final - 30 cards a day Flashcards
(240 cards)
Identify which of the following designations can be associated with a member who coordinates the resources necessary to solve a problem and also ensures that the security policy is followed and that everyone within the organization is aware of the situation?
Manager
Suppose you notice a sudden decrease in network performance and suspect malware is hogging network resources. Which of the following commands will you use to display the PID (process identifier) associated with your network connection?
netstat -o
Which type of a recovery plan accounts for the worst-case scenarios and provides contingency plans for restoring or replacing computer systems, power, telephone systems, and paper-based files?
A Disaster Recovery Plan
is a part of the BCP (business continuity plan) that details the processes for restoring critical functionality and data to a network after an outage.
You are a network administrator at Yosaka & Associates, a private law firm. The employees have been facing various types of data errors and other transmission problems, leading to decreased productivity. You need to find an appropriate technique that will help identify locations of network bottlenecks. Which of the following techniques would you choose in such a scenario?
Traffic Analysis
the examination of network traffic for patterns and exceptions to those patterns.
Donald is a schoolteacher living in Atlanta. While conducting online classes, he experienced a momentary decrease in voltage. His computer shut down and when he switched it back on, he realized that he had lost some data. He called his friend Chadwick who is a network analyst to check out what the issue was. Chadwick found that there was a power flaw caused by an overtaxed electrical system. Such voltage decreases can cause computers or applications to fail and potentially corrupt data. What kind of power flaw caused this issue in Donald’s house?
Brownout
temporary dimming of lights
One of the employees in your organization is suspected of hacking into the network. You as a network administrator want to check the user’s activity for the last week. Which of the following will you use in such a scenario?
Audit Log
is a collection of data in logs that is consistent and thorough enough to retroactively prove compliance and also to defensibly prove user actions.
Which bandwidth management technique adjusts the way network devices respond to indications of network performance issues caused by traffic congestion throughout a network?
Congestion Control
manages the entrance of traffic onto the network, other methods allow for more nuanced control after what happens to the traffic once it’s on the network. (Qos)
A network connection is congested as a result of which there are multiple network fluctuations and latency issues. You as a network administrator plan on solving this issue by using a network device to send signals to the sender or receiver of the data packets that the network is congested. Which of the following will you use in this scenario?
Explicit Signaling
the closed-loop response to existing congestion. (Backward/Forward)
Which of the following is used to create flow records that show relationships among various traffic types?
NetFlow
is a proprietary traffic monitoring protocol from Cisco that tracks all IP traffic crossing any interface where NetFlow is enabled.
Which KPI (key performance indicator) indicates delayed network communications while devices wait for responses or resend transmissions?
Packet Drops
packets that are damaged beyond use, arrive after their expiration, or are not allowed through an interface are dropped.
Jilead Inc. is a software development company that is preparing an incident response plan to prepare for possible events such as a break-in, fire, weather-related emergency, hacking attack, discovery of illegal content or activity on an employee’s computer, malware outbreak, or a full-scale environmental disaster that shuts down businesses throughout the city or state. The response plan has identified the members of the response team and the responsibilities have been assigned and clearly spelled out to each team member. Stanley Hudson has been entrusted with the responsibility of being the person on call who first notices or is alerted to the problem. He has to create a record for the incident, detailing the time it began, its symptoms, and any other pertinent information about the situation. He must remain available at all times to answer calls from clients or employees. What is the role that Stanley has been assigned?
Dispatcher
Which of the following steps of an incident response plan involves the process of repairing affected systems and putting them back in operation to ensure the smooth running of operations?
Recovery
Francine, a new network administrator at an online thrift store, is required to use an application that monitors traffic on the interface between a single device and the network. The application must be able to see the traffic the switch sends to it, which includes broadcast traffic and traffic specifically addressed to the one computer. Which of the following methods should Francine use to monitor the network traffic?
Protocol Analyzer
You are working with an ISP, and you have to impose a maximum cap limit to each client so that your company can predict and purchase accordingly from the network provider. Which of the following terms will you associate with this process?
Traffic Policing
is a traffic-shaping technique in which the volume or rate of traffic traversing an interface is limited to a predefined maximum.
You are a network analyst who has been tasked with managing the volume of network traffic across an organization in order to prevent network congestion. On analyzing the current network, you notice that one of the primary reasons for congestion is that the switches used in the network keep resending data packets that have been lost in the transmission far too quickly. Which of the following do you think should be implemented to solve this issue?
Retransmission Policy
A fraudulent financial deal has just taken place in the company where you are working as a network administrator. The data of the company will be collected in such a way that it can be presented in a court of law for the purpose of prosecution. Some of the forensic data available for analysis may be damaged or destroyed if improperly handled. You have been assigned the duty to safeguard sensitive information, logged data, and other legal evidence until the first responder or incident response team can take over the collection of evidence. To prevent contamination of evidence, you have made sure that each device involved is isolated-that is, the device is disconnected from the network and secured to ensure that no one else has contact with it until the response team arrives. What is the next step that you will take in the event of such an illegal activity?
Document The Scene.
creating a defensible audit trail is one of the highest priorities in the forensics process. An audit trail is a system of documentation that makes it possible for a third party to inspect evidence later and understand the flow of events. A defensible audit trail is an audit trail that can be justified and defended in a court of law according to specific standards
Which network monitoring method can be used to ensure that all traffic sent to any port on a switch is also sent to a device connected to the mirrored port?
Port Mirroring
Goldwin Enterprises has hired you as a network administrator to monitor the network and to ensure that the network functions reliably. To monitor the entire network, you will require a device that will display sensor data on your configurable dashboard. Which of the following software will you request from the management?
Room Alert Monitor by AVTECH
You have been assigned the role of a network administrator, and your first task requires you to measure the throughput between network hosts. Which of the following tools will you use in this scenario?
iPerf
is a command-line based tool.
Which of the following backs up only the data that has changed since the last backup?
Incremental Backups
Which of the following is not a technique used in a closed-loop response to an existing congestion?
Admission Policy
closed-loop responses include:
-Implicit Signaling
-Explicit Signaling
-Choke Packet
-Backpressure
Which of the following steps of an incident response plan includes the act of limiting the damage by the team, where affected systems or areas are isolated, and response staff are called in as required by the situation?
Containment
You are the network administrator in Jolene Consultancy Pvt. Ltd., a small consultancy in Missouri. You have been assigned the task of monitoring network traffic in the systems. You must ensure that many devices can be configured to report their traffic and other statistics to a network monitor. Which of the following would you use in this scenario?
Reporting
A system of documentation that makes it possible for a third party to inspect evidence later and understand the flow of events is called _____.
An Audit Trail