Chapter 11 Flashcards

1
Q

Most UNIX and Linux desktop operating systems provide a GUI application for easily viewing and filtering the information in system logs.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The SNMP version 3 protocol introduces authentication, validation, and encryption for messages exchanged between devices and the network management console.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Wireshark or any other monitoring software running on a single computer connected to a switch doesn’t see all the traffic on a network, but only the traffic the switch sends to it, which includes broadcast traffic and traffic specifically addressed to the computer.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Class of Service utilizes 8 levels of priority, and modifies the PCP field in an 802.1Q tag.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You can find out where various logs are kept on some UNIX and Linux systems by viewing the /etc/syslog.conf or /etc/rsyslog.conf files.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Setting a NIC to run in promiscuous mode will allow it to see all network traffic passing through a network switch.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A system with an availability of 99.999% can be down for a maximum of 52 minutes per year.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A RAID 5 configuration requires a minimum of two hard disks to operate.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A brownout is a momentary decrease in voltage; also known as a sag.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A hot site consists of computers, devices, and connectivity necessary to rebuild a network exist, but without appropriate configuration.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When using SNMP with TLS, what port do agents receive requests on?

A

10161

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

At what point is a packet considered to be a giant?

A

It becomes a giant when it exceeds the medium’s maximum packet size.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Packets that are smaller than a medium’s minimum packet size are known by what term below?

A

Runts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When a device handles electrical signals improperly, usually resulting from a bad NIC, it is referred to by what term below?

A

Jabber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When using DiffServ, what type of forwarding utilizes a minimum departure rate from a given node, which is then assigned to each data stream?

A

Expedited Forwarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What 3-bit field in a 802.1Q tag is modified to set a frame’s Class of Service (CoS)?

A

Priority Code Point (PCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A highly available server is available what percentage of the time?

A

99.999%

18
Q

What happens when an NMS uses the SNMP walk command?

A

The NMS uses get requests to move through sequential rows in the MIB database.

19
Q

When Comcast was found to be interfering with BitTorrent traffic, what method was being used?

A

Comcast was interjecting TCP segments with the RST (reset) field set.

20
Q

What term is used to describe the average amount of time that will pass for a device before a failure is expected to occur?

A

mean time between failures (MTBF)

21
Q

The Link Aggregation Control Protocol was initially defined by what IEEE standard?

A

IEEE 802.3ad

22
Q

Which of the following statements describes a RAID 0 configuration?

A

In a RAID 0, data is striped across multiple disks to improve performance.

23
Q

What Storage Area Network (SAN) protocol runs on top of TCP, and can be used on an existing twisted-pair Ethernet network, while maintaining low cost?

A

Internet SCSI (iSCSI)

24
Q

A differential backup covers what data on a system?

A

It includes data that has changed since the last full backup.

25
Q

Which type of uninterruptible power supply uses AC power to continuously charge its battery, while also providing power to devices through the battery?

A

online UPS

26
Q

In planning for disaster recovery, what is the ultimate goal?

A

The continuation of business.

27
Q

How does a line conditioning UPS protect network equipment?

A

It filters line noise from incoming power.

28
Q

You are attempting to determine how available your Linux systems are, and need to find the current system uptime. What command should you use?

A

uptime

29
Q

What makes up the first 6 bits of the 8-bit DiffServ field?

A

Differentiated Services Code Point (DSCP)

30
Q

A network TAP serves what purpose on a network?

A

It provides a mirrored port for monitoring traffic between other ports.

31
Q

When viewing a syslog message, what does a level of 0 indicate?

A

The message is an emergency situation on the system.

32
Q

Each managed object on a managed device using SNMP is assigned which of the following?

A

object identifier (OID)

33
Q

Once a device has failed, what metric measures the average amount of time to repair?

A

mean time to repair (MTTR)

34
Q

What does the Common Address Redundancy Protocol do?

A

It allows a pool of computers or interfaces to share the same IP address.

35
Q

The grouping of multiple servers so that they appear as a single device to the rest of the network is known as which term?

A

clustering

36
Q

Which type of backup scheme only covers data that has changed since the last backup?

A

incremental backup

37
Q

What is distributed switching?

A

It is a single distributed vSwitch that can service VMs across multiple hosts.

38
Q

If you wish to maintain a “4 nines” availability rating, what is the maximum amount of down time you can have per day?

A

8 seconds

39
Q

A snapshot is most similar to which type of backup scheme?

A

incremental backup

40
Q

What statement regarding the use of a network attached storage device is accurate?

A

A NAS can be easily expanded without interrupting service.