(DESGN) Designing for Cisco Internetwork Solutions

Size: px
Start display at page:

Download "(DESGN) Designing for Cisco Internetwork Solutions"

Transcription

1 (DESGN) Designing for Cisco Internetwork Solutions Version 15.0

2 Important Note, Please Read Carefully Study Tips This product will provide you questions and answers along with detailed explanations carefully compiled and written by our experts. Try to understand the concepts behind the questions instead of cramming the questions. Go through the entire document at least twice so that you make sure that you are not missing anything. Further Material For this test TestKing also provides: * Online Testing. Practice the questions in an exam environment. Try a demo: Latest Version We are constantly reviewing our products. New material is added and old material is revised. Free updates are available for 90 days after the purchase. You should check your member zone at TestKing an update 3-4 days before the scheduled exam date. Here is the procedure to get the latest version: 1. Go to 2. Click on Member zone/log in 3. The latest versions of all purchased products are downloadable from here. Just click the links. For most updates, it is enough just to print the new questions at the end of the new version, not the whole document. Feedback Feedback on specific questions should be send to feedback@testking.com. You should state: Exam number and version, question number, and login ID. Our experts will answer your mail promptly. Copyright Each pdf file contains a unique serial number associated with your particular name and contact information for security purposes. So if we find out that a particular pdf file is being distributed by you, TestKing reserves the right to take legal action against you according to the International Copyright Laws

3 Note: Section A contains 163 questions. Section B contains 241 questions. The total number of questions is 404. Each section starts with QUESTION NO :1. There are no missing questions. Section A QUESTION NO: 1 The advantages of using static routes are: (Choose all that apply) A. Efficient use of router resources. B. Increased security due to known routes. C. A single path into and out of a network. D. Route calculations made by network administrators. Answer: A, B A: Administrator manually programmed the route and update this entry whenever a network topology changed. It will not consume router s CPU and use fixed memory. B: Static route is Private and by default it is not conveyed to other routers as part of an update process. Reference: CCDA Study guide by Damon Merchant.Syngress Press Incorrect Answers C: It is not an advantage D: No Route calculations performed for static route.when configuring the static routes one can specify either the next hop address that the packet will take or the packet to route out an interface. Both methods work properly. QUESTION NO: 2 Before any changes are made to a customer network the current network must be documented. What should be included in this documentation? (Choose all that apply) A. Addressing schemes B. Concerns about the network C. Protocol analysis - 3 -

4 D. Network topology Answer: A, B, D Documenting the customer s current network is important before any changes are made. Items you should be most attentive to include the following: Network Topology Addressing schemes Concerns about the network Reference: Designing Cisco Networks (Ciscopress) page 55 QUESTION NO: 3 Routing protocols are characterized by which of the following features? (Choose all that apply) A. Operation at only the lowest layer of the OSI model. B. Upper-layer protocols existing in a given protocol suite. C. Operation at the Session layer of the OSI model. D. Responsibility for path determination and traffic switching. Answer: D D: Routing protocols make routers work together. Routers keep track of the networks they are directly connected to, as well as other routers on the networks in order to forward packets to foreign networks. A router maintains this info in its routing table and periodically shares information from that table to other routers on the network. This info is used to determine the best route for an incoming packet to take its destination. Reference: CCDA Study guide by Damon Merchant.Syngress Press Incorrect Answers A: It operates on layer 3 of OSI model B: They operate on Layer 3. It will not use upper layer protocols C: Routing protocols operates network layer instead of session layer QUESTION NO: 4 Which of the following are components included in the Cisco SAFE architecture? (Choose three) - 4 -

5 A. Multicast Router B. Enterprise Edge C. Dynamic VLANs D. Enterprise Campus E. SP Edge Answer: B, D, E SAFE architecture blue print includes security in enterprise networks,mid size,remote accress networks,ipsec,sp edge which includes wireless and IP telephony. Reference: Incorrect Answers A,C: They are not in SAFE architecture QUESTION NO: 5 An SNMP-managed network consists of which principal components? (Choose all that apply) A. Firewalls B. Agents C. Network-management systems D. Managed devices Answer: B, C, D B: Agents are actual software pieces that are run on the managed devices. C: They are core in SNMP.An NMS runs a network management application that is responsible for receiving and presenting all of the information collected from the agents to the network administrator. D: Managed devices are network nodes that run an SNMP software agent and are located on a SNMP managed network.they generate and store management related info and then provide this info to a network management system via SNMP.These nodes can be routers,acess servers,switches etc. Reference: CCDA Study guide by Damon Merchant.Syngress Press Incorrect Answers A: Firewalls are not related to SNMP QUESTION NO: 6 What is the third step in building a prototype network? - 5 -

6 A. Determine how much of the network structure must be built to prove that the design meets the customers goals. B. Gain an understanding of what your competition intends to propose. C. Review extracted new customer requirements. D. Develop a testplan. E. Purchase and configure equipment. F. Practice demonstrations Answer: B One can get info about competition s design from account manager. Else you must make assumptions based on competitors previous network designs, products they supply, and the customer s requirements. Evaluate their design and amend your design to include any good ideas. Reference: CCDA Study guide by Damon Merchant.Syngress Press Incorrect Answers A: This is Second step in building a prototype network. C: This is First step in building a prototype network D: This is Fourth step in building a prototype network E: This is Fifth step in building a prototype network F: This is Sixth step in building a prototype network QUESTION NO: 7 A newly hired sales representative is trying to decide upon a WAN solution that will allow her to communicate with the corporate office located over 500 miles from her home. She most be able to access the company web server and send with attachments throughout her entire 8-hour workday. Which of the following would be the most cost effective for her to use? A. ISDN B. Satellite C. Leased Line D. DSL E. ATM Answer: D With DSL he will able to access web server and server. This is fixed cost, and always on. Reference: Incorrect Answers A: ISDN is costly solution. He may not able to send large attachments. B: Very costly solution. Link May fail some time - 6 -

7 C: Leased line will be short data transfer QUESTION NO: 8 A multi-layer LAN switches data outside of the source network based on information stored in which location? A. RIP tables B. OSPF tables C. Bridging tables D. Route processors Answer: D Using route processors switch the packets faster than fast switching, because it has an enhanced caching algorithm and switching cache. Reference: Incorrect Answers A: It is used in Router B: It is used in Router C: It is used in Bridge QUESTION NO: 9 A small state college is planning to improve the security of their campus network, in particular the dorm network. Which information provided by the college is most relevant to the new design? A. User policy B. Number of users C. Applications permitted D. Speed of the network Answer: A Policy is main concern. Which users can access which servers and applications. Security is main critical area Reference: Incorrect Answers B: Number of users matters in case of performance issue. It is not primary issue. C: One can add or delete applications. It will not play major role D: Speed effects if number of users and applications. It is not main info - 7 -

8 QUESTION NO: 10 Which two Cisco router services perform network traffic analysis to assist in documenting a customer s existing network? (Choose two) A. NetFlow B. CDP C. MRTG D. NetMon E. SNMP MIB compiler Answer: A, B A. NetFlow services consist of high-performance IP switching features that capture a rich set of traffic statistics exported from routers and switches while they perform their switching functions B:CDP is a media- and protocol-independent protocol that runs on all Cisco-manufactured equipment including routers, bridges, access and communication servers, and switches. Using CDP, you can view information about all the Cisco devices directly attached to the switch. In addition, CDP detects native VLAN and port duplex mismatches. Network management applications can retrieve the device type and SNMP-agent address of neighboring Cisco devices using CDP. This allows applications to send SNMP queries to neighboring devices. CDP allows network management applications to discover Cisco devices that are neighbors of already known devices, in particular, neighbors running lower-layer, transparent protocols. Incorrect Answers C: Multi Router Traffic Grapher is used to monitor the level of activity on network links.mrtg generates reports in HTML pages that contain Portable Network Graphic (PNG) images that portray a visual look at the traffic on a link. D,E : These are not related to network traffic analysis. QUESTION NO: 11 Which statement about developing a network design implementation plan is true? A. The implementation of a design must be overseen by the designer to ensure success. B. Implementation steps described in detail can be performed by a less-experienced engineer. C. Fallback steps can be reduced if a detailed pilot completes successfully. D. Many implementation steps can be performed simultaneously. Answer: B - 8 -

9 If you specify the related to functionality, scalability, adaptability, Manageability & costeffectiveness clearly and elaborately, implementation can be done be less experience engineer Incorrect Answers A: Success is measured by customer. The customer measures success from a business standpoint C: This will not play any role in network design implementation. D: The steps should be carried in an order. QUESTION NO: 12 You need to show proof of concept for a proposed new campus network that utilizes Layer 3 switching. The production network is business critical and no network disruptions are tolerated. Which approach should be used for this test? A. Pilot network B. Prototype network C. Live network D. Verification design Answer: B IN this method build smaller representation of network design. In Prototyping situation be sure to build those segments of the network that had worst MTBF record to test how your design improves it. Test most critical portions of the network. Reference: CCDA Study guide by Damon Merchant.Syngress Press Incorrect Answers A: If network is small build pilot network. It will be less expensive than pilot C: Live network should not demonstrate any new design. This may disturb existing behaviour D: Verification design to be performed on Lab network. QUESTION NO: 13 You are helping a customer design some enhancements to her network for scalability and availability. You discover that all routers on her network are Cisco but many of her switches come from different vendors and are owned by the departments where they are located. She has an outsourcing agreement for the maintenance of the network equipment. This outsourced service vendor has implemented CiscoWorks with SAA to manage the network. What are three Service Level Management challenges that you would need to address in your design proposal? (Choose three) - 9 -

10 A. Your customer does not own the switches on the network. B. The switches and routers come from different vendors. C. She cannot utilize NetFlow on the network. D. She has no way to monitor SLA conformance. E. She does not manage the network with her own staff. Answer: A, B, E A: Customer does not own switches, because they are not Cisco Switches. B: CiscoWorks with Cisco devices. But Switches came from Different vendor. E: Because Switches are different vendor, she can not manage with her staff Incorrect Answers C: Netflow can not be used, because all the equipment is not from cisco QUESTION NO: 14 Which solution can be deployed at the receiving end of a converged network to help smooth voice traffic that has been affected by variable delay? A. Dejitter buffers B. Higher compression C. Reduces compression D. Link fragmentation and interleaving Answer: A Explaination: Digital voice circuits use dejitter buffers to change this random variable delay to a more tolerable fixed delay. Source: CCDA Exam Certification Guide Second Edition, Page 140 QUESTION NO: 15 What is a function of a firewall? A. Maintains separate routing information for each protocol supported on a router. B. Provides a security buffer between connected public networks and a private network. C. Provides user authentication between connected public networks and a private network. D. Reduces routing loops by preventing the flow of routing information to the source where that information was learned. Answer: B

11 Firewall Protect network from outside world. It is hardware/software or combination of both,used to block or permit network traffic, Reference: Incorrect Answers A: This is not function of firewall C: Firewalls are used to filter packets D: Firewalls not bother about routing loops QUESTION NO: 16 Which three routing protocols have high speed convergence? (Choose three) A. RIPv2 B. IS-IS C. EIGRP D. BGP E. OSPF F. IGRP Answer: B, C, E IS-IS and OSPF are link state protocols. It converges quickly because updates are sent not periodically, but only when changes occur. The routing changes are flooded, and computing is accomplished in parallel. EIGRP is Hybrid protocol. It uses DUAL algorithm to achieve rapid convergence across a network Reference: Incorrect Answers A: RIP V2 sends updates periodically. It converges slowly. F : IGRP also sends updates periodically. It converges slowly QUESTION NO: 17 When designing IPv6 into an existing IPv4 network, which two strategies allow the two address schemes to coexist to facilitate a migration? (Choose two) A. Translate one protocol into the other. B. Encapsulate IPv6 packets into IPv4 packets. C. Bridge between the IPv6 IPv4 networks. D. Enable anycast capability in the routing protocol. Answer: A, B A: Translate One Protocol to another. It will give transparent to the existing user

12 B: The new network IPv6 packets to be encapsulated to IPv4 network to connect to existing IPv4 users. Incorrect Answers C: Bridge will not solve the problem D: This will not provide any advantage for using IPv4 and IPv6 network QUESTION NO: 18 Which two characteristics are affected by choice of codec when designing networks to carry IP telephony? (Choose two) A. Voice quality B. Silence packet handling C. Voice packet header size D. Bandwidth required for voice calls Answer: A, D Voice quality and Bandwidth are main features of Voice networks Incorrect Answers B: This is not main characteristic of codec C: This will not play any role for deciding codec QUESTION NO: 19 Encryption addresses which network security concern? A. Data integrity B. User authentication C. Data authentication D. Data confidentiality Answer: D To safeguard sensitive corporate data Encryption is used. Data confidentiality is main concern. Incorrect Answers A,B,C: These will not play any critical role in network security while performing Encryption

13 QUESTION NO: 20 When designing a network that will incorporate fault management, you must incorporate components that will achieve which three goals? (Choose three) A. Incorporate intrusion detection B. Detect network error conditions C. Log network events D. Notify network administrators E. Discover network topology Answer: B, C, D When network grows beyond few nodes, fault management is used to isolate areas where the trouble lies and generally sounds an audible alarm to alert administrator to the existence of the fault. Log all network events before and after the fault.in WAN circuit fault it may alert both client-side and carrier side personal of the fault. Incorrect Answers A: This is mainly for security management E: It is for Accounting Management QUESTION NO: 21 Which two inputs are required to determine the number of circuits needed from a PBX to a converged network when planning trunk capacity? (Choose two) A. Number of sites B. Busy hour traffic C. Average call duration D. Number of users per site E. Blocking probability (GoS) Answer: B, E B: Measure network traffic load during the busiest hour because this period represents the maximum traffic load that your network must support. The result gives you a traffic load measurement commonly referred to as the Busy Hour Traffic (BHT). E: Grade of Service (GoS) is defined as the probability that calls will be blocked while attempting to seize circuits. It is written as P.xx blocking factor or blockage, where xx is the percentage of calls that are blocked for a traffic system. Incorrect Answers A: Number of sites will give an idea for sizing the PBX C: Most traffic models does not consider call duration. Call holding times are assumed to be exponential. D: This will not play major role

14 QUESTION NO: 22 An Executive Summary contains all except which items? A. Benefits of the solution. B. Strategic recommendations. C. Purpose of the project D. Implementation considerations. E. Cost of the project. Answer: E Cost of the Project is not presented in Executive summary. It will discuss in Business requirements Incorrect Answers A,B,C,D: All are included in Executive Summary. QUESTION NO: 23 According to the Cisco SAFE Architecture, the Enterprise Campus consists of which modules? (Choose three) A. Server B. WAN C. Corporate Internet D. Building Distribution E. Core Answer: A, D, E Server is Required Enterprise networks. Distribution layer is required for Policies; Core is mainly connect to Service Providers. Incorrect Answers B,C: WAN & Corporate Internet are not in SAFE Architecture QUESTION NO: 24 TestKing is expanding into a multinational organization and has hired a network consultant to assist them with planning a new network design. At a monthly presentation

15 the consultant is going to recommend that the company use a routing protocol that will support a network design that cannot be structured into a hierarchy. Which routing protocol should he recommend? A. OSPF B. EIGRP C. IS-IS D. GR E. BGP Answer: B Incorrect Answers Not E: BGP could be hierarchical and BGP wouldn't be used in this network design since it is an exterior gateway protocol. QUESTION NO: 25 While designing a network for a new client, the IS Manager informs you that the company is considering a hub and spoke topology with links that will be low bandwidth and rarely changing routes. Which of the following would you recommend? A. Static Routing B. Dynamic Routing C. IGRP D. RIP-2 E. AARP Answer: A Administrator manually programmed the route and update this entry whenever a network topology changed. It will not consume router s CPU and use fixed memory. Static route is Private and by default it is not conveyed to other routers as part of an update process. Incorrect Answers B: Dynamic routing uses more CPU resources. Not required for low bandwidth routes C,D: Both are dynamic routing protocols. Consume more router resources. E: AARP is Apple Talk Address Resolution Protocol. This will not play any role in determining routes. QUESTION NO: 26 What is the third step in building a pilot network? A. Investigate the competition

16 B. Test the design. C. Practice the demonstration. D. Schedule and present the demonstration. E. Script a demonstration of the test results. Answer: E Write a script of the tests and demonstrations that you will carry out. It indicates the design meets customer requirements, Display the strengths of CISCO equipment you are using, and show the superiority of design over those of your competitors. Reference: Incorrect Answers A: This is Second step B: This is First step C: This is Fourth step D: This is Fifth step QUESTION NO: 27 To ensure that productivity remains high and the quantity of user complaints is low, network response time should be a maximum of? A. 150 milliseconds B. 50 milliseconds C. 25 milliseconds D. 100 milliseconds Answer: D 100 milliseconds response time provides better productivity and minimizes user complaints Incorrect Answers A: It is too long. In this time complaints may rise B,C: They are very small. In this time we can get better productivity. QUESTION NO: 28 TestKing is an auto parts distribution company. They have a single location with headquarters in one office building and three warehouses. Their customer base consists of 400 independent auto parts retailers, which connect through direct links to their network to access an ordering system. The servers and access routers connecting to the retail outlets are on a separate Ethernet VLAN in the headquarters campus. The retail outlets are complaining about poor response time when they connect to the ordering system

17 TestKing wants you to help them plan some improvements to their network to increase the performance of their customers connections to the ordering system. What are two additional details about TestKing s existing network needed for this analysis? (Choose two) A. Router ACLs providing security to the servers. B. Bandwidth of their connection to the Internet. C. Type of the connections to the retail outlets. D. Utilization on the servers VLAN. E. Number of users on the headquarters LAN. Answer: C, D Type of connection ( Leased line, ISDN,Frame Relay ) determine response time. Monitor the Server s speed. Install more processing servers reduce response time Incorrect Answers A: ACL s provide filtering some Packets. it will not provide any role in response time B: Bandwidth determine type of link. E: Number of users may not play critical role QUESTION NO: 29 AAA Video operates a chain of 50 video rental stores located in the Northwestern United States. They currently have a Point-of-Sale (POS) system in which each store posts its daily sales data and inventory changes to a central database through dial-up communication. There is no interaction between the stores and the central system during business hours. The central site runs on an Ethernet LAN. The only always-on WAN link is an Internet connection using wireless broadband to a local ISP. AAA wants to enhance their service offering by creating a new E-Commerce web site where customers can browse and search a catalog of video titles and select the ones they want for rental. The system will instantly communicate the order to the nearest store where employees pull the order and hold it until the customer picks it up. The service must operate on a 24x7 basis. AAA sees this new business strategy as a means to increase revenue and expand the business nationally. They see an opportunity to expand the web site in the future to video, DVD and music sales on a worldwide level. The company wants all stored to be connected to the central site through WAN links. The company is upgrading the central inventory database so that sales and rentals can be posted immediately in real-time. An Internet-based and instant-messaging system will be set up for all headquarters employees and store managers to use. AAA believes that networking the stores will improve order fulfilment processes which will improve customer satisfaction and thus, boost revenue. It will also help communication with store employees. AAA wants to upgrade the local LAN to a Gigabit and Fast Ethernet system to facilitate the demands of the new and upgraded systems. They have budgeted $500,000 for the networking equipment and another $10,000/month for the WAN charges including a faster Internet connection. They believe that 256Kbps speeds will be adequate to the stores. Since they have no staff capable of managing the new network, they will hire two

18 engineers that already have the training and experience. The project must be complete in 6 months when the new inventory system goes online. The IT manager has concerns about the security of the servers and workstations on the network when all stores become connected. He doesn t want any Internet access to or from the stores. He is depending on you to recommend an effective yet affordable solution that will protect his system from intruders. What are three technical goals of AAA Video with regard to this network design project? (Choose three) A. Sell merchandise through the E-Commerce site. B. Real-time posting of sales. C. Network security measures. D. Hire two new network engineers. E. Upgrade to a high-performance LAN. F. Enhance service offerings. Answer: B, C, E Technical goals are better network throughput, efficient routing updates and redundancy. Real time posting of sales provide instant observation of the status. Security provides protect system from intruders. High performance LAN provides better response time Incorrect Answers A,D,E: These are business goals. QUESTION NO: 30 Each set of an implementation plan should consist of which three items of information? (Choose three) A. A description of the step s objective. B. A detailed implementation guidelines. C. A reference to a section in the design document. D. Summary of requirements to be fulfilled by the step. E. Listing of applicable device configurations. Answer: A, B, C Objective of the network to be clearly defined. Define step by step guide lines of design goals and reference section in design document is required. Incorrect Answers D,E : Summary and Listing of applicable devices are not main items QUESTION NO:

19 You have designed and implemented a SAFE network, but users still complain of isolated DoS attacks directed at specific hosts in the e-commerce module. The operating systems on these servers have been patches and all unneeded services have been turned off, but the problem persists. What more can you do to reduce the effect of these attacks? A. Block all TCP traffic to these servers at the Internet firewall. B. Limit connection rate to these servers at the Internet firewall. C. Block all UDP traffic to these servers at the Internet firewall. D. Load-balance between multiple servers running the same applications. Answer: B Prioritize the user connection to servers and limit the connection rate. Incorrect Answers A,C: one can not block TCP and UDP traffic. D: Load Balancing will not solve the problem in greater extent. QUESTION NO: 32 You are designing an IP addressing system for a large home which has IP enabled endsystems (appliance, light switches, security systems, heating/coding systems and video cameras). This network is connected to the Internet 24 hours a day via an ADSL connection and uses Network Address Translation (NAT). The end-systems on this network are remotely accessed by the home owner to monitor the activities in her home. What IP addressing system would be most suitable for these end-systems? A. Public IPv4 addresses B. Private IPv4 addresses C. A combination of Private and Public IPv4 addresses D. Micro-IP addresses E. IPv6 addresses Answer: B Dynamic NAT using a pool of IP addresses or Port address Translation using a Single IP address. This will not consume Public address space. Incorrect Answers A,C,D,E: These are public addresses. They are most expensive. Not suitable QUESTION NO:

20 Why would you recommend classless routing protocols for a network? A. Minimize convergence time. B. Increase security and availability. C. Suit the flat structure of the network. D. Accommodate mixed vendor environment. E. Support variable length subnet masking. Answer: E Classless routing protocols carry Variable subnet masking details in Routing updates. This is Main Advantage compared to classfull routing protocols like RIP & IGRP Incorrect Answers A: It is Second advantage in classless routing protocol B,C,D: Not specific advatages QUESTION NO: 34 Virtual Private Networking (VPN) functionality can be provided at Layer 2 by which two mechanisms? (Choose two) A. Leased Line B. IPSec C. Sonet/SDH D. Tunnelling/GRE E. Frame Relay F. ATM Answer: E, F Frame Relay and ATM operates on Layer 2. Using these two mechanisms one can connect to Internet. Then using VPN remote user can access corporate network using internet Incorrect Answers A,B,C,D: They are not working in Layer 2 QUESTION NO: 35 A very large organization has received its IPv6 address range from their Internet Service Provider and intend to use only IPv6 addresses internally. They will access the Internet through port address translation (PAT). What is a requirement for their Domain Name Servers, DNS?

21 A. They no longer need DNS servers. B. Their DNS servers need to support both IPv4 and IPv6 addresses. C. Their DNS servers need to support only IPv6 addresses. D. Their DNS servers need to support only IPv4 addresses. E. They need additional DNS servers in their network just for IPv6 addresses. F. There are no changed required to their DNS servers. Answer: B Both are required for support downward compatibility. Incorrect Answers A: DNS servers are required for Name resolution C: IPv4 is problem in this case D: IPv6 is problem in this case E: This will add extra cost to the service Provider F. Changes are required in software to support IPv6. QUESTION NO: 36 You ve designed a converged network to carry voice calls on-net as close as possible to the destination to avoid long distance charges. Which two are reasons that a VoIP call could go off-net earlier than designed? (Choose two) A. Remote voice gateway sending busy-back signal. B. Destination routing not configured on local and remote gateways. C. Call manager server is too busy to process the call. D. The telephone user dials an access code. Answer: A, D QUESTION NO: 37 Which three describe the primary functions of the Access Layer of the campus network design hierarchy? (Choose three) A. Provides end-user connectivity. B. Provides route summarization. C. Provides remote office connectivity. D. Provides policy-based routing. E. Connects shared LAN devices. Answer: A, C, E Access Layer

22 The access layer provides user access to local segments on the network. The access layer is characterized by switched and shared bandwidth LANs in a campus environment. Microsegmentation, using LAN switches, provides high bandwidth to workgroups by dividing collision domains on Ethernet segments and reducing the number of stations capturing the token on Token Rings LANS. For small office/home office environments, the access layer provides access for remote sites into the corporate networks using WAN technologies such as ISDN, Frame Relay, and leased lines. Features such as dial-on-demand and static routing can be implemented to control costs. Reference: Designing Cisco Networks (Ciscopress) page 93 QUESTION NO: 38 Which Cisco IOS feature allows the translation of private addresses into registered IP addresses? A. Cisco Address Translation B. Network Address Translation C. Local Address Registration D. Global Address Registration Answer: B Network Address Translation (NAT) is a feature in the Cisco IOS software that enables you to translate private addresses into registered IP addresses only when needed, thereby reducing the need for registered IP addresses. Reference: Designing Cisco Networks (Ciscopress) page 166 QUESTION NO: 39 Which items are important when documenting the business requirements of a company? (Choose two) A. Fixture company growth B. IP address assignments C. Current network topology D. Router software upgrades E. Customer support improvements F. Fixture software applications Answer: A, E Determining Company Business Goals Determine the company s major business goals for the next year and the next fiver years. This information is important to help you design an internetwork that provides the scalability required. Research your customer s industry and competition with knowledge of your

23 customer s business, you can position Cisco technologies and products to help strengthen the customer s status in the customer own industry. Reference: Designing Cisco Networks (Ciscopress) page 46 QUESTION NO: 40 Network Performance is defined by which of the following items? (Choose all that apply) A. Capacity B. Response time C. Packet size D. Utilization E. Efficiency Answer: A, B, D Performance is a general term that includes responsiveness, throughput and resource utilization. QUESTION NO: 41 WAN technologies operate at which three layers of the Open Systems Interconnect (OSI) model? (Choose three) A. Presentation B. Data Link C. Transport D. Physical E. Session F. Network Answer: B, D, F Wan Technologies operate from the Physical layer where it take the bits and turns it into packets, up to the network layer for routing purposes. Data link layer is responsible for switching packets. QUESTION NO: 42 What is the first task that a network designer should perform when documenting the customer requirements and existing environment of a network design project? A. Assess the scope of the design project. B. Identify applications, both planned and installed. C. Identify the customer s business constraints

24 D. Assess the customer s business goals. Answer: C From exam note the step 1 of determining the customer network requirement should be to identify the customer business constraint. Determining the customers' business goal is not on one of the requirement. QUESTION NO: 43 The state hospital has six clinics spread through the state connected to the main hospital facility through dedicated links. Doctors practicing in the state have online access to patient diagnostics, scheduling and billing data in various hospital databases. The hospital has signed new agreements with three insurance providers and they are planning to open a new clinic on the opposite side of the state. The new clinic will have a trauma center which will require constant communication with the local emergency dispatch center. What additional information should you obtain about applications in use on the network? A. The authentication used by the application. B. The routing protocols supported by the application. C. The application data-link layer overhead. D. The applications level of criticality. Answer: D Reference: Designing Cisco Networks (Ciscopress) page QUESTION NO: 44 Which step should you consider when an inexperienced network engineer is implementing the design? A. Make the design implementation description as detailed as possible. B. Have the designer carry out the complex implementation steps. C. Prevent detailed steps that require the involvement of other staff members. D. Create less detailed implementation steps that exclude the direct involvement of the designer. Answer: A Steps for Determining a Customer s network Requirements Determining a customer s requirements for a new network design I s one of the most important tasks in internetwork design. This section provides a step-by-step approach to determining these requirements. This approach will ensure the network design specifically

25 meets the needs of the customer. You might want to take a copy of this outline with you to the customer s site and use it as a checklist when requesting information. Step1. Identify business constraints Step2. Identify security requirements Step3. Identify manageability requirements Step4. Determine application requirements Step5. Characterize new network traffic Step6. Identify performance requirements Step7. Create a customer needs specification document Reference: Designing Cisco Networks (Ciscopress) page 69 QUESTION NO: 45 Which three modules comprise the Enterprise Composite Network Model? (Choose three) A. Enterprise Campus B. Enterprise Edge C. Enterprise Server Edge D. Enterprise Core Backbone E. Service Provider Edge Answer: A, B, E The second layer of modularity, which is illustrated in Figure 2, represents a view of the modules within each functional area. These modules perform specific roles in the network and have specific security requirements, but their sizes are not meant to reflect their scale in a real network. For example, the building module, which represents the end-user devices, may include 80 percent of the network devices. The security design of each module is described separately, but is validated as part of the complete enterprise design. Reference: SAFE: A Security Blueprint for Enterprise Networks QUESTION NO:

26 A medium sized accounting firm has four offices around the country: head office in Phoenix, and branches in Boston, Chicago and Los Angeles. They want connectivity between their branches with full redundancy and high availability. What topology would you recommend for this firm? A. Point to point B. Partial mesh C. Star hub and spoke D. Full mesh Answer: D Full redundancy requirement indicates a Full mesh topology. QUESTION NO: 47 In which network is the IP address a valid node address that can be used on a workstation or other network device? A /23 B /24 C /24 D /25 Answer: A QUESTION NO: 48 You are in the process of designing some changes to a customers network. The design calls for replacing hubs in several wiring closets with switches. You are planning for 30% more ports than exist now on the hubs. The customer wants Fast Ethernet speeds to the workstations. Each closet will be separated into a different IP subnet. All of the users that will connect to these switches use standard file and print applications plus Internet browsing. When designing the access layer of the network, which three questions should be asked to gain necessary additional information regarding the access layer? (Choose three) A. How will VLANs be deployed? B. What uplink cabling exists? C. What level of redundancy is needed? D. Will QoS be needed? E. Will Gigabit uplinks be used? Answer: B, C, E Access layer

27 The access layer provides user access to local segments on the network. The access layer is characterized by switched and shared bandwidth LANs in a campus environment. Microsegmentation, using LAN switches, provides high bandwidth to workgroups by dividing collision domains on Ethernet segments and reducing the number of stations capturing the token on Token Ring LANs. Reference: Designing Cisco Networks (Ciscopress) page 93 QUESTION NO: 49 SNMPv3 added which enhancement to the protocol that did not exist in version 1 or 2? A. Http transport B. Vendor-specific MIBs C. Increased performance D. Secure transmission Answer: D Simple Network Management Protocol Version 3 (SNMPv3) is an interoperable standardsbased protocol for network management. SNMPv3 provides secure access to devices by a combination of authenticating and encrypting packets over the network. The security features provided in SNMPv3 are: Message integrity---ensuring that a packet has not been tampered with in-transit. Authentication---Determining the message is from a valid source. Encryption---Scrambling the contents of a packet prevent it from being seen by an unauthorized source. Reference: fa.html QUESTION NO: 50 Identify the fields that are associated with an IPv6 packet? (Choose four) A. Header Length B. Payload Length C. Header Checksum D. Traffic Class E. Source Address F. Version

28 Answer: B, D, E, F Reference: Implementing IPv6 for Cisco IOS Software PDF page 29 QUESTION NO: 51 Steps for designing Network layer addressing and naming include all but the following: A. Proposing a method for mapping geographical locations to router clusters. B. Developing a plan for configuring user station addresses. C. Designing a hierarchy for addressing. D. Designing route summarization. E. Designing a scheme for naming servers, routers, and user stations. Answer: A Steps for Designing Network Layer Addressing Step1: Design a Hierarchy for addressing Setp2: Design route summarization

29 Step3: Design a plan for distributing administrative authority for addressing and naming at the lower levels of the hierarchy Step4: Design a method for mapping Geographic Locations to network numbers Step5: Develop a Plan for Identifying Special Stations such as Routers and Servers with Specific Node IDs Reference: Designing Cisco Networks (Ciscopress) page QUESTION NO: 52 The routers on a network are being documented for a technical report. Choose the items that should be included in his report. (Choose three) A. Interface error statistics B. Router software revision C. Router power requirements D. Interface loads E. Interface configurations Answer: A, B, E Reference: Designing Cisco Networks (Ciscopress) page QUESTION NO: 53 Cisco Systems uses a three-layer hierarchical model to describe network design topologies. Which three layers are included in this model? (Choose three) A. Designated B. Distribution C. Core D. Access Answer: B, C, D Hierarchical Network Design The core layer provides optimal transport between sites. The distribution layer provides policy-based connectivity. The access layer provides workgroup/user access to the network. Reference: Designing Cisco Networks (Ciscopress) page

30 QUESTION NO: 54 Exhibit: The exhibit shows a customers network as diagramed by the network manager. Based on the information in the diagram, which two Layer 2 or Layer 3 protocols must be supported in the new network design? (Choose two) A. Appletalk B. SNA C. Token Ring D. IPX E. NFS Answer: B, C IBM networking today consists of essentially two separate architectures that branch from a common origin. Before contemporary networks existed, IBM s system network Architecture (SNA) ruled the networking landscape, so it is often referred to as traditional or legacy SNA. Page 130 of the DCN book list the Token Ring Design Rules Reference: Designing Cisco Networks (Ciscopress) page QUESTION NO: 55 A prototype network is used to test a proposed network redesign solution. Although the test seemed to be successful, network performance is unacceptable when implemented in the live network. What was wrong with the prototype network test? A. The prototype should have been built on the live network. B. The prototype failed to test for the proper characteristics. C. The prototype network didn t match the live network exactly. D. Different configuration parameters existed in the prototype network

31 Answer: B Network Health Checklist Use the following checklist when checking a prototype or pilot for proper network functionality and scalability. This checklist provides guidelines, not rules. As mention in chapter 3, Characterizing the Existing Network, the correct answer to questions regarding thresholds for network health is usually, it depends. Thresholds depend on topologies, router configurations, network applications, user requirements, how measurement tools calculate thresholds, and many other factors. Reference: Designing Cisco Networks (Ciscopress) page 278 QUESTION NO: 56 Which three terms describe the primary functions of the distribution layer of the campus network design hierarchy? (Choose three) A. End-user connectivity. B. Connects access devices to the core backbone. C. Provides WAN connections. D. Enforces security policies. E. Provides QoS services. F. High speed transport Answer: B, D, E Distribution Layer The distribution layer of the network is the demarcation point between the access and core layers of the network. The distribution layer can have many roles, including implementing the following functions: Policy Security Address or area aggregation or summarization Departmental or workgroup access Broadcast/multicast domain definition Routing between VLANs Media translations Redistribution between routing domains Demarcation between static and dynamic routing protocols Several Cisco IOS software features can be used to implement policy at the distribution layer, including the following. Filtering by source or destination address Filtering on input or output ports Hiding internal network numbers by route filtering Static routing Quality of service mechanisms

32 Reference: Designing Cisco Networks (Ciscopress) page 92 QUESTION NO: 57 Which two methods provide data integrity? (Choose two) A. Token cards B. Digital signatures C. Two-factor authentication D. Secure fingerprints Answer: B, D Data integrity (verify that data has not been altered). Reference: Designing Cisco Networks (Ciscopress) page QUESTION NO: 58 Exhibit: The diagram shows a standard, Layer 2 campus network design. Which numbered box represents the Core Layer? A. #1 B. #2 C. #3-32 -

33 D. #4 E. #5 Answer: D The core should be where the servers are located. Reference: Designing Cisco Networks (Ciscopress) page 91 QUESTION NO: 59 Exhibit: A timber wholesaler in China has four servers accessible via the Internet and approximately 100 users. They primarily deal with 20 customers located in eight different countries. They want to improve availability of their servers to their customers (see diagram). Which three components would you duplicate to achieve this? (Choose three) A. Layer 3 switch B. Layer 2 switch C. User connections D. ATM connection E. Customers connection to the network Answer: A, B, D You would duplicate the layer 2, layer 3 and ATM connection to speed the access and redundancy of the network

34 QUESTION NO: 60 While examining the existing system of a new customer, you discover that their network management facilities provide a means to detect and correct network device failures, monitor device and bandwidth utilization, and they use SSH to manage devices. Which two functional areas of network management has this customer failed to fulfil? (Choose two) A. Fault management B. Configuration management C. Accounting management D. Performance management E. Security management Answer: C, E C: Accounting management, such as usage tracking is not being used E: Security management, such as filtering or physical security is not being used Note: Secure Shell provides an encrypted configuration management session, not security management. Incorrect Answers: A: A means to detect and correct network device failures is being used B: SSH is being used to manage devices. D: A means to monitor devices and bandwidth utilization is being used. QUESTION NO: 61 Network security design involved these steps: (Choose all that apply) A. Analysis of security risks. B. Training of users, managers, and technical staff. C. Identification of network assets. D. Identification of routing protocol metrics. E. Analysis of security requirements and tradeoffs. Answer: A, B, E Identify security requirements of the new network, do the following: Appraise security risks and determine how much security will be needed and of what type. Determine requirements for outsiders to access data Determine the authorization and authentication requirements for corporate branch offices, mobile users, and telecommuters. Identify any requirements for authenticating routes received from access routers or other routers

35 Identify any requirements for host security, such as physical security of hosts, user accounts, dated software, access rights on data, and so on. Reference: Designing Cisco Networks (Ciscopress) page 70 QUESTION NO: 62 What protocol is responsible for resolving an IP address to a MAC address? A. ARP B. TCP/IP C. IGRP D. IPX E. DDP Answer: A Address Resolution Protocol (ARP) Allows a host to dynamically discover the MAC-layer address corresponding to a particular IP network layer address. In order for two machines on a given network to communicate, they must know the other machine s physical addresses. Reference: Designing Cisco Networks (Ciscopress) page 16 QUESTION NO: 63 When choosing a route, which metric can be used by the IGRP protocol? (Choose all that apply) A. Bandwidth B. Hops C. Reliability D. Fault Tolerance E. Link Cost Answer: A, C IGRP is a distance vector interior gateway protocol and uses combination of metrics; internetwork delay, bandwidth, reliability, and load are all factored into the routing decision. Reference: Designing Cisco Networks (Ciscopress) page 189 QUESTION NO: 64 The Smith and Jones Company (S&J) is a law firm in New York City. They recently signed a merger agreement with another firm on the other side of the city. The

36 employees of the other firm will be moving into S&J s building. They will occupy two floors in the building. They will bring with them , file servers and an advanced web-based legal database system primarily accessed at the office. The partners of S&J would like to upgrade their network before the new employees move into the building. The current network installed at S&J has become very slow. The employees say that they can access the company website quicker from their homes over the Internet than on their local office network. They want you to make their LAN as fast as their WAN. You must also design enough capacity to accommodate the new firm whose users are more technically advanced. S&J would like to adopt VoIP throughout the combined company. Lastly, S&J wants to make sure that network security measures are in place for the new firm s web site and e- mail servers. They have been very frustrated by Internet-based viruses. They want to make sure that no hackers can access their servers from the Internet. Which three data-link layer features will need to be a part of the scope of this design project? (Choose three) A. VLANs B. 10/100 auto sensing C. Redundant WAN links D. Intrusion detection E. Gigabit Ethernet Answer: A, B, E The Data link layer works with switches, which uses auto sensing and can provide Gigabit Ethernets as well as VLANs. QUESTION NO: 65 The successful implementation of which two testing techniques can be used for proof of concept of a network design? (Choose two) A. Pilot network B. Simulation lab C. Prototype network D. Verification network E. Modular network Answer: A, C A prototype of a network is an implementation of a portion of the network to prove that the design meets the requirements. A pilot is simply a scaled-down prototype used to demonstrate basic functionality. Reference: Designing Cisco Networks (Ciscopress) page

37 QUESTION NO: 66 What is the shortest notation of IPv6 address 2080:0000:0000:0000:0008:0000:0000:200C? A. 2080::8::200C B. 2080::0:8:0:0:200C C. 2080:0000:0000:0000:0008:0000:0000:200C D. 2080::8:0:0:200C E. 2080:0:0:0:8::200C F. 2080:0:0:0:8:0:0:200C Answer: D IPv6 addresses are represented as a series of 16-bit hexadecimal fields separated by colons (:) in the format: x:x:x:x:x:x:x:x. Following are two examples of IPv6 addresses: FEDC:BA98:7654:3210:FEDC:BA98:7654: :0:0:0:8:800:200C:417A It is common for IPv6 addresses to contain successive hexadecimal fields of zeros. To make IPv6 addresses less cumbersome, two colons (::) may be used to compress successive hexadecimal fields of zeros at the beginning, middle, or end of an IPv6 address (the colons represent successive hexadecimal fields of zeros). Table 2 lists compressed IPv6 address formats. A double colon may be used as part of the ipv6-address argument when consecutive 16-bit values are denoted as zero. You can configure multiple IPv6 addresses per interfaces, but only one link-local address. Note Two colons (::) can be used only once in an IPv6 address to represent the longest successive hexadecimal fields of zeros. The hexadecimal letters in IPv6 addresses are not case-sensitive. Reference: Implementing IPv6 for Cisco IOS Software PDF page QUESTION NO: 67 What does a tie trunk (tie line) interconnect? A. PBX switch with another PBX switch. B. PBX and CO switch (exchange). C. PBX and remote telephone. D. CO switch (exchange) and a remote telephone. E. CO switch (exchange) with another CO switch

38 Answer: A A trunk (tie-line) is a permanent point-to-point communication line between two voice ports. The connection trunk command creates a permanent Voice over IP (VoIP) call between two VoIP gateways. It simulates a trunk connection by creating virtual trunk tie-lines between two telephony endpoints. To the connected systems, it appears as if a T1 trunk was directly connected between them. Reference: a00800afd65.shtml QUESTION NO: 68 Your IP addressing requirements exceed the public class C address range assigned to your company, so you ve implemented private addressing. Which mechanism would allow all your users simultaneous access to the Internet? A. Translate using static NAT. B. Translate using dynamic NAT. C. Implement VLANs. D. Secondary IP network. Answer: B Cisco Support NAT features include the following: Static translation Dynamic source address translation Establishes a dynamic mapping between the inside local and global addresses. This is accomplished by describing the local addresses to be translated, the pool of addresses from which to allocate global addresses, and associating the two. The router will create translation as needed. Address overloading TCP load distribution Reference: Designing Cisco Networks (Ciscopress) page 167 QUESTION NO: 69 Upon visiting a customer site it is determined that a three-part firewall system should be implemented as a security measure. Which of the following components would be included? (Choose all that apply) A. A router acting as an inside packet filter. B. An independent WAN. C. An isolation LAN. D. A router acting as an outside packet filter

39 Answer: A, C, D The classic firewall system, called the three-part firewall system, has the following three specialized layers: Isolation LAN Inside packet filter Outside packet filter Reference: Designing Cisco Networks (Ciscopress) page 103 QUESTION NO: 70 *DIAGRAM MISSING* Will be provided in later versions. What topology is represented in Diagram 1? A. High-level topology map of the customers current network. B. High-level topology map of the customers proposed packet flow. C. High-level topology map that meets the customers requirements. D. High-level topology map of the customers proposed intranet security system. Answer: A QUESTION NO: 71 Which three steps are used to characterize an existing network? (Choose three) A. Customer input B. Visual inventory C. Network audit D. Traffic analysis E. Server statistics F. Ping analysis Answer: A, C, D To characterize a customer s network, you will need to: Identify any bottlenecks Determine whether the anticipated growth will cause problems Recognize legacy systems that must be incorporated into the new design Recognize business constraints and inputs to the design; business constraints are business-related issues that may place a limitation on your network design

40 Reference: Designing Cisco Networks (Ciscopress) page 45 QUESTION NO: 72 What information will you need to include in your implementation to allow the engineer to gather further details? A. Corporate policies regarding protocols, standards, vendors, and applications. B. Reference to design documents. C. Availability of trained personnel within the organization. D. Budgetary resource limitations. Answer: B In Step3 of characterizing a Customer s Current Network, you need a network topology. Reference: Designing Cisco Networks (Ciscopress) page 55 QUESTION NO: 73 Which three terms describe the primary functions of the core layer of the campus network design hierarchy? (Choose three) A. High-speed transport B. Fault tolerance C. Packet filtering D. Security E. Manageability Answer: A, B, E Core Layer The core layer provides optimal transport between sites. The core layer is the high-speed switching backbone of the network, which is crucial to enable corporate communication. The core layer should have the following characteristics. Offer high reliability Provide redundancy Provide fault tolerance Avoid to changes quickly Offer low latency and good manageability Avoid slow packet manipulation caused by filters or other processes Have a limited and consistent diameter Reference: Designing Cisco Networks (Ciscopress) page

41 QUESTION NO: 74 In a large campus network design, the server farm would normally connect to which layer in the design hierarchy? A. Distribution B. Access C. Core D. Edge E. External Answer: C Reference: SAFE: A Security Blueprint for Enterprise Networks Page 11 QUESTION NO:

42 Under ideal network design conditions, at which layer is most Layer 3 routing features such as summarization and redistribution performed? A. Core B. Distribution C. Access D. External Answer: B Distribution Layer The distribution layer of the network is the demarcation point between the access and core layers of the network. The distribution layer can have many roles, including implementing the following functions: Policy Security Address or area aggregation or summarization Departmental or workgroup access Broadcast/multicast domain definition Routing between VLANs Media translations Redistribution between routing domains Demarcation between static and dynamic routing protocols Several Cisco IOS software features can be used to implement policy at the distribution layer, including the following. Filtering by source or destination address Filtering on input or output ports Hiding internal network numbers by route filtering Static routing Quality of service mechanisms Reference: Designing Cisco Networks (Ciscopress) page 92 QUESTION NO: 76 The Mean Time Between Failure (MTBF) is a measurement of: A. Capacity B. Response time C. Utilization D. Efficiency E. Availability Answer: E

43 Step6: Characterize the Existing Network Availability Gather statistics on network downtime and the mean time between failure (MTBF) for the internetwork. Reference: Designing Cisco Networks (Ciscopress) page 57 QUESTION NO: 77 Which of the following statements regarding SNMP commands is false? A. Control of managed devices occurs when the NMS issues the write command. B. An agent reports an event when the managed device issues the trap command. C. Managed devices use the trap command when reporting events to the NMS. D. The NMS requests events from the managed devices when it issues the trap command. Answer: D Trap operations allow Simple Network Management Protocol (SNMP) agents to send asynchronous notifications that an event has occurred. Traps are sent on a best-effort basis and without any method to verify whether they were received. Reference: a aa1.shtml QUESTION NO: 78 Which three are essential elements of a network design document that is ready to be presented to a customer? (Choose three) A. Design specifications B. Organizational chart C. Implementation plan D. Proof of concept E. Data source Answer: A, C, D Content of the Design Documentation Your design should include the following sections, at a minimum, although you may choose to include additional sections: Executive summary Design requirements Design Solution Summary

44 Appendixes The cost of the proposed design may be provided separately Reference: Designing Cisco Networks (Ciscopress) page 258 QUESTION NO: 79 Why are the PCM codecs used in Europe and parts of Asia incompatible with those used in North America and Japan? A. Echo cancellation B. Code companding C. Pulse sampling D. Noise suppression E. Band limiting Answer: B A-law: An ITU-T companding standard used in the conversion between analog and digital signals in PCM systems. The A-law is used primarily in European telephone networks and is similar to the North American u-law standard. U-law: A companding technique commonly used in North America. U-law is standardized as a 64-kbps codec in ITU-T G.711. Source: CCDA Exam Certification Guide Second Edition QUESTION NO: 80 When are SNMP Trap messages sent? A. When NMS need to initialize agents. B. When agents have events to report to an NMS. C. When an NMS wants agents to begin recording events. D. When an NMS wants a proxy station to take over agent monitoring. Answer: B Trap operations allow Simple Network Management Protocol (SNMP) agents to send asynchronous notifications that an event has occurred. Traps are sent on a best-effort basis and without any method to verify whether they were received. Reference: a aa1.shtml

45 QUESTION NO: 81 You are proposing a multi layer switching solution with multiple paths to a global organization. The proposal is to replace their current non-redundant network of routers. Which three benefits of multi layer switching would you emphasize when you present your proposed design to the organization s board of directors? (Choose three) A. Smaller broadcast domains. B. Increased network availability. C. Increased security due to VLAN functionality. D. Increased network performance. E. Fast convergence due to OSPF protocol use. F. Increased throughput due to multiple paths. Answer: B, D, F Multilayer Switching Multilayer switching combines Layer 2 switching and layer 3 routing functionality. Multilayer switching moves campus traffic at wire speed while at the same time satisfying Layer 3 routing requirements. This combination not only solves throughput problems but also removes the conditions under which layer 3 bottlenecks form. Multilayer switching is based on the route once, switch many model. Reference: Building Cisco Multilayer Switched Networks (Ciscopress) page 20 QUESTION NO: 82 User A and User B work in separate buildings on a campus network. User A sends a packet to use B with an instant messaging application. Please place the actions that are performed on the packet in the proper sequential order as it travels from UserA to UserB. Answer: 1)L2 switched toward dist switch 2)L3 switched thru dist towards core 3)L3 switched across LAN core

46 4)L3 switched thru dist towards access 5)L2 switched across access LAN to target host Typically implementations follow the L2-L3-L2 model in the Cisco Model. Only w/o budget contraints is the L2-L3-L3 model used to provide extra features like redundancy in the Core Layer. But in this case, since User A and B are in separate buildings, the L2-L3-L3 implementation is to be used. What happens is that the packet will go from access -> distro -> core -> distro -> access. No way to avoid that. QUESTION NO: 83 Which three are essential sections of a network design document that ready to be presented to a customer? A. Design requirements B. existing network C. data sources D. pilot network E. technical justifications Answer: A, B, E Documenting the customer s current network is important before any changes are made. Items you should be most attentive to include the following: Network Topology Existing network Addressing schemes Design requirements Concerns about the network technical justifications Reference: Designing Cisco Networks (Ciscopress) page 55 QUESTION NO: 84 Match the submodules of the Enterprise Composite Network Model with the functions they would perform for a Voice Network design. Answer:

47 QUESTION NO: 85 Match the network management component with its function. Answer: QUESTION NO: 86 AAA Video operates a chain of 50 video rental stores located in the Northwestern United States. They currently have a Point-of-Sale (POS) system in which each store posts its daily sales data and inventory changes to a central database through dial-up

48 communication. There is no interaction between the stores and the central system during business hours. The central site runs on an Ethernet LAN. The only always-on WAN link is an Internet connection using wireless broadband to a local ISP. AAA wants to enhance their service offering by creating a new E-Commerce web site where customers can browse and search a catalog of video titles and select the ones they want for rental. The system will instantly communicate the order to the nearest store where employees pull the order and hold it until the customer picks it up. The service must operate on a 24x7 basis. AAA sees this new business strategy as a means to increase revenue and expand the business nationally. They see an opportunity to expand the web site in the future to video, DVD and music sales on a worldwide level. The company wants all stored to be connected to the central site through WAN links. The company is upgrading the central inventory database so that sales and rentals can be posted immediately in real-time. An Internet-based and instant-messaging system will be set up for all headquarters employees and store managers to use. AAA believes that networking the stores will improve order fulfilment processes which will improve customer satisfaction and thus, boost revenue. It will also help communication with store employees. AAA wants to upgrade the local LAN to a Gigabit and Fast Ethernet system to facilitate the demands of the new and upgraded systems. They have budgeted $500,000 for the networking equipment and another $10,000/month for the WAN charges including a faster Internet connection. They believe that 256Kbps speeds will be adequate to the stores. Since they have no staff capable of managing the new network, they will hire two engineers that already have the training and experience. The project must be complete in 6 months when the new inventory system goes online. The IT manager has concerns about the security of the servers and workstations on the network when all stores become connected. He doesn t want any Internet access to or from the stores. He is depending on you to recommend an effective yet affordable solution that will protect his system from intruders. Which are two technical goals of AAA Video with regard to this network design project? (Choose two) A. 24x7 availability of the E-Commerce web site. B. Complete the project in 6 months. C. Keep WAN chargers below $10,000/month. D. Full-time network communication to all stores. E. Improve the order fulfilment process. Answer: A, D To provide 24/7 availability and full-time comms will require redundancy configurations which are technical in nature. B, C are non-technical goals. E is an application layer concern. QUESTION NO: 87 AAA Video operates a chain of 50 video rental stores located in the Northwestern United States. They currently have a Point-of-Sale (POS) system in which each store posts its daily sales data and inventory changes to a central database through dial-up communication. There is no interaction between the stores and the central system

49 during business hours. The central site runs on an Ethernet LAN. The only always-on WAN link is an Internet connection using wireless broadband to a local ISP. AAA wants to enhance their service offering by creating a new E-Commerce web site where customers can browse and search a catalog of video titles and select the ones they want for rental. The system will instantly communicate the order to the nearest store where employees pull the order and hold it until the customer picks it up. The service must operate on a 24x7 basis. AAA sees this new business strategy as a means to increase revenue and expand the business nationally. They see an opportunity to expand the web site in the future to video, DVD and music sales on a worldwide level. The company wants all stored to be connected to the central site through WAN links. The company is upgrading the central inventory database so that sales and rentals can be posted immediately in real-time. An Internet-based and instant-messaging system will be set up for all headquarters employees and store managers to use. AAA believes that networking the stores will improve order fulfilment processes which will improve customer satisfaction and thus, boost revenue. It will also help communication with store employees. AAA wants to upgrade the local LAN to a Gigabit and Fast Ethernet system to facilitate the demands of the new and upgraded systems. They have budgeted $500,000 for the networking equipment and another $10,000/month for the WAN charges including a faster Internet connection. They believe that 256Kbps speeds will be adequate to the stores. Since they have no staff capable of managing the new network, they will hire two engineers that already have the training and experience. The project must be complete in 6 months when the new inventory system goes online. The IT manager has concerns about the security of the servers and workstations on the network when all stores become connected. He doesn t want any Internet access to or from the stores. He is depending on you to recommend an effective yet affordable solution that will protect his system from intruders. Which are three technical constraints imposed by AAA Video on this network design project? (Choose three) A. The POS system. B. Improved employee communication through instant messaging. C. The wireless Internet connection. D. 24x7 availability E. The central site Ethernet LAN. Answer: C, D, E Wireless internet connection is a constraint because of the limited bandwidth it is able to provide. 24/7 is mentioned above. the central site is also a technical constraint because it is a hub-spoke topology where a single point of failure (central) will render the whole network dead. Incorrect Answers: A is an application layer concern B is a business/customer service concern QUESTION NO: 88 AAA Video operates a chain of 50 video rental stores located in the Northwestern United States. They currently have a Point-of-Sale (POS) system in which each store posts its

50 daily sales data and inventory changes to a central database through dial-up communication. There is no interaction between the stores and the central system during business hours. The central site runs on an Ethernet LAN. The only always-on WAN link is an Internet connection using wireless broadband to a local ISP. AAA wants to enhance their service offering by creating a new E-Commerce web site where customers can browse and search a catalog of video titles and select the ones they want for rental. The system will instantly communicate the order to the nearest store where employees pull the order and hold it until the customer picks it up. The service must operate on a 24x7 basis. AAA sees this new business strategy as a means to increase revenue and expand the business nationally. They see an opportunity to expand the web site in the future to video, DVD and music sales on a worldwide level. The company wants all stored to be connected to the central site through WAN links. The company is upgrading the central inventory database so that sales and rentals can be posted immediately in real-time. An Internet-based and instant-messaging system will be set up for all headquarters employees and store managers to use. AAA believes that networking the stores will improve order fulfilment processes which will improve customer satisfaction and thus, boost revenue. It will also help communication with store employees. AAA wants to upgrade the local LAN to a Gigabit and Fast Ethernet system to facilitate the demands of the new and upgraded systems. They have budgeted $500,000 for the networking equipment and another $10,000/month for the WAN charges including a faster Internet connection. They believe that 256Kbps speeds will be adequate to the stores. Since they have no staff capable of managing the new network, they will hire two engineers that already have the training and experience. The project must be complete in 6 months when the new inventory system goes online. The IT manager has concerns about the security of the servers and workstations on the network when all stores become connected. He doesn t want any Internet access to or from the stores. He is depending on you to recommend an effective yet affordable solution that will protect his system from intruders. Which two are business constraints imposed by the AAA Video Company on this new network design project? (Choose two) A. The new Internet-based messaging system. B. $500,000 equipment budget. C. No Internet access to stores. D. Upgrade to Gigabit Ethernet. E. The existing POS system. Answer: B, E Budget is an apparent business constraint. How the business will flourish also depend on the existing application level system, in this case the POS. A is not a constraint. C, D are technical issues QUESTION NO:

51 AAA Video operates a chain of 50 video rental stores located in the Northwestern United States. They currently have a Point-of-Sale (POS) system in which each store posts its daily sales data and inventory changes to a central database through dial-up communication. There is no interaction between the stores and the central system during business hours. The central site runs on an Ethernet LAN. The only always-on WAN link is an Internet connection using wireless broadband to a local ISP. AAA wants to enhance their service offering by creating a new E-Commerce web site where customers can browse and search a catalog of video titles and select the ones they want for rental. The system will instantly communicate the order to the nearest store where employees pull the order and hold it until the customer picks it up. The service must operate on a 24x7 basis. AAA sees this new business strategy as a means to increase revenue and expand the business nationally. They see an opportunity to expand the web site in the future to video, DVD and music sales on a worldwide level. The company wants all stored to be connected to the central site through WAN links. The company is upgrading the central inventory database so that sales and rentals can be posted immediately in real-time. An Internet-based and instant-messaging system will be set up for all headquarters employees and store managers to use. AAA believes that networking the stores will improve order fulfilment processes which will improve customer satisfaction and thus, boost revenue. It will also help communication with store employees. AAA wants to upgrade the local LAN to a Gigabit and Fast Ethernet system to facilitate the demands of the new and upgraded systems. They have budgeted $500,000 for the networking equipment and another $10,000/month for the WAN charges including a faster Internet connection. They believe that 256Kbps speeds will be adequate to the stores. Since they have no staff capable of managing the new network, they will hire two engineers that already have the training and experience. The project must be complete in 6 months when the new inventory system goes online. The IT manager has concerns about the security of the servers and workstations on the network when all stores become connected. He doesn t want any Internet access to or from the stores. He is depending on you to recommend an effective yet affordable solution that will protect his system from intruders. Which two are business goals of AAA video that apply to this network design project? (Choose two) A. Improvement of the order fulfilment process. B. Production deployment in 6 months. C. New messaging systems. D. The hiring of skilled IT staff. E. Increase revenue through the E-Commerce site. Answer: A, E Since the company now requires all stores to communicate full-time to the central site, a much better order fulfillment process can be achieved. The company is investing in a new network design in order to generate more revenue by applying a more hierarchical management approach. Incorrect Answers B is a constraint, not a goal

52 C is an improvement. D is a expenditure concern. QUESTION NO: 90 The West Ridge School District in North Carolina has approximately 2,800 students occupying five schools: three grade schools, one junior high, and one high school. All telephone service is handled by the local phone company. Every phone call is switched by the providers centrex switch, then routed to the appropriate school. Each school is networked with fractional T1 Frame Relay and Cisco routers. The users are on a switched 10/1/100 network utilizing Cisco switched and Category 5 cable. Internet access is through the high school which has an Internet connection through a provider 35 miles away via a T1 Frame Relay. The school district needs to put phones in each classroom for compliance with the Safe- Schools initiative, but the cost is high and facilities are lacking. In addition to the phones, the district would like to install video in each school for video conference and for distance learning in the high school. Video partners will be connected with ISDN PRI LINKS. There is also a need to protect the student information stored on local serves and shared between the schools are as students graduate from elementary school to junior high, and students transfer in and out of the district. Which two are advantages of suggesting IP telephony to this customer? (Choose two) A. Voice, video and data run on the same Cat5 cable. B. Long distance charges can be reduced by running VoIP. C. All reliance on the local phone company can be eliminated. D. The cost of adding additional telephones is minimal. Answer: A, D A. In a converged network, voice, video and integrated data runs on the same physical media. D. The cost is reduced and minimized by requiring less from the telephone service provider. Incorrect: B: Chapter 17, CCDA Exam Certification Guide: Page 435 The introduction of packet-voice technology allows the convergence of data and voice networks --- which lets companies save toll charges on voice telephone calls and reduce their total cost of ownership by not having to build and operate networks for voice, video, and data. Long distances charges are reduced when the remote site is part of the IP network. In this case, the schools are part of a local school district and any long distance calls would not apply to this rule. C: Calls that are placed between offices through the private voice network are called on-net. If a user needs to place a call outside the private network, the call is routed to the local PSTN. If the call is forwarded to the PSTN, it is called off-net. Because not all calls are point to point the need for local company still exists

53 QUESTION NO: 91 The West Ridge School District in North Carolina has approximately 2,800 students occupying five schools: three grade schools, one junior high, and one high school. All telephone service is handled by the local phone company. Every phone call is switched by the providers centrex switch, then routed to the appropriate school. Each school is networked with fractional T1 Frame Relay and Cisco routers. The users are on a switched 10/1/100 network utilizing Cisco switched and Category 5 cable. Internet access is through the high school which has an Internet connection through a provider 35 miles away via a T1 Frame Relay. The school district needs to put phones in each classroom for compliance with the Safe- Schools initiative, but the cost is high and facilities are lacking. In addition to the phones, the district would like to install video in each school for video conference and for distance learning in the high school. Video partners will be connected with ISDN PRI LINKS. There is also a need to protect the student information stored on local serves and shared between the schools are as students graduate from elementary school to junior high, and students transfer in and out of the district. What are two reasons for moving to a converged network at this time? (Choose two) A. Cost savings by using a single cabling system. B. Reduction of long distance chargers by using VoIP. C. Can increase the number of phones without upgrading outside facilities. D. Eliminate reliance on local provider for any future phone calls. Answer: A, C A. In a converged network, the need for separate cabling is eliminated because voice, video and integrated data runs on the same physical media. This saves on costs of running two different cabling systems and in wiring closets. C. Additional phones can be added without the need of for outside upgrades Incorrect: B: Long distance charges would not be eliminated because long distance calls are going offnet. D. The local provider would still be needed for off-net calls. QUESTION NO: 92 The West Ridge School District in North Carolina has approximately 2,800 students occupying five schools: three grade schools, one junior high, and one high school. All telephone service is handled by the local phone company. Every phone call is switched by the providers centrex switch, then routed to the appropriate school

54 Each school is networked with fractional T1 Frame Relay and Cisco routers. The users are on a switched 10/1/100 network utilizing Cisco switched and Category 5 cable. Internet access is through the high school which has an Internet connection through a provider 35 miles away via a T1 Frame Relay. The school district needs to put phones in each classroom for compliance with the Safe- Schools initiative, but the cost is high and facilities are lacking. In addition to the phones, the district would like to install video in each school for video conference and for distance learning in the high school. Video partners will be connected with ISDN PRI LINKS. There is also a need to protect the student information stored on local serves and shared between the schools are as students graduate from elementary school to junior high, and students transfer in and out of the district. How can you protect the student records when in transit between schools and when being shared with other school districts over the Internet? A. Authenticate users B. Secure fingerprints C. Encrypt the data D. Log all access attempts Answer: C All answers seem feasible. If I have to choose ONE, I will go with encryption. It is the single item that will render any illegal acquisition of the data unusable. QUESTION NO: 93 The West Ridge School District in North Carolina has approximately 2,800 students occupying five schools: three grade schools, one junior high, and one high school. All telephone service is handled by the local phone company. Every phone call is switched by the providers centrex switch, then routed to the appropriate school. Each school is networked with fractional T1 Frame Relay and Cisco routers. The users are on a switched 10/1/100 network utilizing Cisco switched and Category 5 cable. Internet access is through the high school which has an Internet connection through a provider 35 miles away via a T1 Frame Relay. The school district needs to put phones in each classroom for compliance with the Safe- Schools initiative, but the cost is high and facilities are lacking. In addition to the phones, the district would like to install video in each school for video conference and for distance learning in the high school. Video partners will be connected with ISDN PRI LINKS

55 There is also a need to protect the student information stored on local serves and shared between the schools are as students graduate from elementary school to junior high, and students transfer in and out of the district. Which two are means of protection the servers that contain student information? (Choose two) A. Encrypt VoIP traffic to/from the call managers. B. Place a firewall between the Internet and the school network. C. Use public-key cryptography. D. Implement host-based security on the servers. Answer: B, D A firewall will provide frontline protection against a public network. The second-level protection will be to implement host-based sec on the servers to ensure only personnel's authorized to used the info stored on the server are allow to access them. Incorrect Answers: A We are interested in protecting data, not voice C will work if we are communicating over a public network but in this case we are not. QUESTION NO: 94 A PBX connects with a USA public service using three ISDN PRI(T1) circuits and no other facility. If non-facility associated signaling is used (only one signaling channel for all three PRI circuits). What is the maximum number of bearer channels that can carry voice calls (provided that the traffic offering allows it)? A. 92 B. 90 C. 72 D. 71 E. 69 Answer: D If an ISDN PRI (T1) is 23B +D, then 3 ISDN PRI T1's using only 1 signaling channel (non-facility associated signaling) for all three ='s 24 x 3 = 72-1= 71. ISDN Non-Facility Associated Signaling (NFAS) allows a single D channel to control multiple PRI interfaces. Use of a single D channel to control multiple PRI interfaces frees one B channel on each interface to carry other traffic.. QUESTION NO:

56 Which address is NOT an IPV6 address scope? A. Unicast B. Anycast C. Mulitcast D. Broadcast Answer: D Reference: Implementing IPv6 for Cisco IOS Software PDF page QUESTION NO: 96 You are documenting the existing network of a customer with a large installed Cisco network. You have prepared this list of the routers in use on the network? 435 Cisco model 2600 routers 129 Cisco model 3600 routers 10 Cisco model 7500 routers Which two additional items of information would be most valuable to complete your documentation of these routers? A. error statistics B. power requirements C. interface options D. software revisions E. management protocols Answer: C, D QUESTION NO: 97 Your entire campus is made up of VLANs attached to layer 2 access switching using C- class networks. The core switches show low utilization, but users complain of slow network response. Analysis shows excessive data link layer traffic

57 Which two network changes can help reduce this problem? (Choose Two) A. implement spanning tree protocol (STP) B. use NAT wherever possible C. segment into smaller VLANs D. reduce size of broadcast domains E. implement EIGRP at the distribution layer Answer: C, D QUESTION NO: 98 You are using a design plan consisting of multiple, complex implementation steps. What are two possible issues you may face? (Choose Two) A. difficult troubleshooting B. less time needed to revert to previous states in case of failure C. more time needed to revert to previous states in case of failure D. limited budget E. corporate policies regarding protocols, standards, vendors, and applications Answer: A, C QUESTION NO: 99 What aspect of a network design is affected by a company with a small number of IT staff with minimal networking skills when the allowed down time is limited to midnight through 6:00 AM once a week? A. choice of design model B. implementation schedule C. choice of layer 2 or layer 3 switching D. security considerations Answer: B QUESTION NO: 100 Which statement about the steps to an implementation plan is true? A. Each step should have a number of phases to carry out B. Each step should list prerequisites for that step

58 C. The designer should be involved in each step of the implementation D. Each step should detail roll-back guidelines in case of failure Answer: A QUESTION NO: 101 What are two characteristics of CDP? (Choose two) A. It reports on directly connected Cisco device B. It uses the UDP protocol C. It is media and protocol independent D. It supports any SNMP device E. It utilizes RMON to gather utilization statisitics Answer: A, C The CDP is a Cisco proprietary layer two protocol that is media- and protocol-independent, and runs on all Cisco-manufactured equipment including the following: routers bridges access servers switches A Cisco device enabled with CDP sends out periodic interface updates to a multicast address in order to make itself known to neigbors. Since it is a layer two protocol, these packets (frames) are not routed. Use of SNMP with the CDP MIB allows network management applications to learn the device type and the SNMP agent address of neighboring devices, and to send SNMP queries to those devices. CDP uses the CISCO-CDP-MIB. Reference: ml QUESTION NO: 102 You are working with a corporation that is using variable length subnet masking (VLSM) in their network. Which the routing protocol would be suitable for this corporation's network? (Choose three) A. RIPv2 B. OSPF C. RIPv1 D. EIGRP E. IGRP

59 F. BGP Answer: A, B, D Enhanced Interior Gateway Routing Protocol (EIGRP) Classless addressing (prefix based) Variable length subnet mask (VLSM) Address summarization Route filtering Periodic and incremental updates RIP v2: Classless addressing (prefix based) VLSM Triggered updates Full routing-table updates Open Shortest Path First (OSPF): Hierarchical scaling (two levels) VLSM Address summarization Stub areas Incremental updates Per-area topology database Dijkstra's shortest path first algorithm (SPF) Reference: 900aecd800a4e11.html QUESTION NO: 103 Which two modules are part of the Enterprise Campus function area of the Enterprise Corporate network model? (Choose two) A. E-commerce module B. Network Management module C. Remote Access module D. Server Farm module Answer: B, D Management Module The primary goal of the management module is to facilitate the secure management of all devices and hosts within the enterprise SAFE architecture. Logging and reporting information flow from the devices through to the management hosts, while content, configurations, and new software flow to the devices from the management hosts

60 Server Module The server module s primary goal is to provide application services to end users and devices. Traffic flows on the server module are inspected by on-board intrusion detection within the Layer 3 switches. Reference: SAFE: A Security Blueprint for Enterprise Networks QUESTION NO: 104 How is subnetworking achieved in IPv6? A. Site Level Aggregator in IPv6 addresses B. Subnetworks are assigned by Public Authorities C. Subnetworking is not allowed in IPv6 D. IPv4 compatible IPv6 addresses E. Subnetworks are assigned by Internet Service Providers Answer: A The aggregatable global address typically consists of a 48-bit global routing prefix and a 16- bit subnet ID or Site-Level Aggregator (SLA). In the IPv6 aggregatable global unicast address format document (RFC 2374), the global routing prefix included two other hierarchically structured fields named Top-Level Aggregator (TLA) and Next-Level Aggregator (NLA).The IETF decided to remove the TLS and NLA fields form the RFCs because these fields are policy-based. Some existing IPv6 networks deployed before the change might still be using networks based on the older architecture. A 16-bit subnet field called the Subnet ID could be used by individual organizations to create their own local addressing hierarchy and to identify subnets. A subnet ID is similar to a subnet in IPv4, except that an organization with an IPv6 subnet ID can support up to 65,535 individual subnets. Reference: Implementing IPv6 for Cisco IOS Software Page 22 QUESTION NO: 105 What are two reasons to use a prototype network instead of a pilot network when testing a network redesign? (Choose two) A. cheaper to implement B. doesn't impact a live network C. more modeling tools available D. more accurate test results E. more flexible test environment

61 Answer: D, E For larger configurations, a prototype is more feasible. For smaller configurations, a pilot might be more practical. The decision will probably be made on relative cost; the costs for prototyping a portion of network will be relatively small for a large network. Reference: Designing Cisco Networks (Ciscopress) page 267 QUESTION NO: 106 Which two are the primary sources for documenting a customer's requirements for a network design project? A. network application specifications B. request for proposal (RFP) C. diagram of desired network D. network performance specifications E. interview with customer Answer: D, E Steps for Determining a Customer s network Requirements Step1. Identify business constraints Step2. Identify security requirements Step3. Identify manageability requirements Step4. Determine application requirements Step5. Characterize new network traffic Step6. Identify performance requirements Step7. Create a customer needs specification document Reference: Designing Cisco Networks (Ciscopress) page 69 QUESTION NO: 107 Which three describe the primary functions of the Access layer of the campus network design hierarchy? (Choose three) A. provides end-user connectivity B. provides router summarization C. provides remote office connectivity D. provides policy-based routing E. connects shared LAN device Answer: A, C, E Access Layer

62 The access layer provides user access to local segments on the network. The access layer is characterized by switched and shared bandwidth LANs in a campus environment. Microsegmentation, using LAN switches, provides high bandwidth to workgroups by dividing collision domains on Ethernet segments and reducing the number of stations capturing the token on Token Rings LANS. For small office/home office environments, the access layer provides access for remote sites into the corporate networks using WAN technologies such as ISDN, Frame Relay, and leased lines. Features such as dial-on-demand and static routing can be implemented to control costs. Reference: Designing Cisco Networks (Ciscopress) page 93 QUESTION NO: 108 TestKing.com Electronics has in excess of 1000 small outlets around the country accommodating the needs of electronic and PC enthusiasts. On average each outlet has twenty computers and requires interconnection to the head office and to a regional office using a router and frame relay network. Which two routing protocols would be most suitable this design? (Choose two) A. IBGP B. RIPv2 C. IGRP D. OSPF E. BGP F. EIGRP Answer: D, F QUESTION NO: 109 You have designed and implemented a SAFE network, but users still complain of isolated DoS attacks directed at specific hosts in the E-commerce module. You have limited connection rate at the Internet firewall, but the problem persists. What more can you do to reduce the effects of these attacks? A. Ensure all relevant OS patches have been applied B. Block all UDP traffic to these servers at the internet firewall C. Block all TCP traffic to these servers at the internet firewall D. Move the affected servers to the DMZ Answer: A To secure hosts, pay careful attention to each of the components within the systems. Keep any systems up-to-date with the latest patches, fixes, and so forth. In particular, pay attention to

63 how these patches affect the operation of other system components. Evaluate all updates on test systems before you implement them in a production environment. Failure to do so might result in the patch itself causing a denial of service (DoS). Reference: SAFE Extending the Security Blueprint to Small, Midsize, and Remote-User Networks Page 8 QUESTION NO: 110 What is the first task that a network designer should perform when documenting the customer requirements and existing environment of a network design project? A. access the scope of the design project B. identify applications, both planned and installed. C. identify the customer's business constraints D. assess the customer's business goals Answer: C Steps for Determining a Customer s network Requirements Step 1. Identify business constraints Reference: Designing Cisco Networks (Ciscopress) page 69 QUESTION NO: 111 A medium sized accounting firm, TestKing, has four offices around the country, head office in Berlin and branches in Kassel, Dortmund add Frankfurt. They want connectivity between these offices with minimal expense as they have limited budget. What topology would you recommend for this firm? A. Partial mesh B. Ring C. Star hub and spoke D. Full mesh Answer: C For small to medium sized companies, the hierarchical model is often implemented as a hub and spoke topology. Reference: Designing Cisco Networks (Ciscopress) page

64 QUESTION NO: 112 When collecting information about a customer's existing network, which two information sources will provide the most accurate data? (choose two) A. Existing network topology diagram B. Customer interview C. Traffic analysis D. Configuration obtained from network equipment E. Customer-supplied server list Answer: A, D Documenting the customer s current network is important before any changes are made. Items you should be most attentive to include the following: Network Topology Addressing schemes Concerns about the network Reference: Designing Cisco Networks (Ciscopress) page 55 QUESTION NO: 113 When choosing a routing protocol for your network design, you need to be aware of IP addressing limitations. Which two IP addressing constraints do classful routing protocols have? (Choose two) A. fixed length subnet masking B. variable length subnet masking C. lack of private addressing support D. subnetted networks must be contiguous Answer: A, D Classful routing protocol do not transmit any information about the prefix length. When receiving information about routes within the same major network, hosts and routers assume the same prefix length as that on the incoming interface of the route information. Classful routing protocols therefore do not accommodate different prefix lengths being used within a major network. Reference: Designing Cisco Networks (Ciscopress) page 161 QUESTION NO: 114 What is the impact of IPv6 on the OSPF protocol? A. Hosts convert OSPF to IS-IS for IPv6-64 -

65 B. Routers convert OSPF to IS-IS for IPv6 C. There is no change in OSPF between IPv4 and IPv6 D. OSPF can not be used with IPv6 E. There is a new version of OSPF for IPv6 Answer: E OSPF is a routing protocol for IP. It is a link-state protocol, as opposed to a distance-vector protocol. Think of a link as being an interface on a networking device. A link-state protocol makes its routing decisions based on the states of the links that connect source and destination machines. The state of a link is a description of that interface and its relationship to its neighboring networking devices. The interface information includes the IPv6 prefix of the interface, the network mask, the type of network it is connected to, the routers connected to that network, and so on. This information is propagated in various type of link-state advertisements (LSAs). Reference: /ipv6imp/sa_ospf3.htm QUESTION NO: 115 You work for a stock brokerage firm that is opening a new office in Madrid. A dozen stock traders will require constant data access to exchange all around the world. This access must be fast and without interruption. Which two feature can help you provide this level of connectivity? (Choose two) A. CDP B. IGRP C. CoS D. QoS E. GoS Answer: C, D This document describes Quality of Service (QoS) for Voice over IP (VoIP) in a LAN environment by mapping Type of Service (ToS) to Class of Service (CoS) parameters. Until recently, the general consensus was that QoS would never be an issue in the enterprise side due to the bursty nature of network traffic and the capability of buffer overflow. The reason for QoS on the LAN side is due to buffering, not lack of bandwidth. For this reason, QoS tools are required to manage these buffers to minimize loss, delay, and delay variation. Transmit buffers have a tendency to fill to capacity in high-speed networks due to the bursty nature of data networks combined with the high volume of smaller Transmission Control

66 Protocol (TCP) packets. If an output buffer fills, ingress interfaces are not able to immediately place new flow traffic into the output buffer. Once the ingress buffer fills, which can happen quickly, packet drops occur and this is where voice quality may possibly degrade due to packet loss. Reference: 800a954d.shtml QUESTION NO: 116 Which two are modules of the edge distribution functional area of the enterprise composite network model? (Choose two) A. Campus infrastructure B. Internet connectivity C. WAN D. Edge security E. Workgroup Switching Answer: B, C There are 4 modules associated with the Edge Distribution E-Commerce Internet Connectivity Remote Acess and VPN WAN Note: The edge distribution module is similar in some respects to the building distribution module in terms of overall function. Both modules employ access control to filter traffic, although the edge distribution module can rely somewhat on the entire edge functional area to perform additional security functions. Both modules use Layer 3 switching to achieve high performance, but the edge distribution module can add additional security functions because the performance requirements are not as great. The edge distribution module provides the last line of defense for all traffic destined to the campus module from the edge module. This includes mitigation of spoofed packets, erroneous routing updates, and provisions for network layer access control. Reference: aper09186a008009c8b6.shtml

67 QUESTION NO: 117 You've designed converged network to carry voice calls on-net close as possible to the destination avoid long distance charges. Which two are reasons that Voip call could go off-net earlier than designed? (Choose two) A. local voice-gateway detects lack of WAN bandwidth B. destination routing not configured on both local and remote gateways C. local call manager server is too busy to process the call D. the telephone user dials an access code Answer: A, D If the near-end voice gateway, using quality of service(qos) features detects that there is not enough bandwidth to complete the call, then it reroutes the call off-net. QUESTION NO: 118 Two locations of a company's network are connected with a satellite point-to-point link. Data communications over this link experience low response time and very low error rates. Which sentence describes the effect of flow control using windows size for the highest end-to-end throughput? A. A large window size minimizes the number of acknowledgments B. A small window size will reduce the number of retransmissions C. A small window size would improve performance D. there is not enough information to determine the effect window size Answer: A Some protocols, such as Novell s traditional NetWare Core Protocol (NCP), use a pingpong approach, where each request generates a reply. This a approach is an inefficient use of bandwaidth, but it can be replaced by the burst mode protocol. With burst mode, a station can send as much data as there is room in the reciever s receive window. In the TCP/IP suit, the TCP supports windowing and flow control. Reference: Designing Cisco Networks (Ciscopress) page 74 QUESTION NO: 119 Which statement describes IPv6 address route summarization? A. IPv6 addresses have to converted to IPv4 addresses to be router summarized B. Classless inter domain routing (CIDR) for IPv6 automatically perform route summarization

68 C. IPv6 address cannot use route summarization D. IPv6 address have built in router summarization based on Top level aggregators, Next Level aggregators and Site Level aggregators E. The routers in the IPv6 network use proprietary protocols to optimize router summarization based on the size of their routing tables Answer: D In addition to required protocols, infrastructure address space needs to be identified since this is the space the ACL will be protecting. Infrastructure address space includes any addresses that are used for the internal network and should rarely, if ever, be accessed by external sources such as router interfaces, point-to-point link addressing and critical infrastructure services. Since these addresses will be used for the destination portion of the infrastructure ACL, summarization is critical and, wherever possible, these addresses should be grouped into classless interdomain routing (CIDR) blocks. Reference: shtml QUESTION NO: 120 Which two pieces of information are most relevant when documenting a company's business requirement? (Choose two) A. improved customer support B. existing network topologies C. IP address assigned by the ISP D. projected growth E. frequency of board meetings Answer: A, D Determining Company Business Goals Determine the company s major business goals for the next year and the next fiver years. This information is important to help you design an internetwork that provides the scalability required. Research your customer s industry and competition With knowledge of your customer s business, you can position Cisco technologies and products to help strengthen the customer s status in the customer own industry. Reference: Designing Cisco Networks (Ciscopress) page 46 QUESTION NO: 121 What is the impact of IPv6 on the BGP protocol?

69 A. There is a new version of BGP for IPv6 B. Hosts convert BGP to IS-IS for IPv6 C. Routers convert BGP to IS-IS for IPv6 D. There is no change to BGP between IPv4 and IPv6 E. BGP cannot be used with IPv6 Answer: A When IPv6 is first implemented in a network, it will co-exist with a larger IPv4 network. During this transition period, using tunnels is a method to allow IPv6 and IPv4 networks to exist at the same time. A method to connect various IPv6 locations throughout a company network is to tunnel the IPv6 through the IPv4 network. Reference: 800b49a5.shtml QUESTION NO: 122 You company, Test King.com, is preparing to do business with partners over the internet and dialup links, and you've been assigned to provide a means to secure these transactions. You need to ensure both the privacy and integrity of the data being transferred over untrusted networks. In addition, there needs to be a way to identity the users initiating these transactions. As part of your verification and test plan, how can you verify that privacy requirements have been satisfied? A. observer applications transactions B. capture and analyze packets for cipher text C. compare checksum on send and received packets D. inspect logs for telephone number of dial-back customers Answer: B Testing You can also use a protocol analyzer to generate traffic when testing a prototype or pilot. Reference: Designing Cisco Networks (Ciscopress) page 55 QUESTION NO: 123 VPN concerns what types of threats? (Select two) A. DoS B. DDoS C. Data confidentiality

70 D. Network mapping E. IP Spoofing Answer: C, E QUESTION NO: 124 The state hospital has six clinics spread throughout the state connected to the main hospital facility through dedicated links. Doctors practicing in the state have online access to patient diagnostics, scheduling and billing data in various hospital databases. The hospital has signed new agreements with three insurance providers and they arc planning to open a new clinic on the opposite side of the state. The new clinic will have a trauma center which will require constant communication with the local emergency dispatch center. Which question would you ask to obtain information about current network availability? A Is clustering technology in use by servers on the network? B. Is full-duplex ethernet technology deployed on the network? C. Which routers have HSRP implemented? D. Are the switches configured for auto-sensing? Answer: A QUESTION NO: 125 When designing IPv6 into an existing IPv4 network, which strategy allows both address schemes to coexist to facilitate a migration? (Choose two) A. Bridge between the two networks. B. Deploy stateful addressing assignments C. Run Ipv6 and Ipv4 stacks on the devices D. Enable anycast capability in the routing protocol. Answer: A, C Explanation IPv4 to IPv6 Transition Strategies and Deployments Several deployment models exist to migrate from an IPv4 network to IPv6. During a transition time, both protocols can coexist in the network. The deployment models are - IPv6 over dedicated WAN links - IPv6 over IPv4 tunnels - IPv6 using dual-stack backbones - Protocol translation Source: CCDA Exam Certification Guide Second Edition, Page

71 QUESTION NO: 126 TestKing has a campus network with five buildings. Building 1 contains all of the TestKing s server and the central core of the network. A Catalyst 6500 multilayer switch connects to each of the other building through Gigabit Ethernet link over multimode fiber optic cable. Each building has a single IP subnet with 300 to 500 devices in each. This customer calls you and report some serious network performance problems. Periodically, response time becomes very slow for several minutes at a time and then speeds up. The problem has been sporadic and very difficult to troubleshoot. He uses Microsoft 2000 and Sun Solaris servers and Windows 2000 workstations with default configurations. What change in network design would you recommend to this customer to improve performance? A. Install a dual Gigabit uplink to the buildings B. Put a layer 3 switch C. Use Single mode fiber for Gigabit uplinks D. Implement multiple VLANs in each of the buildings Answer: D QUESTION NO: 127 Which statement describe the use of Dynamic Host Configuration Protocol (DHCP) for assignement of Ipv6 addresses? A. DHCP is one of the ways for dynamic Ipv6 address assignment B. DHCP is the only way for dynamic Ipv6 address assignment C. DHCP cannot be used with Ipv6 D. DHCP servers can only assign Ipv4 compatible Ipv6 addresses E. DHCP servers can only assign Ipv4 mapped Ipv6 addresses Answer: A An IPv6 host can obtain its address through autoconfiguration or from the DHCP. Source: CCDA Exam Certification Guide Second Edition, Page 251 QUESTION NO: 128 Which network analysis tool can produce a graph of traffic utilization on router interfaces? A. NBAR B. MRTG C. NetFlow

72 D. Cisco NetProfiler Answer: B Explanation The Multi Router Traffic Grapher (MRTG) is a tool to monitor the traffic load on networklinks. MRTG generates HTML pages containing graphical images which provide a LIVE visual representation of this traffic. QUESTION NO: 129 Your customer wants to run voice traffic over the existing frame relay network, but is not prepared to deploy IP telephones at this point. What networking hardware would you use to accommodate this request? A. Call manager B. Voice gatekeeper C. Voice gateway D. Multi Control Unit (MCU) E. Frame Relay Access Device (FRAD) Answer: Pending. Send your suggestion to feedback@testking.com. Not A: Call Manager is software. QUESTION NO: 130 Which two design criteria require VLANs in a proposed solution? (Choose two) A. Security between departments. B. Segmenting collision domains. C. Segmenting broadcast domains. D. Video streaming on the LAN. E. Limited budget of the corporation. F. Use of multivendor equipment. Answer: A, C QUESTION NO: 131 How do you associate a phone number with a physical voice port on a voice-enabled router? A. Configure automatic router selection B. Configure the voice port C. Enable voice over IP

73 D. Configure a dial-peer Answer: D QUESTION NO: 132 You are proposing a network design. The IT Manager asks you to describe route summarization. Which statement best describes route summarization? A. Using one Class A IP address to minimize routing table size in the routers. B. Eliminating the use of subnetworks to increase routing performance. C. Advertising only one of the IP networks to simplify routing table maintenance. D. Grouping multiple contiguous networks and advertising as one large network. E. Load sharing between the organization s routers and the ISP s routers. Answer: D QUESTION NO: 133 TestKing an independently owned nationwide chain, will interconnect all of their offices to their head office. The IT personnel reside at the headquarters and there is only one inexperienced network engineer. They want a simple network topology. Branch offices will connect to a regional office. The regional offices will then connect to the headquarters. The headquarters has a large campus. In order to save money, there will be no redundant links. Also, they want maximum throughput for the branch offices and little or no overhead traffic. Which routing option would you choose for the small office? A. Dynamic routing distance vector protocol B. Dynamic routing link state protocol C. Dynamic routing, hybrid protocol D. Variable length subnetwork masking protocol E. Multi protocol label switching protocol F. Static routing protocol Answer: F QUESTION NO: 134 A global corporation, TestKing.com, has 2,000,000+ hosts and 10,000+ routers in their internal network. They also have connectivity to the Internet and do high volumes of traffic with their business partners and the public at large. They have decided to start using Ipv6. Which statement best describes a flexible Ipv6 strategy for this corporation?

74 A. Ipv6 hosts and Ipv6 routers B. Dual stack hosts and dual stack routers C. Dual stack hosts and Ipv4 routers D. Ipv4 hosts and Ipv6 routers Answer:A QUESTION NO: 135 Which Cisco device management feature is most suited to meeting network traffic and providing data for billing network usage? A. NetFlow B. RMON C. CDP D. QoS E. BGP Answer:A QUESTION NO: 136 Which two pieces of information are most relevant when documenting a company s business requirements? (Choose two) A. Improved customer support B. Existing network topologies C. IP addresses assigned by the ISP D. Projected growth E. Frequency of board meetings Answer: A, D QUESTION NO: 137 You are a network administrator at TestKing and manage a large Metropolitan Area Network spread out over 25 locations around the city. Your CEO, Dr King,has decided to start producing a monthly webcast for all company employees to show the latest product and company news. You fear the effects on the performance of your network when all the 10,000 employees connect to this audio/video stream. You determine that it is time to enable multicast on your network. Which two layer two features are available on Cisco switches to optimize the use of multicast on your network?

75 A. CGMP B. IGMP Snooping C. Express Forwarding D. RGMP E. SNMP Answer: A, B When campus LANs use multicast media, end hosts that do not participate in multicast groups might get flooded with unwanted traffic. Two solutions are - CGMP - IGMP snooping Source: CCDA Exam Cerification Guide Second Edition, Page 103 QUESTION NO: 138 When designing converged networks to carry voice traffic, which mechanism is used to prioritize different types of traffic? A. Grade of service (GoS) B. Quality of service (QoS) C. Dial peers D. Call legs Answer: B QUESTION NO: 139 TestKing is a gaming software company based in London. They would like to redesign the existing network to enhance their communication infrastructure. To successfully address all their needs in the new network, you interviewed their CIO to get his point of view on this project. Below are the notes from the interview. Our goal is to become one of the tope three companies in peer-to-peer online-gaming software. We currently have 200 employees around the world, with 150 of them located at the headquarters. Due to the popularity of onling-gaming, we anticipate that we will grow to around 500 employees in two years, with 40% of them working remotely to reduce costs. Under such growth rate, we anticipate the release of 20 titles in the next 12 months. Which two additional pieces of information are required to design the campus core? (Choose two) A. The operating system used B. The current implementation C. The company s position in the industry

76 D. The security policy E. The traffic pattern Answer: B, E Explanation Testking wants to redesign the network based on growth, therefore the below are needed in the assessment. Network Topology Address Schemes Concerns about the network Incorrect answers A: The OS is not relevant in the network redesign C: Company position is irrelevant D: Security is not one of the objectives and should already be in place given the scenario. Source: Designing Cisco Networks, Page 55 QUESTION NO: 140 Which three standard protocols form the foundation of network management architecture? (Choose three) A. NMS B. RMON C. SNMP D. MIB E. CDP Answer: B, C, E Explanation You use SNMP to exchange information between devices and CDP and RMON to monitor the functions of remote device. Incorrect Answers: A & D: NMS and MIB are components of SNMP Source: CCDA Exam Certification Guide Second Edition, Page 469 QUESTION NO: 141 Exhibit:

77 The router in the diagram is summarizing the networks on the left as it advertises them to the network on the right. Which summarization route will be advertised? A /21 B /22 C /24 D /26 E /27 Answer: A QUESTION NO: 142 Exhibit: You are writing the implementation plan for a complex network design prepared for a large financial institution. You have just written the deployment step to configure the switches used in the design

78 What information is missing from this section of the implementation plan? A. Contingency plan in case this step fails B. Implementation constraints C. Applicable technical constraints D. Applicable timeline for this step Answer: B QUESTION NO: 143 To reduce the bandwidth required for each voice call over a converged network, which codec does Cisco recommend for WAN links? A. G.711 B. G.723 C. G.728 D. G.729 Answer: D QUESTION NO: 144 Which two modules are part of the Enterprise Campus functional area of the Enterprise Composite Network model? (Choose two) A. E-Commerce module B. Network Management module C. Remote Access module D. Server Farm module Answer: B, D Explanation Enterprise Campus - Campus network with backbone, distribution, and access infrastructure; also includes server farm and network management. Source: CCDA Exam Certification Guide Second Edition, Page 624 QUESTION NO: 145 You have designed and implemented a SAFE network, but users still complain of isolated DoS attacks directed at specific hosts in the e-commerce module. The operating systems on these servers have been patched and all unneeded services have been turned

79 off, but the problem persists. What more can you do to reduce the effects of these attacks? A. Block all TCP traffic to these servers at the internet firewall B. Limit connection rate to these servers at the internet firewall C. Block all UDP traffic to these servers at the internet firewall D. Load-balance between multiple servers running the same applications Answer: B QUESTION NO: 146 TestKing has 350 agent offices around the Asia. Each agent office has a frame relay link to corporate headquarters. Because of corporate policy, the bandwidth of the agent links is determined by and paid for by the agents working in the offices. The agents use the network connection primarily to access various database systems at headquarters and also for and Internet access. TestKing has budgeted $5 million to upgrade the primarily Token-Ring and FDDI network infrastructure at headquarters to a fully redundant Gigabit and Fast Ethernet LAN. The upgrade will reduce long-term network costs and improve the performance, reliability, compatibility, scalability and manageability of the LAN Infrastructure. The company is starting a recruiting effort that it hopes will result in the addition of 200 new agent offices in the next three years. The company needs higher capacity to meet the potential demand of the new agents. The project must be completed in three months because of the anticipated demands of a new E commerce system, which will increase revenue, and a new customer service system, which will improve customer satisfaction. The existing LAN equipment is from a non-cisco vendor although the WAN infrastructure is a complete Cisco solution. Test King wants the LAN to be a complete Cisco solution as well. The company outsourcers its IT staff. The Cisco WAN is managed remotely. The IT staff that work on-site have limited training in Cisco networking. The company's website is also outsourced although all the personnel and servers are located at the headquarters and connect directly to the LAN because the company's policy is that all company data must be physically stored in company facilities. The web developers use Macintosh workstations and a mixture of Macintosh and Sun Solaris servers. The insurance database systems use an IBM mainframe or Oracle on HPUX servers with custom-developed client software. The system is based on Eudora. Which two are technical constraints imposed by TestKing insurance on this network design project? (Choose two) A. Equipment vendor selection B. Three month deadline C. Sufficient bandwidth to support centralized database application D. The network must transport custom application protocol E. Gigabit Ethernet upgrade

80 Answer: C, E QUESTION NO: 147 TestKing has 350 agent offices around the Asia. Each agent office has a frame relay link to corporate headquarters. Because of corporate policy, the bandwidth of the agent links is determined by and paid for by the agents working in the offices. The agents use the network connection primarily to access various database systems at headquarters and also for and Internet access. TestKing has budgeted $5 million to upgrade the primarily Token-Ring and FDDI network infrastructure at headquarters to a fully redundant Gigabit and Fast Ethernet LAN. The upgrade will reduce long-term network costs and improve the performance, reliability, compatibility, scalability and manageability of the LAN Infrastructure. The company is starting a recruiting effort that it hopes will result in the addition of 200 new agent offices in the next three years. The company needs higher capacity to meet the potential demand of the new agents. The project must be completed in three months because of the anticipated demands of a new E commerce system, which will increase revenue, and a new customer service system, which will improve customer satisfaction. The existing LAN equipment is from a non-cisco vendor although the WAN infrastructure is a complete Cisco solution. Test King wants the LAN to be a complete Cisco solution as well. The company outsourcers its IT staff. The Cisco WAN is managed remotely. The IT staff that work on-site have limited training in Cisco networking. The company's website is also outsourced although all the personnel and servers are located at the headquarters and connect directly to the LAN because the company's policy is that all company data must be physically stored in company facilities. The web developers use Macintosh workstations and a mixture of Macintosh and Sun Solaris servers. The insurance database systems use an IBM mainframe or Oracle on HPUX servers with custom-developed client software. The system is based on Eudora. Which two are business goals of TestKing on this network design project? (Choose two) A. Project completion in 3 months B. 200 new agent offices C. Increased revenue from E-Commerce system D. Increased manageability of the network E. Increased network scalability Answer: B, C Revenue is a business concept. QUESTION NO: 148 TestKing has 350 agent offices around the Asia. Each agent office has a frame relay link to corporate headquarters. Because of corporate policy, the bandwidth of the agent links

81 is determined by and paid for by the agents working in the offices. The agents use the network connection primarily to access various database systems at headquarters and also for and Internet access. TestKing has budgeted $5 million to upgrade the primarily Token-Ring and FDDI network infrastructure at headquarters to a fully redundant Gigabit and Fast Ethernet LAN. The upgrade will reduce long-term network costs and improve the performance, reliability, compatibility, scalability and manageability of the LAN Infrastructure. The company is starting a recruiting effort that it hopes will result in the addition of 200 new agent offices in the next three years. The company needs higher capacity to meet the potential demand of the new agents. The project must be completed in three months because of the anticipated demands of a new E commerce system, which will increase revenue, and a new customer service system, which will improve customer satisfaction. The existing LAN equipment is from a non-cisco vendor although the WAN infrastructure is a complete Cisco solution. Test King wants the LAN to be a complete Cisco solution as well. The company outsourcers its IT staff. The Cisco WAN is managed remotely. The IT staff that work on-site have limited training in Cisco networking. The company's website is also outsourced although all the personnel and servers are located at the headquarters and connect directly to the LAN because the company's policy is that all company data must be physically stored in company facilities. The web developers use Macintosh workstations and a mixture of Macintosh and Sun Solaris servers. The insurance database systems use an IBM mainframe or Oracle on HPUX servers with custom-developed client software. The system is based on Eudora. Which two are technical goals of TestKing on this network design project? (Choose two) A. Increased performance on the WAN links B. Increased WAN scalability C. Increased performance on the LAN D. Network cost reduction E. Increased LAN availability Answer: C, D TestKing has budgeted $5 million to upgrade the primarily Token-Ring and FDDI network infrastructure at headquarters to a fully redundant Gigabit and Fast Ethernet LAN. The upgrade will reduce long-term network costs and improve the performance, reliability, compatibility, scalability and manageability of the LAN Infrastructure. QUESTION NO: 149 TestKing has 350 agent offices around the Asia. Each agent office has a frame relay link to corporate headquarters. Because of corporate policy, the bandwidth of the agent links is determined by and paid for by the agents working in the offices. The agents use the network connection primarily to access various database systems at headquarters and also for and Internet access

82 TestKing has budgeted $5 million to upgrade the primarily Token-Ring and FDDI network infrastructure at headquarters to a fully redundant Gigabit and Fast Ethernet LAN. The upgrade will reduce long-term network costs and improve the performance, reliability, compatibility, scalability and manageability of the LAN Infrastructure. The company is starting a recruiting effort that it hopes will result in the addition of 200 new agent offices in the next three years. The company needs higher capacity to meet the potential demand of the new agents. The project must be completed in three months because of the anticipated demands of a new E commerce system, which will increase revenue, and a new customer service system, which will improve customer satisfaction. The existing LAN equipment is from a non-cisco vendor although the WAN infrastructure is a complete Cisco solution. Test King wants the LAN to be a complete Cisco solution as well. The company outsourcers its IT staff. The Cisco WAN is managed remotely. The IT staff that work on-site have limited training in Cisco networking. The company's website is also outsourced although all the personnel and servers are located at the headquarters and connect directly to the LAN because the company's policy is that all company data must be physically stored in company facilities. The web developers use Macintosh workstations and a mixture of Macintosh and Sun Solaris servers. The insurance database systems use an IBM mainframe or Oracle on HPUX servers with custom-developed client software. The system is based on Eudora. Which two are business constraints imposed by TestKing on this network design project? (Choose two) A. Equipment vendor selection B. The existing FDDI infrastructure C. The three month time line D. Macintosh and Solaris servers E. Cost reduction due to Ethernet topology Answer: C, D QUESTION NO: 150 You have been asked to propose a security solution to protect servers in the E-commerce module of a network. Which two recommendations can be made to help satisfy this requirement? (Choose two) A. Use intrusion detection on the E-commerce server farm B. Limit the number of incoming connections to better manage risks C. Place application servers and database servers in separate DMZs D. Move the E-commerce application servers to the WAN module where tighter security is used E. Require a private and public key encryption system Answer: A(?), C Note: Or B, C

83 QUESTION NO: 151 Your verification testing of a converged network shows that long distance calls are going off-net at the local office instead of going through a remote office. When attempting to place a long distance call through the remote office, the remote voice gateway sends a busy-back signal. What design change could be made to correct this situation? A. Use a different queuing mechanism B. Add capacity between the remote voice gateway and its PBX C. Add local PSTN trunk capacity D. Add WAN capacity between the local and remote voice gateways Answer: D QUESTION NO: 152 You are a network administrator at TestKing. TestKing is using VLSM in their network. Which three routing protocols would be suitable for TestKing s network? (Choose three) A. RIPv2 B. OSPF C. RIPv1 D. EIGRP E. IGRP F. BGP Answer: A, B, D QUESTION NO: 153 You are designing a network for TestKing. TestKing has a need for classless routing protocol. Which two routing protocols satisfy these requirements?(choose two) A. RIPv1 B. OSPF C. IGRP D. EIGRP E. TFTP Answer: B, D

84 QUESTION NO: 154 You are the administrator at TestKing. You are required to provide a unique VLAN for the sales group that is moving into your building. There are presently two other workgroups at this site with 80 users each. Both groups have a subnet out of a class B address with a mask. The sales group initially has 18 users, with a potential for growth to 24 users. The network uses EIGRP routing protocol. Which subnet mask should be used for efficient IP addressing that meets the requirement for the sales VLAN? A B C D Answer: C QUESTION NO: 155 A small state college is planning to improve the performance of their campus network, in particular the dorm network. Which information provided by the college is least relevant to the new design? A. Location of wiring closets B. Number of users C. Applications used D. Speed of the network Answer: A QUESTION NO: 156 Ipv4 has a range of private IP addresses to allow organizations to use freely, without consulting with any external IP address assigning authority. Which Ipv6 address type achieves the same purpose? A. Global Aggregatable addresses B. Anycast addresses C. Link Local addresses D. Ipv4 compatible Ipv6 addresses E. Site Local addresses F. Ipv4 mapped Ipv6 addresses Answer: E

85 IPv6 site-local addresses are equivalent to IPv4 private addresses. Source: CCDA Exam Certification Guide Second Edition, Page 544 QUESTION NO: 157 What are two threats associated with the remote access and VPN security modules in a SAFE network? (Choose two) A. Network mapping B. Identity spoofing C. DoS directed at exposed hosts D. Data transmission confidentiality E. DdoS directed at the network resources Answer: B, D QUESTION NO: 158 You are working with the large organization TestKing.com. TestKing has multi-vendor routers on three continents in a hierarchical structure. Which routing protocol would b most suitable? A. BGP B. OSPF C. EIGRP D. IGRP E. RIPv2 Answer: B QUESTION NO: 159 In an effort to enhance Internet performance, you decide to test a proxy server. You do this in your live network in order to generate the necessary traffic load. Which type of test is this? A. Pilot B. Simulation C. Conformance D. Prototype Answer: A

86 QUESTION NO: 160 Which two statements are true about network broadcasts? (Choose two) A. Broadcasts are restricted to ports with active, end-user devices. B. Broadcasts can be controlled through the use of VLANs C. Routers do not forward broadcasts D. Broadcasts don t occur at Layer 3 Answer: B, C QUESTION NO: 161 TestKing operates a chain of 50 video rental shires located in the Europe. They currently have a Point-of-Sale (I'OS) system in which each store posts its daily sales data and inventory changes to a central database through dial-up communication. There is no interaction between the stores and the central system during business hours. The central site runs on an Ethernet LAN. The only always-on WAN link is an Internet connection using wireless broadband to a local ISP. TestKing wants to enhance their service offering by creating a new E-Commerce web site where customers can browse and search a catalog of video titles and select the ones they want for rental. The system will instantly communicate the order to the nearest store where employees pull the order and hold it until the customer picks it up. The service must operate on a 24x7 basis. TestKing sees this new business strategy as a means to increase revenue and expand the business nationally. They see an opportunity to expand the web site in the future to video, DVD and music sales on a worldwide level. The company wants all stored to be connected to the central site through WAN links. The company is upgrading the central inventory database so that sales and rentals can be posted immediately in real-time. An Internet-based and instant-messaging system will be set up for all headquarters employees and store managers to use. TestKing believes that networking the stores will improve order fulfillment processes which will improve customer satisfaction and thus, boost revenue. It will also help communication with store employees. TestKing wants to upgrade the local LAN to a Gigabit and Fast Ethernet system to facilitate the demands of the new and upgraded systems. They have budgeted $500,000 for the networking equipment and another $10,000/month for the WAN charges including a faster Internet connection. They believe that 256Kbps speeds will be adequate to the stores. Since they have no staff capable of managing the new network, they will hire two engineers that already have the training and experience. The project must be complete in 6 months when the new inventory system goes online. The IT manager has concerns about the security of the servers and workstations on the network when all stores become connected. He doesn't want any Internet access to or from the stores. He is depending on you to recommend an effective yet affordable solution that will protect his system from intruders. Which two are business constraints imposed by the TestKing Video Company on this new network design project? (Choose two)

87 A. The $10,000/month WAN budget B. The installation of WAN links to all stores C. The lack of any existing IT staff D. Video sales through the global internet E. Real-time posting of store sales Answer: A, C QUESTION NO: 162 When designing converged networks, how is grade of service (GoS) used? A. In trunk capacity planning B. In reducing the need for QoS C. As a means of calculating dial peers D. As a mechanism for prioritizing H.323 traffic Answer: A QUESTION NO: 163 Which security function is performed in the Server Farm module of the Enterprise Composite Network Model? A. port security B. packet filtering C. private VLANs D. AAA controls Answer: Pending. Send your suggestion to feedback@testking.com

88 Section B Practice Questions CASE 1: FSI Test Equipment Incorporated: Precision test equipment manufacturing FSI manufactures high-end, high-volume semi-custom test equipment. Though the company only employs 150 people, sales revenue and profitability are very high because of niche market control and product price levels. Each piece of equipment is built to order and goes through rigorous testing and integration. As a result of market dominance, growth and profitability, company management has decided to make an initial public offering (IPO) of its stock. FSI has customers through out the world. Because their equipment integrates so tightly with customers high tech manufacturing systems, the company in reality becomes a partner with its customers during the design, manufacturing, and testing of the equipment. Purchase order to operational date cycles are typically one year and approximately five systems are in the development cycle at any gives time. Timely, accurate, and secure communications with the customer throughout the cycle is in imperative. Hardware design involves a significant number of CAD drawings to be stored and transmitted. Software development requires hundreds of thousands of lines of code for each customer. Though much of the code is reused, it nonetheless requires configuration and revision control for each customer. With funds raised from the IPO, FSI wants to improve its ability to interface, communicate and respond to its customers. It wants to implement secure FTP of code and drawings to its customer. Security is of utmost importance and therefore FSI is not sure if can trust the Internet to accomplish these transfers. Because of financial concerns, the company would much prefer the Internet to a private network if it can be convinced that the transfers can be made secure. Otherwise it will consider a private network. The company also would like to implement an inter-company workflow system for routing of electronic forms between FSI and its customers world-wide. Again, security is the issue. It would be wonderful if they can use the Internet for both these functions, but the new board of directors must be convinced. FSI offices are in San Jose, California. The project team assigned to customers has two sub-teams: the manufacturing and development team in San Jose, and the integration teams moves on site to the customers facilities. Communication is by telephone, , and even overnight package delivery. 25% of FSI employees (38-40) people are housed at customer sites at any given time. These field persons are in teams of approximately 8 people. A Novell PC LAN on Ethernet is established for each team within the customers facilities with a dial-up Internet connection using Livingston router for . In the San Jose office, FSI has two LANs with 80 PCs. The main LAN has 5 sun AutoCAD workstations that will use the test software, 20 Pentium UNIX engineering workstations for software development on one segment, and 50 office automation desktops running the Lotus Suite on another segment. These two LAN segments are connected to a Novell server with the two Ethernet cards as the only routing mechanism between the two. The second LAN has five processes monitoring an analysis PCs that collect and analyses the test data. This data is accesses continuously by the engineering staff from their workstation

89 The two LANs are networked with a third Internet card in the Novel server. Engineering staff is frequently frustrated with the performance across this link. You have been asked to provide a design and justification for an intranet/internet bases solution that will convince the board of directors that the solution is viable and secure. CASE 2: EIC Satellite Systems: Digital satellite television programming sales EIC sells minidish satellite systems and television programs in central Europe. Its sales network comprises 10 company owned offices, 25 distributed sales and installation offices and a central office in Milan, Italy. In the central office 75 representatives provide 24 hour telephone support and order processing for programming changes. There are 200 employees in the central office with PCs running Microsoft Office in addition to telephone representatives. The company s order processing, billing, accounting and programming systems reside on a large AS400 system in Milan. The 10 company offices are connected to this system with 9600bps leased lines. 25 distributor offices dial in to the system twice a day to upload order and download installation work order. An Ethernet LAN with three Novel servers supports the 275 central office employees. On average, the 10 offices have 4 PCs connected via Ethernet with Microsoft Windows 95. The leased line in each office does not provide a touted connection but a serial connection of 5250 terminal emulation to the communication port on the PC. The 25distributer offices dial in to the three PC Anywhere remote control computers that run 5250 terminal emulation and scripts that download installation work orders and upload new account orders to the AS400. To reduce transaction processing coast EIC will implement intranet technology to replace the current data communication mode. A Web server will be installed on the AS400 with backend CGI that will interface to the order processing, billing and work order system. Java applets will be built for both remote PCs. EIC anticipates that these changes will allow it to handle twice the transactions without upgrading the AS400, while maintaining current transaction processing times. The company offices will be connected via ISDN routers using bonding between channels for the new browser-based applications. Similar browser-based connections will be accomplished for the distributor offices using a direct dial to the EIC Milan main office. Unless convinced otherwise, EIC intends to use the existing 9600bps lines for the routed connections. It is also desirable to provide an in Internet dial-up connections for customers to make their own configuration changes online and to order pay-per-view programming. Security for these transactions will be provided by secure Web transactions. Data transmission encryption is not necessary because these basically are secure Web-based credit card transactions. EIC would like a design and proposal from you to provide the networking for this new architecture that must be implemented in parallel with current operations. CASE 3 Orchard Leasing Corporation: Office building leasing and facilities management

90 Orchard Leasing is a contract leasing and facilities management company with headquarters in Denver, Colorado and offices in Houston, Texas, Atlanta, Georgia, Minneapolis, Minnesota, Chicago, Illinois. Orchard contracts with owners to provide leasing, maintenance and management of high-density office buildings and building complexes. A local office is maintained in one building in each of the cities. The company s superior service and creative and aggressive marketing has lead to very rapid growth in each of the Orchard s marketplaces. In fact, Orchard has just signed contracts for four buildings in London, England and three buildings in Frankfurt, Germany. However this growth has out stripped Orchard s ability to keep up with administrative tasks associated with business, and management is very concerned about its ability to continue to provide the same level of service, given the two new international contracts. Each of the offices has historically maintained its own operation center including a Windows NT file server with leasing, marketing, maintenance, and facilities management (including billing) software, as well as standard office productivity software provided by the WordPerfect suite. The business applications are all custom are all custom applications developed in Access and Visual Basic. Each office has an Ethernet network on 10BaseT cabling. The leasing and marketing software systems run on Apple Macintosh and maintenance and facilities management runs on Intel-based PCs. Typically, there are five PCs and two Macintoshes in an office. The Denver office has six PCs and three Macintoshes but will increase those numbers to ten PCs and six Macintoshes after the proposed upgrades. Data is consolidated monthly in an office report sent by via the Internet to the home office in Denver. This Internet connection is by way of local ISP on a dial up connection. With the addition of the London and Frankfurt offices, Orchard had decided to consolidate a

91 significant portion of administrative tasks in Denver. The lease administration, tenant billing, accounts receivable accounts payable, and master building records will all be consolidated in Denver. The marketing, maintenance, and office productivity software will continue to reside in the branch offices. The number of computers, servers and Macintoshes and PCs will remain the same as the branch offices but a new NT Server and the additional Macintoshes and PCs will be added in Denver. With this upgrade, Orchard will add Microsoft s Exchange with outlook for , scheduling, and contact management. The current branch office files servers will have less of a load and therefore Orchard believes they will be able to run Exchange Server and the existing server hardware with additional memory and disk space. Additionally, Orchard will be establishing a World Wide Web site in Denver to be used for marketing and communication to tenants. Orchards new chief financial officer (CFO), who has responsibility for computer and information systems, has requested competitive bids for a turn-key WAN to meet Orchards needs. High performance across a WAN is not seen as a priority. The communications that will occur between offices are back-office functions and are not time critical. Accomplishing the transmissions this morning rather then tomorrow is the level of criticalness. Minimising cost will take priority over unneeded performance. The CFO estimates that beyond , which will be normal, there will be a daily transmission of records for consolidation both to and from each office and Denver each day. These documents are approximately 2MB in size. CASE 4: Leviathan System s Inc: Business software development, publishing, and sales Traditionally, Leviathan has developed and sold AS400 business software solutions. In addition to its headquarter office, it had five sales offices in United States, a European office, and an Asian office. It is converting its software to Windows NT client/server technology using SQL Server as the database engine for the new project line. The offices are connected with a point-to-point SNA network with line speeds varying from 56k to a Frac T1. Token Ring is installed within the office for LAN applications. Each of the facilities is wired with Category 5 cable in an Intermediate Distribution Facility/Main Distribution Facility (IDF/MDF) design The company recently decided that it must completely convert the Token Ring to Ethernet. This conversion will first occur in the HQ facility and then in each of the branch offices. The conversion will occur one IDF at a time, that is, the Token Ring and Ethernet networks will coexist as work groups are converted. The client-server products will be added, but the AS400 product line will not go away. Therefore, SNA will be a fact of life for the foreseeable future. The customer prefers to have a single WAN but has decided to look at a frame relay solution to transport the client/server traffic and keep the SNA network intact. Some TCP/IP is in use, but only at the local LANs. The AS400s are connected to the Token Ring via a 5294 controller that provides the terminal server functions between the LANs and the AS400. Leviathan considers it too expensive and problematic to put the AS400 on Ethernet, so management would consider maintaining the AS400 on a small, four -node Token Ring network and put the rest of the company in Ethernet. There are terminals in the HQ office and the sales office, each has approximately 6PCs running 5250 terminal emulation, including the Europe and Asia offices. The 5250 terminals will be converted to PCs using the 5250 terminal emulation software. The HQ office also had 100 PCs and 5 Macintoshes (for production of marketing material and product

92 documentation). Additionally, there are two notebook computers in each sales office. These notebooks already use terminal emulation to dial into the AS400 for demonstrations and sales reporting. This dial-in functionality must continue to exist for the AS400 and must be provided for the new client/server products. There are four AS400 at the HQ office facility and one each in two if the US sales offices, the European office, and the Asian office. Four Windows NT servers will be located at HQ, and a small NT server in each of the sales offices. Most of the 100 PC s in HQ run 5250 terminal emulation, which utilizes NEtBIOS. Two NT Servers are at HQUESTION NO: Two additional servers will be installed for a total of four Windows NT Servers, two for development (a Digital Equipment Corporation Alpha and a Hewlett-Packard multiprocessor Pentium), one for Sales and Marketing, and one for all other support. Software development traffic to the AS400 occurs around the clock but peaks from 1 to 7 p.m. The development effort on the new product is expected to follow the same pattern. 15 new employees will be hired for this development effort. All other use of the network occurs in normal business hours. Leviathan will install an Internet server hosted on an additional Windows NT system. It will provide a World Wide Web presentation of Leviathan products and an FTP server to deliver product updates and fixes. It will also host a discussion group system and SMTP and POP3 servers for to customers and prospects. The site must provide secure FTP and a firewall to protect Leviathan internal systems. Leviathan has standardised Microsoft Office for office productivity and Microsoft tools for development of its new product line. Company is provided by a system on the AS400. This system will be converted to Microsoft Exchange, but not as a part of this project. The IS manager has asked for a design to connect all the offices to provide the Ethernet connectivity within the HQ office and to provide for the Internet firewall. QUESTION NO: 1 ISDN networks supports both. A. Synchronous and ADSL modems. B. Toll-connecting trunks and tie trunks. C. Terminal handlers and external PADs. D. Network termination 1 and network termination 2 devices. Answer: D QUESTION NO: 2 Which type of address is expressed as 12 hexadecimal digits, operates at the data link layer, and is burned into ROM by manufacturer? Answer: Mac QUESTION NO:

93 Which device is part of the customer network and initiates a Frame Relay communication exchange with the carrier network? A. DTE B. DCE C. DAS A. SAS Answer: A QUESTION NO: 4 When naming servers, it is recommended that you append the to the server name. A. Location B. IP address C. PC designation D. Segment designation Answer: B QUESTION NO: 5 Which type of ATM connection supports bi-directional communication? A. Multipoint B. Point-to-point C. Point-to-multipoint D. Point-to-point and point-to-multipoint Answer: B QUESTION NO: 6 View the Case Study for the FSI Test Equipment case study, what is a fact to consider in establishing the customer s acceptance criteria of the networks? A. Livingston routers are in use. B. Security is of utmost importance. C. Though code is reused, it requires configuration control for each customer. D. FSI must work in a partner -like framework while implementing the system. Answer: B QUESTION NO:

94 In the EIC Satellite Systems case study, it is not necessary to build the entire network to provide the network design meets the customer s needs. A. True B. False Answer: B QUESTION NO: 8 Exhibit: How will the transparent bridge manage traffic from node A to the other nodes? A. Forward traffic to all nodes. B. Broadcast traffic to all nodes. C. Filter traffic to nodes C and D and ignore traffic to node B. D. Filter traffic to node B and forward traffic to nodes C and D. Answer: A QUESTION NO: 9 The IP Routing Information Protocol (RIP): A. Includes MD5 authentication. B. Specifies no more then 15 hops between and stations. C. Handles the process of updating the Time To Live field in an IP header. D. Sends the network addresses and shored mask, as pad of the routing update. Answer: B QUESTION NO: 10 Which condition would result in recommending routing instead of switching? A. Many Ethernet collisions. B. Bandwidth utilisation over 40 percent on Ethernet. C. Many desktops protocols sending packets to find services. D. Excessive number of Ethernet run frames (shorter then 64 bytes) Answer: C

95 QUESTION NO: 11 Exhibit: Drag each ISDN interface type to its corresponding features. Drag and drop

96 Answer: QUESTION NO: 12 Which other type of network device operates in a manner similar to LAN switches? A. Transparent bridge B. Source route bridge C. Translational bridge D. Source route translational bridge Answer: A QUESTION NO: 13 What is NOT a business constraint (or limitation) on a project? A. Documenting the timeline for this project. B. Documenting the names and types of new protocols. C. Documenting the budget and resources available for this project. D. Identifying any network staffing requirement such as hiring or training. Answer: B QUESTION NO: 14 As stated in the FSI Test Equipment case study, which statement is a business-related issue that affects the network design?

97 A. Timely, accurate, and secure communication with FSI customers is imperative. B. The network must provide bandwidth to support large CAD and engineering files and data. C. In order to accomplish the onsite work required of the field team, a Novell LAN is installed at each customer site. D. The CAD and engineering workstations are maintained on a separate LAN segment because of the importance of consistent high performance of the systems. Answer: A QUESTION NO: 15 View the Case Study. Which statement is true with regard to development of a detailed network design drawing for Orchard Leasing? A. The routers required at each Orchard location should be identified. B. The Domanin Name System server should be identified. C. Information on the exact model and features of each AS400 will be required. D. Based on the software development efforts at Orchard, the Catalyst 3500 Series switch is a good choice for Ethernet Switching. Answer: A QUESTION NO: 16 View the Case Study. Which statement is true with regard to development of a topology map FSI Test Equipment? A. A FastHub 400 will be required for desktop switching. B. IPX support will be required at the headquarters location. C. At each of FSI s locations, a router providing Ethernet and WAN support is required. D. The Cisco 3640 is a good router choice because it supports both Ethernet and Token Ring. Answer: B

98 QUESTION NO: 17 Which to statements about FDDI are true? (Chose two.) A. Token passing controls media access. B. All attached devices must be connected to both rings. C. The dual rings wrap on either side of a ring failure or device failure. D. The secondary ring provides additional bandwidth during heavy traffic. E. Multimode fibre allows greater network diameters than single mode fibre Answer: A, C QUESTION NO: 18 When will a Token Ring station send a beacon frame? A. When the station is powered up. B. When the station is powered down. C. When the station has priority for the token. D. When the station detects a problem with the network. Answer: D QUESTION NO: 19 Which two Apple Talk protocols are Data Link layer protocols? (Chose two.) A. Zone Talk B. FDDI Talk C. Cable Talk D. Local Talk Answer: B, D QUESTION NO: 20 Which task is the second step in building a prototype network structure to prove to a customer that your design works? A. Develop a detailed test plan. B. Gain an understanding of what your competition plans to propose. C. Determine any new customers requirements that affect your design. D. Determine how much of the network structure must be built to prove the design concept. Answer: D

99 QUESTION NO: 21 At which layer of the OSI reference model do bridges and switches operate? A. Session layer B. Network layer C. Physical layer D. Data Link layer E. Transport layer F. Application layer G. Presentation layer Answer: D QUESTION NO: 22 What is the maximum connection speed supported by the X.21 BIS protocol? A. 5.6Kbps B. 19.2Kbps C. 28.8Kbps D. 33.3Kbps Answer: B QUESTION NO: 23 What is an advantage of virtual LAN s (VLANs)? A. Broadcast control B. Small bandwidth domains C. Support discontiguous subnets D. Easy mapping of network-layer addresses to data link-layer addresses Answer: A QUESTION NO: 24 Which technology would you choose for a cost-effective mesh network? A. PPP B. ISDN C. SONET D. Frame Relay

100 Answer: D QUESTION NO: 25 What is the role of secondary station in the SDLC protocol? A. A secondary station provides fault tolerance for a primary station. B. A secondary station enables communication for remote devices when polled by a primary station. C. A secondary station initiates communication with primary station when remote devices are ready to communicate. D. Each station can be either a primary or secondary station. The primary station is the station that initiates communications, and the secondary is receiving station. Answer: B QUESTION NO: 26 Your customer specified that the IP routing must adhere to recent industry standards and must scale to support a large network. Which routing protocol will you recommend to your client? A. RIP B. EGP C. IGRP D. OSPF Answer: D QUESTION NO: 27 Which statement is NOT true about Frame Relay? A. A Frame Relay connection is identified by DLCI. B. Frame Relay is based on the IEEE standard for metropolitan-area networks. C. Frame Relay uses FECN to tell a receiving DTE that a message experienced congestion. D. At the customer s site there is a single electrical interface that appears to be many distinct interfaces to other sites. Answer: B QUESTION NO: 28 The classic firewall system has three specialized layers. What is NOT one of three layers? A. An integration LAN that buffers between the corporate internetwork and the outside world. B. A router that acts as an inside packet filter between the corporate internetwork and the isolation LAN

101 C. A router that acts as an outside packet filter between the isolation LAN and the outside internetwork. D. An isolation LAN (or demilitarized zone) that it buffer between the corporate internetwork and the outside world. Answer: A QUESTION NO: 29 What is NOT a system for authenticating users? A. SLIP B. RADIUS C. TACACS D. Kerberos Answer: A QUESTION NO: 30 View the Case Study. Orchard Leasing has just informed you that is has been reading about router security breaches of companies with Internet access. They have decided to purchase a firewall product that prevents hackers from seeing the internal IP addresses. The company feels a firewall will provide a more secure environment. When provisioning a firewall for the Denver office, which class of products would best fit for Orchard Leasing s needs? A. Cisco 1600 Series router B. Cisco 3600 Series router C. Cisco Secure PIX Firewall D. Catalyst 4000 Series switch Answer: C QUESTION NO: 31 WAN protocols can operate at three layers of the OSI reference model. What are they? (Choose three.) A. Session layer B. Network layer C. Physical layer D. Transport layer E. Data Link layer F. Application layer G. Presentation layer Answer: B, C, E

102 QUESTION NO: 32 Which LAN switching feature is unique to cut through switches? A. CRC checking. B. Reduced latency. C. Higher port density. D. Frame length validation. Answer: B QUESTION NO: 33 Which two problems can occur when transparent bridges are started on a network? A. Bridge tables become inaccurate. B. Packets returned are undeliverable. C. Broadcast storms disable all network communications. D. Duplicate data appears on remote network computer screens. Answer: A, C QUESTION NO: 34 Which two routing protocols does NetWare use? A. RIP B. IGRP C. RTMP D. NLSP Answer: A, D QUESTION NO: 35 How do Apple Talk nodes receive their node addresses? A. Nodes request their configuration from a DHCP server. B. Nodes choose random addresses to start up and test for conflicts. C. MAC addresses in each node are used for the node address, and a router assigns the network address. D. Node addresses are assigned during software configuration and a router assigns the network address. Answer: B

103 QUESTION NO: 36 What is a TE2 device used for in an ISDN connection? A. Connecting an NT2 device to an NT1 device. B. Connecting a non-isdn terminal to ISDN through a TA. C. Connecting four-wire subscriber to two-wire loops. D. Connecting to ISDN through a four-wire, twisted-pair digital link. Answer: B QUESTION NO: 37 For which two protocols was the enhanced IGRP protocol developed to improve? (Choose two) A. RIP B. BGP C. OSPF D. RTMP E. NLSP F. IGRP Answer: A, F QUESTION NO: 38 Which data is analysed before a Layer 2 LAN switch passes data to other ports? A. MAC address. B. Network address. C. MAC address and network address. D. Protocol type, MAC address, and network address. Answer: A QUESTION NO: 39 When should SAP filters be applied to NetWare service advertisement messages? A. Before convergence of all network routers. B. Whenever services will not be used in a particular area. C. After all services have been advertised for 30 minutes. D. After there has been no change in network services for 30 minutes. Answer: B

104 QUESTION NO: 40 What is the first step in designing network layer addressing and naming for a network? A. Design route summarisation (aggregation). B. Design a method for mapping geographical locations to network numbers. C. Design a hierarchy for addressing autonomous systems, areas, networks, subnetworks, and end stations. D. Design a plan for distributing administrative authority for addressing and naming at the lower levels of the hierarchy. Answer: C QUESTION NO: 41 Which routed WAN protocol solution would you recommend for Orchard Leasing? A. IP only. B. IP and IPX. C. IP and IPX only. D. IP, IPX and Apple Talk. Answer: A

105 QUESTION NO: 42 Match Link State and Distance Vector to their correct descriptions. Drag and Drop

106 Answer: QUESTION NO: 43 For which two types of traffic are line connection-oriented services most useful? (Choose two) A. Data B. Video C. Voice D. Broadcast messages Answer: B, C QUESTION NO: 44 Which protocol uses both bandwidth and delay as a path metric? A. RIP B. EGP C. OSPF D. IGRP Answer: D

107 QUESTION NO: 45 View the Case Study. For the proposed network for Orchard Leasing, which router would be the best choice for the Denver site? A. Cisco 1600 Series B. Cisco 1700 Series C. Cisco 3600 Series D. Cisco 7200 Series Answer: C

108 QUESTION NO: 46 Drag each information format to the layer of the OSI reference model where it is used. Note: Some of the OSI Model layers will not be used. Drag and drop

109 Answer: QUESTION NO: 47 When comparing the advantages and disadvantages of a full mesh versus a partial-mesh Frame Relay design. Which statement is most accurate? A. Split horizon limits connectivity in a full mesh. B. A full mesh is more expensive due to more routers. C. Broadcast copying overhead is higher in a partial mesh. D. A partial mesh is less expensive due to fewer virtual circuits. Answer: D QUESTION NO: 48 What is one advantage CHAP has over PAP? A. CHAP is an IETF standard. PAP was never standardised

110 B. With CHAP, an intercepted challenge response cannot be replayed to gain access. C. CHAP can be exported from the United States to other countries. PAP cannot be exported. D. With CHAP, passwords must be stored on a separate server in an encrypted database or file. Answer: B QUESTION NO: 49 Which network design is commonly used to support remote offices accessing the central headquarters of a company? A. The central site has a fractional T1 connection and each remote site has a full T1 connection to the central site. B. Each remote site has a router with one ISDN BRI and the central site has a router with ISDN PRI. C. The central site has a multiservice WAN ATM switch that offers personal communication services to the remote sites. D. The central site uses a hub and spoke topology including an Ethernet concentrator that has multiple WAN interfaces. Answer: B QUESTION NO: 50 View the Case Study. What regard to network capacity in the Leviathan System case study, statement is true? A. The terminal emulation traffic is well understood, and is not a capacity issue. B. A prototype must be developed to demonstrate the adequacy of security between offices. C. Because we do not have information on the disk storage in the servers, we know almost nothing regarding network capacity. D. Because little is known about the true load from the software developers, it would be a good idea to monitor this area during a phased implementation. Answer: D QUESTION NO: 51 Which statement about CRC is true? A. The CRC protocol specifies error correction functions. B. The CRC value determines the sequence in which the destination station should reassemble received packets. C. The sending station and destination station agree on CRC values before the first data packet is transmitted

111 D. If the sending station and destination station both calculate the same CRC value, the packet is considered valid. Answer: D QUESTION NO: 52 A channel exceeds the agreed bandwidth usage scone. How does the ATM QOS policing feature respond? A. Terminates the virtual path. B. Suspends communications for 50 ms. C. Reduces the size of the cell window. D. Makes data cells eligible for discarding. Answer: D QUESTION NO: 53 Which three layers of the OSI reference model are addresses by the ITV-T ISDN standards? (Chose three.) A. Session layer B. Network layer C. Physical layer D. Transport layer E. Data Link layer F. Application layer G. Presentation layer Answer: B, C, E QUESTION NO: 54 Which layer of the OSI model corresponds to the functions performed by TCP? A. Physical layer. B. Data Link Layer. C. Network Layer. D. Transport Layer. E. Session Layer. F. Presentation layer. G. Application layer. Answer: D QUESTION NO:

112 View the Case Study. Which statement is true with regard to development of a detailed network design drawing for EIC Satellite Systems? A. The ISP DNS should be used. B. A router will be required at each EIC-owned location. C. Information on the exact model and features of the AS400 will be required. D. Based on the number of server at EIC catalyst 2900 series XL switch is a good choice for Ethernet switching Answer: B QUESTION NO: 56 View the Case Study. In the Leviathan System case study, which WAN protocol would be the best choice for connecting the sales offices with the main office? A. X25 B. ISDN C. Leased Line D. Frame Relay Answer: D QUESTION NO: 57 View the Case Study. In the Leviathan Systems case study, it is NOT necessary to build the entire network to prove the network design meets the customer s needs. A. True B. False Answer: A QUESTION NO: 58 View the Case Study. In the FSI Test Equipment case study, which criterion would indicate that the prototype is a success? A. Speedy response. B. Speedy AS400 application response time. C. Fast office productivity application response. D. File Transfer of CAD drawings within a given time frame. Answer: C

113 Engineering staff is frequently frustrated with the performance across this link. This was a concern Not D: As far as file transfer is concerned, speedy was not issue. Secure was. QUESTION NO: 59 How does a hold-down prevent routing loops? A. It prevents routers from counting-to-infinity. B. It prevents routers from propagating outdated routing information. C. It blocks redundant paths through the internetwork until the primary path should fail. D. It prevents routers from sending routing information learned from a neighbouring router back to the neighbouring router. Answer: B QUESTION NO: 60 Which OSPE entity can connect to another autonomous system? A. ABR B. ASBR C. Backbone router D. Designated router Answer: B QUESTION NO: 61 View the case study. Diagramming application information flow for the FSI Test Equipment case study is important because: A. It will help identify media requirements. B. It will help identify applications to eliminate. C. It will help identify potentially heavy traffic paths. D. It will help identify the requirements that an ISP must meet. Answer: C QUESTION NO: 62 For the Leviathan Systems case study, what would most likely be your first step when your diagram the packet flow of the 5250 terminal emulation application over the network?

114 A. Identify the router products to be used in the system. B. Identify any bottlenecks in the current 5250 data stream. C. Identify the media to be used in each path of the traffic flow. D. Identify the location of all user and nodes that will use the 5250 emulation. Answer: D QUESTION NO: 63 View the case study. In diagramming the packet flow for the new application at EIC Satellite Systems, which benefits of the new network would you bring to EIC s attention? A. The router at Milan will be a single point of failure. B. Three dial-in connections will not be sufficient for the future. C. The new network will provide access to the Internet for the AS400s. D. The new network can provide a redundant path through the Internet to reach the AS400. Answer: D Q64 Which statement does not specify an application requirement that affects your network design? A. Listing the names and types of applications. B. Identifying peak hours of usage of new applications. C. Appraising the security risk to determine how much security will be needed. D. Documenting the number of users who will use new applications and protocols. Answer: C QUESTION NO: 65 When is the route to a node on remote ring determined in an SRB Token Ring network? A. Before data is sent. B. When the data arrives as the first source route bridge. C. When the Spanning-Tree Protocol responds to a route request. D. As the data passes through intermediate source route bridges. Answer: A QUESTION NO:

115 Which Cisco IOS queuing implementation looks at the size of messages and ensures that high volume senders do not crowd out low volume senders? A. Priority queuing. B. Custom queuing. C. Waited fair queuing. D. WAN Jacob queuing. Answer: C QUESTION NO: 67 As stated in the Leviathan systems case study what is not a requirement for network? A. Support software development traffic. B. Support server to server traffic between offices. C. Reduce transaction processing costs on the AS400. D. Provide sufficient through put to support terminal emulation. Answer: C QUESTION NO: 68 Which statement identifies an FSI test equipment schedule constraint? A. FSI has customers throughout the world. B. The typical implementation of a system is one year. C. FSI feels that an Internet-concentrated design will save time and money. D. 25% if the FSIs employees are housed at customer s offices at any given time. Answer: B QUESTION NO: 69 How do SNMPv1 Network Management Systems request multiple records from an MIB? A. The NMS uses the Dump protocol operation. B. The NMS uses the GetMib protocol operation. C. The NMS uses the GetBulk protocol operation. D. The NMS uses multiple Get and GetNext protocol operations. Answer: D

116 QUESTION NO: 70 Both distance vector and link-state routing protocols converge more quickly if there is: A. Redundancy in the network topology. B. Route redistribution between protocols. C. Consistent use of the Network Time Protocol (NTP) D. Consistent use of the Time To Live field in the IP header. Answer: A QUESTION NO: 71 Which address is NOT reserved for private internets by the Internet Assigned Numbers Authority (IANA): A B C D Answer: B QUESTION NO: 72 SNMP agents are: A. ISO officials who periodically perform audits on companies running target SNMPmanaged networks. B. Applications designated to monitor the activity of SNMP management systems and alert the user in the event of a problem. C. Software modules running in managed devices whose function is to make information about the device available to the NMS. D. Computers dedicated to the task of querying SNMP devices for relevant information and cataloging that information in a database. Answer: C QUESTION NO: 73 Which statement is NOT true about OSPF? A. OSPF is defined by the EIFF in a set of RFCs. B. OSPF is an interior routing protocol that uses DUkstra s algorithm. C. OSPF was designed to replace EGID because of scalability issues with EGID in the Internet. D. OSPF is usually implemented in a hierarchy including areas connected to a backbone area

117 Answer: C QUESTION NO: 74 Before making network design recommendations you need to characterise the existing network s availability and performance. As a general guideline a shared Ethernet segment should not be saturated that is the work utilisation should be no more than? A. 20% B. 30% C. 40% D. 70% Answer: C QUESTION NO: 75 View the case study. For the Leviathan Systems case study, what is a fact to consider in establishing Leviathan s acceptance criteria of the new network? A. The AS400 systems must continue to be supported. B. The Token Ring and Ethernet LANs must coexist on the existing cabling system for a short period. C. Leviathan will hire 15 new employees, and at least 1 development server must be operational prior to their start. D. The company will use an Internet site for World Wide Web, FTP, and discussion groups to improve communications to its customers. Answer: A QUESTION NO: 76 Proactive management means all of the following except: A. Monitoring the network. B. Collecting statistics and watching trends. C. Troubleshooting and resolving network problems. D. Allocating sufficient staff time and hardware and software resources. Answer: C QUESTION NO:

118 Which three protocols are derivates of the SDLC protocol? (Choose three). A. SIP B. PLP C. QLLC D. HDLC E Answer: C, D, E SDLC was the first protocol out at layer 2. Afterwards we got HDLC and Ethernet at layer references Ethernet encapsulation at layer 2. QLLC is also layer 2. PLP is layer 3. QUESTION NO: 78 Which two services does the OSPF Hello protocol provide? (Choose two). A. It discovers neighbour routers. B. It helps to elect a designated router. C. It solicits routers from neighbour routers at startup. D. It allows administrators to test for network connectivity between two devices. Answer: B, C QUESTION NO: 79 You are setting up an ATM network, which ATM Adaptation layer type should you use to support the voice circuit emulation? A. AAL.1 B. AAL.2 C. AAL3/4 D. AAL.5 Answer: C QUESTION NO: 80 How does a transparent bridge learn which nodes connect to which bridge interfaces? A. It examines the source MAC addresses used in network traffic on each interface. B. It examines the source network addresses used in network traffic on each interface. C. It sends explorer packets out whenever an unknown node is specified as on destination. D. It broadcasts hello packets to all nodes on each interface and records addresses included in response packets

119 Answer: A QUESTION NO: 81 Which two statements regarding DLCIs are true? (Choose two) A. DLCIs are not necessary unique. B. DLCIs are not necessary with PVCs. C. DLCIs initiate a Frame Relay communication exchange. D. DLCIs are logical identifiers for Frame Relay virtual circuits. E. DLCIs are carries equipment and sit at the border of the carrier and customer networks. F. DLCIs are customer equipment and sit at the border of the carrier and customer networks. Answer: A, D QUESTION NO: 82 Isolating requirements for fault management. accounting management, configuration management, and performance management would fall under which customer requirement? A. Identifying business constraints. B. Identifying security requirements. C. Identifying performance requirements. D. Identifying manageability requirements. Answer: D QUESTION NO: 83 What is NOT a feature of access management? A. Encryption B. Physical security C. User passwords D. Packets filtering Answer: B QUESTION NO: 84 What is the purpose of the apple talk AARP protocol? A. To update apple talk routing tables. B. To map networks or nodes to zones. C. To test for remote node availability. D. To map Apple Talk addresses to physical addresses

120 Answer: D QUESTION NO: 85 In the following example, the Class B network number of was divided into the following four areas: Backbone North Campus Central Campus South Campus The of the third octet can be used to identify the area. A. First bit B. First 2 bits C. First 3 bits D. Last 6 bits Answer: B QUESTION NO: 86 In the Leviathan Systems case study, what is an identified business-related issue that affects the network design? A. The AS400s will continue to be maintained on Ethernet. B. The company will discontinue using the AS400 product line. C. The company will use an Internet Web site for the World Wide Web, FTP, and discussion groups. D. The company will be rolling out a new hardware product that uses Windows NT client/server technology. Answer: A QUESTION NO: 87 Which protocol does not cause the scalability constraints and issues associated with distance vector routing protocols? A. OSPF B. IP RIP C. IP IGRP D. AppleTalk RTMP Answer: A

121 QUESTION NO: 88 When broadcast and multicast are more then approximately of the traffic on LAN, performance degrades? A. 10% B. 20% C. 30% D. 40% Answer: B QUESTION NO: 89 According to RFC 1918, these blocks of addresses are allocated for private networks. What is NOT a range of private addresses as identified in RFC 1918? A B C D Answer: D QUESTION NO: 90 In the Orchard leasing case study, there will be server (s) that will be used for the Denver business applications? A. 1 B. 2 C. 4 to 5 D. 8 or more Answer: B QUESTION NO: 91 In the FSI test equipment case study is it not necessary to build the entire network to improve the network design meets customer s needs. A. True B. False Answer: A

122 QUESTION NO: 92 Which condition does NOT create LAN media problems? A. Protocols that do not scale well. B. Excessive numbers of collisions on Ethernet networks. C. Long waits for the token on Token Ring or FDDI networks. D. Too many devices contend for access on a LAN segment. Answer: A QUESTION NO: 93 What are the five areas of network management as outlined by the OSI network management model? (Choose five.) A. User management B. Fault management C. Routine management D. Security management E. Accounting management F. Application management G. Performance management H. Configuration management Answer: B, D, E, G, H QUESTION NO: 94 For the EIC Satellite Systems case study, what is a fact to consider in establishing EIC acceptance criteria of the new network? A. EIC intends to use a single PRI in Milan. B. Memory will have to be added to the AS400 C. A web server will be installed on the AS400 D. Some of the distributors use Apple Macintoshes Answer: C QUESTION NO: 95 Use Cisco IOS network encryption if router utilization is or lower. A. 10% B. 40% C. 60% D. 80% Answer: A

123 QUESTION NO: 96 In the Leviathan Systems case study, Leviathan s management expressed the need for the network to operate fully when the Vice President of Development begins to bring in his new developer staff. In order to phase in the new system, what would be the most logical first step? A. Completely install and test the network in the new building before the move. B. Bring the developers LAN online and test it. Then phase in the rest of the network. C. Convert the sales offices one at the time and connect them to the Frame Relay network. D. Install and test a Cisco 3600 series router that connect the AS400 Token Ring and the SNA network. Then install and test the developers network. Answer: B QUESTION NO: 97 Drag each network device to its corresponding function. Task: Drag and drop

124 Answer: QUESTION NO: 98 In which two situations is static routing often useful? (Choose two.) A. In a stub network. B. In a non-switched environment. C. In a dial-on-demand configuration. D. When internetwork topology frequently changes. E. When there are multiple paths to a destination. Answer: A,C QUESTION NO: 99 In the FSI Test Equipment case study, you discover that the most critical issue is secure, timely communications with the field sites over the Internet. Which possibility would you include in a prototype lab to convince the board of the acceptability of the Internet solution? A. Order and install the WAN circuits in the prototype lab. B. Purchase and install the Internet firewall in the prototype lab. C. Order and install a remove access server in the prototype lab. D. Purchase and install the Ethernet switch designed into the headquarters LAN. Answer: B

125 QUESTION NO: 100 View the case study. Which task would you complete to identify Leviathan System s organisational objectives that will affect your network design? A. Identify and document Leviathan s internal data-flow patterns. B. Identify and document Leviathan s existing technology instrument. C. Identify and document the technical competencies of the support staff. D. Identify and document the business objectives, schedule requirements, and political Issues. Answer: D QUESTION NO: 101 To help reduce the complexity associated with identifying and analysing customer problems and designing solutions, Cisco has developed a basic framework into which most customer problems fit. The framework is a triangle that contains the following components: A. Protocols, Transport, and Media B. Transport, Media, and NetManagement C. Media, Protocols, and NetManagement D. Protocols, Transport, and NetManagement Answer: A QUESTION NO: 102 How does the Spanning-Tree Protocol prevent bridging loops? A. It disable all ports on bridges that could create loops. B. It selectively disables bridge ports that could create loops. C. It clears the bridge table on bridges that would create loops. D. It blocks access to bridge table on bridges that would create loops. Answer: B QUESTION NO: 103 When regard to network security in the Leviathan Systems case study, which statement is true? A. The network must protect the AS400s from unauthorised access

126 B. A prototype must be developed to demonstrate the adequacy of security. C. The Internet site could be implemented and security completely tested as a separate phase without creating a risk for other phases. D. Network-level encryption is a requirement. You should encourage the customer to implement a test lab to verify the security of data transmissions. Answer: C QUESTION NO: 104 With regard to network capacity in the EIS Satellite Systems case study, which statement is true? A. The AS400 access and usage patterns are well understood and do not represent a capacity issue. B. A prototype must be developed to demonstrate that the intranet technology will in fact work for EIC. C. Because we do not have information on the disk storage in the servers, we know almost nothing regarding network capacity. D. Because little is known about the true load from the sales offices, it would be a good idea to monitor this area during a phased implementation of a single site. Answer: D QUESTION NO: 105 Before making network design recommendations, you will characterise the existing network s availability and performance. As a general guideline, the response time should generally be less then. A. 1 second B. 50 microseconds C. 25 microseconds D. 100 milliseconds Answer: D QUESTION NO: 106 Which device initiates a session in an X.25 network? A. DTE B. DCE C. PSE D. PAD Answer: D

127 QUESTION NO: 107 In the Leviathan Systems case study, which statement describes the performance characteristics of the existing network? A. NetBIOS is overloading the existing WAN circuits. B. Apple Talk and SNA traffic is overloading some LAN segments. C. The 56-kbps circuits have proven to provide sufficient throughout. D. The customer has not identified performance issues in the current network. Answer: D QUESTION NO: 108 View the case study. Which statement characterises Orchard Leasing s current network? A. Windows NT servers are on the LAN at each site. B. The anticipated company growth will most likely outstrip the capacity of the current systems. C. The bottlenecks in the existing network compelled Orchard to decide to consolidate functions. D. The marketing department will be developing new customer communication models using the Internet. Answer: A QUESTION NO: 109 When determining whether a customer will see major performance enhancements by moving from a hubbed Ethernet environment to a switched Ethernet environment, which step should you take first? A. Investigate the level of collisions. B. Investigate the level of broadcasts. C. Investigate whether the hubs support auto-partitioning. D. Investigate the token-holding timer use by network stations. Answer: A QUESTION NO: 110 The hierarchical model distribution layer can serve many functions. What it NOT a function of the distribution layer? A. Broadcast/multicast domain definition

128 B. Routing between virtual LANs (VLANs). C. Providing workgroup/users access to the network. D. Demarcation between static and dynamic routing protocols. Answer: C QUESTION NO: 111 When responding to a Request for Proposal (REP), which section should you direct at the key decision makers in a company to clearly articulate your strategy for the project? A. Summary. B. Design Solution. C. Executive Summary. D. Design Requirements. Answer: C QUESTION NO: 112 SNMP uses traps to. A. Systematically isolate points of failure in the managed network. B. Prevent unauthorised users from performing set operations to alter management information. C. Allow managed devices to report specific significant events to the NMS whenever they occur. D. Allow network administrators to monitor specific protocol traffic information by selective filtering. Answer: C QUESTION NO: 113 What is not an advantage of using private Internet addressing? A. It increases an enterprise s flexibility to access the Internet. B. It conserves the globally unique address space by not using it where global uniqueness it not required. C. It enables operationally and administratively convenient addressing schemes as well as easier growth paths. D. It allows enterprises to gain flexibility in network design by having more address space at their disposal than they could obtain from the globally unique pool. Answer: D

129 QUESTION NO: 114 In Leviathan Systems case study, which statement indicates an acceptable approach to demonstrate that the proposed design meets the customer s need for performance, security, capacity, and scalability? A. A phased in approach would work well with this network design. B. A detailed prototype of the network should be tested first before any installation. C. The entire network needs to design, installed, and tested before any users are permitted to work on the network. D. The legacy network should be removed first, then all new components of the network need to be installed and tested before any users are permitted to work on the network. Answer: A QUESTION NO: 115 Which statement identifies a business constraint for Orchard Leasing. A. Some TCP/IP is in use in the current system. B. Microsoft Exchange has been selected as the system. C. Orchard has decided to consolidate a significant portion of the administration on Denver. D. Orchard has decided to keep the NT servers, Macintoshes, and PCs in the field offices. Answer: C QUESTION NO: 116 As a guideline, none of the network segments should have more then broadcasts/multicasts. A. 5 percent B. 10 percent C. 20 percent D. 35 percent Answer: C QUESTION NO: 117 In the Orchard Leasing case study, what is a performance requirement and constraint of Orchard? A. Reduced transaction processing costs. B. Support software development traffic. C. Sufficient through put in router for terminal emulation. D. Adequate WAN performance for the transmission of daily, non-critical documents and normal

130 Answer: A Minimising cost will take priority over unneeded performance is a statement from the Case Study. Not C: The Case Study does not speak about AS 400 or terminal emulation at all. QUESTION NO: 118 In the FSI test equipment case study, there will be users who will be using test analysis software. A. 5 B. 20 C. 50 D. 150 or more. Answer: A The main LAN has 5 sun AutoCAD workstations that will use the test software QUESTION NO: 119 Which application and positioning statement best describes the Catalyst 1900 series switch? A. Workgroup stackable with WAN option. B. Scandalous, low cost switch for 10BaseT. C. Multiplayer, multiple 1, pn, backbone switch. D. Stackable, high performance workgroup switch. Answer: B QUESTION NO: 120 View the Case Study. EIC figure2, taken from the EIC Satellite System case study, represents. A. packet flow. B. Business system packet flow. C. A high-level topology of the customer s current network. D. A high-level topology of the customer s proposed network. Answer: C

131 QUESTION NO: 121 View the Figure and Case Study. Orchard Figure 1 from Orchard Leasing case study represents: A. A high-level topology of the customer s current network. B. A detailed topology of the customer s proposed network. C. packet flow and business application packet flow. D. A high-level topology of the customer s proposed network. Answer: A (or B)? The exhibit is missing so it is hard to tell. QUESTION NO: 122 View the case study. Which application will only be using IP for Orchard Leasing case study? A. WordPerfect Suite B. World Wide Web server C. Local business applications D. Denver business applications. Answer: B QUESTION NO: 123 How do NetWare clients use NetWare services? A. NetWare clients must use computers designed for NetWare. B. NetWare clients must use applications designed for Netware. C. NetWare clients must use special utility programs to access network services. D. Access to services is transparent. Services appear to be provided by client computers. Answer: D QUESTION NO: 124 Which statement is true about network security policies? A. End users do not need training on network security. B. Security policies should be bases on an understanding of which company assets are most valuable. C. Security systems should be designed to maximise the number of secrets, for example, passwords and encrypt ion keys. D. A company that has an inflexible security policy that is hard to change is less vulnerable then a company with a flexible policy

132 Answer: B QUESTION NO: 125 Many technologies have been developed to support remove access. Which statement is true about the design goals of the different technologies? A. ADSL was designed to support analog transmission of voice, video, and data. B. Frame Relay was envisioned as a reliable alternative to dedicated leases lines. C. X.25 was designed for simplicity and cost effectiveness when the physical layer is reliable. D. High speed digital leases lines were developed to minimise overhead Franc on WAN circuits. Answer: B QUESTION NO: 126 When writing a Request for Proposal (RFP), which section should you use to describe your recommended solution and the features and benefits it provides? A. Summary. B. Design Solution. C. Executive Summary. D. Design Requirements. Answer: B QUESTION NO: 127 As stated in the Leviathan Systems case study, what is not a requirement for the network? A. Support software development traffic. B. Support server-to-server traffic between offices. C. Reduce transaction processing costs on the AS400. D. Provide sufficient throughput to support terminal emulation. Answer: C QUESTION NO: 128 Which two metrics can IGRP use when selecting a route? (Choose two). A. Hops. B. Link cost

133 C. Bandwidth. D. Reliability. Answer: C, D QUESTION NO: 129 What is the name of the NetWare protocol that advertises NetWare services? Answer: Sap QUESTION NO: 130 Which LAN protocols are used in the Leviathan Systems case study? A. TCP/IP and IPX B. TCP/IP and NetBIOS C. TCP/IP, NetBIOS, and SNA D. TCP/IP, NetBIOS, and Apple Talk Answer: C QUESTION NO: 131 Which Ethernet encapsulation types are supported in Netware networks? A. Novel 802.2, 802.3, 802.5, and Ethernet II. B. Novel 802.2, 802.3, 802.5, and Ethernet SNAP. C. Novel 802.2, 802.5, Ethernet II, and Ethernet SNAP. D. Novel 802.2, 802.3, Ethernet II, and Ethernet SNAP. Answer: D QUESTION NO: 132 When would you advise a customer to use static routers? A. Use static routes when scalability is important. B. Use static routers when bandwidth utilisation is not a problem. C. Use static routers from a central core network to a leaf network. D. Use static routers on Layer 2 forwarding devices such as LAN and ATM switches. Answer: C

134 QUESTION NO: 133 View the Case Study. Which statement is true with regard to development of topology for Orchard Leasing? A. Dial-up requirements must be further developed. B. A router will be required at each Orchard location. C. Each Windows NT server is maintained at each site. D. Information on the exact model and features of each NT server hardware will be required. Answer: B QUESTION NO: 134 LAPB is a denotative of the SDLC protocol. Which three LAPB features are supported by SDLC? (Choose three) A. Frame type. B. Frame format. C. Field functions. D. ABM transfer mode. Answer: A, B, C QUESTION NO: 135 Which statement is true with regard to development of topology map for Leviathan Systems? A. NetBIOS and Apple Talk support will be required at the headquarters location. B. To support to headquarters LAN needs, Ethernet, Token Ring, and SNA switching is required. C. To support the software development efforts to Leviathan. Ethernet and Token Ring switching is critical. D. At the headquarters location and at most of the sales offices, a router providing Ethernet, Token Ring, and WAN support is required. Answer: D QUESTION NO: 136 Proactive network management means all of the following except: A. Monitoring the network. B. Collecting statistics and watching trends. C. Troubleshooting and resolving network problems. D. Allocating sufficient staff time, and hardware and software resources

135 Answer: C QUESTION NO: 137 Which address is updated at each hop in the path in the path switching? Answer: MAC QUESTION NO: 138 Which three statements about Ethernet and IEEE are true? (Choose three). A. They are broadcast mediums. B. They only support coax cable. C. Each network station must examine every frame. D. Token passing prevents collisions on the medium. E. Any network station can access the medium at any time providing the station detect no tramp on the medium. Answer: A, C, E QUESTION NO: 139 What is not feature if the hierarchical model for network design? A. A hierarchical design facilitates changes to the network architecture. B. When the hierarchical design modes is used, redundancy is not required because each payer provides fault tolerance and reliability. C. Management responsibility and network management systems can be distributed to the different layers of a modular network architecture. D. The modular nature of the hierarchical model enables appropriate use of bandwidth within each layer of the hierarchy, thus reducing cost. Answer: B QUESTION NO: 140 Which type of PPP frame negatiates the network layer protocols to be used during a connection? Answer: NCP frame QUESTION NO:

136 A device that has 16 asynchronous ports, two synchronous ports, and one Ethernet port is probably: A. A CSU/DSU B. A multiplexer C. An access server D. An ISDN terminal adapter Answer: C QUESTION NO: 142 View the case study. Which task would you complete to identify EIC Satellite Systems business issues that will affect your network design? A. Identify and document EIC s internal data-flow patterns. B. Identify and document EIC s existing technology investment. C. Identify and document the technical competencies of the support staff. D. Identify and document the business objectives, schedule requirements, and political issues. Answer: D QUESTION NO: 143 What happens when the IP RIP route timer expires? A. The route is marker invalid and deleted from route table. B. RIP tests the route three times and deletes the route if no reply is received. C. The route is marked invalid, remains in the table, and is not advertised to other routers. D. The route is marked invalid and remains in the route table until the route flush. Answer: D QUESTION NO: 144 Which two services does the Diffusing Update Algorithm (DUAL) performs for Enhanced IGRP routers? A. Selects loop-free routers. B. Enables faster convergence. C. Compresses route update packets. D. Selects a designated router for an autonomous system. Answer: A, B

137 QUESTION NO: 145 When designing a flat switched network, you can: A. Have the same number of IPX and IP nodes without any performance degradation. B. Have more IP nodes then IPX nodes on the same segment without any performance degradation. C. Have more IPX nodes than IP nodes on the same segment without any performance degradation. D. Have more Apple Talk nodes than IP nodes on the same segment without any performance degradation. Answer: B QUESTION NO: 146 In the Leviathan Systems case study, you discover that the developers LAN needs to be operational as soon as possible. Assuming that all developers will be located on a single floor of the headquarters office, which task would you include in a phrase 1 effort to meet the customer s need? A. Order the WAN circuits ahead of time. B. Purchase and install the Internet firewall. C. Purchase and install the headquarters router. D. Purchase and install the Ethernet switch on the headquarters LAN. Answer: D QUESTION NO: 147 Which two statements about routers are true? (Choose two). A. They route traffic at the MAC level. B. They provide interfaces for a wide range of links at a wide range of speeds. C. They are capable of supporting multiple protocol suites operating in parallel. D. They are typically used to create separate collision domain within the same LAN. E. They provide a low enough cost per port that it is feasible to attach a single device to each port. Answer: B, C QUESTION NO: 148 View the Figures and Case Study. Which figure represents a high level topology map that meets Leviathan Systems needs? A. Leviathan figure 1 B. Leviathan figure

138 C. Leviathan figure 3 D. Leviathan figure 4 Answer: D QUESTION NO: 149 What is the function of a routing table? A. Resolves MAC addresses to network addresses. B. Queues frames to be transmitted by a router. C. Records the physical topology of an internetwork. D. Stores path information for destinations in the internetwork. Answer: D QUESTION NO: 150 What is the recommended maximum number of nodes in a flat switched/bridged IP network (single broadcast domain)? A. 50 B. 200 C. 500 D. 660 Answer: C QUESTION NO: 151 In the Leviathan Systems case study, which statement describes the constraints imposed by the existing network? A. The existing wiring has no affect on the network design: B. The migration Token Ring to Ethernet will require retesting of all cabling. C. The migration from Token Ring to Ethernet will require rewiring of all facilities. D. The Token Ring and Ethernet LANs must coexist on the existing cabling system for a short period. Answer: D QUESTION NO: 152 What are three advantages of using fibre rather then copper as a network medium? (Choose three). A. Security. B. Low cost

139 C. 100 Mbps bandwidth. D. Ease of installation. E. Larger network diameter. F. Immunity to RFI and EMI. Answer: A, E, F QUESTION NO: 153 How is data transmitted in a Token Ring network? A. A node with data to transmit signals the network with a token. When the token is returned to the node, it begins transmitting the data. B. A node with data to transmit signals the hub to which the node is attached. The hub grants access to the network medium based upon priority of the transmission. C. A node with data to transmit listens for traffic on the network medium. If no traffic is detected, the station reserves the medium with a token and begins. D. When a node with data to transmit gains possession of the token, the node modifies a bit in the token, appends the data, and sends the modified token to the next station on the ring. Answer: D QUESTION NO: 154 Before making network design recommendation. You will characterise the existing network s availability and performance. As a general guideline, the buffer misses should not exceed more then about in one hour on any Cisco router. A. 10 B. 25 C. 50 D. 100 Answer: B QUESTION NO: 155 At which layer of the OSI reference model do bridges and switches operate? A. Session layer B. Network layer C. Physical layer D. Data Link layer E. Transport layer F. Application layer G. Presentation layer

140 Answer: D QUESTION NO: 156 In the FSI Test Equipment case study, the ISP has notified FSI that will be connecting to a Bay Networks router. What would be the most probable routing protocol choice? A. RIP B. IGPP C. OSPF D. EIGPP Answer: C QUESTION NO: 157 In the Leviathan Systems case study, how many users will need AS400 terminal emulation with the new design? A. 15 to 50 B. 50 to 100 C. 100 to150 D. 150 or more Answer: D QUESTION NO: 158 Which type of WAN virtual circuit is created on demand and terminated when transmission is complete? Answer: Switched Virtual Circuits (SVC) QUESTION NO: 159 View the Case Study. Which statement is true with regard to network hardware requirements for EIC Satellite Systems? A. The DSN system should be identified. B. A router will be required at each EIC_owned location C. Information on the exact model and features of the AS400 will be required. D. Based on the number of servers at EIC, the Catalyst 2900 Series XL switch is a good choice for Ethernet Switching. Answer: B

141 QUESTION NO: 160 What is NOT a component of a three-part firewall system? A. A router that connect the corporate Internetwork and the outside world. B. An isolation LAN that is a buffer between the corporate Internetwork and the outside world. C. A router that acts as an inside packet filter between the corporate Internetwork and the isolation LAN. D. A router that acts as an outside packet filter between the isolation LAN and the outside Internetwork. Answer: A QUESTION NO: 161 How do Ethernet IEEE nodes respond to collisions on the network medium? A. Participant nodes stop transmitting for amount of time and send out randomly. B. Participant nodes stop transmitting and the node holding the token is given. C. Participant nodes stop transmitting and listen for traffic before resuming transmissions. D. Participant nodes stop transmitting data and request medium access from their attached hubs. Answer: A QUESTION NO: 162 Exhibit: Which devices in the exhibit can support SNMP agents?

142 A. All devices except NMS. B. All devices including NMS. C. Only network devices such as the router. D. Only end nodes such as workstations and hosts. Answer: A QUESTION NO: 163 For router summarisation to work correctly all of the following requirements must be meet except? A. A subnet mask of must be used. B. Multiple IP addresses must share the same left most bits. C. Routing protocols must carry the prefix 6 length with the 32 bit IP address. D. Routers must base their routing decisions on a 32 bit IP address and prefix length that can be up to 32 bits. Answer: A QUESTION NO: 164 Which statement describes how a APR operates on a single LAN? A. The sending station sends a unicast packet to the destination station requesting the destination stations mach address. The destination station sends a response containing its match address. B. The sending station sends a packet to the LAN router requesting the match address associated with the given network address. The router consults its ARP table and sends a response containing a match address. C. The sending station broadcast a packet to the entire network requesting the Mac address associated with the given network address. The station with the given network address sends a response containing its match address. D. The sending station sends a hello packet that contains the stations mach address. The sending station uses this information to build an ARP table that matches network addresses and mach addresses. Answer: C QUESTION NO: 165 Which transmission type allows a network station to send a network message to a specific subset of nodes on the network? A. Unicast. B. Sub cast. C. Broadcast. D. Multicast

143 Answer: D QUESTION NO: 166 What is the name of the NetWare protocol that advertises netware services? Answer: SAP QUESTION NO: 167 Exhibit: Which two problems can occur when the transparent bridges are started on the network shown in the exhibit? (Choose two) A. Bridges table becomes inaccurate. B. Packets returned are undeliverable. C. Broadcast storms disable all network communications. D. Duplicate data appears on remote network computer screens. Answer: A, C QUESTION NO: 168 What are two differences between 10BaseT and 100BaseT? (Choose two)

144 A. Frame formats. B. Addressing schemes. C. Transmission speed. D. Media access method. E. Maximum network diameter. Answer: C, E QUESTION NO: 169 Which statement about Apple Talk network entities is true? A. Nodes are assigned to sockets. B. Sockets are assigned to zones. C. Sockets are assigned to networks. D. Nodes are assigned to zones for service advertising. Answer: D QUESTION NO: 170 Which set of Frame Relay enhancements offers extensions for managing complex Internetworks? A. CMT B. LMI C. SNMP D. RMOM Answer: B QUESTION NO: 171 Cisco IOS supports generic traffic shaping. It can be said that generic traffic shaping. A. Cannot be used with Frame Relay or SMDS. B. Does not work on layer 2 data-link technologies. C. Provides for generalised BECN on a per virtual circuit (VC) basis D. Helps eliminate the bottleneck situation by throtting back traffic volume at the source End. Answer: D

145 QUESTION NO: 172 View the Case Study, which task must you complete in order to develop a high-level topology map for FSI Test Equipment? A. Identify the ISP. B. Identify the implementation schedule. C. Determine the exact number and type of PCs, servers and hosts. D. Within reason, determine the location, number, and type of PCs, servers, and workstations. Answer: D QUESTION NO: 173 To list the network protocols and the number of users and hosts, you can use the following job aid. To which category would Frame Relay belong? A. Number of Users B. Type of Protocol C. Name of Protocol D. Number of Hosts or Servers Answer: C QUESTION NO: 174 Which tool will help you characterise network traffic? A. CiscoWorks 2000 B. Sniffer Technologies Sniffer. C. Netsys Performance Service Manager. D. All of these choices. Answer: B QUESTION NO: 175 Which two LAN switching features are unique to store-and-forward switches? (Choose two) A. CRC checking. B. Reduced latency. C. Higher port density. D. Frame length validation. Answer: A, D

146 QUESTION NO: 176 When implementing LAN communications over an ATM network, you must have which type of device per ELAN? A. LAN emulation server. B. LAN emulation router. C. LAN emulation gateway. D. LAN emulation mapping service. Answer: A QUESTION NO: 177 View the Figure and Case Study. FSI Figure 1, taken from the FSI Test Equipment case study, represents: A. packet flow. B. The terminal emulation packet flow. C. A high-level topology o the customer s current network. D. A high-level topology of the customer s proposed network. Answer: B

147 QUESTION NO: 178 Drag each IEEE protocol to its corresponding physical medium

148 Answer: QUESTION NO: 179 Which two statements about DDR are true? (Choose two) A. It requires a point-to-multipoint connection. B. Uninteresting traffic causes the Cisco router to immediately terminate an existing session. C. It can be configured to take advantage of leased lines during non-peak traffic times. D. It enables a Cisco router to dynamically create and close a switch-circuit session on demand. E. It evaluates traffic as interesting or uninteresting and creates a session only for interesting traffic. Answer: D, E QUESTION NO: 180 For the FSI Equipment case study, what would most likely be your first step in diagramming packet flow generated by the autoflow box stations? A. Identify the location of all CAD workstations. B. Identify any bottlenecks in the current network. C. Identify the router products to be used in the system. D. Identify how many users are on the same network segment. Answer: A

149 QUESTION NO: 181 A device that terminates careers digital current on the customer premises is probably? A. CSU/DSU B. A multiplaxer. C. An access server. D. An ISDN terminal adapter. Answer: A QUESTION NO: 182 Many technologies have been developed to support to remote access. Which statement is true about the design goes into the different technologies? A. ADSL was designed to support analog transmission of voice, video and data. B. Frame relay was envisioned as a reliable alternative to dedicate leases lines. C. X.25 was designed for simplicity and cost effectiveness when the physical layer is reliable. D. High-speed digital leased lines were developed to minimise overhead traffic on WAN circuits. Answer: B QUESTION NO: 183 View the Case Study. In the EIC Satellite Systems case study the best recommendation for assigning IP addresses to end-user computers is to? A. Assign IP addresses manually. B. Have users chose their own address. C. Use the Cisco Network Registrar product. D. Use Cisco s IOS software NAT feature to dynamically assign IP addresses. Answer: A QUESTION NO: 184 What is the first step to perform when planning a proactive network management strategy? A. Determine network service goals. B. Implement a network manage system. C. Locate network irregularities and bottlenecks

150 D. Plan and implement improvements to the network. Answer: A QUESTION NO: 185 As companies recognise the strategic importance of their internetworks and Intranets, more emphasis is being placed on which type of network management? A. Reactive B. Security C. Proactive D. PC_based Answer: C QUESTION NO: 186 View the Case Study. Which statement is true with regard to development of topology map for Leviathan Systems? A. The DSN system should be identified. B. A Cisco router will be required at each Leviathan location for WAN connectivity. C. Information in the exact model and features of the AS400 system will be required. D. A Catalyst 3500 Series XL switch will be required at each Leviathan location for WAN connectivity. Answer: B QUESTION NO: 187 It can be generally assumed that a larger frame size (MTU) will result in efficiency. A. Less B. Better C. No affect D. Network management Answer: B QUESTION NO: 188 Which statement describes how ARP operates on a single LAN? A. The sending station sends a unicast packet to the destination station requesting the destination stations MAC address. The destination station sends a response containing its MAC address

151 B. The sending station sends a packet to the LAN router requesting the MAC address associated with the given network address. The router consults its ARP table and sends a response containing a MAC address. C. The sending station broadcasts a packet to the entire network requesting the MAC address associated with the given network address. The station with the given network address sends a response containing its MAC address. D. The sending station sends a hello packet to the entire network. Each station on the network replies with a hello packet that contains the stations MAC address. The sending station uses this information to build an ARP table that matches network addresses and MAC addresses. Answer: C QUESTION NO: 189 Which type of routing occurs between multiple autonomous systems and uses EGPs? A. Source routing. B. Integrated routing. C. Inter-domain routing. D. Intra-domain routing. Answer: C QUESTION NO: 190 Which two routed protocols services are implemented at the transport layer of the OSI reference model? (Choose two). A. Flow control. B. Multi plexing. C. Data conversion. D. Session management. E. Session establishment F. Application synchronisation. Answer: A, B QUESTION NO: 191 Which routing rule prohibits a distance vector router from sending routing information to the same interface from which the routing information was originally received? A. Whole downs. B. Split horizon

152 C. Spanning tree logarithm. D. Split horizon with poison reverse. Answer: B QUESTION NO: 192 What is NOT a network management platform? A. RMON B. SunNet Manager C. HP OpenView HP-VX D. HP OpenView Windows Answer: A QUESTION NO: 193 Which statement describes the specialised role that the core layer of the hierarchical model plays? A. The core layer provides policy-based connectivity. B. The core layer provides resource discovery services. C. The core layer provides optimal transfer between sites. D. The core layer provides workgroup access to the Internetwork. Answer: C QUESTION NO: 194 Orchard leasing has just informed you that it has been reading about router security breaches of companies with Internet access. They have decided to purchase a firewall product that prevents hackers from seeing the internal IP addresses Orchard leasing has just informed you that it has been reading about router security. When provisioning a firewall for the Denver office, which class of products would best fit Orchard Leasing s needs? A. Cisco 1600 series. B. Cisco 3600 series. C. Cisco secure PIX fire wall. D. Catalyst 4000 series switch. Answer: C QUESTION NO:

153 Which error checking method is employed by Frame Relay to determine of errors occurred during transmissions between source to destination? (Choose three) A. DE B. CPC C. FCS D. FECN E. BECN F. Odd and even parity. Answer: A, D, E QUESTION NO: 196 For the Orchard Leasing case study, what would most likely be your first step in diagramming the packet flow of business applications? A. Identify any bottlenecks in the current network. B. Identify the router products to be used in the system. C. Identify the media to be used in each path of traffic flow. D. Identify the locations of all user and nodes that use the business applications. Answer: D QUESTION NO: 197 Under which network condition do LAN media problems occur? A. When protocols do not scale well. B. When there are too few network addresses. C. When the network needs to support voice and video. D. When too many devices contend for access on a LAN segment. Answer: D QUESTION NO: 198 For which two actions is the Active Monitor and a Token Ring network responsible? (Choose two) A. Generating new tokens. B. Granting token priority. C. Removing unclaimed frames. D. Checking frames errors. E. Authentication stations logging on the ring

154 Answer: A, C QUESTION NO: 199 Which three statements about CDDI are true? (Choose three) A. It uses twisted pair cabling. B. It supports 100Mbps bandwidth. C. It allows two KM between stations. D. It does emit electrical signals. E. It provides dual rings for fault tolerance. Answer: A, B, E QUESTION NO: 200 What is the function of an SNMP MIB? A. Stores data reported from all monitored stations at the NMS. B. Stores the IP address of the stations at the NMS monitors. C. Stores configuration data that controls how the NMS for monitored stations for updates. D. Stores monitored variables and the variables that control operation of a single monitored station. Answer: D Not A: This is should be the network management application on the NMS. QUESTION NO: 201 Orchard Leasing s management says it must be assured that the U.S offices will function properly before it proceeds with the two international sites. In which task would you include in phase 1 to meet the customer s need? A. Purchase and install the Internet Web site. B. Purchase and install the headquarters router. C. Purchase and install Denver s Internet site. D. Purchase the international Frame Relay Circuits. Answer: B QUESTION NO: 202 Exhibit:

155 What benefit does the IGRP split horizon feature provide for this network? A. Router B cannot publish routes to Router A that is learned from Router A. B. Router A and B can publish routes in Autonomous System 2 without help from Router C. C. Router C can publish routes from Autonomous System 2 to Router A without publishing routes to Router B. D. Routers C can publish routes in Autonomous system 2 to Router A without publishing routes to router B. Answer: A QUESTION NO: 203 You want to advertise an infinite hop count to another router for all routes received from that router. Witch two TIP techniques should you use together? (Choose two.) A. Split horizon B. Spanning tree C. Infinite reply D. Poisoned reverse Answer: A, D QUESTION NO: 204 Which ATM protocols allow Ethernet and Token Ring traffic to flow through an ATM network? Answer: AAL5 QUESTION NO: 205 Which LAN switching feature is unique to cut-through switches? A. CRC checking. B. Reduced latency. C. Higher port density. D. Frame length validation. Answer: B QUESTION NO: 206 Which tool is most helpful for maintaining and upgrading network device configurations?

156 A. A cable tester. B. Remote monitoring. C. Network management software. D. Network modelling and simulation software. Answer: C QUESTION NO: 207 Extracting a customer s requirement for a new network design is one of the most important tasks in the Internetwork design. Extracting customer s requirements require you to identify which security requirements? A. Characterise traffic behaviour between the central site and remote users. B. Determine requirements for remove users to access data. C. Identifying any requirements for authenticating routes received from accessed routers or any other routers. D. Determine the authorisation and authentication requirements for corporate branch offices, mobile users, and telecommunications. Answer: D QUESTION NO: 208 VLSM relies on providing length information explicitly with each use of an address. A. Host B. Class C. Packet D. Prefix Answer: D QUESTION NO: 209 In a hierarchical network design, redundancy and reliability are most important at the. A. Core layer. B. Access layer. C. Backbone layer. D. Distribution layer. Answer: A

157 QUESTION NO: 210 What are two typical uses of ISDN? (Choose two) A. Upgrade a lower bandwidth T1 line. B. Provide multiple links to home offices. C. Connect backbone devices in CDDI networks. D. Connect high priority lobes on Token Ring networks. E. High-speed transfer of data, graphics and multimedia. Answer: B, E QUESTION NO: 211 Which type of PPP frame negotiates the network layer protocols to be used during the connection? Answer: NCP frames QUESTION NO: 212 The hierarchical model distribution layer can serve many functions. What is NOT a function of the distribution layer? A. Broadcast/multicast domain definition. B. Routing between virtual LANs (VLANs). C. Providing workgroup/user access to the network. D. Demarcation between static and dynamic routing protocols. Answer: C QUESTION NO: 213 What are routed protocols? A. Protocols that determine optimal paths through Internetworks using routing algorithms. B. Protocols used to create Internetworks communication models such as the OSI reference model. C. Protocols that perform a variety of functions required for communication between user application in source destination devices. D. Protocols that determine the optimal path to transport information between the logical layers of the OSI reference models in a given device. Answer: C

158 QUESTION NO: 214 Which two statements about switched virtual circuits and permanent virtual circuits are true? (Choose two). A. PVC sessions are initiated just once. B. SVCs and PVCs share a physical communications path with other virtual circuits. C. SVCs provide greater bandwidth because they communicate over multiple virtual circuits. D. A PVC cannot share a physical communications path with other virtual circuits to retain its permanent status. Answer: A, B QUESTION NO: 215 Cisco IOS queuing services? A. Generally run on non-mission critical networks. B. Reduce the size of data to be transmitted over a network link. C. Control whether a network transmission is forwarded or blocked at a router s interface. D. Help a network administrator manage the demands applications put on the network and routers. Answer: D QUESTION NO: 216 Which two interior gateway routing protocol features represent an improvement over RIP? (Choose two) A. Support for up to 255 hops. B. Remote shut down of invalid links. C. Support for unequal multi-path routing. D. Centralised routing management console. Answer: A, C QUESTION NO: 217 When does the advanced IGRP protocol send update packets and to whom does it send the packets? (Choose two). A. When a new neighbour is discovered, update packets are sent to that router. B. When network route changes, update packets are sent to a multicast address. C. When a network routes changes, update packets are broadcast to all nodes

159 D. When a neighbours router hold down timer expires, other neighbour routers send update packets to that neighbour. Answer: B, D QUESTION NO: 218 What is the function of the OSPF designated router? A. It serves as a backup for NABR. B. It serves as a backup for any router in the area. C. It manages communication between its own areas and other areas. D. It distributes LSAs that help to synchronise the topological database of each adjacent router. Answer: D QUESTION NO: 219 For the Leviathan Systems case study, what would most likely be your first step when you diagram the packet flow of the 5250 terminal emulation application over the network? A. Identify the router products to be used in the system. B. Identify the bottlenecks in the current 5250 data stream. C. Identify the media to be used in each path of traffic flow. D. Identify the location of all user and nodes that will use 5250 emulation. Answer: D QUESTION NO: 220 Drag each routing type to its corresponding description. Drag and Drop

160

161 Answer: QUESTION NO: 221 For the EIC Satellite case study, what would most likely be the first step in diagramming the first packet flow of the new application? A. Identify any bottlenecks in the current network. B. Determine if Ethernet switching will be required. C. Determine if the 6600bps lines will be adequate. D. Identify the location of all users and nodes that will use the new application. Answer: D QUESTION NO: 222 When designing IP addressing, it is important to design route summarisation. What is NOT true with route summarisation? A. It reduces the routing update traffic. B. It reduces the overall router overhead. C. It increases the complexities of the network. D. It reduces the number of routes in the routing table. Answer: C

162 QUESTION NO: 223 What are the two differences between 10baseT and 100BaseT? (Choose two). A. Frame formats. B. Addressing schemes. C. Transmission speed. D. Media access method E. Maximum network diameter. Answer: C, E QUESTION NO: 224 Which area does the S reference point define on an ISDN end to end connection? A. The reference point between NT1 and NT2 devices. B. The reference point between user terminals and an NT2. C. The reference point between non ISDN equipment and a TA. D. The reference point between NT1 devices and line termination equipment in a carrier network. Answer: B QUESTION NO: 225 As an example of using route summanization, assume that a router has the following networks behind it and is running the OSPF routing protocol How many networks will this router have to advertise? A. 1 B. 2 C. 3 D. 4 Answer: A QUESTION NO: 226 To characterise the customer s applications, you can use the following job aid

163 To which category would client/server belong? A. Number of users. B. Name of application. C. Type of application. D. Number if hosts or servers. Answer: C QUESTION NO: 227 What are the four phases of link negotiation employed by PPP? (Choose four). A. Link termination. B. Link priority negotiation. C. Link quality determination. D. Contention for medium access. E. Link establishment and configuration negotiation. F. Error checking configuration negotiation. G. Network layer protocol configuration negotiation. Answer: A, E, F, G QUESTION NO: 228 Which tool will help to characterise network trouble? A. CiscoWorks. B. Data General Sniffer. C. Scion software package. D. All of these choices. Answer: A QUESTION NO: 229 In the Orchard Leasing case study, which statement is a business-related issue that affects the network design? A. Each office maintains a Windows NT Server. B. Orchard has just signed contracts in London and Frankfurt. C. Documents are transferred via the Internet with dial-up connections. D. The business applications are custom applications written in Access and Visual Basic. Answer: B

164 QUESTION NO: 230 Drag each LAN protocol to its corresponding feature. Drag and Drop

165 Answer: QUESTION NO: 231 For the EIC Satellite Systems case study, what is a fact to consider in establishing EIC s acceptance criteria if the new network? A. SNA will continue to be supported on the new LAN. B. The 5250 terminals may reduce system performance. C. The sales offices have an average number of four PC s each. D. The new architecture must be implemented in parallel with the current operations. Answer: C QUESTION NO: 232 View the Figure and Case Study in the Leviathan Systems case study, Leviathan Figure 4 represents a A. High level topology map that meets the customer s needs. B. High level topology map of the customer s proposed packet flow. C. High level topology map of the customer s proposes intranet security system. D. High level topology map of the customer s proposed terminal emulation packet flow

(DESGN) Designing for Cisco Internetwork Solutions

(DESGN) Designing for Cisco Internetwork Solutions WWW.REAL-EXAMS.NET The Quickest Way To Get Certified 640-861 (DESGN) Designing for Cisco Internetwork Solutions Version 26.0 WWW.REAL-EXAMS.NET Please Read Carefully This Study Guide has been carefully

More information

Fravo.com. Certification Made Easy. World No1 Cert Guides Designing for Cisco Internetwork Solutions (DESGN) Exam Edition 2.

Fravo.com. Certification Made Easy. World No1 Cert Guides Designing for Cisco Internetwork Solutions (DESGN) Exam Edition 2. Fravo.com Certification Made Easy M C S E, C C N A, C C N P, O C P, C I W, J A V A, S u n S o l a r i s, C h e c k p o i n t World No1 Cert Guides info@fravo.com Designing for Cisco Internetwork Solutions

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!  We offer free update service for one year PASS4TEST IT Certification Guaranteed, The Easy Way! \ We offer free update service for one year Exam : 640-861 Title : CCDA Cisco Certified Design Associate Vendors : Cisco Version : DEMO Get Latest &

More information

PassReview. PassReview - IT Certification Exams Pass Review

PassReview.   PassReview - IT Certification Exams Pass Review PassReview http://www.passreview.com PassReview - IT Certification Exams Pass Review Exam : 640-863 Title : Designing for Cisco Internetwork Solutions Vendors : Cisco Version : DEMO Get Latest & Valid

More information

CCNA. Course Catalog

CCNA. Course Catalog CCNA Course Catalog 2012-2013 This course is intended for the following audience: Network Administrator Network Engineer Systems Engineer CCNA Exam Candidates Cisco Certified Network Associate (CCNA 640-802)

More information

CCNA Exploration Network Fundamentals

CCNA Exploration Network Fundamentals CCNA Exploration 4.0 1. Network Fundamentals The goal of this course is to introduce you to fundamental networking concepts and technologies. These online course materials will assist you in developing

More information

Campus Network Design. 2003, Cisco Systems, Inc. All rights reserved. 2-1

Campus Network Design. 2003, Cisco Systems, Inc. All rights reserved. 2-1 Campus Network Design 2003, Cisco Systems, Inc. All rights reserved. 2-1 Design Objective Business Requirement Why do you want to build a network? Too often people build networks based on technological,

More information

Campus Network Design

Campus Network Design Modular Network Design Campus Network Design Modules are analogous to building blocks of different shapes and sizes; when creating a building, each block has different functions Designing one of these

More information

Cisco Cisco Certified Network Associate (CCNA)

Cisco Cisco Certified Network Associate (CCNA) Cisco 200-125 Cisco Certified Network Associate (CCNA) http://killexams.com/pass4sure/exam-detail/200-125 Question: 769 Refer to exhibit: Which destination addresses will be used by Host A to send data

More information

Cisco CCNA (ICND1, ICND2) Bootcamp

Cisco CCNA (ICND1, ICND2) Bootcamp Cisco CCNA (ICND1, ICND2) Bootcamp Course Duration: 5 Days Course Overview This five-day course covers the essential topics of ICND1 and ICND2 in an intensive Bootcamp format. It teaches students the skills

More information

CCNA. Murlisona App. Hiralal Lane, Ravivar Karanja, Near Pethe High-School, ,

CCNA. Murlisona App. Hiralal Lane, Ravivar Karanja, Near Pethe High-School, , CCNA Cisco Certified Network Associate (200-125) Exam DescrIPtion: The Cisco Certified Network Associate (CCNA) Routing and Switching composite exam (200-125) is a 90-minute, 50 60 question assessment

More information

Course: CCNA Bootcamp (Intensive CCNA)

Course: CCNA Bootcamp (Intensive CCNA) Course: CCNA Bootcamp (Intensive CCNA) Duration: 5 Days Description Introduction to Networking course will prepare you for the basic knowledge and in-depth technology of networking design and implementation.

More information

CISCO EXAM QUESTIONS & ANSWERS

CISCO EXAM QUESTIONS & ANSWERS CISCO 100-101 EXAM QUESTIONS & ANSWERS Number: 100-101 Passing Score: 800 Time Limit: 120 min File Version: 35.5 http://www.gratisexam.com/ CISCO 100-101 EXAM QUESTIONS & ANSWERS Exam Name: CCNA Interconnecting

More information

Scope and Sequence: CCNA Exploration v4.0

Scope and Sequence: CCNA Exploration v4.0 Scope and Sequence: CCNA Exploration v4.0 Last Updated August 30, 2007 The course objectives and outline for the final two CCNA Exploration courses, LAN Switching and Wireless and Accessing the WAN, are

More information

Introducing Campus Networks

Introducing Campus Networks Cisco Enterprise Architecture Introducing Campus Networks 2003, Cisco Systems, Inc. All rights reserved. 2-1 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0 2-2 Campus Data Center Combines switching

More information

Q-Balancer Range FAQ The Q-Balance LB Series General Sales FAQ

Q-Balancer Range FAQ The Q-Balance LB Series General Sales FAQ Q-Balancer Range FAQ The Q-Balance LB Series The Q-Balance Balance Series is designed for Small and medium enterprises (SMEs) to provide cost-effective solutions for link resilience and load balancing

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Five Designing a Network Topology Original slides copyright by Cisco Press & Priscilla Oppenheimer Network Topology Design Issues Hierarchy Redundancy Modularity Well-defined

More information

CCNA Routing and Switching (NI )

CCNA Routing and Switching (NI ) CCNA Routing and Switching (NI400+401) 150 Hours ` Outline The Cisco Certified Network Associate (CCNA) Routing and Switching composite exam (200-125) is a 90-minute, 50 60 question assessment that is

More information

Scope and Sequence: CCNA Discovery

Scope and Sequence: CCNA Discovery Scope and Sequence: CCNA Discovery Last updated June 19, 2009 Target Audience The Cisco CCNA Discovery curriculum is primarily designed for Cisco Networking Academy students who are seeking entry-level

More information

Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE

Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE COURSE TITLE ROUTING AND SWITCHING FUNDAMENTALS COURSE DURATION 16 Hour(s) of Self-Paced Interactive Training COURSE OVERVIEW In the

More information

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review. THE OSI MODEL Application Presentation Session Transport Network Data-Link Physical OSI Model Chapter 1 Review By: Allan Johnson Table of Contents Go There! Go There! Go There! Go There! Go There! Go There!

More information

Cisco Certified Network Associate ( )

Cisco Certified Network Associate ( ) Cisco Certified Network Associate (200-125) Exam Description: The Cisco Certified Network Associate (CCNA) Routing and Switching composite exam (200-125) is a 90-minute, 50 60 question assessment that

More information

Logical Network Design (Part II)

Logical Network Design (Part II) Logical Network Design (Part II) DCS COMSATS Institute of Information Technology Rab Nawaz Jadoon Assistant Professor COMSATS IIT, Abbottabad Pakistan Telecommunication Network Design (TND) Possible (Part

More information

SYSTEMS ADMINISTRATION USING CISCO (315)

SYSTEMS ADMINISTRATION USING CISCO (315) Page 1 of 11 Contestant Number: Time: Rank: SYSTEMS ADMINISTRATION USING CISCO (315) REGIONAL 2016 Multiple Choice: Multiple Choice (50 @ 10 points each) TOTAL POINTS (500 points) (500 points) Failure

More information

Cisco EXAM Designing for Cisco Internetwork Solutions. Buy Full Product.

Cisco EXAM Designing for Cisco Internetwork Solutions. Buy Full Product. Cisco EXAM - 640-864 Designing for Cisco Internetwork Solutions Buy Full Product http://www.examskey.com/640-864.html Examskey Cisco 640-864 exam demo product is here for you to test the quality of the

More information

Bridging and Switching Basics

Bridging and Switching Basics CHAPTER 4 Bridging and Switching Basics This chapter introduces the technologies employed in devices loosely referred to as bridges and switches. Topics summarized here include general link-layer device

More information

IT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview

IT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview IT114 NETWORK+ Course Objectives Upon successful completion of this course, the student will be able to: 1. Identify the devices and elements of computer networks; 2. Diagram network models using the appropriate

More information

Understanding Networking Fundamentals

Understanding Networking Fundamentals Understanding Networking Fundamentals Training Details Training Time : 5 Days Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training A strong foundation

More information

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Interconnecting Cisco Networking Devices Part 1 (ICND)

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Interconnecting Cisco Networking Devices Part 1 (ICND) 100-105.exam Number: 100-105 Passing Score: 800 Time Limit: 120 min CISCO 100-105 Interconnecting Cisco Networking Devices Part 1 (ICND) Exam A QUESTION 1 Which route source code represents the routing

More information

Exam Questions

Exam Questions Exam Questions 200-310 DESGN Designing for Cisco Internetwork Solutions https://www.2passeasy.com/dumps/200-310/ 1. What is the recommended spanning tree protocol to use for all Layer 2 deployments in

More information

TestOut Routing and Switching Pro - English 6.0.x COURSE OUTLINE. Modified

TestOut Routing and Switching Pro - English 6.0.x COURSE OUTLINE. Modified TestOut Routing and Switching Pro - English 6.0.x COURSE OUTLINE Modified 2017-07-10 TestOut Routing and Switching Pro Outline- English 6.0.x Videos: 133 (15:42:34) Demonstrations: 78 (7:22:19) Simulations:

More information

Exam: Title : Routing & Switching Exam (RSS) Ver :

Exam: Title : Routing & Switching Exam (RSS) Ver : Exam: 646-521 Title : Routing & Switching Exam (RSS) Ver : 01.02.04 Missing answer will be provided shortly. QUESTION 1 What does the Catalyst 6500 Network Analysis Module (NAM) do? (Choose two) A. Gives

More information

CCNA-A Scope and Sequence (March 2007-Draft)

CCNA-A Scope and Sequence (March 2007-Draft) CCNA-A Scope and Sequence (March 2007-Draft) This document is a preliminary overview of the new CCNA-A curriculum and is subject to change since the courses are still under development. The English versions

More information

Scope and Sequence: CCNA Discovery

Scope and Sequence: CCNA Discovery Scope and Sequence: CCNA Discovery Last updated April 22, 2008 Target Audience CCNA Discovery is primarily designed for Cisco Networking Academy students who are looking for career-oriented, information

More information

Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise

Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise The Changing Landscape IP-based unified communications is widely deployed in enterprise networks, both for internal calling

More information

MTA_98-366_Vindicator930

MTA_98-366_Vindicator930 MTA_98-366_Vindicator930 Number: 98-366 Passing Score: 700 Time Limit: 45 min File Version: 1.0 http://www.gratisexam.com/ Microsoft Technology Associate Networking Fundamentals MTA 98-366 Exam A QUESTION

More information

Cisco How Virtual Private Networks Work

Cisco How Virtual Private Networks Work Table of Contents How Virtual Private Networks Work...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 Background Information...1 What Makes a VPN?...2 Analogy:

More information

Interconnecting Cisco Networking Devices

Interconnecting Cisco Networking Devices Interconnecting Cisco Networking Devices Q&A DEMO Version Copyright (c) 2007 Chinatag LLC. All rights reserved. Important Note Please Read Carefully For demonstration purpose only, this free version Chinatag

More information

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12 TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group

More information

Chapter 1: Enterprise Campus Architecture. Course v6 Chapter # , Cisco Systems, Inc. All rights reserved. Cisco Public

Chapter 1: Enterprise Campus Architecture. Course v6 Chapter # , Cisco Systems, Inc. All rights reserved. Cisco Public Chapter 1: Analyzing The Cisco Enterprise Campus Architecture CCNP SWITCH: Implementing IP Switching Course v6 1 Chapter 1 Objectives Describe common campus design options and how design choices affect

More information

Exam Topics Cross Reference

Exam Topics Cross Reference Appendix R Exam Topics Cross Reference This appendix lists the exam topics associated with the ICND1 100-105 exam and the CCNA 200-125 exam. Cisco lists the exam topics on its website. Even though changes

More information

CISCO QUAD Cisco CCENT/CCNA/CCDA/CCNA Security (QUAD)

CISCO QUAD Cisco CCENT/CCNA/CCDA/CCNA Security (QUAD) Our Learning Exclusive Custom exam prep software and materials Exam delivery in classroom with 98% success Course specific thinqtank Learning publications to promote fun exciting learning Extended hours

More information

Interconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview

Interconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview Interconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview This course will teach students about building a simple network, establishing internet connectivity, managing network device security,

More information

Cisco 5921 Embedded Services Router

Cisco 5921 Embedded Services Router Data Sheet Cisco 5921 Embedded Services Router The Cisco 5921 Embedded Services Router (ESR) is a Cisco IOS software router application. It is designed to operate on small, low-power, Linux-based platforms

More information

Exam: : VPN/Security. Ver :

Exam: : VPN/Security. Ver : Exam: Title : VPN/Security Ver : 03.20.04 QUESTION 1 A customer needs to connect smaller branch office locations to its central site and desires a more which solution should you recommend? A. V3PN solution

More information

Internetwork Expert s CCNP Bootcamp. Hierarchical Campus Network Design Overview

Internetwork Expert s CCNP Bootcamp. Hierarchical Campus Network Design Overview Internetwork Expert s CCNP Bootcamp Hierarchical Campus Network Design Overview http:// Hierarchical Campus Network Design Overview Per Cisco, a three layer hierarchical model to design a modular topology

More information

Chapter 10: Review and Preparation for Troubleshooting Complex Enterprise Networks

Chapter 10: Review and Preparation for Troubleshooting Complex Enterprise Networks 0: Review and Preparation for Troubleshooting Complex Enterprise Networks CCNP TSHOOT: Maintaining and Troubleshooting IP Networks Chapter TSHOOT 1v6 0 1 0 Objectives Review key maintenance and troubleshooting

More information

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified TestOut Network Pro - English 4.1.x COURSE OUTLINE Modified 2017-07-06 TestOut Network Pro Outline - English 4.1.x Videos: 141 (18:42:14) Demonstrations: 81 (10:38:59) Simulations: 92 Fact Sheets: 145

More information

Navpreet Singh INTRODUCTION TO COMPUTER NETWORKS. Computer Centre Indian Institute of Technology Kanpur Kanpur INDIA

Navpreet Singh INTRODUCTION TO COMPUTER NETWORKS. Computer Centre Indian Institute of Technology Kanpur Kanpur INDIA INTRODUCTION TO COMPUTER NETWORKS Navpreet Singh Computer Centre Indian Institute of Technology Kanpur Kanpur INDIA (Ph : 2597371, Email : navi@iitk.ac.in) About Myself About Myself I am Network Manager

More information

Vendor: Cisco. Exam Code: Exam Name: Implementing Cisco IP Routing (ROUTE v2.0) Version: Demo

Vendor: Cisco. Exam Code: Exam Name: Implementing Cisco IP Routing (ROUTE v2.0) Version: Demo Vendor: Cisco Exam Code: 300-101 Exam Name: Implementing Cisco IP Routing (ROUTE v2.0) Version: Demo DEMO QUESTION 1 Refer to the exhibit. The DHCP client is unable to receive a DHCP address from the DHCP

More information

Cisco Technologies, Routers, and Switches p. 1 Introduction p. 2 The OSI Model p. 2 The TCP/IP Model, the DoD Model, or the Internet Model p.

Cisco Technologies, Routers, and Switches p. 1 Introduction p. 2 The OSI Model p. 2 The TCP/IP Model, the DoD Model, or the Internet Model p. Cisco Technologies, Routers, and Switches p. 1 Introduction p. 2 The OSI Model p. 2 The TCP/IP Model, the DoD Model, or the Internet Model p. 6 Networking Basics p. 14 Wireless LANs p. 22 Cisco Hardware

More information

CCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0)

CCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0) CCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0) 1. Data is being sent from a source PC to a destination server. Which three statements correctly describe the function

More information

ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS

ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS P. Fidry, V. Rakotomanana, C. Ausanneau Pierre.fidry@alcatel-lucent.fr Alcatel-Lucent, Centre de Villarceaux, 91620, Nozay, France Abstract: As a consequence of

More information

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Question Number (ID) : 1 (jaamsp_mngnwi-088) You are the administrator for medium-sized network with many users who connect remotely. You have configured a server running Microsoft Windows Server 2003,

More information

SYSTEMS ADMINISTRATION USING CISCO (315)

SYSTEMS ADMINISTRATION USING CISCO (315) Page 1 of 10 Contestant Number: Time: Rank: SYSTEMS ADMINISTRATION USING CISCO (315) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1.

More information

Campus Network Design

Campus Network Design Design Principles Campus Network Design 2003, Cisco Systems, Inc. All rights reserved. 2-1 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0 2-2 Design Principles Task in Network Design Plan phase

More information

COPYRIGHTED MATERIAL. Table of Contents. Assessment Test

COPYRIGHTED MATERIAL. Table of Contents. Assessment Test 10089.book Page xi Monday, July 23, 2007 3:17 PM Introduction Assessment Test xxiii xxxiii Chapter 1 Internetworking 1 Internetworking Basics 4 Internetworking Models 11 The Layered Approach 12 Advantages

More information

SEMESTER 2 Chapter 3 Introduction to Dynamic Routing Protocols V 4.0

SEMESTER 2 Chapter 3 Introduction to Dynamic Routing Protocols V 4.0 SEMESTER 2 Chapter 3 Introduction to Dynamic Routing Protocols V 4.0 3.1.1 What are the four routing RIP, RIPv2, EIGRP, OSPFv2 protocols that are the focus of this course? 3.1.1.2 What are routing protocols?

More information

Virtual private networks

Virtual private networks Technical papers Virtual private networks Virtual private networks Virtual private networks (VPNs) offer low-cost, secure, dynamic access to private networks. Such access would otherwise only be possible

More information

Advanced Network Administration. 1. Course Description Enabling Communication across Networks Secured Communication using Network Devices

Advanced Network Administration. 1. Course Description Enabling Communication across Networks Secured Communication using Network Devices Advanced Network Administration 1. Course Description Enabling Communication across Networks Secured Communication using Network Devices 2. Duration 5 Days 3. Purpose This five day course for L-2 Network

More information

TEXTBOOK MAPPING CISCO COMPANION GUIDES

TEXTBOOK MAPPING CISCO COMPANION GUIDES TestOut Routing and Switching Pro - English 6.0.x TEXTBOOK MAPPING CISCO COMPANION GUIDES Modified 2018-08-20 Objective Mapping: Cisco 100-105 ICND1 Objective to LabSim Section # Exam Objective TestOut

More information

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features

More information

Exam Code : Version: Free Demo. IT Certification Guaranteed, The Easy Way!

Exam Code : Version: Free Demo. IT Certification Guaranteed, The Easy Way! Vendor : Cisco Exam Code : 642-832 Version: Free Demo IT Certification Guaranteed, The Easy Way Cheat-Test.us - The Worldwide Renowned IT Certification Material Provider The safer, easier way to help you

More information

Planning for Information Network

Planning for Information Network Planning for Information Network Lecture 8: Network Routing Protocols Assistant Teacher Samraa Adnan Al-Asadi 1 Routing protocol features There are many ways to characterize routing protocols, including

More information

S5 Communications. Rev. 1

S5 Communications. Rev. 1 S5 Communications Rev. 1 Page 1 of 15 S5 Communications For a complete understanding of the S5 Battery Validation System (BVS) communication options, it is necessary to understand the measurements performed

More information

Internetworking Concepts Overview. 2000, Cisco Systems, Inc. 2-1

Internetworking Concepts Overview. 2000, Cisco Systems, Inc. 2-1 Internetworking Concepts Overview 2000, Cisco Systems, Inc. 2-1 2000, Cisco Systems, Inc. www.cisco.com ICND v1.0a 2-2 Objectives On completion of this chapter, you will be able to perform the following

More information

QUESTION: 1 You have been asked to establish a design that will allow your company to migrate from a WAN service to a Layer 3 VPN service. In your des

QUESTION: 1 You have been asked to establish a design that will allow your company to migrate from a WAN service to a Layer 3 VPN service. In your des Vendor: Cisco Exam Code: 352-001 Exam Name: ADVDESIGN Version: Demo www.dumpspdf.com QUESTION: 1 You have been asked to establish a design that will allow your company to migrate from a WAN service to

More information

Copyleft 2005, Binnur Kurt. Objectives

Copyleft 2005, Binnur Kurt. Objectives 1 ing Fundamentals Copyleft 2005, Binnur Kurt Objectives Define basic networking terms Describe some commonly used network applications Describe the main purposes and functions of computer networking Describe

More information

Wired internetworking devices. Unit objectives Differentiate between basic internetworking devices Identify specialized internetworking devices

Wired internetworking devices. Unit objectives Differentiate between basic internetworking devices Identify specialized internetworking devices Wired internetworking devices Unit objectives Differentiate between basic internetworking devices Identify specialized internetworking devices Topic A Topic A: Basic internetworking devices Topic B: Specialized

More information

CISCO SYSTEM ADMINISTRATION (41)

CISCO SYSTEM ADMINISTRATION (41) CISCO SYSTEM ADMININSTRATION PAGE 1 OF 11 CONTESTANT ID# Time Rank CISCO SYSTEM ADMINISTRATION (41) Regional 2012 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification:

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Chapter 1. Cisco SONA and the Cisco Enterprise Architecture

Chapter 1. Cisco SONA and the Cisco Enterprise Architecture Chapter 1. Cisco SONA and the Cisco Enterprise Architecture After completing this chapter, you will be able to: Explain the Cisco Service-Oriented Network Architecture (SONA) framework Describe how the

More information

KillTest ᦝ䬺 䬽䭶䭱䮱䮍䭪䎃䎃䎃ᦝ䬺 䬽䭼䯃䮚䮀 㗴 㓸 NZZV ]]] QORRZKYZ PV ٶ瀂䐘މ悹伥濴瀦濮瀃瀆ݕ 濴瀦

KillTest ᦝ䬺 䬽䭶䭱䮱䮍䭪䎃䎃䎃ᦝ䬺 䬽䭼䯃䮚䮀 㗴 㓸 NZZV ]]] QORRZKYZ PV ٶ瀂䐘މ悹伥濴瀦濮瀃瀆ݕ 濴瀦 KillTest Exam : 100-101 Title : CCNA Interconnecting Cisco Networking Devices 1 (ICND1) Version : Demo 1 / 15 1.Which three statements are true about the operation of a full-duplex Ethernet network? (Choose

More information

Never Drop a Call With TecInfo SIP Proxy White Paper

Never Drop a Call With TecInfo SIP Proxy White Paper Innovative Solutions. Trusted Performance. Intelligently Engineered. Never Drop a Call With TecInfo SIP Proxy White Paper TecInfo SD-WAN product - PowerLink - enables real time traffic like VoIP, video

More information

Vendor: Cisco. Exam Code: Exam Name: Cisco Sales Expert. Version: Demo

Vendor: Cisco. Exam Code: Exam Name: Cisco Sales Expert. Version: Demo Vendor: Cisco Exam Code: 646-206 Exam Name: Cisco Sales Expert Version: Demo QUESTION 1 What are three current business factors that are influencing customer decisions in making technology investments?

More information

Exam : Title : Designing for Cisco Internetwork Solutions. Version : Demo

Exam : Title : Designing for Cisco Internetwork Solutions. Version : Demo Exam : 640-863 Title : Designing for Cisco nternetwork Solutions Version : Demo 1. Which statement accurately describes one difference between a small office and medium office topology? A. Small offices

More information

Scope and Sequence: CCNA Discovery v4.0

Scope and Sequence: CCNA Discovery v4.0 Scope and Sequence: CCNA Discovery v4.0 Last Updated August 30, 2007 The course objectives and outline for the final two CCNA Discovery courses, Introducing Routing and Switching in the Enterprise and

More information

Introduction to Networking

Introduction to Networking Introduction to Networking Chapters 1 and 2 Outline Computer Network Fundamentals Defining a Network Networks Defined by Geography Networks Defined by Topology Networks Defined by Resource Location OSI

More information

Q&A. DEMO Version

Q&A. DEMO Version Cisco Certified Network Associate Q&A DEMO Version Copyright (c) 2012 Chinatag LLC. All rights reserved. Important Note Please Read Carefully For demonstration purpose only, this free version Chinatag

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Eight Developing Network Security Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Network Security Design The steps for security design are: 1. Identify

More information

: Designing for Cisco Internetwork Solutions (DESGN) v2.1

: Designing for Cisco Internetwork Solutions (DESGN) v2.1 640-864: Designing for Cisco Internetwork Solutions (DESGN) v2.1 Course Introduction Course Introduction Module 01 - Network Design Methodology Overview Understanding the Network Architectures for the

More information

Seite von 7 05.0.200 Close Window Assessment System Exam Viewer - CCNA Practice Certification Exam # - (Version 4.0) Below you will find the assessment items as presented on the exam as well as the scoring

More information

Hands-On TCP/IP Networking

Hands-On TCP/IP Networking Hands-On Course Description In this Hands-On TCP/IP course, the student will work on a live TCP/IP network, reinforcing the discussed subject material. TCP/IP is the communications protocol suite on which

More information

PREREQUISITES TARGET AUDIENCE. Length Days: 5

PREREQUISITES TARGET AUDIENCE. Length Days: 5 Cisco Implementing Cisco IP Routing v2.0 (ROUTE) ROUTE v2.0 includes major updates and follows an updated blueprint. However, note that this course does not cover all items listed on the blueprint. Some

More information

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified TestOut Network Pro - English 5.0.x COURSE OUTLINE Modified 2018-03-06 TestOut Network Pro Outline - English 5.0.x Videos: 130 (17:10:31) Demonstrations: 78 (8:46:15) Simulations: 88 Fact Sheets: 136 Exams:

More information

Routing Protocol comparison

Routing Protocol comparison Routing Protocol comparison Introduction to routing Networks allow people to communicate, collaborate, and interact in many ways. Networks are used to access web pages, talk using IP telephones, participate

More information

Appendix B Networks, Routing, and Firewall Basics

Appendix B Networks, Routing, and Firewall Basics Appendix B Networks, Routing, and Firewall Basics This appendix provides an overview of IP networks, routing, and firewalls. Related Publications As you read this document, you may be directed to various

More information

CCIE Route & Switch Written (CCIERSW) 1.0

CCIE Route & Switch Written (CCIERSW) 1.0 CCIE Route & Switch Written (CCIERSW) 1.0 COURSE OVERVIEW: CCIE Route and Switch Written (CCIERSW) preparation course is a five-day course that prepares the student for the written exam portion of the

More information

Exam : Cisco Certified Network Associate(CCNA) Title : Version : DEMO

Exam : Cisco Certified Network Associate(CCNA) Title : Version : DEMO Exam : 640-802 Title : Cisco Certified Network Associate(CCNA) Version : DEMO 1.Refer to the exhibit. What could be possible causes for the "Serial0/0 is down" interface status? (Choose two.) A. A Layer

More information

CCNA Routing and Switching Scope and Sequence

CCNA Routing and Switching Scope and Sequence Cisco Network Academy Network Engineering technology 1, 2, 3&4 CCNA 1 2 3 4 CCNA Routing and Switching Scope and Sequence Target Audience The Cisco CCNA Routing and Switching curriculum is designed for

More information

Virtual Private Networks (VPNs)

Virtual Private Networks (VPNs) CHAPTER 19 Virtual Private Networks (VPNs) Virtual private network is defined as customer connectivity deployed on a shared infrastructure with the same policies as a private network. The shared infrastructure

More information

CCNA 4 - Final Exam (B)

CCNA 4 - Final Exam (B) CCNA 4 - Final Exam (B) 1. Identify the factors that contribute to congestion on an Ethernet LAN. (Choose three.) improper placement of enterprise level servers addition of hosts to a physical segment

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Original slides by Cisco Press & Priscilla Oppenheimer Selection Criteria for Switching and Routing Protocols Network traffic

More information

PASS4TEST IT 인증시험덤프전문사이트

PASS4TEST IT 인증시험덤프전문사이트 PASS4TEST IT 인증시험덤프전문사이트 http://www.pass4test.net 일년동안무료업데이트 Exam : 200-120 Title : CCNA Cisco Certified Network Associate CCNA (803) Vendor : Cisco Version : DEMO Get Latest & Valid 200-120 Exam's Question

More information

CERTIFICATE CCENT + CCNA ROUTING AND SWITCHING INSTRUCTOR: FRANK D WOUTERS JR. CETSR, CSM, MIT, CA

CERTIFICATE CCENT + CCNA ROUTING AND SWITCHING INSTRUCTOR: FRANK D WOUTERS JR. CETSR, CSM, MIT, CA CERTIFICATE CCENT + CCNA ROUTING AND SWITCHING INSTRUCTOR: FRANK D WOUTERS JR. CETSR, CSM, MIT, CA CCENT - Cisco Certified Entry Networking Technician (ICND1) CCNA Routing and Switching (ICND2) Prerequisites:

More information

EEC-684/584 Computer Networks

EEC-684/584 Computer Networks EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking

More information

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Product Overview Cisco Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software-based security solution for building scalable

More information

GoCertify Advanced Cisco CCIE Lab Scenario # 1

GoCertify Advanced Cisco CCIE Lab Scenario # 1 GoCertify Advanced Cisco CCIE Lab Scenario # 1 (http://www.gocertify.com) IPexpert, Inc. is a leading provider in on-line Cisco CCNA, CCNP and CCIE training material. For more information please visit

More information

Exam Questions N10-006

Exam Questions N10-006 Exam Questions N10-006 CompTIA Network+ https://www.2passeasy.com/dumps/n10-006/ 1.A technician has verified that a recent loss of network connectivity to multiple workstations is due to a bad CAT5 cable

More information

Chapter 4 NETWORK HARDWARE

Chapter 4 NETWORK HARDWARE Chapter 4 NETWORK HARDWARE 1 Network Devices As Organizations grow, so do their networks Growth in number of users Geographical Growth Network Devices : Are products used to expand or connect networks.

More information