Network Operations Flashcards

1
Q

Security and Business Risks are both areas for:

A

Risk Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information such as Non-disclosure agreements ( NDA ), memorandum of understanding ( MOU ), bring your own device (BYOD), and statement of work (SOW) are just a few of the __________regarding Network Operations

A

Documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

this is an area where everyone knows and are concerned with any changes with in the network

A

Change management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Basically a plan for relocating the network in case of an emergency

A

Disaster Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Collecting data and all the information when something goes down is known as:

A

Forensics or Incident Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Using fault tolerance and redundancy to help prevent your network from going down, and what type of backup plans you have to keep everything up and running

A

High Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

There are 4 security policies:

A

Acceptable use Policy - Defines ownership, what website that are allowed, Access time on the network
Remote Access Policy - Using a VPN, Authentication, Authorization
Password Policy - complexity, Password age, lockout policy
IT Safety Policy - Lifting equipment, Equipment handling, spills, procedures or how to’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

These are 3 terms regarding documentation:

A
  • Non-disclosure agreements ( NDA ) - says you can not talk about
    something you learn or find out while employed with your company
  • License Restriction - Usage, Transferring, and renewals
  • International Export Control - Military information, Nuclear
    Information, and License Keys`
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

These are 2 different types of Change management:

A

Strategic Change - massive change that affects the business structure
Infrastructure change -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A Change request is normally using when submitting a change:

A

Types of Change, Hardware or Software
Configuration Procedures
Rollback Process
What will the over Potential Impact be
Notification to everyone in the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Documentation is highly recommended when implementing a Change request:

A

Make sure everything about the change is documented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Before _________ any devices, be sure to research, test, and configure backups.

A

Patching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

__________ updates are necessary but they depend on the device.

A

Firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

__________ ___________ updates are the most common type of update

A

Operating System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A ________ _________ is an overall look at security in the organization

A

Risk Posture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

______ ________ is used to examine the strength of your network security

A

Pen Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

this is a common IP that’s shared by multiple systems

A

Virtual IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A _______ _______ _________ is one system that, if it fails, will bring down an entire process, workflow, or the whole organization.

A

Single point of failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

______ _______ are the systems needed to maintain production

A

Critical Assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

_________ __________ are the devices needed to maintain the network

A

Critical node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

the Key to maintaining a production on the network is to avoid a ______ ________ __________

A

Single point of failure

22
Q

This document is between the customer and service provider. it defines the scope, quality, an terms of service to be provided.

A

Service Level Agreement or ( SLA )

23
Q

this document defines the agreement between two parties, is used where a legally binding contract is inappropriate
* definition of duties
* time frame

A

memorandum of understanding ( MOU )

24
Q

this document is an agreement between say manufacturers that say they will continue to make parts for each other

A

Multi-source agreement ( MSA )

25
Q

this document is a legal contract between 2 parties ( vendor and Customer)
* Defines services to be performed / supplied
* Defines time frame / deliverables
* Defines milestones / defines progress

A

Statement of Work ( SOW )

26
Q

things that should be done when a incident happens:

A

Secure the area
Document the Scene
Collect evidence
Chain of Custody
Forensics Report to authorities

27
Q

A ______ _______ is the person who must report an incident as soon as it happens.

A

First Responder

28
Q

this is the state of data once it has been reovered

A

Recovery Point objective (RPO)

29
Q

this is the actual time needed to 4 restore / recover full functionality of an organizations network once it seizes to function

A

Recovery time objective ( RTO )

30
Q

To data types when it comes to backups:

A

Configuration data
State

31
Q

Backup methods include:

A

Full Backup
Differential Backup - means to backup all changes since the last full
Incremental Backup - only backs up changes made from last backup
Offsite Backups
Cloud Backups - takes a lot of time for the first full backup

32
Q

this backup is mainly seen on Virtual Machine. they are perfect way of making a copy of something that happened in the past and are not typically stored on separate media.

A

Snapshots

33
Q

When working with local backups you need to think about mediums:

A

Tapes
External Hard drives

34
Q

the failed time to repair a disaster is known as

A

( MTTRepair )

35
Q

the time a system is repaired until it goes down again is known as:

A

( MTTFailure )

36
Q

the time a system fails, it’s repaired and, it fails again is known as:

A

( MTBF ) or mean time between failures

37
Q

Backup site that are part of your evacuation plan include the following:

A

Cold Site
Warm site
Hot site

38
Q

this type of recovery site takes weeks to bring online, it a basic office space, has no operational equipment, and is the cheapest

A

Cold Site

39
Q

this type of recovery site will take days to bring on line and it does have operational equipment

A

Warm Site

40
Q

this type of recovery site only takes hours to bring online an it has real time synchronization, almost all data is ready to go - often will need a quick update, and are very expensive

A

Hot site

41
Q

When choosing your recovery site you might want to think of:

A

Distance and location
Internet requirements - for Housing and Entertainment
Legal issues

42
Q

Your business continuity should include:

A

Annual Exercises.
Alternative Processing Sites
After action Reports
Cloud site backups

43
Q

______ _______ attempts to mitigate incidents to preserve business functiionality

A

Contingency or business continuity planning

44
Q

thorough __________ and _________ practice is what makes recovery plans successful when disasters occur.

A

planning and practice

45
Q

BYOD stands for:

A

Bring your own device

46
Q

AUP stands for

A

Acceptable use Policy agreement

47
Q

this allows a company to connect to a mobile device from a centralized location to be able to control and manage that device

A

Mobile Device Manager (MDM)

48
Q

BYOD challenges include:

A

Personal use versus Business use
The MDM should be able to manage a device from anywhere
Personal data versus company data

49
Q

this is where the corporation owns all the devices you use

A

Corporate-owned, business only (COBO)

50
Q

this is basically the same as COBO but the users will receive an approved list of items or apps they can use.

A

Corporate-owned/issued, personally enabled ( COPE )

51
Q

this is basically the same as COBO but the users can actually choose their devices

A

Choose your own device ( CYOD )

52
Q

A _________ assessment examines any possible security threat, like looking at threats from actors

A

Posture