Looks like no one added any tags here yet for you.
A type of troubleshooting that aims to exclude connections and network components that are immaterial to the current troubleshooting task.
Follow-the-path
Instigating a logging facility is a significant portion of network security and for network troubleshooting. Which of the following can be possibly used?
SNMP Traps
Syslog
Buffered logging
A type of troubleshooting where it needs for you to check every network devices until a possible root cause of the problem has been identified.
Bottom-up
Which can be used to manage devices over the network?
SSH
TFTP
HTTPS
SFTP
The primary purpose of the _______ is to deliver fault segregation and high-speed focal connectivity.
Core layer
This architecture is intended to discourse IT and business challenges, such as supporting the converged network and changing work patterns.
Cisco Borderless Network
Connecting hub and switches which were configured manually for the mode of transmission leads to _____
Duplex Mismatch
A network design that is applicable for fixed and not-so-fast developing networks.
Two-tier campus network design
In network troubleshoong, IPv4 and IPv6 routing tables can be generated by the subsequent approaches:
Directly connected networks
Local host or local routes
Static routes
Dynamic routes
Default routes
A monitoring technique used by systems and network administrators to prevent possible problems before they actually happen.
Proactive Monitoring or Assurance
In the concept of network infrastructure as a fabric, it pertains to the traditional network infrastructure.
Underlay Infrastructure
A software-defined networking where all information of all the components in the network are administered.
Controller-based
A step in troubleshooting where the possible root cause of the problem has to be determined.
Eliminate Possible Causes
Which of the following sengs belongs to SNMPv3?
Username
Authpriv
MD5
AES
If you are to perform network troubleshooting and you decide to start on a chosen layer and perform testing in all directions from that layer, then you are doing ______
Divide-and-conquer
A network device characteristic and business consideration to deliver uninterrupted access to the network.
Resiliency
Utilizing this cloud service permits IT managers to install and execute software code, which can include operating systems and applications.
laaS
Which of the following common data formats are used in network automation and programmability?
JSON
XML
YAML
Analogy:
intranet : _______<==> internet : cloud computing
Virtual Computing
A step in network design where the network designer requires understanding the fundamental existing and upcoming desires of all the possible end users of the network.
Requirement Gathering or Borderless Switched network
A hardware troubleshooting tool that can be used to measure the length to performance-related causes like return loss and crosstalk.
Cable Analyzers
An approach that is more like random troubleshooting for a system administrator newbie.
Educated Guess
_______ : Aggregation <=> STP : Redundancy
EtherChannel
It pertains to a statement of network essentials needed to meet the requirements of the organization.
Network Baseline or Logical network design
A troubleshooting process when the solution has been formed after problem identification.
Propose Hypothesis
A type of troubleshooting where, in definite circumstances, this can be the best way for rapid difficult purpose, such as with a serious single point of failure.
Substitution
Which of the following configuration management tools are based on the Ruby programming language?
Chef
Puppet
Which of the following configuration management tools are based on the python programming language?
Ansible
Saltstack
A consideration in network design where user demands are predicted by constructing more capacity than what the user expects.
Scalability
Switches : STP <==> Routers : _______
OSPF
Which of the following are mechanisms of software defined networks?
OpenFlow
OpenStack
Interface to the Roung System (I2RS)
Transparent Interconnecon of Lots of Links (TRILL)
Cisco FabricPath (FP) – SPB
The systems administrator wishes to design a scalable network. What are the possible considerations that he must take?
Redundancy
Scalable Routing Protocol
Wireless Connectivity
_______ : Layer 3 <==> STP : Layer 2
OSPF
It allows the operating systems to communicate with the firmware to create instances of OSs.
Server Virtualization
A hardware troubleshooting tool that can be utilized to distinguish smashed physical links, crossed-over wiring, shorted links, and incorrectly paired connections.
Cable Testers
Which of the following configuration management tools are agent-based and agentless
Ansible
Chef
RESTful API includes the following features that conforms with the constraint if the REST architecture.
Client-Server
Stateless
Cacheable
The physical network infrastructure where cloud services run.
Data Centers
A network design guideline that satisfies end-user's anticipations for minimizing if not eliminating downtimes.
Resiliency
Illustrations that keep trail of the locality, purpose, and status of equipment on the network.
Network Topology Diagrams
Network design characteristics that allow continuous network growth and unified provision enablement on an on-demand manner.
Modularity
Which of the following are web service APIs that is used in network automation and programmability?
SOAP
REST
XML-RPC
JSON-RPC
It pertains to virtual private networks like IPSec operating over the physical devices in a network infrastructure as Fabric.
Overlay Network
An SDN which includes an added Policy layer that works at a higher level of abstraction.
Policy-Based
A troubleshooting process that might lead you to a working solution but without evidently enlightening the real source of the problem is one of its disadvantages.
Comparison
It is the process of decoupling operating systems from the routers, switches, and other devices.
Virtualization
A plan where you can possibly reverse a provided solution to the problem if it generates another problem.
Rollback Plan
A strategy in network design that is also known as "narrow and deep".
Building Block
When a management station and a proprietary device are connected, SNMP (Simple Network Management Protocol) needs to be mapped.
SNMP
A system administrator conducting network troubleshooting found out that R1 serial interface uses PPP and the other end uses HDLC. This can be a framing error or encapsulation error.
Framing error and Encapsulation Error