Chapter 11 Flashcards
Most UNIX and Linux desktop operating systems provide a GUI application for easily viewing and filtering the information in system logs.
T/F
True
The SNMP version 3 protocol introduces authentication, validation, and encryption for messages exchanged between devices and the network management console.
T/F
True
Wireshark or any other monitoring software running on a single computer connected to a switch doesn’t see all the traffic on a network, but only the traffic the switch sends to it, which includes broadcast traffic and traffic specifically addressed to the computer.
T/F
True
Class of Service utilizes 8 levels of priority, and modifies the PCP field in an 802.1Q tag.
T/F
True
You can find out where various logs are kept on some UNIX and Linux systems by viewing the /etc/syslog.conf or /etc/rsyslog.conf files.
T/F
True
Setting a NIC to run in promiscuous mode will allow it to see all network traffic passing through a network switch.
T/F
False
A system with an availability of 99.999% can be down for a maximum of 52 minutes per year.
T/F
False
A RAID 5 configuration requires a minimum of two hard disks to operate.
T/F
False
A brownout is a momentary decrease in voltage; also known as a sag.
T/F
True
A hot site consists of computers, devices, and connectivity necessary to rebuild a network exist, but without appropriate configuration.
T/F
False
When using SNMP with TLS, what port do agents receive requests on?
161
162
10161
10162
10161
At what point is a packet considered to be a giant?
It becomes a giant when it exceeds the medium’s maximum packet size.
It becomes a giant once a VLAN tag is added.
It becomes a giant only when fragmented pieces are reassembled and the packet size is too large.
It becomes a giant when it exceeds 1500 bytes.
It becomes a giant when it exceeds the medium’s maximum packet size.
Packets that are smaller than a medium’s minimum packet size are known by what term below?
runts
ghosts
jabbers
giants
Runts
When a device handles electrical signals improperly, usually resulting from a bad NIC, it is referred to by what term below?
ghost
blabber
talker
jabber
Jabber
When using DiffServ, what type of forwarding utilizes a minimum departure rate from a given node, which is then assigned to each data stream?
scaled forwarding
prioritized forwarding
assured forwarding
expedited forwarding
Expedited Forwarding
What 3-bit field in a 802.1Q tag is modified to set a frame’s Class of Service (CoS)?
Priority Code Point (PCP)
Tag Protocol Identifier (TPID)
EtherType
CRC checksum
Priority Code Point (PCP)
A highly available server is available what percentage of the time?
90%
99.99%
99.999%
99%
99.999%
What happens when an NMS uses the SNMP walk command?
The NMS walks through a list of given SNMP hosts.
The NMS uses get requests to move through sequential rows in the MIB database.
The NMS sends a request for data to the agent on a managed device.
The NMS requests a list of all active SNMP traps on the system.
The NMS uses get requests to move through sequential rows in the MIB database.
When Comcast was found to be interfering with BitTorrent traffic, what method was being used?
Comcast used IP spoofing to impersonate other BitTorrent clients, then dropped traffic.
Comcast was creating access lists that blocked known BitTorrent trackers.
Comcast used DNS poisoning to prevent clients from talking to other BitTorrent users.
Comcast was interjecting TCP segments with the RST (reset) field set.
Comcast was interjecting TCP segments with the RST (reset) field set.
What term is used to describe the average amount of time that will pass for a device before a failure is expected to occur?
estimated time to failure (ETTF)
maximum time available (MTA)
product cycle lifetime (PCL)
mean time between failures (MTBF)
mean time between failures (MTBF)
The Link Aggregation Control Protocol was initially defined by what IEEE standard?
IEEE 802.1cd
IEEE 802.3af
IEEE 802.3bd
IEEE 802.3ad
IEEE 802.3ad
Which of the following statements describes a RAID 0 configuration?
In a RAID 0, data is striped across multiple disks to improve performance.
In a RAID 0, four or more disks are used to mirror data within each pair of disks, and then striped to multiple pairs of disks.
In a RAID 0, data is mirrored on multiple disks to provide fault tolerance.
In a RAID 0, data is striped across three or more drives, with parity information added to the data.
In a RAID 0, data is striped across multiple disks to improve performance.
What Storage Area Network (SAN) protocol runs on top of TCP, and can be used on an existing twisted-pair Ethernet network, while maintaining low cost?
InfiniBand (IB)
Internet SCSI (iSCSI)
Fibre Channel (FC)
Fibre Channel over Ethernet (FCoE)
Internet SCSI (iSCSI)
A differential backup covers what data on a system?
It includes data that has changed since the last incremental backup.
It includes data that has changed since the last full backup.
It includes all data every time it is performed.
It includes only data that has changed since the last backup.
It includes data that has changed since the last full backup.