WAN Technologies CH 8-9 Exam

Anthony Schulmeister
Quiz by Anthony Schulmeister, updated more than 1 year ago
Anthony Schulmeister
Created by Anthony Schulmeister almost 4 years ago


WAN Technologies CH 8-9 Exam

Resource summary

Question 1

Refer to the exhibit. From what location have the syslog messages been retrieved?
  • syslog server
  • syslog client
  • router NVRAM
  • router RAM

Question 2

Which syslog message type is accessible only to an administrator and only via the Cisco CLI?
  • debugging
  • alerts
  • errors
  • emergency

Question 3

The command ntp server is issued on a router. What impact does this command have?
  • determines which server to send system log files to
  • ensures that all logging will have a time stamp associated with it
  • identifies the server on which to store backup configurations
  • synchronizes the clock of the device to the timeserver that is located at IP address

Question 4

A network administrator has issued the logging trap 4 global configuration mode command. What is the result of this command?
  • The syslog client will send to the syslog server event messages with an identification trap level of only 4.
  • After four events, the syslog client will send an event message to the syslog server.
  • The syslog client will send to the syslog server any event message that has a severity level of 4 and lower.
  • The syslog client will send to the syslog server any event message that has a severity level of 4 and higher.

Question 5

Which protocol is used by network administrators to track and gather statistics on TCP/IP packets that are entering or exiting network devices?
  • NTP
  • NetFlow
  • syslog
  • SNMP

Question 6

Which SNMP version uses weak community string-based access control and supports bulk retrieval?
  • SNMPv2c
  • SNMPv3
  • SNMPv1
  • SNMPv2Classic

Question 7

A network administrator issues two commands on a router: R1(config)# snmp-server host version 2c campus R1(config)# snmp-server enable traps What can be concluded after the commands are entered?
  • Traps are sent with the source IP address as
  • The snmp-server enable traps command needs to be used repeatedly if a particular subset of trap types is desired.
  • No traps are sent, because the notification-types argument was not specified yet.
  • If an interface comes up, a trap is sent to the server.

Question 8

Refer to the exhibit. While planning an upgrade, a network administrator uses the Cisco NetFlow utility to analyze data flow in the current network. Which protocol used the greatest amount of network time?
  • TCP-Telnet
  • UDP-other
  • TCP-other

Question 9

When SNMPv1 or SNMPv2 is being used, which feature provides secure access to MIB objects?
  • source validation
  • packet encryption
  • message integrity
  • community strings

Question 10

Which type of information can an administrator obtain with the show ip cache flow command?
  • the protocol that uses the largest volume of traffic
  • the configuration of the export parameters
  • the NetFlow version that is enabled
  • whether NetFlow is configured on the correct interface and in the correct direction

Question 11

A network administrator has issued the snmp-server user admin1 admin v3 encrypted auth md5 abc789 priv des 256 key99 command. What are two features of this command? (Choose two.)
  • Netflow requires UDP port 514 for notification messages
  • NetFlow can only be used if all devices on the network support it
  • Netflow can only be used in a unidirectional flow
  • NetFlow consumes additional memory
  • Netflow requires both management and agent software.

Question 12

What are the most common syslog messages?
  • output messages that are generated from debug output
  • link up and link down messages
  • those that occur when a packet matches a parameter condition in an access control list
  • error messages about hardware or software malfunctions

Question 13

Which destination do Cisco routers and switches use by default when sending syslog messages for all severity levels?
  • RAM
  • nearest syslog server
  • console

Question 14

Refer to the exhibit. What does the number 17:46:26.143 represent?
  • the time when the syslog message was issued
  • the time passed since the syslog server has been started
  • the time on the router when the show logging command was issued
  • the time passed since the interfaces have been up

Question 15

Refer to the exhibit. What can be concluded from the produced output?
  • This is the output of the show snmp command without any parameters
  • An ACL was configured to restrict SNMP access to an SNMP manager
  • The location of the device was not configured with the snmp-server location command
  • The system contact was not configured with the snmp-server contact command

Question 16

Which protocol or service can be configured to send unsolicited messages to alert the network administrator about a network event such as an extremely high CPU utilization on a router?
  • NetFlow
  • syslog
  • NTP
  • SNMP

Question 17

When logging is used, which severity level indicates that a device is unusable?
  • Critical - Level 2
  • Emergency - Level 0
  • Alert - Level 1
  • Error - Level 3

Question 18

Which protocol or service allows network administrators to receive system messages that are provided by network devices?
  • NetFlow
  • NTP
  • SNMP
  • syslog

Question 19

What is the most common purpose of implementing NetFlow in a networked environment?
  • to support accounting and monitoring with consumer applications
  • to passively capture changing events that occur in the network and to perform after-the-fact-analysis
  • to actively capture traffic from networked devices
  • to monitor live data usage and to control traffic flow with set messages

Question 20

Which statement describes SNMP operation?
  • A get request is used by the SNMP agent to query the device for data.
  • An NMS periodically polls the SNMP agents that are residing on managed devices by using traps to query the devices for data.
  • An SNMP agent that resides on a managed device collects information about the device and stores that information remotely in the MIB that is located on the NMS
  • A set request is used by the NMS to change configuration variables in the agent device.

Question 21

How does NetFlow function on a Cisco router or multilayer switch?
  • On 2960 switches, Netlow allows for data export.
  • NetFlow does not consume any additional memory
  • One user connection to an application exists as two NetFlow flows
  • Netflow captures and analyzes traffic

Question 22

Which SNMP feature provides a solution to the main disadvantage of SNMP polling?
  • SNMP set messages
  • SNMP community strings
  • SNMP trap messages
  • SNMP get messages

Question 23

A user in a large office calls technical support to complain that a PC has suddenly lost connectivity to the network. The technician asks the caller to talk to nearby users to see if other machines are affected. The caller reports that several immediate neighbors in the same department have a similar problem and that they cannot ping each other. Those who are seated in other departments have connectivity. What should the technician check as the first step in troubleshooting the issue?
  • the trunks between switches in the wiring closet
  • the cable that connects the PC of the caller to the network jack
  • the status of the departmental workgroup switch in the wiring closet
  • the cable connection between a PC and a network outlet that is used by a neighbor
  • the power outlet to the PC that is used by the caller

Question 24

When should a network performance baseline be measured?
  • after normal work hours to reduce possible interruptions
  • during normal work hours of an organization
  • immediately after the main network devices restarted
  • when a denial of service attack to the network is detected and blocked

Question 25

What is a purpose of establishing a network baseline?
  • It manages the performance of network devices
  • It provides a statistical average for network performance
  • It creates a point of reference for future network evaluations
  • It checks the security configuration of network devices

Question 26

A network technician is troubleshooting an email connection problem. Which question to the end-user will provide clear information to better define the problem?
  • When did you first notice your email problem?
  • What kind of equipment are you using to send emails?
  • How big are the emails you tried to send?
  • Is your email working now?

Question 27

In which step of gathering symptoms does the network engineer determine if the problem is at the core, distribution, or access layer of the network?
  • Document the symptoms
  • Narrow the scope.
  • Gather information
  • Determine ownership

Question 28

Which number represents the most severe level of syslog logging?
  • 10
  • 0
  • 1
  • 7
  • 100

Question 29

A team of engineers has identified a solution to a significant network problem. The proposed solution is likely to affect critical network infrastructure components. What should the team follow while implementing the solution to avoid interfering with other processes and infrastructure?
  • change-control procedures
  • knowledge base guidelines
  • one of the layered troubleshooting approaches
  • syslog messages and reports

Question 30

After which step in the network troubleshooting process would one of the layered troubleshooting methods be used?
  • documenting symptoms
  • determining ownership
  • narrowing the scope
  • gathering symptoms from suspect devices

Question 31

Which type of tool would an administrator use to capture packets that are going to and from a particular device?
  • baselining tool
  • protocol analyzer
  • NMS tool
  • knowledge base

Question 32

Which troubleshooting method begins by examining cable connections and wiring issues?
  • substitution
  • bottom-up
  • top-down
  • divide-and-conquer

Question 33

An administrator is troubleshooting an Internet connectivity problem on a router. The output of the show interfaces gigabitethernet 0/0 command reveals higher than normal framing errors on the interface that connects to the Internet. At what layer of the OSI model is the problem likely occurring?
  • Layer 1
  • Layer 2
  • Layer 3
  • Layer 4
  • Layer 7

Question 34

A company is setting up a web site with SSL technology to protect the authentication credentials required to access the web site. A network engineer needs to verify that the setup is correct and that the authentication is indeed encrypted. Which tool should be used?
  • baselining tool
  • fault-management tool
  • protocol analyzer
  • cable analyzer

Question 35

Which statement describes the physical topology for a LAN?
  • It defines how hosts and network devices connect to the LAN.
  • It shows the order in which hosts access the network
  • It describes whether the LAN is a broadcast or token-passing network
  • It depicts the addressing scheme that is employed in the LAN

Question 36

A network engineer is troubleshooting a network problem and can successfully ping between two devices. However, Telnet between the same two devices does not work. Which OSI layers should the administrator investigate next?
  • from the network layer to the application layer
  • from the network layer to the physical layer
  • only the network layer
  • all of the layers

Question 37

The newly configured ASBR that connects a company to the Internet has a default route configured and has the default-information originate command entered. Devices connected through this router can access the Internet. The problem is that no other OSPF routers have a default route in the routing table and no other users throughout the organization can access the Internet. What could be the problem?
  • The ASBR should use the exit_interface argument instead of next-hop on the default route
  • The other routers are not configured to accept LSA type 4s
  • The ASBR does not have OSPF configured
  • The ASBR does not have an OSPF neighbor.

Question 38

Users report that the new web site http://www.company1.biz cannot be accessed. The helpdesk technician checks and verifies that the web site can be accessed with http://www.company1.biz:90. Which layer in the TCP/IP model is involved in troubleshooting this issue?
  • internet
  • transport
  • application
  • network access

Question 39

A user reports that after an OS patch of the networking subsystem has been applied to a workstation, it performs very slowly when connecting to network resources. A network technician tests the link with a cable analyzer and notices that the workstation sends an excessive number of frames smaller than 64 bytes and also other meaningless frames. What is the possible cause of the problem?
  • corrupted application installation
  • corrupted NIC driver
  • cabling faults
  • Ethernet signal attenuation

Question 40

Which two specialized troubleshooting tools can monitor the amount of traffic that passes through a switch? (Choose two.)
  • DTX cable analyzer
  • portable network analyzer
  • digital multimeter
  • NAM
  • TDR

Question 41

A group of Windows PCs in a new subnet has been added to an Ethernet network. When testing the connectivity, a technician finds that these PCs can access local network resources but not the Internet resources. To troubleshoot the problem, the technician wants to initially confirm the IP address and DNS configurations on the PCs, and also verify connectivity to the local router. Which three Windows CLI commands and utilities will provide the necessary information? (Choose three.)
  • telnet
  • arp -a
  • netsh interface ipv6 show neighbor
  • tracert
  • ipconfig
  • nslookup
  • ping

Question 42

A networked PC is having trouble accessing the Internet, but can print to a local printer and ping other computers in the area. Other computers on the same network are not having any issues. What is the problem?
  • The link between the switch to which the PC connects and the default gateway router is down.
  • The PC has a missing or incorrect default gateway
  • The default gateway router does not have a default route
  • The switch port to which the PC connects has an incorrect VLAN configured

Question 43

An internal corporate server can be accessed by internal PCs, but not by external Internet users that should have access. What could be the issue?
  • The default gateway router for the server does not have a default route
  • The server does not have a private IP address assigned
  • Static NAT has not been configured properly or at all.
  • The switch port to which the server connects has an incorrect VLAN configured
Show full summary Hide full summary


WAN Technologies CH 6-7 Exam
Anthony Schulmeister
WAN Technologies CH 1-3 Exam
Anthony Schulmeister
WAN Technologies Final Exam CH 1-9
Anthony Schulmeister
WAN Technologies CH 4-5 Exam
Anthony Schulmeister
Networking Semester 4
Scott Coleman
GCSE History – The early years and the Weimar Republic 1918-1923
Ben C
French Revolution quiz
Sarah Egan
Theory of Knowledge Essay Preparation
Derek Cumberbatch
Core 1.12 Timbers blank test
T Andrews