Shared Flashcard Set

Details

Ch15 Network Management
N/A
60
Computer Networking
Graduate
06/20/2013

Additional Computer Networking Flashcards

 


 

Cards

Term
Which of the following protocols is commonly used for communication between network management agents and applications?
A. NTP
B. SNMP
C. SMTP
D. IMAP
Definition
B. SNMP
Term
Which of the following pieces of information must you collect when establishing a baseline for the performance of a WAN link?
A. average daily traffic traveling over the link
B. last time the link failed
C. distribution of traffic types by Network layer protocol
D. users' perceptions of the link's speed
Definition
A. average daily traffic traveling over the link
Term
The routine that collects management information on a device is also known as:
A. a poll
B. an agent
C. a MIB
D. a managed device
Definition
B. an agent
Term
Suppose that half of the patch cables that connect a workgroup of computers in the Accounting Department to a patch panel needed to be replaced due to concerns about faulty manufacturing. Which of the following types of documentation would help you identify these patch cables?
A. baseline
B. wiring schematic
C. event log
D. syslog
Definition
Term
The process where one network management console collects data from multiple networked devices at regular intervals is known as _____.
A. interrogating
B. polling
C. baselining
D. pushing
Definition
B. polling
Term
You have researched a new type of switch and proved that upgrading your switches to this model is feasible. What is the next step you take before replacing your old switches?
A. back up the configurations of your existing switches
B. schedule a time for the switch upgrade that's least disruptive to users
C. inform users that a major network change is pending
D. evaluate the new switch on a pilot network that mimics your network environment
Definition
D. evaluate the new switch on a pilot network that mimics your network environment
Term
Mac OS X account that has read and write privileges to all areas of the file system is called:
A. admin
B. root
C. Setup Assistant
D. Administrator
Definition
B. root
Term
_____ management refers to the detection and signaling of device, link, or component faults.
A. Performance
B. Network
C. Configuration
D. Fault
Definition
D. Fault
Term
Above all, keep _____ in mind when you upgrade or install hardware on a network.
A. safety
B. costs
C. time
D. user inconvenience
Definition
A. safety
Term
_____ management is the collection, storage, and assessment of information related to the versions of software installed on every network device and every device's hardware configuration.
A. Performance
B. Asset
C. Configuration
D. Change
Definition
C. Configuration
Term
Which of the following practices creates a starting point for ongoing evaluation of your network's health?
A. configuration management
B. fault management
C. baselining
d. asset management
Definition
C. baselining
Term
_____ upgrades typically overwrite some systems files on the workstation, so their installation may affect other applications adversely.
A. Full
B. Application
C. Principle
D. Patch
Definition
B. Application
Term
You work for a medical transcription company that contracts with hundreds of home-based transcriptionists across the country. The transcriptionists connect to your network over a VPN that provides remote access services. Employees work at all times of the day or night, and not all of the transcriptionists are connected at the same time. Further, the number of transcriptionists the company hires at any time depends on a variable workload. You need to determine whether to increase the number of licenses on your remote access server. Which of the following variables would you configure your network monitoring application to track over time to help you find your answer?
A. number of users connected to the remote access server
B. % utilization on the VPN router's CPU
C. Maximum traffic handled by the VPN router's NIC
D. % utilization on the remote access server's CPU
Definition
A. number of users connected to the remote access server
Term
A networked _____ is perhaps the simplest device to add.
A. server
B. workstation
C. printer
D. hub
Definition
B. workstation
Term
Which of the following port numbers are used by Simple Network Management Protocol (SNMP)? (Select 2)
A. 161
B. 162
C. 137
D. 138
E. 389
Definition
A. 161
B. 162
Term
Which of the following is the best way to reverse a network operating system upgrade?
A. uninstall the upgrade
B. restore the server's software and configuration from a backup
C. remove the upgrade software folder from the server
D. reinstall the previous version of the operating system
Definition
B. restore the server's software and configuration from a backup
Term
Suppose you work for a financial institution that wants to make sure its clients can log on and review their accounts no matter how much traffic you WAN is experiencing. On your edge router which of the following criteria will you use to prioritize traffic for all HTTPS requests?
A. time of day
B. protocol
C. source MAC address
D. source IP address
Definition
B. protocol
Term
How does an application patch differ from an upgrade?
A. a patch is offered by a third-party software vendor, whereas an upgrade is supplied by the software manufacturer itself
B. a patch is designed to make minor corrections or enhancements, whereas an upgrade replaces most, if not all, of the software code
C. a patch can be automatically distributed to clients over the network, whereas an upgrade requires a manual installation
D. a patch is more comprehensive than an upgrade
Definition
B. a patch is designed to make minor corrections or enhancements, whereas an upgrade replaces most, if not all, of the software code
Term
Maintaining records of each time a switch interface fails is part of which of the following practices?
A. configuration management
B. change management
C. asset management
D. fault management
Definition
D. fault management
Term
An asset management database should include which of the following? (Choose all that apply)
A. Milestones for the network's implementation
B. Model number for every router, switch, and access point on the network
C. Baseline of average daily traffic for each router, switch, and access point on the network
D. Serial number for every server on the network
E. user names for every employee who uses the network
Definition
B. Model number for every router, switch, and access point on the network
D. Serial number for every server on the network
Term
On your Linux server, what file tells you where your system log file is kept?
A. /var/syslog.conf
B. /var/log/logs.conf
C. /etc/usr/logs.conf
D. /etc/syslog.conf
Definition
D. /etc/syslog.conf
Term
The process of reverting to a previous version of software after attempting to upgrade it is known as _____.
A. backleveling
B. change back
C. reverse engineering
D. downgrading
Definition
A. backleveling
Term
The most common type of caching is _____ caching.
A. Web
B. device
C. Internet
D. online
Definition
A. Web
Term
Under what circumstances should a network administrator inform users of a software change?
A. always
B. when the change might result in additional network traffic
C. when the change might affect applications or utilities on which the users rely
D. when the change might affect how users are added to the system
Definition
C. when the change might affect applications or utilities on which the users rely
Term
A(n) _____ is a graphical representation of a network's wired infrastructure.
A. event viewer
B. wiring schematic
C. Multi Router Traffic Grapher
D. network diagram
Definition
B. wiring schematic
Term
The most critical type of software upgrade you will perform is an upgrade to your _____.
A. database
B. NOS
C. application
D. backbone
Definition
B. NOS
Term
You have decided to use an application that will send a text message to your smartphone every time one of your network's core routers or switches experience an event that the system considers an emergency. All switches and routers run Cisco IOS. The application will alert you about events identified with which of the following severity levels?
A. 0
B. 7
C. 5
D. 1
Definition
A. 0
Term
You suspect that one of your network's two redundant core switches has a NIC or cable that's experiencing transmission problems. Supposing you never obtained a baseline for traffic on this switch, which of the following measurements would help you verify your suspicion?
A. average daily traffic on the affected switch
B. % RAM utilization on the affected switch over a week
C. % processor utilization on the affected switch over a week
D. total bits per second traveling through the affected switch, compared to total bits per second traveling through the redundant switch
Definition
D. total bits per second traveling through the affected switch, compared to total bits per second traveling through the redundant switch
Term
Which of the following applications would allow you to determine how many times in the past seven days your Windows 7 workstation has been unable to renew its DHCP-assigned IP address?
A. syslog
B. TCP/IP properties
C. DHCP logger
D. event viewer
Definition
D. event viewer
Term
_____ involves manipulating certain characteristics of packets, data streams, or connections to manage the type and amount of traffic traversing a network or interface at any moment.
A. Traffic monitoring
B. Traffic routing
C. Traffic shaping
D. Traffic polling
Definition
C. Traffic shaping
Term
Which of the following techniques could be used to prevent clients from downloading more than 50 GB of data per day through a given network interface?
A. caching
B. load balancing
C. traffic policing
D. clustering
Definition
C. traffic policing
Term
Which of the following systems would store information about the VTP settings for a switch's interface?
A. change management
B. event log
C. configuration management
D. asset management
Definition
C. configuration management
Term
Which of the following require(s) authentication between an agent and network management console?
A. SNMPv1
B. SNMPv2
C. SNMPv3
D. all of the above
Definition
C. SNMPv3
Term
agent
Definition
A software routine that collects data about a managed device's operation and provides it to a network management application.
Term
backleveling
Definition
To revert to a previous version of a software application after attempting to upgrade it.
Term
cache engine
Definition
A network device devoted to storage and delivery of frequently requested files.
Term
caching
Definition
The local storage of frequently needed files that would otherwise be obtained from an external source.
Term
CALEA (Communications Assistance for Law Enforcement Act)
Definition
A United States federal regulation that requires telecommunications carriers and equipment manufacturers to provide for surveillance capabilities. CALEA was passed by Congress in 1994 after pressure from the FBI, which worried that networks relying solely on digital communications would circumvent traditional wiretapping strategies.
Term
configuration management
Definition
The collection, storage, and assessment of information related to the versions of software installed on every network device and every device's hardware configuration.
Term
event log
Definition
The service on Windows-based operating systems that records events, or the ongoing record of such events.
Term
Event Viewer
Definition
A GUI application that allows users to easily view and sort events recorded in the event log on a computer running a Windows-based operating system.
Term
fault management
Definition
The detection and signaling of device, link, or component faults.
Term
HIPAA (Health Insurance Portability and Accountability Act)
Definition
A federal regulation in the United States, enacted in 1996. One aspect of this regulation addresses the security and privacy of medical records, including those stored or transmitted electronically.
Term
MIB (Management Information Base)
Definition
A database used in network management that contains a device's definitions of managed objects and their data.
Term
network diagram
Definition
A graphical representation of a network's devices and connections.
Term
network management
Definition
The assessment, monitoring, and maintenance of the devices and connections on a network.
Term
patch
Definition
A correction, improvement, or enhancement to part of a software application, often distributed at no charge by software vendors to fix a bug in their code or to add slightly more functionality.
Term
performance management
Definition
The ongoing assessment of how well network links, devices, and components keep up with demands on them.
Term
polling
Definition
A network management application's regular collection of data from managed devices.
Term
SNMP (Simple Network Management Protocol)
Definition
An Application layer protocol in the TCP/IP suite used to convey data regarding the status of managed devices on a network.
Term
SNMPv1
Definition
original version; limited features, it is rarely used on modern networks
Term
SNMPv2
Definition
Version 2; faster performance and and slightly better security
Term
SNMPv3
Definition
most recent and most secure version; added authentication, validation, and encryption for packets exchanged between managed devices and the network management console
Term
syslog
Definition
A standard for generating, storing, and processing messages about events on a system. Syslog describes methods for detecting and reporting events and specifies the format and contents of messages.
Term
system log
Definition
On a computer running a UNIX or Linux operating system, the record of monitored events, which can range in priority from 0 to 7 (where "0" indicates an emergency situation and "7" simply points to information that might help in debugging a problem). You can view and modify system log locations and configurations in the file /etc/syslog.conf on most systems (on some systems, this is the /etc/rsyslog.conf file).
Term
traffic policing
Definition
A traffic-shaping technique in which the volume or rate of traffic traversing an interface is limited to a predefined maximum.
Term
traffic shaping
Definition
Manipulating certain characteristics of packets, data streams, or connections to manage the type and amount of traffic traversing a network or interface at any moment.
Term
upgrade
Definition
A significant change to an application's existing code, typically designed to improve functionality or add new features.
Term
Web caching
Definition
A technique in which Web pages are stored locally, either on a host or network, and then delivered to requestors more quickly than if they had been obtained for the original source.
Term
wiring schematic
Definition
A graphical representation of a network's wired infrastructure.
Supporting users have an ad free experience!