17.8.5 Module Quiz – Build a Small Network (Answers)

17.8.5 Module Quiz – Build a Small Network Answers

1. Which two traffic types require delay sensitive delivery? (Choose two.)

  • email
  • web
  • FТР
  • voice
  • video

Explanation: Voice and video traffic have delay sensitive characteristics and must be given priority over other traffic types such as web, email, and file transfer traffic.

2. A network technician suspects that a particular network connection between two Cisco switches is having a duplex mismatch. Which command would the technician use to see the Layer 1 and Layer 2 details of a switch port?

  • show interfaces 
  • show running-config
  • show ip interface brief
  • show mac-address-table

Explanation: The show interfaces command can be used on both routers and switches to see speed, duplex, media type, MAC address, port type, and other Layer 1/Layer 2-related information.

3. Which statement is true about CDP on a Cisco device?​

  • The show cdp neighbor detail command will reveal the IP address of a neighbor only if there is Layer 3 connectivity.
  • To disable CDP globally, the no cdp enable command in interface configuration mode must be used.
  • CDP can be disabled globally or on a specific interface.
  • Because it runs at the data link layer, the CDP protocol can only be implemented in switches.

Explanation: CDP is a Cisco-proprietary protocol that can be disabled globally by using the no cdp run global configuration command, or disabled on a specific interface, by using the no cdp enable interface configuration command. Because CDP operates at the data link layer, two or more Cisco network devices, such as routers can learn about each other even if Layer 3 connectivity does not exist. The show cdp neighbors detail command reveals the IP address of a neighboring device regardless of whether you can ping the neighbor.

4. What factor should be considered in the design of a small network when devices are being chosen?

  • cost of devices
  • redundancy
  • traffic analysis
  • ISP

Explanation: Factors to consider when designing a network include the cost of devices, speed, modularity and scalability, and ease of managing the network.

5. A user is unable to reach the website when typing ht​tp://ww​w.cisco.com in a web browser, but can reach the same site by typing ht​tp://72.163.4.161. What is the issue?

  • default gateway
  • DHCP
  • DNS 
  • TCP/IP protocol stack

Explanation: Domain Name Service (DNS) is used to translate a web address to an IP address. The address of the DNS server is provided via DHCP to host computers.​

6. Where are Cisco IOS debug output messages sent by default?

  • memory buffers
  • vty lines
  • Syslog server
  • console line

Explanation: Debug messages, like other IOS log messages, are sent to the console line by default. Sending these messages to the terminal lines requires the terminal monitor command.

7. Which element of scaling a network involves identifying the physical and logical topologies?

  • traffic analysis
  • network documentation
  • device inventory
  • cost analysis

Explanation: To scale a network, several elements are required:

  • Network documentation – physical and logical topology
  • Device Inventory – list of devices that use or make up the network
  • Budget – Itemized IT budget, including fiscal year equipment purchasing budget
  • Traffic analysis – protocols, applications, and services and their respective traffic requirements should be documented

8. What mechanism can be implemented in a small network to help minimize network latency for real-time streaming applications?

  • QoS
  • PoE
  • AAA
  • ICMP

Explanation: Quality of service (QoS) is a mechanism which is used to classify and prioritize traffic through the network. This enables network devices to minimize the latency for real-time applications such as voice and video.

9. Which process failed if a computer cannot access the internet and received an IP address of 169.254.142.5?

  • IP
  • DNS
  • DHCP
  • HTTP

Explanation: When a Windows computer cannot communicate with an IPv4 DHCP server, the computer automatically assigns itself an IP address in the169.254.0.0/16 range. Linux and Apple computers do not automatically assign an IP address.​

10. A small company has only one router as the exit point to its ISP. Which solution could be adopted to maintain connectivity if the router itself, or its connection to the ISP, fails?

  • Activate another router interface that is connected to the ISP, so the traffic can flow through it.
  • Have a second router that is connected to another ISP.
  • Purchase a second least-cost link from another ISP to connect to this router.
  • Add more interfaces to the router that is connected to the internal network.

Explanation: Small networks generally have only one link to an ISP to establish a connection to the Internet. Problems can occur in the network, which can cause the disruption of this service. In order to keep connectivity, redundancy has to be provided. If the problem is in the router interface that is connected to the ISP, another interface can be activated on the router, so if one interface fails, traffic may be redirected toward the other interface. However, if the router itself fails, a second router that is connected to another ISP can be used as a backup.

11. When should an administrator establish a network baseline?

  • when the traffic is at peak in the network
  • when there is a sudden drop in traffic
  • at the lowest point of traffic in the network
  • at regular intervals over a period of time

Explanation: An effective network baseline can be established by monitoring the traffic at regular intervals. This allows the administrator to take note when any deviance from the established norm occurs in the network.

12. Which network design consideration would be more important to a large corporation than to a small business?

  • Internet router
  • firewall
  • low port density switch
  • redundancy

Explanation: Small businesses today do need Internet access and use an Internet router to provide this need. A switch is required to connect the two host devices and any IP phones or network devices such as a printer or a scanner. The switch may be integrated into the router. A firewall is needed to protect the business computing assets. Redundancy is not normally found in very small companies, but slightly larger small companies might use port density redundancy or have redundant Internet providers/links.

13. A newly hired network technician is given the task of ordering new hardware for a small business with a large growth forecast. Which primary factor should the technician be concerned with when choosing the new devices?

  • devices with a fixed number and type of interfaces
  • devices that have support for network monitoring
  • redundant devices
  • devices with support for modularity

Explanation: In a small business with a large growth forecast, the primary influencing factor would be the ability of devices to support modularity. Devices with a fixed type/number of interfaces would not support growth. Redundancy is an important factor, but typically found in large enterprises. Network monitoring is also an important consideration, but not as important as modularity.

14. What type of traffic would most likely have the highest priority through the network?

  • FTP
  • instant messaging
  • voice
  • SNMP

Explanation: Not all traffic should receive the same treatment or priority through a network. Some types of traffic, such as voice and video, require the highest priority because they are very sensitive to network latency and delay. Other types of traffic, such as FTP, which is not sensitive to latency and delay, should be given the lowest level of priority so that the higher priority traffic can get through.

15. A network technician is investigating network connectivity from a PC to a remote host with the address 10.1.1.5. Which command, when issued on a Windows PC, will display the path to the remote host?

  • trace 10.1.1.5
  • traceroute 10.1.1.5
  • tracert 10.1.1.5
  • ping 10.1.1.5

Explanation: The tracert command is used to initiate a trace from the command prompt on a Windows PC. The traceroute command is used to initiate a trace from a Cisco router or switch. Some other PC operating systems, such as Linux and Mac OS also use the traceroute command. The ping command does not display the network path to the remote host.

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x