Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
5Activity
0 of .
Results for:
No results containing your search query
P. 1
Ccna 3 Discovery 4.0 Chapter 1

Ccna 3 Discovery 4.0 Chapter 1

Ratings: (0)|Views: 407|Likes:
Published by jeorgeclones

More info:

Published by: jeorgeclones on Jun 17, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as DOC, PDF, TXT or read online from Scribd
See more
See less

08/15/2014

pdf

text

original

 
1
Which two statements are reasons why UDP is used for voice and video traffic instead of TCP? (Choose two.)TCP requires all data packets to be delivered for the data to be usable.The acknowledgment process of TCP introduces delays that break the streams of data.UDP does not have mechanisms for retransmitting lost packets.UDP tolerates delays and compensates for them.TCP is a connectionless protocol that provides end-to-end reliability.UDP is a connection-oriented protocol that provides end-to-end reliability.
2
Which functional component of the Cisco Enterprise Architecture is responsible for hosting internal servers?enterprise campusenterprise edgeservice provider edge building distribution
3
Which two solutions would an enterprise IT department use to facilitate secure intranet access for remote workers?(Choose two.)VPN NATuser authenticationclient firewall software packet sniffing
4
What is the purpose of the Cisco Enterprise Architecture?remove the three-layer hierarchical model and use a flat network approachdivide the network into functional components while still maintaining the concept of Core, Distribution, andAccess Layers provide services and functionality to the core layer by grouping various components into a single componentlocated in the access layer reduce overall network traffic by grouping server farms, the management server, corporate intranet, and e-commerce routers in the same layer 
5
In which functional area of the Cisco Enterprise Architecture should IDS and IPS be located to detect and preventmalicious activity from outside?
 
enterprise campusWAN and Internetenterprise edgeservice provider edge
6
What is a benefit of having an extranet?It provides web-like access to company information for employees only.It limits access to corporate information to secure VPN or remote access connections only.It allows customers and partners to access company information by connecting to a public web server.It allows suppliers and contractors to access confidential internal information using controlled externalconnections.
7
What does VoIP provide to telecommuters?high-quality, live-video presentationsreal-time voice communications over the Internetability to share desktop applications simultaneouslysecure, encrypted data transmissions through the Internet
8
What can be found at the enterprise edge?Internet, VPN, and WAN modulesInternet, PSTN, and WAN servicesserver farms and network managementconsultant must use Internet websites to research a report on the e- business strategies of several firms and then electronically deliver the report to a group of clients in citiesthroughout the worlcampus infrastructure, including access layer devices
9
Which task would typically only require services located at the access layer of the hierarchical design model?connecting to the corporate web server to update sales figuresusing a VPN from home to send data to the main office servers printing a meeting agenda on a local departmental network printe placing a VoIP call to a business associate in another countryresponding to an e-mail from a co-worker in another department
 
10
What are two important characteristics or functions of devices at the Enterprise Edge? (Choose two.) providing Internet, telephone, and WAN services to the enterprise network  providing a connection point for end-user devices to the enterprise network  providing high-speed backbone connectivity with redundant connections providing intrusion detection and intrusion prevention to protect the network against malicious activity providing packet inspection to determine if incoming packets should be allowed on the enterprise network 
11
The ABC Corporation implements the network for its new headquarters using the Cisco Enterprise Architecture.The network administrator wants to filter the traffic from and to the outside world. Where should the administrator deploy a firewall device?server farmenterprise edgeenterprise campusservice provider edge
12
Which two measures help ensure that a hardware problem does not cause an outage in an enterprise LAN thatsupports mission critical services? (Choose two.) providing failover capabilityinstalling redundant power supplies purchasing more bandwidth from the ISPenabling half-duplex connectivity to access layer devicesinstalling routers that can handle a greater amount of throughput
13
Which statement describes the difference between an enterprise WAN and an enterprise extranet?An enterprise WAN is designed to interconnect local LANs, while an enterprise extranet is designed tointerconnect remote branch offices.An enterprise WAN is designed to interconnect branch offices, while an enterprise extranet is designed to giveaccess to external business partners.An enterprise WAN is designed to provide remote access for its teleworkers, while an enterprise extranet isdesigned to provide Internet connectivity for the enterprise.An enterprise WAN is designed to provide Internet connectivity for the enterprise, while an enterprise extranetis designed to provide remote access to the enterprise network for teleworkers.

Activity (5)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
Derick Sabale liked this
Odin Smith liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->