Network+ Domain 3: Network Operations

0.0(0)
studied byStudied by 0 people
0.0(0)
call with kaiCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/100

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 2:48 AM on 9/9/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

101 Terms

1
New cards

Low Humidity Effects

Can result in electrostatic discharge and condensation.

2
New cards

Differential Backup

Backs up only files changed since last full backup.

3
New cards

Humidity Control

To reduce issues, add a de-humidifier to the server room.

4
New cards

Transmission Confirmation

An agent sends an alert to the manager for confirmation.

5
New cards

Community String

Identifies devices under the same administrative control.

6
New cards

Trunk Port Connection

Connecting switches with a straight-through UTP cable.

7
New cards

Business Continuity Planning

Minimize risk of delays and maintain operations during failures.

8
New cards

Packet Sniffer Issue

Capture traffic by connecting Hosts A and B through a hub.

9
New cards

RJ45 Wall Jacks Location

Found in wiring schematic for intermediate distribution closet.

10
New cards

Data Center Security

Install biometric lock and racks with locking doors.

11
New cards

Local Security Policy

Set password length and account lockout policies.

12
New cards

Fire Suppression

Use CO2 or FM200 to suppress electrical fires.

13
New cards

Account Restrictions

Configure day/time restrictions in user accounts.

14
New cards

Error Rate Calculation

Measures how often bits are damaged in transit.

15
New cards

Power Deviation Length

Surge is the longest power deviation.

16
New cards

Baseline Establishment

Establish baselines within a network's first week.

17
New cards

Packet Arrival Order Issue

Different speeds cause packets to arrive out of order, leading to jitter.

18
New cards

Cache Poisoning Log

Check DNS logs to determine cache poisoning or spoofing.

19
New cards

CPU Temperature Check

Check in BIOS for CPU temperature monitoring.

20
New cards

Cable Movement Documentation

Update wiring schematic after moving cables.

21
New cards

Bandwidth Monitoring

First establish a baseline to monitor bandwidth usage.

22
New cards

Component Layout Diagram

Floor plan provides layout of all wiring and components.

23
New cards

Full Backup Definition

Backs up all files from a computer's file system and marks them as backed up.

24
New cards

Protocol Monitoring Tool

Use a packet sniffer to monitor and sort traffic by protocol.

25
New cards

Remote Access Authorization

Uses CHAP or MS-CHAP for authorization.

26
New cards

Equipment Fit Check

4U firewall can fit on the 16U wall-mounted rack.

27
New cards

Incremental Backup Inclusions

Backs up only files changed since last full or differential backup.

28
New cards

Backup Strategy for DRP

Perform a full backup once per week and an incremental backup the other days.

29
New cards

Power signal conditions

Prevents over-voltages and maintains voltage levels

30
New cards

ESD prevention

Protects equipment from electrostatic discharge

31
New cards

Trunk port

Configured to connect switches for data transmission

32
New cards

Plenum cable

Cable suitable for air handling spaces to prevent fire hazards

33
New cards

UPS

Uninterruptible Power Supply for continuous power during outages

34
New cards

Throughput tester

Tool to measure actual bandwidth on a network link

35
New cards

Network diagram

Illustrates subnets, addresses, and routers in a network

36
New cards

Syslog severity level 7

Indicates a debugging message in Syslog

37
New cards

Virtualization servers

Servers used to create virtual instances for various applications

38
New cards

Packet sniffer

Tool to capture and analyze network packets for troubleshooting

39
New cards

MIB navigation

Uses GETNEXT messages to navigate the Management Information Base

40
New cards

Processor performance

CPU utilization should average around 40% in a healthy system

41
New cards

Email header verification

Adding X-headers to prevent email spoofing

42
New cards

Port mirroring

Configuring a switch to copy traffic from one port to another

43
New cards

Incremental backup

Backs up files with the archive bit set without resetting it

44
New cards

Root cause analysis

Process to identify the main reason for system issues

45
New cards

Change Management policy

Outlines the process before implementing new network devices

46
New cards

SNMP security enhancement

Taking steps to increase security when using SNMP for monitoring

47
New cards

Hot aisle

Area where heat is sent out in equipment cooling systems

48
New cards

Promiscuous mode

Configuration to capture all network traffic on an interface

49
New cards

T568A standard

Identifies the wiring standard used in network drop cables

50
New cards

Firewall port status

Check baseline configurations to verify open or closed ports

51
New cards

Fastest data restoration

Restoring full backup from Sunday and last incremental backup

52
New cards

SNMP Version 3

Enhanced SNMP with agent and manager authentication, message encryption

53
New cards

SSL

Secure communication protocol combined with SNMP

54
New cards

SSH

Secure alternative to SNMP for network management

55
New cards

RADIUS

Authentication, authorization, and accounting solution

56
New cards

Load Balancer

Device distributing client requests to servers

57
New cards

OID

Identifies devices under the same administrative control in SNMP

58
New cards

Inverter

Converts DC power from batteries to AC for data center devices

59
New cards

Web Server Logs

Logs indicating user login times and locations

60
New cards

Packet Sniffer

Tool to examine individual frames sent to a firewall

61
New cards

Granular Password Policy

Policy enforcing longer passwords for specific users

62
New cards

Hot and Cold Aisles

Configuration to manage server room temperature

63
New cards

Change Documentation

Document to update after replacing a network cable

64
New cards

Incremental Backups

Backups done daily except Sunday for data recovery

65
New cards

Usermod and Passwd

Utilities to lock a user account

66
New cards

Protocol Analyzer

Device for copying frames and viewing contents

67
New cards

Ethernet Bonding

Solution to prevent NIC failure affecting website accessibility

68
New cards

Scope in BCP

Primary focus area in business continuity planning

69
New cards

Baseline

Tool to identify maximum simultaneous sessions a server can handle

70
New cards

Bottleneck

Term for system unable to meet demands placed on it

71
New cards

Acceptable Use Agreement

Contract specifying employee behavior regarding organization's resources

72
New cards

Monitoring Agreement

Outlines organization's monitoring activities

73
New cards

Non-Compete Agreement

Prohibits employee from working for a competitor

74
New cards

Acceptable Use Policy

Defines employees' rights to use company property

75
New cards

Least Effective Power Loss Protection

Surge protector

76
New cards

Ethernet Bonding Purpose

Provides failover solution, increases network performance

77
New cards

Rack Unit Height

1.75 inches tall

78
New cards

Syslog Emergency Level

Level 0

79
New cards

Password Policy Enforcement

Configure account policies in Group Policy

80
New cards

Firewall Packet Rejection Tool

Event log

81
New cards

Policy Document Content

Requirement for using encrypted communications

82
New cards

24U Rack Height

30 inches

83
New cards

Automatic Account Lockout

Configure account lockout policies in Group Policy

84
New cards

Operating System without Syslog

Windows

85
New cards

Latency Definition

Speed of data packets from source to destination

86
New cards

Trap Protocol Usage

SNMP

87
New cards

Event Logging Term

Trap

88
New cards

Data Restore Operations

Two

89
New cards

Traffic Identification Tool

Protocol analyzer

90
New cards

Computer Crashing Causes

Processor is too hot

91
New cards

System Image Backup Description

Contains OS, programs, drivers, user data

92
New cards

Interface fa0/0 Characteristics

No input or output errors, running in half-duplex mode

93
New cards

Reasons for Protocol Analyzer Use

Identify legacy protocols, identify slow networks

94
New cards

Bandwidth Definition

Amount of data transferred in a specific time

95
New cards

User Account Deletion Commands

userdel -r bsmith; rm -rf /home/bsmith

96
New cards

Backup Strategy Restore Operations

Three

97
New cards

Network Traffic Averages Identifier

Baseline

98
New cards

Non-Disclosure Agreement

Contract not to share proprietary info

99
New cards

Password Policy Change for Directors OU

Create a GPO linked to the Directors OU

100
New cards

Denial-of-Service Attack Log Examination

Security log