Fravo.com. Certification Made Easy. World No1 Cert Guides Designing for Cisco Internetwork Solutions (DESGN) Exam Edition 2.

Size: px
Start display at page:

Download "Fravo.com. Certification Made Easy. World No1 Cert Guides Designing for Cisco Internetwork Solutions (DESGN) Exam Edition 2."

Transcription

1 Fravo.com Certification Made Easy M C S E, C C N A, C C N P, O C P, C I W, J A V A, S u n S o l a r i s, C h e c k p o i n t World No1 Cert Guides info@fravo.com Designing for Cisco Internetwork Solutions (DESGN) Exam Edition 2.0 Copyrights Fravo Technologies. All Rights Reserved.

2 Congratulations!! You have purchased a Fravo Technologies. Study Guide. This study guide is a complete collection of questions and answers that have been developed by our professional & certified team. You must study the contents of this guide properly in order to prepare for the actual certification test. The average time that we would suggest you for studying this study guide is approximately 15 to 20 hours and you will surely pass your exam. We guarantee it! GOOD LUCK! DISCLAIMER This study guide and/or material is not sponsored by, endorsed by or affiliated with Microsoft, Cisco, Oracle, Citrix, CIW, CheckPoint, Novell, Sun/Solaris, CWNA, LPI, ISC, etc. All trademarks are properties of their respective owners. Guarantee If you use this study guide correctly and still fail the exam, send a scanned copy of your official score notice at: info@fravo.com We will gladly refund the cost of this study guide or give you an exchange of study guide of your choice of the same or lesser value. This material is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this material, or any portion thereof, may result in severe civil and criminal penalties, and will be prosecuted to the maximum extent possible under law. Copyrights Fravo Technologies. All Rights Reserved. h t t p : / / w w w. f r a v o. c o m 1

3 Q1. Which solution can be deployed at the receiving end of a converged network to help smooth voice traffic that has been affected by variable delay? A. Dejitter buffers B. Higher compression C. Reduces compression D. Link fragmentation and interleaving Answer: A Q2. When designing a network that will incorporate fault management, you must incorporate components that will achieve which three goals? (Choose three.) A. Incorporate intrusion detection B. Detect network error conditions C. Log network events D. Notify network administrators E. Discover network topology, C, D Q3. What is the first task that a network designer should perform when documenting the customer requirements and existing environment of a network design project? A. Assess the scope of the design project. B. Identify applications, both planned and installed. C. Identify the customer s business constraints. D. Assess the customer s business goals. Q4. Network security design involved these steps: (Choose all that apply.) A. Analysis of security risks. B. Training of users, managers, and technical staff. C. Identification of network assets. D. Identification of routing protocol metrics. E. Analysis of security requirements and tradeoffs. Answer: A, B, C, E Q5. When are SNMP Trap messages sent? A. When NMS need to initialize agents. B. When agents have events to report to an NMS. C. When an NMS wants agents to begin recording events. 2

4 D. When an NMS wants a proxy station to take over agent monitoring. Q6. AAA Video operates a chain of 50 video rental stores located in the Northwestern United States. They currently have a Point-of-Sale (POS) system in which each store posts its daily sales data and inventory changes to a central database through dial-up communication. There is no interaction between the stores and the central system during business hours. The central site runs on an Ethernet LAN. The only always-on WAN link is an Internet connection using wireless broadband to a local ISP. AAA wants to enhance their service offering by creating a new E-Commerce web site where customers can browse and search a catalog of video titles and select the ones they want for rental. The system will instantly communicate the order to the nearest store where employees pull the order and hold it until the customer picks it up. The service must operate on a 24x7 basis. AAA sees this new business strategy as a means to increase revenue and expand the business nationally. They see an opportunity to expand the web site in the future to video, DVD and music sales on a worldwide level. The company wants all stored to be connected to the central site through WAN links. The company is upgrading the central inventory database so that sales and rentals can be posted immediately in real-time. An Internet-based and instant-messaging system will be set up for all headquarters employees and store managers to use. AAA believes that networking the stores will improve order fulfillment processes, which will improve customer satisfaction and thus, boost revenue. It will also help communication with store employees. AAA wants to upgrade the local LAN to a Gigabit and Fast Ethernet system to facilitate the demands of the new and upgraded systems. They have budgeted $500,000 for the networking equipment and another $10,000/month for the WAN charges including a faster Internet connection. They believe that 256Kbps speeds will be adequate to the stores. Since they have no staff capable of managing the new network, they will hire two engineers that already have the training and experience. The project must be complete in 6 months when the new inventory system goes online. The IT manager has concerns about the security of the servers and workstations on the network when all stores become connected. He doesn t want any Internet access to or from the stores. He is depending on you to recommend an effective yet affordable solution that will protect his system from intruders. Which two are business goals of AAA video that apply to this network design project? (Choose two.) A. Improvement of the order fulfillment process. B. Production deployment in 6 months. C. New messaging systems. D. The hiring of skilled IT staff. E. Increase revenue through the E-Commerce site. Answer: A, E 3

5 Explanation: Since the company now requires all stores to communicate full-time to the central site, a much better order fulfillment process can be achieved. The company is investing in a new network design in order to generate more revenue by applying a more hierarchical management approach. Incorrect Answers: B: This is a constraint, not a goal. C: This is an improvement. D: This is an expenditure concern. Q7. Before any changes are made to a customer network the current network must be documented. What should be included in this documentation? (Choose all that apply.) A. Addressing schemes B. Concerns about the network C. Protocol analysis D. Network topology Answer: A, B, D Q8. A company is expanding into a multinational organization and has hired a network consultant to assist them with planning a new network design. At a monthly presentation the consultant is going to recommend that the company use a routing protocol that will support a network design that cannot be structured into a hierarchy. Which routing protocol should he recommend? A. OSPF B. EIGRP C. IS-IS D. GR E. BGP Answer: E Q9. Which three describe the primary functions of the Access Layer of the campus network design hierarchy? (Choose three.) A. Provides end-user connectivity. B. Provides route summarization. C. Provides remote office connectivity. D. Provides policy-based routing. E. Connects shared LAN devices. Answer: A, C, E 4

6 Q10. A prototype network is used to test a proposed network redesign solution. Although the test seemed to be successful, network performance is unacceptable when implemented in the live network. What was wrong with the prototype network test? A. The prototype should have been built on the live network. B. The prototype failed to test for the proper characteristics. C. The prototype network didn t match the live network exactly. D. Different configuration parameters existed in the prototype network. Q11. The successful implementation of which two testing techniques can be used for proof of concept of a network design? (Choose two.) A. Pilot network B. Simulation lab C. Prototype network D. Verification network E. Modular network Answer: A, C Q12. When are SNMP Trap messages sent? A. When NMS need to initialise agents. B. When agents have events to report to an NMS C. When an NMS wants agents to begin recording events. D. When an NMS wants a proxy station to take over agent monitoring. Q13. The West Ridge School District in North Carolina has approximately 2,800 students occupying five schools: three grade schools, one junior high, and one high school. All telephone service is handled by the local phone company. Every phone call is switched by the providers centrex switch, then routed to the appropriate school. Each school is networked with fractional T1 Frame Relay and Cisco routers. The users are on a switched 10/1/100 network utilizing Cisco switched and Category 5 cable. Internet access is through the high school, which has an Internet connection through a provider 35 miles away via a T1 Frame Relay. The school district needs to put phones in each classroom for compliance with the Safe- Schools initiative, but the cost is high and facilities are lacking. In addition to the phones, 5

7 the district would like to install video in each school for video conference and for distance learning in the high school. Video partners will be connected with ISDN PRI LINKS. There is also a need to protect the student information stored on local serves and shared between the schools are as students graduate from elementary school to junior high, and students transfer in and out of the district. How can you protect the student records when in transit between schools and when being shared with other school districts over the Internet? A. Authenticate users B. Secure fingerprints C. Encrypt the data D. Log all access attempts Answer: C Explanation: All the options seem to be correct. But, if I have to choose one, then I will go with encryption of the data. It is the single item that will cause any illegal acquisition of the data unusable. Q14. An SNMP-managed network consists of which principal components? (Choose all that apply.) A. Firewalls B. Agents C. Network-management systems D. Managed devices, C, D Q15. To ensure that productivity remains high and the quantity of user complaints is low, network response time should be a maximum of? A. 150 milliseconds B. 50 milliseconds C. 25 milliseconds D. 100 milliseconds Q16. SNMPv3 added which enhancement to the protocol that did not exist in version 1 or 2? A. Http transport B. Vendor-specific MIBs C. Increased performance D. Secure transmission 6

8 Q17. When choosing a route, which metric can be used by the IGRP protocol? (Choose all that apply) A. Bandwidth B. Hops C. Reliability D. Fault Tolerance E. Link Cost Answer: A, C Q18. AAA Video operates a chain of 50 video rental stores located in the Northwestern United States. They currently have a Point-of-Sale (POS) system in which each store posts its daily sales data and inventory changes to a central database through dial-up communication. There is no interaction between the stores and the central system during business hours. The central site runs on an Ethernet LAN. The only always-on WAN link is an Internet connection using wireless broadband to a local ISP. AAA wants to enhance their service offering by creating a new E-Commerce web site where customers can browse and search a catalog of video titles and select the ones they want for rental. The system will instantly communicate the order to the nearest store where employees pull the order and hold it until the customer picks it up. The service must operate on a 24x7 basis. AAA sees this new business strategy as a means to increase revenue and expand the business nationally. They see an opportunity to expand the web site in the future to video, DVD and music sales on a worldwide level. The company wants all stored to be connected to the central site through WAN links. The company is upgrading the central inventory database so that sales and rentals can be posted immediately in real-time. An Internet-based and instant-messaging system will be set up for all headquarters employees and store managers to use. AAA believes that networking the stores will improve order fulfillment processes, which will improve customer satisfaction and thus, boost revenue. It will also help communication with store employees. AAA wants to upgrade the local LAN to a Gigabit and Fast Ethernet system to facilitate the demands of the new and upgraded systems. They have budgeted $500,000 for the networking equipment and another $10,000/month for the WAN charges including a faster Internet connection. They believe that 256Kbps speeds will be adequate to the stores. Since they have no staff capable of managing the new network, they will hire two engineers that already have the training and experience. The project must be complete in 6 months when the new inventory system goes online. The IT manager has concerns about the security of the servers and workstations on the network when all stores become connected. He doesn t want any Internet access to or from the stores. He is depending on you to recommend an effective yet affordable solution that will protect his system from intruders. 7

9 Which are three technical constraints imposed by AAA Video on this network design project? (Choose three.) A. The POS system. B. Improved employee communication through instant messaging. C. The wireless Internet connection. D. 24x7 availability E. The central site Ethernet LAN. Answer: C, D, E Explanation: Wireless Internet connection is a constraint because of the limited bandwidth it is able to provide. To provide 24x7 availability will require redundancy configurations, which is technical in nature. The central site Ethernet LAN is also a technical constraint because it is a hub-spoke topology where a single point of failure (central) will cause the whole network dead. Incorrect Answers: A: This is an Application layer concern. B: This is a business/customer service concern. Q19. Each set of an implementation plan should consist of which three items of information? (Choose three.) A. A description of the step s objective. B. A detailed implementation guidelines. C. A reference to a section in the design document. D. Summary of requirements to be fulfilled by the step. E. Listing of applicable device configurations. Answer: A, B, C Q20. Exhibit: (Refer the EXHIBIT given below.) 8

10 The exhibit shows a customers network as diagramed by the network manager. Based on the information in the diagram, which two Layer 2 or Layer 3 protocols must be supported in the new network design? (Choose two.) A. Appletalk B. SNA C. Token Ring D. IPX E. NFS, C Q21. Which two methods provide data integrity? (Choose two.) A. Token cards B. Digital signatures C. Two-factor authentication D. Secure fingerprints, D Q22. Match the network management component with its function. (Refer the EXHIBIT given below.) 9

11 Answer: Agent: Generate traps of events MIB: store information about network objects SNMP: management transport mechanism Manager: periodically collects object information Q23. The advantages of using static routes are: (Choose all that apply.) A. Efficient use of router resources. B. Increased security due to known routes. C. A single path into and out of a network. D. Route calculations made by network administrators. Answer: A, B Q24. Which of the following are components included in the Cisco SAFE architecture? (Choose three.) A. Multicast Router B. Enterprise Edge C. Dynamic VLANs D. Enterprise Campus E. SP Edge, D, E Q25. A newly hired sales representative is trying to decide upon a WAN solution that will allow her to communicate with the corporate office located over 500 miles from her home. She most be able to access the company web server and send with attachments throughout her entire 8-hour workday. Which of the following would be the most cost effective for her to use? 10

12 A. ISDN B. Satellite C. Leased Line D. DSL E. ARM Q26. Which two characteristics are affected by choice of codec when designing networks to carry IP telephony? (Choose two.) A. Voice quality B. Silence packet handling C. Voice packet header size D. Bandwidth required for voice calls Answer: A, D Q27. Why would you recommend classless routing protocols for a network? A. Minimize convergence time. B. Increase security and availability. C. Suit the flat structure of the network. D. Accommodate mixed vendor environment. E. Support variable length subnet masking. Answer: E Q28. Cisco Systems uses a three-layer hierarchical model to describe network design topologies. Which three layers are included in this model? (Choose three.) A. Designated B. Distribution C. Core D. Access, C, D Q29.Exhibit: (Refer the EXHIBIT given below.) 11

13 A timber wholesaler in China has four servers accessible via the Internet and approximately 100 users. They primarily deal with 20 customers locate din eight different countries. They want to improve availability of their servers to their customers (see diagram). Which three components would you duplicate to achieve this? (Choose three.) A. Layer 3 switch B. Layer 2 switch C. User connections D. ATM connection E. Customers connection to the network Answer: A, B, D Q30. Which two Cisco router services perform network traffic analysis to assist in documenting a customer s existing network? (Choose two.) A. NetFlow B. CDP C. MRTG D. NetMon E. SNMP MIB compiler Answer: A, B Q31. You ve designed a converged network to carry voice calls on-net as close as possible to the destination to avoid long distance charges. 12

14 Which two are reasons that a VoIP call could go off-net earlier than designed? (Choose two) A. Remote voice gateway sending busy-back signal. B. Destination routing not configured on local and remote gateways. C. Call manager server is too busy to process the call. D. The telephone user dials an access code. Answer: A, D Q32. Which items are important when documenting the business requirements of a company? (Choose two.) A. Fixture company growth B. IP address assignments C. Current network topology D. Router software upgrades E. Customer support improvements F. Fixture software applications Answer: A, E Q33. What topology is represented in Diagram 1? A. High-level topology map of the customers current network. B. High-level topology map of the customers proposed packet flow. C. High-level topology map that meets the customers requirements. D. High-level topology map of the customers proposed intranet security system. Answer: A Q34. Which three modules comprise the Enterprise Composite Network Model? (Choose three.) A. Enterprise Campus B. Enterprise Edge C. Enterprise Server Edge D. Enterprise Core Backbone E. Service Provider Edge Answer: A, B, E Q35. Which three terms describe the primary functions of the core layer of the campus network design hierarchy? (Choose three.) A. High-speed transport B. Fault tolerance 13

15 C. Packet filtering D. Security E. Manageability Answer: A, B, E Q36. Which of the following statements regarding SNMP commands is false? A. Control of managed devices occurs when the NMS issues the write command. B. An agent reports an event when the managed device issues the trap command. C. Managed devices use the trap command when reporting events to the NMS. D. The NMS requests events from the managed devices when it issues the trap command. Q37. A small state college is planning to improve the security of their campus network, in particular the dorm network. Which information provided by the college is most relevant to the new design? A. User policy B. Number of users C. Applications permitted D. Speed of the network Answer: A Q38. You need to show proof of concept for a proposed new campus network that utilizes Layer 3 switching. The production network is business critical and no network disruptions are tolerated. Which approach should be used for this test? A. Pilot network B. Prototype network C. Live network D. Verification design Q39. When designing IPv6 into an existing IPv4 network, which two strategies allow the two address schemes to coexist to facilitate a migration? (Choose two.) A. Translate one protocol into the other. B. Encapsulate IPv6 packets into IPv4 packets. C. Bridge between the IPv6 IPv4 networks. 14

16 D. Enable anycast capability in the routing protocol. Answer: A, B Q40. According to the Cisco SAFE Architecture, the Enterprise Campus consists of which modules? (Choose three.) A. Server B. WAN C. Corporate Internet D. Building Distribution E. Core Answer: A, D, E Q41. What is the third step in building a pilot network? A. Investigate the competition. B. Test the design. C. Practice the demonstration. D. Schedule and present the demonstration. E. Script a demonstration of the test results. Answer: E Q42. AAA Video operates a chain of 50 video rental stores located in the Northwestern United States. They currently have a Point-of-Sale (POS) system in which each store posts its daily sales data and inventory changes to a central database through dial-up communication. There is no interaction between the stores and the central system during business hours. The central site runs on an Ethernet LAN. The only always-on WAN link is an Internet connection using wireless broadband to a local ISP. AAA wants to enhance their service offering by creating a new E-Commerce web site where customers can browse and search a catalog of video titles and select the ones they want for rental. The system will instantly communicate the order to the nearest store where employees pull the order and hold it until the customer picks it up. The service must operate on a 24x7 basis. AAA sees this new business strategy as a means to increase revenue and expand the business nationally. They see an opportunity to expand the web site in the future to video, DVD and music sales on a worldwide level. The company wants all stored to be connected to the central site through WAN links. The company is upgrading the central inventory database so that sales and rentals can be posted immediately in real-time. An Internet-based and instant-messaging system will be set up for all headquarters employees and store managers to use. AAA believes that networking the stores will improve order fulfillment processes, which will improve customer satisfaction and thus, boost revenue. It will also help communication with store employees. 15

17 AAA wants to upgrade the local LAN to a Gigabit and Fast Ethernet system to facilitate the demands of the new and upgraded systems. They have budgeted $500,000 for the networking equipment and another $10,000/month for the WAN charges including a faster Internet connection. They believe that 256Kbps speeds will be adequate to the stores. Since they have no staff capable of managing the new network, they will hire two engineers that already have the training and experience. The project must be complete in 6 months when the new inventory system goes online. The IT manager has concerns about the security of the servers and workstations on the network when all stores become connected. He doesn t want any Internet access to or from the stores. He is depending on you to recommend an effective yet affordable solution that will protect his system from intruders. What are three technical goals of AAA Video with regard to this network design project? (Choose three.) A. Sell merchandise through the E-Commerce site. B. Real-time posting of sales. C. Network security measures. D. Hire two new network engineers. E. Upgrade to a high-performance LAN. F. Enhance service offerings., C, E Q43. You are designing an IP addressing system for a large home, which has IP enabled end-systems (appliance, light switches, security systems, heating/coding systems and video cameras). This network is connected to the Internet 24 hours a day via an ADSL connection and uses Network Address Translation (NAT). The endsystems on this network are remotely accessed by the home owner to monitor the activities in her home. What IP addressing system would be most suitable for these end-systems? A. Public IPv4 addresses B. Private IPv4 addresses C. A combination of Private and Public IPv4 addresses D. Micro-IP addresses E. IPv6 addresses Q44. A very large organization has received its IPv6 address range from their Internet Service Provider and intend to use only IPv6 addresses internally. They will access the Internet through port address translation (PAT). What is a requirement for their Domain Name Servers, DNS? A. They no longer need DNS servers. 16

18 B. Their DNS servers need to support both IPv4 and IPv6 addresses. C. Their DNS servers need to support only IPv6 addresses. D. Their DNS servers need to support only IPv4 addresses. E. They need additional DNS servers in their network just for IPv6 addresses. F. There are no changed required to their DNS servers. Q45. WAN technologies operate at which three layers of the Open Systems Interconnect (OSI) model? (Choose three.) A. Presentation B. Data Link C. Transport D. Physical E. Session F. Network, D, F Q46. Which step should you consider when an inexperienced network engineer is implementing the design? A. Make the design implementation description as detailed as possible. B. Have the designer carry out the complex implementation steps. C. Prevent detailed steps that require the involvement of other staff members. D. Create less detailed implementation steps that exclude the direct involvement of the designer. Answer: A Q47. In which network is the IP address a valid node address that can be used on a workstation or other network device? A /23 B /24 C /24 D /25 Answer: A Q48. Upon visiting a customer site it is determined that a three-part firewall system should be implemented as a security measure. Which of the following components would be included? (Choose all that apply.) A. A router acting as an inside packet filter. 17

19 B. An independent WAN. C. An isolation LAN. D. A router acting as an outside packet filter. Answer: A, C, D Q49. What information will you need to include in your implementation to allow the engineer to gather further details? A. Corporate policies regarding protocols, standards, vendors, and applications. B. Reference to design documents. C. Availability of trained personnel within the organization. D. Budgetary resource limitations. Q50. Under ideal network design conditions, at which layer are most Layer 3 routing features such as summarization and redistribution performed? A. Core B. Distribution C. Access D. External Q51. What is a function of a firewall? A. Maintains separate routing information for each protocol supported on a router. B. Provides a security buffer between connected public networks and a private network. C. Provides user authentication between connected public networks and a private network. D. Reduces routing loops by preventing the flow of routing information to the source where that information was learned. Q52. The routers on a network are being documented for a technical report. Choose the items that should be included in his report. (Choose three.) A. Interface error statistics B. Router software revision C. Router power requirements D. Interface loads E. Interface configurations Answer: A, B, E 18

20 Q53. Your IP addressing requirements exceed the public class C address range assigned to your company, so you ve implemented private addressing. Which mechanism would allow all your users simultaneous access to the Internet? A. Translate using static NAT. B. Translate using dynamic NAT. C. Implement VLANs. D. Secondary IP network. Q54. The Mean Time Between Failure (MTBF) is a measurement of: A. Capacity B. Response time C. Utilization D. Efficiency E. Availability Answer: E Q55. Why are the PCM codecs uses in Europe and parts of Asia incompatible with those used in North America and Japan? A. Echo cancellation B. Code companding C. Pulse sampling D. Noise suppression E. Band limiting Q56. User A and User B work in separate buildings on a campus network. User A sends a packet to use B with an instant messaging application. Please place the actions that are performed on the packet in the proper sequential order as it travels from UserA to UserB. (Refer the EXHIBIT given below.) 19

21 Answer: The correct order of the steps is as given below: Step 1: Layer-2 switched toward the distribution switch Step 2: Layer-3 switched through Distribution toward core Step 3: Layer-3 switched across LAN core Step 4: Layer-3 switched through Distribution toward access Step 5: Layer-2 switched across access LAN to target host Explanation: Typically implementations follow the Layer2-Layer3-Layer2 model in the Cisco Model. Only without budget constraints is the Layer2-Layer3-Layer3 model used to provide extra features like redundancy in the Core Layer. But in this case, since User A and User B are in separate buildings, the Layer2-Layer3-Layer3 implementation is to be used. What happens is that the packet will go from access->distribution->core-> distribution->access. Q57. You are in the process of designing some changes to a customers network. The design calls for replacing hubs in several wiring closets with switches. You are planning for 30% more ports than exist now on the hubs. The customer wants Fast Ethernet speeds to the workstations. Each closet will be separated into a different IP subnet. All of the users that will connect to these switches use standard file and print applications plus Internet browsing. When designing the access layer of the network, which three questions should be asked to gain necessary additional information regarding the access layer? (Choose three.) A. How will VLANs be deployed? B. What uplink cabling exists? C. What level of redundancy is needed? D. Will QoS be needed? E. Will Gigabit uplinks be used?, C, E 20

22 Q58. Steps for designing Network layer addressing and naming include all but the following: A. Proposing a method for mapping geographical locations to router clusters. B. Developing a plan for configuring user station addresses. C. Designing a hierarchy for addressing. D. Designing route summarization. E. Designing a scheme for naming servers, routers, and user stations. Answer: A Q59. You are helping a customer design some enhancements to her network for scalability and availability. You discover that all routers on her network are Cisco but many of her switches come from different vendors and are owned by the departments where they are located. She has an outsourcing agreement for the maintenance of the network equipment. This outsourced service vendor has implemented CiscoWorks with SAA to manage the network. What are three Service Level Management challenges that you would need to address in your design proposal? (Choose three.) A. Your customer does not own the switches on the network. B. The switches and routers come from different vendors. C. She cannot utilize NetFlow on the network. D. She has no way to monitor SLA conformance. E. She does not manage the network with her own staff. Answer: A, B, E Q60. Which three are essential elements of a network design document that is ready to be presented to a customer? (Choose three.) A. Design specifications B. Organizational chart C. Implementation plan D. Proof of concept E. Data source Answer: A, C, D Q61. In a large campus network design, the server farm would normally connect to which layer in the design hierarchy? A. Distribution B. Access C. Core D. Edge E. External 21

23 Answer: C Q62. A medium sized accounting firm has four offices around the country: head office in Phoenix, and branches in Boston, Chicago and Los Angeles. They want connectivity between their branches with full redundancy and high availability. What topology would you recommend for this firm? A. Point to point B. Partial mesh C. Start hub and spoke D. Full mesh Q63. Which three steps are used to characterize an existing network? (Choose three.) A. Customer input B. Visual inventory C. Network audit D. Traffic analysis E. Server statistics F. Ping analysis Answer: A, C, D Q64. Network Performance is defined by which of the following items? (Choose all that apply.) A. Capacity B. Response time C. Packet size D. Utilization E. Efficiency Answer: A, B, D, E Q65. Which statement about developing a network design implementation plan is true? A. The implementation of a design must be overseen by the designer to ensure success. B. Implementation steps described in detail can be performed by a less-experienced engineer. C. Fallback steps can be reduced if a detailed pilot completes successfully. D. Many implementation steps can be performed simultaneously. 22

24 Q66. While examining the existing system of a new customer, you discover that their network management facilities provide a means to detect and correct network device failures, monitor device and bandwidth utilization, and they use SSH to manage devices. Which two functional areas of network management has this customer failed to fulfill? (Choose two.) A. Fault management B. Configuration management C. Accounting management D. Performance management E. Security management, C Q67. What does a tie trunk (tie line) interconnect? A. PBX switch with another PBX switch. B. PBX and CO switch (exchange). C. PBX and remote telephone. D. CO switch (exchange) and a remote telephone. E. CO switch (exchange) with another CO switch. Answer: A Q68. Virtual Private Networking (VPN) functionality can be provided at Layer 2 by which two mechanisms? (Choose two.) A. Leased Line B. IPSec C. Sonet/SDH D. Tunnelling/GRE E. Frame Relay F. ATM Answer: E, F Q69. Encryption addresses which network security concern? A. Data integrity B. User authentication C. Data authentication D. Data confidentiality 23

25 Q70. An Executive Summary contains all except which items? A. Benefits of the solution. B. Strategic recommendations. C. Purpose of the project D. Implementation considerations. E. Cost of the project. Answer: E Q71. A multi-layer LAN switches data outside of the source network based on information stored in which location? A. RIP tables B. OSPF tables C. Bridging tables D. Route processors Q72. AAA Video operates a chain of 50 video rental stores located in the Northwestern United States. They currently have a Point-of-Sale (POS) system in which each store posts its daily sales data and inventory changes to a central database through dial-up communication. There is no interaction between the stores and the central system during business hours. The central site runs on an Ethernet LAN. The only always-on WAN link is an Internet connection using wireless broadband to a local ISP. AAA wants to enhance their service offering by creating a new E-Commerce web site where customers can browse and search a catalog of video titles and select the ones they want for rental. The system will instantly communicate the order to the nearest store where employees pull the order and hold it until the customer picks it up. The service must operate on a 24x7 basis. AAA sees this new business strategy as a means to increase revenue and expand the business nationally. They see an opportunity to expand the web site in the future to video, DVD and music sales on a worldwide level. The company wants all stored to be connected to the central site through WAN links. The company is upgrading the central inventory database so that sales and rentals can be posted immediately in real-time. An Internet-based and instant-messaging system will be set up for all headquarters employees and store managers to use. AAA believes that networking the stores will improve order fulfillment processes, which will improve customer satisfaction and thus, boost revenue. It will also help communication with store employees. AAA wants to upgrade the local LAN to a Gigabit and Fast Ethernet system to facilitate the demands of the new and upgraded systems. They have budgeted $500,000 for the networking equipment and another $10,000/month for the WAN charges including a faster Internet connection. They believe that 256Kbps speeds will be adequate to the stores. Since they have no staff capable of managing the new network, they will hire two 24

26 engineers that already have the training and experience. The project must be complete in 6 months when the new inventory system goes online. The IT manager has concerns about the security of the servers and workstations on the network when all stores become connected. He doesn t want any Internet access to or from the stores. He is depending on you to recommend an effective yet affordable solution that will protect his system from intruders. Which are two technical goals of AAA Video with regard to this network design project? (Choose two.) A. 24x7 availability of the E-Commerce web site. B. Complete the project in 6 months. C. Keep WAN chargers below $10,000/month. D. Full-time network communication to all stores. E. Improve the order fulfillment process. Answer: A, D Explanation: To provide 24x7 availability and full-time network communications will require redundancy configurations, which are technical in nature. Incorrect Answers: B, and C: These are non-technical goals. E: This is an Application layer concern. Q73. The West Ridge School District in North Carolina has approximately 2,800 students occupying five schools: three grade schools, one junior high, and one high school. All telephone service is handled by the local phone company. Every phone call is switched by the providers centrex switch, then routed to the appropriate school. Each school is networked with fractional T1 Frame Relay and Cisco routers. The users are on a switched 10/1/100 network utilizing Cisco switched and Category 5 cable. Internet access is through the high school, which has an Internet connection through a provider 35 miles away via a T1 Frame Relay. The school district needs to put phones in each classroom for compliance with the Safe- Schools initiative, but the cost is high and facilities are lacking. In addition to the phones, the district would like to install video in each school for video conference and for distance learning in the high school. Video partners will be connected with ISDN PRI LINKS. There is also a need to protect the student information stored on local serves and shared between the schools are as students graduate from elementary school to junior high, and students transfer in and out of the district. What are two reasons for moving to a converged network at this time? (Choose two.) A. Cost savings by using a single cabling system. B. Reduction of long distance charges by using VoIP. C. Can increase the number of phones without upgrading outside facilities. 25

27 D. Eliminate reliance on local provider for any future phone calls., C Explanation: By implementing VoIP, we can definitely reduce phone charges if a percentage of calls are made internally. The second advantage is that we can have full control over the network without upgrading external facilities. In this case, phones can be added without contacting the telco. Incorrect Answers: A: Cost savings are not dependent on cabling systems. D: You cannot totally eliminate the reliance on the local provider as external calls still need to be public-switched. Q74. Exhibit: (Refer the EXHIBIT given below.) The diagram shows a standard, Layer 2 campus network design. Which numbered box represents the Core Layer? A. #1 B. #2 26

28 C. #3 D. #4 E. #5 Explanation: The Core Layer should be where the servers are located. Q75. You have designed and implemented a SAFE network, but users still complain of isolated DoS attacks directed at specific hosts in the e-commerce module. The operating systems on these servers have been patches and all unneeded services have been turned off, but the problem persists. What more can you do to reduce the effect of these attacks? A. Block all TCP traffic to these servers at the Internet firewall. B. Limit connection rate to these servers at the Internet firewall. C. Block all UDP traffic to these servers at the Internet firewall. D. Load-balance between multiple servers running the same applications. Q76. AAA Video operates a chain of 50 video rental stores located in the Northwestern United States. They currently have a Point-of-Sale (POS) system in which each store posts its daily sales data and inventory changes to a central database through dial-up communication. There is no interaction between the stores and the central system during business hours. The central site runs on an Ethernet LAN. The only always-on WAN link is an Internet connection using wireless broadband to a local ISP. AAA wants to enhance their service offering by creating a new E-Commerce web site where customers can browse and search a catalog of video titles and select the ones they want for rental. The system will instantly communicate the order to the nearest store where employees pull the order and hold it until the customer picks it up. The service must operate on a 24x7 basis. AAA sees this new business strategy as a means to increase revenue and expand the business nationally. They see an opportunity to expand the web site in the future to video, DVD and music sales on a worldwide level. The company wants all stored to be connected to the central site through WAN links. The company is upgrading the central inventory database so that sales and rentals can be posted immediately in real-time. An Internet-based and instant-messaging system will be set up for all headquarters employees and store managers to use. AAA believes that networking the stores will improve order fulfillment processes, which will improve customer satisfaction and thus, boost revenue. It will also help communication with store employees. AAA wants to upgrade the local LAN to a Gigabit and Fast Ethernet system to facilitate the demands of the new and upgraded systems. They have budgeted $500,000 for the networking equipment and another $10,000/month for the WAN charges including a faster Internet connection. They believe that 256Kbps speeds will be adequate to the 27

29 stores. Since they have no staff capable of managing the new network, they will hire two engineers that already have the training and experience. The project must be complete in 6 months when the new inventory system goes online. The IT manager has concerns about the security of the servers and workstations on the network when all stores become connected. He doesn t want any Internet access to or from the stores. He is depending on you to recommend an effective yet affordable solution that will protect his system from intruders. Which two are business constraints imposed by the AAA Video Company on this new network design project? (Choose two.) A. The new Internet-based messaging system. B. $500,000 equipment budget. C. No Internet access to stores. D. Upgrade to Gigabit Ethernet. E. The existing POS system., E Explanation: Budget is an apparent business constraint. How the business will flourish also depend on the existing application level system, in this case the POS. Incorrect Answers: A: This is not a constraint. C, and D: These are technical issues. Q77. The Smith and Jones Company (S&J) is a law firm in New York City. They recently signed a merger agreement with another firm on the other side of the city. The employees of the other firm will be moving into S&J s building. They will occupy two floors in the building. They will bring with them , file servers and an advanced webbased legal database system primarily accessed at the office. The partners of S&J would like to upgrade their network before the new employees move into the building. The current network installed at S&J has become very slow. The employees say that they can access the company website quicker from their homes over the Internet than on their local office network. They want you to make their LAN as fast as their WAN. You must also design enough capacity to accommodate the new firm whose users are more technically advanced. S&J would like to adopt VoIP throughout the combined company. Lastly, S&J wants to make sure that network security measures are in place for the new firm s web site and servers. They have been very frustrated by Internet-based viruses. They want to make sure that no hackers can access their servers from the Internet. Which three data-link layer features will need to be a part of the scope of this design project? (Choose three.) A. VLANs B. 10/100 auto sensing 28

30 C. Redundant WAN links D. Intrusion detection E. Gigabit Ethernet Answer: A, B, E Q78. Identify the fields that are associated with an IPv6 packet? (Choose four.) A. Header Length B. Payload Length C. Header Checksum D. Traffic Class E. Source Address F. Version, D, E, F Q79. ABC Company is an auto parts distribution company. They have a single location with headquarters in one office building and three warehouses. Their customer base consists of 400 independent auto parts retailers, which connect through direct links to their network to access an ordering system. The servers and access routers connecting to the retail outlets are on a separate Ethernet VLAN in the headquarters campus. The retail outlets are complaining about poor response time when they connect to the ordering system. ABC wants you to help them plan some improvements to their network to increase the performance of their customers connections to the ordering system. What are two additional details about ABC s existing network needed for this analysis? (Choose two.) A. Router ACLs providing security to the servers. B. Bandwidth of their connection to the Internet. C. Type of the connections to the retail outlets. D. Utilization on the servers VLAN. E. Number of users on the headquarters LAN. Answer: C, D Q80. What is the third step in building a prototype network? A. Determine how much of the network structure must be built to prove that the design meets the customers goals. B. Gain an understanding of what your competition intends to propose. C. Review extracted new customer requirements. D. Develop a testplan. E. Purchase and configure equipment. F. Practice demonstrations 29

31 Q81. The West Ridge School District in North Carolina has approximately 2,800 students occupying five schools: three grade schools, one junior high, and one high school. All telephone service is handled by the local phone company. Every phone call is switched by the providers centrex switch, then routed to the appropriate school. Each school is networked with fractional T1 Frame Relay and Cisco routers. The users are on a switched 10/1/100 network utilizing Cisco switched and Category 5 cable. Internet access is through the high school, which has an Internet connection through a provider 35 miles away via a T1 Frame Relay. The school district needs to put phones in each classroom for compliance with the Safe- Schools initiative, but the cost is high and facilities are lacking. In addition to the phones, the district would like to install video in each school for video conference and for distance learning in the high school. Video partners will be connected with ISDN PRI LINKS. There is also a need to protect the student information stored on local serves and shared between the schools are as students graduate from elementary school to junior high, and students transfer in and out of the district. Which two are means of protection the servers that contain student information? (Choose two.) A. Encrypt VoIP traffic to/from the call managers. B. Place a firewall between the Internet and the school network. C. Use public-key cryptography. D. Implement host-based security on the servers., D Explanation: A firewall will provide frontline protection against a public network. The second-level protection will be to implement host-based security on the servers to ensure only personnel are authorized to use the information stored on the server are allowed to access them. Incorrect Answers: A: Our interest is in protecting data, not voice. C: This would work if we are communicating over a public network, but in this case we are not. Q82. Match the submodules of the Enterprise Composite Network Model with the functions they would perform for a Voice Network design. (Refer the EXHIBIT given below.) 30

32 Answer: Building Access: IP phone power Building Distribution: concentrates wiring closets Campus Backbone: fast packet switching Server Farm: connections to call managers Q83. What is the shortest notation of IPv6 address 2080:0000:0000:0000:0008:0000:0000:200C? A. 2080::8::200C B. 2080::0:8:0:0:200C C. 2080:0000:0000:0000:0008:0000:0000:200C D. 2080::8:0:0:200C E. 2080:0:0:0:8::200C F. 2080:0:0:0:8:0:0:200C Q84. Which three terms describe the primary functions of the distribution layer of the campus network design hierarchy? (Choose three.) A. End-user connectivity. B. Connects access devices to the core backbone. C. Provides WAN connections. D. Enforces security policies. E. Provides QoS services. F. High speed transport, D, E Q85. Which Cisco IOS feature allows the translation of private addresses into registered IP addresses? A. Cisco Address Translation B. Network Address Translation 31

33 C. Local Address Registration D. Global Address Registration Q86. While designing a network for a new client, the IS Manager informs you that the company is considering a hub and spoke topology with links that will be low bandwidth and rarely changing routes. Which of the following would you recommend? A. Static Routing B. Dynamic Routing C. IGRP D. RIP-2 E. AARP Answer: A Q87. Routing protocols are characterized by which of the following features? (Choose all that apply.) A. Operation at only the lowest layer of the OSI model. B. Upper-layer protocols existing in a given protocol suite. C. Operation at the Session layer of the OSI model. D. Responsibility for path determination and traffic switching. Q88. The West Ridge School District in North Carolina has approximately 2,800 students occupying five schools: three grade schools, one junior high, and one high school. All telephone service is handled by the local phone company. Every phone call is switched by the providers centrex switch, then routed to the appropriate school. Each school is networked with fractional T1 Frame Relay and Cisco routers. The users are on a switched 10/1/100 network utilizing Cisco switched and Category 5 cable. Internet access is through the high school, which has an Internet connection through a provider 35 miles away via a T1 Frame Relay. The school district needs to put phones in each classroom for compliance with the Safe- Schools initiative, but the cost is high and facilities are lacking. In addition to the phones, the district would like to install video in each school for video conference and for distance learning in the high school. Video partners will be connected with ISDN PRI LINKS. 32

34 There is also a need to protect the student information stored on local serves and shared between the schools are as students graduate from elementary school to junior high, and students transfer in and out of the district. Which two are advantages of suggesting IP telephony to this customer? (Choose two.) A. Voice, video and data run on the same Cat5 cable. B. Long distance charges can be reduced by running VoIP. C. All reliance on the local phone company can be eliminated. D. The cost of adding additional telephones is minimal. Answer: A, D Explanation: Voice, video and data can utilize the same Cat 5 infrastructure and the cost of additional phones would be reduced because the local phone company would not have to add additional lines. Incorrect Answers: C & B: Long distance charges would not be reduced because calls outside the network would still utilize the long distance provider. You would still use the local phone company for calls outside the network. Q89. You are proposing a multi layer switching solution with multiple paths to a global organization. The proposal is to replace their current non-redundant network of routers. Which three benefits of multi layer switching would you emphasize when you present your proposed design to the organization s board of directors? (Choose three.) A. Smaller broadcast domains. B. Increased network availability. C. Increased security due to VLAN functionality. D. Increased network performance. E. Fast convergence due to OSPF protocol use. F. Increased throughput due to multiple paths., D, F Q90. What protocol is responsible for resolving an IP address to a MAC address? A. ARP B. TCP/IP C. IGRP D. IPX E. DDP Answer: A 33

35 Q91. The state hospital has six clinics spread through the state connected to the main hospital facility through dedicated links. Doctors practicing in the state have online access to patient diagnostics, scheduling and billing data in various hospital databases. The hospital has signed new agreements with three insurance providers and they are planning to open a new clinic on the opposite side of the state. The new clinic will have a trauma center, which will require constant communication with the local emergency dispatch center. What additional information should you obtain about applications in use on the network? A. The authentication used by the application. B. The routing protocols supported by the application. C. The application data-link layer overhead. D. The applications level of criticality. Q92. Which two inputs are required to determine the number of circuits needed from a PBX to a converged network when planning trunk capacity? (Choose two.) A. Number of sites B. Busy hour traffic C. Average call duration D. Number of users per site E. Blocking probability (GoS), E Q93. Which three routing protocols have high speed convergence? (Choose three.) A. RIPv2 B. IS-IS C. EIGRP D. BGP E. OSPF F. IGRP, C, E Practice Questions: Case Study: CASE 1: FSI Test Equipment Incorporated: Precision test equipment manufacturing 34

36 FSI manufactures high-end, high-volume semi-custom test equipment. Though the company only employs 150 people, sales revenue and profitability are very high because of niche market control and product price levels. Each piece of equipment is built to order and goes through rigorous testing and integration. As a result of market dominance, growth and profitability, company management has decided to make an initial public offering (IPO) of its stock. FSI has customers through out the world. Because their equipment integrates so tightly with customers high tech manufacturing systems, the company in reality becomes a partner with its customers during the design, manufacturing, and testing of the equipment. Purchase order to operational date cycles are typically one year and approximately five systems are in the development cycle at any gives time. Timely, accurate, and secure communications with the customer throughout the cycle is in imperative. Hardware design involves a significant number of CAD drawings to be stored and transmitted. Software development requires hundreds of thousands of lines of code for each customer. Though much of the code is reused, it nonetheless requires configuration and revision control for each customer. With funds raised from the IPO, FSI wants to improve its ability to interface, communicate and respond to its customers. It wants to implement secure FTP of code and drawings to its customer. Security is of utmost importance and therefore FSI is not sure if can trust the Internet to accomplish these transfers. Because of financial concerns, the company would much prefer the Internet to a private network if it can be convinced that the transfers can be made secure. Otherwise it will consider a private network. The company also would like to implement an inter-company workflow system for routing of electronic forms between FSI and its customers world-wide. Again, security is the issue. It would be wonderful if they can use the Internet for both these functions, but the new board of directors must be convinced. FSI offices are in San Jose, California. The project team assigned to customers has two sub-teams: the manufacturing and development team in San Jose, and the integration teams moves on site to the customers facilities. Communication is by telephone, , and even overnight package delivery. 25% of FSI employees (38-40) people are housed at customer sites at any given time. These field persons are in teams of approximately 8 people. A Novell PC LAN on Ethernet is established for each team within the customers facilities with a dialup Internet connection using Livingston router for . In the San Jose office, FSI has two LANs with 80 PCs. The main LAN has 5 sun AutoCAD workstations that will use the test software, 20 Pentium UNIX engineering workstations for software development on one segment, and 50 office automation desktops running the Lotus Suite on another segment. These two LAN segments are connected to a Novell server with the two Ethernet cards as the only routing mechanism between the two. The second LAN has five processes monitoring an analysis PCs that collect and analyses the test data. This data is accesses continuously by the engineering staff from their workstation. The two LANs are networked with a third Internet card in the Novel server. Engineering staff is frequently frustrated with the performance across this link. You have been asked to provide a design and justification for an intranet/internet bases solution that will convince the board of directors that the solution is viable and secure. 35

37 CASE 2: EIC Satellite Systems: Digital satellite television programming sales EIC sells minidish satellite systems and television programs in central Europe. Its sales network comprises 10 company owned offices, 25 distributed sales and installation offices and a central office in Milan, Italy. In the central office 75 representatives provide 24 hours telephone support and order processing for programming changes. There are 200 employees in the central office with PCs running Microsoft Office in addition to telephone representatives. The company s order processing, billing, accounting and programming systems reside on a large AS400 system in Milan. The 10 company offices are connected to this system with 9600bps leased lines. 25 distributor offices dial in to the system twice a day to upload order and download installation work order. An Ethernet LAN with three Novel servers supports the 275 central office employees. On average, the 10 offices have 4 PCs connected via Ethernet with Microsoft Windows 95. The leased line in each office does not provide a touted connection but a serial connection of 5250 terminal emulation to the communication port on the PC. The 25distributer offices dial in to the three PC Anywhere remote control computers that run 5250 terminal emulation and scripts that download installation work orders and upload new account orders to the AS400. To reduce transaction processing coast EIC will implement intranet technology to replace the current data communication mode. A Web server will be installed on the AS400 with backend CGI that will interface to the order processing, billing and work order system. Java applets will be built for both remote PCs. EIC anticipates that these changes will allow it to handle twice the transactions without upgrading the AS400, while maintaining current transaction processing times. The company offices will be connected via ISDN routers using bonding between channels for the new browser-based applications. Similar browser-based connections will be accomplished for the distributor offices using a direct dial to the EIC Milan main office. Unless convinced otherwise, EIC intends to use the existing 9600bps lines for the routed connections. It is also desirable to provide Internet dial-up connections for customers to make their own configuration changes online and to order pay-per-view programming. Security for these transactions will be provided by secure Web transactions. Data transmission encryption is not necessary because these basically are secure Web-based credit card transactions. EIC would like a design and proposal from you to provide the networking for this new architecture that must be implemented in parallel with current operations. CASE 3 Orchard Leasing Corporation: Office building leasing and facilities management (Refer the EXHIBIT given below.) 36

38 Orchard Leasing is a contract leasing and facilities management company with headquarters in Denver, Colorado and offices in Houston, Texas, Atlanta, Georgia, Minneapolis, Minnesota, Chicago, Illinois. Orchard contracts with owners to provide leasing, maintenance and management of high-density office buildings and building complexes. A local office is maintained in one building in each of the cities. The company s superior service and creative and aggressive marketing has lead to very rapid growth in each of the Orchard s marketplaces. In fact, Orchard has just signed contracts for four buildings in London, England and three buildings in Frankfurt, Germany. However this growth has out stripped Orchard s ability to keep up with administrative tasks associated with business, and management is very concerned about its ability to continue to provide the same level of service, given the two new international contracts. Each of the offices has historically maintained its own operation center including a Windows NT file server with leasing, marketing, maintenance, and facilities management (including billing) software, as well as standard office productivity software provided by the WordPerfect suite. The business applications are all custom are all custom applications developed in Access and Visual Basic. Each office has an Ethernet network on 10BaseT cabling. The leasing and marketing software systems run on Apple Macintosh and maintenance and facilities management runs on Intel-based PCs. Typically, there are five PCs and two Macintoshes in an office. The Denver office has six PCs and three Macintoshes but will increase those numbers to ten PCs and six Macintoshes after the proposed upgrades. Data is consolidated monthly in an office report sent by via the Internet to the home office in Denver. This Internet 37

39 connection is by way of local ISP on a dial up connection. With the addition of the London and Frankfurt offices, Orchard had decided to consolidate a significant portion of administrative tasks in Denver. The lease administration, tenant billing, accounts receivable accounts payable, and master building records will all be consolidated in Denver. The marketing, maintenance, and office productivity software will continue to reside in the branch offices. The number of computers, servers and Macintoshes and PCs will remain the same as the branch offices but a new NT Server and the additional Macintoshes and PCs will be added in Denver. With this upgrade, Orchard will add Microsoft s Exchange with outlook for , scheduling, and contact management. The current branch office files servers will have less of a load and therefore Orchard believes they will be able to run Exchange Server and the existing server hardware with additional memory and disk space. Additionally, Orchard will be establishing a World Wide Web site in Denver to be used for marketing and communication to tenants. Orchards new chief financial officer (CFO), who has responsibility for computer and information systems, has requested competitive bids for a turn-key WAN to meet Orchards needs. High performance across a WAN is not seen as a priority. The communications that will occur between offices are back-office functions and are not time critical. Accomplishing the transmissions this morning rather then tomorrow is the level of criticalness. Minimizing cost will take priority over unneeded performance. The CFO estimates that beyond , which will be normal, there will be a daily transmission of records for consolidation both to and from each office and Denver each day. These documents are approximately 2MB in size. CASE 4: Leviathan System s Inc: Business software development, publishing, and sales Traditionally, Leviathan has developed and sold AS400 business software solutions. In addition to it s headquarter office, it had five sales offices in United States, a European office, and an Asian office. It is converting its software to Windows NT client/server technology using SQL Server as the database engine for the new project line. The offices are connected with a point-to-point SNA network with line speeds varying from 56k to a Frac T1. Token Ring is installed within the office for LAN applications. Each of the facilities is wired with Category 5 cable in an Intermediate Distribution Facility/Main Distribution Facility (IDF/MDF) design. The company recently decided that it must completely convert the Token Ring to Ethernet. This conversion will first occur in the HQ facility and then in each of the branch offices. The conversion will occur one IDF at a time, that is, the Token Ring and Ethernet networks will coexist as work groups are converted. The client-server products will be added, but the AS400 product line will not go away. Therefore, SNA will be a fact of life for the foreseeable future. The customer prefers to have a single WAN but has decided to look at a frame relay solution to transport the client/server traffic and keep the SNA network intact. Some TCP/IP is in use, but only at the local LANs. The AS400s are connected to the Token Ring via a 5294 controller that provides the terminal server functions between the LANs and the AS400. Leviathan 38

40 considers it too expensive and problematic to put the AS400 on Ethernet, so management would consider maintaining the AS400 on a small, four-node Token Ring network and put the rest of the company in Ethernet. There are terminals in the HQ office and the sales office, each has approximately 6PCs running 5250 terminal emulation, including the Europe and Asia offices. The 5250 terminals will be converted to PCs using the 5250 terminal emulation software. The HQ office also had 100 PCs and 5 Macintoshes (for production of marketing material and product documentation). Additionally, there are two notebook computers in each sales office. These notebooks already use terminal emulation to dial into the AS400 for demonstrations and sales reporting. This dial-in functionality must continue to exist for the AS400 and must be provided for the new client/server products. There are four AS400 at the HQ office facility and one each in two if the US sales offices, the European office, and the Asian office. Four Windows NT servers will be located at HQ, and a small NT server in each of the sales offices. Most of the 100 PC s in HQ run 5250 terminal emulation, which utilizes NetBIOS. Two NT Servers are at HQ. Two additional servers will be installed for a total of four Windows NT Servers, two for development (a Digital Equipment Corporation Alpha and a Hewlett- Packard multiprocessor Pentium), one for Sales and Marketing, and one for all other support. Software development traffic to the AS400 occurs around the clock but peaks from 1 to 7 p.m. The development effort on the new product is expected to follow the same pattern. 15 new employees will be hired for this development effort. All other use of the network occurs in normal business hours. Leviathan will install an Internet server hosted on an additional Windows NT system. It will provide a World Wide Web presentation of Leviathan products and an FTP server to deliver product updates and fixes. It will also host a discussion group system and SMTP and POP3 servers for to customers and prospects. The site must provide secure FTP and a firewall to protect Leviathan internal systems. Leviathan has standardized Microsoft Office for office productivity and Microsoft tools for development of its new product line. Company is provided by a system on the AS400. This system will be converted to Microsoft Exchange, but not as a part of this project. The IS manager has asked for a design to connect all the offices to provide the Ethernet connectivity within the HQ office and to provide for the Internet firewall. Questions: Q94. Which two Apple Talk protocols are Data Link layer protocols? (Chose two.) A. Zone Talk B. FDDI Talk C. Cable Talk D. Local Talk 39

41 , D Q95. Which protocol uses both bandwidth and delay as a path metric? A. RIP B. EGP C. OSPF D. IGRP Q96. View the case study. In diagramming the packet flow for the new application at EIC Satellite Systems, which benefits of the new network would you bring to EIC s attention? A. The router at Milan will be a single point of failure. B. Three dial-in connections will not be sufficient for the future. C. The new network will provide access to the Internet for the AS400s. D. The new network can provide a redundant path through the Internet to reach the AS400. Q97. In the Leviathan Systems case study, what is an identified business-related issue that affects the network design? A. The AS400s will continue to be maintained on Ethernet. B. The company will discontinue using the AS400 product line. C. The company will use an Internet Web site for the World Wide Web, FTP, and discussion groups. D. The company will be rolling out a new hardware product that uses Windows NT client/server technology. Answer: A Q98. When determining whether a customer will see major performance enhancements by moving from a hubbed Ethernet environment to a switched Ethernet environment, which step should you take first? A. Investigate the level of collisions. B. Investigate the level of broadcasts. C. Investigate whether the hubs support auto-partitioning. D. Investigate the token-holding timer use by network stations. Answer: A 40

42 Q99. Which type of PPP frame negotiates the network layer protocols to be used during a connection? Answer: NCP frame Q100. In the Leviathan Systems case study, how many users will need AS400 terminal emulation with the new design? A. 15 to 50 B. 50 to 100 C. 100 to150 D. 150 or more Q101. Which two routed protocols services are implemented at the transport layer of the OSI reference model? (Choose two.) A. Flow control B. Multiplexing C. Data conversion D. Session management E. Session establishment F. Application synchronization Answer: A, B Q102. Which type of WAN virtual circuit is created on demand and terminated when transmission is complete? Answer: Switched Virtual Circuits (SVC) Q103. View the Case Study, which task must you complete in order to develop a highlevel topology map for FSI Test Equipment? A. Identify the ISP. B. Identify the implementation schedule. C. Determine the exact number and type of PCs, servers and hosts. D. Within reason, determine the location, number, and type of PCs, servers, and workstations. Q104. For the Orchard Leasing case study, what would most likely be your first step in diagramming the packet flow of business applications? 41

43 A. Identify any bottlenecks in the current network. B. Identify the router products to be used in the system. C. Identify the media to be used in each path of traffic flow. D. Identify the locations of all user and nodes that use the business applications. Q105. When does the advanced IGRP protocol send update packets and to whom does it send the packets? (Choose two.). A. When a new neighbour is discovered, update packets are sent to that router. B. When network route changes, update packets are sent to a multicast address. C. When a network routes changes, update packets are broadcast to all nodes. D. When a neighbours router hold down timer expires, other neighbour routers send update packets to that neighbour., D Q106. Drag each LAN protocol to its corresponding feature. Drag and Drop. (Refer the EXHIBIT given below.) Answer: (Refer the EXHIBIT given below.) 42

44 Q107. Which type of address is expressed as 12 hexadecimal digits, operates at the data link layer, and is burned into ROM by manufacturer? Answer: Mac Q108. What is an advantage of virtual LAN s (VLANs)? A. Broadcast control B. Small bandwidth domains C. Support discontiguous subnets D. Easy mapping of network-layer addresses to data link-layer addresses Answer: A Q109. When comparing the advantages and disadvantages of a full mesh versus a partial-mesh Frame Relay design. Which statement is most accurate? A. Split horizon limits connectivity in a full mesh. B. A full mesh is more expensive due to more routers. C. Broadcast copying overhead is higher in a partial mesh. D. A partial mesh is less expensive due to fewer virtual circuits. 43

45 Q110. Before making network design recommendations you need to characterize the existing network s availability and performance. As a general guideline a shared Ethernet segment should not be saturated that is the work utilization should be no more than? A. 20% B. 30% C. 40% D. 70% Answer: C Q111. In the Leviathan Systems case study, which statement describes the performance characteristics of the existing network? A. NetBIOS is overloading the existing WAN circuits. B. Apple Talk and SNA traffic is overloading some LAN segments. C. The 56-kbps circuits have proven to provide sufficient throughout. D. The customer has not identified performance issues in the current network. Q112. Which two metrics can IGRP use when selecting a route? (Choose two.) A. Hops B. Link cost C. Bandwidth D. Reliability Answer: C, D Q113. What is the function of a routing table? A. Resolves MAC addresses to network addresses. B. Queues frames to be transmitted by a router. C. Records the physical topology of an internetwork. D. Stores path information for destinations in the internetwork. Q114. Which statement about Apple Talk network entities is true? A. Nodes are assigned to sockets. 44

46 B. Sockets are assigned to zones. C. Sockets are assigned to networks. D. Nodes are assigned to zones for service advertising. Q115. What is the first step to perform when planning a proactive network management strategy? A. Determine network service goals. B. Implement a network manage system. C. Locate network irregularities and bottlenecks. D. Plan and implement improvements to the network. Answer: A Q116. VLSM relies on providing length information explicitly with each use of an address. A. Host B. Class C. Packet D. Prefix Q117. To characterize the customer s applications, you can use the following job aid. To which category would client/server belong? A. Number of users. B. Name of application. C. Type of application. D. Number if hosts or servers. Answer: C Q118. Which frame size will provide a impact on network performance when using Ethernet? A. A frame size (MTU) that is the minimum supported. B. A frame size (MTU) that is the maximum supported. C. A frame size (MTU) that uses the largest data block size. D. A frame size (MTU) that uses the smallest data block size. 45

47 Q119. Which type of ATM connection supports bi-directional communication? A. Multipoint B. Point-to-point C. Point-to-multipoint D. Point-to-point and point-to-multipoint Q120. Which to statements about FDDI are true? (Chose two.) A. Token passing controls media access. B. All attached devices must be connected to both rings. C. The dual rings wrap on either side of a ring failure or device failure. D. The secondary ring provides additional bandwidth during heavy traffic. E. Multimode fibre allows greater network diameters than single mode fibre. Answer: A, C Q121. For which two protocols was the enhanced IGRP protocol developed to improve? (Choose two.) A. RIP B. BGP C. OSPF D. RTMP E. NLSP F. IGRP Answer: A, F Q122. View the Case Study. What regard to network capacity in the Leviathan System case study, statement is true? A. The terminal emulation traffic is well understood, and is not a capacity issue. B. A prototype must be developed to demonstrate the adequacy of security between offices. C. Because we do not have information on the disk storage in the servers, we know almost nothing regarding network capacity. D. Because little is known about the true load from the software developers, it would be a good idea to monitor this area during a phased implementation. Q123. Proactive management means all of the following except: 46

48 A. Monitoring the network. B. Collecting statistics and watching trends. C. Troubleshooting and resolving network problems. D. Allocating sufficient staff time and hardware and software resources. Answer: C Q124. Which condition does NOT create LAN media problems? A. Protocols that do not scale well. B. Excessive numbers of collisions on Ethernet networks. C. Long waits for the token on Token Ring or FDDI networks. D. Too many devices contend for access on a LAN segment. Answer: A Q125. Which statement is true about network security policies? A. End users do not need training on network security. B. Security policies should be bases on an understanding of which company assets are most valuable. C. Security systems should be designed to maximize the number of secrets, for example, passwords and encrypt ion keys. D. A company that has an inflexible security policy that is hard to change is less vulnerable then a company with a flexible policy. Q126. How do Ethernet IEEE nodes respond to collisions on the network medium? A. Participant nodes stop transmitting for amount of time and send out randomly. B. Participant nodes stop transmitting and the node holding the token is given. C. Participant nodes stop transmitting and listen for traffic before resuming transmissions. D. Participant nodes stop transmitting data and request medium access from their attached hubs. Answer: A Q127. For the FSI Equipment case study, what would most likely be your first step in diagramming packet flow generated by the autoflow box stations? A. Identify the location of all CAD workstations. B. Identify any bottlenecks in the current network. C. Identify the router products to be used in the system. 47

49 D. Identify how many users are on the same network segment. Answer: A Q128. Exhibit: (Exhibit not available.) What benefit does the IGRP split horizon feature provide for this network? A. Router B cannot publish routes to Router A that is learned from Router A. B. Router A and B can publish routes in Autonomous System 2 without help from Router C. C. Router C can publish routes from Autonomous System 2 to Router A without publishing routes to Router B. D. Routers C can publish routes in Autonomous system 2 to Router A without publishing routes to router B. Answer: A Q129. Which area does the S reference point define on an ISDN end-to-end connection? A. The reference point between NT1 and NT2 devices. B. The reference point between user terminals and an NT2. C. The reference point between non ISDN equipment and a TA. D. The reference point between NT1 devices and line termination equipment in a carrier network. Q130. ISDN networks supports both. A. Synchronous and ADSL modems. B. Toll-connecting trunks and tie trunks. C. Terminal handlers and external PADs. D. Network termination 1 and network termination 2 devices. Q131. When naming servers, it is recommended that you append the to the server name. A. Location B. IP address C. PC designation D. Segment designation 48

50 Q132. In the EIC Satellite Systems case study, it is not necessary to build the entire network to provide the network design meets the customer s needs. A. True B. False Q133. Your customer specified that the IP routing must adhere to recent industry standards and must scale to support a large network. Which routing protocol will you recommend to your client? A. RIP B. EGP C. IGRP D. OSPF Q134. For which two types of traffic are line connection-oriented services most useful? (Choose two.) A. Data B. Video C. Voice D. Broadcast messages, C Q135. Drag each information format to the layer of the OSI reference model where it is used. Note: Some of the OSI Model layers will not be used. Drag and drop. (Refer the EXHIBIT given below.) 49

51 Answer: (Refer the EXHIBIT given below.) 50

52 Q136. Which network design is commonly used to support remote offices accessing the central headquarters of a company? A. The central site has a fractional T1 connection and each remote site has a full T1 connection to the central site. B. Each remote site has a router with one ISDN BRI and the central site has a router with ISDN PRI. C. The central site has a multiservice WAN ATM switch that offers personal communication services to the remote sites. D. The central site uses a hub and spoke topology including an Ethernet concentrator that has multiple WAN interfaces. Q137. A channel exceeds the agreed bandwidth usage scone. How does the ATM QOS policing feature respond? A. Terminates the virtual path. B. Suspends communications for 50 ms. C. Reduces the size of the cell window. D. Makes data cells eligible for discarding. Q138. How does a transparent bridge learn which nodes connect to which bridge interfaces? A. It examines the source MAC addresses used in network traffic on each interface. B. It examines the source network addresses used in network traffic on each interface. C. It sends explorer packets out whenever an unknown node is specified as on destination. D. It broadcasts hello packets to all nodes on each interface and records addresses included in response packets. Answer: A Q139. Which routing rule prohibits a distance vector router from sending routing information to the same interface from which the routing information was originally received? A. Whole downs B. Split horizon C. Spanning tree logarithm D. Split horizon with poison reverse 51

53 Q140. Orchard leasing has just informed you that it has been reading about router security breaches of companies with Internet access. They have decided to purchase a firewall product that prevents hackers from seeing the internal IP addresses Orchard leasing has just informed you that it has been reading about router security. When provisioning a firewall for the Denver office, which class of products would best fit Orchard Leasing s needs? A. Cisco 1600 series. B. Cisco 3600 series. C. Cisco secure PIX fire wall. D. Catalyst 4000 series switch. Answer: C Q141. Use Cisco IOS network encryption if router utilization is or lower. A. 10% B. 40% C. 60% D. 80% Answer: A Q142. In the Orchard Leasing case study, what is a performance requirement and constraint of Orchard? A. Reduced transaction processing costs. B. Support software development traffic. C. Sufficient through put in router for terminal emulation. D. Adequate WAN performance for the transmission of daily, non-critical documents and normal Answer: C Q143. Which address is updated at each hop in the path in the path switching? Answer: MAC Q144. What are three advantages of using fibre rather then copper as a network medium? (Choose three.) A. Security B. Low cost C. 100 Mbps bandwidth D. Ease of installation 52

54 E. Larger network diameter F. Immunity to RFI and EMI Answer: A, E, F Q145. What are two differences between 10BaseT and 100BaseT? (Choose two.). A. Frame formats B. Addressing schemes C. Transmission speed D. Media access method E. Maximum network diameter Answer: C, E Q146. Cisco IOS supports generic traffic shaping. It can be said that generic traffic shaping. A. Cannot be used with Frame Relay or SMDS. B. Does not work on layer 2 data-link technologies. C. Provides for generalized BECN on a per virtual circuit (VC) basis D. Helps eliminate the bottleneck situation by throtting back traffic volume at the source End. Q147. Which tool will help you characterize network traffic? A. CiscoWorks 2000 B. Sniffer Technologies Sniffer C. Netsys Performance Service Manager D. All of these choices. Q148. What is NOT a network management platform? A. RMON B. SunNet Manager C. HP OpenView HP-VX D. HP OpenView Windows Answer: A Q149. For the EIC Satellite case study, what would most likely be the first step in diagramming the first packet flow of the new application? 53

55 A. Identify any bottlenecks in the current network. B. Determine if Ethernet switching will be required. C. Determine if the 6600bps lines will be adequate. D. Identify the location of all users and nodes that will use the new application. Q150. Which condition would result in recommending routing instead of switching? A. Many Ethernet collisions. B. Bandwidth utilization over 40 percent on Ethernet. C. Many desktops protocols sending packets to find services. D. Excessive number of Ethernet run frames (shorter then 64 bytes) Answer: C Q151. Which two routing protocols does NetWare use? A. RIP B. IGRP C. RTMP D. NLSP Answer: A, D Q152. View the Case Study. In the FSI Test Equipment case study, which criterion would indicate that the prototype is a success? A. Speedy response. B. Speedy AS400 application response time. C. Fast office productivity application response. D. File Transfer of CAD drawings within a given time frame. Answer: C Explanation: Engineering staff is frequently frustrated with the performance across this link. This was a concern. Incorrect Answer: D: As far as file transfer is concerned, speed was not an issue, security was. Q153. Which statement is NOT true about OSPF? A. OSPF is defined by the EIFF in a set of RFCs. 54

56 B. OSPF is an interior routing protocol that uses DUkstra s algorithm. C. OSPF was designed to replace EGID because of scalability issues with EGID in the Internet. D. OSPF is usually implemented in a hierarchy including areas connected to a backbone area. Answer: C Q154. Which two services does the OSPF Hello protocol provide? (Choose two.). A. It discovers neighbour routers. B. It helps to elect a designated router. C. It solicits routers from neighbour routers at startup. D. It allows administrators to test for network connectivity between two devices., C Q155. How does the Spanning-Tree Protocol prevent bridging loops? A. It disables all ports on bridges that could create loops. B. It selectively disables bridge ports that could create loops. C. It clears the bridge table on bridges that would create loops. D. It blocks access to bridge table on bridges that would create loops. Q156. LAPB is a denotative of the SDLC protocol. Which three LAPB features are supported by SDLC? (Choose three.) A. Frame type B. Frame format C. Field functions D. ABM transfer mode Answer: A, B, C Q157. What is the name of the NetWare protocol that advertises netware services? Answer: SAP Q158. Which error checking method is employed by Frame Relay to determine of errors occurred during transmissions between source to destination? (Choose three.) A. DE B. CPC C. FCS 55

57 D. FECN E. BECN F. Odd and even parity. Answer: A, D, E Q159. For which two actions is the Active Monitor and a Token Ring network responsible? (Choose two.) A. Generating new tokens. B. Granting token priority. C. Removing unclaimed frames. D. Checking frames errors. E. Authentication stations logging on the ring. Answer: A, C Q160. What are the two differences between 10baseT and 100BaseT? (Choose two.). A. Frame formats. B. Addressing schemes. C. Transmission speed. D. Media access method E. Maximum network diameter. Answer: C, E Q161. In the Orchard Leasing case study, which statement is a business-related issue that affects the network design? A. Each office maintains a Windows NT Server. B. Orchard has just signed contracts in London and Frankfurt. C. Documents are transferred via the Internet with dial-up connections. D. The business applications are custom applications written in Access and Visual Basic. Q162. View the Figure and Case Study in the Leviathan Systems case study, Leviathan Figure 4 represents a A. High level topology map that meets the customer s needs. B. High level topology map of the customer s proposed packet flow. C. High level topology map of the customer s proposes intranet security system. D. High level topology map of the customer s proposed terminal emulation packet flow. Answer: A 56

58 Q163. The IP Routing Information Protocol (RIP): A. Includes MD5 authentication. B. Specifies no more then 15 hops between and stations. C. Handles the process of updating the Time To Live field in an IP header. D. Sends the network addresses and shored mask, as pad of the routing update. Q164. Which other type of network device operates in a manner similar to LAN switches? A. Transparent bridge B. Source route bridge C. Translational bridge D. Source route translational bridge Answer: A Q165. What is the first step in designing network layer addressing and naming for a network? A. Design route summarization (aggregation). B. Design a method for mapping geographical locations to network numbers. C. Design a hierarchy for addressing autonomous systems, areas, networks, subnetworks, and end stations. D. Design a plan for distributing administrative authority for addressing and naming at the lower levels of the hierarchy. Answer: C Q166. Which layer of the OSI model corresponds to the functions performed by TCP? A. Physical Layer B. Data Link Layer C. Network Layer D. Transport Layer E. Session Layer F. Presentation Layer G. Application Layer 57

59 Q167. Before making network design recommendations, you will characterize the existing network s availability and performance. As a general guideline, the response time should generally be less then. A. 1 second B. 50 microseconds C. 25 microseconds D. 100 milliseconds Q168. View the case study. Which task would you complete to identify EIC Satellite Systems business issues that will affect your network design? A. Identify and document EIC s internal data-flow patterns. B. Identify and document EIC s existing technology investment. C. Identify and document the technical competencies of the support staff. D. Identify and document the business objectives, schedule requirements, and political issues. Q169. Drag each IEEE protocol to its corresponding physical medium. (Refer the EXHIBIT given below.) Answer: (Refer the EXHIBIT given below.) 58

60 Q170. View the Case Study. Which statement is true with regard to development of a detailed network design drawing for Orchard Leasing? A. The routers required at each Orchard location should be identified. B. The Domain Name System server should be identified. C. Information on the exact model and features of each AS400 will be required. D. Based on the software development efforts at Orchard, the Catalyst 3500 Series switch is a good choice for Ethernet Switching. Answer: A Q171. View the case study. Diagramming application information flow for the FSI Test Equipment case study is important because: A. It will help identify media requirements. B. It will help identify applications to eliminate. C. It will help identify potentially heavy traffic paths. D. It will help identify the requirements that an ISP must meet. Answer: C Q172. What is the purpose of the apple talk AARP protocol? A. To update apple talk routing tables. B. To map networks or nodes to zones. 59

61 C. To test for remote node availability. D. To map Apple Talk addresses to physical addresses. Q173. According to RFC 1918, these blocks of addresses are allocated for private networks. What is NOT a range of private addresses as identified in RFC 1918? A B C D Q174. View the Case Study. EIC figure2, taken from the EIC Satellite System case study, represents. A. packet flow. B. Business system packet flow. C. A high-level topology of the customer s current network. D. A high-level topology of the customer s proposed network. Answer: C Q175. In the FSI Test Equipment case study, the ISP has notified FSI that will be connecting to a Bay Networks router. What would be the most probable routing protocol choice? A. RIP B. IGPP C. OSPF D. EIGPP Answer: C Q176. What is NOT a component of a three-part firewall system? A. A router that connect the corporate Internetwork and the outside world. B. An isolation LAN that is a buffer between the corporate Internetwork and the outside world. C. A router that acts as an inside packet filter between the corporate Internetwork and the isolation LAN. D. A router that acts as an outside packet filter between the isolation LAN and the outside Internetwork. 60

62 Answer: A Q177. For router summarization to work correctly all of the following requirements must be meet except? A. A subnet mask of must be used. B. Multiple IP addresses must share the same left most bits. C. Routing protocols must carry the prefix 6 length with the 32 bit IP address. D. Routers must base their routing decisions on a 32 bit IP address and prefix length that can be up to 32 bits. Answer: A Q178. Which LAN switching feature is unique to cut-through switches? A. CRC checking. B. Reduced latency. C. Higher port density. D. Frame length validation. Q179. Routing protocol convergence time: A. Is determined by Enhanced IGRP. B. Is affected by the data link-layer technology in use. C. Is the same for distance vector protocols and link-state protocols. D. Includes the time to detect a fault, but not time to determine a new route. Q180. What is NOT a system for authenticating users? A. SLIP B. RADIUS C. TACACS D. Kerberos Answer: A Q181. View the Case Study. In the Leviathan Systems case study, it is NOT necessary to build the entire network to prove the network design meets the customer s needs. A. True 61

63 B. False Answer: A Q182. Which OSPE entity can connect to another autonomous system? A. ABR B. ASBR C. Backbone router D. Designated router Q183. Which Cisco IOS queuing implementation looks at the size of messages and ensures that high volume senders do not crowd out low volume senders? A. Priority queuing. B. Custom queuing. C. Waited fair queuing. D. WAN Jacob queuing. Answer: C Q184. In which two situations is static routing often useful? (Choose two.) A. In a stub network. B. In a non-switched environment. C. In a dial-on-demand configuration. D. When internetwork topology frequently changes. E. When there are multiple paths to a destination. Answer: A, C Q185. When would you advise a customer to use static routers? A. Use static routes when scalability is important. B. Use static routers when bandwidth utilization is not a problem. C. Use static routers from a central core network to a leaf network. D. Use static routers on Layer 2 forwarding devices such as LAN and ATM switches. Answer: C Q186. Drag each routing type to its corresponding description. Drag and Drop. (Refer the EXHIBIT given below.) 62

64 Answer: (Refer the EXHIBIT given below.) Q187. OSPF supports priority routing for which TCP/IP feature? 63

65 A. PS B. TCP C. TOS D. UDP Answer: C Q188. In the Orchard Leasing case study, it is not necessary to build the entire network to improve the meet the customer s needs? A. True B. False Answer: A Q189. As stated in the FSI Test Equipment case study, which statement is a businessrelated issue that affects the network design? A. Timely, accurate, and secure communication with FSI customers is imperative. B. The network must provide bandwidth to support large CAD and engineering files and data. C. In order to accomplish the onsite work required of the field team, a Novell LAN is installed at each customer site. D. The CAD and engineering workstations are maintained on a separate LAN segment because of the importance of consistent high performance of the systems. Answer: A Q190. What is the maximum connection speed supported by the X.21 BIS protocol? A. 5.6Kbps B. 19.2Kbps C. 28.8Kbps D. 33.3Kbps Q191. What is the role of secondary station in the SDLC protocol? A. A secondary station provides fault tolerance for a primary station. B. A secondary station enables communication for remote devices when polled by a primary station. C. A secondary station initiates communication with primary station when remote devices are ready to communicate. D. Each station can be either a primary or secondary station. The primary station is the station that initiates communications, and the secondary is receiving station. 64

66 Q192. The classic firewall system has three specialized layers. What is NOT one of three layers? A. An integration LAN that buffers between the corporate internetwork and the outside world. B. A router that acts as an inside packet filter between the corporate internetwork and the isolation LAN. C. A router that acts as an outside packet filter between the isolation LAN and the outside internetwork. D. An isolation LAN (or demilitarized zone) that it buffer between the corporate internetwork and the outside world. Answer: A Q193. WAN protocols can operate at three layers of the OSI reference model. What are they? (Choose three.) A. Session layer B. Network layer C. Physical layer D. Transport layer E. Data Link layer F. Application layer G. Presentation layer, C, E Q194. How do SNMPv1 Network Management Systems request multiple records from an MIB? A. The NMS uses the Dump protocol operation. B. The NMS uses the GetMib protocol operation. C. The NMS uses the GetBulk protocol operation. D. The NMS uses multiple Get and GetNext protocol operations. Q195. To help reduce the complexity associated with identifying and analyzing customer problems and designing solutions, Cisco has developed a basic framework into which most customer problems fit. The framework is a triangle that contains the following components: A. Protocols, Transport, and Media B. Transport, Media, and NetManagement C. Media, Protocols, and NetManagement 65

67 D. Protocols, Transport, and NetManagement Answer: A Q196. With regard to network capacity in the EIS Satellite Systems case study, which statement is true? A. The AS400 access and usage patterns are well understood and do not represent a capacity issue. B. A prototype must be developed to demonstrate that the intranet technology will in fact work for EIC. C. Because we do not have information on the disk storage in the servers, we know almost nothing regarding network capacity. D. Because little is known about the true load from the sales offices, it would be a good idea to monitor this area during a phased implementation of a single site. Q197. SNMP uses traps to. A. Systematically isolate points of failure in the managed network. B. Prevent unauthorized users from performing set operations to alter management information. C. Allow managed devices to report specific significant events to the NMS whenever they occur. D. Allow network administrators to monitor specific protocol traffic information by selective filtering. Answer: C Q198. It can be generally assumed that a larger frame size (MTU) will result in efficiency. A. Less B. Better C. No affect D. Network management Q199. What are routed protocols? A. Protocols that determine optimal paths through Internetworks using routing algorithms. B. Protocols used to create Internetworks communication models such as the OSI reference model. 66

68 C. Protocols that perform a variety of functions required for communication between user application in source destination devices. D. Protocols that determine the optimal path to transport information between the logical layers of the OSI reference models in a given device. Answer: C Q200. Which statement identifies a business constraint for Orchard Leasing? A. Some TCP/IP is in use in the current system. B. Microsoft Exchange has been selected as the system. C. Orchard has decided to consolidate a significant portion of the administration on Denver. D. Orchard has decided to keep the NT servers, Macintoshes, and PCs in the field offices. Answer: C Q201. The hierarchical model distribution layer can serve many functions. What is NOT a function of the distribution layer? A. Broadcast/multicast domain definition. B. Routing between virtual LANs (VLANs). C. Providing workgroup/user access to the network. D. Demarcation between static and dynamic routing protocols. Answer: C Q202. Cisco IOS queuing services? A. Generally run on non-mission critical networks. B. Reduce the size of data to be transmitted over a network link. C. Control whether a network transmission is forwarded or blocked at a router s interface. D. Help a network administrator manage the demands applications put on the network and routers. Q203. Which two problems can occur when transparent bridges are started on a network? A. Bridge tables become inaccurate. B. Packets returned are undeliverable. C. Broadcast storms disable all network communications. D. Duplicate data appears on remote network computer screens. 67

69 Answer: A, C Q204. What is a TE2 device used for in an ISDN connection? A. Connecting an NT2 device to an NT1 device. B. Connecting a non-isdn terminal to ISDN through a TA. C. Connecting four-wire subscriber to two-wire loops. D. Connecting to ISDN through a four-wire, twisted-pair digital link. Q205. When should SAP filters be applied to NetWare service advertisement messages? A. Before convergence of all network routers. B. Whenever services will not be used in a particular area. C. After all services have been advertised for 30 minutes. D. After there has been no change in network services for 30 minutes. Q206. Match Link State and Distance Vector to their correct descriptions. Drag and Drop. (Refer the EXHIBIT given below.) 68

70 Answer: (Refer the EXHIBIT given below.) Q207. Which three layers of the OSI reference model are addresses by the ITV-T ISDN standards? (Chose three.) A. Session layer B. Network layer C. Physical layer 69

71 D. Transport layer E. Data Link layer F. Application layer G. Presentation layer, C, E Q208. View the Case Study. In the Leviathan System case study, which WAN protocol would be the best choice for connecting the sales offices with the main office? A. X25 B. ISDN C. Leased Line D. Frame Relay Q209. Which statement identifies an FSI test equipment schedule constraint? A. FSI has customers throughout the world. B. The typical implementation of a system is one year. C. FSI feels that an Internet-concentrated design will save time and money. D. 25% if the FSI s employees are housed at customer s offices at any given time. Q210. Which address is NOT reserved for private internets by the Internet Assigned Numbers Authority (IANA): A B C D Q211. Extracting a customer s requirement for a new network design is one of the most important tasks in the Internetwork design. Extracting customer s requirements require you to identify which security requirements? A. Characterize traffic behaviour between the central site and remote users. B. Determine requirements for remove users to access data. C. Identifying any requirements for authenticating routes received from accessed routers or any other routers. 70

72 D. Determine the authorization and authentication requirements for corporate branch offices, mobile users, and telecommunications. Q212. What are two typical uses of ISDN? (Choose two.) A. Upgrade a lower bandwidth T1 line. B. Provide multiple links to home offices. C. Connect backbone devices in CDDI networks. D. Connect high priority lobes on Token Ring networks. E. High-speed transfer of data, graphics and multimedia., E Q213. As stated in the Leviathan Systems case study, what is not a requirement for the network? A. Support software development traffic. B. Support server-to-server traffic between offices. C. Reduce transaction processing costs on the AS400. D. Provide sufficient throughput to support terminal emulation. Answer: C Q214. Which LAN protocols are used in the Leviathan Systems case study? A. TCP/IP and IPX B. TCP/IP and NetBIOS C. TCP/IP, NetBIOS, and SNA D. TCP/IP, NetBIOS, and Apple Talk Answer: C Q215. Which two statements about routers are true? (Choose two.) A. They route traffic at the MAC level. B. They provide interfaces for a wide range of links at a wide range of speeds. C. They are capable of supporting multiple protocol suites operating in parallel. D. They are typically used to create separate collision domain within the same LAN. E. They provide a low enough cost per port that it is feasible to attach a single device to each port., C Q216. What is the function of an SNMP MIB? 71

73 A. Stores data reported from all monitored stations at the NMS. B. Stores the IP address of the stations at the NMS monitors. C. Stores configuration data that controls how the NMS for monitored stations for updates. D. Stores monitored variables and the variables that control operation of a single monitored station. Explanation: Incorrect Answer: A: This option should be the network management application on the NMS. Q217. At which layer of the OSI reference model do bridges and switches operate? A. Session layer B. Network layer C. Physical layer D. Data Link layer E. Transport layer F. Application layer G. Presentation layer Q218. Which transmission type allows a network station to send a network message to a specific subset of nodes on the network? A. Unicast B. Sub cast C. Broadcast D. Multicast Q219. View the Figure and Case Study. FSI Figure 1, taken from the FSI Test Equipment case study, represents: A. packet flow. B. The terminal emulation packet flow. C. A high-level topology o the customer s current network. D. A high-level topology of the customer s proposed network. Q220. View the Case Study. 72

74 In the EIC Satellite Systems case study the best recommendation for assigning IP addresses to end-user computers is to? A. Assign IP addresses manually. B. Have users chose their own address. C. Use the Cisco Network Registrar product. D. Use Cisco s IOS software NAT feature to dynamically assign IP addresses. Answer: A Q221. View the Case Study. Which statement is true with regard to development of topology map for Leviathan Systems? A. The DSN system should be identified. B. A Cisco router will be required at each Leviathan location for WAN connectivity. C. Information in the exact model and features of the AS400 system will be required. D. A Catalyst 3500 Series XL switch will be required at each Leviathan location for WAN connectivity. Q222. Which type of routing occurs between multiple autonomous systems and uses EGPs? A. Source routing. B. Integrated routing. C. Inter-domain routing. D. Intra-domain routing. Answer: C Q223. In the Leviathan Systems case study, you discover that the developers LAN needs to be operational as soon as possible. Assuming that all developers will be located on a single floor of the headquarters office, which task would you include in a phrase 1 effort to meet the customer s need? A. Order the WAN circuits ahead of time. B. Purchase and install the Internet firewall. C. Purchase and install the headquarters router. D. Purchase and install the Ethernet switch on the headquarters LAN. Q224. In the Leviathan Systems case study, which statement describes the constraints imposed by the existing network? 73

75 A. The existing wiring has no affect on the network design: B. The migration Token Ring to Ethernet will require retesting of all cabling. C. The migration from Token Ring to Ethernet will require rewiring of all facilities. D. The Token Ring and Ethernet LANs must coexist on the existing cabling system for a short period. Q225. Before making network design recommendation. You will characterize the existing network s availability and performance. As a general guideline, the buffer misses should not exceed more then about in one hour on any Cisco router. A. 10 B. 25 C. 50 D. 100 Q226. Orchard Leasing s management says it must be assured that the U.S offices will function properly before it proceeds with the two international sites. In which task would you include in phase 1 to meet the customer s need? A. Purchase and install the Internet Web site. B. Purchase and install the headquarters router. C. Purchase and install Denver s Internet site. D. Purchase the international Frame Relay Circuits. Q227. Which ATM protocols allow Ethernet and Token Ring traffic to flow through an ATM network? Answer: AAL5 Q228. View the Figures and Case Study. Which figure represents a high-level topology map that meets Leviathan Systems needs? A. Leviathan figure 1 B. Leviathan figure 2 C. Leviathan figure 3 D. Leviathan figure 4 74

76 Q229. Which Ethernet encapsulation types are supported in Netware networks? A. Novel 802.2, 802.3, 802.5, and Ethernet II. B. Novel 802.2, 802.3, 802.5, and Ethernet SNAP. C. Novel 802.2, 802.5, Ethernet II, and Ethernet SNAP. D. Novel 802.2, 802.3, Ethernet II, and Ethernet SNAP. Q230. When designing a flat switched network, you can: A. Have the same number of IPX and IP nodes without any performance degradation. B. Have more IP nodes then IPX nodes on the same segment without any performance degradation. C. Have more IPX nodes than IP nodes on the same segment without any performance degradation. D. Have more Apple Talk nodes than IP nodes on the same segment without any performance degradation. Q231. Which type of PPP frame negotiates the network layer protocols to be used during the connection? Answer: NCP frames Q232. SNMP agents are: A. ISO officials who periodically perform audits on companies running target SNMPmanaged networks. B. Applications designated to monitor the activity of SNMP management systems and alert the user in the event of a problem. C. Software modules running in managed devices whose function is to make information about the device available to the NMS. D. Computers dedicated to the task of querying SNMP devices for relevant information and cataloging that information in a database. Answer: C Q233. What is NOT a feature of access management? A. Encryption B. Physical security C. User passwords D. Packets filtering 75

77 Q234. In the FSI test equipment case study is it not necessary to build the entire network to improve the network design meets customer s needs. A. True B. False Answer: A Q235. For the EIC Satellite Systems case study, what is a fact to consider in establishing EIC acceptance criteria of the new network? A. EIC intends to use a single PRI in Milan. B. Memory will have to be added to the AS400 C. A web server will be installed on the AS400 D. Some of the distributors use Apple Macintoshes Answer: C Q236. Drag each network device to its corresponding function. Task: Drag and drop. (Refer the EXHIBIT given below.) Answer: (Refer the EXHIBIT given below.) 76

78 Q237. View the case study. Which task would you complete to identify Leviathan System s organizational objectives that will affect your network design? A. Identify and document Leviathan s internal data-flow patterns. B. Identify and document Leviathan s existing technology instrument. C. Identify and document the technical competencies of the support staff. D. Identify and document the business objectives, schedule requirements, and political Issues. Q238. In Leviathan Systems case study, which statement indicates an acceptable approach to demonstrate that the proposed design meets the customer s need for performance, security, capacity, and scalability? A. A phased in approach would work well with this network design. B. A detailed prototype of the network should be tested first before any installation. C. The entire network needs to design, installed, and tested before any users are permitted to work on the network. D. The legacy network should be removed first, then all new components of the network need to be installed and tested before any users are permitted to work on the network. Answer: A 77

79 Q239. How do NetWare clients use NetWare services? A. NetWare clients must use computers designed for NetWare. B. NetWare clients must use applications designed for Netware. C. NetWare clients must use special utility programs to access network services. D. Access to services is transparent. Services appear to be provided by client computers. Q240. When writing a Request for Proposal (RFP), which section should you use to describe your recommended solution and the features and benefits it provides? A. Summary. B. Design Solution. C. Executive Summary. D. Design Requirements. Q241. Which two interior gateway routing protocol features represent an improvement over RIP? (Choose two.) A. Support for up to 255 hops. B. Remote shut down of invalid links. C. Support for unequal multi-path routing. D. Centralized routing management console. Answer: A, C Q242. For the Leviathan Systems case study, what would most likely be your first step when you diagram the packet flow of the 5250 terminal emulation application over the network? A. Identify the router products to be used in the system. B. Identify the bottlenecks in the current 5250 data stream. C. Identify the media to be used in each path of traffic flow. D. Identify the location of all user and nodes that will use 5250 emulation. Q243. As a guideline, none of the network segments should have more then broadcasts/multicasts. A. 5 percent B. 10 percent 78

80 C. 20 percent D. 35 percent Answer: C Q244. Which application and positioning statement best describes the Catalyst 1900 series switch? A. Workgroup stackable with WAN option. B. Scandalous, low cost switch for 10BaseT. C. Multiplayer, multiple 1, pn, backbone switch. D. Stackable, high performance workgroup switch. Q245. View the case study. Which application will only be using IP for Orchard Leasing case study? A. WordPerfect Suite B. World Wide Web server C. Local business applications D. Denver business applications. Q246. Which two statements about switched virtual circuits and permanent virtual circuits are true? (Choose two.). A. PVC sessions are initiated just once. B. SVCs and PVCs share a physical communications path with other virtual circuits. C. SVCs provide greater bandwidth because they communicate over multiple virtual circuits. D. A PVC cannot share a physical communications path with other virtual circuits to retain its permanent status. Answer: A, B Q247. Which statement describes how ARP operates on a single LAN? A. The sending station sends a unicast packet to the destination station requesting the destination stations MAC address. The destination station sends a response containing its MAC address. B. The sending station sends a packet to the LAN router requesting the MAC address associated with the given network address. The router consults its ARP table and sends a response containing a MAC address. 79

81 C. The sending station broadcasts a packet to the entire network requesting the MAC address associated with the given network address. The station with the given network address sends a response containing its MAC address. D. The sending station sends a hello packet to the entire network. Each station on the network replies with a hello packet that contains the stations MAC address. The sending station uses this information to build an ARP table that matches network addresses and MAC addresses. Answer: C Q248. What is not an advantage of using private Internet addressing? A. It increases an enterprise s flexibility to access the Internet. B. It conserves the globally unique address space by not using it where global uniqueness it not required. C. It enables operationally and administratively convenient addressing schemes as well as easier growth paths. D. It allows enterprises to gain flexibility in network design by having more address space at their disposal than they could obtain from the globally unique pool. Q249. Both distance vector and link-state routing protocols converge more quickly if there is: A. Redundancy in the network topology. B. Route redistribution between protocols. C. Consistent use of the Network Time Protocol (NTP) D. Consistent use of the Time To Live field in the IP header. Answer: A Q250. Which LAN switching feature is unique to cut through switches? A. CRC checking. B. Reduced latency. C. Higher port density. D. Frame length validation. Q251. Which two statements are valid for a PVC? (Choose two.) A. Idle B. Call set up C. Data transfer D. Access control 80

82 E. Call termination Answer: A, C Q252. Which address is not reserved for private Internets by assigned numbers authority (ANA)? A B C D Q253. View the Case Study. Which statement is true with regard to development of topology for Orchard Leasing? A. Dial-up requirements must be further developed. B. A router will be required at each Orchard location. C. Each Windows NT server is maintained at each site. D. Information on the exact model and features of each NT server hardware will be required. Q254. Proactive network management means all of the following except: A. Monitoring the network. B. Collecting statistics and watching trends. C. Troubleshooting and resolving network problems. D. Allocating sufficient staff time, and hardware and software resources. Answer: C Q255. What is not feature if the hierarchical model for network design? A. A hierarchical design facilitates changes to the network architecture. B. When the hierarchical design modes is used, redundancy is not required because each payer provides fault tolerance and reliability. C. Management responsibility and network management systems can be distributed to the different layers of a modular network architecture. D. The modular nature of the hierarchical model enables appropriate use of bandwidth within each layer of the hierarchy, thus reducing cost. 81

83 Q356. Which two services does the Diffusing Update Algorithm (DUAL) performs for Enhanced IGRP routers? A. Selects loop-free routers. B. Enables faster convergence. C. Compresses route update packets. D. Selects a designated router for an autonomous system. Answer: A, B Q257. In the FSI Test Equipment case study, you discover that the most critical issue is secure, timely communications with the field sites over the Internet. Which possibility would you include in a prototype lab to convince the board of the acceptability of the Internet solution? A. Order and install the WAN circuits in the prototype lab. B. Purchase and install the Internet firewall in the prototype lab. C. Order and install a remove access server in the prototype lab. D. Purchase and install the Ethernet switch designed into the headquarters LAN. Q258. As stated in the Leviathan systems case study what is not a requirement for network? A. Support software development traffic. B. Support server to server traffic between offices. C. Reduce transaction processing costs on the AS400. D. Provide sufficient through put to support terminal emulation. Answer: C Q259. View the Case Study. Orchard Leasing has just informed you that is has been reading about router security breaches of companies with Internet access. They have decided to purchase a firewall product that prevents hackers from seeing the internal IP addresses. The company feels a firewall will provide a more secure environment. When provisioning a firewall for the Denver office, which class of products would best fit for Orchard Leasing s needs? A. Cisco 1600 Series router B. Cisco 3600 Series router C. Cisco Secure PIX Firewall D. Catalyst 4000 Series switch Answer: C 82

84 Q260. In the EIC satellite system case study, management s most critical concern is the speed of the ISDN lines to the sales office. Which activity would best prove that these lines should be adequate? A. Set up a lab and simulate 56/64 Kbps lease lines connected to the Internet for browsing. B. Perform a simple demonstration of a Web browser s performance on and ISDN line to an Internet site. C. Implement the network with the existing 9600bps lines and let EIC see that the performance is lacking. D. Perform a simple demonstration of a Web browser s performance on the Internet on a 33.6Kbps connection. Q261. Which tool is most helpful for maintaining and upgrading network device configurations? A. A cable tester. B. Remote monitoring. C. Network management software. D. Network modelling and simulation software. Answer: C Q262. Which statement describes how a APR operates on a single LAN? A. The sending station sends a unicast packet to the destination station requesting the destination stations mach address. The destination station sends a response containing its match address. B. The sending station sends a packet to the LAN router requesting the match address associated with the given network address. The router consults its ARP table and sends a response containing a match address. C. The sending station broadcast a packet to the entire network requesting the Mac address associated with the given network address. The station with the given network address sends a response containing its match address. D. The sending station sends a hello packet that contains the stations mach address. The sending station uses this information to build an ARP table that matches network addresses and mach addresses. Answer: C Q263. View the Figure and Case Study. Orchard Figure 1 from Orchard Leasing case study represents: A. A high-level topology of the customer s current network. B. A detailed topology of the customer s proposed network. C. packet flow and business application packet flow. 83

85 D. A high-level topology of the customer s proposed network. Answer: A (or B)? The exhibit is missing so it is hard to tell. Q264. In the Orchard leasing case study, there will be server (s) that will be used for the Denver business applications? A. 1 B. 2 C. 4 to 5 D. 8 or more Q265. For the Leviathan Systems case study, what would most likely be your first step when your diagram the packet flow of the 5250 terminal emulation application over the network? A. Identify the router products to be used in the system. B. Identify any bottlenecks in the current 5250 data stream. C. Identify the media to be used in each path of the traffic flow. D. Identify the location of all user and nodes that will use the 5250 emulation. Q266. When is the route to a node on remote ring determined in an SRB Token Ring network? A. Before data is sent. B. When the data arrives as the first source route bridge. C. When the Spanning-Tree Protocol responds to a route request. D. As the data passes through intermediate source route bridges. Answer: A Q267. View the Case Study. Which statement is true with regard to development of a topology map FSI Test Equipment? A. A FastHub 400 will be required for desktop switching. B. IPX support will be required at the headquarters location. C. At each of FSI s locations, a router providing Ethernet and WAN support is required. D. The Cisco 3640 is a good router choice because it supports both Ethernet and Token Ring. 84

86 Q268. Which two statements about DDR are true? (Choose two.) A. It requires a point-to-multipoint connection. B. Uninteresting traffic causes the Cisco router to immediately terminate an existing session. C. It can be configured to take advantage of leased lines during non-peak traffic times. D. It enables a Cisco router to dynamically create and close a switch-circuit session on demand. E. It evaluates traffic as interesting or uninteresting and creates a session only for interesting traffic., E Q269. Many technologies have been developed to support to remote access. Which statement is true about the design goes into the different technologies? A. ADSL was designed to support analog transmission of voice, video and data. B. Frame relay was envisioned as a reliable alternative to dedicate leases lines. C. X.25 was designed for simplicity and cost effectiveness when the physical layer is reliable. D. High-speed digital leased lines were developed to minimize overhead traffic on WAN circuits. Q270. What happens when the IP RIP route timer expires? A. The route is marker invalid and deleted from route table. B. RIP tests the route three times and deletes the route if no reply is received. C. The route is marked invalid, remains in the table, and is not advertised to other routers. D. The route is marked invalid and remains in the route table until the route flush. Q271. Which device initiates a session in an X.25 network? A. DTE B. DCE C. PSE D. PAD 85

87 Q272. When responding to a Request for Proposal (REP), which section should you direct at the key decision makers in a company to clearly articulate your strategy for the project? A. Summary. B. Design Solution. C. Executive Summary. D. Design Requirements. Answer: C Q273. In the following example, the Class B network number of was divided into the following four areas: Backbone North Campus Central Campus South Campus The of the third octet can be used to identify the area. A. First bit B. First 2 bits C. First 3 bits D. Last 6 bits Q274. When broadcast and multicast are more then approximately of the traffic on LAN, performance degrades? A. 10% B. 20% C. 30% D. 40% Q275. View the Case Study. Which statement is true with regard to development of a detailed network design drawing for EIC Satellite Systems? A. The ISP DNS should be used. B. A router will be required at each EIC-owned location. C. Information on the exact model and features of the AS400 will be required. D. Based on the number of server at EIC catalyst 2900 series XL switch is a good choice for Ethernet switching 86

88 Q276. Which routed WAN protocol solution would you recommend for Orchard Leasing? A. IP only. B. IP and IPX. C. IP and IPX only. D. IP, IPX and Apple Talk. Answer: A Q277. What is NOT a business constraint (or limitation) on a project? A. Documenting the timeline for this project. B. Documenting the names and types of new protocols. C. Documenting the budget and resources available for this project. D. Identifying any network staffing requirement such as hiring or training. Q278. When implementing LAN communications over the ATM network, you must have which type of device per ELAN? A. LAN emulsion server. B. LAN emulsion router. C. LAN emulsion gateway. D. ATM address mapping service. Answer: A Q279. Which three statements about CDDI are true? (Choose three.) A. It uses twisted pair cabling. B. It supports 100Mbps bandwidth. C. It allows two KM between stations. D. It does emit electrical signals. E. It provides dual rings for fault tolerance. Answer: A, B, E Q280. Exhibit: (Refer the EXHIBIT given below.) 87

89 Which two problems can occur when the transparent bridges are started on the network shown in the exhibit? (Choose two.) A. Bridges table becomes inaccurate. B. Packets returned are undeliverable. C. Broadcast storms disable all network communications. D. Duplicate data appears on remote network computer screens. Answer: A, C Q281. When implementing LAN communications over an ATM network, you must have which type of device per ELAN? A. LAN emulation server. B. LAN emulation router. C. LAN emulation gateway. D. LAN emulation mapping service. Answer: A Q282. Which statement is true with regard to development of topology map for Leviathan Systems? A. NetBIOS and Apple Talk support will be required at the headquarters location. B. To support to headquarters LAN needs, Ethernet, Token Ring, and SNA switching is required. 88

90 C. To support the software development efforts to Leviathan. Ethernet and Token Ring switching is critical. D. At the headquarters location and at most of the sales offices, a router providing Ethernet, Token Ring, and WAN support is required. Q283. When regard to network security in the Leviathan Systems case study, which statement is true? A. The network must protect the AS400s from unauthorized access. B. A prototype must be developed to demonstrate the adequacy of security. C. The Internet site could be implemented and security completely tested as a separate phase without creating a risk for other phases. D. Network-level encryption is a requirement. You should encourage the customer to implement a test lab to verify the security of data transmissions. Answer: C Q284. You are setting up an ATM network, which ATM Adaptation layer type should you use to support the voice circuit emulation? A. AAL.1 B. AAL.2 C. AAL3/4 D. AAL.5 Answer: C Q285. Isolating requirements for fault management, accounting management, configuration management, and performance management would fall under which customer requirement? A. Identifying business constraints. B. Identifying security requirements. C. Identifying performance requirements. D. Identifying manageability requirements. Q286. How does a hold-down prevent routing loops? A. It prevents routers from counting-to-infinity. B. It prevents routers from propagating outdated routing information. C. It blocks redundant paths through the internetwork until the primary path should fail. D. It prevents routers from sending routing information learned from a neighbouring router back to the neighbouring router. 89

91 Q287. How do Apple Talk nodes receive their node addresses? A. Nodes request their configuration from a DHCP server. B. Nodes choose random addresses to start up and test for conflicts. C. MAC addresses in each node are used for the node address, and a router assigns the network address. D. Node addresses are assigned during software configuration and a router assigns the network address. Q288. Drag and drop. Drag each ISDN interface type to its corresponding features. (Refer the EXHIBIT given below.) Answer: (Refer the EXHIBIT given below.) 90

92 Q289. When designing IP addressing, it is important to design route summarization. What is NOT true with route summarization? A. It reduces the routing update traffic. B. It reduces the overall router overhead. C. It increases the complexities of the network. D. It reduces the number of routes in the routing table. Answer: C Q290. Which statement describes the specialized role that the core layer of the hierarchical model plays? A. The core layer provides policy-based connectivity. B. The core layer provides resource discovery services. C. The core layer provides optimal transfer between sites. D. The core layer provides workgroup access to the Internetwork. Answer: C Q291. Which two LAN switching features are unique to store-and-forward switches? (Choose two.) A. CRC checking. B. Reduced latency. C. Higher port density. D. Frame length validation. 91

93 Answer: A, D Q292. How is data transmitted in a Token Ring network? A. A node with data to transmit signals the network with a token. When the token is returned to the node, it begins transmitting the data. B. A node with data to transmit signals the hub to which the node is attached. The hub grants access to the network medium based upon priority of the transmission. C. A node with data to transmit listens for traffic on the network medium. If no traffic is detected, the station reserves the medium with a token and begins. D. When a node with data to transmit gains possession of the token, the node modifies a bit in the token, appends the data, and sends the modified token to the next station on the ring. Q293. Which three statements about Ethernet and IEEE are true? (Choose three.). A. They are broadcast mediums. B. They only support coax cable. C. Each network station must examine every frame. D. Token passing prevents collisions on the medium. E. Any network station can access the medium at any time providing the station detect no tramp on the medium. Answer: A, C, E Q294. In the FSI test equipment case study, there will be users who will be using test analysis software. A. 5 B. 20 C. 50 D. 150 or more. Q295. In the Leviathan Systems case study, Leviathan s management expressed the need for the network to operate fully when the Vice President of Development begins to bring in his new developer staff. In order to phase in the new system, what would be the most logical first step? A. Completely install and test the network in the new building before the move. B. Bring the developers LAN online and test it. Then phase in the rest of the network. 92

94 C. Convert the sales offices one at the time and connect them to the Frame Relay network. D. Install and test a Cisco 3600 series router that connect the AS400 Token Ring and the SNA network. Then install and test the developers network. Q296. Which two statements regarding DLCIs are true? (Choose two.) A. DLCIs are not necessary unique. B. DLCIs are not necessary with PVCs. C. DLCIs initiate a Frame Relay communication exchange. D. DLCIs are logical identifiers for Frame Relay virtual circuits. E. DLCIs are carries equipment and sit at the border of the carrier and customer networks. F. DLCIs are customer equipment and sit at the border of the carrier and customer networks. Answer: A, D Q297. Which statement is NOT true about Frame Relay? A. A Frame Relay connection is identified by DLCI. B. Frame Relay is based on the IEEE standard for metropolitan-area networks. C. Frame Relay uses FECN to tell a receiving DTE that a message experienced congestion. D. At the customer s site there is a single electrical interface that appears to be many distinct interfaces to other sites. Q298. Exhibit: (Exhibit not available.) How will the transparent bridge manage traffic from node A to the other nodes? A. Forward traffic to all nodes. B. Broadcast traffic to all nodes. C. Filter traffic to nodes C and D and ignore traffic to node B. D. Filter traffic to node B and forward traffic to nodes C and D. Answer: A Q299. As an example of using route summarization, assume that a router has the following networks behind it and is funning the OSPF routing protocol

95 How many networks will this router have to advertise? A. 1 B. 2 C. 3 D. 4 Answer: A Q300. Which tool will help to characterize network tramp? A. CiscoWorks. B. Data General Sniffer. C. Scion software package. D. All of these choices. Answer: A Q301. You want to advertise an infinite hop count to another router for all routes received from that router. Witch two TIP techniques should you use together? (Choose two.) A. Split horizon B. Spanning tree C. Infinite reply D. Poisoned reverse Answer: A, D Q302. A device that terminates careers digital current on the customer premises is probably? A. CSU/DSU B. A multiplexer C. An access server D. An ISDN terminal adapter Answer: A Q303. Exhibit: (Refer the EXHIBIT given below.) 94

96 Which devices in the exhibit can support SNMP agents? A. All devices except NMS. B. All devices including NMS. C. Only network devices such as the router. D. Only end nodes such as workstations and hosts. Answer: A Q304. Many technologies have been developed to support remove access. Which statement is true about the design goals of the different technologies? A. ADSL was designed to support analog transmission of voice, video, and data. B. Frame Relay was envisioned as a reliable alternative to dedicated leases lines. C. X.25 was designed for simplicity and cost effectiveness when the physical layer is reliable. D. High speed digital leases lines were developed to minimize overhead Franc on WAN circuits. Q305. What are the five areas of network management as outlined by the OSI network management model? (Choose five.) A. User management B. Fault management C. Routine management D. Security management E. Accounting management F. Application management G. Performance management 95

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!  We offer free update service for one year PASS4TEST IT Certification Guaranteed, The Easy Way! \ We offer free update service for one year Exam : 640-861 Title : CCDA Cisco Certified Design Associate Vendors : Cisco Version : DEMO Get Latest &

More information

(DESGN) Designing for Cisco Internetwork Solutions

(DESGN) Designing for Cisco Internetwork Solutions 640-861 (DESGN) Designing for Cisco Internetwork Solutions Version 15.0 Important Note, Please Read Carefully Study Tips This product will provide you questions and answers along with detailed explanations

More information

(DESGN) Designing for Cisco Internetwork Solutions

(DESGN) Designing for Cisco Internetwork Solutions WWW.REAL-EXAMS.NET The Quickest Way To Get Certified 640-861 (DESGN) Designing for Cisco Internetwork Solutions Version 26.0 WWW.REAL-EXAMS.NET Please Read Carefully This Study Guide has been carefully

More information

Scope and Sequence: CCNA Discovery

Scope and Sequence: CCNA Discovery Scope and Sequence: CCNA Discovery Last updated June 19, 2009 Target Audience The Cisco CCNA Discovery curriculum is primarily designed for Cisco Networking Academy students who are seeking entry-level

More information

Scope and Sequence: CCNA Discovery

Scope and Sequence: CCNA Discovery Scope and Sequence: CCNA Discovery Last updated April 22, 2008 Target Audience CCNA Discovery is primarily designed for Cisco Networking Academy students who are looking for career-oriented, information

More information

PassReview. PassReview - IT Certification Exams Pass Review

PassReview.   PassReview - IT Certification Exams Pass Review PassReview http://www.passreview.com PassReview - IT Certification Exams Pass Review Exam : 640-863 Title : Designing for Cisco Internetwork Solutions Vendors : Cisco Version : DEMO Get Latest & Valid

More information

CCNA Exploration Network Fundamentals

CCNA Exploration Network Fundamentals CCNA Exploration 4.0 1. Network Fundamentals The goal of this course is to introduce you to fundamental networking concepts and technologies. These online course materials will assist you in developing

More information

Campus Network Design

Campus Network Design Design Principles Campus Network Design 2003, Cisco Systems, Inc. All rights reserved. 2-1 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0 2-2 Design Principles Task in Network Design Plan phase

More information

Campus Network Design. 2003, Cisco Systems, Inc. All rights reserved. 2-1

Campus Network Design. 2003, Cisco Systems, Inc. All rights reserved. 2-1 Campus Network Design 2003, Cisco Systems, Inc. All rights reserved. 2-1 Design Objective Business Requirement Why do you want to build a network? Too often people build networks based on technological,

More information

Scope and Sequence: CCNA Discovery v4.0

Scope and Sequence: CCNA Discovery v4.0 Scope and Sequence: CCNA Discovery v4.0 Last Updated August 30, 2007 The course objectives and outline for the final two CCNA Discovery courses, Introducing Routing and Switching in the Enterprise and

More information

Campus Network Design

Campus Network Design Modular Network Design Campus Network Design Modules are analogous to building blocks of different shapes and sizes; when creating a building, each block has different functions Designing one of these

More information

CCNA. Course Catalog

CCNA. Course Catalog CCNA Course Catalog 2012-2013 This course is intended for the following audience: Network Administrator Network Engineer Systems Engineer CCNA Exam Candidates Cisco Certified Network Associate (CCNA 640-802)

More information

Logical Network Design (Part II)

Logical Network Design (Part II) Logical Network Design (Part II) DCS COMSATS Institute of Information Technology Rab Nawaz Jadoon Assistant Professor COMSATS IIT, Abbottabad Pakistan Telecommunication Network Design (TND) Possible (Part

More information

Exam: : VPN/Security. Ver :

Exam: : VPN/Security. Ver : Exam: Title : VPN/Security Ver : 03.20.04 QUESTION 1 A customer needs to connect smaller branch office locations to its central site and desires a more which solution should you recommend? A. V3PN solution

More information

Scope and Sequence: CCNA Exploration v4.0

Scope and Sequence: CCNA Exploration v4.0 Scope and Sequence: CCNA Exploration v4.0 Last Updated August 30, 2007 The course objectives and outline for the final two CCNA Exploration courses, LAN Switching and Wireless and Accessing the WAN, are

More information

Understanding Networking Fundamentals

Understanding Networking Fundamentals Understanding Networking Fundamentals Training Details Training Time : 5 Days Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training A strong foundation

More information

Exam Questions

Exam Questions Exam Questions 200-310 DESGN Designing for Cisco Internetwork Solutions https://www.2passeasy.com/dumps/200-310/ 1. What is the recommended spanning tree protocol to use for all Layer 2 deployments in

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Five Designing a Network Topology Original slides copyright by Cisco Press & Priscilla Oppenheimer Network Topology Design Issues Hierarchy Redundancy Modularity Well-defined

More information

: Designing for Cisco Internetwork Solutions (DESGN) v2.1

: Designing for Cisco Internetwork Solutions (DESGN) v2.1 640-864: Designing for Cisco Internetwork Solutions (DESGN) v2.1 Course Introduction Course Introduction Module 01 - Network Design Methodology Overview Understanding the Network Architectures for the

More information

Cisco Technologies, Routers, and Switches p. 1 Introduction p. 2 The OSI Model p. 2 The TCP/IP Model, the DoD Model, or the Internet Model p.

Cisco Technologies, Routers, and Switches p. 1 Introduction p. 2 The OSI Model p. 2 The TCP/IP Model, the DoD Model, or the Internet Model p. Cisco Technologies, Routers, and Switches p. 1 Introduction p. 2 The OSI Model p. 2 The TCP/IP Model, the DoD Model, or the Internet Model p. 6 Networking Basics p. 14 Wireless LANs p. 22 Cisco Hardware

More information

SYSTEMS ADMINISTRATION USING CISCO (315)

SYSTEMS ADMINISTRATION USING CISCO (315) Page 1 of 11 Contestant Number: Time: Rank: SYSTEMS ADMINISTRATION USING CISCO (315) REGIONAL 2016 Multiple Choice: Multiple Choice (50 @ 10 points each) TOTAL POINTS (500 points) (500 points) Failure

More information

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N CompTIA Network+ (Exam N10-007) Course Description: CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT

More information

Introducing Campus Networks

Introducing Campus Networks Cisco Enterprise Architecture Introducing Campus Networks 2003, Cisco Systems, Inc. All rights reserved. 2-1 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0 2-2 Campus Data Center Combines switching

More information

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers 31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers CONTENTS Focus Questions... 2 Chapter 1: Explore the Network... 2 Chapter 2: Configure a Network Operating System... 5 Chapter 3: Network

More information

Course: CCNA Bootcamp (Intensive CCNA)

Course: CCNA Bootcamp (Intensive CCNA) Course: CCNA Bootcamp (Intensive CCNA) Duration: 5 Days Description Introduction to Networking course will prepare you for the basic knowledge and in-depth technology of networking design and implementation.

More information

Exam : Title : Designing for Cisco Internetwork Solutions. Version : Demo

Exam : Title : Designing for Cisco Internetwork Solutions. Version : Demo Exam : 640-863 Title : Designing for Cisco nternetwork Solutions Version : Demo 1. Which statement accurately describes one difference between a small office and medium office topology? A. Small offices

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!   We offer free update service for one year PASS4TEST \ http://www.pass4test.com We offer free update service for one year Exam : 640-864 Title : Designing for Cisco Internetwork Solutions Vendor : Cisco Version : DEMO Get Latest & Valid 640-864

More information

Cisco EXAM Designing for Cisco Internetwork Solutions. Buy Full Product.

Cisco EXAM Designing for Cisco Internetwork Solutions. Buy Full Product. Cisco EXAM - 640-864 Designing for Cisco Internetwork Solutions Buy Full Product http://www.examskey.com/640-864.html Examskey Cisco 640-864 exam demo product is here for you to test the quality of the

More information

Exam: Title : VPN/Security. Ver :

Exam: Title : VPN/Security. Ver : Exam: Title : VPN/Security Ver : 04.21.04 QUESTION 1 You are a technician at Certkiller. Certkiller has its headquarters in New York. The company has just established two branch offices located in Baltimore

More information

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12 TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group

More information

CCNA-A Scope and Sequence (March 2007-Draft)

CCNA-A Scope and Sequence (March 2007-Draft) CCNA-A Scope and Sequence (March 2007-Draft) This document is a preliminary overview of the new CCNA-A curriculum and is subject to change since the courses are still under development. The English versions

More information

CISCO QUAD Cisco CCENT/CCNA/CCDA/CCNA Security (QUAD)

CISCO QUAD Cisco CCENT/CCNA/CCDA/CCNA Security (QUAD) Our Learning Exclusive Custom exam prep software and materials Exam delivery in classroom with 98% success Course specific thinqtank Learning publications to promote fun exciting learning Extended hours

More information

CompTIA Network+ Study Guide Table of Contents

CompTIA Network+ Study Guide Table of Contents CompTIA Network+ Study Guide Table of Contents Course Introduction Table of Contents Getting Started About This Course About CompTIA Certifications Module 1 / Local Area Networks Module 1 / Unit 1 Topologies

More information

Hands-On TCP/IP Networking

Hands-On TCP/IP Networking Hands-On Course Description In this Hands-On TCP/IP course, the student will work on a live TCP/IP network, reinforcing the discussed subject material. TCP/IP is the communications protocol suite on which

More information

Chapter 10: Review and Preparation for Troubleshooting Complex Enterprise Networks

Chapter 10: Review and Preparation for Troubleshooting Complex Enterprise Networks 0: Review and Preparation for Troubleshooting Complex Enterprise Networks CCNP TSHOOT: Maintaining and Troubleshooting IP Networks Chapter TSHOOT 1v6 0 1 0 Objectives Review key maintenance and troubleshooting

More information

Cisco CCNA (ICND1, ICND2) Bootcamp

Cisco CCNA (ICND1, ICND2) Bootcamp Cisco CCNA (ICND1, ICND2) Bootcamp Course Duration: 5 Days Course Overview This five-day course covers the essential topics of ICND1 and ICND2 in an intensive Bootcamp format. It teaches students the skills

More information

Vendor: Cisco. Exam Code: Exam Name: Implementing Cisco IP Routing (ROUTE v2.0) Version: Demo

Vendor: Cisco. Exam Code: Exam Name: Implementing Cisco IP Routing (ROUTE v2.0) Version: Demo Vendor: Cisco Exam Code: 300-101 Exam Name: Implementing Cisco IP Routing (ROUTE v2.0) Version: Demo DEMO QUESTION 1 Refer to the exhibit. The DHCP client is unable to receive a DHCP address from the DHCP

More information

IT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview

IT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview IT114 NETWORK+ Course Objectives Upon successful completion of this course, the student will be able to: 1. Identify the devices and elements of computer networks; 2. Diagram network models using the appropriate

More information

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Question Number (ID) : 1 (jaamsp_mngnwi-088) You are the administrator for medium-sized network with many users who connect remotely. You have configured a server running Microsoft Windows Server 2003,

More information

Cisco 5921 Embedded Services Router

Cisco 5921 Embedded Services Router Data Sheet Cisco 5921 Embedded Services Router The Cisco 5921 Embedded Services Router (ESR) is a Cisco IOS software router application. It is designed to operate on small, low-power, Linux-based platforms

More information

Virtual private networks

Virtual private networks Technical papers Virtual private networks Virtual private networks Virtual private networks (VPNs) offer low-cost, secure, dynamic access to private networks. Such access would otherwise only be possible

More information

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified TestOut Network Pro - English 4.1.x COURSE OUTLINE Modified 2017-07-06 TestOut Network Pro Outline - English 4.1.x Videos: 141 (18:42:14) Demonstrations: 81 (10:38:59) Simulations: 92 Fact Sheets: 145

More information

Cisco Systems Networking Academy

Cisco Systems Networking Academy LIVONIA CAREER TECHNICAL CENTER 8985 NEWBURGH LIVONIA, MI 48150 734-744-2816 Course Name: Cisco Systems Networking Academy Course Number: 906 Course Credit: 1.0 credit/semester School Year: 2008-2009 Instructor:

More information

Q-Balancer Range FAQ The Q-Balance LB Series General Sales FAQ

Q-Balancer Range FAQ The Q-Balance LB Series General Sales FAQ Q-Balancer Range FAQ The Q-Balance LB Series The Q-Balance Balance Series is designed for Small and medium enterprises (SMEs) to provide cost-effective solutions for link resilience and load balancing

More information

TestOut Routing and Switching Pro - English 6.0.x COURSE OUTLINE. Modified

TestOut Routing and Switching Pro - English 6.0.x COURSE OUTLINE. Modified TestOut Routing and Switching Pro - English 6.0.x COURSE OUTLINE Modified 2017-07-10 TestOut Routing and Switching Pro Outline- English 6.0.x Videos: 133 (15:42:34) Demonstrations: 78 (7:22:19) Simulations:

More information

Exam: Title : Routing & Switching Exam (RSS) Ver :

Exam: Title : Routing & Switching Exam (RSS) Ver : Exam: 646-521 Title : Routing & Switching Exam (RSS) Ver : 01.02.04 Missing answer will be provided shortly. QUESTION 1 What does the Catalyst 6500 Network Analysis Module (NAM) do? (Choose two) A. Gives

More information

CCNA. Murlisona App. Hiralal Lane, Ravivar Karanja, Near Pethe High-School, ,

CCNA. Murlisona App. Hiralal Lane, Ravivar Karanja, Near Pethe High-School, , CCNA Cisco Certified Network Associate (200-125) Exam DescrIPtion: The Cisco Certified Network Associate (CCNA) Routing and Switching composite exam (200-125) is a 90-minute, 50 60 question assessment

More information

MTA_98-366_Vindicator930

MTA_98-366_Vindicator930 MTA_98-366_Vindicator930 Number: 98-366 Passing Score: 700 Time Limit: 45 min File Version: 1.0 http://www.gratisexam.com/ Microsoft Technology Associate Networking Fundamentals MTA 98-366 Exam A QUESTION

More information

CCNA Routing and Switching Scope and Sequence

CCNA Routing and Switching Scope and Sequence Cisco Network Academy Network Engineering technology 1, 2, 3&4 CCNA 1 2 3 4 CCNA Routing and Switching Scope and Sequence Target Audience The Cisco CCNA Routing and Switching curriculum is designed for

More information

Navpreet Singh INTRODUCTION TO COMPUTER NETWORKS. Computer Centre Indian Institute of Technology Kanpur Kanpur INDIA

Navpreet Singh INTRODUCTION TO COMPUTER NETWORKS. Computer Centre Indian Institute of Technology Kanpur Kanpur INDIA INTRODUCTION TO COMPUTER NETWORKS Navpreet Singh Computer Centre Indian Institute of Technology Kanpur Kanpur INDIA (Ph : 2597371, Email : navi@iitk.ac.in) About Myself About Myself I am Network Manager

More information

CCNA Discovery 4.0 Designing and Supporting Computer Networks

CCNA Discovery 4.0 Designing and Supporting Computer Networks CCNA Discovery 4.0 Designing and Supporting Computer Networks Creating the Network Design Chapter 5 1 Objectives 2 Analyzing Business goals and technical requirements Determining how to design a network

More information

ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS

ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS P. Fidry, V. Rakotomanana, C. Ausanneau Pierre.fidry@alcatel-lucent.fr Alcatel-Lucent, Centre de Villarceaux, 91620, Nozay, France Abstract: As a consequence of

More information

QUESTION: 1 You have been asked to establish a design that will allow your company to migrate from a WAN service to a Layer 3 VPN service. In your des

QUESTION: 1 You have been asked to establish a design that will allow your company to migrate from a WAN service to a Layer 3 VPN service. In your des Vendor: Cisco Exam Code: 352-001 Exam Name: ADVDESIGN Version: Demo www.dumpspdf.com QUESTION: 1 You have been asked to establish a design that will allow your company to migrate from a WAN service to

More information

Advanced Network Administration. 1. Course Description Enabling Communication across Networks Secured Communication using Network Devices

Advanced Network Administration. 1. Course Description Enabling Communication across Networks Secured Communication using Network Devices Advanced Network Administration 1. Course Description Enabling Communication across Networks Secured Communication using Network Devices 2. Duration 5 Days 3. Purpose This five day course for L-2 Network

More information

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Interconnecting Cisco Networking Devices Part 1 (ICND)

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Interconnecting Cisco Networking Devices Part 1 (ICND) 100-105.exam Number: 100-105 Passing Score: 800 Time Limit: 120 min CISCO 100-105 Interconnecting Cisco Networking Devices Part 1 (ICND) Exam A QUESTION 1 Which route source code represents the routing

More information

Chapter 1. Cisco SONA and the Cisco Enterprise Architecture

Chapter 1. Cisco SONA and the Cisco Enterprise Architecture Chapter 1. Cisco SONA and the Cisco Enterprise Architecture After completing this chapter, you will be able to: Explain the Cisco Service-Oriented Network Architecture (SONA) framework Describe how the

More information

PREREQUISITES TARGET AUDIENCE. Length Days: 5

PREREQUISITES TARGET AUDIENCE. Length Days: 5 Cisco Implementing Cisco IP Routing v2.0 (ROUTE) ROUTE v2.0 includes major updates and follows an updated blueprint. However, note that this course does not cover all items listed on the blueprint. Some

More information

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified TestOut Network Pro - English 5.0.x COURSE OUTLINE Modified 2018-03-06 TestOut Network Pro Outline - English 5.0.x Videos: 130 (17:10:31) Demonstrations: 78 (8:46:15) Simulations: 88 Fact Sheets: 136 Exams:

More information

CCNA Boot Camp. Course Description

CCNA Boot Camp. Course Description CCNA Boot Camp Course Description CCNA Boot Camp combines both the Interconnecting Cisco Network Devices Part 1 (ICND1) course and the Interconnecting Cisco Network Devices Part 2 (ICND2) course into one

More information

Farzad Diba 333 East Juniper Court Mequon, WI (414)

Farzad Diba 333 East Juniper Court Mequon, WI (414) Farzad Diba 333 East Juniper Court Mequon, WI 53092 farzad@farzaddiba.com (414) 301-3279 PROFESSIONAL SUMMARY Experienced leader motivated by complex problems, strategic initiatives and organizational

More information

Cisco CCNP ROUTE: Implementing Cisco IP Routing (ROUTE) 2.0. Upcoming Dates. Course Description. Course Outline

Cisco CCNP ROUTE: Implementing Cisco IP Routing (ROUTE) 2.0. Upcoming Dates. Course Description. Course Outline Cisco CCNP ROUTE: Implementing Cisco IP Routing (ROUTE) 2.0 Implementing Cisco IP Routing (ROUTE) v2.0 is an instructor-led five day training course developed to help students prepare for Cisco CCNP certification.

More information

Chapter 8: Subnetting IP Networks

Chapter 8: Subnetting IP Networks Chapter 8: Subnetting IP Networks Designing, implementing and managing an effective IP addressing plan ensures that networks can operate effectively and efficiently. This is especially true as the number

More information

PRACTICAL ROUTERS and SWITCHES for ENGINEERS and TECHNICIANS

PRACTICAL ROUTERS and SWITCHES for ENGINEERS and TECHNICIANS PRACTICAL ROUTERS and SWITCHES for ENGINEERS and TECHNICIANS Objectives At the end of this workshop participants will: Be able to configure, maintain and manage routers have a clear practical understanding

More information

Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise

Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise The Changing Landscape IP-based unified communications is widely deployed in enterprise networks, both for internal calling

More information

SWITCH Implementing Cisco IP Switched Networks

SWITCH Implementing Cisco IP Switched Networks Hands-On SWITCH Implementing Cisco IP Switched Networks CCNP Course 2 Course Description Revised CCNP Curriculum and Exams Cisco has redesigned the CCNP courses and exams to reflect the evolving job tasks

More information

Upon successful completion of this course, the student should be competent to complete the following tasks:

Upon successful completion of this course, the student should be competent to complete the following tasks: COURSE INFORMATION Course Prefix/Number: IST 201 Course Title: Cisco Internetworking Concepts Lecture Hours/Week: 3.0 Lab Hours/Week: 0.0 Credit Hours/Semester: 3.0 VA Statement/Distance Learning Attendance

More information

Get the skills to maintain your networks and to diagnose and resolve network problems quickly and effectively.

Get the skills to maintain your networks and to diagnose and resolve network problems quickly and effectively. Cisco CCNP - HD Telepresence TSHOOT: Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) 2.0 Get the skills to maintain your networks and to diagnose and resolve network problems quickly and effectively.

More information

COPYRIGHTED MATERIAL. Table of Contents. Assessment Test

COPYRIGHTED MATERIAL. Table of Contents. Assessment Test 10089.book Page xi Monday, July 23, 2007 3:17 PM Introduction Assessment Test xxiii xxxiii Chapter 1 Internetworking 1 Internetworking Basics 4 Internetworking Models 11 The Layered Approach 12 Advantages

More information

Never Drop a Call With TecInfo SIP Proxy White Paper

Never Drop a Call With TecInfo SIP Proxy White Paper Innovative Solutions. Trusted Performance. Intelligently Engineered. Never Drop a Call With TecInfo SIP Proxy White Paper TecInfo SD-WAN product - PowerLink - enables real time traffic like VoIP, video

More information

Chapter 1: Enterprise Campus Architecture. Course v6 Chapter # , Cisco Systems, Inc. All rights reserved. Cisco Public

Chapter 1: Enterprise Campus Architecture. Course v6 Chapter # , Cisco Systems, Inc. All rights reserved. Cisco Public Chapter 1: Analyzing The Cisco Enterprise Campus Architecture CCNP SWITCH: Implementing IP Switching Course v6 1 Chapter 1 Objectives Describe common campus design options and how design choices affect

More information

"Charting the Course... TSHOOT Troubleshooting and Maintaining Cisco IP Networks Course Summary

Charting the Course... TSHOOT Troubleshooting and Maintaining Cisco IP Networks Course Summary Course Summary Description This course is designed to help network professionals improve the skills and knowledge that they need to maintain their network and to diagnose and resolve network problems quickly

More information

CCNA Routing and Switching (NI )

CCNA Routing and Switching (NI ) CCNA Routing and Switching (NI400+401) 150 Hours ` Outline The Cisco Certified Network Associate (CCNA) Routing and Switching composite exam (200-125) is a 90-minute, 50 60 question assessment that is

More information

Internetworking Concepts Overview. 2000, Cisco Systems, Inc. 2-1

Internetworking Concepts Overview. 2000, Cisco Systems, Inc. 2-1 Internetworking Concepts Overview 2000, Cisco Systems, Inc. 2-1 2000, Cisco Systems, Inc. www.cisco.com ICND v1.0a 2-2 Objectives On completion of this chapter, you will be able to perform the following

More information

Cisco Certified Network Associate ( )

Cisco Certified Network Associate ( ) Cisco Certified Network Associate (200-125) Exam Description: The Cisco Certified Network Associate (CCNA) Routing and Switching composite exam (200-125) is a 90-minute, 50 60 question assessment that

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Eight Developing Network Security Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Network Security Design The steps for security design are: 1. Identify

More information

Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE

Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE COURSE TITLE ROUTING AND SWITCHING FUNDAMENTALS COURSE DURATION 16 Hour(s) of Self-Paced Interactive Training COURSE OVERVIEW In the

More information

Hands-On ROUTE Implementing Cisco IP Routing CCNP Course 1

Hands-On ROUTE Implementing Cisco IP Routing CCNP Course 1 Hands-On CCNP Course 1 Course Description Revised CCNP Curriculum and Exams Cisco has redesigned the CCNP courses and exams to reflect the evolving job tasks of global network professionals. Course 1 ROUTE

More information

Virtual Private Networks (VPNs)

Virtual Private Networks (VPNs) CHAPTER 19 Virtual Private Networks (VPNs) Virtual private network is defined as customer connectivity deployed on a shared infrastructure with the same policies as a private network. The shared infrastructure

More information

Implementing Cisco IP Routing (ROUTE)

Implementing Cisco IP Routing (ROUTE) Implementing Cisco IP Routing (ROUTE) COURSE OVERVIEW: Implementing Cisco IP Routing (ROUTE) v2.0 is an instructor-led five-day training course developed to help students prepare for Cisco CCNP certification.

More information

CISCO EXAM QUESTIONS & ANSWERS

CISCO EXAM QUESTIONS & ANSWERS CISCO 100-101 EXAM QUESTIONS & ANSWERS Number: 100-101 Passing Score: 800 Time Limit: 120 min File Version: 35.5 http://www.gratisexam.com/ CISCO 100-101 EXAM QUESTIONS & ANSWERS Exam Name: CCNA Interconnecting

More information

CCNA Discovery 4.0 Designing and Supporting Computer Networks

CCNA Discovery 4.0 Designing and Supporting Computer Networks CCNA Discovery 4.0 Designing and Supporting Computer Networks Characterizing Existing Network Chapter 3 1 Objectives 2 Creating a Network Diagram Typically, the first step in installing a new network is

More information

Computer Network Engineering

Computer Network Engineering Computer Network Engineering 221 Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Computer Network Engineering Certificate of Achievement: Computer Network Engineering

More information

Certified SonicWALL Security Administrator (CSSA) Instructor-led Training

Certified SonicWALL Security Administrator (CSSA) Instructor-led Training Instructor-led Training Comprehensive Services from Your Trusted Security Partner Additional Information Recommended prerequisite for the Certified SonicWALL Security Administrator (CSSA) exam Course Description:

More information

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems... Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...3 Improve Processes...4 Innovation...4 IT Planning & Alignment

More information

Information and Network Technology Revised Date 07/26/2012 Implementation Date 08/01/2012

Information and Network Technology Revised Date 07/26/2012 Implementation Date 08/01/2012 Information and Network Technology Ben Eckart Revised Date 07/26/2012 Implementation Date 08/01/2012 COURSE OUTLINE CRT 286 LAN/WAN Implementation and Support 3 Credit Hours Course Description The focus

More information

Computer Network Engineering

Computer Network Engineering 218 Computer Network Engineering Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Computer Network Engineering Certificate of Achievement: Computer Network Engineering

More information

SYSTEMS ADMINISTRATION USING CISCO (315)

SYSTEMS ADMINISTRATION USING CISCO (315) Page 1 of 10 Contestant Number: Time: Rank: SYSTEMS ADMINISTRATION USING CISCO (315) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1.

More information

University of San Francisco Course Syllabus and Outline

University of San Francisco Course Syllabus and Outline College of Professional Studies BSIS 340 Business Data Networks and Telecommunications University of San Francisco Fall Semester 2008 Robert C. Hughes, M.S. Email: rchughes3@usfca.edu Enrolled Student

More information

Skills Assessment. CCNA Routing and Switching: Connecting Networks. Topology. Assessment Objectives. Scenario

Skills Assessment. CCNA Routing and Switching: Connecting Networks. Topology. Assessment Objectives. Scenario Skills Assessment Topology Assessment Objectives Part 1: Configure Device Basic Settings (15 points, 15 minutes) Part 2: Configure PPP Connections (20 points, 10 minutes) Part 3: Configure IPv4 ACL for

More information

Chapter 2. Communicating Over The Network. CCNA1-1 Chapter 2

Chapter 2. Communicating Over The Network. CCNA1-1 Chapter 2 Chapter 2 Communicating Over The Network CCNA1-1 Chapter 2 Communicating Over the Network The Platform for Communications CCNA1-2 Chapter 2 Elements of Communication People communicate in many different

More information

Intranets and Virtual Private Networks (VPNs)

Intranets and Virtual Private Networks (VPNs) Intranets and Virtual Private Networks (VPNs) Definition Private networking involves securely transmitting corporate data across multiple sites throughout an entire enterprise. Creating a truly private

More information

Allstream NGNSIP Security Recommendations

Allstream NGNSIP Security Recommendations Allstream NGN SIP Trunking Quick Start Guide We are confident that our service will help increase your organization s performance and productivity while keeping a cap on your costs. Summarized below is

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

CCNP 1: Advanced Routing

CCNP 1: Advanced Routing Scope and Sequence CCNP 1: Advanced Routing Cisco Networking Academy Program Version 3.1 TABLE OF CONTENTS CCNP 1: ADVANCED ROUTING...1 TARGET AUDIENCE...3 PREREQUISITES...3 COURSE DESCRIPTION...3 COURSE

More information

Wired internetworking devices. Unit objectives Differentiate between basic internetworking devices Identify specialized internetworking devices

Wired internetworking devices. Unit objectives Differentiate between basic internetworking devices Identify specialized internetworking devices Wired internetworking devices Unit objectives Differentiate between basic internetworking devices Identify specialized internetworking devices Topic A Topic A: Basic internetworking devices Topic B: Specialized

More information

Ethernet Wide Area Networking, Routers or Switches and Making the Right Choice

Ethernet Wide Area Networking, Routers or Switches and Making the Right Choice Ethernet Wide Area Networking, Routers or Switches and Making the Right Choice The Road To Ethernet WAN Various industry sources show trends in globalization and distribution, of employees moving towards

More information

Interconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview

Interconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview Interconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview This course will teach students about building a simple network, establishing internet connectivity, managing network device security,

More information

IP Routing & Bridging

IP Routing & Bridging CHAPTER 2 TCP/IP Routing: Ethernet Dialog Box To access this dialog box (Figure 2-1), select Ethernet/TCP/IP Routing from the Device View. Figure 2-1 TCP/IP Routing: Ethernet Configuration Dialog Box If

More information

HUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN HUAWEI TECHNOLOGIES CO., LTD. Issue 1.1. Date

HUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN HUAWEI TECHNOLOGIES CO., LTD. Issue 1.1. Date HUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN Issue 1.1 Date 2014-03-14 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may be reproduced or

More information

Exam Topics Cross Reference

Exam Topics Cross Reference Appendix R Exam Topics Cross Reference This appendix lists the exam topics associated with the ICND1 100-105 exam and the CCNA 200-125 exam. Cisco lists the exam topics on its website. Even though changes

More information