1/100
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Low Humidity Effects
Can result in electrostatic discharge and condensation.
Differential Backup
Backs up only files changed since last full backup.
Humidity Control
To reduce issues, add a de-humidifier to the server room.
Transmission Confirmation
An agent sends an alert to the manager for confirmation.
Community String
Identifies devices under the same administrative control.
Trunk Port Connection
Connecting switches with a straight-through UTP cable.
Business Continuity Planning
Minimize risk of delays and maintain operations during failures.
Packet Sniffer Issue
Capture traffic by connecting Hosts A and B through a hub.
RJ45 Wall Jacks Location
Found in wiring schematic for intermediate distribution closet.
Data Center Security
Install biometric lock and racks with locking doors.
Local Security Policy
Set password length and account lockout policies.
Fire Suppression
Use CO2 or FM200 to suppress electrical fires.
Account Restrictions
Configure day/time restrictions in user accounts.
Error Rate Calculation
Measures how often bits are damaged in transit.
Power Deviation Length
Surge is the longest power deviation.
Baseline Establishment
Establish baselines within a network's first week.
Packet Arrival Order Issue
Different speeds cause packets to arrive out of order, leading to jitter.
Cache Poisoning Log
Check DNS logs to determine cache poisoning or spoofing.
CPU Temperature Check
Check in BIOS for CPU temperature monitoring.
Cable Movement Documentation
Update wiring schematic after moving cables.
Bandwidth Monitoring
First establish a baseline to monitor bandwidth usage.
Component Layout Diagram
Floor plan provides layout of all wiring and components.
Full Backup Definition
Backs up all files from a computer's file system and marks them as backed up.
Protocol Monitoring Tool
Use a packet sniffer to monitor and sort traffic by protocol.
Remote Access Authorization
Uses CHAP or MS-CHAP for authorization.
Equipment Fit Check
4U firewall can fit on the 16U wall-mounted rack.
Incremental Backup Inclusions
Backs up only files changed since last full or differential backup.
Backup Strategy for DRP
Perform a full backup once per week and an incremental backup the other days.
Power signal conditions
Prevents over-voltages and maintains voltage levels
ESD prevention
Protects equipment from electrostatic discharge
Trunk port
Configured to connect switches for data transmission
Plenum cable
Cable suitable for air handling spaces to prevent fire hazards
UPS
Uninterruptible Power Supply for continuous power during outages
Throughput tester
Tool to measure actual bandwidth on a network link
Network diagram
Illustrates subnets, addresses, and routers in a network
Syslog severity level 7
Indicates a debugging message in Syslog
Virtualization servers
Servers used to create virtual instances for various applications
Packet sniffer
Tool to capture and analyze network packets for troubleshooting
MIB navigation
Uses GETNEXT messages to navigate the Management Information Base
Processor performance
CPU utilization should average around 40% in a healthy system
Email header verification
Adding X-headers to prevent email spoofing
Port mirroring
Configuring a switch to copy traffic from one port to another
Incremental backup
Backs up files with the archive bit set without resetting it
Root cause analysis
Process to identify the main reason for system issues
Change Management policy
Outlines the process before implementing new network devices
SNMP security enhancement
Taking steps to increase security when using SNMP for monitoring
Hot aisle
Area where heat is sent out in equipment cooling systems
Promiscuous mode
Configuration to capture all network traffic on an interface
T568A standard
Identifies the wiring standard used in network drop cables
Firewall port status
Check baseline configurations to verify open or closed ports
Fastest data restoration
Restoring full backup from Sunday and last incremental backup
SNMP Version 3
Enhanced SNMP with agent and manager authentication, message encryption
SSL
Secure communication protocol combined with SNMP
SSH
Secure alternative to SNMP for network management
RADIUS
Authentication, authorization, and accounting solution
Load Balancer
Device distributing client requests to servers
OID
Identifies devices under the same administrative control in SNMP
Inverter
Converts DC power from batteries to AC for data center devices
Web Server Logs
Logs indicating user login times and locations
Packet Sniffer
Tool to examine individual frames sent to a firewall
Granular Password Policy
Policy enforcing longer passwords for specific users
Hot and Cold Aisles
Configuration to manage server room temperature
Change Documentation
Document to update after replacing a network cable
Incremental Backups
Backups done daily except Sunday for data recovery
Usermod and Passwd
Utilities to lock a user account
Protocol Analyzer
Device for copying frames and viewing contents
Ethernet Bonding
Solution to prevent NIC failure affecting website accessibility
Scope in BCP
Primary focus area in business continuity planning
Baseline
Tool to identify maximum simultaneous sessions a server can handle
Bottleneck
Term for system unable to meet demands placed on it
Acceptable Use Agreement
Contract specifying employee behavior regarding organization's resources
Monitoring Agreement
Outlines organization's monitoring activities
Non-Compete Agreement
Prohibits employee from working for a competitor
Acceptable Use Policy
Defines employees' rights to use company property
Least Effective Power Loss Protection
Surge protector
Ethernet Bonding Purpose
Provides failover solution, increases network performance
Rack Unit Height
1.75 inches tall
Syslog Emergency Level
Level 0
Password Policy Enforcement
Configure account policies in Group Policy
Firewall Packet Rejection Tool
Event log
Policy Document Content
Requirement for using encrypted communications
24U Rack Height
30 inches
Automatic Account Lockout
Configure account lockout policies in Group Policy
Operating System without Syslog
Windows
Latency Definition
Speed of data packets from source to destination
Trap Protocol Usage
SNMP
Event Logging Term
Trap
Data Restore Operations
Two
Traffic Identification Tool
Protocol analyzer
Computer Crashing Causes
Processor is too hot
System Image Backup Description
Contains OS, programs, drivers, user data
Interface fa0/0 Characteristics
No input or output errors, running in half-duplex mode
Reasons for Protocol Analyzer Use
Identify legacy protocols, identify slow networks
Bandwidth Definition
Amount of data transferred in a specific time
User Account Deletion Commands
userdel -r bsmith; rm -rf /home/bsmith
Backup Strategy Restore Operations
Three
Network Traffic Averages Identifier
Baseline
Non-Disclosure Agreement
Contract not to share proprietary info
Password Policy Change for Directors OU
Create a GPO linked to the Directors OU
Denial-of-Service Attack Log Examination
Security log