Close Window

Assessment System

1. Assessment Selection

2. Assessment Settings

3. Take Assessment

Take Assessment - DCompNtwk Final - CCNA Discovery: Designing and Supporting Computer Networks (Version 4.0)

T o p o f F o r m 2210994 B o tt o mRemaining: o f F o r m

Time

1

Top of Form

What is the function of a network modular block diagram? It provides a high level view of all sites in an enterprise network. It shows a simplified version of a network and diagrams major functions.------It lists the networking equipment and addressing schemes for each network segment. It shows all the major pieces of networking equipment in a network and how they interconnect.
Bottom of Form

2

Top of Form

If traditional phones are used when introducing VoIP to a network, what component would be required to convert the analog voice from traditional telephone signals into IP packets? Multipoint control unit Power over Ethernet switches a router that acts as a voice gateway Cisco Unified Communications Manager-----------------Bottom of Form

3

Top of Form

A company has just transitioned from traditional telephony to an IP Telephony solution for their voice requirements. What statement describes a characteristic of the new system? connects through a PBX to the PSTN replaces a digital system with an analog one combines data and voice into a converged network requires manual configuration for adding, moving or changing phones enables web applications and phone directories to be available to every PC on the network
Bottom of Form

4

Top of Form

Refer to the exhibit. The routers are configured with RIPv2 with default configurations. When attempting to communicate with other networks, hosts from 10.0.11.0/24 are experiencing connectivity issues. What could done to resolve this issue? Change to a public IP addressing scheme. Use EIGRP with its default configuration as the routing protocol. Change the subnet mask on the link between R2 and R3 to 255.255.255.0. Disable automatic route summarization on all routers in the network.
Bottom of Form

5

Top of Form

Which two descriptions relate to a Frame Relay DLCI? (Choose two.) guaranteed rate at which data travels on the packet-switched network signalling standard between DTE and DCE indicator of congestion on the network locally significant circuit endpoint--------------------one DLCI allowed per local loop Layer 2 address------------------Bottom of Form

6

Top of Form

Why is it difficult for network designers to predict the patterns and behavior of file transfer traffic?

The traffic is user initiated.-----------------------File size is typically very small. Dedicated bandwidth is essential. All file transfer traffic is queued as high priority.
Bottom of Form

7

Top of Form

A school district decides to use the 172.30.0.0/16 network for its LAN networks. The network administrator must create an addressing scheme to support 500 users in the admin office, 200 at the high school, 60 at the elementary school and 28 at the district office. Which VLSM addressing scheme will correctly address the network with minimal waste? 172.30.0.0/20 admin 172.30.1.0/21 high school 172.30.1.8/22 elementary 172.30.1.12/26 district 172.30.0.0/22 admin 172.30.4.0/23 high school 172.30.5.0/24 elementary 172.30.6.0/26 district 172.30.0.0/23 admin 172.30.2.0/24 high school 172.30.3.0/26 elementary 172.30.3.64/27 district 172.30.0.0/23 admin 172.30.2.0/24 high school 172.30.3.0/25 elementary 172.30.3.127/26 district
Bottom of Form Top of Form

8

Which task would typically only require services that are located at the access layer of the hierarchical design model? placing a VoIP call to a business associate in another country connecting to the corporate web server to update sales figures using a VPN from home to send data to the main office server farm responding to an e-mail from a co-worker in another department printing a meeting agenda on a local departmental network printer-------------Bottom of Form

9

Top of Form

Which three enhancements does IPv6 offer over IPv4? (Choose three.) easier implementation and configuration more effective IP security------------------integrated IP mobility support-------------simplified header information--------------------fewer reserved IP addresses eliminates the need to implement DHCP
Bottom of Form

10

Top of Form

A network administrator is integrating IPv6 into an IPv4 network by encapsulating one protocol packet withi another protocol. Which transition method is being used? dual stack Tunneling---------------proxying and translation NAT with Protocol Translator
Bottom of Form

11

Top of Form

Refer to the exhibit. During a test of an EIGRP prototype network, a network administrator issues a show ip protocols command. What two facts can be determined from the output? (Choose two.) The administrative distance is 100. This router has one adjacent neighbor. There are 10 Cisco devices in this prototype network. The auto-summary command was applied on this router. EIGRP is using two values for the calculation of the composite metric. EIGRP on this router will display up to four unequal cost routes to the same destination.
Bottom of Form

12

Top of Form

Which two pieces of information are needed before an IOS image may be loaded on a router from a TFTP server? (Choose two.) the IP address of the TFTP server----------------the current name of the IOS image on the router the operating system of the TFTP server

the name of the configuration file in NVRAM the name of the IOS image on the TFTP server---------------encapsulation of the router interface that is connected to the TFTP server
Bottom of Form

13

Top of Form

Which two values represent valid IPv6 addresses? (Choose two.) ::::1 FF01::1----------------0:0:0:0:0:0:0:1 2001:DB8::47::2A4 2031:0000:04AC:3400:FFE3:0
Bottom of Form

14

Top of Form

A network administrator has configured Frame Relay on a serial interface and issued the show interfaces ser command. The output shows that the interface is up and the line protocol is up. However, pings to the remote router across the link fail. What should the next step be to ensure that the IP address of the remote router app in the Frame Relay map table of the local router? Configure the router using the no inverse-arp command. Ensure that the LMI type is correct for the circuit. Configure the router using the frame-relay map ip command. Verify that the remote router has Frame Relay encapsulation enabled.
Bottom of Form

15

Top of Form

Refer to the exhibit. A networking company technician conducts testing on a prototype to verify that the proposed network design meets connectivity requirements. Which command and its associated output will provide evidence that inter-VLAN routing is implemented correctly and that all users have full connectivity t each other?

Bottom of Form

Top of Form

Showing 1 of 4

<Prev

1

Page:
Bottom of Form

Next>

Close Window

All contents copyright 1992-2009 Cisco Systems, Inc. Privacy Statement and Trademarks.
Top of Form

1

Bottom of Form

Close Window

Assessment System

1. Assessment Selection

2. Assessment Settings

3. Take Assessment

Take Assessment - DCompNtwk Final - CCNA Discovery: Designing and Supporting Computer Networks (Version 4.0)

2156161 T o p o f Remaining: F o r m
B o tt o m o

Time

f F o r m

16

Top of Form

During prototype testing, the network designer performs a test to determine the ability of the network to store device configurations and statistics on local databases. Which design goal is validated if the test is a success? security scalability availability manageability
Bottom of Form

17

Top of Form

Which IOS component can be used for classification and protocol discovery of network traffic and applicatio in use? CDP NBAR ACL logging Network Assistant
Bottom of Form

18

Top of Form

Which WLAN operational feature can be configured as non-broadcast in order to increase the security of an enterprise WLAN for employees? SSID WEP keys VLAN parameters WPA encryption keys

VPN authentication information
Bottom of Form

19

Top of Form

Refer to the exhibit. A network administrator is validating the routing for the new network design. Which command should be used to configure the s0/0/0 interface of the SALES router to advertise the Sales Department networks as one route? SALES(config-if)# ip summary-address eigrp 100 172.16.0.0 255.255.0.0 SALES(config-if)# ip summary-address eigrp 100 172.16.8.0 255.255.240.0 SALES(config-if)# ip summary-address eigrp 100 172.16.16.0 255.255.240.0 SALES(config-if)# ip summary-address eigrp 100 172.16.31.0 255.255.248.0
Bottom of Form

20

Top of Form

Refer to the exhibit. A pre-sales systems engineer receives a diagram of the exhibited WAN implementation from a customer. EIGRP is the routing protocol that is used on the WAN. None of the parameters for EIGRP metric calculation have been modified in any router configurations. Which statement is true about the routing table on router RM? There is a single route to the 192.168.24.0/24 LAN using the T1 connection. There is a single route to the 192.168.24.0/24 LAN using the DSL connection. There is a single route to the 192.168.24.0/24 LAN using the Metro Ethernet connection. EIGRP installs all three routes to the 192.168.24.0/24 LAN and load balances the traffic.
Bottom of Form

21

Top of Form

Refer to the exhibit. Which set of commands will meet the security requirements that are shown?

Bottom of Form

22

Top of Form

What is one advantage of a full mesh topology at the core layer of the enterprise network compared with a partial mesh topology? It adds scalability to the corporate network. It provides fully redundant links to connecting modules. It lowers the impact and risk of DoS attacks from the Internet. It increases the manageability of the network devices in the core layer.
Bottom of Form

23

Top of Form

What are two disadvantages to using simulation software such as Packet Tracer to validate a network design? (Choose two.) unrealistic performance little control over network operation inability to create large or complex networks inability to simulate all required network conditions lack of flexibility to support different devices and connectivity options
Bottom of Form

24

Top of Form

During a review of the proposed bill of materials, an account manager of the network solution company reali that the systems engineer included a switch with lower cost and reduced capabilities for the access layer than was originally specified by the network designer. When questioned, the systems engineer responds that the switches specified by the designer cannot be purchased within the budget limitations of the customer. Which action should the account manager take? Inform the customer that the project budget must be increased.

Inform the customer that the project cannot be completed given the unreasonable budget constraints.

Communicate any risks that are associated with the equipment substitution and obtain customer approval proceed. Because the customer is probably aware that the budget limitations will require lower cost, less capable equipment, the account manager should do nothing.
Bottom of Form

25

Top of Form

Refer to the exhibit. What can the field engineer conclude about the EIGRP authentication between Router1 Router2? Authentication will fail because only one key is configured. Authentication will succeed and EIGRP updates can be exchanged. Authentication will fail because the key chain names do not match. Authentication will fail because the key chain names must match the router names.
Bottom of Form

26

Top of Form

A network designer must select a routing protocol for the network of a customer. The currently installed netw contains both Cisco and non-Cisco routers, and there is no budget to replace them. The designer plans on implementing both VLSM and route summarization in the new network design. Which two protocols can provide the necessary functionality for this LAN? (Choose two.) RTP

RSTP RIPv1 RIPv2 EIGRP OSPF
Bottom of Form

27

Top of Form

A company offers online ordering of its products. The web service is provided by a primary web server that synchronizes with a backup server. A network designer recommends adding a load balancing unit and install additional web servers so that the online ordering traffic can be equally distributed among four web servers. What network design risk is addressed with this recommendation? limited bandwidth possible bottleneck single point of failure large failure domains
Bottom of Form

28

Top of Form

Refer to the exhibit. A network administrator configures two routers to test the WAN connection. The serial connection requires PPP encapsulation and authentication with CHAP. However, the connection cannot be established. According to the partial output of the show running-config command, what is the cause of the problem? The password should be all lowercase. The password should contain fewer than 8 characters. The usernames must be the same as the sending router hostnames. The usernames must be the same as the destination router hostnames.
Bottom of Form

29

Top of Form

In order for the IT staff of a company to understand the basic operation of VPNs, which two features or technologies must the network designer identify as training needs? (Choose two.) IPv6 tunneling QoS operation tunneling protocols VLAN configuration encryption algorithms
Bottom of Form

30

Top of Form

What is a function of software queuing? filters traffic on the basis of administrator defined rules stores received traffic and sends packets based on the order that the packets are received sends packets on the basis of priorities that are manually set transmits packets in a priority sequence that is based on source port
Bottom of Form

Top of Form

Showing 2 of 4

<Prev

2

Page:
Bottom of Form

Next>

Close Window

All contents copyright 1992-2009 Cisco Systems, Inc. Privacy Statement and Trademarks.
Top of Form

2

Bottom of Form

Close Window

Assessment System

1. Assessment Selection

2. Assessment Settings

3. Take Assessment

Take Assessment - DCompNtwk Final - CCNA Discovery: Designing and Supporting Computer Networks (Version 4.0)

T o p o f F o r m 2043227 B o tt o mRemaining: o f F o r m

Time

46

Top of Form

What makes the Cisco EasyVPN application a useful tool for VPN implementation? It provides encryption algorithms unavailable in other systems. It ensures that remote workers actually use the VPN for connectivity.

It simplifies the configuration tasks for the device that is used as the VPN server. It allows a greater variety of network devices to be used for VPN connections.
Bottom of Form

47

Top of Form

Refer to the exhibit. A customer has a problem with connectivity in the network. Based on the IP addressing scheme, what is causing the problem? The WAN link that connects R1 to R3 has an incorrect mask. The WAN links need IP addresses from a different major network. The WAN link that connects R1 to R2 overlaps with the R3 LAN. The IP addressing in R1 LAN is incorrect because subnet zero cannot be used with VLSM.
Bottom of Form

48

Top of Form

Which technical requirement is satisfied when providing QoS for delay sensitive applications? availability manageability scalability

security
Bottom of Form

49

Top of Form

Which statement best describes the VPN feature called split tunneling? It creates separate pathways for different VLANs. It creates two tunnels, one for user traffic and one for management traffic such as CDP and SNMP.

It allows user traffic that is destined for the corporate network to travel across the VPN tunnel, while traf destined for the Internet travels through the local LAN of the VPN client. It allows separate tunnels so that high priority traffic, such as voice and video, uses the higher bandwidth tunnel, while all other user traffic travels on the lower bandwidth tunnel.
Bottom of Form

50

Top of Form

As part of network monitoring, a network administrator receives an alert that the CPU usage of the core route reaches 90% several times a day. Which protocol is in use to monitor the network performance? DNS SNMP SMTP DHCP TFTP
Bottom of Form

51

Top of Form

The main office of a NetworkingCompany customer currently connects to three branch offices via three sepa point-to-point T1 circuits. The customer network uses RIPv2 as the routing protocol within both the LAN an the WAN. The account manager proposes a change to a Frame Relay network because the costs are lower. A single local loop connection can be installed at the main office with three separate PVCs to connect the branc offices. How can the main office edge router be configured to enable the customer to continue to use RIP as t WAN routing protocol? Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote routers. To prevent the Frame Relay network from causing a routing loop, disable split horizon on the serial interface. Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP address to each one. Configure the serial interface with a single interface DLCI number and create frame-relay map stateme for each remote site address.
Bottom of Form

52

Top of Form

Which command can be used to load a new Cisco IOS image on a router? copy startup-config tftp: copy tftp: startup-config copy running-config tftp: copy tftp: flash: copy flash: tftp: copy flash: startup-config
Bottom of Form

Top of Form

Showing 4 of 4

<Prev

4

Page:
Bottom of Form

Next>

Close Window

All contents copyright 1992-2009 Cisco Systems, Inc. Privacy Statement and Trademarks.
Top of Form

4

Bottom of Form

s

Sign up to vote on this title
UsefulNot useful