• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/26

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

26 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)
Which of the SONA layers is used to interconnect IT resources across a converged network foundation?
Networked Infrastructure (Systems) layer
Cisco's Service Oriented Network Architecture (SONA) defines three layers. The Networked Infrastructure (Systems) layer is used to interconnect IT resources, including servers and clients, which are connected through the networking foundation.
Which of the SONA layers is used to maintain efficient allocation of resources between application and business processes?
Integrated Services layer
Cisco's Service Oriented Network Architecture (SONA) defines three layers. The Integrated Services layer is used to maintain efficient allocation of resources (network- and server-based) across the network infrastructure.
Which of the SONA layers is used to meet business requirements and achieve efficiencies through leveraging the other SONA layers?
Application layer
Cisco's Service Oriented Network Architecture (SONA) defines three layers. The Application layer includes business and collaboration applications, which should be used to meet business requirements and achieve efficiencies through leveraging the Integrated Services layer and the Networked Infrastructure layer.
Which of the hierarchical model layers includes the end users' connection into the enterprise network?
Access layer
The hierarchical model includes the Core, Distribution, and Access layers. The Access layer includes the connection to the end users of the enterprise network.
Which of the hierarchical model layers is where wiring closets are aggregated?
Distribution layer
The hierarchical model includes the Core, Distribution, and Access layers. The Distribution layer is where the wiring closets are aggregated from the Access layer devices.
Which of the hierarchical model layers is also referred to as the "backbone"?
Core layer
The hierarchical model includes the Core, Distribution, and Access layers. The Core layer is used to connect together all the different devices across a large network core; because of this, it is also called the backbone of the network.
What are some of the security technologies that can be used at the Access layer?
Port security, DHCP snooping, Portfast, IP Source Guard
Port security can be used to limit the number of devices and specify the source MAC address of allowed devices on a port. DHCP snooping keeps track of trusted and untrusted switch ports and only allows authorized DHCP traffic between them. A port is configured as trusted if the traffic coming from it is verified as a valid source; this is typically used on ports connected to a server in a secured location. Portfast is a feature that transitions a port immediately to the forwarding state and should only be used on ports with a single host device. IP Source Guard works similarly to DHCP snooping but only allows traffic that has either been statically configured or has been given a valid DHCP lease that has been monitored by the process.
At which layer of the hierarchical model is summarization and redistribution commonly configured?
Distribution layer
The Distribution layer is used to not only aggregate the different Access layer devices but to also provide routing services into the core and to other parts of the network. This can include summarizing IP networks and the redistribution of different routing protocols.
At which layer of the hierarchical model is Quality of Service commonly configured?
Distribution layer
The Distribution layer is responsible for many different services, including being where Quality of Service is typically used to mark traffic before entering the Core layer.
Which of the hierarchical model layers requires the highest level of redundancy?
Core layer
The Core layer connects together all other layers and thus requires the highest level of redundancy, so that it can continue working should a failure occur.
What is the recommended maximum number of buildings that can be configured without a Core layer?
Two
It is recommended that if a campus includes three or more buildings, a Core layer should be used.
When building a data center, what name is given to the Distribution or middle layer?
Aggregation layer
When building a data center, the Distribution layer is called the Aggregation layer. The different Access layer switches, which connect the various servers, aggregate at this layer.
When building a data center, which of the model layers are used to connect outside the data center?
Core layer
When building a data center infrastructure, the Core layer is used to transmit to and receive traffic from outside the data center. The Distribution layer or Aggregation layer is used to aggregate all the different Access layer components before entering the core.
Which of the traffic types that are used on switched networks includes Bridge Protocol Data Units (BPDU), Cisco Discovery Protocol (CDP) traffic, and Simple Network Management Protocol (SNMP) traffic?
Network management
Of the five major traffic types seen on modern switched networks, the network management traffic type includes BPDU, CDP, and SNMP traffic, as well as other network management protocol traffic.
Which of the traffic types that are used on switched networks includes IP/TV broadcasts and remote disk imaging traffic?
IP multicast
Both of these different technologies work through the use of IP multicast traffic. This type of traffic enables the application to send out a single stream of traffic and deliver it to only those devices that subscribe to it.
Which of the traffic types that are used on switched networks includes less-than-best-effort traffic?
Scavenger class
The scavenger class includes less-than-best-effort traffic; it can also include other traffic that exceeds the normal traffic bandwidth allowances.
Which of the traffic types that are used on switched networks is recommended for peer-to-peer networking traffic?
Scavenger class
Because a lot of peer-to-peer traffic is not very sensitive to bandwidth and delay restrictions, it is recommended that this type of traffic be placed in the Scavenger class.
Which traffic model has traffic flow directly between endpoints?
Peer-to-Peer model
There are two main traffic models: Peer-to-Peer and Client-Server. The Peer-to-Peer traffic model works by providing services directly between endpoints.
Which traffic model takes advantage of the cheaper bandwidth available in modern switched network environments?
Client-Server model
It used to be that having a server located on each segment was required for timely service access; however, with the cost of bandwidth going down with every generation of switching equipment, it has become more feasible for these servers to be located in a central location, where they can be easily maintained and supported.
At what location in the enterprise do public web servers and external email servers reside?
Client-Enterprise edge
The Client-Enterprise edge connects off of either the Core or the Distribution layer, depending on the specific situation. It connects the enterprise network with the outside world and includes public web servers, external email servers, and other public E-commerce services that are offered to clients.
What does the PPDIOO acronym stand for?
Prepare, Plan, Design, Implement, Operate, and Optimize
PPDIOO is an acronym used to designate the different phases of the Cisco network lifecycle approach.
Which of the different PPDIOO phases includes the establishment of organization requirements and network strategy to best support the architecture?
Prepare
The Prepare phase of the PPDIOO establishes organizational requirements and network strategy, as well as a high-level conceptual architecture.
Which of the different PPDIOO phases identifies the goals, facilities, and user needs?
Plan
The Plan phase is used to identify the goals, facilities, and user needs of a network. This phase also includes the analysis of any existing network structure, as well as the establishment of a detailed project plan, which should be designed to align with current business requirements.
Which of the different PPDIOO phases includes the proactive management of issues as they affect the organization?
Optimize
The optimize phase is responsible for attempting to identify issues before they become large problems. This is done through careful monitoring of devices throughout the network, as well as the tracking of ongoing issues.
What are the four main benefits of the PPDIOO network lifecycle approach?
Lowers TCO (Total Cost of Ownership), increases network availability, improves business agility, and speeds access to applications and services
There are a number of different benefits that come out of following a detailed network lifecycle approach; these are the main four.
When trying to design a network to the 20/80 rule, what does the 20 and the 80 stand for?
The 20 stands for the percentage of traffic that is expected to stay on the local subnet, and 80 stands for the percentage of traffic that is expected to leave the local subnet.
This rule is typically followed when a Client-Server model is used. This is because the central servers are not on the local subnet of any given department. Because of this, a large percentage of the traffic (approximately 80%) will be sent to and received from the remote server location, rather than locally.