Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
20 Cards in this Set
- Front
- Back
Which of the following practices creates a starting point for ongoing evaluation of your network's health?
a) configuration management b) asset management c) fault management d) baselining |
d) baselining
|
|
Suppose you learned that half of the patch cables that connect a workgroup of computers in the Accounting Department to a patch panel needed to be replaced due to concerns about faulty manufacturing. Which of the following type of documentation would help you identify these patch cables?
a) event log b) baselin c) wiring schematic d) syslog |
d) wiring schematic
|
|
You work for a medical transcription company that contracts with hundreds of home-based transcriptionists across the country. They transcriptionists connect to your network over a VPN that provides remote access services. Employees work at all times of the day or night, and not all of the transcriptionists are connected at the same times. Further, the number of transcriptionists the company hires at any time depends on a variable workload. You need to determine whether to increase the number of licenses on your remote access server. Which of the following variables would you configure your network monitoring application to track over time to help you find your answer?
a) % utilization on the VPN router's CPU b) maximun traffic handled by the VPN router's NIC c) number of users connected to the remote access server d) % utilization on the remote access server's CPU |
c) number of users connected to the remote access server
|
|
You have researched a new type of switch and proved that upgrading your switches to this model is feasible. What is the next step you take before replacing your old switches?
a) Evaluate the new switch on a pilot network that mimics your network environment b) inform users that a major network change is pending c) back up the configuration of your existing switches d) schedule a time for the switch upgrade that's lease disruptive to users. |
a) Evaluate the new switch on a pilot network that mimics your network environment
|
|
You suspect that one of your network's two redundant core switches has a NIC or cable that's experiencing transmission problems. Supposing you never obtained a baseline for traffic on this switch, which of the following measurements would help you verify your suspicion?
a) % processor utilization on the affected switch over a week b) total bits per second traveling through the affected switch, compared with total bits per second traveling through the redundant switch c) % rAM utilization on the affected switch over a week. d) Average daily traffic on the affected switch. |
b) total bits per second traveling through the affected switch, compared with total bits per second traveling through the redundant switch
|
|
Which of the following protocols is commonly used for communication between network management agents and applications?
a) IMAP b) SMTP c) NTP d) SNMP |
d) SNMP
|
|
Which of the following applications would allow you to determine how many times in the past seven days your Window's 7 workstation has been unable to renew its DHCP-assigned IP address
a) Event viewer b) DHCP logger c) syslog d) TCP/IP properties |
a) event viewer
|
|
On your Linux server, which file tells you where you system long file is kept?
a) /var/log/logs.conf b) /etc/syslog/conf c) /etc/usr/logs.conf d) /var/syslog.conf |
b) /etc/syslog.conf
|
|
Which of the following techniques could be used to prevent clients from downloading more than 50 GB of data per day through a given network interface?
a) caching b) load balancing c) traffic policing d) clustering |
c) traffic policing
|
|
You have decided to use an application that will send a text message to your smartphone every time one of your network's core routers or switches experiences an event that the system considers and emergency. All switches and routers run Cisco IOS. The application will alert you about events identified with which of the following severity levels?
a) 0 b) 1 c) 5 d) 7 |
a) 1
|
|
Suppose you work for a financial institution that wants to make sure its clients can log on and review their accounts no matter how much traffic your WAN is experiencing. On your edge router, which of the following criteria will you use to prioritize traffic for all HTTPS requests?
a) Protocol b) source IP address c) source MAC address d) time of day |
a) protocol
|
|
An asset management database should include which of the following? (Choose all that apply)
a) serial number for every server on the network b) usernames for every employee who uses the network c) model number for every router, switch, and access point on the network d) baseline of average daily traffic for each router, switch, and access point on the network e) milestones for the network's implementation |
a) serial number for every server on the network
c) model number for every router, switch, and access point on the network |
|
The routine that collects management information on a device is also known as:
a) an agent b) a poll c) a managed device d) a MIB |
a) an agent
|
|
How does an application patch differ from an upgrade?
a) a patch is more comprehensive than an upgrade b) a patch is designed to make minor corrections or enhancements, whereas an upgrade replaces most, if not all, or of the software. c) a patch is offered by a third party software vendor, whereas an upgrade is supplied by the software manufacturer itself. d) a patch can be automatically distributed to clients over the network, where as an upgrade requires manual installation |
b) a patch is designed to make minor corrections or enhancements, whereas an upgrade replaces most, if not all, or of the software.
|
|
Under what circumstances should a network administrator inform users of a software change?
a) always b) when the change might affect applications or utilities on which the users rely c) when the change might result in additional network traffic d) when the change might affect how users are added to the system |
b) when the change might affect applications or utilities on which the users rely
|
|
Which of the following systems would store information about the VTP settings for a switch's interface?
a) change management b) event log c) configuration management d) asset management |
c) configuration management
|
|
Which of the following is the best way to reverse a network operating system upgrade?
a) reinstall the previous version of the operating system b) uninstall the upgrade c) remove the upgrade software folder from the server d) restore the server's software and configuration from a backup |
d) restore the server's software and configuration from a backup
|
|
Which of the following requires authentication between an agent and network management console?
a) SNMPv1 b) SNMPv2 c) SNMPv3 d) All of the above |
c) SNMPv3
|
|
Which of the following pieces of information must you collect when establishing a baseline for the performance of a WAN link?
a) last time the link failed b) average daily traffic traveling over the link c) users' perception of the link's speed d) distribution of traffic types by Network layer protocol |
b) average daily traffic traveling over the link
|
|
Maintaining records of each instance of a switch interface failure is part of which of the following practices?
a) asset management b) change management c) fault management d) configuration management |
c) fault management
|