Business Driven Technology Final Exam Study Set

Ace your homework & exams now with Quizwiz!

discovery prototyping

builds a small-scale representation or working model of the system to ensure it meets the user and business requirements.

advantages of prototyping

-encourages user participation -evolve through iteration, which better supports change. -have a physical quality allowing users to see, touch, and experience system as developed -tend to detect errors earlier -accelerates the phases of the SDLC, helping to ensure success.

outsourcing challenges

-length of contract -threat to competitive advantage -loss of confidentiality

primary forms of agile methodologies

-rapid prototyping or rapid application development methodology. -extreme programming methodology. -rational unified process (RUP) methodology. -scrum methodology

Project Plan

A formal, approved document that manages and controls project execution Well-Defined plan: -easy to read and understand -Communicated to all key participants -Appropriate to the project's size, complexity, and criticality -Prepared by the team, rather than by the individual project manager

The router will load IOS from the TFTP server. If the image fails to load, it will load the IOS image from ROM.

A network administrator configures a router with the command sequence: R1(config)# boot system tftp://c1900-universalk9-mz.SPA.152-4.M3.bin R1(config)# boot system rom What is the effect of the command sequence? On next reboot, the router will load the IOS image from ROM. The router will copy the IOS image from the TFTP server and then reboot the system. The router will load IOS from the TFTP server. If the image fails to load, it will load the IOS image from ROM. The router will search and load a valid IOS image in the sequence of flash, TFTP, and ROM.

The syslog client will send to the syslog server any event message that has a severity level of 4 and lower.​

A network administrator has issued the logging trap 4 global configuration mode command. What is the result of this command? After four events, the syslog client will send an event message to the syslog server. The syslog client will send to the syslog server any event message that has a severity level of 4 and higher. The syslog client will send to the syslog server any event message that has a severity level of 4 and lower.​ The syslog client will send to the syslog server event messages with an identification trap level of only 4.​

show flash0:

A network engineer is upgrading the Cisco IOS image on a 2900 series ISR. What command could the engineer use to verify the total amount of flash memory as well as how much flash memory is currently available? show flash0: show version show interfaces show startup-config

The network administrator wants to verify Layer 2 connectivity.

A ping fails when performed from router R1 to directly connected router R2. The network administrator then proceeds to issue the show cdp neighbors command. Why would the network administrator issue this command if the ping failed between the two routers? The network administrator suspects a virus because the ping command did not work. The network administrator wants to verify Layer 2 connectivity. The network administrator wants to verify the IP address configured on router R2. The network administrator wants to determine if connectivity can be established from a non-directly connected network.

agile

A(n) ________ methodology aims for customer satisfaction through early and continuous delivery of useful software components developed by an iterative process using the bare minimum requirements. waterfall pilot discovery agile

methodology

A(n) ____________ is a set of policies, procedures, standards, processes, practices, tools, techniques, and tasks that people apply to technical and management challenges. methodology exception implementation report

Project management office (PMO)

An internal department that oversees all organizational projects

analysis of project risks

An organization must identify what it wants to do and how it is going to do it. What does the "how" part of this question focus on? justification of the project definition of the project analysis of project risks expected results of the project

Project deliverable

Any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project

IPBase

Beginning with the Cisco IOS Software Release 15.0, which license is a prerequisite for installing additional technology pack licenses? IPBase DATA UC SEC

markup

Extensible ________ Language (XML), a markup language for documents, containing structured information. coupling markup loose

Unclear or missing business requirements Skipped SDLC phases Changing technology The cost of finding errors Balance of the triple constraints

Five primary reasons a project fails: Balance of the triple constraints Changing technology Misunderstanding of tangible benefits Unclear or missing business requirements Too much user participation The cost of finding errors Skipped SDLC phases

Expansion & rapid growth Gain core competencies The internet and globalization Improve financial savings

Four common reasons companies outsource: Expansion and rapid growth Slow operations and production Gain core competencies The Internet and globalization Hire more expensive workforce Improve financial savings

DATA Security Unified Communications

In addition to IPBase, what are the three technology packs that are shipped within the universal Cisco IOS Software Release 15 image? (Choose three.) Advanced IP Services Advanced Enterprise Services DATA Security SP Services Unified Communications

Project stakeholder

Individuals and organizations actively involved in the project or whose interests might be affected as a result of project execution or project completion

RAD methodology XP methodology RUP methodology Srum methodology

List the four primary forms of agile methodologies:

True

Managers need to continuously monitor projects to measure their success. If a project is failing, the manager must cancel the project and save the company any further project costs. Canceling a project is not necessarily a failure as much as it is successful resource management as it frees resources that can be used on other projects that are more valuable to the firm. True or false:

router RAM

Refer to the exhibit. From what location have the syslog messages been retrieved? syslog server syslog client router RAM router NVRAM

Specifying feature set universalk9 Minor release number 1 Where the images runs and if he file is compressed mz platform on which the image runs c1900 Maintenance release and rebuild number M4 new feature release number 4 file extension .bin Major release number 15

Refer to the exhibit. Match the components of the IOS image name to their description. (Not all options are used.) c1900-universalk9-mz.SPA.151-4.M4.bin Specifying the feature set minor release number where the image runs and if the file is compressed platform on which the image runs authentication type maintenance release and rebuild number new feature release number file extension major release number

Router R1 is the master, and R2 is the client. The IP address of R1 is 192.168.1.2.

Refer to the exhibit. Routers R1 and R2 are connected via a serial link. One router is configured as the NTP master, and the other is an NTP client. Which two pieces of information can be obtained from the partial output of the show ntp associations detail command on R2? (Choose two.) Both routers are configured to use NTPv2. Router R1 is the master, and R2 is the client. Router R2 is the master, and R1 is the client. The IP address of R1 is 192.168.1.2. The IP address of R2 is 192.168.1.2

the time when the syslog message was issued

Refer to the exhibit. What does the number 17:46:26.143 represent? the time passed since the syslog server has been started the time when the syslog message was issued the time passed since the interfaces have been up the time on the router when the show logging command was issued

This message is a level 5 notification message. This message indicates that service timestamps have been configured.

Refer to the exhibit. Which two conclusions can be drawn from the syslog message that was generated by the router? (Choose two.) This message resulted from an unusual error requiring reconfiguration of the interface. This message indicates that the interface should be replaced. This message is a level 5 notification message. This message indicates that service timestamps have been configured. This message indicates that the interface changed state five times.

Project milestone

Represents key dates when a certain group of activities must be performed

Offshore outsourcing Nearshore outsourcing Onshore outsourcing

Select the three forms of outsourcing: Offshore outsourcing Nearshore outsourcing In-house outsourcing Iterative outsourcing Onshore outsourcing

waterfall

The __________ methodology is a sequence of phases in which the output of each phase becomes the input for the next. scrum RAD waterfall agile

critical

The __________ path is the series of activities that determine the earliest time by which the project can be completed. Gantt SMART critical PERT

RUP

The ___________ (use acronym) methodology, owned by IBM, provides a framework for breaking down the development of software into four "gates. Waterfall XP RUP

Project Management

The application of knowledge, skills, tools, and techniques to project activities to meet project requirements

synchronizes the system clock with the time source with IP address 10.1.1.1

The command ntp server 10.1.1.1 is issued on a router. What impact does this command have? determines which server to send system log files to identifies the server on which to store backup configurations ensures that all logging will have a time stamp associated with it synchronizes the system clock with the time source with IP address 10.1.1.1

Executive sponsor

The person or group who provides the financial resources for the project

RAD methodology Rapid prototyping

Two terms that emphasize extensive user involvement in the rapid and evolutionary construction of working prototypes of a system, to accelerate the systems development process. RAD methodology Discovery prototyping Rapid prototyping 4GL prototyping

web services

What are application programming interfaces (API) that can be accessed over a network, such as the Internet, and executed on a remote system hosting the requested services? web services loose coupling interoperability

economic feasibility operational feasibility political feasibility legal feasibility

What are forms of feasibility study? (Check all that apply) economic feasibility operational feasibility phased feasibility analysis feasibility political feasibility legal feasibility

Gate one: Inception Gate two: Elaboration Gate three: Construction Gate four: Transition

What are the four gates of RUP (rational unified process) methodology? Gate two: Extreme Gate three: Construction Gate one: Inception Gate one: Implementation Gate three: Conversion Gate four: Transition Gate four: Tangible Gate two: Elaboration

XP methodology

What breaks a project into four phases, and developers cannot continue to the next phase until the previous phase is complete? XP methodology Scrum methodology Waterfall methodology

SPA

What code in the Cisco IOS 15 image filename c1900-universalk9-mz.SPA.153-3.M.bin indicates that the file is digitally signed by Cisco? SPA universalk9 M mz

RAD methodology

What emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system, to accelerate the systems development process? XP methodology RUP methodology Scrum methodology RAD methodology

Service-oriented architecture (SOA)

What is a business-driven enterprise architecture that supports integrating a business as linked, repeatable activities, tasks, or services? scrum methodology service-oriented architecture systems development life cycle object-oriented programming language

a temporary activity undertaken to create a unique product, service, or result

What is a project? a temporary activity undertaken to create a unique product, service, or result the application of knowledge, skills, tools, and techniques to project activities in order to meet or exceed stakeholder needs and expectations from a project any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project represent key dates when a certain group of activities must be performed

15

What is the major release number in the IOS image name c1900-universalk9-mz.SPA.152-3.T.bin? 2 3 15 52 1900

console line

What is used as the default event logging destination for Cisco routers and switches? terminal line syslog server console line workstation

It is an IOS version that, at the request of some countries, removes any strong cryptographic functionality.

What statement describes a Cisco IOS image with the "universalk9_npe" designation for Cisco ISR G2 routers? It is an IOS version that can only be used in the United States of America. It is an IOS version that provides only the IPBase feature set. It is an IOS version that offers all of the Cisco IOS Software feature sets. It is an IOS version that, at the request of some countries, removes any strong cryptographic functionality.

Product Activation Key

When a customer purchases a Cisco IOS 15.0 software package, what serves as the receipt for that customer and is used to obtain the license as well? Software Claim Certificate End User License Agreement Unique Device Identifier Product Activation Key

license accept end user agreement

Which command is used to configure a one-time acceptance of the EULA for all Cisco IOS software packages and features? license save show license license boot module module-name license accept end user agreement

show license udi

Which command would a network engineer use to find the unique device identifier of a Cisco router? show version show license udi show running-configuration license install stored-location-url

rational

Which methodology provides a framework for breaking down the development of software into four gates? rational extreme RAD RUP

syslog

Which protocol or service allows network administrators to receive system messages that are provided by network devices? syslog NTP SNMP NetFlow

CDP can be disabled globally or on a specific interface​.

Which statement is true about CDP on a Cisco device?​ The show cdp neighbor detail command will reveal the IP address of a neighbor only if there is Layer 3 connectivity​. To disable CDP globally, the no cdp enable command in interface configuration mode must be used. CDP can be disabled globally or on a specific interface​. Because it runs at the data link layer​, the CDP protocol can only be implemented in switches.

debugging

Which syslog message type is accessible only to an administrator and only via the Cisco CLI? errors debugging emergency alerts

DATA Security Unified Communications

Which three software packages are available for Cisco IOS Release 15.0? DATA IPVoice Security Enterprise Services Unified Communications Advanced IP Services

Verify connectivity between the router and TFTP server using the ping command. Verify that there is enough flash memory for the new Cisco IOS image using the show flash command.

Which two conditions should the network administrator verify before attempting to upgrade a Cisco IOS image using a TFTP server? (Choose two.) Verify the name of the TFTP server using the show hosts command. Verify that the TFTP server is running using the tftpdnld command. Verify that the checksum for the image is valid using the show version command. Verify connectivity between the router and TFTP server using the ping command. Verify that there is enough flash memory for the new Cisco IOS image using the show flash command.

NTP servers at stratum 1 are directly connected to an authoritative time source. NTP servers ensure an accurate time stamp on logging and debugging information.

Which two statements are true about NTP servers in an enterprise network? (Choose two.) There can only be one NTP server on an enterprise network. All NTP servers synchronize directly to a stratum 1 time source. NTP servers at stratum 1 are directly connected to an authoritative time source. NTP servers ensure an accurate time stamp on logging and debugging information. NTP servers control the mean time between failures (MTBF) for key network devices.

to display device ID and other information about directly connected Cisco devices

Why would a network administrator issue the show cdp neigbors command on a router? to display device ID and other information about directly connected Cisco devices to display router ID and other information about OSPF neighbors to display line status and other information about directly connected Cisco devices to display routing table and other information about directly connected Cisco devices

Service

_______-oriented architecture (SOA) is a business-driven enterprise architecture that supports integrating a business as linked, repeatable activities, tasks, or services. Service Scrum Software

discovery

________ prototyping builds a small-scale representation or working model of the system to ensure it meets the user and business requirements. Development Discovery Legacy Iterative

Iterative

___________ development consists of a series of tiny projects. It has become the foundation of multiple agile methodologies. Iterative Prototyping Integration Implementation

prototyping

___________ is a modern design approach where the designers and system users use an iterative approach to building the system. Engineering Requirements Prototyping Implementation

waterfall methodology

a sequence of phases in which the output of each phase becomes the input for the next.

agile methodology

aims for customer satisfaction through early and continuous delivery of useful software components developed by an interactive process using the bare minimum requirements. it is fast and efficient, with lower costs and fewer features.

intangible benefits

are difficult to quantify or measure -improved decision making -improved community service -improved morale -improved goodwill

tangible benefits

are easy to quantify and typically measured to determine the success or failure of a project. -decreased expenses -decreased processing errors -decreased response time -increased quantity or sales -increased quality

extreme programming (XP) methodology

breaks a project into four phases, and developers cannot continue to next phase until the previous phase is complete. 1. planning 2. designing 3. coding 4. testing

iterative development

consists of a series of tiny projects.

nearshore outsourcing

contracting an outsourcing arrangement with a company in a nearby country. often this country will share a border with the native country

responsibility matrix

defines all project roles and indicates what responsibilities are associated with each role

Communication plan

defines the how, what, when, and who regarding the flow of project information to stakeholders and is key for managing expectations

project requirements document

defines the specifications for product/output of the project and is key for managing expectations, controlling scope, and completing other planning efforts

rapid application development (RAD) methodology

emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system, to accelerate the systems development process.

onshore outsourcing

engaging another company within the same country for services

critical path

estimates the shortest path through the project ensuring all critical tasks are completed from start to finish.

Project assumption

factors considered to be true, real, or certain without proof or demonstration

PERT (Program Evaluation and Review Technique) Chart

is a graphical network model that depicts a project's task and the relationships between them. (dependency and critical path)

methodology

is a set of policies, procedures, standards, processes, practices, tools, techniques, and task that people apply to technical and management challenges.

Gantt Chart

is a simple bar chart that lists project tasks vertically against the project's time frame, listed horizontally.

out-sourcing

is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house. REASONS: -core competencies -financial savings -rapid growth -the internet and globalization

feasibility

is the measure of the tangible and intangible benefits of an information system.

Project Scope Statement

links the project to the organization's overall business goals

dependency

logical relationship that exists between project tasks, or between a project task and a milestone.

legal feasibility

measures how well a solution can be implemented within existing legal and contractual obligations

Operational Feasibility

measures how well a solution meets the identified system requirements to solve the problems and take advantage of opportunities

political feasibility

measures how well the solution will be accepted in a given organization

Economic Feasibility

measures the cost-effectiveness of a project

Technical Feasibility

measures the practicality of a technical solution and the availability of technical resources and expertise

schedule feasibility

measures the project time frame to ensure it can be completed on time

prototyping

modern design approach where the designers and system users use an iterative approach to building the system.

rational unified process (RUP) methodology

owned by IBM, provides a framework for breaking down the development of software into four gates

status report

periodic reviews of actual performance versus expected performance

Project Objective

quantifiable criteria that must be met for the project to be considered a success

Project Constraints

specific factors that can limit options, including budget, delivery dates, available skilled resources, and organizational policies

triple constraint: changing one changes all

time, resources, scope (Project Management Institute--> Project Management Body of Knowledge)

kil switch

trigger that enables a project manager to close the project before completion

scrum methodology

uses small teams to produce small pieces of software using a series of "sprints," or 30-day intervals, to achieve an appointed goal.

in-sourcing (in-house development)

uses the professional expertise within an organization to develop and maintain its information technology systems.

offshore outsourcing

using organizations from developing countries to write code and develop systems. in offshore outsourcing the country is geographically far away.

Specific Measurable Agreed Upon Realistic Time Frame

which are SMART Criteria for Successful Objective Creation: Time Frame Specific Realistic Reliable Specialized Technology


Related study sets

3.12.6 Practice Questions Video, 3.11.5 Expansion Cards Practice Questions, BIOS/UEFI 3.10.9 Practice Questions, 3.9.6 Practice Questions Troubleshooting Memory, 3.8.8 Practice Questions Memory Installation, 3.8.8 Practice Questions Memory Installation

View Set

Art Appreciation Final Study Guide

View Set

Foundations of Business Chapter 7

View Set

Introduction to Advertising Lessons 1-6 Quizzes and Midterm Exam

View Set

Chapter 24 study guide Automotive 145

View Set

Learning System RN-Communication

View Set