Asnwer Ccna Discovery 3 Ver 4 0 Chapter 1-5
Asnwer Ccna Discovery 3 Ver 4 0 Chapter 1-5
Asnwer Ccna Discovery 3 Ver 4 0 Chapter 1-5
Modul 1
1 What can be found at the enterprise edge?
2 In which functional area of the Cisco Enterprise Architecture should IDS and IPS be located to detect
and prevent services from accessing hosts?
Enterprise Campus
Edge Distribution
Enterprise Edge ****
Service Provider Edge
3 A business consultant must use Internet websites to research a report on the e-business strategies of
several firms and then electronically deliver the report to a group of clients in cities throughout the
world. Which two teleworker tools can the consultant use to accomplish this project? (Choose two.)
VoIP
VPN
HTTP ****
Telnet
email ****
4 Which two measures help ensure that a hardware problem does not cause an outage in an enterprise
LAN that supports mission critical services? (Choose two.)
5 Which task would typically only require services located at the access layer of the hierarchical
design model?
7 A remote user needs to access a networking device on the internal network of the company. The
transactions between the remote user and the device must be secure. Which protocol enables this to
happen securely?
HTTP
SSH ****
Telnet
FTP
9 Which functional component of the Cisco Enterprise Architecture is responsible for hosting internal
servers?
remove the three-layer hierarchical model and use a flat network approach
divide the network into functional components while still maintaining the concept of Core,
Distribution, and Access Layers ****
provide services and functionality to the core layer by grouping various components into a single
component located in the access layer
reduce overall network traffic by grouping server farms, the management server, corporate intranet, and
e-commerce routers in the same layer
11 Which two solutions would an enterprise IT department use to facilitate secure intranet access for
remote workers? (Choose two.)
VPN ****
NAT
user authentication ****
client firewall software
packet sniffing
12 Which statement describes the difference between an enterprise WAN and an enterprise extranet?
An enterprise WAN is designed to interconnect local LANs, while an enterprise extranet is designed to
interconnect remote branch offices.
13 Why would a network administrator want to limit the size of failure domains when designing a
network?
14 What is the main purpose of the Access Layer in a hierarchically designed network?
15 Which three functions are performed at the Distribution Layer of the hierarchical network model?
(Choose three.)
17 What are two important characteristics or functions of devices at the Enterprise Edge? (Choose
two.)
18 Why is TCP the preferred Layer 4 protocol for transmitting data files?
TCP is more reliable than UDP because it requires lost packets to be retransmitted. ****
TCP requires less processing by the source and destination hosts than UDP.
UDP introduces delays that degrade the quality of the data applications.
TCP ensures fast delivery because it does not require sequencing or acknowlegements.
19 The ABC Corporation implements the network for its new headquarters using the Cisco Enterprise
Architecture. The network administrator wants to filter the traffic from and to the outside world. Where
should the administrator deploy a firewall device?
server farm
enterprise edge ****
enterprise campus
service provider edge
20 Which two statements are reasons why UDP is used for voice and video traffic instead of TCP?
(Choose two.)
TCP requires all data packets to be delivered for the data to be usable.
The acknowledgment process of TCP introduces delays that break the streams of data. ****
UDP does not have mechanisms for retransmitting lost packets. ****
UDP tolerates delays and compensates for them.
TCP is a connectionless protocol that provides end-to-end reliability.
UDP is a connection-oriented protocol that provides end-to-end reliability.
Modul 2
2. A network administrator needs to configure Telnet access to a router. Which group of commands
enable Telnet access to the router?
3. Which two types of information should be included in a business continuity plan? (Choose two.)
4. Which two router parameters can be set from interface configuration mode? (Choose two.)
a. IP address ****
b. Telnet password
c. hostname
d. console password
e. subnet mask ****
f. enable secret password
5. Which two devices protect a corporate network against malicious attacks at the enterprise edge ?
(Choose two.)
a. demarc
b. IP security (IPSec)
c. Data Service Unit (DSU)
d. intrusion prevention system (IPS) ****
e. intrusion detection system (IDS) ****
6. Which three steps must be performed to remove all VLAN information from a switch but retain the
rest of the configuration? (Choose three.)
a. physical point where the ISP responsibilty ends and the customer responsibilty begins ****
b. physical location where all server farm connections meet before being distributed into the Core
c. point of entry for outside attacks and is often vulnerable
d. point of entry for all Access Layer connections from the Distribution Layer devices
8. Which device is responsible for moving packets between multiple network segments?
a. router ****
b. switch
c. CSU/DSU
d. IDS device
10. What information can an administrator learn using the show version command?
12. It is crucial that network administrators be able to examine and configure network devices from
their homes. Which two approaches allow this connectivity without increasing vulnerability to external
attacks? (Choose two.)
a. Configure a special link at the POP to allow external entry from the home computer.
b. Set up VPN access between the home computer and the network. ****
c. Install a cable modem in the home to link to the network.
d. Configure ACLs on the edge routers that allow only authorized users to access management ports
on network devices. ****
e. Configure a server in the DMZ with a special username and password to allow external access.
13. A network administrator must define specific business processes to implement if a catastrophic
disaster prevents a company from performing daily business routines. Which portion of the network
documentation is the administrator defining?
14. A DoS attack crippled the daily operations of a large company for 8 hours. Which two options
could be implemented by the network administrator to possibly prevent such an attack in the future?
(Choose two.)
a. install security devices with IDS and IPS at the enterprise edge ****
b. reset all user passwords every 30 days
c. filter packets based on IP address, traffic pattern, and protocol ****
d. deny external workers VPN access to internal resources
e. ensure critical devices are physically secure and placed behind the demarc
15. A network manager wants to have processes in place to ensure that network upgrades do not affect
business operations. What will the network manager create for this purpose?
16. An investment company has multiple servers that hold mission critical data. They are worried that if
something happens to these servers, they will lose this valuable information. Which type of plan is
needed for this company to help minimize loss in the event of a server crash?
17. When searching for information about authentication methods and usernames of company
personnel, where can a network administrator look?
18. Refer to the exhibit. Which statement is true about port Fa5/1?
The exhibit : http://img132.imageshack.us/img132/2163/17032eq1.jpg
a. When a violation is detected, the port will log the information to a syslog server.
b. When a violation is detected, the port will go into err-disable mode.
c. There have been 11 security violations since the last reload.
d. The port is currently in the shutdown state. ****
modul 3
1. A router has two serial interfaces and two Fast Ethernet
interfaces. This router must be connected to a WAN link and to a switch that
supports four VLANs. How can this be accomplished in the most efficient and
cost-effective manner to support inter-VLAN routing between the four
VLANs?
a Connect a smaller router to the serial interface to handle the inter-VLAN traffic.
b Add two additional Fast Ethernet interfaces to the router to allow one VLAN per interface.
c Connect a trunked uplink from the switch to one Fast Ethernet interface on the router and
create logical subinterfaces for each
VLAN. *****
d Use serial-to-Fast Ethernet transceivers to connect two of the VLANs to the serial ports on the
router. Support the other two VLANs directly to the available FastEthernet
ports.
3. Which two items will prevent broadcasts from being sent throughout
the network? (Choose two.)
a bridges
b routers ****
c switches
d VLANs ****
e hubs
4 Which two criteria are used by STP to select a root bridge?(Choose two.)
memory size
bridge priority ****
switching speed
number of ports
base MAC address ****
switch
location
5 When are MAC addresses removed from the CAM table?
a The switch initially forwards all traffic using cut-through switching and then changes to store-
and-forward switching if errors exceed a threshold value.
b The switch initially forwards all traffic using cut-through switching and then changes to fast
forward switching if errors exceed a threshold value. *****
c The switch initially forwards all traffic using cut-through switching and then temporarily disables
the port if errors exceed a threshold value.
d The switch initially forwards all traffic using store-and-forward switching and then changes to
cut-through switching if errors exceed a threshold value.
8 Which three must be used when a router interface is configured for VLAN trunking? (Choose
three.)
9 In which STP state does a switch port transmit user data and learn MAC addresses?
a blocking
b learning
c disabling
d listening
e forwarding ***
10 Using STP, how long does it take for a switch port to go from the blocking state to the
forwarding state?
a 2 seconds
b 15 seconds
c 20 seconds
d 50 seconds ****
11 The information contained in a BPDU is used for which two purposes? (Choose two.)
12 Which Catalyst feature causes a switch port to enter the spanning-tree forwarding state
immediately?
a backbonefast
b uplinkfast
c portfast *****
d rapid spanning tree
14 What is the first step in the process of convergence in a spanning tree topology?
a1
b2
c 4 ****
d6
e8
f 16
4 How does a router keep track of which inside local address is used when NAT overload is
configured?
a The router adds an additional bit to the source IP address and maintains a separate table.
b The router modifies the QoS field.
c The router uses TCP or UDP port numbers. ****
d The router uses a manual entry that is created and maintained in the database of the router.
a 10.1.1.1
b 10.1.1.2
c 198.18.1.55 ****
d 64.100.0.1
7 Refer to the exhibit. All networks that are shown have a /24 prefix. Assuming that all routes have
been discovered by all routers in the network, which address will successfully summarize only the
networks that are shown?
a 192.168.8.0/21
b 192.168.8.0/24
c 192.168.16.0/20
d 192.168.16.0/21 ****
e 192.168.16.0/24
8 What is the CIDR prefix designation that summarizes the entire reserved Class B RFC 1918 internal
address range?
a /4
b /8
c /12
d /16 ****
e /20
9 Which NAT term refers to the IP address of your inside host as it appears to the outside network?
10 A network administrator is asked to design a new addressing scheme for a corporate network.
Presently, there are 500 users at the head office, 200 users at sales, 425 at manufacturing, and 50 at the
research site. Which statement defines the correct VLSM addressing map with minimal waste using the
172.16.0.0/16 network?
11 A company using a Class B IP addressing scheme needs as many as 100 subnetworks. Assuming
that variable length subnetting is not used and all subnets require at least 300 hosts, what subnet mask
is appropriate to use?
a 255.255.0.0
b 255.255.240.0
c 255.255.254.0 *****
d 255.255.255.0
e 255.255.255.128
f 255.255.255.192
12 Host A in the exhibit is assigned the IP address 10.118.197.55/20. How many more network devices
can be added to this same subnetwork?
a 253
b 509
c 1021
d 2045
e 4093 *****
13 Refer to the exhibit. RIP version 2 is configured as the network routing protocol and all of the
default parameters remain the same. Which update is sent from R2 to R3 about the 10.16.1.0/24
network connected to R1?
a 10.16.0.0/16 *****
b 10.0.0.0/24
c 10.0.0.0/8
d 10.16.1.0/24
14 What range of networks are summarized by the address and mask, 192.168.32.0/19?
a 192.168.0.0/24 - 192.168.32.0/24
b 192.168.0.0/24 - 192.168.31.0/24
c 192.168.32.0/24 – 192.168.64.0/24
d 192.168.32.0/24 – 192.168.63.0/24 *****
15 Refer to the exhibit. Based on the output of the show ip nat translations command, which kind of
address translation is in effect on this router?
a static
b public
c overload *****
d private
16 How many addresses will be available for dynamic NAT translation when a router is configured
with the following commands?
Router(config)#ip nat pool TAME 209.165.201.23 209.165.201.30 netmask 255.255.255.224
Router(config)#ip nat inside source list 9 pool TAME
a7
b 8 *****
c9
d 10
e 24
f 31
17 Refer to the exhibit. Which two IP addresses could be assigned to the hosts that are shown in the
exhibit? (Choose two.)
a 192.168.65.31
b 192.168.65.32
c 192.168.65.35 *****
d 192.168.65.60 *****
e 192.168.65.63
f 192.168.65.64
18 What are the network and broadcast addresses for host 192.168.100.130/27? (Choose two.)
a network 192.168.100.0
b network 192.168.100.128 *****
c network 192.168.100.130
d broadcast 192.168.100.157
e broadcast 192.168.100.159 *****
f broadcast 192.168.100.255
19 Refer to the exhibit. Which two are valid VLSM network addresses for the serial link between
Router1 and Router2? (Choose two.)
a 192.168.1.4/30 *****
b 192.168.1.8/30 *****
c 192.168.1.90/30
d 192.168.1.101/30
e 192.168.1.190/30
20 When configuring NAT on a Cisco router, what is the inside local IP address?
2 Which Layer 4 protocol does EIGRP use to provide reliability for the transmission of routing
information?
a DUAL
b IP
c PDM
d RTP ****
e TCP
f UDP
3 A network administrator issues the command show ip route and sees this line of output:
192.168.3.0/24 [120/2] via 192.168.2.2, 00:00:05, Serial0/0
What two pieces of information can be obtained from the output? (Choose two.)
4 Refer to the exhibit. A network administrator is troubleshooting a routing problem. When the show ip
route command is entered on RTR-1, only the serial link between RTR-2 and RTR-3 has been learned
from the RIP routing protocol. What are two issues? (Choose two.)
5 What two problems may occur if the EIGRP default bandwidth for a serial link is higher than the
actual bandwidth? (Choose two.)
a Routing updates will arrive too quickly for receiving routers to process.
b The port IP address will be rejected by the routing protocol.
c Suboptimal paths will be selected.
d The port protocol will return to the HDLC default.
e VLSM support will be disabled. ****
f Network convergence may be affected. *****
6 What two statements are correct regarding EIGRP authentication? (Choose two.)
7 Refer to the exhibit. Which statement is true about the EIGRP authentication configuration?
8 Refer to the exhibit. Routers A and B have EIGRP configured and automatic summarization has been
disabled on both routers. Which router command will summarize the attached routes?
11 Refer to the exhibit. Routers RTR-1 and RTR-3 are completely configured. The administrator needs
to configure the routing protocol on router RTR-2 so that communication occurs throughout the
network. Which group of commands will successfully configure EIGRP on RTR-2?
a The route has the highest path cost of all routes to that destination network.
b The route must be confirmed by neighboring routers before it is put in the active state.
c The route is a feasible successor and will be used if the active route fails.
d There is no activity on the route to that network.
e The route is viable and can be used to forward traffic. *****
13 What two statements are true regarding EIGRP tables? (Choose two.)
16 What is the purpose of the network command when RIP is being configured as the routing
protocol?
a 14 hops
b 15 hops *****
c 16 hops
d 17 hops
18 What does a router that is running RIP use to determine the best path to take when forwarding data?
19 Refer to the exhibit. Which statement is true about the output from the show ip protocols
command?
20 What three statements are true about routers that are configured for EIGRP? (Choose three.)