Wednesday, December 24, 2008

Discovery 1-4 (V 4.0)

Discovery 1 : Networking for Home and Small Businesses

Discovery 2 : Working at a Small-to-Medium Business or ISP

Discovery 3 : Introducing Routing and Switching in the Enterprise

Discovery 4 : Designing and Supporting Computer Networks (V 4.0)

 

A Complete Learning Program

The Cisco Networking Academy Program provides skills students need to work in IT fields. The program offers Web-based content, online assessment, hand-on labs, instructor training, and preparation for industry certifications

Exploration 1-4 (V 4.0)

  • Exploration 1 : Network Fundamentals (V 4.0)
  • Exploration 2 : Routing Protocols and Concepts (V 4.0)
  • Exploration 3 : LAN Switching and Wireless (V 4.0)
  • Exploration 4 : Accessing the WAN (V 4.0)
  •  

    A Complete Learning Program

    The Cisco Networking Academy Program provides skills students need to work in IT fields. The program offers Web-based content, online assessment, hand-on labs, instructor training, and preparation for industry certifications

    Tuesday, December 23, 2008

    Bandwidth and Throuhgput

    Bandwidth and Throuhgput

    A major disadvantage of Ethernet 802.3 networks is collisions. Collisions occur when two hosts transmit frames simultaneously. When a collision occurs, the transmitted frames are corrupted or destroyed. The sending hosts stop sending further transmissions for a random period, based on the Ethernet 802.3 rules of CSMA/CD.
    Because Ethernet has no way of controlling which node will be transmitting at any time, we know that collisions will occur when more than one node attempts to gain access to the network. Ethernet's resolution for collisions does not occur instantaneously. Also, a node involved in a collision cannot start transmitting until the matter is resolved. As more devices are added to the shared media the likelihood of collisions increases. Because of this, it is important to understand that when stating the bandwidth of the Ethernet network is 10 Mb/s, full bandwidth for transmission is available only after any collisions have been resolved. The net throughput of the port (the average data that is effectively transmitted) will be considerably reduced as a function of how many other nodes want to use the network. A hub offers no mechanisms to either eliminate or reduce these collisions and the available bandwidth that any one node has to transmit is correspondingly reduced. As a result, the number of nodes sharing the Ethernet network will have effect on the throughput or productivity of the network.

    Collision Domains

    When expanding an Ethernet LAN to accommodate more users with more bandwidth requirements, the potential for collisions increases. To reduce the number of nodes on a given network segment, you can create separate physical network segments, called collision domains.

    The network area where frames originate and collide is called the collision domain. All shared media environments, such as those created by using hubs, are collision domains. When a host is connected to a switch port, the switch creates a dedicated connection. This connection is considered an individual collision domain, because traffic is kept separate from all other traffic, thereby eliminating the potential for a collision. The figure shows unique collision domains in a switched environment. For example, if a 12-port switch has a device connected to each port, 12 collision domains are created.
    As you now know, a switch builds a MAC address table by learning the MAC addresses of the hosts that are connected to each switch port. When two connected hosts want to communicate with each other, the switch uses the switching table to establish a connection between the ports. The circuit is maintained until the session is terminated. In the figure, Host A and Host B want to communicate with each other. The switch creates the connection that is referred to as a microsegment. The microsegment behaves as if the network has only two hosts, one host sending and one receiving, providing maximum utilization of the available bandwidth.

    Switches reduce collisions and improve bandwidth use on network segments because they provide dedicated bandwidth to each network segment.

    Network Latency

    Latency is the time a frame or a packet takes to travel from the source station to the final destination. Users of network-based applications experience latency when they have to wait many minutes to access data stored in a data center or when a website takes many minutes to load in a browser. Latency has at least three sources.

    First, there is the time it takes the source NIC to place voltage pulses on the wire, and the time it takes the destination NIC to interpret these pulses. This is sometimes called NIC delay, typically around 1 microsecond for a 10BASE-T NIC.

    Second, there is the actual propagation delay as the signal takes time to travel through the cable. Typically, this is about 0.556 microseconds per 100 m for Cat 5 UTP. Longer cable and slower nominal velocity of propagation (NVP) result in more propagation delay.

    Third, latency is added based on network devices that are in the path between two devices. These are either Layer 1, Layer 2, or Layer 3 devices. These three contributors to latency can be discerned from the animation as the frame traverses the network.
    Latency does not depend solely on distance and number of devices. For example, if three properly configured switches separate two computers, the computers may experience less latency than if two properly configured routers separated them. This is because routers conduct more complex and time-intensive functions. For example, a router must analyze Layer 3 data, while switches just analyze the Layer 2 data. Since Layer 2 data is present earlier in the frame structure than the Layer 3 data, switches can process the frame more quickly. Switches also support the high transmission rates of voice, video, and data networks by employing application-specific integrated circuits (ASIC) to provide hardware support for many networking tasks. Additional switch features such as port-based memory buffering, port level QoS, and congestion management, also help to reduce network latency.

    Switch-based latency may also be due to oversubscribed switch fabric. Many entry-level switches do not have enough internal throughput to manage full bandwidth capabilities on all ports simultaneously. The switch needs to be able to manage the amount of peak data expected on the network. As the switching technology improves, the latency through the switch is no longer the issue. The predominant cause of network latency in a switched LAN is more a function of the media being transmitted, routing protocols used, and types of applications running on the network.

    Network Congestion

    Network Congestion

    The primary reason for segmenting a LAN into smaller parts is to isolate traffic and to achieve better use of bandwidth per user. Without segmentation, a LAN quickly becomes clogged with traffic and collisions. The figure shows a network that is subject to congestion by multiple node devices on a hub-based network.

    These are the most common causes of network congestion:


    - Increasingly powerful computer and network technologies. Today, CPUs, buses, and peripherals are much faster and more powerful than those used in early LANs, therefore they can send more data at higher rates through the network, and they can process more data at higher rates.
    - Increasing volume of network traffic. Network traffic is now more common because remote resources are necessary to carry out basic work. Additionally, broadcast messages, such as address resolution queries sent out by ARP, can adversely affect end-station and network performance.
    - High-bandwidth applications. Software applications are becoming richer in their functionality and are requiring more and more bandwidth. Desktop publishing, engineering design, video on demand (VoD), electronic learning (e-learning), and streaming video all require considerable processing power and speed.

    LAN Segmentation

    LANs are segmented into a number of smaller collision and broadcast domains using routers and switches. Previously, bridges were used, but this type of network equipment is rarely seen in a modern switched LAN. The figure shows the routers and switches segmenting a LAN.

    In the figure the network is segmented into two collision domains using the switch.

    Bridges and Switches


    Although bridges and switches share many attributes, several distinctions differentiate these technologies. Bridges are generally used to segment a LAN into a couple of smaller segments. Switches are generally used to segment a large LAN into many smaller segments. Bridges have only a few ports for LAN connectivity, whereas switches have many.

    Routers

    Even though the LAN switch reduces the size of collision domains, all hosts connected to the switch are still in the same broadcast domain. Because routers do not forward broadcast traffic by default, they can be used to create broadcast domains. Creating additional, smaller broadcast domains with a router reduces broadcast traffic and provides more available bandwidth for unicast communications. Each router interface connects to a separate network, containing broadcast traffic within the LAN segment in which it originated.

    Controlling Network Latency


    When designing a network to reduce latency, you need to consider the latency caused by each device on the network. Switches can introduce latency on a network when oversubscribed on a busy network. For example, if a core level switch has to support 48 ports, each one capable of running at 1000 Mb/s full duplex, the switch should support around 96 Gb/s internal throughput if it is to maintain full wirespeed across all ports simultaneously. In this example, the throughput requirements stated are typical of core-level switches, not of access-level switches.

    The use of higher layer devices can also increase latency on a network. When a Layer 3 device, such as a router, needs to examine the Layer 3 addressing information contained within the frame, it must read further into the frame than a Layer 2 device, which creates a longer processing time. Limiting the use of higher layer devices can help reduce network latency. However, appropriate use of Layer 3 devices helps prevent contention from broadcast traffic in a large broadcast domain or the high collision rate in a large collision domain.

    Removing Bottlenecks


    Bottlenecks on a network are places where high network congestion results in slow performance.


    In this figure which shows six computers connected to a switch, a single server is also connected to the same switch. Each workstation and the server are all connected using a 1000 Mb/s NIC. What happens when all six computers try to access the server at the same time? Does each workstation get 1000 Mb/s dedicated access to the server? No, all the computers have to share the 1000 Mb/s connection that the server has to the switch. Cumulatively, the computers are capable of 6000 Mb/s to the switch. If each connection was used at full capacity, each computer would be able to use only 167 Mb/s, one-sixth of the 1000 Mb/s bandwidth. To reduce the bottleneck to the server, additional network cards can be installed, which increases the total bandwidth the server is capable of receiving. The figure shows five NIC cards in the server and approximately five times the bandwidth. The same logic applies to network topologies. When switches with multiple nodes are interconnected by a single 1000 Mb/s connection, a bottleneck is created at this single interconnect.

    Higher capacity links (for example, upgrading from 100 Mb/s to 1000 Mb/s connections) and using multiple links leveraging link aggregation technologies (for example, combining two links as if they were one to double a connection's capacity) can help to reduce the bottlenecks created by inter-switch links and router links. Although configuring link aggregation is outside the scope of this course, it is important to consider a device's capabilities when assessing a network's needs. How many ports and of what speed is the device capable of? What is the internal throughput of the device? Can it handle the anticipated traffic loads considering its placement in the network?

    Discovery 4 : Designing and Supporting Computer Networks (V 4.0)

    Cisco Networking Academy
    Discovery 4 : Designing and Supporting Computer Networks (V 4.0)


    Discovery 4 : Module 1 Exam Answers

    Discovery 4 : Module 2 Exam Answers

    Discovery 4 : Module 3 Exam Answers

    Discovery 4 : Module 4 Exam Answers

    Discovery 4 : Module 5 Exam Answers

    Discovery 4 : Module 6 Exam Answers

    Discovery 4 : Module 7 Exam Answers

    Discovery 4 : Module 8 Exam Answers

    Discovery 4 : Module 9 Exam Answers

    Discovery 4 : FINAL Exam Answers

    A Complete Learning Program
    The Cisco Networking Academy Program provides skills students need to work in IT fields. The program offers Web-based content, online assessment, hand-on labs, instructor training, and preparation for industry certifications

    Friday, December 19, 2008

    Share Your Labs Here

    Share Your Labs Here.... CCNA Resource, CCNA Labs , CCNA note.

    Tuesday, December 16, 2008

    CCNA Resources

    CCNA 1 - Module 1 Exam Answers Version 3.1
    CCNA 1 - Module 2 Exam Answers Version 3.1
    CCNA 1 - Module 3 Exam Answers Version 3.1
    CCNA 1 - Module 4 Exam Answers Version 3.1
    CCNA 1 - Module 5 Exam Answers Version 3.1
    CCNA 1 - Module 6 Exam Answers Version 3.1
    CCNA 1 - Module 6/7 Exam Answers Version 3.1
    CCNA 1 - Module 7 Exam Answers Version 3.1
    CCNA 1 - Module 8 Exam Answers Version 3.1
    CCNA 1 - Module 9 Exam Answers Version 3.1
    CCNA 1 - Module 9/10 Exam Answers Version 3.1
    CCNA 1 - Module 10 Exam Answers Version 3.1
    CCNA 1 - Module 11 Exam Answers Version 3.1
    CCNA 1 - Module Final Exam Answers(A) Version 3.1
    CCNA 1 - Module Final Exam Answers(B) Version 3.1
    CCNA 1 Networking Basics (Version 3.1)
    CCNA 2 - Module 1 Exam Answers Version 3.1
    CCNA 2 - Module 2 Exam Answers Version 3.1
    CCNA 2 - Module 3 Exam Answers Version 3.1
    CCNA 2 - Module 4 Exam Answers Version 3.1
    CCNA 2 - Module 5 Exam Answers Version 3.1
    CCNA 2 - Module 6 Exam Answers Version 3.1
    CCNA 2 - Module 7 Exam Answers Version 3.1
    CCNA 2 - Module 8 Exam Answers Version 3.1
    CCNA 2 - Module 9 Exam Answers Version 3.1
    CCNA 2 - Module 10 Exam Answers Version 3.1
    CCNA 2 - Module 11 Exam Answers Version 3.1
    CCNA 2 - Module Final Exam Answers Version 3.1
    CCNA 2 Router and Routing Basics (Version 3.1)
    CCNA 3 - Module 1 Exam Answers Version 3.1
    CCNA 3 - Module 2 Exam Answers Version 3.1
    CCNA 3 - Module 3 Exam Answers Version 3.1
    CCNA 3 - Module 4 Exam Answers Version 3.1
    CCNA 3 - Module 5 Exam Answers Version 3.1
    CCNA 3 - Module 6 Exam Answers Version 3.1
    CCNA 3 - Module 7 Exam Answers Version 3.1
    CCNA 3 - Module 8 Exam Answers Version 3.1
    CCNA 3 - Module 9 Exam Answers Version 3.1
    CCNA 3 - Module Final Exam Answers Version 3.1
    CCNA 3 Switching Basics and Intermediate Routing
    CCNA 4 - Module 1 Exam Answers Version 3.1
    CCNA 4 - Module 2 Exam Answers Version 3.1
    CCNA 4 - Module 3 Exam Answers Version 3.1
    CCNA 4 - Module 4 Exam Answers Version 3.1
    CCNA 4 - Module 5 Exam Answers Version 3.1
    CCNA 4 - Module 6 Exam Answers Version 3.1
    CCNA 4 - Module Final Exam Answers Version 3.1
    CCNA 4 WAN Technologies (Version 3.1)
    Exploration 1 - Module 1 Exam Answers V 4.0
    Exploration 1 - Module 2 Exam Answers V 4.0
    Exploration 1 - Module 3 Exam Answers V 4.0
    Exploration 1 - Module 4 Exam Answers V 4.0
    Exploration 1 - Module 5 Exam Answers V 4.0
    Exploration 1 - Module 6 Exam Answers V 4.0
    Exploration 1 - Module 7 Exam Answers V 4.0
    Exploration 1 - Module 8 Exam Answers V 4.0
    Exploration 1 - Module 9 Exam Answers V 4.0
    Exploration 1 - Module 10 Exam Answers V 4.0
    Exploration 1 - Module 11 Exam Answers V 4.0
    Exploration 1 - FINAL Exam Answers V 4.0.
    Exploration 1 : Network Fundamentals (V 4.0
    Exploration 2 - Module 1 Exam Answers V 4.0
    Exploration 2 - Module 2 Exam Answers V 4.0
    Exploration 2 - Module 3 Exam Answers V 4.0
    Exploration 2 - Module 4 Exam Answers V 4.0
    Exploration 2 - Module 5 Exam Answers V 4.0
    Exploration 2 - Module 6 Exam Answers V 4.0
    Exploration 2 - Module 7 Exam Answers V 4.0
    Exploration 2 - Module 8 Exam Answers V 4.0
    Exploration 2 - Module 9 Exam Answers V 4.0
    Exploration 2 - Module 10 Exam Answers V 4.0
    Exploration 2 - Module 11 Exam Answers V 4.0
    Exploration 2 - FINAL Exam Answers (A) V 4.0
    Exploration 2 - FINAL Exam Answers (B) V 4.0
    Exploration 2 - FINAL Exam Answers (C) V 4.0
    Exploration 2 : Routing Protocols and Concept...
    Exploration 3 - Module 1 Exam Answers V 4.0
    Exploration 3 - Module 2 Exam Answers V 4.0
    Exploration 3 - Module 3 Exam Answers V 4.0
    Exploration 3 - Module 4 Exam Answers V 4.0
    Exploration 3 - Module 5 Exam Answers V 4.0
    Exploration 3 - Module 6 Exam Answers V 4.0
    Exploration 3 - Module 7 Exam Answers V 4.0
    Exploration 3 - FINAL Exam Answers V 4.0.
    Exploration 3 : LAN Switching and Wireless
    Exploration 4 - Module 1 Exam Answers V 4.0
    Exploration 4 - Module 2 Exam Answers V 4.0
    Exploration 4 - Module 3 Exam Answers V 4.0
    Exploration 4 - Module 4 Exam Answers V 4.0
    Exploration 4 - Module 5 Exam Answers V 4.0
    Exploration 4 - Module 6 Exam Answers V 4.0
    Exploration 4 - Module 7 Exam Answers V 4.0
    Exploration 4 - Module 8 Exam Answers V 4.0
    Exploration 4 - FINAL Exam Answers(A) V 4.0
    Exploration 4 - FINAL Exam Answers(B) V 4.0
    Exploration 4 - FINAL Exam Answers(C) V 4.0
    Exploration 4 : Accessing the WAN (V 4.0.
    Discovery 1 - Module 1 Exam Answers V 4.0
    Discovery 1 - Module 2 Exam Answers V 4.0
    Discovery 1 - Module 3 Exam Answers V 4.0
    Discovery 1 - Module 4 Exam Answers V 4.0
    Discovery 1 - Module 5 Exam Answers V 4.0
    Discovery 1 - Module 6 Exam Answers V 4.0
    Discovery 1 - Module 7 Exam Answers V 4.0
    Discovery 1 - Module 8 Exam Answers V 4.0
    Discovery 1 - Module 9 Exam Answers V 4.0
    Discovery 1 : Networking for Home and Small B...
    Discovery 2 - Module 1 Exam Answers V 4.0
    Discovery 2 - Module 2 Exam Answers V 4.0
    Discovery 2 - Module 3 Exam Answers V 4.0
    Discovery 2 - Module 4 Exam Answers V 4.0
    Discovery 2 - Module 5 Exam Answers V 4.0
    Discovery 2 - Module 6 Exam Answers V 4.0
    Discovery 2 - Module 7 Exam Answers V 4.0
    Discovery 2 - Module 8 Exam Answers V 4.0
    Discovery 2 - FINAL Exam Answers V 4.0
    Discovery 2 : Working at a Small-to-Medium Bu...
    Discovery 3 - Module 1 Exam Answers V 4.0
    Discovery 3 - Module 2 Exam Answers V 4.0
    Discovery 3 - Module 3 Exam Answers V 4.0
    Discovery 3 - Module 4 Exam Answers V 4.0
    Discovery 3 - Module 5 Exam Answers V 4.0
    Discovery 3 - Module 6 Exam Answers V 4.0
    Discovery 3 - Module 7 Exam Answers V 4.0
    Discovery 3 - Module 8 Exam Answers V 4.0
    Discovery 3 - Module 9 Exam Answers V 4.0
    Discovery 3 - FINAL Exam Answers V 4.0
    Discovery 3 : Introducing Routing and Switchi...
    Discovery 4 - Module 1 Exam Answers V 4.0
    Discovery 4 - Module 2 Exam Answers V 4.0
    Discovery 4 - Module 3 Exam Answers V 4.0
    Discovery 4 - Module 4 Exam Answers V 4.0
    Discovery 4 - Module 5 Exam Answers V 4.0
    Discovery 4 - Module 6 Exam Answers V 4.0
    Discovery 4 - Module 7 Exam Answers V 4.0
    Discovery 4 - Module 8 Exam Answers V 4.0
    Discovery 4 - Module 9 Exam Answers V 4.0

    Discovery 4 - Module 9 Exam Answers V 4.0

    1. Which two statements describe factors that influence the layout of a proposal? (Choose two.)
    • Proposal layouts are required to use sans serif typefaces.
    A specific proposal layout is followed when one is specified in the RFP.
    • A designer chooses the layout if a written RFP does not specify an outline.

    • The software that is used to create the proposal dictates the proposal layouts.
    • Proposal layouts are required to use a format that is designed by the network engineer.

    2 . What two items are typically included in the executive summary of a proposal? (Choose two.)
    project scope summary
    • high-level implementation plan
    • quotes for all needed equipment
    • technical requirements for the design
    emphasis on the benefits that meet the goals of the customer

    3. Which proposal section describes the intended routing protocol, security mechanisms, and addressing for the planned network?
    logical design
    • physical design
    • executive summary
    • implementation plan
    • network requirements

    4. Which occurrence would indicate a failure of the design phase?
    • The incorrect model switches were ordered.
    • There is no customer signoff for task completion.
    • New requirements are identified after implementation begins.
    The new network capacity is inadequate to support required traffic.

    5. A network installation team is assigned to replace all core switches in an existing data center. No other upgrades are planned. Which kind of installation is this?
    • a new installation
    • a fork-lift installation
    a phased installation
    • a green field installation

    6. What service is provided Cisco standard warranty?
    • software application maintenance
    replacement of defected hardware
    • next business day delivery of replacement parts
    • access to the Cisco Technical Assistance Center (TAC) 24 hours a day, 7 days a week

    7. An upgraded version of the Cisco IOS has been purchased. However, the CD arrived damaged. How will this loss be covered?
    • a hardware warranty
    a software warranty
    • the Cisco SMARTnet Service
    • an additional service contract

    8. A company informs the account manager that the installation of a new edge router at the customer remote branch location cannot be done at the scheduled time because of a large order that the branch office needs to complete. As a result, the end date of the project must be adjusted to accommodate the additional time. What is the action should the account manager take?
    • Cancel the order for the new edge router.
    • Work with designer to redesign the branch network.
    • Instruct the technician to complete the install of the router at on the date in the contract.
    Adjust the timeline documentation to show the company how the delay will affect the
    • project completion date.


    9. NetworkingCompany completes the installation of a network upgrade for a retail customer. All of the onsite tests complete successfully and the customer IT staff approves the results of the tests. The manager of the retail store contacts NetworkingCompany to inform the company that the store will not pay for the upgrade until a recently purchased software package is installed and tested on the network. Which two items that are contained in the proposal can the account manager refer to when discussing this issue with the store manager?(Choose two.)
    the project scope
    • the bill-of-material
    • the project timeline
    the terms and conditions
    • the business goals of the customer
    • the evaluation of the current network

    10. The operation of a new branch location network is delayed because a VPN cannot be configured and established between the branch location and the main office. It is determined that the router at the main office does not have enough memory and does not have the correct Cisco IOS version image to support the VPN features. To prevent this delay, this problem should have been identified and corrected during which part of the design project?
    • the preparation of the business case
    • the prioritizing of the technical goals
    the characterization of the existing network
    • the implementation of the approved design

    11.The NetworkingCompany team is tasked to prepare an implementation schedule for a customer. It is determined that the new firewalls and wireless controllers that are specified in the design cannot be delivered and installed within the agreed upon time frame. The NetworkingCompany informs the customer of the problem. What two options can the NetworkingCompany team take to ensure the success of the project? (Choose two.)
    plan to add additional staff and resources to shorten the installation time after the new equipment is delivered
    • eliminate redundancy in the design to reduce the amount of equipment that is needed
    renegotiate a new time frame with the customer to accommodate the delay
    • delay the installation of the security devices and controllers until a later time
    • redesign the network to use only readily available equipment and software

    12. AAA Financial Services Company is performing implementation planning for a core switch upgrade. The company has 200 financial software programmers that work billable hours during the week. They have critical, scheduled money transfer transmissions that occur at hourly intervals every night. There are two, two-hour long IT maintenance windows scheduled for software upgrades, one on Saturday and one on Sunday. The bank advertises online banking as available 24 hours on business days and 21 hours on the weekends. However, a network upgrade that is necessary to replace some switches is expected to take four hours. Because of rack constraints, this time includes three hours to remove the old switches before the new switches can be installed and one hour to test the logical configuration. How should the implementation scheduling be handled
    • Defer the software upgrades. Use the Saturday window to perform the hardware installation. Use the Sunday window to perform the logical testing.
    • Coordinate and publish a separate four-hour downtime during Friday to perform the complete switch installation and testing process. Use the Saturday and Sunday windows to correct any outage problems after the Friday window.
    • Coordinate and publish two, four-hour downtimes incorporating the published Saturday and Sunday windows. Defer any software upgrades until the new network is proven to be working
    correctly with the old software. Use the Sunday window as a fallback scheduling period if there re problems necessitating backing out of the Saturday window.
    Coordinate and publish an eight-hour downtime incorporating the Saturday window. This ill allow four hours for installation and logical testing, one hour for troubleshooting and decision, and three hours to roll back to the previous configuration if the new switching cannot pass the logical testing. Defer any software upgrades until the new network is proven to be working orrectly with the old software.

    13. ncluded in a Bill of Materials (BOM) for a SOHO wired implementation is a Cisco 2811 router, Catalyst 2560 switch, four PCs, three laptops, and a networked printer. Wireless LAN capability will be implemented on this network. Which two equipment types must be added to the BOM to implement this request? (Choose two.)
    • DNS server
    • LAN switch
    wireless NICs
    • DHCP server
    wireless access points

    14. A customer has just taken delivery of a Cisco 2811 router and Catalyst 3560 switch. Included with the purchase is the SMARTnet Service. Which two resources are included with SMARTnet Service? (Choose two.)
    • signature file updates
    technical support from TAC
    • maintenance releases for OS

    • software application major releases
    • software application maintenance and minor releases

    15. A Cisco 1841 router has been purchased without an agreement for SMARTnet Service. What two items are guaranteed under the standard warranty? (Choose two.)
    • access to TAC
    replacement of defective physical media
    • advanced replacement of hardware parts
    • access to a renewable standard warranty contract
    • under normal use, replacement of defective hardware


    16. Upon completion of a proposal, a network design team must sell their ideas to two key stakeholders. Who are these two stakeholders? (Choose two.)
    customers
    • licensing boards
    • cabling contractors
    internal management
    • project implementation team

    17. What are two important guidelines when creating a slide presentation for a meeting with a customer? (Choose two.)
    • Use all capital letters on words and phrases when possible for added emphasis.
    • Provide varied background graphics to enhance viewer interest.
    Use contrasting colors for background and text to aid visibility.
    • Change fonts frequently to denote differences in subject matter.
    • Use bulleted text to lead the discussion.


    18. In order to finalize a project proposal, an account manager of a
    • networking company creates the terms and conditions section. What are two clauses that should be included in this section? (Choose two.)
    • cost summary
    • installation steps
    change order procedures
    • problem resolution process

    • maintenance contract quotation

    19. Which two items will a systems engineer include in an implementation plan? (Choose two.)
    references to design documents
    • the business goals of the customer
    • diagrams of the existing traffic flows
    the steps to install and test the network
    • cost of each network device and component

    20. Which statement describes a phased installation into an existing network?
    • A phased installation generally takes less time and expense than a green-field installation.
    • A phased installation is not suitable for large, multi-site network installations or upgrades.
    A phased installation requires detailed planning in order to avoid disruption of user services.
    • A phased installation involves building an entire replacement network and migrating users over to it.

    CCNA 1 - Module Final Exam Answers(B) Version 3.1

    CCNA 1 Networking Basics - FINAL Exam Answers (B)

    1. Convert the binary number 10111010 into its hexadecimal equivalent. Select the correct answer from the list below.
    • 85
    • 90
    • BA
    • A1
    • B3
    • 1C

    2. Convert the Hexadecimal number A2 into its Base 10 equivalent. Select the correct answer from the list below.
    • 156
    • 158
    • 160
    • 162
    • 164
    • 166

    3. Select the necessary information that is required to compute the estimated time it would take to transfer data from one location to another. (Choose two.)
    • file size
    • data format
    • network in use
    • type of medium
    • bandwidth of the link

    4. Using the data transfer calculation T=S/BW, how long would it take a 4MB file to be sent over a 1.5Mbps connection?
    • 52.2 seconds
    • 21.3 seconds
    • 6.4 seconds
    • 2 seconds
    • 0.075 seconds
    • 0.0375 seconds

    5. What are features of the TCP/IP Transport layer? (Choose two.)
    • path determination
    • handles representation, encoding and dialog control
    • uses TCP and UDP protocols
    • packet switching
    • reliability, flow control and error correction

    6. Which combinations of charges will be repelled by electric force? (Choose two.)
    • neutral and neutral
    • neutral and positive
    • neutral and negative
    • positive and positive
    • positive and negative
    • negative and negative

    7. Which of the following are considered the best electrical conductors for use in data network communications? (Choose three.)
    • glass fibers
    • copper
    • gold
    • plastic
    • silicon
    • silver

    8. During cable testing, which of the following are used to calculate the information carrying capacity of a data cable? (Choose two.)
    • bit speed
    • attenuation
    • wire map
    • saturation limit
    • analog bandwidth

    9. The highest capacity Ethernet technologies should be implemented in which areas of a network? (Choose three.)
    • between workstation and backbone switch
    • between individual workstations
    • between backbone switches
    • between enterprise server and switch
    • on aggregate access links

    10. What device must be used between an AUI port of a networking device and the media to which it is being connected?
    • a transducer
    • a transmitter
    • a transceiver
    • a transponder
    • a port replicator

    11. An ISDN Basic Rate Interface (BRI) is composed of how many signaling channels?
    • 1
    • 2
    • 3
    • 4

    12. Which of the following items are common to all 100BASE technologies? (Choose three.)
    • frame format
    • media
    • connectors
    • timing
    • multi-part encoding

    13. Which of the following does 1000BASE-T use to accomplish gigabit speeds on Cat 5e cable?
    • the use of four conductors in full-duplex mode
    • the use of two multiplexed pairs of wires, simultaneously
    • the use of three pairs of wires for data and the fourth for stabilization and forward error correction
    • the use of all four pairs of wires in full-duplex mode, simultaneously

    14. For which of the following is Ethernet considered the standard? (Choose three.)
    • inter-building connection
    • mid-length voice
    • video conferencing
    • vertical wiring
    • horizontal wiring
    • diagonal wiring

    15. John has been hired as the network administrator of a local company and has decided to add more hubs to the company's existing network. Which of the following has been caused by John's inexperience?
    • collision domain extended
    • an increased number of collision domains
    • increased network performance
    • increased bandwidth
    • extended bandwidth

    16. "CompA" is trying to locate a new computer named "CompB" on the network. Which of the following does "CompA" broadcast to find the MAC address of "CompB"?
    • MAC request
    • ARP request
    • ping
    • Telnet
    • proxy ARP

    17. Which of the following is a term associated with replacing hubs with switches to increase the number of collision domains?
    • encapsulation
    • latency
    • segmentation
    • layered model
    • broadcast domain
    • extended

    18. The accumulation of traffic from which of the following can cause a network condition called broadcast radiation? (Choose three.)
    • anonymous FTP servers
    • telnet sessions
    • video over IP applications
    • NAS services
    • ARP requests
    • RIP updates

    19. Which of the following describes the use of Spanning Tree Protocol (STP)?
    • resolve routing loops
    • eliminate Split Horizon errors
    • limit collisions
    • resolve switching loops

    20. Which term describes an ARP response by a router on behalf of a requesting host?
    • ARP
    • RARP
    • Proxy ARP
    • Proxy RARP

    21. Which OSI layer encapsulates data into packets?
    • session
    • transport
    • network
    • data link

    22. Which OSI layer defines the functions of a router?
    • physical
    • data link
    • network
    • transport
    • session

    23. Which of the following are Cisco proprietary routing protocols? (Choose two.)
    • RIPv2
    • IGRP
    • OSPF
    • BGP
    • RIPv1
    • EIGRP

    24. A company with a Class B license needs to have a minimum of 1,000 subnets with each subnet capable of accommodating 50 hosts. Which mask below is the appropriate one?
    • 255.255.0.0
    • 255.255.240.0
    • 255.255.255.0
    • 255.255.255.192
    • 255.255.255.224

    25. A small company has a class C network license and needs to create five usable subnets, each subnet capable of accommodating at least 20 hosts. Which of the following is the appropriate subnet mask?
    • 255.255.255.0
    • 255.255.255.192
    • 255.255.255.224
    • 255.255.255.240

    26. When a network administrator applies the subnet mask 255.255.255.248 to a Class A address, for any given subnet, how many IP addresses are available to be assigned to devices?
    • 1022
    • 510
    • 254
    • 126
    • 30
    • 6

    27. If a network administrator needed to download files from a remote server, which protocols could the administrator use to remotely access those files? (Choose two.)
    • NFS
    • ASCII
    • TFTP
    • IMAP
    • FTP
    • UDP

    28. What is established during a connection-oriented file transfer between computers? (Choose two.)
    • a temporary connection to establish authentication of hosts
    • a connection used for ASCII or binary mode data transfer
    • a connection used to provide the tunnel through which file headers are transported
    • a command connection which allows the transfer of multiple commands directly to the remote server system
    • a control connection between the client and server

    29. Which of the following protocols are used for e-mail transfer between clients and servers? (Choose three.)
    • TFTP
    • SNMP
    • POP3
    • SMTP
    • IMAP4
    • postoffice

    30. What type of wiring problem is depicted in this sample of a cable tester?
    • a fault
    • a short
    • an open
    • a split
    • a good map

    31. Which layer of the OSI model covers physical media?
    • Layer 1
    • Layer 2
    • Layer 3
    • Layer 4
    • Layer 5
    • Layer 6

    32. What type of network cable is used between a terminal and a console port?
    • cross-over
    • straight-through
    • rollover
    • patch cable

    33. What does the "10" in 10Base2 indicate about this version of Ethernet?
    • The version uses Base10 numbering within the frames.
    • The version operates at a transmission rate of 10 Mbps.
    • Frames can travel 10 meters unrepeated.
    • The maximum frame length is 10 octets.


    34. How is a MAC address represented?
    • four groups of eight binary digits separated by a decimal point
    • four Base10 digits separated by a decimal point
    • six hexadecimal digits
    • twelve hexadecimal digits
    • twenty-four Base10 digits

    35. To make sure timing limitations are not violated when implementing a 10 Mbps Ethernet network involving hubs or repeaters, a technician should adhere to which rule?
    • the 4-5-3 rule
    • the 6-4-2 rule
    • the 3-4-5 rule
    • the 5-4-3 rule

    36. Which of the following wireless standards increased transmission capabilities to 11 Mbps?
    • 802.11a
    • 802.11b
    • 802.11c
    • 802.11d

    37. Which protocol functions at the internet layer of the TCP/IP protocol suite?
    • File Transfer Protocol (FTP)
    • Trivial File Transfer Protocol (TFTP)
    • Transmission Control Protocol (TCP)
    • Internet Protocol (IP)
    • User Datagram Protocol (UDP)
    • Simple Mail Transport Protocol (SMTP)

    38. Which of these workstation installation and setup tasks are concerned with network access layer functions? (Choose two.)
    • configuring the e-mail client
    • installing NIC drivers
    • configuring IP network settings
    • connecting the network cable
    • using FTP to download application software updates

    39. Which part of an IP address identifies a specific device on a network?
    • first two octets
    • third and fourth octets
    • network portion
    • host portion
    • only the fourth octet

    40. Which of the following are features of the Internet Protocol (IP)? (Choose two.)
    • It is the most widely implemented global addressing scheme.
    • It allows two hosts to share a single address on a local area network.
    • It is a hierarchical addressing scheme allowing addresses to be grouped.
    • It is only locally significant, used primarily on local area networks.

    41. In a new network installation, the network administrator has decided to use a medium that is not affected by electrical noise. Which cable type will best meet this standard?
    • coaxial
    • screened twisted pair
    • shielded twisted pair
    • unshielded twisted pair
    • fiber optic

    42. What is the recommended maximum number of workstations configured on a peer-to-peer network?
    • 25
    • 15
    • 10
    • 5
    • 2

    43. What is the maximum distance that 10BASE-T will transmit data before signal attenuation affects the data delivery?
    • 100 meters
    • 185 meters
    • 300 meters
    • 500 meters

    44. Which type of institution does the domain suffix .org represent?
    • government
    • education
    • network
    • non-profit

    45. Which of the following services is used to translate a web address into an IP address?
    • DNS
    • WINS
    • DHCP
    • Telnet

    46. Which part of the URL http://www.awsb.ca/teacher gives the name of the domain?
    • www
    • http://
    • /teacher
    • awsb.ca

    47. Which of the following will test the internal loopback of a node?
    • ping 10.10.10.1
    • ping 192.168.1.1
    • ping 127.0.0.1
    • ping 223.223.223.223
    • ping 255.255.255.255

    48. Which of the following is the Layer 4 PDU?
    • bit
    • frame
    • packet
    • segment

    49. Which of the following are small, discrete components found within a personal computer? (Choose three.)
    • transistor
    • microprocessor
    • power supply
    • capacitor
    • light emitting diode
    • hard disk

    50. What is important to remember about the data link layer of the OSI model when considering Peer to Peer communication? (Choose three.)
    • It links data to the transport layer.
    • It encapsulates frames into packets.
    • It provides a service to the network layer.
    • It encapsulates the network layer information into a frame.
    • Its header contains a physical address which is required to complete the data link functions.
    It encodes the data link frame into a pattern of 1s and 0s (bits) for transmission on the medium.

    51. Which of the following are useable Class A IP addresses with a default subnet mask? (Choose three.)
    • 127.0.39.1
    • 111.9.28.30
    • 123.1.2.132
    • 128.50.38.2
    • 105.1.34.1
    • 0.23.92.3

    CCNA 1 - Module Final Exam Answers(A) Version 3.1

    CCNA 1 Networking Basics - FINAL Exam Answers (A)

    1. Which of the following OSI layers offers reliable, connection-oriented data communication services?
    • application
    • presentation
    • session
    • transport
    • network

    2. Router interface Ethernet 0 has been assigned the IP address 10.172.192.168 255.255.255.240. What is the network IP address of this interface?
    • 10.0.0.0
    • 10.172.0.0
    • 10.172.192.0
    • 10.172.192.160
    • 10.172.192.168
    • 10.172.192.175

    3. Examine the graphic with current configurations. The New York Offices of ABC Company recently upgraded the computers in the administrative office. Shortly after the upgrade, Host A in the clerical office failed and was replaced with one of the retired administrative office computers. However, the computer can not access the company network in the new location. What is the likely cause of this network access issue for Host A?
    • MAC address incorrectly entered
    • default gateway incorrectly entered
    • subnet mask incorrectly entered
    • IP address incorrectly entered

    4. Which of the following increases the potential for a collision to occur?
    • the use of an active hub instead of an intelligent hub
    • the use of an intelligent hub instead of an active hub
    • a reduction in the number of devices attached to the hub
    • an increase in the number of devices attached to the hub •

    5. What is attenuation?
    • opposition to the flow of current
    • measurement of electrical signals relative to time
    • degradation of a signal as it travels along the medium
    • amount or volume of traffic that is flowing on the medium

    6. Two peer hosts are running applications that exchange data using UDP. During the current session, a datagram fails to arrive at the destination. What is true concerning the retransmission of the datagram?
    • Datagram retransmission occurs when the retransmission timer expires in the source host.
    • Datagram retransmission occurs when the retransmission timer expires in the destination host.
    • Datagram retransmission is controlled by the application layer protocol.
    • Datagram retransmission involves only the data with sequence numbers equal to or higher than the sequence number of the current datagram.

    7. What is significant about the ping 127.0.0.1 command?
    • It verifies the operation of the TCP/IP protocol stack on a host and is called an internal loopback test.
    • It verifies connection to the remote host with the IP address 127.0.0.1.
    • It verifies whether the router that connects the local network to other networks can be reached.
    • It verifies the route packets take between the local host and the host with the IP address 127.0.0.1.

    8. Which LAN switching mode has the highest latency?
    • fast forward
    • fragment-free
    • latency forwarding
    • store-and-forward

    9. Which of the following application layer protocols use UDP segments? (Choose two.)
    • DNS
    • FTP
    • Telnet
    • TFTP
    • SMTP

    10. Which cable specifications are indicated by 100BASE-T?
    • 100-Mbps transmission speed, baseband signal, coaxial cable
    • 100-Mbps transmission speed, broadband signal, twisted-pair cable
    • 100-Mbps transmission speed, baseband signal, twisted-pair cable
    • Equal to 10-Gbps transmission speed, baseband signal, twisted-pair cable

    11. When is a crossover cable used in a network?
    • when connecting a host to the router console port
    • when connecting a host to a switch
    • when connecting a host to a host
    • when connecting a switch to a router

    12. Refer to the graphic. What must be configured on Host A to allow it communicate with the e-mail server? (Choose three.)
    • IP address •
    • subnet mask •
    • default gateway •
    • router name
    • switch name
    • NetBIOS name address

    13. Which cable diagram displays the end to end pinout for a crossover cable used with Cisco devices?
    • Cable A
    • Cable B
    • Cable C
    • Cable D

    14. Which type of address is 192.168.17.134/29?
    • host address
    • network address
    • broadcast address
    • multicast address

    15. How many collision domains are shown in the diagram?
    • three
    • four
    • five
    • six
    • seven
    • eight

    16. When is a straight-through cable used in a network?
    • when connecting a router through the console port
    • when connecting one switch to another switch
    • when connecting a host to a switch
    • when connecting a router to another router

    17. How does network cable length affect attenuation?
    • Category 5 cable that is run in metal conduit has the highest attenuation in the shortest distance.
    • Shorter cable lengths have greater signal attenuation.
    • Longer cable lengths have greater signal attenuation.
    • The length of the cable has no effect on signal attenuation.

    18. Which of the following statements are correct about CSMA/CD? (Choose three.)
    • It is a media access method used in LANs. •
    • It is a media access method used in FDDI WANs.
    • When a device needs to transmit, it checks to see if the media is available. •
    • A device sends data without checking media availability because all devices have equal access.
    • Multiple devices can successfully transmit simultaneously.
    • Only one device can successfully transmit at a time.

    19. Which of the following must be present for current to flow? (Choose three.)
    • closed loop
    • bit-generating device
    • insulating material
    • source of voltage
    • load
    • switch

    20. If Host A pings Host B through a newly installed switch with no entries in the MAC address table, which stations will receive the ping packet?
    • B only
    • A and B
    • B and switch
    • A, B, and switch
    • B, C, D, and switch •
    • A, B, C, D, and switch

    21. Which devices shown in the graphic must have a MAC address?
    • only PC
    • only router
    • PC and router
    • PC, hub, and router
    • PC, printer, and router

    22. What kind of connection is represented in the graphic?
    • console connection
    • Ethernet connection
    • ISDN connection
    • leased line connection

    23. Which of the following is the decimal representation of the binary number 11010011?
    • 203
    • 204
    • 211
    • 212

    24. Which type of cable is required to make a connection between a router console port and a PC COM port?
    • straight-through cable
    • crossover cable
    • rollover cable
    • DB-9 cable
    • coaxial cable

    25. Determine the number of useable networks and hosts for the IP address 192.168.50.0/27
    • 4 networks / 62 hosts
    • 6 networks / 64 hosts
    • 32 networks / 8 hosts
    • 6 networks / 30 hosts
    • 8 networks / 32 hosts
    • 2 networks / 8 hosts

    26. A network administrator is placing an older router back in to service. The administrator discovered that the IOS and configuration files need to be updated to meet the LAN specifications. Which application layer protocol is used to transfer the new configuration files into the router memory?
    • SNMP
    • SMTP
    • HTTP
    • TFTP

    27. Which of the following best describes Spanning Tree Protocol?
    • It enables a network to span across multiple physical segments.
    • It enables a switch to eliminate switching loops.
    • It enables a switch to dynamically choose the best switch mode.
    • It enables a switch to perform as a router.

    28. Which of the following subnet masks could be used when subnetting a Class B IP address? (Choose two.)
    • 255.0.0.0
    • 255.255.0.0
    • 255.192.255.0
    • 255.224.0.0
    • 255.255.252.0
    • 255.255.255.128

    29. How is data encapsulated as it is moved down the OSI model?
    • data, segments, frames, packets, bits
    • data, packets, segments, frames, bits
    • data, segments, packets, frames, bits
    • data, packets, frames, segments, bits

    30. Which of the following describes latency?
    • the noise generated from outside a cable
    • the degradation of a signal as it travels along the media
    • the time required for a NIC to place a frame on the network media
    • the delay between the time a frame leaves its source device and reaches its destination

    31. Which of the following is the binary representation of the decimal number 111?
    • 01101111
    • 01111101
    • 11110111
    • 11101101

    32. Which LAN switching mode begins switching after reading only the first 64 bytes of the frame?
    • fast forward
    • fragment-free
    • latency forwarding
    • store-and-forward

    33. When using Category 5 UTP cable, which RJ-45 pin pairs are used to exchange data between hosts on an Ethernet network?
    • 1 and 2; 4 and 5
    • 1 and 2; 3 and 6 •
    • 3 and 6; 7 and 8
    • 4 and 5; 7 and 8

    34. Which of the following commands could be used on a Windows-based computer to view the current IP configuration of the system? (Choose two.)
    • configip
    • ifconfig
    • ipconfig
    • winipcfg
    • winipconfig

    35. Which type of address is 192.168.17.111/28?
    • host address
    • network address
    • broadcast address
    • multicast address

    36. Which of the following networking devices increase the number of collision domains? (Choose three.)
    • switch
    • hub
    • router
    repeater
    • bridge

    37. What information can be determined from the MAC addresses of PC1, PC2, and PC3, as shown in the graphic? (Choose two.)
    • PC1 and PC2 NICs need to be replaced because they have the same OUI identifier.
    • PC2 and PC3 NICs need to be replaced because they have different OUI identifiers.
    • PC1 and PC2 NICs are from the same vendor.
    • PC1 and PC3 NICs need to be replaced because they have the same vendor-assigned address.
    • PC2 and PC3 NICs are from different vendors.
    • PC2 and PC3 NICs are from the same vendor.

    38. Which of the following are considered WAN technologies? (Choose two.)
    • DSL
    • Ethernet
    • Wireless Ethernet
    • T1-Carrier
    • Token Ring

    39. which one of the router connectors shown in the graphic would be used for a LAN connection?
    • Connector A
    • Connector B
    • Connector C
    • Connector D

    40. How is full-duplex capability typically achieved in fiber-optic cable?
    • Two fibers are encased in separate sheaths.
    • Light is bounced at different rates in opposite directions.
    • Transmit speeds are so high that half-duplex is acceptable.
    • Colors of the light spectrum are separated into transmit and receive streams.

    41. Which of the following are characteristics of IP? (Choose three.)
    • connection-oriented protocol
    • connectionless protocol•
    • reliable protocol
    • unreliable protocol •
    • routed protocol •
    • routing protocol

    42. Which of the following describe the token-passing logical topology? (Choose two.)
    • FDDI is an example of a token-passing network.
    • Token-passing logical topologies must also be physical ring topologies.
    • One of the disadvantages of the token-passing logical topology is the high collision rate.
    • Computers transmit data after "listening" to the wire to detect other traffic.
    • Computers are allowed to transmit data only when they possess a token.

    43. What is the maximum length of a media segment used for 100BASE-TX?
    • 100 meters
    • 185 meters
    • 400 meters
    • 500 meters

    44. which of the following networking devices divide a network into separate collision domains? (Choose two.)
    • repeater
    • bridge
    • switch
    • AUI
    • hub

    45. Which of the following are characteristics of UTP cable? (Choose three.)
    • Each wire is covered by insulating material.
    • It is not affected by EMI or RFI.
    • It is a four-pair wire medium.•
    • It is difficult to terminate the cable.
    • It relies on the cancellation effect produced by the twisted wire pairs.
    • It is more expensive than any other type of LAN cabling.

    46. Examine the graphic with current configurations. Host A in the Clerical offices failed and was replaced. Although a ping to 127.0.0.1 was successful, the replacement computer can not access the company network. What is the likely cause of the problem?
    IP address incorrectly entered
    network cables unplugged
    • subnet mask incorrectly entered
    network card failure

    47. Which of the following describes a physical full-mesh topology?
    • It requires termination at both ends of the cable.
    • It uses a hub or a switch as a central point to connect all wires.
    • It provides maximum connectivity between all network systems.
    • It links all computers to a main computer that controls all traffic on the network.

    48. Which two statements describe the TFTP protocol? (Choose two.)
    • uses authenticated file transfer procedure
    • provides connection-oriented service
    • provides connectionless service
    • provides more features that FTP
    • lacks most of the features of FTP

    49. Which of the following are transport layer protocols of the TCP/IP model? (Choose two.)
    • FTP
    • UDP
    • SMTP
    • TFTP
    • TCP

    50. Which type of UTP network cable connects two Cisco switches?
    • straight-through
    • crossover
    • rollover
    • patch

    51. How will the MAIN router dynamically learn a route to the 10.16.10.48/28 subnetwork in the diagram?
    • with a routed protocol
    • with a routing protocol
    • with a static route
    • with a directly connected route

    52. Which of the following describes the RIP version 1 routing protocol?
    • Cisco proprietary hybrid protocol
    • distance vector protocol that uses hop count as the only metric •
    • link state protocol supporting multiple routed protocols
    • distance vector protocol that uses delay, bandwidth, load, and reliability metrics

    53. How many broadcast domains are shown in the diagram?
    • three
    • four
    • five
    • six
    • seven
    • eight

    54. Which of the following are advantages of UTP cable? (Choose three.)
    • less expensive than fiber optic
    • flexible and easy to run in a building
    • distance between signal boosts is longer than it is for coaxial
    • transmits data at a faster rate than any copper-based media
    • receives less RMF and EMI interference than other types

    Which of the following devices extend a collision domain? (choose 2)
    • -hub
    • -repeater

    Monday, December 15, 2008

    Discovery 4 - Module 8 Exam Answers V 4.0

    1. Which mechanism is used to create a floating static route?
    • administrative distance
    • cost
    • hop count
    • passive interface

    2. IPSec operates at which layer of the OSI model?
    • application
    • network
    • datalink
    • transport

    3. Which is true regarding Frame Relay LMI?
    • There are three LMI types standardized by ANSI, ITU-T, and Cisco.
    • Routers at each end of a Frame Relay virtual circuit must always use the same LMI type.
    • The LMI type must be manually configured.
    • The only function of LMI is to verify the connection between the router and the Frame Relay switch.

    4. Which statement identifies the IP address design for subinterfaces that are configured for a Frame Relay network?
    • Multipoint configurations require the IP address of each subinterface on each router to be in its own subnet.
    • Multipoint configurations require IP addresses for each subinterface on each router to be a part of the same subnet.
    • Point-to-point configurations require IP addresses for each subinterface on each router to be a part of the same subnet.
    • Point-to-point configurations do not require IP addresses on each subinterface on each router.
    • Multipoint configurations do not require IP addresses on each subinterface on each router.

    5. Which three algorithms can be used to encrypt user data in an IPSec VPN framework? (Choose three.)
    • 3DES
    • AES

    • Diffie-Hellman
    • DES
    • ESP
    • SHA

    6. Which flag is set by a Frame Relay switch to inform the receiving station that congestion was experienced?
    • BECN
    • DE
    • FECN
    • FCS

    7. Refer to the exhibit. The complete configuration of a Frame Relay interface on the Chicago router is shown. How does the Chicago router know which DLCI is mapped to the IP address of the remote router?
    • DE
    • CIR
    • FECN
    • Inverse ARP

    8. What statement correctly defines the purpose of the split horizon rule?
    • marks the route unreachable in a routing update that is sent to other routers
    • prevents routers from advertising a network through the interface from which the update came
    • prevents routers from accepting higher cost routes to networks previously marked as inaccessible before the timer expires
    • limits the number of hops a packet can traverse through the network before it should be discarded

    9. Which PVC status suggests that the router recognizes the DLCI configured on its interface as being present on the Frame Relay switch, but the PVC associated with the DLCI is not capable of end-to-end communication?
    • active
    • deleted
    • inactive
    • idle

    10. Refer to the exhibit. Which router command is used to associate a Layer 2 address with the corresponding Layer 3 address?
    • Miller(config-if)#frame-relay map ip 172.16.150.1 110
    • Miller(config-if)#frame-relay map ip 172.16.150.1 112
    • Miller(config-if)#frame-relay map ip 172.16.150.2 110
    • Miller(config-if)#frame-relay map ip 172.16.150.2 112

    11. A network administrator issued the command show frame-relay pvc. The response from the router shows the status of a PVC as deleted. What is the reason for this status?
    • The DLCI is using the wrong LMI type.
    • The DLCI is usable but has little activity.
    • The DLCI is programmed in the switch but the circuit is not usable.
    • The DLCI configured on the CPE device does not match the DLCI.

    12. What is one benefit of using a network simulation software package?
    • The network design can be tested before it is actually implemented.
    • Simulation software packages are quickly updated to support new network technologies and devices.
    • Simulated devices have the same features as actual devices, allowing for detection of all potential problems.
    • Software packages can simulate all possible network traffic conditions, giving an accurate prediction of network performance.

    13. What are two components a network designer considers when planning a VPN? (Choose two.)
    • encryption algorithm for privacy and security
    • encapsulation protocol to use when creating the VPN tunnel

    • switching technology to optimize VPN WAN throughput
    • tunneling technology for guarding against data corruption
    • routing protocol on the gateway for optimum performance

    14. When identifying VPN requirements for endpoint users, what care must be taken to protect the network when remote users log in from unsecured public locations?
    • Ensure that the user has VPN client software that allows access to all internal resources.
    • Ensure that the VPN user traffic does not slow down internally sourced traffic on the network.
    • Ensure that there are no obstacles to hamper the users from accessing all internal resources.
    • Ensure that remote users can only access network resources that are appropriate to their job function.

    15. Which two components are key elements when implementing a VPN? (Choose two.)
    • concentration
    • encryption
    • prioritization
    • compression
    • encapsulation

    16. What tool can help ease the configuration of VPN servers on routers?
    • Cisco SDM
    • PIX Firewall
    • Cisco VPN Concentrator
    • Cisco Adaptive Security Appliances

    17. What is used to identify the path to the next frame-relay switch in a Frame Relay network?
    • CIR
    • DLCI
    • FECN
    • BECN

    18. Which two statements are true regarding VPN security? (Choose two.)
    • Users may only establish a VPN connection from secure locations and never from public areas.
    • Users that connect to a network through a VPN do not have to log in to resources on the network.
    • Users that connect to a network through a VPN are are considered trusted users on the network.
    • Users may establish a VPN connection from unsecure locations such as airports and hotel lobbies.

    • Users that connect to a network through a VPN should have access to all the resources on the network.

    19. Refer to the exhibit. What is placed in the address field of a frame that will travel from the Orlando office to the DC office?
    • MAC address of the Orlando router
    • MAC address of the DC router
    • 192.168.1.25
    • 192.168.1.26
    • DLCI 100
    • DLCI 200

    20. Two directly connected routers are able to ping each other through the Serial 0/0/0 interfaces. A network administrator changes the encapsulation on one router to PPP, and the other is left at the default value. What statement would appear in the output of the show interfaces command issued on one of the routers?
    • Serial 0/0/0 is up, line protocol is up
    • Serial 0/0/0 is down, line protocol is down
    • Serial 0/0/0 is up, line protocol is down
    • Serial 0/0/0 is down, line protocol is up
    • Serial 0/0/0 is administratively down, line protocol is down

    21. Refer to the exhibit. What statement is true about the configuration shown for R2?
    • R2 is configured as the Frame Relay switch.
    • R2 is configured as the main site in a multipoint Frame Relay WAN prototype.
    • R2 is configured as the main site in a point-to-point Frame Relay WAN prototype.
    • R2 is configured as a remote site in a multipoint Frame Relay WAN prototype.
    • R2 is configured as a remote site in a point-to-point Frame Relay WAN prototype.

    22. A company uses serial interfaces on its border router to connect to branch offices through WAN connections. The security policy dictates that the encapsulation should use PPP with authentication protocol CHAP. Which statement is true about the configuration requirement of CHAP?
    • Both the username and password are case sensitive.
    • Neither the username nor the password is case sensitive.
    • The username is case sensitive but the password is not case sensitive.
    • The password is case sensitive but the username is not case sensitive.

    23. Which two statements about split tunnels are true? (Choose two.)
    • Local LAN printing will use the VPN tunnel.
    • The traffic load on the VPN server is increased.
    • Traffic to the corporate network will be encrypted.
    • There is a reduced security risk to the corporate network.
    • All traffic travels across the VPN tunnel from client to server.
    • Traffic to public web sites and general Internet navigation is not encrypted.

    24. An IP address has been assigned to the S0/0/0 interface of a new Cisco router. The administrator wishes to quickly test basic connectivity with the serial interface of an adjoining Cisco router via the use of the default WAN protocol. Which WAN protocol will be used for this test?
    • PPP
    • Frame Relay
    • DSL
    • HDLC
    • ATM 

    25. Which two statements about split tunnels are true? (Choose two.)
    • Local LAN printing will use the VPN tunnel.
    • The traffic load on the VPN server is increased.
    • Traffic to the corporate network will be encrypted.
    • There is a reduced security risk to the corporate network.
    • All traffic travels across the VPN tunnel from client to server.
    • Traffic to public web sites and general Internet navigation is not encrypted.