Obj 3.X Flashcards
Which of the following types of network documentation would provide a drawing of the network cabling imposed over the floorplan for an office building?
Wiring diagram
Physical network diagram
Site survey report
Logical network diagram
The correct answer is Wiring diagram. A wiring diagram provides a detailed drawing of the network cabling and physical connections, often overlaid on a building’s floor plan. It shows how cables are run through the structure, the locations of wall jacks, and how everything is interconnected.
The other choices are incorrect because they represent different types of documentation. A physical network diagram shows the physical layout of devices like routers, switches, and servers but doesn’t necessarily include detailed cabling paths. A site survey report contains information gathered during an assessment of the site, often focused on signal strength or environmental factors for wireless networks, rather than cabling. A logical network diagram illustrates the flow of data between devices on the network but does not show physical cabling or building layouts.
Dion Training Solutions is launching their brand new website. The website needs to be continually accessible to our students and reachable 24x7. Which networking concept would BEST ensure that the website remains up at all times?
High availability
Warm site
Cold site
Snapshots
The correct answer is High availability. High availability refers to designing systems to ensure minimal downtime, making services like websites accessible 24x7. It involves using redundant components, failover systems, and load balancing to prevent service interruptions and maintain continuous uptime.
The other options are incorrect because they relate to disaster recovery rather than keeping a system continuously available. A warm site and cold site refer to backup facilities that can be activated in case of an outage, but they are not used for everyday high availability. Snapshots are backups of system states, which are useful for recovery but don’t help maintain real-time availability of a website.
Which of the following levels would an error condition generate?
1
5
7
3
The correct answer is 3. The severity levels range from zero to seven, with zero being the most severe and seven being the least severe
In the context of network management, error conditions are typically associated with level 3 alerts, indicating a significant issue that requires attention but may not be critical. Level 3 often denotes warnings or errors that can affect system performance or functionality.
The other levels are incorrect because they represent different severities or types of notifications. Level 1 typically indicates a critical failure, requiring immediate attention, while level 5 might denote a minor issue. Level 7 usually represents informational messages or logs that do not require immediate action.
Jason is a network manager leading a project to deploy a SAN. He is working with the vendor’s support technician to set up and configure the SAN on the enterprise network to begin SAN I/O optimization. What should Jason provide to the vendor support technician?
Asset management document
Access to the data center
Baseline documents
Network diagrams
The correct answer is Network diagrams. Jason should provide network diagrams to the vendor support technician to help them understand the existing network infrastructure and how the SAN will fit into that environment. These diagrams illustrate the layout of the network, including devices, connections, and configurations, which are essential for properly integrating and optimizing the SAN.
The other options are less critical in this context. Asset management documents track inventory and management of hardware but are not as crucial for configuring the SAN. Access to the data center might be necessary for physical setup, but without proper planning and documentation like network diagrams, the installation process may be inefficient. Baseline documents are useful for understanding the current performance and may be necessary later for optimization but do not provide the immediate configuration guidance needed during the SAN setup.
Which of the following levels would a debugging condition generate?
7
1
6
0
The correct answer is 7. The severity levels range from zero to seven, with zero being the most severe and seven being the least severe.
In the context of logging levels used in networking devices and software, a debugging condition generates messages at level 7. This level is typically the most detailed, providing extensive information that is useful for troubleshooting and understanding the internal workings of the system.
The other levels are incorrect for the following reasons. 0 typically indicates an emergency level, signaling a system failure. 1 indicates an alert level that requires immediate attention. 6 usually corresponds to informational messages that provide general operational information. Therefore, level 7 is the correct choice for debugging conditions.
Which of the following concepts is the MOST important for a company’s long-term health in the event of a disaster?
Vulnerability scanning
Off-site backups
Uninterruptible power supplies
Implementing an acceptable use policy
The correct answer is Off-site backups. Having off-site backups is crucial for a company’s long-term health in the event of a disaster because it ensures that critical data is preserved and can be restored after a catastrophic event, such as a natural disaster, cyberattack, or hardware failure. This practice allows the organization to maintain continuity and recover operations quickly.
The other options are important but not as critical for long-term health. Vulnerability scanning helps identify security weaknesses but does not directly aid in recovery from a disaster. Uninterruptible power supplies (UPS) provide temporary power during outages, ensuring system availability, but they do not protect against data loss from disasters. Implementing an acceptable use policy is essential for managing employee behavior and data security but does not directly address disaster recovery. Therefore, off-site backups are the most vital concept for ensuring a company’s resilience in the face of disasters.
Which of the following policies or plans would describe the access requirements for connecting a user’s laptop to the corporate network?
Password policy
Bring your own device policy
Remote access policy
Onboarding policy
The correct answer is Bring your own device policy. This policy outlines the access requirements and guidelines for connecting personal devices, such as laptops, to the corporate network. It typically covers security measures, acceptable use, and any restrictions or requirements that must be followed to ensure the device is secure while accessing corporate resources.
The other options are incorrect for the following reasons. A password policy defines the rules regarding password creation and management but does not specifically address access requirements for devices. A remote access policy governs how employees can connect to the corporate network from remote locations, but it may not specifically cover personal devices connecting to the network. An onboarding policy generally outlines the procedures for integrating new employees into the organization and may include various training and compliance aspects but does not focus specifically on device access. Therefore, the Bring your own device policy is the most relevant to the access requirements for connecting a user’s laptop to the corporate network.
Which of the following terms represents the maximum amount of data, as measured in time, that an organization is willing to lose during an outage?
MTBF
MTTR
RTO
RPO
The correct answer is RPO, which stands for Recovery Point Objective. RPO defines the maximum amount of data loss measured in time that an organization is willing to accept during an outage. It indicates how often data backups should occur to minimize potential data loss.
The other terms are incorrect for the following reasons. MTBF (Mean Time Between Failures) refers to the average time between system failures, focusing on reliability rather than data loss. MTTR (Mean Time To Repair) measures the average time it takes to repair a failed system and restore it to operation, also not directly related to data loss. RTO (Recovery Time Objective) represents the maximum acceptable time to restore services after an outage, focusing on downtime rather than data loss. Therefore, RPO is the appropriate term that describes the maximum amount of data loss an organization is willing to tolerate during an outage.
Janet is a system administrator who is troubleshooting an issue with a DNS server. She notices that the security logs have filled up and must be cleared from the event viewer. She recalls this being a daily occurrence. Which of the following would BEST resolve this issue?
Install an event management tool
Delete the logs when full
Increase the maximum log size
Log into the DNS server every hour to check if the logs are full
Using an event management tool will allow the administrator to clear the event logs and move them from the server to a centralized database if needed. This will prevent the logs from filling up on the server without having to delete them permanently from the logging environment.
You are configuring a network to utilize SNMPv3 to send information from your network devices back to an SNMP manager. Which of the following SNMP options should you enable to ensure the data is transferred confidentially?
authNoPriv
authProtect
authEncrypt
authPriv
The correct answer is authPriv. This option in SNMPv3 enables both authentication and encryption, ensuring that the data transferred between the SNMP agent and the SNMP manager is kept confidential and secure. By using authPriv, you are not only verifying the identity of the sender (authentication) but also encrypting the data to protect it from being intercepted during transmission.
The other options are incorrect for the following reasons. authNoPriv provides authentication but does not encrypt the data, leaving it vulnerable to interception. authProtect is not a standard SNMPv3 option; the terminology can be misleading. authEncrypt suggests encryption but does not specify authentication, which is crucial for ensuring the data’s integrity and origin. Therefore, enabling authPriv is the best choice to ensure data confidentiality in SNMPv3 communications.
A network engineer is conducting an assessment for a customer who wants to implement an 802.11ac wireless network. What should the engineer reference before estimating the number of WAPs required?
PoE requirements
Network diagram
Site survey
Network topology
The network engineer should reference a site survey before estimating the number of WAPs required.
A site survey involves physically assessing the environment where the wireless network will be deployed, identifying factors like building materials, interference, and coverage areas that will impact signal strength and range. By conducting a site survey, the engineer can determine the optimal placement and number of access points needed for reliable coverage and performance.
For the exam, it’s key to understand that a site survey is essential for accurately planning wireless deployments, particularly in determining WAP placement and density.
Which of the following components is used to identify a variable that may be set or read using SNMP?
Verbose trap
Granular trap
OID
MIB
The component used to identify a variable that may be set or read using SNMP is the OID.
An OID, or Object Identifier, is a unique identifier assigned to a variable in the Management Information Base (MIB) that can be accessed via SNMP. It defines what information about a network device can be managed or monitored, such as CPU usage or interface status.
For the exam, understand that OIDs are part of SNMP’s structure for managing network devices, and they are essential for querying specific data within the MIB.
Which of the following components is used by an agent to send a complete set of key-pair values about a significant event or condition that is occurring in real-time by providing a full list of variables and values for a given device to a manager?
OID
Granular trap
MIB
Verbose trap
The correct answer is Verbose trap.
A verbose trap is used by an SNMP agent to send detailed information about specific events or conditions occurring in real-time. It provides a complete set of key-pair values, which includes a full list of variables and their corresponding values for a given device, to the manager. This allows the network manager to understand the state of the device and any significant events that may need attention.
For the exam, focus on understanding the differences between the types of traps in SNMP, particularly how verbose traps provide more comprehensive data compared to other types.
The administrator modifies a rule on the firewall, and now all the FTP users cannot access the server any longer. The manager calls the administrator and asks what caused the extreme downtime for the server. In regards to the manager’s inquiry, what did the administrator forget to do first?
Submit a change request
Document the changes
Provide notification of change to users
Schedule a maintenance window
The correct answer is to submit a change request. When modifying firewall rules, it’s crucial to follow an established change management process, which typically includes submitting a change request. This ensures that all stakeholders are informed and that the change is reviewed and approved before implementation.
The other choices are incorrect for various reasons. Documenting the changes is essential but comes after the initial request has been submitted. Providing notification of change to users is also important, but this typically happens after the change request is made and approved. Lastly, scheduling a maintenance window is necessary to minimize impact, but without first submitting a change request, there is no formal process in place to address potential issues that may arise from the change.
Which of the following network performance metrics is used to represent the theoretical maximum rate of data transfer from a source to a destination in a given amount of time under ideal conditions?
Throughput
Latency
Jitter
Bandwidth
The correct answer is bandwidth. Bandwidth represents the theoretical maximum rate of data transfer from a source to a destination in a given amount of time under ideal conditions. It measures the capacity of a network link to transfer data and is typically expressed in bits per second (bps).
The other options are incorrect because they refer to different network performance metrics. Throughput measures the actual rate of data transfer, which is usually lower than the theoretical bandwidth due to various factors like network congestion. Latency refers to the delay in the transmission of data between two points. Jitter measures the variation in packet arrival times, which can affect the quality of real-time communication like VoIP or video streaming.