Quiz 4- semester 3
An administrator wants to replace the configuration file on a Cisco router by loading a new configuration file from a TFTP server. What two things does the administrator need to know before performing this task?
-TFTP server IP address -name of the configuration file that is stored on the TFTP server
Which statement describes SNMP operation?
A set request is used by the NMS to change configuration variables in the agent device.
What is the function of a QoS trust boundary?
A trust boundary identifies which devices trust the marking on packets that enter a network.
A user is unable to reach the website when typing http://www.cisco.com in a web browser, but can reach the same site by typing http://72.163.4.161 . What is the issue?
DNS
Which queuing algorithm has only a single queue and treats all packets equally?
FIFO
What are two approaches to prevent packet loss due to congestion on an interface?
Increase link capacity. Drop lower-priority packets.
What are two characteristics of the best-effort QoS model
It treats all network packets in the same way. It does not provide a delivery guarantee for packets.
What is the benefit of deploying Layer 3 QoS marking across an enterprise network?
Layer 3 marking can carry the QoS information end-to-end.
In which step of gathering symptoms does the network engineer determine if the problem is at the core, distribution, or access layer of the network?
Narrow the scope.
What is the principle that is applied when a network technician is troubleshooting a network fault by using the divide-and-conquer method?
Once it is verified that components in a particular layer are functioning properly, it can then be assumed that components in the layers below it are also functional.
What configuration scenario would offer the most protection to SNMP get and set messages?
SNMPv3 configured with the auth security level
Refer to the exhibit. A network administrator has configured OSPFv2 on the two Cisco routers as shown. PC1 is unable to connect to PC2. What should the administrator do first when troubleshooting the OSPFv2 implementation?
Test Layer 3 connectivity between the directly connected routers.
A computer can access devices on the same network but cannot access devices on other networks. What is the probable cause of this problem?
The computer has an invalid default gateway address.
A network designer is considering whether to implement a switch block on the company network. What is the primary advantage of deploying a switch block?
The failure of a switch block will not impact all end users.
Refer to the exhibit. Which of the three Cisco IOS images shown will load into RAM?
The router selects an image depending on the boot system command in the configuration.
A network administrator configures a router with the command sequence: R1(config)# boot system tftp://c1900-universalk9-mz.SPA.152-4.M3.bin R1(config)# boot system rom What is the effect of the command sequence?
The router will load IOS from the TFTP server. If the image fails to load, it will load the IOS image from ROM.
Refer to the exhibit. R1 and R3 are connected to each other via the local serial 0/0/0 interface. Why are they not forming an adjacency?
They are in different subnets.
Which type of network traffic cannot be managed using congestion avoidance tools?
UDP
What are two characteristics of voice traffic?
Voice traffic latency should not exceed 150 ms. Dropped voice packets are not retransmitted.
Distribution Layer
[#] implements network access policy [#] establishes Layer 3 routing boundaries
Core Layer
[*] provides high-speed backbone connectivity [*] functions as an aggregator for all the campus blocks
Access Layer
[+] represents the network edge [+] provides network access to the user
Which characteristic would most influence a network design engineer to select a multilayer switch over a Layer 2 switch?
ability to build a routing table
Which action should be taken when planning for redundancy on a hierarchical network design?
add alternate physical paths for data to traverse the network
When is the most appropriate time to measure network operations to establish a network performance baseline?
at the same time each day across a set period of average working days, so that typical traffic patterns can be established
What type of traffic is described as consisting of traffic that gets a lower priority if it is not mission-critical?
data
What is a definition of a two-tier LAN network design?
distribution and core layers collapsed into one tier, and the access layer on a separate tier
As the network administrator you have been asked to implement EtherChannel on the corporate network. What does this configuration consist of?
grouping multiple physical ports to increase bandwidth between two switches
What are two benefits of extending access layer connectivity to users through a wireless medium?
increased flexibility reduced costs
Voice packets are being received in a continuous stream by an IP phone, but because of network congestion the delay between each packet varies and is causing broken conversations. What term describes the cause of this condition?
jitter
When QoS is implemented in a converged network, which two factors can be controlled to improve network performance for real-time traffic?
jitter delay
Which troubleshooting tool would a network administrator use to check the Layer 2 header of frames that are leaving a particular host?
protocol analyzer
What is a basic function of the Cisco Borderless Architecture access layer?
provides access to the user
A network manager wants to add a time to log messages so that there is record of when the message was generated. What command should the administrator use on a Cisco router?
service timestamps log datetime
A network manager wants to view the amount of available and free memory, the type of file system, and its permissions. What command should the administrator use on a Cisco router?
show file systems
The command ntp server 10.1.1.1 is issued on a router. What impact does this command have?
synchronizes the system clock with the time source with IP address 10.1.1.1
What network design would contain the scope of disruptions on a network should a failure occur?
the deployment of distribution layer switches in pairs and the division of access layer switch connections between them
What are three functions provided by the syslog service?
to gather logging information for monitoring and troubleshooting to select the type of logging information that is captured to specify the destinations of captured messages
What are two reasons to create a network baseline?
to identify future abnormal network behavior to determine if the network can deliver the required policies
What is the function of the MIB element as part of a network management system?
to store data about a device
What type of traffic is described as being able to tolerate a certain amount of latency, jitter, and loss without any noticeable effects?
voice