Module-17

¡Supera tus tareas y exámenes ahora con Quizwiz!

MODULE-17 END-OF-CHAPTER-QUIZ

Build a Small Network

Which statement is true about CDP on a Cisco device?​

CDP can be disabled globally or on a specific interface​. Topic 17.5.0 - CDP is a Cisco-proprietary protocol that can be disabled globally by using the no cdp run global configuration command, or disabled on a specific interface, by using the no cdp enable interface configuration command. Because CDP operates at the data link layer, two or more Cisco network devices, such as routers can learn about each other even if Layer 3 connectivity does not exist. The show cdp neighbors detail command reveals the IP address of a neighboring device regardless of whether you can ping the neighbor.

Which process failed if a computer cannot access the internet and received an IP address of 169.254.142.5?

DHCP Topic 17.7.0 - When a Windows computer cannot communicate with an IPv4 DHCP server, the computer automatically assigns itself an IP address in the169.254.0.0/16 range. Linux and Apple computers do not automatically assign an IP address.​

A user is unable to reach the website when typing ht​tp://ww​w.cisco.com in a web browser, but can reach the same site by typing ht​tp://72.163.4.161. What is the issue?

DNS Topic 17.7.0 - Domain Name Service (DNS) is used to translate a web address to an IP address. The address of the DNS server is provided via DHCP to host computers.​

What Windows 10 tool is useful to determine which applications are using network services on a host?

Data Usage The Windows 10 Data Usage tool is useful to determine which applications are using network services on a host.

A technician is troubleshooting a network problem. After troubleshooting, the technician concludes that a switch should be replaced. What should the technician do next?

Escalate the trouble ticket to the manager to approve the change. The technician should escalate the problem to their manager.

A small company has only one router as the exit point to its ISP. Which solution could be adopted to maintain connectivity if the router itself, or its connection to the ISP, fails?

Have a second router that is connected to another ISP. Topic 17.1.0 - Small networks generally have only one link to an ISP to establish a connection to the Internet. Problems can occur in the network, which can cause the disruption of this service. In order to keep connectivity, redundancy has to be provided. If the problem is in the router interface that is connected to the ISP, another interface can be activated on the router, so if one interface fails, traffic may be redirected toward the other interface. However, if the router itself fails, a second router that is connected to another ISP can be used as a backup.

What is necessary to plan and use when implementing a network?

IP addressing scheme When implementing a network, planning and using an IP addressing scheme is necessary.

What mechanism can be implemented in a small network to help minimize network latency for real-time streaming applications?

QoS Topic 17.1.0 - Quality of service (QoS) is a mechanism which is used to classify and prioritize traffic through the network. This enables network devices to minimize the latency for real-time applications such as voice and video.

MODULE-17 SCALE-TO-LARGER-NETWORKS

Scale to Larger Networks

Which two network protocols are used to establish a remote access network connection to a device? (Choose two.)

Secure Shell (SSH) Telnet SSH and Telnet are two network protocols that are used to establish a remote access network connection to a device.

A technician is troubleshooting a network problem and has just established a theory of probable causes. What would be the next step in the troubleshooting process?

Test the theory to determine cause. The next step after "Establish a Theory of Probable Causes" is to "Test the Theory to Determine Cause".

Which statement correctly relates to a small network?

The majority of businesses are small. The majority of businesses are small.

MODULE-17 TROUBLESHOOTING-METHODOLOGIES

Troubleshooting Methodologies

Which software installed on key hosts can reveal the types of network traffic flowing through the network?

Wireshark Wireshark can reveal the types of network traffic flowing through the network.

What are two forms of software programs or processes that provide access to the network? (Choose two.)

application layer services network applications Application layer services and network applications are two forms of software programs that provide access to the network.

When should an administrator establish a network baseline?

at regular intervals over a period of time Topic 17.4.0 - An effective network baseline can be established by monitoring the traffic at regular intervals. This allows the administrator to take note when any deviance from the established norm occurs in the network.

Which elements are required to scale to a larger network? (Choose two.)

budget network documentation Elements to scale to a larger network include budget, device inventory, network documentation, and traffic analysis.

Where are Cisco IOS debug output messages sent by default?

console line Topic 17.6.0 - Debug messages, like other IOS log messages, are sent to the console line by default. Sending these messages to the terminal lines requires the terminal monitor command.

Which factor must be considered when selecting network devices?

cost Factors to be considered include cost, speed and types of ports/interfaces, expandability, and operating system features and services.

What factor should be considered in the design of a small network when devices are being chosen?

cost of devices Topic 17.1.0 - Factors to consider when designing a network include the cost of devices, speed, modularity and scalability, and ease of managing the network.

A newly hired network technician is given the task of ordering new hardware for a small business with a large growth forecast. Which primary factor should the technician be concerned with when choosing the new devices?

devices with support for modularity Topic 17.1.0 - In a small business with a large growth forecast, the primary influencing factor would be the ability of devices to support modularity. Devices with a fixed type/number of interfaces would not support growth. Redundancy is an important factor, but typically found in large enterprises. Network monitoring is also an important consideration, but not as important as modularity.

Which element of scaling a network involves identifying the physical and logical topologies?

network documentation Topic 17.3.0 - To scale a network, several elements are required: Network documentation - physical and logical topology Device Inventory - list of devices that use or make up the network Budget - Itemized IT budget, including fiscal year equipment purchasing budget Traffic analysis - protocols, applications, and services and their respective traffic requirements should be documented

A technician is using the debug ip icmp privileged EXEC command to capture live router output. Which commands would stop this debug command on a Cisco router? (Choose two.)

no debug ip icmp undebug all To disable the debug ip icmp command you can use no debug ip icmp, undebug ip icmp, or undebug all.

What is required to classify traffic according to priority?

quality of service (QoS) QoS is required to classify traffic according to priority.

What is required to maintain a high degree of reliability and eliminate single points of failure?

redundancy Redundancy is required to maintain a high degree of reliability and eliminate single points of failure.

Which network design consideration would be more important to a large corporation than to a small business?

redundancy Topic 17.1.0 - Small businesses today do need Internet access and use an Internet router to provide this need. A switch is required to connect the two host devices and any IP phones or network devices such as a printer or a scanner. The switch may be integrated into the router. A firewall is needed to protect the business computing assets. Redundancy is not normally found in very small companies, but slightly larger small companies might use port density redundancy or have redundant Internet providers/links.

A network technician suspects that a particular network connection between two Cisco switches is having a duplex mismatch. Which command would the technician use to see the Layer 1 and Layer 2 details of a switch port?

show interfaces Topic 17.5.0 - The show interfaces command can be used on both routers and switches to see speed, duplex, media type, MAC address, port type, and other Layer 1/Layer 2-related information.

A technician has established a remote connection to router R1 to observe debug output. The technician enters the debug ip icmp command then pings a remote destination. However, no output is displayed. Which command would the technician have to enter to display log messages on a remote connection?

terminal monitor The terminal monitor command displays log messages on a remote connection.

A network technician is investigating network connectivity from a PC to a remote host with the address 10.1.1.5. Which command, when issued on a Windows PC, will display the path to the remote host?

tracert 10.1.1.5 Topic 17.4.0 - The tracert command is used to initiate a trace from the command prompt on a Windows PC. The traceroute command is used to initiate a trace from a Cisco router or switch. Some other PC operating systems, such as Linux and Mac OS also use the traceroute command. The ping command does not display the network path to the remote host.

What type of traffic would most likely have the highest priority through the network?

voice Topic 17.1.0 - Not all traffic should receive the same treatment or priority through a network. Some types of traffic, such as voice and video, require the highest priority because they are very sensitive to network latency and delay. Other types of traffic, such as FTP, which is not sensitive to latency and delay, should be given the lowest level of priority so that the higher priority traffic can get through.

Which two traffic types require delay sensitive delivery? (Choose two.)

voice video Topic 17.1.0 - Voice and video traffic have delay sensitive characteristics and must be given priority over other traffic types such as web, email, and file transfer traffic.


Conjuntos de estudio relacionados

Race/Ethnicity-Healey- Final Exam 3

View Set

Nclex Review: Urinary Incontinence

View Set

Chapter 15: Acute Respiratory Failure

View Set

Chapter 23 Integ Assessment and Chapter skin cancer

View Set

Біологія та екологія - Вступ, біорізноманіття та біосистематика

View Set

Final Exam (Native American History)

View Set

How Do Plant Use and Change Energy

View Set