Front
Back
What is SNMP used for in networking?
- Monitoring, configuring, and controlling network devices
- Assigning VLAN IDs
- Blocking unauthorized ports
- Encrypting wireless traffic
Answer: Monitoring, configuring, and controlling network devices
Practical Example: SNMP polls a router for interface statistics.
Key Objective: 3.2 – SNMP
Follow-up Question: What OSI layer does SNMP operate at?
What is the role of SNMP traps?
- To encrypt syslog traffic
- To update VLAN databases
- To send unsolicited alerts from devices to management stations
- To block suspicious IP addresses
Answer: To send unsolicited alerts from devices to management stations
Practical Example: A switch sends a trap when a port goes down unexpectedly.
Key Objective: 3.2 – SNMP Traps
Follow-up Question: How do SNMP traps differ from SNMP polling?
What is flow data in networking?
- A database of VLAN trunk configurations
- The actual content of each packet in a network stream
- A log of only wireless network connections
- Metadata about network traffic such as source/destination IPs, ports, and protocols
Answer: Metadata about network traffic such as source/destination IPs, ports, and protocols
Practical Example: NetFlow records show the most active IP addresses on a network segment.
Key Objective: 3.2 – Flow Data
Follow-up Question: How does flow data help identify unusual network activity?
What is one key use of flow data?
- Automating VLAN assignments
- Encrypting device configurations
- Reducing switch CPU usage
- Detecting traffic patterns, bandwidth usage, and potential threats
Answer: Detecting traffic patterns, bandwidth usage, and potential threats
Practical Example: An admin uses sFlow data to spot an unexpected bandwidth spike from a single IP.
Key Objective: 3.2 – Flow Data Uses
Follow-up Question: Why is flow data not sufficient for deep packet analysis?
What is packet capture (pcap)?
- The process of aggregating device logs
- The interception and logging of full network traffic
- The storage of SNMP MIB information
- The method of mirroring network ports for analysis
Answer: The interception and logging of full network traffic
Practical Example: Wireshark captures packets to diagnose a VoIP call quality issue.
Key Objective: 3.2 – Packet Capture
Follow-up Question: How does packet capture differ from flow data?
When would packet capture be preferred over flow data?
- When full packet content analysis is required for troubleshooting or security
- When setting baseline performance metrics
- When configuring VLAN trunks
- When only traffic patterns and bandwidth use are needed
Answer: When full packet content analysis is required for troubleshooting or security
Practical Example: Capturing HTTP payloads to investigate suspected data exfiltration.
Key Objective: 3.2 – Packet Capture vs Flow Data
Follow-up Question: What are the potential privacy risks of packet capture?
What are baseline metrics in network monitoring?
- The firmware version of a device
- The maximum bandwidth a device can handle
- The total uptime percentage for a device
- Standard performance measurements used for comparison
Answer: Standard performance measurements used for comparison
Practical Example: A baseline shows that normal CPU usage on a firewall is 20–30%.
Key Objective: 3.2 – Baseline Metrics
Follow-up Question: How are baselines used to detect performance issues?
Which is an example of a baseline metric?
- VLAN trunk encapsulation type
- Device firmware version
- Average daily traffic volume and normal error rate
- SNMP community string
Answer: Average daily traffic volume and normal error rate
Practical Example: Baselines reveal that a 5% packet loss is abnormal for the network.
Key Objective: 3.2 – Baseline Metric Examples
Follow-up Question: Why do baselines vary between different environments?
Why is establishing baseline metrics important?
- To identify deviations that may indicate problems
- To configure SNMP community strings
- To improve wireless signal strength
- To enable VLAN trunking
Answer: To identify deviations that may indicate problems
Practical Example: Baseline response times allow quick detection of a slow router.
Key Objective: 3.2 – Baseline Importance
Follow-up Question: What tools can be used to establish network baselines?
How are baseline metrics and anomaly alerting connected?
- Alerts replace the need for baseline metrics
- Alerts trigger when performance deviates from the established baseline
- Baselines are only used to calculate VLAN IDs
- Baselines are stored in SNMP MIBs
Answer: Alerts trigger when performance deviates from the established baseline
Practical Example: An NMS alerts the admin when latency doubles compared to the baseline.
Key Objective: 3.2 – Baseline & Alerts
Follow-up Question: Why is it important to periodically update baseline metrics?
What is the purpose of anomaly alerting in network monitoring?
- To store configuration backups
- To encrypt SNMP community strings
- To automatically notify admins of deviations from baseline performance
- To schedule network discovery
Answer: To automatically notify admins of deviations from baseline performance
Practical Example: An alert is sent when CPU usage spikes to 90% on a core switch.
Key Objective: 3.2 – Anomaly Alerting
Follow-up Question: Why is it important to tune alert thresholds carefully?
How does anomaly alerting support network integrity?
- By scheduling firmware updates
- By providing encryption for management traffic
- By replacing the need for baseline metrics
- By prompting timely intervention before minor issues escalate
Answer: By prompting timely intervention before minor issues escalate
Practical Example: Detecting a sudden increase in failed logins could indicate a brute-force attack.
Key Objective: 3.2 – Anomaly Alerting Benefits
Follow-up Question: What risks exist if alerts are too sensitive or too frequent?
What is log aggregation?
- Storing VLAN configurations in a database
- Collecting and consolidating log messages from multiple sources
- Distributing IP addresses via DHCP
- Capturing packet data for deep analysis
Answer: Collecting and consolidating log messages from multiple sources
Practical Example: A log aggregator pulls firewall, switch, and server logs into one central dashboard.
Key Objective: 3.2 – Log Aggregation
Follow-up Question: How does log aggregation improve troubleshooting efficiency?
Why is log aggregation important for security compliance?
- It provides a centralized record for auditing and analysis
- It increases bandwidth availability
- It encrypts syslog data in transit
- It replaces packet capture entirely
Answer: It provides a centralized record for auditing and analysis
Practical Example: A compliance audit checks centralized logs for unauthorized access attempts.
Key Objective: 3.2 – Log Aggregation Compliance
Follow-up Question: What retention policies should be considered for log storage?
What is a syslog collector?
- A tool that centralizes syslog messages from network devices
- A wireless signal analyzer
- A device that mirrors switch ports for analysis
- A protocol for encrypting SNMP data
Answer: A tool that centralizes syslog messages from network devices
Practical Example: A syslog collector gathers router logs to help pinpoint a routing loop issue.
Key Objective: 3.2 – Syslog Collector
Follow-up Question: How does a syslog collector differ from a SIEM system?
Why are syslog collectors essential for network management?
- They replace SNMP for device monitoring
- They improve wireless signal coverage
- They simplify monitoring by consolidating multiple log sources
- They automate VLAN creation
Answer: They simplify monitoring by consolidating multiple log sources
Practical Example: Syslog collectors allow faster correlation between firewall and intrusion detection system alerts.
Key Objective: 3.2 – Syslog Collector Use
Follow-up Question: What are some examples of popular syslog collector tools?
What is SIEM technology used for?
- Real-time analysis of security alerts and log data
- Detecting VLAN trunk negotiation issues
- Scheduling firmware updates
- Assigning IP addresses to new devices
Answer: Real-time analysis of security alerts and log data
Practical Example: A SIEM system correlates firewall and IDS alerts to identify a coordinated attack.
Key Objective: 3.2 – SIEM
Follow-up Question: How does SIEM differ from basic log aggregation?
What advantage does SIEM offer over traditional log analysis?
- It increases port throughput speeds
- It correlates data from multiple sources to detect complex threats
- It replaces the need for SNMP entirely
- It automatically patches vulnerable devices
Answer: It correlates data from multiple sources to detect complex threats
Practical Example: SIEM detects an attack by linking suspicious logins with firewall port scans.
Key Objective: 3.2 – SIEM Advantages
Follow-up Question: Why is SIEM important for proactive threat detection?
What is the role of API integration in network management?
- Automating configurations and enabling tool interoperability
- Encrypting syslog messages
- Detecting rogue wireless devices
- Assigning IP addresses
Answer: Automating configurations and enabling tool interoperability
Practical Example: An API integrates a monitoring system with a ticketing platform to automatically create tickets for alerts.
Key Objective: 3.2 – API Integration
Follow-up Question: How can APIs improve scalability in network operations?
Why are APIs important for modern network tools?
- They prevent VLAN misconfigurations
- They allow different systems to exchange data seamlessly
- They provide hardware redundancy
- They reduce Wi-Fi channel overlap
Answer: They allow different systems to exchange data seamlessly
Practical Example: A cloud management API enables centralized control over multiple branch routers.
Key Objective: 3.2 – API Benefits
Follow-up Question: What security considerations should be taken with open APIs?
What is port mirroring used for?
- Encrypting network backups
- Filtering out multicast traffic
- Sending copies of traffic from one port to another for analysis
- Assigning VLAN IDs automatically
Answer: Sending copies of traffic from one port to another for analysis
Practical Example: Port mirroring is used to send all traffic from a server port to a monitoring tool.
Key Objective: 3.2 – Port Mirroring
Follow-up Question: How does port mirroring support security monitoring?
How does port mirroring aid troubleshooting?
- By increasing port speeds
- By assigning static IPs
- By blocking untrusted devices
- By allowing analysis of live traffic without affecting performance
Answer: By allowing analysis of live traffic without affecting performance
Practical Example: Engineers capture mirrored traffic to diagnose an intermittent packet loss issue.
Key Objective: 3.2 – Port Mirroring Benefits
Follow-up Question: What’s the difference between port mirroring and a network tap?
What is ad hoc network discovery?
- Manually scanning the network when needed
- Scheduling automated scans
- Backing up configurations
- Mapping VLAN trunks
Answer: Manually scanning the network when needed
Practical Example: An engineer uses ad hoc discovery to quickly identify new devices added during a branch expansion.
Key Objective: 3.2 – Ad Hoc Network Discovery
Follow-up Question: When is ad hoc discovery preferable over scheduled discovery?