Testout IT Network Pro 11.3.9 Practice
Questions and Answers
Some users report that frequent system crashes have started happening on their
workstations. Upon further investigation, you notice that these users all have received a
recent update to the same application. Where would you go to conduct a root cause
analysis? - Answer- Application Log
You suspect that cache poisoning or spoofing has occurred on your network. Users are
complaining of strange web results and being redirected to undesirable sites. Which log
would help you determine what's going on? - Answer- DNS logs
You suspect that a bad video driver is causing a user's system to randomly crash and
reboot. Where would you go to identify and confirm your suspicions? - Answer- Dump
files
Which Syslog severity level indicates a debugging message? - Answer- Level 7
Which Syslog level indicates an emergency that could severely impact the system and
cause it to become unusable? - Answer- Level 0
Which of the following is a standard for sending log messages to a central logging
server? - Answer- Syslog
You are concerned that an attacker can gain access to your web server, make
modifications to the system, and alter the log files to hide his or her actions. Which of
the following actions would BEST protect the log files? - Answer- Use Syslog to send
log entries to another server.
You are the network administrator for a growing business. When you were hired, the
organization was small, and only a single switch and router were required to support
your users. During this time, you monitored log messages from your router and switch
directly from each device's console.
The organization has grown considerably in recent months. Now you manage eight
individual switches and three routers. It's becoming more and more difficult to monitor
these devices and stay on top of issues in a timely manner.
What should you do? - Answer- Use Syslog to implement centralized logging.
Questions and Answers
Some users report that frequent system crashes have started happening on their
workstations. Upon further investigation, you notice that these users all have received a
recent update to the same application. Where would you go to conduct a root cause
analysis? - Answer- Application Log
You suspect that cache poisoning or spoofing has occurred on your network. Users are
complaining of strange web results and being redirected to undesirable sites. Which log
would help you determine what's going on? - Answer- DNS logs
You suspect that a bad video driver is causing a user's system to randomly crash and
reboot. Where would you go to identify and confirm your suspicions? - Answer- Dump
files
Which Syslog severity level indicates a debugging message? - Answer- Level 7
Which Syslog level indicates an emergency that could severely impact the system and
cause it to become unusable? - Answer- Level 0
Which of the following is a standard for sending log messages to a central logging
server? - Answer- Syslog
You are concerned that an attacker can gain access to your web server, make
modifications to the system, and alter the log files to hide his or her actions. Which of
the following actions would BEST protect the log files? - Answer- Use Syslog to send
log entries to another server.
You are the network administrator for a growing business. When you were hired, the
organization was small, and only a single switch and router were required to support
your users. During this time, you monitored log messages from your router and switch
directly from each device's console.
The organization has grown considerably in recent months. Now you manage eight
individual switches and three routers. It's becoming more and more difficult to monitor
these devices and stay on top of issues in a timely manner.
What should you do? - Answer- Use Syslog to implement centralized logging.