Ch 11

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

(11.5.7) In business continuity planning, what is the primary focus of the scope?

Business processes

Which of the following could be to blame if your computer is regularly crashing or restarting?

The processor is too hot.

What is the definition of latency?

The speed at which data packets travel from source to destination and back.

When an event occurs, the agent logs details regarding the event. What is this event called?

Trap

Where can you check your CPU's temperature?

BIOS

You want to make sure that the correct ports on a firewall are open or closed. Which document should you check?

Baseline configurations

Which deviation in power is the longest?

Blackout

Which of the following is the term for when a system is unable to keep up with the demands placed on it?

Bottleneck

You are using a protocol analyzer to capture network traffic. You want to only capture the frames coming from a specific IP address. Which of the following can you use to simplify this process?

Capture filters

You plan to implement a new security device on your network. Which of the following policies outlines the process you should follow before you implement that device?

Change Management

You suspect that cache poisoning or spoofing has occurred on your network. Users are complaining of strange web results and being redirected to undesirable sites. Which log would help you determine what's going on?

DNS logs

Which of the following provides a layout of all electrical, plumbing, HVAC, and networking wiring and components?

Floor plan

Which Syslog level indicates an emergency that could severely impact the system and cause it to become unusable?

Level 0

Which Syslog severity level indicates a debugging message?

Level 7

You want to know which protocols are being used on your network. You'd like to monitor network traffic and sort traffic by protocol. Which tool should you use?

Packet sniffer

(11.1.1) What is the definition of bandwidth?

The amount of data that can be transferred from one place to another in a specific amount of time.

You are the network administrator for a growing business. When you were hired, the organization was small, and only a single switch and router were required to support your users. During this time, you monitored log messages from your router and switch directly from each device's console. The organization has grown considerably in recent months. Now you manage eight individual switches and three routers. It's becoming more and more difficult to monitor these devices and stay on top of issues in a timely manner. What should you do?

Use Syslog to implement centralized logging.

Which of the following improvements to SNMP are included in version 3? (Select two.)

1. Agent and manager authentication 2. SNMP message encryption

Which of the following is true about a community string?

A community string identifies devices under the same administrative control.

Which of the following is true about processor performance?

A healthy system's CPU utilization should average around 40%.

Which of the following pieces of information are you MOST likely to find in a policy document?

A requirement for using encrypted communications for web transactions

Which of the following defines an Acceptable Use Agreement?

An agreement that identifies the employees' rights to use company property, such as internet access and computer equipment, for personal use.

(11.3.9) Some users report that frequent system crashes have started happening on their workstations. Upon further investigation, you notice that these users all have received a recent update to the same application. Where would you go to conduct a root cause analysis?

Application log

What does SNMP use to identify a group of devices under the same administrative control?

Community strings

Which of the following information are you MOST likely to find in a procedure document?

Details on how to test and deploy patches

Which of the following is a best practice when establishing a baseline?

Determine baselines over time by analyzing network traffic.

You suspect that a bad video driver is causing a user's system to randomly crash and reboot. Where would you go to identify and confirm your suspicions?

Dump files

Which of the following conditions can low humidity result in?

Electrostatic discharge

Which of the following is the term for a calculation of how often bits are damaged in transit due to electromagnetic interference?

Error rate

Most equipment is cooled by bringing cold air in the front and ducting the heat out the back. What is the term for where heat is sent?

Hot aisle

You have been using SNMP on your network for monitoring and management, but you're concerned about the security of this configuration. What should you do to increase security in this situation?

Implement version 3 of SNMP

(11.2.6) Which of the following does an agent send to the manager to confirm the receipt of a transmission?

Inform

When packets arrive at their destination at different speeds, they sometimes arrive out of order. What does this cause?

Jitter

What is the name of the computer that queries agents and gathers responses by sending messages?

Manager

Which of the following provides information on the subnets within your network, including the subnet addresses and the routers connecting each subnet?

Network diagram

Which of the following is a contract in which both parties agree not to share proprietary or confidential information gathered during the business relationship?

Non-Disclosure Agreement

Your 24U rack currently houses two 4U server systems. To prevent overheating, you've installed a rack-mounted environmental monitoring device within the rack. Currently, the device shows that the temperature within the rack is 70 degrees Fahrenheit (21 degrees Celsius). What should you do?

Nothing, the temperature within the rack is within acceptable limits.

You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffing software on a device that's connected to a hub with three other computers. The hub is connected to a switch that's connected to the router. When you run the software, you see frames addressed to the four workstations but not to the router. Which feature should you configure on the switch?

Port mirroring

You maintain the network for an industrial manufacturing company. You're concerned about the dust in the area getting into server components and affecting network availability. Which of the following should you implement?

Positive pressure system

(11.4.12) You want to identify the traffic that is generated and sent through a network by a specific application on a device. Which tool should you use?

Protocol analyzer

Because of an unexplained slowdown on your network, you decide to install monitoring software on several key network hosts to locate the problem. You will then collect and analyze the data from a central network host. Which protocol will the software use to detect the problem?

SNMP

Which protocol uses traps to send notifications from network devices?

SNMP

Which of the following is a standard for sending log messages to a central logging server?

Syslog

Over the past few days, a server has gone offline and rebooted automatically several times. You would like to see a record of when each of these restarts occurred. Which log type should you check?

System

Which of the following ensures that power is supplied to a server or device during short power outages?

Uninterruptible power supply

Your computer seems to be running slowly. In particular, you notice that the hard drive activity light remains lit when you run multiple applications and switch between open windows. This happens even though you aren't saving large files. What should you do to troubleshoot the problem?

Use Resource Monitor to monitor memory utilization.

You are concerned that an attacker can gain access to your web server, make modifications to the system, and alter the log files to hide his or her actions. Which of the following actions would BEST protect the log files?

Use Syslog to send log entries to another server.

Which SNMP component uses GETNEXT messages to navigate the MIB structure?

Walk

Which log file type is one of the most tedious to parse but can tell you exactly when a user logged onto your site and what their location was?

Web server logs

Which type of documentation would you consult to find the location of RJ45 wall jacks and their endpoints in the intermediate distribution closet?

Wiring schematic


Set pelajaran terkait

Business Analytics I (BUAL 2600) Exam 2

View Set

EXAM 2 System Analysis and Design

View Set

Starting Out with Python, 3e Ch 4

View Set

Audit Chapter 5 Risk Assessment: Internal Control Evaluation

View Set

Biology Exam 2 - Mastering Bio HW

View Set

Ch. 14 Express & Implied Warranties

View Set

L3 Soil components and soil formation

View Set