Most UNIX and Linux desktop operating systems provide a GUI application for easily viewing and filtering the information in system logs.
Choose correct answer/s
True
False
Check answer
Question 2
Free
True/False
The SNMP version 3 protocol introduces authentication, validation, and encryption for messages exchanged between devices and the network management console.
Choose correct answer/s
True
False
Check answer
Question 3
Free
True/False
Wireshark or any other monitoring software running on a single computer connected to a switch doesn't see all the traffic on a network, but only the traffic the switch sends to it, which includes broadcast traffic and traffic specifically addressed to the computer.
Choose correct answer/s
True
False
Check answer
Question 4
Free
True/False
You can find out where various logs are kept on some UNIX and Linux systems by viewing the /etc/syslog.conf or /etc/rsyslog.conf files.
Choose correct answer/s
True
False
Check answer
Question 5
Free
True/False
Setting a NIC to run in promiscuous mode will allow it to see all network traffic passing through a network switch.
Choose correct answer/s
True
False
Check answer
Question 6
True/False
A system with an availability of 99.999% can be down for a maximum of 52 minutes per year.
Choose correct answer/s
True
False
To unlock the question
Question 7
True/False
A RAID 5 configuration requires a minimum of two hard disks to operate.
Choose correct answer/s
True
False
To unlock the question
Question 8
True/False
A brownout is a momentary decrease in voltage; also known as a sag.
Choose correct answer/s
True
False
To unlock the question
Question 9
True/False
A hot site consists of computers, devices, and connectivity necessary to rebuild a network exist, but without appropriate configuration.
Choose correct answer/s
True
False
To unlock the question
Question 10
Multiple Choice
When using SNMP with TLS, what port do agents receive requests on?
Choose correct answer/s
161
162
10161
10162
To unlock the question
Question 11
Multiple Choice
At what point is a packet considered to be a giant?
Choose correct answer/s
It becomes a giant when it exceeds the medium's maximum packet size.
It becomes a giant when it exceeds 1500 bytes.
It becomes a giant only when fragmented pieces are reassembled and the packet size is too large.
It becomes a giant once a VLAN tag is added.
To unlock the question
Question 12
Multiple Choice
Packets that are smaller than a medium's minimum packet size are known by what term below?
Choose correct answer/s
jabbers
giants
ghosts
runts
To unlock the question
Question 13
Multiple Choice
When a device handles electrical signals improperly, usually resulting from a bad NIC, it is referred to by what term below?
Choose correct answer/s
ghost
jabber
talker
blabber
To unlock the question
Question 14
Multiple Choice
When using DiffServ, what type of forwarding utilizes a minimum departure rate from a given node, which is then assigned to each data stream?
Choose correct answer/s
assured forwarding
prioritized forwarding
scaled forwarding
expedited forwarding
To unlock the question
Question 15
Multiple Choice
What 3-bit field in a 802.1Q tag is modified to set a frame's Class of Service (CoS)?
Choose correct answer/s
EtherType
CRC checksum
Tag Protocol Identifier (TPID)
Priority Code Point (PCP)
To unlock the question
Question 16
Multiple Choice
A highly available server is available what percentage of the time?
Choose correct answer/s
90%
99%
99.99%
99.999%
To unlock the question
Question 17
Multiple Choice
What happens when an NMS uses the SNMP walk command?
Choose correct answer/s
The NMS sends a request for data to the agent on a managed device.
The NMS uses get requests to move through sequential rows in the MIB database.
The NMS requests a list of all active SNMP traps on the system.
The NMS walks through a list of given SNMP hosts.
To unlock the question
Question 18
Multiple Choice
When Comcast was found to be interfering with BitTorrent traffic, what method was being used?
Choose correct answer/s
Comcast was creating access lists that blocked known BitTorrent trackers.
Comcast was interjecting TCP segments with the RST (reset) field set.
Comcast used DNS poisoning to prevent clients from talking to other BitTorrent users.
Comcast used IP spoofing to impersonate other BitTorrent clients, then dropped traffic.
To unlock the question
Question 19
Multiple Choice
What term is used to describe the average amount of time that will pass for a device before a failure is expected to occur?
Choose correct answer/s
estimated time to failure (ETTF)
product cycle lifetime (PCL)
maximum time available (MTA)
mean time between failures (MTBF)
To unlock the question
Question 20
Multiple Choice
The Link Aggregation Control Protocol was initially defined by what IEEE standard?