chapter4 q&a

Upload: shalua-yonah

Post on 06-Apr-2018

221 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/2/2019 Chapter4 Q&A

    1/6

    APPLICATION IMPACT ON A NETWORK

    1

    Refer to the exhibit. If ACL 150 identifies only voice traffic from network 192.168.10.0/24 and no other traffic, wqueue will voice traffic from other networks use?

    high

    normal

    medium

    default

    2

    Refer to the exhibit. After configuring QoS, a network administrator issues the command show queueing inte

    s0/1. What two pieces of information can an administrator learn from the output of this command? (Choose twqueue traffic definitions

    priority list protocol assignments

    type of queuing being implemented

    number of packets placed in each queue

    queuing defaults that have been changed

    bandwidth utilization counters for each queue

    3 A company that has a traditional telephone system wants to convert to IP telephony. Which two factors shouldconsidered for the design? (Choose two.)

    Digital communications systems have greater noise than analog systems when processing voice traffic.

    Voice-enabled routers or a server must be used for call control and signaling.

    Voice to IP conversions can cause router overhead.

    Power to the phones can be supplied through properly equipped patch panels or switches.

    The cost to combine voice and data VLANs can be a considerable amount.

    http://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtml
  • 8/2/2019 Chapter4 Q&A

    2/6

    4Several web and email servers have recently been installed as part of an enterprise network. The securityadministrator has been asked to provide a summary of security features that can be implemented to help prevunauthorized traffic from being sent into or out of sensitive internal networks. Which three features should thesecurity administrator recommend? (Choose three.)

    firewalls

    priority queuing

    access control lists

    intrusion detection systems

    DHCP

    128-bit WEP

    5

    Refer to the exhibit. The network design documents include requirements to prevent switching loops, to providspecific failover, and to provide Layer 3 recovery. Which two protocols would be needed to provide the supportwo.)

    HDLC

    HSRP

    PPP

    RSTP

    VTP

    6 When QoS is implemented in a converged network, which two factors can be controlled to improve performan(Choose two.)

    link speed

    http://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtml
  • 8/2/2019 Chapter4 Q&A

    3/6

    delay

    packet routing

    jitter

    packet addressing

    7 A customer purchases tickets online and pays using a credit card, but the system goes down before the transis complete. What transaction type retains a record of this transaction after the system failure so that the custowill still receive the tickets and the credit card account will be debited accordingly?

    atomic

    consistent

    durable

    isolated

    8 Which technology provides a mechanism for implementing QoS at Layer 2?

    ToS

    CoS

    DSCP

    IP precedence

    9 What two Cisco tools can be used to analyze network application traffic? (Choose two.)

    NBAR

    NetFlow

    AutoQoS

    Wireshark

    Custom Queuing

    10 Which two items can be determined by diagramming internal traffic flow? (Choose two.)

    the type of ISP services needed

    the capabilities of end-user devices

    the areas where network congestion may occur

    the location of VPN servers used to connect teleworkers

    locations where high-bandwidth connections are required

    11 Which two major differences are associated with IP telephony when compared to traditional telephony that use

    PBX? (Choose two.)manages phones centrally

    utilizes centralized call routing

    creates peer-to-peer relationships between phones

    requires a separate infrastructure to support data transfer

    requires significant manual configuration when adding, moving, or changing phones

    http://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtml
  • 8/2/2019 Chapter4 Q&A

    4/6

    12 Which two traffic types are examples of external traffic flows? (Choose two.)

    A user in the IT department telnets to the core layer router.

    A user in marketing connects to the web server of a competitor.

    A user in the IT department telnets into the access layer switch.

    A user in the services department logs in to a web-based email program.

    A user in accounting connects to an FTP server that is connected to the access layer switch.

    13 Which two network applications are most affected by network congestion and delays? (Choose two.)

    IP telephony

    live video webcasts

    audio file downloads

    online banking services

    file archival and retrieval

    14 Which two statements are characteristics of file transfer traffic flows? (Choose two.)RTP should be used.

    Packets are small in size.

    Transfers are throughput intensive.

    Response-time requirements are low.

    Traffic cannot withstand retransmission delays.

    15 When implementing VoIP services, which two design considerations should be followed? (Choose two.)

    Confirm that network jitter is minimal.

    Use TCP to reduce delays and dropped packets.

    Establish priority queuing to ensure that large data packets are sent uninterrupted.

    Disable real-time protocols to reduce queuing strategy demands.

    Ensure that packet delays do not exceed 150 ms.

    16 In network design, which technology can be implemented to prioritize traffic based on its importance and techrequirements?

    STP

    QoS

    RTP

    TCPVPN

    17 A database server is configured to purge all data that is 60 days old. Ten data items that are 60 days old are tbe purged. However, there is a failure halfway through the transaction, and the entire transaction is voided.What type of transaction action occurred?

    atomic

    consistent

    http://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtml
  • 8/2/2019 Chapter4 Q&A

    5/6

    durable

    isolated

    18

    Refer to the exhibit. Which option correctly matches the terms on top with its definition on the bottom?

    A=1, B=3, C=2, D=4

    A=2, B=1, C=4, D=3

    A=2, B=4, C=1, D=3A=3, B=2, C=4, D=1

    A=4, B=3, C=1, D=2

    A=4, B=2, C=3, D=1

    19 What is the primary goal of QoS?

    classification of traffic

    filtering and queuing voice traffic

    reducing bandwidth requirements

    providing priority service to selected traffic

    20 When implementing QoS in traffic queues, what is the first step the designer should take to ensure that traffic properly prioritized?

    define QoS policies

    define traffic classes

    determine traffic patterns

    identify traffic requirements

    identify networking equipment

    21 An analysis of network protocols reveals that RTP and RTCP are being used. What uses these protocols?

    IDS

    VPN

    WLAN

    Firewall

    real-time video

    22 A company is considering adding voice and video to the data networks. Which two statements are true if voice

    http://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtml
  • 8/2/2019 Chapter4 Q&A

    6/6

    video are added? (Choose two.)

    PoE switches must be purchased.

    More UDP-based traffic flows will be evident.

    Response times will be increased even if QoS is implemented.

    QoS will most likely be implemented to prioritize traffic flows.

    VPNs will most likely be implemented to protect the voice traffic.

    23 The design of an IP telephony system needs to meet the technical requirements to provide a connection to theas well as provide high-quality voice transmissions using the campus network. Which two elements directly athe ability of the design to meet these requirements? (Choose two.)

    voice-enabled firewall

    PoE switches and patch panels

    redundant backbone connectivity

    voice-enabled router at the enterprise edge

    separate voice and data VLANs with QoS implemented

    24 A network design must minimize latency to support real-time streaming applications. Which two protocols enacontrol and scalability of the network resources and minimize latency by incorporating QoS mechanisms?

    (Choose two.)

    RTCP

    HSRP

    RSTP

    RTP

    RPC

    25 What design strategy should be followed when designing a network that uses video on demand?

    implement the appropriate routing protocol to ensure that data segments arrive in order

    implement different QoS queues based on the type of video traffic being distributed

    install servers to store the data in a centrally located server farm

    configure queuing in the core routers to ensure high availability

    http://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtmlhttp://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtml