1. Trang chủ
  2. » Công Nghệ Thông Tin

CompTIA Network+ Certification Study Guide part 75 doc

10 310 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 10
Dung lượng 323,03 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Configuration management documentation is the overall term used to describe writing schematics, developing physical and logical network diagrams, establishing baselines, creating policy,

Trang 1

and DMZ architecture, but not details on creating UTP cables Answer D is

incorrect because a server rack schematic would contain details about wires in

a particular rack, but typically not details on how to create the actual cables

As the network manager for a small ISP in Maryland serving over

4

2,000 customers across the eastern United States, you are in charge

of daily operations Your regional supervisor just received a phone call from corporate He asks you over the phone to develop a calculated plan of action to guide decisions and achieve sound outcomes that provide guidelines that the installation contractors will use on how to access the closest data center which will be the location that is outfit-ted with the latest load balancing technology What kind of document

is your regional supervisor asking you to create?

A Common management documentation

B Configuration management documentation

C Procedure

D Policy

Correct answer and explanation: D Policy is the correct answer because it

provides guidelines on how to address certain subjects Procedures are much more than guidelines Procedures lay out each step needed to accomplish a task For example, when creating a user account, the user ID may be the per-son’s last name and first initial and not to exceed eight characters Detailed steps with procedures help execute policies

Incorrect answers and explanations: A, B, and C Common management

documentation is incorrect because this term does not exist in network man-agement Configuration management documentation is the overall term used to describe writing schematics, developing physical and logical network diagrams, establishing baselines, creating policy, procedures, and configura-tions and using regulaconfigura-tions Procedure is incorrect because this document lays out each step needed to accomplish a task

The FCC reports on how businesses need to accommodate local

5

law enforcement with respect to investigating identify theft Since your brother-in-law is a state trooper he tells you all about this new FCC report and how it’s going to affect the whole town Two weeks pass and you don’t hear anything new from your brother-in-law You ring him up on your cell phone to find out why Soon after he picks up the phone he says, “Hey, don’t you work for that commer-cial telecommunications company on 3rd Avenue?” You pause and say, “Yes, I do.” “Well, tomorrow morning Sergeant Dave Simpson

is visiting your organization to investigate some cyber crime charges

Trang 2

on a local; are you prepared to help him when he arrives?” What

kind of configuration management documentation should you be

very familiar with in order to assist state and federal governments?

A Policy

B Regulation

C Procedure

D Logical network diagram

Correct answer and explanation: B Regulation is the correct answer

because they are important to plan and establish your local policies and

pro-cedures Many organizations are held to state and federal regulations which

will affect their responsibilities as a public/private, for-profit or not-for-profit

business Understanding what regulations your organization must adhere to

will help you manage how your network operates

Incorrect answers and explanations: A, C, and D Policy is incorrect

because it provides guidelines on how to address certain subjects Procedure

is incorrect because procedures lay out each step needed to accomplish a task

For example, when creating a user account, the user ID may be the person’s

last name and first initial and not to exceed eight characters Detailed steps

with procedures help execute policies Logical network diagram is incorrect

because this configuration management documentation depicts how your

network looks from a computer’s point of view and not as a physical

struc-tured layout as we might see it in the server rooms

Just as you arrive to work you get a phone call from that one user

6

who always gives you a hard time over some simple user error like

leaving their monitor off Well, this time the user cannot access her

favorite news Web site She tries and tries, but the Web site still

doesn’t come up You check her connectivity from her computer to

the switch; it’s good You ping her computer from your computer;

it’s good You now want to capture packets inbound and outbound

from her computer What network monitoring tool would you use

to complete this task?

A Event viewer

B Cache engine

C Packet sniffer

D Load balancing server

Correct answer and explanation: C Packet sniffer is the correct answer

Packet sniffing (a.k.a network monitoring) tools are used to capture network

traffic inbound and outbound from the device you have installed the packet

sniffing tool on

Trang 3

Incorrect answers and explanations: A, B, and D Event viewer is incorrect

because this tool is used to display logging information for local and remote computers Cache engine is incorrect because these are servers dedicated

to caching data for clients Usually these servers have a database where the cache is stored and upon request is given to the local host If the cache is not used often enough it is discarded until the client accesses it again Load bal-ancing server is incorrect because a load balbal-ancing device distributes incom-ing network traffic to multiple devices to share the traffic load when there is

a consistent peak in traffic rate

You want to control and optimize the network traffic coming into

7

your domain, but your boss just does not see why load balancing

is not helping What technique will assist your boss in increasing usable bandwidth and lowering latency?

A Traffic shaping

B Load balancing

C High availability

D Jitter

Correct answer and explanation: A Traffic shaping is the correct answer

because this is a common term used to describe the control of computer

net-work traffic to optimize for peak performance, also known as packet shap-ing Increasing usable bandwidth and lowering latency are the goals of traffic

shaping This technique is employed by specifying what traffic at what rate (rate limiting) in a span of time (bandwidth throttling) you are going to allow

in or out of your network

Incorrect answers and explanations: B, C, D Load balancing is incorrect

because this is a technique employed on computer networks to distribute the incoming traffic upon other network devices if there are indications of increased network traffic or “load.” High availability is incorrect because high availability is a system design protocol which once implemented assures a specific degree of uptime continuity in a specific period of time The goal of high availability is to ensure that users have the maximum uptime so they can access network resources anytime and anywhere Jitter is incorrect because jitter is the variation in packet delay when there are delays in transit

You’re VoIP phone rings You pick it up and say, “Hello?” You listen

8

very closely but all you can hear is broken speech as if someone

is talking very slowly but the words are not coming out right You notice your VoIP switch is blinking red and you open up a com-mand console to your VoIP switch to see why Looks like there is a problem with your switch and it is not prioritizing your VoIP traffic

Trang 4

above all else What kind of service do you need to enable to ensure

VoIP has the highest priority to ensure your VoIP packets are sent

and received first?

A Quality of Service

B Dropped

C Delay

D Jitter

Correct answer and explanation: A Quality of Service (QoS) is the

cor-rect answer because QoS is a measure of value of a network service (that is

VoIP) compared to the expected or predicted performance quality that

net-work service is actually producing on your netnet-work By enabling QoS for VoIP

you can ensure that voice echoing in the background or other delays are not

occurring

Incorrect answers and explanations: B, C, and D Dropped, delay, and

jitter are incorrect because each of these are problems that occur if QoS is

not used Dropped packets – The routers might fail to deliver (drop) some

packets if they arrive when their buffers are already full Some, none, or all of

the packets might be dropped, depending on the state of the network, and it

is impossible to determine what will happen in advance The receiving

appli-cation may ask for this information to be retransmitted, possibly causing

severe delays in the overall transmission Delay/Latency – As VoIP is a

real-time application of voice services, any delay would reduce the transmission

thereby making it impossible to understand the other person on the distant

end Overcrowded data links on routers in the transit path of your packets

could result in a delay of data packets Long queues or indirect routes

avoid-ing congestion might be some causes of latency within your VoIP network

Jitter – The Internet is a complex mesh of interconnected routers connected

across the world There is no single path to a given destination In fact some

packets travel completely different paths and end up at the same destination

When there are delays in transit, some packets leaving after others might

arrive at the destination first This variation in packet delay is called “jitter.”

Applications like VoIP cannot effectively be used if jitter is occurring

You are working for Google™ as an intern for the summer You

9

have always wondered how googling occurred on the back end of

all those servers You ask your supervisor what technique they use

to distribute incoming traffic onto other servers when the traffic

load became overbearing for one single server What technique does

your supervisor tell you that Google™ uses to allow for a group of

computers in a cluster to share traffic load?

Trang 5

A Traffic shaping

B Load balancing

C High availability

D Packet shaping

Correct answer and explanation: B Load balancing is the correct answer

Load balancing is a technique employed on computer networks to distribute the incoming traffic upon other network devices if there are indications of increased network traffic or “load.” Load balancing allows a group or cluster

of data center servers to share the inbound traffic all the while seeming as

if there actually is only one external connection to the Internet In a typical network configured for load balancing, once traffic comes into the network via the one external entry point, it is distributed among other servers inter-nally connected to share the high traffic volumes

Incorrect answers and explanations: A, C, and D Traffic shaping, high

availability, and packet shaping do not distribute incoming network traffic to other computer devices Another common term used to describe the control

of computer network traffic to optimize for peak performance is packet shap-ing Increasing usable bandwidth and lowering latency are the goals of traffic

shaping This technique is employed by specifying what traffic at what rate (rate limiting) in a span of time (bandwidth throttling) you are going to allow

in or out of your network More common is the use of traffic shaping at the border routers (those bordering your network’s perimeter) for delaying enter-ing network traffic High availability is a system design protocol which once implemented assures a specific degree of uptime continuity in a specific period

of time The goal of high availability is to ensure that users have the maxi-mum uptime so they can access network resources anytime and anywhere

You were just promoted to network operations manager for your

10

division called Customer Data Center Compliance You have worked at DataFirst, Inc for more than 10 years and you expected the promotion; otherwise you were planning to take a job with MicroServer LLC As you sit down at your new desk, with a win-dow view, you get a phone call from one of your subordinates Bob, who now works for you, is fielding a customer’s question about being able to access Internet Web sites quicker than just redown-loading it each time he visits it You think really hard and tell Bob that he needs what?

A Network performance optimization

B Traffic policing

C Fault tolerance

D Cache engines

Trang 6

Correct answer and explanation: D Cache engines is the correct answer

because they copy from the original data and it is saved for computers to

access locally instead of having to retrieve the same data again from the

Internet This allows the clients to access this “cached” data quicker since it

is stored in a temporary location for a specific amount of time Usually the

time is configured by network administrators to allow for the best

perfor-mance Cache engines are servers dedicated to caching data for clients

Incorrect answers and explanations: A, B, and C Fault tolerance is incorrect

because fault tolerance refers to what you have in place in the case of a network

failure and the plan of how you can recover that lost device with a back-up

device that is ready to take the failed one’s place Fault tolerance is also known

as redundancy Having more than one network router is important, especially

if your company cannot conduct business as usual without network

connec-tivity Traffic policing and traffic contract are both incorrect answers because

these are terms used to describe how packets are allowed in/out of the network

and at what time Enforcing compliance with the traffic contract is how

traf-fic sources are aware of what traftraf-fic policy is in effect Network performance

optimization is simply assessing your network’s status on an ongoing basis

by monitoring and discovering network traffic and logs Data rates, available

bandwidth, WAN link status, backup time, device response rate, and

compo-nent failures are just a few of the things we need to keep tabs on to ensure the

network is optimized The methods in which we will use to discover

perfor-mance issues is through techniques called quality of service (QoS), traffic

shap-ing, load balancshap-ing, high availability, caching engines, and fault tolerance

What kind of network management documentation is displayed in

11

Figure 10.15?

A Logical network diagram

B Physical network diagram

C Wiring schematic

D Configuration management documentation

Correct answer and explanation: B Physical network diagram is correct

Physical network diagrams contain each physical device and physical connection

inside your network Clear and simple physical diagrams go a long way Depending

on your network size and complexity you might need the assistance of network

diagram software such as Microsoft Visio, SmartDraw, and/or AutoCAD

Incorrect answers and explanations: A, C, and D Logical network diagram

is incorrect because this type of configuration management documentation

depicts how your network looks from a computer’s point of view and not as a

physical structured layout as we might see it in our server rooms Protocols,

configurations, IP addressing, subnets, access control lists, security devices

Trang 7

(firewalls, VPNs, and so on), and applications are all logically associated with

a computer network and are drawn into logical network diagrams Wiring schematic is incorrect because these are simple sketches that are created before and during installation of the physical media used for computers to talk to each other These schematics are also developed while troubleshoot-ing and deploytroubleshoot-ing new OSI layer 1 technology Configuration management documentation is incorrect because this is a term that refers to writing sche-matics, developing physical and logical network diagrams, establishing base-lines, creating policy, procedures, and configurations, and using regulations

FIGurE 10.15

Sample network diagram

(Permission granted by

Mark R Lindsey, mark@

lindsey.name)

Network management would be impossible without policies,

proce-12

dures, and configurations Calculated plan of action to guide decisions and achieve sound outcomes is the goal of creating and adhering to policies, procedures, and configurations Security vulnerabilities and network management challenges are the outcomes of badly written or nonexistent policies To prevent this, consider how network techni-cians create user accounts If each network technician created user accounts differently you would have a lot of problems troubleshooting user account issues because none of the accounts are configured from a standard guideline Policies provide guidelines on who can create user accounts, for instance Procedures are much more than guidelines Procedures lay out each step needed to accomplish a task For example, when creating a user account, the user ID may be the person’s last name and first initial and not to exceed eight characters Detailed steps with procedures help execute policies What is a common policy topic?

Trang 8

A A specific layout of the wiring inside your network server room

B Detailed steps on how to configure network backups

C Procedures for installing load balancing software

D IP addressing scheme

Correct answer and explanation: D IP addressing scheme is the correct

answer because a policy provides guidelines on how to address an objective

or task

Incorrect answers and explanations: A, B, and C A specific layout of the

wiring inside your network server room, detailed steps on how to configure

network backups, and procedures for installing load balancing software are

incorrect because these are procedures which provide the detailed steps

nec-essary to carry out an objective

As a junior network engineer you want to find out why a Windows

13

application fails each time you open it You have four windows

open on your Windows XP workstation Which window is the one

you will use to see application errors?

FIGurE 10.16A

Sample Wireshark capture.

Trang 9

FIGurE 10.16B

Sample PacketTrap Perspective capture (Permission granted by PacketTrap Perspective)

FIGurE 10.16C

Sample Event Viewer display.

Trang 10

Correct answer and explanation: C The correct answer is Figure 10.16C,

the diagram of Windows XP Event Viewer On many systems, the logs may

be simple text files that are saved to a location on the local hard drive or

a network server In other cases, the system will provide a specific tool for

viewing the information For example, in Windows NT, 2000, 2003, and

XP, a tool called Event Viewer is used to view a series of logs generated by

the operating system As shown in Figure 10.11, Event Viewer allows you

to view data stored in the following: Application log – contains events that

are logged by individual programs or applications installed on the operating

system Security log – displays possible security issues that the operating

system monitors This includes valid and invalid logon attempts, the use of

a specific resource by an audited user, and other actions related to security

System log – displays events logged by the system components of the

operat-ing system Information stored in this log includes facts about drivers that

failed to load properly, warnings on low disk space and memory, remote

access attempts and other information on the system itself

Incorrect answers and explanations: A, B, and D Figure 10.16A is

incor-rect because this is a picture of a packet sniffer called Wireshark, a

net-work monitoring tool This tool allows you to capture netnet-work traffic for

further analysis on troubleshooting network issues Figure 10.16B is

incor-rect because this is a picture of a network baseline tool Figure 10.16D is

incorrect because this is a tool used for creating logical and physical network

diagrams; this tool is called Microsoft Visio.

FIGurE 10.16d

Sample diagram of a network.

Ngày đăng: 04/07/2014, 13:21