Network Operations (1) Flashcards
Which type of diagram represents a topology or map of how the network looks?
Logical diagram
Physical diagram
Rack diagram
Physical diagram
A physical diagram represents how a network looks, while a logical diagram represents how the traffic flows on the network
Which of the following represents a measurement of how the network behaves under normal conditions?
Baseband
Baseline
IDF
Baseline
A baseline is a log of performance indicators such as CPU usage, network utilization, and other values to give you a picture of your network and servers when they are working correctly
Which shape usually represents a router in networking diagrams?
Circle
Square
Rectangle
Circle
Routers are usually represented as circular objects in networking diagrams
Which of the following concepts combines multiple physical ports on a router or switch into one logical port?
NIC teaming
Clustering
Incremental backup
NIC teaming
NIC teaming, also known by other terms, like port aggregation, combines multiple physical interfaces on a router or switch into one logical interface
Which one of the following sites represents the quickest way for a company to recover from a disaster?
Hot site
Warm site
Cold site
Hot site
A hot site has equipment, data, and links ready to go
Which of the following devices provides only temporary power, to allow devices to shut down properly?
UPS
MTTR
SLA
UPS
A UPS (uninterruptible power supply) is only a temporary provision of power, to allow servers to properly shut down. A power generator is needed for extended power
Nmap is primarily used for
Packet sniffing
Port scanning
Traffic analysis
Port scanning
Nmap is the most popular port scanner in use today
What’s the most popular packet sniffer/protocol analyzer?
Wireshark
Nmap
Nessus
Wireshark
Wireshark is the most popular packet sniffer/protocol analyzer in use todayWireshark is the most popular packet sniffer/protocol analyzer in use today
Which of these is the de facto network management protocol?
SNMP
SMTP
SFTP
SNMP
SNMP (Simple Network Management Protocol) is the de facto network management protocol
Which one of these protocols is not used for VPNs?
IPsec
DTLS
FTPS
FTPS
FTPS is FTP using SSL/TLS, and is not used for VPNs
Which one of these represents a secure CLI remote access protocol?
Telnet
SSH
RDP
SSH
SSH and Telnet use a command-line interface, but only SSH uses encryption. RDP and VNC use a GUI
Which one of these is not used primarily for file transfers?
SFTP
TFTP
HTTP
HTTP
HTTP is primarily used to deliver Web pages and content to browsers, not for uploading and downloading files
Which one of these password recommendations is viable?
Longer is better
Shorter is better
Length does not matter
Longer is better
One of the best ways to strengthen your password, is to make it longer, preventing a brute-force attack
Which of the following prohibits employees from violating the confidentiality of any proprietary and sensitive company-related information?
NDA
AUP
VPN
NDA
A nondisclosure agreement protects the privacy of a network, as those who sign the NDA agree to keep everything confidential
Which of the following defines what is and what is not acceptable to do on an organization’s computers?
NDA
AUP
VPN
AUP
The acceptable use policy clearly differentiates between right and wrong in terms of using a company’s resources