Modules 1 and 2 - Introduction to Networking

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What are some components of change management policy?

* Scope * Definitions of Change * Types of change * Change procedure * Change approval from Change Advisor Board(CAB) and Emergency Change Advisory Board(ECAB)

Benefits of a WLC(Wireless Lan Controller)

- Centralized management - Flexible deployment of wireless access points - Simplified wireless network maintenance - Interference detection - Wireless access point status detection

VPN Headend

A device that terminates the VPN tunnel at a site.

In which life cycle phase is an old device removed from the network?

Implementation

MLA

Master License Agreement

Which network diagram shows a logical topology?

Network Map

What network device can be used to implement access lists, dynamic routing protocols, and Network Address Translation(NAT)?

Router

SLA

Service level agreement. An agreement between a company and a vendor that stipulates performance expectations, such as minimum uptime and maximum downtime levels.

When an Internet connection goes down, what business document defines a customer's options for paying a reduced rate?

Service-Level Agreements

Implementation

The phase in which the device is implemented and put to use

Media Converter

Used to adapt a layer 1 (physical layer) technology to another layer 1 technology i.e. going from fiber to coaxial

What do you need to create a business continuity plan?

- Identify services with high, medium, and low priority - Perform risk assessment - Integrate the plan into existing policies - Communicate to the users - Test the plan - Train users - Maintain the plan

What are some of the key steps in Change Management?

- Identify the change that needs to be implemented - Plan for a rollback in case anything goes wrong - Create a backup before testing the changes - Test the change in a simulated environment, which is close to the environment where the change will take place - Observe the outcome - Define the time for implementing the change - Get approval for the change - Implement the change - Review the result - Document the change

Components of SOPs

- Purpose - Scope - Responsibilities - Definitions - Procedures

Capabilities of a layer 2 swtich

- Recognizing frames - Knowing the source and destination of MAC addresses - Sending the frames directly to the corect port - Ability to send the frames to all other ports except the one on which it was received if it cannot figure out the destination of theframe - Uses MAC addresses to send frames

What are the components of the incident response policy

- Scope - Definitions, such as incident and incident response team - Procedures - Roles and Responsibilities

What information do you gather for a site survey report

- The type of applications used on the wireless network - The type of data, such as audio and video - The wirelss network capacity - The devices that will connect to the wireless network

What are the parts of a system life cycle

1. Acquisition 2. Implementation 3. Maintenance 4. Decommissioning

Components of a password policy

1. Password history 2. Minimum and maximum password age 3. Minimum password length 4. Password complexity

What are the 7 layers of the OSI model?

1. Physical 2. Data Link 3. Network 4. Transport 5. Session 6. Presentation 7. Application

What are the 6 phases in an incident response plan?

1. Preparation 2. Identification 3. Containment 4. Eradication 5. Recovery 6. Lessons Learned

What should a site survey include?

1. number of wireless access points required 2. recommendations on type of wireless access points 3. any interference points 4. the mounting locations along with the cable path 5. amount of redundancy, like 40%

According to the OSI model, at which of the following layers is data encapsulated into a packet? A. Layer 2 B. Layer 3 C. Layer 4 D. Layer 5 E. Layer 6

2

Whistle Blowers, a talent management company, wants to set up a network connection for its branch office in Los Angeles. It has contracted Vince Cabling Solutions for this. The administration department of Whistle Blowers has specifically mentioned that the nodes of the devices used in the division should all be connected through a common cable so that the material costs can be minimized. Analyze which topology Vince Cabling Solutions should

A bus topology

Wireless LAN controller

A central device that manages a network's WAPs

Proxy server

A computer system (or an application program) that intercepts internal user requests and then processes that request on behalf of the user.

Load Balancer

A dedicated network device that can direct requests to different servers based on a variety of factors.

Cable Modem

A device that uses coaxial cable to send and receive data.

Bridge

A layer 2 device that used to connect two network segments and regulate traffic.

Business Continuity Plan

A plan for how an organization will recover and restore partially or completely interrupted critical function(s) within a predetermined time after a disaster or extended disruption

Layer 3 Switch

A switch capable of interpreting Layer 3 data and works much like a router in that it supports the same routing protocols and makes routing decisions.

Intrusion Prevention System (IPS)

A technology that monitors activity like an IDS but will automatically take proactive preventative action if it detects unacceptable activity.

Digital Subscriber Line (DSL)

A type of Internet connection that uses phone lines but transmits signals digitally across an always-open connection.

Router

A type of computer that forwards data across a network

What is the difference between a business continuity plan anda disaster recovery plan

Business continuity plan is focused on business opertaions, disaster recovery planning is focused on restoring the IT operations

In an OUI, what do the last 6 hexadecimal characters represent?

Extension Identifier Date of manufacture Device ID

What does FTP mean?

File Transfer Protocol

What is an MSA

Master Service Agreement - contract that defines the terms for future contracts between parties

What are some of the key SCADA components

Master Terminal Unit(MTU) Remote Terminal Unit(RTU) Programmable Logic Controller(PLC) Human Machine Interface(HMI)

What is an MOU

Memorandum of Understanding

What is a hub?

Network device with several ports that connect end devices to the network

Kevin Mills is a network technician who has been hired by Globcom Telecommunications to fix an error related to emails and messages. The error primarily did not allow the messages sent out by the HR department to arrive intact at the receiving applications on the employees' workstations. Kevin plans to follow the OSI model for troubleshooting. Analyze the statements and suggest which layer of the OSI model Kevin should inspect to understand and resolve the issue.

One should troubleshoot the issue using the session layer

What is a RAID?

Redundant Array of Independent Disks

Which SCADA component is geographically dispersed and receives commands to perform certain tasks?

Remote Terminal Unit(RTUs)

What is an RFP?

Request for Proposal

Godwin Pharmaceuticals has a private web server for its corporate network that runs on a Linux operating system. You have been contacted to make its network remotely accessible to the IT department so that the IT department can have secure access to the workstations and, at the same time, the transmissions remain encrypted. Which of the following protocols would you apply so that the employees can have secured remote access to the computer server?

SSH(Remember SSH is for Linux)

What is a SDS

Safety Data Sheet

What does SCADA stand for

Supervisory Control and Data Acquisition

Layer 2 Swtich

Switch that can connect several systems to a network

What is acquisition?

The phase in which the organization procures the device

Maintenance

The phase where the device breaks down and is repaired and then breaks down again and is repaired again

decommissioning

Time to put the device down and move onto bigger better

Intrusion Detection System (IDS)

a computer program that senses when another computer is attempting to scan or access a computer or network

Firewall

a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.

Voice gateway

provide connectivity between VoIP components and PSTN components

Repeater

receives and repeats a signal to extend its attenuation or range

Standard Operating Procedures (SOPs)

specific sets of written instructions about how to perform a certain aspect of a task

Access Point

the computer or network device that serves as an interface between devices and the network


संबंधित स्टडी सेट्स

MRKT 239 Test 1 The impact of environmental forces on value can be extensive as market changes can easily influence how stakeholders perceive certain products.

View Set

ECON-302 Chapter 5 Learning Exercise

View Set

AP Environmental Science - Questions 301-330

View Set

9.13 - Legal Jurisdiction of the Administrator

View Set

Elimination/GI/GU: Nursing I Exam 2

View Set

Chapter 10: Alternative Marketing

View Set