis
A collection of information on a wide range of areas from recovery assumptions and critical business processes to interdependencies and critical staff that is then analysed to assess impact a disaster may have.
Hybrid Cloud
A combination of public and private clouds
PPP
A communications protocol that enables a workstation to connect to a server using a serial connection.
Open Ended Question
A complex question used to gather detailed information.
PAN(Personal Area Network)
A computer network used for communication among computer devices close to one person. Often uses Bluetooth.
DSCP (Differentiated Services)
A computer networking architecture that specifies a simple, scalable and coarse-grained mechanism for classifying and managing network traffic and providing quality of service (QoS) on modern IP networks.
Virus
A computer program designed to damage computer files.
Zero Client
A client computer that does not have an operating system and merely provides an interface between the user and the server.
NaaS
A cloud-based technology where organizations can offload their network infrastructure to a third-party.
Mission-critical
A computer system or application that is essential to the functioning of your business and its processes.
Incorrect Termination
A condition that occurs when the wires are not crimped in the correct order (Mismatched Standards/Crossovers).
DSLAM(Digital Subscriber Line Access Multiplexer)
A connectivity device located at a telecommunications carrier's office that aggregates multiple digital subscriber lines and connects them to a larger carrier or to the Internet backbone.
Heat Map
A diagram of signal strength in a Wi-Fi network.
E1
A digital carrier standard used in Europe that offers 30 channels and a maximum of 2.048 Mbps throughput.
E3
A digital carrier standard used in Europe that offers 480 channels and a maximum of 34.368-Mbps throughput.
T3
A digital carrier standard used in North America and most of Asia that provides 44.736 Mbps throughput and 672 channels for voice, data, video, or audio signals. Uses TDM over fiber.
DSL
A digital communication system designed to allow high speed data communication over existing telephone; network speed varies by provider
Incident
A disruption in service.
EMI/RFI
A disturbance generated by an external source that affects an electrical circuit by electromagnetic induction, electrostatic coupling, or conduction.
standard
A document that contains an agreed, repeatable way of doing something.
UPC(ultra physical contact)
A dome-shaped endface that aids in optimizing the connections between two jacketed fibers.
Electric Strike
A door unlocking device that is installed in the door jamb and that works in conjunction with a mechanical lock or latch mechanism. Requires power to be applied to unlock a door.
Application Firewall
A firewall that can control the traffic associated with specific services. Works all the way up to Layer 7 of the OSI model.
Dual-homed firewall
A firewall with two interfaces, one attached to the protected network and one attached to the unprotected network.
Network-based firewall
A firewall, generally hardware-based, that protects a network of computers as opposed to one computer.
LTE
A fourth-generation(4G) wireless broadband technology that was developed to allow GSM cellular technology to evolve to provide very high-speed Internet access.
PoE
802.3af. Provides power through the switch. Requires a special switch.
Sandboxing
: Isolating each guest OS from the others and restricting what resources they can access and what privileges they have.
Non-Persistent Agent
A "dissolvable" or portal-based agent. With this approach, a user clicks on a web link to download the agent, which authenticates the user and device, checks the endpoint for compliance, and allows access to the network if policy conditions are met. It then disappears until the user runs it again.
Network Access Control
A Cisco-sponsored industry initiative that uses the network infrastructure to enforce security policy compliance on all devices seeking to access network computing resources; thereby limiting damage from viruses and worms.
802.1x
A IEEE standard designed to enhance security of wireless networks by authenticating a user to a central authority.
RDP
A Microsoft protocol that allows a user to view and control the desktop of a remote computer. Uses TCP 3389.
Internet
A Packet Switching network.
Repeater
A Physical layer device that amplifies the signals it receives on one port and resends it on another port. Used to extend the distance of a network segment.
MPLS(Multi-Protocol Label Switching)
A QoS technique that replaces the IP datagram header with a label at the first router a data stream encounters.
CIDR /10
255.192.0.0
CIDR /21
255.255.248.0
Class C mask
255.255.255.0
CIDR /26
255.255.255.192
HTTPS
443
DNS
53
801.11g
54 Mb/s, 2.4 GHz, 1 MIMO stream, OFDM and DSSS modulation
# of hosts on Class B Network
65534
DHCP
67,68
TFTP
69
BPDU
A Spanning Tree Protocol initializing packet that is sent at definable intervals for the purpose of exchanging information among bridges/switches in networks.
TDR
A high-end instrument for testing the qualities of a cable. It works by issuing a signal on a cable and measuring the way in which the signal bounces back to the device. Copper.
Network Controllers
A highly available and scalable server role, and provides one application programming interface (API) that allows _____________ to communicate with the network, and a second API that allows you to communicate with ____________.
Peer to Peer
A network on which many of the computers function as both clients and servers. Lacks dedicated servers and server OS's.
Client/Server
A network that uses centrally administered computers, known as servers, to enable resource sharing for and to facilitate communication between the other computers on the network.
Physical Bus
A network topology in which a continuous length of cable connects one computer to another in daisy-chain fashion. There's no central interconnecting device.
Physical Star
A network topology that uses a central device, such as a hub or switch, to interconnect computers in a LAN. Each computer has a single length of cable going from its NIC to the central device. It's the most common physical topology in LANs.
Static NAT
A one to one mapping of an internal host to a public IP address.
Stakeholder
A person or group which has an interest in the process or result of a change initiative.
Call Center
A place where telephone calls are made or received in high volume for one or more customers.
Asset Disposal Plan
A plan that documents the timing of, and the costs associated with the disposal of assets.
Bottleneck
A point of congestion or blockage.
WAN Link
A point-to-point connection between two nodes on a WAN.
Trunk Port
A port on a switch configured to carry all data, regardless of VLAN number, between all switches in a LAN.
Access Control
A procedure to identify and/or admit personnel with proper security clearance and required access approval(s) to information or facilities using physical, electronic, and/or human controls.
Informal Site Survey
A site survey where the AP is deployed and tested using standard computer equipment.
Collision
A situation in which two or more packets are detected at the same time on an Ethernet network.
Key Fob
A small device containing a microchip used to generate unique passwords for logging on to a computer or a network.
patch server
A source of patches that can be used by your systems to perform patch analyses and from which they obtain the appropriate patches.
Jam signal
A special signal sent to all network nodes, alerting them that a data collision has occurred.
SONET
A standard in the US that defines a base date rate of 51.84 Mbps. Multiples of this rate are known as optical carrier (OC) levels, such as OC-3, OC-12, etc.
Web Services
A standardized way of integrating Web-based applications using the XML, SOAP, WSDL and UDDI open standards over an Internet protocol backbone.
q
Leave man page.
Firmware Updates
Like software, this is constantly being upgraded and remade by manufacturers in order to keep it up to date and compliant or add functionality.
Emergency Change Advisory Board (ECAB)
A sub-set of the Change Advisory Board who makes decisions about high impact Emergency Changes.
CCTV
A system of television cameras filming in shops and public places so that people can watch and protect those places.
Redundancy
A system of using multiple sources, devices or connections so that no single point of failure will completely stop the flow of information.
GRE
A tunneling protocol developed by Cisco Systems that can encapsulate a wide variety of network layer protocols inside virtual point-to-point links over an Internet Protocol network.
CAT1
A type of UTP Cabling that is rated for voice and not suitable for networking.
CAT3
A type of UTP Cabling that is rated up to 10 Mbps.
CAT2
A type of UTP Cabling that is rated up to 4 Mbps.
anomaly-based
Alerts the administrator or user, when anomalous traffic is detected. example: Suppose suddenly an exponential increase in TCP connection from 20 to 200.
CNAME
Alias. Name to A Record.
CSMA/CD
All Ethernet networks, independent of their speed or frame type, use this access method.
Network Address
All host bits set to 0(off)
Broadcast address
All host bits set to 1(on)
HIDS
An IDS used to monitor an individual server or workstation.
802.1x
An IEEE Standard for port-based Network Access Control.
IPSec
An IETF standard used to secure TCP/IP traffic. It can be implemented to provide integrity and confidentiality.
anycast
An IPv6 address assinged to more than one node.
Superscope
An administrative grouping of scopes that are used to support multiple, logical IP subnets on the same physical subnet. Superscopes contain a list of member scopes (or child scopes) that can be activated as a collection.
Log Managment
An approach to dealing with large volumes of computer-generated log messages (also known as audit records, audit trails, event-logs, etc.). Covers: log collection. centralized aggregation. long-term retention.
backup policy
An organization's procedures and rules for ensuring that adequate amounts and types of backups are made, including suitably frequent testing of the process for restoring the original production system from the backup copies.
Enterprise
An organizational unit, organization, or collection of organizations that share a set of common goals and collaborate to provide specific products or services to customers. A view of the entire network.
Rouge Access Point
An unauthorized access point to a wireless network.
patch
An update to software that corrects an existing problem or that introduces a feature.
live analysis
Analysis of a piece of digital media from within itself; often used to acquire data from RAM where this would be lost upon shutting down the device.
Network Management Software or Network Management System
Another term for SNMP manager software or hardware.
Crimper
Attaches connectors to cable
Social Engineering
Attacks that involve manipulating and tricking an individual into divulging confidential info to be used for fraudulent purposes.
Zero-day Attack
Attacks that take advantage of a newly discovered security hole before a patch is developed.
Something You Are
Authentication factor that relies on a physical characteristic (fingerprint, face, eye, palm)
Biometrics
Authentication technique using automated methods of recognizing a person based on a physiological or behavioral characteristic.
Contact
Avoid this with energized electrical circuits.
jewelry
Avoid wearing this when working with electricity.
Moisture
Avoid working with electricity an environments that have a high level of this.
Drop Cable
Connects node to drop.
ICMPv6
Diagnostics. Router discovery. Neighbor discovery.
SNMP OID (Object ID)
Consists of a series of numbers separated by decimal points. Each decimal point represents a leaf node in the tree structure of the MIB. Point to network objects stored in a database called the Management Information Base, often referred to as the "MIB".
Change Record
Contains all the details of a Change, documenting the lifecycle of a single Change.
Primary Server
Contains authoritative zone information.
CSMA/CA
Contention based media access. Avoids collisions by sending an "intent to transmit"
Incremental change
Continuous improvements made to the organization in an ongoing, adaptive manner. These are gradual changes to the current state.
IP Filter
Control access based on source/ destination IP address.
Micro-Segment
Creates a separate collision domain for every port.
Trouble Ticket:Terminate RJ-45 ends
Crimper
Noise
Data or interference that can trigger a false positive or obscure a true positive.
DOCIS
Data over Cable Service Interface Specification. The main link layer standard for transmitting data via a cable modem. Used by most vendors of HFC networks.
exhibit
Digital media seized for investigation.
Electrostatic discharge sensitive devices (ESDS)
Discrete device, integrated circuit or assembly that may be damaged by electrostatic fields or discharge encountered in routine handling, testing or transit.
Filter
Does not forwards the frame.
DHCP
Dynamic Addressing
Layer 2
DataLink
udp 67,68
Dynamic Host Configuration Protocol (DHCP)
49152 - 65535
Dynamic or Private Ports
Groundable point
Dedicated point which can be connected to EPA- ground.
ICMPv6 Informational Messages
Echo request. Echo Reply.
Ping
Echo. Layer 3 connectivity.
Security Awareness Training
Educates employees about corporate policies and procedures for working with information technology
Modem
Electronic equipment consisting of a device used to connect computers by a telephone line.
Issues with fiber splicing and termination
Fibers may be broken or cracked during cable jacket or buffer tube removal or fiber stripping. This may affect all fibers in the cable or buffer tube or just one fiber.
Plenum Cable
Fire resistant and non-toxic; it must be used when wiring above ceiling tiles. PVC cable cannot be used to wire above ceilings because it is toxic when burned. Rigid. Expensive.
Block,Allow,Log
Firewall rules.
Stateless Firewall
Firewall that does not check the content of the packet and does not validate the state of the connection. Packet Filter.
ATM Cell
Fixed length cell (frame) used to transmit data to reduce variability in transmission delay. 53 Bytes total w/ a 48 Byte payload.
<command> /?
Get command line help in Windows.
man <command>
Get help in Linux/Unix.
No Buffers Errors
Gives the number of received packets discarded because there was no space in the main system. Compare this with the ignored count. Broadcast storms on Ethernet networks and bursts of noise on serial lines are often responsible for these events.
Server Options
Global Options that are given to all clients unless over-ridden.
Honeynet
Group of systems/networks created to lure learn from unautorized intruders.
PKI
Group of technologies used to request, create, manage, store, distribute, and revoke digital certificates.
AH (Authentication Header)
Guarantees connectionless integrity and data origin authentication of IP packets. Further, it can optionally protect against replay attacks by using the sliding window technique and discarding old packets.
Site policy
Guidelines within an organization that control the rules and configurations of an IDS.
Omnidirectional antenna
Has a non-directional pattern (circular pattern) in a given plane with a directional pattern in any orthogonal plane.
HVAC
Heating, Ventilation, Air Conditioning.
Hash
Hexadecimal number generated from a string of text such that, no two different strings can produce the same.
IEEE 802.11a-ht/802.11g-ht
High Throughput wireless.
CAM Table
Holds all the MAC-addresses-to-port mappings on a switch. May be referred to as a MAC Address Table.
Wavelength
Horizontal distance between the crests or between the troughs of two adjacent waves. Fiber and analog.
HSRP
Hot Standby Routing Protocol (Cisco)
Ferrule
Housing, alignment, and mating sleeve of fiber end.
Accessibility
How easily the service desk can be reached by service desk staff, other employees of the company, and customers.
tcp 80
Hyper Text Transport Protocol (HTTP)
Rapid Spanning Tree
IEEE 802.1W. Supports fast convergence. Works using Hello times. Hellos are sent out every two seconds by default, and can respond to changes within three hello times. This allows for convergence due to a network change in six seconds.
802.1q
IEEE standard that specifies how VLAN and trunking information appear in frames and how switches and bridges interpret that information. Frames are tagged with VLAN information.
Virtual IP
IP addresses that can float between two or more physical network nodes. These IP addresses are used to provide redundancy for attached servers and VIPs.
ICMP
IP helper protocol, includes echo and echo reply
ARP
IP to MAC resolution
Issues with fiber install
Improper pulling techniques (such as not pulling the fiber cable by the strength member,) excess tension, tight bends under tension, kinking or even too many bends.
Community
In SNMP, a logical group of managed devices and NMSs in the same administrative domain.
Host operating system
In a hosted virtualization solution, the OS that the hypervisor runs on top of.
IGMP
Multicast group managment
Trouble Ticket: Measure voltage of outlet
Multimeter
netstat
Network statistics.
MAN
Network that interconnects users with computer resources in a geographic area or region larger than that covered by even a large local area network (LAN) but smaller than the area covered by a wide area network (WAN).
NIPS
Network-based. An IPS that monitors the network. An IPS can actively monitor data streams, detect malicious content, and stop attacks in progress.
NIDS
Network-based. IDS used to monitor a network. It can detect network-based attacks, such as smurf attacks. A NIDS cannot monitor encrypted traffic, and cannot monitor traffic on individual hosts.
DIAMETER
New version of RADIUS.
Broadcast
No longer supported by IPv6.
4
Number of allowed MIMO streams with 802.11n.
Link Status 1 (On)
OK to send packets.
Everyone
People in the organization that require security awareness training.
Layer 1
Physical
LAN(Local Area Network)
Private. Single location. High speed.
Error Prone, Time Consuming
Problems with static addressing
RFC 1817
RFC that recommended VLSM.
Directional antenna
Radiates its energy more effectively in one (or some) direction than others.
Secondary Server
Receives updates from the Primary Server.
eDiscovery
Refers to discovery in litigation or government investigations which deals with the exchange of information in electronic format (often referred to as electronically stored information or ESI).[1] These data are subject to local rules and agreed-upon processes, and are often reviewed for privilege and relevance before being turned over to opposing counsel.
Class D addresses
Reserved for multicast
Key Distribution Center (KDC)
Resides entirely on a single physical server (it often coincides with a single process) and can be logically considered divided into three parts: Database, Authentication Server (AS) and Ticket Granting Server (TGS).
IRP (Incident Response Policy)
Security policy that determines the actions that an organization will take following a confirmed or potential security breach.
Layer 4 PDU
Segment
Forward
Sends the frame to a port.
Flood
Sends the frame to all ports.
Layer 5
Session
SPB (Shortest Path Bridging)
Specified in the IEEE 802.1aq standard, is a computer networking technology intended to simplify the creation and configuration of networks, while enabling multipath routing.
FFFE
Stuffed in the middle of a MAC address to make an EUI-64 address.
tcp 23
Telnet
workaround
Temporarily circumventing or minimizing the impact of an incident.
First Hop Last Hop Protocols
Term used to describe the protocols used to connect to the providers network.
Off-boarding
The IAM processes surrounding the removal of an identity for an employee who has left the organization. The term may also be used to describe the restriction of certain access rights when an employee has changed roles within the organization.
WiMax
The IEEE designation is 802.16, and it has a range of 31 miles with bandwidth capabilities up to 70Mbps.
Network Baseline
The act of measuring and rating the performance of a network in real-time situations. Providing this requires testing and reporting of the physical connectivity, normal network utilization, protocol usage, peak network utilization, and average throughput of the network usage.
Baseline
The act of measuring and rating the performance of a network in real-time situations. This requires testing and reporting of the physical connectivity, normal network utilization, protocol usage, peak network utilization, and average throughput of the network usage.
Verify
The action we take on the implementation of the solution.
DNS Spoofing
The basic purpose of spoofing is to confuse a DNS server into giving out bad information.
Route Redistribution
Take a route from one routing protocol and inject it or distribute it into another protocol.
Agent
The code that authenticates the user and their device, and allows network access based on policies you define.
Patch Panel
The common cross connect method used inside an equipment room. Typical Patch Panels utilize 110 or Krone connectors (on the rear) to connect to the horizontal cabling and modular jacks on the front to connect to equipment via patch cords.
Access Point(AP)
The computer or network device that serves as an interface between wireless- equipped computers and the rest of the network.
Cross Connect
The connection method used between permanent cabling (inside the walls) and equipment. A patch cord is often used as the connection means.
Link Status
The current state of an interface.
PUBLIC
The default Community String in SMTP.
Detection Rate
The detection rate is defined as the number of intrusion instances detected by the system(True Positive) divided by the total number of intrusion instances present in the test set.
customer entitlement
The determination of whether the customer is authorized to receive support and, if so, the level of support the customer should receive.
Recovery Time Objective (RTO)
The duration of time and service level within which a business process must be restored after a disruption in order to avoid unacceptable losses. Begins when a disaster hits and does not end until all systems are up and running.
IS-IS
Link State protocol. Not as popular as OSPF.
traceroute
Linux tool for viewing the path the packet takes.
ifconfig
Linux/Unix address information
netstat -i
Linux/Unix command to view interface statistics.
dig
Linux/Unix tool for getting information from name servers(DNS).
ARP Cache Poisoning
Local attacks involving sending spoofed ARP responses on a LAN to the victim and/or gateway.
Console Port
Local interface used for terminal access.
Switch Console
Local, command-line access through a terminal emulation program. (Out-of-band management)
VLAN
Logical division of the network at Layer 2.
LR
Long Reach
Layer 2 Sublayer
MAC
Guest tools
Mechanisms within hosted virtualization solutions that allow a guest OS to access files, directories, the copy/paste buffer, and other resources on the host OS or another guest OS.
MS-CHAP
Microsoft's dominant variation of the CHAP protocol; it uses a slightly more advanced encryption protocol.
Behavior Based
Monitors for certain actions or conditions.
Signature Base
Monitors using pre-defined definitions/patterns. Like AV software.
Tailgating
More than one individual entering a secure area using one access card.
Discover
The first part of the DHCP process.
Identify the problem
The first step in the Troubleshooting Methodology
Acknowledge
The fourth part of the DHCP process.
Bluesnarfing
The gaining of unauthorized access through a Bluetooth connection.
Scope
The network ID.
Penetration Testing
The practice of testing a computer system, network or Web application to find vulnerabilities that an attacker could exploit.
Roaming
The process of a client moving an established Wi-Fi network association from one access point to another access point within the same Extended Service Set (ESS) without losing connection.
acquisition/imaging
The process of creating a duplicate copy of digital media for the purposes of examining it.
triage
The process of determining a customer's need and routing him or her to the appropriate support group.
Site Survey
The process of planning and designing a wireless network, to provide a wireless solution that will deliver the required wireless coverage, data rates, network capacity, roaming capability and Quality of Service (QoS).
Disaster Recovery
The process of restoring and maintaining the data, equipment, applications and other technical resources on which a business depends.
Forwarding
The process of sending a recursive query sent from a host to a resolver, to a second predetermined resolver.
Certification
The process of testing a biometric system to ensure that it meets certain performance criteria.
soft skills
The qualities that people need to deliver great service, such as active listening skills, verbal skills, customer service skills, problem-solving skills, temperament, teamwork skills, and writing skills.
CIR
The rate at which a Frame Relay network agrees to transfer information under normal conditions, averaged over a minimum increment of time.
Baud Rate
The rate at which signals on a wire may change.
Gain
The ratio of the power gain in a given direction to the power gain of a reference antenna in the same direction.
Logging
The recording of user requests made to the firewall.
Bounce
The reflection of a signal off objects like mirrors, windows, metal objects. Reduces range and performance.
Storage
The retention of encoded information over time.
iptables
The tables provided by the Linux kernel firewall and the chains and rules it stores.
De-encapsulation
The technique used by layered protocols in which a layer removes header information from the Protocol Data Unit (PDU) from the layer below.
Request
The third part of the DCHP process.
1,6,11
The three non-overlapping channels in the 2.4 GHz range.
Logical Bus
This topology is where all data transmissions are sent simultaneously to all nodes on the media.
NTP
Time Sync, udp 123
Event Viewer
Tool use to view Windows logs.
Interface Monitoring
Tools used to determine performance and health of the network.
System Log
Tracking file that logs events that are related to Windows Server 2003 operating system.
netflow, ntop
Traffic analyzers.
Voice VLAN
Transports digitized voice calls and signaling information, usually given a higher priority than data VLANs due to time-sensitivity of voice data.
udp 69
Trivial File Transfer Prorocol (TFTP)
Forward Chaining
Troubleshooting a problem from the source.
Host-to-Host VPN
Tunnel encrypted traffic from one host to another.
L2TP
Tunneling protocol used with VPNs. Commonly used with IPsec. Uses port 1701.
Buffer Overflow
Unchecked data which spills into another location in memory.
One to One transmission
Unicast
TELNET,HTTP,SLIP,FTP,TFTP,SNMPv1,SNMPv2
Unsecured protocols.
Driver Update
Updated device drivers for installed hardware.
Dynamic DNS
Updates DNS information automatically.
MDI-X Port
Used on Hub/Switch
MDI Port
Used on end node.
SNMP
Used to configure and monitor network resources.
DCS (Distributed Control System)
Used to control industrial processes such as electric power generation, oil and gas refineries, water and wastewater treatment, and chemical, food, and automotive production.
Routing Metric
Used to determine which route is the best route for a given network.
TLS (Transport Layer Security)
Used to encrypt traffic on the wire. Replacement for SSL and like SSL, it uses certificates.
TLS
Used to secure web protocols
PVC Cable
Used to surround twisted pair cabling. Gives of poisonous gases when it burns. Not formed tightly to the conductors it contains. Fire can travel within. Flexible. Inexpensive.
Throughput tester
Used to test the bandwidth and quality of a connection.
"::" Double Colon
Used to truncate an IPv6 address. Can only be used once.
Exploitation Tools
Used to verify that an actual vulnerability exists by exploiting it
digital media
Used within the fields to refer to the physical medium (such as a hard drive) or data storage device.
Reservations
Uses MAC address to allocate a specific address to a specific client.
Baseband
Uses a single fixed frequency to a send a signal that occupies the cable's entire carrying capacity.
Fiber Channel
Uses a switching fabric to connect storage LUNs to hosts
CHAP
Uses challenges and hash to autheticate.
Infrastructure Mode
Uses one or more concentrators(WAPs).
Three-factor Authentication
Using three different methods to authenticate a user.
Stateful Autoconfiguration
Via a DHCP server.
Stateless Autoconfiguration
Via neighbor discovery and router advertisements.
VRRP
Virtual Router Redundancy Protocol (IETF)
Graphing
Visual display of information or data.
SIP
VoIP connection
UC Device
VoIP phone
RTP
VoIP transport
HTTP
WWW, tcp port 80
TKIP
Was a stopgap security protocol used in the IEEE 802.11 wireless networking standard.
nonskid shoes
Wear these when you are lifting often or lifting potentially heavy objects.
Brute Force
With enough computing power trying all possible combinations.
Top-to-Bottom
Working through the OSI model from Application to Physical
Bottom-to-Top
Working through the OSI model from Physical to Application
MultiLayer Switch
Works at Layer 2 and 3
disk cloning
the process of copying the contents of one computer hard disk to another disk or to an image file for later recovery.
VLSM CIDR mask for 10 host network
/28
VLSM CIDR mask for 2 host network
/30
ACL
A set of rules that control traffic.
Exclusions
Addresses within a Pool/Scope that cannot be leased to clients.
Florescent Light Ballast
Source of EMI.
pathping
Windows command for running diagnostics on a connection.
netstat -e
Windows command to view interface statistics.
route print
Windows command to view the routing table.
netsh
Windows network shell. Used to view and configure TCP/IP settings on the system.
ipconfig
Windows tool for viewing address information.
tracert
Windows tool for viewing the path the datagram takes.
nslookup
Windows/Linux/Unix tool for getting information from name servers(DNS).
WAP
Wireless concentrator.
Class A address range
1.0.0.0 - 126.0.0.0
16,777,214
# of hosts on Class A Network
65534
# of hosts on Class B Network
254
# of hosts on Class C Network
10GBaseLR
10 Gb/s Ethernet over SMF. Max length 10 KM by spec (25 actual).
10GBaseER
10 Gb/s Ethernet over SMF. Max length 30 KM standard (40 engineered).
10GBaseT
10 Gb/s Ethernet over twisted pair. Max length 100 Meters
Class A Private Range
10.0.0.0/8
Interface Speed Setting
10/100/1000/auto
100BaseT
100 Mb/s Ethernet over twisted pair. Max length 100 Meters
1000BaseT
1000 Mb/s Ethernet over twisted pair. Max length 100 Meters
Class A mask
255.0.0.0
Abandoned Call
A call where the caller hangs up before an analyst answers.
VLSM CIDR mask for 16 host network
/27
CAT5e
*Gigabit Ethernet *Max speed: 350 Mbps (up to 1 Gbps)
VLSM CIDR mask for 1500 host network
/21
VLSM CIDR mask for 255 host network
/23
VLSM CIDR mask for 500 host network
/23
VLSM CIDR mask for 200 host network
/24
VLSM CIDR mask for 100 host network
/25
802.11b
11 Mb/s, 2.4 GHz, 1 MIMO stream, DSSS Modulation
POP3
110
MAC Address
12 digit Hexadecimal Layer 2 Address. First 6 digits are vendor ID.
NTP
123
loopback
127.0.0.1
Class B address range
128.0.0.0 - 191.255.255.255
IMAP
143
802.11n
150 Mb/s, 2.4/5 GHz, 4 MIMO streams, OFDM modulation
Management VLAN
A VLAN defined by the switch administrator as a means of accessing the management capabilities of a switch.
portal
A Web "supersite" that provides a variety of services such as a site search to locate pertinent articles and white papers, a product and services buyer's guide, a discussion or message board, event calendars, and publications.
incremental backup
A backup that only contains the files that have changed since the most recent backup (either full or incremental).
Legal Hold
A court order that suspends the processing of destruction or paper/electronic records. AKA preservation order, preservation notice, or litigation hold
differential backup
A cumulative backup of all changes made since the last full backup.
Electrical Hazard
A dangerous condition caused by equipment failure or contact with an energized conductor or circuit part. Hazards include shock, Arc-Fl ash, burns and arc-blast.
Management Information Base (MIB)
A data structure that describes SNMP network elements as a list of data objects.
Reference Test Cable
A known good cable used for diagnostics.
Dynamic Route
A learned route.
True Positive
A legitimate attack which triggers an IDS to produce an alarm.
T1
A level of service offered by the telephone companies over a T-carrier circuit that provides full-duplex transmissions at 1.544 Mbps, carrying digital voice, data, or video signals.
Best Practice
A proven way of completing a task to produce a near optimum result.
Brainstorming
A technique performed by a group of people and designed to generate a large number of ideas for solving a problem.
five whys
A technique that involves repeatedly asking the question "Why?" until the root cause of a problem is determined.
SNMP Object
A variable, a data structure, or a function, and as such, is a location in memory having a value and possibly referenced by an identifier.
Guest operating system
A virtual machine that runs an instance of an OS and its applications.
Physical Ring
All nodes are connected to one another in the shape of a ring or closed loop.
Physical Mesh
All nodes connected to one another.
FF02::1
All-nodes multicast address.
iptables
Allow a system administrator to alter the Linux kernel firewall. They can create rules determining whether a packet is dropped or accepted. Filters incoming, outgoing, and forwarding traffic.
digital signature
An electronic signature that can be used to ensure that a document has not been modified since the signature was applied.
Transmitter
An electronic unit that converts an electrical/binary signal to an optical signal using LEDs or lasers.
incident owner
An employee of the support organization who acts as a customer advocate and proactively ensures that a incident is resolved to the customer's satisfaction.
UPS
Battery backup that provides limited capabilities during power loss(minutes).
EIGRP
Cisco Advanced Distance Vector Protocol
Public Cloud
Cloud services that exist on the Internet offered to anyone and any business.
CDMA
Code Division Multiple Access. Assigns a unique code to each voice call or data transmission to uniquely identify it from all other transmissions sent over cell network. "spread spectrum" network, calls are spread throughout the entire RF band.
Protocol Analyzer
Collect real-time network traffic information.
CSMA/CA
Collision Avoidance. WiFi.
CSMA/CD
Collision Detection. Ethernet. Contention based.
Layer 7 PDU
Data
route del 10.0.0.0 mask 255.0.0.0 192.168.1.1
Delete a route.
Denial of Service (DOS)
Denies, degrades, or disrupts normal functionality of a system or network.
T, TX
Denotes twisted pair.
iSCSI
Ethernet-based shared storage protocol.
Layer 2 PDU
Frame
2000::/3
IPv6 Global (IANA) address.
ping -6
IPv6 ICMP echo request
FE80::/10
IPv6 Link Local address.
::1
IPv6 Loopback.
::
IPv6 Unspecified address. Used in source field of DHCP request datagram.
Network Closet
In each building or on each floor is a gathering place for wiring.
Multiplexing
In telecommunications, a technique that combines multiple messages or signals onto a single transmission channel.
Site Survey
In the context of wireless networking, an assessment of client requirements, facility characteristics, and coverage areas to determine an access point arrangement that will ensure reliable wireless connectivity within a given area.
Interface Errors
Includes runts, giants, no buffer, CRC, frame, overrun, and ignored counts.
tcp 143
Internet Message Access Protocol (IMAP)
Dialup
Internet access that connects using a telephone line and a MODEM.
Virtual PBX
Internet based PBX systems that enable organizations to outsource their PBX services (private branch exchange).
Physical
Layer 1
Hub
Layer 1 Device
NIC
Layer 1 Interface
/var/log/messages
Main Linux log file.
Application, Security, System
Main Windows logs.
Partitioning
Managing guest operating system access to hardware so that each guest OS can access its own resources but cannot encroach on the other guest OSs' resources or any resources not allocated for virtualization use.
Static
Manual Addressing.
b/s
Measure of network bandwidth.
B/s
Measure of storage throughput.
Access Control Mechanisms
Measures or procedures designed to prevent unauthorized access to protected information or facilities.
MUX
Multiplexer. Physical device.
Default Gateway
Must be configured on the switch if you will be managing it from remote networks.
DNS
Name Resolution, udp 53
A Record
Name to IP
AAAA Record
Name to IP(IPv6)
Change fatigue
Neither an acceptance nor rejection of change, but is the state of being overwhelmed and exhausted by the amount of change going on and unable to absorb any more.
Broadcast
One to All transmission
OCx
Optical carrier levels; defines the transmission speeds used in SONET/SDH.
Class Options
Options that are given to a group of specific clients in a specific pool. Can over-ride scope options.
Reservation Options
Options that are given to a specific client in a specific pool. Can over-ride vendor options.
Scope Options
Options that are given to all clients in a specific pool. Can over-ride server options.
Layer 3 PDU
Packet,Datagram
1 and 3,2 and 6
Pins that are crossed in a crossover cable.
Packet Sniffing
Process used by hackers to intercept data packets and analyze their content looking for information.
insulated soles
Proper footwear when working with electricity.
udp 161
Simple Network Management Protocol (SNMP)
SMF
Single Mode Fiber
Drop
Slang term used for each cabling span pulled from a telecommunications closet.
Snips
Small pair of scissors that you use to snip off cable ends.
Static shielding bags
These bags have a multi-layer design to provide a Faraday Cage effect, which blocks out external static electric fields. The inner layer is a static dissipative polyethylene surrounded by a layer of aluminum shielding. The next layer is made of polyester, with an outer layer made of a static dissipative coating. Protect components from static charges both inside and outside of the bag.
Anti-static bags
These bags prevent static build-up on the bag by dissipating static charges. Blue and pink are the industry's standard colors used to distinguish these bags.
Logs
These need to be monitored on all critical devices.
Newton's First Law of Motion
Things in motion continue to move in the same direction unless some effort is exerted upon them.
Serial Number Field
Third Field in an SOA record. Used by a secondary server to determine if it requires a zone transfer from the primary server. If the Secondary's Number is lower than the Primary's, then the secondary server knows that its records are out of date.
As-is state
This is the current situation in the organization.
0 - 1023
Well Known or System Ports
Collision
When 2 devices attempt to use the media at the same time this occurs.
False Rejection
When a biometric system fails to identify an enrollee or fails to verify the legitimate claimed identity of an enrollee.
Bluetooth
You want to use a wireless keyboard and mouse with your laptop computer. Which method should you choose?
SMTP
email, Server to Server and sending, tcp 25
POP3
email, downloads inbox, tcp 110
MAN(Metropolitan Area Network)
large computer networks usually spanning a city. They typically use wireless infrastructure or Optical fiber connections to link their sites.
127.0.0.1
loopback
RDP
3389
STP
4 Pair copper wire wire a foil sheath around it to resist EMI.
UTP
4 Pair copper wire. The most common type of cable used in bound LANs.
802.11a
54 Mb/s, 5 GHz, 1 MIMO stream, OFDM modulation
10GBaseSR
10 Gb/s Ethernet over MMF. Max length 400 meters.
10BaseT
10 Mb/s Ethernet over twisted pair. Max length 100 Meters
100BaseFX
100 Mb/s Ethernet over MMF. Max length 2000 meters.
SHA
A family of cryptographic hash functions published by the National Institute of Standards and Technology (NIST) as a U.S. Federal Information Processing Standard (FIPS)
Botnet
A group of compromised computers connected to a network such as the Internet that are used as part of a network that attacks other networks, usually for nefarious purposes.
Change Advisory Board (CAB)
A group of people that advises the Change Manager in the assessment, prioritization and scheduling of Changes.
Autonomous System
A group of routers under a single authority.
Asset Class
A grouping of assets of a similar nature and use.
Broadcast Domain
A logical network composed of all the computers and networking devices that can be reached by sending a frame to the data link layer broadcast address.
Formal Site Survey
A site survey where specialized equipment is used to determine optimal AP placement.
Collision
A situation in which two or more frames are detected at the same time on an Ethernet network.
Far-end Crosstalk
A measure of the unwanted signal coupling from a transmitter at the near-end into a neighboring pair measured at the far-end.
Multimeter
A measuring instrument for current, voltage, and resistance.
Packet Switching
A method of transmitting data in which messages are separated into packets that travel along the network separately, and then are reassembled in the proper order at the destination.
WAN
A telecommunications network or computer network that extends over a large geographical distance and is often established with leased telecommunication circuits.
Manager
A top-level master system (hardware or software) serving as the human interface to the network.
Hybrid Topology
A topology comprised of several topologies and combined into one network.
HTTP
80
Top Level Domain
Any zone owned by the root servers. You can also think of this as the first label in any domain name other than root.
Interference
Anything that gets in the way of clear communication.
Layer 7
Application
Something You Know
Authentication factor that relies on a piece of knowledge (password, PIN).
Something You Have
Authentication factor that relies on possession (FOB, Card, Cell Phone, Key)
SSO (Single Sign ON)
Authentication method where users can access multiple resources on a network using a single account.
Problems with NAT
Breaks End-to-End model. Inhibits End-to-End security. Some apps not friendly. Merging private networks.
Layer 2 Device
Bridge
All host bits set to 1(on)
Broadcast
One to All transmission
Broadcast
7 Days
Cisco default preferred lifetime (RAP).
30 Days
Cisco default valid lifetime (RAP).
VTP
Cisco proprietary Layer 2 protocol that enables a network manager to configure a single switch so that it propagates VLAN configuration information to other switches in the network.
ICA
Citrix remote presentation protocol. Uses TCP 1494.
10.0.0.0/8
Class A Private Range
1.0.0.0 - 126.0.0.0
Class A address range
255.0.0.0
Class A mask
172.16.0.0/12
Class B Private Range
128.0.0.0 - 191.255.255.255
Class B address range
255.255.0.0
Class B mask
192.0.0.0 - 223.255.255.255
Class C Address Range
192.168.0.0/16
Class C Private Range
255.255.255.0
Class C mask
224.0.0.0 - 239.255.255.255
Class D address range
Reserved for multicast
Class D addresses
240.0.0.0 - 255.255.255.255
Class E address range
Telnet
Clear text remote, tcp 23
FTP
Clear text, tcp 21,20, used to copy files
clear
Clear the screen in Linux.
cls
Clear the screen in Windows.
PAP
Cleartext authentication.
0.0.0.0
Client address before it has an address.
Operating system virtualization
A virtual implementation of the OS interface that can be used to run applications written for the same OS.
Application virtusalization
A virtual implementation of the application programming interface (API) that a running application expects to use.
Loopback
A virtual interface configured on the router, utilized for maintenance/management functions.
VLAN Interface
A virtual interface on a switch that we can assign a IP address to for remote management.
Disk image
A virtual representation of a real disk drive.
Hub and Spoke
A wan topology in which various branch offices are connected through a centralized hub or headquarters.
Change curve
A way of understanding and visually representing the level of an individual's confidence, morale and roll competence through a period of change. From its starting level, for most people it rises slightly, dips, rises again and levels out.
MSDS
A widely used abbreviation for Material Safety Data Sheet. A MSDS contains details of the hazards associated with a chemical, and gives information on its safe use.
MD5
A widely used cryptographic hash function producing a 128-bit (16-byte) hash value, typically expressed in text format as a 32 digit hexadecimal number.
169.254.x.x
APIPA address
Jumbo Frame
Allows for an MTU as high as 9198 bytes.
Implicit Deny
An access control principle that maintains that if a condition is not explicitly met, it is to be rejected. Default for most firewalls.
Keyless Access Control
An access control system that controls access using something other than a key and a lock.
DDOS
An attack that uses hundreds or thousands of zombie computers in a botnet to flood a device with requests.
Duplicate Problem
An attempt to recreate the original incident that caused the service disruption.
VLAN hopping
An exploit that allows an attacker on a VLAN to gain access to traffic on other VLANs that would normally not be accessible.
Endpoint Device
Any machine that attempts to connect to or use the resources of a network. Also referred to as a host.
Out-of-band Management
Allows management outside of normal communications channels (not using network resources).
NAT
Allows private hosts to use a routable address.
Site-to-Site VPN
Allows remote site to securely communicate over public medium.
Network Segmentation
Allows you to control which systems can communicate with one another on the network. You can use VLANs and IP subnets to create this.
VoIP
Allows you to make voice calls over a computer network.
Runt Errors
Almost always caused by collisions. Any Ethernet packet that is less than 64 bytes.
computational forensics
Digital forensics with the use of artificial intelligence.
Presence
Open and extensible platform facilitates the highly secure exchange of ________ and instant messaging (IM) information between Cisco Unified Communications and other applications.
Bonding
Grouping two or more interfaces on a device for the purpose of them behaving as one interface. Provides increased bandwidth and redundancy.
128
IPv6 address bit length.
tracert -6
IPv6 path information.
Router Advertisement Data
Options. Prefix. Lifetime. Auto-configuration flag.
120 meters
Outdoor range 802.11a unlicensed.
140 meters
Outdoor range of 802.11b and g.
250 meters
Outdoor range of 802.11n.
5000 meters
Outdoor range of licensed 802.11a.
special handling
Patches with properties that indicate they must be installed in single-user mode. Also, patches that require you to restart the system after the patch has been applied are referred to as having special handling requirements.
Router
Layer 3 Device
Packet,Datagram,Routing
Layer 3 Keyword
Packet
Layer 3 PDU. Also called a Datagram
Transport
Layer 4
Reliability, Segment
Layer 4 Keyword
Session
Layer 5
Connection
Layer 5 Keyword
Presentation
Layer 6
Format
Layer 6 Keyword
Encyrption
Layer 6 Process(May be Layer 3 -ie: IPSec)
jpeg
Layer 6 example
Application
Layer 7
Service, User
Layer 7 Keyword
optional
Leading Zeros in an IPv6 address.
Persistent Agent
Lives on the end station, where it performs authentication and compliance checking before allowing network access.
Transport Mode
Only the payload of the IP packet is usually encrypted and/or authenticated.
Point to Point
Only two nodes on the network, commonly used to interconnect networks.
non-conducting handles
Only use only tools and equipment with these handles when working on electrical devices.
RIP
Open Distance Vector Protocol
OSPF
Open Link State Protocol
UDP
Connection-less, Unacknowledged
Wireless Bridge
Connects 2 segments at Layer 2.
CAN(Campus Area Network)
Connects LANs across a business campus. Owned and maintained by the business.
CSMA/CD
Contention based media access. Reacts to collisions by sending a jam signal.
Cable Certifier
Determines the precise performance of a cable, and then records it in graphical form for the customer records
Smoke Detector
Device that alerts people when there is smoke in the air.
Ad-hoc Mode
Device to Device connection.
Host Firewall
Software installed on a host and used to protect the host from network-based attacks.
host-based firewall
Software running on a single host that can restrict incoming and outgoing network activity for that host only.
Ticking System
Software to track incidents.
Crossover Cable
Special UTP cable used to connect hubs or to connect network cards without a hub. Cross- over cables reverse the sending and receiving wire pairs from one end to the other. Like device to Like Device connections.
Virtual Server
Technology that enables multiple operating systems to run concurrently on a single machine.
customer satisfaction
The difference between how a customer perceives he or she was treated and how the customer expects to be treated.
metrics
Performance measures.
Caching only Server
Performance only. Contains no zone information.
Lease
The duration the client is allocated the address.
Tunnel Mode
The entire original IP packet is encapsulated with a new packet header added.
Rollback Process
Predefined procedures for backing out of a change.
Layer 6
Presentation
SSID disable
Prevents dynamic discovery of Wifi network.
DHCP Snooping
Prevents rogue DHCP servers from impacting the network.
LACP
Protocol used with etherchannel/port bonding.
Private Cloud
Serves only one customer or organization and can be located on the customer's premises or off the customer's premises.
tcp 25
Simple Mail Transport Protocol(SMTP)
Posture Assessment
The evaluation of system security based on the applications and settings that a particular system is using.
Capture
The method of taking a biometric sample from the end user.
level two
The person or group that resolves incidents that are beyond the scope or authority (such as system access rights or permissions) of level one.
Demarc
The point at which one area of work, responsibility etc ends and another begins. Where the telco hardware intersects with the organization's.
Recovery Point Objective (RPO)
The point in time to which a firm must recover data as defined by the organisation. What an organisation determines is an "acceptable loss" in a disaster situation.
Enrollment Time
The time period a person must spend to have his/her biometric reference template successfully created.
Punch Down Tool
The tool used to install twisted pair cabling into patch panels and wiring closets. It forces the wire down into the insulation displacement connector.
Class C
The type of fire extinguisher used for electrical fires.
Determine if anything has changed
This is the most common root cause of incidents.
Man in the Middle
This type of network attack is when the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker.
Escalation
To raise an incident from one level to another, such as from level one to level two, to dedicate new or additional resources to the incident.
Electrostatic discharge (ESD)
Transfer of charge between bodies at different electrostatic potentials caused by direct contact or induced by electrostatic field.
Broadcast
Transmission type used by DHCP.
Layer 4
Transport
PPTP
Tunneling protocol used with VPNs. Uses TCP port 1723.
Administrative Distance (AD)
Used by routers when you have multiple sources of information about remote networks. They help routers determine which source is more trustworthy, and thus which routing protocol or source will actually populate the routing table.
Circuit Switching
Used by the public switched telephone network to send data over a physical end-to-end circuit.
Autonomous System Number
Used by various routing protocols. IANA allocates AS Numbers to Regional Internet Registries (RIRs). The RIRs further allocate or assign AS Numbers to network operators in line with RIR policies.
Lame Delegation
When an NS record points to an incorrect host.
False Negative
When no alarm is raised when an attack has taken place.
False Acceptance
When a biometric system incorrectly identifies an individual or incorrectly verifies an impostor against a claimed identity.
FTP Bounce
When a client running an FTP utility requests data from an FTP server, it specifies an IP address and port number that is not their own.
Virtual Desktop
When a firm runs an instance of a PC's software on another machine and simply delivers the image of what's executing to the remote device. Using virtualization, a single server can run dozens of PC's, simplifying backup, upgrade, security, and administration.
After Testing
When patches should be applied.
Fail Open
When the control fails, access be allowed.
Fail Close
When the control fails, access will be blocked.
Equal Error Rate
When the decision threshold of a system is set so that the proportion of false rejections will be approximately equal to the proportion of false acceptances.
Active Listening
When the listener participates in a conversation and gives the speaker a sense of confidence that he or she is being heard.
Fully Qualified Domain Name (FQDN)
A domain name that extends all the way back to root.
image
A duplicate copy of some digital media created as part of the forensic process.
Link State
A dynamic routing protocol algorithm that collects a list of all routers and their directly connected networks to build a map of the routing topology.
Distance Vector
A dynamic routing protocol algorithm that uses second hand information to build the routing table. Sometimes refered to as "routing by rumor."
Bastion Host
A strongly protected computer that is in a network protected by a firewall (or is part of a firewall) and is the only host (or one of only a few hosts) in the network that can be directly accessed from networks on the other side of the firewall.
Attacker or Intruder
An entity who tries to find a way to gain unauthorized access to information, inflict harm or engage in other malicious activities.
Near End Cross-talk
An error condition that can occur when connectors are attached to twisted pair cabling. Usually caused by crossed or crushed wire pairs. The error condition does not require that the wires be crushed so much that the conductors inside become exposed.
Speed/Duplex Mismatch
An error state that occurs when autonegotiation fails or ports on either end are configured differently.
False Positive
An event signaling an IDS to produce an alarm when no attack has taken place.
True Negative
An event when no attack has taken place and no detection is made.
Evil Twin
An exploit in which a rogue access point masquerades as a legitimate access point, using the same SSID and potentially other identical settings.
Electrostatic discharge shielding material
Barrier or enclosure that limits the passage of current and attenuates the energy resulting from an electrostatic discharge.
Cleaning
Before any testing, connectors should be cleaned carefully to ensure that no dirt is present on the end face of the connector ferrule as this will cause high loss and reflectance
Reconnaissance Tools
Begins with searches of internet databases including DNS registries,WHOIS databases, Google, on-line news sources, business postings, and many other on-line resources. This phase often includes print media as well, specifically electronically searchable archives that would be found at a college library or large public library
DTE(Data Terminal Equipment)
Can be a router, computer, or some other type of terminal; in all cases, it is a device at the user end of the network.
No Link Light
Can be caused by a fault in cable, port, NIC, or switch. Can also be caused by the Interface being disabled in the OS or BIOS.
Conduit
Circular raceway that cable is run inside. Conduit requirements are specified under appropriate electrical code.
CPU, Memory
Commonly monitored objects.
Unicast
Communication between a single sender and a single receiver over a network.
Half Duplex
Communication between two devices whereby transmission takes place in only one direction at a time.
Full Duplex
Communication that happens in two directions at the same time.
802.11b and 802.11g
Compatible technologies.
backup software
Computer software applications that are used for performing the backing up of data, i.e., the systematic generation of backup copies.
ethical behavior
Conduct that conforms to generally accepted or stated principles of right and wrong.
TFTP
Conection-less, udp 69 , used to transfer files
#ipv6 address 2001:db8:D1A5:C900::1/64
Configures interface with an address.
#ipv6 address autoconfig [default]
Configures stateless autoconfiguration on router.
integrated circuits
ESD can cause a range of harmful effects to these.
Implement the solution or escalate as necessary
Follows - Establish a plan of action to resolve the problem and identify potential effects
Test the theory to determine cause
Follows - Establish a theory of probable cause
Establish a theory of probable cause
Follows - Identify the problem
Verify full system functionality and, if applicable, implement preventative measure
Follows - Implement the solution or escalate as necessary
Establish a plan of action to resolve the problem and identify potential effects
Follows - Test the theory to determine cause
Document findings, actions and outcomes
Follows - Verify full system functionality and, if applicable, implement preventative measure
2^M
Formula for calculating the number of Networks where M is the number of borrowed bits.
2^N-2
Formula for calculating the number of hosts on a network where N is the number of host bits.
UC Gateway
Interconnects UC devices, servers, and systems.
full/half/auto
Interface duplex settings.
10/100/1000/auto
Interface speed settings.
EMI
Interference caused fields of energy.
ACCEPT, REJECT, CHALLENGE
Potential responses from the RADIUS server.
1024 - 49151
Registered or System Ports
ipconfig /release
Release dynamic(DHCP) address.
Statefull Firewall
Remembers active connections, allows only inbound TCP packets from those connections.
tcp 3389
Remote Desktop Protocol (RDP)
Simplify
Remove unnecessary elements when testing.
ipconfig /renew
Renew dynamic(DHCP) address lease.
WPA2
Replace both WEP and WPA. Uses Advanced Encryption Standard (AES) as the encryption method. Can use dynamic keys or pre-shared keys. 2007.
Authentication Server (AS)
Replies to the initial authentication request from the client. Issues a special ticket known as the Ticket Granting Ticket, or more briefly TGT.
Physical Network Diagram
Represent the physical layout of the network.
SNMP Get
Request to query for information on a network entity.
Trouble Ticket:Find distance to break in cable
TDR
False Alarm Rate
The number of 'normal' patterns classified as attacks(False Positive) divided by the total number of 'normal' patterns.
11
The number of allowed channels in the 2.4GHz range in North America.
Bit Rate
The number of bits transmitted per second.
14
The number of channels in the 2.4 GHz range.
12
The number of fields in a IPv4 header.
8
The number of fields in a IPv6 address.
Collision Errors
The number of messages retransmitted. The total number of these with respect to the total number of output packets should be around 0.1 percent or less.
3
The number of non-overlapping channels in the 2.4 GHz range.
40
The number of octets in the IPv6 header.
TTL
The number of seconds remaining on a cached record before it is purged.
level three
The person or group that resolves complex incidents that are beyond the scope of level two.
Two-factor Authentication
Using two different methods to authenticate a user.
Class C Private Range
192.168.0.0/16
DS3
28 DS1 + overhead 44.736Mb/s
Distance
A measure of length that defines the max run between two devices or repeaters for a standard.
Speed
A measure of potential throughput. Expressed in bits per second (b/s).
Mantrap
A device that monitors and controls two interlocking doors to a small room (a vestibule), designed to separate secure and non-secure areas.
Asset Condition
A measure of the health of an asset.
Card Reader
A device that retrieves information stored on an access card and transmits that information to a controller.
Router
A device that routes packets of data between two or more networks.
known error
A problem that has a documented root cause and a workaround.
DS1
1.544 Mbit/s (24 user channels). Used by T-1.
# of hosts on Class A Network
16,777,214
SNMP
161
APIPA address
169.254.x.x
Class B Private Range
172.16.0.0/12
Class C Address Range
192.0.0.0 - 223.255.255.255
Address and Mask
2 Required elements of an IP address
FTP Data
20
FTP Control
21
SSH
22
Class D address range
224.0.0.0 - 239.255.255.255
Telnet
23
Class E address range
240.0.0.0 - 255.255.255.255
SMTP
25
# of hosts on Class C Network
254
CIDR /12
255.240.0.0
CIDR /14
255.252.0.0
Class B mask
255.255.0.0
CIDR /17
255.255.128.0
CIDR /19
255.255.224.0
CIDR /27
255.255.255.224
CIDR /28
255.255.255.240
CIDR /29
255.255.255.248
CIDR /30
255.255.255.252
HSPA+
A 3G mobile wireless technology that uses MIMO and sophisticated encoding techniques to achieve a maximum 84 mbps downlink throughput and 11 mbps uplink throughput inits current release. Advances in more efficiently using limited channels and incorporating more antennas in MIMO promise to push the maximum downlink data rate to 336 mbps.
ATM
A Cell Switching network that can be used on the LAN(Backbone) and WAN. Suitable for Voice, Data, and Video.
Rollover Cable
A Cisco proprietary cable used to connect a computer system to a router or switch console port.
Certificate
A Data Record that contains the information as defined in the X.509 Format.
Change Schedule
A Document that lists all approved Change Proposals and Changes and their planned implementation dates.
CSU/DSU(Channel service unit/data service unit)
A Layer 1 device that connects your serial ports on your router to the provider's network and connects directly to the demarcation point (demark) or location.
Unmanaged Switch
A basic Layer 2 switch. This will work simply by plugging it in and connecting it. It is not configurable.
Packet Filter
A basic level of network access control that is based upon information contained in the IP packet header. Source/Destination: Address/Port: Incoming/Outgoing
Hand Geometry
A biometric access control technology that verifies a person's identity by using the variations in hand size, finger length, and finger thickness.
Signature Verification
A biometric identification method using a person's signature characteristics (writing speed, pen pressure, shape of loops, etc.) to identify that person.
decision tree
A branching structure of questions and possible answers designed to lead an analyst to a solution.
dashboard
A bright display that sends out visual and, in some cases, audible messages to service desk staff and to customer sites that have dashboards installed; also known as electronic reader board.
Patch Cable
A cable assembly with modular plugs on each end. Used for patching equipment to the patch panel in the equipment room and also used to connect to phones and computers at the drop.
Coaxial
A cable consisting of a core, inner conductor that is surrounding by an insulator, an outer cylindrical conductor.
T1 Crossover
A cable is used to connect two T1 CSU/DSU devices in a back-to-back configuration.
Thin Client
A client that relies on another host for the majority of processing and hard disk resources necessary to run applications and share files over the network.
Community Cloud
A cloud that is open only to specific organizations that have common concerns.
RG-6
A coaxial cable that uses F-type screw-on connectors. It is used for digital data, such as from a cable TV company.
Application Recovery
A component of Disaster Recovery that deals with the restoration of business system software and data, after the operating system environment has been restored or replaced.
Single Point of Failure
A component or entity in a system which, if it no longer functions, would adversely affect the entire system.
LAN
A computer network that interconnects computers within a limited area such as a residence, school, laboratory, or office building.
PAN
A computer network used for data transmission among devices such as computers, telephones and personal digital assistants.
Multilayer Switch
A computer networking device that switches on OSI layer 2 like an ordinary network switch and provides extra functions on higher OSI layers, like layer 3.
Critical Node
A computer system whose disruption or destruction immediately degrades the ability of an organization to command, control, or effectively conduct operations.
Honeypot
A computer, data, or network site that is designed to be enticing to crackers so as to detect, deflect, or counteract illegal activity.
Metro Ethernet
A data transfer service that can interconnect two businesses at any distance using standard 802.3 protocols.
Asset Database
A database containing asset related information.
SNMP MIBS
A database used for managing the entities in a communication network. Maps the OIDs on the device to fields.
Broadcast
A datagram or frame addressed to the all hosts address. Typically local.
Load Balancer
A dedicated network device that can direct/distribute requests to more than one server based on a variety of factors.
Worm
A destructive computer program that bores its way through a computer's files or through a computer's network.
Firewall
A device designed to prevent unauthorized access to your computer when connected to a network such as the Internet.
Conductor
A device designed to transmit electricity, heat, etc.
VPN Concentrator
A device that aggregates VPN connections. It is the entry point for VPN clients to the network.
MUX (Multiplexer)
A device that combine multiple signals for transmission over a single line. The signals are demultiplexed (DEMUX'd), or separated, at the receiving end.
Proximity Reader
A device that detects an emitted signal in order to identify the owner.
Media Converter
A device that enables networks or segments using different media to interconnect and exchange signals.
Network Sniffer
A device that has access to the signaling on the network cable.
Exit Alarm
A device that indicates (either audibly or silently) that a secure door has been forced opened.
Switch
A device that interconnects nodes on a network segment.
Antenna
A device that transmits and/or receives electromagnetic waves.
CSU/DSU(Channel service unit/digital service unit)
A device that understands the Layer 1 details of serial links installed by a telco and how to use a serial cable to communicate with networking equipment such as routers.
Content Filter
A device/program to screen and exclude from access or availability Web pages or e-mail that is deemed objectionable.
Electrical Safety Program
A documented program that identifies policies, procedures, principles and safe work practices to protect workers exposed to electrical energy.
Ether Channel/Bonding/Link Aggregation/Teaming
A feature in which up to eight parallel Ethernet segments between the same two devices, each using the same speed, can be combined to act as a single link for forwarding and Spanning Tree Protocol logic.
VLAN Pooling
A feature that enables you to group multiple wireless controller VLANs to load-balance sessions evenly.
Image
A file or directory that contains, at a minimum, the encapsulated components of a guest OS.
Vulnerability
A flaw or weakness that allows a threat agent to bypass security.
Satellite
A form of connectivity that has high latency but can be used from almost any location.
Bare metal virtualization
A form of full virtualization where the hypervisor runs directly on the underlying hardware, without a host operating system.
Hosted virtualization
A form of full virtualization where the hypervisor runs on top of a host OS.
Packet Shaper
A form of traffic shaping. The goal of traffic shaping is to delay metered traffic such that each packet complies with the relevant traffic contract. This is common in Quality of Service (QoS) implementations in which traffic must not exceed the administratively defined rate.
Full virtualization
A form of virtualization where one or more operating systems and the applications they contain are run on top of virtualized hardware.
Request for Change (RFC)
A formal request for a Change to be implemented. An RFC, specifying the details of the proposed Change, must be submitted to Change Management for every non-standard Change.
EAP
A framework to define additional authentication mechanisms other than username and password.
Industrial control system (ICS)
A general term that encompasses several types of control systems used in industrial production, including supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and other smaller control system configurations such as programmable logic controllers (PLC) often found in the industrial sectors and critical infrastructures.
Attenuation
A general term that refers to any reduction in the strength of a signal. A natural consequence of signal transmission over long distances.
SSL
A general-purpose protocol developed by Netscape for managing the encryption of information being transmitted over the Internet.
Token
A generic term for an authentication device.
RAS (Remote Access Server)
A generic term to describe the concentrator/end point for remote clients.
Pool
A group of addresses that can be leased to clients.
SNMP Agent
A hardware device or software program that reports to an SNMP manager.
Microwave
A high volume, long distance, point-to-point transmission in which microwaves are used to transmit signals through atmosphere from one transmission station to another.
Routing Table
A list of information about all known networks and the next hop for each network.
ACL
A list of rules used to grant access to a resource. In a firewall, it identifies traffic that is allowed or blocked based on IP addresses, networks, ports, and some protocols (using the protocol ID).
Cipher Lock
A lock controlled by touch screen, typically 5 to 10 digits that when pushed in the right combination the lock will releases and allows entry.
Application Log
A log that racks events that are related to applications running on the computer. Can be viewed using the Event Viewer utility.
Virtual Switch
A logically defined device that is created and managed by virtualization software and that operates at the Data Link layer. Ports on a ___ connect virtual machines with a network, whether virtual or physical, through the host's physical NIC.
Static Route
A manually created route.
Actuator
A manually operated or automatically controlled switch or sensor which initiates a signal that can be processed by an access control system.
Dynamic NAT and PAT
A many to one mapping used to give private clients access to public networks (Internet)
War Chalking
A mark on a building created by a war driver to specify where a hotspot exists. People "in the know" look for these marks to identify hotspots for their use.
Unified Voice Services
A marketing buzzword describing the integration of real-time, enterprise, communication services such as instant messaging (chat), presence information, voice (including IP telephony), mobility features (including extension mobility and single number reach), audio, web & video conferencing, fixed-mobile convergence (FMC), desktop sharing, data sharing (including web connected electronic interactive whiteboards), call control and speech recognition with non-real-time communication services such as unified messaging (integrated voicemail, e-mail, SMS and fax).
Insulator
A material that does not allow heat or electrons to move through it easily.
critical success factor
A measurable characteristic that must exist for something - such as a process, project or team - to be viewed as successful.
Benefit
A measurable improvement, resulting from change, which is considered advantageous by at least one stakeholder, and contributes to the overall organizational objectives.
MPLS(Multi Protocol Label Switching)
A mechanism for using a shared IP network to securely carry traffic from many, possibly unrelated systems while allowing for differentiated handling to ensure quality of service to critical or time sensitive applications.
SNMP Trap
A message that a network device sends to alert an SNMP manager about an event or a failure.
Paravirtualization
A method for a hypervisor to offer interfaces to a guest OS that the guest OS can use instead of the normal hardware interfaces.
backup rotation scheme
A method for effectively backing up data where multiple media are systematically moved from storage to usage in the backup process and back to storage. There are several different schemes. Each takes a different approach to balance the need for a long retention period with frequently backing up changes.
WPA
A method for encrypting data transmitted over wireless networks. Uses PSKs and TKIP.
Snapshot
A record of the state of a running image, generally captured as the differences between an image and the current state.
patch analysis
A method of checking a system to determine which patches are appropriate for the system.
MAC Filtering
A method of controlling access on a wired or wireless network by denying access to an device that their MAC address does not match one that is on a pre-approved list.
MAC Filtering
A method of controlling access on a wired or wireless network by denying access to an device that their MAC address does not match one that is on a pre-approved list. Layer 2.
OFDM
A method of encoding digital data on multiple carrier frequencies.
NAT
A method of mapping one or more private, reserved IP addresses to one or more public IP addresses.
Multicast
A method of sending Internet Protocol (IP) datagrams to a group of interested receivers in a single transmission.
root cause analysis
A methodical way of determining why problems occur and identifying ways to prevent them.
Cost
A metric that assigns a number to a interface to calculate route.
Latency
A metric that considers delay.
Bandwidth
A metric that considers the link speed in the path.
RTU (Remote Terminal Unit)
A microprocessor-controlled electronic device that interfaces objects in the physical world to a distributed control system or SCADA (supervisory control and data acquisition) system by transmitting telemetry data to a master system, and by using messages from the master supervisory system to control connected objects.
DSSM
A modulation technique. Carrier signals occur over the full bandwidth (spectrum) of a device's transmitting frequency.
Analog Modem
A modulator/demodulator device that allows computers to communicate with one another over existing phone lines.
Protocol Analyzer
A monitoring device or a computer with monitoring software that captures each packet to decode & analyze its contents. Also called a sniffer.
GAN(Global Area Network)
A network composed of different interconnected computer networks that cover an unlimited geographical area.
Protected network
A network segment or segments to which access is controlled.
Medianets
A network that is optimized for high-traffic video.
SAN
A network which provides access to consolidated, block level data storage.
COS (Class of Service)
A parameter used in data and voice protocols to differentiate the types of payloads contained in the packet being transmitted. The objective of such differentiation is generally associated with assigning priorities to the data payload or access levels to the telephone call.
nonstandard patch
A patch that cannot be installed by using normal procedures.
NESSUS
A penetration-testing tool from Tenable Security that performs sophisticated scans to discover information about hosts, ports, services, and software.
OTDR
A performance testing device for use with fiber-optic networks. It works by issuing a light-based signal on a fiber-optic cable and measuring the way in which the signal bounces back.
MAC Address
A permanent address given to each network interface card (NIC) at the factory. This address enables the device to access the network via a Level-2 protocol.
Customer
A person who buys products or services.
Enrollee
A person who has a biometric reference template on file.
Security Guard
A person who provides security checks on staff/ visitors on coming in and out of the organisation.
peer-to-peer support
A practice in which users bypass the formal support structure and seek assistance from their coworkers or someone in another department.
Standard Change
A pre-authorized change that is low risk, relatively common and follows a procedure or work instruction. Deploying a new desktop for example.
Business Recovery Team
A pre-identified group of individuals that is reponsible for maintaining and executing the recovery process.
Count to Infinity
A problem with Distance Vector Protocols that slows convergence and can cause routing loops., Problem that occurs in distance vector routing protocols where router slowly increases metric for a failed route unit it reaches maximum defined metric value.
Physical to Virtual(P2V)
A process in which an existing physical computer is converted into a virtual machine.
LWAPP
A protocol that can control multiple Wi-Fi wireless access points at once. This can reduce the amount of time spent on configuring, monitoring or troubleshooting a large network.
WPA cracking
A security exploit in which a hacker uses a program to discover a WPA key.
patch incompatibility
A rare situation where two patches cannot be on the same system.
WiMAX
A recent wireless technology that can deliver maximum speeds of up to 7 Mbps to your cell phone, home computer, or car. Stands for Worldwide Interoperability for Microwave Access.
Hot Site
A remote physical location where you can maintain copies of all of your critical systems, such as trading applications, data, and documents.
keystore
A repository of certificates and keys that is queried when you attempt to apply a signed patch.
Proxy
A request for a connection made on behalf of a host.
Query
A request for records of a certain name to be sent to a certain DNS server.
Recursive Query
A request from a host to a resolver to find data on other name servers.
Iterative query
A request, usually made by a resolver, for any information a server already has in memory for a certain domain name.
Notification of Change
A requirement to inform all stakeholders of a pending change whiten a given time interval.
Quarantine Network
A restricted network where hosts are place when they are not complient with NAC policies.
EGP (Exterior Gateway Protocol)
A routing protocol used between autonomous systems.
IGP (Interior Gateway Protocol)
A routing protocol used inside an autonomous system.
fuzzy logic
A searching technique that presents all possible solutions that are similar to the search criteria, even when conflicting information exists or no exact match is present.
WEP cracking
A security exploit in which a hacker uses a program to discover a WEP key.
Firewall
A security system consisting of a combination of hardware and software that limits the exposure of a computer or computer network to attack from crackers
customer satisfaction survey
A series of questions that ask customers to provide their perception of the support services being offered.
Audit server
A server that can determine the posture credentials of a host without relying on the presence of a PA on the host. The server must be able to determine the posture credentials of a host and act as a posture-validation server.
RADIUS Server
A server that offers centralized authentication services to a network's access server, VPN server, or wireless access point.
follow the sun
A service desk approach that enables an organization to provide 24-hour coverage by having regional service desks working only during the usual business hours for their location.
Relay Agent
A service the listens for DHCP broadcast request and forwards them via unicast to a DHCP server on another sunbet. Sometimes refered to as IP Helper or BootP Forwarder.
Keypad
A set of buttons or keys bearing digits, symbols and/or alphabetical letters placed in order.
VTC (VideoTeleconference)
A set of telecommunication technologies which allow two or more locations to communicate by simultaneous two-way video and audio transmissions. It has also been called 'visual collaboration' and is a type of groupware.
Alert/Alarm
A signal suggesting that a system has been or is being attacked.
Hop Count
A simple metric that only considers the number of routers in the path.
Closed Ended Question
A simple question that requires a simple answer(yes/no).
Virtual machine
A simulated environment created by virtualization.
centralized service desk
A single service desk that supports all of the technologies used by its customers.
Trunk
A single transmission channel between two points on the network: each point is either a switching center or a node (such as a telephone).
BGP
A standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the Internet.
SCADA (supervisory control and data acquisition)
A system for remote monitoring and control that operates with coded signals over communication channels
Business Continuity
A system of planning for, recovering and maintaining both the IT and business environments within an organisation regardless of the type of interruption. In addition to the IT infrastructure, it covers people, facilities, workplaces, equipment, business processes, and more.
customer surveying system
A system that is used to create and distribute questionnaires to customers and to collect and tabulate the results of their feedback.
Phishing
A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail
DWDM(Dense Wavelength Division Multiplexing)
A technology that allows multiple streams of information together on an optical fiber using different wavelengths of laser light to carry different signals. Also known as Wavelength Division Multiplexing (WDM).
PON(Passive Optical Network)
A telecommunications network that uses point-to-multipoint fiber to the premises in which unpowered optical splitters are used to enable a single optical fiber to serve multiple premises.
ISDN(Integrated Services Digital Network)
A telephone company service that transports data digitally over dial-up or dedicated lines.
Smart Jack
A termination for T-carrier wire pairs that is located at the customer demark and which functions as a connection protection and monitoring point.
Butt Set
A tool for accessing and testing a telephone company's local loop.
Cable Tester
A tool for testing if a cable can connect properly end-to-end and to determine if a cable has a short. These tools are available for a variety of cable types.
Network Firewall
A traffic filtering network device used to protect multiple systems within a network
Broadband
A transmission facility which has sufficient bandwidth to simultaneously carry multiple voice, video or data channels.
Broadband
A transmission technique that carries more than one type of transmission on the same medium, such as cable modem or DSL.
Shock
A trauma subjected to the body by electrical current. When personnel come in contact with energized conductors, it can result in current flowing through their body often causing serious injury or death.
Tri-homed firewall
A tri-homed firewalls connect three network segments with different network addresses. Typically, these would be protected, DMZ, and unprotected segments.
Straight-Through Cable
A twisted pair patch cable in which the wire terminations in both connectors follow the same scheme.
CAT5
A type of UTP Cabling that is rated up to 100 Mbps.
CAT6
A type of UTP Cabling that is rated up to 1000 Mbps and uses RJ-45 connectors.
CAT4
A type of UTP Cabling that is rated up to 16 Mbps.
Cable
A type of broadband internet connection that uses a television cable service provider to connect to the internet
RG-59
A type of coaxial cable characterized by a 75-ohm impedance and a 20 or 22 AW.
WLAN
A wireless computer network that links two or more devices using a wireless distribution method (often spread-spectrum or OFDM radio) within a limited area such as a home, school, computer laboratory, or office building.
Guest Network
A wireless router (or Wi-Fi router) feature that is designed to allow users to easily grant "visitor" access to your wireless Internet connection.
Split Pair
A wiring error where two wires of a twisted pair are instead connected using two wires from different pairs, potentially creating interference.
Reverse Zone
A zone whose purpose is the mapping of IP addresses to names.
TACACS+
AAA Service that uses TCP.
RADIUS
AAA Service that uses udp.
RADIUS, TACACS+
AAA authentication protocols used with 802.1x.
Looking Glass Site
Accessed remotely for the purpose of viewing routing information. Essentially, the server acts as a limited, read-only portal to routers of whatever organization is running the server.
TCP
Acknowledged, Connection Orientated
DORA
Acronym used to describe the DHCP process.
route add 10.0.0.0 mask 255.0.0.0 192.168.1.1
Add a route.
Options/Tags
Additional IP parameters that are passed to the client as part of the DHCP process.
NAC
Adds policies to the network for controlling access by devices and users. Policies may be based on device and/or user authentication and the status of endpoint configuration.
Full Control, Better Logging and Monitoring
Advantages to Manual Addressing
ARP Inspection
Allows a network administrator to intercept, log, and discard ARP packets with invalid MAC address to IP address bindings. When using a transparent firewall, you can protect devices in your network from a malicious device that tries to impersonate the default gateway by using this feature.
VPN
Allows a secure private connection over a public network, using an encrypted 'tunnel'. For example, a remote computer can securely connect to a LAN, as though it were physically connected.
Secure Area
Allows collection of evidence with minimal contamination.
Managed Switch
Allows configuration.
SSID enable
Allows dynamic discovery of Wifi network.
capacitors
Always discharge before working on.
Automated Attendant
An ACD feature that routes calls based on input provided by the caller through a touch-tone telephone.
SNMP Walk
An SNMP application that uses SNMP GETNEXT requests to query a network entity for a tree of information.
802.1X
An IEEE authentication protocol. Commonly used to authenticate a computer's access to a switch or wireless access point.
Route Aggregation
An alternate term for route summarization, which is a method used to minimize the number of routing tables required in an IP network.
antistatic wrist strap
An antistatic device used to safely ground a person working on very sensitive electronic equipment, to prevent the buildup of static electricity on their body, which can result in electrostatic discharge (ESD).
SDN
An approach to computer networking that allows network administrators to manage network services through abstraction of higher-level functionality.
Change management
An approach to moving organizations and their stakeholders, in an organized manner, from their current state to a desired future state.
SIEM
An approach to security management that seeks to provide a holistic view of an organization's information technology (IT) security.
Label
An appropriate group of written, printed or graphic information elements concerning a hazardous product, selected as relevant to the target sector(s), that is affixed to, printed on, or attached to the immediate container of a hazardous product, or to the outside packaging of a hazardous product.
Session Hijacking
An attack in which an attacker attempts to impersonate the user by using his session token.
Smurf Attack
An attack that broadcasts a ping (ICMP echo) request to all computers on the network yet changes the address from which the quest came to that of the target.
Kerberos
An authentication system developed by the MIT and used to verify the identity of networked users. Uses Tickets and is Time Sensitive.
Biometrics
An automated method of recognising a person based on physical characteristics. Among the features measured are face, fingerprints, hand geometry, iris and voice.
Fail-Secure
An electric lock that requires power to unlock. Also called fail-locked.
short
An electrical circuit that allows a current to travel along an unintended path, often where essentially no (or a very low) electrical impedance is encountered.
Inside Threat
An employee or contractor.
HIPS
An extension of a host-based IDS. Designed to react in real time to catch an attack in action.
DSL Modem
An external device that connects your computer to a DSL line.
Collision/Contention Domain
An group of ports that have competition for time on the wire. The risk of two nodes transmitting at the same time and causing collisions exist.
Badge
An identification card usually displaying a cardholder's photo, signature or other specific identifying characteristics.
Line of Sight
An imaginary straight line between two end points. The curvature of the earth can effect the total allowed distance.
Data Breach
An incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so
Open Circuit
An incomplete electrical circuit in which no current flows.
patch dependency
An instance where a patch depends on the existence of another patch on a system. A patch that depends on one or more patches can only be applied to a system when those other patches have already been applied.
superseded patch
An instance where a patch replaces another patch even if it has not already been applied to a system.
Themometer
An instrument that measures temperature.
Frame Relay
An international standard data-link protocol that defines the capabilities to create a frame-switched (packet-switched) service, allowing DTE devices (typically routers) to send data to many other devices using a single physical connection to the Frame Relay service.
Asset
An object (physical or intangible) that has an identifiable value.
Transceiver
An optical device that serves as both transmitter and receiver.
Giants Errors
Any Ethernet frame that is greater than 1518 bytes
Event
Any change of status in a managed object in the network.
SaaS
Applications provided over the Internet. Webmail is an example of a cloud-based technology.
ESD - protected area (EPA)
Area in which ESDS can be handled with accepted reduced risk of damage as a result of electrostatic discharge or fields.
Gather Infomation
Ask questions, collect error messages.
AAA
Authentication, Authorization, Accounting.
FE80 + MAC in EUI-64 format
Autoconfigured Link local address.
Dynamic
Automatic Addressing through DHCP
copy backup
Backs up the selected files, but does not mark the files as backed up (reset the archive bit).
full backup
Backup of all (selected) files on the system.
site-to-site backup
Backup, over the internet, to an offsite location under the user's control.
Trouble Ticket:Test analogue phone system
Butt Set
autonegotiation
Chooses optimal speed and duplex configuration
Trouble Ticket:Validate cable funtionality
Cable Certifier
Trouble Ticket:Test cable continuity
Cable Tester
Hardening
Changing the default settings to increase security.
NBMA (Nonbroadcast Multiaccess.)
Characterization of a type of Layer 2 network in which more than two device connect to the network, but the network does not allow broadcast frames to be sent to all devices on the network.
NBMA (Nonbroadcast Multiaccess)
Characterization of a type of Layer 2 network in which more than two device connect to the network, but the network does not allow broadcast frames to be sent to all devices on the network. Frame Relay uses this.
Port Mirroring/Spanning
Copies the traffic from one, a group, or all ports to a single port and disallows bidirectional traffic on that port. Used to view traffic on other ports in a switched environment.
IDF(Intermediate Distribution Frame)
Cross-connects the user cable media to individual user line circuits and may serve as a distribution point for multipair cables from the main distribution frame (MDF). Wiring Closest.
Hub to Hub
Crossover cable required.
Cellular WAN
Data communications over the cellular telecommunications networks.
Routing Loop
Data is forwarded back to the router that sent the data packets.
Encapsulation
Data is processed from the time an application creates it to the time it reaches the network medium. This process includes adding information such as addresses and ports.
backout data
Data that is created when a patch is applied to enable the system to return to its previous state if the patch is remove.
IDS
Detects/Passive Response
High Availability
Describes a system's ability to continue processing and functioning for a certain period of time - normally a very high percentage of time, for example 99.999%.
Neighbors
Describes routers that same a network ID.
Logical Topology
Describes the data flow on the network between the individual nodes
Hotspot
Designated locations where WiFi access is available.
WEP
Designed to provide wireless connections with the same security as wired connections. Has weaknesses: Static Pre-shared Keys (PSK). 1997.
255.255.255.255
Destination address of DHCP packets.
ICMPv6 Error Messages
Destination unreachable. packet to Big. Time Exceeded.
ipconfig /all
Detailed address information.
Forensics Report
Detailed report on evidence collected as part of the investigation.
Ticket Granting Server (TGS)
Distributes service tickets to clients with a valid TGT, guaranteeing the authenticity of the identity for obtaining the requested resource on the application servers.
Disconnect
Do this to the power source before servicing or repairing electrical equipment.
Chain of Custody
Documents that the evidence was under strict control at all times and no unauthorized person was given the opportunity to corrupt the evidence
tcp/udp 53
Domain Name Service (DNS)
Link Status 0 (Off)
Down, block packets.
capacitors
Drain these before working near them and keep the short circuit on the terminals during the work to prevent electrical shock.
War Driving
Driving around an area with a Wi-Fi-enabled computer or mobile device to find a Wi-Fi network to access and use without authorization.
#ipv6 unicast-routing
Enables IPv6 routing.
AES
Encryption standard used in WiFi.
Symmetric Cryptography
Encryption that uses a single key to encrypt and decrypt a message.
ER
Extended Reach
Demarc Extension
Extends the demarcation point from its original location to another location within the building. Typically consists of a single wire bundle that attaches to the existing demarc and supplies a termination point to a different location. You will need to install an extension to place the demarc into the IDF on your floor. You might need a demarc extension if your network occupies an upper floor of a building.
Critical Asset
Facilities, systems, and equipment which, if destroyed, degraded, or otherwise rendered unavailable, would affect the reliability or operability of the organization.
Failure to Acquire
Failure of a biometric system to capture and extract biometric data.
Spoofing
Faking the sending address of a transmission in order to gain illegal entry into a secure system.
Multimode Fiber
Fiber-optic that supports multiple concurrent communication signal. Commonly implemented in LAN solutions.
tcp 21
File Transfer Protocol - Control (FTP)
tcp 20
File Transfer Protocol - Data (FTP)
Interface Duplex Setting
Full,1/2, or auto
Sampling Size
General rule is always to use the largest sample possible.
BPL
High-speed Internet access delivered over the electrical grid. Home user LAN implementations support speeds of up to 200 Mb/s.
Singlemode Fiber
High-speed, high distance cable. Consists of one, sometimes two, strands of glass fiber. Transmitted end to end and pulsed to create communication. Up to 50 times more effective than multimode fiber.
bit 7 of the vendor OUI
Indicates scope of address. 0 for global. 1 for local.
one hand
If it is safe to do so, work with only one hand, keeping the other hand at your side or in your pocket, away from all conductive material. This precaution reduces the likelihood of accidents that result in current passing through the chest cavity.
Did it ever work?
If not, the answer may be related to problems with the initial configuration.
Logical Network Diagram
Illustrates the network architecture of a group of interconnected computers and other devices, such as printers, modems, switches, routers, and even mobile devices.
Remote Access VPN (Client-to-Site)
Implementation that allows users to gain secure access to the organization 's network resources. location to which the user is connecting has a VPN gateway, and users have software on their PC's that allow them to create secure connections
Remote Access VPN (Client-to-Site,Host-to-site)
Implementation that allows users to gain secure access to the organization 's network resources. location to which the user is connecting has a VPN gateway, and users have software on their PC's that allow them to create secure connections
Asymmetric Cryptography
In this Cryptography a Key Pair - Private and Public Key is used. Private Key is kept secret and the Public Key is Widely distributed.
Kerberos Realm
Indicates an authentication administrative domain.
Wireless Channel Utilization
Indicates how much 802.11 traffic the AP can "hear" on its channel, from all sources.
CRC Errors
Indicates that the checksum generated by the originating LAN station or far-end device does not match the checksum calculated from the data received. The presence of many of these errors but not many collisions is an indication of excessive noise.
35 meters
Indoor range of 802.11a and b.
38 meters
Indoor range of 802.11g.
70 meters
Indoor range of 802.11n.
ESS(Extended Service Set)
Infrastructure Mode with more than one WAPs.
BSS(Basic Service Set)
Infrastructure Mode with one WAP.
SRV Record
Intended to provide information on available services.
PTR Record
Ip to Name
Local or Global
Is the disruption affecting a single user or a group of users.
Certificate Authority (CA)
Issuer of the Digital Certificate. Also validates the Identity of the End-Entity that posseses the Digital Certificate.
Bend Radius
It is usually safe in assuming a minimum long-term low-stress radius not less than 15 times the cable diameter. Beside mechanical destruction, another reason why one should avoid excessive bending of fiber-optic cables is to minimize microbending and macrobending losses.
Environmental Monitoring
Keeping track of the changes in environmental factors. Temperature and humidity.
IPv6 Features
Larger address space. Simpler header. Security and mobility. Transaction richness.
bit
Layer 1 Keyword
Hub
Layer 1 Multiport Repeater
DataLink
Layer 2
Switch
Layer 2 Concentrator
Switch
Layer 2 Device
frame
Layer 2 Keyword
Frames
Layer 2 PDU
LLC
Layer 2 Sub-Layer
Network
Layer 3
Asset Inventory
List of assets containing sufficient information about the assets to physically locate and identify them.
NMAP
Network exploration tool and security / port scanner.
Goodput
Measures the usable data over a period of time.
Quantitative
Measures which indicate a level of performance and where the increase or decrease in these measures can be valued.
Qualitative
Measures which indicate a level of performance but which cannot be given a specific value.
QoS
Mechanisms to ensure that limited network resources are prioritized based on traffic content. Traffic Shaping.
CSMA/CA
Media access method used by WiFi. Avoids collisions by sending an intent to transmit before sending data.
Half-Duplex
Mode used by WiFi.
Partial Mesh
Most devices are connected to each other but not all and ones that aren't have to connect to others by going through others that are connected
WAN(Wide Area Network)
Multi location. Low Speed. Uses Public Teclo/Provider.
MMF
Multi-Mode Fiber
Hub
Multi-port repeater. Legacy Ethernet.
One to Many transmission
Multicast
SMNP
Network maganment, udp 161
nbtstat
Netbios name information.
Layer 3
Network
All host bits set to 0(off)
Network Address
udp 123
Network Time Protocol (NTP)
CAT6a
Newer CAT ratings of cable that is not yet the standard.
Security Log
One of the logs in Event Viewer. It records security events, such as when users enter incorrect passwords.
Point to Multipoint
One point has direct connections to a # of different points.
Multicast
One to Many transmission
Unicast
One to One transmission
Resource Record
One unit of data in the domain name system.
Qualified Person
One who has the skills and knowledge related to the construction and operation of the electrical equipment and installations and has received safety training to recognize and avoid the hazards involved.
Unicast
One-to-One communication.
DMZ
Part of a network on which you place servers that must be accessible by sources both outside and inside your network.
Egress
Passage through an opening in the exit direction, especially passage that leads out of a structure.
Logical Ring
Passes data transmissions from one node to the next, until it returns to the originator.
IEEE 802.3at
PoE+. Power over Ethernet+.
IEEE 802.3af
PoE. Power over Ethernet.
AUP
Policy that outlines the activities for which the computer and network may and may not be used.
APC(angled physical contact)
Polished at an eight degree angle, which reduces the amount of light reflected between the two connected fibers.
Auto-MDIX
Ports on newer network interfaces detect if the connection would require a crossover, and automatically chooses the MDI or MDIX configuration to properly match the other end of the link.
tcp 110
Post Office Protocol (POP3)
EIA/TIA
Produces guidelines for how network cable should be installed in commercial buildings.
IPS
Protects/Active Response
Socket
Protocol : Address : Port
Trouble Ticket:View network traffic
Protocol Analyzer
SSH
Protocol that administrates servers/routers/switches remotely and securely(22/tcp). Depreciates telnet(23/tcp)
SSH
Protocol that administrates servers/routers/switches remotely and securely.
PLC (Programmable logic controller)
Provide boolean logic operations, timers, and (in some models) continuous control. The proportional, integral, and/or differential gains of the _____ continuous control feature may be tuned to provide the desired tolerance as well as the rate of self-correction during process upsets. _____ are used extensively in process-based industries. ____ are computer-based solid-state devices that control industrial equipment and processes.
ESP (Encapsulating Security Payloads)
Provide confidentiality, data-origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic-flow confidentiality.
SA (Security Associations)
Provide the bundle of algorithms and data that provide the parameters necessary to AH and/or ESP operations.
DNS Server
Provides Name Resolution
PaaS
Provides OS and maybe server software.
ISAKMP
Provides a framework for authentication and key exchange.
Cable Modem
Provides high-speed Internet connections through the cable television network.
Neighbor Discovery
Provides same functionality as ARP. Use multicast.
WPA Enterprise
Requires an authentication server using Remote Authentication Dial-In User Service and the 802.1x authentication protocol.
DCE(Data Communication Equipment)
Provides timing services, WAN access - Provider end.
UC Servers
Provides unified communication service.
Access Point
Provides wireless communication to devices on a wireless network.
Grounding
Providing a path for electric charges to flow safely into the ground.
Trouble Ticket:Terminate cross connects to block
Punch Down Tool
ipconfig /flushdns
Purge host name cache.
categorization
Recording the type of incident being reported.
Default Gateway
Router Address
ICMP type 134
Router Advertisement Packet.
ICMP type 133
Router Solicitation Packet.
Channels
Routes of communication to and from the help desk, such as the telephone, voice mail, e-mail, and the Web.
AUP (Acceptable Use Policy )
Rules or guidelines for the proper use of technology or digital devices within an organization.
udp 161
SNMP port
udp 514
SYSLOG port
Gererator
Secondary power source that provides continuation of operations during power loss(hours/days).
tcp 22
Secure Shell (SSH)
SSH
Secure Shell, tcp 22, Linux and Cisco remote Management
tcp 443
Secure WEB (HTTPS)
HTTPS
Secure WWW, tcp 443
customer service
Services that ensure customers receive maximum value for the products or services they purchase.
customer support
Services that help a customer understand and benefit from a product's capabilities by answering questions, solving problems, and providing training.
Virtual Terminals
Session access points for simultaneous access to a Cisco device(ie telnet,ssh).
SR
Short Range
Ignored Errors
Shows the number of received packets ignored by the interface because the interface hardware ran low on internal buffers. These buffers are different from the system buffers mentioned previously in the buffer description. Broadcast storms and bursts of noise can cause the ignored count to be increased.
Absorption
Signal loss created by light energy turning into heat.
Discovery types
Solicitation and Advertisement.
Ticket
Something a client presents to an application server to demonstrate the authenticity of its identity.
standard patch
Standard patches are those that adhere to the OS patching specification and are installable by using the standard methods.
NSlookup
Standard tool for querying name servers in command line operating systems.
Knowledgebase
Stored repository of organized knowledge.
Computer to Switch
Straight through cable required.
SNMPv3
Supports strong authentication with MD5 or SHA, providing confidentiality (encryption) and data integrity of messages via DES or DES-256 encryption between agents and managers to provide an NMS get and trap information.
SDH
Synchronous Digital Hierarchy - Standardized multiplexing protocol that trnasfers multiple digital streams over fiber
MDF(Main Distribution Fame)
Terminates IDFs. Primary Distribution Point. Data Center.
Speed Test Site
Test how much traffic you can push through internet connection(website).
Testing
Test potential solutions one at a time.
Community String
Text string that acts as a password and is used to authenticate messages sent between a management station and a router containing a SNMP agent. The community string is sent in every packet between the manager and the agent.
SOA Record
The SOA is the first record in every properly configured zone. The SOA record contains information about the zone in a string of fields.
Escape
The act of breaking out of a guest OS to gain access to the hypervisor, other guest OSs, or the underlying host OS.
Caching
The act of recording authoritative response to resolver queries for future reference.
Test
The action we take on the theory of probable cause.
Physical Topology
The actual layout of network devices, wires, and cables.
On-boarding
The addition of a new employee to an organization's identity and access management (IAM) system. The term is also used if an employee changes roles within the organization and is granted new or expanded access privileges.
Next Hop
The address of the router that gets the information going to a particular network.
Bandwidth
The amount of data that can or is transmitted over a network in a given amount of time.
retention time
The amount of time in which a given set of data will remain available for restore.
Convergence
The amount of time it takes all routers to have up-to-date information (Steady State) after a change.
restore time
The amount of time required to bring a desired data set back from the backup media.
Macrobending
The attenuation associated with bending or wrapping the fiber. Light can leak out of fiber when the fiber is bent.
Vulnerability Scanning
The automated process of proactively identifying security vulnerabilities of computing systems in a network in order to determine if and where a system can be exploited and/or threatened.
Average Call Duration
The average length of time required to handle a call.
Average Wait Time
The average number of minutes a caller waits for an analyst after being placed in the queue by an ACD; also known as average queue time.
Campus
The buildings and grounds of a college, university, or large corporate facility.
Backbone Wiring
The cabling used between telecommunication closets, entrance facilities, equipment rooms, or buildings.
IaaS
The cloud provider manages the hardware including servers, storage, and networking components. The organization is responsible for all the software, including operating system (and virtualization software), database software, and its applications and data.
Modulation
The coding of information onto a carrier frequency, including on/off light source digital coding.
Asset Management
The combination of management, financial, economic, engineering and other practices applied to physical assets with the objective of providing the required level of service in the most cost effective manner.
UTM (Unified Threat Management)
The evolution of the traditional firewall into an all-inclusive security product able to perform multiple security functions within one single system: network firewalling, network intrusion prevention and gateway antivirus (AV), gateway anti-spam, VPN, content filtering, load balancing, data loss prevention and on-appliance reporting.
Virtual Wire
The firewall is installed transparently on a network segment by binding two ports together and should be used only when no switching or routing is needed.
Antenna pattern
The graphical representation of the radiation properties of the antenna as a function of space.
Logical partitioning
The hypervisor allowing multiple guest OSs to share the same physical resources.
Physical partitioning
The hypervisor assigning separate physical resources to each guest OS.
Risk Assessment
The identification and prioritization of potential business risk and disruptions based on severity and likelihood of occurrence.
level one
The initial point of contact for customers when they have an incident.
Incident Response
The initial response to a computer-related event that seeks to verify an incident, triage the incident, and gather necessary evidence while minimizing data and evidence loss.
Access port
The interface on a switch used for an end node. Devices connected to acces ports sre unaware of VLAN information
Baseline
The level of performance which is used for comparison after the change. This may just be past performance, but where other changes are going on this needs to be adjusted to take account of their impact.
In-band Management
The management of a network device "through" the network.
18,000 feet
The maximum distance between a user's demarc and the central office for all versions of DSL.
root cause
The most basic reason for an undesirable condition or problem, which, if eliminated or corrected, would prevent the problem from existing or occurring.
BIND
The most common DNS software of the internet. Ported to every flavor of Unix and Windows.
Ethernet
The most common LAN topology for bound media networks. Defined in the IEEE 802.3 standard.
100BaseTX
The most common implementation of 100BaseT. Uses 2 pairs.
100 meter
The most common specified maximum run length of twisted pair cable.
568B
The most common wiring standard for terminating UTP connections.
Area 0
The name of the Backbone Area in OSPF
TCP/IP Suite
The native protocol of the internet
Native VLAN
The one VLAN on an 802.1Q trunk for which the endpoints do not add the 4-byte 802.1Q tag when transmitting frames in that VLAN.
Wavelength
The optical term for frequency.
QoS
The overall performance of a telephony or computer network, particularly the performance seen by the users of the network.
First Responder
The people to respond to your emergency.
Abandon Rate Percent
The percentage of abandoned calls compared to the total number of calls received.
backup window
The period of time that a system is available to perform a backup procedure.
Communication channels
The routes used to pass messages, such as social media, email, verbal presentations, reports, etc.
Offer
The second part of the DHCP process.
Bluejacking
The sending of unsolicited messages over a Bluetooth connection.
Virtualization
The simulation of the software and/or hardware upon which other software runs.
Root Bridge
The single bridge/switch on a network selected by the Spanning Tree Protocol to provide the basis for all subsequent path calculations.
Horizontal Wiring
The span of cabling and connectors between the wiring closet and each drop. It is called horizontal because this type of wiring does not go up or down any floors of a building. Slang term is Run.
PPPoE
The standard for connecting home computers to an ISP via DSL or broadband cable.
IEEE 802.1W
The standard that defines Rapid Spanning Tree.
IEEE 802.1D
The standard that defines Spanning Tree.
Adjacency
The state that neighbor routers will form
Attempt
The submission of a biometric sample to a biometric system for identification or verification. A biometric system may allow more than one.
Endface
The surface area of the fiber optic ferrule where the optical fiber is centered and polished.
syslog
The system logging facility for Unix Systems. Used for local and remote logging.
slack space
The unused space at the end of a file in a file system that uses fixed size clusters (so if the file is smaller than the fixed block size then the unused space is simply left). Often contains deleted information from previous uses of the block.
Metropolitan Ethernet
The use of Carrier Ethernet technology in metropolitan area networks (MANs).
hashing
The use of functions (e.g. CRC, SHA1 or MD5) to verify that an "image" is identical to the source media.
MIMO
The use of multiple antennas at both the transmitter and receiver to improve communication performance.
Hypervisor
The virtualization component that manages the guest OSs on a host and controls the flow of instructions between the guest OSs and the physical hardware.
Multicast
Traffic to a group of interfaces.
Leading indicator
These are metrics which give an indication of the progress of the change initiative towards the future state performance levels.
Interface Resets
This can happen if packets queued for transmission were not sent within several seconds. On a serial line, this can be caused by a malfunctioning modem that is not supplying the transmit clock signal, or by a cable problem.
TDM
Time Division Multiplexing. A method of transmitting and receiving independent signals over a common signal path by means of synchronized switches at each end of the transmission line so that each signal appears on the line only a fraction of time in an alternating pattern.
Latency
Time it takes for a data packet to move across a network connection.
TTL
Time to Live. Present in packet header but not in frame header.
download
To copy one or more patches from a source of patches to the system where the patches are to be applied.
apply
To install a patch on a system.
Spanning Tree Protocol(STP)
To prevent Loops from forming on LAN because there are no TTL values in the Layer 2 frame header. IEEE 802.1D.
back out
To remove a patch from a system.
Trouble Ticket:Discover where drop terminates at patch panel
Toner Probe
WiFi Analyzer
Tool for checking/diagnosing issues on a wireless network.
Loop Back Plug
Tool for testing serial, parallel USB, fiber, network or other ports.
Toner Probe
Two devices used together to trace the end of a wire from a known endpoint to the termination point in the wiring closet.
Split Horizon and Poison Reverse
Two methods to combat Count to Infinity and Routing Loops.
RADIUS Client
Typically a network access server such as a Dial-up Sever, VPN server, or Wireless AP.
SSL VPN
Unlinke other VPN technologies, does not require any proprietary software. Uses a browser and secures data through SSL certificates. Considered firewall friendly because it uses port 443 which is commonly open.
1000BaseX
Used in industry to refer to gigabit Ethernet transmission over fiber.
route
View and modify routing table.
ipconfig /displaydns
View host name cache.
netstat -na
View socket information.
arp -a
View table of IP addresses resolved to MAC addresses.
netstat -r
View the routing table without the route command.
W
WAN
10GBaseSW
WAN. 10 Gb/s Ethernet over MMF. Max length 400 meters.
10GBaseLW
WAN. 10 Gb/s Ethernet over SMF. Max length 10 KM by spec (25 actual).
10GBaseEW
WAN.10 Gb/s Ethernet over SMF. Max length 30 KM standard (40 engineered).
SSID
Wifi network identifier. Case sensitive.
Maintenance Window
Windows assigned for the purposes of change, upgrades, patch management, and authorized downtime.
IMAP
email, works with mail on server, tcp 143
Patch Management
the process of regularly applying patches and updates to software used by the organization