Objective 3.2 Flashcards

(54 cards)

1
Q

Front

A

Back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is SNMP used for in networking?
- Monitoring, configuring, and controlling network devices
- Assigning VLAN IDs
- Blocking unauthorized ports
- Encrypting wireless traffic

A

Answer: Monitoring, configuring, and controlling network devices
Practical Example: SNMP polls a router for interface statistics.
Key Objective: 3.2 – SNMP
Follow-up Question: What OSI layer does SNMP operate at?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the role of SNMP traps?
- To encrypt syslog traffic
- To update VLAN databases
- To send unsolicited alerts from devices to management stations
- To block suspicious IP addresses

A

Answer: To send unsolicited alerts from devices to management stations
Practical Example: A switch sends a trap when a port goes down unexpectedly.
Key Objective: 3.2 – SNMP Traps
Follow-up Question: How do SNMP traps differ from SNMP polling?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is flow data in networking?
- A database of VLAN trunk configurations
- The actual content of each packet in a network stream
- A log of only wireless network connections
- Metadata about network traffic such as source/destination IPs, ports, and protocols

A

Answer: Metadata about network traffic such as source/destination IPs, ports, and protocols
Practical Example: NetFlow records show the most active IP addresses on a network segment.
Key Objective: 3.2 – Flow Data
Follow-up Question: How does flow data help identify unusual network activity?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is one key use of flow data?
- Automating VLAN assignments
- Encrypting device configurations
- Reducing switch CPU usage
- Detecting traffic patterns, bandwidth usage, and potential threats

A

Answer: Detecting traffic patterns, bandwidth usage, and potential threats
Practical Example: An admin uses sFlow data to spot an unexpected bandwidth spike from a single IP.
Key Objective: 3.2 – Flow Data Uses
Follow-up Question: Why is flow data not sufficient for deep packet analysis?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is packet capture (pcap)?
- The process of aggregating device logs
- The interception and logging of full network traffic
- The storage of SNMP MIB information
- The method of mirroring network ports for analysis

A

Answer: The interception and logging of full network traffic
Practical Example: Wireshark captures packets to diagnose a VoIP call quality issue.
Key Objective: 3.2 – Packet Capture
Follow-up Question: How does packet capture differ from flow data?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When would packet capture be preferred over flow data?
- When full packet content analysis is required for troubleshooting or security
- When setting baseline performance metrics
- When configuring VLAN trunks
- When only traffic patterns and bandwidth use are needed

A

Answer: When full packet content analysis is required for troubleshooting or security
Practical Example: Capturing HTTP payloads to investigate suspected data exfiltration.
Key Objective: 3.2 – Packet Capture vs Flow Data
Follow-up Question: What are the potential privacy risks of packet capture?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are baseline metrics in network monitoring?
- The firmware version of a device
- The maximum bandwidth a device can handle
- The total uptime percentage for a device
- Standard performance measurements used for comparison

A

Answer: Standard performance measurements used for comparison
Practical Example: A baseline shows that normal CPU usage on a firewall is 20–30%.
Key Objective: 3.2 – Baseline Metrics
Follow-up Question: How are baselines used to detect performance issues?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which is an example of a baseline metric?
- VLAN trunk encapsulation type
- Device firmware version
- Average daily traffic volume and normal error rate
- SNMP community string

A

Answer: Average daily traffic volume and normal error rate
Practical Example: Baselines reveal that a 5% packet loss is abnormal for the network.
Key Objective: 3.2 – Baseline Metric Examples
Follow-up Question: Why do baselines vary between different environments?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is establishing baseline metrics important?
- To identify deviations that may indicate problems
- To configure SNMP community strings
- To improve wireless signal strength
- To enable VLAN trunking

A

Answer: To identify deviations that may indicate problems
Practical Example: Baseline response times allow quick detection of a slow router.
Key Objective: 3.2 – Baseline Importance
Follow-up Question: What tools can be used to establish network baselines?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How are baseline metrics and anomaly alerting connected?
- Alerts replace the need for baseline metrics
- Alerts trigger when performance deviates from the established baseline
- Baselines are only used to calculate VLAN IDs
- Baselines are stored in SNMP MIBs

A

Answer: Alerts trigger when performance deviates from the established baseline
Practical Example: An NMS alerts the admin when latency doubles compared to the baseline.
Key Objective: 3.2 – Baseline & Alerts
Follow-up Question: Why is it important to periodically update baseline metrics?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of anomaly alerting in network monitoring?
- To store configuration backups
- To encrypt SNMP community strings
- To automatically notify admins of deviations from baseline performance
- To schedule network discovery

A

Answer: To automatically notify admins of deviations from baseline performance
Practical Example: An alert is sent when CPU usage spikes to 90% on a core switch.
Key Objective: 3.2 – Anomaly Alerting
Follow-up Question: Why is it important to tune alert thresholds carefully?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does anomaly alerting support network integrity?
- By scheduling firmware updates
- By providing encryption for management traffic
- By replacing the need for baseline metrics
- By prompting timely intervention before minor issues escalate

A

Answer: By prompting timely intervention before minor issues escalate
Practical Example: Detecting a sudden increase in failed logins could indicate a brute-force attack.
Key Objective: 3.2 – Anomaly Alerting Benefits
Follow-up Question: What risks exist if alerts are too sensitive or too frequent?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is log aggregation?
- Storing VLAN configurations in a database
- Collecting and consolidating log messages from multiple sources
- Distributing IP addresses via DHCP
- Capturing packet data for deep analysis

A

Answer: Collecting and consolidating log messages from multiple sources
Practical Example: A log aggregator pulls firewall, switch, and server logs into one central dashboard.
Key Objective: 3.2 – Log Aggregation
Follow-up Question: How does log aggregation improve troubleshooting efficiency?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why is log aggregation important for security compliance?
- It provides a centralized record for auditing and analysis
- It increases bandwidth availability
- It encrypts syslog data in transit
- It replaces packet capture entirely

A

Answer: It provides a centralized record for auditing and analysis
Practical Example: A compliance audit checks centralized logs for unauthorized access attempts.
Key Objective: 3.2 – Log Aggregation Compliance
Follow-up Question: What retention policies should be considered for log storage?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a syslog collector?
- A tool that centralizes syslog messages from network devices
- A wireless signal analyzer
- A device that mirrors switch ports for analysis
- A protocol for encrypting SNMP data

A

Answer: A tool that centralizes syslog messages from network devices
Practical Example: A syslog collector gathers router logs to help pinpoint a routing loop issue.
Key Objective: 3.2 – Syslog Collector
Follow-up Question: How does a syslog collector differ from a SIEM system?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Why are syslog collectors essential for network management?
- They replace SNMP for device monitoring
- They improve wireless signal coverage
- They simplify monitoring by consolidating multiple log sources
- They automate VLAN creation

A

Answer: They simplify monitoring by consolidating multiple log sources
Practical Example: Syslog collectors allow faster correlation between firewall and intrusion detection system alerts.
Key Objective: 3.2 – Syslog Collector Use
Follow-up Question: What are some examples of popular syslog collector tools?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is SIEM technology used for?
- Real-time analysis of security alerts and log data
- Detecting VLAN trunk negotiation issues
- Scheduling firmware updates
- Assigning IP addresses to new devices

A

Answer: Real-time analysis of security alerts and log data
Practical Example: A SIEM system correlates firewall and IDS alerts to identify a coordinated attack.
Key Objective: 3.2 – SIEM
Follow-up Question: How does SIEM differ from basic log aggregation?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What advantage does SIEM offer over traditional log analysis?
- It increases port throughput speeds
- It correlates data from multiple sources to detect complex threats
- It replaces the need for SNMP entirely
- It automatically patches vulnerable devices

A

Answer: It correlates data from multiple sources to detect complex threats
Practical Example: SIEM detects an attack by linking suspicious logins with firewall port scans.
Key Objective: 3.2 – SIEM Advantages
Follow-up Question: Why is SIEM important for proactive threat detection?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the role of API integration in network management?
- Automating configurations and enabling tool interoperability
- Encrypting syslog messages
- Detecting rogue wireless devices
- Assigning IP addresses

A

Answer: Automating configurations and enabling tool interoperability
Practical Example: An API integrates a monitoring system with a ticketing platform to automatically create tickets for alerts.
Key Objective: 3.2 – API Integration
Follow-up Question: How can APIs improve scalability in network operations?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Why are APIs important for modern network tools?
- They prevent VLAN misconfigurations
- They allow different systems to exchange data seamlessly
- They provide hardware redundancy
- They reduce Wi-Fi channel overlap

A

Answer: They allow different systems to exchange data seamlessly
Practical Example: A cloud management API enables centralized control over multiple branch routers.
Key Objective: 3.2 – API Benefits
Follow-up Question: What security considerations should be taken with open APIs?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is port mirroring used for?
- Encrypting network backups
- Filtering out multicast traffic
- Sending copies of traffic from one port to another for analysis
- Assigning VLAN IDs automatically

A

Answer: Sending copies of traffic from one port to another for analysis
Practical Example: Port mirroring is used to send all traffic from a server port to a monitoring tool.
Key Objective: 3.2 – Port Mirroring
Follow-up Question: How does port mirroring support security monitoring?

23
Q

How does port mirroring aid troubleshooting?
- By increasing port speeds
- By assigning static IPs
- By blocking untrusted devices
- By allowing analysis of live traffic without affecting performance

A

Answer: By allowing analysis of live traffic without affecting performance
Practical Example: Engineers capture mirrored traffic to diagnose an intermittent packet loss issue.
Key Objective: 3.2 – Port Mirroring Benefits
Follow-up Question: What’s the difference between port mirroring and a network tap?

24
Q

What is ad hoc network discovery?
- Manually scanning the network when needed
- Scheduling automated scans
- Backing up configurations
- Mapping VLAN trunks

A

Answer: Manually scanning the network when needed
Practical Example: An engineer uses ad hoc discovery to quickly identify new devices added during a branch expansion.
Key Objective: 3.2 – Ad Hoc Network Discovery
Follow-up Question: When is ad hoc discovery preferable over scheduled discovery?

25
Why might you choose ad hoc network discovery over scheduled discovery? - To balance power loads - To quickly assess changes without waiting for the next scheduled scan - To maintain automated updates - To encrypt SNMP traffic
Answer: To quickly assess changes without waiting for the next scheduled scan Practical Example: IT staff run ad hoc scans after deploying a new access point. Key Objective: 3.2 – Ad Hoc Discovery Benefits Follow-up Question: What limitations does ad hoc discovery have?
26
What is scheduled network discovery? - Automated scanning of the network at regular intervals - Manual port scanning by engineers - Collecting syslog messages - Mapping only Layer 3 devices
Answer: Automated scanning of the network at regular intervals Practical Example: A scheduled scan runs nightly to detect new or removed devices. Key Objective: 3.2 – Scheduled Network Discovery Follow-up Question: How can scheduled discovery aid in detecting rogue devices?
27
How does scheduled network discovery improve network management? - By keeping an up-to-date map of devices and changes - By encrypting stored configurations - By limiting broadcast domains - By reducing link latency
Answer: By keeping an up-to-date map of devices and changes Practical Example: A scheduled discovery report highlights new unauthorized devices connected over the weekend. Key Objective: 3.2 – Scheduled Discovery Benefits Follow-up Question: How often should scheduled discovery be performed in a large enterprise?
28
Front
Back
29
What is SNMP used for in networking? - Monitoring, configuring, and controlling network devices - Assigning VLAN IDs - Blocking unauthorized ports - Encrypting wireless traffic
Answer: Monitoring, configuring, and controlling network devices Practical Example: SNMP polls a router for interface statistics. Key Objective: 3.2 – SNMP Follow-up Question: What OSI layer does SNMP operate at?
30
What is the role of SNMP traps? - To encrypt syslog traffic - To update VLAN databases - To send unsolicited alerts from devices to management stations - To block suspicious IP addresses
Answer: To send unsolicited alerts from devices to management stations Practical Example: A switch sends a trap when a port goes down unexpectedly. Key Objective: 3.2 – SNMP Traps Follow-up Question: How do SNMP traps differ from SNMP polling?
31
What is flow data in networking? - A database of VLAN trunk configurations - The actual content of each packet in a network stream - A log of only wireless network connections - Metadata about network traffic such as source/destination IPs, ports, and protocols
Answer: Metadata about network traffic such as source/destination IPs, ports, and protocols Practical Example: NetFlow records show the most active IP addresses on a network segment. Key Objective: 3.2 – Flow Data Follow-up Question: How does flow data help identify unusual network activity?
32
What is one key use of flow data? - Automating VLAN assignments - Encrypting device configurations - Reducing switch CPU usage - Detecting traffic patterns, bandwidth usage, and potential threats
Answer: Detecting traffic patterns, bandwidth usage, and potential threats Practical Example: An admin uses sFlow data to spot an unexpected bandwidth spike from a single IP. Key Objective: 3.2 – Flow Data Uses Follow-up Question: Why is flow data not sufficient for deep packet analysis?
33
What is packet capture (pcap)? - The process of aggregating device logs - The interception and logging of full network traffic - The storage of SNMP MIB information - The method of mirroring network ports for analysis
Answer: The interception and logging of full network traffic Practical Example: Wireshark captures packets to diagnose a VoIP call quality issue. Key Objective: 3.2 – Packet Capture Follow-up Question: How does packet capture differ from flow data?
34
When would packet capture be preferred over flow data? - When full packet content analysis is required for troubleshooting or security - When setting baseline performance metrics - When configuring VLAN trunks - When only traffic patterns and bandwidth use are needed
Answer: When full packet content analysis is required for troubleshooting or security Practical Example: Capturing HTTP payloads to investigate suspected data exfiltration. Key Objective: 3.2 – Packet Capture vs Flow Data Follow-up Question: What are the potential privacy risks of packet capture?
35
What are baseline metrics in network monitoring? - The firmware version of a device - The maximum bandwidth a device can handle - The total uptime percentage for a device - Standard performance measurements used for comparison
Answer: Standard performance measurements used for comparison Practical Example: A baseline shows that normal CPU usage on a firewall is 20–30%. Key Objective: 3.2 – Baseline Metrics Follow-up Question: How are baselines used to detect performance issues?
36
Which is an example of a baseline metric? - VLAN trunk encapsulation type - Device firmware version - Average daily traffic volume and normal error rate - SNMP community string
Answer: Average daily traffic volume and normal error rate Practical Example: Baselines reveal that a 5% packet loss is abnormal for the network. Key Objective: 3.2 – Baseline Metric Examples Follow-up Question: Why do baselines vary between different environments?
37
Why is establishing baseline metrics important? - To identify deviations that may indicate problems - To configure SNMP community strings - To improve wireless signal strength - To enable VLAN trunking
Answer: To identify deviations that may indicate problems Practical Example: Baseline response times allow quick detection of a slow router. Key Objective: 3.2 – Baseline Importance Follow-up Question: What tools can be used to establish network baselines?
38
How are baseline metrics and anomaly alerting connected? - Alerts replace the need for baseline metrics - Alerts trigger when performance deviates from the established baseline - Baselines are only used to calculate VLAN IDs - Baselines are stored in SNMP MIBs
Answer: Alerts trigger when performance deviates from the established baseline Practical Example: An NMS alerts the admin when latency doubles compared to the baseline. Key Objective: 3.2 – Baseline & Alerts Follow-up Question: Why is it important to periodically update baseline metrics?
39
What is the purpose of anomaly alerting in network monitoring? - To store configuration backups - To encrypt SNMP community strings - To automatically notify admins of deviations from baseline performance - To schedule network discovery
Answer: To automatically notify admins of deviations from baseline performance Practical Example: An alert is sent when CPU usage spikes to 90% on a core switch. Key Objective: 3.2 – Anomaly Alerting Follow-up Question: Why is it important to tune alert thresholds carefully?
40
How does anomaly alerting support network integrity? - By scheduling firmware updates - By providing encryption for management traffic - By replacing the need for baseline metrics - By prompting timely intervention before minor issues escalate
Answer: By prompting timely intervention before minor issues escalate Practical Example: Detecting a sudden increase in failed logins could indicate a brute-force attack. Key Objective: 3.2 – Anomaly Alerting Benefits Follow-up Question: What risks exist if alerts are too sensitive or too frequent?
41
What is log aggregation? - Storing VLAN configurations in a database - Collecting and consolidating log messages from multiple sources - Distributing IP addresses via DHCP - Capturing packet data for deep analysis
Answer: Collecting and consolidating log messages from multiple sources Practical Example: A log aggregator pulls firewall, switch, and server logs into one central dashboard. Key Objective: 3.2 – Log Aggregation Follow-up Question: How does log aggregation improve troubleshooting efficiency?
42
Why is log aggregation important for security compliance? - It provides a centralized record for auditing and analysis - It increases bandwidth availability - It encrypts syslog data in transit - It replaces packet capture entirely
Answer: It provides a centralized record for auditing and analysis Practical Example: A compliance audit checks centralized logs for unauthorized access attempts. Key Objective: 3.2 – Log Aggregation Compliance Follow-up Question: What retention policies should be considered for log storage?
43
What is a syslog collector? - A tool that centralizes syslog messages from network devices - A wireless signal analyzer - A device that mirrors switch ports for analysis - A protocol for encrypting SNMP data
Answer: A tool that centralizes syslog messages from network devices Practical Example: A syslog collector gathers router logs to help pinpoint a routing loop issue. Key Objective: 3.2 – Syslog Collector Follow-up Question: How does a syslog collector differ from a SIEM system?
44
Why are syslog collectors essential for network management? - They replace SNMP for device monitoring - They improve wireless signal coverage - They simplify monitoring by consolidating multiple log sources - They automate VLAN creation
Answer: They simplify monitoring by consolidating multiple log sources Practical Example: Syslog collectors allow faster correlation between firewall and intrusion detection system alerts. Key Objective: 3.2 – Syslog Collector Use Follow-up Question: What are some examples of popular syslog collector tools?
45
What is SIEM technology used for? - Real-time analysis of security alerts and log data - Detecting VLAN trunk negotiation issues - Scheduling firmware updates - Assigning IP addresses to new devices
Answer: Real-time analysis of security alerts and log data Practical Example: A SIEM system correlates firewall and IDS alerts to identify a coordinated attack. Key Objective: 3.2 – SIEM Follow-up Question: How does SIEM differ from basic log aggregation?
46
What advantage does SIEM offer over traditional log analysis? - It increases port throughput speeds - It correlates data from multiple sources to detect complex threats - It replaces the need for SNMP entirely - It automatically patches vulnerable devices
Answer: It correlates data from multiple sources to detect complex threats Practical Example: SIEM detects an attack by linking suspicious logins with firewall port scans. Key Objective: 3.2 – SIEM Advantages Follow-up Question: Why is SIEM important for proactive threat detection?
47
What is the role of API integration in network management? - Automating configurations and enabling tool interoperability - Encrypting syslog messages - Detecting rogue wireless devices - Assigning IP addresses
Answer: Automating configurations and enabling tool interoperability Practical Example: An API integrates a monitoring system with a ticketing platform to automatically create tickets for alerts. Key Objective: 3.2 – API Integration Follow-up Question: How can APIs improve scalability in network operations?
48
Why are APIs important for modern network tools? - They prevent VLAN misconfigurations - They allow different systems to exchange data seamlessly - They provide hardware redundancy - They reduce Wi-Fi channel overlap
Answer: They allow different systems to exchange data seamlessly Practical Example: A cloud management API enables centralized control over multiple branch routers. Key Objective: 3.2 – API Benefits Follow-up Question: What security considerations should be taken with open APIs?
49
What is port mirroring used for? - Encrypting network backups - Filtering out multicast traffic - Sending copies of traffic from one port to another for analysis - Assigning VLAN IDs automatically
Answer: Sending copies of traffic from one port to another for analysis Practical Example: Port mirroring is used to send all traffic from a server port to a monitoring tool. Key Objective: 3.2 – Port Mirroring Follow-up Question: How does port mirroring support security monitoring?
50
How does port mirroring aid troubleshooting? - By increasing port speeds - By assigning static IPs - By blocking untrusted devices - By allowing analysis of live traffic without affecting performance
Answer: By allowing analysis of live traffic without affecting performance Practical Example: Engineers capture mirrored traffic to diagnose an intermittent packet loss issue. Key Objective: 3.2 – Port Mirroring Benefits Follow-up Question: What’s the difference between port mirroring and a network tap?
51
What is ad hoc network discovery? - Manually scanning the network when needed - Scheduling automated scans - Backing up configurations - Mapping VLAN trunks
Answer: Manually scanning the network when needed Practical Example: An engineer uses ad hoc discovery to quickly identify new devices added during a branch expansion. Key Objective: 3.2 – Ad Hoc Network Discovery Follow-up Question: When is ad hoc discovery preferable over scheduled discovery?
52
Why might you choose ad hoc network discovery over scheduled discovery? - To balance power loads - To quickly assess changes without waiting for the next scheduled scan - To maintain automated updates - To encrypt SNMP traffic
Answer: To quickly assess changes without waiting for the next scheduled scan Practical Example: IT staff run ad hoc scans after deploying a new access point. Key Objective: 3.2 – Ad Hoc Discovery Benefits Follow-up Question: What limitations does ad hoc discovery have?
53
What is scheduled network discovery? - Automated scanning of the network at regular intervals - Manual port scanning by engineers - Collecting syslog messages - Mapping only Layer 3 devices
Answer: Automated scanning of the network at regular intervals Practical Example: A scheduled scan runs nightly to detect new or removed devices. Key Objective: 3.2 – Scheduled Network Discovery Follow-up Question: How can scheduled discovery aid in detecting rogue devices?
54
How does scheduled network discovery improve network management? - By keeping an up-to-date map of devices and changes - By encrypting stored configurations - By limiting broadcast domains - By reducing link latency
Answer: By keeping an up-to-date map of devices and changes Practical Example: A scheduled discovery report highlights new unauthorized devices connected over the weekend. Key Objective: 3.2 – Scheduled Discovery Benefits Follow-up Question: How often should scheduled discovery be performed in a large enterprise?