Skip to main content

Posts

Showing posts from December 10, 2008

CCNA4 Module 7(90,5%)

1 Why is it important to record baseline measurements of a prototype network? Test results show security weaknesses after the baseline tests are run. The baseline is the point at which the network is operating at its fullest potential. Baseline measurements define a point at which network traffic has exceeded the designed capabilities of the network. Test results are compared to the baseline to see how the test conditions increase processor use or decrease available bandwidth.***** 2 Refer to the exhibit. During prototype testing, verification of VLAN connectivity is being performed. Based on the information shown, what command produced the output? show spanning-tree show interfaces trunk******** show cdp neighbors show interfaces show ip interface brief 3 How do designers decide which network functions need to be included in the prototype test? They select the functions that align with the business goals.****** They select the functions that occur at the network core. They select the

CCNA4 Module 9 (77%)

CCNA Discovery 4 Module 9 Scored 77% 1 Upon completion of a proposal, a network design team must sell their ideas to two key stakeholders. Who are these two stakeholders? (Choose two.) Customers*** licensing boards cabling contractors*** internal management project implementation team 2 NetworkingCompany completes the installation of a network upgrade for a retail customer. All of the onsite tests complete successfully and the customer IT staff approves the results of the tests. The manager of the retail store contacts NetworkingCompany to inform the company that the store will not pay for the upgrade until a recently purchased software package is installed and tested on the network. Which two items that are contained in the proposal can the account manager refer to when discussing this issue with the store manager? (Choose two.) the project scope*** the bill-of-material the project timeline*** the terms and conditions the business goals of the customer the evaluation of the current ne

CCNA 3:Module 1

Options With Highlight Colours are Correct Answer 1. A network technician is asked to examine an existing switched network. Following this examination, the technician makes recommendations for adding new switches where needed and replacing existing equipment that hampers performance. The technician is given a budget and asked to proceed. Which two pieces of information would be helpful in determining necessary port density for new switches? (Choose two.) forwarding rate traffic flow analysis expected future growth number of required core connections number of hubs that are needed in the access layer to increase performance 2. Configuring communication between devices on different VLANs requires the use of which layer of the OSI model? Layer 1 Layer 3 Layer 4 Layer 5 3. What is the likely impact of moving a conventional company architecture to a completely converged network? Local analog phone service can be completely outsourced to cost-effective providers. The Ethernet VLAN structur

CCNA 3:Module 2

Options With Highlight Colours are Correct Answer 1. When a switch receives a frame and the source MAC address is not found in the switching table, what action will be taken by the switch to process the incoming frame? The switch will request that the sending node resend the frame. The switch will issue an ARP request to confirm that the source exists. The switch will map the source MAC address to the port on which it was received. The switch ends an acknowledgement frame to the source MAC of this incoming frame. 2. Refer to the exhibit. How many collision domains are depicted in the network? 1 2 4 6 7 8 3. Refer to the exhibit. What action does SW1 take on a frame sent from PC_A to PC_C if the MAC address table of SW1 is empty? SW1 drops the frame. SW1 floods the frame on all ports on SW1, except port Fa0/1. SW1 floods the frame on all ports on the switch, except Fa0/23 and Fa0/1. SW1 uses the CDP protocol to synchronize the MAC tables on both switches and then forwards the frame to a

CCNA 3:Module 3

Options With Highlight Colours are Correct Answer 1. What statement about the 802.1q trunking protocol is true? 802.1q is Cisco proprietary. 802.1q frames are mapped to VLANs by MAC address. 802.1q does NOT require the FCS of the original frame to be recalculated. 802.1q will not perform operations on frames that are forwarded out access ports. 2. Which two statements describe the benefits of VLANs? (Choose two.) VLANs improve network performance by regulating flow control and window size. VLANs enable switches to route packets to remote networks via VLAN ID filtering. VLANs reduce network cost by reducing the number of physical ports required on switches. VLANs improve network security by isolating users that have access to sensitive data and applications. VLANs divide a network into smaller logical networks, resulting in lower susceptibility to broadcast storms. 3. What are two characteristics of VLAN1 in a default switch configuration? (Choose two.) VLAN1 should renamed. VLAN 1 is t

CCNA 3:Module 4

Options With Highlight Colours are Correct Answer 1. Refer to the exhibit. The switches in the exhibit are connected with trunks within the same VTP management domain. Each switch is labeled with its VTP mode. A new VLAN is added to Switch3. This VLAN does not show up on the other switches. What is the reason for this? VLANs cannot be created on transparent mode switches. Transparent mode switches do not forward VTP advertisements. VLANs created on transparent mode switches are not included in VTP advertisements. Server mode switches neither listen to nor forward VTP messages from transparent mode switches. 2. Which two statements are true about the implementation of VTP? (Choose two.) Switches must be connected via trunks. The VTP domain name is case sensitive. Transparent mode switches cannot be configured with new VLANs. The VTP password is mandatory and case sensitive. Switches that use VTP must have the same switch name. 3. Which two statements describe VTP transparent mode operat

CCNA 3:Module 5

Options With Highlight Colours are Correct Answer 1. Which two statements are true about the default operation of STP in a Layer 2 switched environment that has redundant connections between switches? (Choose two.) The root switch is the switch with the highest speed ports. Decisions on which port to block when two ports have equal cost depend on the port priority and identity. All trunking ports are designated and not blocked. Root switches have all ports set as root ports. Non-root switches each have only one root port. 2. Which two statements describe the BIDs used in a spanning tree topology? (Choose two.) They are sent out by the root bridge only after the inferior BPDUs are sent. They consist of a bridge priority and MAC address. Only the root bridge will send out a BID. They are used by the switches in a spanning tree topology to elect the root bridge. The switch with the fastest processor will have the lowest BID. 3. In which two ways is the information that is contained in BPD

CCNA 3:Module 6

Options With Highlight Colours are Correct Answer 1. Refer to the exhibit. Which three statements describe the network design shown in the exhibit? (Choose three.) This design will not scale easily. The router merges the VLANs into a single broadcast domain. This design uses more switch and router ports than are necessary. This design exceeds the maximum number of VLANs that can be attached to a switch. This design requires the use of the ISL or 802.1q protocol on the links between the switch and the router. If the physical interfaces between the switch and router are operational, the devices on the different VLANs can communicate through the router. 2. A router has two FastEthernet interfaces and needs to connect to four VLANs in the local network. How can this be accomplished using the fewest number of physical interfaces without unnecessarily decreasing network performance? Implement a router-on-a-stick configuration. Add a second router to handle the inter-VLAN traffic. Use a hub t

CCNA 3:Module 7

Options With Highlight Colours are Correct Answer 1. Which two conditions have favored adoption of 802.11g over 802.11a? (Choose two.) 802.11a suffers from a shorter range than 802.11g. The 2.4 GHz frequency band is not as crowded as the 5 GHz band. 802.11a is more susceptible to RF interference from common commercial items. 802.11a uses a more expensive modulation technique than 802.11g. 802.11g is backward compatible with 802.11b, but 802.11a is not. 2. Which two statements concerning network security are accurate? (Choose two.) 802.11i uses 3DES for encryption. Open authentication uses no client or AP verification. The 802.11i protocol is functionally identical to WPA. 802.11i incorporates a RADIUS server for enterprise authentication. A wireless client first associates with an AP and then authenticates for network access. 3. Which installation method will allow connectivity for a new wireless network? set up WEP on the access point only set up open access on both the access point a