Assessment Test


1.

Which of the following best describes the function of proxy ARP?

  1. The host pings the destination site to discover which router to use.

  2. The host ARPs the router’s IP address so that it can find the router’s MAC address.

  3. The host ARPs the destination’s IP address, and the router responds with its (the router’s) MAC address.

  4. The router ARPs the host to see if it needs to communicate with the internetwork.

cproxy arp means that a particular machine (such as a router) responds to arp requests for hosts other than itself. this can be used to make a router disappear from the workstations on a network and eliminate configuration of the workstations. for more information, see chapter 5 .

2.

Which of the following Cisco products introduces policy-based network management?

  1. CiscoView

  2. Netsys Baseliner

  3. CiscoWorks

  4. Cisco Hub/Ring Manager for Windows

bcisco s netsys baseliner software allows you to view a graphical representation of your network and troubleshoot problem areas by generating topologies and reports that are based on the actual configuration files. for more information, see chapter 11 .

3.

When gathering technical data for a customer’s existing network, which sources should be considered? (Choose all that apply.)

  1. IT department

  2. Network analysis tools

  3. Company management

  4. Outside sources

a, btechnical data is normally gathered from the customer s it department and network analysis tools. technical analysis tools can provide information on protocols in use, collision rates, broadcast rates, packet flows, segment utilization, and other network-related issues. for more information, see chapter 4 .

4.

Which of the following is true regarding VLSM?

  1. VLSM relies on providing host length information explicitly with each use of an address.

  2. VLSM relies on providing class length information explicitly with each use of an address.

  3. VLSM relies on providing packet length information explicitly with each use of an address.

  4. VLSM relies on providing prefix length information explicitly with each use of an address.

dvariable-length subnet masks (vlsms) help optimize available address space and specify a different subnet mask for the same network number on various subnets. for more information, see chapter 7 .

5.

CiscoWorks2000 Service Level Manager includes software for which of the following? (Choose all that apply.)

  1. SLAs

  2. SLCs

  3. SLNs

  4. SLQs

a, bciscoworks2000 service level manager includes service- level agreement (sla) and service-level contract (slc) software that allows for monitoring and reporting. for more information, see chapter 13 .

6.

You have an access list numbered 50. What type of access list is it?

  1. Standard IP access list

  2. Extended IP access list

  3. Standard IPX access list

  4. Extended IPX access list

  5. AppleTalk access list

acisco router standard ip access lists are in the range of 1 99 when configured with the ios and can filter only on source ip addresses. for more information, see chapter 10 .

7.

Which of the following is usually supported at the access layer of the Cisco hierarchical model?

  1. Access lists, packet filtering, and queuing

  2. Security and network policies, including address translation and firewalls

  3. Routing between VLANs and other workgroup support functions

  4. Creation of separate collision domains (segmentation)

dthe distribution layer of the cisco three-layer hierarchical design model should include separate collision domains with the implementation of switches. this is also the layer where most workstation and server access occurs. for more information, see chapter 5 .

8.

If your network is currently congested and you are using only hubs in your network, what would be the best solution to decrease congestion on your network?

  1. Cascade your hubs.

  2. Replace your hubs with switches.

  3. Replace your hubs with routers.

  4. Add faster hubs.

blayer 2 switches break up collision domains and decrease congestion on your network. for more information, see chapter 2 .

9.

SNMP version 1 defines which of the following PDU types?

  1. GetRequest

  2. GetResponse

  3. GetBulk

  4. GetTrap

  5. Trap

a, b, esnmpv1 only allows for getrequest, getresponse, and trap messages. the latest version of snmp, version 3, supports the security features message integrity and authentication. for more information, see chapter 11 .

10.

By default, how often are IP RIP updates broadcast?

  1. 30 seconds

  2. 60 seconds

  3. 90 seconds

  4. 120 seconds

aip rip updates are broadcast at 30-second intervals, creating additional overhead in some cases. for more information, see chapter 7 .

11.

During which post-design phase should equipment be purchased and configured?

  1. Prototype implementation

  2. Executive summary

  3. Final testing and demonstrations

  4. Pilot implementation

acisco recommends that you purchase and configure equipment during the prototype implementation phase. for more information, see chapter 12 .

12.

At which layer of the OSI model does segmentation of a data stream happen?

  1. Physical

  2. Data Link

  3. Network

  4. Transport

dthe transport layer receives large data streams from the upper layers and breaks these up into smaller pieces called segments. for more information, see chapter 1 .

13.

Traditional voice architecture includes which of the following technologies? (Choose all that apply.)

  1. PSTN

  2. Tie-lines

  3. VoFR

  4. VoATM

a, btraditional voice architecture typically does not include the voip technologies such as voice over frame relay (vofr) or voice over atm (voatm). for more information, see chapter 13 .

14.

Assuming a default mask, which two pieces of information can be derived from the IP address 172.16.25.11?

  1. It is a Class C address.

  2. It is a Class B address.

  3. The network address is 172.

  4. The network address is 172.16.25.

  5. The host portion is 25.11.

b, e172.16.25.11 is a class b address, and the host portion is 25.11. for more information, see chapter 3 .

15.

Which of the following should have standardized network names? (Choose all that apply.)

  1. Routers

  2. Servers

  3. Workstations

  4. Usernames

a, b, cwhile usernames might be standardized, it is rare for users themselves to have standardized names. for more information, see chapter 7 .

16.

What does the term “Base” indicate in 100Base-TX?

  1. The maximum wiring distance

  2. The type of wiring used in the network

  3. A LAN switch method using half duplex

  4. A signaling method for communication on the network

dbaseband signaling is a technique that uses the entire bandwidth of a wire when transmitting. broadband wiring uses many signals at the same time on a wire. these are both considered an ethernet signaling type. for more information, see chapter 1 .

17.

Tie-lines are responsible for connecting which voice network devices?

  1. Trunks

  2. Phones

  3. PBX switches

  4. Centrex lines

ctie-lines are used for interconnecting pbx switches found in traditional voice network architectures. for more information, see chapter 13 .

18.

PDUs are carried in which of the following protocols?

  1. TCP

  2. UDP

  3. SMTP

  4. RDP

bprotocol data units (pdus) are supported by the user datagram protocol (udp). for more information, see chapter 11 .

19.

What is the decimal and hexadecimal equivalent of the binary number 10101010?

  1. Decimal 100, Hexadecimal 3ef2

  2. Decimal 150, Hexadecimal AB

  3. Decimal 170, Hexadecimal AA

  4. Decimal 180, Hexadecimal FF

cto take a binary number and convert it into decimal, you just need to add the values of each bit that is a 1. the values of 10101010 are 128, 32, 8, and 2. 128 + 32 = 160 + 8 = 168 + 2 = 170, so the decimal answer is 170. hexadecimal is a base 16 numbering system. the base of hexadecimal is 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 0a, 0b, 0c, 0d, 0e, 0f-16 digits total from which to create all the numbers you ll ever need. so, if 1010 in binary is 10, then the hexadecimal equivalent is a. since you have 1010 and 1010, the answer to this question is aa. for more information, see chapter 3 .

20.

Which of the following are Cisco proprietary routing protocols? (Choose all that apply.)

  1. RIP

  2. OSPF

  3. IGRP

  4. RTMP

  5. EIGRP

c, eigrp and eigrp were developed by cisco to meet the scalability design and multiple routed protocol needs of those protocols lacking these features-rip and ospf. for more information, see chapter 8 .

21.

Which LAN switch method runs a CRC on every frame?

  1. Cut-through

  2. Store-and-forward

  3. FragmentCheck

  4. FragmentFree

bstore-and-forward lan switching checks every frame for crc errors. it has the highest latency of any of the lan switch types. for more information, see chapter 2 .

22.

What WAN protocol would you use to create a WAN that provides simultaneous transmission of voice, video, and data?

  1. X.25

  2. Frame Relay

  3. ATM

  4. 56K dedicated line

casynchronous transfer mode (atm) provides simultaneous transmission of voice, video, and data. for more information, see chapter 6 .

23.

Which of the following describes the Physical layer connection between a DTE (router) and a DCE (CSU/DSU) device?

  1. IP, IPX, AFP

  2. TCP, UDP

  3. EIA/TIA 232, V.35, X.21, HSSI

  4. FTP, TFPT, SMTP

ceia/tia 232, v.35, x.21, and hssi are all examples of physical layer specifications. for more information, see chapter 1 .

24.

When meeting with the customer to evaluate their needs and expectations, which of the following are items to review? (Choose all that apply.)

  1. Business constraints

  2. Security requirements

  3. Manageability requirements

  4. Application requirements

  5. Performance requirements

  6. All of the above

fall of the listed options must be considered when evaluating a customer s needs and expectations during a network design. for more information, see chapter 4 .

25.

What is the OSPF Router ID (RID)? (Choose two.)

  1. The lowest IP address on the router (closest to 0.0.0.0)

  2. The highest IP address on the router (closest to 255.255.255.255)

  3. The loopback address

  4. The console address

b, cthe ospf rid of a router is always the highest (closest to 255.255.255.255) active ip address on a router, unless a loopback interface is used, which will always be the rid regardless of the ip address set on the loopback interface. for more information, see chapter 9 .

26.

Which of the following statements is true with regard to bridges?

  1. Bridges do not isolate broadcast domains.

  2. Bridges broadcast packets into the same domain they were received from.

  3. Bridges use IP addresses to filter the network.

  4. Bridges can translate from one media to a different media.

dwhen a lan switch is first brought online, it does not contain entries in its forward/filter table; they re stored in ram. when a frame passes through the switch, the switch copies the frame s mac address information, mapping the mac address to the port on which the frame was received. since the destination port is not known, the switch forwards the frame out every port, excluding the port on which the frame was received. for more information, see chapter 2 .

27.

If you want to view the DLCI numbers configured for your Frame Relay network, which command or commands should you use? (Choose all that apply.)

  1. sh frame-relay

  2. show running

  3. sh int s0

  4. sh frame-relay dlci

  5. sh frame-relay pvc

b, eyou can use the show running-config and show frame-relay pvc commands to see the dlci numbers configured on your router. for more information, see chapter 6 .

28.

Which of the following should not be included in the design solution section of a design document?

  1. Business constraints

  2. Topology issues

  3. Hardware recommendations for LAN and WAN devices

  4. Routing protocols

  5. IOS software features

  6. Network management solutions

abusiness constraints should be identified and specified in the design requirements section of a design document. for more information, see chapter 12 .

29.

What is the broadcast address of the subnet address 172.16.99.99 255.255.192.0?

  1. 172.16.99.255

  2. 172.16.127.255

  3. 172.16.255.255

  4. 172.16.64.127

bfirst start with a 256 mask or, in this case, 256 192 = 64. 64 is the first subnet; 128 is the second subnet. this host is in the 64-subnet range; the broadcast address is 127.255, and the valid host range is 64.1 127.254. for more information, see chapter 3 .

30.

When configuring IPX, which of the following are valid methods to discover existing IPX network addresses? (Choose all that apply.)

  1. Ask the administrator.

  2. It is not necessary since IPX automatically addresses nodes.

  3. Type show ipx at the NetWare server console.

  4. Type config at the NetWare server console.

  5. Set the frame type to auto-detect.

a, dthe novell administrator defines the ipx network number when configuring the netware server. the config command displays the ipx network number along with other ipx address configuration. for more information, see chapter 7 .

31.

Which of the following best describe a use for DDR? (Choose all that apply.)

  1. As a backup link in case of primary link failure

  2. As an additional link used for load balancing

  3. As a backup link in case of excessive network traffic

  4. As an additional default gateway for IP clients

a, cdial-on-demand routing (ddr) is a technique that allows a router to automatically initiate and end a circuit-switched session per the requirements of the sending station. by mimicking keep-alives, the router fools the end station into treating the session as active. ddr permits routing over isdn or telephone lines via a modem or external isdn terminal adapter. for more information, see chapter 5 .

32.

Which of the following describes the function of the OSPF DR?

  1. OSPF routers that generate LSAs for a multi-access network

  2. OSPF routers that generate Hello packets for a multi-access network

  3. OSPF routers that generate hop counts for a multi-access network

  4. OSPF routers that generate metrics for a multi-access network

athe ospf designated router (dr) is responsible for controlling and sending updates to all other ospf-configured routers. for more information, see chapter 9 .

33.

Which of the following are true? (Choose two.)

  1. TCP is connection-oriented but doesn’t use flow control.

  2. IP is not necessary on all hosts that use TCP.

  3. ICMP must be implemented by all TCP/IP hosts.

  4. ARP is used to find a hardware address from a known IP address.

c, dicmp must be implemented by all tcp/ip hosts, and arp is used to find a hardware address from a known ip address. for more information, see chapter 3 .

34.

When gathering administrative data for a customer’s existing network, which sources should be considered?

  1. IT department

  2. Network users

  3. Company management

  4. Outside sources

cadministrative data is normally gathered from company management and includes such things as the company s business goals, corporate structure, geographic locations, current and future staffing, and policies and politics that may affect the new network design. for more information, see chapter 4 .

35.

Which sections should be included in a design document or in a response to a customer’s RFP? (Choose all that apply.)

  1. Executive summary

  2. Design requirements

  3. Design solution

  4. Summary

  5. Appendices

a, b, c, d, ecisco recommends that a design document or a response to a customer s request for purchase (rfp) include these five items. for more information, see chapter 12 .

36.

Which of the following best describes pinhole congestion?

  1. The router is unable to load-balance because the IPX maximum paths command has not been applied.

  2. Unable to load-balance because the routing protocol doesn’t support load balancing.

  3. Load balancing that occurs over DDR links.

  4. Uneven load balancing when the routing protocol doesn’t recognize the capacity of the links.

dsome routing protocols base cost on the number of hops to a particular destination. these routing protocols load-balance over unequal bandwidth paths as long as the hop count is equal. once a slow link becomes saturated, however, higher capacity links cannot be filled. for more information, see chapter 5 .

37.

You have an access list numbered 150. What type of access list is it?

  1. Standard IP access list

  2. Extended IP access list

  3. Standard IPX access list

  4. Extended IPX access list

  5. AppleTalk access list

bcisco router extended ip access lists are in the range of 100 199 when configured with the ios and can filter on source, destination address, destination port number, and protocol type. for more information, see chapter 10 .

38.

Regarding Frame Relay, which of the following statements is true?

  1. You must use Cisco encapsulation if connecting to non-Cisco equipment.

  2. You must use ANSI encapsulation if connecting to non-Cisco equipment.

  3. You must use IETF encapsulation if connecting to non-Cisco equipment.

  4. You must use Q.933A encapsulation if connecting to non-Cisco equipment.

cinternet engineering task force (ietf) is the encapsulation method used when connecting frame relay to non-cisco routers. for more information, see chapter 6 .

39.

What is the purpose of NAT?

  1. NAT is used to convert a private IP address into a registered IP address so that connectivity with the global Internet may be established.

  2. After receiving a BootP request, NAT assigns IP addresses to hosts dynamically so that connectivity with the global Internet may be established.

  3. NAT resolves network addresses to MAC addresses so that connectivity with the global Internet may be established.

  4. NAT resolves remote hardware addresses for local clients so that connectivity with the global Internet may be established.

anetwork address translation (nat) is an algorithm instrumental in minimizing the requirement for globally unique ip addresses, permitting an organization whose addresses are not all globally unique to connect to the internet regardless by translating those addresses into globally routable address space. for more information, see chapter 7 .

40.

Which of the following should not be included in your design document’s executive summary?

  1. Purpose of the project

  2. Brief information on your design

  3. Business constraints

  4. Technical constraints

  5. High-level topology map of the current network

ethe executive summary should be written and presented to management and typically does not include details such as a topology map. for more information, see chapter 12 .

Answers

1.

C Proxy ARP means that a particular machine (such as a router) responds to ARP requests for hosts other than itself. This can be used to make a router disappear from the workstations on a network and eliminate configuration of the workstations. For more information, see Chapter 5.

2.

B Cisco’s Netsys Baseliner software allows you to view a graphical representation of your network and troubleshoot problem areas by generating topologies and reports that are based on the actual configuration files. For more information, see Chapter 11.

3.

A, B Technical data is normally gathered from the customer’s IT department and network analysis tools. Technical analysis tools can provide information on protocols in use, collision rates, broadcast rates, packet flows, segment utilization, and other network-related issues. For more information, see Chapter 4.

4.

D Variable-length subnet masks (VLSMs) help optimize available address space and specify a different subnet mask for the same network number on various subnets. For more information, see Chapter 7.

5.

A, B CiscoWorks2000 Service Level Manager includes service- level agreement (SLA) and service-level contract (SLC) software that allows for monitoring and reporting. For more information, see Chapter 13.

6.

A Cisco router standard IP access lists are in the range of 1–99 when configured with the IOS and can filter only on source IP addresses. For more information, see Chapter 10.

7.

D The distribution layer of the Cisco three-layer hierarchical design model should include separate collision domains with the implementation of switches. This is also the layer where most workstation and server access occurs. For more information, see Chapter 5.

8.

B Layer 2 switches break up collision domains and decrease congestion on your network. For more information, see Chapter 2.

9.

A, B, E SNMPv1 only allows for GetRequest, GetResponse, and Trap messages. The latest version of SNMP, version 3, supports the security features message integrity and authentication. For more information, see Chapter 11.

10.

A IP RIP updates are broadcast at 30-second intervals, creating additional overhead in some cases. For more information, see Chapter 7.

11.

A Cisco recommends that you purchase and configure equipment during the prototype implementation phase. For more information, see Chapter 12.

12.

D The Transport layer receives large data streams from the upper layers and breaks these up into smaller pieces called segments. For more information, see Chapter 1.

13.

A, B Traditional voice architecture typically does not include the VoIP technologies such as Voice over Frame Relay (VoFR) or Voice over ATM (VoATM). For more information, see Chapter 13.

14.

B, E 172.16.25.11 is a class B address, and the host portion is 25.11. For more information, see Chapter 3.

15.

A, B, C While usernames might be standardized, it is rare for users themselves to have standardized names. For more information, see Chapter 7.

16.

D Baseband signaling is a technique that uses the entire bandwidth of a wire when transmitting. Broadband wiring uses many signals at the same time on a wire. These are both considered an Ethernet signaling type. For more information, see Chapter 1.

17.

C Tie-lines are used for interconnecting PBX switches found in traditional voice network architectures. For more information, see Chapter 13.

18.

B Protocol data units (PDUs) are supported by the User Datagram Protocol (UDP). For more information, see Chapter 11.

19.

C To take a binary number and convert it into decimal, you just need to add the values of each bit that is a 1. The values of 10101010 are 128, 32, 8, and 2. 128 + 32 = 160 + 8 = 168 + 2 = 170, so the decimal answer is 170. Hexadecimal is a base 16 numbering system. The base of hexadecimal is 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 0A, 0B, 0C, 0D, 0E, 0F—16 digits total from which to create all the numbers you’ll ever need. So, if 1010 in binary is 10, then the hexadecimal equivalent is A. Since you have 1010 and 1010, the answer to this question is AA. For more information, see Chapter 3.

20.

C, E IGRP and EIGRP were developed by Cisco to meet the scalability design and multiple routed protocol needs of those protocols lacking these features—RIP and OSPF. For more information, see Chapter 8.

21.

B Store-and-forward LAN switching checks every frame for CRC errors. It has the highest latency of any of the LAN switch types. For more information, see Chapter 2.

22.

C Asynchronous Transfer Mode (ATM) provides simultaneous transmission of voice, video, and data. For more information, see Chapter 6.

23.

C EIA/TIA 232, V.35, X.21, and HSSI are all examples of Physical layer specifications. For more information, see Chapter 1.

24.

F All of the listed options must be considered when evaluating a customer’s needs and expectations during a network design. For more information, see Chapter 4.

25.

B, C The OSPF RID of a router is always the highest (closest to 255.255.255.255) active IP address on a router, unless a loopback interface is used, which will always be the RID regardless of the IP address set on the loopback interface. For more information, see Chapter 9.

26.

D When a LAN switch is first brought online, it does not contain entries in its forward/filter table; they’re stored in RAM. When a frame passes through the switch, the switch copies the frame’s MAC address information, mapping the MAC address to the port on which the frame was received. Since the destination port is not known, the switch forwards the frame out every port, excluding the port on which the frame was received. For more information, see Chapter 2.

27.

B, E You can use the show running-config and show frame-relay pvc commands to see the DLCI numbers configured on your router. For more information, see Chapter 6.

28.

A Business constraints should be identified and specified in the design requirements section of a design document. For more information, see Chapter 12.

29.

B First start with a 256 mask or, in this case, 256 – 192 = 64. 64 is the first subnet; 128 is the second subnet. This host is in the 64-subnet range; the broadcast address is 127.255, and the valid host range is 64.1–127.254. For more information, see Chapter 3.

30.

A, D The Novell administrator defines the IPX network number when configuring the NetWare server. The config command displays the IPX network number along with other IPX address configuration. For more information, see Chapter 7.

31.

A, C Dial-on-demand routing (DDR) is a technique that allows a router to automatically initiate and end a circuit-switched session per the requirements of the sending station. By mimicking keep-alives, the router fools the end station into treating the session as active. DDR permits routing over ISDN or telephone lines via a modem or external ISDN terminal adapter. For more information, see Chapter 5.

32.

A The OSPF designated router (DR) is responsible for controlling and sending updates to all other OSPF-configured routers. For more information, see Chapter 9.

33.

C, D ICMP must be implemented by all TCP/IP hosts, and ARP is used to find a hardware address from a known IP address. For more information, see Chapter 3.

34.

C Administrative data is normally gathered from company management and includes such things as the company’s business goals, corporate structure, geographic locations, current and future staffing, and policies and politics that may affect the new network design. For more information, see Chapter 4.

35.

A, B, C, D, E Cisco recommends that a design document or a response to a customer’s Request for Purchase (RFP) include these five items. For more information, see Chapter 12.

36.

D Some routing protocols base cost on the number of hops to a particular destination. These routing protocols load-balance over unequal bandwidth paths as long as the hop count is equal. Once a slow link becomes saturated, however, higher capacity links cannot be filled. For more information, see Chapter 5.

37.

B Cisco router extended IP access lists are in the range of 100–199 when configured with the IOS and can filter on source, destination address, destination port number, and protocol type. For more information, see Chapter 10.

38.

C Internet Engineering Task Force (IETF) is the encapsulation method used when connecting Frame Relay to non-Cisco routers. For more information, see Chapter 6.

39.

A Network Address Translation (NAT) is an algorithm instrumental in minimizing the requirement for globally unique IP addresses, permitting an organization whose addresses are not all globally unique to connect to the Internet regardless by translating those addresses into globally routable address space. For more information, see Chapter 7.

40.

E The executive summary should be written and presented to management and typically does not include details such as a topology map. For more information, see Chapter 12.




CCDA. Cisco Certified Design Associate Study Guide
CCDA: Cisco Certified Design Associate Study Guide, 2nd Edition (640-861)
ISBN: 0782142001
EAN: 2147483647
Year: 2002
Pages: 201

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net