Chapter 11 Flashcards
Most UNIX and Linux desktop operating systems provide a GUI application for easily viewing and filtering the information in system logs.
T/F
True
The SNMP version 3 protocol introduces authentication, validation, and encryption for messages exchanged between devices and the network management console.
T/F
True
Wireshark or any other monitoring software running on a single computer connected to a switch doesn’t see all the traffic on a network, but only the traffic the switch sends to it, which includes broadcast traffic and traffic specifically addressed to the computer.
T/F
True
Class of Service utilizes 8 levels of priority, and modifies the PCP field in an 802.1Q tag.
T/F
True
You can find out where various logs are kept on some UNIX and Linux systems by viewing the /etc/syslog.conf or /etc/rsyslog.conf files.
T/F
True
Setting a NIC to run in promiscuous mode will allow it to see all network traffic passing through a network switch.
T/F
False
A system with an availability of 99.999% can be down for a maximum of 52 minutes per year.
T/F
False
A RAID 5 configuration requires a minimum of two hard disks to operate.
T/F
False
A brownout is a momentary decrease in voltage; also known as a sag.
T/F
True
A hot site consists of computers, devices, and connectivity necessary to rebuild a network exist, but without appropriate configuration.
T/F
False
When using SNMP with TLS, what port do agents receive requests on?
161
162
10161
10162
10161
At what point is a packet considered to be a giant?
It becomes a giant when it exceeds the medium’s maximum packet size.
It becomes a giant once a VLAN tag is added.
It becomes a giant only when fragmented pieces are reassembled and the packet size is too large.
It becomes a giant when it exceeds 1500 bytes.
It becomes a giant when it exceeds the medium’s maximum packet size.
Packets that are smaller than a medium’s minimum packet size are known by what term below?
runts
ghosts
jabbers
giants
Runts
When a device handles electrical signals improperly, usually resulting from a bad NIC, it is referred to by what term below?
ghost
blabber
talker
jabber
Jabber
When using DiffServ, what type of forwarding utilizes a minimum departure rate from a given node, which is then assigned to each data stream?
scaled forwarding
prioritized forwarding
assured forwarding
expedited forwarding
Expedited Forwarding
What 3-bit field in a 802.1Q tag is modified to set a frame’s Class of Service (CoS)?
Priority Code Point (PCP)
Tag Protocol Identifier (TPID)
EtherType
CRC checksum
Priority Code Point (PCP)