|
1. | Which of the following best describes the function of proxy ARP?
|
|
2. | Which of the following Cisco products introduces policy-based network management?
|
|
3. | When gathering technical data for a customer’s existing network, which sources should be considered? (Choose all that apply.)
|
|
4. | Which of the following is true regarding VLSM?
|
|
5. | CiscoWorks2000 Service Level Manager includes software for which of the following? (Choose all that apply.)
|
|
6. | You have an access list numbered 50. What type of access list is it?
|
|
7. | Which of the following is usually supported at the access layer of the Cisco hierarchical model?
|
|
8. | If your network is currently congested and you are using only hubs in your network, what would be the best solution to decrease congestion on your network?
|
|
9. | SNMP version 1 defines which of the following PDU types?
|
|
10. | By default, how often are IP RIP updates broadcast?
|
|
11. | During which post-design phase should equipment be purchased and configured?
|
|
12. | At which layer of the OSI model does segmentation of a data stream happen?
|
|
13. | Traditional voice architecture includes which of the following technologies? (Choose all that apply.)
|
|
14. | Assuming a default mask, which two pieces of information can be derived from the IP address 172.16.25.11?
|
|
15. | Which of the following should have standardized network names? (Choose all that apply.)
|
|
16. | What does the term “Base” indicate in 100Base-TX?
|
|
17. | Tie-lines are responsible for connecting which voice network devices?
|
|
18. | PDUs are carried in which of the following protocols?
|
|
19. | What is the decimal and hexadecimal equivalent of the binary number 10101010?
|
|
20. | Which of the following are Cisco proprietary routing protocols? (Choose all that apply.)
|
|
21. | Which LAN switch method runs a CRC on every frame?
|
|
22. | What WAN protocol would you use to create a WAN that provides simultaneous transmission of voice, video, and data?
|
|
23. | Which of the following describes the Physical layer connection between a DTE (router) and a DCE (CSU/DSU) device?
|
|
24. | When meeting with the customer to evaluate their needs and expectations, which of the following are items to review? (Choose all that apply.)
|
|
25. | What is the OSPF Router ID (RID)? (Choose two.)
|
|
26. | Which of the following statements is true with regard to bridges?
|
|
27. | If you want to view the DLCI numbers configured for your Frame Relay network, which command or commands should you use? (Choose all that apply.)
|
|
28. | Which of the following should not be included in the design solution section of a design document?
|
|
29. | What is the broadcast address of the subnet address 172.16.99.99 255.255.192.0?
|
|
30. | When configuring IPX, which of the following are valid methods to discover existing IPX network addresses? (Choose all that apply.)
|
|
31. | Which of the following best describe a use for DDR? (Choose all that apply.)
|
|
32. | Which of the following describes the function of the OSPF DR?
|
|
33. | Which of the following are true? (Choose two.)
|
|
34. | When gathering administrative data for a customer’s existing network, which sources should be considered?
|
|
35. | Which sections should be included in a design document or in a response to a customer’s RFP? (Choose all that apply.)
|
|
36. | Which of the following best describes pinhole congestion?
|
|
37. | You have an access list numbered 150. What type of access list is it?
|
|
38. | Regarding Frame Relay, which of the following statements is true?
|
|
39. | What is the purpose of NAT?
|
|
40. | Which of the following should not be included in your design document’s executive summary?
|
|
Answers
1. | C Proxy ARP means that a particular machine (such as a router) responds to ARP requests for hosts other than itself. This can be used to make a router disappear from the workstations on a network and eliminate configuration of the workstations. For more information, see Chapter 5. |
2. | B Cisco’s Netsys Baseliner software allows you to view a graphical representation of your network and troubleshoot problem areas by generating topologies and reports that are based on the actual configuration files. For more information, see Chapter 11. |
3. | A, B Technical data is normally gathered from the customer’s IT department and network analysis tools. Technical analysis tools can provide information on protocols in use, collision rates, broadcast rates, packet flows, segment utilization, and other network-related issues. For more information, see Chapter 4. |
4. | D Variable-length subnet masks (VLSMs) help optimize available address space and specify a different subnet mask for the same network number on various subnets. For more information, see Chapter 7. |
5. | A, B CiscoWorks2000 Service Level Manager includes service- level agreement (SLA) and service-level contract (SLC) software that allows for monitoring and reporting. For more information, see Chapter 13. |
6. | A Cisco router standard IP access lists are in the range of 1–99 when configured with the IOS and can filter only on source IP addresses. For more information, see Chapter 10. |
7. | D The distribution layer of the Cisco three-layer hierarchical design model should include separate collision domains with the implementation of switches. This is also the layer where most workstation and server access occurs. For more information, see Chapter 5. |
8. | B Layer 2 switches break up collision domains and decrease congestion on your network. For more information, see Chapter 2. |
9. | A, B, E SNMPv1 only allows for GetRequest, GetResponse, and Trap messages. The latest version of SNMP, version 3, supports the security features message integrity and authentication. For more information, see Chapter 11. |
10. | A IP RIP updates are broadcast at 30-second intervals, creating additional overhead in some cases. For more information, see Chapter 7. |
11. | A Cisco recommends that you purchase and configure equipment during the prototype implementation phase. For more information, see Chapter 12. |
12. | D The Transport layer receives large data streams from the upper layers and breaks these up into smaller pieces called segments. For more information, see Chapter 1. |
13. | A, B Traditional voice architecture typically does not include the VoIP technologies such as Voice over Frame Relay (VoFR) or Voice over ATM (VoATM). For more information, see Chapter 13. |
14. | B, E 172.16.25.11 is a class B address, and the host portion is 25.11. For more information, see Chapter 3. |
15. | A, B, C While usernames might be standardized, it is rare for users themselves to have standardized names. For more information, see Chapter 7. |
16. | D Baseband signaling is a technique that uses the entire bandwidth of a wire when transmitting. Broadband wiring uses many signals at the same time on a wire. These are both considered an Ethernet signaling type. For more information, see Chapter 1. |
17. | C Tie-lines are used for interconnecting PBX switches found in traditional voice network architectures. For more information, see Chapter 13. |
18. | B Protocol data units (PDUs) are supported by the User Datagram Protocol (UDP). For more information, see Chapter 11. |
19. | C To take a binary number and convert it into decimal, you just need to add the values of each bit that is a 1. The values of 10101010 are 128, 32, 8, and 2. 128 + 32 = 160 + 8 = 168 + 2 = 170, so the decimal answer is 170. Hexadecimal is a base 16 numbering system. The base of hexadecimal is 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 0A, 0B, 0C, 0D, 0E, 0F—16 digits total from which to create all the numbers you’ll ever need. So, if 1010 in binary is 10, then the hexadecimal equivalent is A. Since you have 1010 and 1010, the answer to this question is AA. For more information, see Chapter 3. |
20. | C, E IGRP and EIGRP were developed by Cisco to meet the scalability design and multiple routed protocol needs of those protocols lacking these features—RIP and OSPF. For more information, see Chapter 8. |
21. | B Store-and-forward LAN switching checks every frame for CRC errors. It has the highest latency of any of the LAN switch types. For more information, see Chapter 2. |
22. | C Asynchronous Transfer Mode (ATM) provides simultaneous transmission of voice, video, and data. For more information, see Chapter 6. |
23. | C EIA/TIA 232, V.35, X.21, and HSSI are all examples of Physical layer specifications. For more information, see Chapter 1. |
24. | F All of the listed options must be considered when evaluating a customer’s needs and expectations during a network design. For more information, see Chapter 4. |
25. | B, C The OSPF RID of a router is always the highest (closest to 255.255.255.255) active IP address on a router, unless a loopback interface is used, which will always be the RID regardless of the IP address set on the loopback interface. For more information, see Chapter 9. |
26. | D When a LAN switch is first brought online, it does not contain entries in its forward/filter table; they’re stored in RAM. When a frame passes through the switch, the switch copies the frame’s MAC address information, mapping the MAC address to the port on which the frame was received. Since the destination port is not known, the switch forwards the frame out every port, excluding the port on which the frame was received. For more information, see Chapter 2. |
27. | B, E You can use the show running-config and show frame-relay pvc commands to see the DLCI numbers configured on your router. For more information, see Chapter 6. |
28. | A Business constraints should be identified and specified in the design requirements section of a design document. For more information, see Chapter 12. |
29. | B First start with a 256 mask or, in this case, 256 – 192 = 64. 64 is the first subnet; 128 is the second subnet. This host is in the 64-subnet range; the broadcast address is 127.255, and the valid host range is 64.1–127.254. For more information, see Chapter 3. |
30. | A, D The Novell administrator defines the IPX network number when configuring the NetWare server. The config command displays the IPX network number along with other IPX address configuration. For more information, see Chapter 7. |
31. | A, C Dial-on-demand routing (DDR) is a technique that allows a router to automatically initiate and end a circuit-switched session per the requirements of the sending station. By mimicking keep-alives, the router fools the end station into treating the session as active. DDR permits routing over ISDN or telephone lines via a modem or external ISDN terminal adapter. For more information, see Chapter 5. |
32. | A The OSPF designated router (DR) is responsible for controlling and sending updates to all other OSPF-configured routers. For more information, see Chapter 9. |
33. | C, D ICMP must be implemented by all TCP/IP hosts, and ARP is used to find a hardware address from a known IP address. For more information, see Chapter 3. |
34. | C Administrative data is normally gathered from company management and includes such things as the company’s business goals, corporate structure, geographic locations, current and future staffing, and policies and politics that may affect the new network design. For more information, see Chapter 4. |
35. | A, B, C, D, E Cisco recommends that a design document or a response to a customer’s Request for Purchase (RFP) include these five items. For more information, see Chapter 12. |
36. | D Some routing protocols base cost on the number of hops to a particular destination. These routing protocols load-balance over unequal bandwidth paths as long as the hop count is equal. Once a slow link becomes saturated, however, higher capacity links cannot be filled. For more information, see Chapter 5. |
37. | B Cisco router extended IP access lists are in the range of 100–199 when configured with the IOS and can filter on source, destination address, destination port number, and protocol type. For more information, see Chapter 10. |
38. | C Internet Engineering Task Force (IETF) is the encapsulation method used when connecting Frame Relay to non-Cisco routers. For more information, see Chapter 6. |
39. | A Network Address Translation (NAT) is an algorithm instrumental in minimizing the requirement for globally unique IP addresses, permitting an organization whose addresses are not all globally unique to connect to the Internet regardless by translating those addresses into globally routable address space. For more information, see Chapter 7. |
40. | E The executive summary should be written and presented to management and typically does not include details such as a topology map. For more information, see Chapter 12. |
|