Domain 3: Network Operations Flashcards
Which of the following is the term usually applied to a representation of network devices, automatically compiled, and containing information such as IP addresses and connection speeds?
A. Network map
B. Network diagram
C. Cable diagram
D. Management information base
A. Network map
A network map is a depiction of network devices, not drawn to scale, with additional information added, such as IP addresses and link speeds. In most cases, network maps are automatically created by a software product, such as Nmap, that scans the network and creates a display from the information it discovers.
Which of the following types of network documentation is often overlaid on an architectural drawing or blueprint?
A. Network map
B. Network diagram
C. Cable diagram
D. Management information base
C. Cable diagram
A cable diagram is a precise depiction of the cable runs installed in a site. Often drawn on an architect’s plan or blueprint, the cable diagram enables network administrators to locate specific cables and troubleshoot connectivity problems.
Which of the following is not one of the typical heights for devices mounted in IT equipment racks?
A. 1 unit
B. 2 units
C. 3 units
D. 4 units
C. 3 units
Devices designed to fit into IT equipment racks typically have heights measured in units. One unit equals 1.75 inches. Most rack-mounted devices are one (1U), two (2U), or four units (4U) tall.
The cable plant for your company network was installed several years ago by an outside contractor. Now, some of the paper labels have fallen off your patch panels, and you do not know which wall plate is connected to each port. Assuming that you are working on a properly maintained and documented network installation, which of the following is the easiest way to determine which port is connected to which wall plate?
A. Consult the cable diagram provided by the cabling contractor at the time of the installation.
B. Call the cable installation contractor and see if he or she can remember which ports go with which wall plates.
C. Attach a tone generator to a patch panel port and then test each wall plate with a locator until you find the correct one. Repeat for each port that needs labeling.
D. Use a cable certifier to locate the patch panel port associated with each wall plate port.
A. Consult the cable diagram provided by the cabling contractor at the time of the installation.
A reputable cable installer should supply a cable diagram that indicates the locations of all the cable runs on a plan or blueprint of the site. You should be able to use this to determine which ports go with which wall plates. A busy cable installer is unlikely to remember specific details about an installation performed years ago.
Which of the following IT asset management documents published by the International Organization for Standardization (ISO) defines a standard for software identification tags (SWIDs) containing inventory information about the software running on a computer or other device?
A. ISO 19770-1
B. ISO 19770-2
C. ISO 19770-3
D. ISO 19770-4
E. ISO 19770-5
B. ISO 19770-2
ISO 19770 is a family of IT asset management (ITAM) standards that defines procedures and technology for the management of software and related assets in a corporate infrastructure. ISO 19770-2 defines the creation and use of SWID tags, which are XML files containing management and identification information about a specific software product. The other standards define other ITAM elements, such as compliance with corporate governance (ISO 19770-1) and resource utilization measurement (ISO 19770-4).
A rack diagram is typically ruled vertically using which of the following measurements?
A. Inches
B. Centimeters
C. Units
D. Grids
C. Units
Rack diagrams use vertical measurement called units, each of which is 1.75 inches. Most rack-mounted devices are one (1U), two (2U), or four units (4U) tall.
In a standard Cisco network diagram, what component does the symbol in the figure represent?
A. A switch
B. A router
C. A hub
D. A gateway
A. A switch
The diagram symbol shown in the figure represents a network switch. It is not a router, a hub, or a gateway.
A diagram of a telecommunications room or intermediate distribution frame (IDF) for an office building is typically based on which of the following?
A. A hand-drawn sketch
B. A series of photographs
C. An architect’s plan
D. A 3D model
C. An architect’s plan
IDF diagrams should be based on an architect’s plan whenever possible so that actual lengths and locations of cable runs can be documented. In situations where an architect’s plan is not available, a detailed sketch, drawn to scale, can be acceptable. Photographs and models are impractical for this purpose.
Which of the following, originally created for the UNIX sendmail program, is now a standard for message logging that enables tools that generate, store, and analyze log information to work together?
A. Syslog
B. Netmon
C. Netstat
D. Top
A. Syslog
Syslog is a standard designed to facilitate the transmission of log entries generated by a device or process, such as the sendmail SMTP server, across an IP network to a message collector, called a syslog server.
At what point in the installation process should patch panel ports and wall plates be labeled?
A. When the patch panels and wall plates are installed
B. When a length of cable is cut from the spool
C. When the cables are attached to the connectors
D. When the cable runs are tested, immediately after their installation
C. When the cables are attached to the connectors
Patch panel ports and wall plates should be labeled when the cable runs are attached to them. Labeling them at any earlier time can result in cable runs being connected incorrectly.
Which of the following is the term used to describe a wiring nexus that typically is the termination point for incoming telephone and wide area network (WAN) services?
A. MDF
B. MTBF
C. IDF
D. RDP
A. MDF
A large enterprise network will—at minimum—have demarcation points for telephone services and a connection to an Internet service provider’s network. In many cases, these services will enter the building in the same equipment room that houses the backbone switch. This room is then called the main distribution frame (MDF).
A rack diagram is typically ruled into vertical rack units, which are standard-sized divisions that hardware manufacturers use when manufacturing rack-mountable components. Which of the following is the standard vertical height of a single rack unit?
A. 1.721 inches
B. 1.75 inches
C. 40 mm
D. 3.5 inches
B. 1.75 inches
A single rack unit is 1.75 inches, or 44.5 mm. Option A, 1.721 inches, is the height used for many components that are one rack unit tall, leaving a small space between components for easy insertion and removal.
Which of the following log types is the first place that an administrator should look for information about a server’s activities?
A. System log
B. Setup log
C. Application log
D. Security log
A. System log
System logs document the server’s startup activities and the ongoing status of its services and device drivers and services. When a problem occurs or the server’s status changes, the system logs can provide information about what happened and when.
Which of the following Windows applications would you most likely use to create a baseline of system or network performance?
A. Performance Monitor
B. Event Viewer
C. Syslog
D. Network Monitor
A. Performance Monitor
Performance Monitor is a Windows application that can create logs of specific system and network performance statistics over extended periods. Such a log created on a new computer can function as a baseline for future troubleshooting.
Which of the following IT asset management documents published by the International Organization for Standardization (ISO) provides an overview of the ITAM concepts discussed in the ISO 19770 family of standards?
A. ISO 19770-1
B. ISO 19770-2
C. ISO 19770-3
D. ISO 19770-4
E. ISO 19770-5
E. ISO 19770-5
ISO 19770 is a family of IT asset management (ITAM) standards that defines procedures and technology for the management of software and related assets in a corporate infrastructure. ISO 19770-5 provides a general overview of the functions provided by the standards and their benefits to an IT infrastructure.
The other standards define other ITAM elements, such as compliance with corporate governance (ISO 19770-1), creation and use of software ID (SWID) tags (ISO 19770-2), and resource utilization measurement (ISO 19770-4).
A rack-mounted device that is four units tall will be approximately what height in inches?
A. 1.75
B. 3.5
C. 4
D. 7
D. 7
The standard unit height for IT equipment racks is 1.75 inches, which is the equivalent of one unit. Four units would therefore be 7 inches.
Which of the following types of documentation should indicate the complete route of every internal cable run from wall plate to patch panel?
A. Physical network diagram
B. Asset management
C. Logical network diagram
D. Wiring schematic
D. Wiring schematic
The main purpose of a wiring schematic is to indicate where cables are located in walls and ceilings. A physical network diagram identifies all of the physical devices and how they connect together. Asset management is the identification, documentation, and tracking of all network assets, including computers, routers, switches, and so on. A logical network diagram contains addresses, firewall configurations, access control lists, and other logical elements of the network configuration.
In a standard Cisco network diagram, what component does the symbol in the figure represent?
A. A switch
B. A router
C. A hub
D. A gateway
B. A router
The diagram symbol shown in the figure represents a network router. It is not a switch, a hub, or a gateway.
Which of the following is the term used to describe a wiring nexus—typically housed in a closet—where horizontal networks meet the backbone?
A. MDF
B. MTBF
C. IDF
D. SLA
C. IDF
An intermediate distribution frame (IDF) is the location of localized telecommunications equipment such as the interface between a horizontal network, which connects to workstations and other user devices, and the network backbone.
Which of the following event logs on a Windows server can record information about both successful and failed access attempts?
A. System
B. Application
C. Security
D. Setup
C. Security
When you enable audit policies on Windows systems, you can specify whether to audit successful or failed events (or both), including access attempts. This audit information is recorded in the Security event log. The System, Application, and Setup events logs typically do not record both successful and failed access attempts.
What is the width of a standard equipment rack in a datacenter?
A. 12 inches
B. 16 inches
C. 19 inches
D. 24 inches
C. 19 inches
The standard width of an equipment rack in a data center is 19 inches. Network hardware manufacturers use this width when designing rack-mountable components.
When a service fails to start on a Windows server, an entry is typically created in which of the following event logs?
A. Application
B. Security
C. Setup
D. System
D. System
On a Windows system, information about services, including successful service starts and failures, is recorded in the System event log. The Application, Security, and Setup logs typically do not contain this type of information.
In a standard Cisco network diagram, what component does the symbol in the figure represent?
A. A switch
B. A router
C. A hub
D. A gateway
C. A hub
The diagram symbol shown in the figure represents a network hub. It is not a switch, a router, or a gateway.
The precise locations of devices in a datacenter are typically documented in which of the following documents?
A. Rack diagram
B. Network map
C. Wiring schematic
D. Logical diagram
A. Rack diagram
Datacenters typically mount components in racks, 19-inch-wide and approximately 6-foot-tall frameworks in which many networking components are specifically designed to fit. A rack diagram is a depiction of one or more racks, ruled out in standardized 1.752-inch rack units, and showing the exact location of each piece of equipment mounted in the rack. Network maps, wiring schematics, and logical diagrams are documents that document the relationships between components, not their precise locations.
Which of the following statements about network maps is true?
A. Network maps are typically drawn to scale.
B. Network maps typically contain more information than network diagrams.
C. Network maps must be read/write accessible to all personnel working on the network.
D. Network maps diagram only the locations of cable runs and endpoints.
B. Network maps typically contain more information than network diagrams.
Network diagrams typically specify device types and connections, but network maps can also include IP addresses, link speeds, and other information. Network maps diagram the relationships between devices, and provide information about the links that connect them, but they are not drawn to scale and usually do not indicate the exact location of each device. Although universal accessibility would be desirable, there are individuals who should not have access to network maps and other documentation, including temporary employees and computer users not involved in IT work. A network maps include all networking devices, not just cable runs and endpoints.
Which of the following RAID levels uses disk striping with distributed parity?
A. RAID 0
B. RAID 1
C. RAID 5
D. RAID 10
C. RAID 5
Redundant Array of Independent Disks (RAID) is a technology for storing data on multiple hard disk drives, providing fault tolerance, increased performance, or both. The various RAID levels provide different levels of functionality and have different hardware requirements. RAID 5 combines disk striping (blocks written to each disk in turn) with distributed storage of parity information, for fault tolerance. RAID 0 provides data striping only. RAID 1 provides disk mirroring. RAID 10 creates mirrored stripe sets.
While negotiating a new contract with a service provider, you have reached a disagreement over the contracted reliability of the service. The provider is willing to guarantee that the service will be available 99 percent, but you have been told to require 99.9 percent. When you finally reach an agreement, the negotiated language will be included in which of the following documents?
A. SLA
B. AUP
C. NDA
D. BYOD
A. SLA
A service level agreement (SLA) is a contract between a provider and a subscriber that specifies the percentage of time that the contracted services are available.
A server with dual power supplies must be running in which of the following modes for the system to be fault tolerant?
A. Combined mode
B. Redundant mode
C. Individual mode
D. Hot backup mode
B. Redundant mode
A server with dual power supplies can run in one of two modes: redundant or combined. In redundant mode, both power supplies are capable of providing 100 percent of the power needed by the server. Therefore, the server can continue to run if one power supply fails, making it fault tolerant. In combined mode, both power supplies are needed to provide the server’s needs, so a failure of one power supply will bring the server down. Individual mode and hot backup mode are not terms used for this purpose.
Redundant power circuits can enable a server to continue running in spite of which of the following events?
A. A citywide power outage
B. A server power supply failure
C. An uncorrected building circuit failure
D. A failure of the server’s uninterruptable power supply
C. An uncorrected building circuit failure
If a server is connected to two building circuits, it can continue to function if the breaker for one circuit trips and remains uncorrected. All of the other scenarios will bring the server down, unless additional redundancies are in place.
Installing an electrical generator for your datacenter is an example of which of the following fault tolerance concepts?
A. Uninterruptible power supply (UPS)
B. Power redundancy
C. Dual power supplies
D. Redundant circuits
B. Power redundancy
Power redundancy is a general term describing any fault tolerance mechanism that enables equipment to continue functioning when one source of power fails. A UPS is a device that uses battery power, not a generator. The term dual power supplies refers to the power supply units inside a computer, not a separate generator. The term redundant circuits refers to multiple connections to the building’s main power, not to a generator.
Which of the following is not a fault tolerance mechanism?
A. Port aggregation
B. Clustering
C. MTBF
D. UPS
C. MTBF
Mean Time Between Failures (MTBF) is a hardware specification used to predict the approximate lifetime of a component. It does not refer to any type of fault tolerance mechanism. Port aggregation, clustering, and uninterruptible power supplies (UPSs) are all mechanisms that provide fault tolerance in the event of network adapter, server, and power failures, respectively.
Which of the following backup job types does not reset the archive bits of the files it backs up?
A. Full
B. Incremental
C. Differential
D. Supplemental
C. Differential
Differential backups use the archive bit to determine which target files to back up. However, a differential backup does not reset the archive bit. Full backups do not pay attention to the archive bit because they back up all of the files. A full backup, however, does clear the archive bit after the job is completed. Incremental backups also use the archive bit to determine which files have changed since the previous backup job. The primary difference between an incremental and a differential job, however, is that incremental backups clear the archive bit so that unchanged files are not backed up. There is no such thing as a supplemental backup job.
Which of the following RAID levels does not provide fault tolerance?
A. RAID 0
B. RAID 1
C. RAID 5
D. RAID 10
A. RAID 0
Redundant Array of Independent Disks (RAID) is a technology for storing data on multiple hard disk drives, providing fault tolerance, increased performance, or both. The various RAID levels provide different levels of functionality and have different hardware requirements. RAID 0 uses data striping only (blocks written to each disk in turn), which does not provide any form of fault tolerance.
Which of the following is the criterion most commonly used to filter files for backup jobs?
A. Filename
B. File extension
C. File attributes
D. File size
C. File attributes
The archive bit that backup software uses to perform incremental and differential jobs is a file attribute, so this is the most commonly used filter type. It is possible to filter files based on their names, their extensions, and their size, but these are not used as often as the archive file attribute.
What are the three elements in the Grandfather-Father-Son media rotation system?
A. Hard disk drives, optical drives, and magnetic tape drives
B. Incremental, differential, and full backup jobs
C. Monthly, weekly, and daily backup jobs
D. QIC, DAT, and DLT tape drives
C. Monthly, weekly, and daily backup jobs
The generational media rotation system uses the terms grandfather, father, and son to refer to backup jobs that are run monthly, weekly, and daily. The jobs can be full, incremental, or differential, and the terms have nothing to do with whether the backup medium is a hard disk, optical, or any type of tape drive.
You are installing a new Windows server with two hard disk drives in it, and you want to use RAID to create a fault-tolerant storage system. Which of the following RAID levels can you configure the server to use?
A. RAID 0
B. RAID 1
C. RAID 5
D. RAID 10
B. RAID 1
RAID 1 provides disk mirroring for fault tolerance and requires two or more disk drives. RAID 0 provides data striping only, with no fault tolerance. RAID 5 combines disk striping (blocks written to each disk in turn) with distributed storage of parity information for fault tolerance, but it requires a minimum of three disk drives. RAID 10 creates mirrored stripe sets and requires at least four disk drives.
Which of the following media types is Windows Server Backup unable to use to store backed-up data?
A. Local hard disks
B. Local optical disks
C. Magnetic tape drives
D. Remote shared folders
C. Magnetic tape drives
Windows Server Backup cannot back up data to magnetic tape drives. However, it can back up to local hard disks, optical disks, and remote shares.
Which of the following is not a type of server load balancing mechanism?
A. DNS round-robin
B. Network address translation
C. Content switching
D. Multilayer switching
B. Network address translation
Load balancing is a method of distributing incoming traffic among multiple servers. Network address translation (NAT) is a routing mechanism that enables computers on a private network to share one or more public IP addresses. It is therefore not a load balancing method. DNS round-robin, multilayer switching, and content switching are all mechanisms that enable a server cluster to share client traffic.
Which of the following mechanisms for load balancing web servers is able to read the incoming HTTP and HTTPS requests and perform advanced functions based on the information they contain?
A. Content switches
B. Multilayer switches
C. Failover clustering
D. DNS round-robin
A. Content switches
A content switch is an application layer device, which is what renders it capable of reading the incoming Hypertext Transfer Protocol (HTTP/HTTPS) messages. HTTP is an application layer protocol. Multilayer switches do not operate above the transport layer. Failover clustering and DNS round-robin are both techniques for distributing incoming traffic with actually processing it.
Why does performing incremental backups to a hard drive, rather than a tape drive, make it possible to restore a server with a single job, rather than multiple jobs?
A. Because hard drives hold more data than tape drives
B. Because hard drives can transfer data faster than tape drives
C. Because hard drives are random access devices and tape drives are not
D. Because hard drives use a different block size than tape drives
C. Because hard drives are random access devices and tape drives are not
Data is stored on tape drives in a linear fashion. Once you write backup data to a tape, you cannot selectively replace individual files. When you perform a restore job, you might have to restore the most recent full backup, followed by incremental backups, which overwrite some of the full backup files with newer ones. Hard disk drives are random access devices, meaning that individual files can be written to and read from any location on the disk. When you perform incremental backup jobs to a hard disk, the software can restore data using any version of each file that is available. Data capacity, transfer speed, and block size are not relevant.
Which of the following are valid reasons why online uninterruptible power supplies (UPSs) are more expensive than standby UPSs?
A. Online UPSs enable devices to run longer when a main power failure occurs.
B. Online UPSs enable devices to run continuously when a main power failure occurs.
C. Online UPSs are managed devices that can generate alerts.
D. Online UPSs provide greater protection against power spikes and sags.
B. Online UPSs enable devices to run continuously when a main power failure occurs.
Online UPSs run devices from the battery all the time, while simultaneously keeping the battery charged. There is therefore no switchover gap when a power failure occurs. Online UPSs do not necessarily run longer than standby UPSs, nor do they provide more protection again power spikes and sags. Both online and standby UPSs can be managed devices.
Which of the following statements best describes the difference between the fault tolerance mechanisms disk mirroring and disk duplexing?
A. Disk mirroring enables a server to survive the failure of a disk drive.
B. Disk duplexing enables a server to survive the failure of a disk controller.
C. Disk duplexing enables a server to survive a failure of a disk drive or a disk controller.
D. Disk duplexing enables a server to survive a failure of a disk drive or a disk controller.
C. Disk duplexing enables a server to survive a failure of a disk drive or a disk controller.
As with disk mirroring, disk duplexing uses multiple hard disk drives to store duplicate copies of all data. However, disk duplexing calls for each disk to be connected to a separate controller so that the data remains available despite a disk failure or a controller failure.
A network load balancing cluster is made up of multiple computers that function as a single entity. Which of the following terms is used to describe an individual computer in a load balancing cluster?
A. Node
B. Host
C. Server
D. Box
A. Node
In a network load balancing cluster, each computer is referred to as a host. Other types of clusters use other terms. For example, in a failover cluster, each computer is called a node.
If you back up your network by performing a full backup every Wednesday at 6:00 p.m. and differential backups in the evening on the other six days of the week, how many jobs would be needed to completely restore a computer with a hard drive that failed on a Tuesday at noon?
A. One
B. Two
C. Six
D. Seven
B. Two
A differential backup is a job that backs up all the files that have changed since the last full backup. Therefore, to restore a system that failed on Tuesday at noon, you would have to restore the most recent full backup from the previous Wednesday and the most recent differential from Monday.
Which of the following is an element of high availability systems that enables them to automatically detect problems and react to them?
A. Backups
B. Snapshots
C. Failover
D. Cold sites
C. Failover
Highly available systems often have redundant components that enable them to continue operating even after a failure of a hard disk, server, or other component. Backups, snapshots, and cold sites can all contribute to a system’s high availability, but they do not function automatically.
Which of the following disaster recovery mechanisms can be made operational in the least amount of time?
A. A cold site
B. A warm site
C. A hot site
D. All of the options are the same.
C. A hot site
Cold, warm, and hot backup sites differ in the hardware and software they have installed. A cold site is just a space at a remote location. The hardware and software must be procured and installed before the network can be restored. It is therefore the least expensive and takes the most time. A warm site has hardware in place that must be installed and configured. A hot site has all of the necessary hardware installed and configured. A warm site is more expensive than a cold site, and a hot site is the most expensive and takes the least amount of time to be made operational.
Which of the following terms defines how long it will take to restore a server from backups if a complete system failure occurs?
A. RPO
B. RTO
C. BCP
D. MIB
B. RTO
The recovery time objective (RTO) specifies the amount of time needed to restore a server from the most recent backup if it should fail. This time interval depends on the amount of data involved and the speed of the backup medium.
If you back up your network by performing a full backup every Wednesday at 6:00 p.m. and incremental backups in the evening of the other days of the week, how many jobs would be needed to completely restore a computer with a hard drive that failed on a Monday at noon?
A. One
B. Two
C. Five
D. Six
C. Five
An incremental backup is a job that backs up all of the files that have changed since the last backup of any kind. Therefore, to restore a system that failed on Monday at noon, you would have to restore the most recent full backup from the previous Wednesday and the incrementals from Thursday, Friday, Saturday, and Sunday.
Which of the following elements would you typically not expect to find in a service level agreement (SLA) between an Internet service provider (ISP) and a subscriber?
A. A definition of the services to be provided by the ISP
B. A list of specifications for the equipment to be provided by the ISP
C. The types and schedule for the technical support to be provided by the ISP
D. The types of applications that the subscriber will use when accessing the ISP’s services
D. The types of applications that the subscriber will use when accessing the ISP’s services
An ISP provides subscribers with access to the Internet. The applications that the subscriber uses on the Internet are typically not part of the SLA. An SLA does typically specify exactly what services the ISP will supply, what equipment the ISP will provide, and the technical support services the ISP will furnish as part of the agreement.
How does an autochanger increase the overall storage capacity of a backup solution?
A. By compressing data before it is stored on the medium
B. By automatically inserting media into and removing it from a drive
C. By running a tape drive at half its normal speed
D. By writing two tracks at once onto a magnetic tape
B. By automatically inserting media into and removing it from a drive
An autochanger is a robotic device containing one or more removable media drives, such as magnetic tape or optical disk drives. The robotic mechanism inserts and removes media cartridges automatically so that a backup job can span multiple cartridges, increasing its overall capacity.
For a complete restore of a computer that failed at noon on Tuesday, how many jobs would be needed if you performed full backups to tape at 6:00 a.m. every Wednesday and Saturday and incremental backups to tape at 6:00 a.m. every other day?
A. One
B. Two
C. Three
D. Four
D. Four
An incremental backup is a job that backs up all of the files that have changed since the last backup of any kind. Therefore, to restore a system that failed on Tuesday at noon, you would have to restore the most recent full backup from the previous Saturday and the incrementals from Sunday, Monday, and Tuesday morning.
You have just completed negotiating an annual contract with a provider to furnish your company with cloud services. As part of the contract, the provider has agreed to guarantee that the services will be available 99.9 percent of the time, around the clock, seven days per week. If the services are unavailable more than 0.1 percent of the time, your company is due a price adjustment. Which of the following terms describes this clause of the contract?
A. SLA
B. MTBF
C. AUP
D. MTTR
A. SLA
A service level agreement (SLA) is a contract between a provider and a subscriber that specifies the percentage of time that the contracted services are available.
Which of the following disaster recovery mechanisms is the least expensive to implement?
A. A cold site.
B. A warm site.
C. A hot site.
D. All of the options cost the same.
A. A cold site.
Cold, warm, and hot backup sites differ in the hardware and software they have installed. A cold site is just a space at a remote location. The hardware and software must be procured and installed before the network can be restored. It is therefore the least expensive.
Which of the following statements about port aggregation is not true?
A. All of the aggregated ports use the same MAC address.
B. Port aggregation can be a fault tolerance mechanism.
C. Aggregating ports increases network throughput.
D. Port aggregation provides load balancing.
D. Port aggregation provides load balancing.
Load balancing refers to the distribution of traffic between two or more channels. Port aggregation combines ports into a single logical channel with a single MAC address and provides greater throughput. Port aggregation also provides fault tolerance in the event of a port failure.
Which of the following can be provided by clustering servers?
A. Fault tolerance
B. Load balancing
C. Failover
D. All of the above
D. All of the above
A cluster is a group of computers configured with the same application that function as a single unit. The cluster can function as a fault tolerance mechanism by failing over from one server to the next, when necessary, or provide load balancing by distributing traffic among the servers.
Which of the following specifications would you most want to examine when comparing hard disk models for your new RAID array?
A. MTBF
B. SLA
C. AUP
D. MTTR
A. MTBF
Mean Time Between Failures (MTBF) specifies how long you can expect a device to run before it malfunctions. For a hard disk, this specification indicates the life expectancy of the device.
When you configure NIC teaming on a server with two network adapters in an active/passive configuration, which of the following services is provided?
A. Load balancing
B. Fault tolerance
C. Server clustering
D. Traffic shaping
B. Fault tolerance
NIC teaming enables you to combine the functionality of two network interface cards (NIC) in one connection. However, when you configure a NIC team to use an active/passive configuration, one of the network adapters remains idle and functions as a fault tolerance mechanism. If the other NIC should fail, the passive NIC becomes active. In this configuration, NIC teaming does not provide load balancing, server clustering, or traffic shaping.
Which of the following is not a load balancing mechanism?
A. NIC teaming
B. Server clustering
C. DNS round robin
D. RAID 1
D. RAID 1
Redundant Array of Independent Disks (RAID) level 1 is a fault tolerance mechanism that is also known as disk mirroring. A storage subsystem writes data to two or more disks at the same time so that if a disk fails, the data remains available. Because data is written to the disks at the same time, this RAID level does not provide load balancing.
Which of the following describes the difference between cold, warm, and hot backup sites?
A. Whether the backup site is owned, borrowed, or rented
B. The age of the most recent backup stored at the site
C. The cost of the hardware used at the site
D. The time needed to get the site up and running
D. The time needed to get the site up and running
The temperature refers to the sites readiness to assume the role of the network. A cold site is just a space at a remote location. The hardware and software must be procured and installed before the network can be restored. A warm site has hardware in place that must be installed and configured. It takes less time to restore the network than at a cold site, but more than at a hot site. A hot site has all of the necessary hardware installed and configured. The network can go live as soon as the most recent data is restored.
Which of the following storage techniques prevents version skew from occurring during a system backup?
A. Incrementals
B. Differentials
C. Iterations
D. Snapshots
D. Snapshots
Version skew can occur when a data set changes while a system backup is running. A file written to a directory that has already been backed up will not appear on the backup media, even though the job might still be running. This can result in unprotected files, or worse, data corruption. A snapshot is a read-only copy of a data set taken at a specific moment in time. By creating a snapshot and then backing it up, you can be sure that no data corruption has occurred due to version skew. Incrementals and differentials are types of backup jobs, and iteration is not a specific storage technology.
Which of the following is a term for a read-only copy of a data set made at a specific moment in time?
A. Snapshot
B. Incremental
C. Hot site
D. Differential
A. Snapshot
A snapshot is a read-only copy of a data set taken at a specific moment in time. By creating a snapshot and then backing it up, you can be sure that no data corruption has occurred due to version skew. A hot site is an alternative network location in which all hardware and software is installed and ready. Incrementals and differentials are types of backup jobs.