1/87
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
What is the term used to indicate a variation of delay?
jitter
(delay)
A network engineer performs a ping test and receives a value that shows the time it takes for a packet to travel from a source to a destination device and return. Which term describes the value?
latency
What role do network devices play in the IntServ Qos model?
Network devices ensure that resources are available before traffic is allowed to be sent by a host through the network
Which device would be classified as a trusted endpoint?
IP Phone
What is the benefit of deploying Layer 3 QoS marking across an enterprise network?
Layer 3 marking can carry the QoS information end-to-end
What is the function of a QoS trust boundary?
A trust boundary identifies which devices trust the marking on packets that enter a network
What are two approaches to prevent packet loss due to congestion on an interface? (1)
Drop lower-priority packets
What are two approaches to prevent packet loss due to congestion on an interface? (2)
Increase link capacity
What configuration scenario would offer the most protection to SNMP get and set messages?
SNMPv3 configured with the auth security level
Refer to the exhibit. The network administrator enters these commands into the R1 router:
R1# copy running-config tftpAddress or name of remote host [ ]?
When the router prompts for an address or remote host name, what IP address should the administrator enter at the prompt?
192.168.11.252
(tftp application)
The command ntp server 10.1.1.1 is issued on a router. What impact does this command have?
synchronizes the system clock with the time source with IP address 10.1.1.1
As the network administrator you have been asked to implement EtherChannel on the corporate network. What does this configuration consist of?
grouping multiple physical ports to increase bandwidth between two switches
What is a definition of a two-tier LAN network design?
distribution and core layers collapsed into one tier, and the access layer on a separate tier
What are two reasons to create a network baseline? (1)
to identify future abnormal network behavior
What are two reasons to create a network baseline? (2)
to determine if the network can deliver the required policies
A computer can access devices on the same network but cannot access devices on other networks. What is the probable cause of this problem?
The computer has an invalid default gateway address
In which step of gathering symptoms does the network engineer determine if the problem is at the core, distribution, or access layer of the network?
narrow the scope
A network administrator is deploying QoS with the ability to provide a special queue for voice traffic so that voice traffic is forwarded before network traffic in other queues. Which queuing method would be the best choice?
LLQ
What are two characteristics of voice traffic? (1)
Voice traffic latency should not exceed 150 ms
What are two characteristics of voice traffic? (2)
Dropped voice packets are not retransmitted
Which type of network traffic cannot be managed using congestion avoidance tools?
UDP
When QoS is implemented in a converged network, which two factors can be controlled to improve network performance for real-time traffic? (1)
delay
When QoS is implemented in a converged network, which two factors can be controlled to improve network performance for real-time traffic? (2)
jitter
(QoS)
An administrator wants to replace the configuration files on a Cisco router by loading a new configuration file from a TFTP server. What two things does the administrator need to know before performing this task? (1)
name of the configuration file that is stored on the TFTP server
An administrator wants to replace the configuration files on a Cisco router by loading a new configuration file from a TFTP server. What two things does the administrator need to know before performing this task? (2)
TFTP server IP address
Refer to the exhibit. Which of the three Cisco IOS images shown will load into RAM?
The router selects an image depending on the boot system command in the configuration
Refer to the exhibit. Which two types of devices are connected to R1? (1)
1. switch
Refer to the exhibit. Which two types of devices are connected to R1? (2)
2. router
What are three functions provided by the syslog service? (1)
1. to select the type of logging information that is captured
What are three functions provided by the syslog service? (2)
2. to gather logging information for monitoring and troubleshooting
What are three functions provided by the syslog service? (3)
3. to specify the destinations of captured messages
What is the function to the MIB element as part of a network management system?
to store data about a device
What network design would contain the scope of disruptions on a network should a failure occur?
the deployment of distribution layer switches in pairs and the division of access layer switch connections between them
Which action should be taken when planning for redundancy on a hierarchical network design?
add alternate physical paths for data to traverse the network
What are two benefits of extending access layer connectivity to users through a wireless medium? (1)
1. increased flexibility
What are two benefits of extending access layer connectivity to users through a wireless medium? (2)
2. reduced costs
What is a basic function of the Cisco Borderless Architecture access layer?
provides access to the user
Which characteristic would most influence a network design engineer to select a multi-layer switch over a Layer 2 switch?
ability to build a routing table
Refer to the exhibit. Why are routers R1 and R2 not able to establish an OSPF adjacency?
The serial interfaces are not in the same area

When is the most appropriate time to measure network operations to establish a network performance baseline?
at the same time each day across a set period average working days, so that typical traffic patterns can be established
Refer to the exhibit. A user has configured a NIC on the PC as shown but finds that the PC is unable to access the Internet. What is the problem?
The default gateway address is incorrect

Refer to the exhibit. A network engineer configured an ACL preventing Telnet and HTTP access to the HQ web server from guest users in the Branch LAN. The address of the web server 192.168.1.10 and all guest users are assigned addresses in the 192.168.10.0/24 network. After implementing the ACL, no one can access any of the HQ servers. What is the problem?
The ACL is implicitly denying access to all the servers

Refer to the exhibit. A network administrator has configured OSPFv2 on the two Cisco routers as shown. PC1 is unable to connect to PC2. What should the administrator do first when troubleshooting the OSPFv2 implementation?
Test Layer 3 connectivity between the directly connected routers
What type of traffic is described as requiring latency to be no more than 150 milliseconds (ms)?
voice
(150 ms)
A network manager wants to add a time to log messages so that there is record of when the message was generated. What command should the administrator use on a Cisco router?
service timestamps log datetime
Match the functions to the corresponding layers.
1. provides network access to the user
1. access layer
Match the functions to the corresponding layers.
2. represents the network edge
2. access layer
Match the functions to the corresponding layers.
1. implements network access policy
1. distribution layer
Match the functions to the corresponding layers.
2. establishes Layer 3 routing boundaries
2. distribution layer
Match the functions to the corresponding layers.
1. provides high-speed backbone connectivity
1. core layer
Match the functions to the corresponding layers.
2. functions as an aggregator for all the campus blocks
2. core layer
Match the borderless switched network guideline description to the principle.
Allows intelligent traffic load sharing by using all network resources
Flexibility
Match the borderless switched network guideline description to the principle.
Allows seamless network expansion and integrated service enablement on an on-demand basis
modularity
Match the borderless switched network guideline description to the principle.
Facilitates understanding the role of each device at every tier, simplifies deployment, operation, management, and reduces fault domains at every tier
hierarchical
Match the borderless switched network guideline description to the principle.
Satisfies user expectations for keeping the network always on
resiliency
What are two characteristics of the best-effort QoS model? (1)
1. It does not provide a delivery guarantee for packets
What are two characteristics of the best-effort QoS model? (2)
2. It treats all network packets in the same way
Why is QoS an important issue in a converged network that combines voice, video, and data communications?
Voice and video communications are more sensitive to latency
A network administrator configures a router with the command sequence:
R1(config)# boot system tftp://c1900-universalk9-mz.SPA.152-4.M3.bin
R1(config)# boot system rom
What is the effect of the command sequence?
The router will load IOS from the TFTP server. If the image fails to load, it will load the IOS image from ROM
Which statement describes SNMP operation?
A set request is used by the NMS to change configuration variables in the agent device
Refer to the exhibit. A network administrator issues the show lldp neighbors command on a switch. What are two conclusions that can be drawn? (1)
1. Dev1 is connected to interface Fa0/5 of S1
Refer to the exhibit. A network administrator issues the show lldp neighbors command on a switch. What are two conclusions that can be drawn? (2)
2. Dev2 is a switch
What are the three layers of the switch hierarchical design model? (1)
1. distribution
What are the three layers of the switch hierarchical design model? (2)
2. access
What are the three layers of the switch hierarchical design model? (3)
3. core
Refer to the exhibit. Which devices exist in the failure domain when switch S3 loses power?
PC_3 and AP_2

A network designer is considering whether to implement a switch block on the company network. What is the primary advantage of deploying a switch block?
The failure of a switch block will not impact all end users
Which troubleshooting tool would a network administrator use to check the Layer 2 header of frames that are leaving a particular host?
protocol analyzer
Refer to the exhibit. R1 and R3 are connected to each other via the local serial 0/0/0 interface. Why are they not forming an adjacency?
They are in different subnets
What type of traffic is described as not resilient to loss?
video
(not resilient)
A network manager wants to list the contents of flash. What command should the administrator use on a Cisco router?
dir
Voice packets are being received in a continuous stream by an IP phone, but because of network congestion, the delay between each packet varies and is causing broken conversations. What term describes the cause of this condition?
jitter
(broken)
A user is unable to reach the website when typing http://www.cisco.com in a web browser, but can reach the same site by typing http://72.163.4.161. What is the issue?
DNS
What type of traffic is described as tending to be unpredictable, inconsistent, and bursty?
video
(unpredictable)
A network manager wants to determine the size of the Cisco IOS image file on the networking device. What command should the administrator use on a Cisco router?
show flash:0
What is the principle that is applied when a network technician is troubleshooting a network fault by using the divide-and-conquer method?
Once it is verified that components in a particular layer are functioning properly, it can then be assumed that components in the layers below it are also functional
Which queuing algorithm has only a single queue and treats all packets equally?
FIFO
What type of traffic described as traffic that requires at least 30 Kbps of bandwidth?
voice
(30 kbps)
What type of traffic is described as being able to tolerate a certain amount of latency, jitter, and loss without any noticeable effects?
voice
(tolerate)
A network manager wants to view the amount of available and free memory, the type of file system, and its permissions. What command should the administrator use on a Cisco router?
show file systems
What type of traffic is described as requiring latency to be no more than 400 milliseconds (ms)?
voice
(400 ms)
What type of traffic is described as consisting of traffic that requires a higher priority of data if interactive?
data
(interactive)
A network manager wants to configure the router to load a new image from flash during bootup. What command should the administrator use on a Cisco router?
boot system
What type of traffic is described as predictable and smooth?
voice
(predictable)
A network manager wants to ensure that the device will ignore the startup config file during startup and bypass the required passwords. What command should the administrator use on a Cisco router?
confreg 0x2142
What type of traffic is described as having a high volume of data per packet?
video
(high volume of data/packet)
A network manager wants to backup the running configuration to a file server. What command should the administrator use on a Cisco router?
copy running-config tftp
What type of traffic is described as consisting of traffic that gets a low priority if it is not mission-critical?
data
(low priority)