CompTIA Network+ Practice Tests. Craig Zacker

Чтение книги онлайн.

Читать онлайн книгу CompTIA Network+ Practice Tests - Craig Zacker страница 25

CompTIA Network+ Practice Tests - Craig Zacker

Скачать книгу

interface card (NIC) teamingRedundant hardware/clustersSwitchesRoutersFirewallsFacilities and infrastructure supportUninterruptible power supply (UPS)Power distribution units (PDUs)GeneratorHVACFire suppressionRedundancy and high availability (HA) conceptsCold siteWarm siteHot siteCloud siteActive-active vs. active-passiveMultiple Internet service providers (ISPs)/diverse pathsVirtual Router Redundancy Protocol (VRRP)/First Hop Redundancy Protocol (FHRP)Mean time to repair (MTTR)Mean time between failure (MTBF)Recovery time objective (RTO)Recovery point objective (RPO)Network device backup/restoreStateConfiguration

      1 After starting work as the network administrator of Wingtip Toys, you discover that all of the switches in the company's datacenter have support for remote management, with built-in Simple Network Management Protocol (SNMP) agents in each port. Which of the following tasks must you perform to be able to gather information from the agents on those switches and display it on a central console? (Choose all that apply.)Install the network management software on a network computer.Install a Management Information Base (MIB) on each of the switches.Install an agent on the console computer.Install an MIB on the console computer.Purchase a network management product.

      2 Which versions of the Simple Network Management Protocol (SNMP) do not include any security protection other than a cleartext community string? (Choose all that apply.)SNMPv1SNMPv2SNMPv2cSNMPv3

      3 Which of the following statements about the Simple Network Management Protocol (SNMP) are not true? (Choose all that apply.)To effectively monitor a network using SNMP, you must be sure that all of the equipment you purchase when designing and building your network supports the protocol.SNMP is not only the name of a protocol, it is also the name of a network management product.SNMPv1 and SNMPv2 rely on a community string as their only means of security.Most of the network management products on the market today support SNMPv3.

      4 What Windows utility is shown in the accompanying figure?Network MonitorSystem MonitorEvent ViewerLog Viewer

      5 Which of the following was created to provide logging services for the Unix sendmail program?SyslogNetstatSNMPCARP

      6 You are the network administrator of your company's network. Your company wants to perform a baseline analysis of network-related traffic and statistics. They want to track broadcasts, Cyclical Redundancy Check (CRC) errors, and collisions for all traffic traversing a switched network. In addition, they want to provide historical and daily reports for management. They also want to keep track of software distribution and metering. What type of network software product best meets these needs?SNMP managementProtocol analyzerPerformance MonitorNetwork traffic monitor

      7 Which of the following technologies provides both real-time monitoring of security events and automated analysis of the event information gathered?SIEMSNMPSEMSIM

      8 SIEM products combine the capabilities of which of the following? (Choose all that apply.)SyslogSNMPSEMSIM

      9 Which of the following statements about web server logs is not true?To analyze web server activity, you typically use an application that interprets the web server log files.Web server logs are typically maintained as text files.Web server logs record the IP addresses of all visiting users.To interpret web server logs, you use a protocol analyzer.

      10 Which of the following statements best describes a baseline?A baseline is an estimation of expected performance levels, based on manufacturers’ specifications.A baseline is a record of performance levels captured under actual workload conditions.A baseline is a record of performance levels captured under simulated workload conditions.A baseline is a record of performance levels captured before the system is actually in use.

      11 When monitoring performance metrics on one of your servers, you notice that the server is utilizing 100 percent of the network bandwidth available to it. What modification could you make to the server that will most likely address the problem?Add memory to the system.Install a second network adapter.Update the network adapter's firmware.Install a second processor.

      12 Which of the following indicators is typically not included in an operating system's performance monitoring tool, such as the Windows Performance Monitor or the MacOS Activity Monitor?TemperatureCPU/processor activityMemory consumptionNetwork utilizationStorage statistics

      13 Which of the following syslog message severity levels indicates that a system is unusable?01234

      14 Which of the following syslog message severity levels indicates a call for immediate action?01234

      15 Which of the following syslog message severity levels indicates that the message is purely informational?02467

      16 A Simple Network Management Protocol (SNMP) console can inform administrators when a managed device requires attention. For this to occur, the agent in the device first has to send a message to the console. What is the term used for a message sent by an SNMP agent to the central console?PingAlertNotificationTrap

      17 Which of the following metrics would you typically not find displayed by an interface monitor?Error rateBandwidth utilizationPacket dropsRollbacks

      18 Which of the following are reasons contributing to the number of packet drops displayed by an interface monitor? (Choose all that apply.)ResetsDiscardsErrorsOverflows

      19 Which of the following is not a statistic that you would typically find in a server performance baseline?CPU utilizationDisk transfer rateNetwork transmissions speedOS update historyMemory utilization

      20 Log management typically consists of which of the following tasks? (Choose all that apply.)RollbackUtilizationSecurityCycling

      21 Which of the following Security Information and Event Management (SIEM) processes performs searches for specific criteria, during specific time frames, in logs located on different computers?Data aggregationForensic analysisCorrelationRetention

      22 Which of the following terms best describes the Security Information and Event Management (SIEM) process of consolidating log information from multiple sources?Data aggregationForensic analysisCorrelationRetention

      23 Which of the following terms best describes a connectivity problem on wired networks that is caused by individual packets that are delayed due to network congestion, different routing, or queuing problems?LatencyAttenuationJitterBottleneck

      24 Which of the following network interface occurrences are considered to be malfunctions on a full-duplex Ethernet network? (Choose all that apply.)RuntsGiantsCollisionsLate collisions

      25 Which of the following network applications are most likely to be obviously affected by the wired network connectivity problem known as jitter? (Choose all that apply.)EmailVoIPStreaming videoInstant messaging

      26 Which of the following, originally created for the UNIX sendmail program, is now a standard for message logging that enables tools that generate, store, and analyze log information to work together?SyslogNetmonNetstatTop

      27 Which of the following log types is the first place that a Windows administrator should look for information about a server's activities?System logSetup logApplication logSecurity log

      28 When a service fails to start on a Windows server, an entry is typically created in which of the following event logs?ApplicationSecuritySetupSystem

      29 Which of the following Windows applications would you most likely use to create a baseline of system or network performance?Performance MonitorEvent ViewerSyslogNetwork Monitor

      30 At what humidity level do electronic components become vulnerable to damage from electrostatic shock?Below 30 percentBelow 50 percentAbove 70 percentAbove 90 percent

      31 Which of the following

Скачать книгу