Chapter 11 Flashcards
Most UNIX and Linux desktop operating systems provide a GUI application for easily viewing and filtering the information in system logs.
True
The SNMP version 3 protocol introduces authentication, validation, and encryption for messages exchanged between devices and the network management console.
True
Wireshark or any other monitoring software running on a single computer connected to a switch doesn’t see all the traffic on a network, but only the traffic the switch sends to it, which includes broadcast traffic and traffic specifically addressed to the computer.
True
Class of Service utilizes 8 levels of priority, and modifies the PCP field in an 802.1Q tag.
True
You can find out where various logs are kept on some UNIX and Linux systems by viewing the /etc/syslog.conf or /etc/rsyslog.conf files.
True
Setting a NIC to run in promiscuous mode will allow it to see all network traffic passing through a network switch.
False
A system with an availability of 99.999% can be down for a maximum of 52 minutes per year.
False
A RAID 5 configuration requires a minimum of two hard disks to operate.
False
A brownout is a momentary decrease in voltage; also known as a sag.
True
A hot site consists of computers, devices, and connectivity necessary to rebuild a network exist, but without appropriate configuration.
False
When using SNMP with TLS, what port do agents receive requests on?
10161
At what point is a packet considered to be a giant?
It becomes a giant when it exceeds the medium’s maximum packet size.
Packets that are smaller than a medium’s minimum packet size are known by what term below?
Runts
When a device handles electrical signals improperly, usually resulting from a bad NIC, it is referred to by what term below?
Jabber
When using DiffServ, what type of forwarding utilizes a minimum departure rate from a given node, which is then assigned to each data stream?
Expedited Forwarding
What 3-bit field in a 802.1Q tag is modified to set a frame’s Class of Service (CoS)?
Priority Code Point (PCP)