Network management/policies Flashcards

1
Q

Incident Response Plan

A

Contains set of instructions to help network and system admins detect, respond to, and recover from network security incidents.
-cyber crime, data loss, and service outages that threaten daily work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Business Continuity Plan

A

Document that outlines how a business will continue operating during an unplanned disruption in service.
-more comprehensive than disaster recovery plan and contains contingencies for business processes, assets, your human capital and business partners, and all other business aspects that might be affected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

System Life Cycle Plan

A

Describes approach to maintaining an asset from creation to disposal.
-5 phase lifecycle:
Planning, Design, Transition, Operations, and Retirement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data Loss Prevention

A

Used to ensure that end-users do not send sensitive or critical information outside the corporate network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Acceptable Use Policy (AUP)

A

Admin controls
-set of rules the restricts the ways a network device can be used and set guidelines on how it should be used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Non-disclosure agreement (NDA)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Memorandum of Understanding (MOU)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Service Level Agreement (SLA)

A

Admin controls
-contract between a service provider and end user that defines the level of service expected from provider. (Specifically defines what the customer will receive like faster response times)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NetFlow

A

Defines a particular traffic flow based on the different packets that share the same characteristics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Flow analysis

A

Relies on flow collector to record metadata and statistics about network traffic rather than recording each frame
-highlights trends and patterns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Zeek

A

Passive monitors a network like a sniffer, but only logs full packet capture data of potential interest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

MRTG

A

Multi Router Traffic Grapher
-creates graphs showing traffic flow through the network interfaces of routers and switches by polling the appliances with SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Rollback Plan

A

Purpose is to document at every point during deployment of a change or upgrade where you can stop the deployment and return to a known good state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Disaster Recovery Plan

A

Documented, structured approach that documents how an organization can quickly resume work after an unplanned incident.
-natural disasters, power outages, cyber attacks, and other disruptive events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Condition/Severity Levels

A

0 - emergency - system is unstable
1 - alert - condition that should be corrected immediately
2 - critical - failure that needs immediate attention
3 - error - something happening preventing proper function
4 - warning - error may occur if action not taken
5 - notice - events are unusual
6 - information - requires no action
7 - debugging - info for developers as they are debugging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Troubleshooting methodology

A
  1. Identify problem
  2. Establish theory of probable cause
  3. Test theory
  4. Establish a plan of action to resolve problem and identify potential effects
  5. Implement solution or escalate
  6. Verify full system functionality and implement preventative measures(if possible)
  7. Document
17
Q

SNMP

A

-Used to send and receive data from devices to centralized network management station
-Granular
—trap messages get unique object indentifier (OID) for manager to distinguish each message.
—stores OID information in a translation file called MIB (Management Information Base)
—manager only needs to see OID to look up information instead of alert information being contained in the trap.
—prevent redundant info and uses less bandwidth

-Verbose
—all messages sent from one device use the same OID
—alerts as payloads
—simple key:value pair (variable binding)

18
Q

SNMP TRAP

A

Enables managed device to send out alerts to SNMP manager. These traps messages concern the failure of the monitored device, maintenance issues, etc.
INFORM message sent from manager in reply to trap message

19
Q

SNMP WALK

A

Chain of multiple getnext commands essentially goes through a MIB tree from OID to OID pulling information

20
Q

SNMP GET

A

Main method used to request information from a service agent on a specific object identifier.