|
|
Created by Brian Nichols
almost 8 years ago
|
|
| Question | Answer |
| NFS | The Network File System (NFS) is a client/server application that lets a user view and store files on a remote computer as though they were on the user's own computer. |
| RFC | Request For Change When a network administrator believes that a change should be made on the network. Request for change should be filed |
| CIFS | The Common Internet File System Is the renaming of SMB protocol by Microsoft. (CIFS/SMB) is the standard way that users share files across intranets and the Internet. |
| SMBD | SMBDis the server daemon (application) on Linux that provides filesharing and printing services to Windows clients. |
| NMDB | NetBIOS name services Emulates Windows environment on Linux for Samba naming services. It allows other computers to browse the resources provided by the Samba server |
| SFU | Software for Microsoft that emulates Linux, |
| SAN | Storage Area Network A high-speed subnetwork of shared storage devices. A SAN's architecture works in a way that makes all storage devices available to all servers on a LAN or WAN. . |
| Management Proxies | Remote software that provides information on the target system and provides suggestions. |
| SNMP | Simple Network Management Protocol Are protocols for managing complex networks. Used for collecting and organizing information about managed network devices and modifying that information to change device behavior. |
| LDAP | The Lightweight Directory Access Protocol is an open industry application protocol for accessing and maintaining directory information over an IP network. |
| ADSL | Asynchronous DSL Allows for higher download speeds than upload speeds over standard copper lines. |
| IMAP | Internet Message Access Protocol (IMAP) is an Internet protocol used by e-mail clients to retrieve e-mail messages from a mail server over a TCP/IP connection. Messages stay on the server. |
| Firewall | Firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules |
| MIME | Multipurpose Internet Mail Extensions - is an Internet standard that extends the format of email to support: Text in character sets other than ASCII: audio, video, images, application programs etc. |
| SMTP | Simple Mail Transfer Protocol (SMTP) is an Internet standard for email transmission. |
| MTA | Message transfer agent is software that transfers email from one computer to another using a client-server application. |
| MUA Software | Mail User Agent is a computer program used to access and manage a user's email. ex. Outlook |
| MTA Software | Mail Transfer Agent Exchange Server |
| NAS | Network-attached storage Is a storage device connected to a network providing data access to a group of clients. SMB and NFS supported. |
| Firewall Techniques | A) Packet Filter B) Application Gateway C) Stateful Inspection |
| IP Spoofing | Modification of packet headers Thinks it comes from a trusted source. |
| Difference Unicode and ASCII | ASCII has 7 text-based bits. The 8th bit is used for image lines. Unicode is 16 bits for high-quality graphics and styled font text. |
| Baseline | State of the software when it was first installed for comparison to future states. |
| Audit Types | Inventory Audits Facility Audit Operational Audit Efficiency Audit Security Audit |
| Inventory Audit | Inventory Audits should be done before the network is operational Best performed when all the equipment is in one place |
| Facility Audit | Facility audit tracks network devices and notes physical location of all network equipment It is best to have network diagram. The diagram should be updated |
| Operational Audit | This audit looks at daily operational parameters of the network: Network utilization Average # of collisions # of network errors Amount of broadcast traffic |
| Efficiency Audit | Evaluate performance of network-support staff and network users. Evaluated for their ability to respond to and troubleshoot network problems. Determine if there is sufficient # of adequately trained support personnel. |
| Security Audit | All that requires limited access to passwords or locks. What virus protection is needed Which files should be backed up What type of emergency and disaster-recovery procedures should be implemented |
| EMI | Electromagnetic Interference Equipment that interferes with normal operation of computer systems. |
| SMB is the same as? | CIFS |
| What is SMB? | A Linux protocol used by Microsoft OS allowing shared access to files and printers. |
| What is Samba? | Sofware on Linux that provides File/Print services for smb/CIFS clients. Allows Unix servers to communicate with the same networking protocol as Microsoft Windows products |
| RFI | Radio Frequency Interference |
| SOAP | Messaging protocol Allows software to run on different OS systems to communicate with each other. |
| DAS | Direct Attached Storage Storage unit directly connected to a device. |
| SCSI | Small Computer System Interface Standards for physically connecting and transferring data between devices. Example Raid systems Parallel interface |
| Fiber Channel | Fiber or Copper technology for transmitting data between computer devices at data rates of up to 4 + Gbps. |
| ISCSI | Internet Small Computer Systems Interface SCSI over the IP network |
| Postscript | Developed for desktop publishing More MAC end design Made for graphics Supported by most printers |
| PCL | Printer Command Language Not originally designed for graphics. Supports different program languages for printers. Supported by most printers. |
| Win Printer | No intelligence on the printer. Documents are sent to printers from a device. |
| CUPS | Print server software for LInux |
| Raster Graphics | Individual dots that create an image Graphics produce images as grids of individually defined pixels |
| Vector Graphics | Complete image printing Produces images using points, lines, and shapes. Faster than Raster |
| BIND | Allows DNS to run on Linux Sofware developed by Burkly |
| Purpose Proxy Server | Filter requests - deny/permit websites Cache information to speed up same requests in the future. |
| DMZ | Demilitarized Zone a physical or logical subnetwork that exposes an organization's external-facing services to an untrusted network. An external network can access only what is exposed in the DMZ, while the rest of the organization's network is firewalled. |
| Gateways | Joining of different systems together to communicate that may use different protocols. |
| Extranet | A controlled private network that allows access to partners, vendors, and suppliers or an authorized set of customers. Ex. Remote VPN |
| XML | Is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable |
| Network Management Elements | Security: Ensuring that the network is protected from unauthorized users. Performance: Eliminating bottlenecks in the network. Reliability: Making sure the network is available to users and responding to hardware and software malfunctions. |
| Difference between Manager and Agent | Manager polls agents for information. Any alerts are then referred to Managers. |
| MIB | Management Information Database Are objects that can manage simple network protocols on the agent. |
| Why would you do a network audit? | Done to ensure that a network is performing correctly. Compares results to the initial audit at setup as a baseline. |
Want to create your own Flashcards for free with GoConqr? Learn more.