Sie sind auf Seite 1von 21

Close Window

Assessment System 1. Assessment Selection 2. Assessment Settings 3. Take Assessment

Take Assessment - DCompNtwk Final - CCNA Discovery: Designing and Supporting Computer Networks (Version 4.0) Time Remaining: 1

Refer to the exhibit. The network administrator has used the Cisco Feature Navigator to choose a Cisco I image to install on a router. Given the exhibited output of the show version command, which statement about the capacity of the router to use this Cisco IOS image? There is enough DRAM and flash. There is not enough DRAM and flash. There is enough DRAM but not enough flash. There is not enough DRAM but enough flash.

A network administrator is integrating IPv6 into an IPv4 network by encapsulating one protocol packet w another protocol. Which transition method is being used? dual stack Tunneling proxying and translation NAT with Protocol Translator

Refer to the exhibit. What can be concluded from the output that is shown? MDF_2811 has a MAC address of 2294:300F:0000. Device C3750-24_IDF2 is running Cisco IOS Software Release 12.3(23)SEE2. A Cisco 3750 switch is connected to the FastEthernet1/0/1 port on MDF_2811. MDF_2811 is installed in the main distribution facility on floor 28 of building 11. 4

Refer to the exhibit. The administrator wishes to specify that the 56 kb/s circuit will be a backup link tha automatically be used in the event that the primary Frame Relay circuit goes down for traffic to the 172.16.75.0/24 network. Which command syntax will accomplish this? RouterA(config)# ip route 172.16.75.0 255.255.255.0 192.16.35.76 200 RouterA(config)# ip route 172.16.75.0 255.255.255.0 192.16.35.76 RouterA(config)# ip route 172.16.75.0 255.255.255.0 172.16.75.1 RouterA(config)# ip route 192.16.35.76 255.255.255.0 172.16.75.1 5 What are two descriptors of a Frame Relay DLCI? (Choose two.) Layer 2 address one DLCI allowed per local loop locally significant circuit endpoint signaling standard between DTE and DCE provides statistics on PVC usage and connections

What is a signaling standard that is used for managing and maintaining the connection between a CPE ro and the service provider Frame Relay switch? ARP CIR DLCI

Inverse ARP LMI 7

A company offers online ordering of its products. The web service is provided by a primary web server t synchronizes with a backup server. A network designer recommends adding a load balancing unit and in additional web servers so that the online ordering traffic can be equally distributed among four web serve What network design risk is addressed with this recommendation? limited bandwidth possible bottleneck single point of failure large failure domains

In a converged network, which two types of traffic would be categorized as real-time traffic? (Choose tw e-mail file transfer web browsing videoconferencing voice over IP video on demand

Refer to the exhibit. A network engineer issues the show ip route command to validate that the newly designed network is working as anticipated. Which users will the Admin_LAN be able to communicate Users on the Admin_LAN will not be able to communicate with users on either LAN. Users on the Admin_LAN will be able to communicate with the users on the Faculty_LAN. Users on the Admin_LAN will be able to communicate with the users on the Student_LAN. Users on the Admin_LAN will be able to communicate with the users on the Faculty_LAN and the Student_LAN. 0

1 Which WLAN operational feature can be configured as non-broadcast in order to increase the security o enterprise WLAN for employees? SSID WEP keys VLAN parameters WPA encryption keys VPN authentication information

11

What are two advantages of using Layer 3 devices instead of Layer 2 switches at the distribution layer o hierarchical network? (Choose two.) allows connectivity between different VLANs provides reliable connectivity to the end user reduces the number of required redundant links

results in fewer IP subnets to configure and manage enables traffic filtering that is based on subnet addresses 1 What type of system connects to the PSTN and uses a PBX to route calls via analog or digital lines? 2 VPN VoIP IP telephony traditional telephony 13 What makes the Cisco EasyVPN application a useful tool for VPN implementation? It provides encryption algorithms unavailable in other systems. It ensures that remote workers actually use the VPN for connectivity. It simplifies the configuration tasks for the device that is used as the VPN server. It allows a greater variety of network devices to be used for VPN connections. 4

1 A NetworkingCompany engineer is on a support call resolving technical problems for a client network. the issue is resolved, the engineer also provides a training session for the network support staff. What ro the engineer filling on the networking company team? post-sales field engineer pre-sales engineer network designer account manager

15

Refer to the exhibit. Which two commands allow verification of end-to-end Layer 3 connectivity from R3 devices? (Choose two.)

R3> ping R3# traceroute R3# show ip arp R3# show ip route R3# show cdp neighbors

Showing 1 of 4 Close Window

<Prev

Page:

Next>

All contents copyright 1992-2011 Cisco Systems, Inc. Privacy Statement and Trademarks. Close Window

Assessment System 1. Assessment Selection 2. Assessment Settings 3. Take Assessment

Take Assessment - DCompNtwk Final - CCNA Discovery: Designing and Supporting Computer Networks (Version 4.0) Time Remaining: 16

Refer to the exhibit. A pre-sales system engineer receives a diagram of the current WAN from a custom EIGRP is the routing protocol used on the WAN. Based on the default operation of EIGRP, which state true about the routing table on router R1? There is a single route to the 192.168.16.0/24 LAN using the T1 connection. There is a single route to the 192.168.16.0/24 LAN using the DSL connection. There is a single route to the 192.168.16.0/24 LAN using the Metro Ethernet connection. EIGRP installs all three routes to the 192.168.16.0/24 LAN and load balances the traffic. 1 7

Refer to the exhibit. A network administrator is configuring a new router to provide routing between VL The administrator removes the router from the box and connects the Fa0/0 interface to a trunking port o

switch. After the configuration is applied to the router, as shown in the exhibit, the traffic between VLA fails. What is causing this to occur? The R1 router needs a routing protocol configured. The subinterfaces of the R1 router should have IP addresses applied. The R1 router needs three additional Fast Ethernet interfaces installed. The subinterfaces of the R1 router should be configured in the same VLAN. 18 What type of Frame Relay subinterface must be used to connect remote sites without having to disable horizon? multipoint multiaccess point-to-point nonbroadcast multiaccess 1 9

Refer to the exhibit. What can the field engineer conclude about the EIGRP authentication between Rou Router2? Authentication will fail because only one key is configured. Authentication will succeed and EIGRP updates can be exchanged. Authentication will fail because the key chain names do not match. Authentication will fail because the key chain names must match the router names. 20

What is one action which an SNMP tool might take if a network fault occurs or when predefined thresh exceeded? shut down the network

reset all network resources send an e-mail message to an administrator reload the IOS on the network component responsible for the error 1

2 A school district decides to use the 172.30.0.0/16 network for its LAN networks. The network administ must create an addressing scheme to support 500 users in the admin office, 200 at the high school, 60 at elementary school and 28 at the district office. Which VLSM addressing scheme will correctly address network with minimal waste? 172.30.0.0/20 admin 172.30.1.0/21 high school 172.30.1.8/22 elementary 172.30.1.12/26 district 172.30.0.0/22 admin 172.30.4.0/23 high school 172.30.5.0/24 elementary 172.30.6.0/26 district 172.30.0.0/23 admin 172.30.2.0/24 high school 172.30.3.0/26 elementary 172.30.3.64/27 district 172.30.0.0/23 admin 172.30.2.0/24 high school 172.30.3.0/25 elementary 172.30.3.127/26 district

22

The main office of a NetworkingCompany customer currently connects to three branch offices via three separate point-to-point T1 circuits. The customer network uses RIPv2 as the routing protocol within bo LAN and the WAN. The account manager proposes a change to a Frame Relay network because the co lower. A single local loop connection can be installed at the main office with three separate PVCs to co the branch offices. How can the main office edge router be configured to enable the customer to continu use RIP as the WAN routing protocol? Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the rem routers. To prevent the Frame Relay network from causing a routing loop, disable split horizon on the seria interface. Create three separate point-to-point subinterfaces on the serial interface and assign a different subn address to each one. Configure the serial interface with a single interface DLCI number and create frame-relay map sta for each remote site address.

2 A network engineer is prototyping a new IP addressing and summarization strategy for a new network t be integrated into the existing infrastructure. Which method is appropriate for testing the addressing sch using the production network of the customer using actual network equipment in a lab

using the Cisco Network Assistant using a network simulation tool 24

A large company plans to add several servers and requires that the servers be reachable directly from th Internet. Which action will help the company accomplish this goal? Assign to each server a static internal IP address that is mapped statically to a public IP address. Place all servers in their own Class C private subnet. Provide a private address to each server using DHCP. Assign addresses from a pool of public Class B addresses using DHCP. 2 Why is it difficult for network designers to predict the patterns and behavior of file transfer traffic? The traffic is user initiated. File size is typically very small. Dedicated bandwidth is essential. All file transfer traffic is queued as high priority.

26

A designer is creating a test plan to validate a WAN design that is based on Frame Relay technology. W network device can be used in the prototype network to serve as a Frame Relay switch? DSLAM CSU/DSU Cisco 2950 switch Cisco router with appropriate IOS

2 A company has an IT staff that is not highly trained. What two features or technologies must the netwo designer identify as training needs in order for the staff to understand the basic operation of VPNs? (Ch two.) access control lists encryption algorithms Frame Relay configuration QoS operation tunneling protocols VLAN configuration

28

Refer to the exhibit. Following a test plan, the network systems engineer completes the configuration of access layer switch and connects three PCs. The engineer attempts to ping from each PC to the other co PCs to test the configuration. Which statement describes the result of the last step? Host 1 can ping Host 2. Host 1 can ping Host 3. Host 2 can ping Host 3. No hosts can ping any other host. 9 2 What should be considered in the design of a wireless LAN on a corporate campus? the vendor of all employee wireless NICs the cables that are used for LAN connectivity the number of wireless NICs required on enterprise servers the messaging features that are used on employee cell phones the location of the concrete pillars and walls between the offices

30

Refer to the exhibit. A NetworkingCompany engineer is characterizing an existing network for a new cus The engineer issues a show running-config command on the branch router to gather configuration inform What is the engineer able to determine as a result of viewing the output of this command? The branch office router has two routes to the main office LANs in the routing table. The default route for the branch office traffic is the serial link to the Edge2 router. A connection through ISP-A will be used to reach the main office LANs if the Frame Relay network unavailable. By using both the DSL and the Frame Relay connection, the branch office router will load balance tr that is destined for the main office LANs. Showing 2 of 4 Close Window All contents copyright 1992-2011 Cisco Systems, Inc. Privacy Statement and Trademarks. Close Window <Prev Next>

Page:

Assessment System

1. Assessment Selection

2. Assessment Settings

3. Take Assessment

Take Assessment - DCompNtwk Final - CCNA Discovery: Designing and Supporting Computer Networks (Version 4.0) Time Remaining: 31

On a Monday morning the help desk at a large company receives an unusually high number of calls rep no connectivity to the Internet or to any other network resources. Otherwise the PCs are functioning no Help desk technicians note that all the calls are from a single department, and all affected users are on t floor of a single building. Where should the help desk technicians suspect that the problem lies? workgroup switch PC power supplies patch cords from PCs to network jacks cabling from the network jack to the wiring closet 3

Refer to the exhibit. The routers are configured with RIPv2 and utilize the default configuration. When attempting to communicate with other networks, hosts from 172.31.1.0/24 are experiencing connectivit issues. What could be done to resolve this issue? Change to a public IP address scheme. Ensure that automatic route summarization has been disabled on all routers in the network. Change the IP address for the Router3 LAN to be 192.168.7.0/24. Change the subnet mask on the link between Router2 and Router3 to 255.255.255.0. 33

Using the show frame-relay pvc and debug frame-relay lmi commands to troubleshoot a Frame Rela problem, a network administrator rules out issues at Layers 1 and 2. Further investigation reveals that th address of the remote router does not appear in the Frame Relay table. What should the next step be in s the problem? Configure the router using the frame-relay map ip command. Disable Inverse ARP on the local router. Verify that the remote router has Frame Relay encapsulation enabled.

Ensure that the LMI type is correct for the circuit. 4

3 Which task would typically only require services that are located at the access layer of the hierarchical d model? placing a VoIP call to a business associate in another country connecting to the corporate web server to update sales figures using a VPN from home to send data to the main office server farm responding to an e-mail from a co-worker in another department printing a meeting agenda on a local departmental network printer

35

During the boot process and using the default sequence, what is the first location where the router will l the IOS? ROM flash NVRAM TFTP server

3 A network administrator designing a LAN prototype wants to ensure that only a single web server can c to port Fa0/1 on a Cisco Catalyst 2960 switch. The server is plugged into the Fa0/1 port and the server i online. What can the administrator do to ensure that only the MAC address of the server is permitted ac Fa0/1? Configure port Fa0/1 to blocking mode. Configure port Fa0/1 to accept connections only from the static IP address of the server. Configure port security on Fa0/1 to reject all connections from MAC addresses other than that of th server. Bind the IP address of the server to the MAC address on the switch to prevent other hosts from spo the server IP address.

37

A network technician suspects that data is being intercepted when people connect to the network from o What can be done to remove the threat to security? Strengthen physical security. Implement NAT at the network boundary. Establish VPN connections for offsite users. Implement CHAP for authentication.

3 A WIC-1T module needs to be installed in a Cisco 1841 router that currently has a WIC-2T module in s What should the network technician do first? Install the hot-swappable option module. Turn off the power to the router before installing the new module. Remove the WIC-2T module so that the new module can be installed in slot 0.

Shut down all Fast Ethernet ports on the router until the new WIC module installation is complete. Configure the Cisco IOS software to support an internal trunk link between the two WIC modules. 39

An administrator is charged with providing guaranteed quality of service for certain applications. What technical requirement does QoS help to satisfy? Availability Manageability Security Scalabilty 4

Refer to the exhibit. Which set of commands will meet the security requirements that are shown?

41

Refer to the exhibit. A company with four servers in its server farm has not enabled PVRST on the swit that connect to the server farm segment. What will happen within the network if a primary link goes do Access to the the servers will be lost. Convergence time will be slow and possibly cause applications to time out.

Routing protocols will not send the triggered updates in the event of a failure of the root bridge. Switches that connect the servers to the network will not be found by other switches in the network 4 2

Refer to the exhibit. An extended ACL has been created to deny traffic from the 192.168.35.0/24 netwo the web server with IP address 209.165.201.15. According to Cisco best practices, where should the AC applied? RTB Fa0/0 inbound RTC S0/0/1 inbound RTD Fa0/0 outbound RTC S0/1/0 outbound 43

What information does an administrator require before saving the running configuration from a router t TFTP server? router IP address and the name of the configuration file in NVRAM TFTP server IP address and the size of the configuration file in RAM TFTP server IP address and the name of the configuration file that will be saved router IP address, size of the file and name of the configuration file on the TFTP server TFTP server IP address, the router IP address, and the router interface through which the file will b loaded 4

Refer to the exhibit. What summary address can R4 advertise to R5 to reach the three networks on R1, R3 without overlapping the networks on R5? 172.16.0.0/12 172.24.0.0/13 172.20.0.0/14 172.20.0.0/15 172.24.0.0/15

45 A router has been removed from the network for maintenance. A new Cisco IOS software image has been successfully downloaded to a server and copied into the flash of the router. What should be done before p the router back into the production network? Back up the new image. Copy the running configuration to NVRAM. Restart the router and verify that the new image starts successfully. Delete the previously used version of the Cisco IOS software from flash.

Showing 3 of 4 Close Window

<Prev

Page:

Next>

All contents copyright 1992-2011 Cisco Systems, Inc. Privacy Statement and Trademarks. Close Window

Assessment System 1. Assessment Selection 2. Assessment Settings 3. Take Assessment

Take Assessment - DCompNtwk Final - CCNA Discovery: Designing and Supporting Computer Networks (Version 4.0) Time Remaining: 46

Which characteristic should be considered by a network designer when implementing a VoIP solution? VoIP traffic is generally classified as low priority. VoIP centrally routes calls in the same manner as a traditional PBX. VoIP traffic is highly reliable because of retransmission of dropped packets. VoIP can make use of QoS features to help reduce interruptions in communication.

4 A nonroot switch has two paths to the root switch. One path is via the root port. Which Rapid Spanning role will the second port assume to prevent forwarding traffic? Root Backup alternate designated disabled While configuring EIGRP on a router, the technician enters this command: Router(config-router)# variance 8 What is the effect of entering this command? It adjusts the cost of all EIGRP routes to 8. It enables unequal cost load balancing on the router. It restricts the number of EIGRP feasible successor routes to 8. It enables EIGRP equal cost load balancing over a maximum of 8 routes. It modifies the number of values used in the composite metric calculation.

48

4 During prototype testing, a LAN switch fails. As the switch re-initializes using the default parameters, a that has a PC attached transitions to the forwarding state within one second. What protocol would suppo feature? STP

RIP BGP VTP RSTP 50

A network administrator of a middle-sized company is asked to upgrade the routing protocol of the netw support VLSM and route summarization. The current company network contains both Cisco and non-C routers. Which routing protocol should be used for the upgrade? BGP RIPv1 RIPv2 EIGRP

5 When implementing a security policy, which two actions should be included as part of the security chec 1 (Choose two.) Disable all logging. Enable Telnet on TCP port 23. Use HTTP for web administration. Set timeouts and ACLs on VTY lines. Shut down any unused ports and interfaces.

52 Which feature relies on prioritization of network traffic and is used to ensure successful delivery of real-t services? Security reliability redundancy quality of service

Showing 4 of 4 Close Window

<Prev

Page:

Next>

All contents copyright 1992-2011 Cisco Systems, Inc. Privacy Statement and Trademarks.

Das könnte Ihnen auch gefallen