click below
click below
Normal Size Small Size show me how
Block 1 Unit 9
Network Monitoring
| Question | Answer |
|---|---|
| WHAT? are used by network administrators typically to monitor availability of network services, functionality of network interfaces, status of critical hardware systems, CPU, memory, or bandwidth. | Network monitoring systems |
| List three other statistics a NMS provides for servers and devices on a network | Service or device availability, network response time, network route analytics |
| List five basic functions of the NMS | Discover, Map, Monitor, Alert, Report |
| Which basic function of the NMS is to find the devices on the network and how they are connected? | Discover |
| When a network monitoring system completes the discovery process, it automatically assigns an appropriate WHAT? to each discovered device on the discovered WHAT? | Device Role and Device List |
| Devices roles are WHAT? and WHAT? specific | Types and Vendor |
| Which basic function of the NMS is to visualize your network? | Map |
| NMSs generate WHAT? a powerful first response tool that enables network administrators to visualize their networks, display devices and up-to-date status. | Network maps |
| Which basic function of the NMS keeps an eye on your network? | Monitor |
| List the “big 5” network administrators want to monitor for any device on the network | Ping, availability and latency, CPU, memory, disk and interface utilization |
| Which basic function of the NMS notifies network administrators when something goes wrong? | Alert |
| WHAT? based alerting enables network administrators to respond to problems before they impact users, or applications | Threshold |
| WHAT? is an automated messaging system that sends messages when an event affects a network device. | Syslog |
| Which basic function of the NMS deals with real-time and historical reporting? | Report |
| NMSs deliver monitoring information in webpages called WHAT? made up of WHAT? views | dashboards and turn-key |
| An WHAT? detects anomalies with the aim of catching hackers before they do real damage to a network. | Intrusion Detection System and do real damage to a network |
| IDS WHAT? WHAT? and WHAT? the security infrastructure for signs of attacks in progress. | Scan, Audit, Monitor |
| List two ways that IDSs work | Looking for signatures of known attacks or deviations from normal activity. |
| WHAT? is one of the most widely used protocols for monitoring | SNMP |
| List the key functions of the SNMP management tool | Querying agents, getting replies from agents, establishing variables in agents, and recognizing asynchronous events |
| Objects queried by SNMP are maintained in a WHAT? | Management Information Base |
| What does a MIB define? | All the information that is exposed by the managed device |
| What does a MIB define? | All the information that is exposed by the managed device |
| The objects in a MIB are catalogued and has its own, unique WHAT? | Object Identifier |