click below
click below
Normal Size Small Size show me how
NS midterm
Question | Answer |
---|---|
What are three elements of network management? | Security, Performance, Reliability |
What is the difference between a Manager and an Agent? | An agent is narrowly focused on a single device. A manager polls multiple agents and can react to several agents |
What is a MIB? | Management Information Database |
What are management Proxies? | An entity that provides management information behalf of other entities. |
What is SNMP? | Simple Network Message Protocol |
Why would you do a network audit? | To define what is normal for the network, so you can know when things deviate from the norm |
What is a baseline? | Baseline describes the normal status on the network and provides a reference point. |
Name five types of audits | Inventory Audit Facility Audit Operational Audit Efficiency Audit Security Audit |
What is the difference between the five audit types above? | 1)Inventory Audit: Enumerates networking equipment, should be done in situ and before network devices are operational |
What is the difference between the five audit types above? | 2)Facility Audit: Tracks which network devices are placed where. Should be done in conjunction with an Inventory Audit |
What is the difference between the five audit types above? | 3)Accounts for daily network operations including overall utilization, collisions and other fuckups. Requires the creation of a baseline |
What is the difference between the five audit types above? | 4)Efficiency Audit: Evaluates the network media, costs and people using the network, index costs (over time) |
What is the difference between the five audit types above? | 5)Security Audit: Ongoing, determines best-defence/business continuity/backups/virus scanning, backups, disaster recovery, passwords... all that security type stuff. |
What is EMI? | Electro-Magnetic Interference. |
What is RFI? | Radio Frequency Interference. |
What is SOAP? | Simple Object Access Protoco |
What is NFS? | Network File System |
What is a RFC? | Request For Comments/Request for Change |
What is CIFS? | Common Internet File System |
What is SMB the same as? | NTFS |
What does SMB stand for? | Server Message Block |
What is SAMBA? | A suite of UNIX applications that speak SMB protocol |
What is smbd? | A daemon that allows file & printer sharing on a SMB network and provides authentication/authorization for SMB clients. Server Message Block Daemon |
What is nmbd? | A daemon that looks after the Windows Internet Name Service (WINS), and assists with browsing. NetBIOS Message Block Daemon |
What is SFU and what can it do? | Services For Unix |
What does SAN stand for? | Storage Area Network |
What does NAS stand for? | Network Attached Storage |
What does DAS stand for? | Direct Attached Storage |
What does SCSI stand for? | Small Computer System Interface |
What is Fibre Channel? | A technology for transmitting data between computer devices at 1 GBps |
What is iSCSI? | A technology that allows data to be transported to and from storage devices over an IP network |
What is the difference between Postscript and PCL? | Postscript is the defacto print standard in the UNIX community, and the only print standard used by Macintosh (DEPRECATED, Apple uses Postscript as well now) |
What is a WinPrinter? | A printer that the vendor only provides a windows driver for |
What is CUPS? | A linux print spooling program. Common Unix Printing System |
What is Raster Graphics? | Graphics produced by grouping pixels |
What is Vector Graphics? | Images produced by using mathematically generated points, lines and shapes |
What does BIND stand for? | Berkley Internet Name Domain |
What is a purpose of using a PROXY server? | An intermediate that sits between an application and a real server |
What is a FIREWALL? | The place you put pictures of the really shitty employees. A system designed to prevent unauthorized access to or from a private network (intranet) |
Name three techniques used by firewalls | Packet filter, Application gateway, stateful inspection |
What is IP spoofing? | A technique used to gain unauthorized access to computers, whereby he intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host |
What does DMZ stand for? | De-Militarized Zone |
What is a gateway? | A combination of hardware and software that links two different types of networks |
What is an Extranet? | A business to business intranet that allows limited, controlled, secure access between a company's intranet and designated, authenticated users from remote locations |
What is XML | Extensible Markup Language |
What is LDAP? | Lightweight Directory Access Protocol |
What is ADSL? | Asymmetric Digital Subscriber Line |
What is IMAP? | Internet Message Access Protocol |
What is the difference between Unicode and ASCII? | Unicode represents characters as integers, ASCII uses 7 bits to represent all 127 characters. |
What is MIME? | Multipurpose Internet Mail Extensions |
What is SMTP? | Simple Message Transfer Protocol |
What is a MTA? | Mail Transfer Agent |
Name two examples of MTA’s | Sendmail/Postfix, Exchange |
What are two examples of a MUA? | Outlook and Thunderbird |