CCNA 3 modules 9-12

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 64

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

65 Terms

1

jitter

What is the term used to indicate a variation of delay?

-latency

-serialization delay

-speed mismatch

-jitter

New cards
2

latency

A network engineer performs a ping test and receives a value that shows the time it takes for a packet to travel from a source to a destination device and return. Which term describes the value?

-jitter

-latency

-priority

-bandwidth

New cards
3

Network devices ensure that resources are available before traffic is allowed to be sent by a host through the network.

What role do network devices play in the IntServ QoS model?

-Network devices ensure that resources are available before traffic is allowed to be sent by a host through the network.

-Network devices provide a best-effort approach to forwarding traffic.

-Network devices are configured to service multiple classes of traffic and handle traffic as it may arrive.

-Network devices use QoS on a hop-by-hop basis to provide excellent scalability.

New cards
4

IP pone

Which device would be classified as a trusted endpoint?

-switch

-router

-firewall

-IP pone

New cards
5

Layer 3 marking can carry the QoS information end-to-end.

What is the benefit of deploying Layer 3 QoS marking across an enterprise network?

-Layer 3 marking can carry the QoS information end-to-end.

-Layer 3 marking can carry QoS information on switches that are not IP aware.

-Layer 3 marking can be carried in the 802.1Q fields.

-Layer 3 marking can be used to carry non-IP traffic.

New cards
6

A trust boundary identifies which devices trust the marking on packets that enter a network.

What is the function of a QoS trust boundary?

-A trust boundary identifies the location where traffic cannot be remarked.

-A trust boundary only allows traffic to enter if it has previously been marked.

-A trust boundary identifies which devices trust the marking on packets that enter a network.

-A trust boundary only allows traffic from trusted endpoints to enter the network.

New cards
7

-Drop lower-priority packets.

-Increase link capacity.

What are two approaches to prevent packet loss due to congestion on an interface? (Choose two.)

-Decrease buffer space.

-Disable queuing mechanisms.

-Drop lower-priority packets.

-Prevent bursts of traffic.

-Increase link capacity.

New cards
8

SNMPv3 configured with the auth security level

What configuration scenario would offer the most protection to SNMP get and set messages?

-SNMPv2 for in-band management with read-write community strings

-SNMPv1 with out-of-band management in a private subnet

-SNMPv3 configured with the auth security level

-SNMP community strings

New cards
9

192.168.11.252

Refer to the exhibit.

The network administrator enters these commands into the R1 router:

R1# copy running-config tftp

Address or name of remote host [ ]?

When the router prompts for an address or remote host name, what IP address should the administrator enter at the prompt?

-192.168.9.254

-192.168.10.2

-192.168.11.252

-192.168.11.254

-192.168.10.1

<p>Refer to the exhibit.</p><p>The network administrator enters these commands into the R1 router:</p><p>R1# copy running-config tftp</p><p>Address or name of remote host [ ]?</p><p>When the router prompts for an address or remote host name, what IP address should the administrator enter at the prompt?</p><p>-192.168.9.254</p><p>-192.168.10.2</p><p>-192.168.11.252</p><p>-192.168.11.254</p><p>-192.168.10.1</p>
New cards
10

synchronizes the system clock with the time source with IP address 10.1.1.1

The command ntp server 10.1.1.1 is issued on a router. What impact does this command have?

-determines which server to send system log files to

-synchronizes the system clock with the time source with IP address 10.1.1.1

-identifies the server on which to store backup configurations

-ensures that all logging will have a time stamp associated with it

New cards
11

grouping multiple physical ports to increase bandwidth between two switches

As the network administrator you have been asked to implement EtherChannel on the corporate network. What does this configuration consist of?

-providing redundant links that dynamically block or forward traffic

-grouping two devices to share a virtual IP address

-grouping multiple physical ports to increase bandwidth between two switches

-providing redundant devices to allow traffic to flow in the event of device failure

New cards
12

distribution and core layers collapsed into one tier, and the access layer on a separate tier

What is a definition of a two-tier LAN network design?

-access and core layers collapsed into one tier, and the distribution layer on a separate tier

-distribution and core layers collapsed into one tier, and the access layer on a separate tier

-access, distribution, and core layers collapsed into one tier, with a separate backbone layer

-access and distribution layers collapsed into one tier, and the core layer on a separate tier

New cards
13

-to identify future abnormal network behavior

-to determine if the network can deliver the required policies

What are two reasons to create a network baseline? (Choose two.)

-to select a routing protocol

-to determine what kind of equipment to implement

-to design a network according to a proper model

-to identify future abnormal network behavior

-to evaluate security vulnerabilities in the network

-to determine if the network can deliver the required policies

New cards
14

The computer has an invalid default gateway address.

A computer can access devices on the same network but cannot access devices on other networks. What is the probable cause of this problem?

-The computer has an incorrect subnet mask.

-The computer has an invalid default gateway address.

-The cable is not connected properly to the NIC.

-The computer has an invalid IP address.

New cards
15

Narrow the scope.

In which step of gathering symptoms does the network engineer determine if the problem is at the core, distribution, or access layer of the network?

-Gather information.

-Narrow the scope.

-Document the symptoms.

-Determine ownership.

-Determine the symptoms.

New cards
16

LLQ

A network administrator is deploying QoS with the ability to provide a special queue for voice traffic so that voice traffic is forwarded before network traffic in other queues. Which queuing method would be the best choice?

-LLQ

-CBWFQ

-WFQ

-FIFO

New cards
17

-Voice traffic latency should not exceed 150 ms.

-Dropped voice packets are not retransmitted.

What are two characteristics of voice traffic? (Choose two.)

-Voice traffic latency should not exceed 150 ms.

-Voice traffic is unpredictable and inconsistent.

-Voice traffic requires at least 384 kbs of bandwidth.

-Voice traffic consumes lots of network resources.

-Dropped voice packets are not retransmitted.

New cards
18

UDP

Which type of network traffic cannot be managed using congestion avoidance tools?

-TCP

-ICMP

-IP

-UDP

New cards
19

-Delay

-jitter

When QoS is implemented in a converged network, which two factors can be controlled to improve network performance for real-time traffic? (Choose two.)

-Delay

-packet addressing

-jitter

-packet routing

-link speed

New cards
20

-name of the configuration file that is stored on the TFTP server

-TFTP server IP address

An administrator wants to replace the configuration file on a Cisco router by loading a new configuration file from a TFTP server. What two things does the administrator need to know before performing this task? (Choose two.)

-name of the configuration file that is currently stored on the router

-configuration register value

-name of the configuration file that is stored on the TFTP server

-router IP address

-TFTP server IP address

New cards
21

The router selects an image depending on the boot system command in the configuration.

Refer to the exhibit.

Which of the three Cisco IOS images shown will load into RAM?

-The router selects an image depending on the boot system command in the configuration.

-The router selects an image depending on the value of the configuration register.

-The router selects the third Cisco IOS image because it is the most recent IOS image.

-The router selects the third Cisco IOS image because it contains the advipservicesk9 image.

-The router selects the second Cisco IOS image because it is the smallest IOS image.

<p>Refer to the exhibit.</p><p>Which of the three Cisco IOS images shown will load into RAM?</p><p>-The router selects an image depending on the boot system command in the configuration.</p><p>-The router selects an image depending on the value of the configuration register.</p><p>-The router selects the third Cisco IOS image because it is the most recent IOS image.</p><p>-The router selects the third Cisco IOS image because it contains the advipservicesk9 image.</p><p>-The router selects the second Cisco IOS image because it is the smallest IOS image.</p>
New cards
22

-Switch

-router

Refer to the exhibit.

What two types of devices are connected to R1? (Choose two.)

-Switch

-hub

-router

-repeater

-Source Route Bridge

<p>Refer to the exhibit.</p><p>What two types of devices are connected to R1? (Choose two.)</p><p>-Switch</p><p>-hub</p><p>-router</p><p>-repeater</p><p>-Source Route Bridge</p>
New cards
23

-to select the type of logging information that is captured

-to gather logging information for monitoring and troubleshooting

-to specify the destinations of captured messages

What are three functions provided by the syslog service? (Choose three.)

-to select the type of logging information that is captured

-to periodically poll agents for data

-to provide statistics on packets that are flowing through a Cisco device

-to provide traffic analysis

-to gather logging information for monitoring and troubleshooting

-to specify the destinations of captured messages

New cards
24

to store data about a device

What is the function of the MIB element as part of a network management system?

-to collect data from SNMP agents

-to send and retrieve network management information

-to change configurations on SNMP agents

-to store data about a device

New cards
25

the deployment of distribution layer switches in pairs and the division of access layer switch connections between them

What network design would contain the scope of disruptions on a network should a failure occur?

-the reduction in the number of redundant devices and connections in the network core

-the installation of only enterprise class equipment throughout the network

-the deployment of distribution layer switches in pairs and the division of access layer switch connections between them

-the configuration of all access layer devices to share a single gateway

New cards
26

add alternate physical paths for data to traverse the network

Which action should be taken when planning for redundancy on a hierarchical network design?

-add alternate physical paths for data to traverse the network

-continually purchase backup equipment for the network

-implement STP portfast between the switches on the network

-immediately replace a non-functioning module, service or device on a network

New cards
27

-increased flexibility

-reduced costs

What are two benefits of extending access layer connectivity to users through a wireless medium? (Choose two.)

-increased flexibility

-increased network management options

-decreased number of critical points of failure

-reduced costs

-increased bandwidth availability

New cards
28

provides access to the user

What is a basic function of the Cisco Borderless Architecture access layer?

-aggregates Layer 2 broadcast domains

-provides access to the user

-aggregates Layer 3 routing boundaries

-provides fault isolation

New cards
29

ability to build a routing table

Which characteristic would most influence a network design engineer to select a multilayer switch over a Layer 2 switch?

-ability to have multiple forwarding paths through the switched network based on VLAN number(s)

-ability to build a routing table

-ability to provide power to directly-attached devices and the switch itself

-ability to aggregate multiple ports for maximum data throughput

New cards
30

The serial interfaces are not in the same area.

Refer to the exhibit.

Why are routers R1 and R2 not able to establish an OSPF adjacency?​

-The serial interfaces are not in the same area.

-The process numbers are not the same in both routers.

-A backbone router cannot establish an adjacency with an ABR router.

-The router ID values are not the same in both routers.

<p>Refer to the exhibit.</p><p>Why are routers R1 and R2 not able to establish an OSPF adjacency?​</p><p>-The serial interfaces are not in the same area.</p><p>-The process numbers are not the same in both routers.</p><p>-A backbone router cannot establish an adjacency with an ABR router.</p><p>-The router ID values are not the same in both routers.</p>
New cards
31

at the same time each day across a set period of average working days, so that typical traffic patterns can be established

When is the most appropriate time to measure network operations to establish a network performance baseline?

-whenever high network use is detected, so that how the network performs under stress can be monitored

-during quiet vacation periods, so that the level of non-data traffic can be determined

-at the same time each day across a set period of average working days, so that typical traffic patterns can be established

-at random times during a 10 week period, so that abnormal traffic levels can be detected

New cards
32

The default gateway address is incorrect.

Refer to the exhibit.

A user has configured a NIC on the PC as shown but finds that the PC is unable to access the Internet. What is the problem?

-The preferred DNS address is incorrect.

-The default gateway address is incorrect.

-The settings were not validated upon exit.

-There should not be an alternate DNS server.

<p>Refer to the exhibit.</p><p>A user has configured a NIC on the PC as shown but finds that the PC is unable to access the Internet. What is the problem?</p><p>-The preferred DNS address is incorrect.</p><p>-The default gateway address is incorrect.</p><p>-The settings were not validated upon exit.</p><p>-There should not be an alternate DNS server.</p>
New cards
33

The ACL is implicitly denying access to all the servers.

Refer to the exhibit.

A network engineer configured an ACL preventing Telnet and HTTP access to the HQ web server from guest users in the Branch LAN. The address of the web server is 192.168.1.10 and all guest users are assigned addresses in the 192.168.10.0/24 network. After implementing the ACL, no one can access any of the HQ servers. What is the problem?

-Inbound ACLs must be routed before they are processed.

-The ACL is implicitly denying access to all the servers.

-Named ACLs require the use of port numbers.

-The ACL is applied to the interface using the wrong direction.

<p>Refer to the exhibit.</p><p>A network engineer configured an ACL preventing Telnet and HTTP access to the HQ web server from guest users in the Branch LAN. The address of the web server is 192.168.1.10 and all guest users are assigned addresses in the 192.168.10.0/24 network. After implementing the ACL, no one can access any of the HQ servers. What is the problem?</p><p>-Inbound ACLs must be routed before they are processed.</p><p>-The ACL is implicitly denying access to all the servers.</p><p>-Named ACLs require the use of port numbers.</p><p>-The ACL is applied to the interface using the wrong direction.</p>
New cards
34

Test Layer 3 connectivity between the directly connected routers.

Refer to the exhibit.

A network administrator has configured OSPFv2 on the two Cisco routers as shown. PC1 is unable to connect to PC2. What should the administrator do first when troubleshooting the OSPFv2 implementation?

-Disconnect the serial link between router R1 and R2.

-Turn off OSPFv2.

-Implement the network 192.168.255.0 0.0.0.3 area 0 command on router R1.

-Test Layer 3 connectivity between the directly connected routers.

<p>Refer to the exhibit.</p><p>A network administrator has configured OSPFv2 on the two Cisco routers as shown. PC1 is unable to connect to PC2. What should the administrator do first when troubleshooting the OSPFv2 implementation?</p><p>-Disconnect the serial link between router R1 and R2.</p><p>-Turn off OSPFv2.</p><p>-Implement the network 192.168.255.0 0.0.0.3 area 0 command on router R1.</p><p>-Test Layer 3 connectivity between the directly connected routers.</p>
New cards
35

Voice

What type of traffic is described as requiring latency to be no more than 150 milliseconds (ms)?

-Voice

-video

-data

New cards
36

service timestamps log datetime

A network manager wants to add a time to log messages so that there is record of when the message was generated. What command should the administrator use on a Cisco router?

-show cdp interface

-ntp server 10.10.14.9

-service timestamps log datetime

-clock timezone PST -7

New cards
37

core layer

provides high-speed backbone connectivity

New cards
38

core layer

functions as an aggregator for all the campus blocks

New cards
39

access layer

provides network access to the user

New cards
40

access layer

represents the network edge

New cards
41

distribution layer

implements network access policy

New cards
42

distribution layer

establishes layer 3 routing boundaries

New cards
43

flexibility

allows intelligent traffic load sharing by using all network resources

New cards
44

hierarchical

Facilitates understanding the role of each device at every tier, simplifies deployment, operation, and management, and reduces fault domains at every tier

New cards
45

modularity

Allows seamless network expansion and integrated service enablement on an on-demand basis

New cards
46

resiliency

Satisfies user expectations for keeping the network always on

New cards
47

-It does not provide a delivery guarantee for packets.

-It treats all network packets in the same way.

What are two characteristics of the best-effort QoS model? (Choose two.)

-It allows end hosts to signal their QoS needs to the network.

-It uses a connection-oriented approach with QoS.

-It provides preferential treatment for voice packets.

-It does not provide a delivery guarantee for packets.

-It treats all network packets in the same way.

New cards
48

Voice and video communications are more sensitive to latency.

Why is QoS an important issue in a converged network that combines voice, video, and data communications?

-Data communications are sensitive to jitter.

-Legacy equipment is unable to transmit voice and video without QoS.

-Correct Response

-Voice and video communications are more sensitive to latency.

-Data communications must be given the first priority.

New cards
49

The router will load IOS from the TFTP server. If the image fails to load, it will load the IOS image from ROM.

A network administrator configures a router with the command sequence:

R1(config)# boot system tftp://c1900-universalk9-mz.SPA.152-4.M3.bin

R1(config)# boot system rom

What is the effect of the command sequence?

-On next reboot, the router will load the IOS image from ROM.

-The router will search and load a valid IOS image in the sequence of flash, TFTP, and ROM.

-The router will copy the IOS image from the TFTP server and then reboot the system.

-The router will load IOS from the TFTP server. If the image fails to load, it will load the IOS image from ROM.

New cards
50

A set request is used by the NMS to change configuration variables in the agent device.

Which statement describes SNMP operation?

-An SNMP agent that resides on a managed device collects information about the device and stores that information remotely in the MIB that is located on the NMS.​

-A set request is used by the NMS to change configuration variables in the agent device.

-An NMS periodically polls the SNMP agents that are residing on managed devices by using traps to query the devices for data.​

-A get request is used by the SNMP agent to query the device for data.​

New cards
51

-Dev1 is connected to interface Fa0/5 of S1.

-Dev2 is a switch.

Refer to the exhibit.

A network administrator issues the show lldp neighbors command on a switch. What are two conclusions that can be drawn? (Choose two.)

-Dev1 is connected to interface Fa0/5 of S1.

-Dev1 is a switch with mixed types of interfaces.

-Dev2 is a switch.

-Dev1 is connected to interface Fa0/4 of Dev2.

-S1 has only two interfaces.

<p>Refer to the exhibit.</p><p>A network administrator issues the show lldp neighbors command on a switch. What are two conclusions that can be drawn? (Choose two.)</p><p>-Dev1 is connected to interface Fa0/5 of S1.</p><p>-Dev1 is a switch with mixed types of interfaces.</p><p>-Dev2 is a switch.</p><p>-Dev1 is connected to interface Fa0/4 of Dev2.</p><p>-S1 has only two interfaces.</p>
New cards
52

-Distribution

-access

-core

What are the three layers of the switch hierarchical design model? (Choose three.)

-Distribution

-network access

-data link

-enterprise

-access

-core

New cards
53

PC_3 and AP_2

Refer to the exhibit.

Which devices exist in the failure domain when switch S3 loses power?

-S4 and PC_2

-PC_3 and PC_2

-PC_3 and AP_2

-S1 and S4

-AP_2 and AP_1

<p>Refer to the exhibit.</p><p>Which devices exist in the failure domain when switch S3 loses power?</p><p>-S4 and PC_2</p><p>-PC_3 and PC_2</p><p>-PC_3 and AP_2</p><p>-S1 and S4</p><p>-AP_2 and AP_1</p>
New cards
54

The failure of a switch block will not impact all end users.

A network designer is considering whether to implement a switch block on the company network. What is the primary advantage of deploying a switch block?

-This is network application software that prevents the failure of a single network device.

-The failure of a switch block will not impact all end users.

-This is a security feature that is available on all new Catalyst switches.

-A single core router provides all the routing between VLANs.

New cards
55

protocol analyzer

Which troubleshooting tool would a network administrator use to check the Layer 2 header of frames that are leaving a particular host?

-knowledge base

-protocol analyzer

-CiscoView

-baselining tool

New cards
56

They are in different subnets.

Refer to the exhibit.

R1 and R3 are connected to each other via the local serial 0/0/0 interface. Why are they not forming an adjacency?

-They have different routing processes.

-They have different router IDs.

-They are in different subnets.

-The connecting interfaces are configured as passive.

<p>Refer to the exhibit.</p><p>R1 and R3 are connected to each other via the local serial 0/0/0 interface. Why are they not forming an adjacency?</p><p>-They have different routing processes.</p><p>-They have different router IDs.</p><p>-They are in different subnets.</p><p>-The connecting interfaces are configured as passive.</p>
New cards
57

video

What type of traffic is described as not resilient to loss?

-data

-video

-voice

New cards
58

dir

A network manager wants lists the contents of flash. What command should the administrator use on a Cisco router?

-show file systems

-dir

-lldp enable

-service timestamps log datetime

New cards
59

jitter

Voice packets are being received in a continuous stream by an IP phone, but because of network congestion the delay between each packet varies and is causing broken conversations. What term describes the cause of this condition?

-buffering

-latency

-queuing

-jitter

New cards
60

DNS

A user is unable to reach the website when typing http://www.cisco.com in a web browser, but can reach the same site by typing http://72.163.4.161 . What is the issue?

-DHCP

-DNS

-Default Gateway

-TCP/IP Protocol stack

New cards
61

Video

What type of traffic is described as tending to be unpredictable, inconsistent, and bursty?

-Audio

-Video

-Data

-Voice

New cards
62

show flash:0

A network manager wants to determine the size of the Cisco IOS image file on the networking device. What command should the administrator use on a Cisco router?

-show flash:0

-copy flash: tftp:

-config-register 0x2102

-confreg 0x2142

New cards
63

Once it is verified that a component in a particular layer is functioning properly, testing can then be performed on any other layer.

What is the principle that is applied when a network technician is troubleshooting a network fault by using the divide-and-conquer method?

-Testing is performed at Layer 7 and at Layer 1, then at Layers 6 and 2, and so on, working towards the middle of the stack until all layers are verified as operational.

-Once it is verified that components in a particular layer are functioning properly, it can then be assumed that components in the layers below it are also functional.

-Testing is performed at all layers of the OSI model until a non-functioning component is found.

-Once it is verified that a component in a particular layer is functioning properly, testing can then be performed on any other layer.

New cards
64

FIFO

Which queuing algorithm has only a single queue and treats all packets equally?

-CBWFQ

-FIFO

-LLQ

-WFQ

New cards
65

voice

What type of traffic is described as traffic that requires at least 30 Kbps of bandwidth?

-voice

-data

-video

New cards
robot