-

Sunday, March 29, 2015

FINAL EXAM CCNA 4 V4

CCNA Discovery 4 Final Exam with-98%

Klik Signature untuk download


1
Top of Form
Refer to the exhibit. The routers are configured with RIPv2 with default configurations. When attempting to communicate with other networks, hosts from 172.16.2.0/24 are experiencing connectivity issues. What could be done to resolve this issue?
Change to a public IP address scheme.
Disable automatic route summarization.
Change the IP network address on R3 Fa0/0 to 172.16.1.128 /26.
Change the subnet mask on the link between R2 and R3 to 255.255.255.0.
Bottom of Form
2
Top of Form
Refer to the exhibit. What will be the result of entering the commands as shown in the exhibit?
RIPng will not be enabled on interface fa0/0 because the network address is a broadcast address.
RIPng will not be enabled on this interface because the IPv6 address is only /64 bits long.
RIPng will be enabled on interface fa0/0 and will advertise the configured network.
The IPv6 interface configuration requires a network statement for the network.
The IPv6 routing instance must be called RTA not RT0.
Bottom of Form

3
Top of Form
Which two technologies can provide data integrity in a VPN connection? (Choose two.)
ESP
DES
MD5
DH1
SHA-1
Bottom of Form
4
Top of Form
Which protocol is enabled by default to dynamically discover and eliminate Layer 2 loops that are created by redundant links between switches?
CDP
DTP
STP
VTP
Bottom of Form

5
Top of Form
What is used locally by a router to identify each Frame Relay PVC?
LMI
DLCI
IP address
MAC address
Bottom of Form
6
Top of Form
A company decides to deploy a virtual private network (VPN) to connect remote workers and branch offices to corporate headquarters. What is the best description of the type of connectivity the company is ready to implement?
a VPN that uses LANs to connect remote sites or users
a VPN that uses a public network to connect remote sites or users
a VPN that uses a wireless LAN over the Internet to connect remote sites or users
a VPN that uses a dedicated connections, such as leased lines, to connect remote sites or users
Bottom of Form

7
Top of Form
In the Cisco Enterprise Architecture, which module would include web and e-commerce servers for access by users external to the organization?
campus core
enterprise edge
enterprise branch
enterprise campus
Bottom of Form
8
Top of Form
What is one advantage of a full mesh topology at the core layer of the enterprise network compared with a partial mesh topology?
It adds scalability to the corporate network.
It provides fully redundant links to connecting modules.
It lowers the impact and risk of DoS attacks from the Internet.
It increases the manageability of the network devices in the core layer.
Bottom of Form

9
Top of Form
Which command can be used to load a new Cisco IOS image on a router?
copy startup-config tftp:
copy tftp: startup-config
copy running-config tftp:
copy tftp: flash:
copy flash: tftp:
copy flash: startup-config
Bottom of Form
Top of Form
What functionality does NBAR provide to network technicians?
provides data which can be used to create a network diagram
allows for monitoring and managing network devices
allows for classification and monitoring of network traffic
displays the IOS versions and IP addresses on neighboring devices
Bottom of Form

Top of Form
A company has help desk staff that is not highly trained in VPNs. What two features or technologies must the network designer identify as training needs in order for the help desk to support secure remote access for teleworkers? (Choose two.)
QoS operation
VLAN configuration
tunneling protocols
IPv6 and IPv4 dual stack
encryption algorithms
Frame Relay configuration
Bottom of Form
Top of Form
Refer to the exhibit. What three actions will R1 take after receiving a frame from host H1 which is destined for host H2? (Choose three.)
The data frames will be forwarded out interface FastEthernet 0/1 of R1.
No data frames will be forwarded out of either FastEthernet interface of R1.
Router R1 will replace the destination IP address of the packets with the IP address of host H2.
Router R1 will place the MAC address of host H2 in the destination MAC address of the frames.
Router R1 will place the MAC address of the forwarding FastEthernet interface in the place of the source MAC address.
Router R1 will place the IP address of the forwarding FastEthernet interface in the place of the source IP address in the packets.
Bottom of Form

Top of Form
Which statement describes the use of a network baseline?
It creates a high level logical network diagram.
It provides a point of reference for future network evaluations.
It allows precise identification of the original location of network equipment.
It should be established as soon as a problem is detected on the network.
Bottom of Form
Top of Form
Refer to the exhibit. Following a test plan, the network systems engineer completes the configuration of an access layer switch and connects three PCs. The engineer attempts to ping from each PC to the other connected PCs to test the configuration. Which statement describes the result of the last step?
Host 1 can ping Host 2.
Host 1 can ping Host 3.
Host 2 can ping Host 3.
No hosts can ping any other host.
Bottom of Form

Top of Form

Refer to the exhibit. Which username and password combination will correctly configure PPP authentication on routers RTR_A and RTR_B?
Bottom of Form


Top of Form
During a review of the proposed bill of materials, an account manager of the network solution company realizes that the systems engineer included a switch with lower cost and reduced capabilities for the access layer than was originally specified by the network designer. When questioned, the systems engineer responds that the switches specified by the designer cannot be purchased within the budget limitations of the customer. Which action should the account manager take?
Inform the customer that the project budget must be increased.
Inform the customer that the project cannot be completed given the unreasonable budget constraints.
Communicate any risks that are associated with the equipment substitution and obtain customer approval to proceed.
Because the customer is probably aware that the budget limitations will require lower cost, less capable equipment, the account manager should do nothing.
Bottom of Form
Top of Form
What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?
STP
VTP
RSTP
BPDU
port security
Bottom of Form

Top of Form
What level of service is specified by the CIR from a Frame Relay service provider?
the minimum available clock rate
the number of available virtual circuits
the maximum average data transfer rate
the minimum amount of bandwidth available
Bottom of Form
Top of Form
Which is a valid representation of the IPv6 address 4110:00b9:0000:0000:0303:0000:11fa:771a?
4110:b9::303:11fa:771a
4110:00b9:3:3::11fa:771a
4110:00b9::303::11fa:771a
4110:b9::303:0:11fa:771a
Bottom of Form

Top of Form
Refer to the exhibit. EIGRP is correctly configured on router Remote and router HQ. A network technician is configuring a backup route on router Remote to network 198.133.219.32 via router Branch. Which configuration option will successfully create the backup route?
Remote(config)# ip route 198.133.219.32 255.255.255.224 198.133.219.9
Remote(config)# ip route 198.133.219.32 255.255.255.224 198.133.219.9 85
Remote(config)# ip route 198.133.219.32 255.255.255.224 198.133.219.9 90
Remote(config)# ip route 198.133.219.32 255.255.255.224 198.133.219.9 100
Bottom of Form
Top of Form
Refer to the exhibit. What can be concluded from the output that is shown?
MDF_R1 has a MAC address of 2294:300F:0000.
MDF_R1 is connected through FastEthernet0/1 to C2960-24TT-L_IDF1.
Device C2960-24TT-L_IDF1 is running Cisco IOS Software Release 12.2(25)SEE2.
MDF_R1 is installed in the main distribution facility on floor 24 of building L.
Bottom of Form

Top of Form
What is a signaling standard that is used for managing and maintaining the connection between a CPE router and the service provider Frame Relay switch?
ARP
CIR
DLCI
Inverse ARP
LMI
Bottom of Form
Top of Form
Refer to the exhibit. An administrator installs a WIC-2T module into a Cisco 1841 router. Attempts to configure the S0/0/0 interface are unsuccessful. As a first step in troubleshooting the failure, the administrator issues the show version command. What is a possible reason for the failure?
The WIC was not physically installed properly.
The WIC was installed into slot 1 instead of slot 0.
The interface type and number are invalid on an 1841.
The configuration register is the wrong value for adding new modules.
Bottom of Form

Top of Form
Which two processes allow a smooth transition from IPv4 to IPv6? (Choose two.)
IPSec
tunneling
dual stack
authentication
anycast addressing
header simplification
Bottom of Form
Top of Form
Refer to the exhibit. Which type of application communication model best describes this network?
client-client
client-server farm
client-enterprise edge
client-enterprise server
Bottom of Form

Top of Form
Refer to the exhibit. Based on the EIGRP configuration that is shown, what can the field engineer conclude about the EIGRP authentication between RouterA and RouterB?
Authentication will fail because only one key is configured.
Authentication will fail because the key chain names do not match.
Authentication will succeed and EIGRP updates can be exchanged.
Authentication will fail because the key chain names must match the router names.
Bottom of Form
Top of Form
What type of Frame Relay subinterface must be used to connect remote sites without having to disable split horizon?
multipoint
multiaccess
point-to-point
nonbroadcast multiaccess
Bottom of Form

Top of Form
A large company plans to add several servers and requires that the servers be reachable directly from the Internet. Which action will help the company accomplish this goal?
Assign to each server a static internal IP address that is mapped statically to a public IP address.
Place all servers in their own Class C private subnet.
Provide a private address to each server using DHCP.
Assign addresses from a pool of public Class B addresses using DHCP.
Bottom of Form
Top of Form
A NetworkingCompany engineer is on a support call resolving technical problems for a client network. After the issue is resolved, the engineer also provides a training session for the network support staff. What role is the engineer filling on the networking company team?
post-sales field engineer
pre-sales engineer
network designer
account manager
Bottom of Form

Top of Form
A network administrator is given a network address of 192.168.1.64/26 to create four subnets with seven hosts in each subnet. Which subnet mask should be used?
255.255.255.224
255.255.255.240
255.255.255.248
255.255.255.252

Top of Form
What makes the Cisco EasyVPN application a useful tool for VPN implementation?
It provides encryption algorithms unavailable in other systems.
It ensures that remote workers actually use the VPN for connectivity.
It simplifies the configuration tasks for the device that is used as the VPN server.
It allows a greater variety of network devices to be used for VPN connections.
Bottom of Form
Top of Form
A network administrator is integrating IPv6 into an IPv4 network by encapsulating one protocol packet within another protocol. Which transition method is being used?
dual stack
tunneling
proxying and translation
NAT with Protocol Translator
Bottom of Form

Top of Form
What should be considered in the design of a wireless LAN on a corporate campus?
the vendor of all employee wireless NICs
the cables that are used for LAN connectivity
the number of wireless NICs required on enterprise servers
the messaging features that are used on employee cell phones
the location of the concrete pillars and walls between the offices
Bottom of Form
Top of Form
What is a characteristic of FTP traffic flows?
low-volume traffic
predictable bandwidth usage
large packet sizes for transfers
low throughput with high response-time requirements
Bottom of Form

Top of Form
Which technology will prioritize traffic based upon the technical requirements of IP telephony?
PoE
QoS
RPC
RTP
VPN
Bottom of Form
Top of Form
As part of network monitoring, a network administrator receives an alert that the CPU usage of the core router reaches 90% several times a day. Which protocol is in use to monitor the network performance?
DNS
SNMP
SMTP
DHCP
TFTP
Bottom of Form

Top of Form
When implementing an IP telephony solution, why should VLANs be used?
to allow the use of a single IP gateway
to separate voice from data traffic for ease of prioritization
to allow the PBX to use VLAN IDs to filter both voice and data traffic
to allow connectivity between traditional phone devices and IP-based telephony devices
Bottom of Form
Top of Form
If traditional phones are used when introducing VoIP to a network, what component would be required to convert the analog voice from traditional telephone signals into IP packets?
Multipoint control unit
Power over Ethernet switches
a router that acts as a voice gateway
Cisco Unified Communications Manager
Bottom of Form

Top of Form
A network administrator of a middle-sized company is asked to upgrade the routing protocol of the network to support VLSM and route summarization. The current company network contains both Cisco and non-Cisco routers. Which routing protocol should be used for the upgrade?
BGP
RIPv1
RIPv2
EIGRP
Bottom of Form
Top of Form
Refer to the exhibit. A new host needs to be connected to the switch and be assigned to VLAN 2. Router RA is attached to the switch via a trunk and is configured as shown. What IP address should be assigned to this new host?
192.168.1.1 /26
192.168.1.22 /28
192.168.1.32 /28
192.168.1.44 /28
192.168.1.47 /28
192.168.1.55 /28
Bottom of Form

Top of Form
On a Monday morning the help desk at a large company receives an unusually high number of calls reporting no connectivity to the Internet or to any other network resources. Otherwise the PCs are functioning normally. Help desk technicians note that all the calls are from a single department, and all affected users are on the same floor of a single building. Where should the help desk technicians suspect that the problem lies?
workgroup switch
PC power supplies
patch cords from PCs to network jacks
cabling from the network jack to the wiring closet
Bottom of Form
Top of Form
Refer to the exhibit. An extended ACL has been created to deny traffic from the 192.168.35.0/24 network to the web server with IP address 209.165.201.15. According to Cisco best practices, where should the ACL be applied?
RTB Fa0/0 inbound
RTC S0/0/1 inbound
RTD Fa0/0 outbound
RTC S0/1/0 outbound
Bottom of Form

Top of Form
Refer to the exhibit. A networking company designer is reviewing a diagram of a customer network. What are the two problems that need to be resolved in the topology that is shown? (Choose two.)
The firewall router and ISP connection represent a single point of failure.
If one of the Layer 3 switches fails, the Cisco Call Manager will be unreachable.
A power supply failure of the server block switch will cause the entire IP telephony system to fail.
Using Layer 3 switches to interconnect the server block servers to the IP phones introduces too much delay.
The IP phones need to be redundantly connected to the switches to prevent single points of failure at the access layer.
Bottom of Form
Top of Form
Refer to the exhibit. What problem is associated with the the addressing scheme of the network?
The WAN links need IP addresses from a different major network.
The R1 LAN is incorrect because subnet zero cannot be used with VLSM.
The WAN link IP address that connects R1 to R3 has an incorrect mask.
The R1 to R3 and R1 to R2 WAN links have IP addresses that overlap.
The WAN IP address that connects R1 to R2 overlaps with the R3 LAN IP addresses.
Bottom of Form

Top of Form
What are the primary design goals for the core Layer?
to provide centralized server farm and VoIP services
to provide dynamic routing services, filtering, and traffic flow management
to provide 100% uptime, maximization of throughput, and facilitation of network growth
to provide static routing, wireless access points for the network, and security for the edge devices
Bottom of Form

Top of Form
During prototype testing, the network designer performs a test to determine the ability of the network to recover from a link or device failure. Which design goal is validated if the test is a success?
scalability
manageability
availability
security
Bottom of Form
Top of Form
A network technician needs to install a four-port switch module in an operational Cisco 1841 router that has an available HWIC slot. What should the technician do first?
Turn off the power to the router before installing the new module.
Install the hot-swappable four-port switch module directly into slot 1 of the 1841.
Move the existing WIC-2T module to slot 1 and install the four-port module in slot 0.
Shut down all Fast Ethernet ports on the router until the switch module installation is complete.
Bottom of Form

Top of Form
What feature of EIGRP should be considered when selecting a routing protocol?
EIGRP cannot secure routing updates.
It does not scale well for large networks.
It is designed for WAN connections only.
It can only be configured on Cisco devices.
Bottom of Form
Top of Form
Which two pieces of information should a network administrator have before starting an IOS transfer via TFTP? (Choose two.)
IP address of the TFTP server
name of the IOS image on the router
operating system of the TFTP server
name of the configuration file in NVRAM
name of the IOS image on the TFTP server
encapsulation of the router interface that is connected to the TFTP server
Bottom of Form

Top of Form
Which two Frame Relay header bits are used to indicate possible virtual circuit congestion? (Choose two.)
BECN
C/R
DE
DLCI
FECN
Bottom of Form


0 komentar:

Post a Comment

Saling menghormati sesama komentar..........

NEWS

« »
« »
« »