Network Documentation Flashcards

(32 cards)

1
Q

What does the term ‘Vulnerabilities’ refer to?

A

Weaknesses in a system that can be exploited by threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of ‘Configuration Management’?

A

To maintain and control all hardware and software configurations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does ‘OS Management’ involve?

A

Regular updates and maintenance of operating systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are ‘Firmware Updates’?

A

Updates to the software that controls hardware devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is meant by ‘Decommissioning Assets’?

A

The process of retiring equipment from active use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Fill in the blank: A _______ is a copy of device configuration to prevent data loss.

A

Production Config Backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is ‘Change Management’?

A

A systemic approach to handle network changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does ‘Request Process Tracking’ involve?

A

Logging, programming, and analyzing change requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is ‘Base Line Configuration’?

A

A standard of approved settings/configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False: Regular updates are not necessary for maintaining system performance.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the significance of ‘Maintenance Control’?

A

To ensure the availability and performance of hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does ‘Network Disposal’ refer to?

A

The secure removal and destruction of network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fill in the blank: The process of ensuring devices work as intended is known as _______.

A

Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the role of ‘Settings and Setups’?

A

To configure devices for active use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a key component of effective configuration management?

A

Regular updates and backups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of network diagrams?

A

To represent layer 2 and 3 data links and route traffic

Network diagrams help visualize the structure and data flow within a network.

17
Q

What does a physical network diagram illustrate?

A

Physical connections between network devices and their physical locations

It highlights how devices are interconnected in a physical space.

18
Q

What information does a logical network diagram provide?

A

Data flows within a network architecture and protocols

Logical diagrams focus on how data moves rather than physical connections.

19
Q

What is included in an asset inventory?

A

Hardware, software, and licensing details

An asset inventory is crucial for managing IT resources.

20
Q

What does a rack diagram detail?

A

Equipment mounted in server racks

Rack diagrams help in organizing and managing server space.

21
Q

What is the purpose of warranty management?

A

To manage service claims in a timely manner

Proper warranty management ensures efficient handling of equipment issues.

22
Q

What do cable diagrams represent?

A

Physical and logical layout of network cables and equipment

Cable diagrams are essential for understanding network infrastructure.

23
Q

Fill in the blank: IPAM is used to _______.

A

Organize, track, manage IP addresses

24
Q

What does ‘Service Level Agreement’ refer to?

A

A contract that outlines expected service standards and responsibilities between a provider and a customer.

25
What is meant by 'expected service standards'?
The specific criteria and quality metrics that a service provider commits to meet.
26
What are 'penalties for breach' in a service agreement?
Consequences or fines imposed on a provider for failing to meet agreed-upon service standards.
27
What is a 'Heat Map' used for?
To assess coverage and performance of wireless networks.
28
What does 'Life Cycle Management' involve?
Managing the entire lifecycle of network equipment from deployment to end-of-life.
29
What does 'End of Life' signify in technology?
When a product is no longer produced by the manufacturer.
30
What does 'EOS' mean?
Support provided for products that are no longer supported by the manufacturer.
31
Fill in the blank: 'End of life' products are _______.
[no longer produced]
32
True or False: A service provider is not liable for penalties if they breach service standards.
False