Review Questions


1.

Which of the following statements is true regarding traffic shaping?

  1. Traffic shaping eliminates bottlenecks by throttling back traffic volume at the source end.

  2. Traffic shaping only works at Layer 3.

  3. Traffic shaping cannot be used with Frame Relay or Switched Multimegabit Data Service (SMDS).

  4. Traffic shaping only works on Cisco switch technology.

aaccess lists, along with the frame relay becn mechanism, can be used for traffic shaping to help eliminate network bottlenecks.

2.

Which of the following might be logged when IP access list logging is enabled? (Choose all that apply.)

  1. Source address

  2. Source port

  3. Destination address

  4. Destination port

  5. Time

  6. Protocol

  7. Access list line number

  8. Access list number

a, b, c, d, e, f, hall items are logged either to the console or to a syslog server for later review except for access list line number.

3.

Which of the following are reasons why access lists are used? (Choose all that apply.)

  1. To improve security

  2. To reduce routing protocols

  3. To save bandwidth

  4. To speed convergence

a, cthe primary uses of access lists are traffic control. security and bandwidth are methods of traffic control.

4.

Which of the following will allow IP devices to simply ARP for remote devices and receive the MAC address of a default gateway?

  1. IPX Watchdog ARP

  2. Proxy ARP

  3. Spoofed ARP

  4. DDR

  5. None of the above

bproxy arp can minimize the need for client reconfiguration of default router addresses.

5.

Which of the following would be most useful on a subnet without a DHCP server that required DHCP services?

  1. IPX watchdog spoofing

  2. Responding to IPX GNS requests

  3. Proxy ARP

  4. IP helper address

  5. None of the above

dip helper addresses can be configured on the cisco router and allow for central services network designs.

6.

In which of the following situations would compression be most useful?

  1. Insufficient bandwidth

  2. Time-sensitive traffic

  3. Multiple routing protocols

  4. High router CPU utilization

atraffic compression is best applied to wan links where bandwidth is at a premium.

7.

Which of the following are valid types of compression?

  1. Header compression

  2. Data compression

  3. Payload compression

  4. Link compression

a, c, dheader, payload, and link compression are supported by the cisco ios. header compression only affects the ip header, payload compression only affects the data, and link compression works on both the ip header and data.

8.

When using numbered access lists, which range of numbers is used for extended IP access lists?

  1. 0–99

  2. 100–199

  3. 800–899

  4. 900–999

bextended ip access lists are numbered using numbers between 100 and 199.

9.

To which type of traffic does weighted fair queuing assign the highest priority?

  1. SNA

  2. IPX

  3. High volume

  4. Low volume

dweighted fair queuing assigns the highest priority to low-volume traffic.

10.

When should weighted fair queuing be used?

  1. To provide priority to interactive traffic

  2. To provide priority to file transfers

  3. To allow all traffic to be forwarded

  4. A and C

  5. A and B

ainteractive traffic is time-sensitive and is sensitive to delay.

11.

Where is the most effective place to implement queuing?

  1. High-speed LAN links

  2. T1/E1 links only

  3. Any WAN link whose capacity is 2Mbps and slower

  4. All interfaces

cqueuing is most effective on wan links.

12.

When should priority queuing be used?

  1. When traffic has a hierarchical order of importance

  2. When delay doesn’t matter

  3. When all traffic must be forwarded

  4. None of the above

apriority queuing guarantees that higher priority traffic will get sent first.

13.

When should custom queuing be used?

  1. When traffic has a hierarchical order of importance

  2. To overcome the possible problem that is introduced with priority queuing

  3. When trying to provide bandwidth sharing for all traffic

  4. When delay is not important

bcustom queuing allows the network designer to classify traffic at the router interface.

14.

Which step is not part of configuring custom queuing?

  1. Defining the custom queuing filter

  2. Assigning a default queue

  3. Configuring the transfer rate per queue

  4. Assigning a priority queue list to the interface

ddefining the filter, assigning the queue, and configuring the transfer rate are all configurations required to configure custom queuing.

15.

Which statement best describes weighted fair queuing?

  1. The queues are based on the source and destination of the packets.

  2. Bandwidth is shared among all traffic types, giving priority to low-volume traffic.

  3. Bandwidth is shared among high-priority traffic only.

  4. The queues use FIFO.

bweighted fair queuing assigns a higher priority to low-volume traffic.

16.

Which statement best describes priority queuing?

  1. It processes all queues in a round-robin fashion.

  2. The queues are based on the destination address of the packet.

  3. The queues are based on the traffic type; all queues are processed equally.

  4. The queues are based on the traffic type; the highest priority traffic is always processed first.

dtraffic type (i.e., high-priority), will be processed through the queue first.

17.

Which of the following statements is true regarding traffic shaping?

  1. Frame Relay can use traffic shaping to adapt dynamically to available bandwidth using the BECN mechanism.

  2. IP can use traffic shaping to adapt dynamically to available bandwidth using the BECN mechanism.

  3. Traffic shaping does not work with Layer 2 technologies.

  4. Traffic shaping processes packets based on the destination address.

aframe relay uses the becn notification method to dynamically accomplish traffic shaping.

18.

In which of the following situations would RSVP be useful? (Choose all that apply.)

  1. Insufficient bandwidth

  2. Time-sensitive traffic

  3. Multiple routing protocols

  4. High router CPU utilization

a, brsvp is used by end stations and routers to guarantee the passage of time-sensitive traffic.

19.

What is the maximum router CPU utilization for enabling compression?

  1. 10 percent

  2. 100 percent

  3. 50 percent

  4. 65 percent

dcisco recommends that compression be disabled on the router if cpu utilization is greater than 65 percent.

20.

Named access lists are available since which IOS revision?

  1. 10.2

  2. 10.3

  3. 11.2

  4. 11.3

cnamed access lists have been available since ios release 11.2.

Answers

1.

A Access lists, along with the Frame Relay BECN mechanism, can be used for traffic shaping to help eliminate network bottlenecks.

2.

A, B, C, D, E, F, H All items are logged either to the console or to a Syslog server for later review except for access list line number.

3.

A, C The primary uses of access lists are traffic control. Security and bandwidth are methods of traffic control.

4.

B Proxy ARP can minimize the need for client reconfiguration of default router addresses.

5.

D IP helper addresses can be configured on the Cisco router and allow for central services network designs.

6.

A Traffic compression is best applied to WAN links where bandwidth is at a premium.

7.

A, C, D Header, payload, and link compression are supported by the Cisco IOS. Header compression only affects the IP header, payload compression only affects the data, and link compression works on both the IP header and data.

8.

B Extended IP access lists are numbered using numbers between 100 and 199.

9.

D Weighted fair queuing assigns the highest priority to low-volume traffic.

10.

A Interactive traffic is time-sensitive and is sensitive to delay.

11.

C Queuing is most effective on WAN links.

12.

A Priority queuing guarantees that higher priority traffic will get sent first.

13.

B Custom queuing allows the network designer to classify traffic at the router interface.

14.

D Defining the filter, assigning the queue, and configuring the transfer rate are all configurations required to configure custom queuing.

15.

B Weighted fair queuing assigns a higher priority to low-volume traffic.

16.

D Traffic type (i.e., high-priority), will be processed through the queue first.

17.

A Frame Relay uses the BECN notification method to dynamically accomplish traffic shaping.

18.

A, B RSVP is used by end stations and routers to guarantee the passage of time-sensitive traffic.

19.

D Cisco recommends that compression be disabled on the router if CPU utilization is greater than 65 percent.

20.

C Named access lists have been available since IOS release 11.2.




CCDA. Cisco Certified Design Associate Study Guide
CCDA: Cisco Certified Design Associate Study Guide, 2nd Edition (640-861)
ISBN: 0782142001
EAN: 2147483647
Year: 2002
Pages: 201

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net