Deck 11: Network Performance and Recovery

ملء الشاشة (f)
exit full mode
سؤال
 When a device handles electrical signals improperly, usually resulting from a bad NIC, it is referred to by what term below?

A) ghost
B) jabber
C) talker
D) blabber
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
 A highly available server is available what percentage of the time?

A) 90%
B) 99%
C) 99.99%
D) 99.999%
سؤال
 A brownout is a momentary decrease in voltage; also known as a sag.
سؤال
 The SNMP version 3 protocol introduces authentication, validation, and encryption for messages exchanged between devices and the network management console.
سؤال
 At what point is a packet considered to be a giant?

A) It becomes a giant when it exceeds the medium's maximum packet size.
B) It becomes a giant when it exceeds 1500 bytes.
C) It becomes a giant only when fragmented pieces are reassembled and the packet size is too large.
D) It becomes a giant once a VLAN tag is added.
سؤال
 What term is used to describe the average amount of time that will pass for a device before a failure is expected to occur?

A) estimated time to failure (ETTF)
B) product cycle lifetime (PCL)
C) maximum time available (MTA)
D) mean time between failures (MTBF)
سؤال
 Wireshark or any other monitoring software running on a single computer connected to a switch doesn't see all the traffic on a network, but only the traffic the switch sends to it, which includes broadcast traffic and traffic specifically addressed to the computer.
سؤال
 When using SNMP with TLS, what port do agents receive requests on?

A) 161
B) 162
C) 10161
D) 10162
سؤال
 A hot site consists of computers, devices, and connectivity necessary to rebuild a network exist, but without appropriate configuration.
سؤال
 What happens when an NMS uses the SNMP walk command?

A) The NMS sends a request for data to the agent on a managed device.
B) The NMS uses get requests to move through sequential rows in the MIB database.
C) The NMS requests a list of all active SNMP traps on the system.
D) The NMS walks through a list of given SNMP hosts.
سؤال
 A system with an availability of 99.999% can be down for a maximum of 52 minutes per year.
سؤال
 Most UNIX and Linux desktop operating systems provide a GUI application for easily viewing and filtering the information in system logs.
سؤال
 When Comcast was found to be interfering with BitTorrent traffic, what method was being used?

A) Comcast was creating access lists that blocked known BitTorrent trackers.
B) Comcast was interjecting TCP segments with the RST (reset) field set.
C) Comcast used DNS poisoning to prevent clients from talking to other BitTorrent users.
D) Comcast used IP spoofing to impersonate other BitTorrent clients, then dropped traffic.
سؤال
 You can find out where various logs are kept on some UNIX and Linux systems by viewing the /etc/syslog.conf or /etc/rsyslog.conf files.
سؤال
 When using DiffServ, what type of forwarding utilizes a minimum departure rate from a given node, which is then assigned to each data stream?

A) assured forwarding
B) prioritized forwarding
C) scaled forwarding
D) expedited forwarding
سؤال
 Packets that are smaller than a medium's minimum packet size are known by what term below?

A) jabbers
B) giants
C) ghosts
D) runts
سؤال
 What 3-bit field in a 802.1Q tag is modified to set a frame's Class of Service (CoS)?

A) EtherType
B) CRC checksum
C) Tag Protocol Identifier (TPID)
D) Priority Code Point (PCP)
سؤال
 A RAID 5 configuration requires a minimum of two hard disks to operate.
سؤال
 Class of Service utilizes 8 levels of priority, and modifies the PCP field in an 802.1Q tag.
سؤال
 Setting a NIC to run in promiscuous mode will allow it to see all network traffic passing through a network switch.
سؤال
 What makes up the first 6 bits of the 8-bit DiffServ field?

A) Priority Code Point (PCP)
B) Differentiated Services Code Point (DSCP)
C) Class of Service (CoS)
D) Forward Error Correction (FEC)
سؤال
 A differential backup covers what data on a system?

A) It includes all data every time it is performed.
B) It includes only data that has changed since the last backup.
C) It includes data that has changed since the last full backup.
D) It includes data that has changed since the last incremental backup.
سؤال
 What is distributed switching?

A) It is when multiple physical switches are configured to act as a single switch.
B) It is multiple switches that provide redundancy switching for all switches in the group.
C) It is a single physical switch that is partitioned in software to perform as multiple switches.
D) It is a single distributed vSwitch that can service VMs across multiple hosts.
سؤال
 Which type of backup scheme only covers data that has changed since the last backup?

A) full backup
B) incremental backup
C) differential backup
D) snapshot backup
سؤال
 What does the Common Address Redundancy Protocol do?

A) It allows a pool of computers or interfaces to share the same MAC address.
B) It allows a pool of computers or interfaces to share the same IP address.
C) It allows multiple devices to share the same fully qualified domain name.
D) It allows multiple devices to share hardware resources.
سؤال
 How does a line conditioning UPS protect network equipment?

A) It protects against electrical surges.
B) It shields equipment from lightning damage.
C) It reduces fluctuations in incoming voltage.
D) It filters line noise from incoming power.
سؤال
 The Link Aggregation Control Protocol was initially defined by what IEEE standard?

A) IEEE 802.3af
B) IEEE 802.1cd
C) IEEE 802.3ad
D) IEEE 802.3bd
سؤال
 Which of the following statements describes a RAID 0 configuration?

A) In a RAID 0, data is striped across multiple disks to improve performance.
B) In a RAID 0, data is mirrored on multiple disks to provide fault tolerance.
C) In a RAID 0, data is striped across three or more drives, with parity information added to the data.
D) In a RAID 0, four or more disks are used to mirror data within each pair of disks, and then striped to multiple pairs of disks.
سؤال
 Which type of uninterruptible power supply uses AC power to continuously charge its battery, while also providing power to devices through the battery?

A) standby UPS
B) online UPS
C) line conditioning UPS
D) surge UPS
سؤال
 What statement regarding the use of a network attached storage device is accurate?

A) A NAS does not contain its own file system, rather it relies on the host file system provided by individual clients.
B) A NAS reads and writes from its disks significantly slower than other types of servers.
C) A NAS can be easily expanded without interrupting service.
D) A NAS can typically only support RAID-0 configurations.
سؤال
 A snapshot is most similar to which type of backup scheme?

A) incremental backup
B) differential backup
C) full backup
D) versioned backup
سؤال
 A network TAP serves what purpose on a network?

A) It provides a mirrored port for monitoring traffic between other ports.
B) It provides wireless monitoring capabilities, as well as spectrum analysis.
C) It monitors network throughput at a specific point in the network.
D) It serves as a miniature firewall that can be placed in front of any connection.
سؤال
 When viewing a syslog message, what does a level of 0 indicate?

A) The message is an error condition on the system.
B) The message is a warning condition on the system.
C) The message is an emergency situation on the system.
D) The message represents debug information.
سؤال
 In planning for disaster recovery, what is the ultimate goal?

A) The preservation of critical data.
B) The continuation of business.
C) The management of damage.
D) The protection of infrastructure.
سؤال
 You are attempting to determine how available your Linux systems are, and need to find the current system uptime. What command should you use?

A) uptime
B) show runtime
C) lastboot
D) display stats
سؤال
 What Storage Area Network (SAN) protocol runs on top of TCP, and can be used on an existing twisted-pair Ethernet network, while maintaining low cost?

A) Fibre Channel (FC)
B) Fibre Channel over Ethernet (FCoE)
C) Internet SCSI (iSCSI)
D) InfiniBand (IB)
سؤال
 Each managed object on a managed device using SNMP is assigned which of the following?

A) object identifier (OID)
B) TCP/UDP port
C) process ID
D) inode number
سؤال
 If you wish to maintain a "4 nines" availability rating, what is the maximum amount of down time you can have per day?

A) .4 seconds
B) 8 seconds
C) 1 minute, 26 seconds
D) 14 minutes, 23 seconds
سؤال
 Once a device has failed, what metric measures the average amount of time to repair?

A) mean time to repair (MTTR)
B) mean time to restore (MTTR)
C) mean field replacement time (MFRT)
D) mean restoration time (MRT)
سؤال
 The grouping of multiple servers so that they appear as a single device to the rest of the network is known as which term?

A) load balancing
B) clustering
C) link aggregating
D) server overloading
سؤال
 In preparing and planning for disaster recovery, what is the difference between an incident and a disaster?
سؤال
 What are some of the more common network performance metrics that are utilized?
سؤال
 In response to an incident, how should chain of custody of evidence be handled?
سؤال
 The DiffServ technique for addressing QoS issues defines what two different types of data stream forwarding?
سؤال
 Sections of a disaster recovery plan related to computer systems should include what information?
سؤال
 The creation of a response team should include what team roles?
سؤال
 How do the three versions of the Simple Network Management Protocol differ?
سؤال
 What is the difference between a fault and a failure in relation to networking?
سؤال
 The Link Aggregation Control Protocol (LACP) can be configured in what three different ways?
سؤال
 What are the different types of power flaws that can cause damage?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 11: Network Performance and Recovery
1
 When a device handles electrical signals improperly, usually resulting from a bad NIC, it is referred to by what term below?

A) ghost
B) jabber
C) talker
D) blabber
B
2
 A highly available server is available what percentage of the time?

A) 90%
B) 99%
C) 99.99%
D) 99.999%
D
3
 A brownout is a momentary decrease in voltage; also known as a sag.
True
4
 The SNMP version 3 protocol introduces authentication, validation, and encryption for messages exchanged between devices and the network management console.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
 At what point is a packet considered to be a giant?

A) It becomes a giant when it exceeds the medium's maximum packet size.
B) It becomes a giant when it exceeds 1500 bytes.
C) It becomes a giant only when fragmented pieces are reassembled and the packet size is too large.
D) It becomes a giant once a VLAN tag is added.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
 What term is used to describe the average amount of time that will pass for a device before a failure is expected to occur?

A) estimated time to failure (ETTF)
B) product cycle lifetime (PCL)
C) maximum time available (MTA)
D) mean time between failures (MTBF)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
 Wireshark or any other monitoring software running on a single computer connected to a switch doesn't see all the traffic on a network, but only the traffic the switch sends to it, which includes broadcast traffic and traffic specifically addressed to the computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
 When using SNMP with TLS, what port do agents receive requests on?

A) 161
B) 162
C) 10161
D) 10162
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
 A hot site consists of computers, devices, and connectivity necessary to rebuild a network exist, but without appropriate configuration.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
 What happens when an NMS uses the SNMP walk command?

A) The NMS sends a request for data to the agent on a managed device.
B) The NMS uses get requests to move through sequential rows in the MIB database.
C) The NMS requests a list of all active SNMP traps on the system.
D) The NMS walks through a list of given SNMP hosts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
 A system with an availability of 99.999% can be down for a maximum of 52 minutes per year.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
 Most UNIX and Linux desktop operating systems provide a GUI application for easily viewing and filtering the information in system logs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
 When Comcast was found to be interfering with BitTorrent traffic, what method was being used?

A) Comcast was creating access lists that blocked known BitTorrent trackers.
B) Comcast was interjecting TCP segments with the RST (reset) field set.
C) Comcast used DNS poisoning to prevent clients from talking to other BitTorrent users.
D) Comcast used IP spoofing to impersonate other BitTorrent clients, then dropped traffic.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
 You can find out where various logs are kept on some UNIX and Linux systems by viewing the /etc/syslog.conf or /etc/rsyslog.conf files.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
 When using DiffServ, what type of forwarding utilizes a minimum departure rate from a given node, which is then assigned to each data stream?

A) assured forwarding
B) prioritized forwarding
C) scaled forwarding
D) expedited forwarding
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
 Packets that are smaller than a medium's minimum packet size are known by what term below?

A) jabbers
B) giants
C) ghosts
D) runts
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
 What 3-bit field in a 802.1Q tag is modified to set a frame's Class of Service (CoS)?

A) EtherType
B) CRC checksum
C) Tag Protocol Identifier (TPID)
D) Priority Code Point (PCP)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
 A RAID 5 configuration requires a minimum of two hard disks to operate.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
 Class of Service utilizes 8 levels of priority, and modifies the PCP field in an 802.1Q tag.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
 Setting a NIC to run in promiscuous mode will allow it to see all network traffic passing through a network switch.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
 What makes up the first 6 bits of the 8-bit DiffServ field?

A) Priority Code Point (PCP)
B) Differentiated Services Code Point (DSCP)
C) Class of Service (CoS)
D) Forward Error Correction (FEC)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
 A differential backup covers what data on a system?

A) It includes all data every time it is performed.
B) It includes only data that has changed since the last backup.
C) It includes data that has changed since the last full backup.
D) It includes data that has changed since the last incremental backup.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
 What is distributed switching?

A) It is when multiple physical switches are configured to act as a single switch.
B) It is multiple switches that provide redundancy switching for all switches in the group.
C) It is a single physical switch that is partitioned in software to perform as multiple switches.
D) It is a single distributed vSwitch that can service VMs across multiple hosts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
 Which type of backup scheme only covers data that has changed since the last backup?

A) full backup
B) incremental backup
C) differential backup
D) snapshot backup
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
 What does the Common Address Redundancy Protocol do?

A) It allows a pool of computers or interfaces to share the same MAC address.
B) It allows a pool of computers or interfaces to share the same IP address.
C) It allows multiple devices to share the same fully qualified domain name.
D) It allows multiple devices to share hardware resources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
 How does a line conditioning UPS protect network equipment?

A) It protects against electrical surges.
B) It shields equipment from lightning damage.
C) It reduces fluctuations in incoming voltage.
D) It filters line noise from incoming power.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
 The Link Aggregation Control Protocol was initially defined by what IEEE standard?

A) IEEE 802.3af
B) IEEE 802.1cd
C) IEEE 802.3ad
D) IEEE 802.3bd
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
 Which of the following statements describes a RAID 0 configuration?

A) In a RAID 0, data is striped across multiple disks to improve performance.
B) In a RAID 0, data is mirrored on multiple disks to provide fault tolerance.
C) In a RAID 0, data is striped across three or more drives, with parity information added to the data.
D) In a RAID 0, four or more disks are used to mirror data within each pair of disks, and then striped to multiple pairs of disks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
 Which type of uninterruptible power supply uses AC power to continuously charge its battery, while also providing power to devices through the battery?

A) standby UPS
B) online UPS
C) line conditioning UPS
D) surge UPS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
 What statement regarding the use of a network attached storage device is accurate?

A) A NAS does not contain its own file system, rather it relies on the host file system provided by individual clients.
B) A NAS reads and writes from its disks significantly slower than other types of servers.
C) A NAS can be easily expanded without interrupting service.
D) A NAS can typically only support RAID-0 configurations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
 A snapshot is most similar to which type of backup scheme?

A) incremental backup
B) differential backup
C) full backup
D) versioned backup
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
 A network TAP serves what purpose on a network?

A) It provides a mirrored port for monitoring traffic between other ports.
B) It provides wireless monitoring capabilities, as well as spectrum analysis.
C) It monitors network throughput at a specific point in the network.
D) It serves as a miniature firewall that can be placed in front of any connection.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
 When viewing a syslog message, what does a level of 0 indicate?

A) The message is an error condition on the system.
B) The message is a warning condition on the system.
C) The message is an emergency situation on the system.
D) The message represents debug information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
 In planning for disaster recovery, what is the ultimate goal?

A) The preservation of critical data.
B) The continuation of business.
C) The management of damage.
D) The protection of infrastructure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
 You are attempting to determine how available your Linux systems are, and need to find the current system uptime. What command should you use?

A) uptime
B) show runtime
C) lastboot
D) display stats
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
 What Storage Area Network (SAN) protocol runs on top of TCP, and can be used on an existing twisted-pair Ethernet network, while maintaining low cost?

A) Fibre Channel (FC)
B) Fibre Channel over Ethernet (FCoE)
C) Internet SCSI (iSCSI)
D) InfiniBand (IB)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
 Each managed object on a managed device using SNMP is assigned which of the following?

A) object identifier (OID)
B) TCP/UDP port
C) process ID
D) inode number
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
 If you wish to maintain a "4 nines" availability rating, what is the maximum amount of down time you can have per day?

A) .4 seconds
B) 8 seconds
C) 1 minute, 26 seconds
D) 14 minutes, 23 seconds
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
 Once a device has failed, what metric measures the average amount of time to repair?

A) mean time to repair (MTTR)
B) mean time to restore (MTTR)
C) mean field replacement time (MFRT)
D) mean restoration time (MRT)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
 The grouping of multiple servers so that they appear as a single device to the rest of the network is known as which term?

A) load balancing
B) clustering
C) link aggregating
D) server overloading
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
 In preparing and planning for disaster recovery, what is the difference between an incident and a disaster?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
 What are some of the more common network performance metrics that are utilized?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
 In response to an incident, how should chain of custody of evidence be handled?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
 The DiffServ technique for addressing QoS issues defines what two different types of data stream forwarding?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
 Sections of a disaster recovery plan related to computer systems should include what information?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
 The creation of a response team should include what team roles?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
 How do the three versions of the Simple Network Management Protocol differ?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
 What is the difference between a fault and a failure in relation to networking?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
 The Link Aggregation Control Protocol (LACP) can be configured in what three different ways?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
 What are the different types of power flaws that can cause damage?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.