This set of guidelines ensures employees understand acceptable use of company-owned devices and networks.
What is an Acceptable Use Policy (AUP)
This service translates private IP addresses to public IP addresses, allowing multiple devices to share a single internet connection.
What is Network Address Translation (NAT)
This type of monitoring captures and analyzes all network traffic to identify potential issues, often using tools like Wireshark.
What is Packet Sniffing or protocol analysis
This protocol is widely used to synchronize clocks across computer networks.
What is Network Time Protocol (NTP)
Issues at this layer may involve incorrect cabling, faulty hardware, or misconfigured network devices.
What is the Physical Layer (Layer 1)
This document outlines the steps an organization should follow to restore operations in case of major network outage.
What is a Disaster Recovery Plan (DRP)
This protocol eliminates the risk of loops in a network by blocking redundant paths on switches.
What is Spanning Tree Protocol
This network monitoring tool uses ICMP to test the reachability and response time of a host.
This issue occurs when clocks across a network are out of sync, potentially causing authenticity or data logging errors.
What is Time Drift
Problems at this layer often include packet loss, incorrect IP configurations, or routing table errors.
What is the Network Layer (Layer 3)
This policy helps define who is allowed access to specific resources on a network based on their role.
What is a Role-Based Access Control (RBAC) policy
This network service resolves hostnames into IP addresses to facilitate communication over the internet.
What is Domain Name System (DNS)
This protocol collects and organizes data about devices on a network, often used for performance monitoring and troubleshooting.
What is SNMP (Simple Network Management Protocol)
This element in NTP hierarchy determines how far a device is from the reference clock.
What is Stratum
Troubleshooting this layer often involves checking port configurations, firewalls, or application-specific protocols like HTTP or FTP.
What is the Application Layer (Layer 7)
This document ensures that the quality of service agreed upon by a provider and client is maintained, such as uptime guarantees.
What is Service Level Agreement (SLA)
This VLAN configuration technique allows single switch port to belong to multiple VLANs, dividing traffic efficiently.
What is VLAN trunking
This technology uses network tap or mirror port to duplicate traffic for analysis without affecting the original flow.
What is Port Mirroring or SPAN
This mode allows devices to synchronize their clocks even when no direct network connection is available.
What is Autonomous Mode
Errors at this layer can result from failed handshakes or incorrect encryption settings in protocols like SSL/TLS.
What is the Session Layer (Layer 5)
This type of documentation logs all the changes made to a network, including hardware upgrades and configuration updates.
What is a Change Management Log
What is a Native VLAN
This tool focuses on detecting and alerting administrators about unusual or suspicious activities in real-time
What is an Intrusion Detection System (IDS)
This term represents the measurement uncertainty introduced during the transmission of time synchronization data.
What is Jitter
This layer may encounter problems like checksum errors or retransmissions due to unreliable data delivery.
What is Transport Layer (Layer 4)