You are on page 1of 8

Which two solutions would an enterprise IT department use to facilitate secure intranet access for remote workers?

(Choose two.)
VPN
NAT
user authentication
client firewall software
packet sniffing

Which functional component of the Cisco Enterprise Architecture is responsible for hosting internal servers?
enterprise campus
enterprise edge
service provider edge
building distribution

What are two important characteristics or functions of devices at the Enterprise Edge? (Choose two.)
providing Internet, telephone, and WAN services to the enterprise network
providing a connection point for end-user devices to the enterprise network
providing high-speed backbone connectivity with redundant connections
providing intrusion detection and intrusion prevention to protect the network against malicious activity
providing packet inspection to determine if incoming packets should be allowed on the enterprise network

Which statement describes the difference between an enterprise WAN and an enterprise extranet?
An enterprise WAN is designed to interconnect local LANs, while an enterprise extranet is designed to interconnect remote branch offices.
An enterprise WAN is designed to interconnect branch offices, while an enterprise extranet is designed to give access to external business
partners.
An enterprise WAN is designed to provide remote access for its teleworkers, while an enterprise extranet is designed to provide Internet
connectivity for the enterprise.
An enterprise WAN is designed to provide Internet connectivity for the enterprise, while an enterprise extranet is designed to provide remote
access to the enterprise network for teleworkers.

A business consultant must use Internet websites to research a report on the e-business strategies of several firms and then electronically deliver the
report to a group of clients in cities throughout the world. Which two teleworker tools can the consultant use to accomplish this project? (Choose two.)
VoIP
VPN
HTTP
Telnet
email

What is the main purpose of the Access Layer in a hierarchically designed network?
performs routing and packet manipulation
supplies redundancy and failover protection
provides a high-speed, low-latency backbone
serves as a network connection point for end-user devices

What type of traffic flow is always considered to be external?


file sharing traffic
system updates
company e-mail
Internet bound traffic
transaction processing

Which protocol and process could be implemented on a network to ensure that a telecommuter can attend a training presentation via the use of VoIP
and still experience uninterrupted data streams and quality conversations?
TCP and QoS
UDP and QoS
TCP and queuing
UDP and VPN
TCP and VPN

2 testas

A network manager wants to have processes in place to ensure that network upgrades do not affect business operations. What will the network
manager create for this purpose?
business security plan
business continuity plan
service level agreement
network maintenance plan

What is the demarcation?


physical point where the ISP responsibility ends and the customer responsibility begins
physical location where all server farm connections meet before being distributed into the Core
point of entry for outside attacks and is often vulnerable
point of entry for all Access Layer connections from the Distribution Layer devices

3 testas
Which statement best describes adaptive cut-through switching?
The switch initially forwards all traffic using cut-through switching and then changes to store-and-forward switching if errors exceed a threshold
value.
The switch initially forwards all traffic using cut-through switching and then changes to fast-forward switching if errors exceed a threshold value.
The switch initially forwards all traffic using cut-through switching and then temporarily disables the port if errors exceed a threshold value.
The switch initially forwards all traffic using store-and-forward switching and then changes to cut-through switching if errors exceed a threshold
value.

Which two items will prevent broadcasts from being sent throughout the network? (Choose two.)
bridges
routers
switches
VLANs
hubs

What is the purpose of VTP?


maintaining consistency in VLAN configuration across the network
routing frames from one VLAN to another
routing the frames along the best path between switches
tagging user data frames with VLAN membership information
distributing BPDUs to maintain loop-free switched paths

Which three must be used when a router interface is configured for VLAN trunking? (Choose three.)
one subinterface per VLAN
one physical interface for each subinterface
one IP network or subnetwork for each subinterface
one trunked link per VLAN
a management domain for each subinterface
a compatible trunking protocol encapsulation for each subinterface
Refer to the exhibit. The switches are connected with trunks within the same VTP management domain. Each switch is labeled with its VTP mode. A
new VLAN is added to Switch3. This VLAN does not show up on the other switches. What is the reason for this?
VLANs cannot be created on transparent mode switches.
Server mode switches neither listen to nor forward VTP messages from transparent mode switches.
VLANs created on transparent mode switches are not included in VTP advertisements.
There are no ports assigned to the new VLAN on the other switches.
Transparent mode switches do not forward VTP advertisements.

Which statement is true about the port security feature in a Cisco switch?
It disables unused ports.
It filters network traffic based on host MAC addresses.
It executes a shutdown on the port, based on Layer 4 port numbers.
It disables Telnet traffic because the username and password are transmitted in plain text.

Refer to the exhibit. What is the effect of the commands in the exhibit?
There will be no effect unless the command switchport port-security mac-address mac-addr is added.
The first device that is connected to port fa0/6 will be allowed to transmit data. Any other devices that connect to it will shut down the port.
The first device that is connected to port fa0/6 will be allowed to transmit data. The learned MAC will be kept even after the switch is restarted.
The first device that is connected to port fa0/6 will be allowed to transmit data. Any other devices that connect to it will be allowed to transmit
data and a warning will be sent to the syslog server.

Which statement describes the function of a VLAN Management Policy Server (VMPS)?
VMPS provides easy organization of static VLAN membership.
VMPS provides flexible dynamic assignments of VLAN membership.
VMPS provides a backup service for static VLAN membership configuration.
VMPS provides the easiest deployment of VLANs regardless of the number of switches involved.
Which statement describes a difference between STP and RSTP?
RSTP is proprietary while STP is defined by IEEE.
RSTP defines four port states while STP defines five port states.
When a topology changes, RSTP reconfigures the spanning tree in less than 1 second.
STP is more commonly used in large switched enterprise networks that require faster recovery.

4 testas

When running NAT, what is the purpose of address overloading?


limit the number of hosts that can connect to the WAN
allow multiple inside addresses to share a single global address
force hosts to wait for an available address
allow an outside host to share inside global addresses

Which two IP addresses represent the network and broadcast addresses for the network that includes host 192.168.100.130/27? (Choose two.)
network 192.168.100.0
network 192.168.100.128
network 192.168.100.130
broadcast 192.168.100.157
broadcast 192.168.100.159
broadcast 192.168.100.255

What two advantages does CIDR provide to a network? (Choose two.)


reduced routing table size
dynamic address assignment
automatic route redistribution
reduced routing update traffic
automatic summarization at classful boundaries

What two pieces of information can be determined from the host IP address of 192.168.2.93/29? (Choose two.)
The number of bits borrowed for the subnetwork is 5.
The number of usable hosts for each subnetwork is 14.
The /29 translates to a subnet mask of 255.255.255.248.
The network address for this host is 192.168.2.80/29.
The broadcast address for this network is 192.168.2.94/29.
Which two addresses could be used as private IP addresses in a LAN? (Choose two.)
10.10.1.200
172.31.100.254
172.64.10.10
192.165.2.1
192.169.1.1

How does a router keep track of which inside local address is used when NAT overload is configured?
The router adds an additional bit to the source IP address and maintains a separate table.
The router modifies the QoS field.
The router uses TCP or UDP port numbers.
The router uses a manual entry that is created and maintained in the database of the router.

Refer to the exhibit. What solution would solve the discontiguous network problem and prevent the routers from advertising misleading networks?
Turn automatic summarization off and manually summarize the routes at the classful boundary.
Allow automatic summarization to send the most optimal route.
Change the routing protocol to a classless routing protocol, such as RIPv1.
Change the LAN addressing schemes on R2 and R3 to use VLSM since it supports discontiguous networks.

A network technician has been asked to implement a hierarchical addressing scheme. Which two statements could describe the hierarchical
addressing scheme structure to the technician? (Choose two.)
A hierarchical addressing structure logically groups networks into smaller subnetworks.
A hierarchical network operates most efficiently without a specific address structure.
Route summarization will operate efficiently in a hierarchical network without a hierarchical addressing scheme.
A hierarchical addressing structure can simplify network management and improve scalability.
An effective hierarchical addressing scheme must begin with a classful network at the distribution layer.

You might also like