Professional Documents
Culture Documents
Maintenance processes are better aligned to business needs. The overall security of the network will be higher. The total unplanned network downtime will be lower.
Which three of the following is a methodology that can be applied to network maintenance? Fault management, Configuration management, Accounting management, Performance management and Security management (FCAPS) IT Infrastructure Library (ITIL) Telecommunications Management Network (TMN)
Which two of the following are common network maintenance processes? Disaster recovery Documentation
Which two of the following are benefits of scheduled maintenance? Lead times for change requests will be more predictable. Disruptive maintenance tasks can be scheduled during assigned maintenance windows.
Which factors should be considered during the implementation of change procedures? Risk, impact, and resources should be balanced against urgency, necessity and business needs.
Which three of the following items do you need to have to replace a failed device? Replacement hardware for the failed device The current configuration of the failed device The current software version of the failed device
Network monitoring is a fundamental aspect of a proactive network management strategy. True or False? True
Which five of the following protocols can be used to transfer a configuration file from a router to a server to create a configuration backup? HTTPS HTTP FTP TFTP SCP
Which of the following commands is the correct command to copy the running configuration of a router to a file named test.cfg residing on an FTP server with IP address 10.1.1.1, using the username admin and password cisco? copy running-config ftp://admin:cisco@10.1.1.1/test.cfg
What command enables you to manually create an archive copy of the running configuration? archive config
Which of the following commands is the correct command to restore the current configuration to the archived configuration file RO1-archive-config-5 residing in flash? configure replace flash:/RO1-archive-config-5
What command enables you to configure a switch to log system messages to a syslog server at IP address 10.1.1.1? Logging 10.1.1.1
What is the functionality delivered by the online Dynamic Configuration Tool? It validates hardware configurations and creates a bill of materials from it.
Which two of the following are processes that benefit from the implementation of a network performance measurement system? Capacity planning SLA compliance
Which three of the following processes are subprocesses or phases of a troubleshooting process? (Choose three.) Elimination Testing Problem definition
Which four of the following approaches are valid troubleshooting methods? (Choose four.) Top down Bottom up Follow the path Divide and conquer
Which three of the following troubleshooting approaches use the OSI reference model as a guiding principle? (Choose three.) Top down Bottom up Divide and conquer
Which of the following troubleshooting methods is most appropriate to find a bad cable? Move the problem
Which conditions make troubleshooting by spotting the differences more effective? Existence of consistent templates for configurations and a baseline of network behaviour under normal circumstances.
Which of the following has a clear problem definition? When I try to access http://www.cisco.com, my Internet Explorer says that it cannot display the web page.
Which two of the following resources will help in interpreting and analyzing information gathered during troubleshooting? (Choose two.) Documentation Network baseline
Which of the following steps are parts of testing a hypothesis? (Choose four.) Defining a solution Creating a rollback plan Implementing the solution Assessing impact and urgency
During which three of the troubleshooting phases could it be necessary to escalate a problem to a different department? (Choose three.) Defining the problem Gathering information Formulating a hypothesis
Which of the following technologies can be deployed to measure critical network performance indicators such as delay and jitter? IP SLA process does not have
Which of the following phases of the troubleshooting communication as a major component? Eliminating causes
Which of the following commands will display all subnets contained in the prefix 10.1.32.0/19? show ip route 10.1.32.0 255.255.224.0 longer-prefixes
You execute the command show ip route 10.1.1.1, and the response of the router is % Subnet not in table. Which of the following is the most accurate conclusion you can draw from this response? (Select the best answer) There is no specific route in the routing table that matches IP address 10.1.1.1. Packets to that destination may be forwarded by the default route, if it is present.
Which of the following commands will display the part of the running configuration that contains all statements for the EIGRP routing protocol? show running-config | section router eigrp
Which of the following commands will display the output of the command show ip interface brief onscreen and copy the output of the command to the file show-output.txt on TFTP server 10.1.1.1? show ip interface brief | tee tftp://10.1.1.1/show-output.txt
Which of the following Cisco IOS commands will send 154 ICMP request packets of 1400 bytes each with the Dont Fragment bit set to IP address 10.1.1.1? ping 10.1.1.1 size 1400 repeat 154 df-bit
You execute the command telnet 192.168.37.2 80, and the response of the router is Trying 192.168.37.2, 80 ... Open. Which conclusion can you draw from this response? There is a service running on TCP port 80 on host 192.168.37.2, and it accepts connections.
You execute the command show processes cpu, and the output includes CPU utilization for 5 seconds: 30%/26%. Which two of the following statements are correct? The total CPU load over the past 5 seconds was 30 percent. The percentage of CPU time spent on scheduled processes was 4 percent.
Which two of the following technologies can be implemented to create a baseline of network usage? SNMP NetFlow
SPAN traffic is carried in a RSPAN VLAN over which of the following? A trunk connection
Which two of the following commands are necessary to configure a switch to copy all traffic from interface Fa0/1 to a packet sniffer on interface Fa0/5? monitor session 1 source interface Fa0/1 monitor session 1 destination interface Fa0/5
Cisco IOS NetFlow technology enables you to gather detailed traffic profiles and performance statistics such as CPU and memory usage. True or False? False
Which two of the following commands are necessary to configure a router to send SNMP traps to an SNMP manager at IP address 10.2.2.2 using community string cisco? snmp-server enable traps snmp-server host 10.2.2.2 cisco
Which of the following best describes EEM? It is a framework that allows for the creation of custom events and corresponding actions.
Which of the following best describes SNMP? It is a protocol that allows statistics to be gathered from a device and notifications to be sent by that same device.
Which of the following best describes NetFlow? It is a technology that enables the collection of detailed traffic profiles.
Which of the following best describes SPAN? It is a technology that allows traffic to be copied from one switch port to another so that the traffic can be captured.