Anda di halaman 1dari 15

Close Window

Assessment System

1. Assessment Selection 2. Assessment Settings 3. Take Assessment

Take Assessment - DCompNtwk Final - CCNA Discovery: Designing and Supporting


Computer Networks (Version 4.0)

Time Remaining:

1 What is the function of a network modular block diagram?


It provides a high level view of all sites in an enterprise network.
It shows a simplified version of a network and diagrams major functions.
It lists the networking equipment and addressing schemes for each network segment.
It shows all the major pieces of networking equipment in a network and how they interconnect.

2 If traditional phones are used when introducing VoIP to a network, what component would be required to
convert the analog voice from traditional telephone signals into IP packets?
Multipoint control unit
Power over Ethernet switches
a router that acts as a voice gateway
Cisco Unified Communications Manager

3 A company has just transitioned from traditional telephony to an IP Telephony solution for their voice
requirements. What statement describes a characteristic of the new system?
connects through a PBX to the PSTN
replaces a digital system with an analog one
combines data and voice into a converged network
requires manual configuration for adding, moving or changing phones
enables web applications and phone directories to be available to every PC on the network

4
Refer to the exhibit. The routers are configured with RIPv2 with default configurations. When attempting to
communicate with other networks, hosts from 10.0.11.0/24 are experiencing connectivity issues. What could
done to resolve this issue?
Change to a public IP addressing scheme.
Use EIGRP with its default configuration as the routing protocol.
Change the subnet mask on the link between R2 and R3 to 255.255.255.0.
Disable automatic route summarization on all routers in the network.

5 Which two descriptions relate to a Frame Relay DLCI? (Choose two.)


guaranteed rate at which data travels on the packet-switched network
signalling standard between DTE and DCE
indicator of congestion on the network
locally significant circuit endpoint
one DLCI allowed per local loop
Layer 2 address

6 Why is it difficult for network designers to predict the patterns and behavior of file transfer traffic?
The traffic is user initiated.
File size is typically very small.
Dedicated bandwidth is essential.
All file transfer traffic is queued as high priority.

7 A school district decides to use the 172.30.0.0/16 network for its LAN networks. The network administrator
must create an addressing scheme to support 500 users in the admin office, 200 at the high school, 60 at the
elementary school and 28 at the district office. Which VLSM addressing scheme will correctly address the
network with minimal waste?
172.30.0.0/20 admin
172.30.1.0/21 high school
172.30.1.8/22 elementary
172.30.1.12/26 district
172.30.0.0/22 admin
172.30.4.0/23 high school
172.30.5.0/24 elementary
172.30.6.0/26 district
172.30.0.0/23 admin
172.30.2.0/24 high school
172.30.3.0/26 elementary
172.30.3.64/27 district
172.30.0.0/23 admin
172.30.2.0/24 high school
172.30.3.0/25 elementary
172.30.3.127/26 district

8 Which task would typically only require services that are located at the access layer of the hierarchical design
model?
placing a VoIP call to a business associate in another country
connecting to the corporate web server to update sales figures
using a VPN from home to send data to the main office server farm
responding to an e-mail from a co-worker in another department
printing a meeting agenda on a local departmental network printer

9 Which three enhancements does IPv6 offer over IPv4? (Choose three.)
easier implementation and configuration
more effective IP security
integrated IP mobility support
simplified header information
fewer reserved IP addresses
eliminates the need to implement DHCP

10 A network administrator is integrating IPv6 into an IPv4 network by encapsulating one protocol packet withi
another protocol. Which transition method is being used?
dual stack
tunneling
proxying and translation
NAT with Protocol Translator

11
Refer to the exhibit. During a test of an EIGRP prototype network, a network administrator issues a show ip
protocols command. What two facts can be determined from the output? (Choose two.)
The administrative distance is 100.
This router has one adjacent neighbor.
There are 10 Cisco devices in this prototype network.
The auto-summary command was applied on this router.
EIGRP is using two values for the calculation of the composite metric.
EIGRP on this router will display up to four unequal cost routes to the same destination.

12 Which two pieces of information are needed before an IOS image may be loaded on a router from a TFTP
server? (Choose two.)
the IP address of the TFTP server
the current name of the IOS image on the router
the operating system of the TFTP server
the name of the configuration file in NVRAM
the name of the IOS image on the TFTP server
encapsulation of the router interface that is connected to the TFTP server

13 Which two values represent valid IPv6 addresses? (Choose two.)


::::1
FF01::1
0:0:0:0:0:0:0:1
2001:DB8::47::2A4
2031:0000:04AC:3400:FFE3:0

14 A network administrator has configured Frame Relay on a serial interface and issued the show interfaces ser
command. The output shows that the interface is up and the line protocol is up. However, pings to the remote
router across the link fail. What should the next step be to ensure that the IP address of the remote router app
in the Frame Relay map table of the local router?
Configure the router using the no inverse-arp command.
Ensure that the LMI type is correct for the circuit.
Configure the router using the frame-relay map ip command.
Verify that the remote router has Frame Relay encapsulation enabled.

15

Refer to the exhibit. A networking company technician conducts testing on a prototype to verify that the
proposed network design meets connectivity requirements. Which command and its associated output will
provide evidence that inter-VLAN routing is implemented correctly and that all users have full connectivity t
each other?
Showing 1 of 4 <Prev 1 Next>
Page:

Close Window
All contents copyright 1992-2009 Cisco Systems, Inc. Privacy Statement and Trademarks.
Close Window

Assessment System

1. Assessment Selection 2. Assessment Settings 3. Take Assessment

Take Assessment - DCompNtwk Final - CCNA Discovery: Designing and Supporting


Computer Networks (Version 4.0)

Time Remaining:

16 During prototype testing, the network designer performs a test to determine the ability of the network to store
device configurations and statistics on local databases. Which design goal is validated if the test is a success?
security
scalability
availability
manageability

17 Which IOS component can be used for classification and protocol discovery of network traffic and applicatio
in use?
CDP
NBAR
ACL logging
Network Assistant

18 Which WLAN operational feature can be configured as non-broadcast in order to increase the security of an
enterprise WLAN for employees?
SSID
WEP keys
VLAN parameters
WPA encryption keys
VPN authentication information

19
Refer to the exhibit. A network administrator is validating the routing for the new network design. Which
command should be used to configure the s0/0/0 interface of the SALES router to advertise the Sales
Department networks as one route?
SALES(config-if)# ip summary-address eigrp 100 172.16.0.0 255.255.0.0
SALES(config-if)# ip summary-address eigrp 100 172.16.8.0 255.255.240.0
SALES(config-if)# ip summary-address eigrp 100 172.16.16.0 255.255.240.0
SALES(config-if)# ip summary-address eigrp 100 172.16.31.0 255.255.248.0

20

Refer to the exhibit. A pre-sales systems engineer receives a diagram of the exhibited WAN implementation
from a customer. EIGRP is the routing protocol that is used on the WAN. None of the parameters for EIGRP
metric calculation have been modified in any router configurations. Which statement is true about the routing
table on router RM?
There is a single route to the 192.168.24.0/24 LAN using the T1 connection.
There is a single route to the 192.168.24.0/24 LAN using the DSL connection.
There is a single route to the 192.168.24.0/24 LAN using the Metro Ethernet connection.
EIGRP installs all three routes to the 192.168.24.0/24 LAN and load balances the traffic.

21

Refer to the exhibit. Which set of commands will meet the security requirements that are shown?
22 What is one advantage of a full mesh topology at the core layer of the enterprise network compared with a
partial mesh topology?
It adds scalability to the corporate network.
It provides fully redundant links to connecting modules.
It lowers the impact and risk of DoS attacks from the Internet.
It increases the manageability of the network devices in the core layer.

23 What are two disadvantages to using simulation software such as Packet Tracer to validate a network design?
(Choose two.)
unrealistic performance
little control over network operation
inability to create large or complex networks
inability to simulate all required network conditions
lack of flexibility to support different devices and connectivity options

24 During a review of the proposed bill of materials, an account manager of the network solution company reali
that the systems engineer included a switch with lower cost and reduced capabilities for the access layer than
was originally specified by the network designer. When questioned, the systems engineer responds that the
switches specified by the designer cannot be purchased within the budget limitations of the customer. Which
action should the account manager take?
Inform the customer that the project budget must be increased.
Inform the customer that the project cannot be completed given the unreasonable budget constraints.
Communicate any risks that are associated with the equipment substitution and obtain customer approval
proceed.
Because the customer is probably aware that the budget limitations will require lower cost, less capable
equipment, the account manager should do nothing.

25
Refer to the exhibit. What can the field engineer conclude about the EIGRP authentication between Router1
Router2?
Authentication will fail because only one key is configured.
Authentication will succeed and EIGRP updates can be exchanged.
Authentication will fail because the key chain names do not match.
Authentication will fail because the key chain names must match the router names.

26 A network designer must select a routing protocol for the network of a customer. The currently installed netw
contains both Cisco and non-Cisco routers, and there is no budget to replace them. The designer plans on
implementing both VLSM and route summarization in the new network design. Which two protocols can
provide the necessary functionality for this LAN? (Choose two.)
RTP
RSTP
RIPv1
RIPv2
EIGRP
OSPF

27 A company offers online ordering of its products. The web service is provided by a primary web server that
synchronizes with a backup server. A network designer recommends adding a load balancing unit and installi
additional web servers so that the online ordering traffic can be equally distributed among four web servers.
What network design risk is addressed with this recommendation?
limited bandwidth
possible bottleneck
single point of failure
large failure domains
28

Refer to the exhibit. A network administrator configures two routers to test the WAN connection. The serial
connection requires PPP encapsulation and authentication with CHAP. However, the connection cannot be
established. According to the partial output of the show running-config command, what is the cause of the
problem?
The password should be all lowercase.
The password should contain fewer than 8 characters.
The usernames must be the same as the sending router hostnames.
The usernames must be the same as the destination router hostnames.

29 In order for the IT staff of a company to understand the basic operation of VPNs, which two features or
technologies must the network designer identify as training needs? (Choose two.)
IPv6 tunneling
QoS operation
tunneling protocols
VLAN configuration
encryption algorithms

30 What is a function of software queuing?


filters traffic on the basis of administrator defined rules
stores received traffic and sends packets based on the order that the packets are received
sends packets on the basis of priorities that are manually set
transmits packets in a priority sequence that is based on source port
Showing 2 of 4 <Prev 2 Next>
Page:

Close Window
All contents copyright 1992-2009 Cisco Systems, Inc. Privacy Statement and Trademarks.

Close Window

Assessment System

1. Assessment Selection 2. Assessment Settings 3. Take Assessment

Take Assessment - DCompNtwk Final - CCNA Discovery: Designing and Supporting


Computer Networks (Version 4.0)

Time Remaining:

46 What makes the Cisco EasyVPN application a useful tool for VPN implementation?
It provides encryption algorithms unavailable in other systems.
It ensures that remote workers actually use the VPN for connectivity.
It simplifies the configuration tasks for the device that is used as the VPN server.
It allows a greater variety of network devices to be used for VPN connections.

47
Refer to the exhibit. A customer has a problem with connectivity in the network. Based on the IP addressing
scheme, what is causing the problem?
The WAN link that connects R1 to R3 has an incorrect mask.
The WAN links need IP addresses from a different major network.
The WAN link that connects R1 to R2 overlaps with the R3 LAN.
The IP addressing in R1 LAN is incorrect because subnet zero cannot be used with VLSM.

48 Which technical requirement is satisfied when providing QoS for delay sensitive applications?
availability
manageability
scalability
security

49 Which statement best describes the VPN feature called split tunneling?
It creates separate pathways for different VLANs.
It creates two tunnels, one for user traffic and one for management traffic such as CDP and SNMP.
It allows user traffic that is destined for the corporate network to travel across the VPN tunnel, while traf
destined for the Internet travels through the local LAN of the VPN client.
It allows separate tunnels so that high priority traffic, such as voice and video, uses the higher bandwidth
tunnel, while all other user traffic travels on the lower bandwidth tunnel.

50 As part of network monitoring, a network administrator receives an alert that the CPU usage of the core route
reaches 90% several times a day. Which protocol is in use to monitor the network performance?
DNS
SNMP
SMTP
DHCP
TFTP

51 The main office of a NetworkingCompany customer currently connects to three branch offices via three sepa
point-to-point T1 circuits. The customer network uses RIPv2 as the routing protocol within both the LAN and
the WAN. The account manager proposes a change to a Frame Relay network because the costs are lower. A
single local loop connection can be installed at the main office with three separate PVCs to connect the branc
offices. How can the main office edge router be configured to enable the customer to continue to use RIP as t
WAN routing protocol?
Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote
routers.
To prevent the Frame Relay network from causing a routing loop, disable split horizon on the serial
interface.
Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP
address to each one.
Configure the serial interface with a single interface DLCI number and create frame-relay map stateme
for each remote site address.

52 Which command can be used to load a new Cisco IOS image on a router?
copy startup-config tftp:
copy tftp: startup-config
copy running-config tftp:
copy tftp: flash:
copy flash: tftp:
copy flash: startup-config

Showing 4 of 4 <Prev 4 Next>


Page:

Close Window
All contents copyright 1992-2009 Cisco Systems, Inc. Privacy Statement and Trademarks.

Anda mungkin juga menyukai