Review Questions


1.

Traditional voice networks typically include which of the following devices or protocols? (Choose all that apply.)

  1. VoATM

  2. PBX switches

  3. Centrex switches

  4. H.323 application support

b, ctraditional voice networks typically include pbx and centrex switches. they also include tie-lines and trunks.

2.

Subscriber signaling is used between which voice network devices?

  1. PBX and trunk line

  2. Trunk line and tie-line

  3. PBX to PBX

  4. PBX and telephone

dsubscriber signaling is used between the pbx and the telephone.

3.

Centrex lines offer which additional services beyond those of a PBX switch? (Choose all that apply.)

  1. Call transfer

  2. Three-way calling

  3. Closed-user dialing plans

  4. Signaling System 7

a, b, ccentrex lines offer additional services such as call transfer, three-way calling, and closed-user plans.

4.

Which of the following methods best handles delay in VoIP networks?

  1. Addressing

  2. QoS

  3. Routing

  4. Hardware

bdelay in voip networks is handled by qos.

5.

What is the responsibility of the codec in voice networks? (Choose all that apply.)

  1. It encrypts the voice traffic.

  2. It decrypts the voice traffic.

  3. It compresses the voice traffic.

  4. It decompresses the voice traffic.

c, dthe codec is responsible for compressing and decompressing voice traffic. codec choice determines the transfer rate.

6.

Which of the following best describes variable delay?

  1. Delay

  2. Jitter

  3. QoS

  4. Packet loss

bjitter is defined as variable delay.

7.

Which solution can help smooth voice traffic that has been affected by jitter?

  1. Codec

  2. IP telephony

  3. Dejitter buffer

  4. None of the above

cdejitter buffers can receive packets at an irregular rate and send them out at a more consistent rate.

8.

Cisco’s SAFE architecture blueprint design model addresses what network requirements?

  1. Performance

  2. Equipment

  3. Security

  4. Administration

cthe purpose of cisco s safe architecture blueprint design model is to address the network s security requirements.

9.

Which devices would you expect to find in the Corporate Internet module of a SAFE-designed network? (Choose all that apply.)

  1. End-user workstations

  2. Intranet servers

  3. VPN access

  4. Internet services

c, dcisco s safe architecture design blueprint recommends that vpn access and internet services be placed in the corporate internet module.

10.

Which devices would you expect to find in the Campus functional area of a SAFE-designed network? (Choose all that apply.)

  1. E-Commerce servers

  2. Management servers

  3. VPN access

  4. Intranet servers

b, dcisco s safe architecture design blueprint recommends that management and intranet servers, along with end-user workstations, be placed in the campus functional area.

11.

Where would you typically find a firewall in a SAFE-designed network?

  1. Internet Connectivity module

  2. Campus

  3. Service Provider Edge

  4. None of the above

acisco s safe architecture design blueprint recommends that firewalls be placed in the internet connectivity module.

12.

Which devices of a network are targets for security exploitation? (Choose all that apply.)

  1. Hubs

  2. Servers

  3. Routers and switches

  4. Applications

b, c, dservers, routers, switches, and applications are all targets for security exploitation. hubs are not generally a risk because of their lack of management features.

13.

What can be placed on a host or network to act like an alarm system if security issues should arise?

  1. TFTP server

  2. IDS

  3. FTP server

  4. Syslog server

balthough a syslog server is typically used to log security data, only the ids actually acts like an alarm system.

14.

When designing security for the E-Commerce module, which of the following are common countermeasures to typical security issues in this module? (Choose all that apply.)

  1. IDS

  2. Firewalls

  3. Host hardening

  4. DMZ networks

  5. All of the above

  6. None of the above

ee-commerce modules are similar to internet connectivity modules; both employ ids, firewalls, host hardening, and dmz networks.

15.

Which type of server can be used to log security-related information from network devices?

  1. TFTP

  2. Telnet

  3. FTP

  4. Syslog

da syslog server is the preferred server to log security-related information from network devices and idss.

16.

When capturing security-related information to a Syslog server, which protocol provides accurate time reporting?

  1. NTP

  2. FTP

  3. IDS

  4. HTTP

athe ntp (network time protocol) provides for accurate time reporting when configured on each network device and a central server.

17.

Which of the following is an outsourced service?

  1. PSTN

  2. Centrex

  3. PBX

  4. QoS

bcentrex is a service purchased, generally on a monthly fee, to provide services commonly provided by a pbx.

18.

Which SAFE technology is most effective at preserving data confidentiality?

  1. IDS

  2. Encryption

  3. Authentication

  4. QoS

bencryption can help keep data confidential.

19.

What is the first step in any secure network security design?

  1. Cisco’s SAFE architecture blueprint

  2. Security policy

  3. Education

  4. Manager’s approval

bevery secure network security design starts with a security policy relevant to the organization.

20.

This type of network attack can render a host unreachable by valid requests.

  1. IDS

  2. DoS

  3. SNMP

  4. Flood

ba dos (denial-of-service) attack can render a host unreachable by valid requests and cause network slowdowns.

Answers

1.

B, C Traditional voice networks typically include PBX and Centrex switches. They also include tie-lines and trunks.

2.

D Subscriber signaling is used between the PBX and the telephone.

3.

A, B, C Centrex lines offer additional services such as call transfer, three-way calling, and closed-user plans.

4.

B Delay in VoIP networks is handled by QoS.

5.

C, D The codec is responsible for compressing and decompressing voice traffic. Codec choice determines the transfer rate.

6.

B Jitter is defined as variable delay.

7.

C Dejitter buffers can receive packets at an irregular rate and send them out at a more consistent rate.

8.

C The purpose of Cisco’s SAFE architecture blueprint design model is to address the network’s security requirements.

9.

C, D Cisco’s SAFE architecture design blueprint recommends that VPN access and Internet services be placed in the Corporate Internet module.

10.

B, D Cisco’s SAFE architecture design blueprint recommends that management and intranet servers, along with end-user workstations, be placed in the Campus functional area.

11.

A Cisco’s SAFE architecture design blueprint recommends that firewalls be placed in the Internet Connectivity module.

12.

B, C, D Servers, routers, switches, and applications are all targets for security exploitation. Hubs are not generally a risk because of their lack of management features.

13.

B Although a Syslog server is typically used to log security data, only the IDS actually acts like an alarm system.

14.

E E-Commerce modules are similar to Internet Connectivity modules; both employ IDS, firewalls, host hardening, and DMZ networks.

15.

D A Syslog server is the preferred server to log security-related information from network devices and IDSs.

16.

A The NTP (Network Time Protocol) provides for accurate time reporting when configured on each network device and a central server.

17.

B Centrex is a service purchased, generally on a monthly fee, to provide services commonly provided by a PBX.

18.

B Encryption can help keep data confidential.

19.

B Every secure network security design starts with a security policy relevant to the organization.

20.

B A DoS (denial-of-service) attack can render a host unreachable by valid requests and cause network slowdowns.




CCDA. Cisco Certified Design Associate Study Guide
CCDA: Cisco Certified Design Associate Study Guide, 2nd Edition (640-861)
ISBN: 0782142001
EAN: 2147483647
Year: 2002
Pages: 201

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net