Network Monitoring Flashcards

1
Q

There are tools that show interface statistics or Status on the following:

A

Link State
Speed and Duplex factors
Send and Receive Traffic
Cyclic Redundancy Check (CRC) errors
Giants and Runts
Encapsulation errors
Byte Count

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A great monitoring tools are:

A

Zabbix
Grafana
Solar Winds
LibreNMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Giants and Runts refer to the actual_______ _____ in a frame

A

packet size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Networks must be monitored in a number of ways, including:

A

performance, traffic, and environmental

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

this tool allows you to manage and monitor network devices from a single comuter:

A

Simple Network Management Protocol ( SNMP )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_________ are installed on a device to communicate with SNMP

A

Agents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A machine that communicates with a managed device is called a:

A

SNMP Manager and use the following ports for listening,
Unencrypted - UDP 162
Encrypted - TLS 10162

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Network managed devices or agents run on these ports:

A

non-encrypted use - UDP listen on port 161
Encrypted use - TLS listen on port 10161

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

this helps with the communication between the Agent and SNMP manager that’s built into the Agent, like a database:

A

Management Information Base (MIB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This is a standard query within SNMP that consists of an NMS

A

Get

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

this is setup on the managed devices itself

A

Trap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

considered a batch of Gets

A

Walk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

this tool is setup on Linux and is also considered a batch of Gets:

A

SnMPWalk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

There are 3 versions of SNMP

A

SNMP version 1 does not support encryption at all
SNMP version 2 slightly expanded the command set and has encrypt
SNMP version 3 more robust TLS ecryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An ______ _________ is an organization of managed devices

A

SNMP community

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The following are open source NMS for graphing SNMP data:

A

Cacti
Nagios
Zabbix
Spiceworks

16
Q

Where is a place to setup and view logs:

A

Windows - Event Viewer and
Unix systems utilizes SYSlog - standard format / works well with SNMP uses hierarchy of errors, like displays the worst to least problematic
History Logs
Change Logs

17
Q

_____ _______ are a big deal, packets that are coming in and out of network that are clustered or messed up. Abnormal warnings of these might signify security breaches or broken equipment

A

Error rates

18
Q

__________ is basically the monitoring of how your CPU is working, is it being overworked, where and why?

A

Utilization

19
Q

this metric in Network monitoring lets you know when a host, server, or switch is having issues sending and receiving data.

A

Packet Drops

20
Q

This metric is telling us how much data we are actually moving through our throughputs.

A

Bandwidth

21
Q

A specialized metric that lets you know that all of a file was received in the proper sequence.

A

File Integrity

22
Q

_______________ helps identify irregular activity that needs to be investigated.

A

Baselines

23
Q

This actually brings all of the monitoring services into one:

A

Security information and event management (SIEM)

24
Q

When it comes to SIEM we are talking about 2 things:

A

Aggregation - grabbing and storing data ( time synchronization is key)
Normalization - Like when data is kept the same way regarding personal information is documented chronologically logs are also critical / WORM or write once, read many drives.

Correlation - must have alerts, for notifications when something goes bad. Triggering when thresholds are breached

25
Q

Other helpful tools like SIEM that access and correlate across logs to review an event are:

A

Splunk
Arcsight
ELK ( Elasticsearch, Logstash, Kibana)

26
Q

Network troubleshooting theory involves the following:

A

To find the problem, gather information, identify the symptoms of the problem, question the users, and see if there have been changes

Establish the theory of probable cause, use the OSI model to help identify location and problem, and consider future prevention methods.

Test the theory, isolate variables, establish a plan of action, plan out steps, implement, verify, and test.