22. Ensuring Network Availability Flashcards
- What protocol provides detailed information on traffic flows between endpoints?
a. Syslog
b. SNMP
c. NetFlow
d. SPAN
c. The NetFlow standard provides session information including the source and destination addresses, applications, and traffic volume.
- What networking protocol uses OIDs and MIBs for data collection?
a. SPAN
b. NetFlow
c. Syslog
d. SNMP
d. The Simple Network Management Protocol (SNMP) uses Organisational Identifiers (OIDs) and management information bases (MIBs) for collection and organisation of data.
- What is a below-standard frame size called?
a. Undercount
b. Runt
c. Nibble
d. Short Frame
b. An Ethernet frame below the standard size of 64 bytes is a runt.
- What is one-way traffic flow called?
a. Duplex
b. Asymmetric
c. Half-duplex
d. Receive only auto-negotiation
c. Data traffic that transmits and receives in only one direction at a time is referred to as half-duplex.
- What is the average of collected metrics called?
a. NetFlow
b. SNMPv2c
c. Management information base
d. Baseline
e. syslog
d. A measurement is taken from network gear and servers to determine what is considered to be normal operations of a system.
- Which device components should never be allowed to reach full capacity? (choose two)
a. Memory
b. Voltage
c. CPU
d. Delay
a, c. When a system uses all available memory or CPU resources, it may become very unstable and fail. Devices must hav available memory and CPU capacity available to be able to function.
- Which of the following mathematically determines network errors?
a. SNMP
b. NetFlow
c. CRC
d. Syslog
c. A cyclic redundancy check or CRC, is a mathematical calculation of a frame of data that is sent to a remote device where it is also calculated and compared to calculation it received. If the values match, the frame was error free.
- What protocol is used to poll and collect information from network devices?
a. SPAN
b. NetFlow
c. Syslog
d. SNMP
d. The Simple Network Management Protocol (SNMP) is an application and protocol used to collect operational data from network devices.
- What is the term for when a segment of data fails the addition or deletion of header information?
a. Encapsulation error
b. CRC
c. NetFlow
d. Frame reject
a. An encapsulation error occurs when a software process fails to add or remove header data to/from a data frame.
- What are two environmental variables that are commonly monitored? (choose two)
a. Temperature
b. Airflow
c. Humidity
d. Utilisation
a, c. Data centres monitor the temperature and humidity to ensure they are in safe operating ranges to protect the equipment and to make sure they are within their heat and humidity specifications.
- Baselines commonly include which of the following?
a. Processor
b. Memory
c. Storage subsystems
d. Wired/wireless utilisation
e. all of the above
e. A baseline can be taken on any metric that is considered to be critical for operations.
- What are two metrics that are attacked to account for utilisation in operations?
a. Syslog
b. Uptime
c. Downtime
d. SNMP
b, c. Utilisation metrics include tracking both the uptime and downtime of applications, servers, and networking gear.
- What is a system-design protocol that guarantees a certain amount of operational uptime during a given period?
a. High availability
b. Redundancy
c. Hot Standby
d. Backup systems
a. High availability is an architecture that enhances a device’s ability to operate even if a component or software process fails.
- What is bi-directional traffic flow across an ethernet interface?
a. Full-duplex
b. Two-way
c. Duplex
d. Symmetric
a. Traffic that flows in both directions simultaneously is referred to as full duplex.
- What syslog severity level denotes that the system is unusable?
a. Emergency
b. Alert
c. Critical
d. Error
a. The emergency syslog severity level is the most critical and means that a system may be down or unusable.