File - CCNA Discovery

advertisement
CHAPTER QUIZES
CHAPTER 1 QUIZ
1
2
3
4
5
After an evaluation of the business needs and current network infrastructure of ABC Company,
the network designer includes the item “install a second UPS for the core web server” in the
network upgrading proposal. Which network design goal is being met?
 Security
 Scalability
 Availability
 Performance
 Manageability
Drag each definition on the left to the correct functionality on the right
Degree of resource accessibility
availability
Restriction of unauthorized traffic
security
Ability to grow as users and applications are scalability
added
Designed to support personnel can always
manageability
fix it
When designing a network infrastructure, a network engineer will use the hierarchical
network model. What two factors must be taken into account when designing the core layer?
 Packet manipulation to prioritize the flow of core data
 Redundant links to ensure fault tolerance
 Routing protocols chosen for the speed of network convergence
 Access control lists to curtail core layer traffic
 Star network topologies to reduce core layer latency
A company needs to redesign the distribution Layer of their enterprise network. What area
should be the focus of the new design?
 Direct connection to hosts in the local Ethernet network
 Layer 3 interconnections between smaller local networks
 High speed connections between Layer 2 devices
 Interconnections between hosts in a flat network
A network engineer is planning the WAN connectivity for critical network traffic. Why would
the engineer plan a backup WAN link?
 To provide extra bandwidth during system backups
 To provide a development environment for WAN testing
 To provide extra bandwidth for Voice over IP
 To provide an alternative path for data in case the primary link fails
6
Which two are advantages of using a star topology at the access layer of a network?
 Ease of installation
 Redundant traffic pathways
 Minimal configuration needed
 Ease of recovery after failure
 Capabilities of central devices can limit network
7
Network traffic between a PC and a printer on the same local network is usually contained
within which layer of the hierarchical design model?
 Core Layer
 Access Layer
 Distribution Layer
 Enterprise Edge
 Sever Farms
Which statement best describes the purpose of deploying a server farm?
 A server farm is necessary in deploying enterprise-level applications
 A server farm is required in the DMZ design of an enterprise network
 A server farm provides efficient management of the mission-critical servers for the
enterprise
 A server farm is designed to provide secure network services and applications to clients
on internal networks only
Why is the older DMZ firewall model not sufficient to secure mission critical servers and
applications?
 Only servers located on the DMZ network were adequately protected
 The older model did not offer servers enough protection from internally initiated
attacks
 End-user PCs were not protected in the older model, so they were more frequently
hacked
 Servers on the DMZ were not adequately protected from external attacks
How can a wireless network design provide open access for guest users and secure access for
employees?
 Broadcast the SSID so that all users are able to access the network
 Enable WEP to authenticate both sets of users
 Create a separate SSID and separate VLAN for guest users
 Put all access points on the same VLAN and require employees to use WEP
Which functional area of the network contains the devices that provide an interface between
high speed LAN technologies, such as Ethernet, and slower speed wide area technologies?
 Core Layer
 Server Farm
 Access Layer
 Transport Layer
 Enterprise Edge
 Distribution Layer
8
9
10
11
12
13
14
15
A company has decided to allow workers to work from home but does not want to
compromise network security. The network administrator has proposed connecting remote
users to the company network using virtual private networks? Why are VPNs good choices for
connecting remote workers?
 Allow secure connections over public broadband networks
 Provide secure connections over dedicated public WAN circuits
 Segment traffic into logical networks for better bandwidth utilization
 Provide simple remote access without having to filter special packets
A technician is recovering the password on a router. The technician had entered ROMMON
mode, changed the configuration register to 0x2142, and reset the router. The technician
enters configuration mode on the router, changes the password, and enters the copy run start
command. After changing the configuration register to 0x2102, the technician reloads the
router. When the router reloads, the technician finds that only the password is in the
configuration. What could be the problem?
 The technician changed the configuration register to the wrong value
 The technician did not copy the startup configuration to the running configuration
before changing the password
 The technician should have changed the configuration register to 0x2100
 The router ignored NVRAM and did not load the startup configuration file when it
rebooted
 The technician did not copy the running configuration to the startup configuration
before changing the password
Which ACL permits host 10.220.158.10 access to the web server 192.168.3.244?
 access-list 101 permit tcp host 10.220.158.10 eq 80 host 192.168.3.224
 access-list 101 permit tcp host 10.220.158.10 0.0.0.0 host 192.168.3.224 0.0.0.0 eq 80
 access-list 101 permit host 10.220.158.10 0.0.0.0 host 192.168.3.224 0.0.0.0 eq 80
 access-list 101 permit tcp 10.220.158.10 0.0.0.0 host 192.168.3.224 eq 80
Refer to the exhibit. Host C is unable to transfer data because it does not have the MAC
address of the destination host. If host C sends out an ARP request, which of the other hosts
will see this message?
 Host A
 Host B
 Hosts A and B
 Hosts A and D
 Hosts B and D
 Hosts A, B and D
CHAPTER 2 QUIZ
1
2
3
4
5
6
Drag each Cisco Lifecycle Services stage on the left to its corresponding position on the right.
Stage 1 – Prepare
Stage 2 – Plan
Stage 3 –Design
Stage 4 – Implement
Stage 5 – Operate
Stage 6 – Optimize
Which two tasks are conducted during the PPDIOO Prepare phase?
 Develop an implementation plan
 Choose vendors and technical partners
 Establish organizational requirements
 Identify financial justification for upgrade
 Compare network performance with design goals
 Identify the network requirements
Building a network according to the design and verifying that it performs according to
specifications are part of which phase of the Cisco Lifecycle Services strategy?
 Prepare
 Plan
 Design
 Implement
 Operate
 Optimize
Which phase of the Cisco Lifecycle Services strategy addresses the impact of changing business
goals?
•
Prepare
•
Plan
•
Design
•
Implement
•
Operate
•
Optimize
At which point in the PPDIOO cycle is a RFQ typically generated?
 During the planning phase
 At the end of the prepare phase
 Before the beginning of the design phase
 Before the PPDIOO cycle begins
Match the description on the left to the RFQ section it belongs in on the right.
Large hospital in Beijing
Organizational overview
Six remote offices affiliated with the hospital
Install wireless connectivity at the remote clinics
Required Deliverables
Install a VPN between hospital and clinics
Submission date is November 10
Assumptions/Agreements
All services must be approved by IT manager
7
8
9
10
In which phases of the PPDIOO is the pre-sales system engineer involved in?
 Plan and operate
 Plan and design
 Design and implement
 Implement and operate
A company is currently in the implementation phase of the PPDIOO cycle. They have a
question about the new equipment being installed in the wiring closet. Which two people
should they contact for assistance?
 Account manager
 Pre-sales system engineer
 Network designer
 Post-sale field engineer
What are two disadvantages to using a top-down approach to network design?
 This approach can result in an inappropriate network design
 A new design cannot be implemented right away
 This approach contains very little organization requirements
 This approach is not as familiar to many network designers
During an interview with the IT manager, it was discussed that the organization has two critical
communication links to its main supplier. These links require an uptime of 24/7. Which part of
the PPDIOO process is most affected by this information?
 Implementation phase
 Design phase
 Routing protocol selection
 Prototype design plan
CHAPTER 3 QUIZ
1
2
3
4
5
A network consulting company is preparing a network requirements document for a new
client. The network design team is in the process of detailing the both physical and logical
infrastructure, as well as the equipment and applications in use on the network. Which part of
the network design requirements document is the design team preparing?
 Overall goal
 Project scope
 Current state of the network
 Network requirements
A new technician has been hired in the company IT department. The IT manager gives the new
technician the most current logical and physical network diagrams to review. Which two
pieces of information should the technician be able to learn from the diagrams?
 Credentials for configuring devices
 Contact information for installation technicians
 Location of networking equipment
 Cost analysis of networking equipment
 Standard naming conventions
 Status of routing device links
A new technician is assigned a task of updating the existing documentation for a single branch
network that consists of all Cisco devices. The technician runs the Cisco Network Assistant at
the workstation and issues the commands show cdp neighbors detail and show ip route on
each device. Which two pieces of information can be determined by using these tools?
 Device types and software versions of connected equipment
 Workstation IP addresses
 Network hierarchy
 Total number of devices and hosts on the network
 Strengths and weaknesses of the current network
During the initial redesign of a company network, the IT administrator has requested that the
accounting department LAN be exempt from the new network design changes. In which area
of the network design is this exemption defined?
 Overall project goal
 Request for information
 Current state of the network
 Request for proposal
 Network requirements
 Project scope
Refer to the exhibit. What piece of information can be obtained from the output of the show
cdp neighbors detail command?
 The device is a 2600 series router
 The neighboring device is a switch
 The neighboring device is using interface serial 1/0 to connect to this device
 The hostname of this device is RICHMOND
6
7
8
9
10
A technician is dispatched to perform a wireless site survey at a stadium. What three tools or
items does the technician need to take along?
 Laptop
 Floor plan and tape measure
 Ethernet switch
 Pc with terminal emulation software
 Access point
 LAN, WAN and USB interface cables
Match the activity on the left with the appropriate wireless site survey step on the right
Determine service level expectations
Define customer requirements
Determine possible causes of interference
Measure signal stergth
Determine which areas have power and how Determine preliminary AP locations
the AP will connect to the wired network
Estimate number of potential users and
identify coverage areas
determine expected peak usage
Technician performing a wireless site survey use a laptop computer equipped with a site
survey utility on its wireless interface card to measure the signal strength and speed of a link
as they move away from an AP. Which two things do they do with this information?
 They mark the areas where signals are acceptable on a floor plan
 They determine if the area can support advanced wireless technologies
 They record the readings and measure the distance from the AP when the quality or
link speed changes
 They ensure compliance with all local, state, and national fire and electrical codes
 They use the results to estimate the number of potential users and to determine the
expected peak usage
Network designers are accessing the current network infrastructure for a client to prepare a
proposal for a network upgrade. Which two items should they include in the “Current State of
the Network” report?
 Applications used on the network
 Budget allocated for the project
 Diagram of the physical topology
 Projected business growth of the client
 User groups that might be affected by the network upgrade process
A network technician has just completed the installation of a Gigabit Ethernet HWIC into a
Cisco 1841 router. After connecting a PC to the console port of the router and powering it on,
what two things should the network technician do before configuring the device?
• Verify that the new interface card is recognized by the Cisco IOS software
• Note the serial number and speed of the new interface card on the inventory sheet
• Record the interface designation given to the new interface card on the topology
diagram
• Observe the routing table to make sure that the new interface card is sending and
receiving updates
11
12
13
Drag the steps of the bootup process on the left to the correct order of occurance on the right
• Step 1 – POST
• Step 2 – load bootstrap program
• Step 3 – locate and load Cisco IOS
• Step 3 – locate and load startup files
What happens when the command dir flash is issued on a router
• The flash memory is erased
• The flash memory is reformatted
• The contents of the flash memory are displayed
• The contents of the flash media are moved to the NVRAM
Which two conditions should the network administrator verify before attempting to upgrade a
Cisco IOS image using TFTP server?
• Verify the name of the TFTP server using the show hosts command
• Verify that the TFTP server is running using the TFTPDNLD command
• Verify that the checksum for the image is valid using the show version command
• Verify connectivity between the router and TFTP server using the ping command
• Verify that there is enough flash memory for the new Cisco IOS image using the show
flash command
CHAPTER 4 QUIZ
1
2
3
4
5
6
7
Which two items do end-users consider the main criteria for judging network performance?
 Network availability
 Routing efficiency
 Network design hierarchy
 Application responsiveness
 Link utilization
Why would a network administrator implement Rapid Spanning Tree Protocol (RSTP) is an
enterprise network?
 To prevent switching loops
 To load balance traffic over redundant links
 To implement full duplex uplinks
 To autonegotiate switch trunks
What are two steps that network administrators can take to ensure that users have
immediate, reliable access to their emails and shared files?
 Place FTP and email servers in separate locations for security
 Provide FTP and email servers suited for low-volume traffic
 Secure the server location from unauthorized access both physically and logically
 Ensure that redundant paths exists to all servers
Which recommendations should the network designer make to ensure that the web based ecommerce servers are secure and highly available?
 Two DNS servers should be configured for redundancy
 Allow inbound Telnet traffic from the internet only from specified networks
 Two WLC servers should be configured for redundancy
 Internet traffic should be filtered using firewall features and intrusion
 Customer access to the e-commerce across the Internet should be WPA encrypted
When an IP Telephony design is being implemented, what other feature must also be
implemented?
 Qos
 Firewall
 DMZ
 ACLs
Which two statements are true of an IP Telephony system?
 End users can use digital or analog phones to make a call
 Analog to digital conversion occurs at a voice-enabled router
 A Cisco Unified Communications Manager is used for call control
 Directories and web pages are available for use to end users
Which two statements are true regarding IP video communications?
 Video servers should be distributed across the enterprise to conserve bandwidth in
the server farm
 Live video does not require a waiting period for viewing
 VOD minimizes the effects on system resources
 Live video requires large media file storage
8
9
10
11
Drag the definition on the left to its correct applicational characteristic on the right.
Collect existing network documentation and Organizational input
verbal input
Gather information about network devices Network audit
and details of current configurations
Provide information about how the Traffic analysis
applications and protocols use the network
Which two physical elements of the network infrastructure must be examined by the network
administrator prior to implementing a new real-time application?
 Hardware devices and connections
 Office locations
 Network topology
 IP addressing
The administrator is setting up priority queuing. Which classification should be given to VoIP
traffic?
 High
 Medium
 Normal
 Low
Which tool can be used to conduct traffic analysis, identify and classify types of traffic in order
to apply the correct QoS mechanisms?
 NBAR
 NetFlow
 IDS
 Priority queuing
CHAPTER 5 QUIZ
1
2
3
4
5
What three multilayer switch features support the network design goal of availability?
• In-band and out-of-band management
• Efficient load balancing of routed traffic
• Software based packet forwarding or prioritized traffic with QoS
• Redundant power supplies and fans
• Route summarization that reduces the impact of a lower level device failure
• Security features preventing unauthorized or unwanted network traffic
A network administrator would like to improve transactional processing time as well as voice
and video quality. What three things can be done to help achieve these goals?
• Reduce traffic and network broadcasts
• Construction of VLANs for different traffic types
• Remove high speed storage and content servers
• Implement QoS on the network
• Increase traffic filtering
• Lengthen the end-points of traffic
How should the information gathered during risk assessment be used to support the network
design?
• To help identify unknown traffic
• To establish firewall rule sets
• To determine redundancy requirements
• To isolate and identify a security attact
Drag the design requirement on the left to the associated design layer of the right
Create VLANs
Access
QoS classification
High speed connectivity to distribution layer
switches
Core
24x7 Availability
Aggregate traffic
Distribution
Traffic filtering
A network administrator has been asked to provide a report on any measures taken to ensure
full availability at the Core Layer of an enterprise network. If the network has been configured
correctly, which three options will the administrator be able to include as part of the report?
• Redundant links between the Core and Distribution Layers
• Backup power supply and functioning air conditioning systems
• EIGPR routing protocols
• Access control lists
• Switch port security
• QoS mechanisms
6
7
8
9
10
Which design implementation eliminates the need to create a single end-to-end VLAN for
wireless roaming?
• Using a lightweight access point solution with wireless LAN controllers
• Configuring each standalone access point with a different VLAN address
• Putting all of the standalone access points in the same IP subnet
• Configuring all of the access points to use the same channel
A local bookstore manager asks one of his employees who is studying networking to
implement a wireless network to provide connectivity to the Internet for customers and
employees. The wireless network should be able to function even if AP fails because other
competitors nearby also offer this service. The bookstore owner is planning to expand into
another area of their current building and wants to be able to install Aps easily. The bookstore
staff do not have a lot of technical expertise so they want the configuration of the security
parameters to be automatic on all wireless Aps. The networking student recommends the
following:
1. Install a twelve port Layer 2 switch and attach two wireless access points to the switch in
the same VLAN, but on different channels
2. Train the staff to install the Aps using the default security settings
Which statement best describes how the recommendation supports the goals of the
bookstore?
• The recommendation meets all of the technical goals of the customer
• The recommendation does not meet the goal of scalability
• The recommendation does not meet the goal of availability
• The recommendation does not meet the goal of security
• The recommendation does not meet the goal of manageability
A large company requires their external workers to have internal access to the information
stored on the company server. What method provides secure tunneling through the Internet?
• Virtual private network
• Public wireless access point
• Intrusion detection system
• SSH protocol
In which circumstances would a point-to-point T1 connection be preferred over Frame Relay?
• Cost concerns are the highest priority
• QoS is the highest priority
• Only data traffic uses the connection
• Connectivity to multiple sites over the same physical connection is required
Refer to the exhibit. Where would the network administrator place a standard ACL to prevent
the users in the 10.10.10.0/24 subnet from accessing the server in the 10.10.20.0/24 subnet?
• Router RTR1, Fa0/0 interface, inbound
• Router RTR1, S0/0 interface, outbound
• Router RTR2, S0/0 interface, inbound
• Router RTR2, Fa0/0 interface, outbound
CHAPTER 6 QUIZ
1
2
3
4
5
6
Which are two characteristics of a hierarchical addressing scheme?
• Larger broadcast domain
• Network modularity
• Routing stability
• Private addressing support
• Increased security
What could be two results of having a discontiguous IP addressing scheme?
• Layer 2 loop
• Routing loop
• Security hole
• NAT cannot function properly
• Automatic summarization issues
• Spanning tree convergence time increase
What must an administrator do to ensure that summarization will work effectively?
• Enable CIDR
• Enable the use of subnet zero
• Implement a classful routing protocol
• Assign addresses in a hierarchical scheme
What are two ways that some networks can use IPv6 and still communicate over the internet
with their other IPv4 networks?
• Enable tunneling to allow IPv6 packets to be encapsulated and travel over IPv4
networks
• Buy new interface cards that can read IPv6 packets
• Upgrade the IOS on the IPv6 edge routers to an image that can translate IPv6 packets to
IPv4 packets
• Increase the IPv4 header size to include the IPV6 packets
• Use a Microsoft gateway to convert from IPv6 to IPv4
Refer to the following command:
RouterX(Config-if)# ipv6 address 2001:DB8:2222:7272::72/64
Which statement is true?
• No other commands are necessary to allow IPv6 traffic to pass though the router
• The MAC address of the interface card will be used as the network portion of the IPv6
address
• A 6-to-4 tunneling method will be used when IPv4 addresses pass through the router
• The complete IPv6 address is manually specified for the interface
Refer to the exhibit. The number of required host addresses for each subnet in a network is
listed in the exhibit. This number includes the host address requirements for all router ports
and hosts on the subnet. After all device and router port address assignments are determined,
what will be the total number of unused host addresses available?
Net A 6hosts /29, Net B 14 hosts /28, Net C 33 hosts /26, Net D 126 hosts /25
• 14
• 29
• 34
• 40
• 62
7
8
9
10
11
A network administrator is tasked with dividing up a class C network among the QA, Sales, and
Administration departments.
The QA department is made up of 10 people, the Sales is made up of 28 people, and the
Administration has 6. Which two subnets masks adequately address the QA and sales
departments?
• 255.255.255.252 for QA
• 255.255.255.224 for Sales
• 255.255.255.240 for QA
• 255.255.255.248 for QA
• 255.255.255.0 for Sales
Refer to the exhibit. A new PC was deployed int eh Sales network. It was given the host
address of 192.168.10.31 with a default gateway of 192.168.10.17. The PC is not
communicating with the network properly. What is the cause? (Sales 192.168.10.16/28)
• The address is in the wrong subnet
• 192.168.10.31 is the broadcast address for this subnet
• The default gateway is incorrect
• The host address and default gateway are swapped
Refer to the exhibit. What single address and mask can be used to summarize the networks
shown?
172.16.0.0/16, 172.18.0.0/16, 172.20.0.0/16, 172.22.0.0/16
• 172.16.0.0/13
• 172.16.0.0/14
• 172.16.0.0/20
• 172.16.0.0/22
• 172.16.0.0/24
What does VLSM allow a network administrator do?
• Use on subnet mask throughout an autonomous system
• Use multiple subnet masks in the same IP address space
• Use RIPv1 as the routing protocol in an entire autonomous system
• Use multiple routing protocols within an autonomous system
Refer to the exhibit. An additional subnet is required for a new Ethernet link between Router1
and Router2. Which subnet address can be configured in this network to provide a maximum
of 14 useable addresses for this link while wasting the fewest addresses?
Networks:192.168.1.64/26, 128/26, 208/28, 192/28, 248/30, 244/30
• 192.168.1.16/16
• 192.168.1.96/28
• 192.168.1.160/28
• 192.168.1.196/27
• 192.168.1.224/28
• 192.168.1.240/28
CHAPTER 7 QUIZ
1
2
3
4
5
6
Which three descriptions accurately define the concept of a pilot network?
 User traffic not affected by changes
 Highly-controlled and simulated environment
 Requires real-world network traffic
 Not as easily controlled as a prototype network
 High visibility and risk
 Flexibility and manageability
When building a prototype to test a network design, why is it important to create a test plan
before beginning the process?
 To ensure that the goals of the test are clear and measurable
 To record a baseline of network activity on the production network
 To provide a step-by-step guide for implementation of the network design
 To ensure that network resources are adequate to support additional traffic generated
by the test
Identify the testing tool or command on the left with its purpose on the right
Arp commands
Show layer 2 to layer 3 mapping
Debug commands
Provides real time analysis
Ping commands
Verifies layer 3 connectivity
Software logging
Supports trend analysis
Show commands
Provides current state of routing tables
telnet commands
Allows terminal sessions on remote devices
Traceroute commands
Confirms layer 3 path end-to-end
What is a common way of load balancing traffic over redundant links?
 EtherChannel
 STP
 Unequal cost routed links
 Separate ISP connections
A network administrator is testing the redundant links between switches. What state will the
redundant link reach after the active link is disconnected?
 Blocking
 Forwarding
 Listening
 Learning
 disbled
A network designer wishes to add another server to the current network. What risk does the
designer avoid by implementing two servers?
 Limited scalability
 Large failure domain
 Possible bottlenecks
 Single point of failure
7
8
9
10
A new company will have several buildings and use the network for voice, video and data. Two
proposals have been made:
1. Use a flat switched network design to connect all the buildings and a single router for
internet access
2. Use a hierarchical infrastructure with switches at the access layer and routers for data
transport between buildings and internet access. Which statement about the competing
designs is correct?
 Proposal 1 meets all design goals
 Proposal 2 meets all design goals
 Proposal 2 is only adequate for data traffic
 Proposal 1 works well for video, but not VoIP
Which Cisco switching protocol provides resiliency when a network experiences problems and
ensures near 100% uptime?
 VTP
 RSTP
 BPDU
 EIGRP
A web content hosting company has been granted a new contract to host an online ordering
service for large retail chain. The content hosting company asks a networking consulting firm
to examine the current network infrastructure to prepare for the launch of the online ordering
service. The examination reveals that the content hosting company has two T1 lines
connected to two separated ISPs. The server farm provides each customer with a separate
web server. Each server is running Linux with Apache on one 30-gigabyte hard disk?
What are the two greatest potential risks in the current network infrastructure of the content
hosting company?
 Single point of failure of the web server
 Large failure domain if the web server fails
 Potential bottle necks on the internet connection
 Single point of failure if their ISP fails to provide connection
 Limited scalability of web servers due to their hard disk capacity
Refer to the exhibit. Port Fa 0/0 on router R1 is connected to pot Fa0/1 on switch S1. After the
commands shown are entered on both devices, the network administrator determines that
the devices on VLAN 2 are unable to ping the devices on VLAN 1. What is likely the problem?
 S1 is not configured for trunking
 R1 does not have the VLANs entered in the VLAN database
 Spanning tree protocol is blocking port Fa0/0 on R1
 The VLANs do not match the subinterface numbers
CHAPTER 8 QUIZ
1
2
3
4
5
What three things can be done to simulate a DSL or cable WAN connection in a lab
environment?
• Use 100Mbps serial links between the routers
• Use 10Mbps Ethernet connections between the routers via a crossover cable
• Use 100Mbps Ethernet links to connect the routers via a straight-through cable
• Use 10Mbps Ethernet connections between the routers via a straight-through cable
• Change static route preference by increasing the administrative distance assigned to the
route
• Use the bandwidth command on the Ethernet links to adjust the routing metric
Drag the network simulation software on the left to the benefit on the right
Test software is cheaper than a test network
Low overall cost
Changing device types and topologies is easy
Flexibility
Traffic can be observed and packets can be examined
Control
Faster to build large networks with software
Scalability
A ping is sent to address 192.168.50.10 from the Peanut router. Which DLCI will be used to
send the ping?
• 110
• 115
• 220
• 225
Refer to the exhibit. Given the topology as shown, a network administrator configures a Frame
Relay connection to allow each of the routers to communicate with each other. Upon
completing the task, the administrator makes a routing change on R2 but notes that the
update is only being reflected at R1. How should the network administrator resolve this
problem?
• Reconfigure the routing protocol on each of the routers
• Configure sub-interfaces on R1 instead of using single interface
• Routing protocols cannot update across a Frame Relay connection
• Shut down and restart the S0/0/0 interface on R1 as this will trigger a routing update
A network administrator has configured a Frame Relay connection between the corporate
network and a local Internet service provider (ISP) to supply the network database servers
with a dedicated circuit. During routine monitoring, the network administrator notices that
during periods of high traffic, the servers need to retransmit the same data multiple times in
order to complete file transfers. A packet capture of the data headers indicates that the
Discard Eligible (DE) bit is set to one. What must the administrator do to correct this problem?
• Have the ISP increase the local access rate
• Replace the cables connecting the server to the CSU/DSU
• Switch to a different ISP which will provide better QoS
• Contact the ISP to have the Committed Interface Rate (CIR) increased
6
7
8
9
10
What is the purpose of encrypting traffic on a secure VPN?
• To ensure that traffic is routed along the VPN
• To ensure that data sent across the VPN between both authenticated endpoints is not
viewable as clear text
• To ensure that traffic coming from unauthorized personnel does not conflict with traffic
from authorized personnel
• To ensure that all traffic coming from the internet is not viewable in clear text
Drag the encapsulation protocol on the left with the correct description on the right
GRE
Can encapsulate a wide variety of protocol packet types inside IP tunnels
IPSec
A framework of open standards and functions at the network layer
L2F
A protocol that supports the creation of secure virtual private dialup networks
over the internet by tunneling Layer 2 frames
PPTP
A protocol developed by Microsoft used to create VPNs across TCP/IP networks
L2TP
An IETF standard protocol used to tunnel layer 2 PPP packets through a public
network using IP
Where should the VPN server be located on the network to handle the encrypted data?
• After the traffic has entered the internal network
• Before the flow of traffic reaches the internal network
• At the used endpoint
• At the service provider edge as traffic arrives from the user endpoint
When troubleshooting a Frame Relay connection, an administrator entered the show
interfaces s0/0/0 command and received the output shown in the exhibit. What are two
probable reasons for this problem?
• The cable between the CSU/DSU and the other router is disconnected
• The serial 0/0/0 interface is shutdown
• The router is not configured for the same Frame Relay PVC as the switch
• The LMI type of the Frame Relay switch is not ANSI
• The address of the Frame Relay switch is not in the routing table
What provides data confidentiality in a VPN?
• Hashing
• Tunneling
• Encryption
• Data headers
• Encapsulation
• SHA OR MD5
CHAPTER 9 QUIZ
1
2
3
4
5
6
Which section of the network proposal appears in the beginning and covers benefits to the
customer and summarizes the prioritized goals and project scope?
• Network requirements and current network environment
• Physical and logical design
• Cost proposal
• Executive summary
• Implementation plan
What are two benefits with a green field installation?
• A green field or new installation is cheaper than other implementation methods
• There are no users or services to disrupt
• A phased approach makes implementation quicker
• All of the equipment and services can be installed at the same time
• Outdated equipment can be replaced with newer equipment
Which two are benefits to purchasing a Cisco SMARTnet contract?
• Access to Cisco TAC 24 hours a day 7 days a week
• Free equipment based on the contract coverage
• Free training for equipment confirmation
• Advanced replacement of hardware parts
• Free shipping to customers that adhere to the Cisco SMARTnet contracts
Which section of the network proposal contains escalations and complaint resolutions?
• Network requirements
• Terms and signatures
• Executive summary
• Implementation plan
When can the implementation phase of a network project begin?
• On the date that was set in the network proposal
• As soon as the network design is completed
• As soon as the customer approves the implementation plan
• As soon as the planning phase has ended
Which three types of documentation are required for each task in the implementation plan of the
network proposal?
•
•
•
•
•
•
7
Rollback guidelines in case of failure
Estimated costs associated with new hardware
References to design documents
Estimated time required for completion
Training requirements for the end users
Maintenance schedule
A company has requested the IT department to upgrade the backbone of their network to increase
throughput and productivity. Management has requested that the services remain stable and usable
during this update. In addition, the management has decided to replace all of the existing backbone
devices and has agreed to purchase all new devices and cabling. Which installation method is best for
this company?
•
•
•
•
New installation
Phased installation
Complete replacement
Partial installation
Download