Buzzwords Flashcards

1
Q

Describes a network that can grow seamlessly without requiring major hardware or software changes. “By using modular 2800 and 3800 series routers, we can seamlessly ______ and grow to meet future sizing and functionality requirements”. “If we ordered some routers like the 2800 and 3800 series routers that let us add and remove WIC cards as needed like if we want to move from one T1 to two, then we can easily do that and not have to order new routers or try to add them to the network and make unnecessary work for engineers on our staff.”

A

Scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A general term for the network hardware such as routers, switches, firewalls, load balancers etc. They are physical network devices. Example Uses:“We need to move forward with a thorough audit of our _________ for current and future business needs.”

A

Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Performance as it relates to a network is basically how fast or efficient a router, switch or server will run. Example Uses:If you look at a servers memory utilization, and see that it is running at 90% utilization based on the windows task manager, you could say “By adding 2GB of memory, we could significantly improve server performance and consequently also improve application response time and performance for applications hosted on that server”.

A

Improve performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Simply means that processes, equipment or tools to carry out a project is too expensive, high cost. Example Uses:“At this point of the project, upgrading our circuits to multiple DS3 circuits would be ________ based on our current budget”.

A

Cost prohibitive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Technical definition that refers to a layout or standard.

A

Architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

best practice standards that were followed during the build process and refer to the confidence level of network and voice traffic on your network infrastructure. Example Use: “__________rely on the network design that was put in place before/during the build.”

A

Stability and reliability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_______ simplifies the task of building a reliable, scalable, and less expensive internetwork because it focuses on three layers of your network (Core, Distribution, and Access layers).

A

Hierarchical model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Network and voice________ is produced when proper architecture planning is implemented into the network. Example Use: “Following Cisco best practices for designing and configuring all devices on the network greatly increases the _________ of a network system.”

A

Predictability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Network and voice _________ refers to what exactly a piece of network or voice equipment can do.

A

Functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A type of system that can be easily implemented into current business processes. Example Use: “A _________ immediately ready to Use: upon implementation and is designed to fulfill a certain process such as billing, website design, training or content management.”

A

Turn key solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

________ occurs on a network for voice system when critical files are backed up onto another system. Example Use: “An exact copy of all files in a database can be _______ to another system for backup.”

A

Replication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Having the same attributes across a large group of items

A

Consistency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In communication networks, such as Ethernet or packet radio, _________ or network __________ the average rate of successful message delivery over a communication channel. This data may be delivered over a physical or logical link, or pass through a certain network node.

___________ is essentially synonymous to digital bandwidth consumption.
The ________can be analyzed mathematically by means of queueing theory, where the load in packets per time unit is denoted arrival rate λ, and the throughput in packets per time unit is denoted departure rate μ.

Example Uses: “The _________ usually measured in bits per second (bit/s or bps), and sometimes in data packets per second or data packets per time slot.”
“The system throughput or aggregate ________ the sum of the data rates that are delivered to all terminals in a network.”

A

Throughput

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

________ in terms of Cisco Voice and Data Network deployments are considered selling points to the customer because they allow for businesses to typically run more efficiently and cost effectively

A

Features

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Movement, passage, or change from one position, state, stage, subject, concept, etc., to another. In terms of Cisco Network and Voice, the ________can be used in context with moving to a new version of software/code, upgrades, etc.

A

Transition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Move from one system to another. This term can be used for voice and data systems, but is usually used when companies switch to a different technology (i.e. TDM VOICE to IP VOICE).Example Use: This is a common term used when companies decide to change, or _______, from an older system (i.e. Avaya PBX) to a new system (i.e. CallManager).

A

Migrate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A “___________”is when a company will separate a large project into several smaller ______.
Example Use: Project Avaya TDM PBX Voice System Migration to Cisco Data Network and IP VOIP Solution

______ 1: Run new Single Mode Fiber and Cat6 cabling to through all buildings to support the new higher bandwidth data equipment.
______ 2: Install new Cisco Routers and Switches at all locations.
______ 3: Install Cisco CallManager and build all remote locations.

A

Phased approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The delay in transmission of data through the circuits of a computer’s microprocessor or over a TCP/IP network. The delay typically occurs when a system’s bandwidth cannot support the amount of information being relayed at the speed it is being processed. There are, however, many factors that can create a ________ in a system.

________ affect microprocessor performance by slowing down the flow of information back and forth from the CPU and the memory. If all of the components of a system are not able to feed the same amount of data at the same speed, a delay is created.

Example Use: a 2GB processor will be severely ________ed by an 800MB memory bandwidth.

_________ affect network performance by slowing down the flow of information transmitted across networks. TCP/IP connections were originally designed to transmit only text files, and the
11proliferation of bandwidth-intensive transmissions such as high-resolution graphics has caused bottlenecks in the process; therefore, the data moves more slowly across networks.

A

Bottlenecks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A ________ or ____ circuit is a standard telecommunication configuration used by many businesses in the United States, Europe and Asia.

A _____ circuit is based on a T1 line in the US and an E1 in Europe and other parts of the world.

An ISDN ____T1 circuit provides bandwidth speeds of up to 1.544Mbps or 64Kbps per channel in the US.

T1 ____ circuits also provide 23 B-channels and 1 D-channel for caller ID and signaling.
A _____circuit based on an E1 line provides 30 B-channels and 2 D-channels with bandwidth speeds of up to 2.048Mbps.

Example Use: More than one T1 ___ circuit can be combined through pairing to increase the number of channels to 46 B-channels and 2 D-channels. Additional bandwidth and ____ circuits can be added in increments as mentioned above.

A

Primary Rate Interface or PRI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

This is typically a spreadsheet that explains compatible versions of code (i.e. IOS Compatibility ______ or Software Compatibility ______).

A

Matrix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

______ or ____ is a formal document that captures and defines the work activities, deliverables and timeline a vendor will execute against in performance of specified work for a client.

Example Use: Detailed requirements and pricing are usually included in the ______, along with standard regulatory and governance terms and condition

A

Statement of work or SOW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

__________ is a document that helps everyone prepare for an implementation of the Cisco Network and or Voice equipment. It should deliver Cisco best practices to meet the business’s requirements

A

Architectural design document or ADD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

________ is a high-level design report that describes how you may implement a technical solution to your project. This design is customized to the specific integration and business process management related project that you are working on. Example Use: This document includes

  • 14Business and technical requirements regarding the project as provided by you
  • High-level design approachSolution design in terms of a BPM process flow
  • Data flow diagram describing the technical solution
  • List of discrete services/activities that are orchestrated in the flow
  • Best practices guidelines describing project phases and tasks
  • Effort estimate for the project based on Adeptia experiences with similar projects
  • Deployment scenario for the solution in terms of hardware and software needed
A

Solution Design Document or SDD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The ______ solution should briefly describe all platforms, systems, products, services and processes that it depends upon and include any important changes that need to be made to them. Such an overview is important in a multi-project development to make sure that each supporting component design will be compatible with its neighboring designs and with the big picture.

Example Use: A ________ document will usually include a high-level architecture diagram depicting the components, interfaces and networks that need to be further specified or developed. It may also depict or otherwise refer to workflows and/or data flows between component systems.

In addition, there should be brief consideration of all significant commercial, legal, environmental, security, safety and technical risks, issues and assumptions.
The idea is to mention every work area briefly, clearly delegating the ownership of more detailed design activity whilst also encouraging effective collaboration between the various project teams.

Today, most ________ require contributions from several experts, representing many distinct professional disciplines.

Finally, every type of end-user should be identified in the ________ and each contributing design should give due consideration to customer experience.

A

High level design or HLD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

The _________ is used to document the methods and codes generated for meeting the various business requirements. It contains detailed information of the system modification used in the proposed solution.

Example Use: The various activities associated with the creation of the _________ are as follows

  1. Create the _____ specific user interface, business, and data layer components for delivering the proposed system modification to the user.
  2. Review the design security.
  3. Identify the additional security requirements.
A

Technical design document or TDD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

_________ is a document that outlines application specifics like the protocols used, number of users using new protocols and applications, diagram the new flow of information, identifies peak hours of usage of new applications, traffic characteristics (load, behavior, etc), and performance requirements.

A

Application requirements document or ARD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A _______ is a PC on the network that has limited access to the business’s network and voice equipment. It is a way for the business to greatly restrict and monitor access to their environment.

Example Use: A contract engineer would typically Use: some type of SSL VPN client to log into this machine, and once on this machine, the engineer will have access to other devices (i.e. IOS network devices, CallManager, UCCE Boxes, etc.).

A

Jump box

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The objective of the _______ process is to minimize service downtime by ensuring that requests for changes are recorded and then evaluated, authorized, prioritized, planned, tested, implemented, documented and reviewed in a controlled and consistent manner.

Example Use: In a typical scenario where a change is needed to occur on the network, a ticket would need to be opened and approved prior to the execution of the change. This change can be as simple as adding a device (phone, pc, etc) to the network, or it can be as drastic as adding a Cisco Call Manager cluster to the environment. Not obeying ________ guidelines is one of the fastest ways to be fired off a project. In order to make a change to the environment, you need an approved change ticket in advance. If an engineer were to cause an outage due to not having an approved change ticket, this would be grounds for termination.

A

Change management

29
Q

A ______ is part of an organization that does not produce direct profit and adds to the cost of running a company.

Examples Use: _______ include research and development departments, marketing departments, help desks and customer service/contact centers.

Although not always demonstrably profitable, a __________ typically adds to revenue indirectly or fulfills some other corporate mandate. Money spent on research and development may yield innovations that will be profitable in the future. Investments in public relations and customer service may result in more customers and increased customer loyalty.

________ are a target for rollbacks and layoffs when budgets are cut because of negative impact on profit. Operational decisions in a contact center, for example, are typically driven by cost considerations. Financial investments in new equipment, technology and staff are often difficult to justify to management because indirect profitability is hard to translate to bottom-line figures.

Business metrics are sometimes employed to quantify the benefits of a ________ and relate costs and benefits to those of the organization as a whole. In a contact center, metrics such as average handle time, service level and cost per call are used in conjunction with other calculations to justify current or improved funding

A

Cost center

30
Q

Within the framework of project management, a ________ is the end of a stage that marks the completion of a work package or phase, typically marked by a high level event such as completion, endorsement or signing of a deliverable, document or a high level review meeting.

Example Use: In addition to signaling the completion of a key deliverable, a _______ may also signify an important decision or the derivation of a critical piece of information, which outlines or affects the future of a project. In this sense, a ________ not only signifies distance traveled (key stages in a project) but also indicates direction of travel since key decisions made at _______ may alter the route through the project plan.

A

Milestones

31
Q

_______ is the practice of transferring day-to-day related management responsibility as a strategic method for improved effective and efficient operations inclusive of Production Support and lifecycle build/maintenance activities.

Example Use: The person or organization who owns or has direct oversight of the organization or system being managed is referred to as the offer-er, client, or customer. The person or organization that accepts and provides the managed service is regarded as the service provider. Typically, the offer-er remains accountable for the functionality and performance of managed service and does not relinquish the overall management responsibility of the organization or system.

A

managed service

32
Q

A ‘__________’ (_____)is a part of a service contract where the level of service is formally defined. In practice, the term ____ is sometimes used to refer to the contracted delivery time (of the service) or performance.

Example Use: Internet service providers will commonly include ________within the terms of their contracts with customers to define the level(s) of _____ being sold in plain language terms. In this case the ______ will typically have a technical definition in terms of Mean Time Between Failures (MTBF), Mean Time to Repair or Mean time to recovery (MTTR); various data rates; throughput; jitter; or similar measurable details.

A

Service level agreement or SLA

33
Q

_____ is abbreviation for _______. It is a financial related item, checking & controlling & following for company’s budget.

These codes are in layered structure such as ‘Company-Division-Project-Function’.

Example Use: \_\_\_\_\_\_ is   '04.556.7664.002'
1904 -> XX Company
556 -> IT Division
7664 -> ATM project
002 -> Development costs
A

General Ledger code or GL code

34
Q

The ________ (_____)delivers support to the Change Management team by approving requested changes and assisting in the assessment and prioritization of changes. This body is generally made up of IT and Business representatives that include The Change Manager, User managers and groups, technical experts, possible third parties and customers (if required).

The ______ members should selectively be chosen to ensure that the requested changes are thoroughly checked and assessed from both a technical and business perspective. The considered change will dictate the required personnel to convene in a _____ meeting. These entities are not required to meet face-to-face on each requested change, but rather Use: electronic support and communication tools as a medium. Typically a quarterly meeting is scheduled to review outstanding changes, sign-off on approved changes and discuss any future major changes.

Example Uses: A ____ offers multiple perspectives necessary to ensure proper decision making. For example, a decision made solely by IT may fail to recognize the concerns of accounting. The _____ is tasked with reviewing and prioritizing requested changes, monitoring the change process and providing managerial feedback.

A ______ is an integral part of a defined change management process designed to balance the need for change with the need to minimize inherent risks. For example, the _____ is responsible for oversight of all changes in the production environment. As such, it has requests coming in from management, customers, users and IT. Plus the changes may involve hardware, software, configuration settings, patches, etc. This is defined as part of the Change Control Process within ITIL.

The ______ concept can also be used outside of the IT world as the Change Process at a high level can be applied to any system.

A

Change advisory board or CAB

35
Q
A \_\_\_\_\_\_\_ (or \_\_\_\_\_) is one or more locations from which control is exercised over a computer, television broadcast, or telecommunications network. \_\_\_\_\_\_\_ are responsible for monitoring the telecommunication 
network for alarms or certain conditions that may require special attention to avoid impact on the network's performance. 

Example Use: Large organizations may operate more than one _____, either to manage different networks or to provide geographic redundancy in the event of one site being unavailable or offline.

Example Use: In a telecommunications environment, ______ are responsible for monitoring for power failures, communication line alarms (such as bit errors, framing errors, line coding errors, and circuits down) and other performance issues that may affect the network. ______ analyze problems, perform troubleshooting, communicate with site technicians and other _____, and track problems through resolution. If necessary, ______ escalate problems to the appropriate personnel. For severe conditions that are impossible to anticipate –such as a power failure or optical fiber cable cut –______ shave procedures in place to immediately contact technicians to remedy the problem.

A

Network operations center or NOC

36
Q

The ___________ (____) in a business or professional enterprise is the department or group that defines and maintains the standards of process, generally related to project management, within the organization. The ____ strives to standardize and introduce economies of repetition in the execution of projects. The _____ is the source of documentation, guidance and metrics on the practice of project management and execution. In some organizations this is known as the __________ (sometimes abbreviated to __g__ to differentiate); the subtle difference is that program management relates to governing the management of several related projects.

Example Use: Traditional _____’s base project management principles on industry-standard methodologies such as PMBOK or PRINCE2. Increasingly influential industry certification programs such as ISO9000 and the Malcolm Baldrige National Quality Award (MBNQA) as well as government regulatory requirements such as Sarbanes-Oxley have propelled organizations to standardize processes. Organizations around the globe are defining, borrowing and collecting best practices in process and project management and are increasingly assigning the _____ to exert overall influence and evolution of thought to continual organizational improvement.

A

project management office or PMO

37
Q

A ______ is a professional in the field of project management. ______ can have the responsibility of the planning, execution, and closing of any project, typically relating to construction industry, architecture, computer networking, telecommunications or software development

A

project manager

38
Q

A _______ is defined group of employees within the Organization structure.

A

business unit or BU

39
Q

often defined as the delegation of operations or jobs from production within a business to an internal (but ‘stand-alone’) entity that specializes in that operation. ________ is a business decision that is often made to maintain control of critical production or competencies. An alternate Use: of the term implies transferring jobs to within the country where the term is used, either by hiring local subcontractors or building a facility.

A

insourcing

40
Q

is often viewed as involving the contracting out of a business function -commonly one previously performed in-house -to an external provider. In this sense, two organizations may enter into a contractual agreement involving an exchange of services and payments

A

outsourcing

41
Q

In telecommunications, ______ allows customers to interact with a company’s database via a telephone keypad or by speech recognition, after which they can service their own inquiries by following the _____ dialogue. _____ systems can respond with prerecorded or dynamically generated audio to further direct users on how to proceed. _____ applications can be used to control almost any function where the interface can be broken down into a series of simple interactions. ____ systems deployed in the network are sized to handle large call volumes.

Example Use: ______ technology is also being introduced into automobile systems for hands-free operation. Current deployment in automobiles revolves around satellite navigation, audio and mobile phone systems. It has become common in industries that have recently entered the telecommunications industry to refer to an Automated Attendant as an ____. The terms Automated Attendant and ______are distinct and mean different things to traditional telecommunications professionals, whereas emerging telephony and VoIP professionals often Use: the term _____ as a catch-all to signify any kind of telephony menu, even a basic automated attendant.

A

IVR or interactive voice response

42
Q

A _____________ (___)is a telephone exchange that serves a particular business or office, as opposed to one that a common carrier or telephone company operates for many businesses or for the general public.

A

Private branch exchange or PBX

43
Q

In telephony, an ________ (____),also known as _____ distribution, is a device or system that distributes incoming calls to a specific group of terminals that agents Use:. It is often part of a computer telephony integration (CTI) system.

Example Uses: Routing incoming calls is the task of the ___ system. ____ systems are often found in offices that handle large volumes of incoming phone calls from callers who have no need to talk to a specific person but who require assistance from any of multiple persons (e.g., customer service representatives) at the earliest opportunity.

The system consists of hardware for the terminals and switches, phone lines, and software for the routing strategy. The routing strategy is a rule-based set of instructions that tells the ____ how calls are handled inside the system. Typically, this is an algorithm that determines the best available employee or employees to respond to a given incoming call. To help make this match, additional data are solicited and reviewed to find out why the customer is calling. Sometimes the caller’s caller ID or ANI is used; more often a simple Interactive voice response is used to ascertain the reason for the call.

Originally, the ____ function was internal to the Private Branch Exchange of the company. However, the closed nature of these systems limited their flexibility. A system was then designed to enable common computing devices, such as server PCs, to make routing decisions. For this, generally the PBX would issue information about incoming calls to this external system and receive a direction of the call in response.

An additional function for these external routing applications is to enable CTI. This allows improved efficiency for call center agents by matching incoming phone calls with relevant data on their PC via screen pop.

A common protocol to achieve this is CSTA; however, almost every PBX vendor has its own flavor of CSTA, and CSTA is quite hard to program because of its complex nature. Various vendors have developed intermediate software that hides these complexities and expedites the work of programmers.

Also, these protocols enable call centers consisting of PBXs from multiple vendors to be treated as one virtual contact center. All real-time and historical statistical information can then be shared amongst call center sites.

One of the first large and separate ___s was a modified 5XB switch used by New York Telephone in the early 1970s to distribute calls among hundreds of 4-1-1 information operators.

A

Automatic call distributor or ACD

44
Q

Another name for the automatic call distributor (ACD)

A

automated call distribution

45
Q

________ are traditionally used by companies with fewer than 50 employees. A _______ has telephones with multiple buttons (“keys”) and lights that indicate which lines are in use.

When you want to place a call, you just press a button to directly select the telephone company’s central office phone lines. Key systems typically have one unit -an attendant phone or separate box—that acts as controller for a limited number of lines for a limited number of extensions.

Example Use: ______ are usually found in small companies where fewer features are required. They offer convenient elements such as hold buttons, lights, intercoms, paging, speakerphones, privacy, music-on-hold, long-distance restriction, timers, and memory dialing

A

Key system

46
Q

You can perform a _____ in order to check bugs on a new release of IOS code for a cisco device. Example Use: Cisco offers a “Bug Toolkit” to scrub for IOS bugs.

A

bug scrub

47
Q

Programmers publish and apply ______ in various forms. Because proprietary software authors withhold their source code, their ______ are distributed as binary executables instead of source. This type of _____ modifies the program executable—the program the user runs—either by modifying the binary file to include the fixes or by completely replacing it. _______ can also circulate in the form of source code modifications. In these cases, the _____ consist of textual differences between two source code files. These types of patches commonly come out of open source projects. In these cases, developers expect users to compile the new or changed files themselves.

Because the word “______“carries the connotation of a small fix, large fixes may use different nomenclature. Bulky ______ or ______ that significantly change a program may circulate as “service packs” or as “software updates”. Example Uses: Microsoft Windows NT and its successors (including Windows 2000, Windows XP, and later versions) use the “service pack” terminology.
In several Unix-like systems, particularly Linux, updates between releases are delivered as new software packages. These updates are in the same format as the original installation so they can be used either to update an existing package in-place (effectively ______) or be used directly for new installations.

A

patches

48
Q

A company’s internal support group for external customers.

A

Technical assistance center or TAC

49
Q

Describes commerce transactions between businesses, such as between a manufacturer and a wholesaler, or between a wholesaler and a retailer.

Contrasting terms are business-to-consumer (B2C)and business-to-government (B2G).The volume of ________ transactions is much higher than the volume of B2C transactions. The primary reason for this is that in a typical supply chain there will be many _____ transactions involving subcomponents or raw materials, and only one B2C transaction, specifically sale of the finished product to the end customer.

A

business to business or B2B

50
Q

________ (____, sometimes also called ______)describes activities of businesses serving end consumers with products and/or services.

Example Use: A _______ transaction would be a person buying a pair of shoes from a retailer. The transactions that led to the shoes being available for purchase, that is the purchase of the leather, laces, rubber, etc. However, the sale of the shoe from the shoemaker to the retailer would be considered a (B2B)transaction

A

business to consumer or B2C

51
Q

A ________ (_____)is a secure way of connecting to a private Local Area Network at a remote location, using the Internet or any insecure public network to transport the network data packets privately, using encryption. The _____ Uses: authentication to deny access to unauthorized users, and encryption to prevent unauthorized users from reading the private network packets. The ____ can be used to send any kind of network traffic securely, including voice, video or data.

Example Use: _____s are frequently used by remote workers or companies with remote offices to share private data and network resources. ____s may also allow users to bypass regional internet restrictions such as firewalls, and web filtering, by “tunneling” the network connection to a different region.

Technically, the ____ protocol encapsulates network data transfers using a secure cryptographic method between two or more networked devices which are not on the same private network, to keep the data private as it passes through the connecting nodes of a local or wide area network

A

virtual private network or VPN

52
Q

An ______ is a computer network that allows controlled access from the outside, for specific business or educational purposes. An _____ can be viewed as an extension of a company’s intranet that is extended to users outside the company, usually partners, vendors, and suppliers. It has also been described as a “state of mind” in which the Internet is perceived as a way to do business with a selected set of other companies (business-to-business, B2B), in isolation from all other Internet users. In contrast, business-to-consumer (B2C) models involve known servers of one or more companies, communicating with previously unknown consumer users.

Example Uses: An _____ is like a DMZ in that it provides access to needed services for channel partners, without granting access to an organization’s entire network. _______ may also be accessed by customers, suppliers, or other approved parties. _______ extend a private network onto the Internet with special provisions for authentication, authorization and accounting (AAA protocol).

A

Extranet

53
Q

An _____ is a private computer network that Uses: Internet Protocol technology to securely share any part of an organization’s information or network operating system within that organization. The term is used in contrast to internet, a network between organizations, and instead refers to a network within an organization. Sometimes the term refers only to the organization’s internal website, but may be a more extensive part of the organization’s information technology infrastructure. It may host multiple private websites and constitute an important component and focal point of internal communication and collaboration.

Example Uses: Any of the well-known Internet protocols may be found in an intranet, such as HTTP (web services), SMTP (e-mail), and FTP (file transfer protocol). Internet technologies are often deployed to provide modern interfaces to legacy information systems hosting corporate data. An ______ can be understood as a private analog of the Internet, or as a private extension of the Internet confined to an organization. The first _____ websites and home pages began to appear in organizations in 1996-1997. Although not officially noted, the term ______ first became commonplace among early adopters, such as universities and technology corporations, in 1992.
______ may provide a gateway to the Internet by means of a network gateway with a firewall, shielding the intranet from unauthorized external access. The gateway often also implements user authentication, encryption of messages, and often virtual private network (VPN) connectivity for off-site employees to access company information, computing resources and internal communication

A

Intranet

54
Q

______ clusters (also known as ____ Clusters or Failover Clusters) are computer clusters that are implemented primarily for the purpose of providing ________ of services which the cluster provides. They operate by having redundant computers or nodes which are then used to provide service when system components fail.

A

High availability

55
Q

occurs when all of the private links go down simultaneously, but the cluster nodes are still running. If that happens, each node in the cluster may mistakenly decide that every other node has gone down and attempt to start services that other nodes are still running. Having duplicate instances of services may cause data corruption on the shared storage.

A

split brain

56
Q

_________ is the process of verifying the synchronization between two or more software systems and which can be performed after software system collaboration is completed. This is a part of the software testing life cycle for software collaboration involving projects. This kind of software consumers run _______ (____) round before the user acceptance
28test (UAT) round. Software providers usually run a pre-“____” round before Software consumers run their ____ test cases.

Example Uses: If we are providing a solution for a software consumer as enhancement to their existing solution, then we should integrate our application layer and our DB layer with consumer‘s existing application and existing DB layers. After the integration process completed both software systems should be synchronized. Purpose of the ________is to make sure whether these systems are successfully integrated and been up-to-date by exchanging data with each other

A

system integration testing or SIT

57
Q

_________ (____) is a process to obtain confirmation that a system meets mutually agreed-upon requirements. A Subject Matter Expert (SME), preferably the owner or client of the object under test, provides such confirmation after trial or review. In software development, UAT is one of the final stages of a project and often occurs before a client or customer accepts the new system.

Example Uses: Users of the system perform these tests, which developers derive from the client’s contract or the user requirements specification. Test-designers draw up formal tests and devise a range of severity levels. Ideally the designer of the user acceptance tests should not be the creator of the formal integration and system test cases for the same system. The ____ acts as a final verification of the required business function and proper functioning of the system, emulating real-world usage conditions on behalf of the paying client or a specific large customer. If the software works as intended and without issues during normal use, one can reasonably extrapolate the same level of stability in production.

User tests, which are usually performed by clients or end-users, do not normally focus on identifying simple problems such as spelling errors and cosmetic problems, nor showstopper defects, such as software crashes; testers and developers previously identify and fix these issues during earlier unit testing, integration testing, and system testing phases. The results of these tests give confidence to the clients as to how the system will perform in production. There may also be legal or contractual requirements for acceptance of the system.

A

user acceptance testing or UAT

58
Q

___________ is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure critical to an organization after a natural or human-induced disaster. _______ is a subset of business continuity. While business continuity involves planning for keeping all aspects of a
business functioning in the midst of disruptive events, disaster recovery focuses on the IT or technology systems that support business functions.

Example Uses: _________ (____)is “planning which identifies the organization’s exposure to internal and external threats and synthesizes hard and soft assets to provide effective prevention and recovery for the organization, whilst maintaining competitive advantage and value system integrity”. It is also called Business continuity & Resiliency planning (BCRP). The logistical plan used in BCP is called a business continuity plan. The intended effect of BCP is to ensure business continuity, which is an ongoing state or methodology governing how business is conducted.

In plain language, ______ is working out how to stay in business in the event of disaster. Typical incidents include local events like building fires, regional incidents like earthquakes or floods, or national incidents like pandemic illnesses. Any event that could cause the potential for loss of business should be considered, including any event that the business is dependent on, such as loss of source of supply, loss of critical infrastructure (a major piece of machinery or computing/network resource), or the result of theft or vandalism. As such, risk management must be incorporated as part of _____

A

Disaster Recovery DR and Business continuity Plan

59
Q

Numbers that begin with one of the following three-digit codes 800, 888, 877, 866, 855or 844.

A

Toll free number or TFN

60
Q

A _______ (____)is an early stage in a procurement process, issuing an invitation for suppliers, often through a bidding process, to submit a proposal on a specific commodity or service. The _____ process brings structure to the procurement decision and allows the risks and benefits to be identified clearly upfront.

The ______ may dictate to varying degrees the exact structure and format of the supplier’s response. Effective _____s typically reflect the strategy and short/long-term business objectives, providing detailed insight upon which suppliers will be able to offer a matching perspective.

Example Uses:

Key objectives

  • Obtain correct information to enable sound business decisions.
  • Decide correctly on strategic procurement.
  • Leverage the company’s purchasing power to obtain a favorable deal.
  • Enable a broader and creative range of solutions to be considered.

Key benefits

  • Informs suppliers that your company is looking to procure and encourages them to make their best effort.
  • Requires the company to specify what it proposes to purchase. If the requirements analysis has been prepared properly, it can be incorporated quite easily into the ______.
  • Alerts suppliers that the selection process is competitive.-Allows for wide distribution and response.-Ensures that suppliers respond factually to the identified requirements
A

request for proposal or RFP

61
Q

______ is any type of software testing that seeks to uncover new errors, or _______, in existing functionality after changes have been made to the software, such as functional enhancements, patches or configuration changes.

The intent of ________ is to assure that a change, such as a bugfix, did not introduce new bugs.

Example Uses: “One of the main reasons for _______ is that it’s often extremely difficult for a programmer to figure out how a change in one part of the software will echo in other parts of the software.”

Common methods of _______ include rerunning previously run tests and checking whether program behavior has changed and whether previously fixed faults have re-emerged. ________ can be used to test a system efficiently by systematically selecting the appropriate minimum set of tests needed to adequately cover a specific change.

A

regression testing

62
Q

_____________ (______)is a remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks. ______ allows a remote access server to communicate with an authentication server in order to determine if the user has access to the network.

______ is defined in RFC 1492, and Uses: (either TCP or UDP) port 49 by default. A later version of _______ introduced by Cisco in 1990 was called Extended ______ (X_____). The X____ protocol was developed by and is proprietary of Cisco Systems.

Example Use: _____ allows a client to accept a username and password and send a query to a _______ authentication server, sometimes called a ______ daemon or simply ______D. This server was normally a program running on a host. The host would determine whether to accept or deny the request and send a response back. The TIP (routing node accepting dial-up line connections, which the user would normally want to log in into) would then allow access or not, based upon the response.
In this way, the process of making the decision is “opened up” and the algorithms and data used to make the decision are under the complete control of whoever is running the ______ daemon.

________+ and RADIUS have generally replaced ______ and ________ in more recently built or updated networks. _____+ is an entirely new protocol and not compatible with _______or X______. TACACS+ uses: the Transmission Control Protocol (TCP) and RADIUS Uses: the User Datagram Protocol (UDP)

A

terminal access controller access control system or TACACS

63
Q

______, or ______, is an embedded server management technology exclusive to Hewlett-Packard but similar in functionality to the Lights out management (LOM) technology of other vendors.

Example Use: ______ is useful as an out-of-band management technology. The physical connection is an Ethernet port that can be found on most ProLiant servers of the 300 and above series. This port can be enabled using the set-up utility which can be accessed with the F8 key during POST. In this screen an IP can be assigned via DHCP or static. It is also important to create a user so this utility can be accessed. Once the configuration has been done it has to be saved and the server needs to be restarted. To access the utility, be sure that a cable is connected to the _____ port on the back of the server. The ____ IP can be entered in the address bar of any web browser and a login screen will be shown; enter the username and password that has just been created.

A

Integrated lights-out or ILO

64
Q

If your organizational structure requires that certain domains have a different schema, or you require that multiple IT groups need direct ownership of their directory services, or you have a need to have more complete administrative separation between some domains then you need a _____ design with some trusts between the forests (or possibly just between specified domains).

The above is based on Active Directory but the same principles should apply to any LDAP environment

A

multi forest environment

65
Q

_____ tickets are usually network down emergency break-fix scenarios that occur in a voice or data network.

Example Use: If you receive one of these tickets during a work day, it is in your best interest to get this issue resolved quickly. The SLA (service level agreement) for this type of ticket is usually less than 2 hours

A

priority one tickets or P1

66
Q

This term is typically used with equipment that is end-of-life, which means that the manufacturer will no longer support (make parts) for the device

A

sunset

67
Q

“Coming up on the _____” is typically something that will be needed to be completed soon.

Example Use: _____ is used with projects in context with “Phase 2 is on the ______” and will be starting next month

A

horizon

68
Q

A ______ is a change to a network or voice environment that is usually associated with a major change to the type or version of software that will be used in the environment. Engineers will typically “______” to a new system during an afterhours time or on the weekends when the business groups would be least impacted.

Example Use: _____ from a legacy PBX system to a new Cisco Call Manager system. This _____ would require installing all new Cisco equipment

A

cutover