Itexamanswers Net Ccna 3 v7 Modules 9 12 Optimize Monitor and Troubleshoot Networks Exam Answers HTML
Itexamanswers Net Ccna 3 v7 Modules 9 12 Optimize Monitor and Troubleshoot Networks Exam Answers HTML
How to find: Press “Ctrl + F” in the browser and fill in whatever wording is in the question
to find that question/answer. If the question is not here, find it in Questions Bank.
NOTE: If you have the new question on this test, please comment Question and
Multiple-Choice list in form below this article. We will update answers for you in the
shortest time. Thank you! We truly value your contribution to the website.
latency
serialization delay
speed mismatch
jitter
Explanation: Jitter is a phenomenon caused by a variation in delay. Delay (or latency) is the
time it takes for the packet to arrive at its destination. Jitter describes how the voice packets
arrive at the destination at varying intervals (not in a steady, consistent stream). report this ad
2. A network engineer performs a ping test and receives a value that shows the time it
takes for a packet to travel from a source to a destination device and return. Which term
CCNA v7.0 Exam Answers
describes the value?
CCNA 1 - v7 CCNA 2 - v7 CCNA 3 - v7
43
jitter
latency System Test Exam
priority
bandwidth Modules 1 - 3: Basic Network
x
Connectivity and Communications
3. What role do network devices play in the IntServ QoS model?
Exam Answers
Network devices ensure that resources are available before traffic is allowed to be
sent by a host through the network. Modules 4 - 7: Ethernet Concepts
Network devices provide a best-effort approach to forwarding traffic. Exam Answers
Network devices are configured to service multiple classes of traffic and handle traffic as it
Modules 8 - 10: Communicating
may arrive.
Between Networks Exam Answers
Network devices use QoS on a hop-by-hop basis to provide excellent scalability.
4. Which device would be classified as a trusted endpoint? Modules 11 - 13: IP Addressing Exam
Answers
switch
router Modules 14 - 15: Network Application
firewall Communications Exam Answers
IP phone
Modules 16 - 17: Building and
Securing a Small Network Exam
Explanation: Trusted endpoints are devices that have the capability to mark application Answers
traffic at Layer 2 or Layer 3. Trusted endpoints include the following:
– IP phones [PT Skills] Practice PT Skills
– Wireless access points Assessment (PTSA)
– Videoconferencing gateways and systems
[Final Skills] ITN Final Skills Exam
– IP conferencing stations and more
(PTSA)
5. What is the benefit of deploying Layer 3 QoS marking across an enterprise network? ITNv7 Practice Final Exam
Recent Comments
IT Administrator on 13.2.7 Packet Tracer – Use
Ping and Traceroute to Test Network
7. What are two approaches to prevent packet loss due to congestion on an interface? Connectivity (Answers)
(Choose two.)
Arif on 13.2.7 Packet Tracer – Use Ping and
Decrease buffer space. Traceroute to Test Network Connectivity
Disable queuing mechanisms. (Answers)
Drop lower-priority packets.
Adeboye on What Is a syslog facility?
Prevent bursts of traffic.
Increase link capacity. BBQ Joe on CCNA 1 v7.0 Final Exam Answers
Full – Introduction to Networks
Explanation: There are three approaches to prevent sensitive traffic from being dropped: nedo nedo on CCNA (200-301) Certification
Increase link capacity to ease or prevent congestion. Practice Exam Answers (ENSA v7.0)
Guarantee enough bandwidth and increase buffer space to accommodate bursts of
traffic from fragile flows.
Prevent congestion by dropping lower-priority packets before congestion occurs.
43
8. What configuration scenario would offer the most protection to SNMP get and set
messages?
x
SNMPv2 for in-band management with read-write community strings
SNMPv1 with out-of-band management in a private subnet
SNMPv3 configured with the auth security level
SNMP community strings
Explanation: SNMPv3 supports authentication and encryption with the auth and priv
security levels. SNMPv1 and SNMPv2 do not support authentication or encryption. Using a
default community string is not secure because the default string of “public” is well known
and would allow anyone with SNMP systems to read device MIBs.
report this ad
9. Refer to the exhibit. The network administrator enters these commands into the R1
router:
When the router prompts for an address or remote host name, what IP address should the
administrator enter at the prompt?
192.168.9.254
192.168.10.2
192.168.11.252
192.168.11.254
192.168.10.1
Explanation: The requested address is the address of the TFTP server. A TFTP server is
an application that can run on a multitude of network devices including a router, server, or
even a networked PC.
10. The command ntp server 10.1.1.1 is issued on a router. What impact does this
command have?
Explanation: The ntp server ip-address global configuration command configures the NTP
43 server for IOS devices.
x
11. As the network administrator you have been asked to implement EtherChannel on the
corporate network. What does this configuration consist of?
access and core layers collapsed into one tier, and the distribution layer on a separate tier
distribution and core layers collapsed into one tier, and the access layer on a
separate tier
access, distribution, and core layers collapsed into one tier, with a separate backbone layer
access and distribution layers collapsed into one tier, and the core layer on a separate tier
Explanation: Maintaining three separate network tiers is not always required or cost-
efficient. All network designs require an access layer, but a two-tier design can collapse the
distribution and core layers into one layer to serve the needs of a small location with few
users.
13. What are two reasons to create a network baseline? (Choose two.)
Explanation: A network baseline is created to provide a comparison point, at the time that
the network is performing optimally, to whatever changes are implemented in the
infrastructure. A baseline helps to keep track of the performance, to track the traffic patterns,
and to monitor network behavior.
14. A computer can access devices on the same network but cannot access devices on
other networks. What is the probable cause of this problem?
Explanation: The default gateway is the address of the device a host uses to access the
Internet or another network. If the default gateway is missing or incorrect, that host will not
be able to communicate outside the local network. Because the host can access other hosts
on the local network, the network cable and the other parts of the IP configuration are
working.
15. In which step of gathering symptoms does the network engineer determine if the
43 problem is at the core, distribution, or access layer of the network?
x
Gather information.
Narrow the scope.
Document the symptoms.
Determine ownership.
Determine the symptoms.
Explanation: In the “narrow the scope” step of gathering symptoms, a network engineer will
determine if the network problem is at the core, distribution, or access layer of the network.
Once this step is complete and the layer is identified, the network engineer can determine
which pieces of equipment are the most likely cause.
16. A network administrator is deploying QoS with the ability to provide a special queue
for voice traffic so that voice traffic is forwarded before network traffic in other queues.
Which queuing method would be the best choice?
LLQ
CBWFQ
WFQ
FIFO
Explanation: Low latency queuing (LLQ) allows delay-sensitive data, such as voice traffic,
to be defined in a strict priority queue (PQ) and to always be sent first before any packets in
any other queue are forwarded.
Explanation: Voice traffic does not consume a lot of network resources, such as bandwidth.
However, it is very sensitive to delay and dropped packets cannot be retransmitted. For good
voice quality, the amount of latency should always be less than 150 milliseconds.
18. Which type of network traffic cannot be managed using congestion avoidance tools?
TCP
43
ICMP
IP
UDP
x
Explanation: Queuing and compression techniques can help to reduce and prevent UDP
packet loss, but there is no congestion avoidance for User Datagram Protocol (UDP) based
traffic.
19. When QoS is implemented in a converged network, which two factors can be
controlled to improve network performance for real-time traffic? (Choose two.)
delay
packet addressing
jitter
packet routing
link speed
Explanation: Delay is the latency between a sending and receiving device. Jitter is the
variation in the delay of the received packets. Both delay and jitter need to be controlled in
order to support real-time voice and video traffic.
20. An administrator wants to replace the configuration file on a Cisco router by loading a
new configuration file from a TFTP server. What two things does the administrator need to
know before performing this task? (Choose two.)
Explanation: In order to identify the exact location of the desired configuration file, the IP
address of the TFTP server and the name of the configuration file are essential information.
Because the file is a new configuration, the name of the current configuration file is not
necessary.
21. Refer to the exhibit. Which of the three Cisco IOS images shown will load into RAM?
The router selects an image depending on the boot system command in the
configuration.
The router selects an image depending on the value of the configuration register.
The router selects the third Cisco IOS image because it is the most recent IOS image.
The router selects the third Cisco IOS image because it contains the advipservicesk9
image.
The router selects the second Cisco IOS image because it is the smallest IOS image.
Explanation: When performing an upgrade or testing different IOS versions, the boot
system command is used to select which image is used to boot the Cisco device.
22. Refer to the exhibit. What two types of devices are connected to R1? (Choose two.)
43
x
switch
hub
router
repeater
Source Route Bridge
Explanation: The capabilities of the devices displayed by the output show them to be a
Cisco 2811 series router, Cisco 1941 series router, and a Cisco 2960 switch.
23. What are three functions provided by the syslog service? (Choose three.)
Explanation: There are three primary functions provided by the syslog service:
1. gathering logging information
2. selection of the type of information to be logged
3. selection of the destination of the logged information
24. What is the function of the MIB element as part of a network management system?
Explanation: The Management Information Base (MIB) resides on a networking device and
stores operational data about the device. The SNMP manager can collect information from
SNMP agents. The SNMP agent provides access to the information.
25. What network design would contain the scope of disruptions on a network should a
failure occur?
the reduction in the number of redundant devices and connections in the network core
the installation of only enterprise class equipment throughout the network
the deployment of distribution layer switches in pairs and the division of access layer
switch connections between them
the configuration of all access layer devices to share a single gateway
Explanation: One way to contain the impact of a failure on the network is to implement
redundancy. One way this is accomplished is by deploying redundant distribution layer
switches and dividing the access layer switch connections between the redundant
distribution layer switches. This creates what is called a switch block. Failures in a switch
block are contained to that block and do not bring down the whole network.
26. Which action should be taken when planning for redundancy on a hierarchical network
design?
increased flexibility
increased network management options
decreased number of critical points of failure
reduced costs
increased bandwidth availability
Explanation: Wireless connectivity at the access layer provides increased flexibility, reduced
costs, and the ability to grow and adapt to changing business requirements. Utilizing
wireless routers and access points can provide an increase in the number of central points of
failure. Wireless routers and access points will not provide an increase in bandwidth
availability.
28. What is a basic function of the Cisco Borderless Architecture access layer?
29. Which characteristic would most influence a network design engineer to select a
multilayer switch over a Layer 2 switch?
ability to have multiple forwarding paths through the switched network based on VLAN
number(s)
ability to build a routing table
ability to provide power to directly-attached devices and the switch itself
ability to aggregate multiple ports for maximum data throughput
Explanation: Multilayer switches, also known as Layer 3 switches, can route and build a
routing table. This capability is required in a multi-VLAN network and would influence the
network designer to select a multilayer switch. The other options are features also available
on Layer 2 switches, so they would not influence the decision to select a multilayer switch.
30. Refer to the exhibit. Why are routers R1 and R2 not able to establish an OSPF
adjacency?
whenever high network use is detected, so that how the network performs under stress can
be monitored
during quiet vacation periods, so that the level of non-data traffic can be determined
at the same time each day across a set period of average working days, so that
typical traffic patterns can be established
at random times during a 10 week period, so that abnormal traffic levels can be detected
32. Refer to the exhibit. A user has configured a NIC on the PC as shown but finds that the
PC is unable to access the Internet. What is the problem?
Explanation: In order for a computer to communicate outside its network, it must have a
valid default gateway configured.This address cannot be the same as the IP address of the
computer.
33. Refer to the exhibit. A network engineer configured an ACL preventing Telnet and
HTTP access to the HQ web server from guest users in the Branch LAN. The address of
the web server is 192.168.1.10 and all guest users are assigned addresses in the
192.168.10.0/24 network. After implementing the ACL, no one can access any of the HQ
servers. What is the problem?
43
x
Inbound ACLs must be routed before they are processed.
The ACL is implicitly denying access to all the servers.
Named ACLs require the use of port numbers.
The ACL is applied to the interface using the wrong direction.
Explanation: Both named and numbered ACLs have an implicit deny ACE at the end of the
list. This implicit deny blocks all traffic.
34. Refer to the exhibit. A network administrator has configured OSPFv2 on the two Cisco
routers as shown. PC1 is unable to connect to PC2. What should the administrator do first
when troubleshooting the OSPFv2 implementation?
Explanation: A prerequisite for OSPFv2 neighbor relationships to form between two routers
is Layer 3 connectivity. A successful ping confirms that a router interface is active and may
be able to form an OSPF neighbor adjacency.
35. What type of traffic is described as requiring latency to be no more than 150
milliseconds (ms)?
voice
video
data
36. A network manager wants to add a time to log messages so that there is record of
when the message was generated. What command should the administrator use on a
Cisco router?
43
x
38. Match the borderless switched network guideline description to the principle. (Not all
options are used.)
39. What are two characteristics of the best-effort QoS model? (Choose two.)
Explanation: The best-effort QoS model provides no guarantees and it is commonly used
on the Internet. The best-effort QoS model treats all network packets in the same way.
40. Why is QoS an important issue in a converged network that combines voice, video,
and data communications?
Explanation: Without any QoS mechanisms in place, time-sensitive packets, such as voice
and video, will be dropped with the same frequency as email and web browsing traffic.
x
41. A network administrator configures a router with the command sequence:
R1(config)# boot system tftp://c1900-universalk9-mz.SPA.152-4.M3.bin
R1(config)# boot system rom
On next reboot, the router will load the IOS image from ROM.
The router will search and load a valid IOS image in the sequence of flash, TFTP, and ROM.
The router will copy the IOS image from the TFTP server and then reboot the system.
The router will load IOS from the TFTP server. If the image fails to load, it will load the
IOS image from ROM.
Explanation: The boot system command is a global configuration command that allows the
user to specify the source for the Cisco IOS Software image to load. In this case, the router
is configured to boot from the IOS image that is stored on the TFTP server and will use the
ROMmon imagethat is located in the ROM if it fails to locate the TFTP server or fails to load
a valid image from the TFTP server.
An SNMP agent that resides on a managed device collects information about the device
and stores that information remotely in the MIB that is located on the NMS.
A set request is used by the NMS to change configuration variables in the agent
device.
An NMS periodically polls the SNMP agents that are residing on managed devices by using
traps to query the devices for data.
A get request is used by the SNMP agent to query the device for data.
Explanation: An SNMP agent that resides on a managed device collects and stores
information about the device and its operation. This information is stored by the agent locally
in the MIB. An NMS periodically polls the SNMP agents that are residing on managed
devices by using the get request to query the devices for data.
43. Refer to the exhibit. A network administrator issues the show lldp neighbors command
on a switch. What are two conclusions that can be drawn? (Choose two.)
Explanation: In the output from the show lldp command, under Capability, R indicates a
router and B indicates a bridge (switch). Nothing indicates that Dev1 and Dev2 are
connected to one another.
44. What are the three layers of the switch hierarchical design model? (Choose three.)
distribution
network access
data link
enterprise
access
core
Explanation: The access layer is the lowest layer and it provides network access to users.
The distribution layer has many functions, but it aggregates data from the access layer,
43 provides filtering, policy control, and sets Layer 3 routing boundaries. The core layer
provides high speed connectivity.
45. Refer to the exhibit. Which devices exist in the failure domain when switch S3 loses
power?
x
S4 and PC_2
PC_3 and PC_2
PC_3 and AP_2
S1 and S4
AP_2 and AP_1
Explanation: A failure domain is the area of a network that is impacted when a critical
device such as switch S3 has a failure or experiences problems.
This is network application software that prevents the failure of a single network device.
The failure of a switch block will not impact all end users.
This is a security feature that is available on all new Catalyst switches.
A single core router provides all the routing between VLANs.
Explanation: The configuration of a switch block provides redundancy so that the failure of
a single network device generally has little or no effect on end users.
47. Which troubleshooting tool would a network administrator use to check the Layer 2
header of frames that are leaving a particular host?
knowledge base
protocol analyzer
CiscoView
baselining tool
43
Explanation: A protocol analyzer such as Wireshark is capable of displaying the headers of
data at any OSI Layer.
48. Refer to the exhibit. R1 and R3 are connected to each other via the local serial 0/0/0 x
interface. Why are they not forming an adjacency?
They have different routing processes.
They have different router IDs.
They are in different subnets.
The connecting interfaces are configured as passive.
Explanation: The routers need to be in the same subnet in order to form an adjacency. The
routing processes can be different on each router. The router IDs must be different for
routers that participate in the same routing domain. The interfaces are not passive.
video
data
voice
50. A network manager wants lists the contents of flash. What command should the
administrator use on a Cisco router?
buffering
latency
queuing
jitter
Explanation: Jitter is the variation in the latency or delay of received packets. When data is
sent, packets are sent in a continuous stream and are spaced evenly apart. Because of
network congestion, the delay between each packet can vary instead of remaining constant.
52. A user is unable to reach the website when typing http://www.cisco.com in a web
browser, but can reach the same site by typing http://72.163.4.161 . What is the issue?
43
x
DHCP
DNS
Default Gateway
TCP/IP Protocol stack
Audio
Video
Data
Voice
54. A network manager wants to determine the size of the Cisco IOS image file on the
networking device. What command should the administrator use on a Cisco router?
show flash:0
copy flash: tftp:
config-register 0x2102
confreg 0x2142
55. What is the principle that is applied when a network technician is troubleshooting a
network fault by using the divide-and-conquer method?
Testing is performed at Layer 7 and at Layer 1, then at Layers 6 and 2, and so on, working
towards the middle of the stack until all layers are verified as operational.
Once it is verified that components in a particular layer are functioning properly, it
can then be assumed that components in the layers below it are also functional.
Testing is performed at all layers of the OSI model until a non-functioning component is
found.
Once it is verified that a component in a particular layer is functioning properly, testing can
then be performed on any other layer.
Explanation: The nature of the OSI and TCP/IP layered models is that upper layers are
dependent on lower layers. So when troubleshooting, if a particular layer is found to be
working correctly then it can be assumed that all layers below it are also functioning
correctly.
56. Which queuing algorithm has only a single queue and treats all packets equally?
CBWFQ
FIFO
LLQ
WFQ
57. What type of traffic is described as traffic that requires at least 30 Kbps of bandwidth?
voice
data
video
58. What type of traffic is described as being able to tolerate a certain amount of latency,
jitter, and loss without any noticeable effects?
voice
video
data
59. A network manager wants to view the amount of available and free memory, the type of
file system, and its permissions. What command should the administrator use on a Cisco
router?
x
voice
data
video
61. What type of traffic is described as consisting of traffic that requires a higher priority if
interactive?
data
voice
video
62. A network manager wants to configure the router to load a new image from flash
during bootup. What command should the administrator use on a Cisco router?
data
video
voice
64. A network manager wants to ensure that the device will ignore the startup config file
during startup and bypass the required passwords. What command should the
administrator use on a Cisco router?
copy usbflash0:/R1-Config
copy running-config tftp
confreg 0x2142
config-register 0x2102
65. What type of traffic is described as having a high volume of data per packet?
video
voice
data
66. A network manager wants to backup the running configuration to a file server. What
command should the administrator use on a Cisco router?
cd usbflash0:
show file systems
copy running-config tftp
43 dir
67. What type of traffic is described as consisting of traffic that gets a lower priority if it is
not mission-critical?
voice x
data
video
Enterprise Networking, Security, and Automation (Version 7.00) –
Optimize, Monitor, and Troubleshoot Networks Exam PDF
report this ad
43 COMMENTS
An administrator wants to replace the configuration file on a Cisco router by loading a new
configuration file from a TFTP server. What two things does the administrator need to know
before performing this task? (Choose two.)
router IP address
TFTP server IP address
name of the configuration file that is currently stored on the router
configuration register value
name of the configuration file that is stored on the TFTP server
In order to identify the exact location of the desired configuration file, the IP address of the
TFTP server and the name of the configuration file are essential information. Because the file
is a new configuration, the name of the current configuration file is not necessary.
3 0 Reply
how long ago did you review the cisco exam to verify the answer please
According to other pages they indicate that the correct one that Cisco has in its exam is:
VIDEO, although we know that it is not the correct one, we also have to take into account that
the Cisco EXAM is not PERFECT and has errors …..
So I ask which is the correct one according to the last CISCO exam please.
43
2 0 Reply
A network manager wants to backup the running configuration to a file server. What command
should the administrator use on a Cisco router?
cd usbflash0:
show file systems
copy running-config tftp
dir
3 0 Reply
What type of traffic is described as consisting of traffic that gets a lower priority if it is
not mission-critical?
voice
data
video <– wrong answer
A network manager wants to ensure that the device will ignore the startup config file during
startup and bypass the required passwords. What command should the administrator use on a
Cisco router?
copy usbflash0:/R1-Config
copy running-config tftp
confreg 0x2142
config-register 0x2102
43
voice
data
video
0 0 Reply
A network manager wants to configure the router to load a new image from flash during
bootup. What command should the administrator use on a Cisco router?
boot system
clock set 14:25:00 nov 13 2018
0 -1 Reply
What type of traffic is described as having a high volume of data per packet?
video ***
voice
data
0 0 Reply
* data
* video
* voice
0 0 Reply
A network manager wants to configure the router to load a new image from flash during
bootup. What command should the administrator use on a Cisco router?
A network manager wants to configure the router to load a new image from flash during
bootup. What command should the administrator use on a Cisco router?
boot system
copy flash: tftp:
43 copy tftp startup-config
clock set 14:25:00 nov 13 2018
0 0 Reply
x
0 0 Reply
What type of traffic is described as having a high volume of data per packet?
video
voice
data
3 0 Reply
Questions to correct :
the answer is : Once it is verified that components in a particular layer are functioning properly,
it can then be assumed that components in the layers below it are also functional.
Additional Question:
What type of traffic is described as consisting of traffic that requires a higher priority if
interactive?
1-voice
2-vedio
3-data
That is based on the exam i have already did and received a feedback of the wrong questions.
Best Regards
Eman
¿Qué tipo de tráfico se describe como que requiere una latencia de no más de 400
milisegundos (ms)?
(respueta) vídeo
datos
voz
0 0 Reply
A Network maager wants to view the amount of available and free memory,the type of file
system,and it’s permissions.what command should the administrator use on a cisco router?
show file system
lldp enable
clock timezone PST-7
ntp server 10.10.14.9
The Answer is :
show file system :)
43
0 0 Reply
x
Marlon Goochey 2 years ago
11
A network manager wants to view the amount of available and free memory, the type of file