Layered Approach to securing computer systems
Defense in Depth
access to data is provided by the owner
DAC
Duplicate the Problem is what part of the troubleshooting steps
Test the Theory
average amount of time that passes before a piece of hardware fails
MTBF
program or tool used to query a network interface to collect data
Packet sniffer
Process of identifying an individual
Authentication
limits access to resources based on the sensitivity of information and the users clearance level
MAC
Question the obvious is in what step of the troubleshooting methodology
Establish a theory
Point at which data becomes un-recoverable
RPO
primary tool used to track traffic flow between specific source and destination devices
NetFlow
Process of granting or denying a user access to network resources
Authorization
Type of access control that denys all access unless granted
Implicit Deny
What protocol allows you to increase bandwidth in small increments
LACP
time in the future when you expect to restore availability after some type of failure
RTO
a program that processes capture files from packet sniffers and analyzes them based on our monitoring needs
Protocol Analyzer
Protocol developed by Cisco to support AAA in a network with many switches and routers
TACACS+
The framework associated with requiring all hardware, software and users to validate their trust inside a network.
Zero Trust
What pins are are different in a cross over cable
1&3 and 2&6
ability of a network to automatically expand or contract as needed
Elasticity
Tool used to perform port scanning, identify versions of network services in operation and identify operating systems
NMAP, Zenmap
Protocol that programs use to query and change a database used by the network
LDAP (Lightweight Directory Access Protocol)
Framework that manages access to the network based on a set of predetermined rules and permissions
RuBAC
Maximum amount of power that could be radiated from an antenna is called
EIRP (Effective isotropic radiated power)
ensures critical business functions to continue while operations are disrupted
BCP
Has the primary goal of minimizing risk of loss or theft of company data
DLP