Performance and Recovery
What is a hot site?
A hot site consists of computers, devices, and connectivity necessary to rebuild a network, and all are appropriately configured, updated, and connected to match your network's current state.
What is the term that refers to techniques performed at layer 2 on Ethernet frames?
Class of service, CoS
What is a redundant backup site that includes computers, devices, and connectivity necessary to rebuild a network, but they are not appropriately configured, updated, or connected?
Cold site
Which type of disaster recovery site requires several weeks to implement?
Cold site
What is the purpose of an online UPS?
Continuously provide power during outages
What is an extreme type of situation or occurrence, involving a network outage that affects more than a single system or limited group of users?
Disaster
What is the plan that details the processes for restoring critical functionality and data after an outage that affects more than a single system or a limited group of users?
Disaster recovery, disaster-recovery
Which bandwidth management technique limits traffic between a single sender and receiver?
Flow control
Which disaster recovery backup solution minimizes outage to minutes?
Hot backup site
What is an event, large or small, that has adverse effects on a network's availability or resources?
Incident
What is the purpose of traffic shaping on a router?
Limit bandwidth usage for specific devices
Which power backup method provides continuous power to a server during a power outage?
Online UPS
What are the two main categories of UPSs?
Standby, Online
Why might you want to install two power supplies in a critical server?
To increase power capabilities, If one power supply fails, the other can take over
Which backup site includes a running server that does not have access to the latest backups?
Warm site
Which statements are true?
When streaming a movie, the transmission is sensitive to delays and tolerant of loss. When sending an email, the transmission is sensitive to delays and tolerant of loss.
What tool should you use on the server to examine TCP messages?
Wireshark
What would be assigned an OID?
A switch's interface
What is a warm site?
A warm site consists of computers, devices, and connectivity necessary to rebuild a network, and all are appropriately configured, updated, and connected to match your network's current state.
What documentation can help determine what has changed?
Anomalous behavior, Operating System Logs, A baseline
Which log type is used to prove who did what and when?
Audit log
What is a system of documentation that makes it possible for a third party to inspect evidence later and understand the flow of events?
Audit trail
Which congestion control technique does not help prevent network congestion?
Bandwidth governance policy
In network performance monitoring, what is a report of the network's normal state of operation and might include a range of acceptable measurements?
Baseline
What is the plan that defines the resources and protocols a business will use to continue providing service to its customers with little or no disruption during a disaster?
Business continuity plan, BCP
What is the documentation used to track evidence, describing exactly what it is, when it was collected, who collected it, its condition, and how it was secured?
Chain of custody
What specifically defines the characteristics of an event that qualifies as a formal incident and the steps that should be followed as a result?
Incident response plan
For relatively small-network performance monitoring, what CLI-based tool can be used to establish throughput between network hosts?
Iperf
What does a protocol analyzer do?
It digs deep into the details of a packet to identify protocols, errors, misconfigurations, etc.
What is a group of techniques for adjusting the priority a network assigns to various types of transmissions?
Quality of Service (QoS)
What is the purpose of an SNMP Get Next command?
Request the next record in an SNMP log
What command requests the next record in an SNMP log?
SNMP Get Next
Which data link layer flow control method is most efficient for sending large volumes of data?
Selective repeat sliding window
What is the purpose of a top listeners list in a network monitor?
Show computers receiving the most traffic
What should you do when you find illegal files on a coworker's computer?
Shut down the computer and unplug it.
What list will your coworker's computer likely show up on?
Top listeners
What involves manipulating certain characteristics of packets, data streams, or connections to manage the type and amount of traffic traversing a network or interface at any moment?
Traffic shaping
Which consideration for selecting onsite backup solutions was not included in the lecture?
Backup solutions should include, at a minimum, 5 generations of backups for redundancy.
As a subset of performance management, what refers to a collection of strategies to optimize the volume of traffic a network can support?
Bandwidth management
What is the purpose of a cold site in disaster recovery?
Contains equipment for recovery but takes time to implement
What is the transmission of an email sensitive to?
Loss
What is the purpose of an audit log?
Prove who did what and when
What deals with adjusting the way network devices respond to indications of network performance issues caused by traffic congestion?
Congestion control
What is the transmission of an email tolerant of?
Delays
Which field in an IPv4 packet is altered to prioritize video streaming traffic?
DiffServ
What is the purpose of a selective repeat sliding window flow control method?
Efficient transmission of large volumes of data
On Windows-based computers, what application can be used to easily view the contents of performance logs?
Event Viewer
Who are the people with training and/or certifications that prepare them to handle evidence in such a way as to preserve its admissibility in court?
First responders
What is not a role for the incident response team?
Forensics Analyst
Which flow control method resends a lost frame along with all frames sent with it?
Go-back-n sliding window
What is Syslog?
It is a utility for generating, storing, and processing messages about events on a Linux or Unix machine
What can backup generators run on?
LNG, Natural gas, steam, propane
What does network management not include?
Managing user passwords
What is not defined by syslog?
Message security
What is the proprietary traffic monitoring protocol from Cisco that tracks all IP traffic crossing any interface?
NetFlow
What refers to the assessment, monitoring, and maintenance of all aspects of a network?
Network management
What is the difference between a network monitor and a protocol analyzer?
Network monitor continually monitors network traffic, while a protocol analyzer monitors traffic at a specific interface
Using SNMP, what process involves a NMS or network management system server collecting data from multiple managed devices at regular intervals?
Polling
On which port do SNMP agents listen?
Port 161
What is the purpose of DiffServ in an IPv4 packet?
Prioritize certain types of traffic
In which step of the 5-step process to preparing for the CompTIA Network+ Certification Exam is it recommended to understand the nature of the exam and what is being tested?
Step 1
In which step of the 5-step process to preparing for the CompTIA Network+ Certification Exam is it recommended to take and master practice tests?
Step 2
In which step of the 5-step process to preparing for the CompTIA Network+ Certification Exam is it recommended to gain assistance from subject-matter expert instructors?
Step 3
In which step of the 5-step process to preparing for the CompTIA Network+ Certification Exam is it recommended to make a plan of action and review key terms and past lab exercises?
Step 4
What is not a component of the Simple Network Management Protocol?
Test Access Point
What is recommended in the bonus tip section?
Thank your support network, Decide to add the certification badge to your email signature, Update your resume
What examines the flow of network traffic for patterns and exceptions to those patterns?
Traffic analysis
Which log type would be used first to investigate high numbers of dropped packets?
Traffic log
What feature should you configure on the router to limit your roommate's bandwidth?
Traffic shaping
What power device prevents a critical server from losing power, even for an instant?
UPS
What would an environmental monitoring system not track?
User authentication