Network Operations Flashcards

1
Q

Security and Business Risks are both areas for:

A

Risk Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information such as Non-disclosure agreements ( NDA ), memorandum of understanding ( MOU ), bring your own device (BYOD), and statement of work (SOW) are just a few of the __________regarding Network Operations

A

Documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

this is an area where everyone knows and are concerned with any changes with in the network

A

Change management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Basically a plan for relocating the network in case of an emergency

A

Disaster Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Collecting data and all the information when something goes down is known as:

A

Forensics or Incident Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Using fault tolerance and redundancy to help prevent your network from going down, and what type of backup plans you have to keep everything up and running

A

High Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

There are 4 security policies:

A

Acceptable use Policy - Defines ownership, what website that are allowed, Access time on the network
Remote Access Policy - Using a VPN, Authentication, Authorization
Password Policy - complexity, Password age, lockout policy
IT Safety Policy - Lifting equipment, Equipment handling, spills, procedures or how to’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

These are 3 terms regarding documentation:

A
  • Non-disclosure agreements ( NDA ) - says you can not talk about
    something you learn or find out while employed with your company
  • License Restriction - Usage, Transferring, and renewals
  • International Export Control - Military information, Nuclear
    Information, and License Keys`
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

These are 2 different types of Change management:

A

Strategic Change - massive change that affects the business structure
Infrastructure change -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A Change request is normally using when submitting a change:

A

Types of Change, Hardware or Software
Configuration Procedures
Rollback Process
What will the over Potential Impact be
Notification to everyone in the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Documentation is highly recommended when implementing a Change request:

A

Make sure everything about the change is documented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Before _________ any devices, be sure to research, test, and configure backups.

A

Patching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

__________ updates are necessary but they depend on the device.

A

Firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

__________ ___________ updates are the most common type of update

A

Operating System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A ________ _________ is an overall look at security in the organization

A

Risk Posture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

______ ________ is used to examine the strength of your network security

A

Pen Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

this is a common IP that’s shared by multiple systems

A

Virtual IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A _______ _______ _________ is one system that, if it fails, will bring down an entire process, workflow, or the whole organization.

A

Single point of failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

______ _______ are the systems needed to maintain production

A

Critical Assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

_________ __________ are the devices needed to maintain the network

A

Critical node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

the Key to maintaining a production on the network is to avoid a ______ ________ __________

A

Single point of failure

22
Q

This document is between the customer and service provider. it defines the scope, quality, an terms of service to be provided.

A

Service Level Agreement or ( SLA )

23
Q

this document defines the agreement between two parties, is used where a legally binding contract is inappropriate
* definition of duties
* time frame

A

memorandum of understanding ( MOU )

24
Q

this document is an agreement between say manufacturers that say they will continue to make parts for each other

A

Multi-source agreement ( MSA )

25
this document is a legal contract between 2 parties ( vendor and Customer) * Defines services to be performed / supplied * Defines time frame / deliverables * Defines milestones / defines progress
Statement of Work ( SOW )
26
things that should be done when a incident happens:
Secure the area Document the Scene Collect evidence Chain of Custody Forensics Report to authorities
27
A ______ _______ is the person who must report an incident as soon as it happens.
First Responder
28
this is the state of data once it has been reovered
Recovery Point objective (RPO)
29
this is the actual time needed to 4 restore / recover full functionality of an organizations network once it seizes to function
Recovery time objective ( RTO )
30
To data types when it comes to backups:
Configuration data State
31
Backup methods include:
Full Backup Differential Backup - means to backup all changes since the last full Incremental Backup - only backs up changes made from last backup Offsite Backups Cloud Backups - takes a lot of time for the first full backup
32
this backup is mainly seen on Virtual Machine. they are perfect way of making a copy of something that happened in the past and are not typically stored on separate media.
Snapshots
33
When working with local backups you need to think about mediums:
Tapes External Hard drives
34
the failed time to repair a disaster is known as
( MTTRepair )
35
the time a system is repaired until it goes down again is known as:
( MTTFailure )
36
the time a system fails, it's repaired and, it fails again is known as:
( MTBF ) or mean time between failures
37
Backup site that are part of your evacuation plan include the following:
Cold Site Warm site Hot site
38
this type of recovery site takes weeks to bring online, it a basic office space, has no operational equipment, and is the cheapest
Cold Site
39
this type of recovery site will take days to bring on line and it does have operational equipment
Warm Site
40
this type of recovery site only takes hours to bring online an it has real time synchronization, almost all data is ready to go - often will need a quick update, and are very expensive
Hot site
41
When choosing your recovery site you might want to think of:
Distance and location Internet requirements - for Housing and Entertainment Legal issues
42
Your business continuity should include:
Annual Exercises. Alternative Processing Sites After action Reports Cloud site backups
43
______ _______ attempts to mitigate incidents to preserve business functiionality
Contingency or business continuity planning
44
thorough __________ and _________ practice is what makes recovery plans successful when disasters occur.
planning and practice
45
BYOD stands for:
Bring your own device
46
AUP stands for
Acceptable use Policy agreement
47
this allows a company to connect to a mobile device from a centralized location to be able to control and manage that device
Mobile Device Manager (MDM)
48
BYOD challenges include:
Personal use versus Business use The MDM should be able to manage a device from anywhere Personal data versus company data
49
this is where the corporation owns all the devices you use
Corporate-owned, business only (COBO)
50
this is basically the same as COBO but the users will receive an approved list of items or apps they can use.
Corporate-owned/issued, personally enabled ( COPE )
51
this is basically the same as COBO but the users can actually choose their devices
Choose your own device ( CYOD )
52
A _________ assessment examines any possible security threat, like looking at threats from actors
Posture