Performance & Recovery (Key Terms)

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following would be assigned an OID? - An NMS server - A switch's interface - A web server - A UDP port

A switch's interface

Which log type is used to prove who did what and when? - Traffic log - Audit log - System log - Syslog

Audit log

The term _____ is one method of implementing QoS that refers only to techniques performed at layer 2 on Ethernet frames.

Class of service

A _____ is a redundant backup site that includes computers, devices, and connectivity necessary to rebuild a network, but they are not appropriately configured, updated, or connected.

Cold site

Which type of disaster recovery site contains all the equipment you would need to get up and running again after a disaster, and yet would require several weeks to implement? - Warm site - Standby site - Hot site - Cold site

Cold site

_____ control deals with adjusting the way network devices respond to indications of network performance issues caused by traffic congestion so they don't make the problem worse.

Congestion

What field in an IPv4 packet is altered to prioritize video streaming traffic over web surfing traffic? - Traffic Class - Priority Code Point - Time to Live - DiffServ

DiffServ

When repairing a coworker's computer, you find some illegal files. What should you do next? - Shut down the computer and unplug it. - Take screenshots on the computer and save them in your own folder. - Disconnect the computer from the network and leave it running. - Delete the files.

Disconnect the computer from the network and leave it running

_____ are the people with training and/or certifications that prepare them to handle evidence in such a way as to preserve its admissibility in court.

First responders

Which bandwidth management technique limits traffic specifically between a single sender and a single receiver? - Congestion control - Traffic shaping - Quality of Service - Flow control

Flow control

Which flow control method resends a lost frame along with all frames sent with it? - Selective repeat sliding window - Backpressure - Go-back-n sliding window - Stop-and-wait

Go-back-n sliding window

A _____ consists of computers, devices, and connectivity necessary to rebuild a network, and all are appropriately configured, updated, and connected to match your network's current state.

Hot site

Why might you want to install two power supplies in a critical server? - to increase the power capabilities of the server - If one power supply fails, the other can take over - to increase the voltage capacity of the server - both a and b are correct

If one power supply fails, the other can take over

An _____ is any event, large or small, that has adverse effects on a network's availability or resources.

Incident

_____ is a group of techniques for adjusting the priority a network assigns to various types of trans-missions.

QoS

What command requests the next record in an SNMP log? - SNMP Get Request - SNMP Get Next - SNMP Trap - SNMP Get Response

SNMP Get Next

Which data link layer flow control method offers the most efficient frame transmission when sending large volumes of data? - Go-back-n sliding window - Choke packet - Selective repeat sliding window - Stop-and-wait

Selective repeat sliding window

One of your coworkers downloaded several, very large video files for a special project she's working on for a new client. When you run your network monitor later this afternoon, what list will your coworker's computer likely show up on? - Top talkers - Top listeners - Giants - Jabbers

Top listeners

Your roommate has been hogging the bandwidth on your router lately. What feature should you configure on the router to limit the amount of bandwidth his computer can utilize at any one time? - Power management - Congestion control - Flow control - Traffic shaping

Traffic shaping

An _____ trail is a system of documentation that makes it possible for a third party to inspect evidence later and understand the flow of events.

audit

On Windows-based computers, the contents of performance logs, among others, can be easily viewed with the _____ application

event viewer

Which of the following is not defined by syslog? - Message transmission - Message format - Message handling - Message security

Message security

_____ is a proprietary traffic monitoring protocol from Cisco that tracks all IP traffic crossing any interface

NetFlow

_____ refers to the assessment, monitoring, and maintenance of all aspects of a network.

Network management

Which power backup method will continually provide power to a server if the power goes out during a thunderstorm? - Online UPS - Generator - Dual power supplies - Standby UPS

Online UPS

What port do SNMP agents listen on? - Port 161 - Port 21 - Port 162 - Port 20

Port 161

What are the two main categories of UPSs? (Select 2) - Standby - Shunt - Online - inline

Standby Online

_____ examines the flow of network traffic for patterns and exceptions to those patterns.

Traffic analysis

Which log type would most likely be used first to investigate the cause of high numbers of dropped packets? - Traffic log - System log - Jitter log - Audit log

Traffic log

_____, also called packet shaping, involves manipulating certain characteristics of packets, data streams, or connections to manage the type and amount of traffic traversing a network or interface at any moment.

Traffic shaping

Which power device prevents a critical server from losing power, even for an instant? - Surge protector - Generator - PDU - UPS

UPS

Which of the following would an environmental monitoring system not track? - Liquid detection - User authentication - Data room lights - UPS voltage

User authentication

Which backup site includes a running server that does not have access to the latest backups? - Warm site - Cold site - Hot site - On site

Warm site

Which of the following statements is true? Choose two. - When streaming a movie, the transmission is sensitive to loss and tolerant of delays. - When sending an email, the transmission is sensitive to delays and tolerant of loss. - When streaming a movie, the transmission is sensitive to delays and tolerant of loss. - When sending an email, the transmission is sensitive to loss and tolerant of delays.

When streaming a movie, the transmission is sensitive to delays and tolerant of loss. When sending an email, the transmission is sensitive to loss and tolerant of delays.

While troubleshooting a recurring problem on your network, you want to examine the TCP messages being exchanged between a server and a client. Which tool should you use on the server? - Spiceworks - Wireshark - iPerf - NetFlow

Wireshark

As a subset of performance management, _____ management refers to a collection of strategies to optimize the volume of traffic a network can support.

bandwidth

All of the following congestion control techniques help to prevent network congestion except? - Retransmission policy - acknowledgment policy - bandwidth governance policy - discarding policy

bandwidth governance policy

In network performance monitoring, A _____ is a report of the network's normal state of operation and might include a range of acceptable measurements.

baseline

When you arrive at work one morning, your inbox is full of messages complaining of a network slowdown. You collect a capture from your network monitor. What documentation can help you determine what has changed? - Anomalous behavior - Operating System Logs - A baseline - None of the above

baseline

A _____ defines the resources and protocols the business will use to continue providing service to its customers with little or no disruption during a disaster.

business continuity plan

Documentation used to track _____ describes exactly what the evidence is, when it was collected, who collected it, its condition, and how it was secured.

chain of custody

A _____ is an extreme type of situation or occurrence, involving a network outage that affects more than a single system or limited group of users.

disaster

A focused and thorough _____ plan details the processes for restoring critical functionality and data after an outage that affects more than a single system or a limited group of users.

disaster recovery

An _____ specifically defines the characteristics of an event that qualifies as a formal incident and the steps that should be followed as a result.

incident response plan

For relatively small-network performance monitoring, you could use the simple CLI-based tool _____ to establish throughput between network hosts.

iperf

Using SNMP, a NMS or network management system server, which may be a server or workstation, collects data from multiple managed devices at regular intervals in a process called _____.

polling

In a _____, computers, devices, and connectivity necessary to rebuild a network exist, with only some pieces appropriately configured, updated, or connected.

warm site


Conjuntos de estudio relacionados

Jarvis HA Chapter 25, Anus, Rectum, and Prostate Q&A

View Set

Chapter 40 Preoperative Nursing Management

View Set

DE Western Civ. Ch 1 Study Topic Sheet 2022-2023 - practice test

View Set

Muscle System Physiology Test Mastering

View Set