Tool to assist with user provisioning and de-provisioning tasks in GCC High environments.
What is Azure Active Directory?
This open-source operating system is widely used for running services on servers and is known for its robustness and security features
What is Linux?
This protocol operates at the network layer and is responsible for routing packets across multiple networks.
What is the Internet Protocol (IP)?
This operating system, known for its strong support for engineering applications, is commonly used by engineers in workstations.
What is Windows?
This term refers to unauthorized access of a computer system or network with the intent to steal data or cause damage.
What is hacking
Must ensure this type of data protection is in place to secure sensitive information
What is data encryption?
This type of software allows multiple virtual machines to run on a single physical server, optimizing resource utilization.
What is a hypervisor?
In networking, this device forwards data packets between computer networks, functioning at the data link layer.
What is a switch?
This term refers to the type of graphics card that engineers often require for tasks such as CAD modeling and simulations.
What is a dedicated GPU (Graphics Processing Unit)?
These systems monitor network traffic for suspicious activity and known threats.
What are IDS (Intrusion Detection Systems)?
Tool helps track issues, manage support tickets, and streamline communication during the migration process.
What is Azure DevOps?
This type of storage uses interconnected network-attached storage devices to serve multiple clients with high-speed access to data.
What is a Storage Area Network (SAN)?
This concept describes the maximum amount of data that can be transmitted over a network in a given amount of time, measured in bits per second (bps).
What is bandwidth?
This laptop brand is renowned for its ThinkPad series, popular among engineers for its durability and keyboard comfort.
What is Lenovo?
The framework used to analyze cyber threats, including the diamond model and cyber kill chain.
What are threat modeling frameworks?
This compliance standard is often a key focus during migrations to GCC High, particularly for organizations handling (CUI)
What is FedRAMP?
This platform allows developers to automate the deployment of applications within lightweight, portable containers.
What is Docker?
This widely used protocol ensures the reliable delivery of messages over the Internet and operates at the transport layer.
What is the Transmission Control Protocol (TCP)?
When setting up a workstation, this type of storage device is preferred for faster read and write speeds over traditional hard drives.
What is a Solid State Drive (SSD)?
This type of software is commonly utilized to analyze log files and detect unusual behavior
What is a Security Information and Event Management (SIEM) system?
This cloud-based solution is crucial for storing and managing documents securely during the migration process to GCC High.
What is SharePoint Online?
This standard size of server rack typically holds servers and associated devices, and is measured in "U" units.
What is a 19-inch rack?
This method is used for assigning IP addresses dynamically to devices on a network, often managed by a server.
What is Dynamic Host Configuration Protocol (DHCP)?
This software tool allows engineers to create virtual machines, enabling them to run multiple operating systems on a single laptop or workstation.
What is VirtualBox (or VMware)?
This device acts as a barrier between a trusted internal network and untrusted external networks.
What is a firewall?