Network Monitoring Flashcards

1
Q

Baselining often refers to what two things?

A

1) the standard level of performance of a certain device

2) the normal operating capacity for your whole network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 4 key components of a network device baseline?

A

1) processor
2) memory
3) hard-disk
4) network adaptor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What processes can enhance baselining

A

1) log reviewing

2) it says patching and rollback but I fail to see what the link to base lining is here.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cisco’s Network Admission Control and Microsoft’s Network Access Protection are examples of what?

A

Network Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Polices describe what?

A

1) how the network is configured and operated as well as how people are expected to behave on it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Procedures often describe what?

A

How to execute policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

High-level management support is one of the most important aspects in what? Why?

A

Policies and procedures. It means consequence will be enforced if there are breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List the 4 main Standard Business documents

“Sta-Mem-Mas-Ser”

A

1) Statement of Work
2) Memorandum of Understanding
3) Master License Agreement
4) Service-Level Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which business document spells out all details concerning what work is to be performed, deliverables, and the timeline a vendor must execute in performance of specified work

A

Statement of Work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Memorandum of Understanding and what is it often used for?

A

An agreement between two or more organizations that details a common line of action.
It is often used in cases where parties do not have a legal commitment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IT regulations centre around the what triad? List the meanings.

A

CIA.

Confidentiality - protection of data against unauthorized viewing
Integrity - protection of data against changes to it and thus be reliable
Availability - obvious but it’s about ensuring it can be accessed when needed and quickly too.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What should you consider if you have a fail-lock door system?

A

The effect it may have during an evacuation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of fire suppressant to most companies today use?

A

Halon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which type of network should always be segregated from other networks?

A

the Distributed Control System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What control system operates coded signals over communication channels to provide control of remote equipment?

A

Supervisory Control And Data Acquisition (SCADA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Sensors, remote terminal units and programmable logic controllers are all components of what type of system?

A

Supervisory Control And Data Acquisition system (SCADA)

17
Q

Segmenting the network and controlling access from one segment makes it easier to maintain what in the network?

A

Security

18
Q

What are the two reasons we implement segmentation in Medianets?

A

1) to ensure the security of the network

2) to ensure the network delivers the high performance required by the applications