Chapter 15 review questions Flashcards

1
Q

Which of the following practices creates a starting point for ongoing evaluation of your
network’s health?
a. Configuration management
b. Asset management
c. Fault management
d. Baselining

A

b. Asset management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Suppose you learned that half of the patch cables that connect a workgroup of computers
in the Accounting Department to a patch panel needed to be replaced due to concerns
about faulty manufacturing. Which of the following types of documentation would
help you identify these patch cables?
a. Event log
b. Baseline
c. Wiring schematic
d. Syslog

A

c. Wiring schematic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You work for a medical transcription company that contracts with hundreds of homebased transcriptionists across the country. The transcriptionists connect to your
network over a VPN that provides remote access services. Employees work at all
times of the day or night, and not all of the transcriptionists are connected at the same
time. Further, the number of transcriptionists the company hires at any time depends
on a variable workload. You need to determine whether to increase the number of
licenses on your remote access server. Which of the following variables would you
configure your network monitoring application to track over time to help you find
your answer?

a. % utilization on the VPN router’s CPU
b. Maximum traffic handled by the VPN router’s NIC
c. Number of users connected to the remote access server
d. % utilization on the remote access server’s CPU

A

c. Number of users connected to the remote access server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You have researched a new type of switch and proved that upgrading your switches
to this model is feasible. What is the next step you take before replacing your old
switches?
a. Evaluate the new switch on a pilot network that mimics your network
environment.

b. Inform users that a major network change is pending.

c. Back up the configurations of your existing switches.

d. Schedule a time for the switch upgrade that’s least disruptive to users.

A

a. Evaluate the new switch on a pilot network that mimics your network
environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You suspect that one of your network’s two redundant core switches has a NIC or cable
that’s experiencing transmission problems. Supposing you never obtained a baseline for
traffic on this switch, which of the following measurements would help you verify your
suspicion?
a. % processor utilization on the affected switch over a week
b. Total bits per second traveling through the affected switch, compared with total bits
per second traveling through the redundant switch
c. % RAM utilization on the affected switch over a week
d. Average daily traffic on the affected switch

A

b. Total bits per second traveling through the affected switch, compared with total bits
per second traveling through the redundant switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following protocols is commonly used for communication between network
management agents and applications?
a. IMAP
b. SMTP
c. NTP
d. SNMP

A

d. SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following applications would allow you to determine how many times
in the past seven days your Windows 7 workstation has been unable to renew its
DHCP-assigned IP address?
a. Event Viewer
b. DHCP logger
c. Syslog
d. TCP/IP Properties

A

a. Event Viewer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

On your Linux server, which file tells you where your system log file is kept?
a. /var/log/logs.conf
b. /etc/syslog.conf
c. /etc/usr/logs.conf
d. /var/syslog.conf

A

b. /etc/syslog.conf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following techniques could be used to prevent clients from downloading
more than 50 GB of data per day through a given network interface?
a. Caching
b. Load balancing
c. Traffic policing
d. Clustering

A

c. Traffic policing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You have decided to use an application that will send a text message to your smartphone
every time one of your network’s core routers or switches experiences an event that the
system considers an emergency. All switches and routers run Cisco IOS. The application
will alert you about events identified with which of the following severity levels?
a. 0
b. 1
c. 5
d. 7

A

a. 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Suppose you work for a financial institution that wants to make sure its clients can log
on and review their accounts no matter how much traffic your WAN is experiencing.
On your edge router, which of the following criteria will you use to prioritize traffic
for all HTTPS requests?
a. Protocol
b. Source IP address
c. Source MAC address
d. Time of day

A

a. Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An asset management database should include which of the following? (Choose all
that apply.)
a. Serial number for every server on the network

b. Usernames for every employee who uses the network

c. Model number for every router, switch, and access point on the network

d. Baseline of average daily traffic for each router, switch, and access point on the
network

e. Milestones for the network’s implementation

A

a. Serial number for every server on the network
c. Model number for every router, switch, and access point on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The routine that collects management information on a device is also known as:
a. An agent
b. A poll
c. A managed device
d. A MIB

A

a. An agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does an application patch differ from an upgrade?
a. A patch is more comprehensive than an upgrade.

b. A patch is designed to make minor corrections or enhancements, whereas an
upgrade replaces most, if not all, of the software code.

c. A patch is offered by a third-party software vendor, whereas an upgrade is supplied
by the software manufacturer itself.

d. A patch can be automatically distributed to clients over the network, whereas an
upgrade requires a manual installation.

A

b. A patch is designed to make minor corrections or enhancements, whereas an
upgrade replaces most, if not all, of the software code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Under what circumstances should a network administrator inform users of a software
change?
a. Always
b. When the change might affect applications or utilities on which the users rely
c. When the change might result in additional network traffic
d. When the change might affect how users are added to the system

A

b. When the change might affect applications or utilities on which the users rely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following systems would store information about the VTP settings for a
switch’s interface?
a. Change management
b. Event log
c. Configuration management
d. Asset management

A

c. Configuration management

17
Q

Which of the following is the best way to reverse a network operating system upgrade?
a. Reinstall the previous version of the operating system.
b. Uninstall the upgrade.
c. Remove the upgrade software folder from the server.
d. Restore the server’s software and configuration from a backup.

A

d. Restore the server’s software and configuration from a backup.

18
Q

Which of the following require(s) authentication between an agent and network
management console?
a. SNMPv1
b. SNMPv2
c. SNMPv3
d. All of the above

A

c. SNMPv3

19
Q

Which of the following pieces of information must you collect when establishing a
baseline for the performance of a WAN link?
a. Last time the link failed
b. Average daily traffic traveling over the link
c. Users’ perceptions of the link’s speed
d. Distribution of traffic types by Network layer protocol

A

b. Average daily traffic traveling over the link

20
Q

Maintaining records of each instance of a switch interface failure is part of which of the
following practices?
a. Asset management
b. Change management
c. Fault management
d. Configuration management

A

c. Fault management