Find study materials for any course. Check these out:
Browse by school
Make your own
To login with Google, please enable popups
To login with Google, please enable popups
Don’t have an account?
To signup with Google, please enable popups
To signup with Google, please enable popups
Sign up withor
-TCP port 143
-Used for retrieving e-mail messages from e-mail servers
-Protocol that is used for retrieving e-mail messages from e-mail servers
Benefits of using IMAP4 Relative to POP3
Protocol that is used for retrieving e-mail messages from e-mail servers
POP3 (Post Office Protocol, version 3) relies on TCP and operates over port ___.
Simple Mail Transfer Protocol (SMTP):
Is used for relaying e-mail messages between mail servers
110 and 143
Which of the following ports need to be open in order to be able to retrieve an e-mail from SMTP server?
Default subnet mask for Class C address
Network class reserved for special purposes
You have decided to create 254 subnets on your class B network. What subnet mask will you use to accomplish this?
If you subdivide your class B network into 254 subnets, what is the maximum number of hosts you can assign to an single subnet
If you worked on a network that could not interpret classless addressing, and your network ID was 184.108.40.206, what is the theoretical maximum number of different subnets you could create on this network
30 subnet IDs
Class C network 220.127.116.11 255.255.255.0, subnet by borrowing 5 bits
Your company has leased a Class C network whose network ID is 18.104.22.168. You want to create 16 subnets within this network. One of the subnets will have an extended network prefix of 22.214.171.124. What will be the broadcast address for this subnet? (Hint: If you know the number of hosts per subnet, you can easily determine the broadcast address.)
Netstat parameter that displays all connections and listening ports
Parameter that displays the routing table
Netstat parameter that displays addresses and port numbers in numerical form
Nbtstat parameter that lists local NetBIOS names
What utility might you use to find out whether your ISP’s router is responsible for the poor network performance your organization experiences on a particular afternoon?
Program similar to mtr; available as a command-line utility in Windows operating systems
When you use the mtr command to assess the path from your office workstation to a server on your company’s WAN that is located in Spain, what is the first hop the mtr will display
Used for querying DNS server to obtain domain name or IP address mapping
If you know that your colleague’s TCP/IP host name is JSMITH, and you need to find out his IP address, which of the following commands should you type at your shell / command prompt
As a networking consultant, you’ve been asked to help expand a client’s TCP/IP network. The network administrator tells you that the network ID is subnetted as 126.96.36.199/26. On this network, how many bits of each IP address are devoted to host information?
Allows you to view a host’s routing table
Route Print, netstat –r
Commands that produce the same result (display routing table)
Route, netstat –r
Allows you to view the routing table on your Linux workstation
Used for displaying routing tables
Your routing network has been experiencing severe congestion lately. You suspect the oldest 2 routers to be causing the problem. How would you verify this?
Convert subnet mask 11111111 11111111 11111000 00000000 to dotted-decimal equivalent
Forward slash ( / )
CIDR (classless inter-domain routing) notation takes the form on the network ID followed by a(n) _____, followed by the number of bits that are used for the extended network prefix
You have enabled NAT on your small office’s router. The router’s private network IP address is 188.8.131.52. Which of the following IP addresses is the most likely to be automatically assigned to one of the workstations that uses this router as its default gateway?
Your workstation’s IP address is 10.35.88.12 and your supervisor’s workstation’s IP address in 10.35.91.4. When you send data from your workstation to your supervisor’s workstation, what is the most likely IP address of the first default gateway that will accept and interpret your transmission
Standard message format specified by SMTP allows for lines that contain no more than _____ characters
Octets equal to 0 and 255 are ___, only the numbers 1 through 254 can be used for host information in an IPv4 address
Last 8 bits
In classful addressing, Class C IPv4 address host information is located here
Within a classful addressing subnet mask, the ___ bits indicates that corresponding bits in an IPv4 address contain network information
When using classful IPv4 addressing, a network ID always ends with an octet of ___
Result from ANDing 11001111 with 10010001
The gateway that first interprets its outbound requests to other subnets and then interprets its inbound requests from other subnets
Gateways that make up the Internet backbone
You have decided to use PAT on your small office network. At minimum, how many IP addresses must you obtain from your ISP in order for all five clients in your office to be able to access servers on the Internet?
Example of a popular client email software
What Network layer protocol does the traceroute utility use to obtain its information about paths between a source and destination?
Uses very little hard disk space or processing power from the workstation on which it is installed
Which network configuration is best used for a company’s e-mail server?
Because of the functions it performs, each port on a virtual switch can also be considered this
Connect vNICs with a network, whether virtual or physical
Upon creation, each vNIC is automatically assigned a ____.
_____ desktops are desktop operating environments hosted virtually, on a different physical computer from the one with which the user interacts
The remote virtual computing software that comes with Windows client and server operating systems.
Each VM is known as this
The physical computer on a virtual machine on a virtual machine is known as this
___ mode is appropriate for test networks or if you simply need to install a different operating system on your workstation to use a program that is incompatible with your host’s operating system.
In the NAT networking mode, a vNIC relies on the ___ to act as a NAT device.
The most widely implemented virtualization software today.
Virtualization will conserve resources
Which of the following is an advantage to virtualizing many servers in your data center, compared to running each server on a separate physical machine?
Which of the following network configuration types prevents VMs from exchanging traffic with nodes other than the workstation they are installed on
You have created a virtual machine on your workstation so that you can test some new applications. You configured the VM’s hard disk space to be dynamically allocated. Which of the following will allocate more space for the VM when it needs it?
They exist as files on the hard drive of the User host.
Which applies to virtual machines, no matter what type of virtualization software they are created with?
From the host machine’s virtualization software
Each of the VMs on your host computer is configured to use the NAT networking type. They can still pick up e-mail and surf the Web. How are they getting their IP address?
Nothing changes for your VM.
You work second shift and share a desktop workstation with your colleague who work on the first and third shifts. Each of you has a separate virtual machine on the workstation. When your third-shift coworker installs a new program on his VM, it causes the machine’s operating system to stop working. What happens as a consequence?
You are running KVM on a Fedora Linux computer and have configured a virtual server to use the bridged networking type. The IP address your host machine’s NIC is 192.168.25.71. Assuming your physical LAN uses DHCP, which of the following addresses is most likely the one assigned to your virtual server?
Each algorithm can follow one of many paths to reach its destination
TCP port used by Point-to-Point Tunneling Protocol (PPTP)
PPTP is a protocol that is ideally meant for
In the case of dial up networking, this term refers to a modem
A VPN tunneling protocol operates at this layer
As a trunk
How a physical NIC must be configured so that it can connect its host’s VMs to multiple VLANs
The ability to create tunnels
Function that makes VPN protocols unique
In a ____ VPN, tunnels correct multiple sites on a WAN.
All of the above: From a smartphone using cellular signals, From a server at an office oversees, using a T1, From a desktop workstation attached to a DSL Internet connection
As a business owner, you have decided to outsource all of your company’s IT services to a cloud computing service provider. How can your clients and employees access these services?
In which of the following situations would you use RDP
Refers to dialing directly into a private network’s ISP’s remote access server to log on to a network
On network diagrams, the Internetis frequently depicted as a ____.
UNIX is an open source Operating System. T/F?
Windows for Workgroups
Which of the following is not a network operating system (Windows NT, Linux, Windows for Workgroups, Windows 2000)
VPNs can be classified based on the kinds of ___ they connect.
Any type of Internet connection
A VPN is designed to connect 15 film animators and programmers from around the state of California. At the core of the VPN is a router connected to a high-performance server used for storing the animation files. The server and router are housed in an ISP’s data center. The ISP provides two different T3 connections to the Internet backbone. What type of connection must each of the animators and programmers have to access the VPN?
Which of the following are required when logging on to a Windows NT Server?
Each of the VMs on your host computer is configured to use the NAT networking type. They can still pick up e-mail and surf the Web. How are they getting their IP addresses?
Which of the following protocols is supported by Windows 2000 Server for the purpose of dial-up? Choose 2 (TCP/IP, IPX/SPX, SLIP, PPP)
PAP, CHAP, MS-CHAP, and MS-CHAPv2, are all used to provide:
Combination of public key and private key is known as a ____.
Public / private key pair is a feature of:
The use of certificate authorities to associate public keys with certain users is known as ___.
How many keys are required for public key encryption
Plays a crucial role in the public key infrastructure
Public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail data in transmission
Symmetric-key algorithms are based on a single key (shared key), block ciphers provide stronger encryption than stream ciphers, public/private key pair is a feature of asymmetric encryption
If you are entering your account number and password in a Web form to check your bank account balance online, which of the following encryption methods are you most likely using?
PAP, TFTP, L2TP
Lack of encryption is a feature of: (Select all that apply): PAP, IPsec, TFTP, L2TP
Attack occurs when a hacker tries numerous possible character combinations to find the key that will decrypt encrypted data
Which of the following is used as another term for a rogue wireless access point?
Attack occurs when an Internet chat user sends commands to a victim’s machine that causes the screen to fill with garbage characters and requires the victim to terminate their chat sessions
Attack that occurs when a hacker uses programs that try a combination of a user ID and every word in a dictionary to gain access to the network.
In a decoy DMZ
You have decided to add a honeypot to your network. Where on the network would you place it?
System that is used to divert an attacker from the real production network, system that is meant to be compromised, system that allows security administrators to monitor activities of a hacker
What is a honeypot? (Select 3) System that is used to divert an attacker from the real production network, system that hasn’t got any security measures in place, system that is meant to be compromised, virtual system that is used for testing updates and malware analysis, system that allows security administrators to monitor activities of a hacker
Attack that occurs when a system becomes unable to function because it has inundated with requests for services and can’t respond to any of them
You are alerted that suddenly 100% of the resources on your two core routers are being used and no legitimate traffic can travel into or out of your network. What kind of security attack are you most likely experiencing?
Smurf attack is an example of:
Configuring your firewall to deny requests to ports 20 and 21
Which of the following techniques would prevent an FTP bounce attack
Software searches a node for open ports
Doesn’t send the actual password, periodically reauthenticates the client during session, uses hashing
Challenge-Handshake Authentication Protocol (CHAP): (Select 3) - Doesn’t send the actual password, is less secure than Password Authentication Protocol (PAP), periodically reauthenticates the client during session, sends passwords in cleartext, uses hashing
Main function is to examine packets and determine where to direct them based on their Network layer addressing information
Source IP address
Which of the following criteria could a router’s ACL use for denying packets access to a private network?
A ___ firewall is a router (or a computer installed with software that enables it to act as a router) that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination
A VPN ____ authenticates VPN clients and establishes tunnels for VPN connections
IEEE standard that defines port-based access control
Which IEEE standard specifies security mechanisms for wireless networks?
You are designing an 802.11n wireless network for a local café. You want the wireless network to be available to the café’s customers, but not to anyone with a wireless NIC who happens to be in the vicinity. Which of the following security measures require customers to enter a network key to gain access to your network via the access point?
Uses hashing, periodically reauthenticates the client during session, doesn’t send the actual password
Challenge-Handshake Authentication Protocol (CHAP): (Select 3) Uses hashing, periodically reauthenticates the client during session, doesn’t send the actual password, sends passwords in cleartext, is less secure than password authentication protocol (PAP)
Which of the following encryption techniques is incorporated into IP version 6?
In transport mode, IPsec doesn’t offer any encryption (T/F)
In tunneling mode, IPsec encrypts the entire packet (T/F)
Role-based access control (RBAC)
Which access control model assigns permissions based on job function?
Both computers verify the credentials of the other
Authenticating LAN users
Kerberos is ideally meant for ______
What type of device guards against an attack in which a hacker modifies the IP source address in the packets she's issuing so that the transmission appears to belong to your network?
Enhanced security by security by servicing requests on behalf of many users, scanning outbound content to prevent data leakage, faster access to resources through caching, scanning processed content for malware
Which of the following can be implemented through a proxy server? (Select all that apply): Enhanced security by security by servicing requests on behalf of many users, scanning outbound content to prevent data leakage, faster access to resources through caching, scanning processed content for malware
Security zone that offers best security
If a firewall does nothing more than filter packets, at what layer of the OSI model does it operates?
RC4 is used in
Uses SSL/TLS, runs on TCP port 443
Cryptographic hash functions
Sending alert, logging event
Examples of what an IDS can do
Requires port-based authentication
Access security Windows 2000 Server uses on LANs
It establishes a path between the sender and receiver that is guaranteed to supply sufficient bandwidth for the transmission
How does RSVP help improve QoS?
Measure of how well a network service matches its expected performance
On a VoIP network that uses the DiffServ QoS technique, which of the following makes certain that router forwards packets within a given time period
A computer programmed to act like an IP telephone
Skype, the popular Internet telephony service, provides a user with what type of interface?
___ signaling functions are more limited than those performed by the protocols in the H.323 group
SIP and H.323 regulate ___ for VoIP or video-over-IP clients and servers
H.323, Session Initiation Protocol (SIP)
Used for managing VoIP sessions
H.323, Session Initiation Protocol (SIP), Real-time Protocol (RTP)
Which of the following are used to implement Voice over IP (VoIP)? (Select all that apply): H.323, Session Initiation Protocol (SIP), RDP, S/MIME, Real-time Protocol (RTP)
SIP messages use fewer processing resources; SIP supports a wider range of voice and video codecs.
Which of the following are reasons for choosing SIP over H.323? SIP has limited functionality, which makes it more flexible, SIP includes QoS mechanisms that make it more dependable, SIP messages use fewer processing resources, SIP is an older, more reliable standard, SIP supports a wider range of voice and video codecs.
Session Initiation Protocol (SIP), H.323, Real-time Transport Protocol (RTP)
Implement Voice over IP (VoIP)? (Select all that apply): Session Initiation Protocol (SIP), H.323, RDP, Real-time Transport Protocol (RTP), S/MIME
Suppose our organization’s PSTN and VoIP systems are integrated, and that your VoIP system adheres to architecture specified in H.323. Which of the following performs translation between the PSTN’s signaling protocols and H.323 on your network
Which of the following protocols would be used by a video bridge to invite a video phone to join a videoconference?
Handles call setup, call routing, and call termination
What function does the H.225 protocol provide, as part of the H.323 VoIP specification?
Among all video-over-IP applications, ___ is perhaps the simplest
Watching a YouTube video on the Web is an example of which of the following types of video-over-IP services?
When more than two people participate in a videoconference, for example, in a point-to-multipoint or multipoint-to-multipoint scenario, a video ___ is required.
Video over IP
IPTV, videoconferencing, streaming video, and IP multicasting belong to the range of services known as ___.
What type of video-over-IP service relies on full-duplex communication?
One drawback to ___ video is that content may not be edited before it’s distributed
___ is preferred over TCP for real-time applications such as telephone conversations and videoconferencing
A company’s use of VoIP on its WAN to avoid long distance telephone charges
Using VoIP over a WAN allows an organization to avoid paying long-distance telephone charges, a benefit known as ____.
When a caller user an IP telephone, his or her voice is immediately digitized and issued from the telephone to the network in ____ form.
Application Layer of the OSI model
Session Initiation Protocol (SIP) is part of:
Application Layer of the OSI model
Real-time Transport Protocol (RTP) resides at:
____ signaling functions are more limited than those performed by the protocols in H.323
SIP and H.323 regulate ___ for VoIP or video-over-IP clients and servers.
Call signaling and control
In SIP, which of the following network elements maintains a database with network address information for every SIP client?
Many network engineers consider ___- to be superior to MGCP
Which of the following is the most popular signaling protocol used on traditional, circuit-switched PSTN connections?
What can RTCP do that RTP cannot?
A private switch that accepts and interprets both analog and digital voice signals
ATA (analog telephone adapter)
When using an analog telephone, a VoIP adapter that performs analog-to-digital conversion is known as a(n) ___.
Which of the following tools can be used to examine the contents of network traffic?
The Traffic Class field in an IPv6 datagram serves the same function as which of the following fields in an IPv4 datagram?
A(n) ____ is a computer that manages multiple media gateways.
___ describes the use of any network to carry voice signals using the TCP/IP protocol.
What protocol manages addressing for multicast groups?
You have decided to establish a VoIP (voice over IP), system in your home. Which of the following devices is necessary to connect your analog telephone to your VoIP server?
Report on the degree of packet loss and delay in a connection
What can RTCP do that RTP cannot?
Decodes video signals and issues the to a television
In an IPTV system, which of the following functions does a set top box perform?
Supported services list
A ___ is a document (preferably online) that lists every service and software package supported within an organization, plus the names of first- and second-level support contacts for those services or software packages
IP address from the 169.254/16 range may indicate problems with what kind of service?
If a host gets a link-local address only, this may indicate a possible problem with
To take advantage of network monitoring and analyzing tools, the network adapter installed in the machine running the software must support ___ mode.
Is used for packet sniffing, allows a computer to read data addressed to other computers on the network
Which of the following frequently results in negative frame sequences checks?
___ is one of the most important aspects to consider when looking at how a problem solution ight affect users and network functionality.
An administrator should take the time to troubleshoot all network problems correctly by asking specific questions designed to identify the problem ____.
Faults in fiber-optic cabling can be located with the use of:
Excessive late collisions
Which of the following symptoms would probably be present if a client’s NIC was set to transmit data in half-duplex mode while the switch port to which it was attached was configured for full duplex mode?
Telltale factor for ascertaining where faults in a cable lie
Fundamental property of wire that depends on a wire’s molecular structure and size.
Usually results from a bad NIC
What function of a wireless network testing tool measures the amount of interference on a certain channel within a frequency band?
Which of the following tools could you use to determine whether a user’s workstation is transmitting packets in the proper Ethernet frame type for your network?
You have been asked to help solve a problem that suddenly appeared on your company’s network. All data transmission has slowed to a crawl. You suspect a DOS attack or a broadcast storm. Which of the following tools would help you determine the source of either of these problems?
The danger in using a ___ is that it could collect more information than you or the machine can reasonably process
A small electronic device that issues a signal on a wire pair
A software-based tool that continually monitors network traffic from a server or workstation attached to the network
Which of the following tools would you use to verify that your new cable meets Cat 6a standards?
Process or program that provides support personnel with centralized means of documenting changes to the network
A manager in the Sales Department complains that none of her 112 sales people across the country can connect to the company’s VPN.
As a help desk analyst, or first—level support technician, which of the following calls are you most likely to escalate to second-level support personnel?
Her workstation’s wireless connection configuration
You are helping a user who cannot connect to the Internet from her wireless workstation on your company’s LAN. After determining that she is the only user having this problem, and that user error is not the problem’s cause, what is the next thing you check?
Tone probe, tone generator
Which of the following are wire identification / cable location tools?
Which of the following services may need troubleshooting if a host gets a single IP address and that address has the fe80::/10 prefix?
How many users have similar symptoms?
To help you identify the area affected by a problem, which of the following questions might provide the answers you need?
None of the above
You are working at the help desk and take a call from a user who cannot log on to the network. After verifying that this user is the only person affected, you ask for his username and password and try replicating the problem. When you can successfully log onto the network with his user name and password from your help desk workstation, which of the following causes can you rule out: faulty cabling between the user’s workstation and the wall jack, user error, improper protocol configuration on his workstation, none of the above)
A source of excessive EMI has been introduced
You are using your wireless LAN connection to copy documents to a shared folder on your company's file server, when suddenly the connection stalls out. You check your wireless connection status, which indicates that you are still associated with your AP. Next, you run a protocol analyzer program on your workstation, which indicates an excessive number of lost or dropped packets between your workstation and the AP. Which of the following causes could be at fault?
The configuration on a switch in the telecommunications closet is upgraded
Which of the following is an example of a network change that could cause only one group of workstations out of the dozen workgroups in your organization to lose connectivity to a local file server?
Help desk coordinators
Often considered third-level support
Help desk analysts
Are often considered first-level support
All of the above
Suppose a user on your organization's network has changed the subnet mask value in his network interface's TCP/IP properties. Which of the following symptoms might he report when he calls the help desk: he cannot save a document to the network’s file server, he cannot print to a shared printer on the network, he cannot connect to the internet, all of the above
At the end of the cable connected to the switch’s management port
You are troubleshooting a connectivity problem that you believe is related to a faulty cable between a switch and a punch-down block. However, in the disorganized telecommunications closet, it seems impossible to determine which cable belongs to the switch by simply looking at the punch-down block. You decide to use a tone generator and locator to find the cable. Where will you issue the tone?
All users on a network are unable to retrieve e-mail
You are troubleshooting a problem that you suspect is caused by an Internet gateway failure. Assuming your organization relies on only one Internet gateway, which of the following symptoms would lead you to focus on the gateway as the source of the problem.
The user is no longer able to log on to the network
You have recently resolved a problem in which a user could not print to a particular shared printer by upgrading her workstations client software. Which of the following might be an unintended consequence of your solution?
After your Internet service provider makes some changes in the way they connect to their network service provider, your organization's connection to a customer's Web site becomes noticeably slower. Which of the following troubleshooting tools helps you identify the number of hops between your office and the customer's Web site?
When used on a copper-based cable, a continuity tester applies a small amount of ___ to each conductor at one end of the cable.
Which of the following tools can be used to analyze network traffic
You have decided to take a break from your position at a telephone company’s helpdesk and accompany a field technician to learn how to troubleshoot local loops. Which of the following tools will help you verify that line is receiving dial tone from the CO (Central Office)?
Can be used to intercept a telephone conversation
Percentage that represents the highest availability
Detects malware by comparing current characteristic of files and disks against an archived version of these characteristics to discover any changes
A(n) ___ UPS uses the A/C power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery
Factor that you must consider when using cloud backups that you don’t typically have to consider when backing up to an external storage device?
How frequently a full backup is performed in the grandfather-father-son backup scheme
Files changed since Wednesday (a day before)
In a Grandfather-father-son backup scheme, the October—week 1—Thursday backup tape would contain what type of files?
Type of media capable of storing digitized data and that uses a laser to write data to it and read data from it
When purchasing a UPS, you have to match the power needs of your system according to what unit of measure
Clustering failover takes place more rapidly.
Which of the following can be considered an advantage of clustering servers over mirroring servers?
Fault tolerance technique that links multiple servers together to act as a single server
SANs (storage area networks)
Which of the following offers the highest fault tolerance for shared data and programs?
Mesh topologies and ___ topologies are good choices for highly available enterprise networks.
It uses dual fiber-optic rings to connect nodes.
What makes SONET a highly fault-tolerant technology
A(n) ___ virus changes its characteristics every time it is transferred to a new system
A(n) ___ is a deviation from a specified level of system performance for a given period of time
A group of hard disks is called a ___.
____ Web sites are locations on the Internet that dynamically duplicate other locations on the Internet, to ensure their continual availability
___ scanning techniques attempt to identify malware by discovering “malware-like” behavior
___ are distinct networks of storage devices that communicate directly with each other and with other networks
Intended to eliminate single points of failure
Suppose you want to use redundant firewalls on you WAN link. Which of the following protocols would allow you to make both firewalls respond to requests for the same IP address?
Which of the following commands allows you to determine how long your Linux server has been running continuously
A(n) ___ virus disguises itself as a legitimate program to prevent detection.
An incremental backup resets the archive bit after backing up files, whereas a differential backup does not.
What is the difference between an incremental backup and a differential backup?
Which protocols does Network Attached Storage (NAS) use?
They use a proprietary network transmission method, rather than Ethernet
Why do SANs save and retrieve files faster than NAS devices
____ is a specialized storage device or group of storage devices that provides centralized fault-tolerant data storage for a network
Programs that run independently and travel between computers and across networks
It uses dual fiber-optic rings to connect nodes
What makes SONET a highly fault-tolerant technology
It broadcasts communication from one chat room participant to others
What characteristic of the IRC protocol makes it an effective way to spread viruses and worms quickly?
A program that disguises itself as something useful but actually harms your system
Program that runs automatically, without requiring a person to start or stop it
To the SAN
Suppose you are the network manager for an ISP whose network contains five file servers that use software RAID, a NAS installation, and a SAN. You learn that the company is taking on a huge Web hosting client and you need to add 10 TB of storage space as soon as possible. To what part of the network should you add the storage so that it causes the least disruption to the existing network.
Regularly update the anti-malware software’s signature database
If your anti-malware software uses signature scanning, what must you do to keep its malware-fighting capabilities current?
Power that is free from noise is called “____” power.
Which of the following allows two interfaces on a switch share the burden of receiving and transmitting traffic over a single logical connections
Approximately how long will an online UPS take to switch its attached devices to battery power
An archive ___ is a file attribute that can be checked or to indicate whether the file must be archived.
___ management is the collection, storage, and assessment of information related to the versions of software installed on every network device and every device’s hardware configuration.
Which of the following systems would store information about the VTP settings for a switch’s interface
___ management refers to monitoring how well links and devices are keeping up with the demands placed on them
Average daily traffic traveling over the link
Which of the following pieces of information must you collect when establishing a baseline for the performance of a WAN link?
Network device devoted to storage and delivery of frequently requested files
The local storage of frequently needed files that would otherwise be obtained from an external source.
The most common type of caching is ___ caching.
___ management refers to the detection and signaling of device, link, or component faults
Maintaining records of each time a switch interface fails is part of which of the following practices?
Suppose that half of the patch cables that connect a workshop of computers in the Accounting Departments to patch panel needed to be replaced due to concerns about faulty manufacturing. Which of the following types of documentation would help you identify these patch cables?
A(n) ___ is a graphical representations of a network’s wired infrastructure.
Because backbone upgrades are expensive and time consuming, the first step in approaching such project is to ___ it.
The most critical type of software upgrade you will perform is an upgrade to your ____.
The process where one network management console collects data from multiple networked devices at regular intervals is known as ___.
Which of the following techniques could be used to prevent clients from downloading more than 50 GB of data per day through a given network interface?
___ upgrades typically overwrite some system files on the workstation, so their installation may affect other applications adversely.
Which of the following port numbers are used by Simple Network Management Protocol (SNMP)?
Which of the following applications would allow you to determine how many times in the past seven days your Windows 7 workstation has been unable to renew its DHCP-assigned IP address?
A networked ___ is perhaps the simplest device to add
You researched a new type of switch and proved that upgrading your switches to this model is feasible. What is the next step you take before replacing your old switches
On your Linux server, what file tells you where your system log file is kept?
___ involves manipulating certain characteristics of packets, data streams, or connections to manage the type and amount of traversing a network or interface at any moment.
The most comprehensive and complex upgrade involving network hardware is a ___ upgrade
When the change might affect applications or utilities on which the users rely
Under what circumstances should a network administrator inform users of a software change?
The process of reverting to a precious version of software after attempting to upgrade it is known as ___.
Which of the protocols is commonly used for communication between network management agents and applications?
Which of the following require(s) authentication between an agent and network management console.
A key component in managing networks is identifying and tracking its hardware and software through ___ management
Routine that collects management information on a device is also known as:
A network management agent is a ___ that collects information about a device’s operation and provides it to the network management application.
Model number for every router, switch, and access point on the network; serial number for every server on the network
Total bits per second traveling through the affected switch, compared to total bits per second traveling through the redundant switch
You suspect that one of your network’s two redundant core switches has a NIC or cable that’s experiencing transmission problems. Supposing you never obtained a baseline for traffic on this switch, which of the following measurements would help you verify your suspicion?
Which of the following practices creates a starting point for ongoing evaluation of your network’s health?
You have decided to use an application that will send a textmessage to your smartphone every time one of your network’s core routers or switches experiences an event that the system considers an emergency. All switches and routers run Cisco IOS. The application will alert you about events identified with which of the following severity levels?
Restore the server’s software and configuration from a backup
Which of the following is the best way to reverse a network operating system upgrade?
Mac OS X account that has read and write privileges to all areas of the file system called
Suppose you work for a financial institution that wants to make sure its clients can log on and review their accounts no matter how much traffic your WAN is experiencing. On your edge router which of the following criteria will you use to prioritize traffic for all HTTPS requests?
A patch is designed to make mirror connections or enhancements, whereas an upgrade replaces most, if not all, of the software code.
Sign up for free and study better.
Get started today!