CNT 125 CH 12

Ace your homework & exams now with Quizwiz!

__4__ blackout __2__ noise __3__ brownout __1__ surge

1. A momentary increase in voltage due to lightning strikes, solar flares, or electrical problems. 2. Fluctuation in voltage levels caused by other devices on the network or EMI. 3. A momentary decrease in voltage; also known as a sag. An overtaxed electrical system can be the cause. 4. A complete power loss.

__1__ incident __2__ disaste

1. Any event, large or small, that has adverse effects on a network's availability or resources. This could be a security breach, such as a hacker gaining access to a user's account, an infection, such as a worm or virus, or an environmental issue, such as a fire or flood. 2. An extreme type of incident, involving a network outage that affects more than a single system or limited group of users.

__3__ Hot Site __2__ Warm Site __1__ Cold Site

1. Computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated, or connected. 2. Computers, devices, and connectivity necessary to rebuild a network exist, with some pieces appropriately configured, updated, or connected. 3. Computers, devices, and connectivity necessary to rebuild a network exist, and all are appropriately configured, updated, and connected to match your network's current state.

_1__ flow control __3__ QoS __2__ congestion control

1. Configure interfaces and protocols to balance permitted traffic volume with a device's capability of handling that traffic 2. Adjust the way network devices respond to indications of network performance issues caused by traffic congestion so they don't make the problem worse. 3. Prioritize some traffic over other traffic so the most important traffic gets through even during times of congestion

__2__ traffic policing __1__ traffic shaping

1. Delaying less-important traffic Increasing the priority of more-important traffic 2. Limiting the volume of traffic flowing in to or out of an interface during a specified time period Limiting the momentary throughput rate for an interface

__3__ in-line monitoring __4__ Reporting __2__ port mirroring __1__ wireless monitoring

1. Run monitoring software on a computer connected wirelessly to the network 2. Program a switch to use ________, whereby all traffic sent to any port on the switch is copied to this specified port 3. Install a device, called a network TAP (test access point) or packet sniffer, in line with network traffic. 4. devices can be configured to report their traffic and other statistics to a network monitor - rely on protocols such as syslog and SNMP

__2__ error rate (6) Device availability and performance __4__ jitter __1__ utilization (5) Interface statistics __3__ packet drops.

1. metric refers to the actual throughput used as a percentage of available bandwidth 2. The calculated percentage of how often Bits are damaged in transit due to EMI or other interference 3. Packets that are damaged beyond use, arrive after their expiration, or are not allowed through an interface 4. When successive packets experience varying amounts of latency, resulting in their arriving out of order 5. Feedback collated from all network interfaces can provide insights into what's changing on the network and what might be going wrong 6. This includes such metrics as CPU and memory usage, temperature, and network connection speed

__2__ fault management __1__ performance management

1. monitoring how well links and devices are keeping up with the demands placed on them 2. detecting and signaling of device, link, or component failures

__3__ network management agent __5__ SNMP __4__ MIB __2__ managed device __1__ NMS

1. the central collection point .... the management console - the software installed on the management console that collects and displays the data gathered from the managed devices 2. Any network node monitored by the NMS - each object is assigned an OID 3. software routine that collects information about the device's operation and provides it to the NMS 4. list of objects managed by the NMS, as well as the descriptions of these objects - contains data about an object's performance in a database format that can be mined and analyzed 5. Application layer protocol that communicates data between the managed device (the agent) and the management console (NMS)

__3__ differential backup __2__ incremental backup __1__ full backup

1.Backs up everything every time a backup is done2.Backs up only data that has changed since the last backup3.Backs up data that has changed since the last full backup

Generator

A _________ serves as a backup power source, providing power redundancy in the event of a total blackout. ____________ can be powered by diesel, liquid propane gas, natural gas, or steam.

standby

A __________ UPS provides continuous voltage to a device by switching virtually instantaneously to the battery when it detects a loss of power from the wall outlet. Upon restoration of power, the ___________ UPS switches the device back to AC power. The problem with a _________ UPS is that, in the brief amount of time it takes the UPS to discover that power from the wall outlet has faltered, a device may have already detected the power loss and shut down or restarted.

protocol analyzer

A _________________, can monitor traffic at a specific interface between a server or client and the network.

network monitor

A __________________ is a tool that continually monitors network traffic and might receive data from monitored devices that are configured to report their statistics.

DC

A flashlight, uses ______. The batteries in a flashlight have positive and negative poles, and the current always flows at a steady rate in the same direction between those poles,

online

An __________ UPS uses the AC power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery. In other words, a server connected to an __________ UPS always relies on the UPS battery for its electricity.

Incident response plan

An ______________ specifically defines the characteristics of an event that qualifies as a formal incident and the steps that should be followed as a result. Qualifying incidents take into account the full spectrum of possible events, which might include a break-in, fire, weather-related emergency, hacking attack, discovery of illegal content or activity on an employee's computer, malware outbreak, or a full-scale, environmental disaster that shuts down businesses throughout the city or state. The policy is written with the intent of keeping people safe; protecting sensitive data; ensuring network availability and integrity; and collecting data to determine what went wrong, who is responsible, and what actions should be taken in the future to prevent similar damage.

__2__Detection and Identification __3__Containment __6__Review __5__Recovery __4__Remediation __1__Preparation

An incident response is a six-stage process, which actually begins before the incident occurs. Place the following Incident Response steps in the correct order.

True

Data backups provide a way to recover data that is lost. To do this reliably under a wide variety of adverse conditions, the 3-2-1-1 Rule, defines the following backup principles: 3—Keep at least three complete copies of the data. 2—Save backups on at least two different media types, such as hard drive and tape drive, or tape drive and cloud storage. 1—Store at least one backup copy offsite. 1—For greater protection against ransomware, ensure that at least one backup copy is stored offline.

promiscuous

In __________ mode, also called monitoring mode, a device driver directs the NIC to pass all frames to the operating system and on to the monitoring software, not just those broadcast or intended for the host.

(4)Protect the chain of custody _(1)Secure the Area __3__Monitor evidence and data collection _(5)Monitor transport of data and equipment _(2)Document the scene __6__Create a report

It is critical that every IT technician in a company know how to safeguard sensitive information, logged data, and other legal evidence until the first responder or incident response team can take over the collection of evidence. Place the steps in the correct order:

environmental monitoring

Monitoring some of the following factors to ensure your network fuctions reliably is an example of ________________. Device, rack, or room temperature Device, rack, or room humidity, dew point, or barometric pressure Flooding as sensed by liquid detectors Smoke or fire Airflow Vibration Motion as sensed by security cameras Room lights on or off Room or rack doors open or closed Power (main or UPS voltage, battery level, outages, power consumption)

trap

SNMP agents can be programmed to detect certain abnormal conditions (port goes down) that prompt the generation of SNMP ________ messages, where the agent sends the NMS unsolicited data once the specified condition (port goes down) on the managed device are met.

business continuity

The goal of a disaster recovery plan is to ensure ____________, which is the ability of the company to continue doing business with the least amount of interruption possible.

baseline

To identify when there's a problem on the network, you must first know what is normal for that network. A(n) ____________ is a report of the network's normal state of operation and might include a range of acceptable measurements.

1. event log 2. syslog

__2__UNIX or Linux based computer log containing monitored device information__1__Windows-based computer log containing monitored device information

1. runts 2. giants 3. jabber 4. ghosts 5. packet loss 6. discarded packets 7. interface resets

__5__packets lost due to unknown protocol, unrecognized port, network noise - never arrive at destination __1__packets smaller than minimum packet size (less than 64 bytes) __3__A device that handles electrical signals improperly - device always re-transmitting (bad NIC or electrical interference) __4__frames that are not actually frames - caused by device misinterpreting stray voltage on wire __6__packets that arrive at destination but are discarded due to buffer overflow, latency, bottlenecks or congestion __7__ repeated resets of the connection (interface misconfiguration) __2__packets larger than maximum packet size (more than 1518 bytes)

PDU

_____ acts as a power strip to bring power from outlets, or a generator, closer to the devices on the rack. The ______ is specifically designed to handle the high power requirements of a rack full of electronic equipment. Intelligent ______ can even provide monitoring via SNMP and remote-control features so you can know which devices are consuming the most power, remotely power cycle a device (that is, shut off power to the device and then turn the power back on), and receive alerts or configure alarms to indicate when problems occur.

UPS

_____ is a battery-operated power source directly attached to one or more devices and to a power supply, such as a wall outlet, that provides a backup power source in the event of a power outage. A _____ can also help prevent undesired fluctuations of the wall outlet's AC power from harming devices.

AC

_____ power comes from the power station through the wall outlet to a device for it's use.

Network Management

_____________ refers to the assessment, monitoring and maintenance of all aspects of a network.

Spiceworks

______________ is a type of network monitoring software because it can be configured to monitor multiple devices on a network at one time.

Wireshark

______________ is a type of protocol analyzer because it monitors traffic on the interface between a single device and the network.

disaster recovery plan

____________________ is the process of restoring your critical functionality and data after an outage that affects more than a single system or a limited group of users.


Related study sets

L6 The Perfect Game: movie questions

View Set

Life Pre-Intermediate Unit 9, Vocabulary-Jeddah University

View Set

Test 2 Data Communications Chapter 4 Quiz

View Set

Chapter 12 -Managing Human Talent

View Set

Ch 31: Assessment and Management of Patients with Hypertension

View Set

Chapter 42: Colon Diversion Devices

View Set

Biological and psychological risk factors - CHAP 12

View Set

Intro to Digital Forensics Final Exam Questions

View Set

Ch.13 - Businessowners Coverage Form

View Set