1/48
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Administrator's account
Recommended account for system or network administrators to use for all tasks.
Systems Administration
Role responsible for managing all resources in an organization's IT, encompassing various administrative tasks.
Network Administrator
Individual responsible for configuring infrastructure devices like routers, switches, and firewalls.
EIA-TIA Wiring Standards
Standards specifying maximum segment lengths for cables, such as 90 meters for UTP horizontal cables.
Telecommunication Closet
Location holding switches for distribution, following a hierarchical model, also known as MDF.
Patch cable
Cable type in EIA-TIA standards connecting end-user workstations to the network.
Entrance Facility
Point where the ISP's network meets the organization's network, managed by the Systems Administrator.
Hierarchical Network Design
Model focusing on core, distribution, and access layer implementation and deployment.
LLDP
Protocol recommended for supporting Cisco, HP, and Dell products to generate network topological maps.
Needs Analysis
Phase involving determining network usage programs and areas for system administrators.
Geographic Scope
Phase subcomponent covering network coverage and span.
Traditional Network Design
Methodology using a structured systems analysis and design process similar to software development.
Categorizing network needs
Process of identifying network requirements as mandatory, desirable, or wish-list.
Building Block Process
Concept emphasizing the cost-effectiveness of using standard components throughout a network.
Technology Design
Deliverable of the building block approach model, including developed physical network topologies.
Debug AAA Authentication
IOS command useful for troubleshooting AAA problems, providing a high-level view of the login process.
Accounting
Example of tracking user activities and resource consumption, such as user access to the domain controller.
Authorization
Restricting user access to specific resources, like end-users being restricted from the control panel.
TACACS+
Protocol separating authentication and authorization processes.
4
Number of ports used by RADIUS for AAA functions:
Authentication
Process of identifying a user to grant access to a system.
ICMP
ICMP : Ping <==> ____ : tracert
NO SHUT
____ : polling <=> interface g0/0/p0 changed to up : event-reporting
LOS
manager : putty <=> agent : ___
International Organization for Standardization
TCP/IP : Institute of Electronics and Electrical Engineers <=> OSI :_______________________
SGMP
___ : SNMP <=> IGRP : EIGRP
AD LDS
A structured information store based on the structure of AD DS.
AD DS
Allows system admin to manage essentially as many objects, users, computers, printers, shares as we can cram into it given that we have the hardware to support it in a centralized manner.
partitions
Domain directory, schema directory, application directory, configuration directory, and global catalog are all examples of ____________ in an Active Directory Domain Services.
schema
It defines an attribute list which all objects in the Active Directory Domain Services can have.
authentication
A passport is a good analogy for _____________________________.
Masquerade
In general, a ______________ is a disguise. In terms of network security matters, it is a type of attack where the intruders pretends to be an authorized user of a system.
CyberSecurity
It is the use of safeguarding your company's networks, computers and data from prohibited digital access, attack or destruction by performing different procedures, technologies and execution.
Modification
If an attackers or intruders not only accesses but meddle with an asset, the threat is a _____________________.
Network security
The role of __________________ is to protect the company's Information Technology infrastructure from all forms of cyber menaces.
Logical network topology
It demonstrates, at a higher level, how data moves within a network.
LDAP
Provides the link that applications use to communicate with other directory services or servers.
Efficiency Oriented
Throughput and utilization is an example of.
False
A non-elimination of single point of failure is one of the multi-master replication advantages.
Trust Relationships
It is a secure communication paths that allow security principals in one domain to be authenticated and accepted in other domains.
FCAPS
An FCAPS level where inventory of equipment and programs is kept and updated regularly.
fabrication
The intruder may add spurious transactions to a network communication system or add records to an existing database. This statement is best describe by the what security threats?
Distributed Management System
A set of tools used available on the Windows Server to administer and manage the entire network.
System Properties
To change the computer name of the workstations or Clients running Windows 7, you need to access the ________________ where Computer Name tab is available.
Session
Which layer establishes, maintains, and terminates communications between applications located on different devices?
Forests
It pertains to one or more domains that share a common schema, common configuration, automatic transitive trust relationships, and common global catalog.
Polling
Monitoring method where information flow is initiated from the agent to manager.
controlling complexity
A NM user requirement where there were continued growth of devices, users, applications & protocols.
Transitive Trusts
Forest-to-forest ________________ can be created between Windows Server 2003 forests only (ie not between Windows 2000 forests).