CCNA 3 v7 Modules 9 - 12: Optimize, Monitor, and Troubleshoot Networks

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/87

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 2:24 AM on 4/20/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

88 Terms

1
New cards

What is the term used to indicate a variation of delay?

jitter

(delay)

2
New cards

A network engineer performs a ping test and receives a value that shows the time it takes for a packet to travel from a source to a destination device and return. Which term describes the value?

latency

3
New cards

What role do network devices play in the IntServ Qos model?

Network devices ensure that resources are available before traffic is allowed to be sent by a host through the network

4
New cards

Which device would be classified as a trusted endpoint?

IP Phone

5
New cards

What is the benefit of deploying Layer 3 QoS marking across an enterprise network?

Layer 3 marking can carry the QoS information end-to-end

6
New cards

What is the function of a QoS trust boundary?

A trust boundary identifies which devices trust the marking on packets that enter a network

7
New cards

What are two approaches to prevent packet loss due to congestion on an interface? (1)

Drop lower-priority packets

8
New cards

What are two approaches to prevent packet loss due to congestion on an interface? (2)

Increase link capacity

9
New cards

What configuration scenario would offer the most protection to SNMP get and set messages?

SNMPv3 configured with the auth security level

10
New cards

Refer to the exhibit. The network administrator enters these commands into the R1 router:

R1# copy running-config tftpAddress or name of remote host [ ]?

When the router prompts for an address or remote host name, what IP address should the administrator enter at the prompt?

192.168.11.252

(tftp application)

11
New cards

The command ntp server 10.1.1.1 is issued on a router. What impact does this command have?

synchronizes the system clock with the time source with IP address 10.1.1.1

12
New cards

As the network administrator you have been asked to implement EtherChannel on the corporate network. What does this configuration consist of?

grouping multiple physical ports to increase bandwidth between two switches

13
New cards

What is a definition of a two-tier LAN network design?

distribution and core layers collapsed into one tier, and the access layer on a separate tier

14
New cards

What are two reasons to create a network baseline? (1)

to identify future abnormal network behavior

15
New cards

What are two reasons to create a network baseline? (2)

to determine if the network can deliver the required policies

16
New cards

A computer can access devices on the same network but cannot access devices on other networks. What is the probable cause of this problem?

The computer has an invalid default gateway address

17
New cards

In which step of gathering symptoms does the network engineer determine if the problem is at the core, distribution, or access layer of the network?

narrow the scope

18
New cards

A network administrator is deploying QoS with the ability to provide a special queue for voice traffic so that voice traffic is forwarded before network traffic in other queues. Which queuing method would be the best choice?

LLQ

19
New cards

What are two characteristics of voice traffic? (1)

Voice traffic latency should not exceed 150 ms

20
New cards

What are two characteristics of voice traffic? (2)

Dropped voice packets are not retransmitted

21
New cards

Which type of network traffic cannot be managed using congestion avoidance tools?

UDP

22
New cards

When QoS is implemented in a converged network, which two factors can be controlled to improve network performance for real-time traffic? (1)

delay

23
New cards

When QoS is implemented in a converged network, which two factors can be controlled to improve network performance for real-time traffic? (2)

jitter

(QoS)

24
New cards

An administrator wants to replace the configuration files on a Cisco router by loading a new configuration file from a TFTP server. What two things does the administrator need to know before performing this task? (1)

name of the configuration file that is stored on the TFTP server

25
New cards

An administrator wants to replace the configuration files on a Cisco router by loading a new configuration file from a TFTP server. What two things does the administrator need to know before performing this task? (2)

TFTP server IP address

26
New cards

Refer to the exhibit. Which of the three Cisco IOS images shown will load into RAM?

The router selects an image depending on the boot system command in the configuration

27
New cards

Refer to the exhibit. Which two types of devices are connected to R1? (1)

1. switch

28
New cards

Refer to the exhibit. Which two types of devices are connected to R1? (2)

2. router

29
New cards

What are three functions provided by the syslog service? (1)

1. to select the type of logging information that is captured

30
New cards

What are three functions provided by the syslog service? (2)

2. to gather logging information for monitoring and troubleshooting

31
New cards

What are three functions provided by the syslog service? (3)

3. to specify the destinations of captured messages

32
New cards

What is the function to the MIB element as part of a network management system?

to store data about a device

33
New cards

What network design would contain the scope of disruptions on a network should a failure occur?

the deployment of distribution layer switches in pairs and the division of access layer switch connections between them

34
New cards

Which action should be taken when planning for redundancy on a hierarchical network design?

add alternate physical paths for data to traverse the network

35
New cards

What are two benefits of extending access layer connectivity to users through a wireless medium? (1)

1. increased flexibility

36
New cards

What are two benefits of extending access layer connectivity to users through a wireless medium? (2)

2. reduced costs

37
New cards

What is a basic function of the Cisco Borderless Architecture access layer?

provides access to the user

38
New cards

Which characteristic would most influence a network design engineer to select a multi-layer switch over a Layer 2 switch?

ability to build a routing table

39
New cards

Refer to the exhibit. Why are routers R1 and R2 not able to establish an OSPF adjacency?

The serial interfaces are not in the same area

<p>The serial interfaces are not in the same area</p>
40
New cards

When is the most appropriate time to measure network operations to establish a network performance baseline?

at the same time each day across a set period average working days, so that typical traffic patterns can be established

41
New cards

Refer to the exhibit. A user has configured a NIC on the PC as shown but finds that the PC is unable to access the Internet. What is the problem?

The default gateway address is incorrect

<p>The default gateway address is incorrect</p>
42
New cards

Refer to the exhibit. A network engineer configured an ACL preventing Telnet and HTTP access to the HQ web server from guest users in the Branch LAN. The address of the web server 192.168.1.10 and all guest users are assigned addresses in the 192.168.10.0/24 network. After implementing the ACL, no one can access any of the HQ servers. What is the problem?

The ACL is implicitly denying access to all the servers

<p>The ACL is implicitly denying access to all the servers</p>
43
New cards

Refer to the exhibit. A network administrator has configured OSPFv2 on the two Cisco routers as shown. PC1 is unable to connect to PC2. What should the administrator do first when troubleshooting the OSPFv2 implementation?

Test Layer 3 connectivity between the directly connected routers

44
New cards

What type of traffic is described as requiring latency to be no more than 150 milliseconds (ms)?

voice

(150 ms)

45
New cards

A network manager wants to add a time to log messages so that there is record of when the message was generated. What command should the administrator use on a Cisco router?

service timestamps log datetime

46
New cards

Match the functions to the corresponding layers.

1. provides network access to the user

1. access layer

47
New cards

Match the functions to the corresponding layers.

2. represents the network edge

2. access layer

48
New cards

Match the functions to the corresponding layers.

1. implements network access policy

1. distribution layer

49
New cards

Match the functions to the corresponding layers.

2. establishes Layer 3 routing boundaries

2. distribution layer

50
New cards

Match the functions to the corresponding layers.

1. provides high-speed backbone connectivity

1. core layer

51
New cards

Match the functions to the corresponding layers.

2. functions as an aggregator for all the campus blocks

2. core layer

52
New cards

Match the borderless switched network guideline description to the principle.

Allows intelligent traffic load sharing by using all network resources

Flexibility

53
New cards

Match the borderless switched network guideline description to the principle.

Allows seamless network expansion and integrated service enablement on an on-demand basis

modularity

54
New cards

Match the borderless switched network guideline description to the principle.

Facilitates understanding the role of each device at every tier, simplifies deployment, operation, management, and reduces fault domains at every tier

hierarchical

55
New cards

Match the borderless switched network guideline description to the principle.

Satisfies user expectations for keeping the network always on

resiliency

56
New cards

What are two characteristics of the best-effort QoS model? (1)

1. It does not provide a delivery guarantee for packets

57
New cards

What are two characteristics of the best-effort QoS model? (2)

2. It treats all network packets in the same way

58
New cards

Why is QoS an important issue in a converged network that combines voice, video, and data communications?

Voice and video communications are more sensitive to latency

59
New cards

A network administrator configures a router with the command sequence:

R1(config)# boot system tftp://c1900-universalk9-mz.SPA.152-4.M3.bin

R1(config)# boot system rom

What is the effect of the command sequence?

The router will load IOS from the TFTP server. If the image fails to load, it will load the IOS image from ROM

60
New cards

Which statement describes SNMP operation?

A set request is used by the NMS to change configuration variables in the agent device

61
New cards

Refer to the exhibit. A network administrator issues the show lldp neighbors command on a switch. What are two conclusions that can be drawn? (1)

1. Dev1 is connected to interface Fa0/5 of S1

62
New cards

Refer to the exhibit. A network administrator issues the show lldp neighbors command on a switch. What are two conclusions that can be drawn? (2)

2. Dev2 is a switch

63
New cards

What are the three layers of the switch hierarchical design model? (1)

1. distribution

64
New cards

What are the three layers of the switch hierarchical design model? (2)

2. access

65
New cards

What are the three layers of the switch hierarchical design model? (3)

3. core

66
New cards

Refer to the exhibit. Which devices exist in the failure domain when switch S3 loses power?

PC_3 and AP_2

<p>PC_3 and AP_2</p>
67
New cards

A network designer is considering whether to implement a switch block on the company network. What is the primary advantage of deploying a switch block?

The failure of a switch block will not impact all end users

68
New cards

Which troubleshooting tool would a network administrator use to check the Layer 2 header of frames that are leaving a particular host?

protocol analyzer

69
New cards

Refer to the exhibit. R1 and R3 are connected to each other via the local serial 0/0/0 interface. Why are they not forming an adjacency?

They are in different subnets

70
New cards

What type of traffic is described as not resilient to loss?

video

(not resilient)

71
New cards

A network manager wants to list the contents of flash. What command should the administrator use on a Cisco router?

dir

72
New cards

Voice packets are being received in a continuous stream by an IP phone, but because of network congestion, the delay between each packet varies and is causing broken conversations. What term describes the cause of this condition?

jitter

(broken)

73
New cards

A user is unable to reach the website when typing http://www.cisco.com in a web browser, but can reach the same site by typing http://72.163.4.161. What is the issue?

DNS

74
New cards

What type of traffic is described as tending to be unpredictable, inconsistent, and bursty?

video

(unpredictable)

75
New cards

A network manager wants to determine the size of the Cisco IOS image file on the networking device. What command should the administrator use on a Cisco router?

show flash:0

76
New cards

What is the principle that is applied when a network technician is troubleshooting a network fault by using the divide-and-conquer method?

Once it is verified that components in a particular layer are functioning properly, it can then be assumed that components in the layers below it are also functional

77
New cards

Which queuing algorithm has only a single queue and treats all packets equally?

FIFO

78
New cards

What type of traffic described as traffic that requires at least 30 Kbps of bandwidth?

voice

(30 kbps)

79
New cards

What type of traffic is described as being able to tolerate a certain amount of latency, jitter, and loss without any noticeable effects?

voice

(tolerate)

80
New cards

A network manager wants to view the amount of available and free memory, the type of file system, and its permissions. What command should the administrator use on a Cisco router?

show file systems

81
New cards

What type of traffic is described as requiring latency to be no more than 400 milliseconds (ms)?

voice

(400 ms)

82
New cards

What type of traffic is described as consisting of traffic that requires a higher priority of data if interactive?

data

(interactive)

83
New cards

A network manager wants to configure the router to load a new image from flash during bootup. What command should the administrator use on a Cisco router?

boot system

84
New cards

What type of traffic is described as predictable and smooth?

voice

(predictable)

85
New cards

A network manager wants to ensure that the device will ignore the startup config file during startup and bypass the required passwords. What command should the administrator use on a Cisco router?

confreg 0x2142

86
New cards

What type of traffic is described as having a high volume of data per packet?

video

(high volume of data/packet)

87
New cards

A network manager wants to backup the running configuration to a file server. What command should the administrator use on a Cisco router?

copy running-config tftp

88
New cards

What type of traffic is described as consisting of traffic that gets a low priority if it is not mission-critical?

data

(low priority)