• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back
Which of the following practices creates a starting point for ongoing evaluation of your network's health?

a) configuration management
b) asset management
c) fault management
d) baselining
d) baselining
Suppose you learned that half of the patch cables that connect a workgroup of computers in the Accounting Department to a patch panel needed to be replaced due to concerns about faulty manufacturing. Which of the following type of documentation would help you identify these patch cables?

a) event log
b) baselin
c) wiring schematic
d) syslog
d) wiring schematic
You work for a medical transcription company that contracts with hundreds of home-based transcriptionists across the country. They transcriptionists connect to your network over a VPN that provides remote access services. Employees work at all times of the day or night, and not all of the transcriptionists are connected at the same times. Further, the number of transcriptionists the company hires at any time depends on a variable workload. You need to determine whether to increase the number of licenses on your remote access server. Which of the following variables would you configure your network monitoring application to track over time to help you find your answer?

a) % utilization on the VPN router's CPU
b) maximun traffic handled by the VPN router's NIC
c) number of users connected to the remote access server
d) % utilization on the remote access server's CPU
c) number of users connected to the remote access server
You have researched a new type of switch and proved that upgrading your switches to this model is feasible. What is the next step you take before replacing your old switches?

a) Evaluate the new switch on a pilot network that mimics your network environment
b) inform users that a major network change is pending
c) back up the configuration of your existing switches
d) schedule a time for the switch upgrade that's lease disruptive to users.
a) Evaluate the new switch on a pilot network that mimics your network environment
You suspect that one of your network's two redundant core switches has a NIC or cable that's experiencing transmission problems. Supposing you never obtained a baseline for traffic on this switch, which of the following measurements would help you verify your suspicion?

a) % processor utilization on the affected switch over a week
b) total bits per second traveling through the affected switch, compared with total bits per second traveling through the redundant switch
c) % rAM utilization on the affected switch over a week.
d) Average daily traffic on the affected switch.
b) total bits per second traveling through the affected switch, compared with total bits per second traveling through the redundant switch
Which of the following protocols is commonly used for communication between network management agents and applications?

a) IMAP
b) SMTP
c) NTP
d) SNMP
d) SNMP
Which of the following applications would allow you to determine how many times in the past seven days your Window's 7 workstation has been unable to renew its DHCP-assigned IP address

a) Event viewer
b) DHCP logger
c) syslog
d) TCP/IP properties
a) event viewer
On your Linux server, which file tells you where you system long file is kept?

a) /var/log/logs.conf
b) /etc/syslog/conf
c) /etc/usr/logs.conf
d) /var/syslog.conf
b) /etc/syslog.conf
Which of the following techniques could be used to prevent clients from downloading more than 50 GB of data per day through a given network interface?

a) caching
b) load balancing
c) traffic policing
d) clustering
c) traffic policing
You have decided to use an application that will send a text message to your smartphone every time one of your network's core routers or switches experiences an event that the system considers and emergency. All switches and routers run Cisco IOS. The application will alert you about events identified with which of the following severity levels?

a) 0
b) 1
c) 5
d) 7
a) 1
Suppose you work for a financial institution that wants to make sure its clients can log on and review their accounts no matter how much traffic your WAN is experiencing. On your edge router, which of the following criteria will you use to prioritize traffic for all HTTPS requests?

a) Protocol
b) source IP address
c) source MAC address
d) time of day
a) protocol
An asset management database should include which of the following? (Choose all that apply)

a) serial number for every server on the network
b) usernames for every employee who uses the network
c) model number for every router, switch, and access point on the network
d) baseline of average daily traffic for each router, switch, and access point on the network
e) milestones for the network's implementation
a) serial number for every server on the network

c) model number for every router, switch, and access point on the network
The routine that collects management information on a device is also known as:

a) an agent
b) a poll
c) a managed device
d) a MIB
a) an agent
How does an application patch differ from an upgrade?

a) a patch is more comprehensive than an upgrade
b) a patch is designed to make minor corrections or enhancements, whereas an upgrade replaces most, if not all, or of the software.
c) a patch is offered by a third party software vendor, whereas an upgrade is supplied by the software manufacturer itself.
d) a patch can be automatically distributed to clients over the network, where as an upgrade requires manual installation
b) a patch is designed to make minor corrections or enhancements, whereas an upgrade replaces most, if not all, or of the software.
Under what circumstances should a network administrator inform users of a software change?

a) always
b) when the change might affect applications or utilities on which the users rely
c) when the change might result in additional network traffic
d) when the change might affect how users are added to the system
b) when the change might affect applications or utilities on which the users rely
Which of the following systems would store information about the VTP settings for a switch's interface?

a) change management
b) event log
c) configuration management
d) asset management
c) configuration management
Which of the following is the best way to reverse a network operating system upgrade?

a) reinstall the previous version of the operating system
b) uninstall the upgrade
c) remove the upgrade software folder from the server
d) restore the server's software and configuration from a backup
d) restore the server's software and configuration from a backup
Which of the following requires authentication between an agent and network management console?

a) SNMPv1
b) SNMPv2
c) SNMPv3
d) All of the above
c) SNMPv3
Which of the following pieces of information must you collect when establishing a baseline for the performance of a WAN link?

a) last time the link failed
b) average daily traffic traveling over the link
c) users' perception of the link's speed
d) distribution of traffic types by Network layer protocol
b) average daily traffic traveling over the link
Maintaining records of each instance of a switch interface failure is part of which of the following practices?

a) asset management
b) change management
c) fault management
d) configuration management
c) fault management