cisco chapter 17 final
What is necessary to plan and use when implementing a network?
IP addressing scheme
What are two forms of software programs or processes that provide access to the network? (Choose two.)
application layer services and network applications
Which elements are required to scale to a larger network? (Choose two.)
budget and network documentation
Which factor must be considered when selecting network devices?
cost
What Windows 10 tool is useful to determine which applications are using network services on a host?
data usage
A technician is troubleshooting a network problem. After troubleshooting, the technician concludes that a switch should be replaced. What should the technician do next?
escalate the trouble ticket to the manager to approve the change
A technician is using the debug ip icmp privileged EXEC command to capture live router output. Which commands would stop this debug command on a Cisco router? (Choose two.)
no debug IP icmp and unbug all
What is required to classify traffic according to priority?
quality of service QoS
What is required to maintain a high degree of reliability and eliminate single points of failure?
redundancy
Which two network protocols are used to establish a remote access network connection to a device? (Choose two.)
secure shell SSH and telnet
A technician has established a remote connection to router R1 to observe debug output. The technician enters the debug ip icmp command then pings a remote destination. However, no output is displayed. Which command would the technician have to enter to display log messages on a remote connection?
terminal monitor
A technician is troubleshooting a network problem and has just established a theory of probable causes. What would be the next step in the troubleshooting process?
test the theory to determine cause
Which statement correctly relates to a small network?
the majority of businesses are small
Which software installed on key hosts can reveal the types of network traffic flowing through the network?
wireshark