Networking + 12

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following can be determined using a WiFi Analyzer? [Choose all that apply] The domain name of the network Available Wireless Access Points Wireless Access Point signal strength The frequency of the Wireless Access Point Wireless Access Point password

Available Wireless Access Points Wireless Access Point signal strength The frequency of the Wireless Access Point

Which of these hardware metrics needs to be measured to ensure the availability of the network? [Choose all that apply] CPU utilization Temperature Hard drive space Memory

CPU utilization Temperature Memory

Which of the following backups is managed by third-party vendors? Incremental backup Full backup Cloud backup Differential backup

Cloud backup

Which of the following will affect the quality of VoIP calls? Latency Jitter Bandwidth CPU utilization

Jitter

What field in an IPv4 packet is altered to prioritize video streaming traffic over web surfing traffic? a. Time to Live b. Traffic Class c. DiffServ d. Priority Code Point

c. DiffServ

Which of the following would an environmental monitoring system not track? a. User authentication b. Data room lights c. UPS voltage d. Liquid detection

a. User authentication

Which log type is used to prove who did what and when? a. Traffic log b. Audit log c. System log d. Syslog

b. Audit log

Which power backup method will continually provide power to a server if the power goes out during a thunderstorm? a. Dual power supplies b. Online UPS c. Standby UPS d. Generator

b. Online UPS

When repairing a coworker's computer, you find some illegal files. What should you do next? a. Delete the files. b. Take screenshots on the computer and save them in your own folder. c. Disconnect the computer from the network and leave it running. d. Shut down the computer and unplug it.

c. Disconnect the computer from the network and leave it running.

What port do SNMP agents listen on? a. Port 21 b. Port 20 c. Port 161 d. Port 162

c. Port 161

Your roommate has been hogging the bandwidth on your router lately. What feature should you configure on the router to limit the amount of bandwidth his computer can utilize at any one time? a. Congestion control b. Power management c. Traffic shaping d. Flow control

c. Traffic shaping Traffic shaping can be used to limit the volume of traffic flowing into or out of an interface

Which data link layer flow control method offers the most efficient frame transmission when sending large volumes of data? a. Choke packet b. Stop-and-wait c. Go-back-n sliding window d. Selective repeat sliding window

d. Selective repeat sliding window

Which backup site includes a running server that does not have access to the latest backups? a. Cold site b. Hot site c. On site d. Warm site

d. Warm site

Which of the following monitors traffic at a specific interface between a server or client and the network? Protocol analyzer Network monitor Port mirroring Reporting

Protocol analyzer (A network monitor is a tool that continually monitors network traffic and might receive data from monitored devices that are configured to report their statistics. A similar tool, a protocol analyzer, can monitor traffic at a specific interface between a server or client and the network.)

After an incident has occurred resulting in data loss which of the following specifies the amount of acceptable data a company can lose? Mean Time Between Failure (MTBF) Mean Time To Repair (MTTR) Recovery Point Objective (RPO) Recovery Time Objective (RTO)

Recovery Point Objective (RPO)

You are hired as a network administrator to monitor the organization's network status on an ongoing basis to make changes to meet the needs of your network's users. One feedback that you have received from the network engineer of the firm is that there is a lot of delay in network communications because some of the devices used in the network are resending transmissions. Which of the following KPIs will help you in getting a better understanding of the situation? Packet drops Utilization Jitter Error rate

Packet drops

Which port is used to establish an SSH connection to a Linux device and manage it remotely? 8080 443 21 53 22

22

Which of the following occurs when there is fluctuation in voltage levels caused by other devices on the network or EMI? Noise Blackout Surge Brownout

Noise

A server needs to be added to a failover cluster, and a virtual switch needs to be created using Hyper-V Manager. The other server in the cluster has a preconfigured virtual switch named: PLCluster. What must be the name of the virtual switch that needs to be created? PL_Cluster PLCluster PLCluster1 PLABVS

PLCluster

Michigan Tires has hired you as a network administrator to monitor the network and to ensure that the network functions reliably. You will require a device to monitor the CPU temperatures of your servers. Which of the following software will you request from the management? PRTG dashboard by Paessler Room Alert Monitor by AVTECH Wireshark Spiceworks

PRTG dashboard by Paessler

JV Steels has established its manufacturing plant in Alabama. Reports of a huge thunderstorm have surfaced in the media. As a network analyst at JV Steels, what kind of a power flaw should you be prepared for? Blackout Brownout Surge Noise

Surge

What is the major difference between the File Transfer Protocol (FTP) and Trivial File Transfer Protocol (TFTP)? TFTP can only be used on routers TFTP needs fewer resources than FTP FTP can only be used on Windows devices TFTP can only be used on Linux devices

TFTP needs fewer resources than FTP

A__________ site contains all the relevant network equipment and data but needs to be configured in the event of a disaster. Warm Cold Hot Cloud Passive

Warm

Which of the following would be assigned an OID? a. A web server b. An NMS server c. A UDP port d. A switch's interface

d. A switch's interface A device, such as a web server, can be managed by an NMS server, typically using UDP ports 161 and 162. Each managed device may contain several managed objects, which can be any characteristic of the device that is monitored, including components such as a switch's interface, processor temperature, or memory utilization. Each managed object is assigned an OID (object identifier).

Which flow control method resends a lost frame along with all frames sent with it? a. Backpressure b. Selective repeat sliding window c. Stop-and-wait d. Go-back-n sliding window

d. Go-back-n sliding window

Which of the following needs to be done to ensure a backup can be scheduled? [Choose all that apply] Identify and configure storage solution for the backup Use a user account to create the backup Create a virtual switch in Hyper-V Install the Windows Server Backup feature Configure a network interface card

Identify and configure storage solution for the backup install the Windows Server Backup feature

While troubleshooting a recurring problem on your network, you want to examine the TCP messages being exchanged between a server and a client. Which tool should you use on the server? a. NetFlow b. Wireshark c. Spiceworks d. iPerf

b. Wireshark

Which application on Windows devices can be used to review events that occurred on the local system? Disk Management Task Manager Event Viewer File Explorer

Event Viewer

Which service needs to be configured to ensure metrics for network devices can be captured? SMTP DNS SNMP DHCP

SNMP

Which power device prevents a critical server from losing power, even for an instant? a. Surge protector b. Generator c. UPS d. PDU

c. UPS

When configuring a server for a failover cluster, what needs to be validated before adding the server to the cluster? [Choose all that apply] The server has the same roles installed as other servers in the cluster The server has a network interface card configured the same as the other server in the cluster The hard drives are all similarly configured The server has the Windows Server Backup feature installed The server uses a local user account to log in

The server has the same roles installed as other servers in the cluster The server has a network interface card configured the same as the other server in the cluster The hard drives are all similarly configured

Which of the following is a battery-operated power source directly attached to one or more devices and to a power supply, such as a wall outlet, that provides a backup power source in the event of a power outage? Generator PDU UPS Surge protector

UPS

Which of the following KPIs (key performance indicators) refers to the actual throughput used as a percentage of available bandwidth? Packet drops Utilization Jitter Error rate

Utilization

Which of the following Log Level Severity levels indicates that there can be a potential problem? Critical error Warning Error Information

Warning

Jeff Green has been hired as a systems analyst by an online retail company. The company is expecting a huge network traffic triggered by the Christmas sale, which will begin from the midnight of December 23. There is an urgent need to adopt a congestion control technique, and it is Jeff's responsibility to ensure that he selects an appropriate open-loop congestion control technique to prevent this congestion before it occurs. Which of the following techniques should Jeff ideally choose to ensure that important traffic can survive the congestion while less sensitive frames are discarded? Acknowledgment policy Window policy Admission policy Discarding policy

Discarding policy

Why would a terminal emulator be used? To establish a remote connection to a Linux device from a Windows device To run powershell commands on a Linux device To create an FTP connection To establish a remote connection to a Linux device from a Linux device

To establish a remote connection to a Linux device from a Windows device

Which log type would most likely be used first to investigate the cause of high numbers of dropped packets? a. Traffic log b. Audit log c. System log d. Jitter log

a. Traffic log Historical traffic logs can be used to investigate security breaches, confirm regulatory compliance, and investigate network performance issues. A system log tracks information on a single device and will not be helpful until you know which device(s) to check. The data in an audit log is thorough enough to retroactively prove compliance and is often used in forensics investigations; due to the level of detail included, an audit log is not likely the best place to start investigating a network problem. There's no such thing as a jitter log.

Which type of disaster recovery site contains all the equipment you would need to get up and running again after a disaster, and yet would require several weeks to implement? a. Cold site b. Standby site c. Warm site d. Hot site

a. Cold site

Nathan, a network engineer, has been contracted by a company to fix an error that has led to an increase in network latency during conference calls with various clients. Analyze the way to correctly diagnose this issue. By checking the interface statistics of the network By calculating the error rate By checking if the connection has any jitter By checking if the network is operating at maximum capacity

By checking if the connection has any jitter

Which of the following statements is true? Choose two. a. When streaming a movie, the transmission is sensitive to loss and tolerant of delays. b. When sending an email, the transmission is sensitive to loss and tolerant of delays. c. When sending an email, the transmission is sensitive to delays and tolerant of loss. d. When streaming a movie, the transmission is sensitive to delays and tolerant of loss.

b. When sending an email, the transmission is sensitive to loss and tolerant of delays. d. When streaming a movie, the transmission is sensitive to delays and tolerant of loss.

One of your coworkers downloaded several, very large video files for a special project she's working on for a new client. When you run your network monitor later this afternoon, what list will your coworker's computer likely show up on? a. Jabbers b. Top listeners c. Giants d. Top talkers

b. Top listeners

Which of the following is not defined by syslog? a. Message security b. Message handling c. Message transmission d. Message format

a. Message security The syslog standard addresses three primary components, including event message format, event message transmission, and event message handling. Syslog does not define or require message security

What command requests the next record in an SNMP log? a. SNMP Get Next b. SNMP Get Request c. SNMP Get Response d. SNMP Trap

a. SNMP Get Next

Which bandwidth management technique limits traffic specifically between a single sender and a single receiver? a. Traffic shaping b. Flow control c. Quality of Service d. Congestion control

b. Flow control flow control manages the number of frames transmitted end-to-end between a single sender and a single receiver. Congestion control, however, manages the volume of traffic throughout the network.

Why is it essential for a Network Administrator to monitor network bandwidth utilization? [Choose all that apply] To detect malicious applications To detect the available hosts on the network To ensure applications function correctly To prevent users from accessing the internet To ensure users can connect to network resources

To ensure applications function correctly To ensure users can connect to network resources


Conjuntos de estudio relacionados

Sociology: Social Stratification/Global Stratification

View Set

SB HW Ch Auditing Cash & Investments

View Set