• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/26

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

26 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)

What are some things on an Acceptable Use Policy?

-What can/can't be done on company equipment.


-Ownership of equipment/data.


-Network access.


-Privacy/consent to monitor.


-Illegal use.

What are some things on a Network Access Policy?

Accessibility to databases, data, networks, WLANs, VPNs, etc.


What's the difference between a strategic change and an Infrastructure change?

Strategic change - affects a large part of the company or network, usually led by upper management.


Infrastructure change - Lesser impact - software change, e.g. Led by Change Management Committee.

Scope

What is covered in a Change Request?

Type of change, configuration procedures, rollback process, potential impact (pros and cons), end-user notification procedure.

What is a virtual IP?

An IP address that isn't directly assigned to a physical port. Used for failover - assigned to two identical servers, e.g.

What is HSRP an VRRP?

HRRP - Hot Standard Router Protocol (Cisco)


VRRP - Virtual Router Redundancy Protocol




Standards for multiple routers working in tandem for failover purposes.

Redundancy

What is an SLA?

Service Level Agreement. Defines scope, quality, terms of service, including definition of service provided, equipment, and technical support.

What is an MOU?

Memorandum of Understanding. Not a standard contract, covers definition of duties, time frame.

What is an MSA?

Multi-Source Agreement. An agreement in lieu of standardization.

What is a SOW?

Statement of Work. Legal contract between vendor and customer. Defines services/products provide, time frame, and milestones.

What is the definition of a computer virus?

Creates copies of itself, and delivers a payload, causing some headache.

What is the definition of a computer worm?

Created to self-propagate on the Internet.

What is a DDOS?

Distributed Denial of Service. Several computers (usually zombie computers on a botnet) sending faulty ICMP (ping) requests to a specific computer.

What is a Smurf attack?

Sending a request to a large group of computers with a spoofed source address. The group then responds to the spoofed computer, overwhelming it.

What's the difference between a stateful firewall and a stateless firewall.

Stateless looks at the packet type only and make decisions based on heruistics.


Stateful examines the details of a packet (or the state of the packet), including IP address and port.

Name two vulnerability scanners.

Nessus and nmap. (Zenmap is nmap's GUI.)

What four steps are most effective for mitigating network threats?

-End user training/awareness

-Patch management


-Policies and procedures


-Incident response

What is a UTM?

Unified Threat Management. Often a firewall/router combo, but can also be a proxy, antivirus, VPN, etc.

What is a bastion host?

A router exposed to the Internet. Usually referred to in cases with a DMZ between the bastion host and a second router managing the rest of the network (in contrast to one router managing both).

What are the requirements of an SNMP network?

-Agent - software on a client (printer, e.g.).


-Managed Device - the device managed by the Agent.


-Manager - system used to manage SNMP devices.


-Network Management Station (NMS) - software used to manage devices.


-Management Information Base (MIB) - device database used to store device statistics.

What are some basic SNMP communications?

-Get/Response - manual request for information from an agent.


-Trap - automatic alarm configuration (created on agent).


-Walk - a batch of Get requests.

What are the different SNMP versions and their differences?

v1 - limited command set, no encryption.


v2 - Basic encryption, slightly expanded command set.


v3 - TLS (more robust) encryption.


-All backward compatible.

What is an SNMP community?

An organization of managed devices.

What are the error levels for Syslog?

0-7, from most- to least-urgent.

What is an MTU Black Hole?

Inability to fragment data - a user setting. (MTU = Maximum Transmission Unit)

What are the basic troubleshooting steps?

-Identify the problem


-Establish a theory of probable cause


-Test the theory


-Establish a plan of action (resolution)


-Test resolution


-Documentation