Key Concepts in Systems and Network Administration

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/48

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

49 Terms

1
New cards

Administrator's account

Recommended account for system or network administrators to use for all tasks.

2
New cards

Systems Administration

Role responsible for managing all resources in an organization's IT, encompassing various administrative tasks.

3
New cards

Network Administrator

Individual responsible for configuring infrastructure devices like routers, switches, and firewalls.

4
New cards

EIA-TIA Wiring Standards

Standards specifying maximum segment lengths for cables, such as 90 meters for UTP horizontal cables.

5
New cards

Telecommunication Closet

Location holding switches for distribution, following a hierarchical model, also known as MDF.

6
New cards

Patch cable

Cable type in EIA-TIA standards connecting end-user workstations to the network.

7
New cards

Entrance Facility

Point where the ISP's network meets the organization's network, managed by the Systems Administrator.

8
New cards

Hierarchical Network Design

Model focusing on core, distribution, and access layer implementation and deployment.

9
New cards

LLDP

Protocol recommended for supporting Cisco, HP, and Dell products to generate network topological maps.

10
New cards

Needs Analysis

Phase involving determining network usage programs and areas for system administrators.

11
New cards

Geographic Scope

Phase subcomponent covering network coverage and span.

12
New cards

Traditional Network Design

Methodology using a structured systems analysis and design process similar to software development.

13
New cards

Categorizing network needs

Process of identifying network requirements as mandatory, desirable, or wish-list.

14
New cards

Building Block Process

Concept emphasizing the cost-effectiveness of using standard components throughout a network.

15
New cards

Technology Design

Deliverable of the building block approach model, including developed physical network topologies.

16
New cards

Debug AAA Authentication

IOS command useful for troubleshooting AAA problems, providing a high-level view of the login process.

17
New cards

Accounting

Example of tracking user activities and resource consumption, such as user access to the domain controller.

18
New cards

Authorization

Restricting user access to specific resources, like end-users being restricted from the control panel.

19
New cards

TACACS+

Protocol separating authentication and authorization processes.

20
New cards

4

Number of ports used by RADIUS for AAA functions:

21
New cards

Authentication

Process of identifying a user to grant access to a system.

22
New cards

ICMP

ICMP : Ping <==> ____ : tracert

23
New cards

NO SHUT

____ : polling <=> interface g0/0/p0 changed to up : event-reporting

24
New cards

LOS

manager : putty <=> agent : ___

25
New cards

International Organization for Standardization

TCP/IP : Institute of Electronics and Electrical Engineers <=> OSI :_______________________

26
New cards

SGMP

___ : SNMP <=> IGRP : EIGRP

27
New cards

AD LDS

A structured information store based on the structure of AD DS.

28
New cards

AD DS

Allows system admin to manage essentially as many objects, users, computers, printers, shares as we can cram into it given that we have the hardware to support it in a centralized manner.

29
New cards

partitions

Domain directory, schema directory, application directory, configuration directory, and global catalog are all examples of ____________ in an Active Directory Domain Services.

30
New cards

schema

It defines an attribute list which all objects in the Active Directory Domain Services can have.

31
New cards

authentication

A passport is a good analogy for _____________________________.

32
New cards

Masquerade

In general, a ______________ is a disguise. In terms of network security matters, it is a type of attack where the intruders pretends to be an authorized user of a system.

33
New cards

CyberSecurity

It is the use of safeguarding your company's networks, computers and data from prohibited digital access, attack or destruction by performing different procedures, technologies and execution.

34
New cards

Modification

If an attackers or intruders not only accesses but meddle with an asset, the threat is a _____________________.

35
New cards

Network security

The role of __________________ is to protect the company's Information Technology infrastructure from all forms of cyber menaces.

36
New cards

Logical network topology

It demonstrates, at a higher level, how data moves within a network.

37
New cards

LDAP

Provides the link that applications use to communicate with other directory services or servers.

38
New cards

Efficiency Oriented

Throughput and utilization is an example of.

39
New cards

False

A non-elimination of single point of failure is one of the multi-master replication advantages.

40
New cards

Trust Relationships

It is a secure communication paths that allow security principals in one domain to be authenticated and accepted in other domains.

41
New cards

FCAPS

An FCAPS level where inventory of equipment and programs is kept and updated regularly.

42
New cards

fabrication

The intruder may add spurious transactions to a network communication system or add records to an existing database. This statement is best describe by the what security threats?

43
New cards

Distributed Management System

A set of tools used available on the Windows Server to administer and manage the entire network.

44
New cards

System Properties

To change the computer name of the workstations or Clients running Windows 7, you need to access the ________________ where Computer Name tab is available.

45
New cards

Session

Which layer establishes, maintains, and terminates communications between applications located on different devices?

46
New cards

Forests

It pertains to one or more domains that share a common schema, common configuration, automatic transitive trust relationships, and common global catalog.

47
New cards

Polling

Monitoring method where information flow is initiated from the agent to manager.

48
New cards

controlling complexity

A NM user requirement where there were continued growth of devices, users, applications & protocols.

49
New cards

Transitive Trusts

Forest-to-forest ________________ can be created between Windows Server 2003 forests only (ie not between Windows 2000 forests).