640-760 - Supporting Cisco Service Provider IP NGN Operations
Go back to Cisco
What is the correct order of the procedural steps for a network change MOP?
Initial Checks, 2. Procedure, 3. Verification, 4. Backout Procedure, 5. Backout Verification
In inventory management, what is the primary responsibility of a "master poller"?
to provide authoritative information for all other managers
According to the [email protected] framework continual service improvement perspective, what is the most critical information that needs to be captured in the trouble ticketing system?
What tool generates synthetic traffic to measure network performance?
The command logging trap informational instructs a device to perform which of these actions?
Log only messages with a severity of 0-6.
Why do service providers have a difficult time guaranteeing performance levels in SLAs?
The shared infrastructure is dynamic.
According to the [email protected] framework, how would you prioritize an incident ticket?
based on the impact and urgency
Each syslog message has a numerical severity level assigned to generate error messages about software or hardware malfunctions. Which of these messages has the highest numeric severity level?
After notifying the customer about an SLA issue, what should you do?
Document who you contacted about the SLA issue by opening or updating a ticket
According to the [email protected] framework, what type of escalation occurs when the service desk is unable to resolve the incident?
According to the [email protected] framework, after an incident is resolved and the root cause identified, what should be the next step?
Record the root cause analysis in the known error database to identify and resolve potential incidents.
Why is it a best practice to have occasional operational readiness tests to access backed up files?
to verify that your backup process is working correctly
What are two protocols that you can use to copy configurations from a Cisco ASR 9000 Series router? (Choose two.)
Why is it important to have a single trouble ticketing system?
It is easy to transfer tickets back and forth between the support groups.
You are working on a network outage issue and you realize that you need to make a change to the configuration. What should you do in this situation?
Make the necessary change and open a change ticket as soon as possible.
You are responsible for monitoring the IP network. You have noticed since the beginning of your shift that a particular interface on a network switch has been flapping, and it has finally gone down. You open an incident ticket. According to the [email protected] framework, what should you do to determine if it is a recurring issue?
Perform a search of the known-error database.
According to the [email protected] framework, what activity is required to implement reboots, repairs, or workarounds?
initiate a request for change
According to the [email protected] framework, what is the primary reason for implementing SLAs?
Provide a legal contract between the customer and the service provider.
When connecting to the console port, you see this message: %SYS-2-MALLOCFAIL: Memory allocation of 1028 bytes failed from 0x6015EC84, Pool Processor, alignment 0 What two situations could cause this message? (Choose two.)
The memory has fragmented into such small pieces that the router cannot find a usable available block.
The router has temporarily or permanently used all available memory.
Which two statements about the UNIX script are true? (Choose two.) #!/bin/sh tc=1 while [ $tc -le 10 ] do #/opt/trapSender -e 184.108.40.206.220.127.116.11.5.1 -s 1 -g 1 -i 10.1.1.1 -D 10.1.1.5 -n 10 tc=`expr $tc + 1` echo "tc:$tc\n"; sleep 1 done
Within the while loop, the script will pause and wait for one second.
The last number to be printed to the screen when running this script is 11.
According to the [email protected] framework, what is the nature of the method used to escalate an issue that is very serious in nature or an issue that could potentially require an excessive amount of time to resolve?
both hierarchical and functional
According to the [email protected] framework, which four of these statements are characteristics of effective problem management? (Choose four.)
It will reduce incidents.
It will decrease mean-time-to-repair.
It can be either reactive or proactive in nature.
It raises productivity and decreases cost in the long term.
According to the [email protected] framework, what information is typically reported in an NOC incident report?
incident number, priority, incident start time, SLA, incident status
Which three steps would you use to troubleshoot a performance-related problem in the network core? (Choose three.)
create action plan
The Cisco IOS command, logging buffered 65536, performs which one of these tasks?
indicates the number of log messages kept for viewing during a show logging command on the console
Which verification step would help in troubleshooting a large number of CRC errors observed on an interface?
Verify that the physical link connected to the interface is not defective.
An outage occurs in location "A" due to a router crash. This is not the first time that the router has had this problem. In fact, it crashed three times within the past 20 days. According to the [email protected] framework, what type of record should be created to resolve this issue?
According to the [email protected] framework, how would you prioritize workload when dealing with multiple high-urgency incident tickets?
Take impact into account to adjust your workload.
According to the [email protected] framework, what are two possible benefits of generating a detailed root cause analysis using chronological timelines? (Choose two.)
identifies process deficiencies and breakdowns
identifies staffing, skills, and expertise
A Cisco network router crashes and you want to do as much first-level troubleshooting as quickly as you can so that the router can return to service. Which Cisco troubleshooting tool can you use that reports potential problems by analyzing supported show command output?
Your fault management system indicates that an "interface down" event was received five minutes ago, followed by an "interface up" event three minutes later. What should you do?
Monitor the device for additional interface events before taking any action.
Network inventory is polled once per week on Saturdays. A new router is being installed on Sunday. Which of these network managers should be synchronized with the inventory manager in order to have the most up-to-date device list as soon as possible?
What does the log message "%IPNAT-6-DELETED:" indicate?
The message is for information only and requires no further action.
How often should device configurations be backed up? (Choose two.)
at predetermined intervals
when a configuration change is detected
A customer calls complaining about the level of service being received. The customer produces a log showing service-level measurements that were collected over the past week. Which three questions should be asked at a minimum in order to assess the validity of the claim? (Choose three.)
How were the measurements taken?
Are the measurements statistically relevant?
What were the measurements taken?
According to the [email protected] framework, the problem management process can deal with which two types of issues? (Choose two.)
prevention of future outages
A major location was down for several minutes. In your experience, you know that this same location has experienced outages two other times during the past month. As an engineer working on the most recent incident, according to the [email protected] framework, what would you do next?
Open a problem ticket, citing a potential chronic issue.
Why do SNMP counters often show different numbers than Cisco IOS CLI show commands?
The only way to reset the SNMP counters is to reload the box.
According to the [email protected] framework, which two formulas are commonly used to calculate priority? (Choose two.)
priority = urgency + impact
priority = urgency x impact
Which two steps are best practices to be followed while documenting a network. (Choose two.)
Use proper icons for different devices in the network.
Use different colors and widths for denoting different links of different bandwidth.
According to the [email protected] framework, which process deals with the investigation of recurring network issues?
A router is causing problems in the network and you want to capture as much information as you can before you manually reload or power-cycle the router. What command would you type at the CLI of the router to capture information that would be lost when the router is rebooted?
A software upgrade is performed on some of the routers in a network. What would be your first major verification step after the upgrade?
check show version
According to the [email protected] framework, what three criteria can you use to qualify an incident? (Choose three.)
unplanned interruption to a service
a reduction in the quality of service
a failure of a configuration item that has not yet impacted service
Which of these items enables an agent to notify the management station of significant events by sending an unsolicited message?
Which two of these actions can you take to determine performance degradation on a Cisco router? (Choose two.)
Ping the affected device.
Perform a show interface command on the affected device.
According to the [email protected] framework, what triggers an incident?
when an outage is called into a service center
Which protocol can you use to dynamically discover directly connected neighbors in the network for inventory purposes?
Cisco Discovery Protocol
A customer complained about their network performance. You scheduled a change request that will reroute their traffic through a different node to improve performance. What must you do to verify that this change had the desired results?
Collect baseline performance data before and after the change.
Cisco routers provide numerous integrated commands to assist you in monitoring and troubleshooting your internetwork. Which of these actions describes the debug set of commands?
assists in the isolation of protocol and configuration problems