Week 10 Flashcards

Cloud monitoring (32 cards)

1
Q

What is network monitoring?

A

Monitoring an active communications network to diagnose problems and gather statistics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is network management?

A

The operation, administration, maintenance, and provisioning of networked systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why must a network in operation be monitored?

A

To deliver projected SLAs and meet expectations of management, users, customers, and the wider internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is 99.9% uptime in terms of monthly downtime?

A

About 45 minutes of downtime per month.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is baselining?

A

Understanding what is “normal” for the network such as typical load, jitter, errors, and noise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is baselining important?

A

It helps detect abnormalities, plan upgrades, and identify problems early.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why should changes be documented?

A

To easily trace issues caused by upgrades or configuration changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of network accounting?

A

To track usage of resources and bill customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the “Big Three” monitoring areas?

A

Availability, reliability, and performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does Nagios monitor?

A

Servers, switches, applications, and services for availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does Smokeping measure?

A

Connection health, round-trip time, latency, and service responsiveness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does Cacti monitor?

A

Traffic, port usage, and system resources like CPU, RAM, disk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why is documentation important?

A

It helps track devices, understand the network layout, and troubleshoot efficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the role of a Network Operations Center (NOC)?

A

It coordinates tasks, monitors network status, handles incidents, and stores documentation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are automated network documentation tools?

A

IPplan, Netdisco, Netdot, and RackTables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does IPplan do?

A

Manages IP addresses and helps with DNS, configuration files, and hardware tracking.

17
Q

What is Netdisco used for?

A

Finding device locations, managing switch ports, inventory hardware, and reporting network usage.

18
Q

What is Netdot?

A

A tool that handles IP management, topology discovery, device discovery, and documentation.

19
Q

What’s the difference between active and passive monitoring tools?

A

Active tools send traffic to test connectivity; passive tools observe existing traffic.

20
Q

What is SNMP used for?

A

Collecting data such as throughput, errors, CPU load, and more from network devices.

21
Q

What is NetFlow used for?

A

Traffic accounting and identifying traffic flows.

22
Q

Why is a ticket system important?

A

To track events, manage incidents, record communication, and escalate issues properly.

23
Q

What are examples of open-source ticket systems?

A

RT, Trac, and Redmine.

24
Q

What is an NIDS (Network Intrusion Detection System)?

A

A system that detects security threats by monitoring network traffic.

25
Name important NIDS tools.
SNORT, Prelude, Samhain, Nessus
26
What is configuration management?
Tracking and versioning configuration files for equipment and systems
27
What is RANCID used for?
Automatically collecting and archiving router and switch configuration files.
28
What is a major business risk of outsourcing?
Contracts may be poorly structured and limit future flexibility.
29
What is a security risk of outsourcing?
Possible customer data theft, weak security controls, and exposure to cybercrime
30
31
32