Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
27 Cards in this Set
- Front
- Back
The goal of ___________ is to detect, log, notify, users of and automatically fix network problems to keep the network running effectively. |
Fault Management |
|
The goal of ____________ is to control access to network resources so the network cannot be sabotaged and sensitive information cannot be accessed by those without appropriate authorization. |
Security Management |
|
The goal of _____________ is to measure various aspects of network performance so internetwork performance can be maintained at an acceptable level. |
Performance Management |
|
The goal of ______________ is to measure network utilization parameters so individual or group usage on the network can be regulated appropriately. |
Accounting Management |
|
What are the two forms of fault management? |
Active and Passive |
|
Which form of fault management generates an error report to the management tool? |
Passive Fault Management |
|
Which form of fault management uses tools like ping to determine if a device is responding? |
Active Fault Management |
|
For fault isolation in the networking environment, what is the device used for cable continuity testing that combines the functions of an ammeter, voltmeter, and an ohmmeter? |
Multimeter |
|
What gives you the ability to trace a wire in a group of bundled cables? |
Cable Toner |
|
What are the two parts of a Cable Toner? |
Tone generator and Probe |
|
What locates a break and/or imperfections in a cable within a few feet by sending out pulses at regular intervals? |
Time Domain Reflectometer (TDR) |
|
What are the 7 steps of the Troubleshooting Model? |
1. Define the Problems 2. Gather Facts 3. Consider All Possible Causes 4. Create a Plan of Action 5. Implement the Plan of Action 6. Observe the Results of Each Action 7. Repeat the Process |
|
What type of management has these three steps: gathering data, determining baseline levels, and determining appropriate thresholds? |
Performance Management |
|
When a performance threshold is exceeded, what is generated and sent to the network management system? |
A Trap or Notification |
|
What type of management is provided by the Information Assurance (IA) system of suites? |
Security Management |
|
Organizations must characterize the motives, potential motivations, and attack capabilities of ________ in order to implement Defense-in-Depth and effectively resist attacks? |
Adversaries |
|
Nation states, terrorists, criminal elements, hackers, or corporate competitors can all be considered potential _____________ ? |
Adversaries |
|
What includes intelligence gathering, theft of intellectual property, causing embarrassment, or just anticipated pride in having exploited a notable target? |
Motivations |
|
What are the 5 classes of attacks? |
Passive Active Close-In Insider Distribution |
|
What kind of attack includes traffic analysis, monitoring of unprotected communications, decrypting weakly encrypted traffic, and the capture of authentication information (i.e. passwords)? |
Passive Attack |
|
What kind of attack includes attempts to circumvent or break protection features, introduce malicious code, or steal or modify information? |
Active Attack |
|
What kind of attack consists of a regular type individuals attaining close physical proximity to networks, systems, or facilities for the purpose of modifying, gathering, or denying access to information? |
Close-In Attack |
|
What kind of attacks can be malicious or non-malicious which includes intentional eavesdropping, stealing or damaging information, and using information in a fraudulent manner, or denying access to other authorized users? |
Insider Attack |
|
What kind of attack focuses on malicious modification of hardware or software at the factory or during distribution? |
Distribution Attack |
|
In Accounting Management, what are the two tools we use to measure the use of network resources? |
Protocol Analyzer and Network Monitor |
|
What performs a number of functions during real-time analysis of network traffic? |
Protocol Analyzer |
|
What is a software implementation of a protocol analyzer? |
Network Monitor |