Chapter 11 Questions

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

When Comcast was found to be interfering with BitTorrent traffic, what method was being used?

Comcast was interjecting TCP segments with the RST (reset) field set

What makes up the first 6 bits of the 8-bit DiffServ field?

Differentiated Service Code Point (DSCP)

When using DiffServ, what type of forwarding utilizes a minimum departure rate from a given node, which is then assigned to each data stream?

Expedited forwarding

T/F A system with an availability of 99.999% can be down for a maximum of 52 minutes per year.

False

T/F Setting a NIC to run in promiscuous mode will allow it to see all network traffic passing through a network switch.

False

What 3-bit field inn a 802.1Q tag is modified to set a frame's Class of Service (CoS)?

Priority Code Point (PCP)

Packets that are smaller than a medium's minimum packet size are known by what term below?

Runts

In planning for a disaster recovery, what is the ultimate goal?

The continuation of business

T/F Wireshark or any other monitoring software running on a single computer connected to a switch doesn't see all the traffic on a network, but only the traffic the switch sends to it, which includes broadcast traffic and traffic specifically addressed to the computer.

True

T/F A RAID 5 configuration requires a minimum of two hard disks to operate.

False

T/F A hot site consists of computers, devices, and connectivity necessary to rebuild a network exist, but without appropriate configuration.

False

A differential backup covers what data on a system?

It includes data that has changed since the last full backup

A network TAP serves what purpose on a network?

It provides a mirrored port for monitoring traffic between other ports

When a device handles electrical signals improperly, usually resulting from a bad NIC, it is referred to by what term below?

Jabber

Once a device has failed, what metric measures that average amount of time to repair?

Mean time to repair (MTTR)

Each managed object on a managed device using SNMP is assigned which of the following?

Object identifier (OID)

T/F Class of Service utilizes 8 levels of priority, and modifies the PCP field in an 802.1Q tag.

True

T/F Most UNIX and Linux desktop operating systems provide a GUI application for easily viewing and filtering the information in system logs.

True

T/F The SNMP version 3 protocol introduces authentication, validation, and encryption for messages exchanged between devices and the network management console.

True

When using SNMP with TLS, what port do agents receive requests on?

10161

If you wish to maintain a "4 nines" availability rating, what is the maximum amount of down time you can have per day?

8 seconds

A highly available server is available what percentage of the time?

99.999%

What statement regarding the use of a network attached storage device is accurate?

A NAS can be easily expanded without interrupting service

What happens when an NMS uses the SNMP walk command?

The NMS uses get requests to move through sequential rows in the MIB database

The Link Aggregation Control Protocol was initially defined by what IEEE standard?

IEEE 802.3ad

What Storage Area Network (SAN) protocol runs on top of TCP, and can be used on an existing twisted-pair Ethernet network, while maintaining low cost?

Internet SCSI (iSCSI)

What is distributed switching?

It is a single distributed vSwitch that can service VMs across multiple hosts

What term is used to describe the average amount of time that will pass for a device before a failure is expected to occur?

Mean time between failures (MTBF)

Which type of uninterruptible power supply uses AC power to continuously charge its battery, while also providing power to devices through the battery?

Online UPS

T/F A brownout is a momentary decrease in voltage; also known as a sag.

True

T/F You can find out where various logs are kept on some UNIX and Linux systems by viewing the /etc/syslog.conf or /etc/rsyslog.conf files.

True

You are attempting to determine how available your Linux systems are, and need to find the current system uptime. What command should you use?

Uptime

The grouping of multiple servers so that they appear as a single device to the rest of the network is known as which term?

Clustering

Which of the following statements describes a RAID 0 configuration?

In a RAID 0, data is stripped across multiple disks to improve performance

A snapshot is most similar to which type of backup scheme?

Incremental backup

Which type of backup scheme only covers data that has changed since the last backup?

Incremental backup

What does the Common Address Redundancy Protocol do?

It allows a pool of computers or interfaces to share the same IP address

At what point is a packet considered to be a giant?

It becomes a giant when it exceeds the medium's maximum packet size

How does a line conditioning UPD protect network equipment?

It filters line noise from incoming power

When viewing a syslog message, what does a level of 0 indicate?

The message is an emergency situation on the system


Ensembles d'études connexes

Chapter 13: Education (Questions)

View Set

Chapter 1: Retail Structure Exam 1

View Set

Post-test: Fundamentals of Robotics for SCORBOT-ER4u

View Set

Computer Network Test 1 (ch 1 & 2)

View Set

Lección 3 Contextos (Lesson, Contexts): Escuchar (Hear): Audio Play: Supported with the audio Transcript

View Set

Legal Update I Champion School of Real Estate

View Set