Ctrl + F is the shortcut in your browser or operating system that allows you to find words or questions quickly.
Ctrl + Tab to move to the next tab to the right and Ctrl + Shift + Tab to move to the next tab to the left.
On a phone or tablet, tap the menu icon in the upper-right corner of the window; Select "Find in Page" to search a question.
Share UsSharing is Caring
It's the biggest motivation to help us to make the site better by sharing this to your friends or classmates.
Learn the selection criteria of network devices and WAN technologies to meet network requirements. Troubleshoot end-to-end connectivity in a small business.
A construction firm is building a power plant at a remote and isolated mine site and needs to connect the data network of the plant to the corporate network. Which public technology is the most suitable to meet the connection needs?
The _____ transmits bits from one computer to another and regulates the transmission of a stream of bits over the physical medium.
It SPAN Terminology which refers to the traffic that enters the switch.
_____ This is a point established in a building or complex to separate customer equipment from service provider equipment.
What is an advantage offered by GRE tunnels?
Internal BGP is the routing protocol used between routers in the same AS.
When is the most appropriate time to measure network operations to establish a network performance baseline?
_____ allows source and destination ports to be in different switches.
The _____ QoS model specifies a simple and scalable mechanism for classifying and managing network traffic and providing QoS guarantees on modern IP networks.
What does the FIFO queuing stands for?
Network traffic can be marked at both Layer 2 and Layer 3 for QoS..
What function does NCP perform in the establishment of a PPP session?
_____ diagrams keep track of the location, function, and status of devices on the network.
a type of network that establishes a dedicated circuit (or channel) between nodes and terminals before the users may communicate.
What is the default queuing method used on the LAN interfaces of Cisco devices?
It is a queuing algorithm also known as first-come, first-served (FCFS) queuing, involves buffering and forwarding of packets in the order of arrival.
Which Cloud computing service would be best for an organization that needs to collaboratively create applications and deliver them over the web?
Which PPP protocol allows a device to specify an IP address for routing over the PPP link?
What happens when the memory queue of a device fills up and new network traffic is received?
What is an SNMP management agent?
External BGP is the routing protocol used between routers in different autonomous systems.
_____ It is a networking device that provides internetworking and WAN access interface ports that are used to connect to the service provider network.
What is the protocol that provides ISPs the ability to send PPP frames over DSL networks?
Which model is the only QoS model with no mechanism to classify packets?
An administrator has configured an access list on R1 to allow SSH administrative access from host 172.16.1.100. Which command correctly applies the ACL?
The _____ is considered to be the brains of the ACI architecture.
It is a queuing algorithm which extends the standard WFQ functionality to provide support for user-defined traffic classes.
Which statement correctly describes a WAN technology?
What is a disadvantage of leased lines?
The OSI reference model describes how information from a software application in one computer moves through a network medium to a software application in another computer.
Which medium do service providers use to transmit data over WAN connections with SONET, SDH, and DWDM?
CBWFQ extends the standard WFQ functionality to provide support for user-defined traffic classes.
Which service is enabled on a Cisco router by default that can reveal significant information about the router and potentially make it more vulnerable to attack?
SDN is a network architecture that has been developed to virtualize the network.
It is a queuing algorithm which feature brings strict priority queuing (PQ) to CBWFQ.
Which protocol is used by PPP to provide authentication and protection from playback attacks?
A _____ topology illustrates how devices are logically connected to the network, meaning how devices actually transfer data across the network when communicating with other devices.
What equipment at the cable service provider office connects the office to the subscriber locations?
It is an ever increasing requirement of networks today
A network engineer is troubleshooting an unsuccessful PPP multilink connection between two routers. The multilink interface has been created and assigned a number, the interface has been enabled for multilink PPP, and the interface has been assigned a multilink group number that matches the group assigned to the member physical serial interfaces. The physical serial interfaces have also been enabled for PPP multilink. Which additional command should to be issued on the multilink interface?
Generic Routing Encapsulation (GRE) is one example of a basic, non-secure, site-to-site VPN tunneling protocol.
When a PPPoE configuration is being verified, which command can be used to verify the MTU size and encapsulation type configured on a Cisco router?
A general term for Internet services from a mobile phone or from any device that uses the same technology.
Delay-sensitive data such as voice is added to a priority queue so that it can be sent first (before packets in other queues).
_____ It is a WAN protocol that provides Provides router-to-router and host-to-network connections over synchronous and asynchronous circuits.
Also called the forwarding plane, this plane is typically the switch fabric connecting the various network ports on a device.
A network engineer is troubleshooting a network that has recently been updated with a new routing protocol, but the network is not working as expected. The engineer is comparing the running configuration from before and after the change was made. Which approach to troubleshooting the problem is the engineer using?
One of the new challenges associated with the rapid growth of the IoT is increasing the CPU power of computers
It is a type of DHCP where the attacker floods the DHCP server with bogus DHCP requests and eventually leases all of the available IP addresses in the DHCP server pool.
The show ip interface brief and show ipv6 interface brief commands are used to display the up or down status and IP address of all interfaces on a device.
Under which condition does congestion occur on a converged network with voice, video, and data traffic?
One of the new challenges associated with the rapid growth of the IoT is securing new devices with varying level of security.
Which term describes the data exchanges between virtual servers in a data center?
A network administrator issues the telnet www.cisco.com 25 command on the workstation. What is the purpose of this command?
VLAN attacks are controlled by disabling DTP and following basic guidelines for configuring trunk ports.
MAC address table flooding attacks are addressed with port security.
Which statement describes a characteristic of standard IPv4 ACLs?
Which component in a traditional infrastructure device provides Layer 2 and Layer 3 functions to create data paths within a network?
A _____ topology shows the physical layout of the devices connected to the network.
Which feature sends simulated data across the network and measures performance between multiple network locations?
Which IPv4 address range covers all IP addresses that match the ACL filter specified by 172.16.2.0 with wildcard mask 0.0.1.255?
It is an SPAN Terminology which refers to the port that is monitored with use of the SPAN feature answer Source (SPAN) port
What is a characteristic of the two-tier spine-leaf topology of the Cisco ACI fabric architecture?
The Cisco Discovery Protocol (CDP) is a proprietary Layer 2 link discovery protocol.
One of the new challenges associated with the rapid growth of the IoT is integrating many devices from different vendors with custom applications.
This is typically regarded as the brains of a device.
Which network traffic management technology is a basic element in SDN implementations?
In the 802.1X standard, the client attempting to access the network is referred to as the supplicant.
An _____ is a collection of end-point groups (EPG), their connections, and the policies that define those connections.
Packets are assigned to user-defined classes based on matches to criteria such as protocols, ACLs, and input interfaces.
DHCP is the protocol that automatically assigns a host a valid IP address out of a DHCP pool.
To verify the state of a GRE tunnel, use the show interface tunnel command.
What is a characteristic of data flow processing in SDN?
After gathering symptoms, if the troubleshooter determines that the problem is located outside the control of the organization, what is the next step?
Which one of the WAN technologies is inadequate for video traffic but operates adequately for voice traffic?
SNMP is an application layer protocol that provides a message format for communication between managers and agents
Which WAN technology uses a fixed payload of 48 bytes and is transported across both switched and permanent virtual circuits?
Which additional functionality is available on an interface when the encapsulation is changed from HDLC to PPP?
______ are specialized, handheld devices designed for testing the various types of data communication cabling.
It is a type of DHCP attack where the attacker configures a fake DHCP server on the network to issue IP addresses to clients.
A network architecture that virtualizes the network.
What mitigation plan is best for thwarting a DoS attack that is creating a switch buffer overflow?
DHCP _____ is a mitigation technique to prevent rogue DHCP servers from providing false IP configuration parameters.
Packets are classified into different flows based on header information including the ToS value.
IntServ provides a way to deliver the end-to-end QoS that real-time applications require by explicitly managing network resources to provide QoS to specific user packet streams, sometimes called microflows.
This type of SDN uses a centralized controller that has knowledge of all devices in the network.
One of the new challenges associated with the rapid growth of the IoT is developing better routing protocols for new devices
Packets are forwarded in the order in which they are received.
A newer and faster technology considered to be part of 4G technology.
A site-to-site VPN is created when devices on both sides of the VPN connection are aware of the VPN configuration in advance.
What is a characteristic of a WAN?
_____ A general term for Internet services from a mobile phone or from any device that uses the same technology.
What happens when an edge router using IntServ QoS determines that the data pathway cannot support the level of QoS requested?
Which mode is used to configure SNMP?
Which troubleshooting tool can be used to pinpoint the distance to a break in a network cable?
It is a type of telnet attack where the attacker continuously requests Telnet connections in an attempt to render the Telnet service unavailable and preventing an administrator from remotely accessing a switch.
Which PPP option enables load balancing on PPP-enabled interfaces that connect to a single destination?
Simple Network Management Protocol (SNMP) was developed to allow administrators to manage nodes such as servers, workstations, routers, switches, and security appliances, on an IP network.
The use of BGP is most appropriate when an AS has connections to multiple autonomous systems.
Satellite Internet services are used in locations where land-based Internet access is not available, or for temporary installations that are mobile.
With which layers of the OSI model do the PPP control protocols interface?
Which statement describes a difference between the operation of inbound and outbound ACLs?
What does the WFQ automated scheduling method stands for?
What range of IP addresses is represented by the network and wildcard mask 192.168.70.0 0.0.0.127?
It is a type of telnet attack where the attacker may use a list of common passwords, dictionary words, and variations of words to discover the administrative password
_____ A type of digital modem used with high-speed DSL or cable Internet service.
A network engineer is investigating an access issue to a web server. The web server can access the Internet and the local clients can open the web pages. However, outside clients cannot access the web pages. What is the most likely cause of the problem?
What is Fog computing?
_____ A newer and faster technology considered to be part of 4G technology.
_____ It is the default encapsulation type on point-to-point connections, dedicated links, and circuit-switched connections when the link uses two Cisco devices.
Which queuing method provides user-defined traffic classes where each traffic class has a FIFO queue?
How many "things" are predicted to be interconnected on the Internet by 2020?
The IoT refers to the network of billons of physical objects accessible through the Internet as we continue to connect the unconnected.
An attack has been launched within a company and a host name has been identified as the source. What command can a network technician use to determine the IP address assigned to the host name?
One of the new challenges associated with the rapid growth of the IoT is improving the Internet connections from homes
What TCP port is used by BGP to exchange messages between routers?
The show cdp neighbors detail command is used to obtain detailed information about directly connected Cisco neighbor devices.
What is an example of an M2M connection?
Today, over __% of things in the physical world are still not connected to the Internet. Select the answer that will complete the statement.
Which statement describes the QoS classification and marking tools?
These switches provide an application-aware switching fabric and work with an APIC to manage the virtual and physical network infrastructure.
How many levels of priority are possible when using class of service (CoS) marking on frames?
How can SNMP access be restricted to a specific SNMP manager?
Cloud computing and virtualization are different terms that refer to the same thing.
Which public WAN technology provides security by using encrypted tunnels over Internet connections?
Which type of traffic does Cisco recommend be placed in the strict priority queue (PQ) when low latency queuing (LLQ) is being used?
The LLQ feature brings strict priority queuing (PQ) to CBWFQ.
For a data center, what is the difference in the server virtualization data traffic compared with the traditional client-server model?
The show ip route and show ipv6 route commands are used to display the routing table in a router to learn the directly connected neighbors, more remote devices (through learned routes), and the routing protocols that have been configured.
A client calls the support desk and says this to a technician: "I have just started my computer and attempted to check e-mail. The error 0x800ccc0d was displayed. However, I was able to connect to network drives and access the Internet." Which statement would describe the status of this issue?
A purpose-built hardware solution for integrating cloud computing and data center management.
The show monitor command is used to verify the SPAN session.
PPP authentication is performed at which OSI layer?
Which statement describes the physical topology for a LAN?
A _____ is software that creates and runs VM instances and can be installed directly on hardware or run as an application on an OS.
Dynamic Multipoint VPN (DMVPN) is a Cisco software solution for building multiple VPNs in an easy, dynamic, and scalable manner.
It is a SPAN Terminology which refers to the traffic that leaves the switch.
Which command runs several other show commands in order to generate many pages of detailed troubleshooting information?
Use the show ip sla configuration operation-number command to display configuration values including all defaults for IP SLA operations or for a specific operation.
It is a queuing algorithm which is an automated scheduling method that provides fair bandwidth allocation to all network traffic.
To keep up this site, we need your assistance. A little gift will help us alot.
Donate- The more you give the more you receive.
Related SubjectPrivate Security
Network Security
Object Oriented Programming Laboratory
Mobile Programming
Mobile Application Design and Development 2
Mobile Application Design and Development
Management Information Systems
Managing Information and Technology
Mail and Web Services
Living in the Information Technology Era
Information Technology Capstone Project
Information Technology Practicum
Intro to Hardware Description Language
Introduction to Multimedia
Introduction to Information Systems
Introduction to Human Computer
Introduction to Computing
Internet Marketing and Entrepreneurship
Internet Technology in Real Estate
Integrative Programming and Technology 2
Information Assurance and Security 2
Information Systems Operations and Maintenance
Information Security and Management
Information Assurance and Security 3
Fundamentals of Investigation and Intelligence
Fundamentals of Database System
Digital Imaging
Database Management System
Data Structures and Algorithms
Data Communications and Networking 2
Data Communications and Networking
Cyber Security: Theories and Practice
Chemistry for Engineers
Computer Fundamentals
Auditing and Assurance Concepts and Applications
Animation Project
3D Game Art Development
Load Testing
Software Engineering
System Administration and Maintenance
Integrative Programming and Technology
Current Trends and Issues
Linux Administration
Applied Business Tools and Technologies
Computer Programming
Systems Integration and Architecture
Application Lifecycle Management
Data Communications and Networking 3
Information Assurance and Security
Principles of Operating System and its Application
Shopee Cashback Voucher
Temu $0 Shipping Fee
Amazon 75% Off Discounts