Chapter 4 - Network Management Flashcards

1
Q

What does a throughput tester do?

A

page 147

Tests the amount of data that passes in a given period of time in a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What network appliance creates multiple paths for traffic and thereby allow the same session to use multiple physical links?

A

page 140

Load Balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What network appliance makes connection to another location on behalf of the user?

A

page 139

Proxy Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What network appliance is a specialized device that can be configured to allow some types of traffic in or out of a network?

A

page 139

Content filter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What network appliance creates a secure tunnel between two devices using an encryption such as PPTP or L2TP?

A

page 140

VPN Concentrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which hardware tool tests the connectivity of a cable?

A

page 141

cable tester

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What hardware tool makes sure a patch cable is working properly by using a device that tests the network segment?

A

page 141

cable certifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What hardware tool are referred to packet sniffers?

A

page 144

Protocol Analyzers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What hardware tool is used to find breaks in a fiber, copper cable and determine the cable length?

A

page 144
TDR for copper cable
OTDR for Fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Using and Environment Monitor, What is the recommended Temperature, Humidity in the room where servers, router, switches and network equipment are kept?

A

page 146
temperature - 68-75 degrees F
humidity - 50-60%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What types of throughput testers take into account the overhead mechanisms built into the protocol such as acknowledgements and TCP window size?

A

page 147
Netops
IxChariot
Ipart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is DIG?

A

page 150
Domain Information Groper
A flexible tool for interrogating DNS servers.
Some administrator choose Dig over nslookup becauuse of its ease of use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does ARP do?

A

page 152
A service that works in the background and resolves IP address to MAC addresses, so packets can be delivered to their destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What tool can you use to display protocol statistics and current TCP/IP connection?

A

page 155

Netstate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What tool can you use on Windows to setup static routes?

A

page 156

Route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What might you want to consider as the defacto standard for logging.
Especially if you are using Linux or Unix

A

page 160

Syslog, allows you to collect information about the operation of many different devices and application package.

17
Q

What are system logs used for?

A

page 160

To determine what services are available to the users

18
Q

What are history logs used for?

A

page 160

To keep track of events that have already happened and changes that have already been made to a system.

19
Q

What is the process of intercepting and examining messages in order to deduce information from patterns in communications?

A

page 160

Traffic Analysis

20
Q

What is Traffic Shaping?

A

page 166

  • Is controlling computer network traffic to optimize performance and/or reduce latency.
  • Slows down traffic flow that don’t need all the bandwidth
  • Speeds up traffic flow that need the bandwidth
  • Uses bandwidth throttling
21
Q

What is CARP?

A

page 167
Common Address Redundancy Protocol
Use to reduce the effect of a computer failing while providing a critical service

22
Q

What is the basic principle of cache?

A

page 166
To store the resources that a device or a user needs to enable them to perform a task much faster in later attempts than the first time the task was performed.

23
Q

What is defined as the time delay between the moment when a process is initiated and the moment when one of its effects become detectable?

A

page 167

Latency Sensitivity