Exam 11: Network Performance and Recovery
Exam 1: Introduction to Networking50 Questions
Exam 2: Network Infrastructure and Documentation50 Questions
Exam 3: Addressing on Networks50 Questions
Exam 4: Network Protocols and Routing50 Questions
Exam 5: Network Cabling50 Questions
Exam 6: Wireless Networking50 Questions
Exam 7: Virtualization and Cloud Computing50 Questions
Exam 8: Subnets and VLANs50 Questions
Exam 9: Network Risk Management50 Questions
Exam 10: Security in Network Design50 Questions
Exam 11: Network Performance and Recovery50 Questions
Exam 12: Wide Area Networks50 Questions
Select questions type
Wireshark or any other monitoring software running on a single computer connected to a switch doesn't see all the traffic on a network, but only the traffic the switch sends to it, which includes broadcast traffic and traffic specifically addressed to the computer.
Free
(True/False)
4.8/5
(34)
Correct Answer:
True
In response to an incident, how should chain of custody of evidence be handled?
Free
(Essay)
4.7/5
(31)
Correct Answer:
All collected data must be carefully processed and tracked so it does not leave official hands at any point in the forensics process. Typically, documentation used to track chain of custody describes exactly what the evidence is, when it was collected, who collected it, its condition, and how it was secured. If at any point in the process you have custody of evidence, be sure to sign off on a chain of custody document, and obtain a signature from the next person in line when you hand over custody of the evidence.
You are attempting to determine how available your Linux systems are, and need to find the current system uptime. What command should you use?
Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
A
If you wish to maintain a "4 nines" availability rating, what is the maximum amount of down time you can have per day?
(Multiple Choice)
4.7/5
(37)
The Link Aggregation Control Protocol was initially defined by what IEEE standard?
(Multiple Choice)
4.8/5
(32)
Packets that are smaller than a medium's minimum packet size are known by what term below?
(Multiple Choice)
4.8/5
(36)
The SNMP version 3 protocol introduces authentication, validation, and encryption for messages exchanged between devices and the network management console.
(True/False)
4.8/5
(38)
Once a device has failed, what metric measures the average amount of time to repair?
(Multiple Choice)
4.9/5
(36)
Most UNIX and Linux desktop operating systems provide a GUI application for easily viewing and filtering the information in system logs.
(True/False)
4.9/5
(31)
The Link Aggregation Control Protocol (LACP) can be configured in what three different ways?
(Essay)
5.0/5
(29)
In preparing and planning for disaster recovery, what is the difference between an incident and a disaster?
(Essay)
4.9/5
(38)
Sections of a disaster recovery plan related to computer systems should include what information?
(Essay)
4.8/5
(31)
What statement regarding the use of a network attached storage device is accurate?
(Multiple Choice)
4.9/5
(40)
When viewing a syslog message, what does a level of 0 indicate?
(Multiple Choice)
4.8/5
(33)
How does a line conditioning UPS protect network equipment?
(Multiple Choice)
4.8/5
(34)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)