Types of Cyber Threats (38.1.2) Cyber threats can be classified into different categories, as shown in Table 38-1. This allows organizations to assess the likelihood of a threat occurring and understand the monetary impact of a threat so that they can prioritize their security efforts. Table 38-1 Cyber Threat Categories and Examples Internal vs. External…
Author: examcert
What Did I Learn in This Chapter?-2
Packet capture and protocol analysis applications enable you to investigate packet content as it flows through the network. The software decodes the protocol layers housed within a packet. Wireshark is an example of a popular open-source packet capture/protocol analysis application. Bandwidth and throughput are characteristics of network data flow. Bandwidth is the theoretical amount of…
What Did I Learn in This Chapter?-1
Network baselines are a series of measurements of network performance taken during different types of network usage. The baselines help to understand the parameters of a properly working network so that network performance or security problems can be identified when performance deviates significantly from previous baseline measurements. Cisco Discovery Protocol (CDP) is a Cisco protocol…
Network Management Systems
Network Management Systems (37.6.5) Network management refers to two related concepts. First is the process of configuring, monitoring, and managing the performance of a network. Second is the platform that IT and network operations teams use to complete these tasks. Modern network management platforms provide advanced analytics, machine learning, and intelligent automation to continually optimize…
Understanding VPNs – 100-150 Exam Study Guide
Understanding VPNs (37.6.4) To securely communicate and share resources over a network that is not secure, such as the Internet, a Virtual Private Network (VPN) is used. The most common types of VPN are used to access a corporate private network either by remote users or by remote corporate sites. A VPN uses dedicated secure…
Cybersecurity Threats, Vulnerabilities, and Attacks
ObjectivesUpon completion of this chapter, you will be able to answer the following questions: Key TermsThis chapter uses the following key terms. You can find the definitions in the Glossary.Infrastructure as a Service (IaaS)Platform as a Service (PaaS)Software as a Service (SaaS)threat domain Introduction (38.0)It’s Webster again! The college help desk gets support tickets for…
Remote Access with Telnet, SSH, and RDP
Remote Access with Telnet, SSH, and RDP (37.6.2) Long before desktop computers with sophisticated graphical interfaces existed, people used text-based systems, which were often just display terminals physically attached to a central computer. After networks became available, people needed a way to remotely access computer systems in the same manner that they did with the…
Troubleshoot Connectivity Remotely
Troubleshoot Connectivity Remotely (37.6) Quite often the issue is in a remote location. This section discusses the tools at your disposal to help you support remote users and troubleshoot problems from a distance. Supporting Remote Users (37.6.1) When assisting remote users, it is often not efficient to verbally walk a user through complicated procedures. Remote-access…
Packet Capture and Protocol Analysis
Packet Capture and Protocol Analysis (37.5.2) Protocol analyzers can investigate packet content while flowing through the network. A protocol analyzer decodes the various protocol layers in a recorded frame and presents this information in a relatively easy-to-use format. As a technician, you may be tasked to capture traffic from a specific host. Therefore, it is…
Troubleshoot a Network – 100-150 Exam Study Guide
Troubleshoot a Network (37.5) There are many tools that can help you determine the cause and scope of problems affecting the network. This section introduces you to some of those tools and commands. Network Devices as Sources of Network Information (37.5.1) When documenting or diagnosing a network problem, it is often necessary to gather information…