Enterprise Networking, Security, and Automation chapters 9-12

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Cisco IOS log messages fall into one of eight levels. Which syslog logging level is used to log the highest severity level?

0

How much traffic is a 48-port gigabit switch capable of switching when operating at full wire speed?

48 Gb/s, by providing full bandwidth to each port

Which network layer provides direct, switched network connectivity to the user?

Access

Which action should be taken when planning for redundancy on a hierarchical network design?

Add alternate physical paths for data to traverse the network.

Which are recommendations to be used when communicate with a user?

Always be considerate and empathize with users. Always listen or carefully read what the user is saying. Speak at a technical level they can understand.

Which QoS model requires no special QoS mechanisms?

Best effort

Which type of traffic does Cisco recommend be placed in the strict priority queue (PQ) when low latency queuing (LLQ) is being used?

Best effort

Which SNMP version provides services for security models? Which SNMP version is supported by Cisco IOS software?

Both

Which structured troubleshooting method should be used when a cabling problem is suspected?

Bottom-up Troubleshooting method

This type of router provides simple network configuration and management for LANs and WANs.

Branch routers

Which queuing algorithm provides support for user-defined traffic classes?

CBWFQ (Class-Based Weighted Fair Queuing)

Which protocol is used to gather information about Cisco devices which share the same data link?

CDP (Cisco Discovery Protocol)

Which hardware troubleshooting tool is a multifunctional handheld device used to test and certify copper and fiber cables for different services and standards?

Cable Analyzer

Which determines what class of traffic packets or frames belong to.

Classification

When SNMPv1 or SNMPv2 is being used, which feature provides secure access to MIB objects?

Community lines

What is the name of the layer in the Cisco borderless switched network design that is considered to be the backbone used for high-speed connectivity and fault isolation?

Core

Which network layer provides fault isolation and high-speed backbone switch connectivity?

Core

Which type of traffic tends to consume a large portion of network capacity?

Data

What happens when an edge router using IntServ QoS determines that the data pathway cannot support the level of QoS requested?

Data is not forwarded along the pathway

This is the term used to describe the number of ports available on a single switch.

Density

Which three recommendations may be included in a network design strategy that is focused on scalability?

Design a hierarchical network. Choose routers or multilayer switches to limit broadcasts and filter other undesirable traffic from the network. Use expandable, modular equipment, or clustered devices that can be easily upgraded to increase capabilities.

Which QoS model provides many different levels of quality? Which QoS model is the most scalable?

Differential services

Which network layer integrates with the backbone and users to provide intelligent switching, routing, and security?

Distribution

Which document could be referenced to identify the OS on a server?

End-system Documentation

Which feature could be used in a network design to increase the bandwidth by combining multiple physical links into a single logical link?

Etherchannel

Which cost-effective physical network topology design is recommended when building a three-tier campus network that connects three buildings?​

Extended star

Which function is supplied by the access layer in a three-layer network design?

Extended star

Which queuing algorithm is effective for large links that have little delay and minimal congestion?

FIFO (First In First Out)

What is the term that is used for the area of a network that is affected when a device or network service experiences problems?

Failure domain

A network baseline never ends and continually gathers information on a yearly basis.

False

Which term describes the ability of a network to use all available network resources and to provide data load sharing?

Flexible

This is the term used to describe how much data a switch can process per second.

Forwarding rate

Which option lists the three troubleshooting stages in the correct order?

Gather symptoms, isolate the problem, and implement corrective action.

Which three statements will a network baseline answer?

How does the network perform during a normal or average day? What part of the network is least used? What part of the network is most heavily used?

What information can be gathered about a neighbor device from the show cdp neighbors detail command that cannot be found with the show cdp neighbors command?

IP address of neighbor

Which device would be classified as a trusted endpoint?

IP phone

This type of router is designed to provide enterprise-class features in rugged and harsh environments.

Industrial routers

Which QoS model is very resource intensive and provides the highest guarantee of QoS?

IntServ

Which QoS model provides per-request policy admission control? Which QoS model uses explicit end-to-end resource admission control?

Integrated services

What are two characteristics of voice traffic?

It is delay sensitive and consumes few network resources.

Which of these is an on-line network device vendor resource that can be used as a source of information?

Knowledge base

Which protocol works with network devices, such as routers, switches, and wireless LAN access points across multiple manufacturers' devices?

LLDP (Link Layer Discovery Protocol)

Which queuing algorithm allows delay-sensitive data such as voice to be sent before packets in other queues?

LLQ (Low Latency Queuing)

What is the term used to indicate a variation of delay?

Latency

What is the highest OSI layer that should be considered when troubleshooting routers and Layer 3 switches?

Layer 4

Which topology diagram displays IP addresses?

Logical topology

Which adds a value to the packet header?

Marking

Which field replaceable line cards are a feature found on which type of switch?

Modular

Which characteristic of a network allows it to expand and provide on-demand services?

Modularity

Which type of switch supports routing protocols and can forward IP packets at close to Layer 2 forwarding rates?

Multilayer

What happens when the memory queue of a device fills up and new network traffic is received?

Network device will drop arriving packets

What role do network devices play in the IntServ QoS model?

Network devices ensure that resources are available before traffic is allowed to be sent by a host through the network.

This type of router provides fast performance with high security for data centers, campus, and branch networks. Which type of router would an enterprise use to allow customers to access content anytime and anyplace, regardless of whether they are at home or work?

Network edge routers

Which statement describes a characteristic of Cisco Catalyst 2960 switches?

New Cisco Catalyst 2960-C switches support PoE pass-through.

What happens when congestion occurs?

Packet loss

Which OSI layer are you troubleshooting when the cause of network transmission errors is due to late collisions, short frames, and jabber?

Physical

What is the variable amount of time it takes for a frame to traverse the links between the source and destination?

Propagation delay

Which tool is useful to investigate packet content while flowing through the network?

Protocol analyzer

Which term is used to describe a network that is always accessible?

Resilient

Which protocol or service can be configured to send unsolicited messages to alert the network administrator about a network event such as an extremely high CPU utilization on a router?

SNMP (Simple Network Management Protocol)

What are two characteristics of SNMP community strings?

SNMP read-only community strings can be used to get information from an SNMP-enabled device. SNMP read-write community strings can be used to set information on an SNMP-enabled device.

What is the fixed amount of time it takes to transmit a frame from the NIC to the wire?

Serialization delay

This type of router provides end-to-end delivery of subscriber services. This type of router delivers next-generation internet experience across all devices and locations.

Service provider routers

Which category of switch is used to aggregate traffic at the edge of the network?

Service provider switches

Which statement describes a syslog message severity level?

Severity level 0 is the most critical severity level.

Which technology is required when switched networks are designed to include redundant links?

Spanning tree protocol

This is the term used to describe switches that can be interconnected and managed as one larger single switch.

Stackable

In which step of the seven-step troubleshooting process, would you create a rollback plan identifying how to quickly reverse a solution?

Test hypothesis

What is a characteristic of the MIB (Management Information Base)?

The OIDs (object ID) are organized in a hierarchical structure.

What data would be saved and where would the data be placed if a network administrator issued the following command? R1# copy startup-config tftp

The data will be saved to a TFTP server. The data to be saved is the configuration that is stored in NVRAM.

Which structured troubleshooting method should be used when a software orientated problem occurs?

Top-down Troubleshooting method

Which detects when traffic rates reach a configured maximum rate and drops excess traffic?

Traffic policing

Which retains excess packets in a queue and then schedules the excess for later transmission over increments of time?

Traffic shaping

OSPF is well-suited for larger networks because it can be deployed using a hierarchical design.

True

Which SNMP version does not provide encrypted management messages? Which SNMP version includes expanded error codes with types? Which SNMP version uses community-based forms of security?

Version 2

Which SNMP version authenticates the source of management messages? Which SNMP version is used for interoperability and includes message integrity reporting?

Version 3

Which type of traffic requires at least 384 Kbs of bandwidth? Which type of traffic is unpredictable, inconsistent, and bursty?

Video

Which type of traffic can be predictable and smooth? Which type of traffic cannot be retransmitted if lost? Which type of traffic must receive a higher UDP (User Diagram Protocol) priority? Which type of traffic does Cisco recommend be placed in the strict priority queue (PQ) when low latency queuing (LLQ) is being used?

Voice

In QoS models, which type of traffic is commonly provided the most preferential treatment over all other application traffic?

Voice traffic

Which queuing algorithm simultaneously schedules interactive traffic to the front of a queue to reduce response time? Which queuing algorithm classifies traffic into different flows based on packet header addressing? Which queuing algorithm applies priority, or weights, to identify traffic and classify it?

WFQ (Weighted Fair Queuing)

Which provides buffer management and allows TCP traffic to throttle back before buffers are exhausted?

WRED (weighted random early detection)

What is a collapsed core in a network design?

a combination of the functionality of the distribution and core layers

What is the function of PoE (power-over-ethernet) pass-through?

allows switches, phones, and wireless access points to receive power over existing Ethernet cables from an upstream switch

While designing changes to a data center because of a new IoE implementation, a network administrator has the job of diagramming the new physical topology of the area. What should be included in the physical topology diagram?

cable locations and lengths between servers and switches

Which command would a network engineer use to restore the IOS image c1900-universalk9-mz.SPA.152-4.M3.bin to a router?

copy tftp: flash0:

A network administrator issues the copy tftp running-config command on a router. What is the administrator trying to achieve?

copy the configuration file from the TFTP server to the RAM of the router

Under which condition does congestion occur on a converged network with voice, video, and data traffic?

if the request for bandwidth exceeds the amount of bandwidth available

Which network design solution will best extend access layer connectivity to host devices?

implementing wireless connectivity

What is a function of the distribution layer?

interconnection of large-scale networks in wiring closets

What is caused by variation in delay?

jitter

What command must be issued on a Cisco router that will serve as an authoritative NTP (Network Time Protocol) server?

ntp master 1

What mechanism compensates for jitter in an audio stream by buffering packets and then replaying them outbound in a steady stream?

playout delay buffer

What are three important features that should be considered for implementation in a well-designed, scalable network?

redundant links multiple links expandable, modular equipment

Which command could be used to get detailed information about directly connected Cisco neighbor devices?

show cdp (Continuous Data Protection) neighbor

During the gathering information step, which command would display the configured protocols and the global and interface-specific status of any configured Layer 3 protocol?

show protocols

What is an SNMP management agent?

software that is installed on devices managed by SNMP

Which design feature will limit the size of a failure domain in an enterprise network?

the use of the building switch block approach

Why would a network administrator issue the show cdp neigbors command on a router?

to display device ID and other information about directly connected Cisco devices

What are two reasons for an administrator to issue the copy running-config tftp command on a switch or router?

to save the running configuration file to a remote location to transfer the current configuration file to a server

What are SNMP trap messages?

unsolicited messages that are sent by the SNMP agent and alert the NMS to a condition on the network


Kaugnay na mga set ng pag-aaral

Decision Support & Computer Applications

View Set

EC-201 Intro to Microeconomics Exam 1 HW Problems

View Set

POLI 2 - Comparative Politics Midterm

View Set

Chapter 12: Power and Politics MGT 420 GCU

View Set