Surge Protector Correct Answer: Catches voltage rush if power surges
UPS power supply Correct Answer: Uninterruptible Power Supply that keeps gear running if
power is lost
LSM (LAN Services Module) router Correct Answer: directs traffic destined for the LAN. is
faster and has larger bandwidth
LSM (LAN Service Module) Fiber Switch Correct Answer: a lot more information at faster
speed. Relies on fiber optic connections
LSM (LAN Service Module) Network Time Server (NTS) Correct Answer: Synchronization to
all device clocks. provides smooth & efficient traffic
, LSM (LAN Service Module) UPS Correct Answer: Provides 500w of power for 15 minutes
LSM (LAN Service Module) Signal Entry Panel Correct Answer: Serial connections, fiber
connection to fiber switch. Allows for faster speeds
LSM (LAN Service Module) Surge Suppressor Correct Answer: Protects gear from getting fried
ASM (Application Services Module) Correct Answer: Most common. Red circles indicate hard
drives. Has a Hot-Swappable redundant power supplies.
SSD (Solid State Drive) Correct Answer: Used to receive & transfer data quicker than hard
drives
ASM (Application Services Module) Rear Correct Answer: CAT5 protrudes from the back.
must have direct connection from CAT5 to access internet (not wireless)
ESM (Enterprise Switch Module) Correct Answer: Routes all of the traffic because it has the
power. Has more power than LSM, but weaker traffic
SM Signal Entry Panel Correct Answer: Black panel handles all encrypted traffic. Located at top
of module. Red panel handles deals with unencrypted traffic. Located above LANTRONIX and
under third panel
Third SEP (Signal Entry Panel) Correct Answer: Handles traffic for the CV-MCU, the modem
cable connections/fiber connections for transmission
Concept of Isolation & Separation Correct Answer: ensure the effects of a disturbance/incident,
within one part of the system, can be limited to just that part of the overall system
Compartmentalization Correct Answer: an extension of the isolation/separation concept where a
system can be designed into multiple compartments. A breach can be contained in one
compartment
Policy Enforcement Correct Answer: provides the ability to enforce allowed behavior between
connected systems, users, applications, IP networks, and file blocking policies
Identity & Trust Correct Answer: defines the ability of a system to identify entities accessing a
given resources and determine a trust level or state of trust.
Instrumental & Visibility Correct Answer: Using equipment indicating, measuring, and
recording physical quantities
Visibility Correct Answer: the monitoring of behavior of the usage in the network
Two types of network diagrams? Correct Answer: Logical & Physical
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Classroom. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $7.49. You're not tied to anything after your purchase.