Network Technologies and Troubleshooting FAQ
Why Categorize Networks by Size?
The complexity of networking increases as the size of a network grows. Categorizing networks by size helps to understand and manage this complexity effectively.
PPP Characteristics
Which two statements are true regarding a PPP? (Select 2)
- LCP tests the quality of the link.
- LCP manages link establishment and termination.
Disadvantages of Packet-Switched Networks
What is a disadvantage of a packet-switched network compared to a circuit-switched network?
Higher latency due to variable packet delays.
Dense Wavelength Division Multiplexing (DWDM)
Which statement describes a characteristic of DWDM?
It can be used with fiber-optic cabling to increase data capacity.
Troubleshooting Access Control Lists (ACLs)
Refer to the exhibit. A network administrator is troubleshooting an ACL issue. What is the likely cause of the problem?
There is an incorrect wildcard mask in the ACL configuration.
VPN Client Software
The security policy in a company specifies that VPN clients must use specific software. What type of VPN is this?
VPN client software.
Troubleshooting Network Address Translation (NAT)
A network administrator is troubleshooting a NAT configuration. Which command is useful for this purpose?
R2# show ip nat statistics
Frame Relay Layer 2 PDU
Which three parts are included in a Frame Relay Layer 2 PDU? (Select 3)
- The FECN bit
- The BECN bit
- The DE bit
Public Key Cryptography
Which two statements correctly describe aspects of public key cryptography? (Select 2)
- Public key cryptography uses a public key for encryption and a private key for decryption.
- Encryption and decryption are performed using a pair of keys: a public key and a private key.
WAN Technology for Backup Connectivity
Which WAN technology can serve as a backup for a primary connection?
MPLS
Checking Frame Relay PVC Status
Which command can be used to check the status of a Frame Relay PVC?
show frame-relay pvc
Remote Access VPNs
Which two statements describe remote access VPNs? (Select 2)
- Client software is usually required to establish a remote access VPN connection.
- Remote access VPNs support the needs of telecommuters and mobile users.
Configuring Multilink PPP
Refer to the exhibit. Which three steps are required to configure Multilink PPP? (Select 3)
- Assign the serial interfaces to a multilink bundle.
- Create and configure a multilink interface.
- Enable PPP encapsulation on the serial interfaces.
Network Problems at Layer 2
What are two examples of network problems that occur at Layer 2?
- Framing errors
- Encapsulation errors
Protocol for ISP Authentication
What is the protocol that provides ISPs with a method for authenticating user connections?
PPPoE
SSL VPN Requirements
What is required for a host to use an SSL VPN to connect to a remote network?
A web browser with SSL support.
Troubleshooting Static Routes
Refer to the exhibit. A network administrator has implemented a static route, but it is not working. What is the likely cause?
The broadcast keyword is missing from the static route configuration.
Configuring NAT
Refer to the exhibit. An administrator is configuring NAT. What is the purpose of the command marked with an arrow?
The NAT inside source list command defines which internal addresses will be translated.
Dual-Homed WAN Connection
A company connects to one ISP using two separate connections. What type of connection is this?
Dual-homed.
Interpreting Ping Results
Refer to the exhibit. On the basis of the output, what can be concluded? (Select 2)
- There is connectivity between the source and destination devices.
- There are 4 successful pings out of 5 attempts.
PPP Link Termination
A network administrator is configuring a PPP link with CHAP authentication. What happens if the remote router does not support CHAP?
The PPP link will be closed.
IEEE Standard for WiMAX
Which IEEE standard defines the WiMAX technology?
802.16
AAA Flows
Which three flows are associated with consumer AAA operations? (Select 3)
- Accounting
- Network access control
- Billing
Port Forwarding
Refer to the exhibit. What kind of NAT is being configured?
Port forwarding.
Default Location for Cisco Configuration Files
What is the default location for Cisco configuration files on a router?
Console port.
Data Gathering with NetFlow
In the data gathering process, which type of device is used to collect traffic statistics?
NetFlow collector.
Frame Relay and Physical Circuits
What is a characteristic of Frame Relay that allows multiple logical circuits to share a single physical circuit?
The physical circuits are virtualized, allowing multiple virtual circuits to be established over a single physical link.
SNMP Trap Messages
Which SNMP message type informs the network management system (NMS) of an event?
Trap.
SNMP Management Information Bases (MIBs)
Which statement is a characteristic of SNMP MIBs?
The NMS must have access to the MIB to manage a device.
NAT64 Functionality
What benefit does NAT64 provide?
It allows sites to connect IPv6-only hosts to IPv4 networks.
ADSL Service Behavior
What is the expected behavior of an ADSL service regarding upload and download rates?
The download rate is typically faster than the upload rate.
Frame Relay DLCI
The DLCI number assigned to a Frame Relay circuit is locally significant. What does this mean? (Select 3)
- The DLCI identifies a virtual circuit between the source and destination devices.
- The DLCI has local significance and may be different at each end of the virtual circuit.
- Frame Relay uses DLCIs to distinguish between different virtual circuits on a single physical link.
Troubleshooting Windows PC Connectivity
A group of Windows PCs in a new subnet cannot connect to the internet. Which three commands are useful for troubleshooting? (Select 3)
- ping
- nslookup
- ipconfig
Troubleshooting Static Route Configuration
Refer to the exhibit. Router R1 was configured with a static route, but connectivity is not working. What is the likely cause?
There is a problem with the next-hop address in the static route configuration.
Broadband Technology for Remote Locations
Which broadband technology would be most suitable for a user in a remote location with no cellular or wired access?
Fiber-to-the-home.
Determining Inside Local IP Address
Refer to the exhibit. The inside local IP address of PC-A is not being translated. What is the likely inside local IP address of PC-A?
209.165.202.133
Site-to-Site VPNs
What is a type of VPN that is generally used to connect entire networks at different sites?
Site-to-site.
DSL Characteristics
Which two statements about DSL technology are true? (Select 2)
- User connections are aggregated at a DSLAM before being passed to the internet.
- The local loop connects the customer premises to the DSLAM.
Syslog Message Interpretation
Refer to the exhibit. Which three events will occur as a result of the syslog configuration? (Select 3)
- Only traffic that matches the ACL will be logged.
- Messages lower than level 4 will be sent to the configured destination.
- Messages will include the IP address of the interface closest to the destination.
Time-Division Multiplexing (TDM)
Which two characteristics describe time-division multiplexing (TDM)? (Select 2)
- Traffic is allocated a specific time slot on the transmission medium.
- Data capacity across a single link is shared among multiple channels by allocating time slots.
Specialized Troubleshooting Tools
Which two specialized troubleshooting tools are used for in-depth traffic analysis? (Select 2)
- Network Analysis Module (NAM)
- Portable network analyzer
Enterprise WAN Implementation
Which circumstance would result in an enterprise deciding to implement a corporate WAN?
When its employees are dispersed geographically and need to connect to the central office.
Secure Encryption Algorithm
Which algorithm is considered a secure option for encrypting data?
3DES.
Advantages of Modular Network Design
What is one advantage of designing a network with distinct modules?
Failure in one module can be isolated from other modules.
Secure Remote Access Technologies
Which two technologies are implemented by organizations to support secure remote access for teleworkers? (Select 2)
- VPN
- IPsec
Responsibility for Leased Line Issues
A branch office uses a leased line to connect to the corporate network. Who is responsible for troubleshooting issues on the leased line?
The service provider.
Configured IP Address on an Interface
Refer to the exhibit. Which IP address is configured on the Serial0/0/0 interface of the Branch router?
209.165.202.133.
Voice Channels in a T1 Circuit
How many 64 kb/s voice channels are available in a T1 circuit?
24.
Data Center Module
Which network module maintains the resources that employees, partners, and customers rely on for effective communication?
Data center.
Broadband Solution for Home Users
Which broadband solution is appropriate for a home user who needs a wired connection with high bandwidth?
Cable.
Port-Based Network Access Control
A network administrator is asked to design a system to monitor and control network access based on device compliance. What is this system called?
Port-based Network Access Control.
Message Digest Functionality
What is the purpose of a message digest in secure communications?
It ensures that the message has not changed in transit.
Traffic Prioritization with IPsec
Which type of traffic would most likely be prioritized when using IPsec for secure communication?
IPsec.
Troubleshooting Authentication Delays
Users are reporting longer delays in authentication. What should be checked to investigate the issue?
The network performance baseline.
Benefits of Frame Relay
What are three benefits of using Frame Relay for WAN connectivity? (Select 3)
- Mature technology.
- One physical interface can support multiple virtual circuits.
- Reasonable cost compared to other WAN technologies.
Information Provided by SNMP
What type of information is provided by SNMP to monitor network devices?
Traffic statistics.
PPPoE Requirement
Which technology requires the use of PPPoE to provide PPP connections to customers?
DSL.
WAN Connection Categories
Under which two categories of WAN connections does Frame Relay fall? (Select 2)
- Packet-switched
- Private infrastructure
Generic Routing Encapsulation (GRE) Characteristics
What are three characteristics of the generic routing encapsulation (GRE) protocol? (Select 3)
- GRE tunnels encapsulate multiple Layer 3 protocols over a single-protocol backbone.
- GRE creates virtual point-to-point links to remote routers.
- By default, GRE does not include any security mechanisms.
Offering Internet Access on Public Transportation
An intercity bus company wants to offer internet access to passengers. Which two technologies are suitable for this purpose? (Select 2)
- Cellular
- Public infrastructure
Default Event Logging Destination
What is used as the default event logging destination for Cisco routers and switches?
Console line.