3.1 Flashcards

1
Q

The manager of a server room orders a new rack system to reorganize the newly acquired state-of-the-art server blades, alongside the existing servers. Select the most important configuration information, including the labels, that the manager needs to update on the existing rack diagram. (Select three)

Port IDs and links
Standard operating procedures/work instructions
Servicing information
Uninterruptible power supply (UPS) outlets with their respective power supply units (PSU)

A

Port IDs and links
Uninterruptible power supply (UPS) outlets with their respective power supply units (PSU)
Servicing information

Port IDs and information about which appliance links through which ports is important information to include on a rack diagram for reference.

Which uninterruptible power supply (UPS) power outlets supply power to which device’s power supply units (PSU) is important in the case of uninstallation, reinstallation, rearranging, or replacing appliances on the server rack.

Information regarding dates that equipment was serviced and for what reason should always be logged thoroughly and included with the labeling when drawing a rack diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An administrator for a new company is reviewing the Standard Operating Procedures (SOP). Assess the following options and determine which are most likely on an SOP document. (Select three)

Budget considerations for equipment replacement

Procedures for dealing with customer contacts

Step-by-step configuration instructions

Security protocols

A

Budget considerations for equipment replacement
Procedures for dealing with customer contacts
Security protocols

Standard Operating Procedure (SOP)—Sets out the principal goals and considerations, such as a budget for performing a task, and identifies lines of responsibility and authorization for performing it.

Standard Operating Procedure (SOP)—Sets out the principal goals and
considerations, such as security, and identifies lines of responsibility and authorization.

Standard Operating Procedure (SOP)—Sets out the principal goals and
considerations, such as customer contact standards, and identifies procedures and authorization for performing it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A network administrator is using asset management database software to quickly reference asset information such as type, model, serial number, asset ID, location, user(s), value, service information, as well as links to vendor documentation. From the given options, choose the software the network administrator is most likely using.

Lansweeper
Microsoft Visio
Wireshark
EventSentry SIEM

A

Lansweeper

A product such as Lansweeper assists inventory management by scanning network hosts and
compiling an asset information database automatically. It also provides links to vendor documentation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A technician is on the job for a small local government office in a small town. The office resides in a single-office building with a single floor. The technician needs to troubleshoot connection issues experienced throughout the system. Determine where the technician will find the termination points of the access layer switch ports.

Rack system
IDF
MDF
VPN Concentrator

A

MDF

The Main Distribution Frame (MDF) is a core level switching location where trunk links from Intermediate Distribution Frames (IDFs) and WAN circuits terminate. For a small network, there is no need for IDFs, the MDF terminates the access layer switch ports directly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A network administrator is collecting configuration baselines by capturing Configuration Items (CI) and storing them in the Configuration Management Database (CMDB) available in the Configuration Management System software. The administrator’s next task is to identify the relationships between the various CIs and how they affect each other and the network. Describe the ideal method for capturing the relationships between CIs.

Use software tools, such as Lansweeper.
Correlate CI data with performance metrics.
Draw network diagrams.
Run a vulnerability scan.

A

Draw network diagrams.

Drawing diagrams to map the relationships between the various Configuration Items (CI) stored in the Configuration Management Database is the simplest and most efficient way to identify and organize the relationships between the CIs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In reviewing network documentation during a large overhaul of their network, management of a growing Internet Service Provider (ISP) realize they must completely relabel their Main Distribution Frame (MDF) connections, rewrite network diagram maps, and re-document key information, such as Internet Protocol (IP) addresses and bandwidth. They must also add Intermediate Distribution Frames (IDFs) to their network infrastructure. Analyze the situation and demonstrate which forms of documentation need updating. (Select two)

Port location diagrams
Standard Operating Procedure (SOP)
Job logs
Physical diagram

A

Port location diagrams
Physical diagram

A port location diagram identifies how wall ports located in work areas are connected back to ports in a distribution frame or patch panel and then from the patch panel ports to the switch ports.

A physical (layer 1) diagram shows detailed information (such as location) about the physical assets in the network and the connections or cable links running between them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An administrator for a new company is reviewing the Standard Operating Procedures (SOP). Assess the following options and determine which are most likely on an SOP document. (Select three)

  • Step-by-step configuration instructions
  • Security protocols
  • Procedures for dealing with customer contacts
  • Budget considerations for equipment replacement
A
  • Security protocols
  • Procedures for dealing with customer contacts
  • Budget considerations for equipment replacement.

Standard Operating Procedure (SOP)—Sets out the principal goals and considerations, such as a budget for performing a task, and identifies lines of responsibility and authorization for performing it.

Standard Operating Procedure (SOP)—Sets out the principal goals and
considerations, such as security, and identifies lines of responsibility and authorization.

Standard Operating Procedure (SOP)—Sets out the principal goals and
considerations, such as customer contact standards, and identifies procedures and authorization for performing it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When a change to configuration items is reactive, the change initiated is due to which of the following?

Internal forces within the organization
Forces outside of the org.
Request for Change (RFC)
Standard operating procedure

A

Forces outside of the organization

The need to change is often described either as reactive, where the change is forced on the organization, for instance, regulations or market forces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A campus student in charge of administering the school network, relabeled ethernet cables after some changes to the network. The student notices that a cable originally going to Meeting Room B on the second floor of the administration building, now goes to Computer Lab A on the third floor. The student decides to relabel the cable. Determine which labeling is most fitting in terms of port naming conventions.

Meeting Room B, Second Floor
Floor Two Cable
AB01-02B-D01
AB01-03A-D01

A

AB01-03A-D01

A typical port naming convention is for alphanumeric identifiers for the building, telecommunications space, and port. In the example, AB01 means administrative building 1, 03A means floor 3, room A. The port is Data port 1, which has not changed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A network administrator is using asset management database software to quickly reference asset information such as type, model, serial number, asset ID, location, user(s), value, service information, as well as links to vendor documentation. From the given options, choose the software the network administrator is most likely using.

Microsoft Visio
EventSentry SIEM
Lansweeper
Wireshark

A

Lansweeper

A product such as Lansweeper assists inventory management by scanning network hosts and
compiling an asset information database automatically. It also provides links to vendor documentation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A network administrator is working directly with programmers on a new project at a manufacturing plant. The project involves installing modules that a Linux server monitors, that sends “heartbeat” messages of the status of the press molds connected to the modules. Before the installation process, the programmers require the network administrator’s assistance establishing network performance baselines. Which of the following would NOT be a tool or method the administrator would use to institute performance baselines?

Access the server via command line and use the ifconfig terminal command to display IP information.

Test throughput by transferring several large files via multiple routes to test throughput and network efficiency.

Draw several network diagrams of physical and logical layers.

Use IP Flow Information Export (IPFIX) to monitor and analyze packet flow.

A

Access the server via command line and use the ifconfig terminal command to display IP information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A network administrator is working directly with programmers on a new project at a manufacturing plant. The project involves installing modules that a Linux server monitors, that sends “heartbeat” messages of the status of the press molds connected to the modules. Before the installation process, the programmers require the network administrator’s assistance establishing network performance baselines. Determine which of the following tools or methods the administrator would use to establish performance baselines. (Select three)

Test throughput between essential hosts by transfering a large file from one to the other.

Draw network diagrams of all layers.

Use a packet analyzer to investigate packets.

Use jFlow by Juniper to monitor packet flow.

A

Draw network diagrams of all layers.

Use a packet analyzer to investigate packets.

Use jFlow by Juniper to monitor packet flow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A large enterprise client asks a contracted technician to make hourly backups of an Influx database that is always open and continuously updated. The database is critical for hundreds of workers. Which of the following is the best method for accomplishing these backups?

  • Establish an hourly full backup routine.
  • Use Volume Shadow Copy or Samba to create hourly snapshots of the database host.
  • Set up an hourly incremental backup.
  • Institute a policy enforcing hourly differential backups.
A

Use Volume Shadow Copy or Samba to create hourly snapshots of the database host.

Snapshots are the best way to backup open files without errors. In Windows, snapshots can be taken on NTFS volumes by the Volume Shadow Copy Service (VSS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A system has a network of ASICs (Application-Specific Integrated Circuits) computing nodes organized into a cluster for training Artifical Intelligence (AI) models. There are 64 devices running non-stop. In a period of 48 hours, two of the devices failed. Calculate the Mean Time Between Failures (MTBF) for the Service Level Agreement (SLA).

(64+48)/2=56
(64-48)2=32
(48
64)/2=1536
(2*48)+64=160

A

(48*64)/2=1536

The MTBF (Mean Time Between Failures) is the total time divided by the number of failures. Therefore, 64 devices times 48 hours divided by two failures equals 1,536 hours, or 64 days. This indicates that on average, when following an individual device, it will fail in about 1536 hours or 64 days.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A Key Performance Indicator (KPI) is a network performance metric used to determine asset reliability. Which of the following is NOT an example of a KPI?

Mean Time to Failure (MTTF)
Mean Time to Repair (MTTR)
Mean Time Between Failures (MTBF)
Maximum Tolerable Downtime (MTD)

A

Maximum Tolerable Downtime (MTD)

Maximum Tolerable Downtime (MTD) is a metric that states the requirement for a business function. It is a goal, but is not a performance indicator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An Information Technology (IT) engineer recently hired at a high-performance computing facility (HPC), notes that the system, which models climate changes, is a critical system running 24x7 with two-nines availability. Based on an understanding of high availability systems, determine the Maximum Tolerable Downtime (MTD) of the system in hh:mm:ss format.

0: 05:15
0: 00:32
0: 52:34
87: 36:00

A

87:36:00

Maximum Tolerable Downtime (MTD) is calculated from the sum of scheduled service intervals plus unplanned outages over the period. High availability is loosely described as 24x7 (24 hours per day, 7 days per week) or 24x365 (24 hours per day, 365 days per year) with critical system availability for 99% being 87:36:00.