Sie sind auf Seite 1von 13

Take Assessment - DCompNtwk Practice Final - CCNA Discovery: Designing and Supporting

Computer Networks (Version 4.0)

Refer to the exhibit. Following a test plan, the network systems engineer completes the configuration of an access layer switch
and connects three PCs to test the configuration. The engineer attempts to ping from each PC to the other connected PCs.
Which three statements describe the expected results of pinging from one host to another? (Choose three.)
Host 1 can ping Host 2.
Host 1 cannot ping Host 2.

Host 2 cannot ping Host 3.

Host 3 can ping Host 1.

Host 3 can ping Host 2.

Host 3 cannot ping Host 1.

Refer to the exhibit. PPP was successfully negotiated between the two routers. Which command set can be found on the local
router to produce the results that are shown in the graphic?
hostname Sales
interface serial0/0
encapsulation ppp
ppp authentication chap
username Market password 5 jdhdh4737f7hssn
hostname Market
interface serial0/0
encapsulation ppp
ppp authentication chap
username sales password 5 jdhdh4737f7hssn
hostname Market
interface serial0/0
encapsulation ppp
ppp authentication pap
username sales password 5 jdhdh4737f7hssn
hostname Sales
interface serial0/0
encapsulation ppp
ppp authentication pap
username Market password 5 jdhdh4737f7hssn
3 What is the result of implementing a Frame Relay service with a CIR value of zero?
Data will not cross the Frame Relay WAN.
All frames that enter the Frame Relay WAN will be marked as DE.

Only frames that exceed the local access rate will be marked as DE.

CIR is disabled, which allows all data traffic to pass through the Frame Relay WAN.

4 What two factors can increase the amount of time that is required for a network to converge? (Choose two.)
network size

queuing strategy for data traffic

routing protocols that are used on the network

access control lists that are applied to LAN interfaces

network address translation at the network borders

Refer to the exhibit. A customer has a problem with connectivity in the network. Based on the IP addressing scheme, what is
causing the problem?
The WAN link that connects R1 to R3 has an incorrect mask.

The WAN links need IP addresses from a different major network.

The WAN link that connects R1 to R2 overlaps with the R3 LAN.

The IP addressing in R1 LAN is incorrect because subnet zero cannot be used with VLSM.

Refer to the exhibit. A networking company designer is reviewing a diagram of a customer network. What are the two problems that
need to be resolved in the topology that is shown? (Choose two.)
The firewall router and ISP connection represent a single point of failure.

If one of the Layer 3 switches fails, the Cisco Call Manager will be unreachable.
A power supply failure of the server block switch will cause the entire IP telephony system to fail.

Using Layer 3 switches to interconnect the server block servers to the IP phones introduces too much delay.

The IP phones need to be redundantly connected to the switches to prevent single points of failure at the access layer.

Refer to the exhibit. Access list 100 is applied inbound to interface serial 0/0/0 on the SOHO Router1. Which traffic will be denied
by the configuration?
DNS traffic from host A to the Internet

FTP traffic from host A to the Internet

ICMP traffic from the ISP to server 1

traffic from the ISP to the server on port 23

8 Which protocol allows redundant Layer 2 links without switching loops?




Refer to the exhibit. Network A contains six network segments. With manual routing summarization and to advertise only the
networks that are shown, how many summary networks will RA advertise to RB?


10 A web-based retail company is considering updating its WAN connection with new technologies that are offered by the ISP.
What testing platform should be used by the network team of the company to validate the performance and capacity of the
new technology using real world data?


emulation software
simulation software
11 Using the show frame-relay pvc and debug frame-relay lmi commands to troubleshoot a Frame Relay problem, a network
administrator rules out issues at Layers 1 and 2. Further investigation reveals that the IP address of the remote router does not
appear in the Frame Relay table. What should the next step be in solving the problem?
Configure the router using the frame-relay map ip command.

Disable Inverse ARP on the local router.

Verify that the remote router has Frame Relay encapsulation enabled.

Ensure that the LMI type is correct for the circuit.


Refer to the exhibit. All connections are working and CDP is enabled on all devices and interfaces. On which device was the
command issued?




13 Which IOS component can be used for classification and protocol discovery of network traffic and applications in use?

ACL logging

Network Assistant

14 What best describes the function of QoS in data networks?

prioritizes data traffic over all other types of traffic

increases bandwidth on a link to ensure voice quality

provides preferred service to specified network traffic

automatically assigns the highest priority to web and database traffic

Refer to the exhibit. To demonstrate the importance of using contiguous IP addressing in a hierarchical network design, a network
designer configures a prototype network with the use of a network simulator. Which EIGRP configuration commands should the
designer enter on router R1 to correctly advertise a single summary route to router BR1 for the campus LAN?

Answer 4


Refer to the exhibit. What does the JAX router do with traffic that is destined for a web server with an IP address of
The traffic is sent out Serial 0/0/0.

The router sends the traffic out all interfaces other than the one it came in on.

A request is sent to neighboring routers for paths to the network.

The packets are placed into a queue until a better route is discovered via RIP.
17 Which two technologies can provide data integrity in a VPN connection? (Choose two.)



18 A network engineer is designing a LAN prototype for a medium-sized business. What should be used to test the IP addressing
Cisco SDM
network simulation tool

a fully functional network

network equipment in a testing lab

19 What type of system uses a PBX for call control and connection to the PSTN?
traditional telephony


IP telephony

20 What is meant by "tunneling" in the context of migrating from IPv4 to IPv6?

obtaining IPv6 addresses from an IPv4 DHCP server

allowing both protocol stacks to run on the same network device

encapsulating one protocol packet within another protocol

enabling direct communication between hosts that use different versions of the IP protocol

21 As part of network monitoring, a network administrator receives an alert that the CPU usage of the core router reaches 90%
several times a day. Which protocol is in use to monitor the network performance?



22 When configuring Frame Relay, what identifies a virtual circuit to the WAN switch?



Refer to the exhibit. A network designer is validating an IP addressing scheme with a test network that is configured with RIPv1.
However, while the designer can ping between routers RA and RB, communications between network A and network B cannot
be established. What should be done to solve the problem?
Change the routing protocol.

Use the S0/0/0 interface on RB to connect to RA.

Configure both routers with the no auto-summary command.

Replace the IP addressing of network B with

24 In what situation would the router display the ROMMON> prompt at the end of the boot process?
The boot process was interrupted before it completed.
The router could not find a suitable IOS to load into ROM.

The router could not find a running configuration file to load into RAM.

The router loaded an IOS but could not find a configuration file in NVRAM.

25 During a review of the proposed bill of materials, the ABC Networking Company account manager realizes that the systems
engineer included a lower cost, less capable switch model for the access layer connectivity than was specified by the network
designer. When questioned, the systems engineer responds that the switches that were recommended by the designer cannot
be purchased within the budget limitations of the customer. Which action should the account manager take?
Inform the customer that the project cannot be completed given the unreasonable budget constraints.
Communicate any risks that are associated with the equipment substitution and obtain customer approval to proceed.
Because the customer is probably aware that the budget limitations will require lower cost, less capable equipment, the
account manager should do nothing.
Inform the customer that the project budget must be increased.

26 While configuring a router with EIGRP, a technician enters the EIGRP command:

Router(config-router)# variance 3

What is the effect of entering this command?

It enables unequal cost load balancing.

It adjusts the cost of all EIGRP routes to 3.

It restricts the number of EIGRP feasible successor routes to 3.

It enables EIGRP equal cost load balancing over a maximum of 3 routes.

27 What are two advantages of using Layer 3 devices instead of Layer 2 switches at the distribution layer of a hierarchical network?
(Choose two.)
allows connectivity between different VLANs

provides reliable connectivity to the end user

reduces the number of required redundant links

results in fewer IP subnets to configure and manage

enables traffic filtering that is based on subnet addresses

28 What makes the Cisco EasyVPN application a useful tool for VPN implementation?
It provides encryption algorithms unavailable in other systems.

It ensures that remote workers actually use the VPN for connectivity.
It simplifies the configuration tasks for the device that is used as the VPN server.
It allows a greater variety of network devices to be used for VPN connections.
29 A network administrator is asked to upgrade the enterprise network devices and to modify the addressing scheme to support
VLSM and route summarization. The current network infrastructure contains both Cisco and non-Cisco routers. The plan is to
replace old routers gradually with the latest Cisco routers. Which two routing protocols can the administrator use to support both
upgrading requirements? (Choose two.)




Refer to the exhibit. A pre-sales system engineer receives a diagram of the current WAN from a customer. EIGRP is the routing
protocol that is used on the WAN. Based on the default operation of EIGRP, which statement is true about the routing table on
router RE?
There is a single route to the LAN via the T1 connection.

There is a single route to the LAN via the DSL connection.

EIGRP installs all three routes to the LAN and load balances the traffic.
There is a single route to the LAN via the 10 Mb Ethernet connection.

31 A new WIC is installed in an available router slot. At what point during the router startup process does the router test the card
for hardware problems?
after the configuration from NVRAM is loaded into RAM
after the configuration from NVRAM is loaded into ROM

when the bootstrap program is loaded into RAM

during the POST


Refer to the exhibit. What is the purpose of this configuration?

auditing the network traffic with NBAR
monitoring the network traffic with NetFlow

capturing network traffic to send to a syslog server

applying the named ACLs egress and ingress to the Ethernet interfaces
33 Which task would typically only require services that are located at the access layer of the hierarchical design model?
placing a VoIP call to a business associate in another country

connecting to the corporate web server to update sales figures

using a VPN from home to send data to the main office server farm

responding to an e-mail from a co-worker in another department

printing a meeting agenda on a local departmental network printer

34 Company XYZ needs a WAN connection between headquarters and branch offices that has a high level of security. The
connection must provide high bandwidth to support VoIP and transactional data with as little overhead as possible. What is
the best solution for WAN connectivity for company XYZ?


cell relay
PPP over a leased line

35 A small bookstore would like to offer wireless connectivity for customers with laptops. Which wireless components or devices will
provide connectivity to the Internet for the customers with the least possible cost to the bookstore?
wireless LAN controllers
standalone access points

wireless network cards for an ad hoc WLAN

lightweight access point and wireless LAN controller


Refer to the exhibit. Based on the configuration of router R2, which statement is true if the four listed objectives are requirements
of an active security policy?

(1) All traffic from the Internet into the DMZ is to be logged.
(2) Web traffic from the Internet is to be allowed into the DMZ.
(3) TCP traffic from established sessions is to be allowed into the internal network.
(4) Incoming e-mail from the Internet is to be handled by the DMZ e-mail server first.
Only objective 1 is met.
All four objectives are met.

Objectives 1, 2, and 4 are met.

Only objectives 2 and 4 are met.

Only objectives 2 and 3 are met.

37 Which component in a Frame Relay WAN would set the BECN bit in the Frame Relay header if congestion is experienced?
source DTE device
Frame Relay switch

destination DTE device

router through which communication was first initiated


Refer to the exhibit. An extended ACL has been created to deny traffic from the network to the web server with
IP address According to Cisco best practices, where should the ACL be applied?
R3 Fa0/0 inbound

R3 S0/0/1 outbound

R2 S0/0/1 inbound

ISP Fa0/0 outbound


Refer to the exhibit. Before the encapsulation was changed to Frame Relay, the administrator verified physical connectivity by
successfully pinging the remote router. After the encapsulation was changed, the administrator attempted to ping the remote
router on the Frame Relay circuit but was not successful. A show frame-relay pvc command was issued. What could be the
The DLCI is incorrect.

The IP address is incorrect.

The interface needs to be re-enabled after the encapsulation is changed.

The network is not included in the routing table.

Refer to the exhibit. A new host needs to be connected to the switch and be assigned to VLAN 2. Router RA is attached to the
switch via a trunk and is configured as shown. What IP address should be assigned to this new host? /26 /28 /28 /28 /28 /28

41 During the boot process and assuming the default sequence, what is the second location where the router will look for the IOS?


TFTP server


Refer to the exhibit. What must be done before the new IOS image can be installed on the router?

New IOS File name: c2800nm-advipservicesk9-mz.124-15.T3.bin

Size: 51056640
Erase the current IOS .

Change the configuration register to 0x2142.

Execute a copy tftp flash in ROMMON mode.

Rename the file in flash, changing the extension to ".old".


Refer to the exhibit. Based on the show cdp neighbors detail command, which interface on Switch1 is connected to Router1?



44 What is a characteristic of voice traffic in a converged network?

It is assigned secondary priority to data traffic.
It is processed in real time and cannot be retransmitted.

It consists of large packets with long, irregular data flows.

It uses the error-checking features of TCP to ensure good voice quality.

45 Which two events occur when the command RTA(config)# frame-relay map ip 22 is issued on a router? (Choose two.)
The remote router updates the Frame Relay map table with DLCI 22 to reach the network.

Inverse-ARP is used to add an entry for into the Frame Relay map table using DLCI 22.

DLCI 22 replaces the MAC address in the ARP table for entry
A Layer 2 address is statically mapped to a Layer 3 address.

RTA uses DLCI 22 to forward data to

46 An HWIC-4ESW, four-port switch module needs to be installed in a Cisco 1841 router that currently has a WIC-2T module in
slot 0. What should the network technician do first?
Install the hot-swappable option module.
Turn off the power to the router before installing the new module.

Remove the WIC-2T module so that the new module can be installed in slot 0.

Shut down all Fast Ethernet ports on the router until the switch module installation is complete.

Configure the Cisco IOS software to support an internal trunk link between the switch and router module.
47 What should be considered in the design of a wireless LAN on a corporate campus?
the vendor of all employee wireless NICs

the cables that are used for LAN connectivity

the number of wireless NICs required on enterprise servers

the messaging features that are used on employee cell phones

the location of the concrete pillars and walls between the offices

48 A user in a large office calls tech support to complain that the PC no longer connects to the Internet or to any network resources,
but seems otherwise normal. The help desk technician asks the caller to talk to nearby users to see if other machines are affected.
After a few minutes, the caller reports that several immediate neighbors have the same problem, but those seated further away
do not. Assuming that the description is accurate, what should be checked next?
power outlet to the PC that is used by the caller
workgroup switch in the telecommunications room

cable between any network outlet and the telecommunications room

cable between the PC that is used by the caller and the network outlet it connects to

cable between the PC that is used by a neighbor and the network outlet the neighbor PC it connects to


Refer to the exhibit. The administrator wishes to specify that the 56 kb/s circuit will be a backup link that will automatically be used
in the event that the primary Frame Relay circuit goes down for traffic to the network. Which command syntax will
accomplish this?
RouterA(config)# ip route 200

RouterA(config)# ip route

RouterA(config)# ip route

RouterA(config)# ip route

50 What value is an alternative representation of the IPv6 address 2005:AED0:0000:0000:020E:0000:FE00:1111?