• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/27

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

27 Cards in this Set

  • Front
  • Back
agent
A software routine that collects data about a managed device’s operation and provides it to a network management application.
backleveling
To revert to a previous version of a software application after attempting to upgrade it.
cache engine
A network device devoted to storage and delivery of frequently requested files.
Caching
The local storage of frequently needed files that would otherwise be obtained from an external source.
CALEA (Communications Assistance for Law Enforcement Act)
A United States federal regulation that requires telecommunications carriers and equipment manufacturers to provide for surveillance capabilities. CALEA was passed by Congress in 1994 after pressure from the FBI, which worried that networks relying solely on digital communications would circumvent traditional wiretapping strategies.
configuration management
The collection, storage, and assessment of information related to the versions of software installed on every network device and every device’s hardware configuration.
event log
The service on Windows-based operating systems that records events, or the ongoing record of such events.
Event Viewer
A GUI application that allows users to easily view and sort events recorded in the event log on a computer running a Windows-based operating system.
fault management
The detection and signaling of device, link, or component faults.
HIPAA (Health Insurance Portability and Accountability Act)
A federal regulation in the United States, enacted in 1996. One aspect of this regulation addresses the security and privacy of medical records, including those stored or transmitted electronically.
MIB (Management Information Base)
A database used in network management that contains a device’s definitions of managed objects and their data.
network diagram
A graphical representation of a network’s devices and connections.
network management
The assessment, monitoring, and maintenance of the devices and connections on a network.
patch
A correction, improvement, or enhancement to part of a software application, often distributed at no charge by software vendors to fix a bug in their code or to add slightly more functionality.
performance management
The ongoing assessment of how well network links, devices, and components keep up with demands on them.
polling
A network management application’s regular collection of data from managed devices.
SNMP (Simple Network Management Protocol)
An Application layer protocol in the TCP/IP suite used to convey data regarding the status of managed devices on a network.
SNMPv1 (Simple Network Management Protocol version 1)
The original version of SNMP, released in 1988. Because of its limited features, it is rarely used on modern networks.
SNMPv2 (Simple Network Management Protocol version 2)
The second version of SNMP, which improved on SNMPv1 with faster performance and slightly better security, among other features.
SNMPv3 (Simple Network Management Protocol version 3)
A version of SNMP similar to SNMPv2, but with authentication, validation, and encryption for packets exchanged between managed devices and the network management console. SNMPv3 is the most secure version of the protocol.
syslog
A standard for generating, storing, and processing messages about events on a system. Syslog describes methods for detecting and reporting events and specifies the format and contents of messages.
system log
On a computer running a UNIX or Linux operating system, the record of monitored events, which can range in priority from 0 to 7 (where “0” indicates an emergency situation and “7” simply points to information that might help in debugging a problem). You can view and modify system log locations and configurations in the file /etc/syslog.conf on most systems (on some systems, this is the /etc/rsyslog.conf file).
traffic policing
A traffic-shaping technique in which the volume or rate of traffic traversing an interface is limited to a predefined maximum.
traffic shaping
Manipulating certain characteristics of packets, data streams, or connections to manage the type and amount of traffic traversing a network or interface at any moment.
upgrade
A significant change to an application’s existing code, typically designed to improve functionality or add new features.
Web caching
A technique in which Web pages are stored locally, either on a host or network, and then delivered to requesters more quickly than if they had been obtained from the original source.
wiring schematic
A graphical representation of a network’s wired infrastructure.