+ All Categories
Home > Documents > Close Window

Close Window

Date post: 18-Nov-2014
Category:
Upload: keduse
View: 2,903 times
Download: 1 times
Share this document with a friend
Description:
finall exam
15
Close Window Assessment System 1. Assessment Selection 2. Assessment Settings 3. Take Assessment Take Assessment - DCompNtwk Final - CCNA Discovery: Designing and Supporting Computer Networks (Version 4.0) Time Remaining: 1 What is the function of a network modular block diagram? It provides a high level view of all sites in an enterprise network. It shows a simplified version of a network and diagrams major functions. It lists the networking equipment and addressing schemes for each network segment. It shows all the major pieces of networking equipment in a network and how they interconnect. 2 If traditional phones are used when introducing VoIP to a network, what component would be required to convert the analog voice from traditional telephone signals into IP packets? Multipoint control unit Power over Ethernet switches a router that acts as a voice gateway Cisco Unified Communications Manager 3 A company has just transitioned from traditional telephony to an IP Telephony solution for their voice requirements. What statement describes a characteristic of the new system? connects through a PBX to the PSTN replaces a digital system with an analog one combines data and voice into a converged network requires manual configuration for adding, moving or changing phones enables web applications and phone directories to be available to every PC on the network 4
Transcript
Page 1: Close Window

Close Window

Assessment System

1 Assessment Selection

2 Assessment Settings

3 Take Assessment

Take Assessment - DCompNtwk Final - CCNA Discovery Designing and Supporting

Computer Networks (Version 40)

Time Remaining

1 What is the function of a network modular block diagram

It provides a high level view of all sites in an enterprise network

It shows a simplified version of a network and diagrams major functions

It lists the networking equipment and addressing schemes for each network segment

It shows all the major pieces of networking equipment in a network and how they interconnect

2 If traditional phones are used when introducing VoIP to a network what component would be required to

convert the analog voice from traditional telephone signals into IP packets

Multipoint control unit

Power over Ethernet switches

a router that acts as a voice gateway

Cisco Unified Communications Manager

3 A company has just transitioned from traditional telephony to an IP Telephony solution for their voice

requirements What statement describes a characteristic of the new system

connects through a PBX to the PSTN

replaces a digital system with an analog one

combines data and voice into a converged network

requires manual configuration for adding moving or changing phones

enables web applications and phone directories to be available to every PC on the network

4

Refer to the exhibit The routers are configured with RIPv2 with default configurations When attempting to

communicate with other networks hosts from 10011024 are experiencing connectivity issues What could be

done to resolve this issue

Change to a public IP addressing scheme

Use EIGRP with its default configuration as the routing protocol

Change the subnet mask on the link between R2 and R3 to 2552552550

Disable automatic route summarization on all routers in the network

5 Which two descriptions relate to a Frame Relay DLCI (Choose two)

guaranteed rate at which data travels on the packet-switched network

signalling standard between DTE and DCE

indicator of congestion on the network

locally significant circuit endpoint

one DLCI allowed per local loop

Layer 2 address

6 Why is it difficult for network designers to predict the patterns and behavior of file transfer traffic

The traffic is user initiated

File size is typically very small

Dedicated bandwidth is essential

All file transfer traffic is queued as high priority

7 A school district decides to use the 172300016 network for its LAN networks The network administrator

must create an addressing scheme to support 500 users in the admin office 200 at the high school 60 at the

elementary school and 28 at the district office Which VLSM addressing scheme will correctly address the

network with minimal waste

172300020 admin

172301021 high school

172301822 elementary

1723011226 district

172300022 admin

172304023 high school

172305024 elementary

172306026 district

172300023 admin

172302024 high school

172303026 elementary

1723036427 district

172300023 admin

172302024 high school

172303025 elementary

17230312726 district

8 Which task would typically only require services that are located at the access layer of the hierarchical design

model

placing a VoIP call to a business associate in another country

connecting to the corporate web server to update sales figures

using a VPN from home to send data to the main office server farm

responding to an e-mail from a co-worker in another department

printing a meeting agenda on a local departmental network printer

9 Which three enhancements does IPv6 offer over IPv4 (Choose three)

easier implementation and configuration

more effective IP security

integrated IP mobility support

simplified header information

fewer reserved IP addresses

eliminates the need to implement DHCP

10 A network administrator is integrating IPv6 into an IPv4 network by encapsulating one protocol packet within

another protocol Which transition method is being used

dual stack

tunneling

proxying and translation

NAT with Protocol Translator

11

Refer to the exhibit During a test of an EIGRP prototype network a network administrator issues a show ip

protocols command What two facts can be determined from the output (Choose two)

The administrative distance is 100

This router has one adjacent neighbor

There are 10 Cisco devices in this prototype network

The auto-summary command was applied on this router

EIGRP is using two values for the calculation of the composite metric

EIGRP on this router will display up to four unequal cost routes to the same destination

12 Which two pieces of information are needed before an IOS image may be loaded on a router from a TFTP

server (Choose two)

the IP address of the TFTP server

the current name of the IOS image on the router

the operating system of the TFTP server

the name of the configuration file in NVRAM

the name of the IOS image on the TFTP server

encapsulation of the router interface that is connected to the TFTP server

13 Which two values represent valid IPv6 addresses (Choose two)

1

FF011

00000001

2001DB8472A4

2031000004AC3400FFE30

14 A network administrator has configured Frame Relay on a serial interface and issued the show interfaces serial

command The output shows that the interface is up and the line protocol is up However pings to the remote

router across the link fail What should the next step be to ensure that the IP address of the remote router appears

in the Frame Relay map table of the local router

Configure the router using the no inverse-arp command

Ensure that the LMI type is correct for the circuit

Configure the router using the frame-relay map ip command

Verify that the remote router has Frame Relay encapsulation enabled

15

Refer to the exhibit A networking company technician conducts testing on a prototype to verify that the

proposed network design meets connectivity requirements Which command and its associated output will

provide evidence that inter-VLAN routing is implemented correctly and that all users have full connectivity to

each other

Showing 1 of 4 ltPrev

Page 1

Nextgt

Close Window

All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks

Close Window

Assessment System

1 Assessment Selection

2 Assessment Settings

3 Take Assessment

Take Assessment - DCompNtwk Final - CCNA Discovery Designing and Supporting

Computer Networks (Version 40)

Time Remaining

16 During prototype testing the network designer performs a test to determine the ability of the network to store

device configurations and statistics on local databases Which design goal is validated if the test is a success

security

scalability

availability

manageability

17 Which IOS component can be used for classification and protocol discovery of network traffic and applications

in use

CDP

NBAR

ACL logging

Network Assistant

18 Which WLAN operational feature can be configured as non-broadcast in order to increase the security of an

enterprise WLAN for employees

SSID

WEP keys

VLAN parameters

WPA encryption keys

VPN authentication information

19

Refer to the exhibit A network administrator is validating the routing for the new network design Which

command should be used to configure the s000 interface of the SALES router to advertise the Sales

Department networks as one route

SALES(config-if) ip summary-address eigrp 100 1721600 25525500

SALES(config-if) ip summary-address eigrp 100 1721680 2552552400

SALES(config-if) ip summary-address eigrp 100 17216160 2552552400

SALES(config-if) ip summary-address eigrp 100 17216310 2552552480

20

Refer to the exhibit A pre-sales systems engineer receives a diagram of the exhibited WAN implementation

from a customer EIGRP is the routing protocol that is used on the WAN None of the parameters for EIGRP

metric calculation have been modified in any router configurations Which statement is true about the routing

table on router RM

There is a single route to the 19216824024 LAN using the T1 connection

There is a single route to the 19216824024 LAN using the DSL connection

There is a single route to the 19216824024 LAN using the Metro Ethernet connection

EIGRP installs all three routes to the 19216824024 LAN and load balances the traffic

21

Refer to the exhibit Which set of commands will meet the security requirements that are shown

22 What is one advantage of a full mesh topology at the core layer of the enterprise network compared with a

partial mesh topology

It adds scalability to the corporate network

It provides fully redundant links to connecting modules

It lowers the impact and risk of DoS attacks from the Internet

It increases the manageability of the network devices in the core layer

23 What are two disadvantages to using simulation software such as Packet Tracer to validate a network design

(Choose two)

unrealistic performance

little control over network operation

inability to create large or complex networks

inability to simulate all required network conditions

lack of flexibility to support different devices and connectivity options

24 During a review of the proposed bill of materials an account manager of the network solution company realizes

that the systems engineer included a switch with lower cost and reduced capabilities for the access layer than

was originally specified by the network designer When questioned the systems engineer responds that the

switches specified by the designer cannot be purchased within the budget limitations of the customer Which

action should the account manager take

Inform the customer that the project budget must be increased

Inform the customer that the project cannot be completed given the unreasonable budget constraints

Communicate any risks that are associated with the equipment substitution and obtain customer approval to

proceed

Because the customer is probably aware that the budget limitations will require lower cost less capable

equipment the account manager should do nothing

25

Refer to the exhibit What can the field engineer conclude about the EIGRP authentication between Router1 and

Router2

Authentication will fail because only one key is configured

Authentication will succeed and EIGRP updates can be exchanged

Authentication will fail because the key chain names do not match

Authentication will fail because the key chain names must match the router names

26 A network designer must select a routing protocol for the network of a customer The currently installed network

contains both Cisco and non-Cisco routers and there is no budget to replace them The designer plans on

implementing both VLSM and route summarization in the new network design Which two protocols can

provide the necessary functionality for this LAN (Choose two)

RTP

RSTP

RIPv1

RIPv2

EIGRP

OSPF

27 A company offers online ordering of its products The web service is provided by a primary web server that

synchronizes with a backup server A network designer recommends adding a load balancing unit and installing

additional web servers so that the online ordering traffic can be equally distributed among four web servers

What network design risk is addressed with this recommendation

limited bandwidth

possible bottleneck

single point of failure

large failure domains

28

Refer to the exhibit A network administrator configures two routers to test the WAN connection The serial

connection requires PPP encapsulation and authentication with CHAP However the connection cannot be

established According to the partial output of the show running-config command what is the cause of the

problem

The password should be all lowercase

The password should contain fewer than 8 characters

The usernames must be the same as the sending router hostnames

The usernames must be the same as the destination router hostnames

29 In order for the IT staff of a company to understand the basic operation of VPNs which two features or

technologies must the network designer identify as training needs (Choose two)

IPv6 tunneling

QoS operation

tunneling protocols

VLAN configuration

encryption algorithms

30 What is a function of software queuing

filters traffic on the basis of administrator defined rules

stores received traffic and sends packets based on the order that the packets are received

sends packets on the basis of priorities that are manually set

transmits packets in a priority sequence that is based on source port

Showing 2 of 4 ltPrev

Page 2

Nextgt

Close Window

All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks

Close Window

Assessment System

1 Assessment Selection

2 Assessment Settings

3 Take Assessment

Take Assessment - DCompNtwk Final - CCNA Discovery Designing and Supporting

Computer Networks (Version 40)

Time Remaining

46 What makes the Cisco EasyVPN application a useful tool for VPN implementation

It provides encryption algorithms unavailable in other systems

It ensures that remote workers actually use the VPN for connectivity

It simplifies the configuration tasks for the device that is used as the VPN server

It allows a greater variety of network devices to be used for VPN connections

47

Refer to the exhibit A customer has a problem with connectivity in the network Based on the IP addressing

scheme what is causing the problem

The WAN link that connects R1 to R3 has an incorrect mask

The WAN links need IP addresses from a different major network

The WAN link that connects R1 to R2 overlaps with the R3 LAN

The IP addressing in R1 LAN is incorrect because subnet zero cannot be used with VLSM

48 Which technical requirement is satisfied when providing QoS for delay sensitive applications

availability

manageability

scalability

security

49 Which statement best describes the VPN feature called split tunneling

It creates separate pathways for different VLANs

It creates two tunnels one for user traffic and one for management traffic such as CDP and SNMP

It allows user traffic that is destined for the corporate network to travel across the VPN tunnel while traffic

destined for the Internet travels through the local LAN of the VPN client

It allows separate tunnels so that high priority traffic such as voice and video uses the higher bandwidth

tunnel while all other user traffic travels on the lower bandwidth tunnel

50 As part of network monitoring a network administrator receives an alert that the CPU usage of the core router

reaches 90 several times a day Which protocol is in use to monitor the network performance

DNS

SNMP

SMTP

DHCP

TFTP

51 The main office of a NetworkingCompany customer currently connects to three branch offices via three separate

point-to-point T1 circuits The customer network uses RIPv2 as the routing protocol within both the LAN and

the WAN The account manager proposes a change to a Frame Relay network because the costs are lower A

single local loop connection can be installed at the main office with three separate PVCs to connect the branch

offices How can the main office edge router be configured to enable the customer to continue to use RIP as the

WAN routing protocol

Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote

routers

To prevent the Frame Relay network from causing a routing loop disable split horizon on the serial

interface

Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP

address to each one

Configure the serial interface with a single interface DLCI number and create frame-relay map statements

for each remote site address

52 Which command can be used to load a new Cisco IOS image on a router

copy startup-config tftp

copy tftp startup-config

copy running-config tftp

copy tftp flash

copy flash tftp

copy flash startup-config

Showing 4 of 4 ltPrev

Page 4

Nextgt

Close Window

All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks

s

Page 2: Close Window

Refer to the exhibit The routers are configured with RIPv2 with default configurations When attempting to

communicate with other networks hosts from 10011024 are experiencing connectivity issues What could be

done to resolve this issue

Change to a public IP addressing scheme

Use EIGRP with its default configuration as the routing protocol

Change the subnet mask on the link between R2 and R3 to 2552552550

Disable automatic route summarization on all routers in the network

5 Which two descriptions relate to a Frame Relay DLCI (Choose two)

guaranteed rate at which data travels on the packet-switched network

signalling standard between DTE and DCE

indicator of congestion on the network

locally significant circuit endpoint

one DLCI allowed per local loop

Layer 2 address

6 Why is it difficult for network designers to predict the patterns and behavior of file transfer traffic

The traffic is user initiated

File size is typically very small

Dedicated bandwidth is essential

All file transfer traffic is queued as high priority

7 A school district decides to use the 172300016 network for its LAN networks The network administrator

must create an addressing scheme to support 500 users in the admin office 200 at the high school 60 at the

elementary school and 28 at the district office Which VLSM addressing scheme will correctly address the

network with minimal waste

172300020 admin

172301021 high school

172301822 elementary

1723011226 district

172300022 admin

172304023 high school

172305024 elementary

172306026 district

172300023 admin

172302024 high school

172303026 elementary

1723036427 district

172300023 admin

172302024 high school

172303025 elementary

17230312726 district

8 Which task would typically only require services that are located at the access layer of the hierarchical design

model

placing a VoIP call to a business associate in another country

connecting to the corporate web server to update sales figures

using a VPN from home to send data to the main office server farm

responding to an e-mail from a co-worker in another department

printing a meeting agenda on a local departmental network printer

9 Which three enhancements does IPv6 offer over IPv4 (Choose three)

easier implementation and configuration

more effective IP security

integrated IP mobility support

simplified header information

fewer reserved IP addresses

eliminates the need to implement DHCP

10 A network administrator is integrating IPv6 into an IPv4 network by encapsulating one protocol packet within

another protocol Which transition method is being used

dual stack

tunneling

proxying and translation

NAT with Protocol Translator

11

Refer to the exhibit During a test of an EIGRP prototype network a network administrator issues a show ip

protocols command What two facts can be determined from the output (Choose two)

The administrative distance is 100

This router has one adjacent neighbor

There are 10 Cisco devices in this prototype network

The auto-summary command was applied on this router

EIGRP is using two values for the calculation of the composite metric

EIGRP on this router will display up to four unequal cost routes to the same destination

12 Which two pieces of information are needed before an IOS image may be loaded on a router from a TFTP

server (Choose two)

the IP address of the TFTP server

the current name of the IOS image on the router

the operating system of the TFTP server

the name of the configuration file in NVRAM

the name of the IOS image on the TFTP server

encapsulation of the router interface that is connected to the TFTP server

13 Which two values represent valid IPv6 addresses (Choose two)

1

FF011

00000001

2001DB8472A4

2031000004AC3400FFE30

14 A network administrator has configured Frame Relay on a serial interface and issued the show interfaces serial

command The output shows that the interface is up and the line protocol is up However pings to the remote

router across the link fail What should the next step be to ensure that the IP address of the remote router appears

in the Frame Relay map table of the local router

Configure the router using the no inverse-arp command

Ensure that the LMI type is correct for the circuit

Configure the router using the frame-relay map ip command

Verify that the remote router has Frame Relay encapsulation enabled

15

Refer to the exhibit A networking company technician conducts testing on a prototype to verify that the

proposed network design meets connectivity requirements Which command and its associated output will

provide evidence that inter-VLAN routing is implemented correctly and that all users have full connectivity to

each other

Showing 1 of 4 ltPrev

Page 1

Nextgt

Close Window

All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks

Close Window

Assessment System

1 Assessment Selection

2 Assessment Settings

3 Take Assessment

Take Assessment - DCompNtwk Final - CCNA Discovery Designing and Supporting

Computer Networks (Version 40)

Time Remaining

16 During prototype testing the network designer performs a test to determine the ability of the network to store

device configurations and statistics on local databases Which design goal is validated if the test is a success

security

scalability

availability

manageability

17 Which IOS component can be used for classification and protocol discovery of network traffic and applications

in use

CDP

NBAR

ACL logging

Network Assistant

18 Which WLAN operational feature can be configured as non-broadcast in order to increase the security of an

enterprise WLAN for employees

SSID

WEP keys

VLAN parameters

WPA encryption keys

VPN authentication information

19

Refer to the exhibit A network administrator is validating the routing for the new network design Which

command should be used to configure the s000 interface of the SALES router to advertise the Sales

Department networks as one route

SALES(config-if) ip summary-address eigrp 100 1721600 25525500

SALES(config-if) ip summary-address eigrp 100 1721680 2552552400

SALES(config-if) ip summary-address eigrp 100 17216160 2552552400

SALES(config-if) ip summary-address eigrp 100 17216310 2552552480

20

Refer to the exhibit A pre-sales systems engineer receives a diagram of the exhibited WAN implementation

from a customer EIGRP is the routing protocol that is used on the WAN None of the parameters for EIGRP

metric calculation have been modified in any router configurations Which statement is true about the routing

table on router RM

There is a single route to the 19216824024 LAN using the T1 connection

There is a single route to the 19216824024 LAN using the DSL connection

There is a single route to the 19216824024 LAN using the Metro Ethernet connection

EIGRP installs all three routes to the 19216824024 LAN and load balances the traffic

21

Refer to the exhibit Which set of commands will meet the security requirements that are shown

22 What is one advantage of a full mesh topology at the core layer of the enterprise network compared with a

partial mesh topology

It adds scalability to the corporate network

It provides fully redundant links to connecting modules

It lowers the impact and risk of DoS attacks from the Internet

It increases the manageability of the network devices in the core layer

23 What are two disadvantages to using simulation software such as Packet Tracer to validate a network design

(Choose two)

unrealistic performance

little control over network operation

inability to create large or complex networks

inability to simulate all required network conditions

lack of flexibility to support different devices and connectivity options

24 During a review of the proposed bill of materials an account manager of the network solution company realizes

that the systems engineer included a switch with lower cost and reduced capabilities for the access layer than

was originally specified by the network designer When questioned the systems engineer responds that the

switches specified by the designer cannot be purchased within the budget limitations of the customer Which

action should the account manager take

Inform the customer that the project budget must be increased

Inform the customer that the project cannot be completed given the unreasonable budget constraints

Communicate any risks that are associated with the equipment substitution and obtain customer approval to

proceed

Because the customer is probably aware that the budget limitations will require lower cost less capable

equipment the account manager should do nothing

25

Refer to the exhibit What can the field engineer conclude about the EIGRP authentication between Router1 and

Router2

Authentication will fail because only one key is configured

Authentication will succeed and EIGRP updates can be exchanged

Authentication will fail because the key chain names do not match

Authentication will fail because the key chain names must match the router names

26 A network designer must select a routing protocol for the network of a customer The currently installed network

contains both Cisco and non-Cisco routers and there is no budget to replace them The designer plans on

implementing both VLSM and route summarization in the new network design Which two protocols can

provide the necessary functionality for this LAN (Choose two)

RTP

RSTP

RIPv1

RIPv2

EIGRP

OSPF

27 A company offers online ordering of its products The web service is provided by a primary web server that

synchronizes with a backup server A network designer recommends adding a load balancing unit and installing

additional web servers so that the online ordering traffic can be equally distributed among four web servers

What network design risk is addressed with this recommendation

limited bandwidth

possible bottleneck

single point of failure

large failure domains

28

Refer to the exhibit A network administrator configures two routers to test the WAN connection The serial

connection requires PPP encapsulation and authentication with CHAP However the connection cannot be

established According to the partial output of the show running-config command what is the cause of the

problem

The password should be all lowercase

The password should contain fewer than 8 characters

The usernames must be the same as the sending router hostnames

The usernames must be the same as the destination router hostnames

29 In order for the IT staff of a company to understand the basic operation of VPNs which two features or

technologies must the network designer identify as training needs (Choose two)

IPv6 tunneling

QoS operation

tunneling protocols

VLAN configuration

encryption algorithms

30 What is a function of software queuing

filters traffic on the basis of administrator defined rules

stores received traffic and sends packets based on the order that the packets are received

sends packets on the basis of priorities that are manually set

transmits packets in a priority sequence that is based on source port

Showing 2 of 4 ltPrev

Page 2

Nextgt

Close Window

All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks

Close Window

Assessment System

1 Assessment Selection

2 Assessment Settings

3 Take Assessment

Take Assessment - DCompNtwk Final - CCNA Discovery Designing and Supporting

Computer Networks (Version 40)

Time Remaining

46 What makes the Cisco EasyVPN application a useful tool for VPN implementation

It provides encryption algorithms unavailable in other systems

It ensures that remote workers actually use the VPN for connectivity

It simplifies the configuration tasks for the device that is used as the VPN server

It allows a greater variety of network devices to be used for VPN connections

47

Refer to the exhibit A customer has a problem with connectivity in the network Based on the IP addressing

scheme what is causing the problem

The WAN link that connects R1 to R3 has an incorrect mask

The WAN links need IP addresses from a different major network

The WAN link that connects R1 to R2 overlaps with the R3 LAN

The IP addressing in R1 LAN is incorrect because subnet zero cannot be used with VLSM

48 Which technical requirement is satisfied when providing QoS for delay sensitive applications

availability

manageability

scalability

security

49 Which statement best describes the VPN feature called split tunneling

It creates separate pathways for different VLANs

It creates two tunnels one for user traffic and one for management traffic such as CDP and SNMP

It allows user traffic that is destined for the corporate network to travel across the VPN tunnel while traffic

destined for the Internet travels through the local LAN of the VPN client

It allows separate tunnels so that high priority traffic such as voice and video uses the higher bandwidth

tunnel while all other user traffic travels on the lower bandwidth tunnel

50 As part of network monitoring a network administrator receives an alert that the CPU usage of the core router

reaches 90 several times a day Which protocol is in use to monitor the network performance

DNS

SNMP

SMTP

DHCP

TFTP

51 The main office of a NetworkingCompany customer currently connects to three branch offices via three separate

point-to-point T1 circuits The customer network uses RIPv2 as the routing protocol within both the LAN and

the WAN The account manager proposes a change to a Frame Relay network because the costs are lower A

single local loop connection can be installed at the main office with three separate PVCs to connect the branch

offices How can the main office edge router be configured to enable the customer to continue to use RIP as the

WAN routing protocol

Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote

routers

To prevent the Frame Relay network from causing a routing loop disable split horizon on the serial

interface

Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP

address to each one

Configure the serial interface with a single interface DLCI number and create frame-relay map statements

for each remote site address

52 Which command can be used to load a new Cisco IOS image on a router

copy startup-config tftp

copy tftp startup-config

copy running-config tftp

copy tftp flash

copy flash tftp

copy flash startup-config

Showing 4 of 4 ltPrev

Page 4

Nextgt

Close Window

All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks

s

Page 3: Close Window

1723011226 district

172300022 admin

172304023 high school

172305024 elementary

172306026 district

172300023 admin

172302024 high school

172303026 elementary

1723036427 district

172300023 admin

172302024 high school

172303025 elementary

17230312726 district

8 Which task would typically only require services that are located at the access layer of the hierarchical design

model

placing a VoIP call to a business associate in another country

connecting to the corporate web server to update sales figures

using a VPN from home to send data to the main office server farm

responding to an e-mail from a co-worker in another department

printing a meeting agenda on a local departmental network printer

9 Which three enhancements does IPv6 offer over IPv4 (Choose three)

easier implementation and configuration

more effective IP security

integrated IP mobility support

simplified header information

fewer reserved IP addresses

eliminates the need to implement DHCP

10 A network administrator is integrating IPv6 into an IPv4 network by encapsulating one protocol packet within

another protocol Which transition method is being used

dual stack

tunneling

proxying and translation

NAT with Protocol Translator

11

Refer to the exhibit During a test of an EIGRP prototype network a network administrator issues a show ip

protocols command What two facts can be determined from the output (Choose two)

The administrative distance is 100

This router has one adjacent neighbor

There are 10 Cisco devices in this prototype network

The auto-summary command was applied on this router

EIGRP is using two values for the calculation of the composite metric

EIGRP on this router will display up to four unequal cost routes to the same destination

12 Which two pieces of information are needed before an IOS image may be loaded on a router from a TFTP

server (Choose two)

the IP address of the TFTP server

the current name of the IOS image on the router

the operating system of the TFTP server

the name of the configuration file in NVRAM

the name of the IOS image on the TFTP server

encapsulation of the router interface that is connected to the TFTP server

13 Which two values represent valid IPv6 addresses (Choose two)

1

FF011

00000001

2001DB8472A4

2031000004AC3400FFE30

14 A network administrator has configured Frame Relay on a serial interface and issued the show interfaces serial

command The output shows that the interface is up and the line protocol is up However pings to the remote

router across the link fail What should the next step be to ensure that the IP address of the remote router appears

in the Frame Relay map table of the local router

Configure the router using the no inverse-arp command

Ensure that the LMI type is correct for the circuit

Configure the router using the frame-relay map ip command

Verify that the remote router has Frame Relay encapsulation enabled

15

Refer to the exhibit A networking company technician conducts testing on a prototype to verify that the

proposed network design meets connectivity requirements Which command and its associated output will

provide evidence that inter-VLAN routing is implemented correctly and that all users have full connectivity to

each other

Showing 1 of 4 ltPrev

Page 1

Nextgt

Close Window

All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks

Close Window

Assessment System

1 Assessment Selection

2 Assessment Settings

3 Take Assessment

Take Assessment - DCompNtwk Final - CCNA Discovery Designing and Supporting

Computer Networks (Version 40)

Time Remaining

16 During prototype testing the network designer performs a test to determine the ability of the network to store

device configurations and statistics on local databases Which design goal is validated if the test is a success

security

scalability

availability

manageability

17 Which IOS component can be used for classification and protocol discovery of network traffic and applications

in use

CDP

NBAR

ACL logging

Network Assistant

18 Which WLAN operational feature can be configured as non-broadcast in order to increase the security of an

enterprise WLAN for employees

SSID

WEP keys

VLAN parameters

WPA encryption keys

VPN authentication information

19

Refer to the exhibit A network administrator is validating the routing for the new network design Which

command should be used to configure the s000 interface of the SALES router to advertise the Sales

Department networks as one route

SALES(config-if) ip summary-address eigrp 100 1721600 25525500

SALES(config-if) ip summary-address eigrp 100 1721680 2552552400

SALES(config-if) ip summary-address eigrp 100 17216160 2552552400

SALES(config-if) ip summary-address eigrp 100 17216310 2552552480

20

Refer to the exhibit A pre-sales systems engineer receives a diagram of the exhibited WAN implementation

from a customer EIGRP is the routing protocol that is used on the WAN None of the parameters for EIGRP

metric calculation have been modified in any router configurations Which statement is true about the routing

table on router RM

There is a single route to the 19216824024 LAN using the T1 connection

There is a single route to the 19216824024 LAN using the DSL connection

There is a single route to the 19216824024 LAN using the Metro Ethernet connection

EIGRP installs all three routes to the 19216824024 LAN and load balances the traffic

21

Refer to the exhibit Which set of commands will meet the security requirements that are shown

22 What is one advantage of a full mesh topology at the core layer of the enterprise network compared with a

partial mesh topology

It adds scalability to the corporate network

It provides fully redundant links to connecting modules

It lowers the impact and risk of DoS attacks from the Internet

It increases the manageability of the network devices in the core layer

23 What are two disadvantages to using simulation software such as Packet Tracer to validate a network design

(Choose two)

unrealistic performance

little control over network operation

inability to create large or complex networks

inability to simulate all required network conditions

lack of flexibility to support different devices and connectivity options

24 During a review of the proposed bill of materials an account manager of the network solution company realizes

that the systems engineer included a switch with lower cost and reduced capabilities for the access layer than

was originally specified by the network designer When questioned the systems engineer responds that the

switches specified by the designer cannot be purchased within the budget limitations of the customer Which

action should the account manager take

Inform the customer that the project budget must be increased

Inform the customer that the project cannot be completed given the unreasonable budget constraints

Communicate any risks that are associated with the equipment substitution and obtain customer approval to

proceed

Because the customer is probably aware that the budget limitations will require lower cost less capable

equipment the account manager should do nothing

25

Refer to the exhibit What can the field engineer conclude about the EIGRP authentication between Router1 and

Router2

Authentication will fail because only one key is configured

Authentication will succeed and EIGRP updates can be exchanged

Authentication will fail because the key chain names do not match

Authentication will fail because the key chain names must match the router names

26 A network designer must select a routing protocol for the network of a customer The currently installed network

contains both Cisco and non-Cisco routers and there is no budget to replace them The designer plans on

implementing both VLSM and route summarization in the new network design Which two protocols can

provide the necessary functionality for this LAN (Choose two)

RTP

RSTP

RIPv1

RIPv2

EIGRP

OSPF

27 A company offers online ordering of its products The web service is provided by a primary web server that

synchronizes with a backup server A network designer recommends adding a load balancing unit and installing

additional web servers so that the online ordering traffic can be equally distributed among four web servers

What network design risk is addressed with this recommendation

limited bandwidth

possible bottleneck

single point of failure

large failure domains

28

Refer to the exhibit A network administrator configures two routers to test the WAN connection The serial

connection requires PPP encapsulation and authentication with CHAP However the connection cannot be

established According to the partial output of the show running-config command what is the cause of the

problem

The password should be all lowercase

The password should contain fewer than 8 characters

The usernames must be the same as the sending router hostnames

The usernames must be the same as the destination router hostnames

29 In order for the IT staff of a company to understand the basic operation of VPNs which two features or

technologies must the network designer identify as training needs (Choose two)

IPv6 tunneling

QoS operation

tunneling protocols

VLAN configuration

encryption algorithms

30 What is a function of software queuing

filters traffic on the basis of administrator defined rules

stores received traffic and sends packets based on the order that the packets are received

sends packets on the basis of priorities that are manually set

transmits packets in a priority sequence that is based on source port

Showing 2 of 4 ltPrev

Page 2

Nextgt

Close Window

All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks

Close Window

Assessment System

1 Assessment Selection

2 Assessment Settings

3 Take Assessment

Take Assessment - DCompNtwk Final - CCNA Discovery Designing and Supporting

Computer Networks (Version 40)

Time Remaining

46 What makes the Cisco EasyVPN application a useful tool for VPN implementation

It provides encryption algorithms unavailable in other systems

It ensures that remote workers actually use the VPN for connectivity

It simplifies the configuration tasks for the device that is used as the VPN server

It allows a greater variety of network devices to be used for VPN connections

47

Refer to the exhibit A customer has a problem with connectivity in the network Based on the IP addressing

scheme what is causing the problem

The WAN link that connects R1 to R3 has an incorrect mask

The WAN links need IP addresses from a different major network

The WAN link that connects R1 to R2 overlaps with the R3 LAN

The IP addressing in R1 LAN is incorrect because subnet zero cannot be used with VLSM

48 Which technical requirement is satisfied when providing QoS for delay sensitive applications

availability

manageability

scalability

security

49 Which statement best describes the VPN feature called split tunneling

It creates separate pathways for different VLANs

It creates two tunnels one for user traffic and one for management traffic such as CDP and SNMP

It allows user traffic that is destined for the corporate network to travel across the VPN tunnel while traffic

destined for the Internet travels through the local LAN of the VPN client

It allows separate tunnels so that high priority traffic such as voice and video uses the higher bandwidth

tunnel while all other user traffic travels on the lower bandwidth tunnel

50 As part of network monitoring a network administrator receives an alert that the CPU usage of the core router

reaches 90 several times a day Which protocol is in use to monitor the network performance

DNS

SNMP

SMTP

DHCP

TFTP

51 The main office of a NetworkingCompany customer currently connects to three branch offices via three separate

point-to-point T1 circuits The customer network uses RIPv2 as the routing protocol within both the LAN and

the WAN The account manager proposes a change to a Frame Relay network because the costs are lower A

single local loop connection can be installed at the main office with three separate PVCs to connect the branch

offices How can the main office edge router be configured to enable the customer to continue to use RIP as the

WAN routing protocol

Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote

routers

To prevent the Frame Relay network from causing a routing loop disable split horizon on the serial

interface

Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP

address to each one

Configure the serial interface with a single interface DLCI number and create frame-relay map statements

for each remote site address

52 Which command can be used to load a new Cisco IOS image on a router

copy startup-config tftp

copy tftp startup-config

copy running-config tftp

copy tftp flash

copy flash tftp

copy flash startup-config

Showing 4 of 4 ltPrev

Page 4

Nextgt

Close Window

All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks

s

Page 4: Close Window

Refer to the exhibit During a test of an EIGRP prototype network a network administrator issues a show ip

protocols command What two facts can be determined from the output (Choose two)

The administrative distance is 100

This router has one adjacent neighbor

There are 10 Cisco devices in this prototype network

The auto-summary command was applied on this router

EIGRP is using two values for the calculation of the composite metric

EIGRP on this router will display up to four unequal cost routes to the same destination

12 Which two pieces of information are needed before an IOS image may be loaded on a router from a TFTP

server (Choose two)

the IP address of the TFTP server

the current name of the IOS image on the router

the operating system of the TFTP server

the name of the configuration file in NVRAM

the name of the IOS image on the TFTP server

encapsulation of the router interface that is connected to the TFTP server

13 Which two values represent valid IPv6 addresses (Choose two)

1

FF011

00000001

2001DB8472A4

2031000004AC3400FFE30

14 A network administrator has configured Frame Relay on a serial interface and issued the show interfaces serial

command The output shows that the interface is up and the line protocol is up However pings to the remote

router across the link fail What should the next step be to ensure that the IP address of the remote router appears

in the Frame Relay map table of the local router

Configure the router using the no inverse-arp command

Ensure that the LMI type is correct for the circuit

Configure the router using the frame-relay map ip command

Verify that the remote router has Frame Relay encapsulation enabled

15

Refer to the exhibit A networking company technician conducts testing on a prototype to verify that the

proposed network design meets connectivity requirements Which command and its associated output will

provide evidence that inter-VLAN routing is implemented correctly and that all users have full connectivity to

each other

Showing 1 of 4 ltPrev

Page 1

Nextgt

Close Window

All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks

Close Window

Assessment System

1 Assessment Selection

2 Assessment Settings

3 Take Assessment

Take Assessment - DCompNtwk Final - CCNA Discovery Designing and Supporting

Computer Networks (Version 40)

Time Remaining

16 During prototype testing the network designer performs a test to determine the ability of the network to store

device configurations and statistics on local databases Which design goal is validated if the test is a success

security

scalability

availability

manageability

17 Which IOS component can be used for classification and protocol discovery of network traffic and applications

in use

CDP

NBAR

ACL logging

Network Assistant

18 Which WLAN operational feature can be configured as non-broadcast in order to increase the security of an

enterprise WLAN for employees

SSID

WEP keys

VLAN parameters

WPA encryption keys

VPN authentication information

19

Refer to the exhibit A network administrator is validating the routing for the new network design Which

command should be used to configure the s000 interface of the SALES router to advertise the Sales

Department networks as one route

SALES(config-if) ip summary-address eigrp 100 1721600 25525500

SALES(config-if) ip summary-address eigrp 100 1721680 2552552400

SALES(config-if) ip summary-address eigrp 100 17216160 2552552400

SALES(config-if) ip summary-address eigrp 100 17216310 2552552480

20

Refer to the exhibit A pre-sales systems engineer receives a diagram of the exhibited WAN implementation

from a customer EIGRP is the routing protocol that is used on the WAN None of the parameters for EIGRP

metric calculation have been modified in any router configurations Which statement is true about the routing

table on router RM

There is a single route to the 19216824024 LAN using the T1 connection

There is a single route to the 19216824024 LAN using the DSL connection

There is a single route to the 19216824024 LAN using the Metro Ethernet connection

EIGRP installs all three routes to the 19216824024 LAN and load balances the traffic

21

Refer to the exhibit Which set of commands will meet the security requirements that are shown

22 What is one advantage of a full mesh topology at the core layer of the enterprise network compared with a

partial mesh topology

It adds scalability to the corporate network

It provides fully redundant links to connecting modules

It lowers the impact and risk of DoS attacks from the Internet

It increases the manageability of the network devices in the core layer

23 What are two disadvantages to using simulation software such as Packet Tracer to validate a network design

(Choose two)

unrealistic performance

little control over network operation

inability to create large or complex networks

inability to simulate all required network conditions

lack of flexibility to support different devices and connectivity options

24 During a review of the proposed bill of materials an account manager of the network solution company realizes

that the systems engineer included a switch with lower cost and reduced capabilities for the access layer than

was originally specified by the network designer When questioned the systems engineer responds that the

switches specified by the designer cannot be purchased within the budget limitations of the customer Which

action should the account manager take

Inform the customer that the project budget must be increased

Inform the customer that the project cannot be completed given the unreasonable budget constraints

Communicate any risks that are associated with the equipment substitution and obtain customer approval to

proceed

Because the customer is probably aware that the budget limitations will require lower cost less capable

equipment the account manager should do nothing

25

Refer to the exhibit What can the field engineer conclude about the EIGRP authentication between Router1 and

Router2

Authentication will fail because only one key is configured

Authentication will succeed and EIGRP updates can be exchanged

Authentication will fail because the key chain names do not match

Authentication will fail because the key chain names must match the router names

26 A network designer must select a routing protocol for the network of a customer The currently installed network

contains both Cisco and non-Cisco routers and there is no budget to replace them The designer plans on

implementing both VLSM and route summarization in the new network design Which two protocols can

provide the necessary functionality for this LAN (Choose two)

RTP

RSTP

RIPv1

RIPv2

EIGRP

OSPF

27 A company offers online ordering of its products The web service is provided by a primary web server that

synchronizes with a backup server A network designer recommends adding a load balancing unit and installing

additional web servers so that the online ordering traffic can be equally distributed among four web servers

What network design risk is addressed with this recommendation

limited bandwidth

possible bottleneck

single point of failure

large failure domains

28

Refer to the exhibit A network administrator configures two routers to test the WAN connection The serial

connection requires PPP encapsulation and authentication with CHAP However the connection cannot be

established According to the partial output of the show running-config command what is the cause of the

problem

The password should be all lowercase

The password should contain fewer than 8 characters

The usernames must be the same as the sending router hostnames

The usernames must be the same as the destination router hostnames

29 In order for the IT staff of a company to understand the basic operation of VPNs which two features or

technologies must the network designer identify as training needs (Choose two)

IPv6 tunneling

QoS operation

tunneling protocols

VLAN configuration

encryption algorithms

30 What is a function of software queuing

filters traffic on the basis of administrator defined rules

stores received traffic and sends packets based on the order that the packets are received

sends packets on the basis of priorities that are manually set

transmits packets in a priority sequence that is based on source port

Showing 2 of 4 ltPrev

Page 2

Nextgt

Close Window

All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks

Close Window

Assessment System

1 Assessment Selection

2 Assessment Settings

3 Take Assessment

Take Assessment - DCompNtwk Final - CCNA Discovery Designing and Supporting

Computer Networks (Version 40)

Time Remaining

46 What makes the Cisco EasyVPN application a useful tool for VPN implementation

It provides encryption algorithms unavailable in other systems

It ensures that remote workers actually use the VPN for connectivity

It simplifies the configuration tasks for the device that is used as the VPN server

It allows a greater variety of network devices to be used for VPN connections

47

Refer to the exhibit A customer has a problem with connectivity in the network Based on the IP addressing

scheme what is causing the problem

The WAN link that connects R1 to R3 has an incorrect mask

The WAN links need IP addresses from a different major network

The WAN link that connects R1 to R2 overlaps with the R3 LAN

The IP addressing in R1 LAN is incorrect because subnet zero cannot be used with VLSM

48 Which technical requirement is satisfied when providing QoS for delay sensitive applications

availability

manageability

scalability

security

49 Which statement best describes the VPN feature called split tunneling

It creates separate pathways for different VLANs

It creates two tunnels one for user traffic and one for management traffic such as CDP and SNMP

It allows user traffic that is destined for the corporate network to travel across the VPN tunnel while traffic

destined for the Internet travels through the local LAN of the VPN client

It allows separate tunnels so that high priority traffic such as voice and video uses the higher bandwidth

tunnel while all other user traffic travels on the lower bandwidth tunnel

50 As part of network monitoring a network administrator receives an alert that the CPU usage of the core router

reaches 90 several times a day Which protocol is in use to monitor the network performance

DNS

SNMP

SMTP

DHCP

TFTP

51 The main office of a NetworkingCompany customer currently connects to three branch offices via three separate

point-to-point T1 circuits The customer network uses RIPv2 as the routing protocol within both the LAN and

the WAN The account manager proposes a change to a Frame Relay network because the costs are lower A

single local loop connection can be installed at the main office with three separate PVCs to connect the branch

offices How can the main office edge router be configured to enable the customer to continue to use RIP as the

WAN routing protocol

Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote

routers

To prevent the Frame Relay network from causing a routing loop disable split horizon on the serial

interface

Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP

address to each one

Configure the serial interface with a single interface DLCI number and create frame-relay map statements

for each remote site address

52 Which command can be used to load a new Cisco IOS image on a router

copy startup-config tftp

copy tftp startup-config

copy running-config tftp

copy tftp flash

copy flash tftp

copy flash startup-config

Showing 4 of 4 ltPrev

Page 4

Nextgt

Close Window

All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks

s

Page 5: Close Window

2001DB8472A4

2031000004AC3400FFE30

14 A network administrator has configured Frame Relay on a serial interface and issued the show interfaces serial

command The output shows that the interface is up and the line protocol is up However pings to the remote

router across the link fail What should the next step be to ensure that the IP address of the remote router appears

in the Frame Relay map table of the local router

Configure the router using the no inverse-arp command

Ensure that the LMI type is correct for the circuit

Configure the router using the frame-relay map ip command

Verify that the remote router has Frame Relay encapsulation enabled

15

Refer to the exhibit A networking company technician conducts testing on a prototype to verify that the

proposed network design meets connectivity requirements Which command and its associated output will

provide evidence that inter-VLAN routing is implemented correctly and that all users have full connectivity to

each other

Showing 1 of 4 ltPrev

Page 1

Nextgt

Close Window

All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks

Close Window

Assessment System

1 Assessment Selection

2 Assessment Settings

3 Take Assessment

Take Assessment - DCompNtwk Final - CCNA Discovery Designing and Supporting

Computer Networks (Version 40)

Time Remaining

16 During prototype testing the network designer performs a test to determine the ability of the network to store

device configurations and statistics on local databases Which design goal is validated if the test is a success

security

scalability

availability

manageability

17 Which IOS component can be used for classification and protocol discovery of network traffic and applications

in use

CDP

NBAR

ACL logging

Network Assistant

18 Which WLAN operational feature can be configured as non-broadcast in order to increase the security of an

enterprise WLAN for employees

SSID

WEP keys

VLAN parameters

WPA encryption keys

VPN authentication information

19

Refer to the exhibit A network administrator is validating the routing for the new network design Which

command should be used to configure the s000 interface of the SALES router to advertise the Sales

Department networks as one route

SALES(config-if) ip summary-address eigrp 100 1721600 25525500

SALES(config-if) ip summary-address eigrp 100 1721680 2552552400

SALES(config-if) ip summary-address eigrp 100 17216160 2552552400

SALES(config-if) ip summary-address eigrp 100 17216310 2552552480

20

Refer to the exhibit A pre-sales systems engineer receives a diagram of the exhibited WAN implementation

from a customer EIGRP is the routing protocol that is used on the WAN None of the parameters for EIGRP

metric calculation have been modified in any router configurations Which statement is true about the routing

table on router RM

There is a single route to the 19216824024 LAN using the T1 connection

There is a single route to the 19216824024 LAN using the DSL connection

There is a single route to the 19216824024 LAN using the Metro Ethernet connection

EIGRP installs all three routes to the 19216824024 LAN and load balances the traffic

21

Refer to the exhibit Which set of commands will meet the security requirements that are shown

22 What is one advantage of a full mesh topology at the core layer of the enterprise network compared with a

partial mesh topology

It adds scalability to the corporate network

It provides fully redundant links to connecting modules

It lowers the impact and risk of DoS attacks from the Internet

It increases the manageability of the network devices in the core layer

23 What are two disadvantages to using simulation software such as Packet Tracer to validate a network design

(Choose two)

unrealistic performance

little control over network operation

inability to create large or complex networks

inability to simulate all required network conditions

lack of flexibility to support different devices and connectivity options

24 During a review of the proposed bill of materials an account manager of the network solution company realizes

that the systems engineer included a switch with lower cost and reduced capabilities for the access layer than

was originally specified by the network designer When questioned the systems engineer responds that the

switches specified by the designer cannot be purchased within the budget limitations of the customer Which

action should the account manager take

Inform the customer that the project budget must be increased

Inform the customer that the project cannot be completed given the unreasonable budget constraints

Communicate any risks that are associated with the equipment substitution and obtain customer approval to

proceed

Because the customer is probably aware that the budget limitations will require lower cost less capable

equipment the account manager should do nothing

25

Refer to the exhibit What can the field engineer conclude about the EIGRP authentication between Router1 and

Router2

Authentication will fail because only one key is configured

Authentication will succeed and EIGRP updates can be exchanged

Authentication will fail because the key chain names do not match

Authentication will fail because the key chain names must match the router names

26 A network designer must select a routing protocol for the network of a customer The currently installed network

contains both Cisco and non-Cisco routers and there is no budget to replace them The designer plans on

implementing both VLSM and route summarization in the new network design Which two protocols can

provide the necessary functionality for this LAN (Choose two)

RTP

RSTP

RIPv1

RIPv2

EIGRP

OSPF

27 A company offers online ordering of its products The web service is provided by a primary web server that

synchronizes with a backup server A network designer recommends adding a load balancing unit and installing

additional web servers so that the online ordering traffic can be equally distributed among four web servers

What network design risk is addressed with this recommendation

limited bandwidth

possible bottleneck

single point of failure

large failure domains

28

Refer to the exhibit A network administrator configures two routers to test the WAN connection The serial

connection requires PPP encapsulation and authentication with CHAP However the connection cannot be

established According to the partial output of the show running-config command what is the cause of the

problem

The password should be all lowercase

The password should contain fewer than 8 characters

The usernames must be the same as the sending router hostnames

The usernames must be the same as the destination router hostnames

29 In order for the IT staff of a company to understand the basic operation of VPNs which two features or

technologies must the network designer identify as training needs (Choose two)

IPv6 tunneling

QoS operation

tunneling protocols

VLAN configuration

encryption algorithms

30 What is a function of software queuing

filters traffic on the basis of administrator defined rules

stores received traffic and sends packets based on the order that the packets are received

sends packets on the basis of priorities that are manually set

transmits packets in a priority sequence that is based on source port

Showing 2 of 4 ltPrev

Page 2

Nextgt

Close Window

All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks

Close Window

Assessment System

1 Assessment Selection

2 Assessment Settings

3 Take Assessment

Take Assessment - DCompNtwk Final - CCNA Discovery Designing and Supporting

Computer Networks (Version 40)

Time Remaining

46 What makes the Cisco EasyVPN application a useful tool for VPN implementation

It provides encryption algorithms unavailable in other systems

It ensures that remote workers actually use the VPN for connectivity

It simplifies the configuration tasks for the device that is used as the VPN server

It allows a greater variety of network devices to be used for VPN connections

47

Refer to the exhibit A customer has a problem with connectivity in the network Based on the IP addressing

scheme what is causing the problem

The WAN link that connects R1 to R3 has an incorrect mask

The WAN links need IP addresses from a different major network

The WAN link that connects R1 to R2 overlaps with the R3 LAN

The IP addressing in R1 LAN is incorrect because subnet zero cannot be used with VLSM

48 Which technical requirement is satisfied when providing QoS for delay sensitive applications

availability

manageability

scalability

security

49 Which statement best describes the VPN feature called split tunneling

It creates separate pathways for different VLANs

It creates two tunnels one for user traffic and one for management traffic such as CDP and SNMP

It allows user traffic that is destined for the corporate network to travel across the VPN tunnel while traffic

destined for the Internet travels through the local LAN of the VPN client

It allows separate tunnels so that high priority traffic such as voice and video uses the higher bandwidth

tunnel while all other user traffic travels on the lower bandwidth tunnel

50 As part of network monitoring a network administrator receives an alert that the CPU usage of the core router

reaches 90 several times a day Which protocol is in use to monitor the network performance

DNS

SNMP

SMTP

DHCP

TFTP

51 The main office of a NetworkingCompany customer currently connects to three branch offices via three separate

point-to-point T1 circuits The customer network uses RIPv2 as the routing protocol within both the LAN and

the WAN The account manager proposes a change to a Frame Relay network because the costs are lower A

single local loop connection can be installed at the main office with three separate PVCs to connect the branch

offices How can the main office edge router be configured to enable the customer to continue to use RIP as the

WAN routing protocol

Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote

routers

To prevent the Frame Relay network from causing a routing loop disable split horizon on the serial

interface

Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP

address to each one

Configure the serial interface with a single interface DLCI number and create frame-relay map statements

for each remote site address

52 Which command can be used to load a new Cisco IOS image on a router

copy startup-config tftp

copy tftp startup-config

copy running-config tftp

copy tftp flash

copy flash tftp

copy flash startup-config

Showing 4 of 4 ltPrev

Page 4

Nextgt

Close Window

All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks

s

Page 6: Close Window

Showing 1 of 4 ltPrev

Page 1

Nextgt

Close Window

All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks

Close Window

Assessment System

1 Assessment Selection

2 Assessment Settings

3 Take Assessment

Take Assessment - DCompNtwk Final - CCNA Discovery Designing and Supporting

Computer Networks (Version 40)

Time Remaining

16 During prototype testing the network designer performs a test to determine the ability of the network to store

device configurations and statistics on local databases Which design goal is validated if the test is a success

security

scalability

availability

manageability

17 Which IOS component can be used for classification and protocol discovery of network traffic and applications

in use

CDP

NBAR

ACL logging

Network Assistant

18 Which WLAN operational feature can be configured as non-broadcast in order to increase the security of an

enterprise WLAN for employees

SSID

WEP keys

VLAN parameters

WPA encryption keys

VPN authentication information

19

Refer to the exhibit A network administrator is validating the routing for the new network design Which

command should be used to configure the s000 interface of the SALES router to advertise the Sales

Department networks as one route

SALES(config-if) ip summary-address eigrp 100 1721600 25525500

SALES(config-if) ip summary-address eigrp 100 1721680 2552552400

SALES(config-if) ip summary-address eigrp 100 17216160 2552552400

SALES(config-if) ip summary-address eigrp 100 17216310 2552552480

20

Refer to the exhibit A pre-sales systems engineer receives a diagram of the exhibited WAN implementation

from a customer EIGRP is the routing protocol that is used on the WAN None of the parameters for EIGRP

metric calculation have been modified in any router configurations Which statement is true about the routing

table on router RM

There is a single route to the 19216824024 LAN using the T1 connection

There is a single route to the 19216824024 LAN using the DSL connection

There is a single route to the 19216824024 LAN using the Metro Ethernet connection

EIGRP installs all three routes to the 19216824024 LAN and load balances the traffic

21

Refer to the exhibit Which set of commands will meet the security requirements that are shown

22 What is one advantage of a full mesh topology at the core layer of the enterprise network compared with a

partial mesh topology

It adds scalability to the corporate network

It provides fully redundant links to connecting modules

It lowers the impact and risk of DoS attacks from the Internet

It increases the manageability of the network devices in the core layer

23 What are two disadvantages to using simulation software such as Packet Tracer to validate a network design

(Choose two)

unrealistic performance

little control over network operation

inability to create large or complex networks

inability to simulate all required network conditions

lack of flexibility to support different devices and connectivity options

24 During a review of the proposed bill of materials an account manager of the network solution company realizes

that the systems engineer included a switch with lower cost and reduced capabilities for the access layer than

was originally specified by the network designer When questioned the systems engineer responds that the

switches specified by the designer cannot be purchased within the budget limitations of the customer Which

action should the account manager take

Inform the customer that the project budget must be increased

Inform the customer that the project cannot be completed given the unreasonable budget constraints

Communicate any risks that are associated with the equipment substitution and obtain customer approval to

proceed

Because the customer is probably aware that the budget limitations will require lower cost less capable

equipment the account manager should do nothing

25

Refer to the exhibit What can the field engineer conclude about the EIGRP authentication between Router1 and

Router2

Authentication will fail because only one key is configured

Authentication will succeed and EIGRP updates can be exchanged

Authentication will fail because the key chain names do not match

Authentication will fail because the key chain names must match the router names

26 A network designer must select a routing protocol for the network of a customer The currently installed network

contains both Cisco and non-Cisco routers and there is no budget to replace them The designer plans on

implementing both VLSM and route summarization in the new network design Which two protocols can

provide the necessary functionality for this LAN (Choose two)

RTP

RSTP

RIPv1

RIPv2

EIGRP

OSPF

27 A company offers online ordering of its products The web service is provided by a primary web server that

synchronizes with a backup server A network designer recommends adding a load balancing unit and installing

additional web servers so that the online ordering traffic can be equally distributed among four web servers

What network design risk is addressed with this recommendation

limited bandwidth

possible bottleneck

single point of failure

large failure domains

28

Refer to the exhibit A network administrator configures two routers to test the WAN connection The serial

connection requires PPP encapsulation and authentication with CHAP However the connection cannot be

established According to the partial output of the show running-config command what is the cause of the

problem

The password should be all lowercase

The password should contain fewer than 8 characters

The usernames must be the same as the sending router hostnames

The usernames must be the same as the destination router hostnames

29 In order for the IT staff of a company to understand the basic operation of VPNs which two features or

technologies must the network designer identify as training needs (Choose two)

IPv6 tunneling

QoS operation

tunneling protocols

VLAN configuration

encryption algorithms

30 What is a function of software queuing

filters traffic on the basis of administrator defined rules

stores received traffic and sends packets based on the order that the packets are received

sends packets on the basis of priorities that are manually set

transmits packets in a priority sequence that is based on source port

Showing 2 of 4 ltPrev

Page 2

Nextgt

Close Window

All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks

Close Window

Assessment System

1 Assessment Selection

2 Assessment Settings

3 Take Assessment

Take Assessment - DCompNtwk Final - CCNA Discovery Designing and Supporting

Computer Networks (Version 40)

Time Remaining

46 What makes the Cisco EasyVPN application a useful tool for VPN implementation

It provides encryption algorithms unavailable in other systems

It ensures that remote workers actually use the VPN for connectivity

It simplifies the configuration tasks for the device that is used as the VPN server

It allows a greater variety of network devices to be used for VPN connections

47

Refer to the exhibit A customer has a problem with connectivity in the network Based on the IP addressing

scheme what is causing the problem

The WAN link that connects R1 to R3 has an incorrect mask

The WAN links need IP addresses from a different major network

The WAN link that connects R1 to R2 overlaps with the R3 LAN

The IP addressing in R1 LAN is incorrect because subnet zero cannot be used with VLSM

48 Which technical requirement is satisfied when providing QoS for delay sensitive applications

availability

manageability

scalability

security

49 Which statement best describes the VPN feature called split tunneling

It creates separate pathways for different VLANs

It creates two tunnels one for user traffic and one for management traffic such as CDP and SNMP

It allows user traffic that is destined for the corporate network to travel across the VPN tunnel while traffic

destined for the Internet travels through the local LAN of the VPN client

It allows separate tunnels so that high priority traffic such as voice and video uses the higher bandwidth

tunnel while all other user traffic travels on the lower bandwidth tunnel

50 As part of network monitoring a network administrator receives an alert that the CPU usage of the core router

reaches 90 several times a day Which protocol is in use to monitor the network performance

DNS

SNMP

SMTP

DHCP

TFTP

51 The main office of a NetworkingCompany customer currently connects to three branch offices via three separate

point-to-point T1 circuits The customer network uses RIPv2 as the routing protocol within both the LAN and

the WAN The account manager proposes a change to a Frame Relay network because the costs are lower A

single local loop connection can be installed at the main office with three separate PVCs to connect the branch

offices How can the main office edge router be configured to enable the customer to continue to use RIP as the

WAN routing protocol

Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote

routers

To prevent the Frame Relay network from causing a routing loop disable split horizon on the serial

interface

Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP

address to each one

Configure the serial interface with a single interface DLCI number and create frame-relay map statements

for each remote site address

52 Which command can be used to load a new Cisco IOS image on a router

copy startup-config tftp

copy tftp startup-config

copy running-config tftp

copy tftp flash

copy flash tftp

copy flash startup-config

Showing 4 of 4 ltPrev

Page 4

Nextgt

Close Window

All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks

s

Page 7: Close Window

Close Window

Assessment System

1 Assessment Selection

2 Assessment Settings

3 Take Assessment

Take Assessment - DCompNtwk Final - CCNA Discovery Designing and Supporting

Computer Networks (Version 40)

Time Remaining

16 During prototype testing the network designer performs a test to determine the ability of the network to store

device configurations and statistics on local databases Which design goal is validated if the test is a success

security

scalability

availability

manageability

17 Which IOS component can be used for classification and protocol discovery of network traffic and applications

in use

CDP

NBAR

ACL logging

Network Assistant

18 Which WLAN operational feature can be configured as non-broadcast in order to increase the security of an

enterprise WLAN for employees

SSID

WEP keys

VLAN parameters

WPA encryption keys

VPN authentication information

19

Refer to the exhibit A network administrator is validating the routing for the new network design Which

command should be used to configure the s000 interface of the SALES router to advertise the Sales

Department networks as one route

SALES(config-if) ip summary-address eigrp 100 1721600 25525500

SALES(config-if) ip summary-address eigrp 100 1721680 2552552400

SALES(config-if) ip summary-address eigrp 100 17216160 2552552400

SALES(config-if) ip summary-address eigrp 100 17216310 2552552480

20

Refer to the exhibit A pre-sales systems engineer receives a diagram of the exhibited WAN implementation

from a customer EIGRP is the routing protocol that is used on the WAN None of the parameters for EIGRP

metric calculation have been modified in any router configurations Which statement is true about the routing

table on router RM

There is a single route to the 19216824024 LAN using the T1 connection

There is a single route to the 19216824024 LAN using the DSL connection

There is a single route to the 19216824024 LAN using the Metro Ethernet connection

EIGRP installs all three routes to the 19216824024 LAN and load balances the traffic

21

Refer to the exhibit Which set of commands will meet the security requirements that are shown

22 What is one advantage of a full mesh topology at the core layer of the enterprise network compared with a

partial mesh topology

It adds scalability to the corporate network

It provides fully redundant links to connecting modules

It lowers the impact and risk of DoS attacks from the Internet

It increases the manageability of the network devices in the core layer

23 What are two disadvantages to using simulation software such as Packet Tracer to validate a network design

(Choose two)

unrealistic performance

little control over network operation

inability to create large or complex networks

inability to simulate all required network conditions

lack of flexibility to support different devices and connectivity options

24 During a review of the proposed bill of materials an account manager of the network solution company realizes

that the systems engineer included a switch with lower cost and reduced capabilities for the access layer than

was originally specified by the network designer When questioned the systems engineer responds that the

switches specified by the designer cannot be purchased within the budget limitations of the customer Which

action should the account manager take

Inform the customer that the project budget must be increased

Inform the customer that the project cannot be completed given the unreasonable budget constraints

Communicate any risks that are associated with the equipment substitution and obtain customer approval to

proceed

Because the customer is probably aware that the budget limitations will require lower cost less capable

equipment the account manager should do nothing

25

Refer to the exhibit What can the field engineer conclude about the EIGRP authentication between Router1 and

Router2

Authentication will fail because only one key is configured

Authentication will succeed and EIGRP updates can be exchanged

Authentication will fail because the key chain names do not match

Authentication will fail because the key chain names must match the router names

26 A network designer must select a routing protocol for the network of a customer The currently installed network

contains both Cisco and non-Cisco routers and there is no budget to replace them The designer plans on

implementing both VLSM and route summarization in the new network design Which two protocols can

provide the necessary functionality for this LAN (Choose two)

RTP

RSTP

RIPv1

RIPv2

EIGRP

OSPF

27 A company offers online ordering of its products The web service is provided by a primary web server that

synchronizes with a backup server A network designer recommends adding a load balancing unit and installing

additional web servers so that the online ordering traffic can be equally distributed among four web servers

What network design risk is addressed with this recommendation

limited bandwidth

possible bottleneck

single point of failure

large failure domains

28

Refer to the exhibit A network administrator configures two routers to test the WAN connection The serial

connection requires PPP encapsulation and authentication with CHAP However the connection cannot be

established According to the partial output of the show running-config command what is the cause of the

problem

The password should be all lowercase

The password should contain fewer than 8 characters

The usernames must be the same as the sending router hostnames

The usernames must be the same as the destination router hostnames

29 In order for the IT staff of a company to understand the basic operation of VPNs which two features or

technologies must the network designer identify as training needs (Choose two)

IPv6 tunneling

QoS operation

tunneling protocols

VLAN configuration

encryption algorithms

30 What is a function of software queuing

filters traffic on the basis of administrator defined rules

stores received traffic and sends packets based on the order that the packets are received

sends packets on the basis of priorities that are manually set

transmits packets in a priority sequence that is based on source port

Showing 2 of 4 ltPrev

Page 2

Nextgt

Close Window

All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks

Close Window

Assessment System

1 Assessment Selection

2 Assessment Settings

3 Take Assessment

Take Assessment - DCompNtwk Final - CCNA Discovery Designing and Supporting

Computer Networks (Version 40)

Time Remaining

46 What makes the Cisco EasyVPN application a useful tool for VPN implementation

It provides encryption algorithms unavailable in other systems

It ensures that remote workers actually use the VPN for connectivity

It simplifies the configuration tasks for the device that is used as the VPN server

It allows a greater variety of network devices to be used for VPN connections

47

Refer to the exhibit A customer has a problem with connectivity in the network Based on the IP addressing

scheme what is causing the problem

The WAN link that connects R1 to R3 has an incorrect mask

The WAN links need IP addresses from a different major network

The WAN link that connects R1 to R2 overlaps with the R3 LAN

The IP addressing in R1 LAN is incorrect because subnet zero cannot be used with VLSM

48 Which technical requirement is satisfied when providing QoS for delay sensitive applications

availability

manageability

scalability

security

49 Which statement best describes the VPN feature called split tunneling

It creates separate pathways for different VLANs

It creates two tunnels one for user traffic and one for management traffic such as CDP and SNMP

It allows user traffic that is destined for the corporate network to travel across the VPN tunnel while traffic

destined for the Internet travels through the local LAN of the VPN client

It allows separate tunnels so that high priority traffic such as voice and video uses the higher bandwidth

tunnel while all other user traffic travels on the lower bandwidth tunnel

50 As part of network monitoring a network administrator receives an alert that the CPU usage of the core router

reaches 90 several times a day Which protocol is in use to monitor the network performance

DNS

SNMP

SMTP

DHCP

TFTP

51 The main office of a NetworkingCompany customer currently connects to three branch offices via three separate

point-to-point T1 circuits The customer network uses RIPv2 as the routing protocol within both the LAN and

the WAN The account manager proposes a change to a Frame Relay network because the costs are lower A

single local loop connection can be installed at the main office with three separate PVCs to connect the branch

offices How can the main office edge router be configured to enable the customer to continue to use RIP as the

WAN routing protocol

Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote

routers

To prevent the Frame Relay network from causing a routing loop disable split horizon on the serial

interface

Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP

address to each one

Configure the serial interface with a single interface DLCI number and create frame-relay map statements

for each remote site address

52 Which command can be used to load a new Cisco IOS image on a router

copy startup-config tftp

copy tftp startup-config

copy running-config tftp

copy tftp flash

copy flash tftp

copy flash startup-config

Showing 4 of 4 ltPrev

Page 4

Nextgt

Close Window

All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks

s

Page 8: Close Window

Refer to the exhibit A network administrator is validating the routing for the new network design Which

command should be used to configure the s000 interface of the SALES router to advertise the Sales

Department networks as one route

SALES(config-if) ip summary-address eigrp 100 1721600 25525500

SALES(config-if) ip summary-address eigrp 100 1721680 2552552400

SALES(config-if) ip summary-address eigrp 100 17216160 2552552400

SALES(config-if) ip summary-address eigrp 100 17216310 2552552480

20

Refer to the exhibit A pre-sales systems engineer receives a diagram of the exhibited WAN implementation

from a customer EIGRP is the routing protocol that is used on the WAN None of the parameters for EIGRP

metric calculation have been modified in any router configurations Which statement is true about the routing

table on router RM

There is a single route to the 19216824024 LAN using the T1 connection

There is a single route to the 19216824024 LAN using the DSL connection

There is a single route to the 19216824024 LAN using the Metro Ethernet connection

EIGRP installs all three routes to the 19216824024 LAN and load balances the traffic

21

Refer to the exhibit Which set of commands will meet the security requirements that are shown

22 What is one advantage of a full mesh topology at the core layer of the enterprise network compared with a

partial mesh topology

It adds scalability to the corporate network

It provides fully redundant links to connecting modules

It lowers the impact and risk of DoS attacks from the Internet

It increases the manageability of the network devices in the core layer

23 What are two disadvantages to using simulation software such as Packet Tracer to validate a network design

(Choose two)

unrealistic performance

little control over network operation

inability to create large or complex networks

inability to simulate all required network conditions

lack of flexibility to support different devices and connectivity options

24 During a review of the proposed bill of materials an account manager of the network solution company realizes

that the systems engineer included a switch with lower cost and reduced capabilities for the access layer than

was originally specified by the network designer When questioned the systems engineer responds that the

switches specified by the designer cannot be purchased within the budget limitations of the customer Which

action should the account manager take

Inform the customer that the project budget must be increased

Inform the customer that the project cannot be completed given the unreasonable budget constraints

Communicate any risks that are associated with the equipment substitution and obtain customer approval to

proceed

Because the customer is probably aware that the budget limitations will require lower cost less capable

equipment the account manager should do nothing

25

Refer to the exhibit What can the field engineer conclude about the EIGRP authentication between Router1 and

Router2

Authentication will fail because only one key is configured

Authentication will succeed and EIGRP updates can be exchanged

Authentication will fail because the key chain names do not match

Authentication will fail because the key chain names must match the router names

26 A network designer must select a routing protocol for the network of a customer The currently installed network

contains both Cisco and non-Cisco routers and there is no budget to replace them The designer plans on

implementing both VLSM and route summarization in the new network design Which two protocols can

provide the necessary functionality for this LAN (Choose two)

RTP

RSTP

RIPv1

RIPv2

EIGRP

OSPF

27 A company offers online ordering of its products The web service is provided by a primary web server that

synchronizes with a backup server A network designer recommends adding a load balancing unit and installing

additional web servers so that the online ordering traffic can be equally distributed among four web servers

What network design risk is addressed with this recommendation

limited bandwidth

possible bottleneck

single point of failure

large failure domains

28

Refer to the exhibit A network administrator configures two routers to test the WAN connection The serial

connection requires PPP encapsulation and authentication with CHAP However the connection cannot be

established According to the partial output of the show running-config command what is the cause of the

problem

The password should be all lowercase

The password should contain fewer than 8 characters

The usernames must be the same as the sending router hostnames

The usernames must be the same as the destination router hostnames

29 In order for the IT staff of a company to understand the basic operation of VPNs which two features or

technologies must the network designer identify as training needs (Choose two)

IPv6 tunneling

QoS operation

tunneling protocols

VLAN configuration

encryption algorithms

30 What is a function of software queuing

filters traffic on the basis of administrator defined rules

stores received traffic and sends packets based on the order that the packets are received

sends packets on the basis of priorities that are manually set

transmits packets in a priority sequence that is based on source port

Showing 2 of 4 ltPrev

Page 2

Nextgt

Close Window

All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks

Close Window

Assessment System

1 Assessment Selection

2 Assessment Settings

3 Take Assessment

Take Assessment - DCompNtwk Final - CCNA Discovery Designing and Supporting

Computer Networks (Version 40)

Time Remaining

46 What makes the Cisco EasyVPN application a useful tool for VPN implementation

It provides encryption algorithms unavailable in other systems

It ensures that remote workers actually use the VPN for connectivity

It simplifies the configuration tasks for the device that is used as the VPN server

It allows a greater variety of network devices to be used for VPN connections

47

Refer to the exhibit A customer has a problem with connectivity in the network Based on the IP addressing

scheme what is causing the problem

The WAN link that connects R1 to R3 has an incorrect mask

The WAN links need IP addresses from a different major network

The WAN link that connects R1 to R2 overlaps with the R3 LAN

The IP addressing in R1 LAN is incorrect because subnet zero cannot be used with VLSM

48 Which technical requirement is satisfied when providing QoS for delay sensitive applications

availability

manageability

scalability

security

49 Which statement best describes the VPN feature called split tunneling

It creates separate pathways for different VLANs

It creates two tunnels one for user traffic and one for management traffic such as CDP and SNMP

It allows user traffic that is destined for the corporate network to travel across the VPN tunnel while traffic

destined for the Internet travels through the local LAN of the VPN client

It allows separate tunnels so that high priority traffic such as voice and video uses the higher bandwidth

tunnel while all other user traffic travels on the lower bandwidth tunnel

50 As part of network monitoring a network administrator receives an alert that the CPU usage of the core router

reaches 90 several times a day Which protocol is in use to monitor the network performance

DNS

SNMP

SMTP

DHCP

TFTP

51 The main office of a NetworkingCompany customer currently connects to three branch offices via three separate

point-to-point T1 circuits The customer network uses RIPv2 as the routing protocol within both the LAN and

the WAN The account manager proposes a change to a Frame Relay network because the costs are lower A

single local loop connection can be installed at the main office with three separate PVCs to connect the branch

offices How can the main office edge router be configured to enable the customer to continue to use RIP as the

WAN routing protocol

Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote

routers

To prevent the Frame Relay network from causing a routing loop disable split horizon on the serial

interface

Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP

address to each one

Configure the serial interface with a single interface DLCI number and create frame-relay map statements

for each remote site address

52 Which command can be used to load a new Cisco IOS image on a router

copy startup-config tftp

copy tftp startup-config

copy running-config tftp

copy tftp flash

copy flash tftp

copy flash startup-config

Showing 4 of 4 ltPrev

Page 4

Nextgt

Close Window

All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks

s

Page 9: Close Window

There is a single route to the 19216824024 LAN using the Metro Ethernet connection

EIGRP installs all three routes to the 19216824024 LAN and load balances the traffic

21

Refer to the exhibit Which set of commands will meet the security requirements that are shown

22 What is one advantage of a full mesh topology at the core layer of the enterprise network compared with a

partial mesh topology

It adds scalability to the corporate network

It provides fully redundant links to connecting modules

It lowers the impact and risk of DoS attacks from the Internet

It increases the manageability of the network devices in the core layer

23 What are two disadvantages to using simulation software such as Packet Tracer to validate a network design

(Choose two)

unrealistic performance

little control over network operation

inability to create large or complex networks

inability to simulate all required network conditions

lack of flexibility to support different devices and connectivity options

24 During a review of the proposed bill of materials an account manager of the network solution company realizes

that the systems engineer included a switch with lower cost and reduced capabilities for the access layer than

was originally specified by the network designer When questioned the systems engineer responds that the

switches specified by the designer cannot be purchased within the budget limitations of the customer Which

action should the account manager take

Inform the customer that the project budget must be increased

Inform the customer that the project cannot be completed given the unreasonable budget constraints

Communicate any risks that are associated with the equipment substitution and obtain customer approval to

proceed

Because the customer is probably aware that the budget limitations will require lower cost less capable

equipment the account manager should do nothing

25

Refer to the exhibit What can the field engineer conclude about the EIGRP authentication between Router1 and

Router2

Authentication will fail because only one key is configured

Authentication will succeed and EIGRP updates can be exchanged

Authentication will fail because the key chain names do not match

Authentication will fail because the key chain names must match the router names

26 A network designer must select a routing protocol for the network of a customer The currently installed network

contains both Cisco and non-Cisco routers and there is no budget to replace them The designer plans on

implementing both VLSM and route summarization in the new network design Which two protocols can

provide the necessary functionality for this LAN (Choose two)

RTP

RSTP

RIPv1

RIPv2

EIGRP

OSPF

27 A company offers online ordering of its products The web service is provided by a primary web server that

synchronizes with a backup server A network designer recommends adding a load balancing unit and installing

additional web servers so that the online ordering traffic can be equally distributed among four web servers

What network design risk is addressed with this recommendation

limited bandwidth

possible bottleneck

single point of failure

large failure domains

28

Refer to the exhibit A network administrator configures two routers to test the WAN connection The serial

connection requires PPP encapsulation and authentication with CHAP However the connection cannot be

established According to the partial output of the show running-config command what is the cause of the

problem

The password should be all lowercase

The password should contain fewer than 8 characters

The usernames must be the same as the sending router hostnames

The usernames must be the same as the destination router hostnames

29 In order for the IT staff of a company to understand the basic operation of VPNs which two features or

technologies must the network designer identify as training needs (Choose two)

IPv6 tunneling

QoS operation

tunneling protocols

VLAN configuration

encryption algorithms

30 What is a function of software queuing

filters traffic on the basis of administrator defined rules

stores received traffic and sends packets based on the order that the packets are received

sends packets on the basis of priorities that are manually set

transmits packets in a priority sequence that is based on source port

Showing 2 of 4 ltPrev

Page 2

Nextgt

Close Window

All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks

Close Window

Assessment System

1 Assessment Selection

2 Assessment Settings

3 Take Assessment

Take Assessment - DCompNtwk Final - CCNA Discovery Designing and Supporting

Computer Networks (Version 40)

Time Remaining

46 What makes the Cisco EasyVPN application a useful tool for VPN implementation

It provides encryption algorithms unavailable in other systems

It ensures that remote workers actually use the VPN for connectivity

It simplifies the configuration tasks for the device that is used as the VPN server

It allows a greater variety of network devices to be used for VPN connections

47

Refer to the exhibit A customer has a problem with connectivity in the network Based on the IP addressing

scheme what is causing the problem

The WAN link that connects R1 to R3 has an incorrect mask

The WAN links need IP addresses from a different major network

The WAN link that connects R1 to R2 overlaps with the R3 LAN

The IP addressing in R1 LAN is incorrect because subnet zero cannot be used with VLSM

48 Which technical requirement is satisfied when providing QoS for delay sensitive applications

availability

manageability

scalability

security

49 Which statement best describes the VPN feature called split tunneling

It creates separate pathways for different VLANs

It creates two tunnels one for user traffic and one for management traffic such as CDP and SNMP

It allows user traffic that is destined for the corporate network to travel across the VPN tunnel while traffic

destined for the Internet travels through the local LAN of the VPN client

It allows separate tunnels so that high priority traffic such as voice and video uses the higher bandwidth

tunnel while all other user traffic travels on the lower bandwidth tunnel

50 As part of network monitoring a network administrator receives an alert that the CPU usage of the core router

reaches 90 several times a day Which protocol is in use to monitor the network performance

DNS

SNMP

SMTP

DHCP

TFTP

51 The main office of a NetworkingCompany customer currently connects to three branch offices via three separate

point-to-point T1 circuits The customer network uses RIPv2 as the routing protocol within both the LAN and

the WAN The account manager proposes a change to a Frame Relay network because the costs are lower A

single local loop connection can be installed at the main office with three separate PVCs to connect the branch

offices How can the main office edge router be configured to enable the customer to continue to use RIP as the

WAN routing protocol

Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote

routers

To prevent the Frame Relay network from causing a routing loop disable split horizon on the serial

interface

Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP

address to each one

Configure the serial interface with a single interface DLCI number and create frame-relay map statements

for each remote site address

52 Which command can be used to load a new Cisco IOS image on a router

copy startup-config tftp

copy tftp startup-config

copy running-config tftp

copy tftp flash

copy flash tftp

copy flash startup-config

Showing 4 of 4 ltPrev

Page 4

Nextgt

Close Window

All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks

s

Page 10: Close Window

22 What is one advantage of a full mesh topology at the core layer of the enterprise network compared with a

partial mesh topology

It adds scalability to the corporate network

It provides fully redundant links to connecting modules

It lowers the impact and risk of DoS attacks from the Internet

It increases the manageability of the network devices in the core layer

23 What are two disadvantages to using simulation software such as Packet Tracer to validate a network design

(Choose two)

unrealistic performance

little control over network operation

inability to create large or complex networks

inability to simulate all required network conditions

lack of flexibility to support different devices and connectivity options

24 During a review of the proposed bill of materials an account manager of the network solution company realizes

that the systems engineer included a switch with lower cost and reduced capabilities for the access layer than

was originally specified by the network designer When questioned the systems engineer responds that the

switches specified by the designer cannot be purchased within the budget limitations of the customer Which

action should the account manager take

Inform the customer that the project budget must be increased

Inform the customer that the project cannot be completed given the unreasonable budget constraints

Communicate any risks that are associated with the equipment substitution and obtain customer approval to

proceed

Because the customer is probably aware that the budget limitations will require lower cost less capable

equipment the account manager should do nothing

25

Refer to the exhibit What can the field engineer conclude about the EIGRP authentication between Router1 and

Router2

Authentication will fail because only one key is configured

Authentication will succeed and EIGRP updates can be exchanged

Authentication will fail because the key chain names do not match

Authentication will fail because the key chain names must match the router names

26 A network designer must select a routing protocol for the network of a customer The currently installed network

contains both Cisco and non-Cisco routers and there is no budget to replace them The designer plans on

implementing both VLSM and route summarization in the new network design Which two protocols can

provide the necessary functionality for this LAN (Choose two)

RTP

RSTP

RIPv1

RIPv2

EIGRP

OSPF

27 A company offers online ordering of its products The web service is provided by a primary web server that

synchronizes with a backup server A network designer recommends adding a load balancing unit and installing

additional web servers so that the online ordering traffic can be equally distributed among four web servers

What network design risk is addressed with this recommendation

limited bandwidth

possible bottleneck

single point of failure

large failure domains

28

Refer to the exhibit A network administrator configures two routers to test the WAN connection The serial

connection requires PPP encapsulation and authentication with CHAP However the connection cannot be

established According to the partial output of the show running-config command what is the cause of the

problem

The password should be all lowercase

The password should contain fewer than 8 characters

The usernames must be the same as the sending router hostnames

The usernames must be the same as the destination router hostnames

29 In order for the IT staff of a company to understand the basic operation of VPNs which two features or

technologies must the network designer identify as training needs (Choose two)

IPv6 tunneling

QoS operation

tunneling protocols

VLAN configuration

encryption algorithms

30 What is a function of software queuing

filters traffic on the basis of administrator defined rules

stores received traffic and sends packets based on the order that the packets are received

sends packets on the basis of priorities that are manually set

transmits packets in a priority sequence that is based on source port

Showing 2 of 4 ltPrev

Page 2

Nextgt

Close Window

All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks

Close Window

Assessment System

1 Assessment Selection

2 Assessment Settings

3 Take Assessment

Take Assessment - DCompNtwk Final - CCNA Discovery Designing and Supporting

Computer Networks (Version 40)

Time Remaining

46 What makes the Cisco EasyVPN application a useful tool for VPN implementation

It provides encryption algorithms unavailable in other systems

It ensures that remote workers actually use the VPN for connectivity

It simplifies the configuration tasks for the device that is used as the VPN server

It allows a greater variety of network devices to be used for VPN connections

47

Refer to the exhibit A customer has a problem with connectivity in the network Based on the IP addressing

scheme what is causing the problem

The WAN link that connects R1 to R3 has an incorrect mask

The WAN links need IP addresses from a different major network

The WAN link that connects R1 to R2 overlaps with the R3 LAN

The IP addressing in R1 LAN is incorrect because subnet zero cannot be used with VLSM

48 Which technical requirement is satisfied when providing QoS for delay sensitive applications

availability

manageability

scalability

security

49 Which statement best describes the VPN feature called split tunneling

It creates separate pathways for different VLANs

It creates two tunnels one for user traffic and one for management traffic such as CDP and SNMP

It allows user traffic that is destined for the corporate network to travel across the VPN tunnel while traffic

destined for the Internet travels through the local LAN of the VPN client

It allows separate tunnels so that high priority traffic such as voice and video uses the higher bandwidth

tunnel while all other user traffic travels on the lower bandwidth tunnel

50 As part of network monitoring a network administrator receives an alert that the CPU usage of the core router

reaches 90 several times a day Which protocol is in use to monitor the network performance

DNS

SNMP

SMTP

DHCP

TFTP

51 The main office of a NetworkingCompany customer currently connects to three branch offices via three separate

point-to-point T1 circuits The customer network uses RIPv2 as the routing protocol within both the LAN and

the WAN The account manager proposes a change to a Frame Relay network because the costs are lower A

single local loop connection can be installed at the main office with three separate PVCs to connect the branch

offices How can the main office edge router be configured to enable the customer to continue to use RIP as the

WAN routing protocol

Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote

routers

To prevent the Frame Relay network from causing a routing loop disable split horizon on the serial

interface

Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP

address to each one

Configure the serial interface with a single interface DLCI number and create frame-relay map statements

for each remote site address

52 Which command can be used to load a new Cisco IOS image on a router

copy startup-config tftp

copy tftp startup-config

copy running-config tftp

copy tftp flash

copy flash tftp

copy flash startup-config

Showing 4 of 4 ltPrev

Page 4

Nextgt

Close Window

All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks

s

Page 11: Close Window

Refer to the exhibit What can the field engineer conclude about the EIGRP authentication between Router1 and

Router2

Authentication will fail because only one key is configured

Authentication will succeed and EIGRP updates can be exchanged

Authentication will fail because the key chain names do not match

Authentication will fail because the key chain names must match the router names

26 A network designer must select a routing protocol for the network of a customer The currently installed network

contains both Cisco and non-Cisco routers and there is no budget to replace them The designer plans on

implementing both VLSM and route summarization in the new network design Which two protocols can

provide the necessary functionality for this LAN (Choose two)

RTP

RSTP

RIPv1

RIPv2

EIGRP

OSPF

27 A company offers online ordering of its products The web service is provided by a primary web server that

synchronizes with a backup server A network designer recommends adding a load balancing unit and installing

additional web servers so that the online ordering traffic can be equally distributed among four web servers

What network design risk is addressed with this recommendation

limited bandwidth

possible bottleneck

single point of failure

large failure domains

28

Refer to the exhibit A network administrator configures two routers to test the WAN connection The serial

connection requires PPP encapsulation and authentication with CHAP However the connection cannot be

established According to the partial output of the show running-config command what is the cause of the

problem

The password should be all lowercase

The password should contain fewer than 8 characters

The usernames must be the same as the sending router hostnames

The usernames must be the same as the destination router hostnames

29 In order for the IT staff of a company to understand the basic operation of VPNs which two features or

technologies must the network designer identify as training needs (Choose two)

IPv6 tunneling

QoS operation

tunneling protocols

VLAN configuration

encryption algorithms

30 What is a function of software queuing

filters traffic on the basis of administrator defined rules

stores received traffic and sends packets based on the order that the packets are received

sends packets on the basis of priorities that are manually set

transmits packets in a priority sequence that is based on source port

Showing 2 of 4 ltPrev

Page 2

Nextgt

Close Window

All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks

Close Window

Assessment System

1 Assessment Selection

2 Assessment Settings

3 Take Assessment

Take Assessment - DCompNtwk Final - CCNA Discovery Designing and Supporting

Computer Networks (Version 40)

Time Remaining

46 What makes the Cisco EasyVPN application a useful tool for VPN implementation

It provides encryption algorithms unavailable in other systems

It ensures that remote workers actually use the VPN for connectivity

It simplifies the configuration tasks for the device that is used as the VPN server

It allows a greater variety of network devices to be used for VPN connections

47

Refer to the exhibit A customer has a problem with connectivity in the network Based on the IP addressing

scheme what is causing the problem

The WAN link that connects R1 to R3 has an incorrect mask

The WAN links need IP addresses from a different major network

The WAN link that connects R1 to R2 overlaps with the R3 LAN

The IP addressing in R1 LAN is incorrect because subnet zero cannot be used with VLSM

48 Which technical requirement is satisfied when providing QoS for delay sensitive applications

availability

manageability

scalability

security

49 Which statement best describes the VPN feature called split tunneling

It creates separate pathways for different VLANs

It creates two tunnels one for user traffic and one for management traffic such as CDP and SNMP

It allows user traffic that is destined for the corporate network to travel across the VPN tunnel while traffic

destined for the Internet travels through the local LAN of the VPN client

It allows separate tunnels so that high priority traffic such as voice and video uses the higher bandwidth

tunnel while all other user traffic travels on the lower bandwidth tunnel

50 As part of network monitoring a network administrator receives an alert that the CPU usage of the core router

reaches 90 several times a day Which protocol is in use to monitor the network performance

DNS

SNMP

SMTP

DHCP

TFTP

51 The main office of a NetworkingCompany customer currently connects to three branch offices via three separate

point-to-point T1 circuits The customer network uses RIPv2 as the routing protocol within both the LAN and

the WAN The account manager proposes a change to a Frame Relay network because the costs are lower A

single local loop connection can be installed at the main office with three separate PVCs to connect the branch

offices How can the main office edge router be configured to enable the customer to continue to use RIP as the

WAN routing protocol

Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote

routers

To prevent the Frame Relay network from causing a routing loop disable split horizon on the serial

interface

Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP

address to each one

Configure the serial interface with a single interface DLCI number and create frame-relay map statements

for each remote site address

52 Which command can be used to load a new Cisco IOS image on a router

copy startup-config tftp

copy tftp startup-config

copy running-config tftp

copy tftp flash

copy flash tftp

copy flash startup-config

Showing 4 of 4 ltPrev

Page 4

Nextgt

Close Window

All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks

s

Page 12: Close Window

28

Refer to the exhibit A network administrator configures two routers to test the WAN connection The serial

connection requires PPP encapsulation and authentication with CHAP However the connection cannot be

established According to the partial output of the show running-config command what is the cause of the

problem

The password should be all lowercase

The password should contain fewer than 8 characters

The usernames must be the same as the sending router hostnames

The usernames must be the same as the destination router hostnames

29 In order for the IT staff of a company to understand the basic operation of VPNs which two features or

technologies must the network designer identify as training needs (Choose two)

IPv6 tunneling

QoS operation

tunneling protocols

VLAN configuration

encryption algorithms

30 What is a function of software queuing

filters traffic on the basis of administrator defined rules

stores received traffic and sends packets based on the order that the packets are received

sends packets on the basis of priorities that are manually set

transmits packets in a priority sequence that is based on source port

Showing 2 of 4 ltPrev

Page 2

Nextgt

Close Window

All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks

Close Window

Assessment System

1 Assessment Selection

2 Assessment Settings

3 Take Assessment

Take Assessment - DCompNtwk Final - CCNA Discovery Designing and Supporting

Computer Networks (Version 40)

Time Remaining

46 What makes the Cisco EasyVPN application a useful tool for VPN implementation

It provides encryption algorithms unavailable in other systems

It ensures that remote workers actually use the VPN for connectivity

It simplifies the configuration tasks for the device that is used as the VPN server

It allows a greater variety of network devices to be used for VPN connections

47

Refer to the exhibit A customer has a problem with connectivity in the network Based on the IP addressing

scheme what is causing the problem

The WAN link that connects R1 to R3 has an incorrect mask

The WAN links need IP addresses from a different major network

The WAN link that connects R1 to R2 overlaps with the R3 LAN

The IP addressing in R1 LAN is incorrect because subnet zero cannot be used with VLSM

48 Which technical requirement is satisfied when providing QoS for delay sensitive applications

availability

manageability

scalability

security

49 Which statement best describes the VPN feature called split tunneling

It creates separate pathways for different VLANs

It creates two tunnels one for user traffic and one for management traffic such as CDP and SNMP

It allows user traffic that is destined for the corporate network to travel across the VPN tunnel while traffic

destined for the Internet travels through the local LAN of the VPN client

It allows separate tunnels so that high priority traffic such as voice and video uses the higher bandwidth

tunnel while all other user traffic travels on the lower bandwidth tunnel

50 As part of network monitoring a network administrator receives an alert that the CPU usage of the core router

reaches 90 several times a day Which protocol is in use to monitor the network performance

DNS

SNMP

SMTP

DHCP

TFTP

51 The main office of a NetworkingCompany customer currently connects to three branch offices via three separate

point-to-point T1 circuits The customer network uses RIPv2 as the routing protocol within both the LAN and

the WAN The account manager proposes a change to a Frame Relay network because the costs are lower A

single local loop connection can be installed at the main office with three separate PVCs to connect the branch

offices How can the main office edge router be configured to enable the customer to continue to use RIP as the

WAN routing protocol

Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote

routers

To prevent the Frame Relay network from causing a routing loop disable split horizon on the serial

interface

Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP

address to each one

Configure the serial interface with a single interface DLCI number and create frame-relay map statements

for each remote site address

52 Which command can be used to load a new Cisco IOS image on a router

copy startup-config tftp

copy tftp startup-config

copy running-config tftp

copy tftp flash

copy flash tftp

copy flash startup-config

Showing 4 of 4 ltPrev

Page 4

Nextgt

Close Window

All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks

s

Page 13: Close Window

Showing 2 of 4 ltPrev

Page 2

Nextgt

Close Window

All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks

Close Window

Assessment System

1 Assessment Selection

2 Assessment Settings

3 Take Assessment

Take Assessment - DCompNtwk Final - CCNA Discovery Designing and Supporting

Computer Networks (Version 40)

Time Remaining

46 What makes the Cisco EasyVPN application a useful tool for VPN implementation

It provides encryption algorithms unavailable in other systems

It ensures that remote workers actually use the VPN for connectivity

It simplifies the configuration tasks for the device that is used as the VPN server

It allows a greater variety of network devices to be used for VPN connections

47

Refer to the exhibit A customer has a problem with connectivity in the network Based on the IP addressing

scheme what is causing the problem

The WAN link that connects R1 to R3 has an incorrect mask

The WAN links need IP addresses from a different major network

The WAN link that connects R1 to R2 overlaps with the R3 LAN

The IP addressing in R1 LAN is incorrect because subnet zero cannot be used with VLSM

48 Which technical requirement is satisfied when providing QoS for delay sensitive applications

availability

manageability

scalability

security

49 Which statement best describes the VPN feature called split tunneling

It creates separate pathways for different VLANs

It creates two tunnels one for user traffic and one for management traffic such as CDP and SNMP

It allows user traffic that is destined for the corporate network to travel across the VPN tunnel while traffic

destined for the Internet travels through the local LAN of the VPN client

It allows separate tunnels so that high priority traffic such as voice and video uses the higher bandwidth

tunnel while all other user traffic travels on the lower bandwidth tunnel

50 As part of network monitoring a network administrator receives an alert that the CPU usage of the core router

reaches 90 several times a day Which protocol is in use to monitor the network performance

DNS

SNMP

SMTP

DHCP

TFTP

51 The main office of a NetworkingCompany customer currently connects to three branch offices via three separate

point-to-point T1 circuits The customer network uses RIPv2 as the routing protocol within both the LAN and

the WAN The account manager proposes a change to a Frame Relay network because the costs are lower A

single local loop connection can be installed at the main office with three separate PVCs to connect the branch

offices How can the main office edge router be configured to enable the customer to continue to use RIP as the

WAN routing protocol

Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote

routers

To prevent the Frame Relay network from causing a routing loop disable split horizon on the serial

interface

Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP

address to each one

Configure the serial interface with a single interface DLCI number and create frame-relay map statements

for each remote site address

52 Which command can be used to load a new Cisco IOS image on a router

copy startup-config tftp

copy tftp startup-config

copy running-config tftp

copy tftp flash

copy flash tftp

copy flash startup-config

Showing 4 of 4 ltPrev

Page 4

Nextgt

Close Window

All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks

s

Page 14: Close Window

Refer to the exhibit A customer has a problem with connectivity in the network Based on the IP addressing

scheme what is causing the problem

The WAN link that connects R1 to R3 has an incorrect mask

The WAN links need IP addresses from a different major network

The WAN link that connects R1 to R2 overlaps with the R3 LAN

The IP addressing in R1 LAN is incorrect because subnet zero cannot be used with VLSM

48 Which technical requirement is satisfied when providing QoS for delay sensitive applications

availability

manageability

scalability

security

49 Which statement best describes the VPN feature called split tunneling

It creates separate pathways for different VLANs

It creates two tunnels one for user traffic and one for management traffic such as CDP and SNMP

It allows user traffic that is destined for the corporate network to travel across the VPN tunnel while traffic

destined for the Internet travels through the local LAN of the VPN client

It allows separate tunnels so that high priority traffic such as voice and video uses the higher bandwidth

tunnel while all other user traffic travels on the lower bandwidth tunnel

50 As part of network monitoring a network administrator receives an alert that the CPU usage of the core router

reaches 90 several times a day Which protocol is in use to monitor the network performance

DNS

SNMP

SMTP

DHCP

TFTP

51 The main office of a NetworkingCompany customer currently connects to three branch offices via three separate

point-to-point T1 circuits The customer network uses RIPv2 as the routing protocol within both the LAN and

the WAN The account manager proposes a change to a Frame Relay network because the costs are lower A

single local loop connection can be installed at the main office with three separate PVCs to connect the branch

offices How can the main office edge router be configured to enable the customer to continue to use RIP as the

WAN routing protocol

Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote

routers

To prevent the Frame Relay network from causing a routing loop disable split horizon on the serial

interface

Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP

address to each one

Configure the serial interface with a single interface DLCI number and create frame-relay map statements

for each remote site address

52 Which command can be used to load a new Cisco IOS image on a router

copy startup-config tftp

copy tftp startup-config

copy running-config tftp

copy tftp flash

copy flash tftp

copy flash startup-config

Showing 4 of 4 ltPrev

Page 4

Nextgt

Close Window

All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks

s

Page 15: Close Window

SMTP

DHCP

TFTP

51 The main office of a NetworkingCompany customer currently connects to three branch offices via three separate

point-to-point T1 circuits The customer network uses RIPv2 as the routing protocol within both the LAN and

the WAN The account manager proposes a change to a Frame Relay network because the costs are lower A

single local loop connection can be installed at the main office with three separate PVCs to connect the branch

offices How can the main office edge router be configured to enable the customer to continue to use RIP as the

WAN routing protocol

Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote

routers

To prevent the Frame Relay network from causing a routing loop disable split horizon on the serial

interface

Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP

address to each one

Configure the serial interface with a single interface DLCI number and create frame-relay map statements

for each remote site address

52 Which command can be used to load a new Cisco IOS image on a router

copy startup-config tftp

copy tftp startup-config

copy running-config tftp

copy tftp flash

copy flash tftp

copy flash startup-config

Showing 4 of 4 ltPrev

Page 4

Nextgt

Close Window

All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks

s


Recommended