CISCO
A type of troubleshooting that aims to exclude connections and network components that are immaterial to the current troubleshooting task.
Follow-the-path
Instigating a logging facility is a significant portion of network security and for network troubleshooting. Which of the following can be possibly used?
SNMP Traps
Syslog
Buffered logging
A type or troubleshooting where it needs for you to check every network devices until a possible root cause of the problem has been identified.
Bottom-up
Which can be used to manage devices over the network?
SSH
TFTP
HTTPS
SFTP
The primary purpose of the __________ is to deliver fault segregation and high-speed focal connectivity.
Core layer
This architecture is intended to discourse IT and business challenges, such as supporting the converged network and changing work patterns.
Cisco Borderless Network
Connecting hub and switches which was configured manually for the mode of transmission leads to _______.
Duplex Mismatch
A network design that is applicable for fixed and not-so fast developing networks.
two-tier campus network design
In network troubleshooting, IPv4 and IPv6 routing tables can be generated by the subsequent approaches:
Directly connected networks
Local host or local routes
Static routes
Dynamic routes
Default routes
A monitoring technique used by systems and network administrators to prevent possible problem before it actually happens.
Proactive Monitoring
In the concept of network infrastructure as a fabric, it pertains to the traditional network infrastructure.
Underlay Infrastructure
A software defined networking where all information of all the components in the network are administered.
Controller-based
A step in troubleshooting where possible root cause of the problem has to be determined.
Eliminate Possible Causes
Which of the following settings belongs to SNMPv3?
Username
Authpriv
MD5
AES
If you are to perform network troubleshooting and you decided to start on a chosen layer and perform testing in all directions from that layer, then you are doing __________________.
Divide-and-conquer
A network device characteristic and business consideration to deliver uninterrupted access to the network.
Resiliency
Utilizing this cloud service permits IT managers to install and execute software code, which can include operating systems and applications.
laaS
Which of the following common data formats are used in network automation and programmability?
JSON
XML
YAML
intranet : ___________________ <==> internet : cloud computing
Virtual Computing
A step in network design where the network designer requires to understand the fundamental existing and upcoming desires of all the possible end users of the network.
Borderless Switched network
Requirements gathering
A hardware troubleshooting tool that can be used to measure the length to a performance related causes like return loss and cross talk.
Cable Analyzers
A approach that is more like a random troubleshooting for system administrator newbie
Educated Guess
__________ : Aggregation <=> STP : Redundancy
EtherChannel
It pertains to as a statement of network essentials needed to meet the requirements of the organization
Network Baseline
Logical Network Design
A troubleshooting process when the solution has been formed after problem identification.
Propose Hypothesis
A type of troubleshooting where in a definite circumstances, this can be an best way for rapid difficult purpose, such as with a serious single point of failure.
Substitution
Which of the following configuration management tools are based on the Ruby programming language?
Chef
Puppet
Which of the following configuration management tools are based on the python programming language?
Ansible
SaltStack
A consideration in network design where user demands are predicted by constructing more capacity than what the user expects
Scalability
Switches : STP <==> Routers : ____________________
OSPF
Which of the following are mechanisms of software defined networks?
OpenFlow
OpenStack
Interface to the Routing System (I2RS)
Transparent Interconnection of Lots of Links (TRILL)
Cisco FabricPath (FP)
SPB
The systems administrator wishes to design a scalable network. What are the possible considerations that he must take?
Redundancy
Scalable Routing Protocol
Wireless Connectivity
_____: Layer 3 <==> STP : Layer 2
OSPF
It allows the operating systems to communicate with the firmware to create instances of Oss
Server Virtualization
A hardware troubleshooting tools that can utilized to distinguish smashed physical links, crossed-over wiring, shorted links, and incorrectly paired connections.
Cable Testers
Which of the following configuration management tools are agent-based and agentless?
Ansible
Chef
RESTful API includes the following features that conforms with the constraint if the REST architecture.
Client-Server
Stateless
Cacheable
The physical network infrastructure where the cloud services run.
Data Centers
A network design guidelines that satisfies end-user’s anticipations for minimizing if not eliminating downtimes.
Resiliency
An illustrations that keep trail of the locality, purpose, and status of equipments on the network.
Network Topology Diagrams
The network design characteristics that allows continuous network growth and unified provision enablement on an on-demand manner.
Modularity
Which of the following are web service APIs that is used in network automation and programmability?
SOAP
REST
XML-RPC
JSON-RPC
It pertains to the the virtual private networks like IPSec operating over the physical devices in a network infrastructure as Fabric
Overlay Network
An SDN which includes an added Policy layer that works at a higher level of abstraction
Policy Based
A troubleshooting process that might lead you to a working solution but without evidently enlightening the real source of the problem is one of its disadvantage.
Comparison (sauce ito yung naka green)
It is the process of decoupling operating systems from the routers, switches, and other devices.
Virtualization
A plan where you can possibly reverse a provided solution to the problem if it generates another problem.
Rollback Plan
A strategy in network design that is also known as “narrow and deep”.
Building Block
When a management station and a proprietary device are connected, which of the following functions needs to be mapped?
SNMP (Simple Network Management Protocol)
A system administrator is conducting network troubleshooting and found out that R1 serial interface uses PPP and the other end uses the HDLC. What type of problem can this be?
Framing error
Encapsulation Error
A type of troubleshooting that aims to exclude connections and network components that are immaterial to the current troubleshooting task.
Follow-the-path
Instigating a logging facility is a significant portion of network security and for network troubleshooting. Which of the following can be possibly used?
SNMP Traps
Syslog
Buffered logging
A type or troubleshooting where it needs for you to check every network devices until a possible root cause of the problem has been identified.
Bottom-up
Which can be used to manage devices over the network?
SSH
TFTP
HTTPS
SFTP
The primary purpose of the __________ is to deliver fault segregation and high-speed focal connectivity.
Core layer
This architecture is intended to discourse IT and business challenges, such as supporting the converged network and changing work patterns.
Cisco Borderless Network
Connecting hub and switches which was configured manually for the mode of transmission leads to _______.
Duplex Mismatch
A network design that is applicable for fixed and not-so fast developing networks.
two-tier campus network design
In network troubleshooting, IPv4 and IPv6 routing tables can be generated by the subsequent approaches:
Directly connected networks
Local host or local routes
Static routes
Dynamic routes
Default routes
A monitoring technique used by systems and network administrators to prevent possible problem before it actually happens.
Proactive Monitoring
In the concept of network infrastructure as a fabric, it pertains to the traditional network infrastructure.
Underlay Infrastructure
A software defined networking where all information of all the components in the network are administered.
Controller-based
A step in troubleshooting where possible root cause of the problem has to be determined.
Eliminate Possible Causes
Which of the following settings belongs to SNMPv3?
Username
Authpriv
MD5
AES
If you are to perform network troubleshooting and you decided to start on a chosen layer and perform testing in all directions from that layer, then you are doing __________________.
Divide-and-conquer
A network device characteristic and business consideration to deliver uninterrupted access to the network.
Resiliency
Utilizing this cloud service permits IT managers to install and execute software code, which can include operating systems and applications.
laaS
Which of the following common data formats are used in network automation and programmability?
JSON
XML
YAML
intranet : ___________________ <==> internet : cloud computing
Virtual Computing
A step in network design where the network designer requires to understand the fundamental existing and upcoming desires of all the possible end users of the network.
Borderless Switched network
Requirements gathering
A hardware troubleshooting tool that can be used to measure the length to a performance related causes like return loss and cross talk.
Cable Analyzers
A approach that is more like a random troubleshooting for system administrator newbie
Educated Guess
__________ : Aggregation <=> STP : Redundancy
EtherChannel
It pertains to as a statement of network essentials needed to meet the requirements of the organization
Network Baseline
Logical Network Design
A troubleshooting process when the solution has been formed after problem identification.
Propose Hypothesis
A type of troubleshooting where in a definite circumstances, this can be an best way for rapid difficult purpose, such as with a serious single point of failure.
Substitution
Which of the following configuration management tools are based on the Ruby programming language?
Chef
Puppet
Which of the following configuration management tools are based on the python programming language?
Ansible
SaltStack
A consideration in network design where user demands are predicted by constructing more capacity than what the user expects
Scalability
Switches : STP <==> Routers : ____________________
OSPF
Which of the following are mechanisms of software defined networks?
OpenFlow
OpenStack
Interface to the Routing System (I2RS)
Transparent Interconnection of Lots of Links (TRILL)
Cisco FabricPath (FP)
SPB
The systems administrator wishes to design a scalable network. What are the possible considerations that he must take?
Redundancy
Scalable Routing Protocol
Wireless Connectivity
_____: Layer 3 <==> STP : Layer 2
OSPF
It allows the operating systems to communicate with the firmware to create instances of Oss
Server Virtualization
A hardware troubleshooting tools that can utilized to distinguish smashed physical links, crossed-over wiring, shorted links, and incorrectly paired connections.
Cable Testers
Which of the following configuration management tools are agent-based and agentless?
Ansible
Chef
RESTful API includes the following features that conforms with the constraint if the REST architecture.
Client-Server
Stateless
Cacheable
The physical network infrastructure where the cloud services run.
Data Centers
A network design guidelines that satisfies end-user’s anticipations for minimizing if not eliminating downtimes.
Resiliency
An illustrations that keep trail of the locality, purpose, and status of equipments on the network.
Network Topology Diagrams
The network design characteristics that allows continuous network growth and unified provision enablement on an on-demand manner.
Modularity
Which of the following are web service APIs that is used in network automation and programmability?
SOAP
REST
XML-RPC
JSON-RPC
It pertains to the the virtual private networks like IPSec operating over the physical devices in a network infrastructure as Fabric
Overlay Network
An SDN which includes an added Policy layer that works at a higher level of abstraction
Policy Based
A troubleshooting process that might lead you to a working solution but without evidently enlightening the real source of the problem is one of its disadvantage.
Comparison (sauce ito yung naka green)
It is the process of decoupling operating systems from the routers, switches, and other devices.
Virtualization
A plan where you can possibly reverse a provided solution to the problem if it generates another problem.
Rollback Plan
A strategy in network design that is also known as “narrow and deep”.
Building Block
When a management station and a proprietary device are connected, which of the following functions needs to be mapped?
SNMP (Simple Network Management Protocol)
A system administrator is conducting network troubleshooting and found out that R1 serial interface uses PPP and the other end uses the HDLC. What type of problem can this be?
Framing error
Encapsulation Error