7A Flashcards

1
Q

Why is it important to monitor networks?

A

When networks fail, the flow of information required by applications and business operations stop.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does “NMSs” stand for?

A

Network monitoring systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What do “NMSs” do?

A

Monitor the network for problems caused by overloaded or crashed
servers, network connections or other devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An NMS is used by network administrators typically to monitor what?

A
  1. Availability of network services
  2. Functionality of network interfaces
  3. Status of critical hardware systems, CPU, memory, or bandwidth
  4. Service or device availability: Is service or device up and responding to requests?
  5. Network response time: How fast is each request processed?
  6. Network route analytics: What network routes do requests travel through, which hops exist between client and server, are routes optimal?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of an “NMS”?

A
  1. Identifies and sends out alerts regarding issues affecting availability or functionality of network services.
  2. Assist to ensure critical systems in network are available and
    functioning properly.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some examples of suspicious activity that an NMS might find?

A

Suspicious activity may include network scanning, multiple connection
attempts to a network device from an unknown entity, or other reportable activity detected at any level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some examples of intrusion activities that an NMS might find?

A

Intrusion activity may include the presence of unusual or excessive activity on the network, or unauthorized individuals gaining full (root) or limited (user) access to a network device or information system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some tools that fall under NMS?

A

Intrusion Detection System (IDS), and Simple Network Management Protocol (SNMP.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the five basic functions that NMS provides?

A
  1. Discover
  2. Map
  3. Monitor
  4. Alert
  5. Report
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the discover function of NMS do?

A

First function is to find devices (routers, switches, firewalls, printer, etc. ) on the network and if it can, determine how they are connected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When a network monitoring system completes the discovery process, it
automatically assigns what?

A

it automatically assigns an appropriate device role to each discovered device on the discovered device list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The device roles assigned by NMS discovery function are ____ and ____ specific. (For example, what you monitor on a Cisco Router will differ from a Dell Server.)

A

type and vendor specific

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does the map function of NMS do?

A

This function is to visualize your network. This is done by generating network maps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Network maps provide what?

A

They provide a clean and orderly representation of the wiring closet. Network maps display devices and up-to-date status.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Many NMSs require a significant amount of _________ to create a network map.

A

Manual processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does the monitor function of the NMS do?

A

This function keeps an eye on your network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

NMSs provide _______ device roles that define what to monitor.

A

turn-key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

NMSs expose network administrators to a large selection of _________.

A

monitors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

As a starting point, network administrators want to monitor the “big
5” for any device on the network. What are these 5?

A
  1. Ping activity and latency
  2. CPU
  3. Memory
  4. Disk
  5. Interface utilization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A _____ is one of the most basic techniques that monitoring
software uses to test devices within a network.

A

ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Most network monitoring tools provide monitors for other hardware components like the ____ and ________ supplies in a switch, and even monitor the temperature in a wiring closet.

A

fans and power supplies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Most network monitoring tools can also monitor network
services like….?

A

HTTP, TCP/IP and FTP

23
Q

The NMSs alert function notifies network
administrators when…?

A

Notifies administrators when something goes
wrong.

24
Q

___________ alerting enables network administrators to respond to problems before they impact users, or applications.

A

Threshold-based alerting

25
Q

__________ is an automated messaging system that sends messages
when an event affects a network device.

A

Syslog

26
Q

What does the alert function of the NMS do?

A

The NMSs notify network administrators when something goes
wrong.

27
Q

Some NMSs let network administrators configure _____________ when alerts are suspended. For example, to save energy costs, shut printers down at night.

A

blackout periods

28
Q

What does the report function of the NMS do?

A

This function deals with real-time and historical reporting.

29
Q

The report function of NMS enables network administrators to:

A
  1. Validate that network designs are delivering the desired results
  2. Expose trends that could impact the ability of the network to deliver the performance demanded by users, applications, and the mission.
  3. Isolate and fix performance problems quickly
30
Q

NMSs report function delivers monitoring information in webpages called _________.

A

dashboards

31
Q

Dashboards are made up of ___________. For example, a top 10
CPU utilization view or a Top 10 Memory utilization view.

A

turn-key views

32
Q

In the NMS report function, network administrators can do what?

A
  1. Scan summary dashboards to assess the health of the entire network and then drill down with detailed dashboards of specific devices and monitors to quickly isolate performance problems.
  2. Create dashboards for the Help Desk, and counterparts managing systems and applications.
33
Q

What does IDS stand for?

A

Intrusion Detection System

34
Q

What does an IDS do?

A

An IDS detects anomalies with the aim of catching hackers before they do real damage to a network.

35
Q

How does IDS look for signs of attack in progress?

A

They scan, audit, and monitor the security infrastructure

36
Q

IDSs work by either looking for signatures of _______ attacks or ________ from normal activity. An IDS is placed on the network to monitor the traffic traversing it. This technology alerts system administrators an attack may be happening.

A

IDSs work by either looking for signatures of known attacks or deviations from normal activity. An IDS is placed on the network to monitor the traffic traversing it. This technology alerts system administrators an attack may be happening.

37
Q

What does SNMP stand for?

A

Simple Network Management Protocol

38
Q

What protocol is one of the most widely used for monitoring?

A

SNMP

39
Q

What does SNMP do?

A

It is a standard protocol that collects data from almost any network attached device, including routers, switches, wireless LAN Controllers, wireless access points, servers, printers and more.

40
Q

SNMP works by querying what?

A

“Objects”.

41
Q

What is an object in SNMP?

A

An object is something that an NMS collects information about.

42
Q

The key functions of the SNMP management tool
include what?

A
  1. querying agents
  2. getting replies from agents
  3. establishing variables in agents
  4. recognizing asynchronous events
43
Q

Within the NMS, the ________ is responsible for establishing
communications with SNMP agents.

A

SNMP manager

44
Q

How does NMS and SNMP work together?

A

The NMS navigates and manages the system, compiling, storing, and requesting status information; the SNMP software agents respond to its requests.

45
Q

SNMP software agents and NMS communicate via the _____________________.

A

SNMP common language

46
Q

The SNMP common language can provide….?

A

key information on configuration changes and statuses

47
Q

What does MIB stand for?

A

Management Information Base

48
Q

The Objects queried by SNMP are maintained in a….?

A

MIB

49
Q

What does MIB define?

A

A MIB defines all the information that is exposed by the managed device.

50
Q

The objects in a MIB are cataloged using a standardized….?

A

numbering system

51
Q

Each object has its own, unique ___________.

A

object identifier (OID)

52
Q

What is an MIB browser?

A

An MIB Browser allows network administrators navigate thru an MIB to find additional objects that they want to monitor on a device.

53
Q

Combined with a network management system, SNMP lets you….?

A

View, monitor, and manage the nodes via one interface. This interface usually has batch command and automatic alert functionalities, stripping away the need for grueling, manual tasks.