Network+ lesson 12 quiz

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which type of a recovery plan accounts for the worst-case scenarios and provides contingency plans for restoring or replacing computer systems, power, telephone systems, and paper-based files?

A disaster recovery plan

Which of the following is NOT a technique used in a closed-loop response to an existing congestion?

Admission policy

One of the employees in your organization is suspected of hacking into the network. You as a network administrator want to check the user's activity for the last week. Which of the following will you use in such a scenario?

Audit log

Donald is a schoolteacher living in Atlanta. While conducting online classes, he experienced a momentary decrease in voltage. His computer shut down and when he switched it back on, he realized that he had lost some data. What kind of power problem has he experienced?

Brownout

Which of the following power flaws is also called a sag?

Brownout

What type of QoS is performed only at layer 2 of the OSI model?

CoS

Which bandwidth management technique adjusts the way network devices respond to indications of network performance issues caused by traffic congestion throughout a network?

Congestion control

Which of the following steps of an incident response plan includes limiting the damage by isolating the affected systems and calling in response staff as needed?

Containment

James, a network engineer, has been contracted by a company to monitor network performance. In order to recognize problems in the network, James will first need to understand how the network functions in a normal state. Analyze which of the following will be of use to James in this scenario.

Create performance baselines

You have been hired as a systems analyst by an online food delivery service. Your job requires you to keep the network congestion free during peak hours and to ensure that important traffic can survive the congestion while less sensitive frames are discarded. Which of the following open-loop techniques will you use in such a scenario?

Discarding policy

Jilead Inc. is a software development company that is preparing an incident response plan to prepare for possible events such as a break-in, fire, weather-related emergency, hacking attack, discovery of illegal content or activity on an employee's computer, malware outbreak, or a full-scale environmental disaster that shuts down businesses throughout the city or state. The response plan has identified the members of the response team and the responsibilities have been assigned and clearly spelled out to each team member. Stanley Hudson has been entrusted with the responsibility of being the person on call who first notices or is alerted to the problem. He has to create a record for the incident, detailing the time it began, its symptoms, and any other pertinent information about the situation. He must remain available at all times to answer calls from clients or employees. What is Stanley's role in this situation?

Dispatcher

A fraudulent financial deal has just taken place in the company where you are working as a network administrator. The data of the company will be collected in such a way that it can be presented in a court of law for the purpose of prosecution. Some of the forensic data available for analysis may be damaged or destroyed if improperly handled. You have been assigned the duty to safeguard sensitive information, logged data, and other legal evidence until the first responder or incident response team can take over the collection of evidence. To prevent contamination of evidence, you have made sure that each device involved is isolated-that is, the device is disconnected from the network and secured to ensure that no one else has contact with it until the response team arrives. What is the next step that you will take in the event of such an illegal activity?

Document the scene.

HomeLand is an organization that rescues abandoned dogs. They set up a hotline for the general public to report any street dog that they spot anywhere in the city or any dog that they feel needs to be rescued. Within 12 hours of the hotline being activated, the network starts experiencing congestion, messages are corrupted or dropped, and connected devices start resending frames to make up for the loss. These kinds of problems are overwhelming the network as a whole. This generates even more traffic, making the congestion even worse. As a network administrator, what could you do to help the network recover?

Enable explicit signaling

Francine has been asked to set up sensors that detect when hardware is at risk due to battery failure, flooding, temperature fluctuation, or vibration. What kind of sensors must she install

Environmental

A network connection is congested as a result of which there are multiple network fluctuations and latency issues. You as a network administrator plan on solving this issue by using a network device to send signals to the sender or receiver of the data packets that the network is congested. Which of the following will you use in this scenario?

Explicit signaling

BNB Group of Institutions has been facing performance issues with its network ever since it decided to offer online classes. The IT department thinks that the problems stem from the high traffic volume due to many students trying to log in from various locations, which overloads the network. Which of the following bandwidth management techniques will you suggest in this scenario?

Flow control

You have recently been appointed as a network analyst at Hayle Communications. Your first assignment requires you to limit the traffic between a single receiver and a single sender. Which of the following bandwidth management techniques will you use in this scenario?

Flow control

Which of the following backs up only the data that has changed since the last backup of any kind?

Incremental backup

You are hired as a network administrator to monitor an organization's network status on an ongoing basis and to make changes to best meet the needs of your network's users. One feedback that you have received from the network engineer of the firm is that one of the modems is repeatedly power cycling to reset network activity. Which of the following KPIs will help you in getting a better understanding of the situation?

Interface statistics

You are working as a network engineer at IBV Solutions and you have identified a NIC that is always retransmitting, bogging down the network with unwanted traffic. How will you describe this situation in your report?

Jabber

In a disaster recovery plan, the plan's ______ coordinates the resources necessary to solve a problem and also ensures that the security policy is followed and that everyone within the organization is aware of the situation.

Manager

Which of the following is used to create flow records that show relationships among various traffic types?

NetFlow

Which of the following monitors network traffic and might receive data from monitored devices that are configured to report their statistics?

Network monitor

Goldwin Enterprises has hired you as a network administrator to monitor various environmental factors for the entire network via a single administrative dashboard. Which of the following software would enable you to do this?

PRTG Network Monitor

Which KPI (key performance indicator) indicates delayed network communications while devices wait for responses or resend transmissions?

Packet drops

Which network monitoring method can be used to ensure that all traffic sent to any port on a switch is also sent to a device connected to the mirrored port?

Port mirroring

Trevor is working as a network engineer at Spring Oaks High School. The school's management has been facing some network bandwidth issues due to students using the campus network to watch videos. Which of the following should Trevor implement to ensure that essential traffic gets priority over less important traffic?

QoS

Which of the following steps of an incident response plan involves the process of repairing affected systems and putting them back in operation to ensure the smooth running of operations?

Recovery

Which of the following policies should be adopted to help reduce increasing congestion caused by devices attempting to resend lost packets too quickly or too often?

Retransmission policy

You are a network analyst who has been tasked with managing the volume of network traffic across an organization in order to prevent network congestion. On analyzing the current network, you notice that one of the primary reasons for congestion is that the switches used in the network keep resending data packets that have been lost in the transmission far too quickly. Which of the following do you think should be implemented to solve this issue?

Retransmission policy

What is an Ethernet packet that is smaller than 64 bytes called?

Runt

Which protocol is used to transmit messages related to network monitoring?

SNMP

The 3-2-1-1 Rule defines backup principles to follow to reliably recover lost data under a wide variety of adverse conditions. What does the "2" in the second part of the principle denote?

Save backups on at least two different media types

Which power device prevents momentary increase in voltage due to lightning strikes, solar flares, or electrical problems?

Surge protector

You are a network administrator at Yosaka & Associates, a private law firm. The employees have been facing various types of data errors and other transmission problems, leading to decreased productivity. You need to find an appropriate technique that will help identify locations of network bottlenecks. Which of the following techniques would you choose in such a scenario?

Traffic analysis

Agar is a network analyst at BMV, a mobile network. He efficiently manages the network's QoS (Quality of Service) configurations for adjusting the priority a network assigns to various types of transmissions. He ensures timely delivery of the most important traffic while optimizing performance for all users. The management at BMV wants to conduct a pilot test for a new product, and they have requested Agar to temporarily limit the throughput rate for an interface. Which of the following Agar should use in this scenario?

Traffic policing

You are working with an ISP, and you have to impose a maximum cap to each client so that your company can predict and purchase bandwidth within its budget. Which of the following terms will you associate with this process?

Traffic policing

A system of documentation that makes it possible for a third party to inspect evidence later and understand the flow of events is called _____.

an audit trail

You have been assigned the role of a network administrator, and your first task requires you to measure the throughput between network hosts. Which of the following is a tool that would enable you to do this?

iPerf

Suppose you notice a sudden decrease in network performance and suspect malware is hogging network resources. Which of the following commands will you use to display the PID (process identifier) associated with your network connection?

netstat -o


Set pelajaran terkait

Chapter 7 InQuizitive: The Legislature

View Set

BA 325 Practice Questions (Midterm 1-2)

View Set

PR Writing - Giving Speeches & Presentations

View Set

REDBOOK (FEMALE PELVIS ANATOMY) Ch 16

View Set

Skills Lesson: Figurative Language and Imagery

View Set

Seizure Practice Quiz 21 questions (Cox)

View Set

Law on Partnership - Dissolution and Winding Up

View Set