Chapter 11 Flashcards

1
Q

Most UNIX and Linux desktop operating systems provide a GUI application for easily viewing and filtering the information in system logs.

T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The SNMP version 3 protocol introduces authentication, validation, and encryption for messages exchanged between devices and the network management console.

T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Wireshark or any other monitoring software running on a single computer connected to a switch doesn’t see all the traffic on a network, but only the traffic the switch sends to it, which includes broadcast traffic and traffic specifically addressed to the computer.

T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Class of Service utilizes 8 levels of priority, and modifies the PCP field in an 802.1Q tag.

T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You can find out where various logs are kept on some UNIX and Linux systems by viewing the /etc/syslog.conf or /etc/rsyslog.conf files.

T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Setting a NIC to run in promiscuous mode will allow it to see all network traffic passing through a network switch.

T/F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A system with an availability of 99.999% can be down for a maximum of 52 minutes per year.

T/F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A RAID 5 configuration requires a minimum of two hard disks to operate.

T/F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A brownout is a momentary decrease in voltage; also known as a sag.

T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A hot site consists of computers, devices, and connectivity necessary to rebuild a network exist, but without appropriate configuration.

T/F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When using SNMP with TLS, what port do agents receive requests on?

161

162

10161

10162

A

10161

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

At what point is a packet considered to be a giant?

It becomes a giant when it exceeds the medium’s maximum packet size.

It becomes a giant once a VLAN tag is added.

It becomes a giant only when fragmented pieces are reassembled and the packet size is too large.

It becomes a giant when it exceeds 1500 bytes.

A

It becomes a giant when it exceeds the medium’s maximum packet size.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Packets that are smaller than a medium’s minimum packet size are known by what term below?

runts

ghosts

jabbers

giants

A

Runts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When a device handles electrical signals improperly, usually resulting from a bad NIC, it is referred to by what term below?

ghost

blabber

talker

jabber

A

Jabber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When using DiffServ, what type of forwarding utilizes a minimum departure rate from a given node, which is then assigned to each data stream?

scaled forwarding

prioritized forwarding

assured forwarding

expedited forwarding

A

Expedited Forwarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What 3-bit field in a 802.1Q tag is modified to set a frame’s Class of Service (CoS)?

Priority Code Point (PCP)

Tag Protocol Identifier (TPID)

EtherType

CRC checksum

A

Priority Code Point (PCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A highly available server is available what percentage of the time?

90%

99.99%

99.999%

99%

A

99.999%

18
Q

What happens when an NMS uses the SNMP walk command?

The NMS walks through a list of given SNMP hosts.

The NMS uses get requests to move through sequential rows in the MIB database.

The NMS sends a request for data to the agent on a managed device.

The NMS requests a list of all active SNMP traps on the system.

A

The NMS uses get requests to move through sequential rows in the MIB database.

19
Q

When Comcast was found to be interfering with BitTorrent traffic, what method was being used?

Comcast used IP spoofing to impersonate other BitTorrent clients, then dropped traffic.

Comcast was creating access lists that blocked known BitTorrent trackers.

Comcast used DNS poisoning to prevent clients from talking to other BitTorrent users.

Comcast was interjecting TCP segments with the RST (reset) field set.

A

Comcast was interjecting TCP segments with the RST (reset) field set.

20
Q

What term is used to describe the average amount of time that will pass for a device before a failure is expected to occur?

estimated time to failure (ETTF)

maximum time available (MTA)

product cycle lifetime (PCL)

mean time between failures (MTBF)

A

mean time between failures (MTBF)

21
Q

The Link Aggregation Control Protocol was initially defined by what IEEE standard?

IEEE 802.1cd

IEEE 802.3af

IEEE 802.3bd

IEEE 802.3ad

A

IEEE 802.3ad

22
Q

Which of the following statements describes a RAID 0 configuration?

In a RAID 0, data is striped across multiple disks to improve performance.

In a RAID 0, four or more disks are used to mirror data within each pair of disks, and then striped to multiple pairs of disks.

In a RAID 0, data is mirrored on multiple disks to provide fault tolerance.

In a RAID 0, data is striped across three or more drives, with parity information added to the data.

A

In a RAID 0, data is striped across multiple disks to improve performance.

23
Q

What Storage Area Network (SAN) protocol runs on top of TCP, and can be used on an existing twisted-pair Ethernet network, while maintaining low cost?

InfiniBand (IB)

Internet SCSI (iSCSI)

Fibre Channel (FC)

Fibre Channel over Ethernet (FCoE)

A

Internet SCSI (iSCSI)

24
Q

A differential backup covers what data on a system?

It includes data that has changed since the last incremental backup.

It includes data that has changed since the last full backup.

It includes all data every time it is performed.

It includes only data that has changed since the last backup.

A

It includes data that has changed since the last full backup.

25
Q

Which type of uninterruptible power supply uses AC power to continuously charge its battery, while also providing power to devices through the battery?

line conditioning UPS

online UPS

standby UPS

surge UPS

A

online UPS

26
Q

In planning for disaster recovery, what is the ultimate goal?

The management of damage.

The protection of infrastructure.

The continuation of business.

The preservation of critical data.

A

The continuation of business.

27
Q

How does a line conditioning UPS protect network equipment?

It shields equipment from lightning damage.

It protects against electrical surges.

It reduces fluctuations in incoming voltage.

It filters line noise from incoming power.

A

It filters line noise from incoming power.

28
Q

You are attempting to determine how available your Linux systems are, and need to find the current system uptime. What command should you use?

lastboot

show runtime

display stats

uptime

A

uptime

29
Q

What makes up the first 6 bits of the 8-bit DiffServ field?

Differentiated Services Code Point (DSCP)

Priority Code Point (PCP)

Class of Service (CoS)

Forward Error Correction (FEC)

A

Differentiated Services Code Point (DSCP)

30
Q

A network TAP serves what purpose on a network?

It provides wireless monitoring capabilities, as well as spectrum analysis.

It provides a mirrored port for monitoring traffic between other ports.

It serves as a miniature firewall that can be placed in front of any connection.

It monitors network throughput at a specific point in the network.

A

It provides a mirrored port for monitoring traffic between other ports.

31
Q

When viewing a syslog message, what does a level of 0 indicate?

The message is a warning condition on the system.

The message represents debug information.

The message is an error condition on the system.

The message is an emergency situation on the system.

A

The message is an emergency situation on the system.

32
Q

Each managed object on a managed device using SNMP is assigned which of the following?

process ID

TCP/UDP port

object identifier (OID)

inode number

A

object identifier (OID)

33
Q

Once a device has failed, what metric measures the average amount of time to repair?

mean time to repair (MTTR)

mean time to restore (MTTR)

mean restoration time (MRT)

mean field replacement time (MFRT)

A

mean time to repair (MTTR)

34
Q

What does the Common Address Redundancy Protocol do?

It allows a pool of computers or interfaces to share the same MAC address.

It allows multiple devices to share the same fully qualified domain name.

It allows multiple devices to share hardware resources.

It allows a pool of computers or interfaces to share the same IP address.

A

It allows a pool of computers or interfaces to share the same IP address.

35
Q

The grouping of multiple servers so that they appear as a single device to the rest of the network is known as which term?

server overloading

link aggregating

load balancing

clustering

A

clustering

36
Q

Which type of backup scheme only covers data that has changed since the last backup?

incremental backup

differential backup

full backup

snapshot backup

A

incremental backup

37
Q

What is distributed switching?

It is a single distributed vSwitch that can service VMs across multiple hosts.

It is when multiple physical switches are configured to act as a single switch.

It is a single physical switch that is partitioned in software to perform as multiple switches.

It is multiple switches that provide redundancy switching for all switches in the group.

A

It is a single distributed vSwitch that can service VMs across multiple hosts.

38
Q

If you wish to maintain a “4 nines” availability rating, what is the maximum amount of down time you can have per day?

14 minutes, 23 seconds

.4 seconds

1 minute, 26 seconds

8 seconds

A

8 seconds

39
Q

A snapshot is most similar to which type of backup scheme?

full backup

differential backup

versioned backup

incremental backup

A

incremental backup

40
Q

What statement regarding the use of a network attached storage device is accurate?

A NAS does not contain its own file system, rather it relies on the host file system provided by individual clients.

A NAS reads and writes from its disks significantly slower than other types of servers.

A NAS can typically only support RAID-0 configurations.

A NAS can be easily expanded without interrupting service.

A

A NAS can be easily expanded without interrupting service.