Computer Networking Unit 7 Review

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/60

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 9:39 PM on 4/30/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

61 Terms

1
New cards
Which of the following is a characteristic of a cold site?
Requires setup after a disaster
2
New cards
What is the key benefit of Configuration Audits?
To verify that network device settings match approved configurations
3
New cards
Why is Backup Configuration important in IT networks?
It ensures quick restoration of network settings if needed
4
New cards
What is the purpose of a Baseline/Golden Configuration?
To define a standard configuration for network devices
5
New cards
Which of the following is NOT a key part of Configuration Management?
Employee Salary Management
6
New cards
Why is Configuration Management important in network administration?
It ensures devices are configured consistently and securely
7
New cards
What is an example of Service Request Tracking?
A help desk system logging and tracking IT support requests
8
New cards
What is the primary benefit of a Service Request Tracking system?
It ensures all service requests are recorded and handled efficiently
9
New cards
What is an example of a poorly managed network change?
Deploying a new router without proper planning, causing network outages
10
New cards
What is the main purpose of Change Management in IT?
To manage network updates in a controlled and tested manner
11
New cards
Why is it important to monitor End-of-Life (EOL) and End-of-Support (EOS) for IT assets?
To plan upgrades and avoid security risks
12
New cards
Which of the following is NOT a typical component of life-cycle management?
Employee performance reviews
13
New cards
What is the primary function of a Service-Level Agreement (SLA)?
To define service expectations and performance metrics
14
New cards
Why is it important to track software licenses?
To ensure compliance and avoid legal issues
15
New cards
What is the primary purpose of asset inventory in an IT department?
To maintain a record of hardware and software assets
16
New cards
Why might an organization invest in out-of-band management?
To ensure secure and reliable access to network devices even during outages
17
New cards
What is primary drawback of in-band management?
Management access can be disrupted if the main network experiences issues
18
New cards
How does in-band management differ from out-of-band management?
B. Split tunneling routes only work-related traffic through the VPN, while full tunneling routes all traffic
19
New cards
What is a major benefit of using a jump box for administrative access?
It reduces the attacks surface by centralizing access control
20
New cards
What is the purpose of a jump box in network security?
To act as an intermediary server that controls access to sensitive networks
21
New cards
What is a key characteristic of console-based management?
It requires a direct, physical connection to the device
22
New cards
Why would an administrator choose API-based management?
To automate tasks and integrate systems efficiently
23
New cards
Which administrative access method provides a graphical interface for remote management?
RDP
24
New cards
Which port does SSH typically use for secure remote access?
22
25
New cards
What is the primary purpose of SSH in network management?
To allow encrypted remote command-line access to devices
26
New cards
What is the difference between full tunneling and split tunneling in a Client-to-Site VPN?
Split tunneling routes only work-related traffic through the VPN, while full tunneling routes all traffic
27
New cards
How does a Client-to-Site VPN differ from a Site-to-Site VPN?
It connects individual users to the corporate network remotely
28
New cards
What is the main advantage of using a Site-to-Site VPN over leased lines?
It is more cost-effective and simplifies network management
29
New cards
What is the primary function of a Site-to-Site VPN?
To establish a secure connection between multiple office locations
30
New cards
What is port mirroring used for?
Copying network packets to another port for monitoring
31
New cards
What is API integration used for in network monitoring?
To connect software applications and enable data exchange
32
New cards
What is the purpose of a SIEM system?
To provide real-time analysis and management of security-related data
33
New cards
What is the function of a syslog collector?
To gather and process log messages from various network devices
34
New cards
What triggers anomaly alerts in network monitoring?
Predefined metrics exceeding normal thresholds
35
New cards
What do baseline metrics help network administrators do?
Establish normal network performance for comparison
36
New cards
Which tool is commonly used for packet capture?
Wireshark
37
New cards
What is the purpose of packet capture?
To intercept and record network packets for analysis
38
New cards
Which technology is commonly used for flow data collection?
NetFlow
39
New cards
What does flow data provide insights into?
Traffic patterns, volume, and destinations
40
New cards
Why is SNMP v3 preferred over SNMP v2c?
It encrypts data and provides authentication
41
New cards
Which protocol is used for managing and monitoring network devices?
SNMP
42
New cards
What is the primary purpose of network monitoring?
To gather, analyze, and interpret network data for reliability and security
43
New cards
Why is communication important during the troubleshooting process?
To help maintain user trust and keep stakeholders informed
44
New cards
If a network issue has many symptoms and causes confusion, what is a recommended strategy?
Break the problem into smaller parts
45
New cards
What should you do to prevent the same network problem from happening again?
Document the fix and add preventative measures
46
New cards
Why is user feedback important after applying a network fix?
It helps verify that the fix worked in real conditions
47
New cards
What is a key action during the "Apply the Fix" step?
Monitor the system during and after changes
48
New cards
What step comes immediately AFTER confirming your theory of probable cause?
Make a plan to fix the problem
49
New cards
Why should you only make one change at a time when testing a theory?
To know exactly which change caused the result
50
New cards
When forming a theory during troubleshooting, what should you do first?
Start with simple and likely explanations
51
New cards
Why is it helpful to try to reproduce the issue in a test environment?
It allows safe experimentation without affecting the live network
52
New cards
What is the FIRST step in an effective network troubleshooting process?
Understand and define the problem
53
New cards
If a system has a high Mean Time Between Failure (MTBF), what does that indicate?
It is very reliable
54
New cards
Which testing method validates the disaster recovery plan using actual systems?
Validation Test
55
New cards
What metric shows the average time it takes to fix a system after a failure?
MTTR
56
New cards
What is the purpose of a tabletop exercise in disaster recovery testing?
To discuss the response plan without affecting systems
57
New cards
What is the primary difference between active-passive and active-active high availability setups?
Active-active systems both operate simultaneously
58
New cards
Which disaster recovery site is most expensive and offers the fastest recovery time?
Hot site
59
New cards
A company has an RTO of 2 hours. What does this mean?
Systems must be restored within 2 hours of failure
60
New cards
Which of the following best describes a Recovery Point Objective (RPO)?
How much data loss is acceptable
61
New cards
What is the main goal of a Disaster Recovery (DR) plan?
To restore systems and data quickly after a disruption