Term
| The Syrian Electronic Army claimed Skype's parent compnay Microsoft was doing what with your private infomation? |
|
Definition
| Selling it to governments. |
|
|
Term
| In the respone to the 2013 Facebook attack, Oracle provided a patch to address which vulnerability? |
|
Definition
| The ability to by-pass the Java sandbox. |
|
|
Term
| This is the aspect of Network Management that involves keeping track of resources in the network and how they are assigned. |
|
Definition
|
|
Term
| This is the aspect of Network Management that is concerned with configuring resources in the network to support a given service. |
|
Definition
|
|
Term
| The attack on Facebook in 2012 was believed to be taking advantage of the fact that users tend to use the same password in various web-based services making it easy to gain remote access to other corporate networks. What was the name and type of attack that was used? |
|
Definition
|
|
Term
| This is the aspect of Network Management that deals with keeping the network up and running smoothly. |
|
Definition
|
|
Term
| Eventhough in the Evernote hack there was no evidence was found of unauthorized access to the contents of any user account or payment information for Evernote Premium and Evernote Business customers. How many users' passwords did the company reset? |
|
Definition
|
|
Term
| The pro-Syrian government hacking group, the Syrian Electronic Army hacked which of the following companies? |
|
Definition
|
|
Term
| According to the Heavy.com article, which of the following is a hacking concepts that is currently being used frequently being used frequently is the: |
|
Definition
| Watering Hole Attack (WHA). |
|
|
Term
| The Syrian Electronic Army has primarily targeted organizations that it deems to be against the government of Syrian President Bashar Assad. These sites included which media outlets? |
|
Definition
| The New York Times, The Washington Post, The Associated Press |
|
|
Term
| This is the aspect of Network Management that is concerned with performing repairs and upgrades. |
|
Definition
|
|
Term
| This is the aspect of Network Management that involves keeping track of resources in the network and how they are assigned. |
|
Definition
|
|
Term
| The 2013 attack on two NBC owned websites used an attack where users who are simply surfing the Web can stumble upon a hacked website, simply by opening infected pages. What was the name of the was the name of the attack used and what are these types of attacks commonly referred to as? |
|
Definition
| (Citadel Trojan, drive-by download) |
|
|
Term
| Skype responded to the Syrian Electronic Army claim that they obtained documentation and personal account information by stating: |
|
Definition
| "You may have noticed our social media properties were targeted today. No user info was compromised. We're sorry for the inconvenience." |
|
|
Term
| These Devices are similar to craft terminals, in that they allow operators to access devices to view their status and configuration, and possibly modify their parameter settings. But their abilities far exceed those of Craft Terminals. |
|
Definition
|
|
Term
| The se devices help network providers to detect suspicious communication patterns on the network that might be indicative of an ongoing attack. |
|
Definition
| Intrusion Detection Systems (IDS). |
|
|
Term
| These network management systems are used to track how problems in a network are being resolved. |
|
Definition
|
|
Term
| The problem with alarm messages is that they rarely indicate: |
|
Definition
| the root cause of the problem. |
|
|
Term
| If the tier 1 support person cannot solve the problem, the problem is then ______________ to tier 2 support. |
|
Definition
|
|
Term
| The trouble tickets in the stroy involving Pat have two sources. One of them is: |
|
Definition
|
|
Term
| These netwotk management tools enable users to analyze traffic and performance data, with the goal of recognizing trends and patterns in that traffic. |
|
Definition
| Performance analysis systems. |
|
|
Term
| The first support person with whom a customer speaks is usually _______________ level of support. |
|
Definition
|
|
Term
| The catch all title for Networking professionals is: |
|
Definition
|
|
Term
| In most cases, the highest level of support is: |
|
Definition
|
|
Term
| Packet sniffers, packet analyzers, and traffic analyzers are just some of the name for these types of devices. |
|
Definition
|
|
Term
These provide a user-friendly way for humans to interact with individual network equipment. |
|
Definition
|
|
Term
| Performance analysis systems have to deal with massive amounts of data that has been collected over long periods of time. Because they have to deal with such a large amount of data, they frequently involve techniques to recognize common patterns in large amounts of data which are know as: |
|
Definition
|
|
Term
| These devices help users to quickly sift through and make sense of the volumes of event and alarm messages that are received from the network. |
|
Definition
| Alarm Management Systems. |
|
|
Term
| These network management systems are used to assign and track individual maintenance jobs in a network and also help organize and manage the workforce that carries them out. |
|
Definition
|
|
Term
| The management interface handles: |
|
Definition
|
|
Term
| What could be the most important reason for using a dedicated management network instead of a shared one? |
|
Definition
|
|
Term
| This is important for activities such as network planning and the planning of software upgrades. |
|
Definition
|
|
Term
| To be managed, a network element must offer a management _____________ through which a managing system can communicate with the network element for management purposes. |
|
Definition
|
|
Term
| Putting a focus on keeping your operations staff happy, make sure that the amount of damage that any one person can cause is limited and can that the data be recovered is known as a: |
|
Definition
|
|
Term
| Automatically logging the activities of operations support staff who initiated what action, at what time is known as: |
|
Definition
| Collection of audit trails. |
|
|
Term
| The name of the instructor on the SNMP is: |
|
Definition
|
|
Term
| The place from which large networks is managed is generally termed the: |
|
Definition
| Network Operations Center (NOC). |
|
|
Term
| The first main component in network management consists of: |
|
Definition
| the device that must be managed. |
|
|
Term
| This provides your network operations with an invaluable lifeline that lets you bring the network back up in case of disasters and emergencies. |
|
Definition
Reliable backup and restore procedures.
|
|
|
Term
| The MIB should not be confused with a: |
|
Definition
|
|
Term
| This is a conceptual data store that contains a management view of the device being managed. |
|
Definition
| The Management Information Base (MIB). |
|
|
Term
| Our guest speaker, Josh, works for whom? |
|
Definition
| Harley-Davidson Dealer Systems |
|
|
Term
| What is going 'end of life' where Josh works? |
|
Definition
| The Cisco Catalist Switches |
|
|
Term
| The Catalyst Switches are being replaced with what? |
|
Definition
|
|
Term
| How does Josh use Wireshark in his situation? |
|
Definition
| Capturing packets throughout the network to help identify where the problem is. |
|
|
Term
| What was another area where Josh mentioned Wirehark was useful? |
|
Definition
| Voice traffic troubleshooting. |
|
|
Term
| Which of the following does the acronym OAM&P represent? |
|
Definition
| Operations, Administration, Maintenance, and Provisioning. |
|
|
Term
| It is important to remember that correlation does not equal: |
|
Definition
|
|
Term
| Which of the following does the acronym FCAPS represent? |
|
Definition
fault, configuration, accounting, performance, security. |
|
|
Term
| When an alarm is cleared, it means that: |
|
Definition
| The underlying condition that caused the alarm has ended. |
|
|
Term
| It is important to remember that: |
|
Definition
| not every alarm indicates something major or an impending catastrophe of its own. |
|
|
Term
| Generally two techniques deal with potential event information overload. |
|
Definition
| Filtering and Correlation. |
|
|
Term
| What is the difference between alarm filtering and alarm correlation? |
|
Definition
| Filtering limits data that can be distracting, Alarm Correlation can be considered intelligent filtering. |
|
|
Term
| The main idea behind filtering is: |
|
Definition
| to reduce the amount of information to which human operators and higher-level management applications are exposed. |
|
|
Term
| When an alarm is acknowledged, it means that: |
|
Definition
| That a technician is working on the problem. |
|
|
Term
| Historical alarm data can be mined to help with: |
|
Definition
| Future diagnosis and correlation. |
|
|
Term
| Considering the Configuration Management aspect of FCAPS, the ITIL model claims that it: |
|
Definition
| Simplifies the change process |
|
|
Term
| Changes in business have necessitated the need for a new: |
|
Definition
|
|
Term
| This aspect of FCAPS and ITIL maintains the user and business information confidentially. |
|
Definition
|
|
Term
| Considering the ITIL model, any disruption to normal service is considered: |
|
Definition
|
|
Term
| ITIL is not yet considered a(n): |
|
Definition
|
|
Term
| This aspect of FCAPS and ITIL helps prepare the network for the future. |
|
Definition
|
|
Term
| According to the video, FCAPS was introduced in which year? |
|
Definition
|
|
Term
| This aspect of FCAPS and ITIL helps reduce operational costs and establishes better control over the costs of the network. |
|
Definition
|
|
Term
| The product being plugged at the end of the video was: |
|
Definition
|
|
Term
|
Definition
| The ISO Telecommunications Management Network |
|
|
Term
| ITIL is the acronym for which of the following? |
|
Definition
| Information Technology Infrastructure Library |
|
|
Term
| Fault Management includes, from an FCAPS standpoint: |
|
Definition
Detecting, Isolating and Resolving Network problems
|
|
|
Term
| Restoring service right away is the main objective of: |
|
Definition
|
|