Obj 3.X Flashcards

1
Q

Which of the following types of network documentation would provide a drawing of the network cabling imposed over the floorplan for an office building?

Wiring diagram
Physical network diagram
Site survey report
Logical network diagram

A

The correct answer is Wiring diagram. A wiring diagram provides a detailed drawing of the network cabling and physical connections, often overlaid on a building’s floor plan. It shows how cables are run through the structure, the locations of wall jacks, and how everything is interconnected.

The other choices are incorrect because they represent different types of documentation. A physical network diagram shows the physical layout of devices like routers, switches, and servers but doesn’t necessarily include detailed cabling paths. A site survey report contains information gathered during an assessment of the site, often focused on signal strength or environmental factors for wireless networks, rather than cabling. A logical network diagram illustrates the flow of data between devices on the network but does not show physical cabling or building layouts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Dion Training Solutions is launching their brand new website. The website needs to be continually accessible to our students and reachable 24x7. Which networking concept would BEST ensure that the website remains up at all times?

High availability
Warm site
Cold site
Snapshots

A

The correct answer is High availability. High availability refers to designing systems to ensure minimal downtime, making services like websites accessible 24x7. It involves using redundant components, failover systems, and load balancing to prevent service interruptions and maintain continuous uptime.

The other options are incorrect because they relate to disaster recovery rather than keeping a system continuously available. A warm site and cold site refer to backup facilities that can be activated in case of an outage, but they are not used for everyday high availability. Snapshots are backups of system states, which are useful for recovery but don’t help maintain real-time availability of a website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following levels would an error condition generate?

1
5
7
3

A

The correct answer is 3. The severity levels range from zero to seven, with zero being the most severe and seven being the least severe

In the context of network management, error conditions are typically associated with level 3 alerts, indicating a significant issue that requires attention but may not be critical. Level 3 often denotes warnings or errors that can affect system performance or functionality.

The other levels are incorrect because they represent different severities or types of notifications. Level 1 typically indicates a critical failure, requiring immediate attention, while level 5 might denote a minor issue. Level 7 usually represents informational messages or logs that do not require immediate action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Jason is a network manager leading a project to deploy a SAN. He is working with the vendor’s support technician to set up and configure the SAN on the enterprise network to begin SAN I/O optimization. What should Jason provide to the vendor support technician?

Asset management document
Access to the data center
Baseline documents
Network diagrams

A

The correct answer is Network diagrams. Jason should provide network diagrams to the vendor support technician to help them understand the existing network infrastructure and how the SAN will fit into that environment. These diagrams illustrate the layout of the network, including devices, connections, and configurations, which are essential for properly integrating and optimizing the SAN.

The other options are less critical in this context. Asset management documents track inventory and management of hardware but are not as crucial for configuring the SAN. Access to the data center might be necessary for physical setup, but without proper planning and documentation like network diagrams, the installation process may be inefficient. Baseline documents are useful for understanding the current performance and may be necessary later for optimization but do not provide the immediate configuration guidance needed during the SAN setup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following levels would a debugging condition generate?

7
1
6
0

A

The correct answer is 7. The severity levels range from zero to seven, with zero being the most severe and seven being the least severe.

In the context of logging levels used in networking devices and software, a debugging condition generates messages at level 7. This level is typically the most detailed, providing extensive information that is useful for troubleshooting and understanding the internal workings of the system.

The other levels are incorrect for the following reasons. 0 typically indicates an emergency level, signaling a system failure. 1 indicates an alert level that requires immediate attention. 6 usually corresponds to informational messages that provide general operational information. Therefore, level 7 is the correct choice for debugging conditions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following concepts is the MOST important for a company’s long-term health in the event of a disaster?

Vulnerability scanning
Off-site backups
Uninterruptible power supplies
Implementing an acceptable use policy

A

The correct answer is Off-site backups. Having off-site backups is crucial for a company’s long-term health in the event of a disaster because it ensures that critical data is preserved and can be restored after a catastrophic event, such as a natural disaster, cyberattack, or hardware failure. This practice allows the organization to maintain continuity and recover operations quickly.

The other options are important but not as critical for long-term health. Vulnerability scanning helps identify security weaknesses but does not directly aid in recovery from a disaster. Uninterruptible power supplies (UPS) provide temporary power during outages, ensuring system availability, but they do not protect against data loss from disasters. Implementing an acceptable use policy is essential for managing employee behavior and data security but does not directly address disaster recovery. Therefore, off-site backups are the most vital concept for ensuring a company’s resilience in the face of disasters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following policies or plans would describe the access requirements for connecting a user’s laptop to the corporate network?

Password policy
Bring your own device policy
Remote access policy
Onboarding policy

A

The correct answer is Bring your own device policy. This policy outlines the access requirements and guidelines for connecting personal devices, such as laptops, to the corporate network. It typically covers security measures, acceptable use, and any restrictions or requirements that must be followed to ensure the device is secure while accessing corporate resources.

The other options are incorrect for the following reasons. A password policy defines the rules regarding password creation and management but does not specifically address access requirements for devices. A remote access policy governs how employees can connect to the corporate network from remote locations, but it may not specifically cover personal devices connecting to the network. An onboarding policy generally outlines the procedures for integrating new employees into the organization and may include various training and compliance aspects but does not focus specifically on device access. Therefore, the Bring your own device policy is the most relevant to the access requirements for connecting a user’s laptop to the corporate network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following terms represents the maximum amount of data, as measured in time, that an organization is willing to lose during an outage?

MTBF
MTTR
RTO
RPO

A

The correct answer is RPO, which stands for Recovery Point Objective. RPO defines the maximum amount of data loss measured in time that an organization is willing to accept during an outage. It indicates how often data backups should occur to minimize potential data loss.

The other terms are incorrect for the following reasons. MTBF (Mean Time Between Failures) refers to the average time between system failures, focusing on reliability rather than data loss. MTTR (Mean Time To Repair) measures the average time it takes to repair a failed system and restore it to operation, also not directly related to data loss. RTO (Recovery Time Objective) represents the maximum acceptable time to restore services after an outage, focusing on downtime rather than data loss. Therefore, RPO is the appropriate term that describes the maximum amount of data loss an organization is willing to tolerate during an outage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Janet is a system administrator who is troubleshooting an issue with a DNS server. She notices that the security logs have filled up and must be cleared from the event viewer. She recalls this being a daily occurrence. Which of the following would BEST resolve this issue?

Install an event management tool
Delete the logs when full
Increase the maximum log size
Log into the DNS server every hour to check if the logs are full

A

Using an event management tool will allow the administrator to clear the event logs and move them from the server to a centralized database if needed. This will prevent the logs from filling up on the server without having to delete them permanently from the logging environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You are configuring a network to utilize SNMPv3 to send information from your network devices back to an SNMP manager. Which of the following SNMP options should you enable to ensure the data is transferred confidentially?

authNoPriv
authProtect
authEncrypt
authPriv

A

The correct answer is authPriv. This option in SNMPv3 enables both authentication and encryption, ensuring that the data transferred between the SNMP agent and the SNMP manager is kept confidential and secure. By using authPriv, you are not only verifying the identity of the sender (authentication) but also encrypting the data to protect it from being intercepted during transmission.

The other options are incorrect for the following reasons. authNoPriv provides authentication but does not encrypt the data, leaving it vulnerable to interception. authProtect is not a standard SNMPv3 option; the terminology can be misleading. authEncrypt suggests encryption but does not specify authentication, which is crucial for ensuring the data’s integrity and origin. Therefore, enabling authPriv is the best choice to ensure data confidentiality in SNMPv3 communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A network engineer is conducting an assessment for a customer who wants to implement an 802.11ac wireless network. What should the engineer reference before estimating the number of WAPs required?

PoE requirements
Network diagram
Site survey
Network topology

A

The network engineer should reference a site survey before estimating the number of WAPs required.

A site survey involves physically assessing the environment where the wireless network will be deployed, identifying factors like building materials, interference, and coverage areas that will impact signal strength and range. By conducting a site survey, the engineer can determine the optimal placement and number of access points needed for reliable coverage and performance.

For the exam, it’s key to understand that a site survey is essential for accurately planning wireless deployments, particularly in determining WAP placement and density.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following components is used to identify a variable that may be set or read using SNMP?

Verbose trap
Granular trap
OID
MIB

A

The component used to identify a variable that may be set or read using SNMP is the OID.

An OID, or Object Identifier, is a unique identifier assigned to a variable in the Management Information Base (MIB) that can be accessed via SNMP. It defines what information about a network device can be managed or monitored, such as CPU usage or interface status.

For the exam, understand that OIDs are part of SNMP’s structure for managing network devices, and they are essential for querying specific data within the MIB.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following components is used by an agent to send a complete set of key-pair values about a significant event or condition that is occurring in real-time by providing a full list of variables and values for a given device to a manager?

OID
Granular trap
MIB
Verbose trap

A

The correct answer is Verbose trap.

A verbose trap is used by an SNMP agent to send detailed information about specific events or conditions occurring in real-time. It provides a complete set of key-pair values, which includes a full list of variables and their corresponding values for a given device, to the manager. This allows the network manager to understand the state of the device and any significant events that may need attention.

For the exam, focus on understanding the differences between the types of traps in SNMP, particularly how verbose traps provide more comprehensive data compared to other types.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The administrator modifies a rule on the firewall, and now all the FTP users cannot access the server any longer. The manager calls the administrator and asks what caused the extreme downtime for the server. In regards to the manager’s inquiry, what did the administrator forget to do first?

Submit a change request
Document the changes
Provide notification of change to users
Schedule a maintenance window

A

The correct answer is to submit a change request. When modifying firewall rules, it’s crucial to follow an established change management process, which typically includes submitting a change request. This ensures that all stakeholders are informed and that the change is reviewed and approved before implementation.

The other choices are incorrect for various reasons. Documenting the changes is essential but comes after the initial request has been submitted. Providing notification of change to users is also important, but this typically happens after the change request is made and approved. Lastly, scheduling a maintenance window is necessary to minimize impact, but without first submitting a change request, there is no formal process in place to address potential issues that may arise from the change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following network performance metrics is used to represent the theoretical maximum rate of data transfer from a source to a destination in a given amount of time under ideal conditions?

Throughput
Latency
Jitter
Bandwidth

A

The correct answer is bandwidth. Bandwidth represents the theoretical maximum rate of data transfer from a source to a destination in a given amount of time under ideal conditions. It measures the capacity of a network link to transfer data and is typically expressed in bits per second (bps).

The other options are incorrect because they refer to different network performance metrics. Throughput measures the actual rate of data transfer, which is usually lower than the theoretical bandwidth due to various factors like network congestion. Latency refers to the delay in the transmission of data between two points. Jitter measures the variation in packet arrival times, which can affect the quality of real-time communication like VoIP or video streaming.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following types of fire suppression systems utilizes a sprinkler system with water to extinguish a fire but requires both an actuator and the sprinklers to be tripped prior to water being released?

HVAC system
Pre-action system
Clean agent system
Wet pipe system

A

The correct answer is a pre-action system. A pre-action system requires both an actuator (such as a smoke or heat detector) and the sprinkler heads to be triggered before water is released. This two-step process helps prevent accidental water discharge, which can protect sensitive equipment until a fire is confirmed.

The other options are incorrect. An HVAC system is not a fire suppression system but rather a heating, ventilation, and air conditioning system. A clean agent system uses gas or chemicals to extinguish fires without water, making it suitable for environments with sensitive electronics. A wet pipe system, on the other hand, has water stored in the pipes at all times and immediately discharges when the sprinklers are activated, without needing a secondary actuator.

17
Q

Dion Training installed a new router 183 days ago and it stopped working today due to a faulty power supply. The network technicians replaced the power supply and the router was returned to service within 4 hours. Which of the following terms would BEST represent the 183 days in this scenario?

MTBF
MTTR
RPO
RTO

A

The term that would best represent the 183 days in this scenario is MTBF, which stands for Mean Time Between Failures. MTBF measures the average time that a system or component operates before failing. In this case, the router operated for 183 days before experiencing a failure due to a faulty power supply.

MTTR, or Mean Time to Repair, refers to the average time taken to repair a failed component and return it to service, which in this scenario is 4 hours. RPO (Recovery Point Objective) and RTO (Recovery Time Objective) relate to data recovery and service restoration timelines after an outage, but they do not apply to the duration of operation before failure like MTBF does.

18
Q

A wireless networking technician has completed an assessment of a wireless network and documented the detected signal strengths in various locations. Which of the following best describes this document?

Audit report
Site survey report
Network baseline
Logical network diagram

A
  1. The correct answer is Site survey report. A site survey report is a document that contains the results of a wireless network assessment, including signal strengths, interference levels, and coverage areas in various locations. This information is essential for optimizing the wireless network layout.
  2. Audit report is incorrect because it typically focuses on evaluating security, policies, and compliance rather than signal strength. Network baseline is incorrect because a network baseline is a reference point for normal network performance, not a signal strength assessment. Logical network diagram is incorrect because it represents the layout of a network’s devices and connections, not signal strength measurements.
19
Q

You are conducting an intensive vulnerability scan to detect which ports might be open to exploitation. During the scan, one of the network services becomes disabled and impacts the production server. Which of the following sources of information would provide you with the most relevant information for you to use in determining which network service was interrupted and why?

Syslog
Firewall logs
NIDS
Network mapping

A
  1. The correct answer is Syslog. This source of information collects and stores log messages from various devices, including servers and network equipment. It can provide detailed information about system events, including service interruptions, errors, and alerts that occurred during the vulnerability scan, making it the most relevant resource for determining which network service was disabled.
  2. Firewall logs would be less relevant in this scenario since they primarily track traffic allowed or denied through the firewall, rather than internal service statuses. While NIDS (Network Intrusion Detection System) can provide information about detected threats or anomalies, it won’t necessarily detail the status of services or the cause of their interruption. Network mapping is more focused on visualizing the network topology and does not typically contain logs or real-time data about service interruptions, making it less useful for this specific investigation.
20
Q

You are assisting the company with developing a new business continuity plan. What would be the BEST recommendation to add to the BCP?

Physically secure all network equipment
Perform recurring vulnerability scans
Build redundant links between core devices
Maintain up-to-date configuration backups

A
  1. The best recommendation to add to the business continuity plan (BCP) is Build redundant links between core devices. Redundant links ensure that if one connection fails, another can take over, minimizing downtime and maintaining network availability. This is crucial for business continuity, as it helps ensure that critical services remain operational during outages.
  2. While physically securing all network equipment is important for overall security, it does not directly contribute to continuity in the event of a failure. Performing recurring vulnerability scans is also valuable for security but focuses more on identifying and addressing potential threats rather than ensuring operational continuity. Maintaining up-to-date configuration backups is essential for recovery after an incident but does not actively prevent downtime, making redundant links the more proactive choice for a BCP.
21
Q

Which of the following types of agreements is used to document the commitment between a provider and client in terms of quality and availability?

MOU
AUP
SLA
NDA

A
  1. The correct answer is SLA, which stands for Service Level Agreement. An SLA is a formal document that outlines the expectations and commitments between a service provider and a client regarding the quality, availability, and responsibilities of the services provided. It typically includes specific metrics for service levels, such as uptime percentages and response times.
  2. An MOU (Memorandum of Understanding) is more of an informal agreement outlining general intentions and is not legally binding. An AUP (Acceptable Use Policy) defines acceptable behaviors and usage of services, focusing on user conduct rather than service quality. An NDA (Non-Disclosure Agreement) protects confidential information between parties but does not pertain to service quality or availability. Thus, SLAs are the most relevant for documenting service commitments.
22
Q

A network administrator wants to increase the speed and fault tolerance of a connection between two network switches. To achieve this, which protocol should the administrator use?

LDAP
L2TP
LLDP
LACP

A
  1. The correct answer is LACP, which stands for Link Aggregation Control Protocol. LACP allows multiple physical network links to be combined into a single logical link, increasing the bandwidth and providing redundancy. If one of the links in the aggregated connection fails, traffic can continue to flow over the remaining active links, thus enhancing fault tolerance.
  2. LDAP (Lightweight Directory Access Protocol) is used for accessing and maintaining directory information, not for link aggregation or speed improvement. L2TP (Layer 2 Tunneling Protocol) is primarily used for creating virtual private networks and does not enhance switch-to-switch connections. LLDP (Link Layer Discovery Protocol) is used for network device discovery and management but does not contribute to increasing speed or fault tolerance. Therefore, LACP is the best choice for the desired outcome.
23
Q

Which of the following errors would be received if raw data is accidentally changed as it transits the network?

Giant
CRC error
Encapsulation error
Runt

A
  1. The correct answer is CRC error. A CRC (Cyclic Redundancy Check) error occurs when the data received does not match the data that was sent, indicating that the raw data has been changed or corrupted as it traveled across the network. This error detection mechanism helps identify issues with data integrity.
  2. Giant errors refer to packets that exceed the maximum allowed size for a frame and are not necessarily related to data corruption. Encapsulation errors occur when there is a problem with the way data is packaged or formatted but do not directly indicate raw data changes. Runt errors are small packets that are smaller than the minimum allowed frame size, which again does not pertain to data integrity issues. Thus, a CRC error is the most relevant error for identifying changes in raw data during transit.
24
Q

You are working for a brand new startup company who recently moved into an old office building because the CEO liked the “charm” of the place. You have been tasked with converting a small janitorial closet into an IDF to support the new office network. You measure the closet and determine that you can install a two-post rack inside of it, and all your necessary networking equipment will fit in the two-post rack. You test the power outlet installed in the closet, and it is sufficient for your needs. What is the NEXT thing you should be concerned with to ensure this closet can be used as your IDF?

Can I install a UPS in this closet?
How will I label the cables during installation?
Is there adequate airflow and cooling in the closet?
Is there redundant power available?

A

The NEXT concern for converting the janitorial closet into an IDF should be whether there is adequate airflow and cooling in the closet. Even if the power supply is sufficient for your networking equipment, an IDF generates heat, and without proper ventilation or cooling, the equipment may overheat, leading to potential failures or reduced performance. Ensuring proper airflow and cooling will help maintain optimal operating temperatures for the networking gear, thus enhancing its reliability and longevity.

The other options, while important, come after addressing the airflow and cooling. Installing a UPS is vital for power backup, labeling cables is essential for organization, and redundant power enhances reliability, but without adequate cooling, all these factors could be rendered ineffective if the equipment fails due to heat.

25
Q

Review the following packet captured at your NIDS:

23:12:23.154234 IP 86.18.10.3:54326 > 71.168.10.45:3389
Flags [P.], Seq 1834:1245, ackl, win 511, options
[nop,nop, TS val 263451334 erc 482862734, length 125

After reviewing the packet above, you discovered there is an unauthorized service running on the host. Which of the following ACL entries should be implemented to prevent further access to the unauthorized service while maintaining full access to the approved services running on this host?

DENY IP HOST 86.18.10.3 EQ 3389
DENY IP HOST 71.168.10.45 ANY EQ 25
DENY TCP ANY HOST 86.18.10.3 EQ 25
DENY TCP ANY HOST 71.168.10.45 EQ 3389

A

The correct answer is DENY TCP ANY HOST 71.168.10.45 EQ 3389. This Access Control List (ACL) entry effectively blocks traffic to the unauthorized service running on the host at IP address 71.168.10.45, which is using port 3389 (commonly associated with Remote Desktop Protocol). By specifying “ANY” for the source, this rule will deny all incoming TCP traffic directed at that host’s port 3389, preventing further unauthorized access while still allowing other approved services to function normally.

The other options are incorrect for various reasons. DENY IP HOST 86.18.10.3 EQ 3389 would block outgoing traffic from the source IP 86.18.10.3 to port 3389, but since this is an incoming request, it wouldn’t prevent access to the unauthorized service on 71.168.10.45. DENY IP HOST 71.168.10.45 ANY EQ 25 incorrectly targets port 25, which is associated with email (SMTP) services and is unrelated to the unauthorized service in question. Finally, DENY TCP ANY HOST 86.18.10.3 EQ 25 is also incorrect as it denies traffic to port 25 from any source to the host at 86.18.10.3, which does not address the unauthorized service issue at all.

26
Q

You have been dispatched to investigate some sporadic network outages. After looking at the event logs for the network equipment, you found that the network equipment has been restarting at the same time every day. What should you implement to correct this issue?

Airflow management
Grounding bar
Surge protector
UPS

A

The correct answer is UPS (Uninterruptible Power Supply). A UPS provides backup power during outages or fluctuations, helping to prevent network equipment from restarting due to power instability. Since the network equipment is restarting at the same time daily, it suggests that there may be a power-related issue, such as outages or surges, occurring at that specific time. Implementing a UPS would ensure that the equipment remains powered even during these disturbances, improving overall network reliability.

The other options are not the best fit for resolving this issue. Airflow management focuses on cooling and ventilation, which does not directly address power interruptions. Grounding bar is important for electrical safety and reducing electromagnetic interference but does not prevent power outages. Surge protector protects against voltage spikes but does not provide backup power during an outage, which is critical in this scenario. Thus, while surge protectors and grounding bars are important for equipment safety, a UPS is the most effective solution for the recurring outages related to power.

27
Q

A technician installs a new piece of hardware and now needs to add the device to the network management tool database. However, when adding the device to the tool using SNMP credentials, the tool cannot successfully interpret the results. Which of the following needs to be added to allow the network management tool to interpret the new device and control it using SNMP?

GET
TRAP
MIB
WALK

A

The correct answer is MIB. A Management Information Base (MIB) is a collection of information organized hierarchically, which allows network management tools to understand the data and performance metrics of network devices. When a new piece of hardware is added to the network management tool, the corresponding MIB must be loaded to enable the tool to interpret the SNMP (Simple Network Management Protocol) results returned by that device. The MIB defines the variables that can be monitored and controlled via SNMP.

The other options are incorrect because GET is a command used by SNMP to retrieve information from a device, TRAP is used for sending alerts from a device to the management tool, and WALK is an SNMP operation that retrieves a subtree of data from a device but does not itself provide the necessary structure for interpreting data. Without the MIB, the management tool will not have the definitions needed to understand the data it receives from the device.

28
Q

Which of the following types of agreements is a non-legally binding document used to detail what common actions each party intends to perform?

SLA
AUP
MOU
NDA

A

The correct answer is MOU, which stands for Memorandum of Understanding. An MOU is a non-legally binding agreement that outlines the intentions and common actions that parties agree to undertake. It serves as a framework for collaboration or partnership without the enforceability of a contract, detailing the responsibilities and expectations of each party involved.

The other options are incorrect because an SLA, or Service Level Agreement, is a legally binding document that specifies the expected level of service between a service provider and a customer. An AUP, or Acceptable Use Policy, outlines the acceptable use of resources, typically for employees within an organization, and is also considered a binding agreement. An NDA, or Non-Disclosure Agreement, is a legally binding contract that protects confidential information shared between parties.

29
Q

An employee at Dion Training reports that half of the marketing department is currently unable to access any network resources. A network technician determines that the switch has failed and needs replacement. Which of the following is required so that the technician can replace the switch and regain connectivity quickly?

Configuration backup
VLAN configuration
Network diagram
Router image

A

The correct answer is configuration backup. A configuration backup is essential for quickly restoring the switch settings after the replacement. This backup contains the switch’s configurations, including VLAN settings, IP addresses, and any other necessary configurations, allowing the technician to restore the switch to its previous state efficiently, ensuring that network connectivity is regained swiftly.

The other choices are less critical in this scenario. VLAN configuration refers specifically to the settings related to virtual LANs on the switch but does not encompass all necessary configurations. A network diagram provides a visual representation of the network layout, which can be helpful for troubleshooting but does not assist in the actual configuration restoration process. A router image is related to the configuration or firmware of a router, which is not directly relevant to replacing a switch and restoring its configurations.

30
Q

A company-wide audit revealed employees are using company laptops and desktops for personal use. To prevent this from occurring, in which document should the company incorporate the phrase “Company-owned IT assets are to be used to perform authorized company business only”?

NDA
SLA
AUP
MOU

A

The correct answer is AUP (Acceptable Use Policy). The AUP is the document that outlines the acceptable behaviors and practices regarding the use of company resources, including IT assets. By incorporating the phrase “Company-owned IT assets are to be used to perform authorized company business only,” the company establishes clear guidelines for employees on how they are expected to use company equipment and resources, helping to prevent unauthorized personal use.

The other options do not fit this context as well. An NDA (Non-Disclosure Agreement) focuses on confidentiality and protecting sensitive information. An SLA (Service Level Agreement) defines the expected level of service between a service provider and the user but does not typically address acceptable use. An MOU (Memorandum of Understanding) is a formal agreement between parties that outlines their intentions and mutual understanding but is less specific about day-to-day operational policies like acceptable use of IT assets.

31
Q

Which of the following type of sites might contain a datacenter with equipment, but it is not configured and doesn’t contain any user or customer data yet?

Hot site
Cloud site
Cold site
Warm site

A

A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes down.

A warm site features an equipped data center but no customer data. A cold site is a backup facility with little or no hardware equipment installed. A cold site is essentially an office space with basic utilities such as power, cooling system, air conditioning, and communication equipment, etc. A hot site is a real-time replication of an existing network environment. All data generated and stored at the primary site is immediately replicated and backed up at the disaster recovery site. A cloud site is a virtual recovery site that allows you to create a recovery version of your organization’s enterprise network in the cloud. Cloud sites are useful when your disaster recovery plan includes migrating to a telework or remote operations environment.

32
Q

Workers in a company branch office must visit an initial web page and click the “I agree” button before being able to surf the web. Which of the following is this an example of?

MOU
SLA
EULA
AUP

A

The correct answer is AUP, which stands for Acceptable Use Policy. An AUP is a set of rules and guidelines that outline how employees are expected to use company resources, including internet access. By requiring users to click an “I agree” button on an initial web page, the company is ensuring that employees acknowledge and accept the terms of the AUP before they are allowed to access the internet.

A EULA, or End User License Agreement, is a legal contract between a software developer or vendor and the user of that software, detailing how the software can be used. An MOU, or Memorandum of Understanding, is an agreement between two or more parties outlining mutual goals and intentions but is not legally binding. An SLA, or Service Level Agreement, defines the level of service expected from a service provider, typically in the context of IT services.

33
Q

Which of the following is used to provide emergency electrical power during a short outage or until a long-term solution can begin operations?

UPS
HVAC
Generator
PDU

A

The correct answer is UPS, which stands for Uninterruptible Power Supply. A UPS is designed to provide emergency power to connected devices during short outages or power disturbances, allowing them to continue operating temporarily while a more permanent solution, like a generator, can be initiated. It helps prevent data loss and hardware damage by maintaining power for a limited time.

A generator, while also a source of backup power, typically provides power during longer outages and requires more time to start up. HVAC (Heating, Ventilation, and Air Conditioning) systems are not related to power supply and instead manage climate control. PDU stands for Power Distribution Unit, which distributes power to various devices but does not provide emergency power on its own.

34
Q

A small office has an Internet connection that drops out at least two times per week. It often takes until the next day for the service provider to come out and fix the issue. What should you create with the service provider to reduce this downtime in the future?

SLA
NDA
AUP
MOU

A

The correct answer is SLA, which stands for Service Level Agreement. An SLA is a formal contract between a service provider and a client that outlines the expected level of service, including uptime guarantees and response times for addressing issues. By establishing an SLA, the small office can specify the acceptable downtime and the service provider’s obligations to resolve issues within a certain timeframe, which helps to minimize future disruptions to their Internet service.

An NDA (Non-Disclosure Agreement) is used to protect confidential information and is not relevant to service reliability. An AUP (Acceptable Use Policy) governs how users can use the network and Internet services, while an MOU (Memorandum of Understanding) is an informal agreement outlining general intentions but lacks the enforceability and specificity of an SLA regarding service performance and expectations.