Chapter 17 Comprehension Questions

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which two network protocols are used to establish a remote access network connection to a device? (Choose two.)

1) Secure Shell (SSH) 2) Telnet

What are two forms of software programs or processes that provide access to the network? (Choose two.)

1) application layer services 2) network applications

Which elements are required to scale to a larger network? (Choose two.)

1) budget 2) network documentation

A technician is using the debug ip icmp privileged EXEC command to capture live router output. Which commands would stop this debug command on a Cisco router? (Choose two.)

1) no debug ip icmp 2) undebug all

Which two traffic types require delay sensitive delivery? (Choose two.)

1) voice 2) video

Which statement is true about CDP on a Cisco device?​

CDP can be disabled globally or on a specific interface.

Which process failed if a computer cannot access the internet and received an IP address of 169.254.142.5?

DHCP

A user is unable to reach the website when typing ht​tp://ww​w.cisco.com in a web browser, but can reach the same site by typing ht​tp://72.163.4.161. What is the issue?

DNS

What Windows 10 tool is useful to determine which applications are using network services on a host?

Data Usage

A technician is troubleshooting a network problem. After troubleshooting, the technician concludes that a switch should be replaced. What should the technician do next?

Escalate the trouble ticket to the manager to approve the change.

A small company has only one router as the exit point to its ISP. Which solution could be adopted to maintain connectivity if the router itself, or its connection to the ISP, fails?

Have a second router that is connected to another ISP.

What is necessary to plan and use when implementing a network?

IP addressing scheme

What mechanism can be implemented in a small network to help minimize network latency for real-time streaming applications?

QoS

A technician is troubleshooting a network problem and has just established a theory of probable causes. What would be the next step in the troubleshooting process?

Test the theory to determine cause.

Which statement correctly relates to a small network?

The majority of businesses are small.

Which software installed on key hosts can reveal the types of network traffic flowing through the network?

Wireshark

When should an administrator establish a network baseline?

at regular intervals over a period of time

Where are Cisco IOS debug output messages sent by default?

console line

Which factor must be considered when selecting network devices?

cost

What factor should be considered in the design of a small network when devices are being chosen?

cost of devices

A newly hired network technician is given the task of ordering new hardware for a small business with a large growth forecast. Which primary factor should the technician be concerned with when choosing the new devices?

devices with support for modularity

Which element of scaling a network involves identifying the physical and logical topologies?

network documentation

What is required to classify traffic according to priority?

quality of service (QoS)

What is required to maintain a high degree of reliability and eliminate single points of failure?

redundancy

Which network design consideration would be more important to a large corporation than to a small business?

redundancy

A network technician suspects that a particular network connection between two Cisco switches is having a duplex mismatch. Which command would the technician use to see the Layer 1 and Layer 2 details of a switch port?

show interfaces

A technician has established a remote connection to router R1 to observe debug output. The technician enters the debug ip icmp command then pings a remote destination. However, no output is displayed. Which command would the technician have to enter to display log messages on a remote connection?

terminal monitor

A network technician is investigating network connectivity from a PC to a remote host with the address 10.1.1.5. Which command, when issued on a Windows PC, will display the path to the remote host?

tracert 10.1.1.5

What type of traffic would most likely have the highest priority through the network?

voice


Set pelajaran terkait

Chpt 43 Drugs for Nutritional Disorder

View Set

Chapter 11: Drug Therapy for Hematopoietic Disorders

View Set

MFT study ch.1: Research Methods

View Set

Ch 1: Information Systems an overview

View Set

PYS 101 Chap 5 - Sensation & Perception

View Set