Ensure Network Availability Flashcards

1
Q

SNMP uses a series of objects to collect information about a managed device.
What is the name of the structure, similar to a database, that contains these
objects?
a. RIB
b. MIB
c. Syslog
d. Baseline

A

Answer: b. The Management Information Base (MIB) is a database filled with
variables that represent the metrics of the managed network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which syslog level is the most severe?
a. Informational
b. Critical
c. Errors
d. Warnings

A

Answer: b. The Critical syslog level is Level 2, the most severe level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the main categories of SNMP message types? (Choose three.)
a. Get
b. Put
c. Set
d. Trap

A

Answer: a, c, d. The put method is used with HTTP. SNMP uses get, set, and
trap messages—among others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What Microsoft Windows application enables you to view a variety of log
types, including application, security, and system logs?
a. Event Viewer
b. Performance Monitor
c. Microsoft Management Console
d. Control Panel

A

Answer: a. Event Viewer is a classic Windows tool that is still used today to
view the log information for the Windows system. It includes application,
security, and system log information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

As you monitor a key area of your network, you discover that the average
latency spans a wide range. You are seeing some periods of 50 ms and others of
300 ms. What is the term for this type of variation in delay?
a. CRC
b. DSCP
c. WRED
d. Jitter

A

Answer: d. Jitter, which is variation in delay, can be a large problem for VoIP
networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which SNMPv3 security level is the equivalent of SNMPv2c?
a. noAuthNoPriv
b. authPriv
c. authNoPriv
d. noAuthPriv

A

Answer: a. The noAuthNoPriv security level of SNMPv3 is like the community string approach of SNMPv2c.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What syslog level is used for informational messages?
a. 0
b. 8
c. 7
d. 6

A

Answer: d. Syslog level 6 is for informational messages. Note that the lowest
level, level 7, is used for debugging messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which network assurance tool would most likely feature the use of a collector?
a. NetFlow
b. SNMP
c. nmap
d. traceroute

A

Answer: a. NetFlow often uses a flow collector, which can be a single-purpose
device on a network for storing, backing up, and making logs available to the
authorized staff.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following are reported when packets are larger than 1500 bytes?
a. Encapsulation errors
b. Giants
c. Runts
d. OIDs

A

Answer: b. Giants are reported when packets are larger than 1500 bytes. Note
that these large packets might be perfectly normal in your enterprise or datacenter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can you fix a duplex mismatch?
a. Enable autonegotiation.
b. Change the link state to up.
c. Adjust the protocol and packet byte counts.
d. Reduce the humidity level.

A

Answer: a. You can fix a duplex mismatch by either enabling autonegotiation
or forcing the same settings on both connecting interfaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly