Obj 3.X Flashcards

1
Q

Which of the following types of network documentation would provide a drawing of the network cabling imposed over the floorplan for an office building?

Wiring diagram
Physical network diagram
Site survey report
Logical network diagram

A

The correct answer is Wiring diagram. A wiring diagram provides a detailed drawing of the network cabling and physical connections, often overlaid on a building’s floor plan. It shows how cables are run through the structure, the locations of wall jacks, and how everything is interconnected.

The other choices are incorrect because they represent different types of documentation. A physical network diagram shows the physical layout of devices like routers, switches, and servers but doesn’t necessarily include detailed cabling paths. A site survey report contains information gathered during an assessment of the site, often focused on signal strength or environmental factors for wireless networks, rather than cabling. A logical network diagram illustrates the flow of data between devices on the network but does not show physical cabling or building layouts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Dion Training Solutions is launching their brand new website. The website needs to be continually accessible to our students and reachable 24x7. Which networking concept would BEST ensure that the website remains up at all times?

High availability
Warm site
Cold site
Snapshots

A

The correct answer is High availability. High availability refers to designing systems to ensure minimal downtime, making services like websites accessible 24x7. It involves using redundant components, failover systems, and load balancing to prevent service interruptions and maintain continuous uptime.

The other options are incorrect because they relate to disaster recovery rather than keeping a system continuously available. A warm site and cold site refer to backup facilities that can be activated in case of an outage, but they are not used for everyday high availability. Snapshots are backups of system states, which are useful for recovery but don’t help maintain real-time availability of a website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following levels would an error condition generate?

1
5
7
3

A

The correct answer is 3. The severity levels range from zero to seven, with zero being the most severe and seven being the least severe

In the context of network management, error conditions are typically associated with level 3 alerts, indicating a significant issue that requires attention but may not be critical. Level 3 often denotes warnings or errors that can affect system performance or functionality.

The other levels are incorrect because they represent different severities or types of notifications. Level 1 typically indicates a critical failure, requiring immediate attention, while level 5 might denote a minor issue. Level 7 usually represents informational messages or logs that do not require immediate action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Jason is a network manager leading a project to deploy a SAN. He is working with the vendor’s support technician to set up and configure the SAN on the enterprise network to begin SAN I/O optimization. What should Jason provide to the vendor support technician?

Asset management document
Access to the data center
Baseline documents
Network diagrams

A

The correct answer is Network diagrams. Jason should provide network diagrams to the vendor support technician to help them understand the existing network infrastructure and how the SAN will fit into that environment. These diagrams illustrate the layout of the network, including devices, connections, and configurations, which are essential for properly integrating and optimizing the SAN.

The other options are less critical in this context. Asset management documents track inventory and management of hardware but are not as crucial for configuring the SAN. Access to the data center might be necessary for physical setup, but without proper planning and documentation like network diagrams, the installation process may be inefficient. Baseline documents are useful for understanding the current performance and may be necessary later for optimization but do not provide the immediate configuration guidance needed during the SAN setup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following levels would a debugging condition generate?

7
1
6
0

A

The correct answer is 7. The severity levels range from zero to seven, with zero being the most severe and seven being the least severe.

In the context of logging levels used in networking devices and software, a debugging condition generates messages at level 7. This level is typically the most detailed, providing extensive information that is useful for troubleshooting and understanding the internal workings of the system.

The other levels are incorrect for the following reasons. 0 typically indicates an emergency level, signaling a system failure. 1 indicates an alert level that requires immediate attention. 6 usually corresponds to informational messages that provide general operational information. Therefore, level 7 is the correct choice for debugging conditions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following concepts is the MOST important for a company’s long-term health in the event of a disaster?

Vulnerability scanning
Off-site backups
Uninterruptible power supplies
Implementing an acceptable use policy

A

The correct answer is Off-site backups. Having off-site backups is crucial for a company’s long-term health in the event of a disaster because it ensures that critical data is preserved and can be restored after a catastrophic event, such as a natural disaster, cyberattack, or hardware failure. This practice allows the organization to maintain continuity and recover operations quickly.

The other options are important but not as critical for long-term health. Vulnerability scanning helps identify security weaknesses but does not directly aid in recovery from a disaster. Uninterruptible power supplies (UPS) provide temporary power during outages, ensuring system availability, but they do not protect against data loss from disasters. Implementing an acceptable use policy is essential for managing employee behavior and data security but does not directly address disaster recovery. Therefore, off-site backups are the most vital concept for ensuring a company’s resilience in the face of disasters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following policies or plans would describe the access requirements for connecting a user’s laptop to the corporate network?

Password policy
Bring your own device policy
Remote access policy
Onboarding policy

A

The correct answer is Bring your own device policy. This policy outlines the access requirements and guidelines for connecting personal devices, such as laptops, to the corporate network. It typically covers security measures, acceptable use, and any restrictions or requirements that must be followed to ensure the device is secure while accessing corporate resources.

The other options are incorrect for the following reasons. A password policy defines the rules regarding password creation and management but does not specifically address access requirements for devices. A remote access policy governs how employees can connect to the corporate network from remote locations, but it may not specifically cover personal devices connecting to the network. An onboarding policy generally outlines the procedures for integrating new employees into the organization and may include various training and compliance aspects but does not focus specifically on device access. Therefore, the Bring your own device policy is the most relevant to the access requirements for connecting a user’s laptop to the corporate network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following terms represents the maximum amount of data, as measured in time, that an organization is willing to lose during an outage?

MTBF
MTTR
RTO
RPO

A

The correct answer is RPO, which stands for Recovery Point Objective. RPO defines the maximum amount of data loss measured in time that an organization is willing to accept during an outage. It indicates how often data backups should occur to minimize potential data loss.

The other terms are incorrect for the following reasons. MTBF (Mean Time Between Failures) refers to the average time between system failures, focusing on reliability rather than data loss. MTTR (Mean Time To Repair) measures the average time it takes to repair a failed system and restore it to operation, also not directly related to data loss. RTO (Recovery Time Objective) represents the maximum acceptable time to restore services after an outage, focusing on downtime rather than data loss. Therefore, RPO is the appropriate term that describes the maximum amount of data loss an organization is willing to tolerate during an outage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Janet is a system administrator who is troubleshooting an issue with a DNS server. She notices that the security logs have filled up and must be cleared from the event viewer. She recalls this being a daily occurrence. Which of the following would BEST resolve this issue?

Install an event management tool
Delete the logs when full
Increase the maximum log size
Log into the DNS server every hour to check if the logs are full

A

Using an event management tool will allow the administrator to clear the event logs and move them from the server to a centralized database if needed. This will prevent the logs from filling up on the server without having to delete them permanently from the logging environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You are configuring a network to utilize SNMPv3 to send information from your network devices back to an SNMP manager. Which of the following SNMP options should you enable to ensure the data is transferred confidentially?

authNoPriv
authProtect
authEncrypt
authPriv

A

The correct answer is authPriv. This option in SNMPv3 enables both authentication and encryption, ensuring that the data transferred between the SNMP agent and the SNMP manager is kept confidential and secure. By using authPriv, you are not only verifying the identity of the sender (authentication) but also encrypting the data to protect it from being intercepted during transmission.

The other options are incorrect for the following reasons. authNoPriv provides authentication but does not encrypt the data, leaving it vulnerable to interception. authProtect is not a standard SNMPv3 option; the terminology can be misleading. authEncrypt suggests encryption but does not specify authentication, which is crucial for ensuring the data’s integrity and origin. Therefore, enabling authPriv is the best choice to ensure data confidentiality in SNMPv3 communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A network engineer is conducting an assessment for a customer who wants to implement an 802.11ac wireless network. What should the engineer reference before estimating the number of WAPs required?

PoE requirements
Network diagram
Site survey
Network topology

A

The network engineer should reference a site survey before estimating the number of WAPs required.

A site survey involves physically assessing the environment where the wireless network will be deployed, identifying factors like building materials, interference, and coverage areas that will impact signal strength and range. By conducting a site survey, the engineer can determine the optimal placement and number of access points needed for reliable coverage and performance.

For the exam, it’s key to understand that a site survey is essential for accurately planning wireless deployments, particularly in determining WAP placement and density.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following components is used to identify a variable that may be set or read using SNMP?

Verbose trap
Granular trap
OID
MIB

A

The component used to identify a variable that may be set or read using SNMP is the OID.

An OID, or Object Identifier, is a unique identifier assigned to a variable in the Management Information Base (MIB) that can be accessed via SNMP. It defines what information about a network device can be managed or monitored, such as CPU usage or interface status.

For the exam, understand that OIDs are part of SNMP’s structure for managing network devices, and they are essential for querying specific data within the MIB.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following components is used by an agent to send a complete set of key-pair values about a significant event or condition that is occurring in real-time by providing a full list of variables and values for a given device to a manager?

OID
Granular trap
MIB
Verbose trap

A

The correct answer is Verbose trap.

A verbose trap is used by an SNMP agent to send detailed information about specific events or conditions occurring in real-time. It provides a complete set of key-pair values, which includes a full list of variables and their corresponding values for a given device, to the manager. This allows the network manager to understand the state of the device and any significant events that may need attention.

For the exam, focus on understanding the differences between the types of traps in SNMP, particularly how verbose traps provide more comprehensive data compared to other types.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The administrator modifies a rule on the firewall, and now all the FTP users cannot access the server any longer. The manager calls the administrator and asks what caused the extreme downtime for the server. In regards to the manager’s inquiry, what did the administrator forget to do first?

Submit a change request
Document the changes
Provide notification of change to users
Schedule a maintenance window

A

The correct answer is to submit a change request. When modifying firewall rules, it’s crucial to follow an established change management process, which typically includes submitting a change request. This ensures that all stakeholders are informed and that the change is reviewed and approved before implementation.

The other choices are incorrect for various reasons. Documenting the changes is essential but comes after the initial request has been submitted. Providing notification of change to users is also important, but this typically happens after the change request is made and approved. Lastly, scheduling a maintenance window is necessary to minimize impact, but without first submitting a change request, there is no formal process in place to address potential issues that may arise from the change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following network performance metrics is used to represent the theoretical maximum rate of data transfer from a source to a destination in a given amount of time under ideal conditions?

Throughput
Latency
Jitter
Bandwidth

A

The correct answer is bandwidth. Bandwidth represents the theoretical maximum rate of data transfer from a source to a destination in a given amount of time under ideal conditions. It measures the capacity of a network link to transfer data and is typically expressed in bits per second (bps).

The other options are incorrect because they refer to different network performance metrics. Throughput measures the actual rate of data transfer, which is usually lower than the theoretical bandwidth due to various factors like network congestion. Latency refers to the delay in the transmission of data between two points. Jitter measures the variation in packet arrival times, which can affect the quality of real-time communication like VoIP or video streaming.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following types of fire suppression systems utilizes a sprinkler system with water to extinguish a fire but requires both an actuator and the sprinklers to be tripped prior to water being released?

HVAC system
Pre-action system
Clean agent system
Wet pipe system

A

The correct answer is a pre-action system. A pre-action system requires both an actuator (such as a smoke or heat detector) and the sprinkler heads to be triggered before water is released. This two-step process helps prevent accidental water discharge, which can protect sensitive equipment until a fire is confirmed.

The other options are incorrect. An HVAC system is not a fire suppression system but rather a heating, ventilation, and air conditioning system. A clean agent system uses gas or chemicals to extinguish fires without water, making it suitable for environments with sensitive electronics. A wet pipe system, on the other hand, has water stored in the pipes at all times and immediately discharges when the sprinklers are activated, without needing a secondary actuator.

17
Q

Dion Training installed a new router 183 days ago and it stopped working today due to a faulty power supply. The network technicians replaced the power supply and the router was returned to service within 4 hours. Which of the following terms would BEST represent the 183 days in this scenario?

MTBF
MTTR
RPO
RTO

A

The term that would best represent the 183 days in this scenario is MTBF, which stands for Mean Time Between Failures. MTBF measures the average time that a system or component operates before failing. In this case, the router operated for 183 days before experiencing a failure due to a faulty power supply.

MTTR, or Mean Time to Repair, refers to the average time taken to repair a failed component and return it to service, which in this scenario is 4 hours. RPO (Recovery Point Objective) and RTO (Recovery Time Objective) relate to data recovery and service restoration timelines after an outage, but they do not apply to the duration of operation before failure like MTBF does.

18
Q

A wireless networking technician has completed an assessment of a wireless network and documented the detected signal strengths in various locations. Which of the following best describes this document?

Audit report
Site survey report
Network baseline
Logical network diagram

A
  1. The correct answer is Site survey report. A site survey report is a document that contains the results of a wireless network assessment, including signal strengths, interference levels, and coverage areas in various locations. This information is essential for optimizing the wireless network layout.
  2. Audit report is incorrect because it typically focuses on evaluating security, policies, and compliance rather than signal strength. Network baseline is incorrect because a network baseline is a reference point for normal network performance, not a signal strength assessment. Logical network diagram is incorrect because it represents the layout of a network’s devices and connections, not signal strength measurements.
19
Q

You are conducting an intensive vulnerability scan to detect which ports might be open to exploitation. During the scan, one of the network services becomes disabled and impacts the production server. Which of the following sources of information would provide you with the most relevant information for you to use in determining which network service was interrupted and why?

Syslog
Firewall logs
NIDS
Network mapping

A
  1. The correct answer is Syslog. This source of information collects and stores log messages from various devices, including servers and network equipment. It can provide detailed information about system events, including service interruptions, errors, and alerts that occurred during the vulnerability scan, making it the most relevant resource for determining which network service was disabled.
  2. Firewall logs would be less relevant in this scenario since they primarily track traffic allowed or denied through the firewall, rather than internal service statuses. While NIDS (Network Intrusion Detection System) can provide information about detected threats or anomalies, it won’t necessarily detail the status of services or the cause of their interruption. Network mapping is more focused on visualizing the network topology and does not typically contain logs or real-time data about service interruptions, making it less useful for this specific investigation.
20
Q

You are assisting the company with developing a new business continuity plan. What would be the BEST recommendation to add to the BCP?

Physically secure all network equipment
Perform recurring vulnerability scans
Build redundant links between core devices
Maintain up-to-date configuration backups

A
  1. The best recommendation to add to the business continuity plan (BCP) is Build redundant links between core devices. Redundant links ensure that if one connection fails, another can take over, minimizing downtime and maintaining network availability. This is crucial for business continuity, as it helps ensure that critical services remain operational during outages.
  2. While physically securing all network equipment is important for overall security, it does not directly contribute to continuity in the event of a failure. Performing recurring vulnerability scans is also valuable for security but focuses more on identifying and addressing potential threats rather than ensuring operational continuity. Maintaining up-to-date configuration backups is essential for recovery after an incident but does not actively prevent downtime, making redundant links the more proactive choice for a BCP.
21
Q

Which of the following types of agreements is used to document the commitment between a provider and client in terms of quality and availability?

MOU
AUP
SLA
NDA

A
  1. The correct answer is SLA, which stands for Service Level Agreement. An SLA is a formal document that outlines the expectations and commitments between a service provider and a client regarding the quality, availability, and responsibilities of the services provided. It typically includes specific metrics for service levels, such as uptime percentages and response times.
  2. An MOU (Memorandum of Understanding) is more of an informal agreement outlining general intentions and is not legally binding. An AUP (Acceptable Use Policy) defines acceptable behaviors and usage of services, focusing on user conduct rather than service quality. An NDA (Non-Disclosure Agreement) protects confidential information between parties but does not pertain to service quality or availability. Thus, SLAs are the most relevant for documenting service commitments.
22
Q

A network administrator wants to increase the speed and fault tolerance of a connection between two network switches. To achieve this, which protocol should the administrator use?

LDAP
L2TP
LLDP
LACP

A
  1. The correct answer is LACP, which stands for Link Aggregation Control Protocol. LACP allows multiple physical network links to be combined into a single logical link, increasing the bandwidth and providing redundancy. If one of the links in the aggregated connection fails, traffic can continue to flow over the remaining active links, thus enhancing fault tolerance.
  2. LDAP (Lightweight Directory Access Protocol) is used for accessing and maintaining directory information, not for link aggregation or speed improvement. L2TP (Layer 2 Tunneling Protocol) is primarily used for creating virtual private networks and does not enhance switch-to-switch connections. LLDP (Link Layer Discovery Protocol) is used for network device discovery and management but does not contribute to increasing speed or fault tolerance. Therefore, LACP is the best choice for the desired outcome.
23
Q

Which of the following errors would be received if raw data is accidentally changed as it transits the network?

Giant
CRC error
Encapsulation error
Runt

A
  1. The correct answer is CRC error. A CRC (Cyclic Redundancy Check) error occurs when the data received does not match the data that was sent, indicating that the raw data has been changed or corrupted as it traveled across the network. This error detection mechanism helps identify issues with data integrity.
  2. Giant errors refer to packets that exceed the maximum allowed size for a frame and are not necessarily related to data corruption. Encapsulation errors occur when there is a problem with the way data is packaged or formatted but do not directly indicate raw data changes. Runt errors are small packets that are smaller than the minimum allowed frame size, which again does not pertain to data integrity issues. Thus, a CRC error is the most relevant error for identifying changes in raw data during transit.
24
Q

You are working for a brand new startup company who recently moved into an old office building because the CEO liked the “charm” of the place. You have been tasked with converting a small janitorial closet into an IDF to support the new office network. You measure the closet and determine that you can install a two-post rack inside of it, and all your necessary networking equipment will fit in the two-post rack. You test the power outlet installed in the closet, and it is sufficient for your needs. What is the NEXT thing you should be concerned with to ensure this closet can be used as your IDF?

Can I install a UPS in this closet?
How will I label the cables during installation?
Is there adequate airflow and cooling in the closet?
Is there redundant power available?

A

The NEXT concern for converting the janitorial closet into an IDF should be whether there is adequate airflow and cooling in the closet. Even if the power supply is sufficient for your networking equipment, an IDF generates heat, and without proper ventilation or cooling, the equipment may overheat, leading to potential failures or reduced performance. Ensuring proper airflow and cooling will help maintain optimal operating temperatures for the networking gear, thus enhancing its reliability and longevity.

The other options, while important, come after addressing the airflow and cooling. Installing a UPS is vital for power backup, labeling cables is essential for organization, and redundant power enhances reliability, but without adequate cooling, all these factors could be rendered ineffective if the equipment fails due to heat.

25
Q

Review the following packet captured at your NIDS:

23:12:23.154234 IP 86.18.10.3:54326 > 71.168.10.45:3389
Flags [P.], Seq 1834:1245, ackl, win 511, options
[nop,nop, TS val 263451334 erc 482862734, length 125

After reviewing the packet above, you discovered there is an unauthorized service running on the host. Which of the following ACL entries should be implemented to prevent further access to the unauthorized service while maintaining full access to the approved services running on this host?

DENY IP HOST 86.18.10.3 EQ 3389
DENY IP HOST 71.168.10.45 ANY EQ 25
DENY TCP ANY HOST 86.18.10.3 EQ 25
DENY TCP ANY HOST 71.168.10.45 EQ 3389

A

The correct answer is DENY TCP ANY HOST 71.168.10.45 EQ 3389. This Access Control List (ACL) entry effectively blocks traffic to the unauthorized service running on the host at IP address 71.168.10.45, which is using port 3389 (commonly associated with Remote Desktop Protocol). By specifying “ANY” for the source, this rule will deny all incoming TCP traffic directed at that host’s port 3389, preventing further unauthorized access while still allowing other approved services to function normally.

The other options are incorrect for various reasons. DENY IP HOST 86.18.10.3 EQ 3389 would block outgoing traffic from the source IP 86.18.10.3 to port 3389, but since this is an incoming request, it wouldn’t prevent access to the unauthorized service on 71.168.10.45. DENY IP HOST 71.168.10.45 ANY EQ 25 incorrectly targets port 25, which is associated with email (SMTP) services and is unrelated to the unauthorized service in question. Finally, DENY TCP ANY HOST 86.18.10.3 EQ 25 is also incorrect as it denies traffic to port 25 from any source to the host at 86.18.10.3, which does not address the unauthorized service issue at all.

26
Q

You have been dispatched to investigate some sporadic network outages. After looking at the event logs for the network equipment, you found that the network equipment has been restarting at the same time every day. What should you implement to correct this issue?

Airflow management
Grounding bar
Surge protector
UPS

A

The correct answer is UPS (Uninterruptible Power Supply). A UPS provides backup power during outages or fluctuations, helping to prevent network equipment from restarting due to power instability. Since the network equipment is restarting at the same time daily, it suggests that there may be a power-related issue, such as outages or surges, occurring at that specific time. Implementing a UPS would ensure that the equipment remains powered even during these disturbances, improving overall network reliability.

The other options are not the best fit for resolving this issue. Airflow management focuses on cooling and ventilation, which does not directly address power interruptions. Grounding bar is important for electrical safety and reducing electromagnetic interference but does not prevent power outages. Surge protector protects against voltage spikes but does not provide backup power during an outage, which is critical in this scenario. Thus, while surge protectors and grounding bars are important for equipment safety, a UPS is the most effective solution for the recurring outages related to power.