Lesson 14 Flashcards

1
Q

Topic A

A

Topic A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

To efficiently manage your network you must be able to do what

A

Monitor it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Network management involves which functions

A

Operations
Administration
Maintenance
Provisioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is network operations

A

Procedures that allow for the smooth running of the network and monitoring to spot problems as they arise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is network administration

A

Keeping track of the assignment and utilization of devices on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What in network maintenance

A

Repairing and upgrading network components to ensure optimally functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is network provisioning

A

assign resources to support a service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the goal of network mgmt

A

To make operations more efficient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Network quality includes

A

Reliability and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are some of the specific requirements relating to services

A

Bandwidth
Connections
Others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SNMP

A

Simple Network Management Protocol

Layer 7 Protocol

Collects information about network devices

Used for Diagnostics and Maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SNMP has how many components

A

Management system (SNMP Manager)

Agent software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SNMP agents are installed on what

A

Servers
Routers
printers to name a few

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does the SNMP manager do

A

Notifies admins

Take corrective action

Store information for review

Queries agents about specific devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

MIBs

A

Management Information Base

Describes the structure of the management dataof a sub sytem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

OIBs

A

Object Identifier

Identifies a variable that can be read or set via SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Name the SNMP operations

A

Get - REquest to retrieve the value of a variable or list of variable

Trap - enables an agent to notify the management station of significant events by way of unsolicited SNMP message

Walk - essentially a GET operation performed on the MIB node that has child nodes or column nodes. It performs the OID walk through the child nodes or column nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which is the safest version of SNMP

A

V3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Describe the SNMP versions

A

V1 - developed 1988

V2 - developed 1993 and added serveral protocol operations and initiatil security measures

V3 developed 2002 Added security and remote configuaration capabilities. Addfed authentication privacy and access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which SNMP version added Authentication, privacy and access control

A

V3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which port does SNMP use

A

UDP 161 and 162

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What captures and analyzes traffic, creates logs ad alerts admins

A

Network monitoring tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are some things network monitoring tools can look for

A

Congestion

Constructing baselines

Determine upgrade needs

Generate reports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Name some network monitoring tools

A
LAN monitor
QoS monitor
Bandwith monitor
WAN monitor
SIEM monitor
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Throughput tester

A

Measures throughouot and capacity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which tool sends large packets from a source to destination to determine the time it takes to transmit

A

Throughput tester

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which tools measures connectivity

A

Ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Name the different ping tools

A
Ping
Path Ping
Tracert
Netstat
Wireshark
Nagios
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are the categories of network monitoring tools

A

Status
Traffic
Route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What are some status monitoring tools

A

Ping

nsloookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Name a traffic monitoring tool

A

ping

iptrace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is a route monitoring tool

A

tracert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Network Traffic Analysis

A

s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Network Diagnostics

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

System Performance Monitors

A

Monitors state of services/daemons, processes and resources

Tracks one or more counters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which monitor watches services /daemons/resources

A

System Performance Monitors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Name some counters monitored by system performance monitors

A

Bandwidth counters

Storage counter

Network device CPU counter

Network device memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Can system monitoring tools monitor NIC status

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Describe the Syslog

A

Process of logging messages or data logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is a log file

A

REcord of actions and events performed on an operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Which file do you need to look at if you want to assess the operating system

A

Log file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What are the types of log files

A

System
General
History

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

System log files

A

Predetermined by the OS and are a record of events logged by the OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

General log files

A

Contains information about device changes, installation/uninstallation of device drivers and any other system changes

45
Q

History log files

A
  • Types of log
  • The event of the occurrence
  • The name of the user who was logged on at the time of the event
  • Keywords
  • What category the event belongs to
46
Q

Describe a network analyzer

A

Packet or protocol analyzer or packet sniffer

Hardware or software

Intercepts/Logs/Analyzes data and packets across the network

ID ports

47
Q

Can network analyzer be used on LANs and DSL

A

Yes

48
Q

What is log management

A

Process of dealing with computer log messages

Can be used to monitor network health and troubleshoot issues

49
Q

Log management Tools

A

give you more control and options for filtering and managing logs

50
Q

Fault Tolerance

A

ability of a device to withstand a foreseeable component failure and continue to provide an acceptable level of service

51
Q

Name some fault tolerance measures

A

Power
Disks and storage
Network components

52
Q

Describe Alerts

A

notification that sent to a preconfigured user

Alert conditions are configurable

53
Q

Power monitoring tools

A

Monitors the power that supplies the network

54
Q

What is DCIM

A

Data Center Infrastructure Management

Extends traditional data center management functions

Includes physical assets and resources found in the facilities and IT Domains

55
Q

Rack monitoring

A

sensors to monitor the ambient conditions in a rack system

Temp
Humidity

56
Q

Interface monitoring

A

Feature usually built into a switch router or server

Usually monitors TX/RX/Packet errors/Link Status

57
Q

Wireless Analyzers

A

Used to analyze the physical aspects of wireless networks

Includes:
Spectrum analysis
Finding WAPs
Reporting SSIDs
Channel Usage 
Signal strength
Noise Sources
58
Q

Wireless Heat Maps

A

Coverage maps

Red = good coverage
Blue = bad coverage
59
Q

Topic B

A

Topic B

60
Q

What are the three types of configurations

A

Static
Running
Planned

61
Q

Describe configuration management

A

focuses on maintaining a database of the hardware and software components on a network

62
Q

Admins should have access to these types of documents

A
Network diagrams
Device Information 
Utilization Statistics
Policies and procedures
Graphing 
Vendor docmentation
63
Q

Physical Network Diagram

A

Graphical representation of gthe location of all network devices and endpoints and depicts their connection with one another

Does not show the exact location of devices

64
Q

Which diagram depicts routers switches servers workstations firewall WAPs cable mgmt. info and CSUDSU units

A

Physical Network diagram

65
Q

Describe a wiring diagram

A

Combination of a floor plan and a physical network topology diagram

66
Q

Logical Network Diagram

A

Documents the protocols and application that control the flow of network traffic

Shows IP addresses, FQDN, Server application type, Trust relationship[s and routing topology

67
Q

What is Asset Management

A

Policies about financial and contractual specifications of all the hardware and software components in the inventory

68
Q

Critical Hardware Inventory is

A

Provides insurance documentation and helps determine what you need to rebuild the network

Standard Workstations
Specialty Workstations
Basic servers
Connectivity hardware
Backup hardware
69
Q

Critical Software Inventory is

A

Provides insurance documentation and helps determine what you need to rebuild the network

Operating System Software 
Productivity and Application Software
Maintenance Utilities
Backup Documentation
Overall Asset Inventory
70
Q

What is a network policy

A

Formalized statement that defines network functions and expectations for users, mgmt. and IT personnel

71
Q

Name the types of a network policy

A

Policy Statement
Standards
Guidelines
Procedures

72
Q

Outlines the plan for individual components

A

Policy statement

73
Q

Defines how to measure the level of adherence to the policy

A

Standard

74
Q

Suggestion, recommendations or best practices for how to meet the policy standard

A

Guideline

75
Q

Step by Step instructions

A

Procedures

76
Q

Legal issues affect which groups

A

Employees
Customers
Business Partners

77
Q

Name the common business document to consider for the networek

A

SLA
MOU
MLA
SOW

78
Q

SOW

A

Statement of Work

79
Q

MLA

A

Master Liciense Agreement

80
Q

MOU

A

Memorandum of Understanding

81
Q

SLA

A

Service Level Agreement

82
Q

Network baseline is

A

Performance statistics under normal operating conditions

83
Q

Describe steps in the change management process

A
  • Identify the problem
  • Document the rationale for the change
  • Create a change request
  • Work through the approval process
  • Plan the change
  • Implement the change
  • Document
84
Q

Topic C

A

Topic C

85
Q

QoS

A

Quality of Service is a set of parameters that controls the quality provided todifferent types of network traffic

86
Q

What are the QoS parameters

A

Max delay

Signal Loss

Noise

Bandwidth Priority

CPU usage

87
Q

Are QoS parameters agreed to by the TX (ISP) and RX (Subscriber)ends

A

Yes and this is documented in a SLA

88
Q

The QoS SLA defines

A

Parameters

Remedial Measures

Penalties

89
Q

Are FTP and Telnet sensitive to packet loss

A

Yes

90
Q

Are FTP and Telnet tolerant to data delays

A

Yes

91
Q

Name some QoS parameters

A
Bandwidth
Latency
Jitter
Packet Loss
Echoes
92
Q

Latency Sensitivity

A

Being sensitive to packets being delayed during transmission

n

93
Q

Name some Latency sensitive applications

A

VOIP
Video Teleconferencing
Real Time Applications

94
Q

What tricks can be used to reduce latency and add efficiency

A

QoS
Load Balancing
Traffic Shaping
Caching

95
Q

What is traffic shaping

A

Mechanism in QoS for introducing some amount of delay in traffic that exceeds an administratively defined rate

It smooths down traffic bursts

Traffic is buffered and released after a specific time interval

96
Q

Does traffic shaping drop packets

A

No

97
Q

Where is traffic shaping implemented

A

On the outbound interface of a device

98
Q

Where is traffic policing implemented

A

Both outbound and inbound interfaces

99
Q

What is traffic policing

A

governing/regulating the packet flow within standards and limits

100
Q

What happens to packets not conforming to the SLA

A

They are dropped or marked to a lower precedent

101
Q

Packet shaper

A

aka Traffic shaper is the mechanism that enable traffic shaping

Delays metered traffic by using algorithms

102
Q

Load Balancing

A

dividing work amongst devices on the network

103
Q

Are load balancers stand alone devices

A

Yes

104
Q

CARP

A

Common Address Redundancy Protocol

Allows a number of devices to be grouped together to use a single virtual NIC

105
Q

High Availability

A

Rating that expresses how closely devices approach the goal of providing dat availability

Five nines
(99.999%)

106
Q

Caching Engines

A

Application or service that stores or indexes data in order to provide faster responses to requests

107
Q

High Bandwidth Applications

A

software that needs a lot of bandwidth

VOIP
HDTV
Real Time Video
Multimedia

108
Q

What can effect QoS implementation

A

Packet classification

Policing

Resource Allocation`

109
Q

Completed

A

Completed