click below
click below
Normal Size Small Size show me how
IT Fundamentals
Block 1 Unit 8 - Mar 2023
Question | Answer |
---|---|
_________ __________ _________ are used by network administrators typically to monitor availability of network services, functionality of network interfaces, status of critical hardware systems, CPU, memory, or bandwidth. | Network Monitoring Systems (260) |
List three other statistics a NMS provides for servers and devices on a network. ___________________________________ | 1. Service or Device Availability 2. Network Response Time 3. Network Route Analytics (261) |
List five basic functions of the NMS | 1. Map 2. Monitor 3. Alert 4. Report 5. Deliver via Dashboards (265-269) |
Which basic function of the NMS is to find the devices on the network and how they are connected? ____________________________________________ | Discover (264) |
When a network monitoring system completes the discovery process, it automatically assigns an appropriate ______ _______ to each discovered device on the discovered ______ ______. | Device Role (264) and Device List (264) |
Device roles are _______ and ________ specific. | Type Vendor (264) |
Which basic function of the NMS is to visualize your network? _______________________ | Map (265) |
NMSs generate _______ _______, a powerful first response tool that enables network administrators to visualize their networks, display devices and up-to-date status. | Network Maps (265) |
Which basic function of the NMS keeps an eye on your network? ______________________ | Monitor (266) |
List the “big 5” network administrators want to monitor for any device on the network. _________________________ _________________________ ________________________ _________________________ _________________________ | 1. Ping 2. Availability and Latency 3. CPU 4. Memory 5. Disk and Interface Utilization (266) |
Which basic function of the NMS notifies network administrators when something goes wrong? ___________________________________________ | Alert (267) |
____________ based alerting enables network administrators to respond to problems before they impact users, or applications. | Threshold (267) |
___________ is an automated messaging system that sends messages when an event affects a network device. | Syslog (268) |
Which basic function of the NMS deals with real-time and historical reporting? ________________________________ | Report (268) |
NMSs deliver monitoring information in webpages called ____________ made up of ____________ views. | Dashboards made up of Turn-key views (269) |
A(n) _________ _________ _________ detects anomalies with the aim of catching hackers before they do real damage to a network. | Intrusion Detection System (271) |
IDSs ____, _____, and _______ the security infrastructure for signs of attacks in progress. | Scan, Audit, and Monitor (271) |
List two ways that IDSs work. ________________________ _________________________ | 1. Look for signatures of knows attacks 2. Look for deviations from normal activity (271) |
_______ is one of the most widely used protocols for monitoring. | Simple Network management Protocol (SNMP)(272) |
List the key functions of the SNMP management tool. | 1. Querying agents 2. Getting replies from agents 3. Establishing variables in agents 4. Recognizing asynchronous events (274) |
Objects queried by SNMP are maintained in a __________ __________ _____________. | Management Information Base (MIB)(275) |
What does a MIB define? | All the information that is exposed by the management device (275) |
The objects in a MIB are catalogued and has its own, unique ___________ ____________. | Object Identifier (275) |