Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Modules 9-12

Networking Summative

QuestionAnswer
1. What is the term used to indicate a variation of delay? jitter
2. A network engineer performs a ping test and receives a value that shows the time it takes for a packet to travel from a source to a destination device and return. Which term describes the value? latency
3. What role do network devices play in the IntServ QoS model? Network devices ensure that resources are available before traffic is allowed to be sent by a host through the network.
4. Which device would be classified as a trusted endpoint? IP Phone
5. What is the benefit of deploying Layer 3 QoS marking across an enterprise network? Layer 3 marking can carry the QoS information end-to-end.
6. What is the function of a QoS trust boundary? A trust boundary identifies which devices trust the marking on packets that enter a network.
7. What are two approaches to prevent packet loss due to congestion on an interface? (Choose two.) Drop lower-priority packets. Increase link capacity.
8. What configuration scenario would offer the most protection to SNMP get and set messages? SNMPv3 configured with the auth security level
The network administrator enters these commands into the R1 router: R1# copy running-config tftp Address or name of remote host [ ]? When the router prompts for address or remote host name, what IP address should the administrator enter at prompt? 192.168.11.252
10. The command ntp server 10.1.1.1 is issued on a router. What impact does this command have? synchronizes the system clock with the time source with IP address 10.1.1.1
11. As the network administrator you have been asked to implement EtherChannel on the corporate network. What does this configuration consist of? grouping multiple physical ports to increase bandwidth between two switches
12. What is a definition of a two-tier LAN network design? distribution and core layers collapsed into one tier, and the access layer on a separate tier
13. What are two reasons to create a network baseline? (Choose two.) to identify future abnormal network behavior to determine if the network can deliver the required policies
14. A computer can access devices on the same network but cannot access devices on other networks. What is the probable cause of this problem? The computer has an invalid default gateway address.
15. In which step of gathering symptoms does the network engineer determine if the problem is at the core, distribution, or access layer of the network? Narrow the scope
16. A network administrator is deploying QoS with the ability to provide a special queue for voice traffic so that voice traffic is forwarded before network traffic in other queues. Which queuing method would be the best choice? LLQ
17. What are two characteristics of voice traffic? (Choose two.) Voice traffic latency should not exceed 150 ms. Dropped voice packets are not retransmitted.
18. Which type of network traffic cannot be managed using congestion avoidance tools? UDP
19. When QoS is implemented in a converged network, which two factors can be controlled to improve network performance for real-time traffic? (Choose two.) delay jitter
20. An administrator wants to replace the configuration file on a Cisco router by loading a new configuration file from a TFTP server. What two things does the administrator need to know before performing this task? (Choose two.) name of the configuration file that is stored on the TFTP server TFTP server IP address
21. Refer to the exhibit. Which of the three Cisco IOS images shown will load into RAM? The router selects an image depending on the boot system command in the configuration.
22. Refer to the exhibit. What two types of devices are connected to R1? (Choose two.) switch router
23. What are three functions provided by the syslog service? (Choose three.) to select the type of logging information that is captured to gather logging information for monitoring and troubleshooting to specify the destinations of captured messages
24. What is the function of the MIB element as part of a network management system? to store data about a device
25. What network design would contain the scope of disruptions on a network should a failure occur? the deployment of distribution layer switches in pairs and the division of access layer switch connections between them
26. Which action should be taken when planning for redundancy on a hierarchical network design? add alternate physical paths for data to traverse the network
27. What are two benefits of extending access layer connectivity to users through a wireless medium? (Choose two.) increased flexibility reduced costs
28. What is a basic function of the Cisco Borderless Architecture access layer? provides access to the user
29. Which characteristic would most influence a network design engineer to select a multilayer switch over a Layer 2 switch? ability to build a routing table
30. Refer to the exhibit. Why are routers R1 and R2 not able to establish an OSPF adjacency?​ The serial interfaces are not in the same area.
31. When is the most appropriate time to measure network operations to establish a network performance baseline? at the same time each day across a set period of average working days, so that typical traffic patterns can be established
32. Refer to the exhibit. A user has configured a NIC on the PC as shown but finds that the PC is unable to access the Internet. What is the problem? The default gateway address is incorrect.
A network engineer configured ACL preventing Telnet/HTTP access to HQ web server from guests in Branch LAN. Address of the web server is 192.168.1.10 and guest users are assigned addresses in the 192.168.10.0/24 network. No one can access the HQ servers. The ACL is implicitly denying access to all the servers.
34. Refer to the exhibit. A network administrator has configured OSPFv2 on the two Cisco routers as shown. PC1 is unable to connect to PC2. What should the administrator do first when troubleshooting the OSPFv2 implementation? Test Layer 3 connectivity between the directly connected routers.
35. What type of traffic is described as requiring latency to be no more than 150 milliseconds (ms)? voice
36. A network manager wants to add a time to log messages so that there is record of when the message was generated. What command should the administrator use on a Cisco router? service timestamps log datetime
39. What are two characteristics of the best-effort QoS model? (Choose two.) It does not provide a delivery guarantee for packets. It treats all network packets in the same way.
40. Why is QoS an important issue in a converged network that combines voice, video, and data communications? Voice and video communications are more sensitive to latency.
41. A network administrator configures a router with the command sequence: R1(config)# boot system tftp://c1900-universalk9-mz.SPA.152-4.M3.bin R1(config)# boot system rom What is the effect of the command sequence? The router will load IOS from the TFTP server. If the image fails to load, it will load the IOS image from ROM.
42. Which statement describes SNMP operation? A set request is used by the NMS to change configuration variables in the agent device.
43. Refer to the exhibit. A network administrator issues the show lldp neighbors command on a switch. What are two conclusions that can be drawn? (Choose two.) Dev1 is connected to interface Fa0/5 of S1. Dev2 is a switch.
44. What are the three layers of the switch hierarchical design model? (Choose three.) distribution, access, core
45. Refer to the exhibit. Which devices exist in the failure domain when switch S3 loses power? PC_3 and AP_2
46. A network designer is considering whether to implement a switch block on the company network. What is the primary advantage of deploying a switch block? The failure of a switch block will not impact all end users.
47. Which troubleshooting tool would a network administrator use to check the Layer 2 header of frames that are leaving a particular host? protocol analyzer
48. Refer to the exhibit. R1 and R3 are connected to each other via the local serial 0/0/0 interface. Why are they not forming an adjacency? They are in different subnets
49. What type of traffic is described as not resilient to loss? video
50. A network manager wants lists the contents of flash. What command should the administrator use on a Cisco router? dir
51. Voice packets are being received in a continuous stream by an IP phone, but because of network congestion the delay between each packet varies and is causing broken conversations. What term describes the cause of this condition? jitter
52. A user is unable to reach the website when typing in a web browser, but can reach the same site by typing What is the issue? DNS
53. What type of traffic is described as tending to be unpredictable, inconsistent, and bursty? video
54. A network manager wants to determine the size of the Cisco IOS image file on the networking device. What command should the administrator use on a Cisco router? show flash:0
55. What is the principle that is applied when a network technician is troubleshooting a network fault by using the divide-and-conquer method? Once it is verified that components in a particular layer are functioning properly, it can then be assumed that components in the layers below it are also functional.
56. Which queuing algorithm has only a single queue and treats all packets equally? FIFO
57. What type of traffic is described as traffic that requires at least 30 Kbps of bandwidth? voice
58. What type of traffic is described as being able to tolerate a certain amount of latency, jitter, and loss without any noticeable effects? voice
59. A network manager wants to view the amount of available and free memory, the type of file system, and its permissions. What command should the administrator use on a Cisco router? show file systems
60. What type of traffic is described as requiring latency to be no more than 400 milliseconds (ms)? video
61. What type of traffic is described as consisting of traffic that requires a higher priority if interactive? data
62. A network manager wants to configure the router to load a new image from flash during bootup. What command should the administrator use on a Cisco router? boot system
63. What type of traffic is described as predictable and smooth? voice
64. A network manager wants to ensure that the device will ignore the startup config file during startup and bypass the required passwords. What command should the administrator use on a Cisco router? confreg 0x2142
65. What type of traffic is described as having a high volume of data per packet? video
66. A network manager wants to backup the running configuration to a file server. What command should the administrator use on a Cisco router? copy running-config tftp
67. What type of traffic is described as consisting of traffic that gets a lower priority if it is not mission-critical? data
Created by: user-1838864
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards