Chapter 11: Network Performance and Recovery Flashcards
A differential backup covers what data on a system?
It includes data that has changed since the last incremental backup.
It includes data that has changed since the last full backup.
It includes all data every time it is performed.
It includes only data that has changed since the last backup.
It includes data that has changed since the last full backup.
A highly available server is available what percentage of the time?
90%
99%
99.999%
99.99%
99.999%
A snapshot is most similar to which type of backup scheme?
differential backup
full backup
incremental backup
You Answered
versioned backup
incremental backup
At what point is a packet considered to be a giant?
It becomes a giant once a VLAN tag is added.
It becomes a giant when it exceeds 1500 bytes.
It becomes a giant when it exceeds the medium’s maximum packet size.
It becomes a giant only when fragmented pieces are reassembled and the packet size is too large.
It becomes a giant when it exceeds the medium’s maximum packet size
How does a line conditioning UPS protect network equipment?
It reduces fluctuations in incoming voltage.
It protects against electrical surges.
It shields equipment from lightning damage.
It filters line noise from incoming power.
It filters line noise from incoming power.
If you wish to maintain a “4 nines” availability rating, what is the maximum amount of down time you can have per day?
You Answered
14 minutes, 23 seconds
1 minute, 26 seconds
.4 seconds
8 seconds
8 seconds
Once a device has failed, what metric measures the average amount of time to repair?
mean time to repair (MTTR)
mean restoration time (MRT)
mean field replacement time (MFRT)
mean time to restore (MTTR)
mean time to repair (MTTR)
Packets that are smaller than a medium’s minimum packet size are known by what term below?
ghosts
giants
runts
jabbers
runts
The grouping of multiple servers so that they appear as a single device to the rest of the network is known as which term?
load balancing
link aggregating
server overloading
clustering
clustering
What 3-bit field in a 802.1Q tag is modified to set a frame’s Class of Service (CoS)?
Priority Code Point (PCP)
CRC checksum
Tag Protocol Identifier (TPID)
EtherType
Priority Code Point (PCP)
What does the Common Address Redundancy Protocol do?
It allows a pool of computers or interfaces to share the same IP address.
It allows multiple devices to share the same fully qualified domain name.
It allows multiple devices to share hardware resources.
It allows a pool of computers or interfaces to share the same MAC address.
It allows a pool of computers or interfaces to share the same IP address.
What happens when an NMS uses the SNMP walk command?
The NMS walks through a list of given SNMP hosts.
The NMS uses get requests to move through sequential rows in the MIB database.
The NMS sends a request for data to the agent on a managed device.
The NMS requests a list of all active SNMP traps on the system.
The NMS uses get requests to move through sequential rows in the MIB database.
What makes up the first 6 bits of the 8-bit DiffServ field?
Class of Service (CoS)
Differentiated Services Code Point (DSCP)
Forward Error Correction (FEC)
Priority Code Point (PCP)
Differentiated Services Code Point (DSCP)
What statement regarding the use of a network attached storage device is accurate?
A NAS can typically only support RAID-0 configurations.
A NAS can be easily expanded without interrupting service.
A NAS reads and writes from its disks significantly slower than other types of servers.
A NAS does not contain its own file system, rather it relies on the host file system provided by individual clients.
A NAS can be easily expanded without interrupting service.
When Comcast was found to be interfering with BitTorrent traffic, what method was being used?
Comcast used DNS poisoning to prevent clients from talking to other BitTorrent users.
Comcast was interjecting TCP segments with the RST (reset) field set.
Comcast was creating access lists that blocked known BitTorrent trackers.
Comcast used IP spoofing to impersonate other BitTorrent clients, then dropped traffic.
Comcast was interjecting TCP segments with the RST (reset) field set.