Network CH11

Ace your homework & exams now with Quizwiz!

False

Setting a NIC to run in promiscuous mode will allow it to see all network traffic passing through a network switch.

Mean time to repair (MTTR)

Once a device has failed, what metric measures the average amount of time to repair?

Top listeners

One of your coworkers downloaded several, very large video files for a special project she's working on for a new client. When you run your network monitor later this afternoon, what list will your coworker's computer likely show up on?

Runts

Packets that are smaller than a medium's minimum packet size are known by which of the following terms?

Offline folders

To reduce any kind of network congestion bottleneck, you have configured client-side caching. Which of the following is likely to use this configuration?

Priority code point (PCP)

What 3-bit field in an 802.1Q tag is modified to set a frame's Class of Service (CoS)?

SNMP get next

What command requests the next record in an SNMP log?

Port 161

What port do SNMP agents listen on?

Speed

Which of the following features of a network connection between a switch and server is not improved by link aggregation?

Compare network performance to baselines

Employees are complaining that the network seems to be slow. How could you quantitatively determine if this is the case?

1 & 2

Refer to the following statements. Within the operation of the SNMP protocol, which of the following describes a MIB correctly? 1.a database used for managing the entities in a communications network 2.it has a hierarchical structure 3.provides connectivity via SQL database queries and web interface capabilities

Online ups

Which power backup method will continually provide power to a server if the power goes out during a thunderstorm?

Incremental backup

Which type of backup scheme only covers data that has changed since the last backup?

True

You can find out where various logs are kept on some UNIX and Linux systems by viewing the /etc/syslog.conf or /etc/rsyslog.conf files.

Statements 1 and 2 are true

Which of the following is true about Load balancing on a network? 1) Provides redundancy 2) Provides an increase in throughput 3) Increases CPU resources

MIB

You have added a new device to the network management application. What else should you add to the network management application to be able to control it?

True

Most UNIX and Linux desktop operating systems provide a GUI application for easily viewing and filtering the information in system logs.

Differentiated Services code point ( DSCP)

What makes up the first 6 bits of the 8-bit DiffServ field?

Comcast was interjecting TCP segments with the RST (reset) field set.

When Comcast was found to be interfering with BitTorrent traffic, what method was being used?

Incremental back up

When restoring a backup, which of them is likely to be most time consuming to restore?

10161

When using SNMP with TLS, what port do agents receive requests on?

Cold site

Which type of disaster recovery site contains all the equipment you would need to get up and running again after a disaster, and yet would require several weeks to implement?

Wireshark

While troubleshooting a recurring problem on your network, you will want to examine the TCP messages being exchanged between a server and a client. Which tool should you use?

99.999%

A highly available server is available what percentage of the time?

It provides a mirrored port for monitoring traffic between other ports

A network TAP serves what purpose on a network?

Network performance baseline

A network administrator is implementing a ping from one end of the network to the other, records the average round-trip time and archives the results. What is most likely being prepared?

How long devices like this one will last on average until the next failure

When shopping for a new router, what does the MTBF tell you?

Expedited forwarding

When using DiffServ, what type of forwarding utilizes a minimum departure rate from a given node, which is then assigned to each data stream?

Full backup

You need to design a backup strategy. You need to ensure that all servers are backed up every Friday night and a complete copy of all data is available with a single set of media. However, it should take minimal time to restore data. Which of the following would be the ____

Changes since the full back up

You take a full backup of the source data on Monday. Rest of the week, you take differential backups. What would the differential backup of Friday contain?

SNMP (collect & organize data )

You want to monitor the routers for their performance. In case of a performance bottleneck, you need to be alarmed. Which of the following protocol should you use?

Traffic shaping

Your roommate has been hogging the bandwidth on your router lately. What feature should you configure on the router to limit the amount of bandwidth his computer can utilize at any one time?

50+60 (50+10)+90 (60+30)= 200

Your source data is of 50 GB. You make a full backup. Next week, once again you perform a full backup, but this time 10 more GB has been added to the source data. Second week, you perform another backup when the source backup has added 30 more GB. What is the total size of backups have you saved till date?

True

The SNMP version 3 protocol introduces authentication, validation, and encryption for messages exchanged between devices and the network management console.

True

A brownout is a momentary decrease in voltage; also known as a sag.

Incremental backup

A snapshot is most similar to which type of backup scheme?

DiffServ

What field in an IPv4 packet is altered to prioritize video streaming traffic over web surfing traffic?

The NMS uses get requests to move through sequential rows in the MIB database

What happens when an NMS uses the SNMP walk command?

Time of event & event description

What kind of information would you expect to find within a network device's event log? [Choose all that apply].

It includes data that has changed since the last full backup.

A differential backup covers what data on a system?

It becomes a giant when it exceeds the medium's maximum packet size

At what point is a packet considered to be a giant?

SNMP

You are asked to monitor a network which has a network monitoring system. Using the monitoring server, you notice that it is listening on port number 161 for network events. Which network monitoring protocol is in use?

Uptime

You are attempting to determine how available your Linux systems are, and need to find the current system uptime. What command should you use?


Related study sets

Chapter 12: Skin, Hair, and Nails

View Set

CSA+ CH1 Threat Management Part 2

View Set

LAFD Week 6 Exam - Hazmat Response

View Set

TCMC - Histology: Adipose Tissue

View Set