Network+ 8th Edition Chapter 11

¡Supera tus tareas y exámenes ahora con Quizwiz!

22. A highly available server is available what percentage of the time? a. 90% b. 99% c. 99.99% d. 99.999%

d. 99.999%

18. Which of the following statements describes a RAID 0 configuration? a. In a RAID 0, data is striped across multiple disks to improve performance. b. In a RAID 0, data is mirrored on multiple disks to provide fault tolerance. c. In a RAID 0, data is striped across three or more drives, with parity information added to the data. d. In a RAID 0, four or more disks are used to mirror data within each pair of disks, and then striped to multiple pairs of disks.

a. In a RAID 0, data is striped across multiple disks to improve performance.

20. At what point is a packet considered to be a giant? a. It becomes a giant when it exceeds the medium's maximum packet size. b. It becomes a giant when it exceeds 1500 bytes. c. It becomes a giant only when fragmented pieces are reassembled and the packet size is too large. d. It becomes a giant once a VLAN tag is added.

a. It becomes a giant when it exceeds the medium's maximum packet size.

6. A network TAP serves what purpose on a network? a. It provides a mirrored port for monitoring traffic between other ports. b. It provides wireless monitoring capabilities, as well as spectrum analysis. c. It monitors network throughput at a specific point in the network. d. It serves as a miniature firewall that can be placed in front of any connection.

a. It provides a mirrored port for monitoring traffic between other ports.

5. A snapshot is most similar to which type of backup scheme? a. incremental backup b. differential backup c. full backup d. versioned backup

a. incremental backup

17. Once a device has failed, what metric measures the average amount of time to repair? a. mean time to repair (MTTR) b. mean time to restore (MTTR) c. mean field replacement time (MFRT) d. mean restoration time (MRT)

a. mean time to repair (MTTR)

11. Each managed object on a managed device using SNMP is assigned which of the following? a. object identifier (OID) b. TCP/UDP port c. process ID d. inode number

a. object identifier (OID)

19. You are attempting to determine how available your Linux systems are, and need to find the current system uptime. What command should you use? a. uptime b. show runtime c. lastboot d. display stats

a. uptime

13. If you wish to maintain a "4 nines" availability rating, what is the maximum amount of down time you can have per day? a. .4 seconds b. 8 seconds c. 1 minute, 26 seconds d. 14 minutes, 23 seconds

b. 8 seconds

8. What does the Common Address Redundancy Protocol do? a. It allows a pool of computers or interfaces to share the same MAC address. b. It allows a pool of computers or interfaces to share the same IP address. c. It allows multiple devices to share the same fully qualified domain name. d. It allows multiple devices to share hardware resources.

b. It allows a pool of computers or interfaces to share the same IP address.

9. What happens when an NMS uses the SNMP walk command? a. The NMS sends a request for data to the agent on a managed device. b. The NMS uses get requests to move through sequential rows in the MIB database. c. The NMS requests a list of all active SNMP traps on the system. d. The NMS walks through a list of given SNMP hosts.

b. The NMS uses get requests to move through sequential rows in the MIB database.

3. In planning for disaster recovery, what is the ultimate goal? a. The preservation of critical data. b. The continuation of business. c. The management of damage. d. The protection of infrastructure.

b. The continuation of business.

15. The grouping of multiple servers so that they appear as a single device to the rest of the network is known as which term? a. load balancing b. clustering c. link aggregating d. server overloading

b. clustering

10. When a device handles electrical signals improperly, usually resulting from a bad NIC, it is referred to by what term below? a. ghost b. jabber c. talker d. blabber

b. jabber

25. Which type of uninterruptible power supply uses AC power to continuously charge its battery, while also providing power to devices through the battery? a. standby UPS b. online UPS c. line conditioning UPS d. surge UPS

b. online UPS

24. When using SNMP with TLS, what port do agents receive requests on? a. 161 b. 162 c. 10161 d. 10162

c. 10161

16. The Link Aggregation Control Protocol was initially defined by what IEEE standard? a. IEEE 802.3af b. IEEE 802.1cd c. IEEE 802.3ad d. IEEE 802.3bd

c. IEEE 802.3ad

23. A differential backup covers what data on a system? a. It includes all data every time it is performed. b. It includes only data that has changed since the last backup. c. It includes data that has changed since the last full backup. d. It includes data that has changed since the last incremental backup.

c. It includes data that has changed since the last full backup.

7. When viewing a syslog message, what does a level of 0 indicate? a. The message is an error condition on the system. b. The message is a warning condition on the system. c. The message is an emergency situation on the system. d. The message represents debug information.

c. The message is an emergency situation on the system.

4. How does a line conditioning UPS protect network equipment? a. It protects against electrical surges. b. It shields equipment from lightning damage. c. It reduces fluctuations in incoming voltage. d. It filters line noise from incoming power.

d. It filters line noise from incoming power.

12. What is distributed switching? a. It is when multiple physical switches are configured to act as a single switch. b. It is multiple switches that provide redundancy switching for all switches in the group. c. It is a single physical switch that is partitioned in software to perform as multiple switches. d. It is a single distributed vSwitch that can service VMs across multiple hosts.

d. It is a single distributed vSwitch that can service VMs across multiple hosts.

21. What 3-bit field in a 802.1Q tag is modified to set a frame's Class of Service (CoS)? a. EtherType b. CRC checksum c. Tag Protocol Identifier (TPID) d. Priority Code Point (PCP)

d. Priority Code Point (PCP)

1. When using DiffServ, what type of forwarding utilizes a minimum departure rate from a given node, which is then assigned to each data stream? a. assured forwarding b. prioritized forwarding c. scaled forwarding d. expedited forwarding

d. expedited forwarding

14. What term is used to describe the average amount of time that will pass for a device before a failure is expected to occur? a. estimated time to failure (ETTF) b. product cycle lifetime (PCL) c. maximum time available (MTA) d. mean time between failures (MTBF)

d. mean time between failures (MTBF)

2. Packets that are smaller than a medium's minimum packet size are known by what term below? a. jabbers b. giants c. ghosts d. runts

d. runts


Conjuntos de estudio relacionados

OB/ GYN: Physiology of the Female Pelvis

View Set

Week 2: Maternity by Lowdermilk & Perry: Chapters 12, 13, 14, 15, 26

View Set

HW 1: Fundamentals (microeconomics)

View Set

Chapter 27 Pathophysiology NCLEX-Style Review Questions

View Set

Geografi (Midterm) : Menghitung jumlah penduduk

View Set

Chapter 9: Pathways that Harvest Chemical Energy

View Set

Leccion 3 self check Autoevaluation

View Set