CCNA Dcompnwk Final 1

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By FlessGordon
F
FlessGordon
Community Contributor
Quizzes Created: 1 | Total Attempts: 148
| Attempts: 148
SettingsSettings
Please wait...
  • 1/276 Questions

    A large company plans to add several servers and requires that the servers be reachable directly from the Internet. Which action will help the company accomplish this goal?

    • Assign to each server a static internal IP address that is mapped statically to a public IP address
    • Place all servers in their own Class C private subnet.
    • Provide a private address to each server using DHCP
    • Assign addresses from a pool of public Class B addresses using DHCP.
Please wait...
About This Quiz

This CCNA DCompnwk FINAL 1 quiz assesses knowledge in configuring network systems, understanding EIGRP authentication, FTP traffic, router boot processes, and network redundancy. It prepares learners for practical network troubleshooting and management, essential for certification.

CCNA Dcompnwk Final 1 - Quiz

Quiz Preview

  • 2. 

    Refer to the exhibit. Which type of application communication model best describes this network?

    • Client-client

    • Client-server farm

    • Client-enterprise edge

    • Client-enterprise server

    Correct Answer
    A. Client-client
    Explanation
    The given network diagram shows multiple devices connected to each other without a centralized server. This indicates a client-client communication model, where each device can act as both a client and a server, allowing them to directly communicate with each other without the need for a central server.

    Rate this question:

  • 3. 

    • The traffic is sent out Serial 0/0/0

    • The router sends the traffic out all interfaces other than the one it came in on

    • A request is sent to neighboring routers for paths to the 128.107.0.0 network

    • The packets are placed into a queue until a better route is discovered via RIP

    Correct Answer
    A. The traffic is sent out Serial 0/0/0
  • 4. 

    Refer to the exhibit. An administrator installs a WIC-2T module into a Cisco 1841 router. Attempts to configure the S0/0/0 interface are unsuccessful. As a first step in troubleshooting the failure, the administrator issues the show version command. What is a possible reason for the failure?

    • The WIC was not physically installed properly.

    • The WIC was installed into slot 1 instead of slot 0.

    • The interface type and number are invalid on an 1841

    • The configuration register is the wrong value for adding new modules.

    Correct Answer
    A. The WIC was not physically installed properly.
    Explanation
    The possible reason for the failure is that the WIC was not physically installed properly. This could mean that it was not inserted correctly into the router or that there is a hardware issue with the WIC itself. To confirm this, the administrator would need to physically inspect the WIC and ensure that it is properly seated in the router.

    Rate this question:

  • 5. 

    A network technician needs to install a four-port switch module in an operational Cisco 1841 router that has an available HWIC slot. What should the technician do first?

    • Turn off the power to the router before installing the new module

    • Install the hot-swappable four-port switch module directly into slot 1 of the 1841.

    • Move the existing WIC-2T module to slot 1 and install the four-port module in slot 0

    • Shut down all Fast Ethernet ports on the router until the switch module installation is complete

    Correct Answer
    A. Turn off the power to the router before installing the new module
    Explanation
    The technician should turn off the power to the router before installing the new module to ensure safety and prevent any potential damage to the router or the module. By turning off the power, the technician can avoid any electrical accidents or disruptions during the installation process. This precautionary step is necessary to protect the equipment and ensure a smooth installation of the four-port switch module.

    Rate this question:

  • 6. 

    What can be broadcast over the wireless network to help a user connect to the network and use wireless services?

    • SSID

    • WEP keys

    • VLAN parameters

    • WPA encryption keys

    • VPN authentication information

    Correct Answer
    A. SSID
    Explanation
    SSID stands for Service Set Identifier, which is a unique name that identifies a wireless network. When broadcasting the SSID, it allows users to identify and connect to the correct network. Therefore, broadcasting the SSID helps a user connect to the network and use wireless services.

    Rate this question:

  • 7. 

    Which technical requirement is satisfied when providing QoS for delay sensitive applications?

    • Availability

    • Manageability

    • Scalability

    • Security

    Correct Answer
    A. Availability
    Explanation
    When providing Quality of Service (QoS) for delay-sensitive applications, the technical requirement that is satisfied is availability. Availability refers to the ability of a system or network to be accessible and functioning properly when needed. For delay-sensitive applications, it is crucial that the network or system is consistently available to ensure that data packets are delivered in a timely manner, minimizing any potential delays or disruptions.

    Rate this question:

  • 8. 

    An administrator is charged with providing guaranteed quality of service for certain applications. What technical requirement does QoS help to satisfy?

    • Availability

    • Manageability

    • Security

    • Scalabilty

    Correct Answer
    A. Availability
    Explanation
    QoS (Quality of Service) helps to satisfy the technical requirement of availability. It ensures that certain applications receive the necessary network resources and prioritization to maintain a consistent and reliable level of service. This helps to prevent network congestion, delays, and interruptions, ensuring that the applications can always be accessed and used by users without any significant downtime or performance issues.

    Rate this question:

  • 9. 

    Which protocol allows redundant Layer 2 links without switching loops?

    • DHCP

    • HSRP

    • MPLS

    • RSTP

    Correct Answer
    A. RSTP
    Explanation
    RSTP (Rapid Spanning Tree Protocol) allows redundant Layer 2 links without switching loops. It is an advanced version of the Spanning Tree Protocol (STP) that provides faster convergence and better loop prevention mechanisms. RSTP eliminates switching loops by quickly determining the best path for data transmission and blocking redundant links. This ensures that there is only one active path between any two network devices, preventing loops and improving network efficiency. DHCP (Dynamic Host Configuration Protocol) is used for IP address assignment, HSRP (Hot Standby Router Protocol) is used for router redundancy, and MPLS (Multiprotocol Label Switching) is a protocol for efficient packet forwarding in networks.

    Rate this question:

  • 10. 

    Refer to the exhibit. The routers are configured with RIPv2 with default configurations.When attempting to communicate with other networks, hosts from 172.16.2.0/24 areexperiencing connectivity issues. What could be done to resolve this issue?

    • Change to a public IP address scheme.

    • Disable automatic route summarization.

    • Change the IP network address on R3 Fa0/0 to 172.16.1.128 /26.

    • Change the subnet mask on the link between R2 and R3 to 255.255.255.0.

    Correct Answer
    A. Disable automatic route summarization.
  • 11. 

    A company has an IT staff that is not highly trained. What two features or technologies must the network designer identify as training needs in order for the staff to understand the basic operation of VPNs? (Choose two.)

    • Access control lists

    • Encryption algorithms

    • Frame Relay configuration

    • QoS operation

    • Tunneling protocols

    • VLAN configuration

    Correct Answer(s)
    A. Encryption algorithms
    A. Tunneling protocols
    Explanation
    The IT staff needs to understand the basic operation of VPNs, which involves securing the data transmitted over the network and establishing secure connections. Therefore, they need to be trained in encryption algorithms, which are used to encrypt and decrypt the data, ensuring its confidentiality. Additionally, they need to be familiar with tunneling protocols, which are responsible for encapsulating and transporting the data securely through the network. These two features or technologies are essential for the staff to understand the basic operation of VPNs and ensure the security of the network.

    Rate this question:

  • 12. 

    Which protocol is enabled by default to dynamically discover and eliminate Layer 2 loops that are created by redundant links between switches?

    • CDP

    • DTP

    • STP

    • VTP

    Correct Answer
    A. STP
    Explanation
    STP (Spanning Tree Protocol) is enabled by default to dynamically discover and eliminate Layer 2 loops that are created by redundant links between switches. STP works by creating a loop-free logical topology by blocking redundant paths, ensuring that there is only one active path between any two network devices. This prevents broadcast storms and ensures efficient and reliable communication within the network. CDP (Cisco Discovery Protocol) is a Cisco proprietary protocol used for network device discovery. DTP (Dynamic Trunking Protocol) is used to negotiate trunk links between switches. VTP (VLAN Trunking Protocol) is used for VLAN management and propagation.

    Rate this question:

  • 13. 

    Refer to the exhibit. What does the TOR router do with traffic that is destined for a web server with an IP address of 172.18.10.24?

    • The router sends the traffic out Serial 0/0/0

    • The router sends the traffic out all interfaces other than the one it came in on.

    • The router places the packets into a queue until a better route is discovered via RIP.

    • The router sends a request to neighboring routers for paths to the 172.18.10.0 network

    Correct Answer
    A. The router sends the traffic out Serial 0/0/0
    Explanation
    The given correct answer suggests that the TOR router sends the traffic destined for a web server with an IP address of 172.18.10.24 out through the Serial 0/0/0 interface. This means that the router forwards the traffic through the specific interface that is connected to the network where the web server is located.

    Rate this question:

  • 14. 

    A technician adds the command Router(config-router)# variance 5 to a router using EIGRP as the routing protocol. What is the result of entering this command?

    • Adjusts the metric of all EIGRP routes to 5

    • Restricts the number of EIGRP feasible successor routes to 5

    • Activates the use of all K values in the composite metric calculation

    • Enables unequal cost load balancing

    • Enables EIGRP equal cost load balancing over a maximum of 5 routes

    Correct Answer
    A. Enables unequal cost load balancing
    Explanation
    The command "Router(config-router)# variance 5" enables unequal cost load balancing in EIGRP. Unequal cost load balancing allows EIGRP to distribute traffic across multiple paths with different metrics, providing more efficient utilization of network resources. By setting the variance to 5, the router will consider paths with a metric up to 5 times higher than the best path as viable options for load balancing. This helps to optimize network performance and improve overall efficiency.

    Rate this question:

  • 15. 

    Refer to the exhibit. A pre-sales system engineer receives a diagram of the current WAN from a customer. EIGRP is the routing protocol used on the WAN. Based on the default operation of EIGRP, which statement is true about the routing table on router R1?

    • There is a single route to the 192.168.16.0/24 LAN using the T1 connection.

    • There is a single route to the 192.168.16.0/24 LAN using the DSL connection.

    • There is a single route to the 192.168.16.0/24 LAN using the Metro Ethernet connection

    • EIGRP installs all three routes to the 192.168.16.0/24 LAN and load balances the traffic

    Correct Answer
    A. There is a single route to the 192.168.16.0/24 LAN using the Metro Ethernet connection
    Explanation
    Based on the diagram of the current WAN and the fact that EIGRP is the routing protocol used, it can be inferred that there is a single route to the 192.168.16.0/24 LAN using the Metro Ethernet connection. This is because EIGRP, by default, selects the route with the lowest metric as the best path. Since the Metro Ethernet connection has the lowest metric among the available connections, it will be chosen as the route to the LAN. Therefore, the correct answer is that there is a single route to the 192.168.16.0/24 LAN using the Metro Ethernet connection.

    Rate this question:

  • 16. 

    Why is it difficult for network designers to predict the patterns and behavior of file transfer traffic?

    • The traffic is user initiated

    • File size is typically very small

    • Dedicated bandwidth is essential.

    • All file transfer traffic is queued as high priority.

    Correct Answer
    A. The traffic is user initiated
    Explanation
    Network designers find it difficult to predict the patterns and behavior of file transfer traffic because the traffic is user initiated. Users have varying preferences and habits when it comes to transferring files, making it challenging for designers to anticipate when and how much traffic will occur. Additionally, user behavior can change over time, further complicating predictions.

    Rate this question:

  • 17. 

    Refer to the exhibit. The routers are configured with RIPv2 with default configurations. When attempting to communicate with other networks, hosts from 172.31.1.0/24 are experiencing connectivity issues. What could be done to resolve this issue?

    • • Change to a public IP address scheme

    • • Disable automatic route summarization

    • • Change the IP network address on R3 Fa0/0 to 172.16.1.128 /26

    • • Change the subnet mask on the link between R2 and R3 to 255.255.255.0

    Correct Answer
    A. • Disable automatic route summarization
    Explanation
    Disabling automatic route summarization can help resolve the connectivity issues for hosts from the 172.31.1.0/24 network. Automatic route summarization can cause the network to advertise a summarized route instead of the specific routes, which can lead to connectivity problems. By disabling automatic route summarization, the routers will advertise the specific routes, allowing the hosts to communicate with other networks properly.

    Rate this question:

  • 18. 

    A network engineer is designing a LAN prototype for a medium-sized business. What should be used to test the IP addressingscheme?

    • Cisco SDM

    • Network simulation tool

    • A fully functional network

    • Network equipment in a testing lab

    Correct Answer
    A. Network simulation tool
    Explanation
    To test the IP addressing scheme for the LAN prototype, a network simulation tool should be used. This tool allows the network engineer to simulate the network environment and test different IP addressing configurations without the need for physical network equipment. It provides a virtual environment where the engineer can analyze the behavior and performance of the network, ensuring that the IP addressing scheme is properly designed and implemented before deploying it in a production environment.

    Rate this question:

  • 19. 

    What type of system uses a PBX for call control and connection to the PSTN?

    • VPN

    • Traditional telephony

    • VoIP

    • IP telefony

    Correct Answer
    A. Traditional telephony
    Explanation
    A PBX (Private Branch Exchange) is a telephone system that is used within an organization to handle internal calls and connect them to the PSTN (Public Switched Telephone Network). Traditional telephony refers to the use of analog or digital phone lines for communication, which is the type of system that uses a PBX for call control and connection to the PSTN. VPN (Virtual Private Network) is a network technology that allows secure remote access to a private network. VoIP (Voice over Internet Protocol) and IP telephony both refer to the transmission of voice calls over the internet, which do not necessarily require a PBX or connection to the PSTN.

    Rate this question:

  • 20. 

    What makes the Cisco EasyVPN application a useful tool for VPN implementation?

    • It provides encryption algorithms unavailable in other systems.

    • It ensures that remote workers actually use the VPN for connectivity.

    • It simplifies the configuration tasks for the device that is used as the VPN server.

    • It allows a greater variety of network devices to be used for VPN connections.

    Correct Answer
    A. It simplifies the configuration tasks for the device that is used as the VPN server.
    Explanation
    The Cisco EasyVPN application is a useful tool for VPN implementation because it simplifies the configuration tasks for the device that is used as the VPN server. This means that setting up and managing the VPN server becomes easier and less time-consuming. It eliminates the need for complex manual configurations, making it a convenient option for organizations looking to implement VPN solutions.

    Rate this question:

  • 21. 

    A network administrator has changed the VLAN configurations on his network switches over the past weekend. How can the administrator determine if the additions and changes improved performance and availability on the company intranet?

    • Conduct a performance test and compare with the baseline that was established previously

    • Interview departmental secretaries and determine if they think load time for web pages has improved.

    • Determine performance on the intranet by monitoring load times of company web pages from remote sites.

    • Compare the hit counts on the company web server for the current week to the values that were recorded in previous weeks.

    Correct Answer
    A. Conduct a performance test and compare with the baseline that was established previously
    Explanation
    The best way for the network administrator to determine if the additions and changes improved performance and availability on the company intranet is to conduct a performance test and compare it with the baseline that was established previously. This will provide quantitative data on the performance of the network after the changes were made, allowing the administrator to assess any improvements or issues. Comparing the performance test results with the baseline will provide a clear indication of the impact of the VLAN configurations on the network's performance and availability.

    Rate this question:

  • 22. 

    Refer to the exhibit. Which summarized route would be advertised Which summarized route would be advertised by R1 to R2?

    • 10.0.0.0/13

    • 10.4.0.0/14

    • 10.5.0.0/13

    • 10.6.0.0/14

    Correct Answer
    A. 10.0.0.0/13
    Explanation
    R1 would advertise the summarized route 10.0.0.0/13 to R2. This is because it covers all the given subnets: 10.4.0.0/14, 10.5.0.0/13, and 10.6.0.0/14. The summarized route 10.0.0.0/13 includes all the IP addresses within these subnets and is the most efficient way to advertise them as a single route.

    Rate this question:

  • 23. 

    A customer of a large multisite organization has asked a network engineer to compare a new IPv4 addressing strategy with an IPv6 strategy for their new network implementation. Which tool is appropriate for testing and comparing both addressing schemes?

    • NBAR

    • Cisco SDM

    • Network Assistant

    • Network simulation tool

    Correct Answer
    A. Network simulation tool
    Explanation
    A network simulation tool is the appropriate tool for testing and comparing both addressing schemes. This tool allows the network engineer to simulate different network scenarios and configurations, including the implementation of IPv4 and IPv6 addressing strategies. It provides a realistic environment for testing and evaluating the performance, compatibility, and functionality of both addressing schemes, helping the engineer to make an informed decision on which strategy would be more suitable for the new network implementation.

    Rate this question:

  • 24. 

     Refer to the exhibit. What is an accurate description of the first neighbor that is displayedin the output?

    • 24 port 2950 switch with a non-default native VLAN

    • 24 port 2950 switch that is connected to Fa0/0 on Router1

    • 24 port 2950 switch that is assigned to the administrator-defined VTP domain

    • 24 port 2950 switch with interface GigabitEthernet0/1 that is operating at 1000 Mb/s

    Correct Answer
    A. 24 port 2950 switch that is connected to Fa0/0 on Router1
    Explanation
    The first neighbor displayed in the output is a 24 port 2950 switch that is connected to Fa0/0 on Router1.

    Rate this question:

  • 25. 

    A user in a large office calls tech support to complain that the PC no longer connects to the Internet or to any network resources,but seems otherwise normal. The help desk technician asks the caller to talk to nearby users to see if other machines are affected.After a few minutes, the caller reports that several immediate neighbors have the same problem, but those seated further awaydo not. Assuming that the description is accurate, what should be checked next?

    • Power outlet to the PC that is used by the caller

    • Workgroup switch in the telecommunications room

    • Cable between any network outlet and the telecommunications room

    • Cable between the PC that is used by the caller and the network outlet it connects to

    • Cable between the PC that is used by a neighbor and the network outlet the neighbor PC it connects to

    Correct Answer
    A. Workgroup switch in the telecommunications room
    Explanation
    Based on the information provided, the caller reports that several immediate neighbors are also experiencing the same problem, while those seated further away are not affected. This suggests that the issue is localized to a specific area or network switch. Therefore, the next logical step would be to check the workgroup switch in the telecommunications room, as it is responsible for connecting multiple devices to the network.

    Rate this question:

  • 26. 

    A WIC-1T module needs to be installed in a Cisco 1841 router that currently has a WIC-2T module in slot 0. What should the network technician do first?

    • Install the hot-swappable option module

    • Turn off the power to the router before installing the new module.

    • Remove the WIC-2T module so that the new module can be installed in slot 0.

    • Shut down all Fast Ethernet ports on the router until the new WIC module installation is complete.

    • Configure the Cisco IOS software to support an internal trunk link between the two WIC modules.

    Correct Answer
    A. Turn off the power to the router before installing the new module.
    Explanation
    The network technician should turn off the power to the router before installing the new module. This is necessary to ensure that there is no electrical current flowing through the router while the module is being installed, which can help prevent any potential damage to the module or the router itself. Turning off the power also ensures that the installation process is safe for the technician.

    Rate this question:

  • 27. 

    Refer to the exhibit. An extended ACL has been created to deny traffic from the192.168.35.0/24 network to the web server with IP address 209.165.201.15. According to Cisco best practices, where should the ACL be applied

    • RTB Fa0/0 inbound

    • RTC S0/0/1 inbound

    • RTD Fa0/0 outbound

    • RTC S0/1/0 outbound

    Correct Answer
    A. RTB Fa0/0 inbound
    Explanation
    The extended ACL should be applied on the RTB Fa0/0 inbound interface. This is because the ACL is intended to deny traffic from the 192.168.35.0/24 network to the web server, which means it needs to be applied on the interface that is connected to that network. Applying it on the inbound direction ensures that the ACL is evaluated before the traffic enters the router, allowing it to effectively block any traffic from the specified network to the web server with IP address 209.165.201.15.

    Rate this question:

  • 28. 

    In order for the IT staff of a company to understand the basic operation of VPNs, which two features ortechnologies must the network designer identify as training needs? (Choose two.

    • IPv6 tunneling

    • QoS operation

    • Tunneling protocols

    • VLAN configuration

    • Encryption algorithms

    Correct Answer(s)
    A. Tunneling protocols
    A. Encryption algorithms
    Explanation
    The network designer must identify tunneling protocols and encryption algorithms as training needs for the IT staff to understand the basic operation of VPNs. Tunneling protocols are essential for creating secure tunnels over public networks, allowing data to be transmitted securely between remote locations. Encryption algorithms are necessary for encrypting the data transmitted over these tunnels, ensuring its confidentiality and integrity. Understanding these two features or technologies is crucial for the IT staff to effectively configure and maintain VPN connections within the company's network.

    Rate this question:

  • 29. 

     

    • Change to a public IP address scheme.

    • Ensure that automatic route summarization has been disabled on all routers in the network.

    • Change the IP address for the Router3 LAN to be 192.168.7.0/24.

    • Change the subnet mask on the link between Router2 and Router3 to 255.255.255.0.

    Correct Answer
    A. Ensure that automatic route summarization has been disabled on all routers in the network.
    Explanation
    The correct answer is to ensure that automatic route summarization has been disabled on all routers in the network. Automatic route summarization is a feature that allows routers to automatically summarize network routes, reducing the size of the routing table. However, in this case, disabling automatic route summarization is necessary because it may cause issues with routing between the different subnets in the network. By disabling automatic route summarization, each subnet will be advertised as a separate route, allowing for proper routing and communication between the subnets.

    Rate this question:

  • 30. 

     NetworkingCompany engineer is on a support call resolving technical problems for a client network. After the issue is resolved, the engineer also provides a training session for the network support staff. What role is the engineer filling on the networking company team?

    • Post-sales field engineer

    • Pre-sales engineer

    • network designer

    • account manager

    Correct Answer
    A. Post-sales field engineer
    Explanation
    The engineer is filling the role of a post-sales field engineer on the networking company team. This is evident from the fact that they are resolving technical problems for a client network, which indicates that the sale has already been made, and they are providing training to the network support staff after resolving the issue. This role typically involves providing support and training to customers after the sale has been completed.

    Rate this question:

  • 31. 

    A network designer has chosen to specify the use of a dedicated firewall appliance at theperimeter o a large network. Why would the designer use a dedicated firewall rather thanusing the Cisco IOS firewall feature set on the existing router?

    • Traffic filtering is needed on the internal LAN.

    • Multiple levels of access to the network are needed

    • The DMZ requires packet filtering and port blocking

    • Heavy network traffic will be handled best by using a dedicated device

    Correct Answer
    A. Heavy network traffic will be handled best by using a dedicated device
    Explanation
    Using a dedicated firewall device is more suitable for handling heavy network traffic because it is specifically designed and optimized for firewall functions. The Cisco IOS firewall feature set on the existing router may not have the same level of performance and capacity as a dedicated firewall appliance. Additionally, using a dedicated device allows for better scalability and flexibility in terms of adding new features and functionalities as the network grows.

    Rate this question:

  • 32. 

    When implementing a security policy, which two actions should be included as part of thesecurity checklist? (Choose two.)

    • Disable all logging.

    • Enable Telnet on TCP port 23.

    • Use HTTP for web administration.

    • Set timeouts and ACLs on VTY lines.

    • Shut down any unused ports and interfaces.

    Correct Answer(s)
    A. Set timeouts and ACLs on VTY lines.
    A. Shut down any unused ports and interfaces.
    Explanation
    The two actions that should be included as part of the security checklist are setting timeouts and ACLs on VTY lines and shutting down any unused ports and interfaces. Setting timeouts and ACLs on VTY lines helps to control access to the device and prevent unauthorized access. Shutting down unused ports and interfaces reduces the attack surface and prevents potential security vulnerabilities. Disabling all logging, enabling Telnet on TCP port 23, and using HTTP for web administration would not enhance security and could potentially create security risks.

    Rate this question:

  • 33. 

    A network administrator of a middle-sized company is asked to upgrade the routingprotocol of the network to support VLSM and route summarization. The current companynetwork contains both Cisc and non-Cisco routers. Which routing protocol should be usedfor the upgrade?

    • BGP

    • RIP1

    • RIP2

    • EIGRP

    Correct Answer
    A. RIP2
    Explanation
    RIP2 should be used for the upgrade because it supports Variable Length Subnet Masking (VLSM) and route summarization. RIP2 is an enhanced version of RIP (Routing Information Protocol) and is compatible with both Cisco and non-Cisco routers. BGP (Border Gateway Protocol) is typically used for large-scale networks and is not necessary for a middle-sized company. EIGRP (Enhanced Interior Gateway Routing Protocol) is a Cisco proprietary protocol and may not be compatible with non-Cisco routers. RIP1 does not support VLSM and route summarization.

    Rate this question:

  • 34. 

    Refer to the exhibit. A networking company designer is reviewing a diagram of acustomer network. What are the two problems that need to be resolved in the topology that isshown? (Choose two.)

    • The firewall router and ISP connection represent a single point of failure.

    • If one of the Layer 3 switches fails, the Cisco Call Manager will be unreachable.

    • A power supply failure of the server block switch will cause the entire IP telephony system to fail.

    • Using Layer 3 switches to interconnect the server block servers to the IP phones introduces toomuch delay

    • The IP phones need to be redundantly connected to the switches to prevent single points of failureat the access layer

    Correct Answer(s)
    A. The firewall router and ISP connection represent a single point of failure.
    A. A power supply failure of the server block switch will cause the entire IP telephony system to fail.
    Explanation
    The first problem that needs to be resolved is that the firewall router and ISP connection represent a single point of failure. If either of these fails, it will disrupt the entire network connectivity. The second problem is that a power supply failure of the server block switch will cause the entire IP telephony system to fail. This means that if the server block switch loses power, the IP phones will not be able to function. Both of these issues need to be addressed in order to ensure the reliability and availability of the network.

    Rate this question:

  • 35. 

    A small bookstore would like to offer wireless connectivity for customers with laptops. Which wireless components or devices will provide connectivity to the customers with the least possible cost to the bookstore?

    • Standalone access points

    • Wireless LAN controllers

    • Standalone lightweight access points

    • Lightweight access point and wireless LAN controller

    Correct Answer
    A. Standalone access points
    Explanation
    Standalone access points would provide connectivity to customers with the least possible cost to the bookstore. Standalone access points are individual devices that can be directly connected to the existing network infrastructure without the need for additional equipment like wireless LAN controllers. This means that the bookstore can simply install standalone access points throughout the store, allowing customers to connect to the wireless network without incurring the cost of purchasing and maintaining additional devices or controllers.

    Rate this question:

  • 36. 

    Which IOS component can be used to classify and monitor network traffic?

    • CDP

    • NBAR

    • CiscoWorks

    • Network Assistant

    Correct Answer
    A. NBAR
    Explanation
    NBAR (Network-Based Application Recognition) can be used to classify and monitor network traffic. NBAR is a Cisco IOS feature that provides deep packet inspection capabilities, allowing it to identify and classify network traffic based on the application or protocol being used. This enables network administrators to gain better visibility into their network traffic, prioritize certain applications or protocols, and apply quality of service policies accordingly.

    Rate this question:

  • 37. 

    When implementing an IP telephony solution, why should VLANs be used?

    • To allow the use of a single IP gateway

    • To separate voice from data traffic for ease of prioritization

    • To allow the PBX to use VLAN IDs to filter both voice and data traffic

    • To allow connectivity between traditional phone devices and IP-based telephony devices

    Correct Answer
    A. To separate voice from data traffic for ease of prioritization
    Explanation
    VLANs should be used in an IP telephony solution to separate voice from data traffic for ease of prioritization. By separating the two types of traffic, it becomes easier to prioritize voice traffic and ensure that it is given the necessary bandwidth and quality of service for clear and uninterrupted communication. This helps to prevent congestion and ensure that voice calls are not affected by other data-intensive activities on the network.

    Rate this question:

  • 38. 

    What is the advantage of choosing EasyVPN for a new VPN implementation?

    • To provide encryption algorithms unavailable in other systems

    • To ensure that remote workers actually use the VPN for connectivity

    • To allow a greater variety of network devices to be used for VPN connections

    • To simplify the configuration tasks for the device that is used as the VPN server

    Correct Answer
    A. To simplify the configuration tasks for the device that is used as the VPN server
    Explanation
    EasyVPN is advantageous for a new VPN implementation because it simplifies the configuration tasks for the device that is used as the VPN server. This means that setting up and managing the VPN server becomes easier and less time-consuming. With EasyVPN, administrators can quickly and easily configure the necessary settings, making it a convenient choice for organizations looking to implement a VPN solution without the complexity of manual configuration.

    Rate this question:

  • 39. 

    Which characteristic should be considered by a network designer when implementing a VoIP solution?

    • VoIP traffic is generally classified as low priority

    • VoIP centrally routes calls in the same manner as a traditional PBX.

    • VoIP can make use of QoS features to help reduce interruptions in communication.

    • VoIP traffic is highly reliable because of retransmission of dropped packets

    Correct Answer
    A. VoIP can make use of QoS features to help reduce interruptions in communication.
    Explanation
    When implementing a VoIP solution, a network designer should consider the characteristic that VoIP can make use of QoS (Quality of Service) features to help reduce interruptions in communication. QoS ensures that VoIP traffic is given priority over other types of network traffic, such as email or web browsing, to maintain a high level of call quality and minimize latency or packet loss. By implementing QoS, network designers can prioritize VoIP traffic and allocate sufficient bandwidth to ensure smooth and uninterrupted communication.

    Rate this question:

  • 40. 

    Which feature relies on prioritization of network traffic and is used to ensure successful delivery of real-time services?

    • Security

    • Reliability

    • Redundancy

    • Quality of service

    Correct Answer
    A. Quality of service
    Explanation
    Quality of service (QoS) is a feature that relies on prioritization of network traffic to ensure successful delivery of real-time services. It allows for the allocation of network resources to different applications or services based on their priority level, ensuring that critical services such as voice or video communication are given higher priority and guaranteed bandwidth, while less time-sensitive applications receive lower priority. QoS helps maintain reliable and consistent performance for real-time services, reducing latency and ensuring their successful delivery.

    Rate this question:

  • 41. 

    Which two security best practices are recommended for a router deployed as a WAN endpoint? (Choose two.)

    • Turn off unnecessary services

    • Enable HTTP for web administration

    • Configure easy to remember passwords.

    • Apply timeouts on VTY, AUX, and console ports.

    • Enable Telnet access to allow for remote management.

    Correct Answer(s)
    A. Turn off unnecessary services
    A. Apply timeouts on VTY, AUX, and console ports.
    Explanation
    The two security best practices recommended for a router deployed as a WAN endpoint are turning off unnecessary services and applying timeouts on VTY, AUX, and console ports. Turning off unnecessary services helps to reduce the attack surface by disabling any unnecessary protocols or features that could be exploited. Applying timeouts on VTY, AUX, and console ports adds an extra layer of security by automatically terminating idle sessions after a certain period of inactivity, preventing unauthorized access to the router.

    Rate this question:

  • 42. 

    Refer to the exhibit. A networking engineer is characterizing an existing network for a new customer. The engineer issues a show running-config command on the R1 router to gather configuration information. What is the engineer able to determine as a result of viewing the output of this command?

    • The R1 router has two specific routes to the main office LANs in the routing table.

    • The default route for the R1 router points to the Edge1 router.

    • The R1 router will load-balance traffic to the main office LANs by using both DSL and Frame Relay.

    • A connection through ISP-1 will be used to reach the main office LANs if the Frame Relay network is unavailable

    Correct Answer
    A. A connection through ISP-1 will be used to reach the main office LANs if the Frame Relay network is unavailable
    Explanation
    The engineer is able to determine that if the Frame Relay network is unavailable, a connection through ISP-1 will be used to reach the main office LANs.

    Rate this question:

  • 43. 

    Which technology will prioritize traffic based upon the technical requirements of IP telephony?

    • PoE

    • QoS

    • RPC

    • RTP

    • VPN

    Correct Answer
    A. QoS
    Explanation
    QoS stands for Quality of Service, which is a technology that prioritizes network traffic based on the technical requirements of IP telephony. It ensures that voice data packets are given higher priority and are delivered with minimal delay, jitter, and packet loss. QoS helps to maintain the quality and reliability of IP telephony by allocating sufficient bandwidth and managing network congestion.

    Rate this question:

  • 44. 

    A network administrator is given a network address of 192.168.1.64/26 to create four subnets with seven hosts in each subnet. Which subnet mask should be used?

    • 255.255.255.224

    • 255.255.255.240

    • 255.255.255.248

    • 255.255.255.252

    Correct Answer
    A. 255.255.255.240
    Explanation
    The given network address 192.168.1.64/26 has a subnet mask of 255.255.255.192. However, the question requires creating four subnets with seven hosts in each subnet. To accommodate seven hosts, we need a subnet size of 8 (2^3 = 8). Therefore, we need to increase the subnet mask to cover 8 addresses. The next subnet mask that can accommodate 8 addresses is 255.255.255.240, which gives us 16 addresses per subnet (including network and broadcast addresses). Therefore, the correct subnet mask to use is 255.255.255.240.

    Rate this question:

  • 45. 

    • • /19

    • • /20

    • • /21

    • • /22

    • • /23

    • • /24

    Correct Answer
    A. • /22
  • 46. 

    Using the show frame-relay pvc and debug frame-relay lmi commands to troubleshoot a Frame Relay problem, a networkadministrator rules out issues at Layers 1 and 2. Further investigation reveals that the IP address of the remote router does notappear in the Frame Relay table. What should the next step be in solving the problem?

    • Configure the router using the frame-relay map ip command

    • Disable Inverse ARP on the local router

    • Verify that the remote router has Frame Relay encapsulation enabled

    • Ensure that the LMI type is correct for the circuit

    Correct Answer
    A. Configure the router using the frame-relay map ip command
    Explanation
    The next step in solving the problem is to configure the router using the frame-relay map ip command. This command is used to map a specific IP address to a specific DLCI (Data Link Connection Identifier) on the Frame Relay network. By configuring the router with this command, the IP address of the remote router can be added to the Frame Relay table, allowing for proper communication between the routers.

    Rate this question:

  • 47. 

    Which IOS component can be used for classification and protocol discovery of network traffic and applications in use?

    • CDP

    • NBAR

    • ACL logging

    • Network Assistant

    Correct Answer
    A. NBAR
    Explanation
    NBAR (Network-Based Application Recognition) is an IOS component that can be used for classification and protocol discovery of network traffic and applications in use. NBAR analyzes packet headers and payload to identify the applications and protocols being used on the network. It can be used to prioritize or block specific types of traffic based on their application or protocol, allowing for better network management and security.

    Rate this question:

  • 48. 

    • There is a single route to the 172.18.20.0/24 LAN via the T1 connection.

    • There is a single route to the 172.18.20.0/24 LAN via the DSL connection.

    • EIGRP installs all three routes to the 172.18.20.0/24 LAN and load balances the traffic.

    • There is a single route to the 172.18.20.0/24 LAN via the 10 Mb Ethernet connection.

    Correct Answer
    A. There is a single route to the 172.18.20.0/24 LAN via the 10 Mb Ethernet connection.
    Explanation
    The correct answer is "There is a single route to the 172.18.20.0/24 LAN via the 10 Mb Ethernet connection." This is because the given information states that there is only one route to the LAN via the 10 Mb Ethernet connection, while the other options mention multiple routes or different types of connections.

    Rate this question:

  • 49. 

    A new WIC is installed in an available router slot. At what point during the router startup process does the router test the card for hardware problems?

    • After the configuration from NVRAM is loaded into RAM

    • After the configuration from NVRAM is loaded into ROM

    • When the bootstrap program is loaded into RAM

    • During the POST

    Correct Answer
    A. During the POST
    Explanation
    During the POST (Power-On Self Test) is when the router tests the newly installed WIC for any hardware problems. The POST is a diagnostic process that the router goes through during startup to check the hardware components and ensure they are functioning correctly. This includes testing the newly installed card to ensure it is properly functioning and can be used by the router.

    Rate this question:

Quiz Review Timeline (Updated): Aug 18, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 18, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 10, 2014
    Quiz Created by
    FlessGordon
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.