Term
Network ___ documentation typically consists of a diagram of all critical components in the network. |
|
Definition
|
|
Term
The ___ network refers to the direction in which data flows on the network within the physical topology. |
|
Definition
|
|
Term
In computing, historical readings used as a measurement for future calculations are called ___s. |
|
Definition
|
|
Term
Both ___ and ___ network diagrams provide an overview of the network layout and function. |
|
Definition
|
|
Term
A ___ baseline looks at the entire network and a ____ baseline focuses on an individual ___ within the network. |
|
Definition
|
|
Term
Collecting network statistics is a process called ___. |
|
Definition
|
|
Term
For baseline purposes, one of the most common statistics to monitor is ___ usage. |
|
Definition
|
|
Term
___s are documented rules that dictate who can access particular network resources, server rooms, backups, etc. |
|
Definition
|
|
Term
Network ___s differ from policies in that they describe how tasks are to be performed. |
|
Definition
|
|
Term
___s are written by an organization for its employees. ___s are actual legal restrictions with legal consequences. |
|
Definition
|
|
Term
A ___ ___ is either hardware or software that eavesdrops on transmissions traveling throughout the network. |
|
Definition
|
|
Term
The two key defenses against packet sniffers are to use a ___ network running ___ software. |
|
Definition
|
|
Term
___ testing checks the rate of data delivery over a network. |
|
Definition
|
|
Term
___ measures the amount of data flow under real-world conditions, including EMI influences, heavy traffic loads, improper wiring, and even network collisions. |
|
Definition
|
|
Term
___ refers to the maximum amount of information that can be sent through a particular medium under ideal conditions. |
|
Definition
|
|
Term
A ___ ___ is a software-based security utility designed to search a network host for open ports on a TCP/IP-based network. |
|
Definition
|
|
Term
A ___ ___ identifies closed, open, and listening ports. |
|
Definition
|
|
Term
The goal of ___ testing is to establish baselines for the comparison of network functioning. |
|
Definition
|
|
Term
For performance tests to be effective, they need to be taken under the same type of network ___ each time. |
|
Definition
|
|
Term
Sometimes called volume or endurance testing, ___ testing involves artificially placing the network under a larger workload. |
|
Definition
|
|
Term
___ testing is sometimes done to see if bugs exist in the network that are not currently visible but that may become a problem as the network grows. |
|
Definition
|
|
Term
___ tests are about how a network functions today. ___ tests are about how a network may function in the future |
|
Definition
|
|
Term
___ tests push resources to the limit to see if the system breaks under intense pressure. |
|
Definition
|
|
Term
Stress testing enables administrators to observe network ___ failure and verify that their ___ procedures work. |
|
Definition
|
|
Term
___ tests assume that someday something will go wrong, and administrators will know exactly what to do when it happens. |
|
Definition
|
|
Term
___ logs are crucial for finding intrusions and diagnosing current system problems. |
|
Definition
|
|
Term
Windows uses three primary event logs: ___, ___ and ___. |
|
Definition
security application system |
|
|
Term
Windows 7/Vista/XP and 2000 use ___ ___ to view many of the key log files. |
|
Definition
|
|
Term
A ___ log contains events such as successful and unsuccessful logon attempts and failed resource access. |
|
Definition
|
|
Term
To save space, administrators might choose to adjust the security log to audit only failed ___ attempts and not successful ones. |
|
Definition
|
|
Term
A ___ log contains information logged by applications that run on a system rather than the operating system itself. |
|
Definition
|
|
Term
The application log tracks both ___ events and ___ events within applications. |
|
Definition
|
|
Term
A ___ log records information about components or drivers in the system |
|
Definition
|
|
Term
The ___ log is where to look when troubleshooting a problem with a hardware device or network connectivity. |
|
Definition
|
|
Term
The ___ log contains messages related to the client element of DHCP, hardware device errors, time synchronization issues, and service startup problems. |
|
Definition
|
|
Term
Most UNIX/Linux-based systems include the capability to write messages to log files via ___. |
|
Definition
|
|
Term
___ logs are most often associated with the tracking of Internet activity. |
|
Definition
|
|
Term
Another form of ___ log is a compilation of events from other log files. |
|
Definition
|
|
Term
___ logs and ___ logs can be viewed by users without admin privileges. |
|
Definition
|
|
Term
___ logs can only be viewed by users with admin privileges. |
|
Definition
|
|
Term
The process of collecting, retaining and disposing of all system logs is called ___ ___. |
|
Definition
|
|
Term
A ___ ___ is a tool to attach media connectors to the ends of cables. |
|
Definition
|
|
Term
When crimping cables, it is important to ___ them before putting them on the network. |
|
Definition
|
|
Term
A ____ tool is used to attach twisted-pair network cable to an insulation displacement connector (IDC) in a patch panel. |
|
Definition
|
|
Term
A ___ ___ recorder is used to find potential power-related concerns such as power sags, spikes, surges, or other power variations. |
|
Definition
|
|
Term
___ monitoring often refers to the temperature of the server and network equipment rooms. |
|
Definition
|
|
Term
A ___ probe is a tool to find the beginning and end of a cable. |
|
Definition
|
|
Term
A toner probe has two parts: the tone generator, or ___, and the tone locator, or ___. |
|
Definition
|
|
Term
The tone generator and tone locator are sometimes referred to as the ___ and ___. |
|
Definition
|
|
Term
A ___ ___ is used to locate cables hidden in floors, ceilings, or walls and to track cables from the patch panels to their destinations. |
|
Definition
|
|
Term
A ___ ___ enables administrators to examine the bandwidth that a particular protocol is using (TCP, UDP, HTTP, FTP, etc.). |
|
Definition
|
|
Term
Like a packet sniffer, a ___ ___ captures the communication stream between systems. But unlike the sniffer, it also reads and decodes the traffic. |
|
Definition
|
|
Term
A ___ tester, also called a cable tester, is a tool to test whether a cable is working properly. |
|
Definition
|
|
Term
A cable ___ is used to certify cabling by testing it for speed and performance |
|
Definition
|
|
Term
A ___ ___ ___ sends a signal through a length of cable looking for cable faults. |
|
Definition
time domain reflectometer (TDR) |
|
|
Term
A time domain reflectometer (TDR) works at the ___ layer of the OSI model |
|
Definition
|
|
Term
An ___ ___ tester performs the same basic function as a wire media tester, but on optical media. |
|
Definition
|
|
Term
The most common problem with an optical cable is a ___ in the cable. |
|
Definition
|
|
Term
An optical ___ ___ ___ locates the break in an optical cable. |
|
Definition
time domain reflectometer (OTDR) |
|
|
Term
A ___ is used to test electrical current in a cable. |
|
Definition
|
|
Term
A ___ can ping and test response times of key networking equipment, such as routers, DNS servers and DHCP servers. |
|
Definition
|
|
Term
You can use a network ___ to isolate cable shorts, split pairs, and other faults. |
|
Definition
|
|
Term
A network ___ enables administrators to locate cables at patch panels and wall jacks using digital tones. |
|
Definition
|
|
Term
Most network multimeters provide a way to physically connect to a ___. |
|
Definition
|
|
Term
If a network is running slowly, a ___ ___ tester can tell you why. |
|
Definition
|
|
Term
A ___ ___ tester identifies the speeds the network cabling can support and isolates cabling from network problems. |
|
Definition
|
|
Term
A ___ ___ reveals Wi-Fi hot spots and detects wireless network access with LED visual feedback. |
|
Definition
|
|