Network Operations Flashcards
Security and Business Risks are both areas for:
Risk Management
Information such as Non-disclosure agreements ( NDA ), memorandum of understanding ( MOU ), bring your own device (BYOD), and statement of work (SOW) are just a few of the __________regarding Network Operations
Documentation
this is an area where everyone knows and are concerned with any changes with in the network
Change management
Basically a plan for relocating the network in case of an emergency
Disaster Planning
Collecting data and all the information when something goes down is known as:
Forensics or Incident Response
Using fault tolerance and redundancy to help prevent your network from going down, and what type of backup plans you have to keep everything up and running
High Availability
There are 4 security policies:
Acceptable use Policy - Defines ownership, what website that are allowed, Access time on the network
Remote Access Policy - Using a VPN, Authentication, Authorization
Password Policy - complexity, Password age, lockout policy
IT Safety Policy - Lifting equipment, Equipment handling, spills, procedures or how to’s
These are 3 terms regarding documentation:
- Non-disclosure agreements ( NDA ) - says you can not talk about
something you learn or find out while employed with your company - License Restriction - Usage, Transferring, and renewals
- International Export Control - Military information, Nuclear
Information, and License Keys`
These are 2 different types of Change management:
Strategic Change - massive change that affects the business structure
Infrastructure change -
A Change request is normally using when submitting a change:
Types of Change, Hardware or Software
Configuration Procedures
Rollback Process
What will the over Potential Impact be
Notification to everyone in the organization
Documentation is highly recommended when implementing a Change request:
Make sure everything about the change is documented.
Before _________ any devices, be sure to research, test, and configure backups.
Patching
__________ updates are necessary but they depend on the device.
Firmware
__________ ___________ updates are the most common type of update
Operating System
A ________ _________ is an overall look at security in the organization
Risk Posture
______ ________ is used to examine the strength of your network security
Pen Testing
this is a common IP that’s shared by multiple systems
Virtual IP
A _______ _______ _________ is one system that, if it fails, will bring down an entire process, workflow, or the whole organization.
Single point of failure
______ _______ are the systems needed to maintain production
Critical Assets
_________ __________ are the devices needed to maintain the network
Critical node