101c11

¡Supera tus tareas y exámenes ahora con Quizwiz!

At what point is a packet considered to be a giant? A - It becomes a giant when it exceeds the medium's maximum packet size. B - It becomes a giant when it exceeds 1500 bytes. C - It becomes a giant only when fragmented pieces are reassembled and the packet size is too large. D - It becomes a giant once a VLAN tag is added.

A - It becomes a giant when it exceeds the medium's maximum packet size.

Each managed object on a managed device using SNMP is assigned which of the following? A - object identifier (OID) B - TCP/UDP port C - process ID D - inode number

A - object identifier (OID)

If you wish to maintain a "4 nines" availability rating, what is the maximum amount of down time you can have per day? A - 0.4 seconds B - 8 seconds C - 1 minute, 26 seconds D - 14 minutes, 23 seconds

B - 8 seconds

What makes up the first 6 bits of the 8-bit DiffServ field? A - Priority Code Point (PCP) B - Differentiated Services Code Point (DSCP) C - Class of Service (CoS) D - Forward Error Correction (FEC)

B - Differentiated Services Code Point (DSCP)

What does the Common Address Redundancy Protocol do? A - It allows a pool of computers or interfaces to share the same MAC address. B - It allows a pool of computers or interfaces to share the same IP address. C - It allows multiple devices to share the same fully qualified domain name. D - It allows multiple devices to share hardware resources.

B - It allows a pool of computers or interfaces to share the same IP address.

What happens when an NMS uses the SNMP walk command? A - The NMS sends a request for data to the agent on a managed device. B - The NMS uses get requests to move through sequential rows in the MIB database. C - The NMS requests a list of all active SNMP traps on the system. D - The NMS walks through a list of given SNMP hosts.

B - The NMS uses get requests to move through sequential rows in the MIB database.

Which type of backup scheme only covers data that has changed since the last backup? A - full backup B - incremental backup C - differential backup D - snapshot backup

B - incremental backup

When a device handles electrical signals improperly, usually resulting from a bad NIC, it is referred to by what term below? A - ghost B - jabber C - talker D - blabber

B - jabber

The Link Aggregation Control Protocol was initially defined by what IEEE standard? A - IEEE 802.3af B - IEEE 802.1cd C - IEEE 802.3ad D - IEEE 802.3bd

C - IEEE 802.3ad

A differential backup covers what data on a system? A - It includes all data every time it is performed. B - It includes only data that has changed since the last backup. C - It includes data that has changed since the last full backup. D - It includes data that has changed since the last incremental backup.

C - It includes data that has changed since the last full backup.

A hot site consists of computers, devices, and connectivity necessary to rebuild a network exist, but without appropriate configuration. T/F

False

A system with an availability of 99.999% can be down for a maximum of 52 minutes per year. T/F

False

Setting a NIC to run in promiscuous mode will allow it to see all network traffic passing through a network switch. T/F

False

A brownout is a momentary decrease in voltage; also known as a sag. T/F

True

Class of Service utilizes 8 levels of priority, and modifies the PCP field in an 802.1Q tag. T/F

True

Most UNIX and Linux desktop operating systems provide a GUI application for easily viewing and filtering the information in system logs. T/F

True

The SNMP version 3 protocol introduces authentication, validation, and encryption for messages exchanged between devices and the network management console. T/F

True

Wireshark or any other monitoring software running on a single computer connected to a switch doesn't see all the traffic on a network, but only the traffic the switch sends to it, which includes broadcast traffic and traffic specifically addressed to the computer. T/F

True

You can find out where various logs are kept on some UNIX and Linux systems by viewing the /etc/syslog.conf or /etc/rsyslog.conf files. T/F

True

A RAID 5 configuration requires a minimum of two hard disks to operate. T/F

False


Conjuntos de estudio relacionados

Chapter 44: Nursing Care of a Family when a Child has a Hematologic Disorder

View Set

Research HESI Flowers 6, Research HESI Flowers 5, Research HESI - Flowers 4, Research HESI Flowers 3, Research HESI Flowers 2, research HESI Flowers

View Set

EMT - ALL Questions (Chapter 1-15)

View Set

Autonomic Nervous System Control of Heartbeat

View Set

Pain Management Part 1 and 2 (12 questions)

View Set

"When I Have Fears That I May Cease To Be"

View Set

developmental psychology ---- chapter 6

View Set