Term
The Syrian Electronic Army claimed Skype's parent compnay Microsoft was doing what with your private infomation? |
|
Definition
Selling it to governments. |
|
|
Term
In the respone to the 2013 Facebook attack, Oracle provided a patch to address which vulnerability? |
|
Definition
The ability to by-pass the Java sandbox. |
|
|
Term
This is the aspect of Network Management that involves keeping track of resources in the network and how they are assigned. |
|
Definition
|
|
Term
This is the aspect of Network Management that is concerned with configuring resources in the network to support a given service. |
|
Definition
|
|
Term
The attack on Facebook in 2012 was believed to be taking advantage of the fact that users tend to use the same password in various web-based services making it easy to gain remote access to other corporate networks. What was the name and type of attack that was used? |
|
Definition
|
|
Term
This is the aspect of Network Management that deals with keeping the network up and running smoothly. |
|
Definition
|
|
Term
Eventhough in the Evernote hack there was no evidence was found of unauthorized access to the contents of any user account or payment information for Evernote Premium and Evernote Business customers. How many users' passwords did the company reset? |
|
Definition
|
|
Term
The pro-Syrian government hacking group, the Syrian Electronic Army hacked which of the following companies? |
|
Definition
|
|
Term
According to the Heavy.com article, which of the following is a hacking concepts that is currently being used frequently being used frequently is the: |
|
Definition
Watering Hole Attack (WHA). |
|
|
Term
The Syrian Electronic Army has primarily targeted organizations that it deems to be against the government of Syrian President Bashar Assad. These sites included which media outlets? |
|
Definition
The New York Times, The Washington Post, The Associated Press |
|
|
Term
This is the aspect of Network Management that is concerned with performing repairs and upgrades. |
|
Definition
|
|
Term
This is the aspect of Network Management that involves keeping track of resources in the network and how they are assigned. |
|
Definition
|
|
Term
The 2013 attack on two NBC owned websites used an attack where users who are simply surfing the Web can stumble upon a hacked website, simply by opening infected pages. What was the name of the was the name of the attack used and what are these types of attacks commonly referred to as? |
|
Definition
(Citadel Trojan, drive-by download) |
|
|
Term
Skype responded to the Syrian Electronic Army claim that they obtained documentation and personal account information by stating: |
|
Definition
"You may have noticed our social media properties were targeted today. No user info was compromised. We're sorry for the inconvenience." |
|
|
Term
These Devices are similar to craft terminals, in that they allow operators to access devices to view their status and configuration, and possibly modify their parameter settings. But their abilities far exceed those of Craft Terminals. |
|
Definition
|
|
Term
The se devices help network providers to detect suspicious communication patterns on the network that might be indicative of an ongoing attack. |
|
Definition
Intrusion Detection Systems (IDS). |
|
|
Term
These network management systems are used to track how problems in a network are being resolved. |
|
Definition
|
|
Term
The problem with alarm messages is that they rarely indicate: |
|
Definition
the root cause of the problem. |
|
|
Term
If the tier 1 support person cannot solve the problem, the problem is then ______________ to tier 2 support. |
|
Definition
|
|
Term
The trouble tickets in the stroy involving Pat have two sources. One of them is: |
|
Definition
|
|
Term
These netwotk management tools enable users to analyze traffic and performance data, with the goal of recognizing trends and patterns in that traffic. |
|
Definition
Performance analysis systems. |
|
|
Term
The first support person with whom a customer speaks is usually _______________ level of support. |
|
Definition
|
|
Term
The catch all title for Networking professionals is: |
|
Definition
|
|
Term
In most cases, the highest level of support is: |
|
Definition
|
|
Term
Packet sniffers, packet analyzers, and traffic analyzers are just some of the name for these types of devices. |
|
Definition
|
|
Term
These provide a user-friendly way for humans to interact with individual network equipment. |
|
Definition
|
|
Term
Performance analysis systems have to deal with massive amounts of data that has been collected over long periods of time. Because they have to deal with such a large amount of data, they frequently involve techniques to recognize common patterns in large amounts of data which are know as: |
|
Definition
|
|
Term
These devices help users to quickly sift through and make sense of the volumes of event and alarm messages that are received from the network. |
|
Definition
Alarm Management Systems. |
|
|
Term
These network management systems are used to assign and track individual maintenance jobs in a network and also help organize and manage the workforce that carries them out. |
|
Definition
|
|
Term
The management interface handles: |
|
Definition
|
|
Term
What could be the most important reason for using a dedicated management network instead of a shared one? |
|
Definition
|
|
Term
This is important for activities such as network planning and the planning of software upgrades. |
|
Definition
|
|
Term
To be managed, a network element must offer a management _____________ through which a managing system can communicate with the network element for management purposes. |
|
Definition
|
|
Term
Putting a focus on keeping your operations staff happy, make sure that the amount of damage that any one person can cause is limited and can that the data be recovered is known as a: |
|
Definition
|
|
Term
Automatically logging the activities of operations support staff who initiated what action, at what time is known as: |
|
Definition
Collection of audit trails. |
|
|
Term
The name of the instructor on the SNMP is: |
|
Definition
|
|
Term
The place from which large networks is managed is generally termed the: |
|
Definition
Network Operations Center (NOC). |
|
|
Term
The first main component in network management consists of: |
|
Definition
the device that must be managed. |
|
|
Term
This provides your network operations with an invaluable lifeline that lets you bring the network back up in case of disasters and emergencies. |
|
Definition
Reliable backup and restore procedures.
|
|
|
Term
The MIB should not be confused with a: |
|
Definition
|
|
Term
This is a conceptual data store that contains a management view of the device being managed. |
|
Definition
The Management Information Base (MIB). |
|
|
Term
Our guest speaker, Josh, works for whom? |
|
Definition
Harley-Davidson Dealer Systems |
|
|
Term
What is going 'end of life' where Josh works? |
|
Definition
The Cisco Catalist Switches |
|
|
Term
The Catalyst Switches are being replaced with what? |
|
Definition
|
|
Term
How does Josh use Wireshark in his situation? |
|
Definition
Capturing packets throughout the network to help identify where the problem is. |
|
|
Term
What was another area where Josh mentioned Wirehark was useful? |
|
Definition
Voice traffic troubleshooting. |
|
|
Term
Which of the following does the acronym OAM&P represent? |
|
Definition
Operations, Administration, Maintenance, and Provisioning. |
|
|
Term
It is important to remember that correlation does not equal: |
|
Definition
|
|
Term
Which of the following does the acronym FCAPS represent? |
|
Definition
fault, configuration, accounting, performance, security. |
|
|
Term
When an alarm is cleared, it means that: |
|
Definition
The underlying condition that caused the alarm has ended. |
|
|
Term
It is important to remember that: |
|
Definition
not every alarm indicates something major or an impending catastrophe of its own. |
|
|
Term
Generally two techniques deal with potential event information overload. |
|
Definition
Filtering and Correlation. |
|
|
Term
What is the difference between alarm filtering and alarm correlation? |
|
Definition
Filtering limits data that can be distracting, Alarm Correlation can be considered intelligent filtering. |
|
|
Term
The main idea behind filtering is: |
|
Definition
to reduce the amount of information to which human operators and higher-level management applications are exposed. |
|
|
Term
When an alarm is acknowledged, it means that: |
|
Definition
That a technician is working on the problem. |
|
|
Term
Historical alarm data can be mined to help with: |
|
Definition
Future diagnosis and correlation. |
|
|
Term
Considering the Configuration Management aspect of FCAPS, the ITIL model claims that it: |
|
Definition
Simplifies the change process |
|
|
Term
Changes in business have necessitated the need for a new: |
|
Definition
|
|
Term
This aspect of FCAPS and ITIL maintains the user and business information confidentially. |
|
Definition
|
|
Term
Considering the ITIL model, any disruption to normal service is considered: |
|
Definition
|
|
Term
ITIL is not yet considered a(n): |
|
Definition
|
|
Term
This aspect of FCAPS and ITIL helps prepare the network for the future. |
|
Definition
|
|
Term
According to the video, FCAPS was introduced in which year? |
|
Definition
|
|
Term
This aspect of FCAPS and ITIL helps reduce operational costs and establishes better control over the costs of the network. |
|
Definition
|
|
Term
The product being plugged at the end of the video was: |
|
Definition
|
|
Term
|
Definition
The ISO Telecommunications Management Network |
|
|
Term
ITIL is the acronym for which of the following? |
|
Definition
Information Technology Infrastructure Library |
|
|
Term
Fault Management includes, from an FCAPS standpoint: |
|
Definition
Detecting, Isolating and Resolving Network problems
|
|
|
Term
Restoring service right away is the main objective of: |
|
Definition
|
|