Creado por Brian Nichols
hace más de 6 años
|
||
Pregunta | Respuesta |
NFS | The Network File System (NFS) is a client/server application that lets a user view and store files on a remote computer as though they were on the user's own computer. |
RFC | Request For Change When a network administrator believes that a change should be made on the network. Request for change should be filed |
CIFS | The Common Internet File System Is the renaming of SMB protocol by Microsoft. (CIFS/SMB) is the standard way that users share files across intranets and the Internet. |
SMBD | SMBDis the server daemon (application) on Linux that provides filesharing and printing services to Windows clients. |
NMDB | NetBIOS name services Emulates Windows environment on Linux for Samba naming services. It allows other computers to browse the resources provided by the Samba server |
SFU | Software for Microsoft that emulates Linux, |
SAN | Storage Area Network A high-speed subnetwork of shared storage devices. A SAN's architecture works in a way that makes all storage devices available to all servers on a LAN or WAN. . |
Management Proxies | Remote software that provides information on the target system and provides suggestions. |
SNMP | Simple Network Management Protocol Are protocols for managing complex networks. Used for collecting and organizing information about managed network devices and modifying that information to change device behavior. |
LDAP | The Lightweight Directory Access Protocol is an open industry application protocol for accessing and maintaining directory information over an IP network. |
ADSL | Asynchronous DSL Allows for higher download speeds than upload speeds over standard copper lines. |
IMAP | Internet Message Access Protocol (IMAP) is an Internet protocol used by e-mail clients to retrieve e-mail messages from a mail server over a TCP/IP connection. Messages stay on the server. |
Firewall | Firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules |
MIME | Multipurpose Internet Mail Extensions - is an Internet standard that extends the format of email to support: Text in character sets other than ASCII: audio, video, images, application programs etc. |
SMTP | Simple Mail Transfer Protocol (SMTP) is an Internet standard for email transmission. |
MTA | Message transfer agent is software that transfers email from one computer to another using a client-server application. |
MUA Software | Mail User Agent is a computer program used to access and manage a user's email. ex. Outlook |
MTA Software | Mail Transfer Agent Exchange Server |
NAS | Network-attached storage Is a storage device connected to a network providing data access to a group of clients. SMB and NFS supported. |
Firewall Techniques | A) Packet Filter B) Application Gateway C) Stateful Inspection |
IP Spoofing | Modification of packet headers Thinks it comes from a trusted source. |
Difference Unicode and ASCII | ASCII has 7 text-based bits. The 8th bit is used for image lines. Unicode is 16 bits for high-quality graphics and styled font text. |
Baseline | State of the software when it was first installed for comparison to future states. |
Audit Types | Inventory Audits Facility Audit Operational Audit Efficiency Audit Security Audit |
Inventory Audit | Inventory Audits should be done before the network is operational Best performed when all the equipment is in one place |
Facility Audit | Facility audit tracks network devices and notes physical location of all network equipment It is best to have network diagram. The diagram should be updated |
Operational Audit | This audit looks at daily operational parameters of the network: Network utilization Average # of collisions # of network errors Amount of broadcast traffic |
Efficiency Audit | Evaluate performance of network-support staff and network users. Evaluated for their ability to respond to and troubleshoot network problems. Determine if there is sufficient # of adequately trained support personnel. |
Security Audit | All that requires limited access to passwords or locks. What virus protection is needed Which files should be backed up What type of emergency and disaster-recovery procedures should be implemented |
EMI | Electromagnetic Interference Equipment that interferes with normal operation of computer systems. |
SMB is the same as? | CIFS |
What is SMB? | A Linux protocol used by Microsoft OS allowing shared access to files and printers. |
What is Samba? | Sofware on Linux that provides File/Print services for smb/CIFS clients. Allows Unix servers to communicate with the same networking protocol as Microsoft Windows products |
RFI | Radio Frequency Interference |
SOAP | Messaging protocol Allows software to run on different OS systems to communicate with each other. |
DAS | Direct Attached Storage Storage unit directly connected to a device. |
SCSI | Small Computer System Interface Standards for physically connecting and transferring data between devices. Example Raid systems Parallel interface |
Fiber Channel | Fiber or Copper technology for transmitting data between computer devices at data rates of up to 4 + Gbps. |
ISCSI | Internet Small Computer Systems Interface SCSI over the IP network |
Postscript | Developed for desktop publishing More MAC end design Made for graphics Supported by most printers |
PCL | Printer Command Language Not originally designed for graphics. Supports different program languages for printers. Supported by most printers. |
Win Printer | No intelligence on the printer. Documents are sent to printers from a device. |
CUPS | Print server software for LInux |
Raster Graphics | Individual dots that create an image Graphics produce images as grids of individually defined pixels |
Vector Graphics | Complete image printing Produces images using points, lines, and shapes. Faster than Raster |
BIND | Allows DNS to run on Linux Sofware developed by Burkly |
Purpose Proxy Server | Filter requests - deny/permit websites Cache information to speed up same requests in the future. |
DMZ | Demilitarized Zone a physical or logical subnetwork that exposes an organization's external-facing services to an untrusted network. An external network can access only what is exposed in the DMZ, while the rest of the organization's network is firewalled. |
Gateways | Joining of different systems together to communicate that may use different protocols. |
Extranet | A controlled private network that allows access to partners, vendors, and suppliers or an authorized set of customers. Ex. Remote VPN |
XML | Is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable |
Network Management Elements | Security: Ensuring that the network is protected from unauthorized users. Performance: Eliminating bottlenecks in the network. Reliability: Making sure the network is available to users and responding to hardware and software malfunctions. |
Difference between Manager and Agent | Manager polls agents for information. Any alerts are then referred to Managers. |
MIB | Management Information Database Are objects that can manage simple network protocols on the agent. |
Why would you do a network audit? | Done to ensure that a network is performing correctly. Compares results to the initial audit at setup as a baseline. |
¿Quieres crear tus propias Fichas gratiscon GoConqr? Más información.