CH 11 quiz

Ace your homework & exams now with Quizwiz!

Question 17 When using SNMP with TLS, what port do agents receive requests on? 10161 162 161 10162

10161

Question 6 If you wish to maintain a "4 nines" availability rating, what is the maximum amount of down time you can have per day? 1 minute, 26 seconds .4 seconds 14 minutes, 23 seconds 8 seconds

8 seconds

Question 2 A highly available server is available what percentage of the time? 99.99% 99% 99.999% 90%

99.999%

Question 15 When Comcast was found to be interfering with BitTorrent traffic, what method was being used? Comcast used DNS poisoning to prevent clients from talking to other BitTorrent users. Comcast was interjecting TCP segments with the RST (reset) field set. Comcast was creating access lists that blocked known BitTorrent trackers. Comcast used IP spoofing to impersonate other BitTorrent clients, then dropped traffic.

Comcast was interjecting TCP segments with the RST (reset) field set.

Question 11 What does the Common Address Redundancy Protocol do? It allows multiple devices to share hardware resources. It allows a pool of computers or interfaces to share the same MAC address. It allows multiple devices to share the same fully qualified domain name. It allows a pool of computers or interfaces to share the same IP address.

It allows a pool of computers or interfaces to share the same IP address.

Question 4 At what point is a packet considered to be a giant? It becomes a giant when it exceeds the medium's maximum packet size. It becomes a giant when it exceeds 1500 bytes. It becomes a giant once a VLAN tag is added. It becomes a giant only when fragmented pieces are reassembled and the packet size is too large.

It becomes a giant when it exceeds the medium's maximum packet size.

Question 5 How does a line conditioning UPS protect network equipment? It filters line noise from incoming power. It shields equipment from lightning damage. It protects against electrical surges. It reduces fluctuations in incoming voltage.

It filters line noise from incoming power.

Question 1 A differential backup covers what data on a system? It includes data that has changed since the last full backup. It includes only data that has changed since the last backup. It includes data that has changed since the last incremental backup. It includes all data every time it is performed.

It includes data that has changed since the last full backup.

Question 12 What happens when an NMS uses the SNMP walk command? The NMS sends a request for data to the agent on a managed device. The NMS requests a list of all active SNMP traps on the system. The NMS walks through a list of given SNMP hosts. The NMS uses get requests to move through sequential rows in the MIB database.

The NMS uses get requests to move through sequential rows in the MIB database.

Question 9 The grouping of multiple servers so that they appear as a single device to the rest of the network is known as which term? link aggregating load balancing server overloading clustering

clustering

Question 19 Which type of backup scheme only covers data that has changed since the last backup? incremental backup snapshot backup differential backup full backup

incremental backup

Question 3 A snapshot is most similar to which type of backup scheme? differential backup full backup incremental backup versioned backup

incremental backup

Question 16 When a device handles electrical signals improperly, usually resulting from a bad NIC, it is referred to by what term below? jabber talker ghost blabber

jabber

Question 7 Once a device has failed, what metric measures the average amount of time to repair? mean restoration time (MRT) mean time to restore (MTTR) mean field replacement time (MFRT) mean time to repair (MTTR)

mean time to repair (MTTR)

Question 20 Which type of uninterruptible power supply uses AC power to continuously charge its battery, while also providing power to devices through the battery? online UPS line conditioning UPS standby UPS surge UPS

online UPS

Question 8 Packets that are smaller than a medium's minimum packet size are known by what term below? runts jabbers ghosts giants

runts

Question 14 What statement regarding the use of a network attached storage device is accurate? A NAS can typically only support RAID-0 configurations. A NAS does not contain its own file system, rather it relies on the host file system provided by individual clients. A NAS can be easily expanded without interrupting service. A NAS reads and writes from its disks significantly slower than other types of servers.

A NAS can be easily expanded without interrupting service.

Question 13 What makes up the first 6 bits of the 8-bit DiffServ field? Priority Code Point (PCP) Class of Service (CoS) Differentiated Services Code Point (DSCP) Forward Error Correction (FEC)

Differentiated Services Code Point (DSCP)

Question 10 What 3-bit field in a 802.1Q tag is modified to set a frame's Class of Service (CoS)? Tag Protocol Identifier (TPID) Priority Code Point (PCP) CRC checksum EtherType

Priority Code Point (PCP)

Question 18 When viewing a syslog message, what does a level of 0 indicate? The message is a warning condition on the system. The message represents debug information. The message is an error condition on the system. The message is an emergency situation on the system.

The message is an emergency situation on the system.


Related study sets

Chapter 2. Financial Statements, Taxes and Cash Flow

View Set

Business x100 - Chapter 18. Assigned Reading and Pre-class Quiz on Financial Management

View Set

practice ASWB exam 3 - Human Development, Diversity, & Behavior in the Environment

View Set

Government Intervention in International Business - Chapter 7

View Set

PSY 108 6a) Basic Concepts of Sensation and Perception

View Set

Life, Accident and Health test 2

View Set

BOC Urinalysis final, BOC Molecular Pathology final, Microbiology BOC final, BOC Immunology final, Hematology final, Chemistry BOC final, Blood Bank BOC final

View Set

THE PURITAN BENNETT 840 ACUTE CARE VENTILATOR

View Set