Chapter 17 Comprehension Questions
Which two network protocols are used to establish a remote access network connection to a device? (Choose two.)
1) Secure Shell (SSH) 2) Telnet
What are two forms of software programs or processes that provide access to the network? (Choose two.)
1) application layer services 2) network applications
Which elements are required to scale to a larger network? (Choose two.)
1) budget 2) network documentation
A technician is using the debug ip icmp privileged EXEC command to capture live router output. Which commands would stop this debug command on a Cisco router? (Choose two.)
1) no debug ip icmp 2) undebug all
Which two traffic types require delay sensitive delivery? (Choose two.)
1) voice 2) video
Which statement is true about CDP on a Cisco device?
CDP can be disabled globally or on a specific interface.
Which process failed if a computer cannot access the internet and received an IP address of 169.254.142.5?
DHCP
A user is unable to reach the website when typing http://www.cisco.com in a web browser, but can reach the same site by typing http://72.163.4.161. What is the issue?
DNS
What Windows 10 tool is useful to determine which applications are using network services on a host?
Data Usage
A technician is troubleshooting a network problem. After troubleshooting, the technician concludes that a switch should be replaced. What should the technician do next?
Escalate the trouble ticket to the manager to approve the change.
A small company has only one router as the exit point to its ISP. Which solution could be adopted to maintain connectivity if the router itself, or its connection to the ISP, fails?
Have a second router that is connected to another ISP.
What is necessary to plan and use when implementing a network?
IP addressing scheme
What mechanism can be implemented in a small network to help minimize network latency for real-time streaming applications?
QoS
A technician is troubleshooting a network problem and has just established a theory of probable causes. What would be the next step in the troubleshooting process?
Test the theory to determine cause.
Which statement correctly relates to a small network?
The majority of businesses are small.
Which software installed on key hosts can reveal the types of network traffic flowing through the network?
Wireshark
When should an administrator establish a network baseline?
at regular intervals over a period of time
Where are Cisco IOS debug output messages sent by default?
console line
Which factor must be considered when selecting network devices?
cost
What factor should be considered in the design of a small network when devices are being chosen?
cost of devices
A newly hired network technician is given the task of ordering new hardware for a small business with a large growth forecast. Which primary factor should the technician be concerned with when choosing the new devices?
devices with support for modularity
Which element of scaling a network involves identifying the physical and logical topologies?
network documentation
What is required to classify traffic according to priority?
quality of service (QoS)
What is required to maintain a high degree of reliability and eliminate single points of failure?
redundancy
Which network design consideration would be more important to a large corporation than to a small business?
redundancy
A network technician suspects that a particular network connection between two Cisco switches is having a duplex mismatch. Which command would the technician use to see the Layer 1 and Layer 2 details of a switch port?
show interfaces
A technician has established a remote connection to router R1 to observe debug output. The technician enters the debug ip icmp command then pings a remote destination. However, no output is displayed. Which command would the technician have to enter to display log messages on a remote connection?
terminal monitor
A network technician is investigating network connectivity from a PC to a remote host with the address 10.1.1.5. Which command, when issued on a Windows PC, will display the path to the remote host?
tracert 10.1.1.5
What type of traffic would most likely have the highest priority through the network?
voice