Management, Monitoring and Optimization Flashcards

1
Q

UTP cables use which type of connector?

RJ-11

RJ-25

RJ-45

A

RJ-45

UTP cables use an RJ-45 connector. RJ-11 and RJ-25 are often used for terminating telephone lines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which type of cable will have the pins in the same order on both connectors?

Crossover cable

Straight-through cable

Console cable

A

Straight-through cable

Straight-through cables, known as drop cables or patch cables, will have the pins in the same order on both connectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which pins are switched in a crossover cable?

1 and 2, 3 and 4

1 and 3, 2 and 6

2 and 4, 5 and 7

A

1 and 3, 2 and 6

On a crossover cable, one connector has flipped the wires. Specifically, pins 1 and 3 get switched, and pins 2 and 6 get switched

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

UTP cable has specific colors for the wire associated with each pin. Based on the TIA/EIA 568B wiring standard, what is the correct color order, starting with pin 1?

White/Orange, Orange, Blue, White/Green, White/Blue, Green, White/Brown, Brown

Orange, White/Orange, White/Green, Blue, White/Blue, White/Brown, Brown, Green

White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown

A

White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown

If you are going to make your own UTP cables (drop/patch cables) to customize length, you need to make sure that the right wires get to the right pins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the technical term for what happens when two objects of dissimilar charge come in contact?

RFI

EMI

ESD

A

ESD

Electrostatic discharge (ESD) is the technical term for what happens when two objects of dissimilar charge come in contact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following govern how the network is configured and operated as well as how people are expected to behave on the network?

Baselines

Laws

Policies

A

Policies

Policies govern how the network is configured and operated as well as how people are expected to behave on the network, such as how users are able to access resources and which types of employees get network access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You have upgraded the firmware on your switches and access points. What documentation do you need to update?

Baselines and configuration documentation

Physical network diagram

Logical network diagram

A

Baselines and configuration documentation

A physical network diagram contains all the physical devices and connectivity paths on your network and should accurately picture how your network physically fits together in detail. This document will also have the firmware revision on all the switches and access points in your network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In an ICS, which of the following uses coded signals over communication channels to acquire information about the status of the remote equipment?

ICS server

Telemetry system

Human interface

A

ICS server

An ICS server, also called a data acquisition server, uses coded signals over communication channels to acquire information about the status of the remote equipment for display or for recording functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Load testing, connectivity testing, and throughput testing are all examples of what?

Load balancing

Network monitoring

Packet sniffing

A

Network monitoring

Network monitoring can have several names, including load testing, connectivity testing, and throughput testing. You will also hear network monitors referred to as protocol analyzers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What can provide different priority levels to different applications, data flows, or users to help guarantee performance levels?

1 Gbps connection

Bandwidth

Quality of Service

A

Quality of Service

QoS provides different priority levels to different applications, data flows, or users so that they can be guaranteed a certain performance level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following identifies steps to recover from adverse effects caused by a change?

Rollback process

Approvable process

Notification process

A

Rollback process

Those making the changes should be completely briefed in rollback procedures, and they should exhibit a clear understanding of them prior to implementing the changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

After a change has been made, which of the following is not a document that needs to be updated?

Network configurations

Additions to the network

Physical location changes

All of the above

A

All of the above

The job isn’t complete until the paperwork is complete. In this case, network configurations, additions to the network, and physical location changes should be updated to reflect the changed state of the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following provides increased availability to firewalls and gateways?

DHCP

CARP

SaaS

A

CARP

Common Address Redundancy Protocol (CARP) can be used to increase availability of gateways and firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You have added a new cable segment to your network. You need to make sure you document this for troubleshooting purposes. What should you update?

The disaster recovery plan

The wiring schematics

The router connections document

A

The wiring schematics

If you add a new cable segment to the network, you need to update the wiring schematics document

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the basic purpose of QoS? (Choose two.)

Block access to certain websites

Make your entire network run faster

Provide priority to one or more types of traffic over others

Block access to web resources for just certain users or groups

Prioritize delay-sensitive traffic

A

Provide priority to one or more types of traffic over others

Prioritize delay-sensitive traffic

Quality of service (QoS) is basically the ability to provide different priority to one or more types of traffic over other levels for different applications, data flows, or users so that they can be guaranteed a certain performance level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which network-performance optimization technique can delay packets that meet certain criteria to guarantee usable bandwidth for other applications?

Traffic shaping

Jitter

Logical

A

Traffic shaping

Traffic shaping, also known as packet shaping, is a form of bandwidth optimization. It delays packets that meet a certain criteria to guarantee usable bandwidth for other applications. Essentially, with traffic shaping, you’re delaying some traffic so other traffic can get through. Traffic shaping uses bandwidth throttling to ensure that certain data streams don’t send too much data in a specified period of time

17
Q

Which of the following is neither a virtualization component nor a service made available through virtualization?

Virtual servers

SaaS

CARP

A

CARP

Common Address Redundancy Protocol (CARP) can be used to increase availability of gateways and firewalls. It is not related to virtualization

18
Q

Which of the following are reasons to optimize network performance? (Choose all that apply.)

Maximizing uptime

Minimizing latency

Using VoIP

Using video applications

None of the above

A

Maximizing uptime

Minimizing latency

Using VoIP

Using video applications

There are many bandwidth-intensive programs, like VoIP and video streaming. These are just a few of the reasons it’s necessary to try to optimize network performance

19
Q

What term describes technologies that can deliver voice communications over the Internet?

Jitter

Uptime

Voice over Internet Protocol

A

Voice over Internet Protocol

Voice over Internet Protocol (VoIP) is a general term that describes several technologies that are able to deliver voice communications over the Internet or other data networks

20
Q

To optimize performance on your network, which of the following control traffic in some way? (Choose all that apply.)

QoS

Traffic shaping

Load balancing

Caching services

None of the above

A

QoS

Traffic shaping

Load balancing

Caching services

There are many theories and strategies you can apply to optimize performance on your network. All of them deal with controlling the traffic in some way. Strategies include QoS, traffic shaping, load balancing, high availability, and the use of caching servers. You want to ensure that you have plenty of bandwidth available for those applications that need it, such as critical service operations, VoIP, and real-time multimedia streaming