Top Banner
Close Window Assessment System 1. Assessment Selection 2. Assessment Settings 3. Take Assessment Take Assessment - DCompNtwk Chapter 1 - CCNA Discovery: Designing and Supporting Computer Networks (Version 4.0) Time Remaining: 1
20
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Ccna 4

Close Window

Assessment System

  1. Assessment Selection  

  2. Assessment Settings

  3. Take Assessment

Take Assessment - DCompNtwk Chapter 1 - CCNA Discovery: Designing and Supporting Computer Networks (Version 4.0)

Time Remaining:

1

Refer to the exhibit. What happens when Host 1 attempts to send data?Frames from Host 1 are dropped, but no other action is taken.Frames from Host 1 cause the interface to shut down, and a log message is

, 03/01/-1,
Common header
, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
end spacer
, 03/01/-1,
spacer between cells
, 03/01/-1,
All other buttons use apps_button_nth.gif
, 03/01/-1,
All other buttons use apps_button_nth.gif
, 03/01/-1,
The first button uses apps_button_1st.gif as bkg image
, 03/01/-1,
NOTE: the double href tags to make the whole table cell active in IE
, 03/01/-1,
LHS margin table cell
, 03/01/-1,
spacer graphic controls minimum width
, 03/01/-1,
Common application name header
, 03/01/-1,
// end sitewide tools
, 03/01/-1,
// begin sitewide tools
Page 2: Ccna 4

sent.Frames from Host 1 are forwarded, but a log message is sent.Frames from Host 1 are forwarded, and the mac-address table is updated.

2 Which Cisco IOS function can be configured at the distribution layer to filter unwanted traffic and provide traffic management?

virus protectionspyware protectionVPNsaccess control lists

3 Which three statements describe the functions of the Cisco hierarchical network design model? (Choose three.)Route summarization is not necessary at the core and distribution layers. The distribution layer is responsible for traffic filtering and isolating failures from the core.Two goals of the core layer are 100 percent uptime and maximizing throughput.The access layer provides a means of connecting end devices to the network.The distribution layer distributes network traffic directly to end users.The core layer usually employs a star topology.

4 Which two statements are true regarding network convergence? (Choose two.)In a large network, using the EIGRP or OSPF routing protocols rather than RIPv2 may improve convergence time.Using STP at the core layer improves convergence time by allowing the use of redundant links between devices.Route summarization improves convergence time by minimizing the size of the routing table.A full mesh topology improves convergence time by allowing load balancing.ACLs can be configured to improve convergence time.

5 The ability to connect securely to a private network over a public network is provided by which WAN technology?

DSLFrame RelayISDNPSTNVPN

6 Refer to the exhibit. Which two devices are part of the access design layer? (Choose two.)

Edge2ISP4BR4FC-APFC-CPE-1FC-ASW-2

7 Refer to the exhibit. The network administrator creates a standard access control list to prohibit traffic from the 192.168.1.0/24 network from reaching the 192.168.2.0/24 network while still permitting Internet access for all networks. On which router interface and in which direction should it be applied?

, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
Page 3: Ccna 4

interface fa0/0, inboundinterface fa0/0, outboundinterface fa0/1, inboundinterface fa0/1, outbound

8 What are two best practices in wireless LAN design to ensure secure wireless access to the corporate network? (Choose two.)

Configure APs for broadcast SSID.Place APs as far apart as possible.Use a separate WLAN for employees.Configure WPA.Use wireless routers in all IDFs.

9 Which three functions are performed at the distribution layer of the hierarchical network model? (Choose three.)

summarizing routes from the access layerallowing end users to access the local network providing the gateway of last resort for core layer devices preserving bandwidth at the access layer by filtering network functionsisolating network problems to prevent them from affecting the core layerutilizing redundant links for load balancing to increase available bandwidth

10 What is true about implementing a centralized server farm topology?requires direct cabling from the MPOE to enhance the performance of serversrequires the addition of high-capacity switches to each workgroupprovides defined entry and exit points so that filtering and securing traffic is easierallows for placement of workgroup servers at the access layer

11 Centralizing servers in a data center server farm can provide which benefit over a distributed server environment?

It keeps client-to-server traffic local to a single subnet.Servers located in a data center require less bandwidth.It is easier to filter and prioritize traffic to and from the data center.Server farms are not subject to denial of service attacks.

12 In a well-designed, high-availability network, which device significantly affects the most users if a failure occurs?

desktop PC of the userlarge switch in the network core layerlarge switch in the network distribution layersmall workgroup switch in the network access layer

13 What are three ways to ensure that an unwanted user does not connect to a wireless network and view the data? (Choose three.)

Disable SSID broadcasting.Configure filters to restrict IP addresses.Use authentication between clients and the wireless device.Use NetBIOS name filtering between clients and the wireless device.Configure strong encryption such as WPA.Use a WEP compression method.

, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
Page 4: Ccna 4

14 Refer to the exhibit. What effect does the ACL shown have on network traffic, assuming that it is correctly applied to the interface?

All traffic to network 172.16.0.0 is denied.All TCP traffic is denied to and from network 172.16.0.0.All Telnet traffic from the 172.16.0.0 network to any destination is denied.All port 23 traffic to the 172.16.0.0 network is denied.All traffic from the 172.16.0.0 network is denied to any other network.

15 Refer to the exhibit. Which two statements correctly describe the benefits of the network access layer design that is shown? (Choose two.)

If host A sends a broadcast message, only hosts in VLAN10 receive the broadcast frame.If host A attempts to transmit data at the same time as another host, only hosts in VLAN10 are affected by the collision. Segmenting all voice traffic on a separate VLAN facilitates the implementation of QoS.VLANs improve network performance by facilitating the use of route summarization.VLANs at the access layer help guarantee network availability by facilitating load balancing.

Close Window

All contents copyright 1992-2010 Cisco Systems, Inc. Privacy Statement  and  Trademarks.

Close Window

Assessment System

  1. Assessment Selection  

  2. Assessment Settings

  3. Take Assessment

, 03/01/-1,
All other buttons use apps_button_nth.gif
, 03/01/-1,
All other buttons use apps_button_nth.gif
, 03/01/-1,
The first button uses apps_button_1st.gif as bkg image
, 03/01/-1,
NOTE: the double href tags to make the whole table cell active in IE
, 03/01/-1,
LHS margin table cell
, 03/01/-1,
spacer graphic controls minimum width
, 03/01/-1,
Common application name header
, 03/01/-1,
// end sitewide tools
, 03/01/-1,
// begin sitewide tools
, 03/01/-1,
Common header
, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
Page 5: Ccna 4

Take Assessment - DCompNtwk Chapter 1 - CCNA Discovery: Designing and Supporting Computer Networks (Version 4.0)

Time Remaining:

16 Refer to the exhibit. The server broadcasts an ARP request for the MAC address of its default gateway. If STP is not enabled, what is the result of this ARP request?

Router_1 contains the broadcast and replies with the MAC address of the next-hop router.Switch_A replies with the MAC address of the Router_1 E0 interface.Switch_A and Switch_B continuously flood the message onto the network.Switch_B forwards the broadcast request and replies with the Router_1 address.

17 What are two mechanisms that provide redundancy for server farm implementations? (Choose two.)host intrusion prevention systemsvirtual private networksnetwork intrusion prevention systemsRapid Spanning Tree ProtocolHot Standby Routing Protocol

18 Which two items in a physical WLAN design can be identified through a site survey? (Choose two.)the types of antennas that are requiredthe encryption techniques that are requiredthe access point hardware that is requiredthe different levels of access that are requiredthe connection reliability that is required

19 What kind of ACL inspects outbound UDP, TCP, and ICMP traffic and allows inbound access only to traffic that belongs to these established sessions?

dynamic ACLtime-based ACLreflexive ACLlock and key ACL

20 What address can be used to summarize only networks 172.16.0.0/24, 172.16.1.0/24, 172.16.2.0/24, and 172.16.3.0/24?

172.16.0.0/21172.16.0.0/22172.16.0.0 255.255.255.248172.16.0.0 255.255.254.0

21 The network administrator is designing network connectivity for a home teleworker. The teleworker needs secure access to download and upload documents on the network file server. What network connection would be most cost efficient while still meeting the security and connectivity needs of this teleworker?

, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
end spacer
, 03/01/-1,
spacer between cells
Page 6: Ccna 4

dedicated leased line connection with a dialup backup linkFrame Relay connection with a DSL backup linkDSL VPN connection with a dialup backup linkATM connection with a DSL VPN backup linkDSL connection with no backup link

22 Which statement is true about a DMZ in a traditional network firewall design?A DMZ is designed to provide service for external access but not for internal access.Servers in the DMZ provide limited information that can be accessed from external networks.User access to the DMZ from the Internet and the internal network usually is treated the same way.All servers in the enterprise network should be located in a DMZ because of enhanced security measures.

23 Which two considerations are valid when designing access layer security? (Choose two.)In a large wireless network, the most efficient method to secure the WLAN is MAC address filtering.DoS attacks are normally launched against end-user PCs and can be mitigated by installing personal firewalls on all company PCs.SSH is more secure than Telnet to administer network devices.Disabling unused ports on the switches helps prevent unauthorized access to the network.All Telnet passwords are at least 6 characters long.

24 A network designer is creating a new network. The design must offer enough redundancy to provide protection against a single link or device failure, yet must not be too complex or expensive to implement. What topology would fill these needs?

starfull meshpartial meshextended starhub and spoke

25

Refer to the exhibit. If the firewall module has been correctly configured using best practices for network security, which statement is true about the security design for the network?

Servers in the network are not protected from internal attacks.Servers in the DMZ are protected from internal and external attacks.Servers in the server farm are protected from internal and external attacks.

, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
Page 7: Ccna 4

Traffic from the external networks is not able to access the servers in the DMZ.

Close Window

All contents copyright 1992-2010 Cisco Systems, Inc. Privacy Statement  and  Trademarks.

Close Window

Assessment System

Take Assessment - DCompNtwk Chapter 3 - CCNA Discovery: Designing and Supporting Computer Networks (Version 4.0)

Time Remaining:

1 A company is beginning to analyze their new Cisco IOS upgrade requirements. What is one of the router components that a network administrator must consider when selecting a new Cisco IOS version?

processor typestorage space in NVRAMinterfaces and modules to be supportedcompatibility of the bootstrap version with the new Cisco IOS software

2 What section of the Network Design Requirements document usually details the physical areas, applications, and user groups affected by the network upgrade?

overall project goalproject scopenetwork requirements

, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
end spacer
, 03/01/-1,
spacer between cells
, 03/01/-1,
The first button uses apps_button_1st.gif as bkg image
, 03/01/-1,
NOTE: the double href tags to make the whole table cell active in IE
, 03/01/-1,
LHS margin table cell
, 03/01/-1,
spacer graphic controls minimum width
, 03/01/-1,
Common application name header
, 03/01/-1,
// end sitewide tools
, 03/01/-1,
// begin sitewide tools
, 03/01/-1,
Common header
Page 8: Ccna 4

current state of the network

3

Refer to the exhibit. A network designer has no documentation and is attempting to create a logical diagram of the network using the output from show commands. What can be determined from the output shown?

The attached device with the IP address 10.10.10.2 is a switch.The attached switch is a VTP server in the Toronto domain.The designer will not be able to telnet to the attached switch.The Cisco router IOS supports enterprise-level voice and video technologies.

4 A network design project includes a review of the existing network. What is the purpose of this phase of the project?

eliminate the need for a site surveyshorten the timeframe of the projectlower the cost of the project by removing redundant links and devicesdetermine if the number of applications used within the company can be reduceddetermine what current network devices require upgrades to meet the new requirements

5 It is important to identify the details of network sections and devices that will be affected or involved in a new design. This information is included in which section of the Network Design Requirements Document?

Project GoalProject ScopeTechnical RequirementsCurrent State of the Network

, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
Page 9: Ccna 4

6 The new serial interface card for the router arrives and the network technician reads that it is hot-swappable. What does this mean?

The card cannot be installed while the router is powered on because static discharge could damage the card.The card cannot be installed until the router is powered off and completely cooled down.The card can be installed while the router is powered on if the router supports this technology.The card is a replacement and must be installed in the same slot as the card it is replacing.

7

Refer to the exhibit. Which of the three Cisco IOS images shown will load into RAM?The router selects the first image stored in flash.The router selects the third Cisco IOS image because it is the most recent IOS image.The router selects the second Cisco IOS image because it is the smallest IOS image.The router selects an image depending on the boot system command in the configuration.The router selects the third Cisco IOS image because it contains the advipservicesk9 image.

8

, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
Page 10: Ccna 4

Refer to the exhibit. The top of the output shows the Cisco Feature Navigator regarding a Cisco IOS image that the administrator wants to install on a router. Below it is the output from the show version command for that router. Which statement is true regarding the capacity of the router to run this Cisco IOS image?

There is not enough DRAM and flash.There is enough DRAM and flash.There is enough DRAM but not enough flash.There is enough flash but not enough DRAM.

9 What are two practices a network technician should follow when installing a new interface card in a router? (Choose two.)

Be sure the interface card faceplate does not touch the chassis rear panel.Do not tighten the captive screws until the router has been powered on and recognizes the card.Store the blank faceplate inside the card slot to be used if the card is removed.Handle the interface card by the edges to avoid static discharge.Push the interface card into place until the edge connector is seated securely.

10 In which section of the Network Design Requirements document would a network consulting team detail names and IP addresses of important networking components and servers, provide network diagrams and topologies, and define strengths and weaknesses of the network?

, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
Page 11: Ccna 4

network requirementsproject scopeoverall project goalstate of the network

11

Refer to the exhibit. A network administrator issues the command shown to gain knowledge about a poorly documented network. Which two pieces of information can the network administrator discover from the command output? (Choose two.)

One connected device has router capability.The entire network contains a total of five Cisco devices with CDP enabled.None of the directly connected network devices have been configured with an IP address.Device EDGE_2811 is connected to port Fast Ethernet 0/0 on device C3750-24_MDF.Five Cisco devices with CDP enabled are directly connected to device C3750-24_MDF.

12

, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
Page 12: Ccna 4

Refer to the exhibit. If a reload command is issued on router FC-CPE-1, where does the router first search for the Cisco IOS image?

NVRAMflashRAMTFTP server

13

Refer to the exhibit. What two items can be determined from the output? (Choose two.)

R2 is a Cisco 2600 device.R2 has 22 MB of RAM installed.The version of the IOS is 12.3.Over 8 MB of NVRAM is installed.A new 36 MB IOS file can be installed on the device.

14 A production router is reloaded and finishes with a Router> prompt. What three facts can be determined? (Choose three.)

POST occurred normally.The boot process was interrupted.There is not enough RAM or flash on this router.The configuration register may have a value of 0x2142.A full version of the Cisco IOS was located and loaded.The router did not locate the Cisco IOS in flash, so it defaulted to ROM.

15 During a site survey, the network designer noticed that people were accessing the company wireless network from the parking lot. What should be done to stop the wireless signal from radiating out into the parking lot?

change the channel on the wireless APconnect the wireless AP to a firewallchange the type of antenna attached to the APmove the wireless AP to a secure VLANmove the wireless AP to a port on a Layer 3 switch

Close Window

All contents copyright 1992-2010 Cisco Systems, Inc. Privacy Statement  and  Trademarks.

, 03/01/-1,
Common header
, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
Page 13: Ccna 4

Close Window

Assessment System

Take Assessment - DCompNtwk Chapter 3 - CCNA Discovery: Designing and Supporting Computer Networks (Version 4.0)

Time Remaining:

16 An employee at a company notices that the wireless signal strength indicator on his laptop fluctuates from good to low. The network administrator decides to do a site survey of that area. Which three factors need to be included in the survey? (Choose three.)

type and model number of the WNIC of the laptopnumber of users in the arealocation of the APlist of MAC addresses filtered by the APnumber of simultaneous applications running on the laptop of the employeelocation of walls and filing cabinets in the office

17 When planning an IOS upgrade, what are two pieces of information that need to be collected before selecting the new IOS? (Choose two.)

amount of installed NVRAMmodel number of the routernumber of interfaces and installed HWICsinstalled Cisco IOS feature set and versionerror statistics for each interface

18 Which two items are objectives of a WLAN design site survey? (Choose two.)identify coverage areasdetermine primary AP locationsdetermine what AP equipment should be purchaseddetermine how many users will access the WLANidentify the bottleneck of the LAN infrastructure

19

, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
end spacer
, 03/01/-1,
spacer between cells
, 03/01/-1,
The first button uses apps_button_1st.gif as bkg image
, 03/01/-1,
NOTE: the double href tags to make the whole table cell active in IE
, 03/01/-1,
LHS margin table cell
, 03/01/-1,
spacer graphic controls minimum width
, 03/01/-1,
Common application name header
, 03/01/-1,
// end sitewide tools
, 03/01/-1,
// begin sitewide tools
Page 14: Ccna 4

Refer to the exhibit. Which two actions would improve the weaknesses of the exhibited topology, assuming that each access layer segment is in its own subnet? (Choose two.)

Implement redundant links to each server by adding additional NICs.Implement a redundant link from all access layer switches to Admin, Dist, and Server Farm.Implement a backup firewall with a link to a secondary ISP and implement a redundant link to the DMZ.Implement redundant links from the existing firewall to all access layer switches.Implement redundant links from the DMZ to Admin and Dist.

20 The new network design for AnyCompany must include support of voice and video traffic. Before upgrading, the network designer checks whether the existing devices can support the new requirements. Which three items does the designer need to check? (Choose three.)

number of routers and switches owned by AnyCompanyrouters that will support extra ASICs and WWICssize of DRAM and flash on each devicerouters that will support HWICs and VWICssystem bootstrap version on each router and switchmodules supported on the loaded Cisco IOS

21

Refer to the exhibit. The network administrator is attempting to install a new version of the IOS on R2. Based on the exhibited output, what are two possible reasons that the transfer failed? (Choose two.)

The administrator did not enable TFTP on R2.There is not enough flash available to store the new IOS.Connectivity between R2 and the TFTP server was not verified.The copy command was incorrectly entered.

, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
Page 15: Ccna 4

The administrator did not verify that the TFTP server is running.

22 A new Cisco IOS version has been copied into flash from a TFTP server. When a reload is issued to upgrade the Cisco IOS, the router freezes part of the way through the loading process. What could be the problem?

There is enough flash but not enough RAM in the router.The new HWIC cards have not been installed yet.The TFTP server needs to be present during a reload.The new Cisco IOS should have been loaded into NVRAM.The new bootstrap version is not compatible with the original version on the router.

23 During a wireless site survey, a consultant is determining the hours of peak usage and the estimated number of users in each location. The consultant is currently in what step of the site survey process?

the defining of customer requirementsthe identification of coverage areasthe determining of preliminary AP locationsthe measurement of signal strength

24

Refer to the exhibit. Based upon the Cisco IOS file naming convention, what is represented by the value ipvoicek9 listed in the IOS filename?

versionfile formatfeature sethardware platform

Close Window

All contents copyright 1992-2010 Cisco Systems, Inc. Privacy Statement  and  Trademarks.

, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB
, 03/01/-1,
START MCSA, MCMA, FIB
, 03/01/-1,
END MCSA, MCMA, FIB