Chapter 2: Network Infrastructure and Documentation

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

hrtr01(home router 1),schadmrtr02(school administration building router 2), clpc01,clpc02(computer lab pc 1 and 2)

List some good names for devices on your home network or on the network in your school's lab.

Patch cable

You need to connect a new network printer to a nearby wall jack. What kind of cable should you use?

Entrance facility

A technician from your ISP has arrived to help you troubleshoot a weak WAN connection. To what location do you take her?

Look at whether the device is located on the ISP's side of the demarc.

A transceiver was recently damaged by a lightning strike during a storm. How might you decide whether the ISP is responsible for replacing this device, or whether your company must foot the bill?

Schedule the change for completion during off-hours (unless it is an emergency)

For what time period should you schedule a network change?

• Pay attention to any established naming convention already in use by your employer. For example, existing acronyms for the various departments in your corporation are more recognizable for employees.

Demonstrate the use of best practices when creating a naming scheme for devices on a computer network.(4)

• Consider any security risks from the details you might include in your naming convention. Make sure naming and labeling information is stored behind locked doors and inside secure databases. Don't use names that identify the location (physical or digital) of sensitive information that might alert an attacker to a highly desirable target, such as customer credit card information or protected patient data. When needed, use more obscure names that won't easily attract attention.

Demonstrate the use of best practices when creating a naming scheme for devices on a computer network.(6)

List hardware(Devices, racks, jacks, patch panels, switches, ports, MDF/IDF, floor plans, power and water shutoff locations)

How can you go about gathering the information needed to assemble a thorough operations manual? (hardware)

List software(Operating systems (and their configurations), applications (and their configuration), Active Directory (security groups, domains, etc.))

How can you go about gathering the information needed to assemble a thorough operations manual?(software)

MDF, IDF

There is only one -------- per network, but there can be many ------- connecting internal portions of the network.

List any special instruction(Who to contact in an emergency, how to access backup information, how to meet the requirements of various privacy, security, and safety restrictions)

How can you go about gathering the information needed to assemble a thorough operations manual? (special instructions)

• Think big-picture-down-to-details when designing device name fields, such as starting with the building name, then floor, then data room number, then rack number. If your company has national locations or international locations, certain names may need to include codes for continent, country, state, city, and so on. Think in terms of "top-down" or "outside-in" and be consistent.

Demonstrate the use of best practices when creating a naming scheme for devices on a computer network.(5)

List contact info(Vendors, decision makers, team members, utilities (alarm, electric, water))

How can you go about gathering the information needed to assemble a thorough operations manual? (contacts)

By submitting a Change Request Document

In a large organization, how do you typically request permission to perform a network change?

List all components on the network.

What is the first step of inventory management?

A password manager

Which of these is considered a secure place to store a list of documented network passwords?

Minimizing cable clutter can prevent airflow blockages and heat buildup

Why is it important to minimize cable clutter in a rack?

• Use names that are as descriptive as possible (without giving away too much information to potential hackers)

Demonstrate the use of best practices when creating a naming scheme for devices on a computer network.(1)

• Only include fields that are absolutely essential in identifying the device.

Demonstrate the use of best practices when creating a naming scheme for devices on a computer network.(2)

List network configurations(Protocols, backups, passwords, IP addressing (static, DHCP scopes), subnets, VLANs, server roles, access methods, transmission details)

How can you go about gathering the information needed to assemble a thorough operations manual? (network configuration)

Rack ears

If you're shopping for a rack switch, what component on the switch tells you it can be mounted to a rack?

Physical layout, logical topology, perimeter, access method, protocols, network devices and connections

What are some elements that are typically included in network diagrams?

Height,Width, Depth. Standard racks are 42U or about 6ft.

What is the unit of measurement that defines the space available in a rack? How tall are standard racks?

Network map

What type of diagram shows a graphical representation of a network's wired infrastructure?

VoIP gateway

Which device converts signals from a campus's analog phone equipment into IP data that can travel over the Internet?

a. Routers b. Switches d. KVM switch

Which of the following devices are you likely to find in the MDF? Choose all that apply. a. Routers b. Switches c. Network printer d. KVM switch

This method describes the best way to install networking media to maximize performance and minimize upkeep.

Why is it important to use a structured cabling standard when installing and managing cabling systems?

Plenum-rated cable is required by many local electrical-codes because it has a flame resistant jacket that produces less smoke then regular cable coated with PVC.

Why is it important to use plenum-rated cabling in the area above the ceiling tile?

a. Zenmap c. Command Prompt d.Powershell

You've decided to run an Nmap scan on your network. What app could you open to perform this task? Choose all that apply. a. Zenmap b. Microsoft Edge c. Command Prompt d. PowerShell

• Don't overcomplicate the name with useless or redundant information.

Demonstrate the use of best practices when creating a naming scheme for devices on a computer network.(3)


संबंधित स्टडी सेट्स

Chapter 27: The Origin and Diversification of Eukaryotes

View Set

Chp 19 Section 1 Industrial Revolution

View Set

Chapter 12: Electronic Health Records True or false

View Set

CompTIA Cloud+ CV0-002 Practice Questions

View Set

Chapter 3 - strategic marketing planning

View Set

MGMT 490 Business Policy Chapter 4 Evaluating a Company's Resources, Capabilities, and Competitiveness

View Set

Chapter 12: Food Safety Concerns

View Set