Você está na página 1de 5

7/16/12

01.htm

Close Window

Assessment System
1. Assessment Selection 2. Assessment Settings

3. Take Assessment

Take Assessment - DCompNtwk Final - CCNA Discovery: Designing and Supporting Computer Networks (Version 4.0)

Tim e Rem aining: 01:09:38

If a router is unable to find a suitable IOS to load into RAM, in what mode does the boot process end? setup mode user mode rommon mode privileged mode Which statement describes the use of a network baseline? It creates a high level logical network diagram. It provides a point of reference for future network evaluations. It allows precise identification of the original location of network equipment. It should be established as soon as a problem is detected on the network. A company has help desk staff that is not highly trained in VPNs. What two features or technologies must the network designer identify as training needs in order for the help desk to support secure remote access for teleworkers? (Choose two.) QoS operation VLAN configuration tunneling protocols IPv6 and IPv4 dual stack encryption algorithms Frame Relay configuration

file:///C:/Documents and Settings/cs/Desktop/sudu/01.htm

1/5

7/16/12

01.htm

Refer to the exhibit. A networking engineer is characterizing an existing network for a new customer. The engineer issues a show running-config command on the R1 router to gather configuration information. What is the engineer able to determine as a result of viewing the output of this command? The R1 router has two specific routes to the main office LANs in the routing table. The default route for the R1 router points to the Edge1 router. The R1 router will load-balance traffic to the main office LANs by using both DSL and Frame Relay. A connection through ISP-1 will be used to reach the main office LANs if the Frame Relay network is unavailable. 5 What type of Frame Relay subinterface must be used to connect remote sites without having to disable split horizon? multipoint multiaccess point-to-point nonbroadcast multiaccess Which feature of network design and configuration would be considered a weakness? Choosing a flat network model. Choosing to implement an IPS instead of IDS. Choosing to disable Telnet and allow only SSH connections for remote access to the core routers. Choosing not to broadcast the SSID for wireless access points. Which IOS component can be used to classify and monitor network traffic? CDP NBAR CiscoWorks Network Assistant Who provides technical support and training after deploying a network solution on a large networking team? account manager network designer pre-sales engineer post-sales field engineer 9

file:///C:/Documents and Settings/cs/Desktop/sudu/01.htm

2/5

7/16/12

01.htm

Refer to the exhibit. Which summarized route would be advertised by R1 to R2? 10.0.0.0/13 10.4.0.0/14 10.5.0.0/13 10.6.0.0/14 10

Refer to the exhibit. A network administrator is configuring a new router to provide routing between VLANs. The administrator removes the router from the box and connects the Fa0/0 interface to a trunking port on the switch. After the configuration is applied to the router, as shown in the exhibit, the traffic between VLANs fails. What is causing this to occur? The R1 router needs a routing protocol configured. The subinterfaces of the R1 router should have IP addresses applied. The R1 router needs three additional Fast Ethernet interfaces installed. The subinterfaces of the R1 router should be configured in the same VLAN.

11

file:///C:/Documents and Settings/cs/Desktop/sudu/01.htm

3/5

7/16/12

01.htm

Refer to the exhibit. A pre-sales systems engineer receives a diagram of the exhibited WAN implementation from a customer. EIGRP is the routing protocol that is used on the WAN. None of the parameters for EIGRP metric calculation have been modified in any router configurations. Which statement is true about the routing table on router RM? There is a single route to the 192.168.24.0/24 LAN using the T1 connection. There is a single route to the 192.168.24.0/24 LAN using the DSL connection. There is a single route to the 192.168.24.0/24 LAN using the Metro Ethernet connection. EIGRP installs all three routes to the 192.168.24.0/24 LAN and load balances the traffic. 12

Refer to the exhibit. Following a test plan, the network systems engineer completes the configuration of an access layer switch and connects three PCs. The engineer attempts to ping from each PC to the other connected PCs to test the configuration. Which statement describes the result of the last step? Host 1 can ping Host 2. Host 1 can ping Host 3. Host 2 can ping Host 3. No hosts can ping any other host. 13 The network infrastructure at the headquarters of an organization consists of Cisco network devices that are running RIPv1. As part of an upgrade project, a portion of the company backbone will be increased to 10 Gb/s and needs to support unequal cost load balancing between routers. The IP addressing scheme is also changing and needs to support VLSM and CIDR. Which routing protocol should be selected for the network? BGP EIGRP OSPF RIPv2 14 A network administrator has removed a router from the network for maintenance. A new Cisco IOS software image has been successfully downloaded to a server and copied into the flash of the router. What should the administrator do before placing the router back into service? Delete the previous version of the Cisco IOS software from flash. Copy the new IOS into NVRAM to create a backup copy. Restart the router and verify that the new image starts successfully. Verify the free space available on the router to store the new IOS image.
file:///C:/Documents and Settings/cs/Desktop/sudu/01.htm 4/5

7/16/12

01.htm

15

Refer to the exhibit. A customer has a problem with connectivity in the network. Based on the IP addressing scheme, what is causing the problem? The WAN links need IP addresses from a different major network. The WAN link that connects R1 to R2 overlaps with the R3 LAN. The WAN links that connect R1 to R3 and R1 to R2 have incorrect masks. The R1 LAN is incorrect because subnet zero cannot be used with VLSM.

Showing 1 of 4

<Prev

Page: 1

Next>

Close Window
All contents copyright 1992-2012 Cisco Systems, Inc. Privacy Statement and Trademarks.

file:///C:/Documents and Settings/cs/Desktop/sudu/01.htm

5/5

Você também pode gostar