After starting work as the network administrator of Wingtip Toys, you discover that all of the switches in the company's datacenter have support for remote management, with built-in Simple Network Management Protocol (SNMP) agents in each port. Which of the following tasks must you perform to be able to gather information from the agents on those switches and display it on a central console? (Choose all that apply.)
Install the network management software on a network computer.
Install a Management Information Base (MIB) on each of the switches.
Install an agent on the console computer.
Install an MIB on the console computer.
Purchase a network management product.
Which versions of the Simple Network Management Protocol (SNMP) do not include any security protection other than a cleartext community string? (Choose all that apply.)
SNMPv1
SNMPv2
SNMPv2c
SNMPv3
Which of the following statements about the Simple Network Management Protocol (SNMP) are not true? (Choose all that apply.)
To effectively monitor a network using SNMP, you must be sure that all of the equipment you purchase when designing and building your network supports the protocol.
SNMP is not only the name of a protocol, it is also the name of a network management product.
SNMPv1 and SNMPv2 rely on a community string as their only means of security.
Most of the network management products on the market today support SNMPv3.
What Windows utility is shown in the accompanying figure?
Network Monitor
System Monitor
Event Viewer
Log Viewer
Which of the following was created to provide logging services for the Unix sendmail program?
Syslog
Netstat
SNMP
CARP
You are the network administrator of your company's network. Your company wants to perform a baseline analysis of network-related traffic and statistics. They want to track broadcasts, Cyclical Redundancy Check (CRC) errors, and collisions for all traffic traversing a switched network. In addition, they want to provide historical and daily reports for management. They also want to keep track of software distribution and metering. What type of network software product best meets these needs?
SNMP management
Protocol analyzer
Performance Monitor
Network traffic monitor
Which of the following technologies provides both real-time monitoring of security events and automated analysis of the event information gathered?
SIEM
SNMP
SEM
SIM
SIEM products combine the capabilities of which of the following? (Choose all that apply.)
Syslog
SNMP
SEM
SIM
Which of the following statements about web server logs is not true?
To analyze web server activity, you typically use an application that interprets the web server log files.
Web server logs are typically maintained as text files.
Web server logs record the IP addresses of all visiting users.
To interpret web server logs, you use a protocol analyzer.
Which of the following statements best describes a baseline?
A baseline is an estimation of expected performance levels, based on manufacturers’ specifications.
A baseline is a record of performance levels captured under actual workload conditions.
A baseline is a record of performance levels captured under simulated workload conditions.
A baseline is a record of performance levels captured before the system is actually in use.
When monitoring performance metrics on one of your servers, you notice that the server is utilizing 100 percent of the network bandwidth available to it. What modification could you make to the server that will most likely address the problem?
Add memory to the system.
Install a second network adapter.
Update the network adapter's firmware.
Install a second processor.
Which of the following indicators is typically not included in an operating system's performance monitoring tool, such as the Windows Performance Monitor or the MacOS Activity Monitor?
Temperature
CPU/processor activity
Memory consumption
Network utilization
Storage statistics
Which of the following syslog message severity levels indicates that a system is unusable?
0
1
2
3
4
Which of the following syslog message severity levels indicates a call for immediate action?
0
1
2
3
4
Which of the following syslog message severity levels indicates that the message is purely informational?
0
2
4
6
7
A Simple Network Management Protocol (SNMP) console can inform administrators when a managed device requires attention. For this to occur, the agent in the device first has to send a message to the console. What is the term used for a message sent by an SNMP agent to the central console?
Ping
Alert
Notification
Trap
Which of the following metrics would you typically not find displayed by an interface monitor?
Error rate
Bandwidth utilization
Packet drops
Rollbacks
Which of the following are reasons contributing to the number of packet drops displayed by an interface monitor? (Choose all that apply.)
Resets
Discards
Errors
Overflows
Which of the following is not a statistic that you would typically find in a server performance baseline?
CPU utilization
Disk transfer rate
Network transmissions speed
OS update history
Memory utilization
Log management typically consists of which of the following tasks? (Choose all that apply.)
Rollback
Utilization
Security
Cycling
Which of the following Security Information and Event Management (SIEM) processes performs searches for specific criteria, during specific time frames, in logs located on different computers?
Data aggregation
Forensic analysis
Correlation
Retention
Which of the following terms best describes the Security Information and Event Management (SIEM) process of consolidating log information from multiple sources?
Data aggregation
Forensic analysis
Correlation
Retention
Which of the following terms best describes a connectivity problem on wired networks that is caused by individual packets that are delayed due to network congestion, different routing, or queuing problems?
Latency
Attenuation
Jitter
Bottleneck
Which of the following network interface occurrences are considered to be malfunctions on a full-duplex Ethernet network? (Choose all that apply.)
Runts
Giants
Collisions
Late collisions
Which of the following network applications are most likely to be obviously affected by the wired network connectivity problem known as jitter? (Choose all that apply.)
Email
VoIP
Streaming video
Instant messaging
Which of the following, originally created for the UNIX sendmail program, is now a standard for message logging that enables tools that generate, store, and analyze log information to work together?
Syslog
Netmon
Netstat
Top
Which of the following log types is the first place that a Windows administrator should look for information about a server's activities?
System log
Setup log
Application log
Security log
When a service fails to start on a Windows server, an entry is typically created in which of the following event logs?
Application
Security
Setup
System
Which of the following Windows applications would you most likely use to create a baseline of system or network performance?
Performance Monitor
Event Viewer
Syslog
Network Monitor
At what humidity level do electronic components become vulnerable to damage from electrostatic shock?
Below 30 percent
Below 50 percent
Above 70 percent
Above 90 percent
Which of the following event logs on a Windows server can record information about both successful and failed access attempts?
System
Application
Security
Setup
Which of the following is the database used by the Simple Network Management Protocol (SNMP) to store information gathered from agents distributed about the network?
Trap
Syslog
MIB
SIEM
Which of the following is the most likely cause of runt and giant frames on an Ethernet network interface?
A network adapter malfunction
Half-duplex communication
Excessive cable length
Electromagnetic interference
Which of the following is the most likely cause of Cyclic Redundancy Check (CRC) errors on an Ethernet network interface?
Half-duplex communication
A network adapter malfunction
Electromagnetic interference
Excessive cable length
Which of the following utilities can display the number of packets sent and received for a specific network interface on a Unix, Linux, MacOS or Windows computer?
Top
Ifconfig
Netstat
Nbtstat
Which of the following is a feature included in some routers that collects and analyzes network traffic data sent or received through a network interface?
Netmon
Netflow
Netstat
Nbtstat
Which of the following is not a type of error typically found in network interface statistics?
Runt
Encapsulation
Giant
CRC
Jumbo
Which of the following is not an SNMP component?
MIBs
Traps
OIDs
CRCs
Ralph is designing the HVAC implementation for his company's new central datacenter, which will house all of the equipment for the corporate headquarters and the company's manufacturing facility. The datacenter must adhere to the Tier III standard defined by the Uptime Institute, which calls for at least 99.9 percent uptime. As part of the environmental infrastructure for the datacenter, Ralph plans to install sensors to monitor environmental factors that can affect computer equipment and generate alerts when conditions exceed accepted thresholds. Which of the following environmental factors is not one of those that Ralph should arrange to monitor to protect the equipment specific to a datacenter?
Flood
Humidity
Radon
Static electricity
Temperature
Routers using link states and Dijkstra's algorithm to calculate the lowest cost route to a specific destination can conceivably be running which of the following interior gateway routing protocols? (Choose all that apply.)
OSPF
RIP
EIGRP
IS-IS
BGP
Which of the following is the term usually applied to a representation of network devices, automatically compiled, and containing information such as IP addresses and connection speeds?
Network map
Network diagram
Cable diagram
Management information base
Which of the following types of network documentation is often overlaid on an architectural drawing or blueprint?
Network map
Network diagram
Cable diagram
Management information base
Which of the following is not one of the typical heights for devices mounted in IT equipment racks?
1 unit
2 units
3 units
4 units
The cable plant for your company network was installed several years ago by an outside contractor. Now, some of the paper labels have fallen off your patch panels, and you do not know which wall plate is connected to each port. Assuming that you are working on a properly maintained and documented network installation, which of the following is the easiest way to determine which port is connected to which wall plate?
Consult the cable diagram provided by the cabling contractor at the time of the installation.
Call the cable installation contractor and see if he or she can remember which ports go with which wall plates.
Attach a tone generator to a patch panel port and then test each wall plate with a locator until you find the correct one. Repeat this for each port that needs labeling.
Use a cable certifier to locate the patch panel port associated with each wall plate port.
Which of the following IT asset management documents published by the International Organization for Standardization (ISO) defines a standard for Software Identification Tags (SWIDs) containing inventory information about the software running on a computer or other device?
ISO 19770-1
ISO 19770-2
ISO 19770-3
ISO 19770-4
ISO 19770-5
Which of the following are places where network wiring connections are found? (Choose all that apply.)
MDF
MTBF
IDF
RDP
A rack diagram is typically ruled vertically using which of the following measurements?
Inches
Centimeters
Units
Grids
In a standard Cisco network diagram, what component does the symbol in the figure represent?
A switch
A router
A hub
A gateway
Which of the following statements are true about the differences between a diagram of a patch panel installation organized physically and one that is organized logically? (Choose all that apply.)
A physical diagram is organized according to the floors and rooms where the cable drops are located.
A physical diagram is precisely scaled to represent the actual patch panel hardware.
A logical diagram is organized according to the divisions within the company, such as departments and workgroups.
A logical diagram uses an organization that represents company divisions but does not physically resemble the actual patch panels.
A diagram of a telecommunications room or Intermediate Distribution Frame (IDF) for an office building is typically based on which of the following?
A hand-drawn sketch
A series of photographs
An architect's plan
A 3D model
A site survey report
The documentation for Main Distribution Frames (MDFs) and Intermediate Distribution Frames (IDFs) should incorporate details on which of the following elements? (Choose all that apply.)
Power
Environment
Distances
Costs
At what point in the installation process should patch panel ports and wall plates be labeled?
When the patch panels and wall plates are installed
When a length of cable is cut from the spool
When the cables are attached to the connectors
When the cable runs are tested, immediately after their installation
Which of the following is the term used to describe a wiring nexus that is typically the termination point for incoming telephone and Wide Area Network (WAN) services?
MDF
MTBF
IDF
RDP
MOU
Your department is experiencing frequent delays as users wait for images to render using their outdated graphics software package. As a result, you are planning to submit a change request for a new software product at the monthly meeting of the company's change management team. Which of the following types of information are likely to be included in your request? (Choose all that apply.)
The possibility of rolling back to the previous software, if necessary
The procedure for installing and configuring the new software
An estimate of the productivity increase realizable with the new software
A list of software and hardware upgrades or modifications needed to run the new software
A rack diagram is typically ruled into vertical rack units, which are standard-sized divisions that hardware manufacturers use when manufacturing rack-mountable components. Which of the following is the standard vertical height of a single rack unit?
1.721 inches
1.75 inches
40 mm
3.5 inches
The change request for new graphics software that you submitted to your company's change management team has been approved. Now it is time to implement the change. Which of the following administrative tasks will most likely be the change management team's responsibility during the implementation process? (Choose all that apply.)
Authorizing downtime
Notifying users
Designating a maintenance window
Documenting all modifications made
Which of the following IT asset management documents published by the International Organization for Standardization (ISO) provides an overview of the ITAM concepts discussed in the ISO 19770 family of standards?
ISO 19770-1
ISO 19770-2
ISO 19770-3
ISO 19770-4
ISO 19770-5
A rack-mounted device that is four units tall will be approximately what height in inches?
1.75
3.5
4
7
Which of the following types of documentation should indicate the complete route of every internal cable run from wall plate to patch panel?
Physical network diagram
Asset management
Logical network diagram
Wiring schematic
Which of the following statements about physical network diagrams and logical network diagrams are true? (Choose all that apply.)
A physical network diagram is created automatically, and a logical network diagram is created manually.
A physical network diagram depicts hardware devices and the connections between them.
A logical network diagram contains all of the information you would need to rebuild your network from scratch.
A logical network diagram typically contains the IP addresses of network devices.
In a standard Cisco network diagram, what component does the symbol in the figure represent?
A switch
A router
A hub
A gateway
Which of the following is the term used to describe a wiring nexus—typically housed in a closet—where horizontal networks meet the backbone?
MDF
MTBF
IDF
SLA
MOU
What is the width of a standard equipment rack in a datacenter?
12 inches
16 inches
19 inches
24 inches
In a standard Cisco network diagram, what component does the symbol in the figure represent?
A switch
A router
A hub
A gateway
The precise locations of devices in a datacenter are typically documented in which of the following documents?
Rack diagram
Network map
Wiring schematic
Logical diagram
Business continuity plan
Audit and assessment report
Which of the following statements about network maps is true?
Network maps are typically drawn to scale.
Network maps typically contain more information than network diagrams.
Network maps must be read/write accessible to all personnel working on the network.
Network maps diagram only the locations of cable runs and endpoints.
Which of the following types of documentation should contain the chemical composition of all cleaning compounds used in a datacenter?
ESD
MSDS
NDA
BYOD
SOP
After being hired for a job as an IT administrator, you have been assigned two user accounts, one of which is intended for general use and the other only for administrative tasks. You are also required to sign an agreement that outlines the restrictions for your account use. Specifically, you are not permitted to use the administrative account for anything other than administrative tasks, including browsing the Internet and accessing data for which you are not authorized. Which of the following is the best name for this type of agreement?
Remote access policies
Service level agreement
Acceptable use policy
Privileged user agreement
You are working for a company with numerous branch offices scattered around the country, and you are required to travel to these offices frequently. Each branch office has some means of accessing the network at the company headquarters. Some use frame relay, some use Virtual Private Networks (VPNs), and a few even use dial-in access. During one trip, you mention to a branch office manager that you intend to connect to the headquarters network that night from your hotel room. The manager warns you that this is against company policy, but you are not so sure. Where in the company documentation should you look to confirm this?
Remote access policies
Service level agreement
Acceptable use policy
Privileged user agreement
Which of the following is a document that a company's new hires might want to consult to determine whether they are permitted to install their own personal software on company computers?
SLA
AUP
NDA
BYOD
Many employees have been contacting the IT help desk asking how they can connect their personal smartphones and tablets to the company's wireless network. This has raised issues regarding network security and technical support. You have been asked to draft a policy for the in-house use of personal electronics that addresses these issues. Which of the following describes the document that you will be creating?
SLA
AUP
NDA
BYOD
You are going to work for a new company as a software developer, and Human Resources (HR) has notified you that you must sign a document guaranteeing that you will maintain confidentiality about the company's products and programming code in perpetuity. Which of the following documents contains this agreement?
SLA
AUP
NDA
MOU
BYOD
Which of the following are typical elements of a corporate password policy? (Choose all that apply.)
Minimum password length
Use of special characters
Unique passwords
Frequent password changes
Alice is implementing a new password policy that requires all users to change their passwords every seven days. What further modification can she make to the password policy to prevent users from thwarting the password change requirement?
Specify a minimum password length
Require the use of special characters
Require the creation of unique passwords
Specify a maximum password change interval
Which of the following are settings typically included in an account lockout policy? (Choose all that apply.)
Account lockout duration
Time allowed between attempts
Account lockout threshold
Reset account lockout threshold counter
How do account lockouts help to prevent intruders from cracking passwords?
By forcing users to select passwords of a minimum length
By preventing users from entering incorrect passwords more than a specified number of times
By preventing users from reusing the same passwords
By requiring an additional authentication method, such as a fingerprint
Which of the following data loss prevention terms is used to describe dangers pertaining to data that is being transmitted over a network? (Choose all that apply.)
Data in use
Data at rest
Data in motion
Data in transit
Which of the following data loss prevention terms is used to describe dangers pertaining to data while a user is loading it into an application?
Data in use
Data at rest
Data in process
Data in motion
Which of the following data loss prevention terms is used to describe potential dangers of data loss or data leakage to unauthorized parties while the data is stored without being used?
Data in use
Data at rest
Data in motion
Data on disk
Which of the following is not one of the standard terms used in data loss prevention?
Data online
Data at rest
Data in motion
Data in use
The terms on-boarding and off-boarding are typically associated with which of the following policies?
Data loss prevention
Incident response
Inventory management
Identity management
Disaster recovery
Business continuity
The term off-boarding refers to which of the following procedures?
Removing a node from a cluster
Disconnecting all cables from a switch
Revoking a user's network privileges
Retiring old workstations
Which of the following is most likely to be the last step in a change management procedure?
Documentation
Notification
Approval
Scheduling
Which of the following U.S. organizations are capable of imposing international export controls on software products? (Choose all that apply.)
The company that created the software
Department of State
Department of Commerce
Department of the Treasury
Which of the following is the primary result of an organization's security incident response policies?
To know how to respond to a particular incident
To prevent an incident from occurring again
To identify the cause of an incident
To document the procedures leading up to an incident
You are an IT director, and a fire has broken out in the lower floors of your company's office building. After the personnel are evacuated, the fire department asks you where they can find documentation about all chemicals and equipment used in the company's datacenter, which is threatened by the fire. You direct them to the correct filing cabinet in your office, which contains which of the following document types?
ESD
NDA
BYOD
MSDS
You have been asked to draft an Acceptable Use Policy (AUP) for new hires at your company to sign, which specifies what they can and cannot do when working with the company's computers and network. Which of the following is not one of the provisions typically found in this type of document?
Privacy
Ownership
Illegal use
Upgrades
You are starting a new job, and the company's Human Resources (HR) department has asked you to sign an Acceptable Use Policy (AUP) regarding computer and network use. The document includes a privacy clause. Which of the following are specifications you can expect to find in this clause? (Choose all that apply.)
Any emails you send or receive can be monitored by the company at any time.
All files and data that you store on company computers must be accessible to the company for scanning and monitoring.
All work that you perform for the company becomes the sole property of the company, including copyrights and patents.
All hardware, software, and any proprietary data stored on the company's computers remains the property of the company.
Which of the following tasks is not considered to be part of an IT department's incident response plan?
Stopping an ongoing incident
Containing the damage caused by an incident
Repairing the damage caused by an incident
Rebuilding an infrastructure destroyed by an incident
Which of the following are occurrences that are typically addressed by an IT department's incident response policies? (Choose all that apply.)
Denial-of-Service (DoS) attack
Hard disk failure
Electrical fire
Server outage
Which of the following terms would apply to the procedure of adding a user's personal smartphone to the network under a Bring Your Own Device (BYOD) policy?
Out-of-band
On-boarding
In-band
Off-boarding
Your company has been acquired by another firm and, as IT director, you will have to comply with the new firm's safety policies in your datacenter and other IT workspaces. One of the new requirements states that there must be a fail closed policy for the datacenter. Which of the following best describes what this policy dictates should occur in the event of an emergency?
All computers that are logged on should automatically log off.
All computers that are running should automatically shut down.
All doors that are normally open should lock themselves.
All doors that are normally locked should open themselves.
You are the first responder to an incident of computer crime at your company. The datacenter's security has been penetrated, a server accessed, and sensitive company data stolen. The company's incident response plan lists the specific tasks that you are responsible for performing. Which of the following are likely to be among those tasks? (Choose all that apply.)
Turn off the server.
Secure the area.
Document the scene.
Collect evidence.
Cooperate with the authorities.
Password policies frequently require users to specify complex passwords. Which of the following are characteristic of a complex password?
Passwords that contain mixed upper- and lowercase letters, numbers, and symbols
Passwords that exceed a specific length
Passwords that do not duplicate a specific number of the user's previous passwords
Passwords that do not duplicate the user's account name, birth date, or other personal information
Password policies that contain a history requirement typically have which of the following limitations?
Users cannot reuse recent passwords.
Users cannot create passwords containing names of relatives.
Users cannot create passwords containing names of historical figures.
Users cannot create passwords that duplicate those of any other users on the network.
Account lockout policies are designed to protect against which of the following types of attacks?
Social engineering
Spoofing
Brute force
Man in the middle
Which of the following types of password policies are designed to prevent brute-force attacks? (Choose all that apply.)
Password length policies
Account lockout policies
Password history policies
Complex password policies
Which of the following is not likely to be a procedural element of an IT asset disposal policy?
Data deletion
Recycling
Data preservation
Inventory
While negotiating a new contract with a service provider, you have reached a disagreement over the contracted reliability of the service. The provider is willing to guarantee that the service will be available 99 percent of the time, but you have been told to require 99.9 percent. When you finally reach an agreement, the negotiated language will be included in which of the following documents?
SLA
AUP
NDA
BYOD
Which of the following elements would you typically not expect to find in a Service Level Agreement (SLA) between an Internet Service Provider (ISP) and a subscriber?
A definition of the services to be provided by the ISP
A list of specifications for the equipment to be provided by the ISP
The types and schedule for the technical support to be provided by the ISP
The types of applications that the subscriber will use when accessing the ISP's services
You have just completed negotiating an annual contract with a provider to furnish your company with cloud services. As part of the contract, the provider has agreed to guarantee that the services will be available 99.9 percent of the time, around the clock, seven days per week. If the services are unavailable more than 0.1 percent of the time, your company is due a price adjustment. Which of the following terms describes this clause of the contract?
SLA
MTBF
AUP
MTTR
The technical support clause of a Service Level Agreement (SLA) will typically include which of the following elements? (Choose all that apply.)
Whether the provider will provide on-site, telephone, or online support
The time service for responses to support calls, which specifies how quickly the provider must respond to requests for support.
The percentage of time that the service is guaranteed to be available
The amount of support that will be provided and the costs for additional support
After switching from a standard public switched telephone network (PSTN) telephone system to a Voice over Internet Protocol (VoIP) system, users are complaining of service interruptions and problems hearing callers at certain times of the day. After examining a network traffic audit and assessment report, you determine that traffic levels on the Internet connection are substantially higher during the first and last hours of the day, the same times when most of the users experienced problems. Which of the following solutions can provide more reliable VoIP service during peak usage times?
Implement traffic shaping
Implement load balancing
Upgrade the Local Area Network (LAN) from Fast Ethernet to Gigabit Ethernet
Replace the router connecting the LAN to the Internet with a model that supports Simple Network Management Protocol (SNMP).
A server with dual power supplies must be running in which of the following modes for the system to be fault tolerant?
Combined mode
Redundant mode
Individual mode
Hot backup mode
Redundant power circuits can enable a server to continue running in spite of which of the following events?
A citywide power outage
A server power supply failure
An uncorrected building circuit failure
A failure of the server's Uninterruptable Power Supply (UPS)
Which of the following media types is Windows Server Backup unable to use to store backed-up data?
Local hard disks
Local optical disks
Magnetic tape drives
Remote shared folders
Which of the following Redundant Array of Independent Disks (RAID) levels provides fault tolerance by storing parity information on the disks, in addition to the data? (Choose all that apply.)
RAID 0
RAID 1
RAID 5
RAID 10
Installing an electrical generator for your datacenter is an example of which of the following fault tolerance concepts?
Uninterruptible Power Supply (UPS)
Power redundancy
Dual power supplies
Redundant circuits
Which of the following RAID levels uses disk striping with distributed parity?
RAID 0
RAID 1
RAID 5
RAID 10
Which of the following is not a fault tolerance mechanism?
Port aggregation
Clustering
MTBF
UPS
Which of the following is not a type of server load balancing mechanism?
DNS round-robin
Network Address Translation
Content switching
Multilayer switching
Which of the following mechanisms for load balancing web servers is able to read the incoming HTTP and HTTPS requests and perform advanced functions based on the information they contain?
Content switches
Multilayer switches
Failover clustering
DNS round-robin
Which of the following statements about the differences between online and standby Uninterruptible Power Supplies (UPSs) are correct? (Choose all that apply.)
A standby UPS runs devices using battery power all the time.
An online UPS provides no gap in the power supplied to the devices during a main power failure.
An online UPS switches devices to battery power only during a main power failure.
A standby UPS provides only enough power for an orderly shutdown of the devices.
Which of the following are valid reasons why online Uninterruptible Power Supplies (UPSs) are more expensive than standby UPSs?
Online UPSs enable devices to run longer when a main power failure occurs.
Online UPSs enable devices to run continuously when a main power failure occurs.
Online UPSs are managed devices that can generate alerts.
Online UPSs provide greater protection against power spikes and sags.
Which of the following are equivalent terms for the process of combining the bandwidth of two or more network adapters to increase the overall speed of the connection and provide fault tolerance? (Choose all that apply.)
Bonding
Link aggregation
Clustering
Port aggregation
NIC teaming
A network load balancing cluster is made up of multiple computers that function as a single entity. Which of the following terms is used to describe an individual computer in a load balancing cluster?
Node
Host
Server
Box
Which of the following is an element of high availability systems that enables them to automatically detect problems and react to them?
Backups
Snapshots
Failover
Cold sites
Which of the following RAID levels does not provide fault tolerance?
RAID 0
RAID 1
RAID 5
RAID 10
Which of the following networking concepts frequently use virtual Internet Protocol (IP) addresses to provide high availability? (Choose all that apply.)
Clustering
Load balancing
Network Address Translation (NAT)
Network Interface Card (NIC) teaming
Which of the following disaster recovery mechanisms can be made operational in the least amount of time?
A cold site
A warm site
A hot site
All of the options are the same.
Which of the following datacenter disaster recovery mechanisms is the least expensive to implement?
A cold site
A warm site
A hot site
A cloud site
Which of the following terms defines how long it will take to restore a server from backups if a complete system failure occurs?
RPO
RTO
BCP
MIB
In a disaster recovery scenario, which of the following terms applies to devices that are not repairable?
MTBF
MTTF
MTTR
MDT
If you have a server with dual power supplies, both of which are connected to a single Uninterruptible Power Supply (UPS), with a building power circuit connected to a backup generator, which of the following failures can the server survive and keep running indefinitely? (Choose all that apply.)
Failure of one server power supply
Failure of the UPS
Failure of the building power circuit
Failure of the building backup generator
Which of the following is the primary function of an Uninterruptible Power Supply (UPS) during a two-hour building power failure.
To keep servers running until building power is restored
To keep servers running until they can be powered down safely
To keep servers from being damaged by power spikes
To keep servers running in the event of a computer power supply failure
If you have a server with dual power supplies, one of which is plugged into a single Uninterruptible Power Supply (UPS) and the other into a wall socket with a surge protector, and the building's power circuit is connected to a backup generator, which of the following failures can the server survive and keep running indefinitely? (Choose all that apply.)
Failure of one server power supply
Failure of the UPS
Failure of the building power circuit
Failure of the building backup generator
If you have a server with dual power supplies, each of which is connected to a separate Uninterruptible Power Supply (UPS), with each UPS connected to a separate building power circuit connected to a backup generator, which of the following failures can the server survive and keep running indefinitely? (Choose all that apply.)
Failure of one server power supply
Failure of one UPS
Failure of one building power circuit
Failure of the building backup generator
Which of the following is the criterion most commonly used to filter files for backup jobs?
Filename
File extension
File attributes
File size
Which of the following disaster recovery mechanisms is the least expensive to implement?
A cold site
A warm site
A hot site
All of the options cost the same.
Which of the following statements about port aggregation is not true?
All of the aggregated ports use the same MAC address.
Port aggregation can be a fault tolerance mechanism.
Aggregating ports increases network throughput.
Port aggregation provides load balancing
Which of the following can be provided by clustering servers?
Fault tolerance
Load balancing
Failover
All of the above
When you configure NIC teaming on a server with two network adapters in an active/passive configuration, which of the following services is provided?
Load balancing
Fault tolerance
Server clustering
Traffic shaping
Which of the following is not a load balancing mechanism?
NIC teaming
Server clustering
DNS round-robin
RAID 1
Which of the following best describes the difference between cold, warm, and hot backup sites?
Whether the backup site is owned, borrowed, or rented
The age of the most recent backup stored at the site
The cost of the hardware used at the site
The time needed to get the site up and running
Which of the following specifications would you most want to examine when comparing hard disk models for your new Redundant Array of Independent Disks (RAID) array?
MTBF
SLA
AUP
MTTR
Which of the following RAID levels provides fault tolerance with the smallest amount of usable disk space? (Choose all that apply.)
RAID 0
RAID 1
RAID 5
RAID 10
Disk mirroring and disk duplexing are both fault tolerance mechanisms for hard disk data storage. Which of the following statements about disk mirroring and disk duplexing is true?
Disk mirroring enables a server to survive the failure of a disk drive.
Disk duplexing enables a server to survive the failure of a disk controller.
Disk mirroring enables a server to survive a failure of a disk drive or a disk controller.
Disk duplexing enables a server to survive a failure of a disk drive or a disk controller.
You are installing a new Windows server with two hard disk drives in it, and you want to use RAID to create a fault-tolerant storage system. Which of the following RAID levels can you configure the server to use?
RAID 0
RAID 1
RAID 5
RAID 10
Which of the following RAID levels provide fault tolerance without using parity data? (Choose all that apply.)
RAID 0
RAID 1
RAID 5
RAID 10
Which of the following backup job types does not reset the archive bits of the files it backs up?
Full
Incremental
Differential
Supplemental
What are the three elements in the Grandfather-Father-Son media rotation system for network backups?
Hard disk drives, optical drives, and magnetic tape drives
Incremental, differential, and full backup jobs
Monthly, weekly, and daily backup jobs
QIC, DAT, and DLT tape drives
Which of the following types of backup jobs are supported by the Windows Server Backup program? (Choose all that apply.)
Incremental
Differential
Full
Supplemental
Which of the following is a term for a read-only copy of a data set made at a specific moment in time?
Snapshot
Incremental
Hot site
Differential
Which of the following storage techniques prevents version skew from occurring during a system backup?
Incrementals
Differentials
Iterations
Snapshots
If you back up your network by performing a full backup every Wednesday at 6:00 p.m. and incremental backups in the evening of the other days of the week, how many jobs would be needed to completely restore a computer with a hard drive that failed on a Monday at noon?
One
Two
Five
Six
How does an autochanger increase the overall storage capacity of a backup solution?
By compressing data before it is stored on the medium
By automatically inserting media into and removing it from a drive
By running a tape drive at half its normal speed
By writing two tracks at once onto a magnetic tape
For a complete restore of a computer that failed at noon on Tuesday, how many jobs would be needed if you performed full backups to tape at 6:00 a.m. every Wednesday and Saturday and incremental backups to tape at 6:00 a.m. every other day?
One
Two
Three
Four
If you back up your network by performing a full backup every Wednesday at 6:00 p.m. and differential backups in the evening on the other six days of the week, how many jobs would be needed to completely restore a computer with a hard drive that failed on a Tuesday at noon?
One
Two
Six
Seven
Why does performing incremental backups to a hard drive, rather than a tape drive, make it possible to restore a server with a single job, rather than multiple jobs?
Because hard drives hold more data than tape drives
Because hard drives can transfer data faster than tape drives
Because hard drives are random access devices and tape drives are not
Because hard drives use a different block size than tape drives
Which of the following is not a fault tolerance mechanism?
UPS
RAID 1
SNMP
Clustering
Which of the following is the primary difference between the Power Distribution Units (PDUs) used in datacenters and the standard power strips used in offices and homes?
More outlets
Larger power input
Larger power output
All of the above
Which of the following statements about backing up a firewall's state and backing up its configuration are true? (Choose all that apply.)
A backup of a firewall's state contains more data than a backup of its configuration.
A backup of a firewall's configuration contains more data than a backup of its state.
A backup of a firewall's state contains the exact same data as a backup of its configuration.
A backup of a firewall's state includes its configuration.
A backup of a firewall's configuration includes its state.
Which of the following is the most commonly recommended fire suppression system for a datacenter?
Carbon Dioxide
Water
Foam
HFC-125
Concurrent multipath routing (CMR) is a technique that provides which of the following benefits? (Choose all that apply.)
Increased bandwidth
Fault tolerance
Data encapsulation
Load balancing
A First Hop Redundancy Protocol (FHRP) is designed to dynamically alter which one of the following Internet Protocol (IP) configuration settings on a network host?
IP address
Subnet mask
Default gateway
DNS server address
Which of the following is not a First Hop Redundancy Protocol (FHRP)?
CARP
VRRP
HSRP
RARP
Ralph is designing a new network with the redundant switching arrangement shown in the accompanying figure. This redundancy enables every node on the network to communicate with any other node, even if one of the switches should fail. Which of the following is a potential drawback of this arrangement?
Runt frames
Late collisions
Broadcast storms
Corrupted switch lookup tables
Installing redundant firewalls in a parallel configuration, as shown in the accompanying graphic, provides which of the following benefits? (Choose all that apply.)
Load balancing
Fault tolerance
Added security
Enhanced performance
Redundant servers running in an active-active configuration provide which of the following advantages that the same servers in an active-passive configuration do not? (Choose all that apply.)
Increased performance
Fault tolerance
Data encapsulation
Load balancing
To build a network with redundant Internet connections that ensures full fault tolerance, it is necessary to use which of the following?