Business Driven Technology Final Exam Study Set
discovery prototyping
builds a small-scale representation or working model of the system to ensure it meets the user and business requirements.
advantages of prototyping
-encourages user participation -evolve through iteration, which better supports change. -have a physical quality allowing users to see, touch, and experience system as developed -tend to detect errors earlier -accelerates the phases of the SDLC, helping to ensure success.
outsourcing challenges
-length of contract -threat to competitive advantage -loss of confidentiality
primary forms of agile methodologies
-rapid prototyping or rapid application development methodology. -extreme programming methodology. -rational unified process (RUP) methodology. -scrum methodology
Project Plan
A formal, approved document that manages and controls project execution Well-Defined plan: -easy to read and understand -Communicated to all key participants -Appropriate to the project's size, complexity, and criticality -Prepared by the team, rather than by the individual project manager
The router will load IOS from the TFTP server. If the image fails to load, it will load the IOS image from ROM.
A network administrator configures a router with the command sequence: R1(config)# boot system tftp://c1900-universalk9-mz.SPA.152-4.M3.bin R1(config)# boot system rom What is the effect of the command sequence? On next reboot, the router will load the IOS image from ROM. The router will copy the IOS image from the TFTP server and then reboot the system. The router will load IOS from the TFTP server. If the image fails to load, it will load the IOS image from ROM. The router will search and load a valid IOS image in the sequence of flash, TFTP, and ROM.
The syslog client will send to the syslog server any event message that has a severity level of 4 and lower.
A network administrator has issued the logging trap 4 global configuration mode command. What is the result of this command? After four events, the syslog client will send an event message to the syslog server. The syslog client will send to the syslog server any event message that has a severity level of 4 and higher. The syslog client will send to the syslog server any event message that has a severity level of 4 and lower. The syslog client will send to the syslog server event messages with an identification trap level of only 4.
show flash0:
A network engineer is upgrading the Cisco IOS image on a 2900 series ISR. What command could the engineer use to verify the total amount of flash memory as well as how much flash memory is currently available? show flash0: show version show interfaces show startup-config
The network administrator wants to verify Layer 2 connectivity.
A ping fails when performed from router R1 to directly connected router R2. The network administrator then proceeds to issue the show cdp neighbors command. Why would the network administrator issue this command if the ping failed between the two routers? The network administrator suspects a virus because the ping command did not work. The network administrator wants to verify Layer 2 connectivity. The network administrator wants to verify the IP address configured on router R2. The network administrator wants to determine if connectivity can be established from a non-directly connected network.
agile
A(n) ________ methodology aims for customer satisfaction through early and continuous delivery of useful software components developed by an iterative process using the bare minimum requirements. waterfall pilot discovery agile
methodology
A(n) ____________ is a set of policies, procedures, standards, processes, practices, tools, techniques, and tasks that people apply to technical and management challenges. methodology exception implementation report
Project management office (PMO)
An internal department that oversees all organizational projects
analysis of project risks
An organization must identify what it wants to do and how it is going to do it. What does the "how" part of this question focus on? justification of the project definition of the project analysis of project risks expected results of the project
Project deliverable
Any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project
IPBase
Beginning with the Cisco IOS Software Release 15.0, which license is a prerequisite for installing additional technology pack licenses? IPBase DATA UC SEC
markup
Extensible ________ Language (XML), a markup language for documents, containing structured information. coupling markup loose
Unclear or missing business requirements Skipped SDLC phases Changing technology The cost of finding errors Balance of the triple constraints
Five primary reasons a project fails: Balance of the triple constraints Changing technology Misunderstanding of tangible benefits Unclear or missing business requirements Too much user participation The cost of finding errors Skipped SDLC phases
Expansion & rapid growth Gain core competencies The internet and globalization Improve financial savings
Four common reasons companies outsource: Expansion and rapid growth Slow operations and production Gain core competencies The Internet and globalization Hire more expensive workforce Improve financial savings
DATA Security Unified Communications
In addition to IPBase, what are the three technology packs that are shipped within the universal Cisco IOS Software Release 15 image? (Choose three.) Advanced IP Services Advanced Enterprise Services DATA Security SP Services Unified Communications
Project stakeholder
Individuals and organizations actively involved in the project or whose interests might be affected as a result of project execution or project completion
RAD methodology XP methodology RUP methodology Srum methodology
List the four primary forms of agile methodologies:
True
Managers need to continuously monitor projects to measure their success. If a project is failing, the manager must cancel the project and save the company any further project costs. Canceling a project is not necessarily a failure as much as it is successful resource management as it frees resources that can be used on other projects that are more valuable to the firm. True or false:
router RAM
Refer to the exhibit. From what location have the syslog messages been retrieved? syslog server syslog client router RAM router NVRAM
Specifying feature set universalk9 Minor release number 1 Where the images runs and if he file is compressed mz platform on which the image runs c1900 Maintenance release and rebuild number M4 new feature release number 4 file extension .bin Major release number 15
Refer to the exhibit. Match the components of the IOS image name to their description. (Not all options are used.) c1900-universalk9-mz.SPA.151-4.M4.bin Specifying the feature set minor release number where the image runs and if the file is compressed platform on which the image runs authentication type maintenance release and rebuild number new feature release number file extension major release number
Router R1 is the master, and R2 is the client. The IP address of R1 is 192.168.1.2.
Refer to the exhibit. Routers R1 and R2 are connected via a serial link. One router is configured as the NTP master, and the other is an NTP client. Which two pieces of information can be obtained from the partial output of the show ntp associations detail command on R2? (Choose two.) Both routers are configured to use NTPv2. Router R1 is the master, and R2 is the client. Router R2 is the master, and R1 is the client. The IP address of R1 is 192.168.1.2. The IP address of R2 is 192.168.1.2
the time when the syslog message was issued
Refer to the exhibit. What does the number 17:46:26.143 represent? the time passed since the syslog server has been started the time when the syslog message was issued the time passed since the interfaces have been up the time on the router when the show logging command was issued
This message is a level 5 notification message. This message indicates that service timestamps have been configured.
Refer to the exhibit. Which two conclusions can be drawn from the syslog message that was generated by the router? (Choose two.) This message resulted from an unusual error requiring reconfiguration of the interface. This message indicates that the interface should be replaced. This message is a level 5 notification message. This message indicates that service timestamps have been configured. This message indicates that the interface changed state five times.
Project milestone
Represents key dates when a certain group of activities must be performed
Offshore outsourcing Nearshore outsourcing Onshore outsourcing
Select the three forms of outsourcing: Offshore outsourcing Nearshore outsourcing In-house outsourcing Iterative outsourcing Onshore outsourcing
waterfall
The __________ methodology is a sequence of phases in which the output of each phase becomes the input for the next. scrum RAD waterfall agile
critical
The __________ path is the series of activities that determine the earliest time by which the project can be completed. Gantt SMART critical PERT
RUP
The ___________ (use acronym) methodology, owned by IBM, provides a framework for breaking down the development of software into four "gates. Waterfall XP RUP
Project Management
The application of knowledge, skills, tools, and techniques to project activities to meet project requirements
synchronizes the system clock with the time source with IP address 10.1.1.1
The command ntp server 10.1.1.1 is issued on a router. What impact does this command have? determines which server to send system log files to identifies the server on which to store backup configurations ensures that all logging will have a time stamp associated with it synchronizes the system clock with the time source with IP address 10.1.1.1
Executive sponsor
The person or group who provides the financial resources for the project
RAD methodology Rapid prototyping
Two terms that emphasize extensive user involvement in the rapid and evolutionary construction of working prototypes of a system, to accelerate the systems development process. RAD methodology Discovery prototyping Rapid prototyping 4GL prototyping
web services
What are application programming interfaces (API) that can be accessed over a network, such as the Internet, and executed on a remote system hosting the requested services? web services loose coupling interoperability
economic feasibility operational feasibility political feasibility legal feasibility
What are forms of feasibility study? (Check all that apply) economic feasibility operational feasibility phased feasibility analysis feasibility political feasibility legal feasibility
Gate one: Inception Gate two: Elaboration Gate three: Construction Gate four: Transition
What are the four gates of RUP (rational unified process) methodology? Gate two: Extreme Gate three: Construction Gate one: Inception Gate one: Implementation Gate three: Conversion Gate four: Transition Gate four: Tangible Gate two: Elaboration
XP methodology
What breaks a project into four phases, and developers cannot continue to the next phase until the previous phase is complete? XP methodology Scrum methodology Waterfall methodology
SPA
What code in the Cisco IOS 15 image filename c1900-universalk9-mz.SPA.153-3.M.bin indicates that the file is digitally signed by Cisco? SPA universalk9 M mz
RAD methodology
What emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system, to accelerate the systems development process? XP methodology RUP methodology Scrum methodology RAD methodology
Service-oriented architecture (SOA)
What is a business-driven enterprise architecture that supports integrating a business as linked, repeatable activities, tasks, or services? scrum methodology service-oriented architecture systems development life cycle object-oriented programming language
a temporary activity undertaken to create a unique product, service, or result
What is a project? a temporary activity undertaken to create a unique product, service, or result the application of knowledge, skills, tools, and techniques to project activities in order to meet or exceed stakeholder needs and expectations from a project any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project represent key dates when a certain group of activities must be performed
15
What is the major release number in the IOS image name c1900-universalk9-mz.SPA.152-3.T.bin? 2 3 15 52 1900
console line
What is used as the default event logging destination for Cisco routers and switches? terminal line syslog server console line workstation
It is an IOS version that, at the request of some countries, removes any strong cryptographic functionality.
What statement describes a Cisco IOS image with the "universalk9_npe" designation for Cisco ISR G2 routers? It is an IOS version that can only be used in the United States of America. It is an IOS version that provides only the IPBase feature set. It is an IOS version that offers all of the Cisco IOS Software feature sets. It is an IOS version that, at the request of some countries, removes any strong cryptographic functionality.
Product Activation Key
When a customer purchases a Cisco IOS 15.0 software package, what serves as the receipt for that customer and is used to obtain the license as well? Software Claim Certificate End User License Agreement Unique Device Identifier Product Activation Key
license accept end user agreement
Which command is used to configure a one-time acceptance of the EULA for all Cisco IOS software packages and features? license save show license license boot module module-name license accept end user agreement
show license udi
Which command would a network engineer use to find the unique device identifier of a Cisco router? show version show license udi show running-configuration license install stored-location-url
rational
Which methodology provides a framework for breaking down the development of software into four gates? rational extreme RAD RUP
syslog
Which protocol or service allows network administrators to receive system messages that are provided by network devices? syslog NTP SNMP NetFlow
CDP can be disabled globally or on a specific interface.
Which statement is true about CDP on a Cisco device? The show cdp neighbor detail command will reveal the IP address of a neighbor only if there is Layer 3 connectivity. To disable CDP globally, the no cdp enable command in interface configuration mode must be used. CDP can be disabled globally or on a specific interface. Because it runs at the data link layer, the CDP protocol can only be implemented in switches.
debugging
Which syslog message type is accessible only to an administrator and only via the Cisco CLI? errors debugging emergency alerts
DATA Security Unified Communications
Which three software packages are available for Cisco IOS Release 15.0? DATA IPVoice Security Enterprise Services Unified Communications Advanced IP Services
Verify connectivity between the router and TFTP server using the ping command. Verify that there is enough flash memory for the new Cisco IOS image using the show flash command.
Which two conditions should the network administrator verify before attempting to upgrade a Cisco IOS image using a TFTP server? (Choose two.) Verify the name of the TFTP server using the show hosts command. Verify that the TFTP server is running using the tftpdnld command. Verify that the checksum for the image is valid using the show version command. Verify connectivity between the router and TFTP server using the ping command. Verify that there is enough flash memory for the new Cisco IOS image using the show flash command.
NTP servers at stratum 1 are directly connected to an authoritative time source. NTP servers ensure an accurate time stamp on logging and debugging information.
Which two statements are true about NTP servers in an enterprise network? (Choose two.) There can only be one NTP server on an enterprise network. All NTP servers synchronize directly to a stratum 1 time source. NTP servers at stratum 1 are directly connected to an authoritative time source. NTP servers ensure an accurate time stamp on logging and debugging information. NTP servers control the mean time between failures (MTBF) for key network devices.
to display device ID and other information about directly connected Cisco devices
Why would a network administrator issue the show cdp neigbors command on a router? to display device ID and other information about directly connected Cisco devices to display router ID and other information about OSPF neighbors to display line status and other information about directly connected Cisco devices to display routing table and other information about directly connected Cisco devices
Service
_______-oriented architecture (SOA) is a business-driven enterprise architecture that supports integrating a business as linked, repeatable activities, tasks, or services. Service Scrum Software
discovery
________ prototyping builds a small-scale representation or working model of the system to ensure it meets the user and business requirements. Development Discovery Legacy Iterative
Iterative
___________ development consists of a series of tiny projects. It has become the foundation of multiple agile methodologies. Iterative Prototyping Integration Implementation
prototyping
___________ is a modern design approach where the designers and system users use an iterative approach to building the system. Engineering Requirements Prototyping Implementation
waterfall methodology
a sequence of phases in which the output of each phase becomes the input for the next.
agile methodology
aims for customer satisfaction through early and continuous delivery of useful software components developed by an interactive process using the bare minimum requirements. it is fast and efficient, with lower costs and fewer features.
intangible benefits
are difficult to quantify or measure -improved decision making -improved community service -improved morale -improved goodwill
tangible benefits
are easy to quantify and typically measured to determine the success or failure of a project. -decreased expenses -decreased processing errors -decreased response time -increased quantity or sales -increased quality
extreme programming (XP) methodology
breaks a project into four phases, and developers cannot continue to next phase until the previous phase is complete. 1. planning 2. designing 3. coding 4. testing
iterative development
consists of a series of tiny projects.
nearshore outsourcing
contracting an outsourcing arrangement with a company in a nearby country. often this country will share a border with the native country
responsibility matrix
defines all project roles and indicates what responsibilities are associated with each role
Communication plan
defines the how, what, when, and who regarding the flow of project information to stakeholders and is key for managing expectations
project requirements document
defines the specifications for product/output of the project and is key for managing expectations, controlling scope, and completing other planning efforts
rapid application development (RAD) methodology
emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system, to accelerate the systems development process.
onshore outsourcing
engaging another company within the same country for services
critical path
estimates the shortest path through the project ensuring all critical tasks are completed from start to finish.
Project assumption
factors considered to be true, real, or certain without proof or demonstration
PERT (Program Evaluation and Review Technique) Chart
is a graphical network model that depicts a project's task and the relationships between them. (dependency and critical path)
methodology
is a set of policies, procedures, standards, processes, practices, tools, techniques, and task that people apply to technical and management challenges.
Gantt Chart
is a simple bar chart that lists project tasks vertically against the project's time frame, listed horizontally.
out-sourcing
is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house. REASONS: -core competencies -financial savings -rapid growth -the internet and globalization
feasibility
is the measure of the tangible and intangible benefits of an information system.
Project Scope Statement
links the project to the organization's overall business goals
dependency
logical relationship that exists between project tasks, or between a project task and a milestone.
legal feasibility
measures how well a solution can be implemented within existing legal and contractual obligations
Operational Feasibility
measures how well a solution meets the identified system requirements to solve the problems and take advantage of opportunities
political feasibility
measures how well the solution will be accepted in a given organization
Economic Feasibility
measures the cost-effectiveness of a project
Technical Feasibility
measures the practicality of a technical solution and the availability of technical resources and expertise
schedule feasibility
measures the project time frame to ensure it can be completed on time
prototyping
modern design approach where the designers and system users use an iterative approach to building the system.
rational unified process (RUP) methodology
owned by IBM, provides a framework for breaking down the development of software into four gates
status report
periodic reviews of actual performance versus expected performance
Project Objective
quantifiable criteria that must be met for the project to be considered a success
Project Constraints
specific factors that can limit options, including budget, delivery dates, available skilled resources, and organizational policies
triple constraint: changing one changes all
time, resources, scope (Project Management Institute--> Project Management Body of Knowledge)
kil switch
trigger that enables a project manager to close the project before completion
scrum methodology
uses small teams to produce small pieces of software using a series of "sprints," or 30-day intervals, to achieve an appointed goal.
in-sourcing (in-house development)
uses the professional expertise within an organization to develop and maintain its information technology systems.
offshore outsourcing
using organizations from developing countries to write code and develop systems. in offshore outsourcing the country is geographically far away.
Specific Measurable Agreed Upon Realistic Time Frame
which are SMART Criteria for Successful Objective Creation: Time Frame Specific Realistic Reliable Specialized Technology