Contact: admin@chungchimang.tk ========== I'M FIXING THIS BLOG...

CCNA 3 - Module 1: Lan Design

DOWNLOAD SLIDE HERE


Exam Answers v3.x and v4.0

V3.x

Options with
highlight colours are correct answer

1 Which of the following are contained in the routing updates of classless routing protocols? (Choose two.)
• 32-bit address

• next hop router interface
• subnet mask

• unicast host address
• Layer 2 address

2 Router1 and Router2 shown in the topology have been configured with the no ip subnet-zero command. Which of the following valid VLSM network numbers could be used for the serial link between Router1 and Router2? (Choose two.)
• 192.168.1.0/30
• 192.168.1.4/30
• 192.168.1.8/30
• 192.168.1.96/30
• 192.168.1.138/30
• 192.168.1.190/30

3 What is the purpose of the network command used in the configuration of the RIP routing protocol?
• It specifies RIP v2 as the routing protocol.
• It enables the use of VLSM.
• It specifies the fastest path to the destination route.
• It specifies which interfaces will exchange RIP routing updates.
• It activates RIP for all routes that exist within the enterprise network.

4 Which of the following is considered a limitation of RIP v1?
• RIP v1 does not send subnet mask information in its updates.
• RIP v1 is not widely supported by networking hardware vendors.
• RIP v1 consumes excessive bandwidth by multicasting routing updates using a Class D address.
• RIP v1 requires enhanced router processors and extra RAM to function effectively.
• RIP v1 does not support load balancing across equal-cost paths.
• RIP v1 authentication is complicated and time-consuming to configure.

5 Which command would a network administrator use to determine if the routers in an enterprise have learned about a newly added network?
• router# show ip address
• router# show ip route
• router# show ip networks
• router# show ip interface brief
• router# debug ip protocol
• router# debug rip update

6 How does a router know of paths to destination networks? (Choose two.)
• inspection of the destination IP address in data packets
• ARP requests from connected routers
• manual configuration of routes
• updates from other routers

• DHCP information broadcasts
• updates from the SMTP management information base

7 Which of the following statements are true regarding RIP v1 and v2? (Choose three.)
• Both RIP versions use hop count.
• Both RIP versions can provide authentication of update sources.
• Both RIP versions use 16 hops as a metric for infinite distance.
• RIP v1 uses split horizon to prevent routing loops while RIP v2 does not.
• RIP v1 uses hold-down times to prevent routing loops while RIP v2 does not.
• RIP v1 broadcasts routing table updates, while RIP v2 multicasts its updates.

8 What does VLSM allow a network administrator to do?
• utilize one subnet mask throughout an autonomous system
• utilize multiple subnet masks in the same IP address space
• utilize IGRP as the routing protocol in an entire autonomous system
• utilize multiple routing protocols within an autonomous system

9 The network shown in the diagram is having problems routing traffic. It is suspected that the problem is with the addressing scheme. What is the problem with the addressing used in the topology?
• The address assigned to the Ethernet0 interface of Router1 is a broadcast address for that subnetwork.
• The subnetwork configured on the serial link between Router1 and Router2 overlaps with the subnetwork assigned to Ethernet0 of Router3.
• The subnetwork assigned to the Serial0 interface of Router1 is on a different subnetwork from the address for Serial0 of Router2.
• The subnetwork assigned to Ethernet0 of Router2 overlaps with the subnetwork assigned to Ethernet0 of Router3.

10 Refer to the network shown. How will Router1 summarize and advertise the four networks attached to its Ethernet ports?
• 172.16.16.0/20
• 172.16.19.0/20
• 172.16.16.0/20 and 172.16.19.0/20
• 172.16.16.0/22
• 172.16.18.0/24
• 172.16.0.0/24

11 A Class C address has been assigned for use in the network shown in the graphic. Using VLSM, which bit mask should be used to provide for the number of host addresses required on Router A, while wasting the fewest addresses?
• /31
• /30
• /29
• /28
• /27
• /26

12 The routers in the diagram use the subnet assignments shown. What is the most efficient route summary that can be configured on Router3 to advertise the internal networks to the cloud?
• 192.1.1.0/26 and 192.1.1.64/27
• 192.1.1.128/25
• 192.1.1.0/23 and 192.1.1.64/23
• 192.1.1.0/24
• 192.1.1.0/25
• 192.1.1.0/24 and 192.1.1.64/24

13 A new network is to be configured on a router. Which of the following tasks must be completed to configure this interface and implement dynamic IP routing for the new network? (Choose three.)
• Select the routing protocol to be configured.
• Assign an IP address and subnet mask to the interface.
• Update the ip host configuration information with the device name and new interface IP address.
• Configure the routing protocol with the new network IP address.
• Configure the routing protocol with the new interface IP address and subnet mask.
• Configure the routing protocol in use on all other enterprise routers with the new network information.

14 What is the default network mask for a Class B address?
• 255.0.0.0
• 255.255.0.0
• 255.255.255.0
• 255.255.255.255

15 How often does RIP v1 send routing table updates, by default?
• every 30 seconds
• every 45 seconds
• every 60 seconds
• every 90 seconds

16 An additional subnet is required for a new Ethernet link between Router1 and Router2 as shown in the diagram. Which of the following subnet addresses can be configured in this network to provide a maximum of 14 useable addresses for this link while wasting the fewest addresses?
• 192.1.1.16/26
• 192.1.1.96/28
• 192.1.1.160/28
• 192.1.1.196/27
• 192.1.1.224/28
• 192.1.1.240/28

17 Which subnet mask is represented by the /21 notation?
• 255.255.224.0
• 255.255.248.0
• 255.255.252.0
• 255.255.240.0

18 Which of the following problems does VLSM help to alleviate?
• the shortage of IP addresses
• the difficulty of assigning static IP addresses to hosts in large enterprises
• the complexity of implementing advanced routing protocols such as OSPF and EIGRP
• the shortage of network administrators qualified in the use of RIP v1 and IGRP

19 In the network shown in the graphic, three bits were borrowed from the host portion of a Class C address. How many valid host addresses will be unused on the three point-to-point links combined if VLSM is not used?
• 3
• 4
• 12
• 36
• 84
• 180

20 A Class C network address has been subnetted into eight subnetworks. Using VLSM, the last subnet will be divided into eight smaller subnetworks. What bit mask must be used to create eight smaller subnetworks, each having two usable host addresses?
• /26
• /27
• /28
• /29
• /30
• /31

==============================

V4.0

Options with highlight colours are correct answer

1. A network technician is asked to examine an existing switched network. Following this examination, the technician makes recommendations for adding new switches where needed and replacing existing equipment that hampers performance. The technician is given a budget and asked to proceed. Which two pieces of information would be helpful in determining necessary port density for new switches? (Choose two.)
• forwarding rate
• traffic flow analysis
• expected future growth

• number of required core connections
• number of hubs that are needed in the access layer to increase performance

2. Configuring communication between devices on different VLANs requires the use of which layer of the OSI model?
• Layer 1
• Layer 3
• Layer 4
• Layer 5

3. What is the likely impact of moving a conventional company architecture to a completely converged network?
• Local analog phone service can be completely outsourced to cost-effective providers.
• The Ethernet VLAN structure is less complex.
• A shared infrastructure is created resulting in a single network to manage.
• QoS issues are greatly reduced.
• There is less bandwidth competition between voice and video streams.

4. Which hierarchical design model layer controls the flow of network traffic using policies and delineates broadcast domains by performing routing functions between virtual LANs (VLANs)?
• application
• access
• distribution
• network
• core

5. A network administrator is selecting a switch that will operate at the network core. Which three features should the switch support for optimum network performance and reliability? (Choose three.)
• port security
• security policies
• 10 Gigabit Ethernet
• quality of service (QoS)
• hot-swappable hardware

• Power over Ethernet (PoE)

6. Which three features are commonly supported at the distribution layer of the Cisco hierarchical network model? (Choose three.)
• security policies
• Power over Ethernet
• switch port security
• quality of service
• Layer 3 functionality

• end user access to network

7. Which two features are supported at all three levels of the Cisco three-layer hierarchical model? (Choose two.)
• Power over Ethernet
• load balancing across redundant trunk links
• redundant components
• Quality of Service
• link aggregation

8. Which two characteristics are associated with enterprise level switches? (Choose two.)
• low port density
• high forwarding rate
• high latency level
• support link aggregation
• predefined number of ports

9. Link aggregation should be implemented at which layer of the hierarchical network?
• core only
• distribution and core
• access and distribution
• access, distribution, and core

10. For organizations that are implementing a voice over IP solution, what functionality should be enabled at all three layers of the hierarchical network?
• Power over Ethernet
• quality of service
• switch port security
• inter-VLAN routing

11. Which layer of the hierarchical design model provides a means of connecting devices to the network and controlling which devices are allowed to communicate on the network?
• application
• access
• distribution
• network
• core

12. At which heirarchical layer are switches normally not required to process all ports at wire speed?
• core layer
• distribution layer
• access layer
• entry layer

13. Which layer of the OSI model does an access layer LAN switch use to make a forwarding decision?
• Layer 1
• Layer 2
• Layer 3
• Layer 4

14. Refer to the exhibit. What characteristic of hierarchical network designs is exhibited by having SW3 connected to both SW1 and Sw2?
• scalability
• security
• redundancy
• maintainability

15. Which layer of the hierarchical network design model is refered to as the high-speed backbone of the internetwork, where high availability and redundancy are critical?
• access layer
• core layer
• data-link layer
• distribution layer
• network layer
• physical layer

16. What statement best describes a modular switch?
• a slim-line chassis
• allows interconnection of switches on redundant backplane
• defined physical characteristics
• flexible characteristics

17. A technician is attempting to explain Cisco StackWise technology to a client that is setting up three stackable switches. Which explanation accurately describes StackWise technology?
• StackWise technology allows up to eight ports to be bound together to increase available bandwidth.
• StackWise technology allows the switch to deliver power to end devices by using existing Ethernet cabling.
• StackWise technology allows the switch capabilities and ports to be expanded by the addition of line cards.
• StackWise technology allows up to nine switches to be interconnected via the use of a fully redundant backplane.

18. Which hierarchical design characteristic would be recommended at both the core and distribution layers to protect the network in the case of a route failure?
• PoE
• redundancy
• aggregation
• access lists

19. Which feature supports higher throughput in switched networks by combining multiple switch ports?
• convergence
• redundant links
• link aggregation
• network diameter

20. Refer to the exhibit. Beginning with HR servers and workstations, a network engineer is designing a new security structure for the network. Which set of • • policies adheres to the hierarchical network model design principles?
• Implement Layer 3 switching on S1 to reduce the packet processing load on D1 and D2. Install all security processing on S1 to reduce network traffic load.
• Configure port security options on S1. Use Layer 3 access control features on D1 and D2 to limit access to the HR servers to just the HR subnet.
• Move all HR assets out of the data center and connect them to S1. Use Layer 3 security functions on S1 to deny all traffic into and out of S1.
• Perform all port access and Layer 3 security functions on C1.


No comments:

Post a Comment

Thank for your comments!!!