Deck 15: Network Management

Full screen (f)
exit full mode
Question
A(n) ____ is a graphical representation of a network's devices and connections.

A) Multi Router Traffic Grapher
B) network diagram
C) wiring schematic
D) event viewer
Use Space or
up arrow
down arrow
to flip the card.
Question
For a cabling upgrade, the best way to ensure that future upgrades go smoothly is to carefully document the existing cable after making any upgrades.
Question
The most common type of caching is ____ caching.

A) online
B) Web
C) Internet
D) device
Question
____ management refers to the detection and signaling of device, link, or component faults.

A) Performance
B) Fault
C) Network
D) Configuration
Question
____ involves manipulating certain characteristics of packets, data streams, or connections to manage the type and amount of traffic traversing a network or interface at any moment.

A) Traffic monitoring
B) Traffic routing
C) Traffic polling
D) Traffic shaping
Question
A ____ is a major change to a software package's existing code.

A) revision
B) change
C) patch
D) software upgrade
Question
A key component in managing networks is identifying and tracking its hardware and software through ____ management.

A) performance
B) change
C) configuration
D) asset
Question
The process where one network management console collects data from multiple networked devices at regular intervals is known as ____.

A) base lining
B) interrogating
C) polling
D) pushing
Question
____ management refers to monitoring how well links and devices are keeping up with the demands placed on them.

A) Performance
B) Fault
C) Network
D) Configuration
Question
A network management agent is a ____ that collects information about a device's operation and provides it to the network management application.

A) software routine
B) hardware device
C) GUI
D) probe
Question
The more data you gather while establishing your network's baseline, the less accurate your prediction will be.
Question
____ upgrades typically overwrite some system files on the workstation, so their installation may affect other applications adversely.

A) Principle
B) Application
C) Patch
D) Full
Question
____ management is the collection, storage, and assessment of information related to the versions of software installed on every network device and every device's hardware configuration.

A) Change
B) Performance
C) Asset
D) Configuration
Question
A ____ is a network device devoted to storage and delivery of frequently requested files.

A) cache engine
B) Web site host
C) server
D) database host
Question
Documenting and capturing an accurate picture of a network's physical and logical elements are initial steps in understanding the network.
Question
A patch is a replacement for an entire software package.
Question
____ is the local storage of frequently needed files that would otherwise be obtained from an external source.

A) Swapping
B) Paging
C) Caching
D) Segmentation
Question
A(n) ____ is a graphical representation of a network's wired infrastructure.

A) Multi Router Traffic Grapher
B) network diagram
C) wiring schematic
D) event viewer
Question
A ____ is a correction, improvement, or enhancement to a software application.

A) revision
B) change
C) patch
D) software upgrade
Question
The first step in configuration management is to take an inventory of each node on the network.
Question
Because backbone upgrades are expensive and time consuming, the first step in approaching such a project is to ____ it.

A) research
B) justify
C) plan
D) document
Question
Explain the purpose of a patch.
Question
The most comprehensive and complex upgrade involving network hardware is a ____ upgrade.

A) cabling
B) printer
C) NOS
D) backbone
Question
A(n) ____________________ is a report of the network's current state of operation.
Question
Describe the preparation and implementation requirements when upgrading a network printer.
Question
____________________ refers to the assessment, monitoring, and maintenance of all aspects of a network.
Question
List six characteristics software running on network devices may use to prioritize traffic.
Question
Explain how a network management application can present an administrator with results after data is collected.
Question
Explain how to gather baseline data on a network.
Question
Explain how asset management simplifies maintaining and upgrading the network.
Question
The most critical type of software upgrade you will perform is an upgrade to your ____.

A) database
B) application
C) NOS
D) backbone
Question
Describe how to select an asset management tool.
Question
Describe the purpose of baseline measurements.
Question
____________________ holds down costs because the ISP doesn't have to plan for every client using all the throughput he could at all times
Question
A networked ____ is perhaps the simplest device to add.

A) workstation
B) hub
C) printer
D) server
Question
On Windows-based computers an event log and can be easily viewed with the GUI ____________________ application.
Question
Above all, keep ____ in mind when you upgrade or install hardware on a network.

A) user inconvenience
B) time
C) costs
D) safety
Question
The process of reverting to a previous version of software after attempting to upgrade it is known as ____.

A) backleveling
B) reverse engineering
C) downgrading
D) change back
Question
The definition of managed devices and their data are collected in a(n) ____________________.
Question
Explain how to provide a way to reverse the hardware upgrade and reinstall the old hardware when necessary.
Question
Describe the preparation and implementation requirements when upgrading a hub or access point.
Question
Match between columns
Requires telecommunications carriers and equipment manufacturers to provide for surveillance capabilities.
SNMP
Requires telecommunications carriers and equipment manufacturers to provide for surveillance capabilities.
system log
Requires telecommunications carriers and equipment manufacturers to provide for surveillance capabilities.
agent
Requires telecommunications carriers and equipment manufacturers to provide for surveillance capabilities.
syslog function
Requires telecommunications carriers and equipment manufacturers to provide for surveillance capabilities.
event log
Requires telecommunications carriers and equipment manufacturers to provide for surveillance capabilities.
RFP
Requires telecommunications carriers and equipment manufacturers to provide for surveillance capabilities.
CALEA
Requires telecommunications carriers and equipment manufacturers to provide for surveillance capabilities.
NOS
Requires telecommunications carriers and equipment manufacturers to provide for surveillance capabilities.
HIPAA
Collects information about a device's operation but does not demand significant process resources.
SNMP
Collects information about a device's operation but does not demand significant process resources.
system log
Collects information about a device's operation but does not demand significant process resources.
agent
Collects information about a device's operation but does not demand significant process resources.
syslog function
Collects information about a device's operation but does not demand significant process resources.
event log
Collects information about a device's operation but does not demand significant process resources.
RFP
Collects information about a device's operation but does not demand significant process resources.
CALEA
Collects information about a device's operation but does not demand significant process resources.
NOS
Collects information about a device's operation but does not demand significant process resources.
HIPAA
Addresses the security and privacy of medical records.
SNMP
Addresses the security and privacy of medical records.
system log
Addresses the security and privacy of medical records.
agent
Addresses the security and privacy of medical records.
syslog function
Addresses the security and privacy of medical records.
event log
Addresses the security and privacy of medical records.
RFP
Addresses the security and privacy of medical records.
CALEA
Addresses the security and privacy of medical records.
NOS
Addresses the security and privacy of medical records.
HIPAA
Stores results from devices monitoring conditions in Windows-based networks.
SNMP
Stores results from devices monitoring conditions in Windows-based networks.
system log
Stores results from devices monitoring conditions in Windows-based networks.
agent
Stores results from devices monitoring conditions in Windows-based networks.
syslog function
Stores results from devices monitoring conditions in Windows-based networks.
event log
Stores results from devices monitoring conditions in Windows-based networks.
RFP
Stores results from devices monitoring conditions in Windows-based networks.
CALEA
Stores results from devices monitoring conditions in Windows-based networks.
NOS
Stores results from devices monitoring conditions in Windows-based networks.
HIPAA
Part of the TCP/IP suite of protocols and typically runs over UDP on port 161.
SNMP
Part of the TCP/IP suite of protocols and typically runs over UDP on port 161.
system log
Part of the TCP/IP suite of protocols and typically runs over UDP on port 161.
agent
Part of the TCP/IP suite of protocols and typically runs over UDP on port 161.
syslog function
Part of the TCP/IP suite of protocols and typically runs over UDP on port 161.
event log
Part of the TCP/IP suite of protocols and typically runs over UDP on port 161.
RFP
Part of the TCP/IP suite of protocols and typically runs over UDP on port 161.
CALEA
Part of the TCP/IP suite of protocols and typically runs over UDP on port 161.
NOS
Part of the TCP/IP suite of protocols and typically runs over UDP on port 161.
HIPAA
Stores results from devices monitoring conditions in UNIX or Linux-based networks.
SNMP
Stores results from devices monitoring conditions in UNIX or Linux-based networks.
system log
Stores results from devices monitoring conditions in UNIX or Linux-based networks.
agent
Stores results from devices monitoring conditions in UNIX or Linux-based networks.
syslog function
Stores results from devices monitoring conditions in UNIX or Linux-based networks.
event log
Stores results from devices monitoring conditions in UNIX or Linux-based networks.
RFP
Stores results from devices monitoring conditions in UNIX or Linux-based networks.
CALEA
Stores results from devices monitoring conditions in UNIX or Linux-based networks.
NOS
Stores results from devices monitoring conditions in UNIX or Linux-based networks.
HIPAA
Specifies what work a contractor should do.
SNMP
Specifies what work a contractor should do.
system log
Specifies what work a contractor should do.
agent
Specifies what work a contractor should do.
syslog function
Specifies what work a contractor should do.
event log
Specifies what work a contractor should do.
RFP
Specifies what work a contractor should do.
CALEA
Specifies what work a contractor should do.
NOS
Specifies what work a contractor should do.
HIPAA
Usually involves significant, potentially drastic, changes to the way your servers and clients operate.
SNMP
Usually involves significant, potentially drastic, changes to the way your servers and clients operate.
system log
Usually involves significant, potentially drastic, changes to the way your servers and clients operate.
agent
Usually involves significant, potentially drastic, changes to the way your servers and clients operate.
syslog function
Usually involves significant, potentially drastic, changes to the way your servers and clients operate.
event log
Usually involves significant, potentially drastic, changes to the way your servers and clients operate.
RFP
Usually involves significant, potentially drastic, changes to the way your servers and clients operate.
CALEA
Usually involves significant, potentially drastic, changes to the way your servers and clients operate.
NOS
Usually involves significant, potentially drastic, changes to the way your servers and clients operate.
HIPAA
Records event information from Linux and UNIX machines.
SNMP
Records event information from Linux and UNIX machines.
system log
Records event information from Linux and UNIX machines.
agent
Records event information from Linux and UNIX machines.
syslog function
Records event information from Linux and UNIX machines.
event log
Records event information from Linux and UNIX machines.
RFP
Records event information from Linux and UNIX machines.
CALEA
Records event information from Linux and UNIX machines.
NOS
Records event information from Linux and UNIX machines.
HIPAA
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 15: Network Management
1
A(n) ____ is a graphical representation of a network's devices and connections.

A) Multi Router Traffic Grapher
B) network diagram
C) wiring schematic
D) event viewer
B
2
For a cabling upgrade, the best way to ensure that future upgrades go smoothly is to carefully document the existing cable after making any upgrades.
False
3
The most common type of caching is ____ caching.

A) online
B) Web
C) Internet
D) device
B
4
____ management refers to the detection and signaling of device, link, or component faults.

A) Performance
B) Fault
C) Network
D) Configuration
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
____ involves manipulating certain characteristics of packets, data streams, or connections to manage the type and amount of traffic traversing a network or interface at any moment.

A) Traffic monitoring
B) Traffic routing
C) Traffic polling
D) Traffic shaping
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
A ____ is a major change to a software package's existing code.

A) revision
B) change
C) patch
D) software upgrade
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
A key component in managing networks is identifying and tracking its hardware and software through ____ management.

A) performance
B) change
C) configuration
D) asset
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
The process where one network management console collects data from multiple networked devices at regular intervals is known as ____.

A) base lining
B) interrogating
C) polling
D) pushing
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
____ management refers to monitoring how well links and devices are keeping up with the demands placed on them.

A) Performance
B) Fault
C) Network
D) Configuration
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
A network management agent is a ____ that collects information about a device's operation and provides it to the network management application.

A) software routine
B) hardware device
C) GUI
D) probe
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
The more data you gather while establishing your network's baseline, the less accurate your prediction will be.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
____ upgrades typically overwrite some system files on the workstation, so their installation may affect other applications adversely.

A) Principle
B) Application
C) Patch
D) Full
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
____ management is the collection, storage, and assessment of information related to the versions of software installed on every network device and every device's hardware configuration.

A) Change
B) Performance
C) Asset
D) Configuration
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
A ____ is a network device devoted to storage and delivery of frequently requested files.

A) cache engine
B) Web site host
C) server
D) database host
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
Documenting and capturing an accurate picture of a network's physical and logical elements are initial steps in understanding the network.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
A patch is a replacement for an entire software package.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
____ is the local storage of frequently needed files that would otherwise be obtained from an external source.

A) Swapping
B) Paging
C) Caching
D) Segmentation
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
A(n) ____ is a graphical representation of a network's wired infrastructure.

A) Multi Router Traffic Grapher
B) network diagram
C) wiring schematic
D) event viewer
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
A ____ is a correction, improvement, or enhancement to a software application.

A) revision
B) change
C) patch
D) software upgrade
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
The first step in configuration management is to take an inventory of each node on the network.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
Because backbone upgrades are expensive and time consuming, the first step in approaching such a project is to ____ it.

A) research
B) justify
C) plan
D) document
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
Explain the purpose of a patch.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
The most comprehensive and complex upgrade involving network hardware is a ____ upgrade.

A) cabling
B) printer
C) NOS
D) backbone
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
A(n) ____________________ is a report of the network's current state of operation.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
Describe the preparation and implementation requirements when upgrading a network printer.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
____________________ refers to the assessment, monitoring, and maintenance of all aspects of a network.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
List six characteristics software running on network devices may use to prioritize traffic.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
Explain how a network management application can present an administrator with results after data is collected.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
Explain how to gather baseline data on a network.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
Explain how asset management simplifies maintaining and upgrading the network.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
The most critical type of software upgrade you will perform is an upgrade to your ____.

A) database
B) application
C) NOS
D) backbone
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
Describe how to select an asset management tool.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
Describe the purpose of baseline measurements.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
____________________ holds down costs because the ISP doesn't have to plan for every client using all the throughput he could at all times
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
A networked ____ is perhaps the simplest device to add.

A) workstation
B) hub
C) printer
D) server
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
On Windows-based computers an event log and can be easily viewed with the GUI ____________________ application.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
Above all, keep ____ in mind when you upgrade or install hardware on a network.

A) user inconvenience
B) time
C) costs
D) safety
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
The process of reverting to a previous version of software after attempting to upgrade it is known as ____.

A) backleveling
B) reverse engineering
C) downgrading
D) change back
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
The definition of managed devices and their data are collected in a(n) ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
Explain how to provide a way to reverse the hardware upgrade and reinstall the old hardware when necessary.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Describe the preparation and implementation requirements when upgrading a hub or access point.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
Requires telecommunications carriers and equipment manufacturers to provide for surveillance capabilities.
SNMP
Requires telecommunications carriers and equipment manufacturers to provide for surveillance capabilities.
system log
Requires telecommunications carriers and equipment manufacturers to provide for surveillance capabilities.
agent
Requires telecommunications carriers and equipment manufacturers to provide for surveillance capabilities.
syslog function
Requires telecommunications carriers and equipment manufacturers to provide for surveillance capabilities.
event log
Requires telecommunications carriers and equipment manufacturers to provide for surveillance capabilities.
RFP
Requires telecommunications carriers and equipment manufacturers to provide for surveillance capabilities.
CALEA
Requires telecommunications carriers and equipment manufacturers to provide for surveillance capabilities.
NOS
Requires telecommunications carriers and equipment manufacturers to provide for surveillance capabilities.
HIPAA
Collects information about a device's operation but does not demand significant process resources.
SNMP
Collects information about a device's operation but does not demand significant process resources.
system log
Collects information about a device's operation but does not demand significant process resources.
agent
Collects information about a device's operation but does not demand significant process resources.
syslog function
Collects information about a device's operation but does not demand significant process resources.
event log
Collects information about a device's operation but does not demand significant process resources.
RFP
Collects information about a device's operation but does not demand significant process resources.
CALEA
Collects information about a device's operation but does not demand significant process resources.
NOS
Collects information about a device's operation but does not demand significant process resources.
HIPAA
Addresses the security and privacy of medical records.
SNMP
Addresses the security and privacy of medical records.
system log
Addresses the security and privacy of medical records.
agent
Addresses the security and privacy of medical records.
syslog function
Addresses the security and privacy of medical records.
event log
Addresses the security and privacy of medical records.
RFP
Addresses the security and privacy of medical records.
CALEA
Addresses the security and privacy of medical records.
NOS
Addresses the security and privacy of medical records.
HIPAA
Stores results from devices monitoring conditions in Windows-based networks.
SNMP
Stores results from devices monitoring conditions in Windows-based networks.
system log
Stores results from devices monitoring conditions in Windows-based networks.
agent
Stores results from devices monitoring conditions in Windows-based networks.
syslog function
Stores results from devices monitoring conditions in Windows-based networks.
event log
Stores results from devices monitoring conditions in Windows-based networks.
RFP
Stores results from devices monitoring conditions in Windows-based networks.
CALEA
Stores results from devices monitoring conditions in Windows-based networks.
NOS
Stores results from devices monitoring conditions in Windows-based networks.
HIPAA
Part of the TCP/IP suite of protocols and typically runs over UDP on port 161.
SNMP
Part of the TCP/IP suite of protocols and typically runs over UDP on port 161.
system log
Part of the TCP/IP suite of protocols and typically runs over UDP on port 161.
agent
Part of the TCP/IP suite of protocols and typically runs over UDP on port 161.
syslog function
Part of the TCP/IP suite of protocols and typically runs over UDP on port 161.
event log
Part of the TCP/IP suite of protocols and typically runs over UDP on port 161.
RFP
Part of the TCP/IP suite of protocols and typically runs over UDP on port 161.
CALEA
Part of the TCP/IP suite of protocols and typically runs over UDP on port 161.
NOS
Part of the TCP/IP suite of protocols and typically runs over UDP on port 161.
HIPAA
Stores results from devices monitoring conditions in UNIX or Linux-based networks.
SNMP
Stores results from devices monitoring conditions in UNIX or Linux-based networks.
system log
Stores results from devices monitoring conditions in UNIX or Linux-based networks.
agent
Stores results from devices monitoring conditions in UNIX or Linux-based networks.
syslog function
Stores results from devices monitoring conditions in UNIX or Linux-based networks.
event log
Stores results from devices monitoring conditions in UNIX or Linux-based networks.
RFP
Stores results from devices monitoring conditions in UNIX or Linux-based networks.
CALEA
Stores results from devices monitoring conditions in UNIX or Linux-based networks.
NOS
Stores results from devices monitoring conditions in UNIX or Linux-based networks.
HIPAA
Specifies what work a contractor should do.
SNMP
Specifies what work a contractor should do.
system log
Specifies what work a contractor should do.
agent
Specifies what work a contractor should do.
syslog function
Specifies what work a contractor should do.
event log
Specifies what work a contractor should do.
RFP
Specifies what work a contractor should do.
CALEA
Specifies what work a contractor should do.
NOS
Specifies what work a contractor should do.
HIPAA
Usually involves significant, potentially drastic, changes to the way your servers and clients operate.
SNMP
Usually involves significant, potentially drastic, changes to the way your servers and clients operate.
system log
Usually involves significant, potentially drastic, changes to the way your servers and clients operate.
agent
Usually involves significant, potentially drastic, changes to the way your servers and clients operate.
syslog function
Usually involves significant, potentially drastic, changes to the way your servers and clients operate.
event log
Usually involves significant, potentially drastic, changes to the way your servers and clients operate.
RFP
Usually involves significant, potentially drastic, changes to the way your servers and clients operate.
CALEA
Usually involves significant, potentially drastic, changes to the way your servers and clients operate.
NOS
Usually involves significant, potentially drastic, changes to the way your servers and clients operate.
HIPAA
Records event information from Linux and UNIX machines.
SNMP
Records event information from Linux and UNIX machines.
system log
Records event information from Linux and UNIX machines.
agent
Records event information from Linux and UNIX machines.
syslog function
Records event information from Linux and UNIX machines.
event log
Records event information from Linux and UNIX machines.
RFP
Records event information from Linux and UNIX machines.
CALEA
Records event information from Linux and UNIX machines.
NOS
Records event information from Linux and UNIX machines.
HIPAA
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.