Deck 8: Managing a Local Area Network
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 8: Managing a Local Area Network
1
A voltgague is a tool that measures the characteristics of an electric current.
False
2
Using additional redundant hardware is known as fault intolerance.
False
3
A protocol analyzer can operate in stealth mode, meaning that instead of ignoring packets intended for other devices, as is the usual case, the analyzer captures all packets that flow across the network.
False
4
A central processing unit (CPU) that consistently runs at 90 percent capacity or higher would indicate that the server is overloaded.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
All hardware and software vendors must support all levels of RAID.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
An uninterruptible power supply also serves as a power conditioner , which keeps intense spikes of electrical current, common during thunderstorms, from reaching the server.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
Each is a common level of RAID except _____.
A) RAID 0
B) RAID 1
C) RAID 5
D) RAID 1000
A) RAID 0
B) RAID 1
C) RAID 5
D) RAID 1000
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
The Simple Network Management Protocol (SNMP) is part of the TCP/IP protocol suite that allows computers and network equipment to gather data about network performance.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
The RAID level that uses multiple drives but is not fault-tolerant is _____.
A) RAID 1
B) RAID 0
C) RAID 53
D) RAID 103
A) RAID 1
B) RAID 0
C) RAID 53
D) RAID 103
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
The technology that does not protect against a disk control work card failure is _____.
A) disk duplexing
B) RAID
C) disk mirroring
D) ECC
A) disk duplexing
B) RAID
C) disk mirroring
D) ECC
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
A time domain reflectometer (TDR) is a sophisticated device that sends a signal down a cable and then records the return of the signal.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Parity error checking is less efficient than error correction code (ECC).
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Each is a preventive measure that can be taken to make a server as stable as possible except _____.
A) perform timely backups
B) provide constant electrical power
C) use passwords
D) protect from viruses
A) perform timely backups
B) provide constant electrical power
C) use passwords
D) protect from viruses
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
RAID 0 striping partitions the storage space of each hard drive into smaller sections known as _____.
A) stripes
B) segments
C) sectors
D) tracks
A) stripes
B) segments
C) sectors
D) tracks
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Retrieving a page from a paging file on a hard drive is called a soft page fault.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
Most businesses create two sets of backup tapes.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
A soft page fault occurs when the page was moved to another area of RAM and then must be retrieved back into the area of RAM used for processing.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
When a defective network interface card (NIC) will not stop sending network signals, this is known as "jabbering."
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Managing a local area network involves taking the necessary proactive steps to try to prevent problems as well as constantly monitoring the network for any symptoms that may indicate a problem.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
Anytime the contents of a file are changed, the archive bit is set, meaning this modified file now needs to be backed up.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Each RAID level is supported today by hardware and software vendors except _____.
A) RAID 0
B) RAID 1
C) RAID 2
D) RAID 5
A) RAID 0
B) RAID 1
C) RAID 2
D) RAID 5
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Disk ____________________ has separate disk controller cards for each hard drive.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
The RAID level that uses error correction code (ECC) is _____.
A) RAID 0
B) RAID 1
C) RAID 2
D) RAID 3
A) RAID 0
B) RAID 1
C) RAID 2
D) RAID 3
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Disk ____________________ involves having multiple drives in the file server that are all connected to the same disk controller card.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
_____ divides the parity data across all drives instead of using a separate drive to hold the parity error-checking information.
A) RAID 1
B) RAID 5
C) RAID 50
D) RAID 55
A) RAID 1
B) RAID 5
C) RAID 50
D) RAID 55
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Each network problem can be identified by network monitors except _____.
A) late collisions
B) user logins
C) jabber
D) negative frame sequence checks
A) late collisions
B) user logins
C) jabber
D) negative frame sequence checks
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Server random access memory (RAM) is divided into _____.
A) paging files
B) page faults
C) page frames
D) soft page faults
A) paging files
B) page faults
C) page frames
D) soft page faults
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Backup software can internally designate which files have already been backed up by setting a(n) _____ bit in the properties of the file.
A) archive
B) backup
C) restore
D) directory
A) archive
B) backup
C) restore
D) directory
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
When using Simple Network Management Protocol (SNMP), _____ are loaded onto each network device that will be managed.
A) management information bases (MIB)
B) management stations
C) SNMP triggers
D) software agents
A) management information bases (MIB)
B) management stations
C) SNMP triggers
D) software agents
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
The main carrier of computer viruses today is _____.
A) floppy diskettes
B) Internet
C) spreadsheets
D) e-mail
A) floppy diskettes
B) Internet
C) spreadsheets
D) e-mail
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
Each is an important step to reduce the risk of virus infection except _____.
A) constantly update new virus definition files
B) be suspicious of all e-mail attachments
C) keep current backup copies of all important data
D) run virus scan once per moth
A) constantly update new virus definition files
B) be suspicious of all e-mail attachments
C) keep current backup copies of all important data
D) run virus scan once per moth
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
A _____ virus changes its appearance each time it replicates, making it especially difficult to detect.
A) stealth
B) trojan
C) polymorphic
D) macro
A) stealth
B) trojan
C) polymorphic
D) macro
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
Each is an optical disc technology except _____.
A) CD-R
B) DVD-R
C) DVD+RW
D) DVD+CRW
A) CD-R
B) DVD-R
C) DVD+RW
D) DVD+CRW
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Because the ____________________ plays such an important role in a LAN, managing it is one of the most important jobs for a network manager.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
A stripe can be as small as ____________________ or as large as several megabytes.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Fault-tolerant server hard drives are based on the standard known as ________________________________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
An uninterruptible power supply (UPS) performs each task except _____.
A) power conditioning
B) surge protection
C) reboot server
D) disconnect users and shut down server
A) power conditioning
B) surge protection
C) reboot server
D) disconnect users and shut down server
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Each is one of the basic types of backups except _____.
A) monthly backup
B) full backup
C) differential backup
D) incremental backup
A) monthly backup
B) full backup
C) differential backup
D) incremental backup
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
If the total amount of free hard disk space on a file server is less than _____ percent, then additional space should be found.
A) 90
B) 75
C) 50
D) 20
A) 90
B) 75
C) 50
D) 20
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Multiple hardware RAID arrays can be combined into a singel array group known as _____.
A) MultiRAID
B) RAID Group 250
C) dual-level RAID
D) RAID consolidation
A) MultiRAID
B) RAID Group 250
C) dual-level RAID
D) RAID consolidation
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Tell how an archive bit is used in making backups.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
A(n) _________________________ is a computer program that instructs a computer to perform an operation without the user's knowledge or consent.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Explain the difference between disk mirroring and disk duplexing that is used in RAID level 1.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
RAID 5 parity data is always stored on a(n) ____________________ drive.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Explain how a file server manages random access memory (RAM) through paging.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Tell the difference between a macro virus, a polymorphic virus, and a stealth virus.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
A(n) ______________________________ is an external device located between the outlet for electrical power and the server whose primary purpose is to continue to supply power to the server in the event of an electrical power failure.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Explain how Simple Network Management Protocol (SNMP) works.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Multiple hardware RAID arrays that are combined into a single array group are known as _________________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Many network managers perform a full backup once a week and a(n) ____________________ backup once a day.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck