Network Operations Flashcards

1
Q

It is 3 am on a Saturday, and you just received a call from a system administrator that reports multiple network outages across the office network. It is snowing heavily outside, and the roads are inaccessible for you to get to the building to check the configuration of the network devices. What technology should you use to connect to your home office network to troubleshoot the network outages?

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A technician added memory to a router, but the router never recognizes that memory. The router is then powered down, and the technician relocates all of the memory to different modules. On startup, the router does not boot and displays memory errors. Which of the following is the MOST likely cause of this issue?

A

ESD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following provides origin authenticity through source authentication, data integrity through hash functions, and confidentiality through encryption protection for IP packets?

A

IPSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You are trying to connect to a router using SSH to check its configuration. Your attempts to connect to the device over SSH keep failing. You ask another technician to verify that SSH is properly configured, enabled on the router, and allows access from all subnets. She attempts to connect to the router over SSH from her workstation and confirms all the settings are correct. Which of the following steps might you have missed in setting up your SSH client preventing you from connecting to the router?

A

Generate a new SSH key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The UPS that provides backup power to your server is malfunctioning because its internal battery has died. To replace the battery, you must shut down the server, unplug it from the UPS, and unplug the UPS from its power source (the wall outlet). You perform these actions but think that there has to be a better way to increase the server’s availability in the future. Which of the following recommendations would BEST increase the server’s availability based on your experience with the UPS battery replacement?

A

Add a redundant power supply to the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An offsite backup service is involved in an investigation currently. Because of this, they are not recycling outdated tapes. Which of the following is the MOST likely reason for this?

A

A notice of a legal hold

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Susan is a network administrator who is in the process of preparing and cleaning network switches for resale. She splashes the cleaning agent in her eye and needs to know how to cleanse her eye. Where should she look to find the right procedure?

A

MSDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Jason is the network manager and is leading a project to deploy a SAN. He is working with the vendor’s support technician to set up and configure the SAN on the network. To begin SAN I/O optimization, what should Jason need to provide to the vendor support technician?

A

Network disgrams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is a document used in cyber forensics that lists everywhere evidence has been?

A

Chain of custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An administrator reassigns a laptop to a different user in the company. Upon delivering the laptop to the new user, the administrator documents the new location, the device’s user, and when the device was reassigned. Which of the following BEST describes these actions?

A

Asset management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A network administrator is assigned an approved change request with a change window of 120 minutes. After 90 minutes, the change is stuck on step five of a five-step change. The network manager decides to initiate a rollback. Which describes what the network administrator should do next?

A

Return the system back to the original state before the change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When a criminal or government investigation is underway, what describes the identification, recovery, or exchange of electronic information relevant to that investigation?

A

eDiscovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A project manager is tasked with the planning of a new network installation. The customer requires that everything discussed in the meetings is installed and configured when a network engineer arrives onsite. Which document should the project manager provide the customer?

A

Statement of Work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Your router has been turning itself off and on again for a few weeks. You begin to think back to when these issues are occurring and remember that each time it occurs that the lights also become dimmer momentarily. You hook up a device to monitor the power being supplied to the router and identify that brownouts are frequently occurring, resulting in the router’s power cycling. What should you (a network technician) do to solve this problem?

A

Install a UPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A network’s design includes gateways connecting an assembly-line network. The assembly-line network uses specialized cabling and interfaces to allow the assembly-line robots to communicate with one another. Which type of network would you classify this design as?

A

SCADA/ICS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You are configuring a network to utilize SNMPv3 to send information from your network devices back to an SNMP manager. Which of the following SNMP options should you enable to ensure the data is transferred confidentially?

A

authPriv

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

One of the routers in your network just failed. You have been asked to replace it with the same model router from the spare inventory closet as part of an emergency change request. You find the new router in the closet and notice it was signed into inventory 13 months ago. You install the router and attempt to enable HTTPS in the configuration to allow for remote access. The failed router had this capability, but this spare does not, even though they are the same model and were purchased simultaneously. What should you do to enable HTTPS access for this router?

A

Update the firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following is designed to keep the system’s uptime running in the event of a disaster?

A

High availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A network administrator updated an Internet server to evaluate some new features in the current release. A week after the update, the Internet server vendor warns that the latest release may have introduced a new vulnerability, and a patch is not available for it yet. Which of the following should the administrator do to mitigate this risk?

A

Downgrade the sever and defer the new feature testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A client reports that half of the office is unable to access a shared printer on the network. Which of the following should the network technician use to troubleshoot the issue?

A

Network diagrams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Your company has several small branch offices around the country, but you work as a network administrator at the centralized headquarters building. You need the capability of being able to remotely access any of the remote site’s routers to configure them without having to fly to each location in person. Your company’s CIO is worried that allowing remote access could allow an attacker to gain administrative access to the company’s network devices. Which of the following is the MOST secure way to prevent this from occurring while still allowing you to remotely access the devices?

A

Create an out - of - band management network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Your network security manager wants a monthly report of the security posture of all the assets on the network (e.g., workstations, servers, routers, switches, firewalls). The report should include any feature of a system or appliance that is missing a security patch, OS update, or other essential security feature and its risk severity. Which solution would work best to find this data?

A

Vulnerability scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The Chief Information Officer (CIO) wants to improve the security of the company’s data. Which management control should be implemented to ensure employees are using encryption to transmit any sensitive information over the network?

A

Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

After a company rolls out software updates, Ann, a lab researcher, can no longer use the lab equipment connected to her PC. The technician contacts the vendor and determines there is an incompatibility with the latest version of the drivers. Which of the following should the technician perform to get the researcher back to work as quickly as possible?

A

Rollback the drivers to the previous version

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

You are currently troubleshooting a workstation in the office and determined that it is an issue with the cabling somewhere between the workstation and the switch. You have tested the patch cable from the workstation to the wall jack, and it is not faulty. You want to check the port on the switch next. Which of the following would BEST help you identify which switch port is associated with the workstation’s wall jack?

A

Proper labling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A third-party vendor has just released patches to resolve a major vulnerability. There are over 100 critical devices that need to be updated. What action should be taken to ensure the patch is installed with minimal downtime?

A

Deploy the patch in a lab environment, quick conduct testing, and then immediately install it in the production environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Janet is a system administrator who is troubleshooting an issue with a DNS server. She notices that the security logs have filled up and must be cleared from the event viewer. She recalls this being a daily occurrence. Which of the following would BEST resolve this issue?

A

Install an event management tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The Security Operations Center is trying to determine if there are any network anomalies currently being observed. To assist them, you gather information about the current performance of the network. Which of the following should you also gather to compare the current information against?

A

Baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A network technician needs to install a server to authenticate remote users before accessing corporate network resources when working from home. Which kind of server should the network technician implement?

A

RAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which of the following would be the BEST addition to a business continuity plan to protect the business from a catastrophic disaster such as a fire, tornado, or earthquake?

A

Hot sites or cold sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

An additional network segment is urgently needed for QA testing on the external network. A software release could be impacted if this change is not immediate. The request comes directly from management, and there is no time to go through the emergency change management process. Which of the following should the technician do?

A

Make the change, document the requester, and document all network changes

32
Q

Jason wants to use his personal cell phone for work-related purposes. Because of his position, Jason has access to sensitive company data, which might be stored on his cell phone during its usage. The company is concerned about this but believes that it might be acceptable with the proper security controls in place. Which of the following should be done to protect both the company and Jason if they allow him to use his personal cell phone for work-related purposes?

A

Conduct real-time monitoring of the phone’s activity and usage

33
Q

A system administrator wants to verify that external IP addresses cannot collect software versioning from servers on the network. Which of the following should the system administrator do to confirm the network is protected?

A

Analyze packet captures

34
Q

You have just received an email regarding a security issue detected on the company’s standard web browser. Which of the following should you do to fix the issue?

A

Vulnerability patch

35
Q

Which of the following would require the network administrator to schedule a maintenance window?

A

A minor release upgrade of a production router

36
Q

Workers in a company branch office must visit an initial web page and click the “I agree” button before being able to surf the web. Which of the following is this an example of?

A

An AUP

37
Q

A company-wide audit revealed employees are using company laptops and desktops for personal use. To prevent this from occurring, in which document should the company incorporate the phrase “Company-owned IT assets are to be used to perform authorized company business only”?

A

AUP

38
Q

A network engineer is conducting an assessment for a customer who wants to implement an 802.11ac wireless network. What should the engineer reference before estimating the number of WAPs required?

A

Site survey

39
Q

A technician installs a new piece of hardware and now needs to add the device to the network management tool database. However, when adding the device to the tool using SNMP credentials, the tool cannot successfully interpret the results. Which of the following needs to be added to allow the network management tool to interpret the new device and control it using SNMP?

A

MIB

40
Q

You are working for a brand new startup company that allows you to use your own laptop, tablet, or other devices while at work. The company does provide some rules and guidelines that you must follow based on their policy. Which of the following policies should you look at to ensure you understand these rules and guidelines?

A

BYOD

41
Q

Which encryption type MOST likely is used for securing the key exchange during a client-to-server VPN connection?

A

ISAKMP

42
Q

A company utilizes a patching server to update its PCs regularly. After the latest patch deployment, all of the older PCs with non-gigabit Ethernet cards become disconnected from the network and now require a technician to fix the issue locally at each PC. What could be done to prevent this problem next time?

A

Disable automatic driver updates to PC’s on the patching server

43
Q

You are about to perform a major configuration upgrade to a network device. What should you have prepared in case the upgrade fails?

A

Rollback plan

44
Q

You are conducting a port scan of an older server on your network to determine what services are being run on it. You find that ports 80 and 443 are open, but ports 20 and 21 are reported as closed. All other ports are reported as FILTERED. Based on this report, what can you determine about the server?

A

The sever is running as a web server and is denying any other service requests

45
Q

You have been dispatched to investigate some sporadic network outages. After looking at the event logs for the network equipment, you found that the network equipment has been restarting at the same time every day. What should you implement to correct this issue?

A

UPS

46
Q

A network technician has received reports of an Internet-based application that has stopped functioning. Employees reported that after updating the Internet browsers, the application began to fail. Many users rolled back the update, but this did not correct the issue. What should the company do to reduce this type of action from causing network problems in the future?

A

Segment the network and create a test lab for all updates before deployment

47
Q

A network technician is using telnet to connect to a router on a network that has been compromised. A new user and password have been added to the router with full rights. The technician is concerned that the regularly used administrator account has been compromised. After changing the password on all the networking devices, which of the following should the technician do to prevent the password from being sniffed on the network again?

A

Only allow administrators to access routers using port 22

48
Q

You are assisting the company with developing a new business continuity plan. What would be the BEST recommendation to add to the BCP?

A

Build redundant links between core devices

49
Q

A technician wants to update the organization’s disaster recovery plans. Which of the following would allow network devices to be replaced quickly if a device fails?

A

Archives/ backups

50
Q

Over the past week, your network users have reported that the network has been operating slowly. You have made some changes to the network to increase its speed and responsiveness, but your supervisor is requesting that you prove that the network is actually faster and doesn’t just “feel” faster. Which of the following should you use to prove that the current configuration has improved the network’s speed?

A

Show him the results of a new performance baseline assessment

51
Q

During what period should all scheduled work on production network equipment be conducted?

A

Maintenance window

52
Q

John is investigating a performance issue on a server and has begun by gathering its utilization statistics. John notices that the statistics are outside of the normal, acceptable ranges. What should John do next?

A

Conduct a baseline review

53
Q

After a recent breach, the security technician decides to analyze and aggregate its security logs. Which system should be used?

A

SIEM

54
Q

Your company has installed a guest wireless network in the break room. According to company policy, employees may only connect to the network and use it during their lunch break. Which of the following policies should you have each employee sign to show they understand and accept the use conditions for this guest network?

A

AUP

55
Q

You need to connect to a Linux server to conduct some maintenance. The server is located in a remote office about 50 miles from your own. You decide to connect the server remotely instead of driving to the location to save some time, but you want to ensure you do this securely. The Linux server has VNC installed, but it isn’t configured to provide an encrypted connection. Which of the following should you use to secure the VNC connection to the remote server?

A

SSH in tunnel mode

56
Q

Dion Training is considering moving its headquarters and data center to Florida, but they are worried about hurricanes disrupting their business operations. To mitigate this risk, Dion Training has signed a contract with a vendor located in a different state to provide hardware, software, and the procedures necessary for the company to recover quickly in the case of a catastrophic event, like a hurricane causing a power loss for up to 10 days. As the owner, Jason is a little concerned that this contract isn’t sufficient to mitigate enough of the risk since it only provides a solution for the first 10 days. Jason wonders, “what will we do if a major outage occurs, and our offices are not able to be used for 6-12 months?” Jason has hired you to help develop Dion Training’s long-term strategy for recovering from such an event. What type of plan should you create?

A

business continuity plan

57
Q

The Chief Security Officer is concerned with the possible theft of corporate data from the network. He wants to ensure that any sensitive data cannot be exfiltrated from the network. Which of the following should be implemented to BEST mitigate this threat?

A

DLP

58
Q

A network administrator wants to increase the speed and fault tolerance of a connection between two network switches. To achieve this, which protocol should the administrator use?

A

LACP

59
Q

You are working for a brand new startup company who recently moved into an old office building because the CEO liked the “charm” of the place. You have been tasked with converting a small janitorial closet into an IDF to support the new office network. You measure the closet and determine that you can install a two-post rack inside of it, and all your necessary networking equipment will fit in the two-post rack. You test the power outlet installed in the closet, and it is sufficient for your needs. What is the NEXT thing you should be concerned with to ensure this closet can be used as your IDF?

A

Is there adequate airflow and cooling in the closet

60
Q

The administrator modifies a rule on the firewall, and now all the FTP users cannot access the server any longer. The manager calls the administrator and asks what caused the extreme downtime for the server. In regards to the manager’s inquiry, what did the administrator forget to do first?

A

Submit a change request

61
Q

You have just replaced a faulty Ethernet cable in a patch panel. Within a few minutes, you find out that users are experiencing slow or no Internet connectivity all over the building. A broadcast storm has begun to occur. After removing the replacement cable, which of the following should you do NEXT?

A

review labeling and logical network diagram documentation

62
Q

A network technician has received a report that workstations are unable to gain access to the network. During the troubleshooting process, the technician discovers that the switch connecting these workstations has failed. Which of the following is the QUICKEST option to configure a replacement switch?

A

Image

63
Q

A network technician has downloaded the latest operating system of a particular vendor’s switch. This update includes new features and enhancements. What should the technician perform FIRST when updating the switch’s operating systems?

A

Backup the current configuration for each switch

64
Q

You are troubleshooting a SQL server on the network. It has been unable to perform an uncompressed backup of the database because it needs several terabytes of disk space available. Which of the following devices should you install to have the MOST cost-efficient backup solution?

A

NAS

65
Q

Last night, your company’s system administrators conducted a server upgrade. This morning, several users are having issues accessing the company’s shared drive on the network. You have been asked to troubleshoot the problem. What document should you look at first to create a probable theory for the cause of the issue?

A

Change management documentation

66
Q

Dion Training Solutions is launching their brand new website. The website needs to be continually accessible to our students and reachable 24x7. Which networking concept would BEST ensure that the website remains up at all times?

A

High availability

67
Q

Which of the following concepts is the MOST important for a company’s long-term health in the event of a disaster?

A

Off - site backups

68
Q

Company policies require that all network infrastructure devices send system-level information to a centralized server. Which of the following should be implemented to ensure the network administrator can review device error information from one central location?

A

Syslog server

69
Q

A network administrator has determined that the ingress and egress traffic of a router’s interface are not correctly reported to the monitoring server. Which of the following can be used to determine if the router interface uses 64b vs. 32b counters?

A

SNMP Walk

70
Q

A network technician is diligent about maintaining all system servers at the most current service pack level available. After performing upgrades, users experience issues with server-based applications. Which of the following should be used to prevent issues in the future?

A

Configure a test lab for updates

71
Q

A software company is meeting with a car manufacturer to finalize discussions. In the signed document, the software company will provide the latest versions of its mapping application suite for the car manufacturer’s next generation of cars. In return, the car manufacturer will provide three specific vehicle analytics to the software company to enhance the software company’s mapping application suite. The software company can offer its enhanced mapping application to other car manufacturers but must pay the car manufacturer a royalty. Which of the following BEST describes the document used in this scenario?

A

MOU

72
Q

Which of the following BEST describes the process of documenting everyone who has physical access or possession of evidence?

A

Chain of custody

73
Q

You are working as a forensic investigator for the police. The police have a search warrant to capture a suspect’s workstation as evidence for an ongoing criminal investigation. As you enter the room with the policeman, he arrests the suspect and handcuffs him. What should you do FIRST?

A

Secure the area

74
Q

While monitoring the network, you notice that the network traffic to one of the servers is extremely high. Which of the following should you utilize to verify if this is a concern?

A

Network baseline

75
Q

A small office has an Internet connection that drops out at least two times per week. It often takes until the next day for the service provider to come out and fix the issue. What should you create with the service provider to reduce this downtime in the future?

A

SLA