3.1 Flashcards

(41 cards)

1
Q

Front

A

Back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the main purpose of a physical network diagram?

  • To show the flow of data between devices
  • To illustrate physical connections and device locations
  • To display network security policies
  • To list all installed software
A

Answer: To illustrate physical connections and device locations
Practical Example: A physical diagram shows where routers, switches, and firewalls are located in a building, making hardware maintenance easier.
Key Objective: 3.1 – Documentation
Follow-up Question: Why is a physical diagram useful during hardware relocation?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which details are typically included in a physical network diagram?

  • Device names, IP addresses, logical paths
  • Cable types, device models, physical port connections
  • VLAN configurations and routing protocols
  • Service-level agreement terms
A

Answer: Cable types, device models, physical port connections
Practical Example: A data center’s physical diagram includes rack numbers, switch models, and fiber/copper cabling routes.
Key Objective: 3.1 – Documentation
Follow-up Question: How can including cable types improve troubleshooting?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the main purpose of a logical network diagram?

  • To show the layout of server racks
  • To illustrate how data flows and devices communicate
  • To document hardware warranty dates
  • To list cabling types used in the network
A

Answer: To illustrate how data flows and devices communicate
Practical Example: A logical diagram shows VLANs, IP subnets, and routing paths between departments in a corporate network.
Key Objective: 3.1 – Documentation
Follow-up Question: Why might a logical diagram not match the physical diagram?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which information is typically found in a logical network diagram?

  • Device models and physical cable paths
  • VLAN IDs, subnets, routing protocols
  • Patch panel port labels
  • Software license expiration dates
A

Answer: VLAN IDs, subnets, routing protocols
Practical Example: A logical diagram shows that VLAN 20 handles voice traffic, VLAN 30 handles data, and OSPF routes traffic between them.
Key Objective: 3.1 – Documentation
Follow-up Question: How does a logical diagram help with network segmentation planning?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the key difference between physical and logical network diagrams?

  • Physical diagrams focus on devices and cabling, logical diagrams focus on data flow and configurations
  • Physical diagrams show data flow, logical diagrams show hardware
  • Physical diagrams only show Layer 3 info, logical diagrams only show Layer 1 info
  • Physical diagrams are for security, logical diagrams are for compliance
A

Answer: Physical diagrams focus on devices and cabling, logical diagrams focus on data flow and configurations
Practical Example: In a troubleshooting session, the physical diagram shows where a switch is located; the logical diagram shows its VLAN assignments.
Key Objective: 3.1 – Documentation
Follow-up Question: Why is it important to maintain both diagrams?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the main purpose of a rack diagram?

  • To document IP address allocations
  • To show equipment placement within a rack for organization and airflow
  • To record device firmware versions
  • To display Wi-Fi signal strength
A

Answer: To show equipment placement within a rack for organization and airflow
Practical Example: A rack diagram shows that patch panels are placed at the top, switches in the middle, and servers at the bottom for efficient cabling.
Key Objective: 3.1 – Documentation
Follow-up Question: How can a rack diagram help during equipment upgrades?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can a rack diagram assist with airflow planning?

  • By showing data flow between switches
  • By indicating hot and cold air zones in rack layout
  • By tracking warranty expirations
  • By labeling VLAN assignments
A

Answer: By indicating hot and cold air zones in rack layout
Practical Example: A rack diagram shows front-to-back airflow for all devices, allowing placement in hot aisle/cold aisle configurations.
Key Objective: 3.1 – Documentation
Follow-up Question: Why is airflow management critical in dense server racks?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of cable maps and diagrams?

  • To track IP address assignments
  • To document cable connections, pathways, and topology
  • To monitor wireless signal strength
  • To display firewall rules
A

Answer: To document cable connections, pathways, and topology
Practical Example: A cable map shows that a workstation port in Room 204 is patched to Switch 3, Port 12 in the IDF.
Key Objective: 3.1 – Documentation
Follow-up Question: How can cable maps speed up troubleshooting during network outages?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is it important to maintain accurate and updated cable maps?

  • To improve wireless coverage
  • To speed up installation, troubleshooting, and upgrades
  • To track software licenses
  • To reduce rack temperature
A

Answer: To speed up installation, troubleshooting, and upgrades
Practical Example: Updated cable maps allow a technician to trace a faulty connection quickly without testing every cable.
Key Objective: 3.1 – Documentation
Follow-up Question: What problems can arise from outdated cable maps?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the focus of a Layer 1 network diagram?

  • Physical devices, cabling, and locations
  • VLAN configurations and IP subnets
  • Firewall rules and ACLs
  • Routing protocols
A

Answer: Physical devices, cabling, and locations
Practical Example: A Layer 1 diagram shows the physical connections between switches in two buildings.
Key Objective: 3.1 – Documentation
Follow-up Question: How does a Layer 1 diagram differ from a Layer 3 diagram?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the focus of a Layer 2 network diagram?

  • Physical cable paths and rack layouts
  • Switch connections, VLAN information, and Ethernet frame paths
  • IP addressing and routing tables
  • Software license details
A

Answer: Switch connections, VLAN information, and Ethernet frame paths
Practical Example: A Layer 2 diagram shows how VLAN 10 spans multiple switches via trunk ports.
Key Objective: 3.1 – Documentation
Follow-up Question: Why is VLAN information important in a Layer 2 diagram?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the focus of a Layer 3 network diagram?

  • Routing, IP addresses, and subnets
  • Device models and serial numbers
  • Cabling types and lengths
  • Airflow patterns in server racks
A

Answer: Routing, IP addresses, and subnets
Practical Example: A Layer 3 diagram shows OSPF routing between three office locations, with subnet ranges labeled.
Key Objective: 3.1 – Documentation
Follow-up Question: How does a Layer 3 diagram help with network expansion planning?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of a hardware asset inventory?

  • To track physical devices and their specifications
  • To monitor IP address assignments
  • To map VLAN IDs
  • To manage wireless coverage
A

Answer: To track physical devices and their specifications
Practical Example: A hardware inventory lists all switches, including their models, locations, and firmware versions.
Key Objective: 3.1 – Asset Inventory
Follow-up Question: Why is hardware inventory important for lifecycle management?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which details are typically recorded in a hardware inventory?

  • VLAN IDs and routing protocols
  • Device model, serial number, location, and condition
  • Software patch history
  • Airflow patterns in racks
A

Answer: Device model, serial number, location, and condition
Practical Example: An inventory spreadsheet shows that Switch 5 is a Cisco 2960, located in Rack B2, in good condition.
Key Objective: 3.1 – Asset Inventory
Follow-up Question: How can this information assist during equipment replacement?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of a software inventory in network management?

  • To document installed applications, versions, and configurations
  • To track physical cable routes
  • To plan rack layouts
  • To assign IP addresses
A

Answer: To document installed applications, versions, and configurations
Practical Example: A software inventory lists firewall firmware versions to ensure they’re updated for security compliance.
Key Objective: 3.1 – Asset Inventory
Follow-up Question: Why is software inventory important for security patching?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What information is typically tracked in a software inventory?

  • VLAN IDs and trunk configurations
  • Application name, version, installation date, configuration details
  • Device model and condition
  • Cable type and length
A

Answer: Application name, version, installation date, configuration details
Practical Example: The software inventory for a router includes its OS version, feature licenses, and installation date.
Key Objective: 3.1 – Asset Inventory
Follow-up Question: How can software inventory assist during an OS upgrade?

18
Q

What is the main purpose of licensing management in networking?

  • To avoid legal and financial penalties and ensure compliance with software use rights
  • To track VLAN IDs
  • To monitor wireless coverage
  • To record cable pathways
A

Answer: To avoid legal and financial penalties and ensure compliance with software use rights
Practical Example: A network admin uses a licensing database to track firewall software license expiration dates to prevent service disruption.
Key Objective: 3.1 – Asset Inventory
Follow-up Question: How can automated license tracking tools help organizations?

19
Q

What risks arise from poor licensing management?

  • Reduced rack airflow
  • Increased legal, financial, and operational risks
  • Increased VLAN overlap
  • Slower wireless speeds
A

Answer: Increased legal, financial, and operational risks
Practical Example: An expired security software license leaves the network vulnerable to malware attacks.
Key Objective: 3.1 – Asset Inventory
Follow-up Question: How can licensing management improve security compliance?

20
Q

Why is warranty and support tracking important for network devices?

  • It ensures timely access to vendor repair and replacement services
  • It reduces the need for VLAN documentation
  • It eliminates the need for backup configurations
  • It improves wireless coverage
A

Answer: It ensures timely access to vendor repair and replacement services
Practical Example: When a switch fails, warranty records allow IT to quickly request a replacement from the vendor.
Key Objective: 3.1 – Asset Inventory
Follow-up Question: How can warranty tracking reduce downtime?

21
Q

How can warranty information assist in network repairs?

  • By identifying devices eligible for free or expedited repair/replacement
  • By providing VLAN assignments
  • By indicating cable pathways
  • By monitoring firmware versions
A

Answer: By identifying devices eligible for free or expedited repair/replacement
Practical Example: Warranty records show a failed firewall is still under coverage, allowing for immediate manufacturer replacement.
Key Objective: 3.1 – Asset Inventory
Follow-up Question: Why is it important to update warranty records after purchasing new hardware?

22
Q

What is the purpose of IP Address Management (IPAM)?

  • To track, organize, and manage IP address space within a network
  • To monitor rack airflow
  • To plan wireless access point placement
  • To document software license terms
A

Answer: To track, organize, and manage IP address space within a network
Practical Example: An IPAM tool prevents duplicate IP assignments by showing all active and available addresses.
Key Objective: 3.1 – IP Address Management
Follow-up Question: How can IPAM help during network expansion?

23
Q

How does IPAM prevent IP conflicts?

  • By showing wireless signal coverage
  • By providing a clear record of allocated and available IPs
  • By monitoring rack airflow patterns
  • By tracking VLAN IDs
A

Answer: By providing a clear record of allocated and available IPs
Practical Example: IPAM detects when two devices are assigned the same IP, allowing quick resolution before downtime occurs.
Key Objective: 3.1 – IP Address Management
Follow-up Question: How can IPAM integration with DHCP improve efficiency?

24
Q

How does IPAM integrate with DHCP and DNS?

  • It syncs IP assignments, leases, and name records for accurate tracking
  • It manages VLAN trunking
  • It monitors cable labeling
  • It provides firmware version history
A

Answer: It syncs IP assignments, leases, and name records for accurate tracking
Practical Example: When DHCP assigns a new IP, IPAM logs it and updates DNS with the hostname.
Key Objective: 3.1 – IP Address Management
Follow-up Question: Why is DNS integration important in IPAM?

25
What is the purpose of a Service-level Agreement (SLA)? - To define service expectations, performance metrics, and remedies for breaches - To plan cable pathways - To document rack airflow - To assign VLAN IDs
Answer: To define service expectations, performance metrics, and remedies for breaches Practical Example: An SLA specifies that an ISP must maintain 99.9% uptime, with penalties for extended outages. Key Objective: 3.1 – Service-level Agreement Follow-up Question: What is one common performance metric in an SLA?
26
What is the purpose of a wireless survey? - To assess coverage and performance of a wireless network in a given area - To plan VLAN assignments - To document cable pathways - To track license expirations
Answer: To assess coverage and performance of a wireless network in a given area Practical Example: A wireless survey reveals that the break room has weak Wi-Fi coverage, prompting the installation of another access point. Key Objective: 3.1 – Wireless Survey and Heat Map Follow-up Question: Why is it important to perform a wireless survey before deploying new APs?
27
What does a wireless heat map show? - The IP addresses of all network devices - The physical location of VLAN trunks - The signal strength and coverage of wireless networks - The licensing status of network software
Answer: The signal strength and coverage of wireless networks Practical Example: A heat map shows green zones with strong signal, yellow zones with moderate signal, and red zones with poor coverage. Key Objective: 3.1 – Wireless Survey and Heat Map Follow-up Question: How can heat maps help improve Wi-Fi reliability?
28
What is the goal of life-cycle management in networking? - To oversee network equipment from acquisition to disposal - To monitor rack airflow - To map VLANs - To document firewall rules
Answer: To oversee network equipment from acquisition to disposal Practical Example: A switch is tracked from purchase, through regular firmware updates, until it is securely decommissioned. Key Objective: 3.1 – Life-cycle Management Follow-up Question: How can life-cycle management improve budget planning?
29
What does End-of-Life (EOL) mean for network equipment? - The vendor stops manufacturing and selling the product - The product is incompatible with VLANs - The device cannot be racked properly - The device reaches maximum IP capacity
Answer: The vendor stops manufacturing and selling the product Practical Example: Cisco announces EOL for a router model, prompting the company to plan for replacements before spare parts become scarce. Key Objective: 3.1 – Life-cycle Management Follow-up Question: Why is it risky to keep using EOL equipment?
30
What does End-of-Support (EOS) mean for a network product? - The vendor stops providing updates and technical assistance - The product becomes wireless-only - The device must be relocated to the MDF - The VLANs must be reassigned
Answer: The vendor stops providing updates and technical assistance Practical Example: After EOS, a firewall no longer receives security patches, increasing vulnerability to cyberattacks. Key Objective: 3.1 – Life-cycle Management Follow-up Question: How does EOS affect network security?
31
Why is patch and bug fix management important in networking? - To address vulnerabilities, improve functionality, and prevent breaches - To improve cable labeling accuracy - To increase rack airflow - To avoid EOL notifications
Answer: To address vulnerabilities, improve functionality, and prevent breaches Practical Example: A patch fixes a critical flaw in a router’s firmware that hackers could exploit. Key Objective: 3.1 – Software Management Follow-up Question: What risks arise from delaying security patches?
32
Why is firmware management important for network devices? - To ensure reliability, security, and optimal hardware performance - To map VLAN trunks - To monitor rack airflow - To track IP addresses
Answer: To ensure reliability, security, and optimal hardware performance Practical Example: Updating switch firmware fixes a bug causing random port shutdowns. Key Objective: 3.1 – Software Management Follow-up Question: Why should firmware updates be scheduled carefully?
33
What is the purpose of a baseline/golden configuration? - To serve as an approved template for deploying or restoring devices - To track warranty periods - To plan rack layouts - To manage VLAN assignments
Answer: To serve as an approved template for deploying or restoring devices Practical Example: When a router’s config becomes corrupted, the golden configuration is restored to quickly bring it back online. Key Objective: 3.1 – Configuration Management Follow-up Question: How can a baseline configuration speed up new device deployment?
34
What is the purpose of change management in networking? - To handle network changes systematically, reducing service disruption - To track software license renewals - To plan rack airflow patterns - To manage VLAN assignments
Answer: To handle network changes systematically, reducing service disruption Practical Example: Before replacing a core switch, a change management plan is created to schedule downtime, notify users, and test post-installation. Key Objective: 3.1 – Change Management Follow-up Question: How can change management reduce the risk of failed upgrades?
35
What is request process tracking in change management? - Logging, progressing, and analyzing change requests - Mapping physical cable routes - Monitoring wireless heat maps - Updating firmware
Answer: Logging, progressing, and analyzing change requests Practical Example: A technician submits a change request to add a new VLAN; the request is tracked until completion and documented for auditing. Key Objective: 3.1 – Change Management Follow-up Question: Why is request tracking important for accountability?
36
What is configuration management in networking? - Maintaining and controlling all hardware and software configurations - Documenting wireless access point placement - Managing cable inventories - Planning rack airflow
Answer: Maintaining and controlling all hardware and software configurations Practical Example: Configuration management ensures all switches use the same security settings to meet compliance requirements. Key Objective: 3.1 – Configuration Management Follow-up Question: How does configuration management help during troubleshooting?
37
What is a production configuration? - The active settings in use on network devices in the operational environment - The baseline configuration stored for deployment - The backup copy of device settings - The firmware update schedule
Answer: The active settings in use on network devices in the operational environment Practical Example: The production configuration on a router defines its current routing protocols and ACLs. Key Objective: 3.1 – Configuration Management Follow-up Question: Why is it important to monitor production configurations regularly?
38
What is a backup configuration? - A stored copy of device settings used to restore operations after an issue - The set of VLAN IDs currently assigned in the network - The layout of cable trays - The firmware version history
Answer: A stored copy of device settings used to restore operations after an issue Practical Example: A backup configuration file is loaded onto a replacement switch to restore it to its previous state. Key Objective: 3.1 – Configuration Management Follow-up Question: How often should backup configurations be updated?
39
Why are backup configurations important in network management? - They minimize downtime after failures by enabling quick restoration - They track warranty periods - They help plan wireless coverage - They document rack layouts
Answer: They minimize downtime after failures by enabling quick restoration Practical Example: When a switch is damaged by a power surge, the backup configuration is used to bring the replacement online quickly. Key Objective: 3.1 – Configuration Management Follow-up Question: What could happen if backup configurations are outdated?
40
How does a baseline configuration differ from a production configuration? - Baseline is a template; production is the active settings in use - Baseline is backup; production is firmware - Baseline is VLAN map; production is cable map - Baseline is rack airflow; production is wireless coverage
Answer: Baseline is a template; production is the active settings in use Practical Example: The baseline defines standard security settings; the production config may include temporary changes for troubleshooting. Key Objective: 3.1 – Configuration Management Follow-up Question: Why is it important to align production with the baseline configuration?
41
What is the purpose of decommissioning network assets? - To securely remove outdated equipment while protecting data and the environment - To plan VLAN assignments - To update firmware - To document rack airflow patterns
Answer: To securely remove outdated equipment while protecting data and the environment Practical Example: Before recycling an old firewall, all configuration data is wiped, and the hardware is sent to an e-waste facility. Key Objective: 3.1 – Decommissioning Follow-up Question: Why is secure data removal essential during decommissioning?