Exam 11: Network Performance and Recovery

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Wireshark or any other monitoring software running on a single computer connected to a switch doesn't see all the traffic on a network, but only the traffic the switch sends to it, which includes broadcast traffic and traffic specifically addressed to the computer.

Free
(True/False)
4.8/5
(34)
Correct Answer:
Verified

True

In response to an incident, how should chain of custody of evidence be handled?

Free
(Essay)
4.7/5
(31)
Correct Answer:
Verified

All collected data must be carefully processed and tracked so it does not leave official hands at any point in the forensics process. Typically, documentation used to track chain of custody describes exactly what the evidence is, when it was collected, who collected it, its condition, and how it was secured. If at any point in the process you have custody of evidence, be sure to sign off on a chain of custody document, and obtain a signature from the next person in line when you hand over custody of the evidence.

You are attempting to determine how available your Linux systems are, and need to find the current system uptime. What command should you use?

Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
Verified

A

If you wish to maintain a "4 nines" availability rating, what is the maximum amount of down time you can have per day?

(Multiple Choice)
4.7/5
(37)

The Link Aggregation Control Protocol was initially defined by what IEEE standard?

(Multiple Choice)
4.8/5
(32)

A differential backup covers what data on a system?

(Multiple Choice)
4.8/5
(36)

Packets that are smaller than a medium's minimum packet size are known by what term below?

(Multiple Choice)
4.8/5
(36)

What makes up the first 6 bits of the 8-bit DiffServ field?

(Multiple Choice)
4.8/5
(39)

What is distributed switching?

(Multiple Choice)
4.8/5
(28)

The SNMP version 3 protocol introduces authentication, validation, and encryption for messages exchanged between devices and the network management console.

(True/False)
4.8/5
(38)

What happens when an NMS uses the SNMP walk command?

(Multiple Choice)
4.8/5
(43)

Once a device has failed, what metric measures the average amount of time to repair?

(Multiple Choice)
4.9/5
(36)

Most UNIX and Linux desktop operating systems provide a GUI application for easily viewing and filtering the information in system logs.

(True/False)
4.9/5
(31)

The Link Aggregation Control Protocol (LACP) can be configured in what three different ways?

(Essay)
5.0/5
(29)

In preparing and planning for disaster recovery, what is the difference between an incident and a disaster?

(Essay)
4.9/5
(38)

The creation of a response team should include what team roles?

(Essay)
4.9/5
(33)

Sections of a disaster recovery plan related to computer systems should include what information?

(Essay)
4.8/5
(31)

What statement regarding the use of a network attached storage device is accurate?

(Multiple Choice)
4.9/5
(40)

When viewing a syslog message, what does a level of 0 indicate?

(Multiple Choice)
4.8/5
(33)

How does a line conditioning UPS protect network equipment?

(Multiple Choice)
4.8/5
(34)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)