Performance and Recovery

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What is a hot site?

A hot site consists of computers, devices, and connectivity necessary to rebuild a network, and all are appropriately configured, updated, and connected to match your network's current state.

What is the term that refers to techniques performed at layer 2 on Ethernet frames?

Class of service, CoS

What is a redundant backup site that includes computers, devices, and connectivity necessary to rebuild a network, but they are not appropriately configured, updated, or connected?

Cold site

Which type of disaster recovery site requires several weeks to implement?

Cold site

What is the purpose of an online UPS?

Continuously provide power during outages

What is an extreme type of situation or occurrence, involving a network outage that affects more than a single system or limited group of users?

Disaster

What is the plan that details the processes for restoring critical functionality and data after an outage that affects more than a single system or a limited group of users?

Disaster recovery, disaster-recovery

Which bandwidth management technique limits traffic between a single sender and receiver?

Flow control

Which disaster recovery backup solution minimizes outage to minutes?

Hot backup site

What is an event, large or small, that has adverse effects on a network's availability or resources?

Incident

What is the purpose of traffic shaping on a router?

Limit bandwidth usage for specific devices

Which power backup method provides continuous power to a server during a power outage?

Online UPS

What are the two main categories of UPSs?

Standby, Online

Why might you want to install two power supplies in a critical server?

To increase power capabilities, If one power supply fails, the other can take over

Which backup site includes a running server that does not have access to the latest backups?

Warm site

Which statements are true?

When streaming a movie, the transmission is sensitive to delays and tolerant of loss. When sending an email, the transmission is sensitive to delays and tolerant of loss.

What tool should you use on the server to examine TCP messages?

Wireshark

What would be assigned an OID?

A switch's interface

What is a warm site?

A warm site consists of computers, devices, and connectivity necessary to rebuild a network, and all are appropriately configured, updated, and connected to match your network's current state.

What documentation can help determine what has changed?

Anomalous behavior, Operating System Logs, A baseline

Which log type is used to prove who did what and when?

Audit log

What is a system of documentation that makes it possible for a third party to inspect evidence later and understand the flow of events?

Audit trail

Which congestion control technique does not help prevent network congestion?

Bandwidth governance policy

In network performance monitoring, what is a report of the network's normal state of operation and might include a range of acceptable measurements?

Baseline

What is the plan that defines the resources and protocols a business will use to continue providing service to its customers with little or no disruption during a disaster?

Business continuity plan, BCP

What is the documentation used to track evidence, describing exactly what it is, when it was collected, who collected it, its condition, and how it was secured?

Chain of custody

What specifically defines the characteristics of an event that qualifies as a formal incident and the steps that should be followed as a result?

Incident response plan

For relatively small-network performance monitoring, what CLI-based tool can be used to establish throughput between network hosts?

Iperf

What does a protocol analyzer do?

It digs deep into the details of a packet to identify protocols, errors, misconfigurations, etc.

What is a group of techniques for adjusting the priority a network assigns to various types of transmissions?

Quality of Service (QoS)

What is the purpose of an SNMP Get Next command?

Request the next record in an SNMP log

What command requests the next record in an SNMP log?

SNMP Get Next

Which data link layer flow control method is most efficient for sending large volumes of data?

Selective repeat sliding window

What is the purpose of a top listeners list in a network monitor?

Show computers receiving the most traffic

What should you do when you find illegal files on a coworker's computer?

Shut down the computer and unplug it.

What list will your coworker's computer likely show up on?

Top listeners

What involves manipulating certain characteristics of packets, data streams, or connections to manage the type and amount of traffic traversing a network or interface at any moment?

Traffic shaping

Which consideration for selecting onsite backup solutions was not included in the lecture?

Backup solutions should include, at a minimum, 5 generations of backups for redundancy.

As a subset of performance management, what refers to a collection of strategies to optimize the volume of traffic a network can support?

Bandwidth management

What is the purpose of a cold site in disaster recovery?

Contains equipment for recovery but takes time to implement

What is the transmission of an email sensitive to?

Loss

What is the purpose of an audit log?

Prove who did what and when

What deals with adjusting the way network devices respond to indications of network performance issues caused by traffic congestion?

Congestion control

What is the transmission of an email tolerant of?

Delays

Which field in an IPv4 packet is altered to prioritize video streaming traffic?

DiffServ

What is the purpose of a selective repeat sliding window flow control method?

Efficient transmission of large volumes of data

On Windows-based computers, what application can be used to easily view the contents of performance logs?

Event Viewer

Who are the people with training and/or certifications that prepare them to handle evidence in such a way as to preserve its admissibility in court?

First responders

What is not a role for the incident response team?

Forensics Analyst

Which flow control method resends a lost frame along with all frames sent with it?

Go-back-n sliding window

What is Syslog?

It is a utility for generating, storing, and processing messages about events on a Linux or Unix machine

What can backup generators run on?

LNG, Natural gas, steam, propane

What does network management not include?

Managing user passwords

What is not defined by syslog?

Message security

What is the proprietary traffic monitoring protocol from Cisco that tracks all IP traffic crossing any interface?

NetFlow

What refers to the assessment, monitoring, and maintenance of all aspects of a network?

Network management

What is the difference between a network monitor and a protocol analyzer?

Network monitor continually monitors network traffic, while a protocol analyzer monitors traffic at a specific interface

Using SNMP, what process involves a NMS or network management system server collecting data from multiple managed devices at regular intervals?

Polling

On which port do SNMP agents listen?

Port 161

What is the purpose of DiffServ in an IPv4 packet?

Prioritize certain types of traffic

In which step of the 5-step process to preparing for the CompTIA Network+ Certification Exam is it recommended to understand the nature of the exam and what is being tested?

Step 1

In which step of the 5-step process to preparing for the CompTIA Network+ Certification Exam is it recommended to take and master practice tests?

Step 2

In which step of the 5-step process to preparing for the CompTIA Network+ Certification Exam is it recommended to gain assistance from subject-matter expert instructors?

Step 3

In which step of the 5-step process to preparing for the CompTIA Network+ Certification Exam is it recommended to make a plan of action and review key terms and past lab exercises?

Step 4

What is not a component of the Simple Network Management Protocol?

Test Access Point

What is recommended in the bonus tip section?

Thank your support network, Decide to add the certification badge to your email signature, Update your resume

What examines the flow of network traffic for patterns and exceptions to those patterns?

Traffic analysis

Which log type would be used first to investigate high numbers of dropped packets?

Traffic log

What feature should you configure on the router to limit your roommate's bandwidth?

Traffic shaping

What power device prevents a critical server from losing power, even for an instant?

UPS

What would an environmental monitoring system not track?

User authentication


संबंधित स्टडी सेट्स

CCNA 1 Exam 1 modules 1-3 part 3

View Set

Intermediate Accounting II Chapter 15: Accounting for Stockholders' Equity

View Set

Module 5: Alternative Methods for Drug Adminstration

View Set

Business Law, 8e (Cheeseman) Chapter 14 Statute of Frauds and Equitable Exceptions

View Set

Psychology Chapter 5 Human Development

View Set