3.0 Network Operation Flashcards
You are hired to manage the network at a large data center. On your first day, a user reports that they have lost network connectivity. At the user’s workstation, you successfully ping 127.0.0.1 and then swap out the patch cable that runs from the computer to a blank wall plate. In the network closet, you notice that all four patch panels were mounted to the rack after the punchdowns were completed, but nothing indicates port assignments or which areas the patch panels serve. You end up resolving the issue, but it takes longer than necessary. You want to speed up the resolution of future connectivity issues. What should you prepare FIRST?
A) Labeling
B) Physical diagrams
C) IDF/MDF documentation
D) Inventory management
E) Logical diagrams
Labeling is an important component of the network build and its documentation. Patch panel ports should be labeled and wall jacks should be labeled with the corresponding port number on the patch panel. Likewise, the patch cable should have the same labeling. Switches, routers, hubs, and wireless access points should be labeled, as well as each piece of equipment in a server rack.
When comparing logical vs physical diagrams, each provides a different visualization of the network topology. The physical network diagram includes cable lengths and types, server names, IP addresses, server roles, network equipment locations, and number of network users.
What does IDF/MDF functions do?
Intermediate Distribution Frame/Main Distribution Frame (IDF/MDF) documentation first describes and details the primary ISP feed into the building (MDF). The documentation also shows how the MDF splits out and feeds the various IDFs throughout the facility. Most often, and IDF will provide network service to a floor or department. This documentation would not provide any information on the ports in the patch panels.
What does Inventory management entail?
Inventory management deals with the identification, tagging, allocation, and placement of the major physical pieces of equipment with which the network is built. Routers, switches, hubs, wireless access points, and high-end NICS are among the items that are often tracked in an inventory management system. Inventory management would give detailed device information but would not contain information on the ports in a patch panel.
Your company’s network experienced some recent performance issues that you resolved with a lot of effort. After resolving the problem, you decide to start monitoring network performance. You have selected the network performance tool that you will use. What must you do first?
A) Determine where the bottlenecks are.
B) Capture the baselines.
C) Examine the logs to determine where to deploy the tool.
D) Measure the current available bandwidth.
Once you have selected the network performance tool, you need to capture the network performance baselines. These baselines will act as a basis of comparison. Baselines should be captured at different times. Network utilization will be much higher during peak usage times. If you do not capture the appropriate baselines, you may not realize when actual performance issues arise.
What is the purpose of graphing?
For the Network+ exam, you need to analyze metrics and reports from monitoring and tracking performance tools. This includes graphing and link status. Graphing will provide an easy way to determine trends. This helps in forecasting when needs will reach the point where an upgrade may be necessary. For example, graphing trends may show a 10% increase in bandwidth usage every six months. If trends continue, it may be necessary to upgrade the network to a faster cabling. For link status, you need to read the documentation that accompanies any network device to ensure that you can properly interpret lights on the network devices. “High utilizations threshold exceeded on r01: current value 9624161.18” is an example of an interface link status message.
You need to determine the reliability of a network segment. Which of the following would help you?
A) Packet drops
B) Error rate
C) Utilization
D) Bandwidth
Error rate is a metric that can be used to tool to indicate the reliability of the network. A segment with a high error rate would be less reliable than a segment with a low error rate. The error rate is usually expressed as a percentage.
What happens when Packet Drops?
Packet drops occur when a data package transmitted from one device fails to reach another device, measured as packet loss. Packet loss can be measured with the ping utility. If you add “-n 100” at the end of a ping command, as in ping www.somesite.com –n 100, you will end up with a report that tells you the percentage of packet loss.
What does Utilization mean?
Utilization is a measurement of how much of the capacity of the network is being used. For example, a utilization of 40% would mean that 40% of the total capacity of the network is being used.
Which two guidelines are the best to implement for passwords according to CompTIA guidelines? (Choose 2)
A) Configure passwords to change periodically.
B) Ensure that passwords change rarely or never change.
C) Ensure that passwords are only constructed of only alphanumeric characters.
D) Create passwords that contain at least one symbol.
E) Ensure that passwords are at least 15 characters in length.
Of the choices presented, you should configure passwords to change periodically and create passwords that contain at least one symbol in order to create the strongest passwords. Depending on the security level required, passwords might change once every three months, once per month or once per week. In some very high security situations, such as military and intelligence agencies, passwords are commonly configured to change as often as twice per day. Configuring passwords to change periodically can significantly increase the strength of password security on a network. Passwords should also include alphanumeric characters and at least one symbol, such as the dollar sign ($) character. Whenever creating a password, it is always important to have complexity requirements established. These policies are designed to reduce the threat of password attacks by adding in random characters and numbers that make the password nearly impossible to ever guess.
Passwords should usually be between eight and ten characters in length. A minimum password length of greater than ten characters will force users to create passwords that are too long to be easily remembered. If a user’s password is too long, then the user might record the password and place it where it can be easily found, which can cause a security risk.
Passwords are often victims of brute force or dictionary attacks where attackers attempt to guess passwords. Using complex passwords help prevent these attacks. Both brute force and dictionary attacks are forms of password attacks. Additionally, it is worth noting that brute force attacks can be used to crack both passwords and cryptography. Organizations should also implement account lockout policies to lock accounts after a certain number of invalid login attempts.
Which component of a computer use policy should state that the data stored on a company computer is not guaranteed to remain confidential?
A) information ownership
B) computer ownership
C) acceptable use
D) no expectation of privacy
A no expectation of privacy policy is the component of a computer use policy that should indicate that data stored on a company computer is not guaranteed to remain confidential. A no expectation of privacy policy should also state that data transferred to and from a company network is not guaranteed to remain confidential. Policies must be communicated to personnel as part of end-user awareness. End-user awareness is the responsibility of management and should include training, policies, and procedures to ensure that organizational security is understood by all personnel.
Computer ownership is a component of a computer use policy that indicates that computers are owned by the company and should be used only for company purposes. Information ownership is a component of a computer use policy that states that all information stored on company computers is owned by the company. Acceptable use is a computer use policy, which states the conditions under which company computers should be used.
Which term is used to describe the ability to respond to a single point of failure on a network?
A) Loopback
B) Fault tolerance
C) RAID
D) Clustering
The ability to respond to a single point of failure on a network is called fault tolerance. Fault tolerance on servers involves hardware RAID, UPS systems, power conditioning, backups, and clustering.
Fault tolerance refers to making sure that devices are safe from any kind of problem that might occur with them. It carries with it the ideas of redundancy, backups, clustering, power conditioning, RAID, and UPS systems that can keep computers up and running.
What does Clustering and RAID are associated with?
Clustering and RAID are associated with fault tolerance on servers, rather than fault tolerance on a network.
What does Network fault tolerance help with?
Network fault tolerance amounts to redundancy in both the network gear and the backbone links that connect wiring closets together. The key component for routers, switches, and hubs are redundant parts. Your goal with network gear is to look for single points of failure (SPOFs), and provide redundancy to make sure the network remains up and functional. To ensure a company’s long term health in the event of a disaster, redundancy and offsite backups are two of the best tools to implement.
What does Firewalls do in terms of helping redundancy?
Firewalls are also critical to ensuring redundancy. Establishing multiple firewalls in a network greatly increases security in the event that one is broken as well as can help secure different zones within a network and monitor the traffic sent between them greatly reducing security concerns.
Which of the following types of backups would back up data that has NOT been changed since the last backup?
A) Full backup
B) Incremental backup
C) Differential backup
D) System snapshot
Full backups backup all of the files on a system, regardless of whether the data has been changed or not. While full backups provide the protection in case of a failure, they take the most time and require the most storage resources to accomplish. A full backup resets the archive bit, which is the indicator in file attributes that tells the OS whether or not the file needs to be backed up. When a file is created or modified, the archive bit is “set” or turned on.
What is differential backups?
Differential backups look at the archive bit and back up all data whose archive bit is set. Differential backups do not reset the archive bit. If, for example, a full back up is performed on Sunday, a differential backup performed on Monday night will back up all of Monday’s new files and modifications, without resetting the archive bit. A differential backup performed on Tuesday night will back up all of Monday’s new/modified files as well as all of Tuesday’s new/modified files. Wednesday night’s backup will process changes from Monday, Tuesday and Wednesday. To restore data, the administrator would restore the full backup and the most recent differential backup.
What is Incremental back up?
Incremental backups look at the archive bit and back up all data whose archive bit is set. Unlike differential backups, however, incremental backups reset the archive bit. If, for example, a full back up is performed on Sunday, an incremental backup performed on Monday night will back up all of Monday’s new files and modifications, while resetting the archive bit. An incremental backup performed on Tuesday night will only backup all of Tuesday’s new/modified files and reset the archive bit. Wednesday night’s backup will process Wednesday’s changes and reset the archive bit. To restore data, the administrator would restore the full backup and each of the incremental backups.
What is a snap shot?
Snapshots create a system image at a given point in time. While they can be considered a form of backup, snapshots are not concerned with archive bits and capture the entire system state.
Why is it important to have a best-known state documented for a network?
For the Network+ exam, you will need to understand the importance of restoring network devices after they fail or are compromised. Regardless of what caused a device to crash, organizations should establish a best-known state for a network device that will detail how it has been configured and what patch it is operating on while it is functional. Establishing a best configuration will allow IT teams to detect whether a device is out of compliance and quickly make changes if it is.
You are the network administrator for a healthcare organization. Recently several federal and state government laws have been enacted which will affect network operations. Which change management documentation should record this information?
A) policies
B) regulations
C) baselines
D) procedures
Regulations are governmental guidelines that are written by federal or state agencies based on the laws passed by federal or state government. Regulations are established by entities outside the network owner.
Policies set forth the network rules, including the who, what, and when of the rules. Policies tell what the rules are, who is covered by the rule, and when the rule applies. Procedures set forth the steps that must be taken to enforce the policies, including updating the network drivers. Procedures tell how to achieve the desired results.
What do we consider first when we have performance issues on the network?
Baselines are primarily used to identify performance issues. They are actually performance statistics used for comparative purposes. By establishing a performance baseline, you can ensure that performance issues are identified much easier in the future.
Which option represents the amount of time that a system is expected to be operational over the course of a year?
A) Load balancing
B) Port aggregation
C) High availability
D) NIC teaming
High availability refers to the amount of time that the system is expected to be operational over the course of a year. It is often expressed in nines, as in “5 nines,” which would mean the system is up 99.999% of the time. This translates to about 5 minutes and 15 seconds downtime per year, which may be too much downtime for some organizations.
What is a NIC teaming?
NIC teaming is binding two or more network interface cards (NICs) so they appear as one. If one of the cards fails, the others still carry the traffic. Aggregation is also used for load balancing, and providing increased bandwidth.
What is Port Aggregation?
Port aggregation is binding two or more network ports so they appear as one. If one of the aggregated ports fails, the others still carry the traffic. Aggregation is also used for load balancing, and providing increased bandwidth. While NIC teaming can be thought of as a RAID for NICs, port aggregation can be thought of as a RAID for switch ports. Port aggregation is often associated with flow control. Flow control is the process of managing the rate of data transmissions between two different nodes to prevent a sender from overwhelming a receiver and causing it to freeze up or slow the network down.
You are designing a network for a new facility. The client wishes to provide main connections to several floors from where the ISP service enters the building. On each floor, switches will handle the distribution to end devices. What would be the most helpful for maintaining and documenting those main connections?
A) IDF/MDF documentation
B) Labeling
C) Wiring and port locations
D) Change management documentation
Intermediate Distribution Frame/Main Distribution Frame (IDF/MDF) documentation first describes and details the primary ISP feed into the building, which is handled by the MDF. The documentation also shows how the MDF splits out and feeds the various IDFs throughout the facility. Most often, an IDF will provide network service to a floor or department.
What is change management primarily used for?
Change management documentation primarily applies to software patches, updates, and rollbacks. It is important to document when these events occur, and what the results were. Change management also refers to the documentation, justification, and approval process for major configuration changes, such as the addition of a switch or a storage area network. Change management documentation is not part of any diagram and would not note where ISP service entered a building.
Change management documentation includes system life cycles. A system life cycle is used to help organizations manage and keep track of how various systems are being used. These plans detail the process of designing, implementing, maintaining, and removing various devices, applications, and tools within a network. While a system life cycle may change from organization to organization, they help you track and manage different aspects of a network.
Wiring and port locations should be a critical component of the network documentation. This documentation facilitates troubleshooting connectivity by not only identifying the IP or MAC address where the problem is located, but also the physical location of the problem. Wiring and port location documentation maps the individual network connection to and from each device, not the ISP feed into a building.
Which of the following statements is UNLIKELY to appear in an organization’s safety policies and procedures for its networking equipment?
A) Look for simpler, more approachable alternatives to technician’s manuals online.
B) Wear appropriate safety equipment.
C) Always use insulated tools.
D) Keep all work areas clean, uncluttered, and organized.
E) Exercise caution when working around electrical equipment.
F) Arrange for assistance or lifts when moving heavy equipment.
The essence of stating and practicing proper safety procedures and policies is doing things by the book. Because looking for simpler, more approachable alternatives to technician’s manuals online encourages readers to skip the book quite literally, it is completely at odds with this approach.
Keeping work areas clean, uncluttered and organized not only minimizes the potential for accident or mishaps, it also promotes productivity. It also ensures that confidential information is not left out in the open for prying eyes. This makes it a cornerstone for best safety practice and policy.
Wearing appropriate safety equipment means exercising due diligence in the workplace. It is another best safety practice when working with and around electrical equipment.
Using insulated tools minimizes the risk of shock or injury when working around electrical equipment. It should be automatic for those who work in such environs, but an explicit policy/requirement simply emphasizes how important this is for safety.
Moving heavy equipment always carries a risk of damage to the gear or injury to those who work with it. That is why arranging for assistance, mechanical or from a sufficient number of co-workers is an absolute must.
Electricity is dangerous and can be life-threatening (or -ending). It is absolutely essential to exercise caution when working in or around electrical gear.
You have two Web servers, named WebSrv1 and WebSrv2. You need to configure the Web servers so that they share the Web request load equally. What should you do?
A) Implement an active/active cluster.
B) Implement traffic shaping.
C) Implement Quality of Service (QoS).
D)Implement an active/passive cluster.
You should implement an active/active cluster, also known as a load-balancing cluster. This will ensure that the two Web servers share the Web request load equally.
High availability is an important concern regarding Web servers. Operating Web servers in a cluster environment could improve availability. Providing two identical Web servers would improve availability and provide redundancy.
When should you implement active/passive cluster?
Active//passive known as failover cluster. With active/passive, one of the Web servers handles the Web request load. If the active server fails, then the passive server will take over the Web request load.
What is traffic shaping?
Traffic shaping is a specialized type of Quality of Service (QoS) feature where traffic from each host is monitored. When traffic from the host is too high, packets are then queued. Traffic shaping can also define how much bandwidth can be used by different protocols on the network.
What is redundancy?
Redundancy is the process of adding additional network devices, equipment, and communication mediums within a network. These extra devices ensure that even if one were to fail, there are multiple other devices that can keep the network running while the problem is identified. High availability is designed to keep system running in the event of a disaster. Two additional ways to help ensure redundancy are implementing multiple internet service providers and using diverse pathways. Multiple internet service providers can provide redundancy if one of the providers loses service. Having multiple and diverse pathways within a network can ensure that the network can still function and transmit information in the event that one pathway fails.
You have changed the IP address scheme for two of your company’s networks. In addition, the names of two servers have changed. Which change management documentation should you revise?
A) network baseline
B) logical network diagram
C) wiring schematic
D) physical network diagram
You should only revise the physical network diagram. The physical network diagram includes cable lengths and types, server names, IP addresses, server roles, network equipment locations, and number of network users.
The logical network diagram includes server roles, domain architecture, protocols used, and trust relationships. Server names and IP addresses are not included in the logical network diagram.
What is a wiring schematic?
The wiring schematic emphasizes the flow of the network. It includes equipment symbols and lines that indicate the flow. Changing the IP address scheme and server names will not affect the wiring schematic.
Management has decided to renovate a portion of the office. You have been asked to relocate several computers and other network devices in the renovation area to another part of the building. After relocating the computers and devices, you document the new location. What is the term used to describe the actions you took?
A) baseline
B) SLA
C) NAC
D) asset management
Asset management involves documenting information regarding the company assets, including location, user, IP address, and other information. Asset management is part of the network documentation that must be maintained.
Why is SLA so important?
A service level agreement (SLA) is an agreement from a service provider that details the level of service that will be maintained.
What does NAC do in terms of security?
Network access control (NAC) is a method whereby an organization implements rules for security for devices that connect to the network. The rules include all requirements for any device to connect to the network. If a device is compliant, it is given access to the network. If it is not, it will be quarantined from the rest of the network.
In terms of documentation what does IP address utilization provide?
IP address utilization − You should always track your IP usage, particularly if you implement a network with multiple subnets. Two devices on the same network cannot use the same IP address, even if you implement private IP addresses. Carefully document your IP address usage to ensure communication. Implementing a DHCP server on your network is the best way to do this. At any time, you will be able to view IP address utilization from the DHCP server
In terms of documentation what does vendor documentation provide?
Vendor documentation − Retain all vendor documentation for all devices, including computers. When it comes to configuration management, vendor documentation can aid you in ensuring that you purchase hardware that is compatible with the device or computer. In many cases, vendor documentation can be found online. But this isn’t always the case, especially with older, legacy hardware.
What is On-boarding and Off-boarding procedures of mobile devices?
For the Network+ exam, you also need to understand the on-boarding and off-boarding of mobile devices. Mobile devices are increasingly being used on corporate networks. Companies must consider the impact of these devices and create the appropriate policies for their use. Formal on-boarding procedures should be developed and should include minimum security requirements for the devices. Companies should implement some sort of mobile device management (MDM), which would allow you to manage mobile devices from a central management console. MDM would allow you to on-board and off-board mobile devices quickly and easily.