Module 12 Study Guide
Which KPI (key performance indicator) indicates delayed network communications while devices wait for responses or resend transmissions?
Packet Drops packets that are damaged beyond use, arrive after their expiration, or are not allowed through an interface are dropped.
Which network monitoring method can be used to ensure that all traffic sent to any port on a switch is also sent to a device connected to the mirrored port?
Port Mirroring
Which of the following power flaws is also called a sag?
Brownout
Which of the following steps of an incident response plan includes the act of limiting the damage by the team, where affected systems or areas are isolated, and response staff are called in as required by the situation?
Containment
A network connection is congested as a result of which there are multiple network fluctuations and latency issues. You as a network administrator plan on solving this issue by using a network device to send signals to the sender or receiver of the data packets that the network is congested. Which of the following will you use in this scenario?
Explicit Signaling the closed-loop response to existing congestion. (Backward/Forward)
Which of the following backs up only the data that has changed since the last backup?
Incremental Backups
You have been assigned the role of a network administrator, and your first task requires you to measure the throughput between network hosts. Which of the following tools will you use in this scenario?
iPerf is a command-line based tool.
Which of the following is not a technique used in a closed-loop response to an existing congestion?
Admission Policy closed-loop responses include: -Implicit Signaling -Explicit Signaling -Choke Packet -Backpressure
A system of documentation that makes it possible for a third party to inspect evidence later and understand the flow of events is called _____.
An Audit Trail
James, a network engineer, has been contracted by a company to monitor network performance. In order to know and analyze any problem in a network, James will need to understand how the network functions in a normal state. Analyze which of the following will be of use to James in this scenario.
Checking the Network's Performance Baseline baseline is a record of how a network or resource operates under normal conditions.
HomeLand is an organization that rescues abandoned dogs. They set up a hotline for the general public to report any street dog that they spot anywhere in the city or any dog that they feel needs to be rescued. Within 12 hours of the hotline being activated, the network starts experiencing congestion, messages are corrupted or dropped, and connected devices start resending frames to make up for the loss. These kinds of problems are overwhelming the network as a whole. This generates even more traffic, making the congestion even worse. Analyze which of the following policies HomeLand should adopt to detect congestion on the network after experiencing several missed acknowledgment messages.
Implicit Signaling is a Closed-Loop respose.
Identify which of the following designations can be associated with a member who coordinates the resources necessary to solve a problem and also ensures that the security policy is followed and that everyone within the organization is aware of the situation?
Manager
Which type of a recovery plan accounts for the worst-case scenarios and provides contingency plans for restoring or replacing computer systems, power, telephone systems, and paper-based files?
A Disaster Recovery Plan is a part of the BCP (business continuity plan) that details the processes for restoring critical functionality and data to a network after an outage.
Donald is a schoolteacher living in Atlanta. While conducting online classes, he experienced a momentary decrease in voltage. His computer shut down and when he switched it back on, he realized that he had lost some data. He called his friend Chadwick who is a network analyst to check out what the issue was. Chadwick found that there was a power flaw caused by an overtaxed electrical system. Such voltage decreases can cause computers or applications to fail and potentially corrupt data. What kind of power flaw caused this issue in Donald's house?
Brownout temporary dimming of lights
You have been hired as a systems analyst by an online food delivering service. Your job requires you to keep the network congestion free during peak hours and to ensure that important traffic can survive the congestion while less sensitive frames are discarded. Which of the following techniques will you use in such a scenario?
Discarding Policy is an Open-Loop technique
Jilead Inc. is a software development company that is preparing an incident response plan to prepare for possible events such as a break-in, fire, weather-related emergency, hacking attack, discovery of illegal content or activity on an employee's computer, malware outbreak, or a full-scale environmental disaster that shuts down businesses throughout the city or state. The response plan has identified the members of the response team and the responsibilities have been assigned and clearly spelled out to each team member. Stanley Hudson has been entrusted with the responsibility of being the person on call who first notices or is alerted to the problem. He has to create a record for the incident, detailing the time it began, its symptoms, and any other pertinent information about the situation. He must remain available at all times to answer calls from clients or employees. What is the role that Stanley has been assigned?
Dispatcher
Which of the following steps of an incident response plan involves the process of repairing affected systems and putting them back in operation to ensure the smooth running of operations?
Recovery
What is an Ethernet packet that is smaller than 64 bytes called?
Runt
The 3-2-1-1 Rule defines backup principles to follow to reliably recover lost data under a wide variety of adverse conditions. What does the "2" in the second part of the principle denote?
Save Backups on at least Two Different Media Types. 3-2-1-1 is a collection of backup principles that requires at least three complete copies of the data, backups saved on at least two media types, with at least one copy stored offsite, and at least one copy stored offline.
Which power device prevents momentary increase in voltage due to lightning strikes, solar flares, or electrical problems?
Surge Protector is a power management device that redirects excess voltage away from connected computing or networking devices to the ground, thereby protecting connected devices from harm.
Suppose you notice a sudden decrease in network performance and suspect malware is hogging network resources. Which of the following commands will you use to display the PID (process identifier) associated with your network connection?
netstat -o
Which bandwidth management technique adjusts the way network devices respond to indications of network performance issues caused by traffic congestion throughout a network?
Congestion Control manages the entrance of traffic onto the network, other methods allow for more nuanced control after what happens to the traffic once it's on the network. (Qos)
Francine, a new network administrator at an online thrift store, is required to use an application that monitors traffic on the interface between a single device and the network. The application must be able to see the traffic the switch sends to it, which includes broadcast traffic and traffic specifically addressed to the one computer. Which of the following methods should Francine use to monitor the network traffic?
Protocol Analyzer
Agar is a network analyst at BMV, a mobile network. He efficiently manages the network's QoS (Quality of Service) configurations for adjusting the priority a network assigns to various types of transmissions. He ensures timely delivery of the most important traffic while optimizing performance for all users. The management at BMV wants to conduct a pilot test for a new product, and they have requested Agar to limit the momentary throughput rate for an interface. Analyze which of the following Agar should use in this scenario.
Traffic Policing is a traffic-shaping technique in which the volume or rate of traffic traversing an interface is limited to a predefined maximum.
A fraudulent financial deal has just taken place in the company where you are working as a network administrator. The data of the company will be collected in such a way that it can be presented in a court of law for the purpose of prosecution. Some of the forensic data available for analysis may be damaged or destroyed if improperly handled. You have been assigned the duty to safeguard sensitive information, logged data, and other legal evidence until the first responder or incident response team can take over the collection of evidence. To prevent contamination of evidence, you have made sure that each device involved is isolated-that is, the device is disconnected from the network and secured to ensure that no one else has contact with it until the response team arrives. What is the next step that you will take in the event of such an illegal activity?
Document The Scene. creating a defensible audit trail is one of the highest priorities in the forensics process. An audit trail is a system of documentation that makes it possible for a third party to inspect evidence later and understand the flow of events. A defensible audit trail is an audit trail that can be justified and defended in a court of law according to specific standards
You are working as a network engineer at IBV Solutions. The network administrator tells you to prepare a report of all the bad NICs that have been retransmitted, leading to a bad network. Which of the following will you use to state this in your report?
Jabbers network performance baselines are obtained by analyzing network traffic information and might include information on the utilization rate for your network backbone, number of users logged on per day or per hour, number of protocols that run on your network, statistics about errors (such as runts, jabbers, or giants), frequency with which networked applications are used, or information regarding which users take up the most bandwidth.
Trevor is working as a network engineer at Spring Oaks High School. The school's management has been facing some issues while handling network traffic. Trevor wants to check the bandwidth as he assumes that the issues faced by the management are related to bandwidth errors. Which of the following technologies should Trevor use to ensure some traffic gets priority over other traffic so the most important traffic gets through even during times of congestion?
QoS
You are the network administrator in Jolene Consultancy Pvt. Ltd., a small consultancy in Missouri. You have been assigned the task of monitoring network traffic in the systems. You must ensure that many devices can be configured to report their traffic and other statistics to a network monitor. Which of the following would you use in this scenario?
Reporting
You are a network analyst who has been tasked with managing the volume of network traffic across an organization in order to prevent network congestion. On analyzing the current network, you notice that one of the primary reasons for congestion is that the switches used in the network keep resending data packets that have been lost in the transmission far too quickly. Which of the following do you think should be implemented to solve this issue?
Retransmission Policy
Which of the following policies should be adopted to help reduce increasing congestion caused by devices attempting to resend lost packets too quickly or too often?
Retransmission Policy is an Open-Looped technique. Retransmission timers help reduce increasing congestion caused by devices attempting to resend lost packets too quickly or too often.
Goldwin Enterprises has hired you as a network administrator to monitor the network and to ensure that the network functions reliably. To monitor the entire network, you will require a device that will display sensor data on your configurable dashboard. Which of the following software will you request from the management?
Room Alert Monitor by AVTECH
One of the employees in your organization is suspected of hacking into the network. You as a network administrator want to check the user's activity for the last week. Which of the following will you use in such a scenario?
Audit Log is a collection of data in logs that is consistent and thorough enough to retroactively prove compliance and also to defensibly prove user actions.
BNB Group of Institutions has been facing a lot of issues with its network ever since it decided to adopt online classes as a medium to impart education. The IT department analyzes the issue and is of the opinion that the problems are related to the high amount of traffic due to students trying to log in from various locations; as a result, the network devices are overloaded. The IT department has requested your help as a network administrator. Which of the following bandwidth management techniques will you suggest in this scenario?
Flow Control is a bandwidth management technique configured on interfaces to balance permitted traffic volume with a device's capability of handling that traffic.
You have recently been appointed as a network analyst at Hayle Communications. Your first assignment requires you to limit the traffic between a single receiver and a single sender. Which of the following bandwidth management techniques will you use in this scenario?
Flow Control is a bandwidth management technique configured on interfaces to balance permitted traffic volume with a device's capability of handling that traffic.
You are hired as a network administrator to monitor an organization's network status on an ongoing basis and to make changes to best meet the needs of your network's users. One feedback that you have received from the network engineer of the firm is that one of the modems is repeatedly power cycling to reset network activity. Which of the following KPIs will help you in getting a better understanding of the situation?
Interface Statistics
Which of the following is used to create flow records that show relationships among various traffic types?
NetFlow is a proprietary traffic monitoring protocol from Cisco that tracks all IP traffic crossing any interface where NetFlow is enabled.
Which of the following monitors network traffic and might receive data from monitored devices that are configured to report their statistics?
Network Monitor
An organization determined that there was an increase in network latency, and it approached you, a network administrator, to solve the issue. You decide that the extra demand on the network device's CPU and memory should be lessened to solve this issue. You also plan on getting a comprehensive view of the network traffic and sample traffic as well. Which of the following will you use in this scenario?
SNMP (Simple Network Message Protocol) Trap is a type of unsolicited SNMP message sent from an agent to the NMS (network management system) once specified conditions on the managed device are met.
You are a network administrator at Yosaka & Associates, a private law firm. The employees have been facing various types of data errors and other transmission problems, leading to decreased productivity. You need to find an appropriate technique that will help identify locations of network bottlenecks. Which of the following techniques would you choose in such a scenario?
Traffic Analysis the examination of network traffic for patterns and exceptions to those patterns.
You are working with an ISP, and you have to impose a maximum cap limit to each client so that your company can predict and purchase accordingly from the network provider. Which of the following terms will you associate with this process?
Traffic Policing is a traffic-shaping technique in which the volume or rate of traffic traversing an interface is limited to a predefined maximum.