Configuration management documentation is the overall term used to describe writing schematics, developing physical and logical network diagrams, establishing baselines, creating policy,
Trang 1and DMZ architecture, but not details on creating UTP cables Answer D is
incorrect because a server rack schematic would contain details about wires in
a particular rack, but typically not details on how to create the actual cables
As the network manager for a small ISP in Maryland serving over
4
2,000 customers across the eastern United States, you are in charge
of daily operations Your regional supervisor just received a phone call from corporate He asks you over the phone to develop a calculated plan of action to guide decisions and achieve sound outcomes that provide guidelines that the installation contractors will use on how to access the closest data center which will be the location that is outfit-ted with the latest load balancing technology What kind of document
is your regional supervisor asking you to create?
A Common management documentation
B Configuration management documentation
C Procedure
D Policy
Correct answer and explanation: D Policy is the correct answer because it
provides guidelines on how to address certain subjects Procedures are much more than guidelines Procedures lay out each step needed to accomplish a task For example, when creating a user account, the user ID may be the per-son’s last name and first initial and not to exceed eight characters Detailed steps with procedures help execute policies
Incorrect answers and explanations: A, B, and C Common management
documentation is incorrect because this term does not exist in network man-agement Configuration management documentation is the overall term used to describe writing schematics, developing physical and logical network diagrams, establishing baselines, creating policy, procedures, and configura-tions and using regulaconfigura-tions Procedure is incorrect because this document lays out each step needed to accomplish a task
The FCC reports on how businesses need to accommodate local
5
law enforcement with respect to investigating identify theft Since your brother-in-law is a state trooper he tells you all about this new FCC report and how it’s going to affect the whole town Two weeks pass and you don’t hear anything new from your brother-in-law You ring him up on your cell phone to find out why Soon after he picks up the phone he says, “Hey, don’t you work for that commer-cial telecommunications company on 3rd Avenue?” You pause and say, “Yes, I do.” “Well, tomorrow morning Sergeant Dave Simpson
is visiting your organization to investigate some cyber crime charges
Trang 2on a local; are you prepared to help him when he arrives?” What
kind of configuration management documentation should you be
very familiar with in order to assist state and federal governments?
A Policy
B Regulation
C Procedure
D Logical network diagram
Correct answer and explanation: B Regulation is the correct answer
because they are important to plan and establish your local policies and
pro-cedures Many organizations are held to state and federal regulations which
will affect their responsibilities as a public/private, for-profit or not-for-profit
business Understanding what regulations your organization must adhere to
will help you manage how your network operates
Incorrect answers and explanations: A, C, and D Policy is incorrect
because it provides guidelines on how to address certain subjects Procedure
is incorrect because procedures lay out each step needed to accomplish a task
For example, when creating a user account, the user ID may be the person’s
last name and first initial and not to exceed eight characters Detailed steps
with procedures help execute policies Logical network diagram is incorrect
because this configuration management documentation depicts how your
network looks from a computer’s point of view and not as a physical
struc-tured layout as we might see it in the server rooms
Just as you arrive to work you get a phone call from that one user
6
who always gives you a hard time over some simple user error like
leaving their monitor off Well, this time the user cannot access her
favorite news Web site She tries and tries, but the Web site still
doesn’t come up You check her connectivity from her computer to
the switch; it’s good You ping her computer from your computer;
it’s good You now want to capture packets inbound and outbound
from her computer What network monitoring tool would you use
to complete this task?
A Event viewer
B Cache engine
C Packet sniffer
D Load balancing server
Correct answer and explanation: C Packet sniffer is the correct answer
Packet sniffing (a.k.a network monitoring) tools are used to capture network
traffic inbound and outbound from the device you have installed the packet
sniffing tool on
Trang 3Incorrect answers and explanations: A, B, and D Event viewer is incorrect
because this tool is used to display logging information for local and remote computers Cache engine is incorrect because these are servers dedicated
to caching data for clients Usually these servers have a database where the cache is stored and upon request is given to the local host If the cache is not used often enough it is discarded until the client accesses it again Load bal-ancing server is incorrect because a load balbal-ancing device distributes incom-ing network traffic to multiple devices to share the traffic load when there is
a consistent peak in traffic rate
You want to control and optimize the network traffic coming into
7
your domain, but your boss just does not see why load balancing
is not helping What technique will assist your boss in increasing usable bandwidth and lowering latency?
A Traffic shaping
B Load balancing
C High availability
D Jitter
Correct answer and explanation: A Traffic shaping is the correct answer
because this is a common term used to describe the control of computer
net-work traffic to optimize for peak performance, also known as packet shap-ing Increasing usable bandwidth and lowering latency are the goals of traffic
shaping This technique is employed by specifying what traffic at what rate (rate limiting) in a span of time (bandwidth throttling) you are going to allow
in or out of your network
Incorrect answers and explanations: B, C, D Load balancing is incorrect
because this is a technique employed on computer networks to distribute the incoming traffic upon other network devices if there are indications of increased network traffic or “load.” High availability is incorrect because high availability is a system design protocol which once implemented assures a specific degree of uptime continuity in a specific period of time The goal of high availability is to ensure that users have the maximum uptime so they can access network resources anytime and anywhere Jitter is incorrect because jitter is the variation in packet delay when there are delays in transit
You’re VoIP phone rings You pick it up and say, “Hello?” You listen
8
very closely but all you can hear is broken speech as if someone
is talking very slowly but the words are not coming out right You notice your VoIP switch is blinking red and you open up a com-mand console to your VoIP switch to see why Looks like there is a problem with your switch and it is not prioritizing your VoIP traffic
Trang 4above all else What kind of service do you need to enable to ensure
VoIP has the highest priority to ensure your VoIP packets are sent
and received first?
A Quality of Service
B Dropped
C Delay
D Jitter
Correct answer and explanation: A Quality of Service (QoS) is the
cor-rect answer because QoS is a measure of value of a network service (that is
VoIP) compared to the expected or predicted performance quality that
net-work service is actually producing on your netnet-work By enabling QoS for VoIP
you can ensure that voice echoing in the background or other delays are not
occurring
Incorrect answers and explanations: B, C, and D Dropped, delay, and
jitter are incorrect because each of these are problems that occur if QoS is
not used Dropped packets – The routers might fail to deliver (drop) some
packets if they arrive when their buffers are already full Some, none, or all of
the packets might be dropped, depending on the state of the network, and it
is impossible to determine what will happen in advance The receiving
appli-cation may ask for this information to be retransmitted, possibly causing
severe delays in the overall transmission Delay/Latency – As VoIP is a
real-time application of voice services, any delay would reduce the transmission
thereby making it impossible to understand the other person on the distant
end Overcrowded data links on routers in the transit path of your packets
could result in a delay of data packets Long queues or indirect routes
avoid-ing congestion might be some causes of latency within your VoIP network
Jitter – The Internet is a complex mesh of interconnected routers connected
across the world There is no single path to a given destination In fact some
packets travel completely different paths and end up at the same destination
When there are delays in transit, some packets leaving after others might
arrive at the destination first This variation in packet delay is called “jitter.”
Applications like VoIP cannot effectively be used if jitter is occurring
You are working for Google™ as an intern for the summer You
9
have always wondered how googling occurred on the back end of
all those servers You ask your supervisor what technique they use
to distribute incoming traffic onto other servers when the traffic
load became overbearing for one single server What technique does
your supervisor tell you that Google™ uses to allow for a group of
computers in a cluster to share traffic load?
Trang 5A Traffic shaping
B Load balancing
C High availability
D Packet shaping
Correct answer and explanation: B Load balancing is the correct answer
Load balancing is a technique employed on computer networks to distribute the incoming traffic upon other network devices if there are indications of increased network traffic or “load.” Load balancing allows a group or cluster
of data center servers to share the inbound traffic all the while seeming as
if there actually is only one external connection to the Internet In a typical network configured for load balancing, once traffic comes into the network via the one external entry point, it is distributed among other servers inter-nally connected to share the high traffic volumes
Incorrect answers and explanations: A, C, and D Traffic shaping, high
availability, and packet shaping do not distribute incoming network traffic to other computer devices Another common term used to describe the control
of computer network traffic to optimize for peak performance is packet shap-ing Increasing usable bandwidth and lowering latency are the goals of traffic
shaping This technique is employed by specifying what traffic at what rate (rate limiting) in a span of time (bandwidth throttling) you are going to allow
in or out of your network More common is the use of traffic shaping at the border routers (those bordering your network’s perimeter) for delaying enter-ing network traffic High availability is a system design protocol which once implemented assures a specific degree of uptime continuity in a specific period
of time The goal of high availability is to ensure that users have the maxi-mum uptime so they can access network resources anytime and anywhere
You were just promoted to network operations manager for your
10
division called Customer Data Center Compliance You have worked at DataFirst, Inc for more than 10 years and you expected the promotion; otherwise you were planning to take a job with MicroServer LLC As you sit down at your new desk, with a win-dow view, you get a phone call from one of your subordinates Bob, who now works for you, is fielding a customer’s question about being able to access Internet Web sites quicker than just redown-loading it each time he visits it You think really hard and tell Bob that he needs what?
A Network performance optimization
B Traffic policing
C Fault tolerance
D Cache engines
Trang 6Correct answer and explanation: D Cache engines is the correct answer
because they copy from the original data and it is saved for computers to
access locally instead of having to retrieve the same data again from the
Internet This allows the clients to access this “cached” data quicker since it
is stored in a temporary location for a specific amount of time Usually the
time is configured by network administrators to allow for the best
perfor-mance Cache engines are servers dedicated to caching data for clients
Incorrect answers and explanations: A, B, and C Fault tolerance is incorrect
because fault tolerance refers to what you have in place in the case of a network
failure and the plan of how you can recover that lost device with a back-up
device that is ready to take the failed one’s place Fault tolerance is also known
as redundancy Having more than one network router is important, especially
if your company cannot conduct business as usual without network
connec-tivity Traffic policing and traffic contract are both incorrect answers because
these are terms used to describe how packets are allowed in/out of the network
and at what time Enforcing compliance with the traffic contract is how
traf-fic sources are aware of what traftraf-fic policy is in effect Network performance
optimization is simply assessing your network’s status on an ongoing basis
by monitoring and discovering network traffic and logs Data rates, available
bandwidth, WAN link status, backup time, device response rate, and
compo-nent failures are just a few of the things we need to keep tabs on to ensure the
network is optimized The methods in which we will use to discover
perfor-mance issues is through techniques called quality of service (QoS), traffic
shap-ing, load balancshap-ing, high availability, caching engines, and fault tolerance
What kind of network management documentation is displayed in
11
Figure 10.15?
A Logical network diagram
B Physical network diagram
C Wiring schematic
D Configuration management documentation
Correct answer and explanation: B Physical network diagram is correct
Physical network diagrams contain each physical device and physical connection
inside your network Clear and simple physical diagrams go a long way Depending
on your network size and complexity you might need the assistance of network
diagram software such as Microsoft Visio, SmartDraw, and/or AutoCAD
Incorrect answers and explanations: A, C, and D Logical network diagram
is incorrect because this type of configuration management documentation
depicts how your network looks from a computer’s point of view and not as a
physical structured layout as we might see it in our server rooms Protocols,
configurations, IP addressing, subnets, access control lists, security devices
Trang 7(firewalls, VPNs, and so on), and applications are all logically associated with
a computer network and are drawn into logical network diagrams Wiring schematic is incorrect because these are simple sketches that are created before and during installation of the physical media used for computers to talk to each other These schematics are also developed while troubleshoot-ing and deploytroubleshoot-ing new OSI layer 1 technology Configuration management documentation is incorrect because this is a term that refers to writing sche-matics, developing physical and logical network diagrams, establishing base-lines, creating policy, procedures, and configurations, and using regulations
FIGurE 10.15
Sample network diagram
(Permission granted by
Mark R Lindsey, mark@
lindsey.name)
Network management would be impossible without policies,
proce-12
dures, and configurations Calculated plan of action to guide decisions and achieve sound outcomes is the goal of creating and adhering to policies, procedures, and configurations Security vulnerabilities and network management challenges are the outcomes of badly written or nonexistent policies To prevent this, consider how network techni-cians create user accounts If each network technician created user accounts differently you would have a lot of problems troubleshooting user account issues because none of the accounts are configured from a standard guideline Policies provide guidelines on who can create user accounts, for instance Procedures are much more than guidelines Procedures lay out each step needed to accomplish a task For example, when creating a user account, the user ID may be the person’s last name and first initial and not to exceed eight characters Detailed steps with procedures help execute policies What is a common policy topic?
Trang 8A A specific layout of the wiring inside your network server room
B Detailed steps on how to configure network backups
C Procedures for installing load balancing software
D IP addressing scheme
Correct answer and explanation: D IP addressing scheme is the correct
answer because a policy provides guidelines on how to address an objective
or task
Incorrect answers and explanations: A, B, and C A specific layout of the
wiring inside your network server room, detailed steps on how to configure
network backups, and procedures for installing load balancing software are
incorrect because these are procedures which provide the detailed steps
nec-essary to carry out an objective
As a junior network engineer you want to find out why a Windows
13
application fails each time you open it You have four windows
open on your Windows XP workstation Which window is the one
you will use to see application errors?
FIGurE 10.16A
Sample Wireshark capture.
Trang 9FIGurE 10.16B
Sample PacketTrap Perspective capture (Permission granted by PacketTrap Perspective)
FIGurE 10.16C
Sample Event Viewer display.
Trang 10Correct answer and explanation: C The correct answer is Figure 10.16C,
the diagram of Windows XP Event Viewer On many systems, the logs may
be simple text files that are saved to a location on the local hard drive or
a network server In other cases, the system will provide a specific tool for
viewing the information For example, in Windows NT, 2000, 2003, and
XP, a tool called Event Viewer is used to view a series of logs generated by
the operating system As shown in Figure 10.11, Event Viewer allows you
to view data stored in the following: Application log – contains events that
are logged by individual programs or applications installed on the operating
system Security log – displays possible security issues that the operating
system monitors This includes valid and invalid logon attempts, the use of
a specific resource by an audited user, and other actions related to security
System log – displays events logged by the system components of the
operat-ing system Information stored in this log includes facts about drivers that
failed to load properly, warnings on low disk space and memory, remote
access attempts and other information on the system itself
Incorrect answers and explanations: A, B, and D Figure 10.16A is
incor-rect because this is a picture of a packet sniffer called Wireshark, a
net-work monitoring tool This tool allows you to capture netnet-work traffic for
further analysis on troubleshooting network issues Figure 10.16B is
incor-rect because this is a picture of a network baseline tool Figure 10.16D is
incorrect because this is a tool used for creating logical and physical network
diagrams; this tool is called Microsoft Visio.
FIGurE 10.16d
Sample diagram of a network.