Network Operations Flashcards

Net+ Certification (45 cards)

1
Q

Which two items would be specified as part of an SLA? (Choose two.)

A. Minimum server software configurations
B. Minimum server hardware configurations
C. Availability and uptime
D. Help desk response time
E. Password change requirements

A

C. Availability and uptime
D. Help desk response time

About Service Level Agreements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A policy includes the following statement:
“Employees are not allowed to use company equipment to copy or distribute copyrighted material without the written permission of the holder of the copyright.”
Which policy would this statement be part of?

A. SLA
B. AUP
C. NDA
D. BYOD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A medium-sized company is moving into a new office space. The office is being prewired with Cat 6 cabling. Employees will be moving their own equipment and will need to connect into the network. Technical Services wants to help ensure that the move goes as smoothly as possible.
What should Technical Services use to ensure this?

A. Work instructions
B. Labeling
C. Logical network diagram
D. Physical network diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A company is changing its network design as shown in the exhibit. The company plans to deploy a web server and a honeypot in the DMZ.
Which two documents does the company need to update? (Select TWO.)

A. Standard operating procedure
B. Rack diagram
C. Logical network diagram
D. Change management document
E. Physical network diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A company has offices on several floors of a building. All connections to external public lines come in through a central area and are routed to distribution points on each floor. The distribution points on each floor connect to the internal network.
Where is the cabling and equipment for the central area documented in detail?

A. IDF documentation
B. Logical network diagram
C. Physical network diagram
D. MDF documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A large organization has offices in several locations around the world. Each geographic location has primary responsibility for its network administration and management. The company wants to ensure consistent instructions and management throughout the company.
What should the company use to help ensure this?

A. Network configuration baselines
B. Change management
C. AUP
D. Standard operating procedures (SOP)
E. SLA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An ISP has suffered several unscheduled outages every day for a week. What is the MOST likely result of this activity?

A. The MOU will be updated.
B. Change management will be implemented.
C. The SLA will be violated.
D. NetFlow data will be reviewed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An employee wants to install an AP at their desk. Which should they consult FIRST?

A. AUP
B. MOU
C. SLA
D. DR plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which type of backup takes the least time and uses the least amount of disk space?

A. Copy
B. Differential
C. Incremental
D. Full

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

While discussing a configuration issue with a switch manufacturer’s technical support team, the in-house support team learns of a switch vulnerability. The vulnerability was fixed with a recent update. The support team needs to mitigate the vulnerability and avoid a potential attack with minimum risk to the network, downtime, and cost.
What should in-house support do?

A. Purchase a new switch that has the vulnerability fixed to replace the existing switch.
B. Order new firmware chips and remove and replace the firmware.
C. Download and install the most recent firmware update.
D. Deploy an IDS to closely monitor activity with the switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of physical security device lets a company locate devices that have been moved to a new location?

A. Asset tracking tags
B. Motion detection
C. Video surveillance
D. Key fob

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A company needs to use physical security devices to secure a server room.
The following requirements must be met:
- Entrance to the storage area should be limited to select employees only.
- It should be possible to track any equipment removed from the room.
- It should be possible to configure an alarm to sound if anyone is in the room after normal business hours.
What should the company do? To answer, drag the appropriate physical security device to each location. A physical security device may be used once, more than once, or not at all.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A network administrator must capture all north-south packets at line rate for long-term storage and analysis. Traffic flows should not be impeded or interrupted.
Which is the BEST option for meeting this requirement?

A. Configure an inline IPS.
B. Deploy a L2 switch.
C. Deploy a proxy server.
D. Configure a port mirror.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the role of an MIB when implementing SNMP for network management?

A. It is the software package installed on each managed client.
B. It is a collection of manageable device definitions that identifies device property information.
C. It is a server configured to collect device information and issue command requests.
D. It provides the method for authentication and encryption of messages used for device management.

A

B. It is a collection of manageable device definitions that identifies device property information.

SNMP, MIBs and OIDs – an overview
snmp: Simple Network Management Protocol
Security concepts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A company runs call center services with 25 agents. Agents report that their softphones have random quality issues. Which performance parameter should be verified in the network?

A. The minimum frame size of 9 k
B. The minimum bandwidth of 50 Mbps
C. The maximum of 10% of packet loss
D. The maximum of 150 ms of delay

A

D. The maximum of 150 ms of delay

QoS
Jumboframes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A network technician must ensure that nodes can send traps when performance thresholds are breached. Which solution BEST meets this requirement?

A. Configure network nodes to synchronize with a centralized NTP server.
B. Deploy an SNMP management system and configure agents on nodes.
C. Configure a syslog server and forward syslog information from nodes.
D. Install IDS software on each network node and define performance alerts.

A

B. Deploy an SNMP management system and configure agents on nodes.

What is SNMP, and How Does It Work?
What is syslog?
What is an Intrusion Detection System?
What is NTP?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A network engineer needs to be able to identify anomalies in LAN performance and availability. What should the engineer do FIRST?

A. Verify the network SLA.
B. Create network baselines.
C. Deploy SNMP agents.
D. Configure audit logs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

An organization upgrades the network cabling in some of its buildings from copper to fiber optic. However, a network administrator is concerned that some of the cabling may be faulty. What should the administrator monitor FIRST to determine if their concern is valid?

A. An increase in improperly routed packets.
B. An increased number of CRC errors.
C. An increased number of failed DNS queries.
D. An increase in MTU mismatch errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A network administrator needs to ensure network availability by sending status, diagnostic, and event information from network nodes to a centralized server.
Which technology should the administrator use?

A. nmap
B. FHRP
C. Syslog
D. RADIUS

20
Q

A network administrator is configuring SNMP and needs to specify an element in an MID hierarchy for monitoring. What should the administrator enter?

A. 3FFE:0:0:1:200:F8FF:FE75:50DF
B. 172.30.12.155
C. 00-14-22-01-23-45
D. 1.3.6.1.2.1.14.2

21
Q

A network administrator wants to monitor the impact of logging to a router’s console. What should the administrator monitor for FIRST?

A. CPU usage
B. Jitter
C. Memory
D. Giants

22
Q

A company must implement additional monitoring and analysis to meet compliance requirements related to work done for new customers. The company needs a solution that can collect log, event, and other security information from a variety of sources and correlate and analyze the data to identify threats. It should provide for long-term storage of the data collected and be able to identify trending threats.
What type of device solution should the company use?

A. SIEM
B. SNMP
C. IDS
D. Server log

23
Q

A company is developing its business continuity and disaster recovery plans. The company needs to determine the reliability of a critical network device. Continuity plans will depend on how frequent the device is likely to fail.
Which value should be used to determine this?

A. MTBF
B. MTTR
C. RPO
D. RTO

24
Q

Which statement BEST describes a warm backup recovery site?

A. The site has computer equipment, network hardware, and data communication installed and configured, but it does not have recent backups of corporate data.
B. The site has the necessary facilities infrastructure to support business operations but not computer or network hardware.
C. The site has the necessary facilities infrastructure to support business operations with computer and network hardware stored onsite, but this equipment is not set up nor configured for use.
D. The site has computer equipment, network hardware, and data communication installed and configured with a current duplicate of critical data.

A

A. The site has computer equipment, network hardware, and data communication installed and configured, but it does not have recent backups of corporate data.

An Overview of Disaster Recovery Sites
Types of Backup Sites - Hot Site, Warm Site, Cold Site

25
A company's ecommerce platform frequently crashes due to heavy traffic loads. Which is the BEST option for improving site availability for end users? A. Deploy a NAT gateway and configure port forwarding rules. B. Deploy a web server farm and configure active/active load balancing. C. Place the web servers on the DMZ and configure restrictive ACLs. D. Deploy an IDS between the network firewall and the web server.
B. Deploy a web server farm and configure active/active load balancing. [What Is a Load Balancer?](https://www.f5.com/glossary/load-balancer) [What is DMZ network?](https://www.barracuda.com/support/glossary/dmz-network) [NAT: How Network Address Translation Works](https://computer.howstuffworks.com/nat.htm#pt1) [Intrusion detection and prevention systems: IDS IPS overview](https://www.calyptix.com/intrusion-detection-and-prevention-systems-ids-ips-overview/)
26
An organization plans to contract with a cloud service provider (CSP) for a disaster recovery site that will host backup critical system hardware. When the primary datacenter fails, data will be restored, and the secondary site will be activated. Costs must be minimized. Which type of disaster recovery site should the organization deploy? A. Hot site B. Cold site C. Mobile site D. Warm site
D. Warm site [8.3.2. Backup Sites: Cold, Warm, and Hot](https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/4/html/introduction_to_system_administration/s2-disaster-recovery-sites) [Hot Site vs. Cold Site](https://www.nimblefreelancer.com/what-is-a-hot-site-what-is-a-cold-site/) [Data Center Recovery Strategy](https://e-janco.com/articles/2012/201209-datacenter_recovery_strategy.html) [What does cold standby, warm standby and hot standby mean?](https://dexonsystems.com/blog/what-does-standby-mean)
27
Following a disaster, a network administrator is attempting to prioritize system resources. What should the admin do FIRST? A. Verify the RPO. B. Check the RTO. C. Check the MTTR. D. Verify the MTBF.
B. Check the RTO. [MTBF, MTTR, MTTA, and MTTF](https://www.atlassian.com/incident-management/kpis/common-metrics) [RPO and RTO: What’s the Difference?](https://www.veeam.com/blog/recovery-time-recovery-point-objectives.html) [MTBF vs. MTTF vs. MTTR: Defining IT Failure](https://www.bmc.com/blogs/mtbf-vs-mtff-vs-mttr-whats-difference/)
28
Which is the BEST option for increasing availability of a network's gateway router group? A. RADIUS B. NTP C. FHRP D. STP
C. FHRP [First Hop Redundancy Protocol (FHRP) and its Types](https://www.pynetlabs.com/fhrp-first-hop-redundancy-protocol/) [What is NTP?](https://www.ntp.org/ntpfaq/NTP-s-def/) [STP – Spanning Tree Protocol Explained](https://www.guru99.com/stp-spanning-tree-protocol-examples.html) [RADIUS Server (RADIUS Authentication) and How it Works](https://www.foxpass.com/blog/radius-server-and-how-it-works)
29
A company has a Dynamic Host Configuration Protocol (DHCP) server with all of the subnet addresses specified as an IP address scope. The company deploys a new physical server as a database server in the 192.168.4.0/24 subnet. Applications that use the database server require the server to always have the same IP address. Company policy forbids the use of static addressing. What should the company do to set the addressing for the database server? A. Use an APIPA address. B. Specify an IP address exclusion. C. Configure an IP address reservation. D. Use a virtual IP (VIP) address.
C. Configure an IP address reservation. [Static IP vs DHCP Reservation](https://www.stephenwagner.com/2019/05/07/static-ip-vs-dhcp-reservation/) [APIPA](https://www.pcmag.com/encyclopedia/term/apipa)
30
A company's network is shown in the exhibit. The DHCP server is configured with a scope for each network. Clients in the 192.168.4.0 and 192.168.4.128 subnets are unable to lease addresses from the DHCP server. Clients in the 192.168.2.0 subnet are able to lease addresses. What should the company do? A. Deploy a DHCP relay agent in the 192.168.2.0 subnet. B. Open UDP port 53 on each of the routers. C. Deploy DHCP relay agents in the 192.168.4.0 and 192.168.4.128 subnets. D. Configure IP exclusions for the 192.168.4.0 and 192.168.4.128 subnets.
C. Deploy DHCP relay agents in the 192.168.4.0 and 192.168.4.128 subnets. [DHCP Relay Agent in Computer Network](https://www.geeksforgeeks.org/dhcp-relay-agent-in-computer-network/) [Using a BOOTP Relay Agent](https://www.novell.com/documentation/dns_dhcp/?page=/documentation/dns_dhcp/dhcp_enu/data/behbgbaf.html) [Is DNS TCP or UDP port 53?](https://www.infoblox.com/dns-security-resource-center/dns-security-faq/is-dns-tcp-or-udp-port-53/)
31
Which protocol provides time synchronization service over the global internet? A. NTP B. ICMP C. SNMP D. IPAM
A. NTP [What is NTP?](https://www.ntp.org/ntpfaq/NTP-s-def/) [IP Address Management and Switch Port Mapper](https://www.manageengine.com/network-monitoring/ipam-spm-plugin.html)
32
The support team has been tasked with creating an alias name for a newly deployed server. What should the team do? To answer, complete the statement by choosing the correct answers from the drop-down menus. Connect to: Configure:
Connect to: DNS server Configure: CNAME record [Resource Record Types](https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc958958(v=technet.10)) [What Is DHCP?](https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc958947(v=technet.10)) [Managing DHCP Options](https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc958929(v=technet.10)) [NTP Overview](https://docs.oracle.com/cd/E19077-01/n1k.switch/819-7594-11/xdoc/ntp_overview.html)
33
The nslookup command fails and shows the error in the exhibit. What should the support team create to fix the problem? A. CNAME record B. TXT record C. Static route entry D. Reverse lookup zone E. APIPA address
D. Reverse lookup zone [How to set up A-record and rDNS record](https://snov.io/knowledgebase/how-to-set-up-a-record-and-rdns-record/) [What Are DNS Records? Understanding the Basics](https://www.bluehost.com/help/article/dns-records-explained) [APIPA: Automatic Private IP Addressing](https://www.lifewire.com/automatic-private-internet-protocol-addressing-816437) [What is a TXT Record](https://www.bluehost.com/help/article/txt-records) [Adding a Static Route in Windows](https://www.networkinghowtos.com/howto/adding-a-static-route-in-windows/) [Static Routes and the Default Gateway](https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/5/html/deployment_guide/s1-networkscripts-static-routes)
34
PC1 fails to receive an IP address in the network shown in the exhibit. What should be configured to fix the problem? A. DHCP option 66 on Router 1 B. DHCP option 66 on Router 2 C. Port forwarding on Router 1 D. Port forwarding on Router 2 E. Conditional forwarder on Router 1 F. Conditional forwarder on Router 2 G. IP helper address on Router 1 H. IP helper address on Router 2
G. IP helper address on Router 1 [Cisco IOS – DHCP Helper (DHCP Relay) – IP-Helper Setup](https://www.petenetlive.com/KB/Article/0001168) [How to Set Up Port Forwarding on Any Router](https://www.noip.com/support/knowledgebase/general-port-forwarding-guide) [DNS Forwarding and Conditional Forwarding](https://medium.com/tech-jobs-academy/dns-forwarding-and-conditional-forwarding-f3118bc93984) [IP Phone Provisioning via DHCP “Option 66”](https://www.3cx.com/sip-phones/dhcp-option-66/)
35
A network engineer must ensure internet-based SMTP servers can locate their organization's SMTP servers. Which record should the engineer create on a public DNS server? A. PTR B. MX C. SRV D. TXT
B. MX [What is a DNS MX record?](https://www.cloudflare.com/learning/dns/dns-records/dns-mx-record/) [What is a DNS SRV record?](https://www.cloudflare.com/learning/dns/dns-records/dns-srv-record/) [What is a DNS SPF record?](https://www.cloudflare.com/learning/dns/dns-records/dns-spf-record/) [What is a DNS PTR record?](https://www.cloudflare.com/learning/dns/dns-records/dns-ptr-record/)
36
A network technician has been asked to create a DNS record so that users can browse to the company's main website, www.example.com. Additionally, users must be able to use example.com to get to the website. The website is hosted using a single IP address, 192.168.0.100. What should the technician do to complete the this assignment? A. Create a CNAME record that points www.example.com to 192.168.0.100 and an A record that points www.example.com to example.com. B. Create an A record for example.com that points to www.excample.com and a CNAME record that points www.example.com to the website's IP address. C. Create a CNAME record for www.example.com that points to www.example.com and an A record for www.example.com that points to 192.160.0.100. D. Create an A record for www.example.com that points to the website's IP address and create a CNAME record for example.com that points to www.example.com.
D. Create an A record for www.example.com that points to the website's IP address and create a CNAME record for example.com that points to www.example.com. [About A records](https://support.google.com/a/answer/2576578#zippy=%2Cconfigure-a-records-now) [What is a DNS CNAME record?](https://www.cloudflare.com/learning/dns/dns-records/dns-cname-record/) [CNAME Records](https://support.dnsimple.com/articles/cname-record/) [CNAME vs. A Record](https://easydmarc.com/blog/cname-vs-a-record/)
37
A technician needs to execute command-line management commands on a Linux server located in a remote office. The technician should be required to log on at the server. All communication should be encrypted. What should the technician use? A. Telnet B. VNC C. RDP D. SSH
D. SSH [Difference between SSH and Telnet](https://www.geeksforgeeks.org/difference-ssh-telnet/) [VNC vs RDP: Which Remote Desktop Tool is the Best?](https://www.realvnc.com/en/blog/vnc-vs-rdp/?lai_vid=63V4Nx3kXH1JL&lai_sr=20-24&lai_sl=l)
38
Most of a company's network administrators are Windows operating system specialists. The company is cross training administrators to help perform periodic management and administrative tasks on Linux servers. This includes a mix of command-line and graphic utilities. Some of the administrators being trained are in remote offices. All trainers are in the company's main office. The administrators being trained log on and work locally from a Linux server. The trainer will connect to the Linux server from a client computer. Both computers need to display the same screen and allow commands and utilities to be used from either computer. Which remote connection technology should the trainers use? A. RDP B. VNC C. Telnet D. SSH
B. VNC [VNC vs RDP: Which Remote Desktop Tool is the Best?](https://www.realvnc.com/en/blog/vnc-vs-rdp/?lai_vid=63V4Nx3kXH1JL&lai_sr=0-4&lai_sl=l) [Difference between SSH and Telnet](https://www.geeksforgeeks.org/difference-ssh-telnet/)
39
A company wants to support multiple client computers running an application installed on a computer that runs Windows Server 2016. The clients should be able to take advantage of the memory and processor resources on the server. Each client will have a unique data set. Which technology should the company use? A. RDP B. VPN C. SSH D. VNC
A. RDP [Difference between SSH and Telnet](https://www.geeksforgeeks.org/difference-ssh-telnet/) [What is VPN? How It Works, Types of VPN](https://www.kaspersky.com/resource-center/definitions/what-is-a-vpn) [What are VNC and RDP?](https://www.realvnc.com/en/blog/vnc-vs-rdp/?lai_vid=63V4Nx3kXH1JL&lai_sr=20-24&lai_sl=l)
40
A company wants to configure a site-to-site VPN link between two offices. Users in each office should have access to resources in the other office, including shared folders and network services. What type of VPN should the company use? A. PPTP VPN B. IPSec VPN C. TLS VPN D. SSL VPN
B. IPSec VPN
41
A company needs to support a secure link for remote users to a web-aware application that is deployed on a server in the perimeter network. The Technical Services department recommends using an SSL VPN to minimize the configuration changes needed in network firewalls. The solution will use certificate-based authentication. What is the minimum certificate requirement for this configuration? A. A client-side certificate only B. Different certificates on the client and server C. A server-side certificate only D. The same certificate on both the client and server
C. A server-side certificate only [What is the difference between client and server certificates?](https://www.digicert.com/faq/public-trust-and-certificates/whats-the-difference-between-client-certificates-vs-server-certificates) [Server Authentication Certificate – What You Should Know](https://sectigostore.com/page/server-authentication-certificate/)
42
A network engineer must ensure communications between an organization's branch offices and main HQ cannot be eavesdropped on. What should the engineer do? A. Configure firewalls to only allow trusted connections. B. Use private IP addresses on all sensitive servers. C. Configure site-to-site VPN between locations. D. Segment unencrypted and encrypted traffic.
C. Configure site-to-site VPN between locations. [What Is a Site-to-Site VPN?](https://www.paloaltonetworks.com/cyberpedia/what-is-a-site-to-site-vpn) [What is the difference between a public and private IP address?](https://help.keenetic.com/hc/en-us/articles/213965789-What-is-the-difference-between-a-public-and-private-IP-address) [What Is Network Segmentation?](https://www.cisco.com/c/en/us/products/security/what-is-network-segmentation.html) [What is a firewall?](https://www.cisco.com/site/us/en/learn/topics/security/what-is-a-firewall.html)
43
What are the implications of allowing inbound port 3389 on a NAT gateway? A. Attackers can attempt brute force attacks on user desktops. B. Unencrypted communications will allow passwords to be sniffed. C. Network switches will be directly accessible from the internet. D. Out-of-band device management will be easier to perform.
A. Attackers can attempt brute force attacks on user desktops. [What is the Remote Desktop Protocol (RDP)?](https://www.cloudflare.com/learning/access-management/what-is-the-remote-desktop-protocol/) [Remote Desktop Protocol](https://learn.microsoft.com/en-us/windows/win32/termserv/remote-desktop-protocol) [SSH Protocol – Secure Remote Login and File Transfer](https://www.ssh.com/academy/ssh/protocol) [Out-of-Band Management: What is it and why do I need it?](https://www.perle.com/supportfiles/out-of-band-management.shtml)
44
A network technician discovers a router being managed on port 23. What should the technician do FIRST? A. Configure SSH. B. Install an IDS. C. Configure complex passwords. D. Enable the firewall.
A. Configure SSH. [Telnet vs SSH – Difference Between Them](https://www.guru99.com/telnet-vs-ssh.html) [Host-based Firewall Software Guidelines](https://security.berkeley.edu/MSSND/host-based-firewall-software-guidelines) [The Surprising Mistakes That Make Your Passwords Vulnerable](https://www.lifewire.com/strong-password-examples-2483118) [What is an Intrusion Detection System?](https://www.paloaltonetworks.com/cyberpedia/what-is-an-intrusion-detection-system-ids)
45
During a DDoS attack, a technician is unable to access a critical router. What should the technician do to prevent this issue in the future? A. Place the router in a screened subnet. B. Require multifactor authentication. C. Implement out-of-band management. D. Deploy an IDS on the router network.
C. Implement out-of-band management. [Out-of-Band Management: What is it and why do I need it?](https://www.perle.com/supportfiles/out-of-band-management.shtml) [Back to basics: Multi-factor authentication (MFA)](https://www.nist.gov/itl/applied-cybersecurity/back-basics-multi-factor-authentication-mfa) [What is an Intrusion Detection System?](https://www.paloaltonetworks.com/cyberpedia/what-is-an-intrusion-detection-system-ids)