Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
26 Cards in this Set
- Front
- Back
- 3rd side (hint)
What are some things on an Acceptable Use Policy? |
-What can/can't be done on company equipment. -Ownership of equipment/data. -Network access. -Privacy/consent to monitor. -Illegal use. |
|
|
What are some things on a Network Access Policy?
|
Accessibility to databases, data, networks, WLANs, VPNs, etc. |
|
|
What's the difference between a strategic change and an Infrastructure change? |
Strategic change - affects a large part of the company or network, usually led by upper management. Infrastructure change - Lesser impact - software change, e.g. Led by Change Management Committee. |
Scope |
|
What is covered in a Change Request? |
Type of change, configuration procedures, rollback process, potential impact (pros and cons), end-user notification procedure. |
|
|
What is a virtual IP? |
An IP address that isn't directly assigned to a physical port. Used for failover - assigned to two identical servers, e.g. |
|
|
What is HSRP an VRRP? |
HRRP - Hot Standard Router Protocol (Cisco) VRRP - Virtual Router Redundancy Protocol Standards for multiple routers working in tandem for failover purposes. |
Redundancy |
|
What is an SLA? |
Service Level Agreement. Defines scope, quality, terms of service, including definition of service provided, equipment, and technical support. |
|
|
What is an MOU? |
Memorandum of Understanding. Not a standard contract, covers definition of duties, time frame. |
|
|
What is an MSA? |
Multi-Source Agreement. An agreement in lieu of standardization. |
|
|
What is a SOW? |
Statement of Work. Legal contract between vendor and customer. Defines services/products provide, time frame, and milestones. |
|
|
What is the definition of a computer virus? |
Creates copies of itself, and delivers a payload, causing some headache. |
|
|
What is the definition of a computer worm? |
Created to self-propagate on the Internet. |
|
|
What is a DDOS? |
Distributed Denial of Service. Several computers (usually zombie computers on a botnet) sending faulty ICMP (ping) requests to a specific computer. |
|
|
What is a Smurf attack? |
Sending a request to a large group of computers with a spoofed source address. The group then responds to the spoofed computer, overwhelming it. |
|
|
What's the difference between a stateful firewall and a stateless firewall. |
Stateless looks at the packet type only and make decisions based on heruistics. Stateful examines the details of a packet (or the state of the packet), including IP address and port. |
|
|
Name two vulnerability scanners. |
Nessus and nmap. (Zenmap is nmap's GUI.) |
|
|
What four steps are most effective for mitigating network threats? |
-End user training/awareness
-Patch management -Policies and procedures -Incident response |
|
|
What is a UTM? |
Unified Threat Management. Often a firewall/router combo, but can also be a proxy, antivirus, VPN, etc. |
|
|
What is a bastion host? |
A router exposed to the Internet. Usually referred to in cases with a DMZ between the bastion host and a second router managing the rest of the network (in contrast to one router managing both). |
|
|
What are the requirements of an SNMP network? |
-Agent - software on a client (printer, e.g.). -Managed Device - the device managed by the Agent. -Manager - system used to manage SNMP devices. -Network Management Station (NMS) - software used to manage devices. -Management Information Base (MIB) - device database used to store device statistics. |
|
|
What are some basic SNMP communications? |
-Get/Response - manual request for information from an agent. -Trap - automatic alarm configuration (created on agent). -Walk - a batch of Get requests. |
|
|
What are the different SNMP versions and their differences? |
v1 - limited command set, no encryption. v2 - Basic encryption, slightly expanded command set. v3 - TLS (more robust) encryption. -All backward compatible. |
|
|
What is an SNMP community? |
An organization of managed devices. |
|
|
What are the error levels for Syslog? |
0-7, from most- to least-urgent. |
|
|
What is an MTU Black Hole? |
Inability to fragment data - a user setting. (MTU = Maximum Transmission Unit) |
|
|
What are the basic troubleshooting steps? |
-Identify the problem -Establish a theory of probable cause -Test the theory -Establish a plan of action (resolution) -Test resolution -Documentation |
|