Quiz 4- semester 3

Ace your homework & exams now with Quizwiz!

An administrator wants to replace the configuration file on a Cisco router by loading a new configuration file from a TFTP server. What two things does the administrator need to know before performing this task?

-TFTP server IP address -name of the configuration file that is stored on the TFTP server

Which statement describes SNMP operation?

A set request is used by the NMS to change configuration variables in the agent device.

What is the function of a QoS trust boundary?

A trust boundary identifies which devices trust the marking on packets that enter a network.

A user is unable to reach the website when typing http://www.cisco.com in a web browser, but can reach the same site by typing http://72.163.4.161 . What is the issue?

DNS

Which queuing algorithm has only a single queue and treats all packets equally?

FIFO

What are two approaches to prevent packet loss due to congestion on an interface?

Increase link capacity. Drop lower-priority packets.

What are two characteristics of the best-effort QoS model

It treats all network packets in the same way. It does not provide a delivery guarantee for packets.

What is the benefit of deploying Layer 3 QoS marking across an enterprise network?

Layer 3 marking can carry the QoS information end-to-end.

In which step of gathering symptoms does the network engineer determine if the problem is at the core, distribution, or access layer of the network?

Narrow the scope.

What is the principle that is applied when a network technician is troubleshooting a network fault by using the divide-and-conquer method?

Once it is verified that components in a particular layer are functioning properly, it can then be assumed that components in the layers below it are also functional.

What configuration scenario would offer the most protection to SNMP get and set messages?

SNMPv3 configured with the auth security level

Refer to the exhibit. A network administrator has configured OSPFv2 on the two Cisco routers as shown. PC1 is unable to connect to PC2. What should the administrator do first when troubleshooting the OSPFv2 implementation?

Test Layer 3 connectivity between the directly connected routers.

A computer can access devices on the same network but cannot access devices on other networks. What is the probable cause of this problem?

The computer has an invalid default gateway address.

A network designer is considering whether to implement a switch block on the company network. What is the primary advantage of deploying a switch block?

The failure of a switch block will not impact all end users.

Refer to the exhibit. Which of the three Cisco IOS images shown will load into RAM?

The router selects an image depending on the boot system command in the configuration.

A network administrator configures a router with the command sequence: R1(config)# boot system tftp://c1900-universalk9-mz.SPA.152-4.M3.bin R1(config)# boot system rom What is the effect of the command sequence?

The router will load IOS from the TFTP server. If the image fails to load, it will load the IOS image from ROM.

Refer to the exhibit. R1 and R3 are connected to each other via the local serial 0/0/0 interface. Why are they not forming an adjacency?

They are in different subnets.

Which type of network traffic cannot be managed using congestion avoidance tools?

UDP

What are two characteristics of voice traffic?

Voice traffic latency should not exceed 150 ms. Dropped voice packets are not retransmitted.

Distribution Layer

[#] implements network access policy [#] establishes Layer 3 routing boundaries

Core Layer

[*] provides high-speed backbone connectivity [*] functions as an aggregator for all the campus blocks

Access Layer

[+] represents the network edge [+] provides network access to the user

Which characteristic would most influence a network design engineer to select a multilayer switch over a Layer 2 switch?

ability to build a routing table

Which action should be taken when planning for redundancy on a hierarchical network design?

add alternate physical paths for data to traverse the network

When is the most appropriate time to measure network operations to establish a network performance baseline?

at the same time each day across a set period of average working days, so that typical traffic patterns can be established

What type of traffic is described as consisting of traffic that gets a lower priority if it is not mission-critical?

data

What is a definition of a two-tier LAN network design?

distribution and core layers collapsed into one tier, and the access layer on a separate tier

As the network administrator you have been asked to implement EtherChannel on the corporate network. What does this configuration consist of?

grouping multiple physical ports to increase bandwidth between two switches

What are two benefits of extending access layer connectivity to users through a wireless medium?

increased flexibility reduced costs

Voice packets are being received in a continuous stream by an IP phone, but because of network congestion the delay between each packet varies and is causing broken conversations. What term describes the cause of this condition?

jitter

When QoS is implemented in a converged network, which two factors can be controlled to improve network performance for real-time traffic?

jitter delay

Which troubleshooting tool would a network administrator use to check the Layer 2 header of frames that are leaving a particular host?

protocol analyzer

What is a basic function of the Cisco Borderless Architecture access layer?

provides access to the user

A network manager wants to add a time to log messages so that there is record of when the message was generated. What command should the administrator use on a Cisco router?

service timestamps log datetime

A network manager wants to view the amount of available and free memory, the type of file system, and its permissions. What command should the administrator use on a Cisco router?

show file systems

The command ntp server 10.1.1.1 is issued on a router. What impact does this command have?

synchronizes the system clock with the time source with IP address 10.1.1.1

What network design would contain the scope of disruptions on a network should a failure occur?

the deployment of distribution layer switches in pairs and the division of access layer switch connections between them

What are three functions provided by the syslog service?

to gather logging information for monitoring and troubleshooting to select the type of logging information that is captured to specify the destinations of captured messages

What are two reasons to create a network baseline?

to identify future abnormal network behavior to determine if the network can deliver the required policies

What is the function of the MIB element as part of a network management system?

to store data about a device

What type of traffic is described as being able to tolerate a certain amount of latency, jitter, and loss without any noticeable effects?

voice


Related study sets

UNDERSTANDING OUR ENVIRONMENT CH1

View Set

Human relations management and behavioral science

View Set

1M-CONCEPTOF MAN:BIO-PSYCHO-SOCIAL ANDSPIRITUAL BEING

View Set

mkg 310 chapter 2 review questions

View Set

Exam 5 Vascular Prep U Questions Chapter 30

View Set

Chapter 43: Stress and Adaptation

View Set

Lesson 2 Pregnancy Elsevier Questions

View Set