3.0 Network Operations Flashcards
What defines proper system usage for employees when using information technology (IT) systems?
AUP
what type of policy would specify the rules and guidelines related to connecting a personally owned device to a corporate network?
BYOD policy
what policy are employees typically required to read and acknowledge that outlines user responsibilities?
AUP
what UDP-based encryption protocol is often used for VPN access?
DTLS (datagram transport layer security)
what protocol uses SSH with FTP to securely transfer files?
SFTP
why is telnet not recommended for use today?
lack of encryption
what should be used in place of telnet for better security?
SSH
what type of VPN allows users to access an internal network with a web browser?
SSL VPN
note that SSL VPNs often use TLS
what protocol would you use to transfer large files?
FTP
what type of system would you use to consolidate and analyze security logs from multiple systems, in addition to providing real-time monitoring?
SIEM (security information and event management)
what option should you use to ensure SNMPv3 command and information remains confidential?
the authProv security level
what protocol would you use to securely manage network devices?
SNMPv3
what should be done if a software update causes some features to no longer work?
Rollback the update
what process would an organization implement to ensure systems are kept up-to-date?
patch management
what is the best place to test updates to ensure they do not cause undesired outages?
Test server or test environment