Ch. 17 - Cisco Build a Small Network

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A. tracert 10.1.1.5

A network technician is investigating network connectivity from a PC to a remote host with the address 10.1.1.5. Which command, when issued on a Windows PC, will display the path to the remote host? A. tracert 10.1.1.5 B. traceroute 10.1.1.5 C. trace 10.1.1.5 D. ping 10.1.1.5

D. show interfaces

A network technician suspects that a particular network connection between two Cisco switches is having a duplex mismatch. Which command would the technician use to see the Layer 1 and Layer 2 details of a switch port? A. show running-config B. show ip interface brief​ C. show mac-address-table D. show interfaces

D. devices with support for modularity

A newly hired network technician is given the task of ordering new hardware for a small business with a large growth forecast. Which primary factor should the technician be concerned with when choosing the new devices? A. redundant devices B. devices that have support for network monitoring C. devices with a fixed number and type of interfaces D. devices with support for modularity

B. Have a second router that is connected to another ISP.

A small company has only one router as the exit point to its ISP. Which solution could be adopted to maintain connectivity if the router itself, or its connection to the ISP, fails? A. Add more interfaces to the router that is connected to the internal network. B. Have a second router that is connected to another ISP. C. Activate another router interface that is connected to the ISP, so the traffic can flow through it. D. Purchase a second least-cost link from another ISP to connect to this router.

C. terminal monitor

A technician has established a remote connection to router R1 to observe debug output. The technician enters the debug ip icmp command then pings a remote destination. However, no output is displayed. Which command would the technician have to enter to display log messages on a remote connection? A. monitor debug output B. monitor terminal C. terminal monitor D. terminal monitor debug

D. Test the theory to determine cause.

A technician is troubleshooting a network problem and has just established a theory of probable causes. What would be the next step in the troubleshooting process? A. Document findings, actions, and outcomes. B. Establish a plan of action and implement the solution. C. Identify the problem. D. Test the theory to determine cause. E. Verify solution and implement preventive measures.

B. Escalate the trouble ticket to the manager to approve the change.

A technician is troubleshooting a network problem. After troubleshooting, the technician concludes that a switch should be replaced. What should the technician do next? A. Email all users to let them know they are replacing a switch. B. Escalate the trouble ticket to the manager to approve the change. C. Purchase a new switch and replace the defective one. D. Resolve the problem.

C. no debug ip icmp & D. undebug all

A technician is using the debug ip icmp privileged EXEC command to capture live router output. Which commands would stop this debug command on a Cisco router? (Choose two.) A. debug ip icmp off B. no debug debug ip icmp C. no debug ip icmp D. undebug all E. undebug debug ip icmp

C. DNS

A user is unable to reach the website when typing ht​tp://ww​w.cisco.com in a web browser, but can reach the same site by typing ht​tp://72.163.4.161. What is the issue? A. default gateway B. DHCP C. DNS D. TCP/IP protocol stack

B. Data Usage

What Windows 10 tool is useful to determine which applications are using network services on a host? A. Control panel B. Data Usage C. File Manager D. Windows Defender Firewall E. Windows Explorer

B. application layer services & D. network applications

What are two forms of software programs or processes that provide access to the network? (Choose two.) A. antivirus software B. application layer services C. gaming software D. network applications E. productivity software F. virtual machine software

C. cost of devices

What factor should be considered in the design of a small network when devices are being chosen? A. redundancy B. traffic analysis C. cost of devices D. ISP

B. IP addressing scheme

What is necessary to plan and use when implementing a network? A. device names B. IP addressing scheme C. MAC addressing scheme D. printer location

B. quality of service (QoS)

What is required to classify traffic according to priority? A. IP addressing scheme B. quality of service (QoS) C. routing D. switching

D. redundancy

What is required to maintain a high degree of reliability and eliminate single points of failure? A. accessibility B. expandability C. integrity D. redundancy

B. QoS

What mechanism can be implemented in a small network to help minimize network latency for real-time streaming applications? A. AAA B. QoS C. PoE D. ICMP

B. voice

What type of traffic would most likely have the highest priority through the network? A. FTP B. voice C. instant messaging D. SNMP

D. at regular intervals over a period of time

When should an administrator establish a network baseline? A. when there is a sudden drop in traffic B. when the traffic is at peak in the network C. at the lowest point of traffic in the network D. at regular intervals over a period of time

C. console line

Where are Cisco IOS debug output messages sent by default? A. memory buffers B. Syslog server C. console line D. vty lines

D. network documentation

Which element of scaling a network involves identifying the physical and logical topologies? A. traffic analysis B. cost analysis C. device inventory D. network documentation

A. budget & D. network documentation

Which elements are required to scale to a larger network? (Choose two.) A. budget B. device configurations C. increased bandwidth D. network documentation E. windows hosts

C. cost

Which factor must be considered when selecting network devices? A. color B. console connections C. cost D. elasticity

B. redundancy

Which network design consideration would be more important to a large corporation than to a small business? A. firewall B. redundancy C. low port density switch D. Internet router

C. DHCP

Which process failed if a computer cannot access the internet and received an IP address of 169.254.142.5? A. IP B. DNS C. DHCP D. HTTP

E. Wireshark

Which software installed on key hosts can reveal the types of network traffic flowing through the network? A. Linux B. MacOS C. SSH D. Windows E. Wireshark

C. The majority of businesses are small.

Which statement correctly relates to a small network? A. Small networks are complex. B. Small networks require an IT department to maintain. C. The majority of businesses are small.

B. CDP can be disabled globally or on a specific interface​.

Which statement is true about CDP on a Cisco device?​ A. The show cdp neighbor detail command will reveal the IP address of a neighbor only if there is Layer 3 connectivity​. B. CDP can be disabled globally or on a specific interface​. C. Because it runs at the data link layer​, the CDP protocol can only be implemented in switches. D. To disable CDP globally, the no cdp enable command in interface configuration mode must be used.

D. Secure Shell (SSH) & F. Telnet

Which two network protocols are used to establish a remote access network connection to a device? (Choose two.) A. File Transfer Protocol (FTP) B. Hypertext Transfer Protocol (HTTP). C. Remote Connect (RC) D. Secure Shell (SSH) E. Simple Mail Transfer Protocol (SMTP) F. Telnet

A. voice & E. video

Which two traffic types require delay sensitive delivery? (Choose two.) A. voice B. web C. email D. FTP E. video


Ensembles d'études connexes

CHAPTER 33: INTERNATIONAL TRADE by Fuatino

View Set

You May Ask Yourself Chapter 13: Education

View Set

1230 Maternal/Neonatal Nursing Chapter 65

View Set

Large-Scale Brain Networks and Psychopathology: A Unifying Triple Network Model -Menon

View Set