Reference no: EM132453502
1. Discuss a scenario that addresses the importance of utilizing Route Process Redundancy (RPR), Stateful Switch Over (SSO), and Non-Stop Forwarding (NSF) in the implementation of Redundant Supervisor Engines in Catalyst switches. Indicate the manner in which you would choose one option over another in terms of fail-over time, transparency, and configuration complexity.
2. Suggest the troubleshooting preparations that you believe are necessary to diagnose and resolve problems related to EIGRP. Suggest what you believe to be the most effective and the least effective tool(s) available to both monitor and debug EIGRP. Provide a rationale for your responses. Imagine that you have been tasked with gathering information from the OSPF data structures, observing the transmission and reception of packets, and observing the exchange of routing information. Suggest the commands that you would use to accomplish these tasks and explain the strategies that you would employ to ensure that these commands do not affect router performance. Provide a rationale for your responses.
3. Imagine that you work for a business that utilizes an enterprise network design. Share your advice regarding consequences of not achieving high availability in the network. Speculate the manner in which this shortcoming would affect business operations in terms of customer relations and internal communications. Support your response with specific examples of the possible effects on business operations.
4. We've looked at the manner in which authentication servers, onetime passwords (OTP), and logging are used to minimize security threats in campus-wide network architecture. If you were the manager of the network at XYZ Company, would you recommend that these security elements be located in the server farm, the campus core, the building distribution, or the building access areas? Explain your rationale.
On networks using trunking protocols, there is a possibility of rogue traffic hopping from one VLAN to another, thereby creating security vulnerabilities according to the text. From your reading, which is the most detrimental vulnerability that a VLAN hopping attack may expose, and in what way would you mitigate such an attack? In your response, include key mitigation strategies for VLAN hopping with double tagging.
5. Per the text, DHCP is a widely used technique for configuring the IP address and other parameters of IP devices. Identify what you believe to be the single most common configuration error and explain the reasons to support your position. Discuss the strategy you would use to fix the error that you have identified. Provide a rationale for your response.
There are a number of Cisco IOS tools and commands available for troubleshooting an OSPFv3 or Stateless IP Autoconfiguration problem. Select the tool that you would use to troubleshoot such a problem and provide a rationale for your response.
6. Imagine that you have been contracted as a network consultant for a mid-sized company. You have observed a router that is slow to respond to commands issued on the console; in addition, it is not sending routing protocol packets to other routers. Analyze the potential causes of these symptoms and suggest one way in which you would troubleshoot the router in order to restore baseline operations. Discuss the most common causes for router memory failure and recommend both preventative strategies and early actions that your organization can take in order to prevent router memory failure from occurring. Provide a rationale to support your responses.