N+ 3.0 Network Operations (Full)

0.0(0)
studied byStudied by 0 people
0.0(0)
call with kaiCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/133

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 2:30 PM on 10/2/24
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

134 Terms

1
New cards

What is the main function of an agent in Simple Network Management Protocol (SNMP)?

To monitor the network devices and operating systems

2
New cards

What is an SNMP agent responsible for?

Answering requests from the NMS, sending messages to the NMS, and collecting & presenting values for certain metrics (or counters)

3
New cards

Why is it necessary to back up network device configurations?

Configurations are usually unique and could be lost due to various issues

4
New cards

What is a key consideration when trying to provide an active-active configuration for the main site and backup site in a redundancy strategy?

How to get traffic to the main site and backup site simultaneously

5
New cards

What does a txload value of 25 indicate in the context of send/receive traffic?

1/10 of the connection speed is being used to transmit data

6
New cards

What is the function of the standard operating procedures (SOPs) in a quality management system (QMS)?

Define the responsibilities and standards associated with each process

7
New cards

In the context of a maintenance contract for a fault-tolerant system, what does the acronym ’MTTR’ specifically refer to?

Mean Time to Repair

8
New cards

What is MTTR a measure of?

The average time needed to repair a failed item in a fault-tolerant system

9
New cards

What is the metric MTTR specified in?

Maintenance contracts

10
New cards

Which device metric can indicate that there is overutilization of an internal resource like the CPU?

Overheating

11
New cards

What is the significance of identifying the root cause in a network incident document?

To prevent the same incident from recurring

12
New cards

Which of the following accurately describes the different types of dual-power supplies?

Active/passive, load balancing, and load-shifting

13
New cards

What is an active/passive dual-power configuration?

One power supply is active while the other remains passive until the active one fails

14
New cards

What is a load balancing dual-power configuration?

Both power supplies actively provide power, dividing the load between them

15
New cards

What is a load-shifting dual-power configuration?

Power loads are continually transferred between the two power supplies to allow for regular performance checks

16
New cards

What does the term ’the nines’ in a service-level agreement (SLA) refer to?

The percentage of uptime per year

17
New cards

What does CPU utilization imply about the performance of a device on a network?

High CPU utilization indicates that the device is doing more work

18
New cards

What is the purpose of a performance baseline in network troubleshooting?

It provides a record of typical network activity, and it confirms that a performance problem has been resolved

19
New cards

Why should the fiber-optic cables running from the MDF to the IDF closets be documented extensively?

Their other end can be a great deal of distance away

20
New cards

Why is it best practice to statically set the speed and duplex on important connections, such as your Internet router?

To avoid having a speed or duplex mismatch

21
New cards

What does statically setting the speed and duplex of your important connections (like internet router) do?

Prevents the port from negotiating automatically at less desirable settings

22
New cards

What method of authentication does SNMP version 3 primarily use?

User accounts and SNMP view

23
New cards

What is the impact of a latency of 125 ms or more when dealing with real-time protocols such as Voice over IP (VoIP)?

Creates an echo

24
New cards

What is the purpose of a nondisclosure agreement (NDA) in a network professional context?

Protect the organization from the employee disclosing proprietary information

25
New cards

What causes CRC errors in network communication?

Failed FCS checks

26
New cards

What does a hot site in a disaster recovery strategy refer to?

A site with full equipment setup to resume complete primary site’s network operations

27
New cards

What information would a network log typically classify as a session-based traffic log?

The start and end of a particular session or transmission on the network

28
New cards

What are the major components of a power generator?

Fuel, engine, and generator

29
New cards

What is the most common cause of failure in network device components?

High temperature

30
New cards

Which type of fire suppression system is often used in data centers because it does not damage equipment?

Clean agent

31
New cards

How do clean agent fire suppression systems work?

The system displaces oxygen in the air below 15%, which helps to contain fire

32
New cards

In context of backups, what does a differential backup do?

Copies all the files with the archive bit set and resets the archive bit after it is done

33
New cards

What is the main responsibility of the IT department in an organization when an employee is leaving?

Make sure the user is not connected to the IT systems remotely and disable the user’s account

34
New cards

Which of the following best describes a power spike as it relates to networking equipment?

A state when the voltage increases for 1 to 2 nanoseconds

35
New cards

What is the role of the ’Agent’ in the Simple Network Management Protocol (SNMP) as described in the text?

A software that collects and presents specific set of counters or metrics upon request and sends messages to NMS

36
New cards

What do the statuses ’up’ and ’line protocol is up’ mean in the output of the show interface command on a network switch?

The physical layer connectivity and the data link connectivity for the connection are both active

37
New cards

What is a common cause of encapsulation errors when configuring a network interface?

Misconfiguration of Ethernet encapsulation

38
New cards

What happens when an interface receives a frame larger than the configured maximum transmission unit (MTU)?

The giant frame counter will increment

39
New cards

What is the purpose of the ’Actions Taken’ element in a network incident document?

Documents the steps taken to identify and rectify the incident

40
New cards

Which stage of the IT system life cycle usually involves tasks such as imaging, configuring, or installing software?

Deploying

41
New cards

What are the common types of traffic logs as described in the text?

Overview, Session, and Exception logs

42
New cards

Which of the following options is NOT part of a common network incident document as identified in the given text?

Backups taken

43
New cards

What are some of the steps to harden a network according to the information given?

Changing the default password and installing the latest updates

44
New cards

What should the labeling scheme for wiring documentation include?

Building, room, grid coordinates, patch panel, and outlet

45
New cards

What is the primary function of protocol packets and byte counts in network interface inspection?

Evaluate the layer 3 network load

46
New cards

What type of traffic logs are best for understanding traffic patterns to a network based on the source and destinations?

Overview-based traffic logs

47
New cards

What are the two ways to measure bandwidth?

Available bandwidth and bandwidth utilization or throughput

48
New cards

What is Business Continuity as a Service (BCaaS) in the context of cloud sites?

A full product completely managed by the cloud provider designed for business continuity

49
New cards

What does an SNMP set command do in a network?

Allows a variable to be set on the device or operating system

50
New cards

What is the purpose of a change rollback plan in change management documentation?

To describe the steps to roll back from a failed primary plan

51
New cards

What should be taken into consideration when developing a password policy for an organization?

The sensitivity of information the users handle

52
New cards

What is one solution for mitigating the issue of Internet connection loss according to the text?

Employing an additional ISP to create diverse paths

53
New cards

Which statement about Virtual Router Redundancy Protocol (VRRP) is correct?

It is an open standard First-Hop Redundancy Protocol

54
New cards

What routers can VRRP be used on?

Ones from any manufacturer

55
New cards

How does VRRP function?

Active/passive configuration with only the active router answering ARP requests for the virtual IP and MAC addresses

56
New cards

Which of the following is NOT a valid measure to mitigate the risk of equipment damage caused by flooding?

Pour antifreeze directly on the networking equipment

57
New cards

What is the role of the recovery point objective (RPO) within a backup strategy?

Defines the maximum amount of data loss acceptable in the event of a disaster

58
New cards

Which PowerShell command can be used to gather detailed statistics about a network connection in Windows?

Get-NetAdapterStatistics

59
New cards

Which of the following best describes the Clean Agent fire suppression system?

Uses a mixture of nitrogen, argon, and CO2 or a mixture of those gases

60
New cards

What additional safety measure does the preaction system, a type of fire suppression system, employ?

Employs an independent thermal link that pre-charges the system with water

61
New cards

What is the primary purpose of snapshots as described in the text?

To allow users to restore their own files up to the last 64 snapshots

62
New cards

Which concept is defined as creating multiple instances of a data center in different locations to minimize the impact of a catastrophic event?

Facility redundancy

63
New cards

Which of the following best describes the role of a disaster recovery plan in an organization as described in the text?

Details how to restore systems so that business functions normally after a disaster

64
New cards

Why is a centralized logging server seen as the best approach for logging network events?

Reduces the risk of log files being inaccessible in the event of device failure

65
New cards

What describes the operation of Deluge Systems in fire suppression?

When a fire breaks out, the entire system dumps water from all the sprinkler heads

66
New cards

What is the purpose of the ’Services Impacted’ section in a network incident document?

Details all the network systems and business units affected during the incident

67
New cards

What port does the Syslog protocol operate on?

UDP port 514

68
New cards

Which of the following correctly describes the role of a soft control in an organization’s remote access policy?

Defines who has access and why, in relation to their job duties

69
New cards

According to the text, why is it necessary to define and compare metrics when managing performance and troubleshooting?

To have a measure of success

70
New cards

What are the purposes of HVAC system in a data center?

To filter out dust and keep the environmental conditions stable

71
New cards

What is the purpose of the community name in SNMP versions 1 and 2c?

Acts as a shared passphrase authentication

72
New cards

Which of the following best describes the Memorandum of Understanding (MOU)?

Serves as an amendment to an already established agreement

73
New cards

What are the consequences of using an incremental backup method?

Can speed up backups, but can also create a longer RTO

74
New cards

What does the Recover Point Objective (RPO) in a disaster recovery plan refer to?

The point in time to which the organization can be recovered

75
New cards

Which statement best describes the Dry Pipe System for fire suppression in a facility?

Initially the pipes are charged with air or nitrogen, and only releases water when a pressure drop due to heating occurs

76
New cards

What does a full backup specifically entail?

Backs up all the files in the dataset, regardless of when they were last modified

77
New cards

What is an electrical sag in network equipment?

An exception when the line voltage dips below the nominal operating voltage

78
New cards

Which two factors can make temperature a problem for devices on a network?

External environment and internal temperature

79
New cards

What is the primary difference between a standby UPS and a line interactive UPS?

In a standby UPS, the load must shift from AC to a completely different circuit, while on a line interactive UPS, the inverter is always wired to the load

80
New cards

How does a standby UPS work?

The load must shift from AC to a completely different circuit

81
New cards

How does a line interactive UPS work?

The inverter is always wired to the load

82
New cards

What is the primary purpose of a Nondisclosure Agreement (NDA) in an organization?

To legally protect the organization from an employee disclosing proprietary information

83
New cards

Why is the ’Date and Time’ an important component of a network incident document?

Allows you to distinguish between various incidents that could occur on the same day

84
New cards

What is the purpose of first-hop redundancy protocols (FHRPs) such as Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy Protocol (VRRP) in a network setting?

To configure a highly available default gateway by providing a coordinated virtual router

85
New cards

What is the main difference between a logical diagram and a physical diagram in network documentation?

A logical diagram details how a network system works, while a physical diagram details why it operates

86
New cards

What does a logical diagram do?

Details how a network system works

87
New cards

What does a physical diagram do?

Details why a network operates

88
New cards

What is the primary difference between a power ’spike’ and a power ’surge’?

Power surge lasts over three nanoseconds, while a power spike lasts one to two nanoseconds

89
New cards

How long does a power surge last?

Over three nanoseconds

90
New cards

How long does a power spike last?

One to two nanoseconds

91
New cards

What is the main function of the Spanning Tree Protocol (STP) in creating high network availability?

Forwards frames across the redundant link following a failure

92
New cards

What does humidity below 20 percent risk in server rooms?

Electrostatic discharge (ESD)

93
New cards

What is an important aspect that should be included in a network incident document to maintain consistency in reporting incidents and to provide a record of the event?

Summary of what happened during the incident

94
New cards

What is the purpose of an Acceptable Use Policy (AUP) in an organization?

Mitigate employee abuse of company resources

95
New cards

What is a characteristic of a cold site for disaster recovery?

A site without equipment, which will need to be bought and configured after a disaster

96
New cards

Which of the following is NOT a function of the NetFlow protocol based on the given text?

Designs the network topology for optimal performance

97
New cards

What is the purpose of a site survey report in relation to a wireless network?

To establish a proper coverage after wireless equipment purchase and to guide future adjustments

98
New cards

What is the purpose of a business continuity plan in an organization?

To detail how an organization will continue to function during a disastrous event

99
New cards

What is the main function of Power Distribution Units (PDUs) in a data center?

Supply power in a dual-power supply configuration

100
New cards

What is the purpose of Object Identifiers (OIDs) in SNMP?

Unique objects on a device that can be queried or configured