cisco discovery 4 final 2010

Upload: ranka-cvitanovic

Post on 04-Apr-2018

226 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/31/2019 Cisco Discovery 4 Final 2010

    1/20

    sco Discovery 4 Final 2010

    Which task would typically only require services located at the access layer of the hierarchical design

    model?

    connecting to the corporate web server to update sales figures

    using a VPN from home to send data to the main office servers

    printing a meeting agenda on a local departmental network printer

    placing a VoIP call to a business associate in another country

    responding to an e-mail from a co-worker in another department

    efer to the exhibit. A network administrator is validating the routing for the new network design. Whic

    ommand should be used to configure the s0/0/0 interface of the SALES router to advertise the Salesepartment networks as one route?

    SALES(config-if)# ip summary-address eigrp 100 172.16.0.0 255.255.0.0

    SALES(config-if)# ip summary-address eigrp 100 172.16.8.0 255.255.240.0

    SALES(config-if)# ip summary-address eigrp 100 172.16.16.0 255.255.240.0

    SALES(config-if)# ip summary-address eigrp 100 172.16.31.0 255.255.248.0

    Why is it difficult for network designers to predict the patterns and behavior of file transfer traffic?

    The traffic is user initiated.

    File size is typically very small.

    Dedicated bandwidth is essential.

    All file transfer traffic is queued as high priority.

  • 7/31/2019 Cisco Discovery 4 Final 2010

    2/20

    efer to the exhibit. A NetworkingCompany designer is reviewing a diagram of a customer network. Wh

    wo risks or issues can be identified in the topology that is shown? (Choose two.)

    The firewall router and ISP connection represent a single point of failure.

    A failure of the switch that connects the Cisco Call Manager to the network will cause the entire

    elephony system to fail.

    Using Layer 3 switches to interconnect the data center servers to the IP phones introduces too m

    elay.

    The IP phones need to be redundantly connected to the switches to prevent single points of failu

    he access layer.

    If one of the Layer 3 switches fails, the Cisco Call Manager will be unreachable.

  • 7/31/2019 Cisco Discovery 4 Final 2010

    3/20

    efer to the exhibit. A network associate is configuring a new router to provide routing between VLANs

    ssociate removes the router from the box and connects the Fa0/0 interface to a trunking port on the

    witch. After the configuration is applied to the router, the traffic between VLANs still fails. What is caus

    his to occur?

    The NWRnStick router needs a routing protocol configured.

    The NWRnStick router needs additional Fast Ethernet interfaces installed.

    The subinterfaces of the NWRnStick router should have IP addresses applied.

    All the subinterfaces of the NWRnStick router should be configured in the same VLAN.

    When implementing a security policy, which two actions should be included as part of the security

    hecklist? (Choose two.)

    Disable all logging.

    Enable Telnet on TCP port 23.

    Use HTTP for web administration.

    Set timeouts and ACLs on VTY lines.

    Shut down any unused ports and interfaces.

  • 7/31/2019 Cisco Discovery 4 Final 2010

    4/20

    The network infrastructure of the main campus in an organization consists of network devices from

    multiple vendors. The IT department has a network architecture upgrade project that will gradually

    pgrade the campus backbone to 10 Gb/s. The routing protocol also needs to be upgraded from RIP to

    upport VLSM and CIDR, with infrequent routing updates to reduce traffic. In phase one of the project, t

    gh-end Cisco devices are purchased to replace two of the four current core routers made by another

    etworking company.

    Which routing protocol should be selected for the network?

    BGP

    OSPF

    RIPv2

    EIGRP

    A network engineer is prototyping a new IP addressing and summarization strategy for a new network

    hat will be integrated into the existing infrastructure. Which method is appropriate for testing the

    ddressing scheme?

    using the production network of the customer

    using actual network equipment in a lab

    using the Cisco Network Assistant

    using a network simulation tool

    A network administrator is integrating IPv6 into an IPv4 network by encapsulating an IPV6 packet with

    n IPv4 protocol. Which transition method is being used?

    tunneling

    dual stack

    proxying and translation

    NAT with Protocol Translator

    0 What Cisco VPN solution allows for simple configuration of VPNs on the laptops of remote and mobile

    mployees?

    EasyVPN Server

    EasyVPN Remote

    EasyVPN Client

    EasyVPN Remote-Access

  • 7/31/2019 Cisco Discovery 4 Final 2010

    5/20

    1 What are three advantages of IPv6 over IPv4? (Choose three.)

    increased IP security

    fewer reserved IP addresses

    simplified header information

    integrated IP mobility support

    easier implementation and configuration

    more efficient handling of broadcasts

    2 In the Cisco Enterprise Architecture, which module would include web and e-commerce servers for

    ccess by users external to the organization?

    campus core

    enterprise edge

    enterprise branch

    enterprise campus

    3 If a router is unable to find a suitable IOS to load into RAM, in what mode does the boot process end?

    setup mode

    user mode

    rommon mode

    privileged mode

  • 7/31/2019 Cisco Discovery 4 Final 2010

    6/20

    4

    efer to the exhibit. The users on the 192.168.10.128/26 network are not allowed Internet access. Whe

    he most efficient location to place an extended ACL?

    inbound on S0/0/0 of R1

    outbound on S0/0/1 of R1

    inbound on Fa0/0 of R2

    outbound on Fa0/0 of R2

    inbound on S0/0/1 of R2

    5 What type of Frame Relay subinterface must be used to connect remote sites without having to disa

    plit horizon?

    multipoint

    multiaccess

    point-to-point

    nonbroadcast multiaccess

  • 7/31/2019 Cisco Discovery 4 Final 2010

    7/20

    6

    efer to the exhibit. Based on the EIGRP configuration that is shown, what can the field engineer conclu

    bout the EIGRP authentication between RouterA and RouterB?

    Authentication will fail because only one key is configured.

    Authentication will fail because the key chain names do not match.

    Authentication will succeed and EIGRP updates can be exchanged.

    Authentication will fail because the key chain names must match the router names.

    7

    efer to the exhibit. What is the spanning-tree role of all the enabled interfaces of SW11?

    alternate

    backup

    designated

    root

  • 7/31/2019 Cisco Discovery 4 Final 2010

    8/20

    8

    efer to the exhibit. The administrator wishes to specify that the 56 kb/s circuit will be a backup link th

    ill automatically be used in the event that the primary Frame Relay circuit goes down for traffic to the

    72.16.75.0/24 network. Which command syntax will accomplish this?

    RouterA(config)# ip route 172.16.75.0 255.255.255.0 192.16.35.76 200

    RouterA(config)# ip route 172.16.75.0 255.255.255.0 192.16.35.76

    RouterA(config)# ip route 172.16.75.0 255.255.255.0 172.16.75.1

    RouterA(config)# ip route 192.16.35.76 255.255.255.0 172.16.75.1

    9 What are two advantages of using Layer 3 devices instead of Layer 2 switches at the distribution lay

    f a hierarchical network? (Choose two.)

    allows connectivity between different VLANs

    provides reliable connectivity to the end user

    reduces the number of required redundant links

    results in fewer IP subnets to configure and manage

    enables traffic filtering that is based on subnet addresses

  • 7/31/2019 Cisco Discovery 4 Final 2010

    9/20

    0

    efer to the exhibit. The network administrator has used the Cisco Feature Navigator to choose a Cisco

    mage to install on a router. Given the exhibited output of the show version command, which statemen

    ue about the capacity of the router to use this Cisco IOS image?

    There is enough DRAM and flash.

    There is not enough DRAM and flash.

    There is enough DRAM but not enough flash.

    There is not enough DRAM but enough flash.

    1 On a Monday morning the help desk at a large company receives an unusually high number of calls

    eporting no connectivity to the Internet or to any other network resources. Otherwise the PCs are

    unctioning normally. Help desk technicians note that all the calls are from a single department, and al

    ffected users are on the same floor of a single building. Where should the help desk technicians suspe

    hat the problem lies?

    workgroup switch

    PC power supplies

    patch cords from PCs to network jacks

    cabling from the network jack to the wiring closet

    2 In order for the IT staff of a company to understand the basic operation of VPNs, which two features

    echnologies must the network designer identify as training needs? (Choose two.)

    IPv6 tunneling

    QoS operation

  • 7/31/2019 Cisco Discovery 4 Final 2010

    10/20

    tunneling protocols

    VLAN configuration

    encryption algorithms

    3 A network administrator needs to transfer an IOS image to a router using a TFTP server. What shoul

    erified prior to beginning the transfer process?

    The TFTP server must connect to the router via a serial connection.

    Connectivity between the TFTP server and the router should have been established.

    The TFTP server and the router must be on different networks for the transfer.

    The TFTP server software must be the same version as the Cisco IOS software.

    4

    efer to the exhibit. A technician at the ISP site asks the network administrator at the client site to chan

    he CHAP password as part of the routing security maintenance. After the administrator makes the cha

    nd reboots the router, the technician issues a show interfaces serial 0/0/0 command. According to the

    utput, what can be concluded about the serial connection between the client site and ISP site?

    The router at the client site is still in the process of rebooting.

    The administrator probably configured the wrong password.

    The administrator has not issued a no shut command on the serial interface.

    The administrator probably configured the wrong IP address for the serial interface.

  • 7/31/2019 Cisco Discovery 4 Final 2010

    11/20

    5 The main office of a NetworkingCompany customer currently connects to three branch offices via th

    eparate point-to-point T1 circuits. The customer network uses RIPv2 as the routing protocol within bot

    he LAN and the WAN. The account manager proposes a change to a Frame Relay network because the

    osts are lower. A single local loop connection can be installed at the main office with three separate PV

    o connect the branch offices. How can the main office edge router be configured to enable the custom

    ontinue to use RIP as the WAN routing protocol?

    Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the

    emote routers.

    To prevent the Frame Relay network from causing a routing loop, disable split horizon on the ser

    terface.

    Create three separate point-to-point subinterfaces on the serial interface and assign a different

    ubnet IP address to each one.

    Configure the serial interface with a single interface DLCI number and create frame-relay map

    atements for each remote site address.

    6 What is the advantage of choosing EasyVPN for a new VPN implementation?

    to provide encryption algorithms unavailable in other systems

    to ensure that remote workers actually use the VPN for connectivity

    to allow a greater variety of network devices to be used for VPN connections

    to simplify the configuration tasks for the device that is used as the VPN server

    7

    efer to the exhibit. Which type of application communication model best describes this network?

    client-client

    client-server farm

    client-enterprise edge

    client-enterprise server

    8 Which IOS component can be used to classify and monitor network traffic?

    CDP

  • 7/31/2019 Cisco Discovery 4 Final 2010

    12/20

    NBAR

    CiscoWorks

    Network Assistant

    9 A network engineer is at a customer site. After resolving technical problems in the network, the

    ngineer provides a training session for the support staff. Which job function best fits the activities of th

    etwork engineer?

    network designer

    account manager

    pre-sales engineer

    post-sales field engineer

    0 A network administrator has removed a router from the network for maintenance. A new Cisco IOS

    oftware image has been successfully downloaded to a server and copied into the flash of the router. W

    hould the administrator do before placing the router back into service?

    Delete the previous version of the Cisco IOS software from flash.

    Copy the new IOS into NVRAM to create a backup copy.

    Restart the router and verify that the new image starts successfully.

    Verify the free space available on the router to store the new IOS image.

    1 A network administrator is configuring a router interface with the command R1(config-if)# ipv6 addr

    001:DB8:C18:1::/64 eui-64. If the MAC address of this Ethernet interface is 01-1C-70-CF-B4-30, what is

    ost identifier for this interface under EUI-64 format?

    11C:7000:00CF:B430

    11C:70FE:FECF:B430

    11C:70FF:FECF:B430

    11C:70FF:FFCF:B430

  • 7/31/2019 Cisco Discovery 4 Final 2010

    13/20

    2

    efer to the exhibit. Based on the configuration of router R2, which statement is true if the four listed

    bjectives are requirements of an active security policy?

    bjectives

    1) All traffic from the Internet into the DMZ is to be logged.

    2) Web traffic from the Internet is to be allowed into the DMZ.

    3) TCP traffic from established sessions is to be allowed into the internal network.

    4) Incoming e-mail from the Internet is to be handled by the DMZ e-mail server first.

    Only objective 1 is met.

    All four objectives are met.

    Objectives 1, 2, and 4 are met.

    Only objectives 2 and 4 are met.

    Only objectives 2 and 3 are met.

    3

  • 7/31/2019 Cisco Discovery 4 Final 2010

    14/20

    efer to the exhibit. A NetworkingCompany engineer is characterizing an existing network for a new

    ustomer. The engineer issues a show running-config command on the branch router to gather

    onfiguration information. What is the engineer able to determine as a result of viewing the output of t

    ommand?

    The branch office router has two routes to the main office LANs in the routing table.

    The default route for the branch office traffic is the serial link to the Edge2 router.

    A connection through ISP-A will be used to reach the main office LANs if the Frame Relay networknavailable.

    By using both the DSL and the Frame Relay connection, the branch office router will load balance

    affic that is destined for the main office LANs.

    4 Company XYZ requires a WAN solution that provides flexible bandwidth options and supports one

    hysical interface at the head office that would provide simultaneous connectivity to various remote sit

    he distance from each site should not make the solution more expensive. Which WAN technology mee

    he requirements of the company?

    DSL

    cable

    Frame Relay

    T1 leased line

    5 A large company plans to add several servers and requires that the servers be reachable directly fro

    he Internet. Which action will help the company accomplish this goal?

    Assign to each server a static internal IP address that is mapped statically to a public IP address.

    Place all servers in their own Class C private subnet.

  • 7/31/2019 Cisco Discovery 4 Final 2010

    15/20

    Provide a private address to each server using DHCP.

    Assign addresses from a pool of public Class B addresses using DHCP.

    6

    efer to the exhibit. Following a test plan, the network systems engineer completes the configuration o

    ccess layer switch and connects three PCs to test the configuration. The engineer attempts to ping fro

    ach PC to the other connected PCs. Which three statements describe the expected results of pinging f

    ne host to another? (Choose three.)

    Host1 can ping Host2.

    Host1 cannot ping Host2.

    Host1 can ping Host3.

    Host1 cannot ping Host3.

    Host2 can ping Host3.

    Host2 cannot ping Host3.

    7 A school district decides to use the 172.30.0.0/16 network for its LAN networks. The network

    dministrator must create an addressing scheme to support 500 users in the admin office, 200 at the h

    chool, 60 at the elementary school and 28 at the district office. Which VLSM addressing scheme will

    orrectly address the network with minimal waste?

    172.30.0.0/20 admin

  • 7/31/2019 Cisco Discovery 4 Final 2010

    16/20

  • 7/31/2019 Cisco Discovery 4 Final 2010

    17/20

    0 Which two events occur when the command RouterB(config-if)# frame-relay map ip 198.133.219.2

    issued on RouterB? (Choose two.)

    RouterB uses DLCI 211 to forward data to 198.133.219.2.

    A Layer 2 address is statically mapped to a Layer 3 address.

    DLCI 211 replaces the MAC address in the ARP table for entry 198.133.219.2.

    Inverse ARP is used to add an entry for 198.133.219.2 into the Frame Relay map table using DLC

    11.

    The remote router updates the Frame Relay map table with DLCI 211 to reach the 198.133.219.0

    etwork.

    1

    efer to the exhibit. A network administrator configures two routers to test the WAN connection. The se

    onnection requires PPP encapsulation and authentication with CHAP. However, the connection cannot

    stablished. According to the partial output of the show running-config command, what is the cause of

    roblem?

    The password should be all lowercase.

    The password should contain fewer than 8 characters.

    The usernames must be the same as the sending router hostnames.

    The usernames must be the same as the destination router hostnames.

  • 7/31/2019 Cisco Discovery 4 Final 2010

    18/20

    efer to the exhibit. What can be concluded from the output that is shown?

    MDF_2811 has a MAC address of 2294:300F:0000.

    Device C3750-24_IDF2 is running Cisco IOS Software Release 12.3(23)SEE2.

    A Cisco 3750 switch is connected to the FastEthernet1/0/1 port on MDF_2811.

    MDF_2811 is installed in the main distribution facility on floor 28 of building 11.

    3

    efer to the exhibit. In the Cisco IOS filename that is shown, what is signified by the underlined portion

    version

    platform

    file format

    feature set

    4 What are two reasons to choose a pilot network instead of a prototype network during proof-of-conc

    esting of a network design? (Choose two.)

    Changes can be made at any time.

    The customer desires testing in a real-world environment.

  • 7/31/2019 Cisco Discovery 4 Final 2010

    19/20

    A highly controlled simulated environment is easier to manage.

    The test network must be independent from the production network.

    Network response to unplanned and unpredictable events must be assessed.

    5 A company has branch offices at several locations across the country. Which security implementatio

    ould provide a cost-effective, secure, and authenticated connection to centralized internal resources t

    re located at company headquarters, without requiring configuration for individual employees at the

    ranch offices?

    leased line with PPP authentication

    site-to-site VPN

    access control list

    remote-access VPN

    6 A network administrator is asked to upgrade the enterprise network devices and to modify the

    ddressing scheme to support VLSM and route summarization. The current network infrastructure cont

    oth Cisco and non-Cisco routers. The plan is to replace old routers gradually with the latest Cisco route

    Which two routing protocols can the administrator use to support both upgrading requirements? (Choo

    wo.)

    BGP

    OSPF

    RIPv1

    RIPv2

    EIGRP

    7

    efer to the exhibit. The routers are configured with RIPv2 and utilize the default configuration. When

    ttempting to communicate with other networks, hosts from 172.31.1.0/24 are experiencing connectivi

    sues. What could be done to resolve this issue?

    Change to a public IP address scheme.

    Ensure that automatic route summarization has been disabled on all routers in the network.

    Change the IP address for the Router3 LAN to be 192.168.7.0/24.

    Change the subnet mask on the link between Router2 and Router3 to 255.255.255.0.

  • 7/31/2019 Cisco Discovery 4 Final 2010

    20/20

    8 Which technology will prioritize traffic based upon the technical requirements of IP telephony?

    PoE

    QoS

    RPC

    RTP

    VPN

    9 A small office with ten employees needs to provide external customer access to an office Web serve

    so requires filtered access to the Internet for its employees. What device would best serve their need

    standalone access points with separate VLANs for customers and employees

    core layer router with software based firewall set

    dedicated firewall appliance with DMZ capabilities

    SOHO router with IOS firewall feature set to filter traffic in and out of the company

    0 A technician adds the command Router(config-router)# variance 5 to a router using EIGRP as the

    outing protocol. What is the result of entering this command?

    enables unequal cost load balancing

    adjusts the metric of all EIGRP routes to 5

    restricts the number of EIGRP feasible successor routes to 5

    activates the use of all K values in the composite metric calculation

    enables EIGRP equal cost load balancing over a maximum of 5 routes

    1 What best practice should be followed when installing a new interface card into a Cisco 1841 router?

    Leave the power on because the device supports hot-swappable interface cards.

    Be sure the card faceplate does not touch the rear panel of the chassis.

    Use pliers to push the card into the connecting socket.

    Use a properly grounded antistatic wrist strap.

    Leave the captive screws loose until the card is working properly, then tighten securely.

    2 When implementing an IP telephony solution, why should VLANs be used?

    to allow the use of a single IP gateway

    to separate voice from data traffic for ease of prioritization

    to allow the PBX to use VLAN IDs to filter both voice and data traffic

    to allow connectivity between traditional phone devices and IP-based telephony devices