Building a Real-World Network
Managing Risk
Protecting Your Network
Network Monitoring
Network Troubleshooting
100
A network comprised of a medium-sized space spanning multiple building is call this
What is a Campus Area Network (CAN)
100
This document is arguably the most famous of all security policies as this is one document that pretty much everyone who works for any organization is required to read, and in many cases sign, before they can start work.
What is an Acceptable Use Policy
100
This term is sometimes used to describe people who carry out network threats
What is a Threat Agent
100
This underlying protocol enables network monitoring tools to work.
What is SNMP
100
A cable might experience crosstalk, where the electrical signal bleeds from one wire pair to another, creating ___________.
What is Interference
200
A single, decent ____________ might adequately handle brief power fluctuations for a single reach, but will not be able to deal with a serious power outage.
What is a UPS
200
This written document defines how an organization will protect its IT infrastructure
What is a Security Policy
200
This term refers to a single computer under the control of an operator.
What is a Zombie
200
Managed devices run specialized _______________ called agents
What is Software
200
This tool positions unshielded twisted pair (UTP) wires into 66- and 110-blocks
What is a Punchdown tool
300
Operators interact with controllers through controls or computers called a(n) ________________.
What is HMI (Human Machine Interface)
300
Educating users to recognize social-engineering tactics assists in _________________.
What is Risk Management
300
This tool watches for and ignores incoming DHCP requests from unknown MAC addresses.
What is DHCP Snooping
300
The snmpwalk utility tells the SNMP manager to perform a series of ___________ commands
What is Get
300
This command can be used on a Windows computer to view the IP settings
What is ipconfig
400
What bandwidth does ISDN offer
128 Kbps
400
Nmap is an example of a _______________.
What is a Port Scanner
400
This type of attack involves the attacker tapping into communications between two systems.
What is Man in the Middle
400
A packet sniffer is a program that queries a network interface and collects packets in a file called a __________ file.
What is Capture
400
Which utilities are excellent examples of connectivity applications that enable a technician to determine if a connection can be made between two computers. ______________ and ______________
What is Ping and Traceroute
500
This industrial control system (ICS) device monitors characteristics like temperature
What is a Sensor
500
Disaster recover starts with a plan and includes ______________.
What is Data Backups
500
This term describes a technology that spreads data across multiple drives
What is RAID
500
Which filtering term does Wireshark use when creating a file that only shows DHCP packets
What is bootp
500
This tool intercepts and logs network packets
What is a Packet Sniffer