module 11

¡Supera tus tareas y exámenes ahora con Quizwiz!

When using SNMP with TLS, what port do agents receive requests on? 10161 10162 162 161

10161

If you wish to maintain a "4 nines" availability rating, what is the maximum amount of down time you can have per day? 8 seconds 14 minutes, 23 seconds 1 minute, 26 seconds .4 seconds

8 seconds

A highly available server is available what percentage of the time?

99.999%

When Comcast was found to be interfering with BitTorrent traffic, what method was being used?

Comcast was interjecting TCP segments with RST (reset) field set

A RAID 5 configuration requires a minimum of two hard disks to operate. True False

False

A hot site consists of computers, devices, and connectivity necessary to rebuild a network exist, but without appropriate configuration. True False

False

A system with an availability of 99.999% can be down for a maximum of 52 minutes per year. False True

False

Setting a NIC to run in promiscuous mode will allow it to see all network traffic passing through a network switch. True False

False

The Link Aggregation Control Protocol was initially defined by what IEEE standard? IEEE 802.3bd IEEE 802.1cd IEEE 802.3ad IEEE 802.3af

IEEE 802.3ad

which of the following statements describes a RAID 0 configuration

In a RAID 0, data is striped across multiple disks to improve performance

A snapshot is most similar to which type of backup scheme?

Incremental backup

What Storage Area Network (SAN) protocol runs on top of TCP, and can be used on an existing twisted-pair Ethernet network, while maintaining low cost?

Internet SCSI (iSCSI)

What Storage Area Network (SAN) protocol runs on top of TCP, and can be used on an existing twisted-pair Ethernet network, while maintaining low cost? Internet SCSI (iSCSI) Fibre Channel over Ethernet (FCoE) InfiniBand (IB) Fibre Channel (FC)

Internet SCSI (iSCSI)

What does the Common Address Redundancy Protocol do? It allows multiple devices to share hardware resources. It allows a pool of computers or interfaces to share the same IP address. It allows multiple devices to share the same fully qualified domain name. It allows a pool of computers or interfaces to share the same MAC address.

It allows a pool of computers or interfaces to share the same IP address.

At what point is a packet considered to be a giant? It becomes a giant when it exceeds 1500 bytes. It becomes a giant only when fragmented pieces are reassembled and the packet size is too large. It becomes a giant when it exceeds the medium's maximum packet size. It becomes a giant once a VLAN tag is added.

It becomes a giant when it exceeds the medium's maximum packet size.

How does a line conditioning UPS protect network equipment? It protects against electrical surges. It shields equipment from lightning damage. It filters line noise from incoming power. It reduces fluctuations in incoming voltage.

It filters line noise from incoming power.

A differential backup covers what data on a system?

It includes data that has changed since the last full backup

What is distributed switching? It is multiple switches that provide redundancy switching for all switches in the group. It is when multiple physical switches are configured to act as a single switch. It is a single distributed vSwitch that can service VMs across multiple hosts. It is a single physical switch that is partitioned in software to perform as multiple switches.

It is a single distributed vSwitch that can service VMs across multiple hosts.

What happens when an NMS uses the SNMP walk command? The NMS sends a request for data to the agent on a managed device. The NMS uses get requests to move through sequential rows in the MIB database. The NMS requests a list of all active SNMP traps on the system. The NMS walks through a list of given SNMP hosts.

The NMS uses get requests to move through sequential rows in the MIB database.

Class of Service utilizes 8 levels of priority, and modifies the PCP field in an 802.1Q tag. False True

True

Most UNIX and Linux desktop operating systems provide a GUI application for easily viewing and filtering the information in system logs. False True

True

The SNMP version 3 protocol introduces authentication, validation, and encryption for messages exchanged between devices and the network management console. False True

True

Wireshark or any other monitoring software running on a single computer connected to a switch doesn't see all the traffic on a network, but only the traffic the switch sends to it, which includes broadcast traffic and traffic specifically addressed to the computer. False True

True

You can find out where various logs are kept on some UNIX and Linux systems by viewing the /etc/syslog.conf or /etc/rsyslog.conf files. False True

True

The grouping of multiple servers so that they appear as a single device to the rest of the network is known as which term? server overloading link aggregating load balancing clustering

clustering

When using DiffServ, what type of forwarding utilizes a minimum departure rate from a given node, which is then assigned to each data stream? prioritized forwarding scaled forwarding assured forwarding expedited forwarding

expedited forwarding

Which type of backup scheme only covers data that has changed since the last backup? full backup incremental backup differential backup snapshot backup

incremental backup

When a device handles electrical signals improperly, usually resulting from a bad NIC, it is referred to by what term below? talker ghost jabber blabber

jabber

What term is used to describe the average amount of time that will pass for a device before a failure is expected to occur?

mean time between failures (MTBF)

Once a device has failed, what metric measures the average amount of time to repair? mean restoration time (MRT) mean time to repair (MTTR) mean field replacement time (MFRT) mean time to restore (MTTR)

mean time to repair (MTTR)

Each managed object on a managed device using SNMP is assigned which of the following? TCP/UDP port inode number process ID object identifier (OID)

object identifier (OID)

Which type of uninterruptible power supply uses AC power to continuously charge its battery, while also providing power to devices through the battery? surge UPS line conditioning UPS online UPS standby UPS

online UPS

Packets that are smaller than a medium's minimum packet size are known by what term below? jabbers giants ghosts runts

runts

A brownout is a momentary decrease in voltage; also known as a sag. False True

true

You are attempting to determine how available your LINUX systems are and need to find the current system uptime. What command should you use?

uptime

What statement regarding the use of a network attached storage device is accurate? A NAS does not contain its own file system, rather it relies on the host file system provided by individual clients. A NAS can be easily expanded without interrupting service. A NAS reads and writes from its disks significantly slower than other types of servers. A NAS can typically only support RAID-0 configurations.

A NAS can be easily expanded without interrupting service.

What makes up the first 6 bits of the 8-bit DiffServ field? Class of Service (CoS) Priority Code Point (PCP) Differentiated Services Code Point (DSCP) Forward Error Correction (FEC)

Differentiated Services Code Point (DSCP)

A network TAP serves what purpose on a network? It monitors network throughput at a specific point in the network. It provides a mirrored port for monitoring traffic between other ports. It serves as a miniature firewall that can be placed in front of any connection. It provides wireless monitoring capabilities, as well as spectrum analysis.

It provides a mirrored port for monitoring traffic between other ports.

What 3-bit field in a 802.1Q tag is modified to set a frame's Class of Service (CoS)? CRC checksum Tag Protocol Identifier (TPID) Priority Code Point (PCP) EtherType

Priority Code Point (PCP)

In planning for disaster recovery, what is the ultimate goal? The continuation of business. The protection of infrastructure. The management of damage. The preservation of critical data.

The continuation of business.

When viewing a syslog message, what does a level of 0 indicate? The message is an emergency situation on the system. The message represents debug information. The message is an error condition on the system. The message is a warning condition on the system.

The message is an emergency situation on the system.


Conjuntos de estudio relacionados

Paul Krugman Macroeconomics Ch 13

View Set

Unit 1.2: Understand the hardware requirements of a computer system

View Set

Connect (Prologue, Chapter 1, Appendix 5A) Homework Questions

View Set

MRI103: Parameters and Options EXAM 1

View Set

Psychology of Learning: Chapter 8

View Set