Network Operations (1) Flashcards

1
Q

Which type of diagram represents a topology or map of how the network looks?

Logical diagram

Physical diagram

Rack diagram

A

Physical diagram

A physical diagram represents how a network looks, while a logical diagram represents how the traffic flows on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following represents a measurement of how the network behaves under normal conditions?

Baseband

Baseline

IDF

A

Baseline

A baseline is a log of performance indicators such as CPU usage, network utilization, and other values to give you a picture of your network and servers when they are working correctly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which shape usually represents a router in networking diagrams?

Circle

Square

Rectangle

A

Circle

Routers are usually represented as circular objects in networking diagrams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following concepts combines multiple physical ports on a router or switch into one logical port?

NIC teaming

Clustering

Incremental backup

A

NIC teaming

NIC teaming, also known by other terms, like port aggregation, combines multiple physical interfaces on a router or switch into one logical interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which one of the following sites represents the quickest way for a company to recover from a disaster?

Hot site

Warm site

Cold site

A

Hot site

A hot site has equipment, data, and links ready to go

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following devices provides only temporary power, to allow devices to shut down properly?

UPS

MTTR

SLA

A

UPS

A UPS (uninterruptible power supply) is only a temporary provision of power, to allow servers to properly shut down. A power generator is needed for extended power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Nmap is primarily used for

Packet sniffing

Port scanning

Traffic analysis

A

Port scanning

Nmap is the most popular port scanner in use today

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What’s the most popular packet sniffer/protocol analyzer?

Wireshark

Nmap

Nessus

A

Wireshark

Wireshark is the most popular packet sniffer/protocol analyzer in use todayWireshark is the most popular packet sniffer/protocol analyzer in use today

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of these is the de facto network management protocol?

SNMP

SMTP

SFTP

A

SNMP

SNMP (Simple Network Management Protocol) is the de facto network management protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which one of these protocols is not used for VPNs?

IPsec

DTLS

FTPS

A

FTPS

FTPS is FTP using SSL/TLS, and is not used for VPNs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which one of these represents a secure CLI remote access protocol?

Telnet

SSH

RDP

A

SSH

SSH and Telnet use a command-line interface, but only SSH uses encryption. RDP and VNC use a GUI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which one of these is not used primarily for file transfers?

SFTP

TFTP

HTTP

A

HTTP

HTTP is primarily used to deliver Web pages and content to browsers, not for uploading and downloading files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which one of these password recommendations is viable?

Longer is better

Shorter is better

Length does not matter

A

Longer is better

One of the best ways to strengthen your password, is to make it longer, preventing a brute-force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following prohibits employees from violating the confidentiality of any proprietary and sensitive company-related information?

NDA

AUP

VPN

A

NDA

A nondisclosure agreement protects the privacy of a network, as those who sign the NDA agree to keep everything confidential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following defines what is and what is not acceptable to do on an organization’s computers?

NDA

AUP

VPN

A

AUP

The acceptable use policy clearly differentiates between right and wrong in terms of using a company’s resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly