Network Operations Flashcards

1
Q

When drawing a router on a network diagram, which is correct?

A square with two sets of arrows

A square with picture inside that looks like the sun

A circle with two sets of arrows perpendicular to each other

A

A circle with two sets of arrows perpendicular to each other

A router is commonly drawn as a circle with two sets of arrows perpendicular to each other, depicting a type of crossroads for packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which document would you create to detail step-by-step instructions to decommission a server from your network?

ISO document

SOP document

Server policy

A

SOP document

The standard operating procedure document details the step-by-step work instructions necessary to decommission a server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which group of people evaluates changes for the network to reduce the possibility of affecting day-to-day operations?

Network operations

Executive committee

Change advisory board

A

Change advisory board

The change advisory board reviews changes proposed for the network so that they do not affect day-to-day operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When labeling cable in a switch closet, which statement is a best practice?

The label should have the name of the workstation.

The label should be labeled from the least specific to the most specific location.

The label should be labeled from the most specific to the least specific location.

A

The label should be labeled from the least specific to the most specific location.

When labeling cable in the switch closet, the label should depict the least specific location, such as a building, to the most specific location, such as the outlet number. Workstation names and purposes can change over time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why should performance baselines be captured over a long period of time?

To define normal operations and activity

To define a historical representation of activity

To help validate when a problem is solved

All of the above

A

All of the above

Performance baselines gathered over time help create a historical representation of activity and normal operations. When a server is performing poorly, the baseline can validate both the problem and implemented solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which type of software helps assist in tracking IT inventory?

Asset management software

Life-cycle management software

Accounting software

A

Asset management software

Asset management software assists in tracking IT inventory, such as network equipment and other fixed tangible assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Configuring a group of disks with RAID level 5 is an example of which availability concept?

Fault tolerance

High availability

Clustering

A

Fault tolerance

Configuring a group of disks with RAID level 5 striping with parity is an example of fault tolerance, because redundancy of resources is used to ensure operations in the event of failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You have a high demand of normal requests on the company’s web server. Which strategy should be implemented to avoid issues if demand becomes too high?

Port aggregation

Fault tolerance

Load balancing

A

Load balancing

Load balancing should be implemented with two or more web servers to scale out the servers and lower demand on any one single web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which type of recovery is the least expensive to maintain over time?

Cold site recovery

Warm site recovery

Hot site recovery

A

Cold site recovery

A cold site is the least expensive to maintain over time, because very little or no hardware is at the site. If a disaster occurs, it will take time to acquire hardware and configure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A recovery from tape will take 4 hours; what is this an example of?

The recovery point objective (RPO)

The recovery time objective (RTO)

Grandfather, father, son (GFS) rotation

A

The recovery time objective (RTO)

The recovery time objective (RTO) is a measurement of how fast you can recover from data loss from backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You are the network administrator for your organization. Backup windows are starting to extend into work shifts. You have been asked to recommend a better strategy; what will speed up backups to shorten the window?

Disk-to-tape backups

Disk-to-disk backups

Full backups

A

Disk-to-disk backups

Disk-to-disk backups will speed up any backup, since the backup is coming off disks and being backed up to disks. Although GFS rotations may speed up end-of-week and end-of-month backups, it is considered a rotation strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which backup job will back up files with the archive bit set and then reset the archive bit for the next backup?

Archive backup

Differential backup

Incremental backup

A

Incremental backup

An incremental backup will only back up files that have the archive bit set. After backing up the files, the archive bit is reset for the next backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You are contracting with a new service provider and are reviewing their service level agreement (SLA). The SLA states that their commitment to uptime is 99.99 percent. What is the expected downtime per year?

  1. 65 days
  2. 76 hours
  3. 56 minutes
A

52.56 minutes

An SLA of 4 nines is 52.56 minutes per year of expected downtime. This equates to 4.38 minutes per month that the service can be down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You are the network administrator for your organization. You have been tasked to aggregate bandwidth of two 1 Gbps ports between a Cisco switch and an HP switch. Which protocol should you choose to complete the task?

LACP

802.1q

PAgP

A

LACP

Link Aggregation Control Protocol (LACP) is an open standard control protocol used for aggregation of ports between non-Cisco switches. Non-Cisco switches will not support the Cisco proprietary protocol of Port Aggregation Protocol (PAgP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which type of uninterruptable power supplies (UPS), often found in datacenters, provides constant power from the battery-powered inverter circuit?

Line interactive UPS

Standby UPS

Online UPS

A

Online UPS

An online UPS uses the AC power for the rectifier/charging circuit that maintains a charge for the batteries. The batteries then supply the inverter with a constant DC power source. The inverter converts the DC power source back into an AC power circuit again that supplies the load

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which type of backup is used for grandfather, father, son (GFS) rotations?

Copy backup

Full backup

Differential backup

A

Full backup

A full backup is used for grandfather, father, son (GFS) rotations. GFS rotations help to maintain a lengthy RPO by keeping fewer backups using daily, weekly, and monthly backups

17
Q

You need to design a patch management strategy for your organization. The majority of your clients are Microsoft Windows clients. What should you recommend as a patch management solution?

MSCS

MSBA

WSUS

A

WSUS

The Microsoft Windows Server Update Services (WSUS) helps facilitate the updating of Microsoft clients and servers

18
Q

You need to capture network packets for analysis of a problem; which tool allows you to capture network packets?

Wireshark

Nmap

SCCM

A

Wireshark

Wireshark is a common open source packet capture tool used in networks for analysis of problems

19
Q

Which high availability protocol is an open standard?

HSRP

NTFS

VRRP

A

VRRP

Virtual Router Redundancy Protocol (VRRP) is an open standard protocol that is used for high availability of default gateways

20
Q

You are using a network management station (NMS) to collect data for network devices. What must be loaded before you can capture data from the network devices via the Simple Network Management Protocol (SNMP)?

OID

MIB

Traps

A

MIB

Before an NMS can collect SNMP statistics, the management information base (MIB) from the manufacturer must be loaded

21
Q

Which remote access technology uses encryption by default?

FTPS

TFTP

SFTP

A

SFTP

By default the SSH File Transfer Protocol (SFTP) uses public-private key pairs to provide encryption for the remote access session

22
Q

Which policy would you create to define the minimum specification if an employee wanted to use their own device for email?

MDM

AUP

BYOD

A

BYOD

A bring your own device (BYOD) policy defines the minimum specifications for an employee’s device used for work-related access. The mobile device management (MDM) software would usually dictate these specifications

23
Q

A co-worker was replacing a toner cartridge in a printer, and toner has accidentally gotten in his eye. Which document should be consulted for prompt treatment?

MSDS

MSDN

Instructions

A

MSDS

The material safety data sheet (MSDS) details how materials should be stored, fire safety of materials, and emergency information

24
Q

Which protocol uses a handshake protocol to initiate encryption?

SSL

FTP

TLS

A

TLS

Transport Layer Security (TLS) uses the TLS handshake protocol to initiate encryption