Saturday, 21 April 2018

The more complicated a network becomes, the more vulnerable it becomes. TRUE

36. (p. 505) The more complicated a network becomes, the more vulnerable it becomes.
TRUE

37. (p. 506) You do not need to create wiring schematics for a small network.
FALSE

38. (p. 510) An acceptable use policy defines procedures employees should perform to protect the network's security.
FALSE

39. (p. 511) Regulations are the rules that govern behavior in the workplace.
TRUE

40. (p. 512) An object is an aspect of a counter that can be monitored.
FALSE

41. (p. 512) You cannot configure what objects are monitored by Performance Monitor.
FALSE

42. (p. 518) An application log contains information on important events relating to system services and device drivers.
FALSE

43. (p. 519) The goal of network performance optimization is to keep resources available and the network performing as fast as expected.
TRUE

44. (p. 526) If you want reliable power during a long-term blackout, have a UPS in place.
FALSE

45. (p. 527) Clustered servers can balance the load when there is heavy usage.
TRUE

46. (p. 523) Uptime is not a critical factor in network management.
FALSE

47. (p. 526) An uninterruptible power supply (UPS) keeps the power on long enough to shut down the servers properly.
TRUE

48. (p. 527) RAID 0 offers speed and fault tolerance.
FALSE

49. (p. 521) Quality of Service (QoS) can smooth out the needs of latency-sensitive applications such as VoIP and unified communication boxes.
TRUE

50. (p. 521) RAID 6 adds another parity block, allowing an array of four or more drives, tolerating a loss of two.
TRUE



Fill in the Blank Questions
 
51. (p. 505) To quickly see all the details of your network, consult the _______________
configuration management documentation

52. (p. 506) The _______________ identifies how cabling in a network connects to various switches, plus what standards are used for the cabling.
wiring schematic

53. (p. 506) The _______________ usually generates the wiring diagram.
network administrator

54. (p. 506) A(n) _______________ shows the cabling runs, defining the type of connections (Gigabit Ethernet, T1, and so on), as well as every router, switch, server, CSU/DSU, cable modem, and WAP, including make, model, and firmware upgrade.
physical network diagram

55. (p. 507) An important aid in documenting a network is the use of _______________ developed by Cisco to represent the various types of networking devices.
network topology icons

56. (p. 506) Normally, the _______________ creates the physical network diagram.
network administrator

57. (p. 508) A(n) _______________ describes the broadcast domains and individual IP addresses for all devices in a network with static IP addresses, sometimes showing individual computers, but rarely showing connections.
network map

58. (p. 507) A popular tool used to create network diagrams is __________.
Microsoft Visio

59. (p. 510) Policies and procedures help protect your network from harm by mitigating security __________.
risks

60. (p. 510) A(n) _______________ is a log of performance indicators, such as CPU usage, network utilities, and other measurements that portray the normal functioning of a network and its servers.
baseline

61. (p. 510) Windows comes with a tool called _______________ for creating a baseline.
Performance Monitor

62. (p. 510) A(n) _______________ defines exactly what a user can and cannot do with the organization's computers and network.
acceptable use policy

63. (p. 510) A(n) _______________ defines procedures employees should perform to protect the network's security.
security policy

64. (p. 510) Network and computer _______________ are the results of the procedures.
configurations

65. (p. 511) Every configurable network device comes with a tool to document its _______________.
configuration

66. (p. 511) _______________ are the rules that govern behavior in the workplace, helping to keep networks and users safe and productive.
regulations

67. (p. 511) A detailed overview of a network, along with how to upgrade it, are both part of the _______________ for a network.
change management documentation

68. (p. 516) Log files in Vista are called _______________.
data collector sets

69. (p. 510) Regardless of the operating system, you should create _______________ for all systems and cover all aspects of the network—both at rest and in use.
baselines

70. (p. 517) A(n) _______________ can also act as a network intrusion detection system (IDS) because it is always online and always checking for certain events or changes.
network monitor

71. (p. 519) Caching, data throughput, and resource availability are all important areas that come into play for _______________.
network performance optimization

72. (p. 521) _______________, used primarily on gateway devices, gives certain applications priority when a connection reaches a certain amount of utilization.
Quality of Service (QoS)

73. (p. 523) Systems that can continue to provide network functions after catastrophic hardware failure are said to have _______________.
fault tolerance

74. (p. 527) Distributing the load among several servers is a form of _______________.
load balancing

75. (p. 527) A(n) _______________ is a group of servers acting as a single server so that service can still be provided if a server fails.
cluster

76. (p. 526) If you have a(n) _______________ in place, you will have power for your network during extended blackouts.
backup generator

77. (p. 526) If you wish to have protection against short-term brownouts and power failures, be sure to use a(n) _______________.
UPS

78. (p. 524) A(n) _______________ backup includes only files with the archive bit turned on, and it turns off the bit as it backs up each file.
incremental

79. (p. 525) A(n) _______________ backup is identical to an incremental backup, except that it doesn't turn off the archive bits.
differential

80. (p. 525) A(n) _______________ backup backs up all files that have changed that day, but does not change the archive bit.
daily backup

81. (p. 506) A(n) _______________ shows network devices and how they connect.
network diagram

82. (p. 508) A(n) _______________ goes deeper into the individual components of the network.
network map

83. (p. 510) To create a good __________, you need to run logging utilities and performance monitoring for extended periods of time.
baseline

84. (p. 520) Dedicated caching servers use __________ to load balance.
Cache Array Routing Protocol (CARP)

85. (p. 521) __________ allows you to use services such as VoIP, instant messaging (IM), telephone service, and video conferencing all on one system.
Unified Communications (UC)



Essay Questions
 
86. (p. 504) List the three areas of network management. 
The three areas of network management are configuration management, network monitoring, and network optimization.

87. (p. 505) Describe the value of configuration management. 
Configuration management enables network managers to maintain and update a network in a logical and orderly fashion to lessen the vulnerabilities of a large, complicated network.

88. (p. 505) Describe what is included in configuration management. 
Configuration management includes the configuration management documentation, a set of documents, policies, and procedures that network technicians follow to maintain and update a network. It includes documented standards for the NICs, cabling, network operating systems, and applications.

89. (p. 505) List the four broad categories included in configuration management documentation. 
The four broad categories include:
Network connectivity
Baselines
Policies, procedures, and configurations
Regulations

90. (p. 506) Define a wiring diagram or wiring schematic. 
A wiring diagram or wiring schematic is documentation of how wires in a network connect to various switches and other network devices. It also includes the cabling standards in use. This covers every cable run, telecommunications closet, network outlet, cross-connect, and demarc.

91. (p. 511) What should be your last step when you make changes to a network? 
The last step you take when making changes to a network is updating the network configuration management documentation.

92. (p. 510) Describe the role of a baseline in network management. 
A baseline provides a network administrator with a picture of how a network and its servers look when everything is functioning normally. Since the baseline contains measurements of many functions, a good network manager does ongoing logging of these same functions in order to see when things are changing, possibly indicating a brewing problem.

93. (p. 510) Briefly describe the role of policies and procedures in network management. 
Policies define what people can and cannot do with network hardware and software, providing the actual procedures they should follow when doing such things as upgrading components or adding new user accounts.

94. (p. 510) Give an example of an acceptable use policy. 
One example of an acceptable use policy includes exactly if and how a user can use a computer for personal use. A subset of that is if a user is permitted to add personal software; if so, exactly what software.

95. (p. 511) Give an example of a regulation that would be part of configuration management documentation. 
An example of a regulation that would be part of configuration management would be what to do when you have a safety violation or some sort of bad accident.

96. (p. 512) Distinguish between an object and a counter in Performance Monitor. 
In Performance Monitor an object is a system component that you can monitor using the program, while a counter is a measurable feature of that object.

97. (p. 514) Describe the function of a log in Performance Monitor. 
In Performance Monitor, a log is saved data that can be viewed after the fact, rather than simply viewing it onscreen in real time.

98. (p. 518) Describe application general logs. 
These record updates to applications, for example, and aren't terribly interesting from a networking standpoint. Linux systems tend to have lots of logs, but most versions have a directory called/var/log where all of your logs (usually) reside. Mac OS X has roughly the same logs as Linux.

99. (p. 518) Describe a security log. 
A security log is one of the log file types that most operating systems will generate. It includes events that affect security, such as successful and failed logons and logoffs.

100. (p. 518) Describe a system log. 
A system log is one of the log file types that most operating systems generate automatically. It includes a large array of events involving system services, device drivers, and system configuration changes.

101. (p. 518) What types of problems would call for checking out the system log on a computer? 
If you suspect a problem with system services, devices drivers, or configuration changes, check the system log file for related events.

102. (p. 518) Discuss the flexibility of the default log files in operating systems. 
Every operating system creates log files, logging important events. These files are flexible in that you can modify them to log certain types of events, as needed.

103. (p. 521) Explain how Quality of Service (QoS) works. 
QoS, a Layer 2 service, works with 802.1Q trunks to prioritize traffic, applying a Class of Service (CoS) priority to a certain physical port. As traffic passes through the port to a trunk line, it receives an allocated amount of bandwidth determined by the priority (the higher the value from 0 to 7, the more bandwidth).

104. (p. 522) Describe traffic shaping. 
Traffic shaping works at Layer 3 and Layer 7 of the OSI model to prioritize traffic based on the TCP/UDP port number. It either gives certain packets a priority, or directly assigns a fixed amount of bandwidth to packets from a certain application (defined by port number). Traffic shaping is usually done on edge routers.

105. (p. 520) Describe the challenge of using caching for network optimization. 
The challenge of using caching for network optimization is in identifying all the places in which it can be used, such as DNS caching, proxy servers, and more.

106. (p. 521) When is it necessary to throttle bandwidth? 
When you have limited Internet bandwidth compared to the demand, you need a method to throttle bandwidth so that latency-sensitive applications get more bandwidth, reducing bandwidth to applications that are not directly affected by waiting.

107. (p. 521-522) Differentiate between Quality of Service (QoS) and traffic shaping. 
Quality of Service (QoS) works at Layer 2 of the OSI model, prioritizing traffic by either MAC address or physical ports to allocate bandwidth. Traffic shaping works at Layer 3 and Layer 7 of the OSI model, prioritizing traffic by TCP and UDP port numbers.

108. (p. 524) Describe the archive bit and its relationship to data backup. 
The archive bit is a file attribute that is manipulated by backup programs to keep track of the files they back up.

109. (p. 524-525) Compare an incremental backup and a differential backup. 
Both an incremental backup and a differential backup will back up only files with the archive bit turned on. The difference is that an incremental backup will turn off the archive bit of each file it backs up, while a differential backup will not. This makes a differential backup a cumulative backup.

110. (p. 524) Compare a normal backup with a copy backup. 
Both a normal backup and a copy backup will back up every file selected, but only the normal backup will turn off the archive bit for every backed-up file.

111. (p. 526) Compare an uninterruptible power supply (UPS) with a backup generator. 
A UPS provides power, via battery, for a short period of time during a brownout or blackout, while a backup generator will provide power for a long-term power failure, requiring some sort of fuel to provide electricity.

112. (p. 525) Explain the common backup rotation known as grandfather, father, son (GFS). 
The grandfather, father, son (GFS) backup rotation involves a regimen in which you would run a full backup once a week, and a differential backup each day. The weekly backup (often on tape) is the father and is stored offsite. The differential backups are the son. The last full backup of the month is the grandfather and is also stored offsite. Backups can be restored by previous months, weeks, or days.

113. (p. 523) Describe why tape continues to be an important backup medium. 
Tape continues to be an important backup medium because it is relatively inexpensive and reliable over a long period of time.

114. (p. 517) Describe the dual functions of a network monitor. 
A network monitor is always online checking for certain events, and therefore, it also can act as a network intrusion detection system (IDS).

115. (p. 526) Describe a redundant power supply and redundant NIC. 
A redundant, or spare, power supply kicks on automatically if the main power supply in a system dies. A redundant NIC works in much the same way, replacing a failed NIC or failed connection.

116. (p. 518) Describe the categories of logs. 
Logs fall into three general categories, such as general, system, and history. General logs you can see in tools like Windows Event Viewer. These logs record updates to applications and generic events, for example, and aren't terribly interesting from a networking standpoint. System logs display general system and security events, and history logs track the history of how a user or users access network resources, or how network resources are accessed throughout the network.

117. (p. 520) Describe caching servers. 
Dedicated cache servers are available for larger networks. They reduce overall network traffic by caching frequently accessed information inside the local network, reducing requests that have to traverse outside. More commonly today, you'll find caching server functions as part of software services. Squid, for example, is a proxy and caching server that handles HTTP traffic, DNS, FTP, and more. You can deploy Squid on multiple servers and use the Cache Array Routing Protocol (CARP) to load balance among them all, optimizing network performance.

118. (p. 508) Describe network maps. 
A network map goes deeper into the individual components of the network, and documents IP addresses, ports, protocols and other pertinent information. Network maps are usually created with Nmap or other network mapping/scanning software.

119. (p. 506) Describe wiring schemes. 
A wiring scheme describes cabling and connectors used in the network. It will describe wiring standards used, such as CAT5, 568A, fiber, and so forth. It may also define connectors for PCs, switches, and routers.

120. (p. 527) Which RAID does not offer any fault tolerance, and why? 

RAID 0 enables you to stripe together two or more drives into a single drive for reads and writes, increasing the overall speed of the data transfers. Unlike RAIDs 1, 5, 6, and others, RAID 0 provides no fault tolerance, as it does not use parity bits.

No comments:

Post a Comment