1/58
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Username, Authpriv, MD5, AES
1. Which of the following settings belong to SNMPv3?
Bottom-up
A type of troubleshooting where it needs for you to check every network device until a possible root cause of the problem has been identified.
OSPF
________ : Layer 3 < = => STP: Layer 2
Enterprise
Intranet: ______ < = = > Internet: Cloud computing
JSON, YAML, XML
Which of the following common data formats are used in network automation and programmability?
Saltstack, Ansible
Which of the following configuration management tools are based on Python programming language?
Divide-and-conquer
If you are to perform network troubleshooting and you decided to start on a chosen layer and perform testing in all directions from that layer, then you are doing _______.
Directly connected networks, static routes, dynamic routes, local routes, default routes
In network troubleshooting, IPv4 and IPv6 routing tables can be generated by the subsequent approaches:
Educated Guess
An approach that is more like a random troubleshooting for system administration newbie.
LAAS
Utilizing this cloud service permits IT managers to install and execute software code, which can include operating systems and applications.
SOAP, REST, XML-RPC, JSON-RPC
Which of the following are web server APIs that are used in network automation and programmability?
Underlay Network
In the concept of network infrastructure as a fabric, it pertains to the traditional network infrastructure.
Proactive monitoring
A monitoring technique used by systems and network administrators to prevent possible problems before it actually happens.
Substitution
A type of troubleshooting where in a definite circumstance, this can be the best way for rapid difficult purpose, such as with a serious single point of failure.
EtherChannel
_______ : Aggregation < = = > STP: Redundancy
OpenFlow, OpenStack, I2RS, TRILL, FP, SPB
16. Which of the following are mechanisms of software-defined networks?
Network Topology Diagrams
An illustration that keep trail of locality, purpose, and status of equipment on the network.
Data Center
The physical network infrastructure where the cloud services run.
Console, Buffered Logging, SNMP Traps, Syslog, Terminal Line
Instigating a logging facility is a significant part of network security and for network troubleshooting. Which of the following can be possibly used?
Core Layer
The primary purpose of the _________ is to deliver fault segregation and high-speed focal connectivity.
Building Block Approach
A strategy in network design that is also known as narrow-and-deep.
Scalability
A consideration in network design where user demands are predicted by constructing more capacity than what the user expects.
Needs Analysis
A step in network design where the network designer requires to understand the fundamental existing and upcoming desires of all the possible end users of the network.
Rollback Plan
A plan where you can possibly reverse a provided solution to the problem if it generates another problem.
Encapsulation Error
A system administrator is conducting network troubleshooting and found out that R1 serial interface uses PPP and the other end uses HDLC.
Cable Analyzers
A hardware troubleshooting tool that can be used to measure the length to performance-related causes like return loss and cross talk.
SSH
Which can be used to manage devices over the network.
Modularity
The network design characteristics that allows continuous network growth and unified provision enablement on an on-demand manner.
Resiliency
A network design guideline that satisfies end-user's anticipation for minimizing if not eliminating down-times.
Traditional Network Design
A network design that is capable for fixed and not-so fast developing networks.
Comparison
A troubleshooting process that might lead you to a working solution but without evidently enlightening the real source of the problem is one of its disadvantages.
Resiliency
A network device characteristic and business consideration to deliver uninterrupted access to the network.
duplex mismatches
Connecting hub and switches which was configured manually for the mode of transmission leads to.
CDP
When a management station and a proprietary device are connected. Which of the following functions needs to be mapped.
Chef, Puppet
Which of the following configuration management tools are based on the Ruby programming language?
Virtualization
It is the process of decoupling operating systems from the routers, switches, and other devices.
OSPF
Switches: STP <==> Routers: ________.
Controller-based (SDN)
A software defined networking where all information of all the components in the network are administered.
Propose Hypothesis
A troubleshooting process when the solution has been formed after problem identification.
Overlay
It pertains to the virtual private networks like IPsec operating over the physical devices in a network infrastructure as fabric.
Cable Testers
A hardware troubleshooting tools that can utilized to distinguish smashed physical links, crossed-over wiring, shorted links, and incorrectly paired connections.
Redundancy, Scalable routing protocol, wireless connectivity
The system administrator wishes to design a scalable network. What are the possible considerations that he must take?
Eliminate possible causes
A step in troubleshooting where possible root cause of the problem has to be determined.
Follow-the-path
A type of troubleshooting that aims to exclude connections and network components that are immaterial to the current troubleshooting task.
Client-server, Stateless, Cacheable.
Restful API includes the following features that conforms with the constraint if the REST architecture:
Ansible, Chef
Which of the following configuration management tools are agent-based and agentless?
Cisco Borderless Network
This architecture is intended to discourse IT and business challenges, such as supporting the converged network and changing work patterns.
Network Baseline
It pertains to as a statement of network essentials needed to meet the requirements of the organization.
Hypervisor
It allows the operating system to communicate with the firmware to create instances of the OS.
policy-based
An SDN which includes an added policy layer that works at a higher level of abstraction.
Redundancy
__________ is a significant part of network design for avoiding disturbance of network services by reducing the likelihood of a single point of failure.
Aggregation
MST: Redundancy <==> LACP: _________________.
Port Density
It is a characteristics of a switch when the systems/network administrators consider the number of possible connections on a layer 2 device.
Wire Speed
In a Layer 2 switch, ________ is the data rate that the GigaEthernet 0/1 is capable of reaching.
Resiliency
A network property that fulfills user anticipations for keeping the network continuously on.
Failure Domain
A __________ is a part of a network that is wedged when a critical component or link service experiences faults.
Modularity
A property of the network that allows network growth and service integration on the on-demand consideration.
Distribution Layer
Telecommunication closets used in network design is considered to be __________________.
Distribution Layer
A hierarchical network function that combines Data-Link layer broadcast domains and network layer routing limitations.