Chapter 20 - Management, Monitoring, and Optimization Flashcards

1
Q

UTP cables use which type of connector?

A. RJ-11

B. RJ-25

C. RJ-45

D. BNC

A
  1. C. UTP cables use an RJ-45 connector. RJ-11 and RJ-25 are often used for terminating telephone lines.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which type of cable will have the pins in the same order on both connectors?

A. Crossover cable

B. Straight-through cable

C. Console cable

D. Telephone cable

A
  1. B. Straight-through cables, known as drop cables or patch cables, will have the pins in the same order on both connectors.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which pins are switched in a crossover cable?

A. 1 and 2, 3 and 4

B. 1 and 3, 2 and 6

C. 2 and 4, 5 and 7

D. 1 and 4, 5 and 8

A
  1. B. On a crossover cable, one connector has flipped the wires. Specifically, pins 1 and 3 get switched, and pins 2 and 6 get switched.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

UTP cable has specific colors for the wire associated with each pin. Based on the TIA/EIA 568B wiring standard, what is the correct color order, starting with pin 1?

A. White/Orange, Orange, Blue, White/Green, White/Blue, Green, White/Brown, Brown

B. Orange, White/Orange, White/Green, Blue, White/Blue, White/Brown, Brown, Green

C. White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown

D. White/Green, Green, White/Orange, Blue, White/Blue, Orange, White/Brown, Brown

A
  1. C. If you are going to make your own UTP cables (drop/patch cables) to customize length, you need to make sure that the right wires get to the right pins.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the technical term for what happens when two objects of dissimilar charge come in contact?

A. RFI

B. EMI

C. ESD

D. Crosstalk

A
  1. C. Electrostatic discharge (ESD) is the technical term for what happens when two objects of dissimilar charge come in contact.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following govern how the network is configured and operated as well as how people are expected to behave on the network?

A. Baselines

B. Laws

C. Policies

D. Procedures

A
  1. C. Policies govern how the network is configured and operated as well as how people are expected to behave on the network, such as how users are able to access resources and which types of employees get network access.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You have upgraded the firmware on your switches and access points. What documentation do you need to update?

A. Baselines and configuration documentation

B. Physical network diagram

C. Logical network diagram

D. Wiring schematics

A
  1. A. A physical network diagram contains all the physical devices and connectivity paths on your network and should accurately picture how your network physically fits together in detail. This document will also have the firmware revision on all the switches and access points in your network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In an ICS, which of the following uses coded signals over communication channels to acquire information about the status of the remote equipment?

A. ICS server

B. Telemetry system

C. Human interface

D. PLC

A
  1. A. An ICS server, also called a data acquisition server, uses coded signals over communication channels to acquire information about the status of the remote equipment for display or for recording functions.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Load testing, connectivity testing, and throughput testing are all examples of what?

A. Load balancing

B. Network monitoring

C. Packet sniffing

D. Traffic shaping

A
  1. B. Network monitoring can have several names, including load testing, connectivity testing, and throughput testing. You will also hear network monitors referred to as protocol analyzers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What can provide different priority levels to different applications, data flows, or users to help guarantee performance levels?

A. 1 Gbps connection

B. Bandwidth

C. Uptime

D. Quality of Service

A
  1. D. QoS provides different priority levels to different applications, data flows, or users so that they can be guaranteed a certain performance level.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following identifies steps to recover from adverse effects caused by a change?

A. Rollback process

B. Approvable process

C. Notification process

D. Impact assessment

A
  1. A. Those making the changes should be completely briefed in rollback procedures, and they should exhibit a clear understanding of them prior to implementing the changes.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

After a change has been made, which of the following is not a document that needs to be updated?

A. Network configurations

B. Additions to the network

C. Physical location changes

D. All of the above

A
  1. D. The job isn’t complete until the paperwork is complete. In this case, network configurations, additions to the network, and physical location changes should be updated to reflect the changed state of the network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following provides increased availability to firewalls and gateways?

A. DHCP

B. CARP

C. SaaS

D. NaaS

A
  1. B. Common Address Redundancy Protocol (CARP) can be used to increase availability of gateways and firewalls.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You have added a new cable segment to your network. You need to make sure you document this for troubleshooting purposes. What should you update?

A. The disaster recovery plan

B. The wiring schematics

C. The router connections document

D. The baseline document

A
  1. B. If you add a new cable segment to the network, you need to update the wiring schematics document.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the basic purpose of QoS? (Choose two.)

A. Block access to certain websites

B. Make your entire network run faster

C. Provide priority to one or more types of traffic over others

D. Block access to web resources for just certain users or groups

E. Prioritize delay-sensitive traffic

A
  1. C, E. Quality of service (QoS) is basically the ability to provide different priority to one or more types of traffic over other levels for different applications, data flows, or users so that they can be guaranteed a certain performance level.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which network-performance optimization technique can delay packets that meet certain criteria to guarantee usable bandwidth for other applications?

A. Traffic shaping

B. Jitter

C. Logical

D. Load balancing

A
  1. A. Traffic shaping, also known as packet shaping, is a form of bandwidth optimization. It delays packets that meet a certain criteria to guarantee usable bandwidth for other applications. Essentially, with traffic shaping, you’re delaying some traffic so other traffic can get through. Traffic shaping uses bandwidth throttling to ensure that certain data streams don’t send too much data in a specified period of time.
17
Q

Which of the following is neither a virtualization component nor a service made available through virtualization?

A. Virtual servers

B. SaaS

C. CARP

D. Virtual switches

A
  1. C. Common Address Redundancy Protocol (CARP) can be used to increase availability of gateways and firewalls. It is not related to virtualization.
18
Q

Which of the following are reasons to optimize network performance? (Choose all that apply.)

A. Maximizing uptime

B. Minimizing latency

C. Using VoIP

D. Using video applications

E. None of the above

A
  1. A, B, C, D. There are many bandwidth-intensive programs, like VoIP and video streaming. These are just a few of the reasons it’s necessary to try to optimize network performance.
19
Q

What term describes technologies that can deliver voice communications over the Internet?

A. Jitter

B. Uptime

C. Voice over Internet Protocol

D. None of the above

A
  1. C. Voice over Internet Protocol (VoIP) is a general term that describes several technologies that are able to deliver voice communications over the Internet or other data networks.
20
Q

To optimize performance on your network, which of the following control traffic in some way? (Choose all that apply.)

A. QoS

B. Traffic shaping

C. Load balancing

D. Caching services

E. None of the above

A
  1. A, B, C, D. There are many theories and strategies you can apply to optimize performance on your network. All of them deal with controlling the traffic in some way. Strategies include QoS, traffic shaping, load balancing, high availability, and the use of caching servers. You want to ensure that you have plenty of bandwidth available for those applications that need it, such as critical service operations, VoIP, and real-time multimedia streaming.