Security
Access Control
Misc (Hard)
Its a Disaster
Network monitoring
200

Layered Approach to securing computer systems

Defense in Depth

200

access to data is provided by the owner

DAC

200

Duplicate the Problem is what part of the troubleshooting steps

Test the Theory

200

average amount of time that passes before a piece of hardware fails

MTBF

200

program or tool used to query a network interface to collect data

Packet sniffer

400

Process of identifying an individual

Authentication

400

limits access to resources based on the sensitivity of information and the users clearance level

MAC

400

Question the obvious is in what step of the troubleshooting methodology 

Establish a theory

400

Point at which data becomes un-recoverable

RPO

400

primary tool used to track traffic flow between specific source and destination devices

NetFlow

600

Process of granting or denying a user access to network resources

Authorization

600

Type of access control that denys all access unless granted

Implicit Deny

600

What protocol allows you to increase bandwidth in small increments

LACP

600

time in the future when you expect to restore availability after some type of failure

RTO

600

a program that processes capture files from packet sniffers and analyzes them based on our monitoring needs

Protocol Analyzer

800

Protocol developed by Cisco to support AAA in a network with many switches and routers

TACACS+

800

The framework associated with requiring all hardware, software and users to validate their trust inside a network.

Zero Trust

800

What pins are are different in a cross over cable

1&3 and 2&6

800

ability of a network to automatically expand or contract as needed

Elasticity

800

Tool used to perform port scanning, identify versions of network services in operation and identify operating systems

NMAP, Zenmap

1000

Protocol that programs use to query and change a database used by the network

LDAP (Lightweight Directory Access Protocol)

1000

Framework that manages access to the network based on a set of predetermined rules and permissions

RuBAC

1000

Maximum amount of power that could be radiated from an antenna is called

EIRP (Effective isotropic radiated power)

1000

ensures critical business functions to continue while operations are disrupted

BCP

1000

Has the primary goal of minimizing risk of loss or theft of company data

DLP

M
e
n
u