642-770 - Operational Foundations for Cisco Service Provider Core Networks
Go back to
Cisco
Example Questions
Trouble tickets are scrubbed for which two reasons? (Choose two.)
to ensure the tickets are accurate
to generate service level management reports
According to the [email protected] framework, who should review the incident reports?
the incident, problem, and change manager
While is the simplest method for detecting invalid or unauthorized changes?
Use exception reporting from syslog indicating access to a device in privileged mode and compare this report to the change record to identify possible unauthorized changes
According to Cisco IOS Management Best Practices, which three attribute should be fulfilled in the Device Naming Convention? (Choose three)
identify the device
device type
device location
Your company has deployed a new Cisco router into the core network. Your network fault management system is receiving events from the new device, but the NMS console is showing only the following. .1.3.6.1.4.1.9.9.117.1.2.1.1.2.7 What is the cause of this event?
The fault management system does not have the correct MIBs loaded to support the device.
You are monitoring a corporate network when a number of routers begin reporting high CPU utilization. Console alarms indication of excessive BPDUs. What is the probable cause of these threshold crossing alarms?
Spanning Tree Protocol failure
According to the [email protected] framework, how should special types of incidents, such as redundant power supply failure, be handled?
Treat the incident as an operational issue and follow the appropriate process.
Your company has deployed a new Cisco router into the core network. Your network fault management system is receiving events from the new device but the NMS console is showing only the following: 1.3.6.1 4.1.9.9 117.1.2.1.7 What is the cause of this event?
The fault management system does not have the correct MIBs loaded to support the device.
How would you identify and assign change risk?
by reviewing impact and priority
How are unauthorized devices installed in the network identified?
by generating service asset and configuration reports
MTTR can be used as a metric in which of these areas?
performance management
According to the [email protected] framework, which event status is given the highest priority?
exception
Which two statements about process in Cisco IOS and IOS XR Software are true? (Choose two)
In Cisco IOS XR Software, the default priority is 10.
In Cisco IOS Software, all processes share the same virtual space.
According [email protected] framework, what is the objective of the release and deployment process?
reduce unpredicted impact in the production services
Which of these frameworks provides a set of publications that suggests best practices for managing IT services?
[email protected]
You have built a new facility and are now testing connectivity. All routers at the new facility can ping their directly connected neighbors, but cannot ping any other routers. Which statement is true?
Layers 1 and 2 are working properly, but layer 3 needs more information to forward packets.
You need to add a new DNS server to your Linux server. Where would you have to add the new DNS entry in the operating system?
etc/resolv.conf
According to the [email protected] framework, which two statements define change success? (Choose two.)
Met request for change (RFC) criteria.
Change completed with minor modification to the implementation plan.
What do you call a process that collects and compiles a series of measurements, taken at regular intervals that representative of a current status and heath of the network?
baselining
You have just completed a comprehensive study of the traffic patterns in your network. As you review the results, you discover a remote office that has had any particular problems. However, the volume of voice quality related tickets has increased in the last two weeks. Which two possible causes would the traffic study show? (Choose two)
The route to this office is suboptimal and during peak traffic may cause a delay in packet delivery
QoS is missing from the circuit configuration to this site.
What will happen if a new version of Cisco IOS XR Software is installed and activated, and then the router reloads?
When the router comes back, the old version is loaded and the old and new versions are on disk0.
According to the ITTUS v3 framework, which event status is given the highest priority?
exception
Which two-stage configuration process is correct in Cisco IOS XR Software?
Make configuration changes, then enter "commit" to make configuration changes persist.
Which two options are reasons that the CMDB should be up-to-date. (Choose two.)
The information is useful during change management.
It helps during the asset audit process.
What would this script provide? #!/bin/bash for host in 192.168.1.1 192.168.1.2 192.168.1.3 do telnet $host echo "ls *.txt" echo "logout" done
Nothing, interactive remote shells are not supported in bash.
Which statement best describes characteristics of the NGN?
The NGN is a network that aims to bring all services together into a single converged network.
What is the primary purpose of the change approval process?
assess and mitigate risk
According to the [email protected] framework, what two actions can you do after you establish a configuration baseline? (Choose two.)
Assemble all relevant components to prepare for a change.
Build a service component from a defined set of inputs.
Which two are benefits of proactive network maintenance? (Choose two.)
gives an opportunity to prevent an outage
gives an opportunity to update network devices
Which three areas could be impacted by a change in the network environment? (Chose three)
as-built network documentation
disaster recovery plan
service level agreements
What two items are typically reviewed during the past-change implementation review process? (Choose two)
the cause of change failures
number of unauthorized changes
Which command could be used to verify that the software upgrade change was completed properly on a Cisco IOS router?
show version
According to [email protected] framework, which of these is a standard change?
a pre-authorized change
According to the [email protected] framework, which two options are the goals of configuration management? (Choose two.)
optimize service assets and capabilities
minimize compliance issues
When a traceroute is executed, if a packet does not return within the expected timeout window, what is printed to the screen?
an astensk (*)
Which two are recognized KPIs for service validation and testing? (Choose two.)
number of identified errors
percentage of failed service-acceptance tests
According to the [email protected] framework, what is the most important change success criteria?
A user acceptance test is successful.
According to the [email protected] framework, a change that has an";approve"; status has met which criteria?
The business and technical assessments have been completed, and the change has been approved and committed to the change scheduler.
According to the [email protected] framework, why is application profiling critical?
It will give everyone an opportunity to understand how the application will behave on the network.
The planning and coordination of resources to deploy a major release within predicted cost, time, and quality estimates is within which of these disciplines?
project management
Which two are recognized standards or frameworks that influence network operations? (Choose two.)
[email protected]
eTOM
According to the ITILĀ® v3 framework, a change that has an";approve"; status has met which criteria?
The business and technical assessments have been completed, and the change has been approved and committed to the change scheduler.
Which management process flow includes these elements? - perform planned or unplanned upgrades - install or configure network devices - execute NRFU or operational validation tests - set QOS policies and mechanisms
configuration management
You have just solved a troublesome network event. From a troubleshooting perspective, what is your next step?
Document the problem and what you did to correct it.
You have just completed periodic trend analysis of the network traffic. The trend is within expectations and within current network capacity. What should be the next step?
Documentation of the trend analysis results - continue monitoring.
What do you call a process that collects and compiles a series of measurements, taken at regular intervals that are representative of a current status and health of the network?
baselining
What is the best way to mitigate a problem using any process or troubleshooting method?
Be proactive, identify problems and remedy them before you have to troubleshoot them.
Which two statements about SNMP in Cisco IOS and IOS XR Software are true? (Choose two)
Informs are not supported in Cisco IOS XR Software.
MIBs in Cisco IOS XR Software are handled by four different mibd processes, which are controlled by snmpd.
Cisco IOS XR Software was designed with three partitions or separate planes. Which are the three planes?
control, data, and management
Which method of traffic analysis allows you to consider the effect of growth and failures on the existing network?
service take-up trend analysis