Sunteți pe pagina 1din 21

Close Window

Assessment System

1. Assessment Selection 2. Assessment Settings 3. Take Assessment

Take Assessment - DCompNtwk Practice Final - CCNA Discovery: Designing and


Supporting Computer Networks (Version 4.0)

Time Remaining:

Refer to the exhibit. A network designer is validating an IP addressing scheme with a test network that is
configured with RIPv1. However, while the designer can ping between routers RA and RB, communications
between network A and network B cannot be established. What should be done to solve the problem?
Change the routing protocol.
Use the S0/0/0 interface on RB to connect to RA.
Configure both routers with the no auto-summary command.
Replace the IP addressing of network B with 172.16.254.0/24.

2
Refer to the exhibit. Before the encapsulation was changed to Frame Relay, the administrator verified physic
connectivity by successfully pinging the remote router. After the encapsulation was changed, the administrat
attempted to ping the remote router on the Frame Relay circuit but was not successful. A show frame-relay
command was issued. What could be the problem?
The DLCI is incorrect.
The IP address is incorrect.
The interface needs to be re-enabled after the encapsulation is changed.
The network is not included in the routing table.

3 Which task would typically only require services that are located at the access layer of the hierarchical design
model?
placing a VoIP call to a business associate in another country
connecting to the corporate web server to update sales figures
using a VPN from home to send data to the main office server farm
responding to an e-mail from a co-worker in another department
printing a meeting agenda on a local departmental network printer

4 A user in a large office calls tech support to complain that the PC no longer connects to the Internet or to any
network resources, but seems otherwise normal. The help desk technician asks the caller to talk to nearby use
to see if other machines are affected. After a few minutes, the caller reports that several immediate neighbors
have the same problem, but those seated further away do not. Assuming that the description is accurate, what
should be checked next?
power outlet to the PC that is used by the caller
workgroup switch in the telecommunications room
cable between any network outlet and the telecommunications room
cable between the PC that is used by the caller and the network outlet it connects to
cable between the PC that is used by a neighbor and the network outlet the neighbor PC it connects to
5 What value is an alternative representation of the IPv6 address 2005:AED0:0000:0000:020E:0000:FE00:111
2005:AED0::020E:0000:FE00:1
2005:AED0::20E:0:FE00:1111
2005:AED0:0:0:020E:0:FE:1
2005:AED::20E::FE00:1111

Refer to the exhibit. A new host needs to be connected to the switch and be assigned to VLAN 2. Router RA
attached to the switch via a trunk and is configured as shown. What IP address should be assigned to this new
host?
192.168.1.1 /26
192.168.1.22 /28
192.168.1.32 /28
192.168.1.44 /28
192.168.1.47 /28
192.168.1.55 /28

7 Which two events occur when the command RTA(config)# frame-relay map ip 10.1.1.1 22 is issued on a
router? (Choose two.)
The remote router updates the Frame Relay map table with DLCI 22 to reach the 10.1.1.0 network.
Inverse-ARP is used to add an entry for 10.1.1.1 into the Frame Relay map table using DLCI 22.
DLCI 22 replaces the MAC address in the ARP table for entry 10.1.1.1.
A Layer 2 address is statically mapped to a Layer 3 address.
RTA uses DLCI 22 to forward data to 10.1.1.1.

8 A small bookstore would like to offer wireless connectivity for customers with laptops. Which wireless
components or devices will provide connectivity to the Internet for the customers with the least possible cost
the bookstore?
wireless LAN controllers
standalone access points
wireless network cards for an ad hoc WLAN
lightweight access point and wireless LAN controller

9 What two factors can increase the amount of time that is required for a network to converge? (Choose two.)
network size
queuing strategy for data traffic
routing protocols that are used on the network
access control lists that are applied to LAN interfaces
network address translation at the network borders

10

Refer to the exhibit. A networking company designer is reviewing a diagram of a customer network. What ar
the two problems that need to be resolved in the topology that is shown? (Choose two.)
The firewall router and ISP connection represent a single point of failure.
If one of the Layer 3 switches fails, the Cisco Call Manager will be unreachable.
A power supply failure of the server block switch will cause the entire IP telephony system to fail.
Using Layer 3 switches to interconnect the server block servers to the IP phones introduces too much del
The IP phones need to be redundantly connected to the switches to prevent single points of failure at the
access layer.

11

Refer to the exhibit. The administrator wishes to specify that the 56 kb/s circuit will be a backup link that wil
automatically be used in the event that the primary Frame Relay circuit goes down for traffic to the
172.16.75.0/24 network. Which command syntax will accomplish this?
RouterA(config)# ip route 172.16.75.0 255.255.255.0 192.16.35.76 200
RouterA(config)# ip route 172.16.75.0 255.255.255.0 192.16.35.76
RouterA(config)# ip route 172.16.75.0 255.255.255.0 172.16.75.1
RouterA(config)# ip route 192.16.35.76 255.255.255.0 172.16.75.1

12

Refer to the exhibit. PPP was successfully negotiated between the two routers. Which command set can be fo
on the local router to produce the results that are shown in the graphic?
hostname Sales
interface serial0/0
encapsulation ppp
ppp authentication chap
username Market password 5 jdhdh4737f7hssn
hostname Market
interface serial0/0
encapsulation ppp
ppp authentication chap
username sales password 5 jdhdh4737f7hssn
hostname Market
interface serial0/0
encapsulation ppp
ppp authentication pap
username sales password 5 jdhdh4737f7hssn
hostname Sales
interface serial0/0
encapsulation ppp
ppp authentication pap
username Market password 5 jdhdh4737f7hssn

13

Refer to the exhibit. What does the JAX router do with traffic that is destined for a web server with an IP addr
of 128.107.10.24?
The traffic is sent out Serial 0/0/0.
The router sends the traffic out all interfaces other than the one it came in on.
A request is sent to neighboring routers for paths to the 128.107.0.0 network.
The packets are placed into a queue until a better route is discovered via RIP.

14
Refer to the exhibit. All connections are working and CDP is enabled on all devices and interfaces. On which
device was the command issued?
R1
R2
Sw1
Sw2
Sw3

15 During the boot process and assuming the default sequence, what is the second location where the router will
look for the IOS?
ROM
flash
NVRAM
TFTP server

Showing 1 of 4 <Prev 1 Next>


Page:

Close Window
All contents copyright 1992-2010 Cisco Systems, Inc. Privacy Statement and Trademarks.
Close Window

Assessment System

1. Assessment Selection 2. Assessment Settings 3. Take Assessment

Take Assessment - DCompNtwk Practice Final - CCNA Discovery: Designing and


Supporting Computer Networks (Version 4.0)

Time Remaining:

16 Which protocol allows redundant Layer 2 links without switching loops?


DHCP
HSRP
MPLS
RSTP

17 Which two technologies can provide data integrity in a VPN connection? (Choose two.)
ESP
DES
MD5
DH1
SHA-1

18
Refer to the exhibit. A pre-sales system engineer receives a diagram of the current WAN from a customer.
EIGRP is the routing protocol that is used on the WAN. Based on the default operation of EIGRP, which
statement is true about the routing table on router RE?
There is a single route to the 172.18.20.0/24 LAN via the T1 connection.
There is a single route to the 172.18.20.0/24 LAN via the DSL connection.
EIGRP installs all three routes to the 172.18.20.0/24 LAN and load balances the traffic.
There is a single route to the 172.18.20.0/24 LAN via the 10 Mb Ethernet connection.

19
Refer to the exhibit. Based on the configuration of router R2, which statement is true if the four listed objecti
are requirements of an active security policy?

Objectives
(1) All traffic from the Internet into the DMZ is to be logged.
(2) Web traffic from the Internet is to be allowed into the DMZ.
(3) TCP traffic from established sessions is to be allowed into the internal network.
(4) Incoming e-mail from the Internet is to be handled by the DMZ e-mail server first.
Only objective 1 is met.
All four objectives are met.
Objectives 1, 2, and 4 are met.
Only objectives 2 and 4 are met.
Only objectives 2 and 3 are met.

20 What is the result of implementing a Frame Relay service with a CIR value of zero?
Data will not cross the Frame Relay WAN.
All frames that enter the Frame Relay WAN will be marked as DE.
Only frames that exceed the local access rate will be marked as DE.
CIR is disabled, which allows all data traffic to pass through the Frame Relay WAN.

21

Refer to the exhibit. Network A contains six network segments. With manual routing summarization and to
advertise only the networks that are shown, how many summary networks will RA advertise to RB?
1
2
3
4

22
Refer to the exhibit. An extended ACL has been created to deny traffic from the 192.168.30.0/24 network to
web server with IP address 209.165.201.30. According to Cisco best practices, where should the ACL be
applied?
R3 Fa0/0 inbound
R3 S0/0/1 outbound
R2 S0/0/1 inbound
ISP Fa0/0 outbound

23 A web-based retail company is considering updating its WAN connection with new technologies that are offe
by the ISP. What testing platform should be used by the network team of the company to validate the
performance and capacity of the new technology using real world data?
pilot
prototype
emulation software
simulation software

24 When configuring Frame Relay, what identifies a virtual circuit to the WAN switch?
LMI
CPE
PVC
DLCI

25
Refer to the exhibit. What is the purpose of this configuration?
auditing the network traffic with NBAR
monitoring the network traffic with NetFlow
capturing network traffic to send to a syslog server
applying the named ACLs egress and ingress to the Ethernet interfaces

26

Refer to the exhibit. To demonstrate the importance of using contiguous IP addressing in a hierarchical netwo
design, a network designer configures a prototype network with the use of a network simulator. Which EIGR
configuration commands should the designer enter on router R1 to correctly advertise a single summary route
router BR1 for the campus LAN?
27 What makes the Cisco EasyVPN application a useful tool for VPN implementation?
It provides encryption algorithms unavailable in other systems.
It ensures that remote workers actually use the VPN for connectivity.
It simplifies the configuration tasks for the device that is used as the VPN server.
It allows a greater variety of network devices to be used for VPN connections.

28 What is meant by "tunneling" in the context of migrating from IPv4 to IPv6?


obtaining IPv6 addresses from an IPv4 DHCP server
allowing both protocol stacks to run on the same network device
encapsulating one protocol packet within another protocol
enabling direct communication between hosts that use different versions of the IP protocol

29 A network administrator is asked to upgrade the enterprise network devices and to modify the addressing
scheme to support VLSM and route summarization. The current network infrastructure contains both Cisco a
non-Cisco routers. The plan is to replace old routers gradually with the latest Cisco routers. Which two routin
protocols can the administrator use to support both upgrading requirements? (Choose two.)
BGP
OSPF
RIPv1
RIPv2
EIGRP

30

Refer to the exhibit. Based on the show cdp neighbors detail command, which interface on Switch1 is
connected to Router1?
FastEthernet0/1
FastEthernet0/2
Serial0/0
Serial0/0/1

Showing 2 of 4 <Prev 2 Next>


Page:

Close Window
All contents copyright 1992-2010 Cisco Systems, Inc. Privacy Statement and Trademarks.

Close Window

Assessment System
1. Assessment Selection 2. Assessment Settings 3. Take Assessment

Take Assessment - DCompNtwk Practice Final - CCNA Discovery: Designing and


Supporting Computer Networks (Version 4.0)

Time Remaining:

31 What should be considered in the design of a wireless LAN on a corporate campus?


the vendor of all employee wireless NICs
the cables that are used for LAN connectivity
the number of wireless NICs required on enterprise servers
the messaging features that are used on employee cell phones
the location of the concrete pillars and walls between the offices

32 An HWIC-4ESW, four-port switch module needs to be installed in a Cisco 1841 router that currently has a W
2T module in slot 0. What should the network technician do first?
Install the hot-swappable option module.
Turn off the power to the router before installing the new module.
Remove the WIC-2T module so that the new module can be installed in slot 0.
Shut down all Fast Ethernet ports on the router until the switch module installation is complete.
Configure the Cisco IOS software to support an internal trunk link between the switch and router module

33 Which IOS component can be used for classification and protocol discovery of network traffic and applicatio
in use?
CDP
NBAR
ACL logging
Network Assistant

34 What type of system uses a PBX for call control and connection to the PSTN?
VPN
traditional telephony
VoIP
IP telephony

35 Which component in a Frame Relay WAN would set the BECN bit in the Frame Relay header if congestion i
experienced?
source DTE device
Frame Relay switch
destination DTE device
router through which communication was first initiated

36 As part of network monitoring, a network administrator receives an alert that the CPU usage of the core route
reaches 90% several times a day. Which protocol is in use to monitor the network performance?
DNS
SNMP
SMTP
DHCP
TFTP

37 What are two advantages of using Layer 3 devices instead of Layer 2 switches at the distribution layer of a
hierarchical network? (Choose two.)
allows connectivity between different VLANs
provides reliable connectivity to the end user
reduces the number of required redundant links
results in fewer IP subnets to configure and manage
enables traffic filtering that is based on subnet addresses

38 What is a characteristic of voice traffic in a converged network?


It is assigned secondary priority to data traffic.
It is processed in real time and cannot be retransmitted.
It consists of large packets with long, irregular data flows.
It uses the error-checking features of TCP to ensure good voice quality.

39 In what situation would the router display the ROMMON> prompt at the end of the boot process?
The boot process was interrupted before it completed.
The router could not find a suitable IOS to load into ROM.
The router could not find a running configuration file to load into RAM.
The router loaded an IOS but could not find a configuration file in NVRAM.

40 What best describes the function of QoS in data networks?


prioritizes data traffic over all other types of traffic
increases bandwidth on a link to ensure voice quality
provides preferred service to specified network traffic
automatically assigns the highest priority to web and database traffic

41 A network engineer is designing a LAN prototype for a medium-sized business. What should be used to test
IP addressing scheme?
Cisco SDM
network simulation tool
a fully functional network
network equipment in a testing lab

42 Company XYZ needs a WAN connection between headquarters and branch offices that has a high level of
security. The connection must provide high bandwidth to support VoIP and transactional data with as little
overhead as possible. What is the best solution for WAN connectivity for company XYZ?
DSL
cable
cell relay
PPP over a leased line

43 A new WIC is installed in an available router slot. At what point during the router startup process does the ro
test the card for hardware problems?
after the configuration from NVRAM is loaded into RAM
after the configuration from NVRAM is loaded into ROM
when the bootstrap program is loaded into RAM
during the POST

44

Refer to the exhibit. What must be done before the new IOS image can be installed on the router?
New IOS File name: c2800nm-advipservicesk9-mz.124-15.T3.bin
Size: 51056640
Erase the current IOS .
Change the configuration register to 0x2142.
Execute a copy tftp flash in ROMMON mode.
Rename the file in flash, changing the extension to ".old".

45

Refer to the exhibit. Access list 100 is applied inbound to interface serial 0/0/0 on the SOHO Router1. Which
traffic will be denied by the configuration?
DNS traffic from host A to the Internet
FTP traffic from host A to the Internet
ICMP traffic from the ISP to server 1
traffic from the ISP to the server on port 23

Showing 3 of 4 <Prev 3 Next>


Page:

Close Window
All contents copyright 1992-2010 Cisco Systems, Inc. Privacy Statement and Trademarks.
Close Window

Assessment System

1. Assessment Selection 2. Assessment Settings 3. Take Assessment

Take Assessment - DCompNtwk Practice Final - CCNA Discovery: Designing and


Supporting Computer Networks (Version 4.0)

Time Remaining:

46

Refer to the exhibit. A customer has a problem with connectivity in the network. Based on the IP addressing
scheme, what is causing the problem?
The WAN link that connects R1 to R3 has an incorrect mask.
The WAN links need IP addresses from a different major network.
The WAN link that connects R1 to R2 overlaps with the R3 LAN.
The IP addressing in R1 LAN is incorrect because subnet zero cannot be used with VLSM.

47 While configuring a router with EIGRP, a technician enters the EIGRP command:
Router(config-router)# variance 3

What is the effect of entering this command?


It enables unequal cost load balancing.
It adjusts the cost of all EIGRP routes to 3.
It restricts the number of EIGRP feasible successor routes to 3.
It enables EIGRP equal cost load balancing over a maximum of 3 routes.

48

Refer to the exhibit. Following a test plan, the network systems engineer completes the configuration of an
access layer switch and connects three PCs to test the configuration. The engineer attempts to ping from each
to the other connected PCs. Which three statements describe the expected results of pinging from one host to
another? (Choose three.)
Host 1 can ping Host 2.
Host 1 cannot ping Host 2.
Host 2 cannot ping Host 3.
Host 3 can ping Host 1.
Host 3 can ping Host 2.
Host 3 cannot ping Host 1.

49 Using the show frame-relay pvc and debug frame-relay lmi commands to troubleshoot a Frame Relay
problem, a network administrator rules out issues at Layers 1 and 2. Further investigation reveals that the IP
address of the remote router does not appear in the Frame Relay table. What should the next step be in solvin
the problem?
Configure the router using the frame-relay map ip command.
Disable Inverse ARP on the local router.
Verify that the remote router has Frame Relay encapsulation enabled.
Ensure that the LMI type is correct for the circuit.

50 During a review of the proposed bill of materials, the ABC Networking Company account manager realizes t
the systems engineer included a lower cost, less capable switch model for the access layer connectivity than w
specified by the network designer. When questioned, the systems engineer responds that the switches that we
recommended by the designer cannot be purchased within the budget limitations of the customer. Which acti
should the account manager take?
Inform the customer that the project cannot be completed given the unreasonable budget constraints.
Communicate any risks that are associated with the equipment substitution and obtain customer approval
proceed.
Because the customer is probably aware that the budget limitations will require lower cost, less capable
equipment, the account manager should do nothing.
Inform the customer that the project budget must be increased.

Showing 4 of 4 <Prev 4 Next>


Page:

Close Window
All contents copyright 1992-2010 Cisco Systems, Inc. Privacy Statement and Trademarks.

S-ar putea să vă placă și