click below
click below
Normal Size Small Size show me how
Modules 9-12
Networking Summative
| Question | Answer |
|---|---|
| 1. What is the term used to indicate a variation of delay? | jitter |
| 2. A network engineer performs a ping test and receives a value that shows the time it takes for a packet to travel from a source to a destination device and return. Which term describes the value? | latency |
| 3. What role do network devices play in the IntServ QoS model? | Network devices ensure that resources are available before traffic is allowed to be sent by a host through the network. |
| 4. Which device would be classified as a trusted endpoint? | IP Phone |
| 5. What is the benefit of deploying Layer 3 QoS marking across an enterprise network? | Layer 3 marking can carry the QoS information end-to-end. |
| 6. What is the function of a QoS trust boundary? | A trust boundary identifies which devices trust the marking on packets that enter a network. |
| 7. What are two approaches to prevent packet loss due to congestion on an interface? (Choose two.) | Drop lower-priority packets. Increase link capacity. |
| 8. What configuration scenario would offer the most protection to SNMP get and set messages? | SNMPv3 configured with the auth security level |
| The network administrator enters these commands into the R1 router: R1# copy running-config tftp Address or name of remote host [ ]? When the router prompts for address or remote host name, what IP address should the administrator enter at prompt? | 192.168.11.252 |
| 10. The command ntp server 10.1.1.1 is issued on a router. What impact does this command have? | synchronizes the system clock with the time source with IP address 10.1.1.1 |
| 11. As the network administrator you have been asked to implement EtherChannel on the corporate network. What does this configuration consist of? | grouping multiple physical ports to increase bandwidth between two switches |
| 12. What is a definition of a two-tier LAN network design? | distribution and core layers collapsed into one tier, and the access layer on a separate tier |
| 13. What are two reasons to create a network baseline? (Choose two.) | to identify future abnormal network behavior to determine if the network can deliver the required policies |
| 14. A computer can access devices on the same network but cannot access devices on other networks. What is the probable cause of this problem? | The computer has an invalid default gateway address. |
| 15. In which step of gathering symptoms does the network engineer determine if the problem is at the core, distribution, or access layer of the network? | Narrow the scope |
| 16. A network administrator is deploying QoS with the ability to provide a special queue for voice traffic so that voice traffic is forwarded before network traffic in other queues. Which queuing method would be the best choice? | LLQ |
| 17. What are two characteristics of voice traffic? (Choose two.) | Voice traffic latency should not exceed 150 ms. Dropped voice packets are not retransmitted. |
| 18. Which type of network traffic cannot be managed using congestion avoidance tools? | UDP |
| 19. When QoS is implemented in a converged network, which two factors can be controlled to improve network performance for real-time traffic? (Choose two.) | delay jitter |
| 20. An administrator wants to replace the configuration file on a Cisco router by loading a new configuration file from a TFTP server. What two things does the administrator need to know before performing this task? (Choose two.) | name of the configuration file that is stored on the TFTP server TFTP server IP address |
| 21. Refer to the exhibit. Which of the three Cisco IOS images shown will load into RAM? | The router selects an image depending on the boot system command in the configuration. |
| 22. Refer to the exhibit. What two types of devices are connected to R1? (Choose two.) | switch router |
| 23. What are three functions provided by the syslog service? (Choose three.) | to select the type of logging information that is captured to gather logging information for monitoring and troubleshooting to specify the destinations of captured messages |
| 24. What is the function of the MIB element as part of a network management system? | to store data about a device |
| 25. What network design would contain the scope of disruptions on a network should a failure occur? | the deployment of distribution layer switches in pairs and the division of access layer switch connections between them |
| 26. Which action should be taken when planning for redundancy on a hierarchical network design? | add alternate physical paths for data to traverse the network |
| 27. What are two benefits of extending access layer connectivity to users through a wireless medium? (Choose two.) | increased flexibility reduced costs |
| 28. What is a basic function of the Cisco Borderless Architecture access layer? | provides access to the user |
| 29. Which characteristic would most influence a network design engineer to select a multilayer switch over a Layer 2 switch? | ability to build a routing table |
| 30. Refer to the exhibit. Why are routers R1 and R2 not able to establish an OSPF adjacency? | The serial interfaces are not in the same area. |
| 31. When is the most appropriate time to measure network operations to establish a network performance baseline? | at the same time each day across a set period of average working days, so that typical traffic patterns can be established |
| 32. Refer to the exhibit. A user has configured a NIC on the PC as shown but finds that the PC is unable to access the Internet. What is the problem? | The default gateway address is incorrect. |
| A network engineer configured ACL preventing Telnet/HTTP access to HQ web server from guests in Branch LAN. Address of the web server is 192.168.1.10 and guest users are assigned addresses in the 192.168.10.0/24 network. No one can access the HQ servers. | The ACL is implicitly denying access to all the servers. |
| 34. Refer to the exhibit. A network administrator has configured OSPFv2 on the two Cisco routers as shown. PC1 is unable to connect to PC2. What should the administrator do first when troubleshooting the OSPFv2 implementation? | Test Layer 3 connectivity between the directly connected routers. |
| 35. What type of traffic is described as requiring latency to be no more than 150 milliseconds (ms)? | voice |
| 36. A network manager wants to add a time to log messages so that there is record of when the message was generated. What command should the administrator use on a Cisco router? | service timestamps log datetime |
| 39. What are two characteristics of the best-effort QoS model? (Choose two.) | It does not provide a delivery guarantee for packets. It treats all network packets in the same way. |
| 40. Why is QoS an important issue in a converged network that combines voice, video, and data communications? | Voice and video communications are more sensitive to latency. |
| 41. A network administrator configures a router with the command sequence: R1(config)# boot system tftp://c1900-universalk9-mz.SPA.152-4.M3.bin R1(config)# boot system rom What is the effect of the command sequence? | The router will load IOS from the TFTP server. If the image fails to load, it will load the IOS image from ROM. |
| 42. Which statement describes SNMP operation? | A set request is used by the NMS to change configuration variables in the agent device. |
| 43. Refer to the exhibit. A network administrator issues the show lldp neighbors command on a switch. What are two conclusions that can be drawn? (Choose two.) | Dev1 is connected to interface Fa0/5 of S1. Dev2 is a switch. |
| 44. What are the three layers of the switch hierarchical design model? (Choose three.) | distribution, access, core |
| 45. Refer to the exhibit. Which devices exist in the failure domain when switch S3 loses power? | PC_3 and AP_2 |
| 46. A network designer is considering whether to implement a switch block on the company network. What is the primary advantage of deploying a switch block? | The failure of a switch block will not impact all end users. |
| 47. Which troubleshooting tool would a network administrator use to check the Layer 2 header of frames that are leaving a particular host? | protocol analyzer |
| 48. Refer to the exhibit. R1 and R3 are connected to each other via the local serial 0/0/0 interface. Why are they not forming an adjacency? | They are in different subnets |
| 49. What type of traffic is described as not resilient to loss? | video |
| 50. A network manager wants lists the contents of flash. What command should the administrator use on a Cisco router? | dir |
| 51. Voice packets are being received in a continuous stream by an IP phone, but because of network congestion the delay between each packet varies and is causing broken conversations. What term describes the cause of this condition? | jitter |
| 52. A user is unable to reach the website when typing in a web browser, but can reach the same site by typing What is the issue? | DNS |
| 53. What type of traffic is described as tending to be unpredictable, inconsistent, and bursty? | video |
| 54. A network manager wants to determine the size of the Cisco IOS image file on the networking device. What command should the administrator use on a Cisco router? | show flash:0 |
| 55. What is the principle that is applied when a network technician is troubleshooting a network fault by using the divide-and-conquer method? | Once it is verified that components in a particular layer are functioning properly, it can then be assumed that components in the layers below it are also functional. |
| 56. Which queuing algorithm has only a single queue and treats all packets equally? | FIFO |
| 57. What type of traffic is described as traffic that requires at least 30 Kbps of bandwidth? | voice |
| 58. What type of traffic is described as being able to tolerate a certain amount of latency, jitter, and loss without any noticeable effects? | voice |
| 59. A network manager wants to view the amount of available and free memory, the type of file system, and its permissions. What command should the administrator use on a Cisco router? | show file systems |
| 60. What type of traffic is described as requiring latency to be no more than 400 milliseconds (ms)? | video |
| 61. What type of traffic is described as consisting of traffic that requires a higher priority if interactive? | data |
| 62. A network manager wants to configure the router to load a new image from flash during bootup. What command should the administrator use on a Cisco router? | boot system |
| 63. What type of traffic is described as predictable and smooth? | voice |
| 64. A network manager wants to ensure that the device will ignore the startup config file during startup and bypass the required passwords. What command should the administrator use on a Cisco router? | confreg 0x2142 |
| 65. What type of traffic is described as having a high volume of data per packet? | video |
| 66. A network manager wants to backup the running configuration to a file server. What command should the administrator use on a Cisco router? | copy running-config tftp |
| 67. What type of traffic is described as consisting of traffic that gets a lower priority if it is not mission-critical? | data |