Читать книгу CompTIA Network+ Practice Tests - Craig Zacker - Страница 10

Chapter 3 Network Operations

Оглавление

THE COMPTIA NETWORK+ EXAM N10-008 TOPICS COVERED IN THIS CHAPTER INCLUDE THE FOLLOWING:

 3.1 Given a scenario, use the appropriate statistics and sensors to ensure network availability.Performance metrics/sensorsDevice/chassisTemperatureCentral processing unit (CPU) usageMemoryNetwork metricsBandwidthLatencyJitterSNMPTrapsObject identifiers (OIDs)Management information bases (MIBs)Network device logsLog reviewsTraffic logsAudit logsSyslogLogging levels/severity levelsInterface statistics/statusLink state (up/down)Speed/duplexSend/receive trafficCyclic redundancy checks (CRCs)Protocol packet and byte countsInterface errors or alertsCRC errorsGiantsRuntsEncapsulation errorsEnvironmental factors and sensorsTemperatureHumidityElectricalFloodingBaselinesNetFlow dataUptime/downtime

 3.2 Explain the purpose of organizational documents and policies.Plans and proceduresChange managementIncident response planDisaster recovery planBusiness continuity planSystem life cycleStandard operating proceduresHardening and security policiesPassword policyAcceptable use policyBring your own device (BYOD) policyRemote access policyOnboarding and offboarding policySecurity policyData loss preventionCommon documentationPhysical network diagramFloor planRack diagramIntermediate distribution frame (IDF)/main distribution frame (MDF) documentationLogical network diagramWiring diagramSite survey reportAudit and assessment reportBaseline configurationsCommon agreementsNon-disclosure agreement (NDA)Service-level agreement (SLA)Memorandum of understanding (MOU)

 3.3 Explain high availability and disaster recovery concepts and summarize which is the best solution.Load balancingMultipathingNetwork interface card (NIC) teamingRedundant hardware/clustersSwitchesRoutersFirewallsFacilities and infrastructure supportUninterruptible power supply (UPS)Power distribution units (PDUs)GeneratorHVACFire suppressionRedundancy and high availability (HA) conceptsCold siteWarm siteHot siteCloud siteActive-active vs. active-passiveMultiple Internet service providers (ISPs)/diverse pathsVirtual Router Redundancy Protocol (VRRP)/First Hop Redundancy Protocol (FHRP)Mean time to repair (MTTR)Mean time between failure (MTBF)Recovery time objective (RTO)Recovery point objective (RPO)Network device backup/restoreStateConfiguration

1 After starting work as the network administrator of Wingtip Toys, you discover that all of the switches in the company's datacenter have support for remote management, with built-in Simple Network Management Protocol (SNMP) agents in each port. Which of the following tasks must you perform to be able to gather information from the agents on those switches and display it on a central console? (Choose all that apply.)Install the network management software on a network computer.Install a Management Information Base (MIB) on each of the switches.Install an agent on the console computer.Install an MIB on the console computer.Purchase a network management product.

2 Which versions of the Simple Network Management Protocol (SNMP) do not include any security protection other than a cleartext community string? (Choose all that apply.)SNMPv1SNMPv2SNMPv2cSNMPv3

3 Which of the following statements about the Simple Network Management Protocol (SNMP) are not true? (Choose all that apply.)To effectively monitor a network using SNMP, you must be sure that all of the equipment you purchase when designing and building your network supports the protocol.SNMP is not only the name of a protocol, it is also the name of a network management product.SNMPv1 and SNMPv2 rely on a community string as their only means of security.Most of the network management products on the market today support SNMPv3.

4 What Windows utility is shown in the accompanying figure?Network MonitorSystem MonitorEvent ViewerLog Viewer

5 Which of the following was created to provide logging services for the Unix sendmail program?SyslogNetstatSNMPCARP

6 You are the network administrator of your company's network. Your company wants to perform a baseline analysis of network-related traffic and statistics. They want to track broadcasts, Cyclical Redundancy Check (CRC) errors, and collisions for all traffic traversing a switched network. In addition, they want to provide historical and daily reports for management. They also want to keep track of software distribution and metering. What type of network software product best meets these needs?SNMP managementProtocol analyzerPerformance MonitorNetwork traffic monitor

7 Which of the following technologies provides both real-time monitoring of security events and automated analysis of the event information gathered?SIEMSNMPSEMSIM

8 SIEM products combine the capabilities of which of the following? (Choose all that apply.)SyslogSNMPSEMSIM

9 Which of the following statements about web server logs is not true?To analyze web server activity, you typically use an application that interprets the web server log files.Web server logs are typically maintained as text files.Web server logs record the IP addresses of all visiting users.To interpret web server logs, you use a protocol analyzer.

10 Which of the following statements best describes a baseline?A baseline is an estimation of expected performance levels, based on manufacturers’ specifications.A baseline is a record of performance levels captured under actual workload conditions.A baseline is a record of performance levels captured under simulated workload conditions.A baseline is a record of performance levels captured before the system is actually in use.

11 When monitoring performance metrics on one of your servers, you notice that the server is utilizing 100 percent of the network bandwidth available to it. What modification could you make to the server that will most likely address the problem?Add memory to the system.Install a second network adapter.Update the network adapter's firmware.Install a second processor.

12 Which of the following indicators is typically not included in an operating system's performance monitoring tool, such as the Windows Performance Monitor or the MacOS Activity Monitor?TemperatureCPU/processor activityMemory consumptionNetwork utilizationStorage statistics

13 Which of the following syslog message severity levels indicates that a system is unusable?01234

14 Which of the following syslog message severity levels indicates a call for immediate action?01234

15 Which of the following syslog message severity levels indicates that the message is purely informational?02467

16 A Simple Network Management Protocol (SNMP) console can inform administrators when a managed device requires attention. For this to occur, the agent in the device first has to send a message to the console. What is the term used for a message sent by an SNMP agent to the central console?PingAlertNotificationTrap

17 Which of the following metrics would you typically not find displayed by an interface monitor?Error rateBandwidth utilizationPacket dropsRollbacks

18 Which of the following are reasons contributing to the number of packet drops displayed by an interface monitor? (Choose all that apply.)ResetsDiscardsErrorsOverflows

19 Which of the following is not a statistic that you would typically find in a server performance baseline?CPU utilizationDisk transfer rateNetwork transmissions speedOS update historyMemory utilization

20 Log management typically consists of which of the following tasks? (Choose all that apply.)RollbackUtilizationSecurityCycling

21 Which of the following Security Information and Event Management (SIEM) processes performs searches for specific criteria, during specific time frames, in logs located on different computers?Data aggregationForensic analysisCorrelationRetention

22 Which of the following terms best describes the Security Information and Event Management (SIEM) process of consolidating log information from multiple sources?Data aggregationForensic analysisCorrelationRetention

23 Which of the following terms best describes a connectivity problem on wired networks that is caused by individual packets that are delayed due to network congestion, different routing, or queuing problems?LatencyAttenuationJitterBottleneck

24 Which of the following network interface occurrences are considered to be malfunctions on a full-duplex Ethernet network? (Choose all that apply.)RuntsGiantsCollisionsLate collisions

25 Which of the following network applications are most likely to be obviously affected by the wired network connectivity problem known as jitter? (Choose all that apply.)EmailVoIPStreaming videoInstant messaging

26 Which of the following, originally created for the UNIX sendmail program, is now a standard for message logging that enables tools that generate, store, and analyze log information to work together?SyslogNetmonNetstatTop

27 Which of the following log types is the first place that a Windows administrator should look for information about a server's activities?System logSetup logApplication logSecurity log

28 When a service fails to start on a Windows server, an entry is typically created in which of the following event logs?ApplicationSecuritySetupSystem

29 Which of the following Windows applications would you most likely use to create a baseline of system or network performance?Performance MonitorEvent ViewerSyslogNetwork Monitor

30 At what humidity level do electronic components become vulnerable to damage from electrostatic shock?Below 30 percentBelow 50 percentAbove 70 percentAbove 90 percent

31 Which of the following event logs on a Windows server can record information about both successful and failed access attempts?SystemApplicationSecuritySetup

32 Which of the following is the database used by the Simple Network Management Protocol (SNMP) to store information gathered from agents distributed about the network?TrapSyslogMIBSIEM

33 Which of the following is the most likely cause of runt and giant frames on an Ethernet network interface?A network adapter malfunctionHalf-duplex communicationExcessive cable lengthElectromagnetic interference

34 Which of the following is the most likely cause of Cyclic Redundancy Check (CRC) errors on an Ethernet network interface?Half-duplex communicationA network adapter malfunctionElectromagnetic interferenceExcessive cable length

35 Which of the following utilities can display the number of packets sent and received for a specific network interface on a Unix, Linux, MacOS or Windows computer?TopIfconfigNetstatNbtstat

36 Which of the following is a feature included in some routers that collects and analyzes network traffic data sent or received through a network interface?NetmonNetflowNetstatNbtstat

37 Which of the following is not a type of error typically found in network interface statistics?RuntEncapsulationGiantCRCJumbo

38 Which of the following is not an SNMP component?MIBsTrapsOIDsCRCs

39 Ralph is designing the HVAC implementation for his company's new central datacenter, which will house all of the equipment for the corporate headquarters and the company's manufacturing facility. The datacenter must adhere to the Tier III standard defined by the Uptime Institute, which calls for at least 99.9 percent uptime. As part of the environmental infrastructure for the datacenter, Ralph plans to install sensors to monitor environmental factors that can affect computer equipment and generate alerts when conditions exceed accepted thresholds. Which of the following environmental factors is not one of those that Ralph should arrange to monitor to protect the equipment specific to a datacenter?FloodHumidityRadonStatic electricityTemperature

40 Routers using link states and Dijkstra's algorithm to calculate the lowest cost route to a specific destination can conceivably be running which of the following interior gateway routing protocols? (Choose all that apply.)OSPFRIPEIGRPIS-ISBGP

41 Which of the following is the term usually applied to a representation of network devices, automatically compiled, and containing information such as IP addresses and connection speeds?Network mapNetwork diagramCable diagramManagement information base

42 Which of the following types of network documentation is often overlaid on an architectural drawing or blueprint?Network mapNetwork diagramCable diagramManagement information base

43 Which of the following is not one of the typical heights for devices mounted in IT equipment racks?1 unit2 units3 units4 units

44 The cable plant for your company network was installed several years ago by an outside contractor. Now, some of the paper labels have fallen off your patch panels, and you do not know which wall plate is connected to each port. Assuming that you are working on a properly maintained and documented network installation, which of the following is the easiest way to determine which port is connected to which wall plate?Consult the cable diagram provided by the cabling contractor at the time of the installation.Call the cable installation contractor and see if he or she can remember which ports go with which wall plates.Attach a tone generator to a patch panel port and then test each wall plate with a locator until you find the correct one. Repeat this for each port that needs labeling.Use a cable certifier to locate the patch panel port associated with each wall plate port.

45 Which of the following IT asset management documents published by the International Organization for Standardization (ISO) defines a standard for Software Identification Tags (SWIDs) containing inventory information about the software running on a computer or other device?ISO 19770-1ISO 19770-2ISO 19770-3ISO 19770-4ISO 19770-5

46 Which of the following are places where network wiring connections are found? (Choose all that apply.)MDFMTBFIDFRDP

47 A rack diagram is typically ruled vertically using which of the following measurements?InchesCentimetersUnitsGrids

48 In a standard Cisco network diagram, what component does the symbol in the figure represent?A switchA routerA hubA gateway

49 Which of the following statements are true about the differences between a diagram of a patch panel installation organized physically and one that is organized logically? (Choose all that apply.)A physical diagram is organized according to the floors and rooms where the cable drops are located.A physical diagram is precisely scaled to represent the actual patch panel hardware.A logical diagram is organized according to the divisions within the company, such as departments and workgroups.A logical diagram uses an organization that represents company divisions but does not physically resemble the actual patch panels.

50 A diagram of a telecommunications room or Intermediate Distribution Frame (IDF) for an office building is typically based on which of the following?A hand-drawn sketchA series of photographsAn architect's planA 3D modelA site survey report

51 The documentation for Main Distribution Frames (MDFs) and Intermediate Distribution Frames (IDFs) should incorporate details on which of the following elements? (Choose all that apply.)PowerEnvironmentDistancesCosts

52 At what point in the installation process should patch panel ports and wall plates be labeled?When the patch panels and wall plates are installedWhen a length of cable is cut from the spoolWhen the cables are attached to the connectorsWhen the cable runs are tested, immediately after their installation

53 Which of the following is the term used to describe a wiring nexus that is typically the termination point for incoming telephone and Wide Area Network (WAN) services?MDFMTBFIDFRDPMOU

54 Your department is experiencing frequent delays as users wait for images to render using their outdated graphics software package. As a result, you are planning to submit a change request for a new software product at the monthly meeting of the company's change management team. Which of the following types of information are likely to be included in your request? (Choose all that apply.)The possibility of rolling back to the previous software, if necessaryThe procedure for installing and configuring the new softwareAn estimate of the productivity increase realizable with the new softwareA list of software and hardware upgrades or modifications needed to run the new software

55 A rack diagram is typically ruled into vertical rack units, which are standard-sized divisions that hardware manufacturers use when manufacturing rack-mountable components. Which of the following is the standard vertical height of a single rack unit?1.721 inches1.75 inches40 mm3.5 inches

56 The change request for new graphics software that you submitted to your company's change management team has been approved. Now it is time to implement the change. Which of the following administrative tasks will most likely be the change management team's responsibility during the implementation process? (Choose all that apply.)Authorizing downtimeNotifying usersDesignating a maintenance windowDocumenting all modifications made

57 Which of the following IT asset management documents published by the International Organization for Standardization (ISO) provides an overview of the ITAM concepts discussed in the ISO 19770 family of standards?ISO 19770-1ISO 19770-2ISO 19770-3ISO 19770-4ISO 19770-5

58 A rack-mounted device that is four units tall will be approximately what height in inches?1.753.547

59 Which of the following types of documentation should indicate the complete route of every internal cable run from wall plate to patch panel?Physical network diagramAsset managementLogical network diagramWiring schematic

60 Which of the following statements about physical network diagrams and logical network diagrams are true? (Choose all that apply.)A physical network diagram is created automatically, and a logical network diagram is created manually.A physical network diagram depicts hardware devices and the connections between them.A logical network diagram contains all of the information you would need to rebuild your network from scratch.A logical network diagram typically contains the IP addresses of network devices.

61 In a standard Cisco network diagram, what component does the symbol in the figure represent?A switchA routerA hubA gateway

62 Which of the following is the term used to describe a wiring nexus—typically housed in a closet—where horizontal networks meet the backbone?MDFMTBFIDFSLAMOU

63 What is the width of a standard equipment rack in a datacenter?12 inches16 inches19 inches24 inches

64 In a standard Cisco network diagram, what component does the symbol in the figure represent?A switchA routerA hubA gateway

65 The precise locations of devices in a datacenter are typically documented in which of the following documents?Rack diagramNetwork mapWiring schematicLogical diagramBusiness continuity planAudit and assessment report

66 Which of the following statements about network maps is true?Network maps are typically drawn to scale.Network maps typically contain more information than network diagrams.Network maps must be read/write accessible to all personnel working on the network.Network maps diagram only the locations of cable runs and endpoints.

67 Which of the following types of documentation should contain the chemical composition of all cleaning compounds used in a datacenter?ESDMSDSNDABYODSOP

68 After being hired for a job as an IT administrator, you have been assigned two user accounts, one of which is intended for general use and the other only for administrative tasks. You are also required to sign an agreement that outlines the restrictions for your account use. Specifically, you are not permitted to use the administrative account for anything other than administrative tasks, including browsing the Internet and accessing data for which you are not authorized. Which of the following is the best name for this type of agreement?Remote access policiesService level agreementAcceptable use policyPrivileged user agreement

69 You are working for a company with numerous branch offices scattered around the country, and you are required to travel to these offices frequently. Each branch office has some means of accessing the network at the company headquarters. Some use frame relay, some use Virtual Private Networks (VPNs), and a few even use dial-in access. During one trip, you mention to a branch office manager that you intend to connect to the headquarters network that night from your hotel room. The manager warns you that this is against company policy, but you are not so sure. Where in the company documentation should you look to confirm this?Remote access policiesService level agreementAcceptable use policyPrivileged user agreement

70 Which of the following is a document that a company's new hires might want to consult to determine whether they are permitted to install their own personal software on company computers?SLAAUPNDABYOD

71 Many employees have been contacting the IT help desk asking how they can connect their personal smartphones and tablets to the company's wireless network. This has raised issues regarding network security and technical support. You have been asked to draft a policy for the in-house use of personal electronics that addresses these issues. Which of the following describes the document that you will be creating?SLAAUPNDABYOD

72 You are going to work for a new company as a software developer, and Human Resources (HR) has notified you that you must sign a document guaranteeing that you will maintain confidentiality about the company's products and programming code in perpetuity. Which of the following documents contains this agreement?SLAAUPNDAMOUBYOD

73 Which of the following are typical elements of a corporate password policy? (Choose all that apply.)Minimum password lengthUse of special charactersUnique passwordsFrequent password changes

74 Alice is implementing a new password policy that requires all users to change their passwords every seven days. What further modification can she make to the password policy to prevent users from thwarting the password change requirement?Specify a minimum password lengthRequire the use of special charactersRequire the creation of unique passwordsSpecify a maximum password change interval

75 Which of the following are settings typically included in an account lockout policy? (Choose all that apply.)Account lockout durationTime allowed between attemptsAccount lockout thresholdReset account lockout threshold counter

76 How do account lockouts help to prevent intruders from cracking passwords?By forcing users to select passwords of a minimum lengthBy preventing users from entering incorrect passwords more than a specified number of timesBy preventing users from reusing the same passwordsBy requiring an additional authentication method, such as a fingerprint

77 Which of the following data loss prevention terms is used to describe dangers pertaining to data that is being transmitted over a network? (Choose all that apply.)Data in useData at restData in motionData in transit

78 Which of the following data loss prevention terms is used to describe dangers pertaining to data while a user is loading it into an application?Data in useData at restData in processData in motion

79 Which of the following data loss prevention terms is used to describe potential dangers of data loss or data leakage to unauthorized parties while the data is stored without being used?Data in useData at restData in motionData on disk

80 Which of the following is not one of the standard terms used in data loss prevention?Data onlineData at restData in motionData in use

81 The terms on-boarding and off-boarding are typically associated with which of the following policies?Data loss preventionIncident responseInventory managementIdentity managementDisaster recoveryBusiness continuity

82 The term off-boarding refers to which of the following procedures?Removing a node from a clusterDisconnecting all cables from a switchRevoking a user's network privilegesRetiring old workstations

83 Which of the following is most likely to be the last step in a change management procedure?DocumentationNotificationApprovalScheduling

84 Which of the following U.S. organizations are capable of imposing international export controls on software products? (Choose all that apply.)The company that created the softwareDepartment of StateDepartment of CommerceDepartment of the Treasury

85 Which of the following is the primary result of an organization's security incident response policies?To know how to respond to a particular incidentTo prevent an incident from occurring againTo identify the cause of an incidentTo document the procedures leading up to an incident

86 You are an IT director, and a fire has broken out in the lower floors of your company's office building. After the personnel are evacuated, the fire department asks you where they can find documentation about all chemicals and equipment used in the company's datacenter, which is threatened by the fire. You direct them to the correct filing cabinet in your office, which contains which of the following document types?ESDNDABYODMSDS

87 You have been asked to draft an Acceptable Use Policy (AUP) for new hires at your company to sign, which specifies what they can and cannot do when working with the company's computers and network. Which of the following is not one of the provisions typically found in this type of document?PrivacyOwnershipIllegal useUpgrades

88 You are starting a new job, and the company's Human Resources (HR) department has asked you to sign an Acceptable Use Policy (AUP) regarding computer and network use. The document includes a privacy clause. Which of the following are specifications you can expect to find in this clause? (Choose all that apply.)Any emails you send or receive can be monitored by the company at any time.All files and data that you store on company computers must be accessible to the company for scanning and monitoring.All work that you perform for the company becomes the sole property of the company, including copyrights and patents.All hardware, software, and any proprietary data stored on the company's computers remains the property of the company.

89 Which of the following tasks is not considered to be part of an IT department's incident response plan?Stopping an ongoing incidentContaining the damage caused by an incidentRepairing the damage caused by an incidentRebuilding an infrastructure destroyed by an incident

90 Which of the following are occurrences that are typically addressed by an IT department's incident response policies? (Choose all that apply.)Denial-of-Service (DoS) attackHard disk failureElectrical fireServer outage

91 Which of the following terms would apply to the procedure of adding a user's personal smartphone to the network under a Bring Your Own Device (BYOD) policy?Out-of-bandOn-boardingIn-bandOff-boarding

92 Your company has been acquired by another firm and, as IT director, you will have to comply with the new firm's safety policies in your datacenter and other IT workspaces. One of the new requirements states that there must be a fail closed policy for the datacenter. Which of the following best describes what this policy dictates should occur in the event of an emergency?All computers that are logged on should automatically log off.All computers that are running should automatically shut down.All doors that are normally open should lock themselves.All doors that are normally locked should open themselves.

93 You are the first responder to an incident of computer crime at your company. The datacenter's security has been penetrated, a server accessed, and sensitive company data stolen. The company's incident response plan lists the specific tasks that you are responsible for performing. Which of the following are likely to be among those tasks? (Choose all that apply.)Turn off the server.Secure the area.Document the scene.Collect evidence.Cooperate with the authorities.

94 Password policies frequently require users to specify complex passwords. Which of the following are characteristic of a complex password?Passwords that contain mixed upper- and lowercase letters, numbers, and symbolsPasswords that exceed a specific lengthPasswords that do not duplicate a specific number of the user's previous passwordsPasswords that do not duplicate the user's account name, birth date, or other personal information

95 Password policies that contain a history requirement typically have which of the following limitations?Users cannot reuse recent passwords.Users cannot create passwords containing names of relatives.Users cannot create passwords containing names of historical figures.Users cannot create passwords that duplicate those of any other users on the network.

96 Account lockout policies are designed to protect against which of the following types of attacks?Social engineeringSpoofingBrute forceMan in the middle

97 Which of the following types of password policies are designed to prevent brute-force attacks? (Choose all that apply.)Password length policiesAccount lockout policiesPassword history policiesComplex password policies

98 Which of the following is not likely to be a procedural element of an IT asset disposal policy?Data deletionRecyclingData preservationInventory

99 While negotiating a new contract with a service provider, you have reached a disagreement over the contracted reliability of the service. The provider is willing to guarantee that the service will be available 99 percent of the time, but you have been told to require 99.9 percent. When you finally reach an agreement, the negotiated language will be included in which of the following documents?SLAAUPNDABYOD

100 Which of the following elements would you typically not expect to find in a Service Level Agreement (SLA) between an Internet Service Provider (ISP) and a subscriber?A definition of the services to be provided by the ISPA list of specifications for the equipment to be provided by the ISPThe types and schedule for the technical support to be provided by the ISPThe types of applications that the subscriber will use when accessing the ISP's services

101 You have just completed negotiating an annual contract with a provider to furnish your company with cloud services. As part of the contract, the provider has agreed to guarantee that the services will be available 99.9 percent of the time, around the clock, seven days per week. If the services are unavailable more than 0.1 percent of the time, your company is due a price adjustment. Which of the following terms describes this clause of the contract?SLAMTBFAUPMTTR

102 The technical support clause of a Service Level Agreement (SLA) will typically include which of the following elements? (Choose all that apply.)Whether the provider will provide on-site, telephone, or online supportThe time service for responses to support calls, which specifies how quickly the provider must respond to requests for support.The percentage of time that the service is guaranteed to be availableThe amount of support that will be provided and the costs for additional support

103 After switching from a standard public switched telephone network (PSTN) telephone system to a Voice over Internet Protocol (VoIP) system, users are complaining of service interruptions and problems hearing callers at certain times of the day. After examining a network traffic audit and assessment report, you determine that traffic levels on the Internet connection are substantially higher during the first and last hours of the day, the same times when most of the users experienced problems. Which of the following solutions can provide more reliable VoIP service during peak usage times?Implement traffic shapingImplement load balancingUpgrade the Local Area Network (LAN) from Fast Ethernet to Gigabit EthernetReplace the router connecting the LAN to the Internet with a model that supports Simple Network Management Protocol (SNMP).

104 A server with dual power supplies must be running in which of the following modes for the system to be fault tolerant?Combined modeRedundant modeIndividual modeHot backup mode

105 Redundant power circuits can enable a server to continue running in spite of which of the following events?A citywide power outageA server power supply failureAn uncorrected building circuit failureA failure of the server's Uninterruptable Power Supply (UPS)

106 Which of the following media types is Windows Server Backup unable to use to store backed-up data?Local hard disksLocal optical disksMagnetic tape drivesRemote shared folders

107 Which of the following Redundant Array of Independent Disks (RAID) levels provides fault tolerance by storing parity information on the disks, in addition to the data? (Choose all that apply.)RAID 0RAID 1RAID 5RAID 10

108 Installing an electrical generator for your datacenter is an example of which of the following fault tolerance concepts?Uninterruptible Power Supply (UPS)Power redundancyDual power suppliesRedundant circuits

109 Which of the following RAID levels uses disk striping with distributed parity?RAID 0RAID 1RAID 5RAID 10

110 Which of the following is not a fault tolerance mechanism?Port aggregationClusteringMTBFUPS

111 Which of the following is not a type of server load balancing mechanism?DNS round-robinNetwork Address TranslationContent switchingMultilayer switching

112 Which of the following mechanisms for load balancing web servers is able to read the incoming HTTP and HTTPS requests and perform advanced functions based on the information they contain?Content switchesMultilayer switchesFailover clusteringDNS round-robin

113 Which of the following statements about the differences between online and standby Uninterruptible Power Supplies (UPSs) are correct? (Choose all that apply.)A standby UPS runs devices using battery power all the time.An online UPS provides no gap in the power supplied to the devices during a main power failure.An online UPS switches devices to battery power only during a main power failure.A standby UPS provides only enough power for an orderly shutdown of the devices.

114 Which of the following are valid reasons why online Uninterruptible Power Supplies (UPSs) are more expensive than standby UPSs?Online UPSs enable devices to run longer when a main power failure occurs.Online UPSs enable devices to run continuously when a main power failure occurs.Online UPSs are managed devices that can generate alerts.Online UPSs provide greater protection against power spikes and sags.

115 Which of the following are equivalent terms for the process of combining the bandwidth of two or more network adapters to increase the overall speed of the connection and provide fault tolerance? (Choose all that apply.)BondingLink aggregationClusteringPort aggregationNIC teaming

116 A network load balancing cluster is made up of multiple computers that function as a single entity. Which of the following terms is used to describe an individual computer in a load balancing cluster?NodeHostServerBox

117 Which of the following is an element of high availability systems that enables them to automatically detect problems and react to them?BackupsSnapshotsFailoverCold sites

118 Which of the following RAID levels does not provide fault tolerance?RAID 0RAID 1RAID 5RAID 10

119 Which of the following networking concepts frequently use virtual Internet Protocol (IP) addresses to provide high availability? (Choose all that apply.)ClusteringLoad balancingNetwork Address Translation (NAT)Network Interface Card (NIC) teaming

120 Which of the following disaster recovery mechanisms can be made operational in the least amount of time?A cold siteA warm siteA hot siteAll of the options are the same.

121 Which of the following datacenter disaster recovery mechanisms is the least expensive to implement?A cold siteA warm siteA hot siteA cloud site

122 Which of the following terms defines how long it will take to restore a server from backups if a complete system failure occurs?RPORTOBCPMIB

123 In a disaster recovery scenario, which of the following terms applies to devices that are not repairable?MTBFMTTFMTTRMDT

124 If you have a server with dual power supplies, both of which are connected to a single Uninterruptible Power Supply (UPS), with a building power circuit connected to a backup generator, which of the following failures can the server survive and keep running indefinitely? (Choose all that apply.)Failure of one server power supplyFailure of the UPSFailure of the building power circuitFailure of the building backup generator

125 Which of the following is the primary function of an Uninterruptible Power Supply (UPS) during a two-hour building power failure.To keep servers running until building power is restoredTo keep servers running until they can be powered down safelyTo keep servers from being damaged by power spikesTo keep servers running in the event of a computer power supply failure

126 If you have a server with dual power supplies, one of which is plugged into a single Uninterruptible Power Supply (UPS) and the other into a wall socket with a surge protector, and the building's power circuit is connected to a backup generator, which of the following failures can the server survive and keep running indefinitely? (Choose all that apply.)Failure of one server power supplyFailure of the UPSFailure of the building power circuitFailure of the building backup generator

127 If you have a server with dual power supplies, each of which is connected to a separate Uninterruptible Power Supply (UPS), with each UPS connected to a separate building power circuit connected to a backup generator, which of the following failures can the server survive and keep running indefinitely? (Choose all that apply.)Failure of one server power supplyFailure of one UPSFailure of one building power circuitFailure of the building backup generator

128 Which of the following is the criterion most commonly used to filter files for backup jobs?FilenameFile extensionFile attributesFile size

129 Which of the following disaster recovery mechanisms is the least expensive to implement?A cold siteA warm siteA hot siteAll of the options cost the same.

130 Which of the following statements about port aggregation is not true?All of the aggregated ports use the same MAC address.Port aggregation can be a fault tolerance mechanism.Aggregating ports increases network throughput.Port aggregation provides load balancing

131 Which of the following can be provided by clustering servers?Fault toleranceLoad balancingFailoverAll of the above

132 When you configure NIC teaming on a server with two network adapters in an active/passive configuration, which of the following services is provided?Load balancingFault toleranceServer clusteringTraffic shaping

133 Which of the following is not a load balancing mechanism?NIC teamingServer clusteringDNS round-robinRAID 1

134 Which of the following best describes the difference between cold, warm, and hot backup sites?Whether the backup site is owned, borrowed, or rentedThe age of the most recent backup stored at the siteThe cost of the hardware used at the siteThe time needed to get the site up and running

135 Which of the following specifications would you most want to examine when comparing hard disk models for your new Redundant Array of Independent Disks (RAID) array?MTBFSLAAUPMTTR

136 Which of the following RAID levels provides fault tolerance with the smallest amount of usable disk space? (Choose all that apply.)RAID 0RAID 1RAID 5RAID 10

137 Disk mirroring and disk duplexing are both fault tolerance mechanisms for hard disk data storage. Which of the following statements about disk mirroring and disk duplexing is true?Disk mirroring enables a server to survive the failure of a disk drive.Disk duplexing enables a server to survive the failure of a disk controller.Disk mirroring enables a server to survive a failure of a disk drive or a disk controller.Disk duplexing enables a server to survive a failure of a disk drive or a disk controller.

138 You are installing a new Windows server with two hard disk drives in it, and you want to use RAID to create a fault-tolerant storage system. Which of the following RAID levels can you configure the server to use?RAID 0RAID 1RAID 5RAID 10

139 Which of the following RAID levels provide fault tolerance without using parity data? (Choose all that apply.)RAID 0RAID 1RAID 5RAID 10

140 Which of the following backup job types does not reset the archive bits of the files it backs up?FullIncrementalDifferentialSupplemental

141 What are the three elements in the Grandfather-Father-Son media rotation system for network backups?Hard disk drives, optical drives, and magnetic tape drivesIncremental, differential, and full backup jobsMonthly, weekly, and daily backup jobsQIC, DAT, and DLT tape drives

142 Which of the following types of backup jobs are supported by the Windows Server Backup program? (Choose all that apply.)IncrementalDifferentialFullSupplemental

143 Which of the following is a term for a read-only copy of a data set made at a specific moment in time?SnapshotIncrementalHot siteDifferential

144 Which of the following storage techniques prevents version skew from occurring during a system backup?IncrementalsDifferentialsIterationsSnapshots

145 If you back up your network by performing a full backup every Wednesday at 6:00 p.m. and incremental backups in the evening of the other days of the week, how many jobs would be needed to completely restore a computer with a hard drive that failed on a Monday at noon?OneTwoFiveSix

146 How does an autochanger increase the overall storage capacity of a backup solution?By compressing data before it is stored on the mediumBy automatically inserting media into and removing it from a driveBy running a tape drive at half its normal speedBy writing two tracks at once onto a magnetic tape

147 For a complete restore of a computer that failed at noon on Tuesday, how many jobs would be needed if you performed full backups to tape at 6:00 a.m. every Wednesday and Saturday and incremental backups to tape at 6:00 a.m. every other day?OneTwoThreeFour

148 If you back up your network by performing a full backup every Wednesday at 6:00 p.m. and differential backups in the evening on the other six days of the week, how many jobs would be needed to completely restore a computer with a hard drive that failed on a Tuesday at noon?OneTwoSixSeven

149 Why does performing incremental backups to a hard drive, rather than a tape drive, make it possible to restore a server with a single job, rather than multiple jobs?Because hard drives hold more data than tape drivesBecause hard drives can transfer data faster than tape drivesBecause hard drives are random access devices and tape drives are notBecause hard drives use a different block size than tape drives

150 Which of the following is not a fault tolerance mechanism?UPSRAID 1SNMPClustering

151 Which of the following is the primary difference between the Power Distribution Units (PDUs) used in datacenters and the standard power strips used in offices and homes?More outletsLarger power inputLarger power outputAll of the above

152 Which of the following statements about backing up a firewall's state and backing up its configuration are true? (Choose all that apply.)A backup of a firewall's state contains more data than a backup of its configuration.A backup of a firewall's configuration contains more data than a backup of its state.A backup of a firewall's state contains the exact same data as a backup of its configuration.A backup of a firewall's state includes its configuration.A backup of a firewall's configuration includes its state.

153 Which of the following is the most commonly recommended fire suppression system for a datacenter?Carbon DioxideWaterFoamHFC-125

154 Concurrent multipath routing (CMR) is a technique that provides which of the following benefits? (Choose all that apply.)Increased bandwidthFault toleranceData encapsulationLoad balancing

155 A First Hop Redundancy Protocol (FHRP) is designed to dynamically alter which one of the following Internet Protocol (IP) configuration settings on a network host?IP addressSubnet maskDefault gatewayDNS server address

156 Which of the following is not a First Hop Redundancy Protocol (FHRP)?CARPVRRPHSRPRARP

157 Ralph is designing a new network with the redundant switching arrangement shown in the accompanying figure. This redundancy enables every node on the network to communicate with any other node, even if one of the switches should fail. Which of the following is a potential drawback of this arrangement?Runt framesLate collisionsBroadcast stormsCorrupted switch lookup tables

158 Installing redundant firewalls in a parallel configuration, as shown in the accompanying graphic, provides which of the following benefits? (Choose all that apply.)Load balancingFault toleranceAdded securityEnhanced performance

159 Redundant servers running in an active-active configuration provide which of the following advantages that the same servers in an active-passive configuration do not? (Choose all that apply.)Increased performanceFault toleranceData encapsulationLoad balancing

160 To build a network with redundant Internet connections that ensures full fault tolerance, it is necessary to use which of the following?Different ISPsDifferent WAN connectionsDifferent routersAll of the above

CompTIA Network+ Practice Tests

Подняться наверх