The system that detects network intrusion attempts and controls access to the network for the intruders.
What is IPS (Intrusion Prevention System)?
The wireless communications mode that enables wireless devices to communicate directly with each other.
A document that is regularly updated to show who is in possession of an organization's loaned hardware.
What is an asset management document?
What are the two most important environmental factors for a datacenter?
What is humidity?
What is temperature?
The first step in any troubleshooting problem.
What is establishing a theory of probable cause?
In PKI, this is the entity that signs a certificate.
What is the issuer?
The type of cable needed to connect a notebook computer to the console port on the router.
What is a rollover cable?
An organization's VLANs operate across several switches, and all the users on a VLAN have this in common.
What is broadcast domain?
The frequency band used in an 802.11a network.
What is 5 GHz?
The primary purpose of a VPN concentrator.
What is terminating VPN tunnels?
Implementing an independent network within your private LAN, you can limit the groups and users have to the independent with this type of network.
What is a VLAN (virtual local area network)?
A process that can translate internal network IP addresses to external ones.
What is NAT (Network address translation)?
This wireless standard provides the shortest range and the most non-overlapping channels to prevent interference.
What is 802.11a?
In preventative maintenance, this allows you to schedule the replacement of a component at a convenient time rather than waiting for it to fail at an inopportune time.
What is MTBF (Mean time between failures)?
Documenting the minimum level of security for all network devices will provide this.
What are standards?
The well-known port that can be blocked to prevent users on the internet from using HTTP to connect to computers on an organization's network.
What is port 80?
This topology uses various connections to increase redundancy.
What is mesh topology?
An attack that involves the use of multiple computers with the purpose of denying legitimate access to a critical server.
Your PC is receiving an IP address that is not part of the DHCP scope, and can no longer access network resources; name the type of address being assigned.
What is APIPA (Automatic Private IP Addressing)?
Two of these devices can could interference with an 802.11b 2.4-GHz WLAN. Identify them.
- Microwave Ovens
- Cordless phones
- Electrical wiring
- Cable TV cabling
What is a microwave oven?
What is a cordless phone?
The command used to configure a firewall and filter packets on a Linux system.
What is iptables?
The tool used to secure a CAT5e cable to a 110 block.
What is a punch down tool?
A router that is not correctly routing packets based on IP addresses operates under this layer of the OSI model.
What is the network layer?
A network using the Open Shortest Path First (OSPF) routing protocol uses this metric for optimal path calculation.
The name of the issue that describes the latency experienced from workstations with 1Gb NICs (Network Interface Card) that are connected to 100Mb ports on the switch.
What is a speed and duplex mismatch?