Network Operations Flashcards
Net+ Certification (45 cards)
Which two items would be specified as part of an SLA? (Choose two.)
A. Minimum server software configurations
B. Minimum server hardware configurations
C. Availability and uptime
D. Help desk response time
E. Password change requirements
A policy includes the following statement:
“Employees are not allowed to use company equipment to copy or distribute copyrighted material without the written permission of the holder of the copyright.”
Which policy would this statement be part of?
A. SLA
B. AUP
C. NDA
D. BYOD
A medium-sized company is moving into a new office space. The office is being prewired with Cat 6 cabling. Employees will be moving their own equipment and will need to connect into the network. Technical Services wants to help ensure that the move goes as smoothly as possible.
What should Technical Services use to ensure this?
A. Work instructions
B. Labeling
C. Logical network diagram
D. Physical network diagram
A company is changing its network design as shown in the exhibit. The company plans to deploy a web server and a honeypot in the DMZ.
Which two documents does the company need to update? (Select TWO.)
A. Standard operating procedure
B. Rack diagram
C. Logical network diagram
D. Change management document
E. Physical network diagram
C. Logical network diagram
E. Physical network diagram
Logical vs. Physical Data Flow Diagram
What Is a Server Rack Diagram and Its Benefits?
Change Control Management SOP Template
A company has offices on several floors of a building. All connections to external public lines come in through a central area and are routed to distribution points on each floor. The distribution points on each floor connect to the internal network.
Where is the cabling and equipment for the central area documented in detail?
A. IDF documentation
B. Logical network diagram
C. Physical network diagram
D. MDF documentation
A large organization has offices in several locations around the world. Each geographic location has primary responsibility for its network administration and management. The company wants to ensure consistent instructions and management throughout the company.
What should the company use to help ensure this?
A. Network configuration baselines
B. Change management
C. AUP
D. Standard operating procedures (SOP)
E. SLA
An ISP has suffered several unscheduled outages every day for a week. What is the MOST likely result of this activity?
A. The MOU will be updated.
B. Change management will be implemented.
C. The SLA will be violated.
D. NetFlow data will be reviewed.
An employee wants to install an AP at their desk. Which should they consult FIRST?
A. AUP
B. MOU
C. SLA
D. DR plan
Which type of backup takes the least time and uses the least amount of disk space?
A. Copy
B. Differential
C. Incremental
D. Full
While discussing a configuration issue with a switch manufacturer’s technical support team, the in-house support team learns of a switch vulnerability. The vulnerability was fixed with a recent update. The support team needs to mitigate the vulnerability and avoid a potential attack with minimum risk to the network, downtime, and cost.
What should in-house support do?
A. Purchase a new switch that has the vulnerability fixed to replace the existing switch.
B. Order new firmware chips and remove and replace the firmware.
C. Download and install the most recent firmware update.
D. Deploy an IDS to closely monitor activity with the switch.
C. Download and install the most recent firmware update.
Hardening Network Devices
How to Update Your Router’s Firmware
How to Upgrade Your Router’s Firmware
What type of physical security device lets a company locate devices that have been moved to a new location?
A. Asset tracking tags
B. Motion detection
C. Video surveillance
D. Key fob
A company needs to use physical security devices to secure a server room.
The following requirements must be met:
- Entrance to the storage area should be limited to select employees only.
- It should be possible to track any equipment removed from the room.
- It should be possible to configure an alarm to sound if anyone is in the room after normal business hours.
What should the company do? To answer, drag the appropriate physical security device to each location. A physical security device may be used once, more than once, or not at all.
A network administrator must capture all north-south packets at line rate for long-term storage and analysis. Traffic flows should not be impeded or interrupted.
Which is the BEST option for meeting this requirement?
A. Configure an inline IPS.
B. Deploy a L2 switch.
C. Deploy a proxy server.
D. Configure a port mirror.
What is the role of an MIB when implementing SNMP for network management?
A. It is the software package installed on each managed client.
B. It is a collection of manageable device definitions that identifies device property information.
C. It is a server configured to collect device information and issue command requests.
D. It provides the method for authentication and encryption of messages used for device management.
B. It is a collection of manageable device definitions that identifies device property information.
SNMP, MIBs and OIDs – an overview
snmp: Simple Network Management Protocol
Security concepts
A company runs call center services with 25 agents. Agents report that their softphones have random quality issues. Which performance parameter should be verified in the network?
A. The minimum frame size of 9 k
B. The minimum bandwidth of 50 Mbps
C. The maximum of 10% of packet loss
D. The maximum of 150 ms of delay
A network technician must ensure that nodes can send traps when performance thresholds are breached. Which solution BEST meets this requirement?
A. Configure network nodes to synchronize with a centralized NTP server.
B. Deploy an SNMP management system and configure agents on nodes.
C. Configure a syslog server and forward syslog information from nodes.
D. Install IDS software on each network node and define performance alerts.
B. Deploy an SNMP management system and configure agents on nodes.
What is SNMP, and How Does It Work?
What is syslog?
What is an Intrusion Detection System?
What is NTP?
A network engineer needs to be able to identify anomalies in LAN performance and availability. What should the engineer do FIRST?
A. Verify the network SLA.
B. Create network baselines.
C. Deploy SNMP agents.
D. Configure audit logs.
An organization upgrades the network cabling in some of its buildings from copper to fiber optic. However, a network administrator is concerned that some of the cabling may be faulty. What should the administrator monitor FIRST to determine if their concern is valid?
A. An increase in improperly routed packets.
B. An increased number of CRC errors.
C. An increased number of failed DNS queries.
D. An increase in MTU mismatch errors.
B. An increased number of CRC errors.
What Causes CRC Errors?
How to Resolve DNS Issues
How to Troubleshoot Routing Problems
Troubleshooting MTU Issues
A network administrator needs to ensure network availability by sending status, diagnostic, and event information from network nodes to a centralized server.
Which technology should the administrator use?
A. nmap
B. FHRP
C. Syslog
D. RADIUS
A network administrator is configuring SNMP and needs to specify an element in an MID hierarchy for monitoring. What should the administrator enter?
A. 3FFE:0:0:1:200:F8FF:FE75:50DF
B. 172.30.12.155
C. 00-14-22-01-23-45
D. 1.3.6.1.2.1.14.2
A network administrator wants to monitor the impact of logging to a router’s console. What should the administrator monitor for FIRST?
A. CPU usage
B. Jitter
C. Memory
D. Giants
A company must implement additional monitoring and analysis to meet compliance requirements related to work done for new customers. The company needs a solution that can collect log, event, and other security information from a variety of sources and correlate and analyze the data to identify threats. It should provide for long-term storage of the data collected and be able to identify trending threats.
What type of device solution should the company use?
A. SIEM
B. SNMP
C. IDS
D. Server log
A company is developing its business continuity and disaster recovery plans. The company needs to determine the reliability of a critical network device. Continuity plans will depend on how frequent the device is likely to fail.
Which value should be used to determine this?
A. MTBF
B. MTTR
C. RPO
D. RTO
Which statement BEST describes a warm backup recovery site?
A. The site has computer equipment, network hardware, and data communication installed and configured, but it does not have recent backups of corporate data.
B. The site has the necessary facilities infrastructure to support business operations but not computer or network hardware.
C. The site has the necessary facilities infrastructure to support business operations with computer and network hardware stored onsite, but this equipment is not set up nor configured for use.
D. The site has computer equipment, network hardware, and data communication installed and configured with a current duplicate of critical data.
A. The site has computer equipment, network hardware, and data communication installed and configured, but it does not have recent backups of corporate data.
An Overview of Disaster Recovery Sites
Types of Backup Sites - Hot Site, Warm Site, Cold Site