B.3.3 Network+ Domain 3: Network Operations

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Policy

A new law was recently passed requiring that all businesses must keep a history of the emails sent between members of the board of directors. You need to ensure that your organization complies with this law. Which document type would you update first in response to this new law?

1.75 inches tall

A rack's height is measured in rack units (Us). How tall is a single rack unit?

-userdel bsmith;rm -rf /home/bsmith -userdel -r bsmith

An employee named Bob Smith, whose username is bsmith, has left the company. You have been instructed to delete his user account and home directory. Which of the following commands would produce the desired outcome? (Select two.)

SNMP (Simple Network Management Protocol)

Because of an unexplained slowdown on your network, you decide to install monitoring software on several key network hosts to locate the problem. You will then collect and analyze the data from a central network host. Which protocol will the software use to detect the problem?

-Conditions the power signal -Protects from over-voltages

Beside protecting a computer from under-voltages, a typical UPS also performs which two actions?

Add a separate A/C unit in the server room.

Components within your server room are failing at a rapid pace. You discover that the humidity in the server room is at 60%, and the temperature is 80 degrees. What should you do to help reduce future problems?

-The interface is dropping incoming packets. -Several collisions have occurred. -One cyclic redundancy check error has occurred.

Consider the following output from the show interface fa0/0 command generated on a router: FastEthernet0/0 is up, line protocol is up[...]Auto-duplex, 100Mb/s, 100BaseTX/FX[...]Input queue: 0/75/1771/0 (size/max/drops/flushes); Total output drops: 0[...]5 minute input rate 0 bits/sec, 0 packets/sec5 minute output rate 0 bits/sec, 0 packets/sec15387 packets input, 1736263 bytes, 0 no bufferReceived 15241 broadcasts, 0 runts, 0 giants0 input errors, 1 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort0 watchdog, 0 multicast0 input packets with dribble condition detected607 packets output, 6141 bytes, 0 underruns4 output errors, 10 collisions, 3 interface resets, 0 restarts0 babbles, 0 late collision, 0 deferred0 lost carrier, 0 no carrier0 output buffer failures, 0 output buffers swapped out Which of the following statements are true about the fa0/0 interface? (Select three.)

Syslog

Each of the following are tools used to check a network's health. Which of these is typically used for managing and sending messages from one computer system to another?

Configure account lockout policies in Group Policy

For users on your network, you want to automatically lock user accounts if four incorrect passwords are used within 10 minutes. What should you do?

Business processes

In business continuity planning, what is the primary focus of the scope?

Hot aisle

Most equipment is cooled by bringing cold air in the front and ducting the heat out the back. What is the term for where heat is sent?

usermod -l kjones kscott

One of your users, Karen Scott, has recently married and is now Karen Jones. She has requested that her username be changed from kscott to kjones with no other values changed. Which of the following commands would accomplish this?

System

Over the past few days, a server has gone offline and rebooted automatically several times. You would like to see a record of when each of these restarts occurred. Which log type should you check?

42 inches

Rack heights vary from a few rack units to many rack units. The most common rack heights are 24U and 42U. How tall is a 24U rack?

Application log

Some users report that frequent system crashes have started happening on their workstations. Upon further investigation, you notice that these users all have received a recent update to the same application. Where would you go to conduct a root cause analysis?

-Train sales employees to use their own user accounts to update the customer database. -Delete the account that the sales employees are currently using.

Upon running a security audit in your organization, you discover that several sales employees are using the same domain user account to log in and update the company's customer database. Which action should you take? (Select two. Each response is part of a complete solution.)

Community strings

What does SNMP use to identify a group of devices under the same administrative control?

Remote access policies

What does a remote access server use for authorization?

The amount of data that can be transferred from one place to another in a specific amount of time.

What is the definition of bandwidth?

The speed at which data packets travel from source to destination and back.

What is the definition of latency?

Manager

What is the name of the computer that queries agents and gathers responses by sending messages?

Maintain business operations with reduced or restricted infrastructure capabilities

What is the primary goal of business continuity planning?

Trap

When an event occurs, the agent logs details regarding the event. What is this event called?

Jitter

When packets arrive at their destination at different speeds, they sometimes arrive out of order. What does this cause?

Network diagram

When troubleshooting a router, you want to identify which other devices are connected as well as the subnet addresses of each connected subnet. Which type of document would MOST likely have this information?

BIOS

Where can you check your CPU's temperature?

Walk

Which SNMP component uses GETNEXT messages to navigate the MIB structure?

Level 0

Which Syslog level indicates an emergency that could severely impact the system and cause it to become unusable?

Level 7

Which Syslog severity level indicates a debugging message?

Blackout

Which deviation in power is the longest?

Web server logs

Which log file type is one of the most tedious to parse but can tell you exactly when a user logged onto your site and what their location was?

-A passive device that is used to copy frames and allow you to view frame contents. -A device that does NOT allow you to capture, modify, and retransmit frames (to perform an attack).

Which of the following accurately describe what a protocol analyzer is used for? (Select two.)

-Identify users that are connecting to unauthorized websites -Find devices that might be using legacy protocols, such as IPX/SPX or NetBIOS

Which of the following are reasons to use a protocol analyzer? (Select two.)

Alerts

Which of the following components are the SIEM's way of letting the IT team know that a pre-established parameter is not within the acceptable range?

Electrostatic discharge

Which of the following conditions can low humidity result in?

The processor is too hot.

Which of the following could be to blame if your computer is regularly crashing or restarting?

Floor plan

Which of the following creates a visual representation of physical components along with a clearly defined set of principles and procedures?

An agreement that identifies the employees' rights to use company property, such as internet access and computer equipment, for personal use.

Which of the following defines an Acceptable Use Agreement?

Wiring schematic

Which of the following documents would likely identify that drop cables on your network use the T568A standard?

Inform

Which of the following does an agent send to the manager to confirm the receipt of a transmission?

Uninterruptible power supply

Which of the following ensures that power is supplied to a server or device during short power outages?

Determine which ports are open on a network

Which of the following functions can a port scanner provide?

-SNMP message encryption -Agent and manager authentication

Which of the following improvements to SNMP are included in version 3? (Select two.)

Details on how to test and deploy patches

Which of the following information are you MOST likely to find in a procedure document?

Determine baselines over time by analyzing network traffic.

Which of the following is a best practice when establishing a baseline?

Syslog

Which of the following is a standard for sending log messages to a central logging server?

Surge protector

Which of the following is the least effective power loss protection for computer systems?

Error rate

Which of the following is the term for a calculation of how often bits are damaged in transit due to electromagnetic interference?

Bottleneck

Which of the following is the term for when a system is unable to keep up with the demands placed on it?

A community string identifies devices under the same administrative control.

Which of the following is true about a community string?

A healthy system's CPU utilization should average around 40%.

Which of the following is true about processor performance?

A requirement for using encrypted communications for web transactions

Which of the following pieces of information are you MOST likely to find in a policy document?

Floor plan

Which of the following provides a layout of all electrical, plumbing, HVAC, and networking wiring and components?

Network diagram

Which of the following provides information on the subnets within your network, including the subnet addresses and the routers connecting each subnet?

-passwd -usermod

Which of the following utilities could you use to lock a user account? (Select two.)

Windows

Which operating system does not use Syslog by default?

SNMP

Which protocol uses traps to send notifications from network devices?

Wiring schematic

Which type of documentation would you consult to find the location of RJ45 wall jacks and their endpoints in the intermediate distribution closet?

No, you should not run a cable across the floor of the data center.

You are adding a new rack to your data center, which will house two new blade servers and a new switch. The new servers will be used for virtualization. The only space you have available in the data center is on the opposite side of the room from your existing rack, which already houses several servers, a switch, and a router. You plan to configure a trunk port on each switch and connect them with a straight-through UTP cable that will run across the floor of the data center. To protect equipment from power failures, you also plan to install a UPS on the rack along with redundant power supplies for the server. Will this configuration work?

Packet sniffer

You are concerned about attacks directed against your network firewall. You would like to examine the contents of individual frames sent to the firewall. Which tool should you use?

Use Syslog to send log entries to another server.

You are concerned that an attacker can gain access to your web server, make modifications to the system, and alter the log files to hide his or her actions. Which of the following actions would BEST protect the log files?

-Minimum password age -Enforce password history

You are configuring the Local Security Policy on a Windows system. You want to prevent users from reusing old passwords. You also want to force them to use a new password for at least five days before changing it again. Which policies should you configure? (Select two.)

-Minimum password length -Account lockout threshold

You are configuring the Local Security Policy on a Windows system. You want to require users to create passwords that are at least 10 characters in length. You also want to prevent login after three unsuccessful login attempts. Which policies should you configure? (Select two.)

Configure the network interface to use promiscuous mode

You are running a packet sniffer on your workstation so you can identify the types of traffic on your network. You expect to see all the traffic on the network, but the packet sniffer only seems to be capturing frames that are addressed to the network interface on your workstation. Which of the following must you do in order to see all the network traffic?

Use Syslog to implement centralized logging.

You are the network administrator for a growing business. When you were hired, the organization was small, and only a single switch and router were required to support your users. During this time, you monitored log messages from your router and switch directly from each device's console. The organization has grown considerably in recent months. Now you manage eight individual switches and three routers. It's becoming more and more difficult to monitor these devices and stay on top of issues in a timely manner. What should you do?

Change documentation

You are troubleshooting a workstation connection to the network. During your troubleshooting, you replace the drop cable that connects the computer to the network. Which type of document should you update?

Wiring schematic

You are troubleshooting a workstation connection to your network. During your troubleshooting, you move the cable in the wiring closet to a different port on the patch panel. Which type of document should you update?

Wiring schematic

You are troubleshooting the connection of a computer in an office to the punch down block in the distribution closet. Which document would you consult to identify the termination of the cable on the punch down block based on the wall jack location in the office?

Capture filters

You are using a protocol analyzer to capture network traffic. You want to only capture the frames coming from a specific IP address. Which of the following can you use to simplify this process?

X-headers

You are worried about email spoofing. What can you put throughout an email's header that provides the originating email account or IP address and not a spoofed one?

Promiscuous mode

You decide to use a packet sniffer to identify the type of traffic being sent to a router. You run the packet sniffing software on a device connected to the same hub that is connected to the router. When you run the software, you only see frames addressed to the workstation, not other devices. Which feature should you configure?

Port mirroring

You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffing software on a device that's connected to a hub with three other computers. The hub is connected to a switch that's connected to the router. When you run the software, you see frames addressed to the four workstations but not to the router. Which feature should you configure on the switch?

Throughput tester

You have a WAN link that connects two sites. It's supposed to provide 1.5 Mbps of bandwidth. You want to perform a test to see the link's actual bandwidth. Which tool should you use?

Run the packet sniffer application on Host B.

You have a small network of devices connected together using a switch. You want to capture the traffic that is sent from Host A to Host B. On Host C, you install a packet sniffer that captures network traffic. After running the packet sniffer, you can't find any captured packets between Host A and Host B. What should you do?

Load tester

You have a website that customers use to view product information and place orders. You would like to identify the maximum number of simultaneous sessions that this server can maintain before performance is negatively impacted. Which tool should you use?

-Install a biometric lock on the data center door. -Install racks with locking doors.

You have been hired by a startup company to install a new data center. The company is small, so they have elected to use an unused employee break room as the data center. You are concerned about the physical security of the servers that will be installed in the data center. What should you do? (Select two.)

-The front of your servers should face the cold aisle. -The rear of your servers should face the hot aisle.

You have been struggling to keep the temperature in your server room under control. To address this issue, you've decided to reconfigure the room to create hot and cold aisles. Which of the following are true concerning this configuration? (Select two.)

Implement version 3 of SNMP

You have been using SNMP on your network for monitoring and management, but you're concerned about the security of this configuration. What should you do to increase security in this situation?

Configure day/time restrictions in user accounts.

You have hired 10 new temporary employees to be with the company for three months. How can you make sure that these users can only log on during regular business hours?

Application log

You have installed a new application on a network device. During testing, it appears as if the software is causing other services on the device to stop responding. Which tool should you consult to identify the problem?

Users cannot change the password for 10 days.

You have just configured the password policy and set the minimum password age to 10. What is the effect of this configuration?

usermod -L joer

You have performed an audit and found an active account for an employee with the username joer. This user no longer works for the company. Which command can you use to disable this account?

Positive pressure system

You maintain the network for an industrial manufacturing company. You're concerned about the dust in the area getting into server components and affecting network availability. Which of the following should you implement?

Event log

You manage a firewall that connects your private network to the internet. You would like to see a record of every packet that has been rejected by the firewall in the past month. Which tool should you use?

Implement a granular password policy for the users in the Directors OU.

You manage a single domain named widgets.com. Organizational units (OUs) have been created for each company department. User and computer accounts have been moved into their corresponding OUs. You define a password and account lockout policy for the domain. However, members of the Directors OU want to enforce longer passwords than are required for the rest of the users. You need to make the change as easily as possible. Which of the following actions should you take?

Create a granular password policy for Matt. Apply the new policy directly to Matt's user account.

You manage a single domain named widgets.com. Organizational units (OUs) have been created for each company department. User and computer accounts have been moved into their corresponding OUs. Members of the Directors OU want to enforce longer passwords than are required for the rest of the users. You define a new granular password policy with the required settings. All users in the Directors OU are currently members of the DirectorsGG group, which is a global security group in that OU. You apply the new password policy to that group. Matt Barnes is the chief financial officer, and he would like his account to have even stricter password policies than are required for other members in the Directors OU. What should you do?

Change Management

You plan to implement a new security device on your network. Which of the following policies outlines the process you should follow before you implement that device?

Dump files

You suspect that a bad video driver is causing a user's system to randomly crash and reboot. Where would you go to identify and confirm your suspicions?

DNS logs

You suspect that cache poisoning or spoofing has occurred on your network. Users are complaining of strange web results and being redirected to undesirable sites. Which log would help you determine what's going on?

passwd -S gshant

You suspect that the gshant user account is locked. Enter the command you would use in Command Prompt to display the account's status.

Performance

You suspect that your web server has been the target of a denial-of-service attack. You would like to view information about the number of connections to the server over the past three days. Which log would you MOST likely examine?

Protocol analyzer

You want to identify the traffic that is generated and sent through a network by a specific application on a device. Which tool should you use?

Packet sniffer

You want to know which protocols are being used on your network. You'd like to monitor network traffic and sort traffic by protocol. Which tool should you use?

Configure account policies in Group Policy.

You want to make sure that all users have passwords over eight characters in length and that passwords must be changed every 30 days. What should you do?

Wireshark

You want to use a tool to view network packets, including each packet's source and destination. Which tool should you use?

Establish a baseline

You would like to get a feel for the amount of bandwidth that you are using on your network. What is the first thing you should do?

Firewall

You've heard about a Trojan horse program where the compromised system sends personal information to a remote attacker on a specific TCP port. You want to be able to easily tell whether any of your systems are sending data to an attacker. Which log should you monitor?

2U UPS

You've just installed a new 16U wall-mounted rack in your data center. You need to install the following equipment on this rack: A 4U redundant power supply A 4U server A 4U switch A 2U router Which of the following equipment will also fit on this rack along with the above equipment?

Nothing, the temperature within the rack is within acceptable limits.

Your 24U rack currently houses two 4U server systems. To prevent overheating, you've installed a rack-mounted environmental monitoring device within the rack. Currently, the device shows that the temperature within the rack is 70 degrees Fahrenheit (21 degrees Celsius). What should you do?

Use Resource Monitor to monitor memory utilization.

Your computer seems to be running slowly. In particular, you notice that the hard drive activity light remains lit when you run multiple applications and switch between open windows. This happens even though you aren't saving large files. What should you do to troubleshoot the problem?


Ensembles d'études connexes

Practice RD Exam Questions from EatRight

View Set

Trigonometry - Find Side Lengths & Angle Measures, Trigonometry - Find Side Lengths, Trigonometric Functions

View Set

Chapter 2: Trade-offs, Comparative Advantage, and the Market System

View Set