Chap 3 - Network Operations Flashcards
MIB
Management Information Base
- database that stores all reosurces to be monitored
- data is hierarcical
- resources are atrrtibuted an ID, OID, object identifier
SNMP
Simple Network Management Protocol
- SNMPv1 (1988): Initial version, basic features for network management. Cleartext string authenication
- SNMPv2: added better security, but not backwards compatible with v1
- SNMPv2c: Minor tweaks to SNMPv1, improving efficiency, uses community strings for authenitcation, which are cleartext for backwards compatibility with v1
- SNMPv3: Adds encryption, robust authentication, and enhanced device management features.
- Communication: Uses UDP ports 161 (agent) and 162 (NMS aka traps)
3-1: After starting work as the network admin of Wingtip toys, you discovery that all of the switches in the company’s datacenter have support for remote management with built-in SNMP agents in each port. Which of the following tasks must you perform to be able to gather informaiton from the agents on those switches and display it on the central console? (Choose all that apply)
- Install the network management software on a network computer
- Install a MIB on each of the switches
- Install an agent on the console computer
- Install an MIB on the console computer
- Purchase a network management product
- Install the network management software on a network computer
- Purchase a network management product
Three items in an SNMP based network management system
- a management console software product installed on a network computer
- agents installed on the devices you want to manage
- MIBs for each of the agents
Note: if a switch already has built-in support for SNMP, it means that they already have the agents and MIBs installed
3-2: Which version of SNMP do not include any security protection other than a cleartext community string? (Choose all that apply)
SNMPv1
SNMPv2
SNMPv2c
SNMPv3
SNMPv1
SNMPv2c
3-3: Which of the following statements about SNMP are not true? (Choose all that apply)
- To effectively monitor a network using SNMP, you must be sure that all of the equipment you purchase when designing and building your network supports the protocol
- SNMP is not only the name of a protocol, its also the name of a network management product
- SNMPv1 and SNMPv2 rely on a community string as their only means of security
- Most of the network management products on the market today support SNMPv1
- SNMP is not only the name of a protocol, its also the name of a network management product
- SNMPv1 and SNMPv2 rely on a community string as their only means of security
Syslog
- Syslog Server: Collects messages from multiple devices across a network.
- Listening Port: Uses UDP port 514 for logging messages from clients.
- Log Reviews: Supports analysis of traffic logs and audit logs.
- Message Tagging: Can automatically categorize messages by severity levels, ranging from 0 (Emergency) to 7 (Debug).
- Telcos: Use TCP port 601 for syslog, though this is less common in general IT contexts
3-6: You are the network admin of your company’s network. Your company wants to peform a baseline anaylsis of network related traffic and statisitics. They want to track broadcasts, Cyclical Redundancy Check (CRC) and collision for all traffic transversing a switched network. In addition, they want to provide historical and daily reports for management. They also want to keep track of software distribution and metering. What type of network software product best meets their needs?
SNMP management
Protocol analyzer
Performance monitor
Network traffic monitor
SNMP management
3-8: SIEM products combine the capabilities of which of the following (Choose all that apply)
Syslog
SNMP
SEM
SIM
SEM
SIM
SEM
SEM (Security Event Management)
involves real-time monitoring of security events across the entire enterprise, often through edge devices, and centralizing security and event logs for analysis
SIM
Security Information Management (SIM)
This pertains to the practice of collecting, monitoring, and analyzing security-related data from computer logs and various network sources to identify security threats or incidents.
3-10: Which of the following statements best describes a baseline?
- A baseline is an estimation of expected performance levels, based on manufacturer’s specifications
- A baseline is a record of performance levels captured under actual workload conditions
- A baseline is a record of performance levels captured under simulated workload conditions
- A baseline is a record of performance levels captured before the system is actually in use
A baseline is a record of performance levels captured under actual workload conditions
Syslog codes
- 0 (emergency) -7 (debug)
- code 0 means the system is unusable
- code 1 is an alert message meaning immediate action is needed
- code 2 is a critical condition alert
- code 3 is an error condition
- code 4 is a warning
- code 6 is information
- code 7 is debug (lots of info)
3-18: Which of the following are reasons contributing to the number of packet drops displayed by an interface montior? (Choose all that apply)
Resets
Discards
Errors
Overflows
Discards
Errors
Discards
the process where a router discards a packet when its Time to Live (TTL) number decreases to zero at each hop
Overflows
where a system or a buffer cannot handle more data than it is designed to hold, leading to data loss or system malfunctions
3-20: Log management typically consists of which of the following tasks? (Choose all that apply)
Rollback
Utilization
Security
Cycling
Security
Cycling
Cycling
technique for managing log size by configuring it to delete the oldest record each time a new one is added
3-21: Which of the following SIEM processes performs searches for specific critieria, during specific timeframes, in logs located on different computers?
Data aggregration
Forensic analysis
Correlation
Retention
Forensic analysis
3-22: Which of the following terms best describes the SIEM process of consolidating log information from multiple sources?
Data aggregration
Forensic analysis
Correlation
Retention
Data aggregration
Jitter
connectivity problem on wired networks that is caused by individual packets that are delayed due to network congestion, different routing, or queuing problems
affects VoIP and streaming media mostly
3-23: Which of the following terms best describes a connectivity problem on wired networks that is caused by individual packets that are delayed due to network congestion, different routing, or queuing problems?
Latency
Attenuation
Jitter
Bottleneck
Jitter
3-24: Which of the following network interface occurences are considered to be malfunctions on a full-duplex Ethernet network? (Choose all that apply)
Runts
Giants
Collisions
Late Collisions
Runts
Giants
Collisions
Late Collisions
Runts
packets smaller than the 64-byte minimum allowable length
Giants
packets larger than the 1518-byte maximum allowable length
3-39 (apprebreviated as its too damn long in the book): Which of the following is not an environment factor that would need to be monitored in a data center adhering to the Tier III standard (99.9% uptime)?
Flood
Humidity
Radon
Static electricity
Temperature
Radon
3-40: Routers using link states and Dijkstra’s algorithm to calculate the lowest cost route to a specific destination can conceivably be running which of the following interior gateway routing protocols? (Choose all that apply)
OSPF
RIP
EIGRP
IS-IS
BGP
OSPF
IS-IS
IS-IS
Intermediate System - Intermediate System
- interior routing protocol
- link state protocol
- uses Dijkstra’s algorithm
3-41: Which of the following is the term usually applied to a representation of network devices, automatically complied, and containing information such as IP addresses and connection speeds?
Network map
Network diagram
Cable diagram
Management information base
Network map
Network Map
a representation of network devices, automatically complied, and containing information such as IP addresses and connection speeds
diagram the relationships between devices, and provide information about the links that connect them
3-42: Which of the following types of network documentation is often overlaid on an architectural drawing or blueprint?
Network map
Network diagram
Cable diagram
Management information base
Cable diagram
Network Diagram
document containing pictograms of network devices with lines representing the connections between them
Cable Diagram
- precise depiction of the cable that is installed at a site
- often drawn on an architect’s floor plan or blueprint
- enables network admins to locate specific cables and troubleshoot issues
3-43: Which of the following is not one of the typical heights for devices mounted inn IT equipment racks?
1 unit
2 units
3 units
4 units
3 units
3-44: The cable plant for your company network was installed several years ago by an outside contractor. Now, some of the paper labels have fallen off your patch panels, and you do not know which wall plate is connected to each port. Assuming that you are working on a properly maintained and documented network installation, which of the following is the easiest way to determine which port is connected to which wall plate?
- Consult the cable diagram provided by the cabling contractor at the time of installation
- Call the cable installation contractor and she if he/she can remember which ports go to which wall plates
- Attach a tone generator to a patch panel port and then test each wall plate with a locator until you find the correct one. Repeat this for each port that needs labeling
- Use a cable certifier to locate the patch panel associated with each wall plate port
Consult the cable diagram provided by the cabling contractor at the time of installation
Nick: key to this answer is in the question: “Assuming that you are working on a properly maintained and documented network installation,” however this is NEVER the case….
ISO-19770 standards
family of IT asset management (ITAM) standards that defines for procedures and technology for the management of software and related assets in a corporate infrastructure
- ISO 19970-1: compliance with corporate governance
- ISO 19970-2: focused on SWID tags, XML files with management and ID information about a specific software product
- ISO 19970-3: manage software entitlements, to simplify license compliance
- ISO 19970-4: resource utilization measurement
3-46: Which of the following are places where network wiring connections are found? (Choose all that apply)
MDF
MTBF
IDF
RDP
MDF
IDF
MDF
Main Distribution Frame
the room in a building that houses the demarcation point, telephone cross-connects, and LAN cross-connects
IDF
Intermediate Distribution Frame
a room where all the horizontal cabling from different areas of a building, such as workstations, converges. It serves as a central point for connecting and managing these cables
4-47: A rack diagram is typically ruled vertically using which of the following statements?
Inches
Centimeters
Units
Grids
Units
Unit
Vertical measurement for rack diagrams. Written as: 1U, 2U, 4U
1U = 1.75 inches or 44.5mm
3-49: Which of the following statements are true about the differences between a diagram of a patch panelt installation organized physically and one that is organized logically? (Choose all that apply)
- a phyiscal diagram is organized according to the floors and rooms where the cable drops are located
- a phyiscal diagram is precisely scanned to represent the actual patch panel hardware
- A logical diagram is organized according to the divisions within the company, such as departments and workgroups
- A logical diagram uses an organization that represents company divisions but does not physically resemble the actual patch panels
- a phyiscal diagram is organized according to the floors and rooms where the cable drops are located
- A logical diagram is organized according to the divisions within the company, such as departments and workgroups
3-52: At what point in the installation process should patch panel ports and wall plates be label?
When the patch panels and wall plates are installed
When a length of cable is cut from the spool
When the cables are attached to connectors
When the cable runs are tested, immediately after their installation
When the cables are attached to connectors
Nick: confusing question as this answer sounds similar to the last answer, and what is installation defined as in this case? Stupid CompTIA…
3-54: Your department is experiencing frequent delays as users wait for images to render using their outdated graphics software package. As a result, you are planning to submit a change request for a new software product at the monthly meeting of the company’s change management team. Which of the following types of information are likely to be included in your request? (Choose all that apply)
- The possibility of rolling back to the previous software, if necessary
- The procedure for installing and configuring the new software
- An estimate of the productivity increase realizable with the new software
- A list of software and hardware upgrades or modifications needed to run the new software
- The possibility of rolling back to the previous software, if necessary
- The procedure for installing and configuring the new software
- An estimate of the productivity increase realizable with the new software
- A list of software and hardware upgrades or modifications needed to run the new software
3-56: The change request for new graphics software that you submitted to your company’s change management team has been approved. Now it is time ot implement the change. Which of the following administrative tasks wil most likely be the change management team’s responsibility during the implementation process? (Choose all that apply)
Authorizing downtime
Notifying users
Designating a maintanence window
Documenting all modifications made
Authorizing downtime
Designating a maintanence window
ISO-19770-5
overview of functions provided by the standards and their benefits to an IT infrastructure, aka ITAM - IT Asset Management
Wiring Schematic
indicates where cables are located in walls and ceilings, including complete route of every internal cable run from wall plate to patch panel
Physical Network Diagram
identifies all of the physical (hardware) devices and how they are connected together
Logical Network Diagram
- contains IP addresses
- firewall configurations
- ACLs
- and other logical elements of network configuration
3-63: What is the width of a standard equipment rack in a datacenter?
12 in
16 in
19 in
24 in
19 in
racks are approx 6ft tall
Horizontal Cabling
Horizontal cabling refers to the segment of cabling that runs more or less horizontally from work areas to the telecommunications room within a structured cabling network