Check answers here:
Modules 9 – 12: Optimize, Monitor, and Troubleshoot Networks Exam Answers
Quiz-summary
0 of 67 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
Information
CCNA 3 v7 Modules 9 – 12: Optimize, Monitor, and Troubleshoot Networks Test Online
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 67 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- Answered
- Review
-
Question 1 of 67
1. Question
1 pointsWhat is the term used to indicate a variation of delay?Correct
Incorrect
-
Question 2 of 67
2. Question
1 pointsA network engineer performs a ping test and receives a value that shows the time it takes for a packet to travel from a source to a destination device and return. Which term describes the value?Correct
Incorrect
-
Question 3 of 67
3. Question
1 pointsWhat role do network devices play in the IntServ QoS model?Correct
Incorrect
-
Question 4 of 67
4. Question
1 pointsWhich device would be classified as a trusted endpoint?Correct
Incorrect
-
Question 5 of 67
5. Question
1 pointsWhat is the benefit of deploying Layer 3 QoS marking across an enterprise network?Correct
Incorrect
Hint
Marking traffic at Layer 2 or Layer 3 is very important and will affect how traffic is treated in a network using QoS.- Layer 2 marking of frames can be performed for non-IP traffic.
- Layer 2 marking of frames is the only QoS option available for switches that are not “IP aware.”
- Layer 3 marking will carry the QoS information end-to-end.
-
Question 6 of 67
6. Question
1 pointsWhat is the function of a QoS trust boundary?Correct
Incorrect
Hint
Network traffic is classified and marked as close to the source device as possible. The trust boundary is the location where the QoS markings on a packet are trusted as they enter an enterprise network. -
Question 7 of 67
7. Question
1 pointsWhat are two approaches to prevent packet loss due to congestion on an interface? (Choose two.)Correct
Incorrect
Hint
There are three approaches to prevent sensitive traffic from being dropped:- Increase link capacity to ease or prevent congestion.
- Guarantee enough bandwidth and increase buffer space to accommodate bursts of traffic from fragile flows.
- Prevent congestion by dropping lower-priority packets before congestion occurs.
-
Question 8 of 67
8. Question
1 pointsWhat configuration scenario would offer the most protection to SNMP get and set messages?Correct
Incorrect
Hint
SNMPv3 supports authentication and encryption with the auth and priv security levels. SNMPv1 and SNMPv2 do not support authentication or encryption. Using a default community string is not secure because the default string of “public” is well known and would allow anyone with SNMP systems to read device MIBs. -
Question 9 of 67
9. Question
1 pointsRefer to the exhibit. The network administrator enters these commands into the R1 router: R1# copy running-config tftp Address or name of remote host [ ]? When the router prompts for an address or remote host name, what IP address should the administrator enter at the prompt?Correct
Incorrect
Hint
The requested address is the address of the TFTP server. A TFTP server is an application that can run on a multitude of network devices including a router, server, or even a networked PC. -
Question 10 of 67
10. Question
1 pointsThe command ntp server 10.1.1.1 is issued on a router. What impact does this command have?Correct
Incorrect
Hint
The ntp server ip-address global configuration command configures the NTP server for IOS devices. -
Question 11 of 67
11. Question
1 pointsAs the network administrator you have been asked to implement EtherChannel on the corporate network. What does this configuration consist of?Correct
Incorrect
Hint
EtherChannel is utilized on a network to increase speed capabilities by grouping multiple physical ports into one or more logical EtherChannel links between two switches. STP is used to provide redundant links that dynamically block or forward traffic between switches. FHRPs are used to group physical devices to provide traffic flow in the event of failure. -
Question 12 of 67
12. Question
1 pointsWhat is a definition of a two-tier LAN network design?Correct
Incorrect
Hint
Maintaining three separate network tiers is not always required or cost-efficient. All network designs require an access layer, but a two-tier design can collapse the distribution and core layers into one layer to serve the needs of a small location with few users. -
Question 13 of 67
13. Question
1 pointsWhat are two reasons to create a network baseline? (Choose two.)Correct
Incorrect
Hint
A network baseline is created to provide a comparison point, at the time that the network is performing optimally, to whatever changes are implemented in the infrastructure. A baseline helps to keep track of the performance, to track the traffic patterns, and to monitor network behavior. -
Question 14 of 67
14. Question
1 pointsA computer can access devices on the same network but cannot access devices on other networks. What is the probable cause of this problem?Correct
Incorrect
Hint
The default gateway is the address of the device a host uses to access the Internet or another network. If the default gateway is missing or incorrect, that host will not be able to communicate outside the local network. Because the host can access other hosts on the local network, the network cable and the other parts of the IP configuration are working. -
Question 15 of 67
15. Question
1 pointsIn which step of gathering symptoms does the network engineer determine if the problem is at the core, distribution, or access layer of the network?Correct
Incorrect
Hint
In the “narrow the scope” step of gathering symptoms, a network engineer will determine if the network problem is at the core, distribution, or access layer of the network. Once this step is complete and the layer is identified, the network engineer can determine which pieces of equipment are the most likely cause. -
Question 16 of 67
16. Question
1 pointsA network administrator is deploying QoS with the ability to provide a special queue for voice traffic so that voice traffic is forwarded before network traffic in other queues. Which queuing method would be the best choice?Correct
Incorrect
Hint
Low latency queuing (LLQ) allows delay-sensitive data, such as voice traffic, to be defined in a strict priority queue (PQ) and to always be sent first before any packets in any other queue are forwarded. -
Question 17 of 67
17. Question
1 pointsWhat are two characteristics of voice traffic? (Choose two.)Correct
Incorrect
Hint
Voice traffic does not consume a lot of network resources, such as bandwidth. However, it is very sensitive to delay and dropped packets cannot be retransmitted. For good voice quality, the amount of latency should always be less than 150 milliseconds. -
Question 18 of 67
18. Question
1 pointsWhich type of network traffic cannot be managed using congestion avoidance tools?Correct
Incorrect
Hint
Queuing and compression techniques can help to reduce and prevent UDP packet loss, but there is no congestion avoidance for User Datagram Protocol (UDP) based traffic. -
Question 19 of 67
19. Question
1 pointsWhen QoS is implemented in a converged network, which two factors can be controlled to improve network performance for real-time traffic? (Choose two.)Correct
Incorrect
Hint
Delay is the latency between a sending and receiving device. Jitter is the variation in the delay of the received packets. Both delay and jitter need to be controlled in order to support real-time voice and video traffic. -
Question 20 of 67
20. Question
1 pointsAn administrator wants to replace the configuration file on a Cisco router by loading a new configuration file from a TFTP server. What two things does the administrator need to know before performing this task? (Choose two.)Correct
Incorrect
Hint
In order to identify the exact location of the desired configuration file, the IP address of the TFTP server and the name of the configuration file are essential information. Because the file is a new configuration, the name of the current configuration file is not necessary. -
Question 21 of 67
21. Question
1 pointsRefer to the exhibit. Which of the three Cisco IOS images shown will load into RAM?Correct
Incorrect
Hint
When performing an upgrade or testing different IOS versions, the boot system command is used to select which image is used to boot the Cisco device. -
Question 22 of 67
22. Question
1 pointsRefer to the exhibit. What two types of devices are connected to R1? (Choose two.)Correct
Incorrect
Hint
The capabilities of the devices displayed by the output show them to be a Cisco 2811 series router, Cisco 1941 series router, and a Cisco 2960 switch. -
Question 23 of 67
23. Question
1 pointsWhat are three functions provided by the syslog service? (Choose three.)Correct
Incorrect
Hint
There are three primary functions provided by the syslog service:- gathering logging information
- selection of the type of information to be logged
- selection of the destination of the logged information
-
Question 24 of 67
24. Question
1 pointsWhat is the function of the MIB element as part of a network management system?Correct
Incorrect
Hint
The Management Information Base (MIB) resides on a networking device and stores operational data about the device. The SNMP manager can collect information from SNMP agents. The SNMP agent provides access to the information. -
Question 25 of 67
25. Question
1 pointsWhat network design would contain the scope of disruptions on a network should a failure occur?Correct
Incorrect
Hint
One way to contain the impact of a failure on the network is to implement redundancy. One way this is accomplished is by deploying redundant distribution layer switches and dividing the access layer switch connections between the redundant distribution layer switches. This creates what is called a switch block. Failures in a switch block are contained to that block and do not bring down the whole network. -
Question 26 of 67
26. Question
1 pointsWhich action should be taken when planning for redundancy on a hierarchical network design?Correct
Incorrect
Hint
One method of implementing redundancy is path redundancy, installing alternate physical paths for data to traverse the network. Redundant links in a switched network supports high availability and can be used for load balancing, reducing congestion on the network. -
Question 27 of 67
27. Question
1 pointsWhat are two benefits of extending access layer connectivity to users through a wireless medium? (Choose two.)Correct
Incorrect
Hint
Wireless connectivity at the access layer provides increased flexibility, reduced costs, and the ability to grow and adapt to changing business requirements. Utilizing wireless routers and access points can provide an increase in the number of central points of failure. Wireless routers and access points will not provide an increase in bandwidth availability. -
Question 28 of 67
28. Question
1 pointsWhat is a basic function of the Cisco Borderless Architecture access layer?Correct
Incorrect
Hint
A function of the Cisco Borderless Architecture access layer is providing network access to the users. Layer 2 broadcast domain aggregation, Layer 3 routing boundaries aggregation, and high availability are distribution layer functions. The core layer provides fault isolation and high-speed backbone connectivity. -
Question 29 of 67
29. Question
1 pointsWhich characteristic would most influence a network design engineer to select a multilayer switch over a Layer 2 switch?Correct
Incorrect
Hint
Multilayer switches, also known as Layer 3 switches, can route and build a routing table. This capability is required in a multi-VLAN network and would influence the network designer to select a multilayer switch. The other options are features also available on Layer 2 switches, so they would not influence the decision to select a multilayer switch. -
Question 30 of 67
30. Question
1 pointsRefer to the exhibit. Why are routers R1 and R2 not able to establish an OSPF adjacency?Correct
Incorrect
Hint
On router R1, the network 192.168.10.0/30 is defined in the wrong area (area 1). It has to be defined in area 0 in order to establish adjacency with router R2, which has the network 192.168.10.0/30 defined in area 0. -
Question 31 of 67
31. Question
1 pointsWhen is the most appropriate time to measure network operations to establish a network performance baseline?Correct
Incorrect
Hint
The purpose of establishing a network performance baseline is to provide a reference of normal or average network use to enable data traffic anomalies to be detected and then investigated. Network operations that are not average, or are not normal, cannot be used to establish a network performance baseline. -
Question 32 of 67
32. Question
1 pointsRefer to the exhibit. A user has configured a NIC on the PC as shown but finds that the PC is unable to access the Internet. What is the problem?Correct
Incorrect
Hint
In order for a computer to communicate outside its network, it must have a valid default gateway configured.This address cannot be the same as the IP address of the computer. -
Question 33 of 67
33. Question
1 pointsRefer to the exhibit. A network engineer configured an ACL preventing Telnet and HTTP access to the HQ web server from guest users in the Branch LAN. The address of the web server is 192.168.1.10 and all guest users are assigned addresses in the 192.168.10.0/24 network. After implementing the ACL, no one can access any of the HQ servers. What is the problem?Correct
Incorrect
Hint
Both named and numbered ACLs have an implicit deny ACE at the end of the list. This implicit deny blocks all traffic. -
Question 34 of 67
34. Question
1 pointsRefer to the exhibit. A network administrator has configured OSPFv2 on the two Cisco routers as shown. PC1 is unable to connect to PC2. What should the administrator do first when troubleshooting the OSPFv2 implementation?Correct
Incorrect
Hint
A prerequisite for OSPFv2 neighbor relationships to form between two routers is Layer 3 connectivity. A successful ping confirms that a router interface is active and may be able to form an OSPF neighbor adjacency. -
Question 35 of 67
35. Question
1 pointsWhat type of traffic is described as requiring latency to be no more than 150 milliseconds (ms)?Correct
Incorrect
-
Question 36 of 67
36. Question
1 pointsA network manager wants to add a time to log messages so that there is record of when the message was generated. What command should the administrator use on a Cisco router?Correct
Incorrect
-
Question 37 of 67
37. Question
1 pointsMatch the functions to the corresponding layers. (Not all options are used.)Correct
Incorrect
-
Question 38 of 67
38. Question
1 pointsMatch the borderless switched network guideline description to the principle. (Not all options are used.)Sort elements
- flexibility
- modularity
- hierarchical
- resiliency
- convergence
-
allows intelligent traffic load sharing by using all network resources
-
allows seamless network expansion and integrated service enablement on an on- demand basis
-
facilitates understanding the role of each device at every tier, simplifies deployment, operation, management, and reduces fault domains at every tier
-
satisfies user expectations for keeping the network always on
Correct
Incorrect
-
Question 39 of 67
39. Question
1 pointsWhat are two characteristics of the best-effort QoS model? (Choose two.)Correct
Incorrect
Hint
The best-effort QoS model provides no guarantees and it is commonly used on the Internet. The best-effort QoS model treats all network packets in the same way. -
Question 40 of 67
40. Question
1 pointsWhy is QoS an important issue in a converged network that combines voice, video, and data communications?Correct
Incorrect
Hint
Without any QoS mechanisms in place, time-sensitive packets, such as voice and video, will be dropped with the same frequency as email and web browsing traffic. -
Question 41 of 67
41. Question
1 pointsA network administrator configures a router with the command sequence:R1(config)# boot system tftp://c1900-universalk9-mz.SPA.152-4.M3.bin R1(config)# boot system rom
What is the effect of the command sequence?Correct
Incorrect
Hint
The boot system command is a global configuration command that allows the user to specify the source for the Cisco IOS Software image to load. In this case, the router is configured to boot from the IOS image that is stored on the TFTP server and will use the ROMmon imagethat is located in the ROM if it fails to locate the TFTP server or fails to load a valid image from the TFTP server. -
Question 42 of 67
42. Question
1 pointsWhich statement describes SNMP operation?Correct
Incorrect
Hint
An SNMP agent that resides on a managed device collects and stores information about the device and its operation. This information is stored by the agent locally in the MIB. An NMS periodically polls the SNMP agents that are residing on managed devices by using the get request to query the devices for data. -
Question 43 of 67
43. Question
1 pointsRefer to the exhibit. A network administrator issues the show lldp neighbors command on a switch. What are two conclusions that can be drawn? (Choose two.)Correct
Incorrect
Hint
In the output from the show lldp command, under Capability, R indicates a router and B indicates a bridge (switch). Nothing indicates that Dev1 and Dev2 are connected to one another. -
Question 44 of 67
44. Question
1 pointsWhat are the three layers of the switch hierarchical design model? (Choose three.)Correct
Incorrect
Hint
The access layer is the lowest layer and it provides network access to users. The distribution layer has many functions, but it aggregates data from the access layer, provides filtering, policy control, and sets Layer 3 routing boundaries. The core layer provides high speed connectivity. -
Question 45 of 67
45. Question
1 pointsRefer to the exhibit. Which devices exist in the failure domain when switch S3 loses power?Correct
Incorrect
Hint
A failure domain is the area of a network that is impacted when a critical device such as switch S3 has a failure or experiences problems. -
Question 46 of 67
46. Question
1 pointsA network designer is considering whether to implement a switch block on the company network. What is the primary advantage of deploying a switch block?Correct
Incorrect
Hint
The configuration of a switch block provides redundancy so that the failure of a single network device generally has little or no effect on end users. -
Question 47 of 67
47. Question
1 pointsWhich troubleshooting tool would a network administrator use to check the Layer 2 header of frames that are leaving a particular host?Correct
Incorrect
Hint
A protocol analyzer such as Wireshark is capable of displaying the headers of data at any OSI Layer. -
Question 48 of 67
48. Question
1 pointsRefer to the exhibit. R1 and R3 are connected to each other via the local serial 0/0/0 interface. Why are they not forming an adjacency?Correct
Incorrect
Hint
The routers need to be in the same subnet in order to form an adjacency. The routing processes can be different on each router. The router IDs must be different for routers that participate in the same routing domain. The interfaces are not passive. -
Question 49 of 67
49. Question
1 pointsWhat type of traffic is described as not resilient to loss?Correct
Incorrect
-
Question 50 of 67
50. Question
1 pointsA network manager wants lists the contents of flash. What command should the administrator use on a Cisco router?Correct
Incorrect
-
Question 51 of 67
51. Question
1 pointsVoice packets are being received in a continuous stream by an IP phone, but because of network congestion the delay between each packet varies and is causing broken conversations. What term describes the cause of this condition?Correct
Incorrect
-
Question 52 of 67
52. Question
1 pointsA user is unable to reach the website when typing http://www.cisco.com in a web browser, but can reach the same site by typing http://72.163.4.161 . What is the issue?Correct
Incorrect
-
Question 53 of 67
53. Question
1 pointsWhat type of traffic is described as tending to be unpredictable, inconsistent, and bursty?Correct
Incorrect
-
Question 54 of 67
54. Question
1 pointsA network manager wants to determine the size of the Cisco IOS image file on the networking device. What command should the administrator use on a Cisco router?Correct
Incorrect
-
Question 55 of 67
55. Question
1 pointsWhat is the principle that is applied when a network technician is troubleshooting a network fault by using the divide-and-conquer method?Correct
Incorrect
-
Question 56 of 67
56. Question
1 pointsWhich queuing algorithm has only a single queue and treats all packets equally?Correct
Incorrect
-
Question 57 of 67
57. Question
1 pointsWhat type of traffic is described as traffic that requires at least 30 Kbps of bandwidth?Correct
Incorrect
-
Question 58 of 67
58. Question
1 pointsWhat type of traffic is described as being able to tolerate a certain amount of latency, jitter, and loss without any noticeable effects?Correct
Incorrect
-
Question 59 of 67
59. Question
1 pointsA network manager wants to view the amount of available and free memory, the type of file system, and its permissions. What command should the administrator use on a Cisco router?Correct
Incorrect
-
Question 60 of 67
60. Question
1 pointsWhat type of traffic is described as requiring latency to be no more than 400 milliseconds (ms)?Correct
Incorrect
-
Question 61 of 67
61. Question
1 pointsWhat type of traffic is described as consisting of traffic that requires a higher priority if interactive?Correct
Incorrect
-
Question 62 of 67
62. Question
1 pointsA network manager wants to configure the router to load a new image from flash during bootup. What command should the administrator use on a Cisco router?Correct
Incorrect
-
Question 63 of 67
63. Question
1 pointsWhat type of traffic is described as predictable and smooth?Correct
Incorrect
-
Question 64 of 67
64. Question
1 pointsA network manager wants to ensure that the device will ignore the startup config file during startup and bypass the required passwords. What command should the administrator use on a Cisco router?Correct
Incorrect
-
Question 65 of 67
65. Question
1 pointsWhat type of traffic is described as having a high volume of data per packet?Correct
Incorrect
-
Question 66 of 67
66. Question
1 pointsA network manager wants to backup the running configuration to a file server. What command should the administrator use on a Cisco router?Correct
Incorrect
-
Question 67 of 67
67. Question
1 pointsWhat type of traffic is described as consisting of traffic that gets a lower priority if it is not mission-critical?Correct
Incorrect