tshoot ch 1

Upload: liketotally

Post on 07-Apr-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/3/2019 TSHOOT ch 1

    1/4

    What are two motivations for measuring network performance? (Choose two.)

    capacity planning

    controlling traffic flow

    diagnosing performance problems

    increasing network security

    monitoring user activity

    troubleshooting logging activity

    When should high-impact network changes be made on a production network?

    immediately

    during regular business hours

    during peak network traffic times

    during scheduled maintenance windows

    Which two network maintenance tasks should be performed as part of a network maintenance plan?

    (Choose two.)

    network monitoring

    IP address administration

    service-level agreement compliance

    command line device management

    accommodating adds, moves, and changes

    Which two network procedures should all network maintenance plans include? (Choose two).

    replacing failed devices

    determining business hours

    accommodating adds, moves, and changes

    establishing a list of non-essential applications

    responding to all external queries

    What are two benefits of scheduling maintenance as part of the network maintenance planning effort?

    (Choose two.)

    reduced network downtime

    more promotion of the use of a common calendar

    less need for network monitoringpredictable lead time for change requests

    immediate solutions to noncritical issues

    easier for budget planning purposes

    What are two benefits to a scheduled maintenance? (Choose two.)

    reduces network downtime

    allows failed devices to be corrected immediately

    allows the engineers to make the corrections during peak utilization times

    ensures software patches and backups are completed

    Why is it important to have a disaster recovery plan for a network?

    to reduce network costs

    to reduce downtime when a device failsto increase network capacity during peak times

    to increase network throughput during peak times

    What must be considered when creating configuration backups to be used during disaster recovery?

    a clear versioning and naming system

    service contract information

    exact hardware serial numbers

    location of single points of failure

  • 8/3/2019 TSHOOT ch 1

    2/4

    An administrator has a written procedure of the steps to follow if a device fails. Which two items should

    the administrator have in order to reduce the amount of downtime the failed device could cause? (Choose

    two.)

    existing IOS

    SNMP logs

    Cisco Feature Navigator

    copy of current configuration

    An administrator needs to ensure a server is created to store all network device backups. Which service

    should be enabled on the server to allow it to receive backups?

    Telnet

    CCP

    NTP

    FTP

    Which two statements are true about NTP servers in an enterprise network? (Choose two.)

    There can only be one NTP server on an enterprise network.

    All NTP servers synchronize directly to a stratum 1 time source.

    NTP servers at stratum 1 are directly connected to an authoritative time source.

    NTP servers ensure an accurate time stamp on logging and debugging information.

    NTP servers control the mean time between failures (MTBF) for key network devices.

    Which Cisco web-based resource provides a complete bill-of-materials based on selected hardware and

    software configurations?

    Cisco Power Calculator

    Cisco Feature Navigator

    Embedded Event Manager

    Dynamic Configuration Tool

    CiscoWorks Resource Manager Essentials

    What are two ways to simplify access to network maintenance documentation? (Choose two.)

    a wiki

    an issue tracking system

    SNMP Object NavigatorCisco Feature Navigator

    Cisco Dynamic Configuration Tool

    A network technician receives a report from a user about a connectivity issue to a branch office resource.

    The details of the issue are documented and assigned a priority. Another team member reviews the issue

    and researches how similar issues were resolved in the past. The issue is escalated to another team for

    resolution. What type of maintenance tool matches the process described?

    Management Information Base (MIB)

    Dynamic Configuration Tool

    issue tracking system

    syslog server logging system

    Which two actions are considered part of network monitoring and performance measurement? (Choosetwo.)

    measurement of network delay, jitter, or packet loss

    monitoring of interface status, interface load, CPU load, and memory usage

    monitoring the procedures used to install software, configurations, and licenses

    monitoring the performance of the tools required to transfer the software and configuration to the device

    ensuring the availability of documentation of the exact hardware part, serial, and service contract numbers

    for the devices

  • 8/3/2019 TSHOOT ch 1

    3/4

    Which network performance statistics should be measured in order to verify SLA compliance?

    NAT translation statistics

    device CPU and memory utilization

    packet round-trip time (RTT), jitter, and packet loss

    number of error messages that are logged on the syslog server

    Refer to the exhibit. Based on the information presented, why would a syslog server not receive debugging

    information?

    Debugging information cannot be sent to a syslog server.

    The logging trap 7 global configuration command still needs to be issued.

    The logging buffer is too small to store debugging information and must be increased.The logging console debugging global configuration command still needs to be issued.

    The logging monitor debugging global configuration command still needs to be issued.

    Successful disaster recovery is dependent on the existence of which two items? (Choose two.)

    network management personnel on-site 24/7

    up-to-date server patches

    software provisioning tools

    up-to-date hardware inventory

    well-defined trust boundaries

    Refer to the exhibit. A network administrator is tasked with creating a backup of the startup configuration

    for router R1 to a server with IP address 10.1.15.1. Which option will provide the most secure way to

    transfer the file?R1# copy startup-config ftp://10.1.15.1/R1-test.cfg

    R1# copy startup-config ftp://RED:[email protected]/R1-test.cfg

    R1# copy startup-config http://10.1.15.1/R1-test.cfg

    R1# copy startup-config https://10.1.15.1/R1-test.cfg

  • 8/3/2019 TSHOOT ch 1

    4/4

    Refer to the exhibit. A network administrator is tasked with creating a configuration archive for the

    configuration of R1. What would be the outcome of the displayed configuration?

    The current running configuration file will be archived after 10080 minutes on the remote server.

    The current running configuration file will be archived every 10080 minutes in the local flash memory.

    The current running configuration file will be archived any time running configuration is copied to

    NVRAM.

    The current running configuration file will be archived every 10080 minutes in the local flash memory andremote location.