Server Administration Final
Which of the following critieria can a packet-fiiltering firewall not use to determine whether to accept or deny traffic
Application Data
Which log type is used to prove who did what and when?
Audit log
Which type of disaster recovery site contains all the equipment you would need to get up and running again after a disaster, and yet would require several weeks to implement?
Cold site
What field in an IPv4 packet is altered to prioritize video streaming traffic over web surfing traffic?
DiffServ
At what layer of the OSI model do proxy sergers operate
Layer 7
Which power backup method will continually provide power to a server if the power goes out during a thunderstorm?
Online UPS
What port do SNMP agents listen on?
Port 161
What command requests the next record in an SNMP log?
SNMP Get Next
Which data link layer flow control method offers the most efficent frame transmission when sending large volumes of data?
Selective repeat sliding window
Which principle ensures auditing processes are managed by someone other than the employees who activities are being audited?
Separation of duties
Which information in a transmitted message might an IDS use to identify network threats?
Signature
One of your coworkers downloaded several, very large video files for a special project she's working on for a new client. When you run your network monitor later this afternoon, what list will your coworker's computer likely show up on?
Top listeners
Your roommate has been hogging the bandwidth on your router lately. What feature should you configure on the router to limit the amount of bandwidth his computer can utilize at any one time?
Traffic shaping
While troubleshooting a recurring problem on your network, you want to examine the TCP messages being exchanged between a server and a client. Which tool should you use on the server?
Wireshark