CCNA 4 7 8 exam plus other

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Refer to the exhibit. On the basis of the information presented, which two IP SLA related statements are true? (Choose two.) - IP SLA 99 is measuring jitter. - IP SLA 99 is configured with the type dns target-addr 192.168.2.1 command. - IP SLA 99 is sending echo requests every 10 seconds. - IP SLA 99 is sending echo requests from IP address 192.168.2.1. - IP SLA 99 is scheduled to begin in 2 hours. - IP SLA 99 will run forever unless explicitly disabled.

- IP SLA 99 is sending echo requests every 10 seconds. - IP SLA 99 will run forever unless explicitly disabled.

What are three new challenges associated with the rapid growth of the IoT? (Choose three.) - increasing the CPU power of computers - integrating new things into existing networks - improving the Internet connections from homes - securing new devices with varying level of security - developing better routing protocols for new devices - integrating many devices from different vendors with custom applications

- integrating new things into existing networks - securing new devices with varying level of security - integrating many devices from different vendors with custom applications

Which two business and technical challenges does implementing virtualization within a data center help businesses to overcome? (Choose two.) - virus and spyware attacks - server hardware needs - power and air conditioning - physical footprint - operating system license requirements

- power and air conditioning - physical footprint

What are two reasons to create a network baseline? (Choose two.) - to determine what kind of equipment to implement - to evaluate security vulnerabilities in the network - to identify future abnormal network behavior - to design a network according to a proper model - to determine if the network can deliver the required policies - to select a routing protocol

- to identify future abnormal network behavior - to determine if the network can deliver the required policies

Which number represents the most severe level of syslog logging? 0 1 6 7

0

How many "things" are predicted to be interconnected on the Internet by 2020? 1 million 5 million 1 billion 50 billion

50 billion

Today, over __% of things in the physical world are still not connected to the Internet. Select the answer that will complete the statement. 85 90 75 99

99

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. A user reports that PC0 cannot visit the web server www.server.com. Troubleshoot the network configuration to identify the problem. What is the cause of the problem? - The clock rate on Branch S0/0/0 is configured incorrectly. - A serial interface encapsulation is configured incorrectly. - The DNS server address on PC0 is configured incorrectly. - A default route on HQ is not configured.

A serial interface encapsulation is configured incorrectly.

Where are IPv4 address to Layer 2 Ethernet address mappings maintained on a host computer? routing table MAC address table ARP cache neighbor table

ARP cache

A network engineer is investigating an access issue to a web server. The web server can access the Internet and the local clients can open the web pages. However, outside clients cannot access the web pages. What is the most likely cause of the problem? - The web server does not have a default gateway configured. - An ACL is blocking incoming connections. - There is a cable fault. - There are excessive broadcasts in the network.

An ACL is blocking incoming connections.

What technology allows users to access data anywhere and at any time? data analytics Cloud computing micromarketing virtualization

Cloud computing

What is a difference between the functions of Cloud computing and virtualization? - Cloud computing utilizes data center technology whereas virtualization is not used in data centers. - Cloud computing requires hypervisor technology whereas virtualization is a fault tolerance technology. - Cloud computing separates the application from the hardware whereas virtualization separates the OS from the underlying hardware. - Cloud computing provides services on web-based access whereas virtualization provides services on data access through virtualized Internet connections.

Cloud computing separates the application from the hardware whereas virtualization separates the OS from the underlying hardware.

After gathering symptoms, if the troubleshooter determines that the problem is located outside the control of the organization, what is the next step? - Question the end users. - Analyze existing symptoms. - Narrow the scope of the problem. - Gather symptoms from suspected devices. - Contact the administrator of the external system.

Contact the administrator of the external system.

Refer to the exhibit. What action occurs at stage 3 of the general troubleshooting process? Correct the problem. Question end users. Narrow the scope. Document symptoms.

Correct the problem.

What is a characteristic of data flow processing in SDN? - The SDN controller attaches an entry to each packet to identify the flow. - OpenStack is used to construct the entry in switches to facilitate data forwarding. - Each data flow through the network must be approved by the SDN controller first. - The SDN controller routes a data flow first and the data plane will use policies to permit or deny the flow.

Each data flow through the network must be approved by the SDN controller first.

Which feature sends simulated data across the network and measures performance between multiple network locations? LLDP IP SLA syslog SPAN

IP SLA

Which three pieces of information are typically recorded in a logical topology diagram? (Choose three.) - device locations - routing protocols - cable specifications - device models and manufacturers - static routes IP address and prefix lengths

IP address and prefix lengths routing protocols static routes

Which Cloud computing service would be best for a new organization that cannot afford physical servers and networking equipment and must purchase network services on-demand? PaaS ITaaS IaaS SaaS

IaaS

What is the term for the extension of the existing Internet structure to billions of connected devices? IoT SCADA digitization M2M

IoT

Refer to the exhibit. A network administrator issues the commands in order to configure secure remote access to the router. However, the administrator notices that sessions are still being made over telent and are in plain-text. What action should be taken to encrypt the remote access traffic? - Use the enable secret command to configure encryption. - Add the service password-encryption command to the configuration. - Replace the login command with login local. - Issue the no transport input telnet ssh command and then issue the transport input ssh command.

Issue the no transport input telnet ssh command and then issue the transport input ssh command.

What statement describes Fog computing? - It requires Cloud computing services to support non-IP enabled sensors and controllers. - It utilizes a centralized computing infrastructure that stores and manipulates big data in one very secure data center. - It supports larger networks than Cloud computing does. - It creates a distributed computing infrastructure that provides services close to the network edge.

It creates a distributed computing infrastructure that provides services close to the network edge.

What is a purpose of establishing a network baseline? - It creates a point of reference for future network evaluations. - It provides a statistical average for network performance. - It manages the performance of network devices. - It checks the security configuration of network devices.

It creates a point of reference for future network evaluations.

Which statement describes the physical topology for a LAN? - It depicts the addressing scheme that is employed in the LAN. - It describes whether the LAN is a broadcast or token-passing network. - It defines how hosts and network devices connect to the LAN. - It shows the order in which hosts access the network.

It defines how hosts and network devices connect to the LAN.

What is Fog computing? - It is a type of computing that enhances P2P applications. - It is a type of computing that sends controller data to a sensor. - It is a type of computing that disperses servers and services globally in distributed data centers. - It is a type of computing where services are hosted where they are used, such as at the network edge or with end devices.

It is a type of computing where services are hosted where they are used, such as at the network edge or with end devices.

Which statement describes the Cisco IoT System? - It is a switch operating system to integrate many Layer 2 security features. - It is an infrastructure to manage large scale systems of very different endpoints and platforms. - It is a router operating system combining IOS and Linux for fog computing. - It is an advanced routing protocol for cloud computing.

It is an infrastructure to manage large scale systems of very different endpoints and platforms.

An administrator is troubleshooting an Internet connectivity problem on a router. The output of the show interfaces gigabitethernet 0/0 command reveals higher than normal framing errors on the interface that connects to the Internet. At what layer of the OSI model is the problem likely occurring? Layer 1 Layer 2 Layer 3 Layer 4 Layer 7

Layer 2

Which two layers of the OSI model are associated with SDN network control plane functions that make forwarding decisions? (Choose two.)​ Layer 1 Layer 2 Layer 3 Layer 4 Layer 5

Layer 2 Layer 3

Which two specialized troubleshooting tools can monitor the amount of traffic that passes through a switch? (Choose two.) portable network analyzer digital multimeter DTX cable analyzer TDR NAM

NAM portable network analyzer

In which step of gathering symptoms does the network engineer determine if the problem is at the core, distribution, or access layer of the network? - Determine ownership. - Narrow the scope. - Document the symptoms. - Gather information. - Determine the symptoms.

Narrow the scope.

Which network traffic management technology is a basic element in SDN implementations? OpenFlow OpenStack IEEE 802.1aq Interface to the Routing System

OpenFlow

Which Cloud computing service would be best for an organization that needs to collaboratively create applications and deliver them over the web? PaaS IaaS SaaS ITaaS

PaaS

Here is a link to the PT Activity. Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. A user reports that PC0 cannot visit the web server www.server.com. Troubleshoot the network configuration to identify the problem. What is the cause of the problem? - Routing between HQ and Branch is configured incorrectly. - A serial interface on Branch is configured incorrectly. - The clock rate on one of the serial links is configured incorrectly. - The DNS server address on PC0 is configured incorrectly.

Routing between HQ and Branch is configured incorrectly.

Which technology virtualizes the network control plane and moves it to a centralized controller?​ SDN IaaS fog computing cloud computing

SDN

What is an example of an M2M connection in the IoT? - Redundant servers communicate with each other to determine which server should be active or standby. - Sensors in a warehouse communicate with each other and send data to a server block in the cloud. - A user sends an email over the Internet to a friend. - An automated alarm system in a campus sends fire alarm messages to all students and staff.

Sensors in a warehouse communicate with each other and send data to a server block in the cloud.

An internal corporate server can be accessed by internal PCs, but not by external Internet users that should have access. What could be the issue? - Static NAT has not been configured properly or at all. - The server does not have a private IP address assigned. - The switch port to which the server connects has an incorrect VLAN configured. - The default gateway router for the server does not have a default route.

Static NAT has not been configured properly or at all.

When is the most appropriate time to measure network operations to establish a network performance baseline? - at random times during a 10 week period, so that abnormal traffic levels can be detected - during quiet vacation periods, so that the level of non-data traffic can be determined - whenever high network use is detected, so that how the network performs under stress can be monitored - at the same time each day across a set period of average working days, so that typical traffic patterns can be established

at the same time each day across a set period of average working days, so that typical traffic patterns can be established

Which troubleshooting method begins by examining cable connections and wiring issues? divide-and-conquer top-down bottom-up substitution

bottom-up

Which troubleshooting tool can be used to pinpoint the distance to a break in a network cable? digital multimeter network analyzer network analysis module cable tester

cable tester

A team of engineers has identified a solution to a significant network problem. The proposed solution is likely to affect critical network infrastructure components. What should the team follow while implementing the solution to avoid interfering with other processes and infrastructure? - one of the layered troubleshooting approaches - change-control procedures - knowledge base guidelines - syslog messages and reports

change-control procedures

Which three network models are described in the fog computing pillar of the Cisco IoT System? (Choose three.) enterprise WAN P2P peer-to-peer client/server cloud computing fog computing

client/server cloud computing fog computing

Which component in a traditional infrastructure device provides Layer 2 and Layer 3 functions to create data paths within a network? data plane control plane adjacency table forwarding information base

control plane

A user reports that after an OS patch of the networking subsystem has been applied to a workstation, it performs very slowly when connecting to network resources. A network technician tests the link with a cable analyzer and notices that the workstation sends an excessive number of frames smaller than 64 bytes and also other meaningless frames. What is the possible cause of the problem? - Ethernet signal attenuation - corrupted application installation - cabling faults - corrupted NIC driver

corrupted NIC driver

A network engineer is troubleshooting a network that has recently been updated with a new routing protocol, but the network is not working as expected. The engineer is comparing the running configuration from before and after the change was made. Which approach to troubleshooting the problem is the engineer using? - comparing IP settings on network devices - divide-and-conquer - bottom-up - top-down

divide-and-conquer

Which is a characteristic of a Type 2 hypervisor?​ - does not require management console software - installs directly on hardware - has direct access to server hardware resources - best suited for enterprise environments

does not require management console software

When should a network performance baseline be measured? - during normal work hours of an organization - immediately after the main network devices restarted - after normal work hours to reduce possible interruptions - when a denial of service attack to the network is detected and blocked

during normal work hours of an organization

Which term describes the data exchanges between virtual servers in a data center? vertical traffic backbone traffic east-west traffic north-south traffic

east-west traffic

True or False. Cloud computing and virtualization are different terms that refer to the same thing.

false

Which IoT pillar extends cloud connectivity closer to the network edge? - management and automation pillar - application enablement platform pillar - network connectivity pillar - fog computing pillar

fog computing pillar

A network engineer is troubleshooting a network problem and can successfully ping between two devices. However, Telnet between the same two devices does not work. Which OSI layers should the administrator investigate next? - from the network layer to the application layer - from the network layer to the physical layer - only the network layer - all of the layers

from the network layer to the application layer

After which step in the network troubleshooting process would one of the layered troubleshooting methods be used? - documenting symptoms - determining ownership - narrowing the scope - gathering symptoms from suspect devices

gathering symptoms from suspect devices

Fill in the blank. A ______________ is software that creates and runs VM instances and can be installed directly on hardware or run as an application on an OS.

hypervisor

Which cloud computing opportunity would provide the use of network hardware such as routers and switches for a particular company? infrastructure as a service (IaaS) browser as a service (BaaS) software as a service (SaaS) wireless as a service (WaaS)

infrastructure as a service (IaaS)

Which is a characteristic of a Type 1 hypervisor?​ - installed on an existing operating system​ - installed directly on a server​ - best suited for consumers and not for an enterprise environment - does not require management console software

installed directly on a server​

A group of Windows PCs in a new subnet has been added to an Ethernet network. When testing the connectivity, a technician finds that these PCs can access local network resources but not the Internet resources. To troubleshoot the problem, the technician wants to initially confirm the IP address and DNS configurations on the PCs, and also verify connectivity to the local router. Which three Windows CLI commands and utilities will provide the necessary information? (Choose three.) telnet netsh interface ipv6 show neighbor ipconfig arp -a tracert nslookup ping

ipconfig nslookup ping

A network administrator is having issues with a newly installed network not appearing in other routers. At which layer of the OSI model is the network administrator going to start the troubleshooting process when using a top-down approach? internet network session transport application

network

Which category of software troubleshooting tools provides device-level monitoring, configuration, and fault-management? - network management system tools - knowledge bases - baselining tools - host-based protocol analyzers

network management system tools

An attack has been launched within a company and a host name has been identified as the source. What command can a network technician use to determine the IP address assigned to the host name? ipconfig /all net computer nslookup tracert

nslookup

Which cybersecurity solution is described in the security pillar of the Cisco IoT System to address the security of power plants and factory process lines? - operational technology specific security - IoT physical security - cloud computing security - IoT network security

operational technology specific security

A company is setting up a web site with SSL technology to protect the authentication credentials required to access the web site. A network engineer needs to verify that the setup is correct and that the authentication is indeed encrypted. Which tool should be used? fault-management tool cable analyzer protocol analyzer baselining tool

protocol analyzer

Which statement describes the concept of cloud computing? - separation of control plane from data plane - separation of operating system from hardware - separation of management plane from control plane - separation of application from hardware

separation of application from hardware

Which command runs several other show commands in order to generate many pages of detailed troubleshooting information? show ip cache show protocols show tech-support show running-config

show tech-support

How does virtualization help with disaster recovery within a data center? - guarantee of power - improvement of business practices - supply of consistent air flow - support of live migration

support of live migration

What component is considered the brains of the ACI architecture and translates application policies​? - the Application Network Profile endpoints - the hypervisor​ - the Application Policy Infrastructure Controller - the Nexus 9000 switch

the Application Policy Infrastructure Controller

What pre-populates the FIB on Cisco devices that use CEF to process packets? the ARP table the adjacency table the routing table the DSP

the routing table

A user in a large office calls technical support to complain that a PC has suddenly lost connectivity to the network. The technician asks the caller to talk to nearby users to see if other machines are affected. The caller reports that several immediate neighbors in the same department have a similar problem and that they cannot ping each other. Those who are seated in other departments have connectivity. What should the technician check as the first step in troubleshooting the issue? - the status of the departmental workgroup switch in the wiring closet - the trunks between switches in the wiring closet - the cable that connects the PC of the caller to the network jack - the power outlet to the PC that is used by the caller - the cable connection between a PC and a network outlet that is used by a neighbor

the status of the departmental workgroup switch in the wiring closet

A network administrator issues the telnet www.cisco.com 25 command on the workstation. What is the purpose of this command? - to verify that the website is operational - to establish a management session to the web server - to probe the server that provides the web service to determine if it is also running an email service - to identify the path of network traffic toward the web server

to probe the server that provides the web service to determine if it is also running an email service

A network engineer is troubleshooting a network problem where users cannot access the FTP server at the same IP address where a website can be successfully accessed. Which troubleshooting method would be the best to apply in this case? - comparing IP settings on user workstations - top-down - bottom-up - divide-and-conquer

top-down

Users report that the new web site http://www.company1.biz cannot be accessed. The helpdesk technician checks and verifies that the web site can be accessed with http://www.company1.biz:90. Which layer in the TCP/IP model is involved in troubleshooting this issue? network access transport internet application

transport

Which type of Hypervisor is implemented when a user with a laptop running the Mac OS installs a Windows virtual OS instance? type 2 type 1 virtual machine bare metal

type 2

The newly configured ASBR that connects a company to the Internet has a default route configured and has the default-information originate command entered. Devices connected through this router can access the Internet. The problem is that no other OSPF routers have a default route in the routing table and no other users throughout the organization can access the Internet. What could be the problem? - The ASBR does not have an OSPF neighbor. - The other routers are not configured to accept LSA type 4s. - The ASBR should use the exit_interface argument instead of next-hop on the default route. - The ASBR does not have OSPF configured.

The ASBR does not have an OSPF neighbor.

A networked PC is having trouble accessing the Internet, but can print to a local printer and ping other computers in the area. Other computers on the same network are not having any issues. What is the problem? - The link between the switch to which the PC connects and the default gateway router is down. - The PC has a missing or incorrect default gateway. - The default gateway router does not have a default route. - The switch port to which the PC connects has an incorrect VLAN configured.

The PC has a missing or incorrect default gateway.

How is the control plane modified to operate with network virtualization? - The control plane function is consolidated into a centralized controller. - The control plane on each device is interconnected to a dedicated high-speed network. - A hypervisor is installed in each device to allow multiple instances of the control plane. - Control plane redundancy is added to each network device.

The control plane function is consolidated into a centralized controller.

A client calls the support desk and says this to a technician: "I have just started my computer and attempted to check e-mail. The error 0x800ccc0d was displayed. However, I was able to connect to network drives and access the Internet." Which statement would describe the status of this issue? - The client needs to plug into a different port on the switch and try the steps again before contacting the helpdesk. - More detail is required before a complete problem description can be completed. - The client needs to reboot the PC and report back to the helpdesk. - The helpdesk has enough information to begin finding a resolution. - The client needs to switch cables before the helpdesk can begin to resolve the issue.

The helpdesk has enough information to begin finding a resolution.

What is a characteristic of the two-tier spine-leaf topology of the Cisco ACI fabric architecture?​ - The leaf switches always attach to the spines and they are interlinked through a trunk line. - The leaf switches always attach to the spines, but they never attach to each other. - The spine switches attach to the leaf switches and attach to each other for redundancy. - The spine and leaf switches are always linked through core switches.

The leaf switches always attach to the spines, but they never attach to each other.

For a data center, what is the difference in the server virtualization data traffic compared with the traditional client-server model? - Data traffic from clients will be routed to multiple virtual servers. - There are significant data exchanges between virtual servers. - There is more data traffic flowing from virtual servers to clients. - More network control traffic is generated between virtual servers and clients.

There are significant data exchanges between virtual servers.

Which type of hypervisor would most likely be used in a data center? Nexus Hadoop Type 1 Type 2

Type 1

A network technician is troubleshooting an email connection problem. Which question to the end-user will provide clear information to better define the problem? - What kind of equipment are you using to send emails? - Is your email working now? - How big are the emails you tried to send? - When did you first notice your email problem?

When did you first notice your email problem?

Which cloud model provides services for a specific organization or entity? a hybrid cloud a public cloud a community cloud a private cloud

a private cloud

What is an example of an M2M connection? - a person getting information from a database, or conducting a complex analysis - two people communicating with each other through an instant messaging application - a sensor in a garbage can signaling that it is full and delivering the data to a GPS mapping system for the sanitation truck to adjust its route for pickups - a domestic refrigerator sending an email to homeowners to inform them that milk must be purchased

a sensor in a garbage can signaling that it is full and delivering the data to a GPS mapping system for the sanitation truck to adjust its route for pickups

Users report that their PCs cannot access the file server that is located in the server farm at the headquarters building. The support desk technician checks the latest network update reports and realizes that the router that was connected to the network segment of those users failed suddenly and has just been replaced. What command should the technician instruct the users to issue on the PCs to solve the problem? arp -a arp -d ipconfig /renew ipconfig /flushdns

arp -d


Ensembles d'études connexes

Exam 2 (ALL) - Upper Limb & Thorax

View Set

Agency formation and termination

View Set

El Maestro File 7 (plus have impression materials section added)

View Set

Chapter 11 - Pricing with Market Power

View Set

Chapter 490 - Psychological Services Act, Chapter 64B19 - Board of Psychology F.A.C. & Chapter 456 Health Professions General Provisions

View Set

Immuno. Chapter 3 BCR/TCR study questions

View Set

Chapter 7 PRIMARY AND SECONDARY MARKETS

View Set

CH 42 Management of Patients with Musculoskeletal Trauma (E4)

View Set

Chapter 9 practice quiz true false

View Set

AIS Chapter 3: Cybercrime, Fraud, and Ethics

View Set

CH 15 reading questions/ study guide

View Set