http://www.lammlepress.com/complete-14-module-dvd-series-p-29.html CISCO Training: CCNA - Introduction to Internetworking by Todd Lammle This training video ...
But if you find the same answers for all the Module anywhere in the internet.
And if you have an Answers are correct 100% or if you find an answer, What is wrong in this blog. please send me. (Post in blog or Send Email )
Because,I will update the blog…
Saturday, June 29, 2013
CCNA Video Training - Todd Lammle
Wednesday, June 26, 2013
01 :: CCNA Voice - Version 8.0 :: Introduction
The CCNA Voice class is an ultimate all-in-one solution for engineers pursuing the Cisco Certified Network Associate Voice (CCNA Voice) certification. This V...
Sunday, June 23, 2013
An Overview of Cisco Professional Level Security Certification: CCNP Security
Learning@Cisco Product Manager David Bump gives an overview of the CCNP Security certification. For more information, please visit Cisco Learning Network htt...
Wednesday, June 19, 2013
CCNA training part 1 - How to prepare
Tuesday, June 18, 2013
Cheap Life Insurance Quotes
To ensure that you have the right insurance plan that you can afford, its important for you to know the correct life insurance quotes. You can go to the insurer's website for the same, or look for their brochures. But we recommend that you call them personally for this purpose.
If you think that you are not able to gather the correct and sufficient information, then you should fix up a meeting with a licensed agent and clear up the things. Fixing a meeting does not make you bound to purchasing an insurance plan. If you happen to find a cheap term quotes, then make sure the plan does not oblige you for any other plan.
Before you opt for a life insurance plan, we recommend you to study the following points carefully.
1. There are different types available in the market. While they may have different names in different companies, generally they hold the same concepts. Do not be confused by the different names and in fact, as you go from one company to another, put together a list in columns of each type - for instance, all term life insurance in one column regardless of their names and all whole life plans in another. That way, you know the basic benefits from each plan in every company. Comparison will be easier.
2. There are three basic types - Whole, term and universal life insurance. Term life insurance will have no cash value and you cannot take a loan against it. Whole one gives you more returns than what you have paid. Universal also builds up its cash value and in addition allows you to take a loan against it.
3. One kind of a policy can be converted to other kind of a policy with respect to some of the deciding factors. In such cases, your health plays a major role.
For instance, another company is offering you a cheaper life insurance rate, but your health does not allow you to qualify for the same, so you have to stick to the present company.4. Even term allows riders so if you need a rider to attach to your current term life insurance plan, do so. Riders available include spouse and child term riders which mean your precious ones are protected as much as you are with a negligible increase in premium.
5. If you think that you are into some risky job in which you are prone to occupational hazards, the you can ease your tension by adding a "waiver of cost" rider. This would mean that if at any time during the policy term, you get disabled, then all the costs of the policy would be paid by the company itself.
Make sure that you do not risk your future for saving a little money. There might be a number of cheap term life insurance rates available in the market, but they might offer you a limited cover and benefit. So, don't go for the price, look if the policy is fulfilling your needs or not.
Never be fooled by companies, agents or plans that boast of cheap or super affordable life insurance quotes. Your life insurance plan is meant to be something that protects and helps you when you need it most - basically, if it does not serve your needs, rethink the plan and start all over again.
The final layer of the ISO protocol stack. The name "physical layer" can be a bit problematic. Because of that name, and because of what I just said about th...
Sunday, June 16, 2013
Debt Consolidation Quote - The Answer You Need
If you are having difficulty paying your loan and credit card bills each month, you need to get a debt consolidation quote. A quote from a reliable company will help you find a way out of debt. If you have accumulated a large amount of debt, then consolidation is what you need as well. Credit reporting agencies lower your credit score due to a high credit card balances, even if you pay your bills on time each month. A debt quote is free and easy to obtain, and you will be able to see what programs are available to help you become debt free.
Do some research online about the programs available, and then get a quote from a reliable nonprofit debt consolidation company. Once you have a debt quote, review the details of the quote and ask any questions that you may have. There may be more than one option for you, so choose the bill consolidation program that fits your specific financial needs.
The most accessible place to request a consolidation quote is the internet. You can simply fill out a free form at any time of day and submit it, and you will receive a call from a counselor with the information that you need to make an informed decision. They will tell you about the methods of debt relief available to you in order for you to become debt free. You can also find companies in your phone book and in television advertisements that will be able to provide the same help.
The company you choose will be able to tell you about the many people they have helped throughout the years. You will want to choose a reliable company so that you know that your financial situation will be handled in the best way possible.
Take time to learn about the benefits of getting a good debt consolidation quote.
There are advantages to each method of debt help, so read blogs and articles before deciding. Consolidation loans, bill consolidation without a loan, and debt settlement are all methods that will help you get your financial situation back on track so that you can become debt free.Ask your debt counselor to answer any questions that you have regarding your bill consolidation program. Make the choice that is right for you. It will have affordable monthly payments, and it will enable you to pay off your debts and improve your credit scores.
When you have all of the details, you are ready to proceed with your debt consolidation quote and the program that will change your life. Living debt free can be a reality for you. You don't want to live in debt any longer.
For a free debt consolidation quote, please click on the link Debt Consolidation
Saturday, June 15, 2013
Farm Insurance Quotes For Dummies
It's not difficult to see why a farmer in Australia would be interested in knowing more about farm insurance quotes.
You can probably conscious of the fact that life on a farm is quite unpredictable and that many things could potentially affect you and your livelihood. If you think about it, it is really a no-brainer to take out insurance.
Why You Need It
Have a think about the amount of things that can potentially go wrong on the farm:
Machinery Breakdown - These days farms use a lot of machinery in order to do the work of planting and harvesting unlike in previous decades and centuries when it used to be done manually. If one of your machines were to break down for whatever reason, then you may not currently have cash flow to pay the cost of replacing it. And if you don't have machinery, then you can't complete your work and get income for your harvest.
Mother Nature - The success of your crops depend 100% on the weather. If there is a drought or flood, this could potentially wipe away all your income for the year. If there are diseases or locusts roaming around, then this could also have a significant impact. Unfortunately, the effect of mother nature can never be completely controlled or predicted.
Personal Injury - Working on the farm can be a very dangerous activity. There have been stories of farmers getting seriously and fatally injured by equipment used on the farm. If you end up getting injured, it could put you out of work for many weeks, which means you may not be able to plant and harvest your crops. This would certainly affect your income.
Theft - Unfortunately, theft is not limited to the big cities. Farm are large places to manage and thieves can easily get away with theft when you cannot monitor them effectively.
How To Find Them
Farm insurance quotes can be found in many places.
You can approach your current insurer and ask them to give you a new quote. In addition, you can approach some of the competitors in the marketplace to see if you can give you a more favourable quote. If you don't prefer spending a lot of time shopping around and prefer to get someone else to the job on your behalf, then a farm insurance broker is the job for you.Making A Decision
The decision as to whether get farm insurance is not a matter of if but when. If you don't have one now, then you are risking a lot. The premium may seem very expensive at first, however, it will turn out to be nothing if something unfortunate were to occur. Get your hands on some farm insurance quotes today.
A quick tutorial on how to set up VLANs and Trunks for the Cisco CCNA. Using Packet Tracer, I demonstrate the basics of VLANs and how they function. In this ...
Friday, June 14, 2013
Cisco CCNA Certification Breakdown
http://www.trainsignal.com/Cisco-CCNA-Training.aspx?utm_source=YouTube&utm_medium=Social%20Media&utm_campaign=CCNA%20Certification%20Breakdown%20clip Zach Mo...
Training Videos:CCNA,IP Addressing,CCNA boot camps.mp4
CISCO CCNA:IP Addressing Training Video is from Zoom Technology,the pioneer in Network Training.In this video CCNA(IP addressing) was discussed which is one ...
Video Rating: 4 / 5Keyword : ccna training videos
Thursday, June 13, 2013
CCNA Discovery 4 - Module Final 2 Exam Version 4.0 Designing and Supporting Computer Networks
• Host1 can ping Host2.
• Host1 cannot ping Host2.
• Host1 can ping Host3.
• Host1 cannot ping Host3
• Host2 can ping Host3.
• Host2 cannot ping Host3.
2. When should a network designer specify that a dedicated firewall appliance be used at the perimeter of the network rather than a router with a Cisco IOS software-based firewall feature set?
• There are multiple servers in the DMZ.
• The network is large in size and network traffic can overload the device.
• Traffic filtering is needed on the internal network.
• Multiple levels of access to the network are needed.
3. Refer to the exhibit. What does the status in the output indicate about the DLCI?
• The switch has the DLCI configured but it is not usable by this router.
• The DLCI was previously configured in the switch but is no longer there.
• It is usable but has little activity.
• The DLCI has been renamed for that PVC.
4. A NetworkingCompany customer is interested in creating an e-commerce business, which includes a network upgrade and the addition of a new server farm. By offering their products on the web, the company expects to increase revenue and reduce wait times to process orders. The network designer proposes to implement the server farm in a new data center and to add a new T1 circuit to handle the expected traffic. What are two business goals of the NetworkingCompany customer? (Choose two.)
• install a new T1 circuit
• increase revenue
• implement a new server farm
• reduce wait times to process orders
• install a new data center
5. Refer to the exhibit. A field engineer is called into a customer's office to determine a problem with connectivity in the network. Based on the customer's IP addressing scheme, what is causing the problem?
• The VLSM scheme is correct as shown.
• The WAN that connects R1 to R3 has an incorrect mask.
• The WAN that connects R1 to R2 overlaps with the R3 LAN.
• The R1 LAN is incorrect because subnet zero cannot be used with VLSM.
6. A network administrator is troubleshooting connectivity problems on a small IPv6 network that consists of two network segments that are connected by a single router. The administrator can ping the IP addresses of local hosts on each segment from the router. Hosts on one network segment cannot successfully ping the IP addresses of hosts on the other network segment. What is the most likely cause of the connectivity problem between the segments?
• incorrect VLAN assignments on each segment
• broadcast storm that is caused by a malfunctioning NIC on a host
• incorrect DNS mappings of host names to IPv6 addresses
• IPv6 traffic forwarding not configured on the router
7. Refer to the exhibit. What can be concluded from the output that is shown?
• MDF_2811 has a MAC address of 2294:300F:0000.
• A Cisco 3750 switch is connected to the FastEthernet1/0/1 port on MDF_2811.
• MDF_2811 is installed in the main distribution facility on floor 28 of building 11.
• Device 3750-24_IDF2 is running Cisco IOS Software Release 12.2(25)SEE2.
8. Refer to the exhibit. A NetworkingCompany designer is reviewing a diagram of a customer network. What two risks or issues can be identified in the topology that is shown? (Choose two.)
• The firewall router and ISP connection represent a single point of failure.
• A failure of the switch that connects the Cisco Call Manager to the network will cause the entire IP telephony system to fail.
• Using Layer 3 switches to interconnect the data center servers to the IP phones introduces too much delay.
• The IP phones need to be redundantly connected to the switches to prevent single points of failure at the access layer.
• If one of the Layer 3 switches fails, the Cisco Call Manager will be unreachable.
9. At the distribution layer of a hierarchical network, what are two advantages of using Layer 3 devices instead of Layer 2 switches? (Choose two.)
• enables the creation of large multisite VLANs
• creates fewer IP subnets to configure and manage
• reduces the number of redundant links required
• reduces the complexity of STP configurations
• enables traffic filtering based on subnet addresses
10. Refer to the exhibit. A network associate is configuring a new router to provide routing between VLANs. The associate removes the router from the box and connects the Fa0/0 interface to a trunking port on the switch. After the configuration is applied to the router, the traffic between VLANs still fails. What is causing this to occur?
• The NWRnStick router needs a routing protocol configured.
• The NWRnStick router needs additional Fast Ethernet interfaces installed.
• The subinterfaces of the NWRnStick router should have IP addresses applied.
• All the subinterfaces of the NWRnStick router should be configured in the same VLAN.
11. Refer to the exhibit. Two network engineers are setting up a prototype network to test a new Frame Relay network design. One of the engineers connects the cables and powers up all of the devices per the test plan. The second engineer uses a console cable to connect to the BR1 router, configures the Frame Relay connection and issues a show interfaces serial 2/0 command. What does the output of this command indicate to the engineers?
• A no shutdown command must be entered on the interface.
• The IP address has not yet been configured on the interface.
• The WAN encapsulation method is incorrect on the interface.
• The cable that connects BR1 to FR2 may not be correct or is not connected properly.
12. The main office of a NetworkingCompany customer currently connects to three branch offices via three separate point-to-point T1 circuits. The customer network uses RIPv2 as the routing protocol within both the LAN and the WAN. The account manager proposes a change to a Frame Relay network because the costs are lower. A single local loop connection can be installed at the main office with three separate PVCs to connect the branch offices. How can the main office edge router be configured to enable the customer to continue to use RIP as the WAN routing protocol?
• Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote routers.
• To prevent the Frame Relay network from causing a routing loop, disable split horizon on the serial interface.
• Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP address to each one.
• Configure the serial interface with a single interface DLCI number and create frame-relay map statements for each remote site address.
13. A user in a large office calls tech support to complain that the PC no longer connects to the Internet or to any network resources, but seems otherwise normal. The help desk technician asks the caller to talk to nearby users to see if other machines are affected. After a few minutes, the caller reports that several immediate neighbors have the same problem, but those seated further away do not. Assuming that the description is accurate, what should be checked next?
• power outlet to the PC that is used by the caller
• workgroup switch in the telecommunications room
• cable between any network outlet and the telecommunications room
• cable between the PC that is used by the caller and the network outlet it connects to
• cable between the PC that is used by a neighbor and the network outlet the neighbor PC it connects to
14. Refer to the exhibit. Based on the EIGRP configuration that is shown, what can the field engineer conclude about the EIGRP authentication between RouterA and RouterB?
• Authentication will fail because only one key is configured.
• Authentication will fail because the key chain names do not match.
• Authentication will succeed and EIGRP updates can be exchanged.
• Authentication will fail because the key chain names must match the router names.
15. Refer to the exhibit. The network administrator is configuring the port security feature on switch SWC. The administrator issued the command show port-security interface fa 0/2 to verify the configuration. What can be concluded from the output that is shown? (Choose three.)
• This port is currently up.
• The port is configured as a trunk link.
• There is no device currently connected to this port.
• Three security violations have been detected on this interface.
• Switchport mode for this interface is access-mode.
• Security violations will cause this port to shut down immediately.
16. During prototype testing, the network designer performs a test to determine the ability of the network to recover from a link or device failure. Which design goal is validated if the test is a success?
• scalability
• manageability
• availability
• security
17. Refer to the exhibit. A network technician is performing an initial installation of a new switch in the east wing. The technician removes the switch from the box, connects the switch to a router that supports the 10.255.254.0/24 network, and adds the configuration that is shown. The technician notifies the network administrator that the switch has been installed. The network administrator then attempts to telnet to the switch from host 192.168.0.1 to complete the switch configuration. What are the results of this attempt to telnet?
• The switch refuses the connection.
• The connection to the switch times out.
• The network administrator is prompted to login.
• The connection is established at the user EXEC prompt.
18. A small bookstore would like to offer wireless connectivity for customers with laptops. Which wireless components or devices will provide connectivity to the customers with the least possible cost to the bookstore?
• standalone access points
• wireless LAN controllers
• standalone lightweight access points
• lightweight access point and wireless LAN controller
19. Which three enhancements does IPv6 offer over IPv4? (Choose three.)
• easier implementation and configuration
• more effective IP security
• integrated IP mobility support
• simplified header information
• fewer reserved IP addresses
• eliminates the need to implement DHCP
20. Refer to the exhibit. What is the spanning-tree role of all the enabled interfaces of SW11?
• alternate
• backup
• designated
• root
21. What can be broadcast over the wireless network to help a guest user conveniently log in to the network and use wireless services?
• SSID
• VPN authentication
• WPA encryption
• VLAN parameters
• WEP keys
22. A network designer needs to perform prototype testing on a multisite network design to verify that failure domains are not larger than specified in the proposal. What would be the most efficient way to conduct this test?
• Use simulation software to check the IP addressing scheme for errors.
• Power down lab equipment and ping from one host to all other hosts.
• Disconnect links between lab equipment and ping end-to-end across the network.
• Delete devices or links in simulation software and ping from each host to all other hosts.
23. Refer to the exhibit. A pre-sales system engineer receives a diagram of the current network WAN connectivity from a customer. EIGRP is the routing protocol used on the WAN. Based on the default operation of EIGRP, which statement is true about the routing table on router R1?
• There is a single route to the 192.168.16.0/28 LAN via the use of the T1 connection.
• There is a single route to the 192.168.16.0/28 LAN via the use of the DSL connection.
• There is a single route to the 192.168.16.0/28 LAN via the use of the Metro Ethernet connection.
• EIGRP installs all three routes to the 192.168.16.0/28 LAN and load balances the traffic.
24. A local car dealership recently purchased an automobile financing company. The owner of the dealership issues a contract to NetworkingCompany to integrate the finance company network into the car dealership network. A router in the existing finance company network requires a password for both Telnet and console access, but no one remembers the passwords. What can the NetworkingCompany network technician do to obtain or change the passwords and gain access to the router?
• Use a TFTP server to download a new configuration file to the router that contains the passwords used on the car dealership network and then reload the router.
• Connect a rollover cable to the serial0/0 port of the router in order to bypass the password security, and use the show running-config command to obtain the passwords.
• Connect a console cable to the router, power cycle the router, issue a Ctrl-Break to enter ROM monitor mode, and change the configuration register to bypass the startup configuration.
• Connect the router to another Cisco router at the car dealership, use the show cdp neighbors command to obtain an IP address of the router, and use SSH to gain secure access in order to view the passwords.
25. An HWIC-4ESW, four-port switch module needs to be installed in a Cisco 1841 router that currently has a WIC-2T module in slot 0. What should the network technician do first?
• Turn off power to the router before installing the new module.
• Remove the WIC-2T module so that the new module can be installed in slot 0.
• Shut down all Fast Ethernet ports on the router until the switch module installation is complete.
• Configure the router Cisco IOS software to support an internal trunk link between the switch and router module.
26. Which of the following are characteristics of the core layer of the hierarchical network design model? (Choose three.)
• redundant paths
• high-level policy enforcement
• packet manipulation
• media transitions
• rapid forwarding of traffic
• no packet filtering
27. Refer to the exhibit. To demonstrate the importance of using contiguous IP addressing in a hierarchical network design, a network designer configures a prototype network with the use of a network simulator. Which EIGRP configuration commands should the designer enter on router R1 to correctly advertise a single summary route to router BR1 for the campus LAN?
28. A network administrator wants to load a configuration file from a TFTP server into NVRAM on a router. How should the administrator create a startup-config file in NVRAM that matches the contents of the configuration file on the TFTP server?
• Copy the configuration file from a TFTP server by using the command copy tftp startup-config.
• Copy the configuration file from a TFTP server by using the command copyfilename startup-config.
• Copy the file to RAM from a console connection by using the copy tftp running-config command. Then reload the router to use the new configuration.
• Paste the configuration file to the command line of the router while in global configuration mode. Then issue the copy startup-config running-config command.
29. Which two options are true about discontiguous networks? (Choose two.)
• The routing problems of discontiguous subnetworks can be resolved easily by using the RIPv2 default configuration.
• The default configuration of all classless routing protocols can prevent problems that are caused by discontiguous networks.
• Automatic route summarization can cause problems in a network with discontiguous subnets.
• A network that runs a classful routing protocol will have problems if discontiguous subnets exist in the network.
• Automatic route summarization helps resolve problems with a network with discontiguous subnetworks.
30. A technician is configuring a router for routing using EIGRP. The technician enters the EIGRP router configuration mode command:
• Router(config-router)# variance 3
• What is the effect of entering this command?
• It enables unequal cost load balancing.
• It adjusts the cost of all EIGRP routes to 3.
• It restricts the number of EIGRP feasible successor routes to 3.
• It enables EIGRP equal cost load balancing over a maximum of 3 routes.
31. Refer to the exhibit. The two switches that are shown will not form a trunk. What is the most likely cause of this problem?
• The native VLANs are improperly configured.
• All the hosts are on the same VLAN and a trunk is not needed.
• Both ports are set to dynamic auto.
• The trunk should be configured using the switchport mode access command.
32. Refer to the exhibit. A NetworkingCompany engineer is characterizing an existing network for a new customer. The engineer issues a show run command on the branch router to gather configuration information. What is the engineer able to determine as a result of viewing the output of this command?
• The branch office router has two routes to the main office LAN in the routing table.
• The default route for the branch office traffic is the router that is located at the main office.
• A connection through ISP-A will be used to reach the main office LAN if the Frame Relay network is unavailable.
• By using both the DSL and the Frame Relay connection, the branch office router will load balance traffic that is destined for the main office LAN.
33. A company has an IT staff that is not highly trained. What two features or technologies must the network designer identify as training needs in order for the staff to understand the basic operation of VPNs? (Choose two.)
• access control lists
• encryption algorithms
• Frame Relay configuration
• QoS operation
• tunneling protocols
• VLAN configuration
34. A customer has asked a network engineer to prototype the new IP addressing and summarization strategy for a large, multisite network implementation. Which tool is appropriate for testing the complete addressing scheme?
• Cisco SDM
• network simulation tool
• actual network equipment in a lab
• current network of the customer
35. A new WIC is installed in an available router slot. At what point during the router startup process does the router test the card for hardware problems?
• after the configuration from NVRAM is loaded into RAM
• when the bootstrap program is loaded into RAM
• after the configuration from NVRAM is loaded into ROM
• during the power-on self-test (POST)
36. Refer to the exhibit. What does the JAX router do with traffic that is destined for a web server with an IP address of 128.107.10.24?
• The traffic is sent out Serial 0/0/0.
• The router sends the traffic out all interfaces other than the one it came in on.
• A request is sent to neighboring routers for paths to the 128.107.0.0 network.
• The packets are placed into a queue until a better route is discovered via RIP
37. Which two weaknesses in a proposed network design can be identified by setting up a prototype network and performing tests on it? (Choose two.)
• congestion and inadequate bandwidth in the provider Frame Relay network
• costs of the proposed equipment exceed the customer budget
• potential points of failure that are critical to the network
• limited scalability that can present problems if the network grows faster than anticipated
• poor documentation of existing network topology and design
38. What are two advantages of using a simulation tool to test an IP addressing scheme? (Choose two.)
• Address configuration errors can be addressed using out-of-band connections.
• Placement of subnets and route summarization can be verified.
• An engineer can test physical security without leaving the office or lab.
• The addressing scheme can be tested for scalability.
• The effects of combining new with existing infrastructure can be measured.
• It provides real-time monitoring of a production network.
39. A high school uses a fractional T1 for Internet access. Wireless network access is provided in approximately 30 percent of the physical campus. Tests performed recently by the IT administrators indicate that the T1 circuit is operating at full capacity. The school district IT design team is asked to propose a network upgrade plan to address two business goals:
1. Provide wireless network connectivity for students in 90 percent of the physical campus.
2. Improve Internet access for all students and faculty.
The design team proposes to upgrade the memory of the core router that is connected to the ISP and to purchase additional wireless access points.
What can be concluded about the proposal that is presented by the design team?
• The proposal addresses only the goal to increase the wireless coverage.
• The proposal addresses only the goal to improve Internet access.
• The proposal addresses both business goals.
• The proposal addresses neither business goal.
40. A router has been removed from the network for maintenance. A new Cisco IOS software image has been successfully downloaded to a server and copied into the flash of the router. What should be done before placing the router back into service?
• Back up the new image.
• Copy the running configuration to NVRAM.
• Delete the previous version of the Cisco IOS software from flash
• Restart the router and verify that the new image starts successfully.
41. During a review of the proposed bill of materials, the NetworkingCompany account manager realizes that the systems engineer included a lower cost, less capable switch model for the access layer connectivity than was specified by the network designer. When questioned, the systems engineer responds that the switches recommended by the designer cannot be purchased within the budget limitations of the customer. Which action should the account manager take?
• Inform the customer that the project cannot be completed given the unreasonable budget constraints.
• Communicate any risks associated with the equipment substitution and obtain customer approval to proceed.
• Because the customer is probably aware that the budget limitations will require lower cost, less capable equipment, the account manager should do nothing.
• Because the customer is probably aware that the budget limitations will require lower cost, less capable equipment, the account manager should do nothing.
42. Which two events occur when the command RTA(config)# frame-relay map ip 10.1.1.1 22 is issued on a router? (Choose two.)
• DLCI 22 replaces the MAC address in the ARP table for entry 10.1.1.1.
• The remote router that is connected to network 10.1.1.0 enters 22 the DLCI for host 10.1.1.1.
• Inverse-ARP is used to add an entry for 10.1.1.1 into the Frame Relay map table using DLCI 22.
• A Layer 2 address is statically mapped to a Layer 3 address.
• RTA uses DLCI 22 to forward data to 10.1.1.1.
43. A new host needs to be connected to VLAN 1. Router RA is attached to the VTP trunk and configured as shown in the output contained in the graphic. Which of the following IP addresses should be assigned to this new host?
• 192.168.1.1 /26
• 192.168.1.11 /28
• 192.168.1.22 /28
• 192.168.1.33 /28
• 192.168.1.44 /28
• 192.168.1.55 /28
44. A NetworkingCompany engineer is on a support call resolving technical problems for a client network. After the issue is resolved, the engineer also provides a training session for the client's network support staff. Which position on the networking company team is this engineer performing?
• post-sales field engineer
• pre-sales engineer
• network designer
• account manager
45. Refer to the exhibit. What happens if the network administrator issues the commands shown when an ACL called Managers already exists on the router?
• The commands overwrite the Managers ACL that is already on the router.
• The commands are added at the end of the Managers ACL that is already on the router.
• The commands are added at the beginning of the Managers ACL that is already on the router.
• The network administrator receives an error stating that the ACL already exists.
46. What is the main purpose of the access layer in a hierarchically designed network?
• perform routing and packet manipulation
• supply redundancy and failover protection
• provide a high-speed, low-latency backbone
• serve as a network connection point for end-user devices
47. An engineer who is part of a sales team has been asked to select technologies and equipment capabilities to meet the network requirements of the prospective client. The engineer is also responsible for diagramming the placement and interconnection of various network devices and services. Which role is this engineer performing?
• post-sales field engineer
• account manager
• pre-sales engineer
• network designer
48. After an administrator installs a WIC into a two-slot router and issues the show version command, the newly installed interfaces in the WIC cannot be seen in the router output. What is a possible reason why the newly installed interfaces are not displayed in the router output?
• The interface is not configured properly.
• The WIC was put into slot 0 instead of slot 1.
• The WIC was not physically installed in the slot properly.
• The show version command cannot be used to validate the presence of installed interfaces.
49. Why would a designer choose a flat network over a hierarchical network design?
• to make it easier to filter unwanted traffic
• to be able to implement QoS
• to keep costs low in small networks
• to reduce the size of failure domains
50. A NetworkingCompany customer requires VPN connectivity for workers who must travel frequently. To support the VPN server, the customer router must be upgraded to a new Cisco IOS software version with the Advanced IP Services feature set. What should the field engineer do before copying the new IOS to the router?
• Set the router to load the new IOS image file directly from the TFTP server on the next reboot.
• Delete the currently installed IOS by using the erase flash: command, and reload the router
• Issue the show running-configuration command to determine the features of the currently installed IOS image file.
• Issue the show version and the show flash commands to ensure that the router has enough memory and file space to support the new IOS image.
51. A network designer must select a routing protocol for the network of a customer. The currently installed network contains both Cisco and non-Cisco routers, and there is no budget to replace them. The designer plans on implementing both VLSM and route summarization in the new network design. Which two protocols can provide the necessary functionality for this LAN? (Choose two.)
• RTP
• RSTP
• RIPv1
• RIPv2
• EIGRP
• OSPF
52. A configuration file needs to be loaded into the RAM of a router from a TFTP server. What should an administrator know before accomplishing this task?
• the router IP address and the operating system that is used by the TFTP server
• the TFTP server IP address and the name of the configuration file on the server
• the router IP address and the name of the router configuration file in NVRAM
• the TFTP server IP address and the router interface through which the file will be loaded
53. What are two suggested best practices to implement when securing network devices? (Choose two.)
• Configure VLAN 1 as the native VLAN.
• Disable unused ports on switches.
• Enable SSH and disable Telnet.
• Consolidate guest traffic and internal employee traffic.
• Ensure that logs are stored locally on routers.
54. After performing a password recovery operation on a router, the network field engineer copies the running configuration to the startup configuration and then reloads the router. The router boots successfully but immediately enters the setup mode. The engineer manually loads the startup configuration using the copy start run command and verifies that the configuration is correct and the passwords are reset. What can cause the router to enter setup mode rather than load the correct startup configuration file?
• The field engineer configured the incorrect passwords in the startup configuration file.
• The configuration register setting was not changed back to the correct value before the router was reloaded.
• The running configuration was not successfully saved to the startup configuration before the router was reloaded.
• During the password recovery process, the engineer should have copied the startup configuration to the running configuration before reloading the router.
55. The network designer recommends using RSTP in the design of a new data center. There are multiple redundant Layer 2 switches and links contained in the new design. What is the benefit of using RSTP in this situation over standard STP?
• Redundant links are not blocked.
• Routing tables converge more quickly.
• Spanning Tree convergence times are reduced.
• Fewer redundant links are required to maintain connectivity.
56. Refer to the exhibit. When creating an extended ACL to deny traffic from the 192.168.30.0 network destined for the Web server 209.165.201.30, where is the best location for applying the ACL?
• R3 Fa0/0 inbound
• R3 S0/0/1 outbound
• R2 S0/0/1 inbound
• ISP Fa0/0 outbound
57. What makes the Cisco EasyVPN application a useful tool for VPN implementation?
• It provides encryption algorithms unavailable in other systems.
• It ensures that remote workers actually use the VPN for connectivity.
• It simplifies the configuration tasks for the device that is used as the VPN server.
• It allows a greater variety of network devices to be used for VPN connections.
58. Which statement is true about implementing QoS in a network?
• Voice traffic automatically receives the highest priority.
• QoS guarantees enough bandwidth to every application.
• QoS increases actual bandwidth on a link to ensure voice quality.
• Voice traffic requires priority over other data traffic because it is sensitive to delays.
CCNA Discovery 4 - Module Final 1 Exam Version 4.0 Designing and Supporting Computer Networks
• Select the routing protocol to be configured.
• Assign an IP address and subnet mask to the interface.
• Update the ip host configuration information with the device name and new interface IP address.
• Configure the routing protocol with the new network IP address.
• Configure the routing protocol with the new interface IP address and subnet mask.
• Configure the routing protocol in use on all other enterprise routers with the new network information.
2. A customer reports connectivity problems to an ISP technician. Upon questioning the customer, the technician discovers that all network applications are functioning except for FTP. What should the technician suspect is the problem?
• misconfigured firewall
• bad port on switch or hub
• misconfigured IP addressing on the customer’s workstation
• wrong DNS server configured on the customer’s workstation
• wrong default gateway configured on the customer’s workstation
3. A user reports being unable to access the Internet. The help desk technician employs a bottom-up approach to troubleshooting. The technician first has the user check the patch cable connection from the PC to the wall, and then has the user verify that the NIC has a green link light. What will the technician have the user do next?
• Enter an IP address into the WWW browser address bar to see if DNS is at fault.
• Use traceroute to identify the device along the path to the ISP that may be at fault.
• Verify the IP address, subnet, and gateway settings using ipconfig on the PC.
• Connect to the user home router to check firewall settings for blocked TCP ports.
4. Refer to the exhibit. The graphic shows the output of a command issued on router RTB. According to the output, what two statements are true of router RTB? (Choose two.)
• The router is connected to a router named Boise.
• Router RTB is connected to a Cisco 1841 router.
• Router RTB is directly connected to two other routers.
• The IP address of the router interface connected to router RTB is 192.168.2.6.
• The RTB router is connected to two Cisco devices by Fast Ethernet links.
5. What is used by a routing protocol to determine the best path to include in the routing table?
• Convergence time
• Default distance
• Metric
• Type of router
6. A Catalyst 2960 switch has been taken out of storage to be used as a temporary replacement for another switch that needs to be repaired. About a minute after the switch has started, the SYST LED on the front of the switch transitions from blinking green to amber. What is the meaning of the amber SYST LED?
• The switch has no configuration file in NVRAM.
• The switch has failed POST and must be sent for service.
• The switch is functioning properly.
• The switch is in half-duplex mode.
7. A company is developing an Internet store for its website. Which protocol should be used to transfer credit card information from customers to the company web server?
• FTPS
• HTTP
• HTTPS
• WEP2
• TFTP
8. Which two protocols allow network devices to report their status and events to a centralized network management device? (Choose two.)
• Syslog
• Telnet
• HTTP
• HTTPS
• SNMP
9. What are two purposes of DNS? (Choose two.)
• to dynamically assign IP addressing information to network hosts
• to simplify the administration of host and default gateway addressing on client computers
• to assign TCP port numbers to hosts as part of the data transfer process
• to resolve human-readable domain names to numeric IP addresses
• to replace the static HOSTS file with a more practical dynamic system
10. The show ip route command was executed on one of the routers shown in the graphic and the following output was displayed:
C 192.168.4.0/24 is directly connected, Serial0/0
R 192.168.5.0/24 [120/1] via 192.168.4.2, 00:00:19, Serial0/0
R 192.168.1.0/24 [120/2] via 192.168.3.1, 00:00:20, Serial0/1
R 192.168.2.0/24 [120/2] via 192.168.3.1, 00:00:20, Serial0/1
C 192.168.3.0/24 is directly connected, Serial0/1
From which router was this command executed?
• A
• B
• C
• D
11. Given the network 192.168.25.0 shown in the graphic, which subnet mask would accommodate the number of hosts in each subnet?
• 255.255.0.0
• 255.255.224.0
• 255.255.255.0
• 255.255.255.224
• 255.255.255.240
• 255.255.255.248
12. A hacker attempts to reach confidential information that is stored on a server inside the corporate network. A network security solution inspects the entire packet, determines that it is a threat, and blocks the packet from entering the inside network. Which security measure protected the network?
• an IDS
• an IPS
• Anti-X software
• a host-based firewall
13. When customers use credit cards to make purchases at a small business, a modem is heard dialing a telephone number to transfer the transaction data to the central office. What type of WAN serial connection is in use?
• leased line
• packet switched
• circuit switched
• point-to-point
14. Refer to the exhibit. Which combination of cables and symbols is correct?
• A - crossover, B - straight-through, C - straight-through
• A - crossover, B - rollover, C - straight-through
• A - straight-through, B -crossover, C - straight-through
• A - straight-through, B -straight-through, C - straight-through
• A - straight-through, B - straight-through, C - crossover
• A - rollover, B - straight-through, C - straight-through
15. Refer to the exhibit. Which IP addresses could be assigned to the hosts in the diagram? (Choose two.)
• 192.168.65.31
• 192.168.65.32
• 192.168.65.35
• 192.168.65.60
• 192.168.65.63
• 192.168.65.64
16. Refer to the exhibit. Which type of UTP cable should be used to connect Host A to Switch1?
• rollover
• console
• crossover
• straight-through
17. Refer to the exhibit. A NOC technician at an ISP enters the command shown. What are two reasons to use this command? (Choose two.)
• to map the path to 192.168.1.7
• to test reachability to 192.168.1.7
• to locate connectivity problems along the route to 192.168.1.7
• to identify the ISPs that interconnect the NOC with the remote host with the address 192.168.1.7
• to measure the time that packets take to reach 192.168.1.7 and return to the technician’s workstation
18. What is the most commonly used exterior routing protocol?
• BGP
• RIP
• OSPF
• EIGRP
19. What minimum configurations must be set on a host to allow a request to be sent to http://www.cisco.com/? (Choose four.)
• DNS server
• WINS server
• IP address
• NetBIOS
• subnet mask
• default gateway
20. A small tire retailer requires a low-cost WAN connection to its headquarters in order to manage its inventory and process customer sales in real time. Which WAN connection type is best suited to its needs?
• Sonet
• T3
• dialup
• DSL
• leased line
21. Refer to the graphic. Which command will configure a static route on Router A to direct traffic from LAN A that is destined for LAN C?
• RouterA(config)# ip route 192.168.4.0 255.255.255.0 192.168.5.2
• RouterA(config)# ip route 192.168.4.0 255.255.255.0 192.168.3.2
• RouterA(config)# ip route 192.168.5.0 255.255.255.0 192.168.3.2
• RouterA(config)# ip route 192.168.3.0 255.255.255.0 192.168.3.1
• RouterA(config)# ip route 192.168.3.2 255.255.255.0 192.168.4.0
22. A user reports being able to access the Internet but not being able to download e-mail from the mail server at the ISP. What should the user check on the user workstation?
• the POP3 and SMTP server settings in the e-mail application
• the patch cable connections at the back of the workstation and at the wall plate
• the DHCP settings in the operating system
• the IP address, mask, and default gateway values
• the NIC drivers
23. In an IPv4 environment, what information is used by the router to forward data packets from one interface of a router to another?
• destination network address
• source network address
• source MAC address
• well known port destination address
24. What is one purpose of the TCP three-way handshake?
• sending echo requests from the source to the destination host to establish the presence of the destination
• determining the IP address of the destination host in preparation for data transfer
• requesting the destination to transfer a binary file to the source
• synchronizing sequence numbers between source and destination in preparation for data transfer
25. A network technician is using a network management station to gather data about the performance of devices and links within the ISP. Which application layer protocol makes this possible?
• SNMP
• FTP
• DHCP
• SMTP
26. How do port filtering and access lists help provide network security?
• They prevent specified types of traffic from reaching specified network destinations.
• They alert network administrators to various type of denial of service attacks as they occur.
• They prevent viruses, worms, and Trojans from infecting host computers and servers.
• They enable encryption and authentication of confidential data communications.
27. Refer to the exhibit. The network administrator has configured the RTA and RTB interfaces. In order to allow hosts that are attached to RTA to reach the server that is attached to RTB, a static route from RTA to the server LAN and a default route from RTB back to RTA need to be configured. Which two commands will the administrator use to accomplish these tasks on the two routers? (Choose two.)
• RTA(config)# ip route 10.16.10.5 255.255.255.252 10.16.10.6
• RTA(config)# ip route 0.0.0.0 0.0.0.0 10.16.10.6
• RTA(config)# ip route 10.16.10.96 255.255.255.252 10.16.10.6
• RTB(config)# ip route 10.16.10.6 255.255.255.248 10.16.10.6
• RTB(config)# ip route 0.0.0.0 0.0.0.0 S0/0/1
• RTB(config)# ip route 0.0.0.0 0.0.0.0 10.16.10.6
28. Refer to the exhibit. Which two sets of commands are required to configure passwords for all management ports on a Catalyst 2960 switch? (Choose two.)
• ALSwitch(config)# interface vlan 1
ALSwitch(config-if)# password cisco
ALSwitch(config-if)# login
• ALSwitch(config)# line vty 0 4
ALSwitch(config-line)# password cisco
ALSwitch(config-line)# login
• ALSwitch(config)# line vty 0 15
ALSwitch(config-line)# password cisco
ALSwitch(config-line)# login
• ALSwitch(config)# enable secret class
ALSwitch(config)# enable password cisco
• ALSwitch(config)# interface fa0/1
ALSwitch(config-if)# password cisco
ALSwitch(config-if)# no shutdown
• ALSwitch(config)# line cons 0
ALSwitch(config-line)# password cisco
ALSwitch(config-line)# login
29. The command copy tftp running-config has been entered on the router. What will this command do?
• copy the configuration in RAM to a server
• copy the configuration file from a server to RAM
• copy the configuration file in NVRAM to RAM
• copy the configuration file in NVRAM to a server
• copy the configuration file from a server to NVRAM
30. Refer to the exhibit. The network administrator needs to configure the router with a name. Which command will the administrator use to configure the router name?
• Router# ip hostname Boise
• Router# enable hostname Boise
• Router(config-line)# name Boise
• Router(config)# hostname Boise
• Router(config)# ip hostname Boise
31. How many host addresses may be assigned on each subnetwork when using the 130.68.0.0 network address with a subnet mask of 255.255.248.0?
• 30
• 256
• 2046
• 2048
• 4094
• 4096
32. Refer to the exhibit. A new branch office has been added to the corporate network and a new router is to be installed to allow branch office users to access the database server at headquarters. How should the serial 0/0/0 interface of the new branch office router be configured to connect to the headquarters router?
• branch_23(config-if)# ip address 192.168.5.19 255.255.255.240
branch_23(config-if)# no shutdown
• branch_23(config-if)# encapsulation hdlc
branch_23(config-if)# ip address 192.168.5.25 255.255.255.240
branch_23(config-if)# no shutdown
• branch_23(config-if)# encapsulation ppp
branch_23(config-if)# no shutdown
• branch_23(config-if)# encapsulation ppp
branch_23(config-if)# ip address 192.168.5.33 255.255.255.240
• branch_23(config-if)# encapsulation ppp
branch_23(config-if)# ip address 192.168.5.21 255.255.255.240
branch_23(config-if)# no shutdown
33. Which two statements are true about the use of the debug ip rip command on a Cisco router? (Choose two.)
• The debug ip rip command displays RIP routing activity in real time.
• The debug ip rip command can be issued at the user EXEC configuration mode.
• The debug ip rip command displays a combination of the information that is displayed by the show ip route and show ip protocols commands.
• Because of router processor usage, the debug ip rip command should be used only when necessary.
• The debug ip rip command should be used instead of the show ip route command whenever possible.
34. A ping 192.1.1.20 command is issued on workstation A to determine if workstation B can be reached. What events will occur if this command is successful? (Choose two.)
• The router will block the ping request message.
• The router will reply to the echo request with a proxy ping response.
• Workstation A will send a UDP ping request message to workstation B.
• Workstation B will send a UDP ping reply message to workstation A.
• Workstation A will send an ICMP echo request message to workstation B.
• Workstation B will send an ICMP echo reply message to workstation A.
35. Which type of address is 192.168.17.111/28?
• host address
• network address
• broadcast address
• multicast address
36. Refer to the exhibit. The network administrator of the building in the graphic needs to choose the type of cable best suited to add ServerB to the network. Which cable type is the best choice?
• STP
• UTP
• coaxial
• fiber optic
37. A network administrator is asked to design a system to allow simultaneous access to the Internet for 250 users. The ISP for this network can only supply five public IPs. What can be used to accomplish this task?
• routable translation
• dynamic translation
• static translation
• port address translation
38. Refer to the exhibit. The network administrator uses the command below to configure a default route to the ISP network :
RTB(config)# ip route 0.0.0.0 0.0.0.0 10.1.1.6
A ping issued from the ISP is successful to router RTB. However, ping echo request packets arrive at a host that is attached to the Fa0/0 interface of RTB, and the replies do not make it back to the ISP router. What will fix this problem?
• The ISP must be configured to forward packets from the 192.168.1.0 network.
• The ip route command needs to be edited so that the next hop address is 10.1.1.5.
• The ip route command needs to be edited so that the 192.168.1.1 address is the next hop address.
• The ip route command should be removed from the RTB router configuration.
39. How does TCP ensure the reliable transfer of data?
• If data segments are not received from the source, the destination requests that the segments be resent.
• If an acknowledgment of the transmitted segments is not received from the destination in a predetermined amount of the time, the source resends the data.
• TCP uses the SYN-ACK portion of the three-way handshake to ensure that all data has been received.
• The TCP Protocol Interpreter process verifies the transmitted data at source and destination.
40. Which subnet masks could be used when subnetting a Class B IP address? (Choose two.)
• 255.255.255.240
• 255.255.192.0
• 255.255.0.0
• 255.192.0.0
• 240.0.0.0
• 255.0.0.0
41. Which two commands ensure that any password that permits access to the privileged EXEC mode is not shown in plain text when the configuration files are displayed? (Choose two.)
• Router(config)# enable secret cisco
• Router(config)# enable cisco
• Router(config)# encryption-password all
• Router(config)# enable login encrypted
• Router(config)# enable password encryption
• Router(config)# service password-encryption
42. Refer to the exhibit. The network shown is connected using services from the same ISP. How will the Fohi router dynamically learn routes to the 192.168.16.16/28, 192.168.16.32/28, and 192.168.16.64/28 subnetworks?
• with BGP
• with a static route
• with a directly connected route
• with an interior routing protocol
43. Refer to the exhibit. The network administrator needs to configure the Fa0/0 interface of RTB so that hosts from RTA can connect to the server that is attached to RTB. Which two commands will the administrator use to accomplish this task? (Choose two.)
• RTB# ip address 192.168.102.98 255.255.255.248
• RTB(config-if)# ip address 192.168.102.99 255.255.255.252
• RTB(config)# ip address 192.168.102.97 255.255.255.252
• RTB(config)# no shutdown
• RTB(config-if)# no shutdown
• RTB(config-if)# ip address 192.168.102.97 255.255.255.252
44. Refer to the exhibit. Which two statements describe the data conversation shown? (Choose two.)
• The data conversation was started by the HTTP application process running on the client.
• The data conversation is identified by TCP port 80 on the client.
• The user started the data conversation by sending an e-mail.
• The IP address of the Internet server is 192.168.17.43.
• The Internet server will send data to port 8547 on the client.
45. What is true regarding the differences between NAT and PAT?
• PAT uses the word “overload” at the end of the access-list statement to share a single registered address.
• Static NAT allows an unregistered address to map to multiple registered addresses.
• Dynamic NAT allows hosts to receive the same global address each time external access is required.
• PAT uses unique source port numbers to distinguish between translations.
46. What is the purpose of the routing process?
• to encapsulate data that is used to communicate across a network
• to select the paths that are used to direct traffic to destination networks
• to convert a URL name into an IP address
• to provide secure Internet file transfer
• to forward traffic on the basis of MAC addresses
47. What are three characteristics of the TCP protocol? (Choose three.)
• exchanges datagrams unreliably
• is used to send IP error messages
• forces the retransmission of unacknowledged packets
• creates a virtual session between end-user applications
• carries the IP address of the destination host in the TCP header
• is responsible for breaking messages into segments and reassembling them at their destination
48. After an unsuccessful ping to the local router, the technician decides to investigate the router. The technician observes that the lights and fan on the router are not operational. In which layer of the OSI model is the problem most likely occurring?
• transport
• network
• data link
• physical
49. Why are port numbers included in the TCP header of a segment?
• to indicate the correct router interface that should be used to forward a segment
• to identify which switch ports should receive or forward the segment
• to determine which Layer 3 protocol should be used to encapsulate the data
• to enable a receiving host to forward the data to the appropriate application
• to allow the receiving host to assemble the packet in the proper order
50. How does a router know of paths to destination networks? (Choose two.)
• inspection of the destination IP address in data packets
• ARP requests from connected routers
• manual configuration of routes
• updates from other routers
• DHCP information broadcasts
• updates from the SMTP management information base
CCNA Discovery 4 - Module 9 Exam Version 4.0 Designing and Supporting Computer Networks
VPN cannot be configured and established between the branch location and the main office. It is
determined that the router at the main office does not have enough memory and does not have
the correct Cisco IOS version image to support the VPN features. To prevent this delay, this
problem should have been identified and corrected during which part of the design project?
• the preparation of the business case
• the prioritizing of the technical goals
• the characterization of the existing network
• the implementation of the approved design
2. Which occurrence would indicate a failure of the design phase?
• The incorrect model switches were ordered.
• There is no customer signoff for task completion.
• New requirements are identified after implementation begins.
• The new network capacity is inadequate to support required traffic.
3. AAA Financial Services Company is performing implementation planning
for a core switch upgrade. The company has 200 financial software programmers that work
billable hours during the week. They have critical, scheduled money transfer transmissions that
occur at hourly intervals every night. There are two, two-hour long IT maintenance windows
scheduled for software upgrades, one on Saturday and one on Sunday. The bank advertises
online banking as available 24 hours on business days and 21 hours on the weekends. However,
a network upgrade that is necessary to replace some switches is expected to take four hours.
Because of rack constraints, this time includes three hours to remove the old switches before the
new switches can be installed and one hour to test the logical configuration. How should the
implementation scheduling be handled
• Defer the software upgrades. Use the Saturday window to perform the hardware
installation. Use the Sunday window to perform the logical testing.
• Coordinate and publish a separate four-hour downtime during Friday to perform the
complete switch installation and testing process. Use the Saturday and Sunday windows to
correct any outage problems after the Friday window.
• Coordinate and publish two, four-hour downtimes incorporating the published Saturday
and Sunday windows. Defer any software upgrades until the new network is proven to be working
correctly with the old software. Use the Sunday window as a fallback scheduling period if there
are problems necessitating backing out of the Saturday window
• Coordinate and publish an eight-hour downtime incorporating the Saturday window. This
will allow four hours for installation and logical testing, one hour for troubleshooting and decision,
and three hours to roll back to the previous configuration if the new switching cannot pass the
logical testing. Defer any software upgrades until the new network is proven to be working
correctly with the old software.
4. Which two statements describe factors that influence the layout of aproposal? (Choose two.)
• Proposal layouts are required to use sans serif typefaces.
• A specific proposal layout is followed when one is specified in the RFP.
• A designer chooses the layout if a written RFP does not specify an outline.
• The software that is used to create the proposal dictates the proposal layouts.
• Proposal layouts are required to use a format that is designed by the network engineer.
5. What two items are typically included in the executive summary of aproposal? (Choose two.)
• project scope summary
• high-level implementation plan
• quotes for all needed equipment
• technical requirements for the design
• emphasis on the benefits that meet the goals of the customer
6. A customer has just taken delivery of a Cisco 2811 router and Catalyst
3560 switch. Included with the purchase is the SMARTnet Service. Which two resources are
included with SMARTnet Service? (Choose two.)
• signature file updates
• technical support from TAC
• maintenance releases for OS
• software application major releases
• software application maintenance and minor releases
7. The NetworkingCompany team is tasked to prepare an implementation
schedule for a customer. It is determined that the new firewalls and wireless controllers that are
specified in the design cannot be delivered and installed within the agreed upon time frame. The
NetworkingCompany informs the customer of the problem. What two options can the
NetworkingCompany team take to ensure the success of the project? (Choose two.)
• plan to add additional staff and resources to shorten the installation time after the new
equipment is delivered
• eliminate redundancy in the design to reduce the amount of equipment that is needed
• renegotiate a new time frame with the customer to accommodate the delay
• delay the installation of the security devices and controllers until a later time
• redesign the network to use only readily available equipment and software
8. NetworkingCompany completes the installation of a network upgrade for
a retail customer. All of the onsite tests complete successfully and the customer IT staff approves
the results of the tests. The manager of the retail store contacts NetworkingCompany to inform
the company that the store will not pay for the upgrade until a recently purchased software
package is installed and tested on the network. Which two items that are contained in the
proposal can the account manager refer to when discussing this issue with the store manager?(Choose two.)
• the project scope
• the bill-of-material
• the project timeline
• the terms and conditions
• the business goals of the customer
• the evaluation of the current network
9. Which proposal section describes the intended routing protocol, security mechanisms, and addressing for the planned network?
• logical design
• physical design
• executive summary
• implementation plan
• network requirements
10. Which two items will a systems engineer include in an implementation plan? (Choose two.)
• references to design documents
• the business goals of the customer
• diagrams of the existing traffic flows
• the steps to install and test the network
• cost of each network device and component
11. In order to finalize a project proposal, an account manager of a
networking company creates the terms and conditions section. What are two clauses that should
be included in this section? (Choose two.)
• cost summary
• installation steps
• change order procedures
• problem resolution process
• maintenance contract quotation
12. Included in a Bill of Materials (BOM) for a SOHO wired implementation is
a Cisco 2811 router, Catalyst 2560 switch, four PCs, three laptops, and a networked printer.
Wireless LAN capability will be implemented on this network. Which two equipment types must be
added to the BOM to implement this request? (Choose two.)
• DNS server
• LAN switch
• DHCP server
• wireless access points
• wireless NICs
13. Which statement describes a phased installation into an existing network?
• A phased installation generally takes less time and expense than a green-field installation.
• A phased installation is not suitable for large, multi-site network installations or upgrades.
• A phased installation requires detailed planning in order to avoid disruption of user services.
• A phased installation involves building an entire replacement network and migrating users over to it.
14. A company informs the account manager that the installation of a new
edge router at the customer remote branch location cannot be done at the scheduled time
because of a large order that the branch office needs to complete. As a result, the end date of the
project must be adjusted to accommodate the additional time. What is the action should the
account manager take?
• Cancel the order for the new edge router.
• Work with designer to redesign the branch network.
• Instruct the technician to complete the install of the router at on the date in the contract.
• Adjust the timeline documentation to show the company how the delay will affect the project completion date.
15. A network installation team is assigned to replace all core switches in an existing data center. No other upgrades are planned. Which kind of installation is this?
• a new installation
• a fork-lift installation
• a phased installation
• a green field installation
16. What service is provided Cisco standard warranty?
• software application maintenance
• replacement of defected hardware
• next business day delivery of replacement parts
• access to the Cisco Technical Assistance Center (TAC) 24 hours a day, 7 days a week
17. An upgraded version of the Cisco IOS has been purchased. However, the CD arrived damaged. How will this loss be covered?
• a hardware warranty
• a software warranty
• the Cisco SMARTnet Service
• an additional service contract
18. What are two important guidelines when creating a slide presentation for
a meeting with a customer? (Choose two.)
• Use all capital letters on words and phrases when possible for added emphasis.
• Provide varied background graphics to enhance viewer interest.
• Use contrasting colors for background and text to aid visibility.
• Change fonts frequently to denote differences in subject matter.
• Use bulleted text to lead the discussion.
19. A Cisco 1841 router has been purchased without an agreement for
SMARTnet Service. What two items are guaranteed under the standard warranty? (Choose two.)
• access to TAC
• replacement of defective physical media
• advanced replacement of hardware parts
• access to a renewable standard warranty contract
• under normal use, replacement of defective hardware
20. Upon completion of a proposal, a network design team must sell their
ideas to two key stakeholders. Who are these two stakeholders? (Choose two.)
• customers
• licensing boards
• cabling contractors
• internal management
• project implementation team
CCNA Discovery 4 - Module 8 Exam Version 4.0 Designing and Supporting Computer Networks
• Both the username and password are case sensitive.
• Neither the username nor the password is case sensitive.
• The username is case sensitive but the password is not case sensitive.
• The password is case sensitive but the username is not case sensitive.
2. Refer to the exhibit. The complete configuration of a Frame Relay interface on the Chicago router is shown. How does the Chicago router know which DLCI is mapped to the IP address of the remote router?
• DE
• CIR
• FECN
• Inverse ARP
3. A network administrator issued the command show frame-relay pvc. The response from the router shows the status of a PVC as deleted. What is the reason for this status?
• The DLCI is using the wrong LMI type.
• The DLCI is usable but has little activity.
• The DLCI is programmed in the switch but the circuit is not usable.
• The DLCI configured on the CPE device does not match the DLCI.
4. Which three algorithms can be used to encrypt user data in an IPSec VPN framework? (Choose three.)
• 3DES
• AES
• Diffie-Hellman
• DES
• ESP
• SHA
5. What is used to identify the path to the next frame-relay switch in a Frame Relay network?
• CIR
• DLCI
• FECN
• BECN
6. Which statement identifies the IP address design for subinterfaces that are configured for a Frame Relay network?
• Multipoint configurations require the IP address of each subinterface on each router to be in its own subnet.
• Multipoint configurations require IP addresses for each subinterface on each router to be a part of the same subnet.
• Point-to-point configurations require IP addresses for each subinterface on each router to be a part of the same subnet.
• Point-to-point configurations do not require IP addresses on each subinterface on each router.
• Multipoint configurations do not require IP addresses on each subinterface on each router.
7. An IP address has been assigned to the S0/0/0 interface of a new Cisco router. The administrator wishes to quickly test basic connectivity with the serial interface of an adjoining Cisco router via the use of the default WAN protocol. Which WAN protocol will be used for this test?
• PPP
• Frame Relay
• DSL
• HDLC
• ATM
8. Refer to the exhibit. What is placed in the address field of a frame that will travel from the Orlando office to the DC office?
• MAC address of the Orlando router
• MAC address of the DC router
• 192.168.1.25
• 192.168.1.26
• DLCI 100
• DLCI 200
9. Which flag is set by a Frame Relay switch to inform the receiving station that congestion was experienced?
• BECN
• DE
• FECN
• FCS
10. When identifying VPN requirements for endpoint users, what care must be taken to protect the network when remote users log in from unsecured public locations?
• Ensure that the user has VPN client software that allows access to all internal resources.
• Ensure that the VPN user traffic does not slow down internally sourced traffic on the network.
• Ensure that there are no obstacles to hamper the users from accessing all internal resources.
• Ensure that remote users can only access network resources that are appropriate to their job function.
11. Which two statements are true regarding VPN security? (Choose two.)
• Users may only establish a VPN connection from secure locations and never from public areas.
• Users that connect to a network through a VPN do not have to log in to resources on the network.
• Users that connect to a network through a VPN are are considered trusted users on the network.
• Users may establish a VPN connection from unsecure locations such as airports and hotel lobbies.
• Users that connect to a network through a VPN should have access to all the resources on the network.
12. IPSec operates at which layer of the OSI model?
• application
• network
• datalink
• transport
13. Which mechanism is used to create a floating static route?
• administrative distance
• cost
• hop count
• passive interface
14. What is one benefit of using a network simulation software package?
• The network design can be tested before it is actually implemented.
• Simulation software packages are quickly updated to support new network technologies and devices.
• Simulated devices have the same features as actual devices, allowing for detection of all potential problems.
• Software packages can simulate all possible network traffic conditions, giving an accurate prediction of network performance.
15. Two directly connected routers are able to ping each other through the Serial 0/0/0 interfaces. A network administrator changes the encapsulation on one router to PPP, and the other is left at the default value. What statement would appear in the output of the show interfaces command issued on one of the routers?
• Serial 0/0/0 is up, line protocol is up
• Serial 0/0/0 is down, line protocol is down
• Serial 0/0/0 is up, line protocol is down
• Serial 0/0/0 is down, line protocol is up
• Serial 0/0/0 is administratively down, line protocol is down
16. Refer to the exhibit. What statement is true about the configuration shown for R2?
• R2 is configured as the Frame Relay switch.
• R2 is configured as the main site in a multipoint Frame Relay WAN prototype.
• R2 is configured as the main site in a point-to-point Frame Relay WAN prototype.
• R2 is configured as a remote site in a multipoint Frame Relay WAN prototype.
• R2 is configured as a remote site in a point-to-point Frame Relay WAN prototype.
17. What tool can help ease the configuration of VPN servers on routers?
• Cisco SDM
• PIX Firewall
• Cisco VPN Concentrator
• Cisco Adaptive Security Appliances
18. What statement correctly defines the purpose of the split horizon rule?
• marks the route unreachable in a routing update that is sent to other routers
• prevents routers from advertising a network through the interface from which the update came
• prevents routers from accepting higher cost routes to networks previously marked as inaccessible before the timer expires
• limits the number of hops a packet can traverse through the network before it should be discarded
19. Which is true regarding Frame Relay LMI?
• There are three LMI types standardized by ANSI, ITU-T, and Cisco.
• Routers at each end of a Frame Relay virtual circuit must always use the same LMI type.
• The LMI type must be manually configured.
• The only function of LMI is to verify the connection between the router and the Frame Relay switch.
20. Which two statements about split tunnels are true? (Choose two.)
• Local LAN printing will use the VPN tunnel.
• The traffic load on the VPN server is increased.
• Traffic to the corporate network will be encrypted.
• There is a reduced security risk to the corporate network.
• All traffic travels across the VPN tunnel from client to server.
• Traffic to public web sites and general Internet navigation is not encrypted.
21. Refer to the exhibit. Which router command is used to associate a Layer 2 address with the corresponding Layer 3 address?
• Miller(config-if)#frame-relay map ip 172.16.150.1 110
• Miller(config-if)#frame-relay map ip 172.16.150.1 112
• Miller(config-if)#frame-relay map ip 172.16.150.2 110
• Miller(config-if)#frame-relay map ip 172.16.150.2 112
22. Which two statements about split tunnels are true? (Choose two.)
• Local LAN printing will use the VPN tunnel.
• The traffic load on the VPN server is increased.
• Traffic to the corporate network will be encrypted.
• There is a reduced security risk to the corporate network.
• All traffic travels across the VPN tunnel from client to server.
• Traffic to public web sites and general Internet navigation is not encrypted.
23. Which two components are key elements when implementing a VPN? (Choose two.)
• concentration
• encryption
• prioritization
• compression
• encapsulation
24. Which PVC status suggests that the router recognizes the DLCI configured on its interface as being present on the Frame Relay switch, but the PVC associated with the DLCI is not capable of end-to-end communication?
• active
• deleted
• inactive
• idle
25. What are two components a network designer considers when planning a VPN? (Choose two.)
• encryption algorithm for privacy and security
• encapsulation protocol to use when creating the VPN tunnel
• switching technology to optimize VPN WAN throughput
• tunneling technology for guarding against data corruption
• routing protocol on the gateway for optimum performance
CCNA Discovery 4 - Module 7 Exam Version 4.0 Designing and Supporting Computer Networks
• Appendix
• Test Procedures
• Test Description
• Actual Results and Conclusions
• Anticipated Results and Success Criteria
2. Refer to the exhibit. After all the interfaces have stabilized, what is the spanning-tree state of all the enabled interfaces of SW11?
• discarding
• forwarding
• learning
• listening
3. Refer to the exhibit. What two measures can be taken to address the areas of weakness circled in the network design? (Choose two.)
• Provide redundant connections to all end users.
• Add another core switch to increase redundancy.
• Add a switch in the server block connecting the server farm to each core switch.
• Add an additional switch to the DMZ and direct links from the new switch to the core switches.
• Provide a redundant firewall router connecting to a second ISP, the core switches, and the DMZ.
4. Refer to the exhibit. A network designer creates a test plan that includes the specification shown. In which section of the test plan would this specification be found?
• Test Description
• Test Procedures
• Design and Topology Diagram
• Actual Results and Conclusions
• Anticipated Results and Success Criteria
5. A network designer needs to determine if a proposed IP addressing scheme allows efficient route summarization and provides the appropriate amount of scalability to a design. What is useful for validating a proposed hierarchical IP addressing scheme?
• NBAR
• a pilot network
• a route summary
• a network simulator
• a physical topology ma
6. Why is it important to record baseline measurements of a prototype network?
• Test results show security weaknesses after the baseline tests are run.
• The baseline is the point at which the network is operating at its fullest potential.
• Baseline measurements define a point at which network traffic has exceeded the designed capabilities of the network.
• Test results are compared to the baseline to see how the test conditions increase processor use or decrease available bandwidth.
7. Refer to the exhibit. During prototype testing, verification of VLAN connectivity is being performed. Based on the information shown, what command produced the output?
• show spanning-tree
• show interfaces trunk
• show cdp neighbors
• show interfaces
• show ip interface brief
8. Refer to the exhibit. A network technician is performing an initial installation of a new switch in the east wing. The technician removes the switch from the box, makes the connections to the network, and adds the configuration shown. The technician notifies the network administrator that the switch has been installed. When the network administrator at the home office attempts to telnet to the switch from host 192.168.0.1, the connection fails. What action should the network technician take?
• Add an enable password to the switch.
• Add a default gateway to the switch configuration.
• Configure the switch with an IP access list to permit the host connection.
• Enable the physical interfaces of the switch with the no shutdown command.
9. Refer to the exhibit. During prototype testing of the Cisco network shown, connectivity must be verified. Assuming all connections are working and CDP is enabled on all devices and interfaces, on which device was the command issued?
• R1
• S1
• R3
• S2
• R5
• S3
10. A network engineer has decided to pilot test a portion of a new network design rather than rely on a prototype for proof-of-concept. What are two advantages of pilot testing a design concept?(Choose two.)
• The test network experiences real-world network traffic.
• Users within the enterprise are not affected by the test.
• Network response can be tested in unplanned and unpredictable situations.
• Unlikely failure conditions can be conveniently tested.
• Network response can be tested in a highly controlled simulated environment.
11. What OSI model Layer 2 security measure can a network engineer implement when prototyping network security?
• a firewall at the network edge
• port security at the access design layer
• port security at the distribution design layer
• IP access control lists at the access design layer
12. Refer to the exhibit. Why are interfaces Fa0/11, Fa0/23, and Fa0/24 not shown in this switch output?
• Interfaces Fa0/11, Fa0/23, and Fa0/24 are trunks.
• Interfaces Fa0/11, Fa0/23, and Fa0/24 are shutdown.
• Interfaces Fa0/11, Fa0/23, and Fa0/24 are blocking.
• Interfaces Fa0/11, Fa0/23, and Fa0/24 failed diagnostics
13. How do designers decide which network functions need to be included in the prototype test?
• They select the functions that align with the business goals.
• They select the functions that occur at the network core.
• They select the functions that do not exist in the existing network.
• They select the functions from a list of generic network operations.
14. Refer to the exhibit. A network administrator has been given the task of creating a design for a temporary classroom building that is to be set up outside an overcrowded school. In testing the prototype, it is found that the student PC cannot ping the teacher PC. All the switch interfaces are active and connected properly, as is interface Fa0/0 of the router. Given that only the commands shown have bee added to the router configuration, what is the source of the problem?
• The IP settings on the student PC are incorrect.
• The default gateway on the teacher PC is misconfigured.
• The router Fa0/0 interface has not been configured as a VLAN trunk.
• The Fa0/0 physical interface has not been configured with an IP address and subnet mask.
• The administrator forgot to configure a routing protocol to allow the ping packets to reach the teacher PC subnet.
15. Refer to the exhibit. The redundant paths are of equal bandwidth and EIGRP is the routing protocol in use. Which statement describes the data flow from Server to PC2?
• EIGRP load balances across the R3 to R1 and R3 to R2 links.
• EIGRP load balances across the R1 to Switch3 and R2 to Switch3 paths.
• EIGRP load balances across the Switch1 to Switch3 and Switch1 to Switch2 paths.
• EIGRP does not load balance in this topology.
16. Switch port Fa0/24 was previously configured as a trunk, but now it is to be used to connect a host to the network. How should the network administrator reconfigure switch port Fa0/24?
• Use the switchport mode access command from interface configuration mode.
• Enter the switchport nonegotiate command from interface configuration mode.
• Administratively shut down and re-enable the interface to return it to the default.
• Enter the no switchport mode trunk command in interface configuration mode.
• Use the switchport access vlan vlan number command from interface configuration mode
• to remove the port from the trunk and add it to a specific VLAN.
17. In the router command encapsulation dot1q 10, what does the number 10 represent?
• the metric used for a particular route
• the number of the VLAN associated with the encapsulated subinterface
• the priority number given to the device for the election process
• the number that must match the Fast Ethernet subinterface number
• the number used to program the router for unequal cost path load balancing
18. What Rapid Spanning Tree Protocol (RSTP) state is given to the forwarding port elected for every switched Ethernet LAN segment?
• root
• backup
• alternate
• designated
19. Refer to the exhibit. During prototyping, Layer 2 functionality is being tested. Based on the output shown, which two pieces of information can be determined? (Choose two.)
• Switch1 is the root bridge.
• Interface Fa0/2 on Switch1 has no role in the operation of spanning tree.
• Interface Fa0/2 on Switch1 is the alternate port used to reach the root bridge.
• Based on the entries in the "Role" column, it can be concluded that RSTP has been implemented.
• Interface Fa0/1 on Switch1 is the forwarding port selected for the entire spanning-tree topology.
20. Refer to the exhibit. The users on the 192.168.10.192 network are not allowed Internet access. The network design calls for an extended ACL to be developed and tested. Where should the ACL be placed for the least effect on other network traffic?
• inbound on Fa0/0 of R3
• outbound on Fa0/0 of R3
• inbound on Fa0/1 of R3
• outbound on Fa0/1 of R3
• inbound on Fa0/1 of R2
• outbound on S0/0 of R2