Network Technologies and Troubleshooting FAQ

Why Categorize Networks by Size?

The complexity of networking increases as the size of a network grows. Categorizing networks by size helps to understand and manage this complexity effectively.

PPP Characteristics

Which two statements are true regarding a PPP? (Select 2)

  • LCP tests the quality of the link.
  • LCP manages link establishment and termination.

Disadvantages of Packet-Switched Networks

What is a disadvantage of a packet-switched network compared to a circuit-switched network?

Higher latency due to variable packet delays.

Dense Wavelength Division Multiplexing (DWDM)

Which statement describes a characteristic of DWDM?

It can be used with fiber-optic cabling to increase data capacity.

Troubleshooting Access Control Lists (ACLs)

Refer to the exhibit. A network administrator is troubleshooting an ACL issue. What is the likely cause of the problem?

There is an incorrect wildcard mask in the ACL configuration.

VPN Client Software

The security policy in a company specifies that VPN clients must use specific software. What type of VPN is this?

VPN client software.

Troubleshooting Network Address Translation (NAT)

A network administrator is troubleshooting a NAT configuration. Which command is useful for this purpose?

R2# show ip nat statistics

Frame Relay Layer 2 PDU

Which three parts are included in a Frame Relay Layer 2 PDU? (Select 3)

  • The FECN bit
  • The BECN bit
  • The DE bit

Public Key Cryptography

Which two statements correctly describe aspects of public key cryptography? (Select 2)

  • Public key cryptography uses a public key for encryption and a private key for decryption.
  • Encryption and decryption are performed using a pair of keys: a public key and a private key.

WAN Technology for Backup Connectivity

Which WAN technology can serve as a backup for a primary connection?

MPLS

Checking Frame Relay PVC Status

Which command can be used to check the status of a Frame Relay PVC?

show frame-relay pvc

Remote Access VPNs

Which two statements describe remote access VPNs? (Select 2)

  • Client software is usually required to establish a remote access VPN connection.
  • Remote access VPNs support the needs of telecommuters and mobile users.

Configuring Multilink PPP

Refer to the exhibit. Which three steps are required to configure Multilink PPP? (Select 3)

  • Assign the serial interfaces to a multilink bundle.
  • Create and configure a multilink interface.
  • Enable PPP encapsulation on the serial interfaces.

Network Problems at Layer 2

What are two examples of network problems that occur at Layer 2?

  • Framing errors
  • Encapsulation errors

Protocol for ISP Authentication

What is the protocol that provides ISPs with a method for authenticating user connections?

PPPoE

SSL VPN Requirements

What is required for a host to use an SSL VPN to connect to a remote network?

A web browser with SSL support.

Troubleshooting Static Routes

Refer to the exhibit. A network administrator has implemented a static route, but it is not working. What is the likely cause?

The broadcast keyword is missing from the static route configuration.

Configuring NAT

Refer to the exhibit. An administrator is configuring NAT. What is the purpose of the command marked with an arrow?

The NAT inside source list command defines which internal addresses will be translated.

Dual-Homed WAN Connection

A company connects to one ISP using two separate connections. What type of connection is this?

Dual-homed.

Interpreting Ping Results

Refer to the exhibit. On the basis of the output, what can be concluded? (Select 2)

  • There is connectivity between the source and destination devices.
  • There are 4 successful pings out of 5 attempts.

PPP Link Termination

A network administrator is configuring a PPP link with CHAP authentication. What happens if the remote router does not support CHAP?

The PPP link will be closed.

IEEE Standard for WiMAX

Which IEEE standard defines the WiMAX technology?

802.16

AAA Flows

Which three flows are associated with consumer AAA operations? (Select 3)

  • Accounting
  • Network access control
  • Billing

Port Forwarding

Refer to the exhibit. What kind of NAT is being configured?

Port forwarding.

Default Location for Cisco Configuration Files

What is the default location for Cisco configuration files on a router?

Console port.

Data Gathering with NetFlow

In the data gathering process, which type of device is used to collect traffic statistics?

NetFlow collector.

Frame Relay and Physical Circuits

What is a characteristic of Frame Relay that allows multiple logical circuits to share a single physical circuit?

The physical circuits are virtualized, allowing multiple virtual circuits to be established over a single physical link.

SNMP Trap Messages

Which SNMP message type informs the network management system (NMS) of an event?

Trap.

SNMP Management Information Bases (MIBs)

Which statement is a characteristic of SNMP MIBs?

The NMS must have access to the MIB to manage a device.

NAT64 Functionality

What benefit does NAT64 provide?

It allows sites to connect IPv6-only hosts to IPv4 networks.

ADSL Service Behavior

What is the expected behavior of an ADSL service regarding upload and download rates?

The download rate is typically faster than the upload rate.

Frame Relay DLCI

The DLCI number assigned to a Frame Relay circuit is locally significant. What does this mean? (Select 3)

  • The DLCI identifies a virtual circuit between the source and destination devices.
  • The DLCI has local significance and may be different at each end of the virtual circuit.
  • Frame Relay uses DLCIs to distinguish between different virtual circuits on a single physical link.

Troubleshooting Windows PC Connectivity

A group of Windows PCs in a new subnet cannot connect to the internet. Which three commands are useful for troubleshooting? (Select 3)

  • ping
  • nslookup
  • ipconfig

Troubleshooting Static Route Configuration

Refer to the exhibit. Router R1 was configured with a static route, but connectivity is not working. What is the likely cause?

There is a problem with the next-hop address in the static route configuration.

Broadband Technology for Remote Locations

Which broadband technology would be most suitable for a user in a remote location with no cellular or wired access?

Fiber-to-the-home.

Determining Inside Local IP Address

Refer to the exhibit. The inside local IP address of PC-A is not being translated. What is the likely inside local IP address of PC-A?

209.165.202.133

Site-to-Site VPNs

What is a type of VPN that is generally used to connect entire networks at different sites?

Site-to-site.

DSL Characteristics

Which two statements about DSL technology are true? (Select 2)

  • User connections are aggregated at a DSLAM before being passed to the internet.
  • The local loop connects the customer premises to the DSLAM.

Syslog Message Interpretation

Refer to the exhibit. Which three events will occur as a result of the syslog configuration? (Select 3)

  • Only traffic that matches the ACL will be logged.
  • Messages lower than level 4 will be sent to the configured destination.
  • Messages will include the IP address of the interface closest to the destination.

Time-Division Multiplexing (TDM)

Which two characteristics describe time-division multiplexing (TDM)? (Select 2)

  • Traffic is allocated a specific time slot on the transmission medium.
  • Data capacity across a single link is shared among multiple channels by allocating time slots.

Specialized Troubleshooting Tools

Which two specialized troubleshooting tools are used for in-depth traffic analysis? (Select 2)

  • Network Analysis Module (NAM)
  • Portable network analyzer

Enterprise WAN Implementation

Which circumstance would result in an enterprise deciding to implement a corporate WAN?

When its employees are dispersed geographically and need to connect to the central office.

Secure Encryption Algorithm

Which algorithm is considered a secure option for encrypting data?

3DES.

Advantages of Modular Network Design

What is one advantage of designing a network with distinct modules?

Failure in one module can be isolated from other modules.

Secure Remote Access Technologies

Which two technologies are implemented by organizations to support secure remote access for teleworkers? (Select 2)

  • VPN
  • IPsec

Responsibility for Leased Line Issues

A branch office uses a leased line to connect to the corporate network. Who is responsible for troubleshooting issues on the leased line?

The service provider.

Configured IP Address on an Interface

Refer to the exhibit. Which IP address is configured on the Serial0/0/0 interface of the Branch router?

209.165.202.133.

Voice Channels in a T1 Circuit

How many 64 kb/s voice channels are available in a T1 circuit?

24.

Data Center Module

Which network module maintains the resources that employees, partners, and customers rely on for effective communication?

Data center.

Broadband Solution for Home Users

Which broadband solution is appropriate for a home user who needs a wired connection with high bandwidth?

Cable.

Port-Based Network Access Control

A network administrator is asked to design a system to monitor and control network access based on device compliance. What is this system called?

Port-based Network Access Control.

Message Digest Functionality

What is the purpose of a message digest in secure communications?

It ensures that the message has not changed in transit.

Traffic Prioritization with IPsec

Which type of traffic would most likely be prioritized when using IPsec for secure communication?

IPsec.

Troubleshooting Authentication Delays

Users are reporting longer delays in authentication. What should be checked to investigate the issue?

The network performance baseline.

Benefits of Frame Relay

What are three benefits of using Frame Relay for WAN connectivity? (Select 3)

  • Mature technology.
  • One physical interface can support multiple virtual circuits.
  • Reasonable cost compared to other WAN technologies.

Information Provided by SNMP

What type of information is provided by SNMP to monitor network devices?

Traffic statistics.

PPPoE Requirement

Which technology requires the use of PPPoE to provide PPP connections to customers?

DSL.

WAN Connection Categories

Under which two categories of WAN connections does Frame Relay fall? (Select 2)

  • Packet-switched
  • Private infrastructure

Generic Routing Encapsulation (GRE) Characteristics

What are three characteristics of the generic routing encapsulation (GRE) protocol? (Select 3)

  • GRE tunnels encapsulate multiple Layer 3 protocols over a single-protocol backbone.
  • GRE creates virtual point-to-point links to remote routers.
  • By default, GRE does not include any security mechanisms.

Offering Internet Access on Public Transportation

An intercity bus company wants to offer internet access to passengers. Which two technologies are suitable for this purpose? (Select 2)

  • Cellular
  • Public infrastructure

Default Event Logging Destination

What is used as the default event logging destination for Cisco routers and switches?

Console line.