Networking Fundamentals Part 2 (Week5)
____ are important information to know for cloud migration because countries and states have different laws for data protection. Target hosts Business continuity Baselines Legal restrictions
Legal restrictions
____ projection involves predicting one or more network capacities based on the current network parameters and multiplying those capacities by some constant. Multiplicative Addictive Linear Geometric
Linear
In a wide area connectivity map, mobile or wireless sites are indicated by circles containing the letter ____. A X E M
M
A database that holds the information about all managed network devices.
MIB (Management Information Base)
____ is a proprietary traffic monitoring protocol from Cisco that tracks all IP traffic crossing any interface where it is enabled) NetFlow SNMP IP TCP
NetFlow
____ testers have a display that graphically shows a network segment and all the devices attached to it. Cable Electrical Connector Network
Network
The cloud migration strategy ____ can also be called do-nothing. Retain Rehost Repurchase Refactor
Retain
An isolated environment where you can experiment with changes or potentially dangerous software without exposing sensitive resources to risk of damage.
Sandboxing
Software resources or services running on a network that are outside the knowledge or oversight of the IT department.
Shadow IT
____ is an industry standard created by the Internet Engineering Task Force and designed originally to manage Internet components. Transport Control Protocol (TCP) Simple Network Management Protocol (SNMP) Simple Mail Transfer Protocol (SMTP) Internet Control Message Protocol (ICMP)
Simple Network Management Protocol (SNMP)
There are ___ phases in the process of cloud migration. 5 3 4 6
5
____ involves the creation of mathematical equations to calculate various network values. Linear projection Benchmarking Analytical modeling Computer simulation
Analytical modeling
A study used to compare current conditions with desired conditions of a network system.
Gap Analysis
Creating a(n) ____________________ for an existing computer network involves measuring and recording a network's state of operation over a given period of time.
Baseline
____ involves generating system statistics under a controlled environment and then comparing those statistics against known measurements. Benchmarking Linear projection Analytical modeling Computer simulation
Benchmarking
A document requesting that vendors submit a proposal for a product or service that the customer wants to purchase.
RFP (Request For Proposal)
The streamlining and built-in repetition of the application lifecycle, along with the increased collaboration between the teams working on an app.
DevOps
The advantage of using a ____ is that it can mimic conditions that would be extremely difficult, if not impossible, to create on a real network. computer simulation benchmark time projection linear projection
computer simulation
One technique used to model a corporation's network environment is to create ____. connectivity maps dots model link shadows node approaches
connectivity maps
It is called ____ when a NIC transmits continuously but does not send valid data) macaw jabber flood nicker
jabber
To examine the nodes in a wide area connectivity map in more detail, an analyst can expand each individual site into a ____ area connectivity map. local universal personal world
local
A ____ map can show how individual workstations or groups of workstations are clustered with switches, routers, hubs, and server farms. local area detailed connectivity wide area connectivity local area overview connectivity metropolitan area connectivity
local area detailed connectivity
Change ____ consists of carefully defined processes to evaluate the need for a change, the cost of the change, a plan for making the change with minimal disruption, and a backup plan if the change does not work as expected) evaluation analysis assessment management
management
When a company is evaluating a project's ____ feasibility, the company must ask: Will the proposed system produce the expected results? time financial technical operational
operational
A ____ is an isolated environment where you can experiment with changes or potentially dangerous software without exposing sensitive resources to risk of damage. safe box testbox fenced box sandbox
sandbox
When a company is evaluating a project's ____ feasibility, the company must ask: Can the proposed system be designed, built, tested, and installed in an amount of time that all parties find reasonable and to which they can agree? time operational financial technical
time
Three different modeling techniques can be used: ____ area connectivity maps, metropolitan area connectivity maps, and local area connectivity maps. wide world universal personal
wide
