Qwiz2
A VIK Wikiből
What is the variable amount of time it takes for a frame to traverse the links between the source and destination?
- Serialization delay
- Propagation delay
- Code delay
What happens when congestion occurs?
- Packet loss
- Jitter
- Code delay
What is the fixed amount of time it takes to transmit a frame from the NIC to the wire?
- Serialization delay
- Jitter
- Code delay
What is caused by variation in delay?
- Congestion
- Packet loss
- Jitter
Which type of traffic tends to consume a large portion of network capacity?
- Voice
- Video
- Data
Which type of traffic requires at least 384 Kbs of bandwidth?
- Voice
- Video
- Data
Which type of traffic is unpredictable, inconsistent, and bursty?
- Voice
- Video
- Data
Which type of traffic can be predictable and smooth?
- Voice
- Video
- Data
Which type of traffic cannot be retransmitted if lost?
- Voice
- Video
- Data
Which type of traffic must receive a higher UDP priority?
- Voice
- Video
- Data
Which queuing algorithm simultaneously schedules interactive traffic to the front of a queue to reduce response time?
- FIFO
- WFQ
- CBWFQ
- LLQ
Which queuing algorithm provides support for user-defined traffic classes?
- FIFO
- WFQ
- CBWFQ
- LLQ
Which queuing algorithm is effective for large links that have little delay and minimal congestion?
- FIFO
- WFQ
- CBWFQ
- LLQ
Which queuing algorithm classifies traffic into different flows based on packet header addressing?
- FIFO
- WFQ
- CBWFQ
- LLQ
Which queuing algorithm allows delay-sensitive data such as voice to be sent before packets in other queues?
- FIFO
- WFQ
- CBWFQ
- LLQ
Which queuing algorithm applies priority, or weights, to identify traffic and classify it?
- FIFO
- WFQ
- CBWFQ
- LLQ
Which QoS model provides per-request policy admission control?
- Best effort
- Integrated services
- Differential services
Which QoS model requires no special QoS mechanisms?
- Best effort
- Integrated services
- Differential services
Which QoS model provides many different levels of quality?
- Best effort
- Integrated services
- Differential services
Which QoS model uses explicit end-to-end resource admission control?
- Best effort
- Integrated services
- Differential services
Which QoS model is the most scalable?
- Best effort
- Integrated services
- Differential services
Which detects when traffic rates reach a configured maximum rate and drops excess traffic?
- Traffic policing
- Traffic shaping
- Classification
Which determines what class of traffic packets or frames belong to.
- Traffic policing
- Marking
- Classification
Which adds a value to the packet header?
- Marking
- 802.1Q
- Classification
Which provides buffer management and allows TCP traffic to throttle back before buffers are exhausted?
- Traffic policing
- 802.1Q
- WRED
Which retains excess packets in a queue and then schedules the excess for later transmission over increments of time?
- Traffic policing
- Traffic shaping
- WRED
What is the term used to indicate a variation of delay?
- Latency
- Speed mismatch
- Jitter
- Serialization delay
A network engineer performs a ping test and receives a value that shows the time it takes for a packet to travel from a source to a destination device and return. Which term describes the value?
- Bandwidth
- Latency
- Priority
- Jitter
What role do network devices play in the IntServ QoS model?
- Network devices are configured to service multiple classes of traffic and handle traffic as it may arrive.
- Network devices use QoS on a hop-by-hop basis to provide excellent scalability.
- Network devices ensure that resources are available before traffic is allowed to be sent by a host through the network.
- Network devices provide a best effort approach to forwarding traffic.
Which device would be classified as a trusted endpoint?
- Firewall
- IP phone
- Switch
- Router
Under which condition does congestion occur on a converged network with voice, video, and data traffic?
- If voice traffic latency begins to decrease accross the network.
- If a user downloads a file that exceeds the file limitation that is set on the server.
- If video traffic requests more bandwidth than voice traffic requests.
- If the request for bandwidth exceeds the amount of bandwidth available.
Which type of traffic does Cisco recommend be placed in the strict priority queue (PQ) when low latency queuing (LLQ) is being used?
- Video
- Voice
- Management
- Data
Which model is the only QoS model with no mechanism to classify packets?
- Best-effort
- Hard QoS
- DiffServ
- IntServ
What happens when the memory queue of a device fills up and new network traffic is received?
- The network device queues the received traffic while sending previously received traffic.
- The network device sends the received traffic immediately.
- The network device will drop the arriving packets.
- The network device drops all traffic in the queue.
What are two characteristics of voice traffic? (Choose two.)
- It consumes few network resources.
- It can tolerate latency up to 400 ms.
- It is delay sensitive.
- It is insensitive to packet loss.
- It is bursty.
Which QoS model is very resource intensive and provides the highest guarantee of QoS?
- Best-effort
- Soft QoS
- DiffServ
- IntServ
What happens when an edge router using IntServ QoS determines that the data pathway cannot support the level of QoS requested?
- Data is forwarded along the pathway using a best-effort approach.
- Data is not forwarded along the pathway.
- Data is forwarded along the pathway using IntServ but not provided preferential treatment.
- Data is forwarded along the pathway using DiffServ.
In QoS models, which type of traffic is commonly provided the most preferential treatment over all other application traffic?
- File transfers.
- Web traffic.
- Email.
- Voice traffic.
Which queuing mechanism supports user-defined traffic classes?
- CBWFQ
- WFQ
- FCFS
- FIFO
What mechanism compensates for jitter in an audio stream by buffering packets and then replaying them outbound in a steady stream?
- Digital signal processor
- Voice codec
- WFQ
- Playout delay buffer
- CDP
- LLDP
Which protocol works with network devices, such as routers, switches, and wireless LAN access points across multiple manufacturers’ devices?
- CDP
- LLDP
Which SNMP version authenticates the source of management messages?
- Version 2
- Version 3
- Both
Which SNMP version provides services for security models?
- Version 2
- Version 3
- Both
Which SNMP version does not provide encrypted management messages?
- Version 2
- Version 3
- Both
Which SNMP version is supported by Cisco IOS software?
- Version 2
- Version 3
- Both
Which SNMP version includes expanded error codes with types?
- Version 2
- Version 3
- Both
Which SNMP version uses community-based forms of security?
- Version 2
- Version 3
- Both
Which SNMP version is used for interoperability and includes message integrity reporting?
- Version 2
- Version 3
- Both
Refer to the following syslog: Jun 12 17:46:01.619: %IFMGR-7-NO_IFINDEX_FILE: Unable to open nvram:/ifIndex-table No such file or directory
What security level generated the message?
- Error
- Informational
- Warning
- Debugging
Refer to the following syslog: Jun 12 17:46:01.619: %IFMGR-7-NO_IFINDEX_FILE: Unable to open nvram:/ifIndex-table No such file or directory
What is the mnemonic for this syslog message?
- IFMGR
- Unable to open nvram
- NO_IFINDEX_FILE
- ifIndex-table
Refer to the following syslog: Jun 12 17:46:01.619: %IFMGR-7-NO_IFINDEX_FILE: Unable to open nvram:/ifIndex-table No such file or directory
What is the syslog reporting facility?
- IFMGR
- Unable to open nvram
- NO_IFINDEX_FILE
- ifIndex-table
What are two reasons for an administrator to issue the copy running-config tftp command on a switch or router? (Choose two.)
- To overwrite the current configuration.
- To save the running configuration file to a remote location.
- To have a backup of the running configuration file in the router.
- To force an automatic reload of the device.
- To transfer the current configuration file to a server.
What information can be gathered about a neighbor device from the show cdp neighbors detail command that cannot be found with the show cdp neighbors command?
- The hostname of the neighbor.
- The platform that is used by the neighbor.
- The IP address of the neighbor.
- The capabilities of the neighbor.
When SNMPv1 or SNMPv2 is being used, which feature provides secure access to MIB objects?
- Source validation
- Message integrity
- Community strings
- Packet encryption
What command must be issued on a Cisco router that will serve as an authoritative NTP server?
- ntp server 172.16.0.1
- clock set 11:00:00 DEC 20 2010
- ntp broadcast client
- ntp master 1
Which protocol or service can be configured to send unsolicited messages to alert the network administrator about a network event such as an extremely high CPU utilization on a router?
- Syslog
- SNMP
- NetFlow
- NTP
Which statement describes a syslog message severity level?
- A syslog alarm at the severity level 4 and higher is sent to an external syslog server by default.
- A severity level 7 message is only accessible through the terminal line.
- Severity level 0 is the most critical severity level.
- A syslog alarm with a severity level of 7 indicates an emergency situation that can render the system unusable.
What is an SNMP management agent?
- A database that a device keeps about network performance.
- A communication protocol that is used by SNMP.
- Software that is installed on devices managed by SNMP.
- A computer loaded with management software and used by an administrator to monitor a network.
What are two characteristics of SNMP community strings? (Choose two.)
- If the manager sends one of the correct read-only community strings, it can get information and set information in an agent.
- A vulnerability of SNMPv1, SNMPv2, and SNMPv3 is that they send the community strings in plaintext.
- SNMP read-write community strings can be used to set information on an SNMP-enabled device.
- Commonly known community strings should be used when configuring secure SNMP.
- SNMP read-only community strings can be used to get information from an SNMP-enabled device.
A network administrator issues the copy tftp running-config command on a router. What is the administrator trying to achieve?
- Copy the configuration file from the RAM of the router to the TFTP server.
- Copy the configuration file from the NVRAM of the router to the TFTP server.
- Copy the configuration file from the TFTP server to the RAM of the router.
- Copy the configuration file from the TFTP server to the NVRAM of the router.
What is a characteristic of the MIB?
- The OIDs are organized in a hierarchical structure.
- A separate MIB tree exists for any given device in the network.
- Information is organized in a flat manner so that SNMP can access it quickly.
- Information in the MIB cannot be changed.
What data would be saved and where would the data be placed if a network administrator issued the following command? (Choose two.)
R1# copy startup-config tftp
- The data to be saved is the configuration that is stored in NVRAM.
- The data to be saved is the configuration that is stored on a TFTP server.
- The data will be saved to a TFTP server.
- The data will be saved in RAM.
- The data to be saved is the configuration that is being modified in RAM.
- The data will be saved in NVRAM.
Which command would a network engineer use to restore the IOS image c1900-universalk9-mz.SPA.152-4.M3.bin to a router?
- copy flash0: c1900-universalk9-mz.SPA.152-4.M3.bin
- copy flash0: tftp:
- copy tftp: flash0:
- copy c1900-universalk9-mz.SPA.152-4.M3.bin tftp:
Why would a network administrator issue the show cdp neigbors command on a router?
- To display line status and other information about directly connected Cisco devices.
- To display device ID and other information about directly connected Cisco devices.
- To display routing table and other information about directly connected Cisco devices.
- To display router ID and other information about OSPF neighbors.
What are SNMP trap messages?
- Unsolicited messages that are sent by the SNMP agent and alert the NMS to a condition on the network.
- Messages that are used by the NMS to change configuration variables in the agent device.
- Messages that are used by the NMS to query the device for data.
- Messages that are sent periodically by the NMS to the SNMP agents that reside on managed devices to query the device for data.
Which term is used to describe a network that is always accessible?
- Hierarchical
- Modular
- Resilient
- Flexible
Which characteristic of a network allows it to expand and provide on-demand services?
- Hierarchical
- Modular
- Resilient
- Flexible
Which term describes the ability of a network to use all available network resources and to provide data load sharing?
- Hierarchical
- Modular
- Resilient
- Flexible
Which network layer provides fault isolation and high-speed backbone switch connectivity?
- Core
- Distribution
- Access
Which network layer provides direct, switched network connectivity to the user?
- Core
- Distribution
- Access
Which network layer integrates with the backbone and users to provide intelligent switching, routing, and security?
- Core
- Distribution
- Access
Which three recommendations may be included in a network design strategy that is focused on scalability? (Choose three.)
- Design a hierarchical network.
- Use Layer 2 devices to filter and reduce network traffic in the core.
- Choose routers or multilayer switches to limit broadcasts and filter other undesirable traffic from the network.
- Use expandable, modular equipment, or clustered devices that can be easily upgraded to increase capabilities.
- Combine the access and distribution layer for easier access and limit the size of the failure domain.
True or false? OSPF is well-suited for larger networks because it can be deployed using a hierarchical design.
- True
- False
What are three important features that should be considered for implementation in a well-designed, scalable network? (Choose three.)
- Static routes
- Redundant links
- Multiple links
- Access layer with only wired devices
- Expandable, modular equipment
Which category of switch is used to aggregate traffic at the edge of the network?
- Campus LAN switches
- Cloud-managed switches
- Service provider switches
- Data center switches
Field replaceable line cards are a feature found on which type of switch?
- Modular
- Fixed configuration
- Virtual
- Stackable
This is the term used to describe switches that can be interconnected and managed as one larger single switch.
- Modular
- Multilayer
- Cloud-managed
- Stackable
This is the term used to describe the number of ports available on a single switch.
- Speed
- Scalability
- Density
- Modularity
This is the term used to describe how much data a switch can process per second.
- Forwarding rate
- Power
- Reliability
- Wire speed
Which type of switch supports routing protocols and can forward IP packets at close to Layer 2 forwarding rates?
- Modular
- Multilayer
- Cloud-managed
- Stackable
This type of router provides fast performance with high security for data centers, campus, and branch networks.
- Branch routers
- Network edge routers
- Service provider routers
- Industrial routers
This type of router provides end-to-end delivery of subscriber services.
- Branch routers
- Network edge routers
- Service provider routers
- Industrial routers
This type of router provides simple network configuration and management for LANs and WANs.
- Branch routers
- Network edge routers
- Service provider routers
- Industrial routers
This type of router is designed to provide enterprise-class features in rugged and harsh environments.
- Branch routers
- Network edge routers
- Service provider routers
- Industrial routers
This type of router delivers next-generation internet experience across all devices and locations.
- Branch routers
- Network edge routers
- Service provider routers
- Industrial routers
Which cost-effective physical network topology design is recommended when building a three-tier campus network that connects three buildings?
- Dual ring
- Mesh
- Extended star
- Bus
How much traffic is a 48-port gigabit switch capable of switching when operating at full wire speed?
- 48 Gb/s, by providing full bandwidth to each port.
- 24 Gb/s, because this is the maximum forwarding rate on Cisco switches.
- 1 Gb/s, because data can only be forwarded from one port at a time.
- 44 Gb/s, due to overhead requirements.
What is the term that is used for the area of a network that is affected when a device or network service experiences problems?
- Collision domain
- User domain
- Failure domain
- Broadcast domain
Which type of router would an enterprise use to allow customers to access content anytime and anyplace, regardless of whether they are at home or work?
- Branch routers
- Network edge routers
- Service provider routers
- Modular routers
Which design feature will limit the size of a failure domain in an enterprise network?
- The purchase of enterprise equipment that is designed for large traffic volume.
- The use of a collapsed core design.
- The installation of redundant power supplies.
- The use of the building switch block approach.
What is a function of the distribution layer?
- Interconnection of large-scale networks in wiring closets.
- Network access to the user.
- Fault isolation.
- High-speed backbone connectivity.
What is the function of PoE pass-through?
- Allows multiple physical switch ports to be aggregated together and act as a single logical link to increase bandwidth on trunk links.
- Allows a multilayer switch to forward IP packets at a rate close to that of Layer 2 switching by bypassing the CPU.
- Allows switches, phones, and wireless access points to receive power over existing Ethernet cables from an upstream switch.
- Allows a switch to disable redundant Layer 2 paths in the topology to prevent Layer 2 loops.
Which function is supplied by the access layer in a three-layer network design?
- High-speed connectivity.
- Network access.
- Routing.
- Application of policies.
- Backbone connectivity.
Which action should be taken when planning for redundancy on a hierarchical network design?
- Implement STP PortFast between the switches on the network.
- Purchase backup equipment for every network device at the distribution layer.
- Add alternate physical paths for data to traverse the network.
- Immediately replace a nonfunctioning module, service ,or device on a network.
What is a collapsed core in a network design?
- A combination of the functionality of the access and core layers.
- A combination of the functionality of the access, distribution, and core layers.
- A combination of the functionality of the distribution and core layers.
- A combination of the functionality of the access and distribution layers.
What is the name of the layer in the Cisco borderless switched network design that is considered to be the backbone used for high-speed connectivity and fault isolation?
- Network access
- Core
- Access
- Data link
- Network
Which technology is required when switched networks are designed to include redundant links?
- Link aggregation
- Virtual LANs
- Virtual Private Network
- Spanning Tree Protocol
Which feature could be used in a network design to increase the bandwidth by combining multiple physical links into a single logical link?
- Trunk ports
- EtherChannel
- VLANs
- Subinterfaces
Which statement describes a characteristic of Cisco Catalyst 2960 switches?
- They are best used as distribution layer switches.
- They are modular switches.
- They do not support an active switched virtual interface (SVI) with IOS versions prior to 15.x.
- New Cisco Catalyst 2960-C switches support PoE pass-through.
Which network design solution will best extend access layer connectivity to host devices?
- Implementing wireless connectivity.
- Implementing routing protocols.
- Implementing redundancy.
- Implementing EtherChannel.
Which topology diagram displays IP addresses?
- IP topology
- Logical topology
- Physical topology
- Port topology
Which document could be referenced to identify the OS on a server?
- End-system Documentation
- LAN Switch Device Documentation
- Router Device Documentation
Which three statements will a network baseline answer? (Choose three.)
- How does the network perform during a normal or average day?
- How much did the network cost?
- What are the network policies?
- What part of the network is least used?
- What part of the network is most heavily used?
- Who is responsible for managing the network?
True or False? A network baseline never ends and continually gathers information on a yearly basis?
- True
- False
Which command could be used to get detailed information about directly connected Cisco neighbor devices?
- show cdp neighbor
- show ip interface
- show ip route
- show version
Which option lists the three troubleshooting stages in the correct order?
- Gather symptoms, implement corrective action, and isolate the problem.
- Gather symptoms, isolate the problem, and implement corrective action.
- Implement corrective action, gather symptoms, and isolate the problem.
- Implement corrective action, isolate the problem, and gather symptoms.
- Isolate the problem, gather symptoms, and implement corrective action.
- Isolate the problem, implement corrective action, and gather symptoms.
In which step of the seven-step troubleshooting process, would you create a rollback plan identifying how to quickly reverse a solution?
- Analyze information
- Define the problem
- Eliminate possible causes
- Gather information
- Propose Hypothesis
- Solve the problem and document solution
- Test hypothesis
Which are recommendations to be used when communicate with a user?
- Always be considerate and empathize with users.
- Always listen or carefully read what the user is saying.
- Speak at a technical level they can understand.
- All the above
During the gathering information step, which command would display the configured protocols and the global and interface-specific status of any configured Layer 3 protocol?
- show interface
- show ip interface brief
- show ip protocols
- show protocols
- show version
What is the highest OSI layer that should be considered when troubleshooting routers and Layer 3 switches?
- Layer 1
- Layer 2
- Layer 3
- Layer 4
- Layer 7
Which structured troubleshooting method should be used when a cabling problem is suspected?
- Bottom-up
- Comparison
- Divide-and-conquer
- Educated guess
- Follow-the-Path
- Top-down
Which structured troubleshooting method should be used when a software orientated problem occurs?
- Bottom-up
- Comparison
- Divide-and-conquer
- Educated guess
- Follow-the-Path
- Top-down
Which of these is an on-line network device vendor resource that can be used as a source of information?
- Baselining tool
- Knowledge base
- NMS
- Protocol analyzer
Which tool is useful to investigate packet content while flowing through the network?
- Baselining tool
- Knowledge base
- NMS
- Protocol analyzer
Which hardware troubleshooting tool is a multifunctional handheld device used to test and certify copper and fiber cables for different services and standards?
- Cabel analyzer
- Cabel tester
- Digital multimeters
- Network Analysis Module
- Portable Network Analyzers
Cisco IOS log messages fall into one of eight levels. Which syslog logging level is used to log the highest severity level?
- 0
- 1
- 4
- 6
Which OSI layer are you troubleshooting when the cause of network transmission errors is due to late collisions, short frames, and jabber?
- Application
- Data link
- Network
- Physical
- Transport
Which OSI layer are you troubleshooting when investigating a spanning-tree loop?
- Application
- Data link
- Network
- Physical
- Transport
Which OSI layer are you troubleshooting when investigating a routing protocol loop?
- Application
- Data link
- Network
- Physical
- Transport
- Application
- Data link
- Network
- Physical
- Transport
- Application
- Data link
- Network
- Physical
- Transport
Which IOS command can be used to test if other network protocols are working?
- ping
- ssh
- telnet
- traceroute
Which statement describes the physical topology for a LAN?
- It defines how hosts and network devices connect to the LAN.
- It describes whether the LAN is a broadcast or token-passing network.
- It depicts the addressing scheme that is employed in the LAN.
- It shows the order in which hosts access the network.
A network engineer is troubleshooting a network problem where users cannot access the FTP server at the same IP address where a website can be successfully accessed. Which troubleshooting method would be the best to apply in this case?
- Comparing IP settings on user workstations
- Top-down
- Bottom-up
- Divide-and-conquer
A computer technician performed a number of actions to correct a problem. Some actions did not solve the problem, but eventually a solution was found. What should be documented?
- A description of the problem and solution.
- Only the failed attempts, so that future technicians will know what not to try.
- Only the solution, because this solved the problem.
- Everything that was done to try to solve the problem.
A network engineer is troubleshooting a network problem and can successfully ping between two devices. However, Telnet between the same two devices does not work. Which OSI layers should the administrator investigate next?
- Only the network layer
- From the network layer to the application layer
- All of the layers
- From the network layer to the physical layer
While designing changes to a data center because of a new IoE implementation, a network administrator has the job of diagramming the new physical topology of the area. What should be included in the physical topology diagram?
- The IP addressing scheme for all workstations in the company.
- The service level agreement from the ISP.
- Technical specifications of firewalls.
- Cable locations and lengths between servers and switches.
A network technician is troubleshooting an email connection problem. Which question to the end-user will provide clear information to better define the problem?
- How big are the emails you tried to send?
- When did you first notice your email problem?
- What kind of equipment are you using to send emails?
- Is your email working now?
Which troubleshooting tool can be used to pinpoint the distance to a break in a network cable?
- Digital multimeter
- Cable tester
- Network analyzer
- Network analysis module
Which troubleshooting software is an example of a network management system tool?
- CyberGauge
- LANsurveyor
- WhatsUp Gold
- Wireshark
What is the purpose of establishing a network baseline?
- To document and analyze the network traffic.
- To provide an inventory of network devices.
- To verify the configuration of routers and switches on the network.
- To help monitor and troubleshoot network performance.
After which step in the network troubleshooting process would one of the layered troubleshooting methods be used?
- Gathering symptoms from suspect devices.
- Narrowing the scope.
- Determining ownership.
- Documenting symptoms.
A company is setting up a web site with SSL technology to protect the authentication credentials required to access the web site. A network engineer needs to verify that the setup is correct and that the authentication is indeed encrypted. Which tool should be used?
- Baselining tool
- Protocol analyzer
- Cable analyzer
- Fault-management tool
When should a network performance baseline be measured?
- After normal work hours to reduce possible interruptions.
- During normal work hours of an organization.
- Immediately after the main network devices restarted.
- When a denial of service attack to the network is detected and blocked.
A networked PC is having trouble accessing the Internet, but can print to a local printer and ping other computers in the area. Other computers on the same network are not having any issues. What is the problem?
- The default gateway router does not have a default route.
- The switch port to which the PC connects has an incorrect VLAN configured.
- The link between the switch to which the PC connects and the default gateway router is down.
- The PC has a missing or incorrect default gateway.
A technician installed a network adapter in a computer and wants to test network connectivity. The ping command can receive responses from workstations on the same subnet but not from remote workstations. What could be causing the problem?
- The NIC driver is out of date.
- The TCP/IP protocol stack is not loaded.
- The default gateway is incorrect.
- The operating system is not compatible with the remote sites.
What network troubleshooting capability is provided by a cable analyzer?
- Measuring electrical values of voltage, current, and resistance.
- Discovering VLAN configuration and viewing switch interface details.
- Testing and certifying of copper and fiber cables.
- Generating reports on traffic that is consuming critical network resources.