TestOut Unit 11

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following improvements to SNMP are included in version 3? (Select two). Agent and manager authentication Ports 160 and 161 usage SNMP message encryption SNMP data transfer through SFTP Community name hashing

Agent and manager authentication SNMP message encryption

Where can you check your CPU's temperature? Performance Manager BIOS Device Manager Task Manager

BIOS

Which of the following is ture about a community string? Devices with different community names are able tosend SNMP massages to each other. A community string identifies devices under the same adminstrative control. A string is a password. A string cannot limit access

A community string identifies devices under the same administrative control.

Which backup strategy backs up all files from a computer's file system (regardless of whether the file's archive bit is set or not) and then marks them as backed up? Incremental Differential Copy Full

Full

You suspect that cache poisoning or spoofing has occurred on your network. Users are complaining of strange web results and being redirected to undesirable sites. Which log would help you determine what's going on? Application logs DNS logs Network logs Security logs

DNS logs

Which of the following is the term for a calculation of how often bits are damaged in transit due to electromagnetic interference? Latency Bandwidth Bottleneck Error rate

Error rate

You are the desktop administrator for your company. You would like to manage the computers remotely using a tool with a graphical user interface (GUI). Which actions should you take to accomplish this? (Select two. Each answer is a possible solution.) Use Telnet to connect to each computer. Establish a Remote Desktop connection to each computer. Send an assistance invitation. Open computer Management and connect to each remote computer. Run Remote Shell to manage each computer.

Establish a Remote Desktop connection to each computer. Open Computer Management and connect to each remote computer.

Which of the following does an agent send to the manager to confirm the receipt of a transmission? Walk GET Alert Inform

Inform

When packets arrive at their destination at different speeds, they sometimes arrive out of order. When does this cause? Error rates Latency Dropped packets Jitter

Jitter

Which Syslog level indicates an emergency that could severely impact the system and cause it to become unusable? Level 2 Level 4 Level 6 Level 0

Level 0

Which Syslog severity level indicates a debugging message? Level 1 Level 3 Level 5 Level 7

Level 7

Which of the following devices accept incoming client requests and distributes those requests to specific server? Load balancer Caching engine CSD/DSU Media converter

Load balancer

What is the name of the computer that queries agents and gathers responses by sending messages? Manager Trap Agent MIB

Manager

You want to know which protocols are being used on your network. You'd like to monitor network traffic and sort traffic by protocol. Which tool should you use? Throughput tester IDS Port scanner Packet sniffer IPS

Packet sniffer

You are in tyhye middle of a big project at work. All of your work files are on a server at the office. You want to be able to access the server desktop, open and edit files, save the files on the server, and print files to a printer that's connected to a computer at home. Which protocol should you use? Telnet FTP SSH RDP

RDP

In addition to performing regular backups, what must you do to protect your system from data loss? Regularly test restoration procedures. Write-protect all backup media. Store the backup media in an on-site fireproof vault Restrict restoration privileges to system administrators.

Regularly test restoration procedures.

Which of the following is a tool that allows access to the graphical desktop environment of another Windows client system over a network connection? Remote Desktop Remote Desktop Gateway VPN SSH

Remote Desktop

Which protocol uses traps to send notifications from network devices? SNMP SMTP ICMP IGMP

SNMP

Which of the following is a protocol used for terminal emulation? RDP SSH ICA VNC

SSH

Which fot he following is the least effective power loss protection for computer systems? Uninterruptible power supply Backup power generator Surge protector Secondary power source

Surge protector

Which of the following is a standard for sending log messages to a central logging server? Nmap OVAL LC4 Syslog

Syslog

Over the past few days, a server has gone offline and rebooted automatically several times. You would like to see a record of when each of these restarts occurred. Which log type should you check. Security Firewall Performance System

System

What is the definition of bandwidth? The amount of data that can be transferred from one place to another in a specific amount of time. The calculation of how often bits are damaged in transit due to electromagnetic interference. The condition that occurs when a system is unable to keep up with the demands placed on it. The speed at which packets travel from source to destination and back.

The amount of data that can be transferred from one place to another in a specific amount of time.

Which of the following could be to blame if your computer is regularly crashing or restarting? You've run out of bandwidth. You're dropping packets. You don't have enough memory. The processor is too hot.

The processor is too hot.

What is the definition of latency? The speed at which data packets travel from source to destination and back. A calculation of how often bits are damaged in transit due to electromagnetic interference. The percentage of time that a disk subsystem reads from and writes to a disk. The percentage of avaliable bandwidth being used.

The speed at which data packets travel from source to destination and back.

Why should you store backup media off site? To comply with government regulations To reduce the possibility of theft To make the restoration process more efficient To prevent the same disaster from affecting both the network and the backup media.

To prevent the same disaster from affecting both the network and the backup media

You just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a server room that requires an ID card for access. You backed up the router configuration to a remote location with an encrypted file. You access the router configuration interface from your notebook computer using a Telnet client with the username admin and the password admin. You used the MD5 hashing algorithm to protect the password. What else should you do to increase the security of this device? (Select two.) Use encrypted Type 7 passwords. Use an SSH client to access the router configuration. Use a web browser to access the router configuration using an HTTP connection. Change the default administrative username and password. Use TFTP to backup the router configuration to a remote location.

Use an SSH client to access the router configuration. Change the default administrative username and password.

Which of the following remote protocols was orginally designed for UNIX? RDP ICA VNC VPN

VNC

Which SNMP component uses GETNEXT messages to navigate the MIB structure? GET Trap Inform Walk

Walk

Which log file type is one of the most tedious to parse but can tell you exactly when a user logged onto your site and what their location was? Authentication logs Event logs System logs Web server logs

Web server logs

Which type of documentation would you consult to find the location of RJ45 wall jacks and their endpoints in the intermediate distribution closet? Policy Baseline Procedure Wiring schematic

Wiring schematic

You are adding a new rack to your data center, which will house two new blade servers and a new switch. The new servers will be used for file storage and a database server. The only space you have available in the data center is on the opposite side of the room from your existing rack, which already houses several servers, a switch, and a router. You plan to configure a trunk port on each switch and connect them with a crossover UTP plenum cable that will run through the suspended tile ceiling in the data center. To provide power for the new devices, you had an electrician install several new 20-amp wall outlets near the new rack. Each device on the rack will be plugged directly into one of these new wall outlets. What is wrong with this configuration? (Select two.) You must use a straight-through cable to connect the two switches together. You should implement a UPS between the wall outlet and the network devices. You should not connect networking equipment to a 20-amp wall circuit. You should implement redundant power supplies for the network devices. You should not run a plenum cable through a suspended tile ceiling.

You should implement a UPS between the wall outlet and the network devices. You should implement redundant power supplies for the network devices.

Which of the following is true about processor performance? Processor utilization is the amount of time the processor spends on idle tasks. If a processor utilization is consistently high, your system is performing well. Utilization spikes as long as an application is open. A healthy system's CPU utilization should average around 40%.

A healthy system's CPU utilization should average around 40%.

Which of the following pieces of information are you MOST likely to find in a policy document? A requirement for using encrypted communications for web transactions The IP address assigned to a router interface Steps for completing and validating nightly backups Average performance statistics for a router

A requirement for using encrypted communications for web transactions.

Which of the following describe a system image backup? A system image includes only specified files and folders backed up to a compressed file. A system image only contains the operating system, installed programs, drivers, and user profile settings. A system image contains everything on the system volume, including the operating system, installed programs, drivers, and user data files. A system image does not include operating system files, program files, encrypted files, files in the Recycle Bin, user profile settings, or temporary files.

A system image contains everything on the system volume, including the operating system, installed programs, drivers, and user data files.

Which of the following defines an Acceptable USE Agreement An agreement that identifies the employees' rights to use company property, such as internet access and computer equipment, for personal use. An agreement that outlines the organization's monitoring activities. A legal contract between the organization and the employee that specifies that the employee is not to disclose the organization's confidential information. An agreement that prohibits an employee from working for a competing organization for a specified time after the employee leaves the organization.

An agreement that identifies the employees' rights to use company property, such as internet access and computer equipment, for personal use.

Some users report that frequent system crashes have started happening on their workstations. Upon further investigation, you notice that these users all have received a recent update to the same application. Where would you go to conduct a root cause analysis? Security log Application log Network log Firewall log

Application log

You want to make sure that the correct ports on a firewall are open or closed. Which document should you check? Wireless site survey Wiring schematic Baseline configurations Intermediate distribution frame

Baseline configurations

Which deviation in power is the longest? Transient Surge Sag Blackout

Blackout

Which of the following is the term for when a system is unable to keep up with the demands placed on it? Bottleneck Jitter Hard fault Latency

Bottleneck

In business contiunity planning, what is the primary focus of the scope? Compnay assets Human life and safety Business processes Recovery time objective

Business processes

You are using a protocol analyzer to capture network traffic. You want to only capture the frames coming from a specific IP address. Which of the following can you use to simplify this process? Display filters Switch Capture filters NIC

Capture filters

You plan to implement a new security device on your network. Which of the following policies outlines the process you should follow before you implement that device? Acceptable Use Resource Allocation Change Management Service Level Agreement

Change Management

What does SNMP use to identify a group of dvices under the same administrative control? Informs Passwords OID Community strings

Community strings

You manage your company's website, which uses a cluster of two servers with a single shared storage device. The shared storage device uses a RAID 1 configuration. Each server has a single connection to the shared storage and a single connection to your ISP. You want to provide redundancy so that a failure on a single component doesn't cause the website to become unavailable. What should you add to your configuration to accomplish this? Connect one server to the internet through a different ISP. On each server, add a second network connection to connect the server to the shared storage device. On each server, add a second network connection to the internet. Reconfigure the disk array in a RAID 1+0 configuration.

Connect one server to the internet through a different ISP

Which of the following information are you MOST likely to find in a procedure document? Details on how to test and deploy patches The relationship of routers to other routers on the network A record of the repaires made to a specific device An inventory of the hardware components inside a specific device

Details on how to test and deploy patches

Which of the following is a best practice when establishing a baseline? Determine baselines over time by analyzing network traffic. Establish baselines within a netwrok or device's first week of installation. Establish baselines using only specialized tools. Establish baselines only during the busiest times of the day.

Determine baselines over time by analyzing network traffic.

Which backup strategy backs up only files that have the archive bit set and does not mark them? Differential Incremental Full Normal

Differential

You suspect that a bad video driver is causing a user's system to randomly crash and reboot. Where would you go to identify and confirm your suspicions? Application logs Syslog SIP logs Dump files

Dump files

Which of the following conditions can low humidity result in? Warm air Electrostatic discharge Condensation Cold air

Electrostatic discharge

A web server on your network hosts your company's public website. You want to make sure that a NIC failure on the server does not prevent the website from being accessible on the internet. Which solution should you implement? Ethernet bonding QoS Traffic shaping Spanning Tree

Ethernet bonding

Which of the following provides a layout of all electrical, plumbing, HVAC, and networking wiring and components? Wiring diagram Floor plan Network diagram Rack diagram

Floor plan

Your network uses the following backup strategy. You create: Full backups every Sunday night. Incremental back8ps Monday night through Saturday night. On a Thursday monring, the storage fails. How many restore operations would you need to perform to recover all of the data? One Two Three Four Five

Four

Most equipment is cooled by bringing cold air in the front and ducting the heat out the back. What is the term for where heat is sent? Hot aisle Back aisle Front aisle Cold aisle

Hot aisle

You manage a server at work that has just been configured with a new application. Consequently, the server has crashed several times during the last week. You think that you've resolved the problem, but you'd like to be able to manage the server remotely just in case more issues occur. Which of the following protocols should you use for remote management? (Select two.) ICA VNC L2TP PPP PPTP

ICA VNC

You have been using SNMP on your network for monitoring and management, but you're concerned about the security of this configuration. What should you do to increase security in this situation? Implement a RADIUS solution. Combine SNMP with SSL. Use SSH instead of SNMP Implement version 3 of SNMP

Implement version 3 of SNMP

You have purchased a solar backup power device to provide temporary electrical power to critical systems in your data center should the power provided by the electrical utility company go out. The solar panel array captures sunlight, converts it into direct current (DC), and stores it in large batteries. The power supplies on the servers, switches, and routers in your data center require alternating current (AC) to operate. Which electrical device should you implement to convert the DC power stored in the batteries into AC power that can be used in the data center? Transformer Transistor Capacitor Inverter

Inverter

Which of the following provides information on the subnets within your network, including the subnet addresses and the routers connecting each subnet? Rack diagram Wiring diagram Floor plan Network diagram

Network diagram

You are adding a new rack to your data center, which will house two new blade servers and a new switch. The new servers will be used for virtualization. The only space you have available in the data center is on the opposite side of the room from your existing rack, which already houses several servers, a switch, and a router. You plan to configure a trunk port on each switch and connect them with a straight-through UTP cable that will run across the floor of the data center. To protect equipment from power failures, you also plan to install a UPS on the rack along with redundant power supplies for the server. Will this configuration work? No, you should not run a cable across the data center floor. No, you must use a cross-over cable to connect the two switches together. Yes, this configuration complies with data center best practices. No, you should not use blade servers for virtualization. No, you must implement the UPS and power supplies on the rack externally.

No, you should not run a cable across the data center floor.

Which of the following is a contract in which both parties agree not to share proprietary or confidential information gathered during the business relationship? Memorandum of Understanding Non-Compete Agreement Non-Disclosure Agreement Service Level Agreement

Non-DiscolsureAgreement

Your 24U rack currently houses two 4U server systems. To prevent overheating, you've installed a rack-mounted environmental monitoring device within the rack. Currently, the device shows that the temperature within the rack is 70 degrees Fahrenheit (21 degrees Celsius). What should you do? Reorient the cold aisle within the server room so that it is directed toward the air conditioner's return duct. Nothing, the temperature within the rack is within acceptable limits. Install a humidifier to increase the humidity within the server room. Install an additional air conditioning unit for the server room.

Nothing, the temperature within the rack is within acceptable limits.

Your network performs a full backup every night. Each Sunday, the Previous night's backup tape is archived. On a Wednesday morning, the storage system fails. How many restore operations would you need to perform to recover all of the data? One Two Three Four

One

Which of the following are backed up during a differential backup? Only files that have changed since the last full backup. Only files that have been added since the last full or incremental backup. Only files that have changed since the last full or incremental backup. Only files that have changed since the last full or differential backup.

Only files that have changed since the last full backup.

Which of the following are backed up during an incremental backup? Only files that have changed since the last full backup. Only files that are new since the last full or incremental backup. Only files that have changed since the last full or differential backup. Only files that have changed since the last full or incremental backup.

Only files that have changed since the last full or incremental backup.

Your disaster recovery plan (DRP) calls for backup media to be stored at a different location. The location is a safe deposit box at the local bank. Because of this, the disaster recovery plan specifies that you must choose a method that uses the least amount of backup media but also allows you to quickly back up and restore files. Which backup strategy would BEST meet the DRP's specifications? Perform a full backup once per week and a differential backup the other days of the week. Perform a full backup each day of the week. Perform a full backup once per month and an incremental backup the other days of the month. Perform a full backup once per week and an incremental backup other days of the week.

Perform a full backup once per week and a differential backup the other days of the week.

Which port does Remote Desktop use? Port 135 Port 22 Port 3389 Port 23

Port 3389

You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffing software on a device that's connected to a hub with three other computers. The hub is connected to a switch that's connected to the router. When you run the software, you see frames addressed to the four workstations but not to the router. Which feature should you configure on the switch? Promiscuous mode Port mirroring Spanning Tree Protocol Bonding

Port mirroring

You maintain the network for an industrial manufacturing company. You're concerned about the dust in the area getting into server components and affecting network availability. Which of the following should you implement? Positive pressure system UPS Line conditioner Negative pressure system Backup generator

Positive pressure system

You want to identify the traffic that is generated and sent through a network by a specific application on a device. Which tool should you use? Toner probe Protocol analyzer Certifier Multimeter TDR

Protocol analyzer

What is the purpose of using Ethernet bonding? (Select two.) Provides a failover solution for network adapters Provides increased bus speeds Increases network performance Enables dual remote access (DRA) over a WAN link Increases read and write operations between the system bus and network adapters

Provides a failover solution for network adapters Increases network performance

Which of the following is a role service that allows users with the Remote Desktop Connection client and an internet connection to connect on an internal network. RD Gateway RD CAP RD RAP Remote Desktop

RD Gateway

Which of the following protols or services would you associate with Windows Remote Desktop network traffic? NNTP WPA RD RAP RDP

RDP

Of the following restoration processes, which would result in the fastest restoration of all data if a system failure occurred on Friday? Restore the full backup from Sunday and the last incremental backup. Restore the full backup from Sunday and the last differential backup. Restore the full backup from Sunday and all differential backups. Restore the full backup from Sunday and all incremental backups.

Restore the full backup from Sunday and the last differential backup.

Because of an unexplained slowdown on your network, you decide to install monitoring software on several key network hosts to locate the problem. You will then collect and analyze the data from a central network host. Which protocol will the software use to detect the problem IPX UDP SNMP TCP/IP

SNMP

You are concerned that an attacker can gain access to your web server, make modifications to the system, and alter the log files to hide his or her actions. Which of the following actions would BEST protect the log files? Use Syslog to send log entries to another server. Take a hash of the log files. Configure permissions on the log files to prevent access. Encrypt the log files.

Use Syslog to send log entries to another server

When an evert occurs, the agent logs details regarding the event. What is this event called? Trap MIB GET OID

Trap

Your network uses the following backup strategy. You create: Full backups every Sunday night. Differential backups Monday night through Saturday night. On Thursday morning, the storage system fails. How many restore operations would you need to perform to recover all of the data? One Two Three Four

Two

Which of the following ensures that power is supplied to a server or device during short power outages? Backup generator Line conditioner Uninterruptible power supply Surge protector

Uninterruptible power supply

Your computer seems to be running slowly. In particular, you notice that the hard drive activitly light remains lit when you run multiple applications and switch between open windows. This happens even though you aren't saving large files. When should you do to troubleshoot the problem? Use Resource Monitor to monitor disk activity. Use Task Manager to monitor disk activity. Use Resource Monitor to monitor memory utilization. Use Reliability Monitor to monitor system reliability.

Use Resource Monitor to monitor memory utilization.

You are the network administrator for a growing business. When you were hired, the organization was small, and only a single switch and router were required to support your users. During this time, you monitored log messages from your router and switch directly from each device's console. The organization has grown considerably in recent months. Now you manage eight individual switches and three routers. It's becoming more and more difficult to monitor these devices and stay on top of issues in a timely manner. What should you do? Use Syslog to implement centralizaed logging. Use a remote access utility, such as SSH, to access router and switch consoles remotely. Consolidate network resources down to one or two switches. Hire additional resources to help monitor and manage your network infrastructure.

Use Syslog to implement centralized logging.


Ensembles d'études connexes

Chapter 14 clicker questions - updated/corrected 11/26/14

View Set

Бухгалтерський облік (тести)

View Set

Chapter 1 - Scientific Movements Leading to Evolutionary Psychology (Under Construction)

View Set

Things Fall Apart Reading Questions- Frisbie

View Set

Investment Planning: Efficient Market Theory (Module 12)

View Set