New Questions Flashcards

(97 cards)

1
Q

How many virtual routers can GLBP support?

A

1024

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

If you need multivendor FHRP what do you use?

A

VRRP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What gigabit ethernet technology reaches the furthest without a repeater?

A

1000BASE-LX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
What three L2 designs are used for the access layer?
looped square
loop free square
looped U
loop free U
looped triangle
loop-free triangle
A

Looped square
Looped triangle
Loop free U

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What servers from the data center block need direct connection to all other blocks?

network mgmt servers
web server
AD server
dhcp server

A

network mgmt servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Data Center cable management with high server density, the options where:
A
  • Top of Rack (X)

- End of Row (X)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which module of enterprise contains the following: dns/http/smtp servers, firewall?

A

Internet connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
A campus network needs end-to-end QoS tools to manage traffic and ensure voice quality. Which three types of QoS tools are needed?
(A) interface queuing and scheduling
(B) congestion management
(C) compression and fragmentation
(D) bandwidth provisioning
(E) traffic classification
(F) buffer management
A

A, D, E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Which layers are usually collapsed in medium sized networks?
Access
Core
Distribution
DC Layer
A

Core

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ISR features question

A

INSERT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

VoIP configuration names

A

single site, centralized multisite, and distributed multisite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
What IPT component supports QoS, PoE, VoIP?
(A) Client endpoints
(B) Call processing
(C) Service applications
(D) Voice-enabled Infrastructure
A

Voice-enabled infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the major benefits of using a VPN?

A

Flexibility, cost, and scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

VDCS

A

INSERT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Which mechanisms are required to deploy QoS on an IP WAN?
(A) queuing and scheduling
(B) Call admission Control
(C) traffic shaping
(D) link efficiency techniques
(E) traffic classification
A

Answer = B,C,D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What two devices are used in the teleworker solution?

A

880 router

ISR G2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which one of these statements should the designer keep in mind when considering the advanced routing features?

A.
one-way router redistribution avoids the requirement for state or default routes.

B.
Redistribution, summarization, and filtering are most often applied between the campus core and enterprise edge.

C.
Filtering only occurs on the routing domain boundary using redistribution.

D.
Summarize routes at the core toward the distribution layer.

E.
The hierarchical flexibility of IPv6 addressing avoids the requirements for routing traffic reduction using aggregation.

A

Answer A is incorrect as a default route is still required Answer B & D are incorrect as Redistribution, summarization, and filtering are used in the Distribution Layer Cisco Press CCDA 640-864 Official Certification Guide Fourth Edition, Chapter 1, Page 36 37
Answer C is incorrect as route filter can occur at either a routing domain boundary or at a routing redistribution point. Cisco Press CCDA 640-864 Official Certification Guide Fourth Edition, Chapter Answer E is correct as IPv6 allow the aggregation (summarization) of routing prefixes to reduction of the number of routes in the global routing table. Cisco Press CCDA 640-864 Official Certification Guide Fourth Edition, Chapter 9

Note: Core Layer
The core layer is the network’s high-speed switching backbone that is crucial to corporate communications. It is also referred as the backbone. The core layer should have the following characteristics:

Distribution Layer
The network’s distribution layer is the isolation point between the network’s access and core layers. The distribution layer can have many roles, including implementing the following functions:

You can use several Cisco IOS Software features to implement policy at the distribution layer:
Route Filtering
Filtering of routes can occur on either a redistribution point or in the routing domain to prevent some parts of the network from accessing other sections of the network.

Filtering at a redistribution point provides the following:

Global Aggregatable IPv6 Address
Global aggregatable unicast addresses allow the aggregation of routing prefixes. This allows a reduction of the number of routes in the global routing table. These addresses are used in links to aggregate (summarize) routes upwards to the core in large organizations or to ISPs. Global aggregatable addresses are identified by the fixed prefix of 2000:/3. As shown in Figure 9-5, the format of the global aggregatable IPv6 address is a global routing prefix starting with binary 001, followed by the subnet ID and then the 64-bit interface identifier (ID). The device MAC address is normally used as the interface ID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which one of these statements is true about addressing redundancy within the WAN environment?

A.
The reliability and speed of DSL allow for cost savings by not including redundant links.

B.
CAMDM and dark fiber offer advanced redundancy features such as automatic backup and repair mechanism to cope system faults.

C.
An SLA is one way to eliminate the need for redundancy.

D.
The failure of a single SONET/SDH link or network element does not lead to failure of the entire network.

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which one of these statements is true concerning the enterprise data center?

A.
It can be located either at the enterprise campus or at a remote branch.

B.
Remote data center connectivity requirements align with the small office design.

C.
The data center designs will differ substantially depending on whether the location is on campus or remote.

D.
A remote branch with a data center becomes the enterprise campus.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

According to Cisco, which four improvements are the main benefits of the PPDIOO lifecycle approach to network design? (Choose four)

A.
faster ROI

B.
improved business availability

C.
increased network availability

D.
faster access to applications and services

E.
lower total cost of network ownership

F.
better implementation team engagement

A

B C D E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which two statements best describe an OSPF deployment? (Choose two)

A.
ABR provides automatic classful network boundary summarization.

B.
ABR requires manual configuration for classful network summarization

C.
External routes are propagated into the autonomous system from stub areas via ASBR.

D.
External routes are propagated into the autonomous system from regular areas or NSSA via ASBR.

E.
External routes are propagated into the autonomous system from regular areas or NSSA via ABR.

A

B D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A large enterprise requires sensitive information be transmitted over a public infrastructure. It requires confidentiality integrity, and authenticity. Which security solution best meets these requirements?

A.
Cisco IOS Firewall

B.
Intrusion Prevention

C.
IPSEC

D.
AAA

E.
Traffic Guard Protector

F.
SECURE CONECTIVITY

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which statement describes the recommended deployments of IPv4 addressing in the Cisco Network Architecture for the Enterprise?

A.
private addressing throughout with public addressing n the Internet Connectivity module

B.
private addressing throughout with public addressing n the Internet Connectivity and E- Commerce modules

C.
private addressing throughout with public addressing m the Internet Connectivity, E-Commerce, and Remote Access and VPN modules

D.
private addressing throughout with public addressing in the Internet Connectivity, E-Commerce, and Enterprise Branch modules

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which network scenario is static routing most appropriate?

A.
parallel WAN links

B.
IPSec VPN

C.
expanding networks

D.
hierarchical routing

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Which of these is the equation used to derive a 64 Kbps bit rate? A. 2 x 8 kHz x 4-bit code words B. 8 kHz x 8-bit code words C. 2 x 4-bit code words x 8 kHz D. 2×4 kHz x 8-bit code words
D
26
Which three terms describe the primary functions of the distribution layer of the campus network design hierarchy? (Chose three) A. provides end-user connectivity B. provides high speed transport C. provides QoS services D. enforces security policies E. provides WAN connection F. connects access devices to the core backbone
C D F
27
Which codec does Cisco recommend tor WAN link? A. G.711 B. G 723 C. G 728 D. G 729
D
28
Which two of these best describe the implementation of a WAN Backup design over the Internet? (Choose two.) A. a best-effort method B. bandwidth guaranteed based on interface configuration C. designed as an alternative to a failed WAN connection D. implemented with a point-to-point logical link using a Layer 2 tunnel E. requires no ISP coordination or involvement
A C`
29
Which three pieces of information should be documented for each step of each phase in a design implementation plan? (Choose three.) A. easy guidelines in case of failure B. estimated rollback time in case of failure C. simple implementation guidelines D. estimated implementation time E. design document references F. step description
D. estimated implementation time E. design document references F. step description
30
Which three types of WAN topologies can be deployed in the Cisco Enterprise Architecture Enterprise Edge WAN module? (Choose three.) A. ring B. full mesh C. partial mesh D. collapsed core E. star F. core G. edge
B C E
31
What are the modes of unicast reverse path forwarding? ``` A) Strict Mode B) Loose Mode C) VRF Mode D) Global E) Local ```
A B C
32
This: SNMP – Defines how information is exchanged… RMON – provides complete network visibility from physical to application CDP – runs over data link layer… Netflow – processes larger ACLs efficiently…
Other side.
33
There was a network topology diagram (configured with EIGRP and OSPF) and the question was on which router will the redistribution be performed.
– Router2 (between OSPF and | EIGRP areas).
34
Advantage of colocating datacenter
(Ans.improved redundancy)
35
Netflow can do what?
– processes larger ACLs efficiently…
36
What are three basic design approaches for packet-switched networks? (Choose three.)
Fully meshed, partially meshed, hub and spoke
37
14. Which three parameters can you identify by using a traffic analyzer? (Choose three.) protocol specification (IP protocol ID, TCP/UDP port number) average bit rate and packet rate QoS requirements importance of the application devices that use a specific protocol and their addresses
1,b,e
38
What are the benefits of PPDIOO
Lowers total cost of ownership Increases network availability Improves business agility Speeds up access to applications and services
39
``` Which item is not an SNMP opeartion GetNext Community Trap Set ```
Community
40
During which phase of the PPDIOO model would you conduct interviews with supporting staff to develp and propose a viable solution
Prepare
41
What are the two most likely driving forces motivating businesses to integrate voice and data into converged networks?
Data, voice, and video cannot converge on their current PSTN structures WAN costs can be reduced by migrating to converged networks
42
During which stage of the PPDIOO process are implementation procedures prepared?
Design
43
Which three solutions are part of the borderless network services? ``` Wireless Routing TrustSec MediaNet Switching EnergyWise Next-Gen WAN ```
TrustSec MediaNet EnergyWise
44
Which three mechanisms are required to deploy QoS on an IP WAN? ``` queuing and scheduling Call Admission Control Traffic shaping link efficiency techniques Traffic classification bandwidth provisioning ```
C, D, E
45
What is part of the prepare phase of PPDIOO? Obtain site contact info Perform network audit Identifiy customer requirements Perform gap analysis
Identify customer requirements
46
When designing a WAN backup for voice and video applications what types of connections should be used? ``` Private WAN internet ISDN MPLS dial-up ATM DSL ```
Private WAN ISDN MPLS
47
``` Observe the following options in which section of the network document does CIsco recommend a discussion of performance, scalability, capacity, security, and traffic needs? Design summary design solution executive summary design requirements ```
design requirements
48
Which aspect would most likely be found in the draft design document A list of QoS requirements a note that thre are no segments with more than 70% broadcast or multicast traffic the level of redundancy or high availabilty that currently exits or is required in the netowkr the list of network infrastructure services which are in use such as voice and video
a list of QoS requirements
49
Which of the following three options represents the components of the teleworker solution? ``` Cisco Unified IP Phone Cisco 880 Series router Aironet Office Extend Access Point Catalyst 3560 Series Switch Cisco 2900 Series Router MPLS Layer 3 VPN Leased Lines ```
ABC
50
At which stage in the PPDIOO process would you analyze a customer's network in order to discover opportunities for network improvement? ``` Operate Implement Plan Design Prepare Design Assessment ```
Design
51
Which information should a network summary report identify? actions needed to support the existing network customer requirements new network features customer requirement modifications actions needed to support existing network features infrastructure shortcomings
infrastructure shortcomings
52
Which two capabilities of NetFlow accounting assist designers with network planning? the monitoring of processor time on network devices the calculation of packet and byte counts of network traffic the decoding and analyzing of packets the presentation of a time-based view of application usage on the network the monitoring of user network utilization
B | E
53
When designing using the Cisco enterprise architecture, in which enterprise campus layer do the enterprise edge and enterprise wan modules establish their connection? ``` Building access building distribution campus core enterprise branch enterprise data center ```
campus core
54
``` Which types of communicating devices compose RMON architecture? router switch management station monitor ```
management station | monitor
55
Which Cisco technology using Nexus NX-OS infrastructure allows the network architect to create up to four separate control and data plane instances of the Nexus chassis? virtual port-channel virtual routing and forwarding virtual switching system virtual device context
virtual device context
56
Which two techniques can reduce voice packet transfer delay across a link of less than 512 kbps ``` deploy lfi increase link bandwidth extend the trust boundray deploy software compression increase queue depth ```
deploy LFI | increase link bandwidth
57
Which three statements are true regarding the virtual interface on a Cisco Wireless LAN controller ``` supports mobility management serves as a DHCP relay used for all controller to AP communication supports embedded Layer 3 security default for out-of-band management default for in-band management provides connectivity to AAA servers ```
ABD
58
Spanning layer 2 across geographically separate data centers is a key consideration for current data center designs. Which is the name of the NX-OS technology that facilitates MAC in IP transport for Layer 2 VLANs across any IP network
overlay transport virtualizations
59
For the following options which emerging wan technology uses DSL coding and digital modulation techniques with ethernet cable wireless smds long-reach ethernet(LRE)
long reach ethernet
60
The cisco data center network architecture comprisis which two cisco SONA layers ``` collaboration applications wan/internet interactive services network infrastructure business applications ```
interactive services | network infrastructure
61
High availability is a key design consideration in the enterprise campus network. In a fully redundant topology, which is likely to provide faster IGP convergence during a failure. redundant supervisors redundant supervisors with cisco nonstop forwarding and stateful switchover single supervisors with tuned igp timers single supervisors
single supervisors with tuned IGP timers
62
Which three are security services offered through cisco router security ``` trust and identity integrated threat control unified wireless network security solution secure connectivity voice-messaging security endpoint security virtual security gateway ```
ABD
63
You are asked to design a new branch office that will need to support 25 users. These users will be using an ISP connection and will need to connect to the main office for network services. Which two cisco devices are the most appropriate to fulfill all these requirements? ``` cisco ips cisco ISR G2 Cisco ASA Cisco 2960 Cisco CRS-1 Cisco ACS ```
BC
64
Which one of these statements should the designer keep in mind when considering the advanced routing features? one way router redistribution avoids the requirement for state or default routes redistribution, summarization and filtering are most often applied between campus core and enterprise edge filtering only occurs on the routing domain boundary using redisturbition summarize routes at the core towoard the distribution layer the hierarchical flexibility of IPv6 addressing avoids the requirement for routing traffic reduction using aggregation
B
65
Which two encryption transforms will be used by both ESP and AH for authentication?
HMAC-MD5 or Hash Message Authentication Code-Secure Hash ALgorithm
66
Which standard language will be used by SNMP to define the device information to be stored
ASN.1
67
What is SLC
service level contract
68
Which is the remote monitoring agent in the RMON architecture called? Tree Station Agent Probe
Probe
69
Which three are features of LWAPP? (Choose three.) ``` A. firmware synchronization B. local management of APs C. configuration changes manually synced D. encryption of control channel E. configuration data only on the WLC F. wireless control free operation G. replaces 802.1x for authentication in wireless connections ```
ADE
70
Which of these statement is true concerning the data center access layer design the access layer in the data center is typically built at layer 3 which allows for better shaping of services across multiple servers with layer 2 access the default gateway for the servers can be configured at the access or aggregation layer a dual homing nic requires a vlan or trunk between the two access switches to support the dual ip address onthe two server links to two separate switches the access layer is normally not required as dual homing is standard from the servers to the aggregation layer
B
71
Which two statements about the data center aggregation layer are correct layer 4 through layer 7 services are provided in that layer stp should never be support in that layer that layer is the critical point for application services layer 2 connectivity is provided in that layer from the data center to the core
a c
72
When building global network businesses which three principles should be used
customer focus continuous standardization and core versus context
73
Which is the purpose of the NAC profiler automates discovery and inventory of all lan attached devices generates a profile based on username and group learns and creates a database of virus definnotions based on lan traffic a database used to map user vpn accounts
A
74
Which two design methodology steps relate, at least in port, to the implment phase of the PPDIOO process? ``` verifying the network testing design determining customer requirements characterizing the existing network establishing the organizational requriments ```
AB
75
Which WLC interface is dedicated for WLAN client data? ``` virtual interface dynamic interface management interface AP manager interface service port interface ```
dynamic interface
76
Which two solutions are parts of the Cisco security management suite ``` asa cisco security agent NAC appliance CSM PIX Cisco Security MARS ```
DF
77
What does ODR stand for?
On demand routing
78
What is primary consideration when choosing a routed netowrk design over a traditional campus network design layer 3 service support at the network edge the routing protocol choice open ospf or proprietary eigrp the routing abilities of the host devices the need to control the broadcast domains within the campus core
a
79
Your boss is interested in a wireless WAN solution which provides higher bandwidth than point-to-multipoint (pmp) wireless. Which description is correct? Service providers cannot install point-to-point (p2p) links from a p2mp hub P2p wireless connections can provide up to 44 Mbps raw bandwidth P2p links tend to be slower than p2mp P2mp wireless connections can provide up to 1.544 Mbps raw bandwidth
B
80
Which two statements best describe the implementation of Overlay VPN connectivity for remote access in the Enterprise Edge WAN module? (Choose two.) A. It must use Layer 2 labels to forward packets B. It uses dedicated point-to-point links. C. Bandwidth is provisioned on a site-to-site basis. D. The ISP actively participates in customer routing. E. Optimum routing between customer sites requires a full mesh of virtual circuits.
A C
81
Which advantage is of security systems that are part of the Cisco ecosystem? A. There is a suite of products to choose from. B. Various partners as well as supporting products increase the effectiveness of security systems. C. There are no advantages. D. The Cisco ecosystem ensure that partners can implement the solution.
B
82
Which two features are supported by single wireless controller deployments? A. automatic detection and configuration of LWAPPs B. LWAPP support across multiple floors and buildings C. automatic detection and configuration of RF parameters D. Layer 2 and Layer 3 roaming E. controller redundancy F. mobility groups
AB
83
Which one of these statements describes why, from a design perspective, a managed VPN approach for enterprise teleworkers is a most effective? A. A managed VPN solution uses a cost effective, on-demand VPN tunnel back to the enterprise B. This solution supports all teleworkers who do not require voce or video C. This architecture provides centralized management where the enterprise can apply security policies and push configurations. D. It provides complete flexibility for remote access through a wireless hotspot or a guest network at a host, in addition to a home office.
C
84
When designing using the cisco enterpries architecture in which enterprise campus layer does the remote access and vpn module establish its connection building access campus core enterprise branch enterprise data center
campus core
85
In the enterprise data center, which are the three main components? ``` network infrastructure interactive services data center management internet services wan services vpn and remote access ```
ABC
86
Which three technologies are recommended to be used for WAN connectivity in today’s Enterprise Edge designs? (Choose three.) ``` A. DWDM B. Metro Ethernet C. Frame Relay D. MPLS VPN E. ISDN F. DSL G. Wireless ```
ABD
87
In which phase of PPDIOO are the network requirements identified?
Plan
88
What is the benefit of deploying a gatekeeper in an H.323 IP telephony network? provides spatial redundancy through the use of HSRP provides load balancing via GUP when alternate gatekeepers are deployed reduces configuration complexity by centralizing the dial plan increases redundancy by allowing each gateway to maintain a copy of the dial plan
C
89
When designing for a remote worker, which are two typical requirements? best effort interactive and low volume traffic patterns connections to the enterprise edge using layer 2 wan technologies alyways-on connection with sla from isp voice and ipsec vpn support high-end security devices with stateful firewall filtering dual or multihoming to isps
always-on connection with sla from isp | voice and ipsec vpn support
90
The network-design process is limited by many external constraints. which origins are of these constraints
technological, political, social, economical
91
Where in the cisco enterprise architecture does network management reside?
enterprise campus module
92
``` Which is a factor in enterprise campus design decisions? network application characteristics routing protocol characteristics switching latency characteristics packet filtering characteristics ```
network application characteristics
93
When considering the three VoIP design models single site, centralized multisite, and distributed multisite which question below would help to eliminate one of these questions? A. Will the switches be required to provide inline power? B. Will users need to make off site calls, beyond the enterprise? C. Will users require applications such as voice mail and interactive voice response? D. Are there users whose only enterprise access is via a QoS-enabled WAN?
D
94
What are three valid methods of gathering information about an existing data network? (Choose three.) A. Use organizational input. B. Analyze the user-mapping of a running application. C. Perform a traffic analysis. D. Perform a packet-level audit to verify carrier service guarantees. E. Use reports that analyze the metrics of the customer’s existing network. F. Perform a network audit to gather more detail about the network.
CEF
95
Where do you put DNS and DHCP on enterprise model. select two enterprise campus server farm module enterprise edge sp edge premise enterprise branch
AD
96
As a network engineer can you tell me accounting managmenet on network management system allows a network manager to perform which function assess the networks effectiveness and throughput charge back to users for network resources performance managament identify problem areas in the network
charge back to users for network resources
97
The evolution of the Data Center is best represented by the 3.0 architecture component of virtualization. Which of the following is not an example of the virtualization taking place in the Data Center ? a) VLANs and VSANs provide for virtualized LAN and SAN connectivity, separating physical networks and equipment into virtual entities. b) Virtual machines that run on application within the client operating system, is future virtualized and running on common hardware. c) Storage devices virtualized into Storage pools, and network devices are virtualized using device contexts d) virtualized media access utilizing Fibre Channel over Ethernet.
B