• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/27

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

27 Cards in this Set

  • Front
  • Back

The goal of ___________ is to detect, log, notify, users of and automatically fix network problems to keep the network running effectively.

Fault Management

The goal of ____________ is to control access to network resources so the network cannot be sabotaged and sensitive information cannot be accessed by those without appropriate authorization.

Security Management

The goal of _____________ is to measure various aspects of network performance so internetwork performance can be maintained at an acceptable level.

Performance Management

The goal of ______________ is to measure network utilization parameters so individual or group usage on the network can be regulated appropriately.

Accounting Management

What are the two forms of fault management?

Active and Passive

Which form of fault management generates an error report to the management tool?

Passive Fault Management

Which form of fault management uses tools like ping to determine if a device is responding?

Active Fault Management

For fault isolation in the networking environment, what is the device used for cable continuity testing that combines the functions of an ammeter, voltmeter, and an ohmmeter?

Multimeter

What gives you the ability to trace a wire in a group of bundled cables?

Cable Toner

What are the two parts of a Cable Toner?

Tone generator and Probe

What locates a break and/or imperfections in a cable within a few feet by sending out pulses at regular intervals?

Time Domain Reflectometer (TDR)

What are the 7 steps of the Troubleshooting Model?

1. Define the Problems


2. Gather Facts


3. Consider All Possible Causes


4. Create a Plan of Action


5. Implement the Plan of Action


6. Observe the Results of Each Action


7. Repeat the Process

What type of management has these three steps: gathering data, determining baseline levels, and determining appropriate thresholds?

Performance Management

When a performance threshold is exceeded, what is generated and sent to the network management system?

A Trap or Notification

What type of management is provided by the Information Assurance (IA) system of suites?

Security Management

Organizations must characterize the motives, potential motivations, and attack capabilities of ________ in order to implement Defense-in-Depth and effectively resist attacks?

Adversaries

Nation states, terrorists, criminal elements, hackers, or corporate competitors can all be considered potential _____________ ?

Adversaries

What includes intelligence gathering, theft of intellectual property, causing embarrassment, or just anticipated pride in having exploited a notable target?

Motivations

What are the 5 classes of attacks?

Passive


Active


Close-In


Insider


Distribution

What kind of attack includes traffic analysis, monitoring of unprotected communications, decrypting weakly encrypted traffic, and the capture of authentication information (i.e. passwords)?

Passive Attack

What kind of attack includes attempts to circumvent or break protection features, introduce malicious code, or steal or modify information?

Active Attack

What kind of attack consists of a regular type individuals attaining close physical proximity to networks, systems, or facilities for the purpose of modifying, gathering, or denying access to information?

Close-In Attack

What kind of attacks can be malicious or non-malicious which includes intentional eavesdropping, stealing or damaging information, and using information in a fraudulent manner, or denying access to other authorized users?

Insider Attack

What kind of attack focuses on malicious modification of hardware or software at the factory or during distribution?

Distribution Attack

In Accounting Management, what are the two tools we use to measure the use of network resources?

Protocol Analyzer and Network Monitor

What performs a number of functions during real-time analysis of network traffic?

Protocol Analyzer

What is a software implementation of a protocol analyzer?

Network Monitor