Qwiz2
A VIK Wikiből
A network engineer is troubleshooting a network problem and can successfully ping between two devices. However, Telnet between the same two devices does not work. Which OSI layers should the administrator investigate next?
- Only the network layer
- From the network layer to the application layer
- All of the layers
- From the network layer to the physical layer
Which action should be taken when planning for redundancy on a hierarchical network design?
- Implement STP PortFast between the switches on the network.
- Purchase backup equipment for every network device at the distribution layer.
- Add alternate physical paths for data to traverse the network.
- Immediately replace a nonfunctioning module, service ,or device on a network.
Which type of switch supports routing protocols and can forward IP packets at close to Layer 2 forwarding rates?
- Modular
- Multilayer
- Cloud-managed
- Stackable
Which SNMP version provides services for security models?
- Version 2
- Version 3
- Both
Which QoS model requires no special QoS mechanisms?
- Best effort
- Integrated services
- Differential services
Which document could be referenced to identify the OS on a server?
- End-system Documentation
- LAN Switch Device Documentation
- Router Device Documentation
Which type of traffic requires at least 384 Kbs of bandwidth?
- Voice
- Video
- Data
Which OSI layer are you troubleshooting when the cause of network transmission errors is due to late collisions, short frames, and jabber?
- Application
- Data link
- Network
- Physical
- Transport
What happens when an edge router using IntServ QoS determines that the data pathway cannot support the level of QoS requested?
- Data is forwarded along the pathway using a best-effort approach.
- Data is not forwarded along the pathway.
- Data is forwarded along the pathway using IntServ but not provided preferential treatment.
- Data is forwarded along the pathway using DiffServ.
Which tool is useful to investigate packet content while flowing through the network?
- Baselining tool
- Knowledge base
- NMS
- Protocol analyzer
What is the highest OSI layer that should be considered when troubleshooting routers and Layer 3 switches?
- Layer 1
- Layer 2
- Layer 3
- Layer 4
- Layer 7
What are two reasons for an administrator to issue the copy running-config tftp command on a switch or router? (Choose two.)
- To overwrite the current configuration.
- To save the running configuration file to a remote location.
- To have a backup of the running configuration file in the router.
- To force an automatic reload of the device.
- To transfer the current configuration file to a server.
Which topology diagram displays IP addresses?
- IP topology
- Logical topology
- Physical topology
- Port topology
Cisco IOS log messages fall into one of eight levels. Which syslog logging level is used to log the highest severity level?
- 0
- 1
- 4
- 6
Which type of traffic does Cisco recommend be placed in the strict priority queue (PQ) when low latency queuing (LLQ) is being used?
- Video
- Voice
- Management
- Data
Under which condition does congestion occur on a converged network with voice, video, and data traffic?
- If voice traffic latency begins to decrease accross the network.
- If a user downloads a file that exceeds the file limitation that is set on the server.
- If video traffic requests more bandwidth than voice traffic requests.
- If the request for bandwidth exceeds the amount of bandwidth available.
Which SNMP version uses community-based forms of security?
- Version 2
- Version 3
- Both
This type of router provides simple network configuration and management for LANs and WANs.
- Branch routers
- Network edge routers
- Service provider routers
- Industrial routers
When should a network performance baseline be measured?
- After normal work hours to reduce possible interruptions.
- During normal work hours of an organization.
- Immediately after the main network devices restarted.
- When a denial of service attack to the network is detected and blocked.
Which network layer provides direct, switched network connectivity to the user?
- Core
- Distribution
- Access
A network engineer is troubleshooting a network problem where users cannot access the FTP server at the same IP address where a website can be successfully accessed. Which troubleshooting method would be the best to apply in this case?
- Comparing IP settings on user workstations
- Top-down
- Bottom-up
- Divide-and-conquer
Which network design solution will best extend access layer connectivity to host devices?
- Implementing wireless connectivity.
- Implementing routing protocols.
- Implementing redundancy.
- Implementing EtherChannel.
What data would be saved and where would the data be placed if a network administrator issued the following command? (Choose two.)
R1# copy startup-config tftp
- The data to be saved is the configuration that is stored in NVRAM.
- The data to be saved is the configuration that is stored on a TFTP server.
- The data will be saved to a TFTP server.
- The data will be saved in RAM.
- The data to be saved is the configuration that is being modified in RAM.
- The data will be saved in NVRAM.
What command must be issued on a Cisco router that will serve as an authoritative NTP server?
- ntp server 172.16.0.1
- clock set 11:00:00 DEC 20 2010
- ntp broadcast client
- ntp master 1
Which SNMP version authenticates the source of management messages?
- Version 2
- Version 3
- Both
Which three recommendations may be included in a network design strategy that is focused on scalability? (Choose three.)
- Design a hierarchical network.
- Use Layer 2 devices to filter and reduce network traffic in the core.
- Choose routers or multilayer switches to limit broadcasts and filter other undesirable traffic from the network.
- Use expandable, modular equipment, or clustered devices that can be easily upgraded to increase capabilities.
- Combine the access and distribution layer for easier access and limit the size of the failure domain.
Which option lists the three troubleshooting stages in the correct order?
- Gather symptoms, implement corrective action, and isolate the problem.
- Gather symptoms, isolate the problem, and implement corrective action.
- Implement corrective action, gather symptoms, and isolate the problem.
- Implement corrective action, isolate the problem, and gather symptoms.
- Isolate the problem, gather symptoms, and implement corrective action.
- Isolate the problem, implement corrective action, and gather symptoms.
Which queuing mechanism supports user-defined traffic classes?
- CBWFQ
- WFQ
- FCFS
- FIFO
Which provides buffer management and allows TCP traffic to throttle back before buffers are exhausted?
- Traffic policing
- 802.1Q
- WRED
What mechanism compensates for jitter in an audio stream by buffering packets and then replaying them outbound in a steady stream?
- Digital signal processor
- Voice codec
- WFQ
- Playout delay buffer
Which term describes the ability of a network to use all available network resources and to provide data load sharing?
- Hierarchical
- Modular
- Resilient
- Flexible
Refer to the following syslog: Jun 12 17:46:01.619: %IFMGR-7-NO_IFINDEX_FILE: Unable to open nvram:/ifIndex-table No such file or directory
What security level generated the message?
- Error
- Informational
- Warning
- Debugging
- Application
- Data link
- Network
- Physical
- Transport
Which hardware troubleshooting tool is a multifunctional handheld device used to test and certify copper and fiber cables for different services and standards?
- Cabel analyzer
- Cabel tester
- Digital multimeters
- Network Analysis Module
- Portable Network Analyzers
How much traffic is a 48-port gigabit switch capable of switching when operating at full wire speed?
- 48 Gb/s, by providing full bandwidth to each port.
- 24 Gb/s, because this is the maximum forwarding rate on Cisco switches.
- 1 Gb/s, because data can only be forwarded from one port at a time.
- 44 Gb/s, due to overhead requirements.
Which protocol or service can be configured to send unsolicited messages to alert the network administrator about a network event such as an extremely high CPU utilization on a router?
- Syslog
- SNMP
- NetFlow
- NTP
What information can be gathered about a neighbor device from the show cdp neighbors detail command that cannot be found with the show cdp neighbors command?
- The hostname of the neighbor.
- The platform that is used by the neighbor.
- The IP address of the neighbor.
- The capabilities of the neighbor.
A technician installed a network adapter in a computer and wants to test network connectivity. The ping command can receive responses from workstations on the same subnet but not from remote workstations. What could be causing the problem?
- The NIC driver is out of date.
- The TCP/IP protocol stack is not loaded.
- The default gateway is incorrect.
- The operating system is not compatible with the remote sites.
What role do network devices play in the IntServ QoS model?
- Network devices are configured to service multiple classes of traffic and handle traffic as it may arrive.
- Network devices use QoS on a hop-by-hop basis to provide excellent scalability.
- Network devices ensure that resources are available before traffic is allowed to be sent by a host through the network.
- Network devices provide a best effort approach to forwarding traffic.
Which troubleshooting software is an example of a network management system tool?
- CyberGauge
- LANsurveyor
- WhatsUp Gold
- Wireshark
- Application
- Data link
- Network
- Physical
- Transport
Which command would a network engineer use to restore the IOS image c1900-universalk9-mz.SPA.152-4.M3.bin to a router?
- copy flash0: c1900-universalk9-mz.SPA.152-4.M3.bin
- copy flash0: tftp:
- copy tftp: flash0:
- copy c1900-universalk9-mz.SPA.152-4.M3.bin tftp:
A network administrator issues the copy tftp running-config command on a router. What is the administrator trying to achieve?
- Copy the configuration file from the RAM of the router to the TFTP server.
- Copy the configuration file from the NVRAM of the router to the TFTP server.
- Copy the configuration file from the TFTP server to the RAM of the router.
- Copy the configuration file from the TFTP server to the NVRAM of the router.
Which feature could be used in a network design to increase the bandwidth by combining multiple physical links into a single logical link?
- Trunk ports
- EtherChannel
- VLANs
- Subinterfaces
Which SNMP version does not provide encrypted management messages?
- Version 2
- Version 3
- Both
What are two characteristics of voice traffic? (Choose two.)
- It consumes few network resources.
- It can tolerate latency up to 400 ms.
- It is delay sensitive.
- It is insensitive to packet loss.
- It is bursty.
What happens when congestion occurs?
- Packet loss
- Jitter
- Code delay
Which type of router would an enterprise use to allow customers to access content anytime and anyplace, regardless of whether they are at home or work?
- Branch routers
- Network edge routers
- Service provider routers
- Modular routers
Which queuing algorithm allows delay-sensitive data such as voice to be sent before packets in other queues?
- FIFO
- WFQ
- CBWFQ
- LLQ
A network engineer performs a ping test and receives a value that shows the time it takes for a packet to travel from a source to a destination device and return. Which term describes the value?
- Bandwidth
- Latency
- Priority
- Jitter
A networked PC is having trouble accessing the Internet, but can print to a local printer and ping other computers in the area. Other computers on the same network are not having any issues. What is the problem?
- The default gateway router does not have a default route.
- The switch port to which the PC connects has an incorrect VLAN configured.
- The link between the switch to which the PC connects and the default gateway router is down.
- The PC has a missing or incorrect default gateway.
Which SNMP version includes expanded error codes with types?
- Version 2
- Version 3
- Both
Refer to the following syslog: Jun 12 17:46:01.619: %IFMGR-7-NO_IFINDEX_FILE: Unable to open nvram:/ifIndex-table No such file or directory
What is the syslog reporting facility?
- IFMGR
- Unable to open nvram
- NO_IFINDEX_FILE
- ifIndex-table
Which type of traffic cannot be retransmitted if lost?
- Voice
- Video
- Data
Which characteristic of a network allows it to expand and provide on-demand services?
- Hierarchical
- Modular
- Resilient
- Flexible
Which model is the only QoS model with no mechanism to classify packets?
- Best-effort
- Hard QoS
- DiffServ
- IntServ
What is the term used to indicate a variation of delay?
- Latency
- Speed mismatch
- Jitter
- Serialization delay
Which category of switch is used to aggregate traffic at the edge of the network?
- Campus LAN switches
- Cloud-managed switches
- Service provider switches
- Data center switches
Which function is supplied by the access layer in a three-layer network design?
- High-speed connectivity.
- Network access.
- Routing.
- Application of policies.
- Backbone connectivity.
Field replaceable line cards are a feature found on which type of switch?
- Modular
- Fixed configuration
- Virtual
- Stackable
Which OSI layer are you troubleshooting when investigating a routing protocol loop?
- Application
- Data link
- Network
- Physical
- Transport
A computer technician performed a number of actions to correct a problem. Some actions did not solve the problem, but eventually a solution was found. What should be documented?
- A description of the problem and solution.
- Only the failed attempts, so that future technicians will know what not to try.
- Only the solution, because this solved the problem.
- Everything that was done to try to solve the problem.
Which command could be used to get detailed information about directly connected Cisco neighbor devices?
- show cdp neighbor
- show ip interface
- show ip route
- show version
What is the fixed amount of time it takes to transmit a frame from the NIC to the wire?
- Serialization delay
- Jitter
- Code delay
Which are recommendations to be used when communicate with a user?
- Always be considerate and empathize with users.
- Always listen or carefully read what the user is saying.
- Speak at a technical level they can understand.
- All the above
Which statement describes the physical topology for a LAN?
- It defines how hosts and network devices connect to the LAN.
- It describes whether the LAN is a broadcast or token-passing network.
- It depicts the addressing scheme that is employed in the LAN.
- It shows the order in which hosts access the network.
What is a function of the distribution layer?
- Interconnection of large-scale networks in wiring closets.
- Network access to the user.
- Fault isolation.
- High-speed backbone connectivity.
This type of router is designed to provide enterprise-class features in rugged and harsh environments.
- Branch routers
- Network edge routers
- Service provider routers
- Industrial routers
Which queuing algorithm is effective for large links that have little delay and minimal congestion?
- FIFO
- WFQ
- CBWFQ
- LLQ
Which queuing algorithm simultaneously schedules interactive traffic to the front of a queue to reduce response time?
- FIFO
- WFQ
- CBWFQ
- LLQ
While designing changes to a data center because of a new IoE implementation, a network administrator has the job of diagramming the new physical topology of the area. What should be included in the physical topology diagram?
- The IP addressing scheme for all workstations in the company.
- The service level agreement from the ISP.
- Technical specifications of firewalls.
- Cable locations and lengths between servers and switches.
Which queuing algorithm classifies traffic into different flows based on packet header addressing?
- FIFO
- WFQ
- CBWFQ
- LLQ
Which determines what class of traffic packets or frames belong to.
- Traffic policing
- Marking
- Classification
True or false? OSPF is well-suited for larger networks because it can be deployed using a hierarchical design.
- True
- False
Which QoS model uses explicit end-to-end resource admission control?
- Best effort
- Integrated services
- Differential services
During the gathering information step, which command would display the configured protocols and the global and interface-specific status of any configured Layer 3 protocol?
- show interface
- show ip interface brief
- show ip protocols
- show protocols
- show version
In QoS models, which type of traffic is commonly provided the most preferential treatment over all other application traffic?
- File transfers.
- Web traffic.
- Email.
- Voice traffic.
Which queuing algorithm applies priority, or weights, to identify traffic and classify it?
- FIFO
- WFQ
- CBWFQ
- LLQ
Which design feature will limit the size of a failure domain in an enterprise network?
- The purchase of enterprise equipment that is designed for large traffic volume.
- The use of a collapsed core design.
- The installation of redundant power supplies.
- The use of the building switch block approach.
After which step in the network troubleshooting process would one of the layered troubleshooting methods be used?
- Gathering symptoms from suspect devices.
- Narrowing the scope.
- Determining ownership.
- Documenting symptoms.
Which retains excess packets in a queue and then schedules the excess for later transmission over increments of time?
- Traffic policing
- Traffic shaping
- WRED
What is the variable amount of time it takes for a frame to traverse the links between the source and destination?
- Serialization delay
- Propagation delay
- Code delay
What happens when the memory queue of a device fills up and new network traffic is received?
- The network device queues the received traffic while sending previously received traffic.
- The network device sends the received traffic immediately.
- The network device will drop the arriving packets.
- The network device drops all traffic in the queue.
What is an SNMP management agent?
- A database that a device keeps about network performance.
- A communication protocol that is used by SNMP.
- Software that is installed on devices managed by SNMP.
- A computer loaded with management software and used by an administrator to monitor a network.
What are three important features that should be considered for implementation in a well-designed, scalable network? (Choose three.)
- Static routes
- Redundant links
- Multiple links
- Access layer with only wired devices
- Expandable, modular equipment
This is the term used to describe the number of ports available on a single switch.
- Speed
- Scalability
- Density
- Modularity
A company is setting up a web site with SSL technology to protect the authentication credentials required to access the web site. A network engineer needs to verify that the setup is correct and that the authentication is indeed encrypted. Which tool should be used?
- Baselining tool
- Protocol analyzer
- Cable analyzer
- Fault-management tool
Which device would be classified as a trusted endpoint?
- Firewall
- IP phone
- Switch
- Router
When SNMPv1 or SNMPv2 is being used, which feature provides secure access to MIB objects?
- Source validation
- Message integrity
- Community strings
- Packet encryption
What are SNMP trap messages?
- Unsolicited messages that are sent by the SNMP agent and alert the NMS to a condition on the network.
- Messages that are used by the NMS to change configuration variables in the agent device.
- Messages that are used by the NMS to query the device for data.
- Messages that are sent periodically by the NMS to the SNMP agents that reside on managed devices to query the device for data.
A network technician is troubleshooting an email connection problem. Which question to the end-user will provide clear information to better define the problem?
- How big are the emails you tried to send?
- When did you first notice your email problem?
- What kind of equipment are you using to send emails?
- Is your email working now?
This is the term used to describe switches that can be interconnected and managed as one larger single switch.
- Modular
- Multilayer
- Cloud-managed
- Stackable
Which type of traffic can be predictable and smooth?
- Voice
- Video
- Data
Refer to the following syslog: Jun 12 17:46:01.619: %IFMGR-7-NO_IFINDEX_FILE: Unable to open nvram:/ifIndex-table No such file or directory
What is the mnemonic for this syslog message?
- IFMGR
- Unable to open nvram
- NO_IFINDEX_FILE
- ifIndex-table
Which technology is required when switched networks are designed to include redundant links?
- Link aggregation
- Virtual LANs
- Virtual Private Network
- Spanning Tree Protocol
Which QoS model is very resource intensive and provides the highest guarantee of QoS?
- Best-effort
- Soft QoS
- DiffServ
- IntServ
What is the name of the layer in the Cisco borderless switched network design that is considered to be the backbone used for high-speed connectivity and fault isolation?
- Network access
- Core
- Access
- Data link
- Network
Which statement describes a syslog message severity level?
- A syslog alarm at the severity level 4 and higher is sent to an external syslog server by default.
- A severity level 7 message is only accessible through the terminal line.
- Severity level 0 is the most critical severity level.
- A syslog alarm with a severity level of 7 indicates an emergency situation that can render the system unusable.
Which QoS model is the most scalable?
- Best effort
- Integrated services
- Differential services
Which adds a value to the packet header?
- Marking
- 802.1Q
- Classification
Which detects when traffic rates reach a configured maximum rate and drops excess traffic?
- Traffic policing
- Traffic shaping
- Classification
Which SNMP version is supported by Cisco IOS software?
- Version 2
- Version 3
- Both
What are two characteristics of SNMP community strings? (Choose two.)
- If the manager sends one of the correct read-only community strings, it can get information and set information in an agent.
- A vulnerability of SNMPv1, SNMPv2, and SNMPv3 is that they send the community strings in plaintext.
- SNMP read-write community strings can be used to set information on an SNMP-enabled device.
- Commonly known community strings should be used when configuring secure SNMP.
- SNMP read-only community strings can be used to get information from an SNMP-enabled device.
What is a characteristic of the MIB?
- The OIDs are organized in a hierarchical structure.
- A separate MIB tree exists for any given device in the network.
- Information is organized in a flat manner so that SNMP can access it quickly.
- Information in the MIB cannot be changed.
What is the term that is used for the area of a network that is affected when a device or network service experiences problems?
- Collision domain
- User domain
- Failure domain
- Broadcast domain
What is the purpose of establishing a network baseline?
- To document and analyze the network traffic.
- To provide an inventory of network devices.
- To verify the configuration of routers and switches on the network.
- To help monitor and troubleshoot network performance.
Which type of traffic tends to consume a large portion of network capacity?
- Voice
- Video
- Data
Which of these is an on-line network device vendor resource that can be used as a source of information?
- Baselining tool
- Knowledge base
- NMS
- Protocol analyzer
Which network layer integrates with the backbone and users to provide intelligent switching, routing, and security?
- Core
- Distribution
- Access
Which SNMP version is used for interoperability and includes message integrity reporting?
- Version 2
- Version 3
- Both
True or False? A network baseline never ends and continually gathers information on a yearly basis?
- True
- False
Which cost-effective physical network topology design is recommended when building a three-tier campus network that connects three buildings?
- Dual ring
- Mesh
- Extended star
- Bus
Which type of traffic must receive a higher UDP priority?
- Voice
- Video
- Data
What is a collapsed core in a network design?
- A combination of the functionality of the access and core layers.
- A combination of the functionality of the access, distribution, and core layers.
- A combination of the functionality of the distribution and core layers.
- A combination of the functionality of the access and distribution layers.
Why would a network administrator issue the show cdp neigbors command on a router?
- To display line status and other information about directly connected Cisco devices.
- To display device ID and other information about directly connected Cisco devices.
- To display routing table and other information about directly connected Cisco devices.
- To display router ID and other information about OSPF neighbors.
Which QoS model provides per-request policy admission control?
- Best effort
- Integrated services
- Differential services
Which term is used to describe a network that is always accessible?
- Hierarchical
- Modular
- Resilient
- Flexible
What network troubleshooting capability is provided by a cable analyzer?
- Measuring electrical values of voltage, current, and resistance.
- Discovering VLAN configuration and viewing switch interface details.
- Testing and certifying of copper and fiber cables.
- Generating reports on traffic that is consuming critical network resources.
In which step of the seven-step troubleshooting process, would you create a rollback plan identifying how to quickly reverse a solution?
- Analyze information
- Define the problem
- Eliminate possible causes
- Gather information
- Propose Hypothesis
- Solve the problem and document solution
- Test hypothesis
This is the term used to describe how much data a switch can process per second.
- Forwarding rate
- Power
- Reliability
- Wire speed
Which three statements will a network baseline answer? (Choose three.)
- How does the network perform during a normal or average day?
- How much did the network cost?
- What are the network policies?
- What part of the network is least used?
- What part of the network is most heavily used?
- Who is responsible for managing the network?
This type of router delivers next-generation internet experience across all devices and locations.
- Branch routers
- Network edge routers
- Service provider routers
- Industrial routers
Which troubleshooting tool can be used to pinpoint the distance to a break in a network cable?
- Digital multimeter
- Cable tester
- Network analyzer
- Network analysis module
This type of router provides fast performance with high security for data centers, campus, and branch networks.
- Branch routers
- Network edge routers
- Service provider routers
- Industrial routers
What is the function of PoE pass-through?
- Allows multiple physical switch ports to be aggregated together and act as a single logical link to increase bandwidth on trunk links.
- Allows a multilayer switch to forward IP packets at a rate close to that of Layer 2 switching by bypassing the CPU.
- Allows switches, phones, and wireless access points to receive power over existing Ethernet cables from an upstream switch.
- Allows a switch to disable redundant Layer 2 paths in the topology to prevent Layer 2 loops.
Which IOS command can be used to test if other network protocols are working?
- ping
- ssh
- telnet
- traceroute
Which type of traffic is unpredictable, inconsistent, and bursty?
- Voice
- Video
- Data
Which OSI layer are you troubleshooting when investigating a spanning-tree loop?
- Application
- Data link
- Network
- Physical
- Transport
Which protocol works with network devices, such as routers, switches, and wireless LAN access points across multiple manufacturers’ devices?
- CDP
- LLDP
Which structured troubleshooting method should be used when a cabling problem is suspected?
- Bottom-up
- Comparison
- Divide-and-conquer
- Educated guess
- Follow-the-Path
- Top-down
Which queuing algorithm provides support for user-defined traffic classes?
- FIFO
- WFQ
- CBWFQ
- LLQ
This type of router provides end-to-end delivery of subscriber services.
- Branch routers
- Network edge routers
- Service provider routers
- Industrial routers
What is caused by variation in delay?
- Congestion
- Packet loss
- Jitter
Which statement describes a characteristic of Cisco Catalyst 2960 switches?
- They are best used as distribution layer switches.
- They are modular switches.
- They do not support an active switched virtual interface (SVI) with IOS versions prior to 15.x.
- New Cisco Catalyst 2960-C switches support PoE pass-through.
- CDP
- LLDP
Which structured troubleshooting method should be used when a software orientated problem occurs?
- Bottom-up
- Comparison
- Divide-and-conquer
- Educated guess
- Follow-the-Path
- Top-down
Which QoS model provides many different levels of quality?
- Best effort
- Integrated services
- Differential services
Which network layer provides fault isolation and high-speed backbone switch connectivity?
- Core
- Distribution
- Access