Ensure Network Availability Flashcards
SNMP uses a series of objects to collect information about a managed device.
What is the name of the structure, similar to a database, that contains these
objects?
a. RIB
b. MIB
c. Syslog
d. Baseline
Answer: b. The Management Information Base (MIB) is a database filled with
variables that represent the metrics of the managed network devices.
Which syslog level is the most severe?
a. Informational
b. Critical
c. Errors
d. Warnings
Answer: b. The Critical syslog level is Level 2, the most severe level.
What are the main categories of SNMP message types? (Choose three.)
a. Get
b. Put
c. Set
d. Trap
Answer: a, c, d. The put method is used with HTTP. SNMP uses get, set, and
trap messages—among others.
What Microsoft Windows application enables you to view a variety of log
types, including application, security, and system logs?
a. Event Viewer
b. Performance Monitor
c. Microsoft Management Console
d. Control Panel
Answer: a. Event Viewer is a classic Windows tool that is still used today to
view the log information for the Windows system. It includes application,
security, and system log information.
As you monitor a key area of your network, you discover that the average
latency spans a wide range. You are seeing some periods of 50 ms and others of
300 ms. What is the term for this type of variation in delay?
a. CRC
b. DSCP
c. WRED
d. Jitter
Answer: d. Jitter, which is variation in delay, can be a large problem for VoIP
networks.
Which SNMPv3 security level is the equivalent of SNMPv2c?
a. noAuthNoPriv
b. authPriv
c. authNoPriv
d. noAuthPriv
Answer: a. The noAuthNoPriv security level of SNMPv3 is like the community string approach of SNMPv2c.
What syslog level is used for informational messages?
a. 0
b. 8
c. 7
d. 6
Answer: d. Syslog level 6 is for informational messages. Note that the lowest
level, level 7, is used for debugging messages.
Which network assurance tool would most likely feature the use of a collector?
a. NetFlow
b. SNMP
c. nmap
d. traceroute
Answer: a. NetFlow often uses a flow collector, which can be a single-purpose
device on a network for storing, backing up, and making logs available to the
authorized staff.
Which of the following are reported when packets are larger than 1500 bytes?
a. Encapsulation errors
b. Giants
c. Runts
d. OIDs
Answer: b. Giants are reported when packets are larger than 1500 bytes. Note
that these large packets might be perfectly normal in your enterprise or datacenter.
How can you fix a duplex mismatch?
a. Enable autonegotiation.
b. Change the link state to up.
c. Adjust the protocol and packet byte counts.
d. Reduce the humidity level.
Answer: a. You can fix a duplex mismatch by either enabling autonegotiation
or forcing the same settings on both connecting interfaces.