Documente Academic
Documente Profesional
Documente Cultură
CCNA4
Curriculum1
Generated by Foxit PDF Creator © Foxit Software
http://www.foxitsoftware.com For evaluation only.
Generated by Foxit PDF Creator © Foxit Software
http://www.foxitsoftware.com For evaluation only.
Generated by Foxit PDF Creator © Foxit Software
http://www.foxitsoftware.com For evaluation only.
http://www.gradarom.com/cisco/index.php?lang=en&module=DRSEnt_Chapter_1
2What are two important characteristics or functions of devices at the Enterprise Edge? (Choose two.)
providing Internet, telephone, and WAN services to the enterprise network
providing a connection point for end-user devices to the enterprise network
providing high-speed backbone connectivity with redundant connections
providing intrusion detection and intrusion prevention to protect the network against malicious
activity
providing packet inspection to determine if incoming packets should be allowed on the enterprise
network
3 Which two measures help ensure that a hardware problem does not cause an outage in an enterprise LAN th
supports mission critical services? (Choose two.)
providing failover capability
installing redundant power supplies
purchasing more bandwidth from the ISP
enabling half-duplex connectivity to access layer devices
installing routers that can handle a greater amount of throughput
4Which three items can be discovered by using a packet sniffer application? (Choose three.)
network transmission speed
source IP address
Ethernet frame type
duplex operational status
near-end crosstalk (NEXT) level
Generated by Foxit PDF Creator © Foxit Software
http://www.foxitsoftware.com For evaluation only.
5 Which two statements are reasons why UDP is used for voice and video traffic instead of TCP? (Choose two
TCP requires all data packets to be delivered for the data to be usable.
The acknowledgment process of TCP introduces delays that break the streams of data.
UDP does not have mechanisms for retransmitting lost packets.
UDP tolerates delays and compensates for them.
TCP is a connectionless protocol that provides end-to-end reliability.
UDP is a connection-oriented protocol that provides end-to-end reliability.
6Which task would typically only require services located at the access layer of the hierarchical design model
connecting to the corporate web server to update sales figures
using a VPN from home to send data to the main office servers
printing a meeting agenda on a local departmental network printer
placing a VoIP call to a business associate in another country
responding to an e-mail from a co-worker in another department
7 The ABC Corporation implements the network for its new headquarters using the Cisco Enterprise Architec
The network administrator wants to filter the traffic from and to the outside world. Where should the
administrator deploy a firewall device?
server farm
enterprise edge
enterprise campus
service provider edge
8Why is TCP the preferred Layer 4 protocol for transmitting data files?
TCP is more reliable than UDP because it requires lost packets to be retransmitted.
TCP requires less processing by the source and destination hosts than UDP.
UDP introduces delays that degrade the quality of the data applications.
TCP ensures fast delivery because it does not require sequencing or acknowledgements.
9 Which protocol and process could be implemented on a network to ensure that a telecommuter can attend a
training presentation via the use of VoIP and still experience uninterrupted data streams and quality
conversations?
TCP and QoS
UDP and QoS
TCP and queuing
UDP and VPN
Generated by Foxit PDF Creator © Foxit Software
http://www.foxitsoftware.com For evaluation only.
11 What is the main purpose of the Access Layer in a hierarchically designed network?
performs routing and packet manipulation
supplies redundancy and failover protection
provides a high-speed, low-latency backbone
serves as a network connection point for end-user devices
12In which functional area of the Cisco Enterprise Architecture should IDS and IPS be located to detect and
prevent malicious activity from outside?
enterprise campus
WAN and Internet
enterprise edge
service provider edge
15 Which two solutions would an enterprise IT department use to facilitate secure intranet access for remote
workers? (Choose two.)
Generated by Foxit PDF Creator © Foxit Software
http://www.foxitsoftware.com For evaluation only.
VPN
NAT
user authentication
client firewall software
packet sniffing
17Which functional component of the Cisco Enterprise Architecture is responsible for hosting internal server
enterprise campus
enterprise edge
service provider edge
building distribution
20 What are two benefits of controlling the flow of traffic in an enterprise network? (Choose two.)
security
smaller failure domains
more reliable transaction processing
bandwidth optimization
Generated by Foxit PDF Creator © Foxit Software
http://www.foxitsoftware.com For evaluation only.
21Which statement describes the difference between an enterprise WAN and an enterprise extranet?
An enterprise WAN is designed to interconnect local LANs, while an enterprise extranet is designed to
interconnect remote branch offices.
An enterprise WAN is designed to interconnect branch offices, while an enterprise extranet is
designed to give access to external business partners.
An enterprise WAN is designed to provide remote access for its teleworkers, while an enterprise extran
is designed to provide Internet connectivity for the enterprise.
An enterprise WAN is designed to provide Internet connectivity for the enterprise, while an enterprise
extranet is designed to provide remote access to the enterprise network for teleworkers.
22 A business consultant must use Internet websites to research a report on the e-business strategies of several
firms and then electronically deliver the report to a group of clients in cities throughout the world. Which tw
teleworker tools can the consultant use to accomplish this project? (Choose two.)
VoIP
VPN
HTTP
Telnet
email
23A remote user needs to access a networking device on the internal network of the company. The transaction
between the remote user and the device must be secure. Which protocol enables this to happen securely?
HTTP
SSH
Telnet
FTP
24 What are two important guidelines when using packet sniffers to determine traffic flow patterns? (Choose tw
Capture only traffic from a single application at a time.
Perform the capture on several different network segments.
Create a baseline capture during a low or non-utilization period.
Relocate highly active servers before attempting the capture.
Capture traffic during peak utilization times.
Generated by Foxit PDF Creator © Foxit Software
http://www.foxitsoftware.com For evaluation only.
Which of the following can be done to allow the users on the 10.0.0.0 network to communicate with
the Web Server shown in the graphic? (Choose two.)
* Configure the Miami router to use NAT.
• Configure the Web Server with a private address.
* Configure the Miami router to use PAT.
• Change the Internet link IP address of 128.56.0.0 to a private address.
• Configure the Tampa router to use PAT.
2 What is the default number of pings issued by a DHCP server to a pool address before sending the
DHCPOFFER to a client?
• one
* two
• three
• four
• five
4 Which configuration parameters are provided by the dynamic allocation process of DHCP?
(Choose three.)
* Gateway address
* DNS server
• DHCP Server
* Subnet mask
• Key server
• ARP server
5
Generated by Foxit PDF Creator © Foxit Software
http://www.foxitsoftware.com For evaluation only.
What is the purpose of the command marked with an arrow shown in the partial configuration
output of a Cisco 806 broadband router?
• defines which addresses are allowed out of the router
• defines which addresses are allowed into the router
* defines which addresses can be translated
• defines which addresses are assigned to a NAT pool
Given the accompanying debug output from a Cisco router, what kind of address is 10.10.10.3 with
the IP identification number of 29855?
* inside local
• inside global
• outside local
• outside global
Given the accompanying graphic, which statement would be applied to the S0 interface when
configuring NAT on the Tampa router?
Generated by Foxit PDF Creator © Foxit Software
http://www.foxitsoftware.com For evaluation only.
• ip nat inside
* ip nat outside
• ip pat inside
• ip pat outside
Given the accompanying graphic, which addresses could be assigned to traffic leaving S0 as a result
of the statement ip nat pool Tampa 179.9.8.96 179.9.8.111 netmask 255.255.255.240? (Choose
two.)
• 10.0.0.125
• 179.9.8.95
* 179.9.8.98
* 179.9.8.101
• 179.9.8.112
Refer to the exhibit. Which command would establish a group of 30 IP addresses that could be used
to hide inside addresses from the Internet?
• ip nat pool Raleigh 10.0.0.32 10.0.0.63 netmask 255.255.255.224
• ip nat pool Raleigh 10.0.0.32 10.0.0.63 netmask 255.255.255.240
* ip nat pool Raleigh 171.11.10.32 171.11.10.63 netmask 255.255.255.224
• ip nat pool Raleigh 171.11.10.32 171.11.10.63 netmask 255.255.255.240
10
Given the accompanying diagram, which commands are necessary to implement PAT on the
Raleigh router? (Choose four.)
* access-list 10 permit 192.168.10.0 0.0.0.255
• access-list 10 permit 171.11.0.0 0.0.255.255
Generated by Foxit PDF Creator © Foxit Software
http://www.foxitsoftware.com For evaluation only.
12 Which of the following are broadcasts sent by a client to a DHCP server? (Choose two.)
* DHCPDISCOVER
• DHCPRELEASE
• DHCPACK
* DHCPREQUEST
• DHCPOFFER
13 In addition to assigning addresses from predefined pools, which other services can a DHCP
server offer? (Choose three.)
* DNS server addresses
* domain names
• global IP assignments
• NAT translations
* WINS server addresses
14 Users are complaining that they cannot attach to network resources. A technician has confirmed
that clients are not properly receiving IP configuration information through the DHCP process. The
network administrator wants to watch the DHCP process while the technician tries to release and
renew addresses on the clients. Which command would the network administrator use to monitor
the process of address allocation?
• show ip dhcp server statistics
• show ip dhcp binding
* debug ip dhcp server events
• debug ip dhcp binding
15
Generated by Foxit PDF Creator © Foxit Software
http://www.foxitsoftware.com For evaluation only.
Refer to the graphic. Which command would allow the router to forward DHCP broadcasts from
Host A to the DHCP server?
* ip helper-address
• dhcp helper-address
• dhcp relay-agent
• dhcp-relay
16 What is the default lease time for addresses assigned to clients through Easy IP?
* twenty-four hours
• forty-eight hours
• one week
• two weeks
17
The Raleigh router shown in the diagram is configured with PAT. Which of the following must be
changed if the private network is migrated to a 10.0.0.0 network? (Choose two.)
* E0 interface address
• S0 interface address
* the access-list statement
• the NAT outside interface
• the NAT inside interface
18 A network administrator needs to configure a router to offer DHCP services. Assuming the
router is operating with factory defaults and the IOS supports DHCP, what must be done to start the
DHCP service?
Generated by Foxit PDF Creator © Foxit Software
http://www.foxitsoftware.com For evaluation only.
19 Which of the following traffic types are supported by Cisco IOS NAT? (Choose two.)
• Routing table updates
* ICMP
* FTP
• BOOTP
• SNMP
21 A company was issued 207.48.12.8/29 as its registered address from its ISP. Which of the
following is a solution that will allow Internet access to 300 employees simultaneously?
• VLSM to further subnet the registered address and create more IP addresses
• normal subnetting on the Class C network and address the host
* RFC 1918 and port address translation
• this is an impossible scenario because there are not enough addresses
Generated by Foxit PDF Creator © Foxit Software
http://www.foxitsoftware.com For evaluation only.
Q.2 In which functional area of the Cisco Enterprise Architecture should IDS and IPS be located to
detect and prevent services from accessing hosts?
Enterprise Campus
Edge Distribution
Enterprise Edge
Service Provider Edge
Q.3 A business consultant must use Internet websites to research a report on the e-business
strategies of several firms and then electronically deliver the report to a group of clients in cities
throughout the world. Which two teleworker tools can the consultant use to accomplish this project?
(Choose two.)
VoIP
VPN
HTTP
Telnet
email
Q.4 Which two measures help ensure that a hardware problem does not cause an outage in an
enterprise LAN that supports mission critical services? (Choose two.)
Q.5 Which task would typically only require services located at the access layer of the hierarchical
Generated by Foxit PDF Creator © Foxit Software
http://www.foxitsoftware.com For evaluation only.
design model?
Q.7 A remote user needs to access a networking device on the internal network of the company.
The transactions between the remote user and the device must be secure. Which protocol enables
this to happen securely?
HTTP
SSH
Telnet
FTP
Q.9 Which functional component of the Cisco Enterprise Architecture is responsible for hosting
internal servers?
enterprise campus
enterprise edge
Generated by Foxit PDF Creator © Foxit Software
http://www.foxitsoftware.com For evaluation only.
remove the three-layer hierarchical model and use a flat network approach
divide the network into functional components while still maintaining the concept of Core,
Distribution, and Access Layers
provide services and functionality to the core layer by grouping various components into a
single
component located in the access layer
reduce overall network traffic by grouping server farms, the management server, corporate
intranet, and e-commerce routers in the same layer
Q.11 Which two solutions would an enterprise IT department use to facilitate secure intranet access
for remote workers? (Choose two.)
VPN
NAT
user authentication
client firewall software
packet sniffing
Q.12 Which statement describes the difference between an enterprise WAN and an enterprise
extranet?
Q.13 Why would a network administrator want to limit the size of failure domains when designing
a network?
Q.14 What is the main purpose of the Access Layer in a hierarchically designed network?
Q.15 Which three functions are performed at the Distribution Layer of the hierarchical network
model? (Choose three.)
Q.17 What are two important characteristics or functions of devices at the Enterprise Edge?
(Choose two.)
activity
providing packet inspection to determine if incoming packets should be allowed on the
enterprise network
Q.18 Why is TCP the preferred Layer 4 protocol for transmitting data files?
TCP is more reliable than UDP because it requires lost packets to be retransmitted.
TCP requires less processing by the source and destination hosts than UDP.
UDP introduces delays that degrade the quality of the data applications.
TCP ensures fast delivery because it does not require sequencing or acknowlegements.
Q.19 The ABC Corporation implements the network for its new headquarters using the Cisco
Enterprise Architecture. The network administrator wants to filter the traffic from and to the outside
world. Where should the administrator deploy a firewall device?
server farm
enterprise edge
enterprise campus
service provider edge
Q.20 Which two statements are reasons why UDP is used for voice and video traffic instead of
TCP?(Choose two.)
TCP requires all data packets to be delivered for the data to be usable.
The acknowledgment process of TCP introduces delays that break the streams of data.
UDP does not have mechanisms for retransmitting lost packets.
UDP tolerates delays and compensates for them.
TCP is a connectionless protocol that provides end-to-end reliability.
UDP is a connection-oriented protocol that provides end-to-end reliability
http://www.scribd.com/doc/4935486/Ccna-3-Discovery-4-0-module-1-100