You are on page 1of 23

Close Window

Assessment System

1. Assessment 2. Assessment 3. Take


Selection Settings Assessment

Take Assessment - DCompNtwk Final - CCNA Discovery: Designing and Supporting


Computer Networks (Version 4.0)

T
o
p
o
f
F
o
r
m 2210994
B Time
o
tt
o
mRemaining:

o
f
F
o
r
m
1 Top of Form
What is the function of a network modular block diagram?
It provides a high level view of all sites in an enterprise network.

It shows a simplified version of a network and diagrams major functions.-------

It lists the networking equipment and addressing schemes for each network segment.

It shows all the major pieces of networking equipment in a network and how they interconnect.
Bottom of Form

2 Top of Form
If traditional phones are used when introducing VoIP to a network, what component would be required to
convert the analog voice from traditional telephone signals into IP packets?
Multipoint control unit

Power over Ethernet switches

a router that acts as a voice gateway

Cisco Unified Communications Manager------------------


Bottom of Form

3 Top of Form
A company has just transitioned from traditional telephony to an IP Telephony solution for their voice
requirements. What statement describes a characteristic of the new system?
connects through a PBX to the PSTN

replaces a digital system with an analog one

combines data and voice into a converged network

requires manual configuration for adding, moving or changing phones

enables web applications and phone directories to be available to every PC on the network
Bottom of Form

4 Top of Form
Refer to the exhibit. The routers are configured with RIPv2 with default configurations. When attempting to
communicate with other networks, hosts from 10.0.11.0/24 are experiencing connectivity issues. What could
done to resolve this issue?
Change to a public IP addressing scheme.

Use EIGRP with its default configuration as the routing protocol.

Change the subnet mask on the link between R2 and R3 to 255.255.255.0.

Disable automatic route summarization on all routers in the network.


Bottom of Form

5 Top of Form
Which two descriptions relate to a Frame Relay DLCI? (Choose two.)
guaranteed rate at which data travels on the packet-switched network

signalling standard between DTE and DCE

indicator of congestion on the network

locally significant circuit endpoint---------------------

one DLCI allowed per local loop

Layer 2 address-------------------
Bottom of Form

6 Top of Form
Why is it difficult for network designers to predict the patterns and behavior of file transfer traffic?
The traffic is user initiated.------------------------

File size is typically very small.

Dedicated bandwidth is essential.

All file transfer traffic is queued as high priority.


Bottom of Form

7 Top of Form
A school district decides to use the 172.30.0.0/16 network for its LAN networks. The network administrator
must create an addressing scheme to support 500 users in the admin office, 200 at the high school, 60 at the
elementary school and 28 at the district office. Which VLSM addressing scheme will correctly address the
network with minimal waste?
172.30.0.0/20 admin
172.30.1.0/21 high school
172.30.1.8/22 elementary
172.30.1.12/26 district
172.30.0.0/22 admin
172.30.4.0/23 high school
172.30.5.0/24 elementary
172.30.6.0/26 district
172.30.0.0/23 admin
172.30.2.0/24 high school
172.30.3.0/26 elementary
172.30.3.64/27 district
172.30.0.0/23 admin
172.30.2.0/24 high school
172.30.3.0/25 elementary
172.30.3.127/26 district
Bottom of Form

8 Top of Form
Which task would typically only require services that are located at the access layer of the hierarchical design
model?
placing a VoIP call to a business associate in another country

connecting to the corporate web server to update sales figures

using a VPN from home to send data to the main office server farm

responding to an e-mail from a co-worker in another department

printing a meeting agenda on a local departmental network printer--------------


Bottom of Form
9 Top of Form
Which three enhancements does IPv6 offer over IPv4? (Choose three.)
easier implementation and configuration

more effective IP security-------------------

integrated IP mobility support--------------

simplified header information---------------------

fewer reserved IP addresses

eliminates the need to implement DHCP


Bottom of Form

10 Top of Form
A network administrator is integrating IPv6 into an IPv4 network by encapsulating one protocol packet withi
another protocol. Which transition method is being used?
dual stack

Tunneling----------------

proxying and translation

NAT with Protocol Translator


Bottom of Form

11 Top of Form
Refer to the exhibit. During a test of an EIGRP prototype network, a network administrator issues a show ip
protocols command. What two facts can be determined from the output? (Choose two.)
The administrative distance is 100.

This router has one adjacent neighbor.

There are 10 Cisco devices in this prototype network.

The auto-summary command was applied on this router.

EIGRP is using two values for the calculation of the composite metric.

EIGRP on this router will display up to four unequal cost routes to the same destination.
Bottom of Form

12 Top of Form
Which two pieces of information are needed before an IOS image may be loaded on a router from a TFTP
server? (Choose two.)
the IP address of the TFTP server-----------------

the current name of the IOS image on the router

the operating system of the TFTP server


the name of the configuration file in NVRAM

the name of the IOS image on the TFTP server----------------

encapsulation of the router interface that is connected to the TFTP server


Bottom of Form

13 Top of Form
Which two values represent valid IPv6 addresses? (Choose two.)
::::1

FF01::1-----------------

0:0:0:0:0:0:0:1

2001:DB8::47::2A4

2031:0000:04AC:3400:FFE3:0
Bottom of Form

14 Top of Form
A network administrator has configured Frame Relay on a serial interface and issued the show interfaces ser
command. The output shows that the interface is up and the line protocol is up. However, pings to the remote
router across the link fail. What should the next step be to ensure that the IP address of the remote router app
in the Frame Relay map table of the local router?
Configure the router using the no inverse-arp command.

Ensure that the LMI type is correct for the circuit.

Configure the router using the frame-relay map ip command.

Verify that the remote router has Frame Relay encapsulation enabled.
Bottom of Form

15 Top of Form
Refer to the exhibit. A networking company technician conducts testing on a prototype to verify that the
proposed network design meets connectivity requirements. Which command and its associated output will
provide evidence that inter-VLAN routing is implemented correctly and that all users have full connectivity t
each other?
Bottom of Form

Top of Form

1
Showing 1 of 4 <Prev Next>
Page:
Bottom of Form

Close Window

All contents copyright 1992-2009 Cisco Systems, Inc. Privacy Statement and Trademarks.
Top of Form
1

Bottom of Form
Close Window

Assessment System

1. Assessment 2. Assessment 3. Take


Selection Settings Assessment

Take Assessment - DCompNtwk Final - CCNA Discovery: Designing and Supporting


Computer Networks (Version 4.0)

2156161
T
o Time
p
o
f
F
Remaining:
o
r
m
B
o
tt
o
m

o
f
F
o
r
m

16 Top of Form
During prototype testing, the network designer performs a test to determine the ability of the network to store
device configurations and statistics on local databases. Which design goal is validated if the test is a success?
security

scalability

availability

manageability
Bottom of Form

17 Top of Form
Which IOS component can be used for classification and protocol discovery of network traffic and applicatio
in use?
CDP

NBAR

ACL logging

Network Assistant
Bottom of Form

18 Top of Form
Which WLAN operational feature can be configured as non-broadcast in order to increase the security of an
enterprise WLAN for employees?
SSID

WEP keys

VLAN parameters

WPA encryption keys


VPN authentication information
Bottom of Form

19 Top of Form

Refer to the exhibit. A network administrator is validating the routing for the new network design. Which
command should be used to configure the s0/0/0 interface of the SALES router to advertise the Sales
Department networks as one route?
SALES(config-if)# ip summary-address eigrp 100 172.16.0.0 255.255.0.0

SALES(config-if)# ip summary-address eigrp 100 172.16.8.0 255.255.240.0

SALES(config-if)# ip summary-address eigrp 100 172.16.16.0 255.255.240.0

SALES(config-if)# ip summary-address eigrp 100 172.16.31.0 255.255.248.0


Bottom of Form

20 Top of Form
Refer to the exhibit. A pre-sales systems engineer receives a diagram of the exhibited WAN implementation
from a customer. EIGRP is the routing protocol that is used on the WAN. None of the parameters for EIGRP
metric calculation have been modified in any router configurations. Which statement is true about the routing
table on router RM?
There is a single route to the 192.168.24.0/24 LAN using the T1 connection.

There is a single route to the 192.168.24.0/24 LAN using the DSL connection.

There is a single route to the 192.168.24.0/24 LAN using the Metro Ethernet connection.

EIGRP installs all three routes to the 192.168.24.0/24 LAN and load balances the traffic.
Bottom of Form

21 Top of Form
Refer to the exhibit. Which set of commands will meet the security requirements that are shown?
Bottom of Form

22 Top of Form
What is one advantage of a full mesh topology at the core layer of the enterprise network compared with a
partial mesh topology?
It adds scalability to the corporate network.

It provides fully redundant links to connecting modules.

It lowers the impact and risk of DoS attacks from the Internet.

It increases the manageability of the network devices in the core layer.


Bottom of Form

23 Top of Form
What are two disadvantages to using simulation software such as Packet Tracer to validate a network design?
(Choose two.)
unrealistic performance

little control over network operation

inability to create large or complex networks

inability to simulate all required network conditions

lack of flexibility to support different devices and connectivity options


Bottom of Form

24 Top of Form
During a review of the proposed bill of materials, an account manager of the network solution company reali
that the systems engineer included a switch with lower cost and reduced capabilities for the access layer than
was originally specified by the network designer. When questioned, the systems engineer responds that the
switches specified by the designer cannot be purchased within the budget limitations of the customer. Which
action should the account manager take?
Inform the customer that the project budget must be increased.
Inform the customer that the project cannot be completed given the unreasonable budget constraints.
Communicate any risks that are associated with the equipment substitution and obtain customer approval
proceed.
Because the customer is probably aware that the budget limitations will require lower cost, less capable
equipment, the account manager should do nothing.
Bottom of Form

25 Top of Form

Refer to the exhibit. What can the field engineer conclude about the EIGRP authentication between Router1
Router2?
Authentication will fail because only one key is configured.

Authentication will succeed and EIGRP updates can be exchanged.

Authentication will fail because the key chain names do not match.

Authentication will fail because the key chain names must match the router names.
Bottom of Form

26 Top of Form
A network designer must select a routing protocol for the network of a customer. The currently installed netw
contains both Cisco and non-Cisco routers, and there is no budget to replace them. The designer plans on
implementing both VLSM and route summarization in the new network design. Which two protocols can
provide the necessary functionality for this LAN? (Choose two.)
RTP
RSTP

RIPv1

RIPv2

EIGRP

OSPF
Bottom of Form

27 Top of Form
A company offers online ordering of its products. The web service is provided by a primary web server that
synchronizes with a backup server. A network designer recommends adding a load balancing unit and install
additional web servers so that the online ordering traffic can be equally distributed among four web servers.
What network design risk is addressed with this recommendation?
limited bandwidth

possible bottleneck

single point of failure

large failure domains


Bottom of Form

28 Top of Form
Refer to the exhibit. A network administrator configures two routers to test the WAN connection. The serial
connection requires PPP encapsulation and authentication with CHAP. However, the connection cannot be
established. According to the partial output of the show running-config command, what is the cause of the
problem?
The password should be all lowercase.

The password should contain fewer than 8 characters.

The usernames must be the same as the sending router hostnames.

The usernames must be the same as the destination router hostnames.


Bottom of Form

29 Top of Form
In order for the IT staff of a company to understand the basic operation of VPNs, which two features or
technologies must the network designer identify as training needs? (Choose two.)
IPv6 tunneling

QoS operation

tunneling protocols

VLAN configuration

encryption algorithms
Bottom of Form
30 Top of Form
What is a function of software queuing?
filters traffic on the basis of administrator defined rules

stores received traffic and sends packets based on the order that the packets are received

sends packets on the basis of priorities that are manually set

transmits packets in a priority sequence that is based on source port


Bottom of Form

Top of Form

2
Showing 2 of 4 <Prev Next>
Page:
Bottom of Form

Close Window

All contents copyright 1992-2009 Cisco Systems, Inc. Privacy Statement and Trademarks.
Top of Form
2

Bottom of Form

Close Window
Assessment System

1. Assessment 2. Assessment 3. Take


Selection Settings Assessment

Take Assessment - DCompNtwk Final - CCNA Discovery: Designing and Supporting


Computer Networks (Version 4.0)

T
o
p
o
f
F
o
r
m 2043227
B Time
o
tt
o
mRemaining:

o
f
F
o
r
m

46 Top of Form
What makes the Cisco EasyVPN application a useful tool for VPN implementation?
It provides encryption algorithms unavailable in other systems.

It ensures that remote workers actually use the VPN for connectivity.
It simplifies the configuration tasks for the device that is used as the VPN server.

It allows a greater variety of network devices to be used for VPN connections.


Bottom of Form

47 Top of Form

Refer to the exhibit. A customer has a problem with connectivity in the network. Based on the IP addressing
scheme, what is causing the problem?
The WAN link that connects R1 to R3 has an incorrect mask.

The WAN links need IP addresses from a different major network.

The WAN link that connects R1 to R2 overlaps with the R3 LAN.

The IP addressing in R1 LAN is incorrect because subnet zero cannot be used with VLSM.
Bottom of Form

48 Top of Form
Which technical requirement is satisfied when providing QoS for delay sensitive applications?
availability

manageability

scalability
security
Bottom of Form

49 Top of Form
Which statement best describes the VPN feature called split tunneling?
It creates separate pathways for different VLANs.

It creates two tunnels, one for user traffic and one for management traffic such as CDP and SNMP.
It allows user traffic that is destined for the corporate network to travel across the VPN tunnel, while traf
destined for the Internet travels through the local LAN of the VPN client.
It allows separate tunnels so that high priority traffic, such as voice and video, uses the higher bandwidth
tunnel, while all other user traffic travels on the lower bandwidth tunnel.
Bottom of Form

50 Top of Form
As part of network monitoring, a network administrator receives an alert that the CPU usage of the core route
reaches 90% several times a day. Which protocol is in use to monitor the network performance?
DNS

SNMP

SMTP

DHCP

TFTP
Bottom of Form

51 Top of Form
The main office of a NetworkingCompany customer currently connects to three branch offices via three sepa
point-to-point T1 circuits. The customer network uses RIPv2 as the routing protocol within both the LAN an
the WAN. The account manager proposes a change to a Frame Relay network because the costs are lower. A
single local loop connection can be installed at the main office with three separate PVCs to connect the branc
offices. How can the main office edge router be configured to enable the customer to continue to use RIP as t
WAN routing protocol?
Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote
routers.
To prevent the Frame Relay network from causing a routing loop, disable split horizon on the serial
interface.
Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP
address to each one.
Configure the serial interface with a single interface DLCI number and create frame-relay map stateme
for each remote site address.
Bottom of Form
52 Top of Form
Which command can be used to load a new Cisco IOS image on a router?
copy startup-config tftp:

copy tftp: startup-config

copy running-config tftp:

copy tftp: flash:

copy flash: tftp:

copy flash: startup-config


Bottom of Form

Top of Form

4
Showing 4 of 4 <Prev Next>
Page:
Bottom of Form

Close Window

All contents copyright 1992-2009 Cisco Systems, Inc. Privacy Statement and Trademarks.
Top of Form
4

Bottom of Form
s