Chapter 9 - WAN Availability and QoS Flashcards

1
Q

Which of the following is a measure of data transferred from one host to another in a given amount of time?

  1. Reliability
  2. Response time
  3. Throughput
  4. Jitter
A

C. Throughput is the measure of data transferred from one host to another in a given amount of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is a description of the key design principle scalability?

  1. Modularity with additional devices, services, and technologies
  2. Redundancy through hardware, software, and connectivity
  3. Ease of managing and maintaining the infrastructure
  4. Providing enough capacity and bandwidth for applications
A

A. Modularity with additional devices, services, and technologies is a description of the key design principle scalability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What percentage of availability allows for four hours of downtime in a year?

  1. 99.5%
  2. 99.99%
  3. 99.999%
  4. 99.95%
A

D. 8756 / 8760 × 100 yields the availability percentage, which is 99.95%.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What Internet connectivity option provides the highest level of resiliency for services?

  1. Single-router dual-homed
  2. Single-router single-homed
  3. Dual-router dual-homed
  4. Shared DMZ
A

C. The highest level of resiliency for services avoids single points of failures for both the router and the circuits by using dual routers with one circuit per router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following eliminates single points of failures with the router and the circuit?

  1. Dual-router dual-homed
  2. Single-router dual-homed
  3. Shared DMZ
  4. Single-router single-homed
A

A. To eliminate single points of failures on both routers and circuits, you need dual routers with one circuit per router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What backup option allows for both a backup link and load-sharing capabilities using the available bandwidth?

  1. Dial backup
  2. Secondary WAN link
  3. IPsec tunnel
  4. GRE tunnel
A

B. Adding a secondary WAN link makes the network more fault tolerant by allowing for both a backup link and load sharing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following adds a strict priority queue to modular class-based QoS?

  1. FIFO
  2. CBWFQ
  3. WFQ
  4. LLQ
A

D. Low-latency queuing (LLQ) adds a strict priority queue to CBWFQ.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is a mechanism to handle traffic overflow using a queuing algorithm with QoS?

  1. Congestion management
  2. Traffic shaping and policing
  3. Classification
  4. Link efficiency
A

A. Congestion management is a mechanism to handle traffic overflow using a queuing algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which QoS model uses Resource Reservation Protocol (RSVP) to explicitly request QoS for the application along the end-to-end path through devices in the network?

  1. DiffServ
  2. IntServ
  3. CBWFQ
  4. BE
A

B. IntServ uses Resource Reservation Protocol (RSVP) to explicitly request QoS for the application along the end-to-end path through devices in the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What technique does traffic shaping use to release the packets into the output queue at a preconfigured rate?

  1. Token bucket
  2. Leaky bucket
  3. Tagging
  4. Interleaving
A

A. The token bucket technique uses traffic shaping to release the packets into the output queue at a preconfigured rate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is based on the availability of technology as well as the projected traffic patterns, technology performance, constraints, and reliability?

  1. Designing the topology
  2. Assessing the existing network
  3. Identifying the network requirements
  4. Characterize the existing network
A

A. Designing the topology is based on the availability of technology as well as the projected traffic patterns, technology performance, constraints, and reliability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which design principle involves redundancy through hardware, software, and connectivity?

  1. Performance
  2. Security
  3. Scalability
  4. High availability
A
  1. D. High availability is a design principle that involves redundancy through hardware, software, and connectivity.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which application requires round-trip times of less than 400 ms with low delay and jitter?

  1. Data file transfer
  2. Real-time voice
  3. Real-time video
  4. Interactive data
A

B. Real-time voice is an application that requires round-trip times of less than 400 ms with low delay and jitter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is a measure of a given application’s availability to its users?

  1. Response time
  2. Throughput
  3. Reliability
  4. Performance
A

C. Reliability is a measure of a given application’s availability to its users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following defines the upper limit of frames that can be transmitted without a return acknowledgment?

  1. Throughput
  2. Link efficiency
  3. Window size
  4. Low-latency queuing
A

C. Window size defines the upper limit of frames that can be transmitted without a return acknowledgment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is the availability target range for branch WAN high availability?

  1. 99.9900%
  2. 99.9000%
  3. 99.0000%
  4. 99.9999%
A

A. The availability target range for branch WAN high availability is 99.9900%.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which WAN deployment model provides for the best SLA guarantees?

  1. MPLS WAN with dual routers
  2. Hybrid WAN with MPLS and Internet routers
  3. Internet WAN with dual routers
  4. Internet WAN with a single router
A

A. MPLS WAN with dual routers is a deployment model that provides the best SLA guarantees.

18
Q

Which Internet connectivity option provides for the highest level of resiliency?

  1. Single-router single-homed
  2. Single-router dual-homed
  3. Dual-router dual-homed
  4. GRE tunnels
A

C. Dual-router dual-homed Internet connectivity provides for the highest level of resiliency.

19
Q

When designing Internet for remote sites, which option provides control for security services such as URL filtering, firewalling, and intrusion prevention?

  1. Centralized Internet
  2. Direct Internet
  3. Direct Internet with split tunnel
  4. IPsec with split tunnel
A

A. When designing Internet for remote sites, centralized Internet provides control for security services such as URL filtering, firewalling, and intrusion prevention.

20
Q

Which design considerations are most important for Internet high availability design? (Choose two.)

  1. Using a public BGP AS number for eBGP connections to ISPs
  2. Using provider-independent IP address space for advertisements to ISPs
  3. Using BGP communities
  4. Using extended ACLs
A

A and B. Using a public BGP AS number for eBGP connections and provider-independent IP address space for advertisements to ISPs are two important design considerations for a high availability design.

21
Q

Which WAN backup option provides for redundancy and additional bandwidth?

  1. Backup link
  2. IPsec tunnel
  3. GRE tunnel
  4. NAT-T
A

A. Backup link for WAN backup provides for redundancy and additional bandwidth.

22
Q

Which failover option can be used to back up the primary MPLS WAN connection?

  1. BGP
  2. GLBP
  3. HSRP
  4. IPsec tunnel
A

D. IPsec tunnel failover can be used to back up the primary MPLS WAN connection.

23
Q

Which of the following is not a model for providing QoS?

  1. Best-effort
  2. DiffServ
  3. IntServ
  4. NSF
A

D. NSF is not a model for providing QoS. Best-effort, DiffServ, and IntServ are QoS models.

24
Q

In QoS markings, what DSCP value is used for VoIP traffic?

  1. AF4
  2. CS2
  3. EF
  4. CS5
A

C. EF is the DSCP value for VoIP traffic.

25
Q

Which QoS method uses a strict priority queue in addition to modular traffic classes?

  1. CBWFQ
  2. Policing
  3. WFQ
  4. LLQ
A

D. LLQ uses a strict priority queue in addition to modular traffic classes.

26
Q

Within RSVP, what function is used to determine whether the requested flows can be accepted?

  1. Admission control
  2. Classification
  3. Policing
  4. Queuing and scheduling
A

A. Admission control is the function used to determine whether the requested flows can be accepted.

27
Q

Which of the following slows down the rate at which packets are sent out an interface (egress) by matching certain criteria?

  1. Policing
  2. CAR
  3. Shaping
  4. NBAR
A

C. Shaping slows down the rate at which packets are sent out an interface (egress) by matching certain criteria.

28
Q

What is the buffering process that routers and switches use when they receive traffic faster than it can be transmitted?

  1. Policing
  2. Queuing
  3. NBAR
  4. Shaping
A

B. Queuing is the buffering process that routers and switches use when they receive traffic faster than can be transmitted.

29
Q

What do service providers use to define their service offerings at different levels?

  1. SWAN
  2. WAN tiers
  3. WWAN
  4. SLA
A

D. SLAs are used by service providers to define their service offerings at different levels.

30
Q

Which of the following has mechanisms to handle traffic overflow using a queuing algorithm?

  1. Link-efficiency mechanisms
  2. Classification
  3. Congestion management
  4. Traffic shaping and policing
A

C. Congestion management mechanisms handle traffic overflow using a queuing algorithm.

31
Q

Which QoS category identifies and marks flows?

  1. Congestion management
  2. Traffic shaping and policing
  3. Link-efficiency mechanisms
  4. Classification and marking
A

D. Classification and marking identifies and marks flows.

32
Q

Which design principle balances the amount of security and technologies with the budget?

  1. Performance
  2. Standards and regulations
  3. Cost
  4. Security
A

C. The cost design principle balances the amount of security and technologies with the budget.

33
Q

Which application type has requirements for low throughput and response time within a second?

  1. Real-time video
  2. Interactive data
  3. Real-time voice
  4. Interactive video
A

B. Interactive data as an application type has requirements for low throughput and response time within a second.

34
Q

Which of the following WAN connectivity options has bandwidth capabilities of 1 Gbps to 10 Gbps?

  1. 802.11a
  2. LTE
  3. LTE Advance Pro
  4. LTE Advanced
A

C. LTE Advanced Pro has bandwidth capabilities of 1 Gbps to 10 Gbps.

35
Q

How many days of downtime per year occur with 99.00000% availability?

  1. 8.76 days
  2. 5.2 days
  3. 3.65 days
  4. 1.2 days
A

C. Downtime at 99% equates to 3.65 days of availability per year.

36
Q

With dual-router and dual-path availability models, how much downtime is expected per year?

  1. 4 to 9 hours per year
  2. 26 hours per year
  3. 5 hours per year
  4. 5 minutes per year
A

D. With dual-router and dual-path availability models, 5 mins of downtime is expected per year.

37
Q

Which deployment model for WAN connectivity has a single router or dual routers and uses both MPLS and an Internet VPN?

  1. Hybrid WAN
  2. Internet WAN
  3. MPLS WAN
  4. VPLS WAN
A

A. The hybrid WAN deployment model has single routers or dual routers and uses both MPLS and an Internet VPN.

38
Q

When designing the Internet with high availability, which of the following is a design consideration ?

  1. Use public address space for internal addressing
  2. Use private address space for route advertising to the ISPs
  3. Block all Internet routes
  4. Use HSRP/GLBP or an IGP internally
A

D. HSRP/GLBP or an IGP internally are design considerations for designing Internet with high availability.

39
Q

Which of the following is an important design consideration when using IPsec over GRE tunnels?

  1. QoS classification
  2. MTU size
  3. Header type
  4. Payload length
A

B. MTU size is an important design consideration when using IPsec over GRE tunnels.

40
Q

When using DSCP to classify traffic, which of the following is prioritized the most?

  1. Signaling
  2. Transactional data
  3. Real-time interaction
  4. VoIP
A

D. VoIP needs to be prioritized the most.