Unit 5 Flashcards
___ ___ consists of AFI’s, Local OI’s, and other policies adopted to prevent and monitor unauthorized access, misuse, modification, or denial of service of a computer network or network device.
Network Security
____ is not simply ensuring multiple media paths in a network, but it also refers to the devices themselves and the power supplied to each device. Redundant power eliminates a single point of power failure within the network.
Redundancy
Redundancy uses ___ of critical components/devices, increasing the reliability of the system.
duplication
___ are inexpensive and convenient solutions that can be applied on a per device basis or support multiple devices with lower power requirements.
Uninterruptible Power Supplies (UPS)
In the event of a power failure, the ___ will provide power, similar to a large rechargeable battery, to all devices connected until the battery drains, at which point the connected devices will power down.
UPS
A ___ is commonly used to supply power to end devices to mitigate minor short-term outages.
UPS
___ ___ ___ is beneficial because, over time, power supplies fail. Having a backup power supply built-in ensures that there is readily available power for the device in the event the primary power source fails.
Redundant Power Supplies
The main drawback is that this solution provides no protection for large-scale power failures within the network.
Redundant Power Supplies
Generally, ___ ___ are reserved for vital or large-scale facilities that house core network components.
facility generators
___ ___ protect entire buildings for sustained periods to ensure mission- critical devices remain functional.
facility generators
The drawback is that these systems require continual maintenance and are generally very costly.
facility generators
This would be a solution used to minimize the effect of large-scale outages caused by natural phenomena (such as lightning strikes) or brownouts.
facility generators
___ ___ helps eliminate a single point of failure in the network.
Network redundancy
Sometimes the device itself just fails. In these instances, it is common to have devices, known as a ___ ___, ready for replacement. A ___ ___ device would be a mirror image of the failed device down to
specifications and configuration.
hot spare
This allows technicians to quickly replace the failed device with
the pre-configured spare device to restore network operation. Minimizing the downtime in a network should be a priority for all network technicians. It is important to understand you will not
have a ___ ___ ___ for all network devices; generally, only mission-critical devices require this option.
hot spare device
___ ___ provides a solution for network managers who require higher bandwidth between servers, routers, and switches than single-link Ethernet technology can provide.
Link aggregation
___ ___ provides incremental trunk speeds by combining multiple interfaces to act as one link.
Link aggregation
When it comes to link aggregation, the maximum number of links that can be combined is…?
eight
____ is a technology used to allow grouping of several physical Ethernet links to create one logical Ethernet link. It is basically a port link aggregation technology used primarily on Cisco
switches.
EtherChannel
____ allows multiple physical Ethernet links to combine into one logical channel. This allows load sharing of traffic among the links in the channel as well as redundancy in the event that one or more links in the channel fail.
EtherChannel
____ is a Cisco proprietary version of Link-Aggregation described as having more than one link connected to a server, switch, or router and treating it like one logical link.
EtherChannel
The following is a list of benefits for what technology?
Increased bandwidth
Redundancy
When a link fails, the traffic will go onto another link almost instantly
When a link is restored, it will automatically rejoin the ____
EtherChannel
____ is an application layer protocol that is a part of the TCP/IP suite. It exchanges management information between network devices. Network administrators use ___ to monitor and map network availability, performance, and error rates.
Simple Network Management Protocol (SNMP)
Which version of SNMP is the following describing?
____ operates over protocols such as User Datagram Protocol (UDP), Internet Protocol (IP), OSI Connectionless Network Service (CLNS), AppleTalk Datagram-Delivery Protocol (DDP), and Novell Internet Packet Exchange (IPX). It is not used in today’s networks.
SNMP version 1 (SNMPv1)
Which version of SNMP is the following describing?
Revises version 1 and includes improvements in the areas of performance, security, confidentiality, and manager-to-manager communications. This version is still used, but SNMPv3 is preferred.
SNMP version 2 (SNMPv2)
Which version of SNMP is the following describing?
This version added security and remote configuration enhancements to SNMP. This is the preferred version of SNMP. It is also the SNMP version that is required on AF networks.
SNMP version 3 (SNMPv3)
___ is any program or code designed to do something on a system or network that you don’t want to have happen.
Malware
A ___ is a program that has two jobs: to replicate and to activate. Replication means it makes copies of itself, often as code stored in boot sectors or as extra code added to the end of executable
programs. Activation is when a ___ does something like erase the boot sector of a drive.
Virus