1/76
Exam Objective 3
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Physical Diagram
A visual representation showing the physical layout of devices, cables, and connections in a network.
Logical Diagram
A diagram showing network devices, logical flows, and connections without physical layout details.
Rack Diagram
A visual schematic illustrating the placement of networking equipment within racks or cabinets.
Cable Maps and Diagrams
Visual documentation showing cable routing and connections between network devices.
Network Diagrams
Diagrams depicting network topology and device connections at various layers
Layer 1
Physical layer connections involving cables and hardware.
Layer 2
Data link layer connections, including switches and MAC addressing.
Layer 3
Network layer connections, including routers and IP addressing.
Asset Inventory
A detailed list and tracking system for all network hardware and software assets.
Hardware
Physical devices such as routers, switches, servers, and endpoints included in the asset inventory.
Software
Applications and licensed software tracked as part of the asset inventory.
Licensing
Management and tracking of software licenses and compliance.
Warranty Support
Documentation and tracking of warranty and support agreements for hardware and software.
IP Address Management (IPAM)
Processes and tools used to plan, track, and manage IP address allocations in a network.
Service-Level Agreement (SLA)
A contract defining the expected level of service between a provider and a client.
Wireless Survey/Heat Map
An analysis and visual representation of wireless signal strength and coverage in an area.
Life-Cycle Management
Managing the stages of network device and software life from acquisition to retirement.
End-of-Life (EOL)
The point at which a product is no longer sold or produced by the manufacturer.
End-of-Support (EOS)
The point at which a manufacturer no longer provides updates or support for a product.
Software Management
Managing software updates and patches for network devices and systems.
Patches and Bug Fixes
Updates released to fix software vulnerabilities or improve performance.
Operating System (OS)
The software that manages hardware and network resources on devices.
Firmware
Low-level software programmed into hardware devices that controls their functions.
Decommissioning
The process of removing hardware or software from active use and properly disposing of it.
Change Management
Formal process to request, track, approve, and implement changes to the network.
Request Process Tracking/Service Request
Monitoring and documenting all change requests or service tickets throughout their lifecycle.
Configuration Management
Tracking and maintaining device settings and software configurations.
Production Configuration
The active configuration currently running on network devices.
Backup Configuration
Saved copies of configurations used to restore devices if needed.
Baseline/Golden Configuration
Standardized, approved configuration used as a reference for devices.
SNMP
Simple Network Management Protocol used to monitor and manage network devices.
Traps
Notifications sent from devices to management systems signaling specific events or alerts.
Management Information Base (MIB)
A virtual database containing device objects monitored via SNMP.
Versions
SNMP protocol versions including v2c and v3, with varying features and security.
Community Strings
Passwords used to authenticate SNMP messages between devices and managers.
Authentication
Security mechanisms to validate SNMP communication.
Flow Data
Information collected about IP traffic flows for network analysis and monitoring.
Packet Capture
Technique of intercepting and logging traffic passing over a network.
Baseline Metrics
Standard measurements of normal network behavior used for anomaly detection.
Anomaly Alerting/Notification
Systems that detect and notify administrators of unusual network events.
Log Aggregation
Collecting logs from multiple devices into a centralized location.
Syslog Collector
A system that collects and stores syslog messages from network devices.
Security Information and Event Management (SIEM)
Tools that provide real-time analysis of security alerts and events.
Application Programming Interface (API) Integration
Connecting and managing network devices and tools through APIs.
Port Mirroring
Copying network traffic from one port to another for monitoring and analysis.
Solutions
Tools and methods used for network management and troubleshooting.
Ad Hoc
Manual or spontaneous network discovery performed as needed.
Scheduled
Automated, recurring network discovery performed on a set schedule.
Traffic Analysis
Examining network traffic to identify patterns, issues, or threats.
Performance Monitoring
Tracking network performance metrics like bandwidth and latency.
Availability Monitoring
Checking uptime and accessibility of network devices and services.
Configuration Monitoring
Tracking changes and states of device configurations.
Recovery Point Objective (RPO)
The maximum acceptable amount of data loss measured in time during recovery.
Recovery Time Objective (RTO)
The target maximum time allowed to restore service after a failure.
Mean Time to Repair (MTTR)
Average time required to repair a failed component or device.
Mean Time Between Failures (MTBF)
Average expected time between device or system failures.
Cold Site
A backup location with infrastructure but no active equipment.
Warm Site
A backup site with pre-installed equipment and partial functionality.
Hot Site
A fully operational backup site with real-time data replication.
High-Availability Approaches
Methods to maintain continuous network service:
Active-Active
Multiple systems actively sharing load simultaneously.
Active-Passive
Primary system actively runs while secondary system waits for failover.
Tabletop Exercises
Discussion-based simulations of disaster scenarios and responses.
Validation Tests
Hands-on testing of recovery procedures to ensure effectiveness.
Site-to-Site VPN
Virtual private network connecting entire networks securely.
Client-to-Site VPN
VPN allowing individual clients to connect securely:
Clientless
VPN connection without client software.
Split Tunnel vs. Full Tunnel
Whether traffic is split between local network and VPN or fully routed through VPN.
Connection Methods
Methods to access and manage network devices:
SSH
Secure protocol for remote command-line management of network devices.
Graphical User Interface (GUI)
Visual interface for managing network devices.
API
Application programming interface for automated management.
Console
Direct physical connection for device management.
Jump Box/Host
A dedicated system used as a secure gateway to access other network devices.
In-Band vs. Out-of-Band Management
Methods for managing devices:
In-Band Management
Managing devices over the same network used by regular traffic.
Out-of-Band Management
Using a dedicated management channel separate from regular network traffic.