You are on page 1of 7

Physical topology Layout of devices on a network.

. The physical topology shows the way that the devices are connected through the cabling and how cables are arranged. Uses icons to

document the location of hosts, networking devices, and media. It is important to maintain and update maps to aid future troubleshooting.

Logical topology Map of the flow of the data on a network that shows how devices communicate with each other. Host names, addresses, group information, and applications can be recorded on the logical topology map. Connections between multiple sites may be shown but do not represent actual physical locations.

Control plane

Redlined Marks on blueprints to show changes


Business continuity plan (BCP ) steps to be taken to continue business operations when there is a natural or man-made disaster. Procedures for IT support may include : offsite storage of backup data, alternate IT processing centers, Redundant communication links.

Business security plan (BSP) physical, system, and organizational control measures to be taken to protect network and information assets. IT security plan can contain policies related to: user authentication, permissible software, remote access, intrusion monitoring, incident handling.

Network maintenance plan (NMP) ensures business continuity by keeping the network running efficiently. Network maintenance must be scheduled during specific periods, usually nights and weekends, to minimize impact on business operations. The maintenance plan can contain: maintenance windows, scheduled downtime, staff on-call responsibility, equipment and software to be maintained (OS, IOS, services), network performance monitoring.

Service-level agreement (SLA) binding contract between a network service provider and the end user who requires a certain level of service. Ensures service parameters by defining required

service provider level of performance. An SLA can include: connection speeds/bandwidth, network uptime, network performance monitoring, problem resolution response time, on-call responsibilities.

Network Operations Center (NOC) the facility location and personnel in an organization responsible for maintaining a network. AKA data center. Typically provide support for local and remote locations, often managing local and wide area networking issues. NOC usually has: raised floors for cabling and power. High performance UPS and air conditioning. Fire suppression systems, network monitoring stations, servers, backup systems, and data storage. Access layer switches and distribution layer routers, if it serves as a Main Distribution Facility (MDF) for the building or campus where it is located.

Data center Central management location that monitors all network resources. A data center is also known as a NOC.

Server farm Collection of servers located in a central facility and maintained by the central group to provide server needs for organizations. A server farm usually has primary and backup server hardware for load-balancing, redundancy, and fault-tolerance purposes. A server farm architecture provides the operation and maintenance of servers.

Load balancing

Network attached storage (NAS)

Storage-area network (SAN)

Rack units (RU)

Structured cabling

Electromagnetic interference (EMI)

Telecommunications room

Intermediate distributions facility (IDF)

Access point (AP)

Main distribution facility (MDF)

Extended star

Power over Ethernet (PoE)

Point of presence (POP)

Service provider (SP)


Punchdown block

Channel service unit/data service unit (CSU/DSU)

Customer premise equipment (CPE)

Form factors



Port density

1. What type of connection point is a point of presence (POP)? d. between an ISP and an Enterprise network ****

2. A network administrator needs to configure Telnet access to a router. Which group of commands enable Telnet access to the router? d. Router(config)# enable password class **** Router(config)# line vty 0 4 Router(config-line)# login Router(config-line)# password cisco

3. Which two types of information should be included in a business continuity plan? (Choose two.) d. alternate IT processing locations ***** e. problem resolution escalation steps ****

4. Which two router parameters can be set from interface configuration mode? (Choose two.) a. IP address **** e. subnet mask ****

5. Which two devices protect a corporate network against malicious attacks at the enterprise edge ?(Choose two.) d. intrusion prevention system (IPS) **** e. intrusion detection system (IDS) ****

6. Which three steps must be performed to remove all VLAN information from a switch but retain the rest of the configuration? (Choose three.) d. Issue the command delete flash:vlan.dat. **** e. Issue the command erase start. **** f. Reload the switch. ****

7. What is the demarcation? a. physical point where the ISP responsibilty ends and the customer responsibilty begins ****

8. Which device is responsible for moving packets between multiple network segments? a. router ****

10. What information can an administrator learn using the show version command? a. Cisco IOS filename ****

11. Which two situations require a network administrator to use out-of-band management to change a router configuration? (Choose two.) a. Network links to the router are down. **** d. The network interfaces of the router are not configured with IP addresses. ****

12. It is crucial that network administrators be able to examine and configure network devices from their homes. Which two approaches allow this connectivity without increasing vulnerability to external attacks? (Choose two.) b. Set up VPN access between the home computer and the network. **** d. Configure ACLs on the edge routers that allow only authorized users to access management ports on network devices. **** 13. A network administrator must define specific business processes to implement if a catastrophic disaster prevents a company from performing daily business routines. Which portion of the network documentation is the administrator defining? b. business continuity plan ****

14. A DoS attack crippled the daily operations of a large company for 8 hours. Which two options could be implemented by the network administrator to possibly prevent such an attack in the future? (Choose two.) a. install security devices with IDS and IPS at the enterprise edge **** c. filter packets based on IP address, traffic pattern, and protocol ****

15. A network manager wants to have processes in place to ensure that network upgrades do not affect business operations. What will the network manager create for this purpose? d. network maintenance plan ****

16. An investment company has multiple servers that hold mission critical data. They are worried that if something happens to these servers, they will lose this valuable information. Which type of plan is needed for this company to help minimize loss in the event of a server crash? a. business security ****

17. When searching for information about authentication methods and usernames of company personnel, where can a network administrator look? b. Business Security Plan ****


Refer to the exhibit. Which statement is true about port Fa5/1? d. The port is currently in the shutdown state. ****