Take Assessment - DCompNtwk Practice Final - CCNA Discovery: Designing and Supporting Computer Networks (Version 4.

0)
1 In configuring CHAP authentication for PPP, what is important to know about the format of usernames and passwords? Only the passwords are case sensitive. The usernames and passwords are case sensitive. Neither the usernames nor the passwords are case sensitive. The usernames are case sensitive but the passwords are not. 2

Refer to the exhibit. A NetworkingCompany designer is reviewing a diagram of a customer network. What two risks or issues can be identified in topology that is shown? (Choose two.) The firewall router and ISP connection represent a single point of failure. A failure of the switch that connects the Cisco Call Manager to the network will cause the entire IP telephony system to fail. Using Layer 3 switches to interconnect the data center servers to the IP phones introduces too much delay. The IP phones need to be redundantly connected to the switches to prevent single points of failure at the access layer. If one of the Layer 3 switches fails, the Cisco Call Manager will be unreachable. 3 What is a benefit of using CIDR to summarize multiple classful networks into a single network? It reduces the number of entries in routing tables. It allows RIPv1 to function as a classless routing protocol. It allows the routing protocol to define a more accurate best path selection. It increases the amount of information transmitted in routing protocol updates.

4

When designing a prototype network for a new server farm, a network designer chooses to use redundant links to connect to the rest of the net Which business goal will be addressed by this choice? security scalability availability manageability

5

A router has been removed from the network for maintenance. A new Cisco IOS software image has been successfully downloaded to a server copied into the flash of the router. What should be done before placing the router back into service? Back up the new image. Copy the running configuration to NVRAM. Delete the previous version of the Cisco IOS software from flash. Restart the router and verify that the new image starts successfully.

6

A company has an IT staff that is not highly trained. What two features or technologies must the network designer identify as training needs in o the staff to understand the basic operation of VPNs? (Choose two.) access control lists encryption algorithms Frame Relay configuration QoS operation tunneling protocols VLAN configuration

7

What is meant by "tunneling" in the context of migrating from IPv4 to IPv6? obtaining IPv6 addresses from an IPv4 DHCP server allowing both protocol stacks to run on the same network device encapsulating one protocol packet within another protocol enabling direct communication between hosts that use different versions of the IP protocol

8

During a review of the proposed bill of materials, the ABC Networking Company account manager realizes that the systems engineer included a cost, less capable switch model for the access layer connectivity than was specified by the network designer. When questioned, the systems en responds that the switches that were recommended by the designer cannot be purchased within the budget limitations of the customer. Which a should the account manager take? Inform the customer that the project cannot be completed given the unreasonable budget constraints. Communicate any risks that are associated with the equipment substitution and obtain customer approval to proceed.

Because the customer is probably aware that the budget limitations will require lower cost, less capable equipment, the account manager nothing. Inform the customer that the project budget must be increased. 9

A school district decides to use the 172.30.0.0/16 network for its LAN networks. The network administrator must create an addressing scheme t 500 users in the admin office, 200 at the high school, 60 at the elementary school and 28 at the district office. Which VLSM addressing scheme correctly address the network with minimal waste? 172.30.0.0/20 admin 172.30.1.0/21 high school 172.30.1.8/22 elementary 172.30.1.12/26 district 172.30.0.0/22 admin 172.30.4.0/23 high school 172.30.5.0/24 elementary 172.30.6.0/26 district 172.30.0.0/23 admin 172.30.2.0/24 high school 172.30.3.0/26 elementary 172.30.3.64/27 district

3. the traffic between VLANs still is causing this to occur? The router needs a routing protocol configured. .30. The subinterfaces must be the same value as the VLAN ID that they are routing for.0.172. The associate removes the router from and connects the Fa0/0 interface to a trunking port on the switch. A network associate is configuring a new router to provide routing between VLANs.0/25 elementary 172.3.0/23 admin 172. All the subinterfaces of the router should be configured in the same VLAN. The subinterfaces of the router should have IP addresses applied.2.30.30. The router needs additional Fast Ethernet interfaces installed.0/24 high school 172.127/26 district 10 A customer has asked a network engineer to prototype the new IP addressing and summarization strategy for a large. After the configuration is applied to the router. multisite network implem Which tool is appropriate for testing the complete addressing scheme? Cisco SDM network simulation tool actual network equipment in a lab current network of the customer 11 What can be broadcast over the wireless network to help a user connect to the network and use wireless services? SSID WPA encryption keys voice VLAN parameters IP address of the access point management VLAN parameters 12 Refer to the exhibit.30.

1 .13 Refer to the exhibit. Privacy Statement and Trademarks. irregular data flows. Showing 1 of 4 <Prev Page: 1 Next> Close Window All contents copyright 1992-2012 Cisco Systems. moving or changing phones enables web applications and phone directories to be available to every PC on the network 15 What is a characteristic of voice traffic in a converged network? It is assigned secondary priority to data traffic. Inc. It consists of large packets with long. What statement describes a characteristic of the new system? connects through a PBX to the PSTN replaces a digital system with an analog one combines data and voice into a converged network requires manual configuration for adding. It is processed in real time and cannot be retransmitted. It uses the error-checking features of TCP to ensure good voice quality. What is the purpose of this configuration? auditing the network traffic with NBAR monitoring the network traffic with NetFlow capturing network traffic to send to a syslog server applying the named ACLs egress and ingress to the Ethernet interfaces 14 A company has just transitioned from traditional telephony to an IP Telephony solution for their voice requirements.

Close Window Assessment System 1. Assessment Selection 2.DCompNtwk Practice Final .0) 4070884 01:07:51 Time Remaining: 16 What are two suggested best practices to implement when securing network devices? (Choose two.) Configure VLAN 1 as the native VLAN. Ensure that logs are stored locally on routers. Enable SSH and disable Telnet. Take Assessment Take Assessment .CCNA Discovery: Designing and Supporting Computer Networks (Version 4. Assessment Settings 3. . Disable unused ports on switches. Consolidate guest traffic and internal employee traffic.

When attempting to communicate with other networks. traffic should be allowed? incoming ICMP traffic all incoming connections to internal servers incoming responses to traffic that is generated from the inside incoming connections from the outside that duplicate inside addresses 19 . a network technician is tasked with establishing the filtering rules for the network firewall. The routers are configured with RIPv2 with default configurations. h 10.17 Refer to the exhibit.0.0/24 are experiencing connectivity issues. 18 To reduce unwanted incoming traffic from the outside.0.255.11. Disable automatic route summarization on all routers in the network.255. What could be done to resolve this issue? Change to a public IP addressing scheme. Use EIGRP with its default configuration as the routing protocol. Change the subnet mask on the link between R2 and R3 to 255.

0/25 address blocks are available. which interface on Switch1 is connected to Router1? FastEthernet0/1 FastEthernet0/2 Serial0/0 Serial0/0/1 20 A network administrator is determining which network address can be assigned to a new remote site with thirty-one users. The logical topology documentation is referenced and it is concluded that the 172.32.64/27 172. Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP address to each one.128.160.Refer to the exhibit. 22 What is the main purpose of the access layer in a hierarchically designed network? . disable split horizon on the serial interface.0/27 172.64.0/26 172.24. To prevent the Frame Relay network from causing a routing loop.24. A single local loop connection can be installed at the main office with three separate PVCs to connect the branch How can the main office edge router be configured to enable the customer to continue to use RIP as the WAN routing protocol? Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote routers.128. Based on the show cdp neighbors detail command.0/26 21 The main office of a NetworkingCompany customer currently connects to three branch offices via three separate point-to-point T1 circuits.24. Configure the serial interface with a single interface DLCI number and create frame-relay map statements for each remote site address.0/19 and 172.24.24. The network uses RIPv2 as the routing protocol within both the LAN and the WAN.192.48.32/27 172.32.24.24. Which network add be assigned to the new remote site while wasting the fewest addresses? 172. The account manager proposes a change to a Frame Relay netw because the costs are lower.64/26 172.24.

It adjusts the cost of all EIGRP routes to 3. The WIC was not pushed completely into the slot. low-latency backbone serve as a network connection point for end-user devices 23 Which IOS command can a network designer use to help document the active routing status of an existing network? show vlan show ip route show running-config show cdp neighbors detail 24 What best describes the function of QoS in data networks? prioritizes data traffic over all other types of traffic increases bandwidth on a link to ensure voice quality provides preferred service to specified network traffic automatically assigns the highest priority to web and database traffic 25 After a WIC is installed in a two-slot router. The show running-config command cannot be used to validate the presence of installed interfaces. 26 While configuring a router with EIGRP. 27 A small bookstore would like to offer wireless connectivity for customers with laptops. It restricts the number of EIGRP feasible successor routes to 3. The WIC was put into slot 0 instead of slot 1. and there is no budget to replace them. the network engineer issues the show running-config command. The currently installed network contains both Cisco and non-C routers. What is a possible reason why the newly installed interfaces are not shown? The new interfaces are in a shutdown state. Which wireless components or devices will provide conne the Internet for the customers with the least possible cost to the bookstore? wireless LAN controllers standalone access points wireless network cards for an ad hoc WLAN lightweight access point and wireless LAN controller 28 A network designer must select a routing protocol for the network of a customer. but the newly installed interfaces WIC cannot be seen in the router output. It enables EIGRP equal cost load balancing over a maximum of 3 routes.perform routing and packet manipulation supply redundancy and failover protection provide a high-speed. a technician enters the EIGRP command: Router(config-router)# variance 3 What is the effect of entering this command? It enables unequal cost load balancing.) RTP RSTP RIPv1 . The designer plans on implementing both VLSM and route summarization in the new network d Which two protocols can provide the necessary functionality for this LAN? (Choose two.

Showing 2 of 4 <Prev Page: 2 Next> Close Window All contents copyright 1992-2012 Cisco Systems. DSW3 would become root upon failure of DSW2. Privacy Statement and Trademarks. The TFTP server and the router must be on different networks for the transfer. . DSW3 is the root bridge. DSW2 is the root bridge. DSW2 would become root upon failure of DSW3. DSW3 would become root upon failure of DSW1.RIPv2 EIGRP OSPF 29 Refer to the exhibit. The TFTP server software must be the same version as the Cisco IOS software. 30 A network administrator needs to transfer an IOS image to a router using a TFTP server. What should be verified prior to beginning the transfer The TFTP server must connect to the router via a serial connection. Connectivity between the TFTP server and the router should have been established. What result can be expected for STP in VLAN1? DSW1 is the root bridge. Inc. DSW1 would become root upon failure of DSW3. DSW3 is the root bridge.

A customer has a problem with connectivity in the network. Assessment Selection 2. . what is causing the proble The WAN link that connects R1 to R3 has an incorrect mask. The WAN link that connects R1 to R2 overlaps with the R3 LAN.2 Close Window Assessment System 1. The WAN links need IP addresses from a different major network. Based on the IP addressing scheme.DCompNtwk Practice Final .CCNA Discovery: Designing and Supporting Computer Networks (Version 4.0) 4016417 01:06:57 Time Remaining: 31 Refer to the exhibit. Take Assessment Take Assessment . Assessment Settings 3.

What protocol would support this feature? STP RIP BGP VTP RSTP 33 What is the result of implementing a Frame Relay service with a CIR value of zero? Data will not cross the Frame Relay WAN. 32 During prototype testing. 37 A configuration file needs to be loaded into the RAM of a router from a TFTP server. a LAN switch fails. Traffic filtering is needed on the internal network. What should an administrator know before accomplishing t the router IP address and the operating system that is used by the TFTP server the TFTP server IP address and the name of the configuration file on the server the router IP address and the name of the router configuration file in NVRAM the TFTP server IP address and the value of the configuration register on the router 38 .The IP addressing in R1 LAN is incorrect because subnet zero cannot be used with VLSM. Only frames that exceed the local access rate will be marked as DE. 34 What supports the ability of streaming video to be sent to a group of viewers simultaneously without congesting the entire network? traffic queues multicast multiple Layer 4 sessions high priority from QoS 35 Which IOS component can be used for classification and protocol discovery of network traffic and applications in use? CDP NBAR ACL logging Network Assistant 36 When should a network designer specify that a dedicated firewall appliance be used at the perimeter of the network rather than a router with a C software-based firewall feature set? There are multiple servers in the DMZ. As the switch re-initializes using the default parameters. Multiple levels of access to the network are needed. The network is large in size and network traffic can overload the device. a port that has a PC attached transitions to forwarding state within one second. CIR is disabled. which allows all data traffic to pass through the Frame Relay WAN. All frames that enter the Frame Relay WAN will be marked as DE.

Remove the WIC-2T module so that the new module can be installed in slot 0.30.0/24 network to the web server with IP address 209. Which step would solve this problem? Change the LMI type on the local router. four-port switch module needs to be installed in a Cisco 1841 router that currently has a WIC-2T module in slot 0. Configure the router using the frame-relay map ip command. Turn off the power to the router before installing the new module. Shut down all Fast Ethernet ports on the router until the switch module installation is complete.168. What shoul network technician do first? Install the hot-swappable option module.201. Configure the Cisco IOS software to support an internal trunk link between the switch and router module. Further investigation reveals that the IP address of the remote router d appear in the Frame Relay table. 40 While troubleshooting a Frame Relay link.Refer to the exhibit. Verify that the remote router has Frame Relay encapsulation enabled. where should the ACL be applied? R3 Fa0/0 inbound R3 S0/0/1 outbound R2 S0/0/1 inbound ISP Fa0/0 outbound 39 An HWIC-4ESW. Verify that the DLCI number is the same on both sides of the PVC. An extended ACL has been created to deny traffic from the 192. According to Cisco best practices. 41 . the network administrator executes the show ip interface brief command on both sides of the PVC interfaces show a configured IP address and that the line protocol is up.165.30.

0/10 that enters the route leased-line Internet connection. All traffic that enters the router on s0/0/0 will be blocked. What testing platfor be used by the network team of the company to validate the performance and capacity of the new technology using real world data? pilot prototype emulation software simulation software 45 . The IP address is incorrect. A network technician wishes to allow all traffic to internal LANs except traffic from network 10. the administrator attempted to ping the remote router on the Frame Relay circuit but was n successful. the administrator verified physical connectivity by successfully ping remote router. What will be apparent once these commands are entered into the router? The wild card mask is wrong. 42 Which protocol allows redundant Layer 2 links without switching loops? DHCP HSRP MPLS RSTP 43 Refer to the exhibit. The interface needs to be re-enabled after the encapsulation is changed. A show frame-relay pvc command was issued. Before the encapsulation was changed to Frame Relay.0. The required objective will have been achieved. The access-list is applied in the wrong direction. 44 A web-based retail company is considering updating its WAN connection with new technologies that are offered by the ISP.0.Refer to the exhibit. The network is not included in the routing table. What could be the problem? The DLCI is incorrect. After the encapsulation was changed.

Host 2 cannot ping Host 3. Showing 3 of 4 <Prev Page: 3 Next> Close Window All contents copyright 1992-2012 Cisco Systems. 3 Close Window Assessment System . Host 3 can ping Host 2.Refer to the exhibit. Following a test plan. Host 3 can ping Host 1. Inc. Host 1 cannot ping Host 2.) Host 1 can ping Host 2. Host 3 cannot ping Host 1. The engineer attempts to ping from each PC to the other connected PCs. Privacy Statement and Trademarks. the network systems engineer completes the configuration of an access layer switch and connects th test the configuration. Which three statements describe the expected pinging from one host to another? (Choose three.

) Frame Relay Layer 2 address one DLCI allowed per local loop locally significant circuit endpoint signaling standard between DTE and DCE establishes the data transfer rate through a Frame Relay network 47 Which component in a Frame Relay WAN would set the BECN bit in the Frame Relay header if congestion is experienced? source DTE device Frame Relay switch destination DTE device router through which communication was first initiated 48 What is the advantage of choosing EasyVPN for a new VPN implementation? to provide encryption algorithms unavailable in other systems to ensure that remote workers actually use the VPN for connectivity to allow a greater variety of network devices to be used for VPN connections to simplify the configuration tasks for the device that is used as the VPN server 49 .0) 3984279 01:06:25 Time Remaining: 46 What are two accurate descriptors of a DLCI? (Choose two.CCNA Discovery: Designing and Supporting Computer Networks (Version 4.1. Assessment Settings 3. Assessment Selection 2.DCompNtwk Practice Final . Take Assessment Take Assessment .

18. EIGRP is the routing protocol that is the WAN. 4 Take Assessment – DCompNtwk Final Exam – CCNA Discovery: Designing and Supporting Computer Networks (Version 4. Based on the default operation of EIGRP.20. 50 What are two advantages of using Layer 3 devices instead of Layer 2 switches at the distribution layer of a hierarchical network? (Choose two.Refer to the exhibit.20. A pre-sales system engineer receives a diagram of the current WAN from a customer. EIGRP installs all three routes to the 172. the network systems engineer completes the configuration of an access layer switch and connects three PCs. Inc.18.18. which statement is true about the routing table on router RE? There is a single route to the 172. Refer to the exhibit.0/24 LAN and load balances the traffic. The engineer attempts to ping from each PC to the other connected PCs to test the configuration. Which statement describes the result of the last step? Host 1 can ping Host 2.) allows connectivity between different VLANs provides reliable connectivity to the end user reduces the number of required redundant links results in fewer IP subnets to configure and manage enables traffic filtering that is based on subnet addresses Showing 4 of 4 <Prev Page: 4 Next> Close Window All contents copyright 1992-2012 Cisco Systems.20. Following a test plan.0/24 LAN via the DSL connection. There is a single route to the 172. Privacy Statement and Trademarks.18.0) – Answers – 2011 – 2012 1. .0/24 LAN via the 10 Mb Ethernet connection. There is a single route to the 172.20.0/24 LAN via the T1 connection.

What is a characteristic of FTP traffic flows? low-volume traffic predictable bandwidth usage large packet sizes for transfers low throughput with high response-time requirements 4. The company wants to add a backup link in case the Frame Relay connection fails. which two types of traffic would be categorized as real-time traffic? (Choose two. Create a floating static route. what can the field engineer conclude about the EIGRP authentication between RouterA and RouterB? Authentication will fail because only one key is configured. Authentication will fail because the key chain names must match the router names. Based on the EIGRP configuration that is shown. The backup link will use the business DSL connection through another ISP. Host 2 can ping Host 3. No hosts can ping any other host.Host 1 can ping Host 3. Create a second default route for the backup path. In a converged network. Authentication will fail because the key chain names do not match. What is the spanning-tree role of all the enabled interfaces of SW11? alternate backup designated root . 2. If a router is unable to find a suitable IOS to load into RAM. Add a new route to the routing protocol configuration. How should the router be configured to include the backup link? Create a static route with the administrative distance of 1. 3.) e-mail file transfer web browsing videoconferencing voice over IP video on demand 6. Authentication will succeed and EIGRP updates can be exchanged. 7. Refer to the exhibit. in what mode does the boot process end? setup mode user mode rommon mode privileged mode 5. Refer to the exhibit. A company uses the Frame Relay network to establish a VPN connection between headquarters and the branch office.

Turn off the power to the router before installing the new module. After the issue is resolved. a LAN switch fails. 12. A WIC-1T module needs to be installed in a Cisco 1841 router that currently has a WIC-2T module in slot 0. the engineer also provides a training session for the network support staff. What protocol would support this feature? STP RIP BGP VTP RSTP 10. What are two accurate descriptors of a DLCI? (Choose two. Shut down all Fast Ethernet ports on the router until the new WIC module installation is complete. A NetworkingCompany engineer is on a support call resolving technical problems for a client network. A user in a large office calls technical support to complain that a PC has suddenly lost connectivity to the network. a port that has a PC attached transitions to the forwarding state within one second. the cable connection between a PC and a network outlet that is used by a neighbor. Configure the Cisco IOS software to support an internal trunk link between the two WIC modules.) Frame Relay Layer 2 address one DLCI allowed per local loop locally significant circuit endpoint signaling standard between DTE and DCE establishes the data transfer rate through a Frame Relay network 11. Remove the WIC-2T module so that the new module can be installed in slot 0. What should the network technician do first? Install the hot-swappable option module. The network administrator has used the Cisco Feature Navigator to choose a Cisco IOS image to install on a router. The technician asks the caller to talk to nearby users to see if other machines are affected. The caller reports that several immediate neighbors in the same department have a similar problem and that they cannot ping each other. What role is the engineer filling on the networking company team? post-sales field engineer pre-sales engineer network designer account manager 13. As the switch re-initializes using the default parameters. which statement is true about the capacity of the router . the status of the departmental workgroup switch in the wiring closet. What should the technician check as the first step in troubleshooting the issue? the power outlet to the PC that is used by the caller.8. 9. Refer to the exhibit. During prototype testing. the cable that connects the PC of the caller to the network jack. Those who are seated in other departments have connectivity. Given the exhibited output of the show version command. the trunks between switches in the wiring closet.

The commands are added at the end of the existing Managers ACL. 16.24. 14. Which statement is true about the routing table on router RM? There is a single route to the 192. Configure the router using the frame-relay map ip command. A pre-sales systems engineer receives a diagram of the exhibited WAN implementation from a customer. There is not enough DRAM but enough flash. Routing protocols will not send the triggered updates in the event of a failure of the root bridge.24. What will happen within the network if a primary link goes down? Access to the the servers will be lost. The named ACL “Managers” already exists on the router. but permits inbound traffic only if it is a response to the traffic that is initiated from inside the network? Dynamic Reflexive Standard Extended time-based 17. What type of ACL permits outbound traffic. There is a single route to the 192.0/24 LAN using the DSL connection.168. pings to the remote router across the link fail. There is not enough DRAM and flash. Switches that connect the servers to the network will not be found by other switches in the network. Refer to the exhibit. Refer to the exhibit. Ensure that the LMI type is correct for the circuit. The commands are added at the beginning of the existing Managers ACL. A network administrator has configured Frame Relay on a serial interface and issued the show interfaces serial command.to use this Cisco IOS image? There is enough DRAM and flash. There is enough DRAM but not enough flash. . The output shows that the interface is up and the line protocol is up. The network administrator receives an error that states that the ACL already exists. However.168. A company with four servers in its server farm has not enabled PVRST on the switches that connect to the server farm segment. Refer to the exhibit. Verify that the remote router has Frame Relay encapsulation enabled. 18. What should the next step be to ensure that the IP address of the remote router appears in the Frame Relay map table of the local router? Configure the router using the no inverse-arp command. 15. What will happen when the network administrator issues the commands that are shown in the exhibit? The commands overwrite the existing Managers ACL. Convergence time will be slow and possibly cause applications to time out. None of the parameters for EIGRP metric calculation have been modified in any router configurations.0/24 LAN using the T1 connection. EIGRP is the routing protocol that is used on the WAN.

Refer to the exhibit. 20. Which EIGRP configuration commands should a network administrator enter on router R1 to correctly advertise a single summary route to router MAIN for the campus LAN? 24. A network administrator is configuring a new router to provide routing between VLANs. authenticated WAN connection to a rural branch office.168. and authenticated connection to centralized internal resources that are located at company headquarters. Refer to the exhibit.168.15.0/24 LAN using the Metro Ethernet connection.0/24 LAN and load balances the traffic.35. A company has branch offices at several locations across the country. Which security implementation would provide a cost-effective. as shown in the exhibit. EIGRP installs all three routes to the 192. without requiring configuration for individual employees at the branch offices? leased line with PPP authentication site-to-site VPN access control list remote-access VPN 22. What is causing this to occur? The R1 router needs a routing protocol configured. Refer to the exhibit. According to Cisco best practices.24. where should the ACL be applied? RTB Fa0/0 inbound RTC S0/0/1 inbound RTD Fa0/0 outbound RTC S0/1/0 outbound 23. 19. secure.165. the traffic between VLANs fails.24. The R1 router needs three additional Fast Ethernet interfaces installed.201. An extended ACL has been created to deny traffic from the 192.0/24 network to the web server with IP address 209. The subinterfaces of the R1 router should be configured in the same VLAN. Which WAN connection type should the network designer recommend? DSL ISDN leased line Frame Relay 21. After the configuration is applied to the router. The subinterfaces of the R1 router should have IP addresses applied.There is a single route to the 192.168. Refer to the exhibit. The administrator removes the router from the box and connects the Fa0/0 interface to a trunking port on the switch. What is an accurate description of the first neighbor that is displayed in the output? 24 port 2950 switch with a non-default native VLAN 24 port 2950 switch that is connected to Fa0/0 on Router1 24 port 2950 switch that is assigned to the administrator-defined VTP domain 24 port 2950 switch with interface GigabitEthernet0/1 that is operating at 1000 Mb/s . A bank is planning to add a secure. The connection must provide bandwidth of up to 10 Mb/s with QoS supporting VoIP.

The DMZ requires packet filtering and port blocking. Why would the designer use a dedicated firewall rather than using the Cisco IOS firewall feature set on the existing router? Traffic filtering is needed on the internal LAN. A company has help desk staff that is not highly trained in VPNs. Heavy network traffic will be handled best by using a dedicated device.) QoS operation VLAN configuration tunneling protocols IPv6 and IPv4 dual stack encryption algorithms Frame Relay configuration 28. the network designer performs a test to determine the ability of the network to recover from a link or device failure. During prototype testing. What two features or technologies must the network designer identify as training needs in order for the help desk to support secure remote access for teleworkers? (Choose two. Multiple levels of access to the network are needed. 27. Which design goal is validated if the test is a success? scalability manageability availability security 26 A network designer has chosen to specify the use of a dedicated firewall appliance at the perimeter o a large network. low-latency backbone serves as a network connection point for IP telephony devices 29. At the distribution layer of a hierarchical network. what are two advantages of using Layer 3 devices instead of Layer 2 switches? (Choose two.) provides reliable connectivity to end users creates fewer IP subnets to configure and manage reduces the number of redundant links required provides connectivity between different VLANs enables traffic filtering based on subnet addresses . Which method is appropriate for testing the addressing scheme? using the production network of the customer using actual network equipment in a lab using the Cisco Network Assistant using a network simulation tool 30. A network engineer is prototyping a new IP addressing and summarization strategy for a new network that will be integrated into the existing infrastructure.25. What is a function that is associated with the access layer in a hierarchically designed network? performs routing and packet manipulation supplies redundancy and failover protection provides a high-speed.

0/24 are experiencing connectivity issues. What functionality does NBAR provide to network technicians? provides data which can be used to create a network diagram allows for monitoring and managing network devices allows for classification and monitoring of network traffic displays the IOS versions and IP addresses on neighboring devices 34. Set timeouts and ACLs on VTY lines. The WAN links that connect R1 to R3 and R1 to R2 have incorrect masks. Enable Telnet on TCP port 23.) Disable all logging. Routing tables converge more quickly. What supports the ability of streaming video to be sent to a group of viewers simultaneously without congesting the entire network? traffic queues multicast multiple Layer 4 sessions high priority from QoS 33. . which two actions should be included as part of the security checklist? (Choose two.128 /26.0. When implementing a security policy.1.2.16. Shut down any unused ports and interfaces. 37.16. 36. The R1 LAN is incorrect because subnet zero cannot be used with VLSM.31. Refer to the exhibit. The WAN link that connects R1 to R2 overlaps with the R3 LAN. Access list 100 is applied inbound to interface serial 0/0/0 on the SOHO Router1. Use HTTP for web administration. What is the benefit of using RSTP rather than STP in this situation? Redundant links are not blocked.255. When attempting to communicate with other networks. The network designer recommends using RSTP in the design of a new data center.255. Change the IP network address on R3 Fa0/0 to 172. Which traffic will be denied by the configuration? DNS traffic from host A to the Internet FTP traffic from host A to the Internet ICMP traffic from the ISP to server 1 traffic from the ISP to the server on port 23 32. Disable automatic route summarization. What could be done to resolve this issue? Change to a public IP address scheme. Change the subnet mask on the link between R2 and R3 to 255. The routers are configured with RIPv2 with default configurations. Refer to the exhibit. There are multipl redundant Layer 2 switches and links contained in the new design. 35. Based on the IP addressing scheme. A customer has a problem with connectivity in the network. what is causing the problem? The WAN links need IP addresses from a different major network. hosts from 172. Refer to the exhibit.

168. Refer to the exhibit.168. What IP address should be assigned to this new host? 192.168.1 /26 192. 41. A company establishes a Frame Relay connection between corporate headquarters and a branch office. After the administrator makes the change and reboots the router.Spanning Tree convergence times are reduced. Which routing protocol should be used for the upgrade? BGP RIPv1 RIPv2 EIGRP 42 Which two technologies can provide data integrity in a VPN connection? (Choose two.) ESP DES MD5 DH1 SHA-1 43.168.47 /28 192. The administrator probably configured the wrong password. The CIR for the connection is set at 4 Mb/s.1.44 /28 192. what can be concluded about the serial connection between the client site and ISP site? The router at the client site is still in the process of rebooting.22 /28 192.1. The current company network contains both Cisc and non-Cisco routers. A network administrator of a middle-sized company is asked to upgrade the routing protocol of the network to support VLSM and route summarization. Fewer redundant links are required to maintain connectivity. According to the output. the technician issues a show interfaces serial 0/0/0 command. A technician at the ISP site asks the network administrator at the client site to change the CHAP password as part of the routing security maintenance.55 /28 40. Router RA is attached to the switch via a trunk and is configured as shown.168.1. Which statement is .168. What can be broadcast over the wireless network to help a user connect to the network and use wireless services? SSID WEP keys VLAN parameters WPA encryption keys VPN authentication information 39. A new host needs to be connected to the switch and be assigned to VLAN 2. The administrator probably configured the wrong IP address for the serial interface. Refer to the exhibit. 38.1.32 /28 192. The administrator has not issued a no shut command on the serial interface.1.1.

IPsec for IPv6 is not compatible with IPsec for IPv4. What should be done to ensure that each branch office link is a separate subnet and that routing updates are successful between corporate headquarters and the branch offices? Configure multipoint subinterfaces on the physical interface. The company currently uses RIPv2 for routing and plans no changes to the RIPv2 configuration. What Cisco VPN solution allows for simple configuration of VPNs on the laptops of remote and mobile employees? . a portion of the company backbone will be increased to 10 Gb/s and needs to support unequal cost load balancing between routers. The network designer recommends using one physical interface on the edge router to support the new Frame Relay connections. If the company sends data faster than 4 Mb/s. As part of network monitoring. If the company sends data faster than 4 Mb/s.) IPv6 does not support broadcasts. IPv6 uses a simplified header structure. A company plans to establish Frame Relay connections between corporate headquarters and severa branch offices. The network infrastructure at the headquarters of an organization consists of Cisco network devices that are running RIPv1. The IP addressing scheme is also changing and needs to support VLSM and CIDR. Configure point-to-point subinterfaces on the physical interface. Which two statements are true about the enhancements IPv6 has over IPv4? (Choose two. Which routing protocol should be selected for the network? BGP EIGRP OSPF RIPv2 48. Configure a single subinterface to establish multiple PVC connections. some of the data frames will be flagged with a DE bit. Configure the physical interface to share one DLCI to multiple remote sites and their connections.true about this WAN connection? The company will not be able to send data faster than 4 Mb/s. As part of an upgrade project. a network administrator receives an alert that the CPU usage of the core router reaches 90% several times a day. Which protocol is in use to monitor the network performance? DNS SNMP SMTP DHCP TFTP 46. IPv6 uses fixed length address strings. the TSP will change the CIR to zero. 45. IPv6 does not require private addresses. When the company sends data faster than 4 Mb/s. 47. 44. the Frame Relay switch will set the BECN bit t 1 on the frames that are headed to the company.

51 Which two pieces of information are needed before an IOS image may be loaded on a router from a TFTP server? (Choose two. Power off the router. then verify new interfaces using the show runningconfig command after powering up. the Cisco Call Manager will be unreachable.) the IP address of the TFTP server the current name of the IOS image on the router the operating system of the TFTP server the name of the configuration file in NVRAM the name of the IOS image on the TFTP server encapsulation of the router interface that is connected to the TFTP server 52. The IP phones need to be redundantly connected to the switches to prevent single points of failure at the access layer. Refer to the exhibit. A networking company designer is reviewing a diagram of a customer network. Insert the module with the power on.) The firewall router and ISP connection represent a single point of failure. Check the router and interface module data sheets on CCO to determine hot-swappability. Using Layer 3 switches to interconnect the server block servers to the IP phones introduces too much delay. If one of the Layer 3 switches fails. What are the two problems that need to be resolved in the topology that is shown? (Choose two. then issue the show running-config command to verify that all new interfaces are recognized. .) IPSec tunneling dual stack authentication anycast addressing header simplification 50.EasyVPN Server EasyVPN Remote EasyVPN Client EasyVPN Remote-Access 49. then check to see if the associated LED is lit. insert the module. How should a network engineer determine if a router module is hot-swappable? Insert the module with the power on. A power supply failure of the server block switch will cause the entire IP telephony system to fail. Which two processes allow a smooth transition from IPv4 to IPv6? (Choose two.

Sign up to vote on this title
UsefulNot useful