10
1 Which statement describes the difference between an enterprise WAN and an enterprise extranet An enterprise WAN is designed to interconnect local LANs, while an enterprise extranet is designed to interconnect remote branch offices. An enterprise WAN is designed to interconnect branch offices, while an enterprise extranet designed to give access to external business partners. An enterprise WAN is designed to provide remote access for its teleworkers, while an enter extranet is designed to provide Internet connectivity for the enterprise. An enterprise WAN is designed to provide Internet connectivity for the enterprise, while a enterprise extranet is designed to provide remote access to the enterprise network for teleworkers. 2 What type of traffic flow is always considered to be external? file sharing traffic system updates company e-mail Internet bound traffic transaction processing 3 Which two statements are reasons why UDP is used for voice and video traffic instead of TCP? two.) TCP requires all data packets to be delivered for the data to be usable. The acknowledgment process of TCP introduces delays that break the streams of data. UDP does not have mechanisms for retransmitting lost packets. UDP tolerates delays and compensates for them. TCP is a connectionless protocol that provides end-to-end reliability. UDP is a connection-oriented protocol that provides end-to-end reliability. 4 Which functional component of the Cisco Enterprise Architecture is responsible for hosting in servers? enterprise campus enterprise edge service provider edge building distribution 5 A remote user needs to access a networking device on the internal network of the company. The transactions between the remote user and the device must be secure. Which protocol enables thi happen securely? HTTP SSH Telnet FTP 6 What are two important guidelines when using packet sniffers to determine traffic flow patter 1

Ccna3 Test 1,2

Embed Size (px)

Citation preview

Page 1: Ccna3 Test 1,2

1 Which statement describes the difference between an enterprise WAN and an enterprise extranet?An enterprise WAN is designed to interconnect local LANs, while an enterprise extranet is designed to interconnect remote branch offices.An enterprise WAN is designed to interconnect branch offices, while an enterprise extranet is designed to give access to external business partners.An enterprise WAN is designed to provide remote access for its teleworkers, while an enterprise extranet is designed to provide Internet connectivity for the enterprise.An enterprise WAN is designed to provide Internet connectivity for the enterprise, while an enterprise extranet is designed to provide remote access to the enterprise network for teleworkers.

2What type of traffic flow is always considered to be external?

file sharing traffic

system updates

company e-mail

Internet bound traffic

transaction processing

3 Which two statements are reasons why UDP is used for voice and video traffic instead of TCP? (Choose two.)

TCP requires all data packets to be delivered for the data to be usable.

The acknowledgment process of TCP introduces delays that break the streams of data.

UDP does not have mechanisms for retransmitting lost packets.

UDP tolerates delays and compensates for them.

TCP is a connectionless protocol that provides end-to-end reliability.

UDP is a connection-oriented protocol that provides end-to-end reliability.

4Which functional component of the Cisco Enterprise Architecture is responsible for hosting internal servers?

enterprise campus

enterprise edge

service provider edge

building distribution

5 A remote user needs to access a networking device on the internal network of the company. The transactions between the remote user and the device must be secure. Which protocol enables this to happen securely?

HTTP

SSH

Telnet

FTP

6 What are two important guidelines when using packet sniffers to determine traffic flow patterns? (Choose two.)

Capture only traffic from a single application at a time.

Perform the capture on several different network segments.

Create a baseline capture during a low or non-utilization period.

Relocate highly active servers before attempting the capture.

Capture traffic during peak utilization times.

1

Page 2: Ccna3 Test 1,2

7What are two benefits to an employee of teleworking? (Choose two.)

reduced commuting costs

reduced network complexity

reduced need for support staff

reduced need for expensive business attire

reduced security risks to the network infrastructure

8 Which two measures help ensure that a hardware problem does not cause an outage in an enterprise LAN that supports mission critical services? (Choose two.)

providing failover capability

installing redundant power supplies

purchasing more bandwidth from the ISP

enabling half-duplex connectivity to access layer devices

installing routers that can handle a greater amount of throughput

9What is a benefit of having an extranet?

It provides web-like access to company information for employees only.

It limits access to corporate information to secure VPN or remote access connections only.

It allows customers and partners to access company information by connecting to a public web server.

It allows suppliers and contractors to access confidential internal information using controlled external connections.

10 How does a VPN work to support remote user productivity?

It uses SSL to encrypt remote user logins to the corporate intranet.

It uses secure Telnet for remote user connections to internal network devices.

It creates a virtual circuit that allows real-time communications between any two Internet endpoints.

It uses encapsulation to create a secure tunnel for transmission of data across non-secure networks.

11 What does VoIP provide to telecommuters?

high-quality, live-video presentations

real-time voice communications over the Internet

ability to share desktop applications simultaneously

secure, encrypted data transmissions through the Internet

12A business consultant must use Internet websites to research a report on the e-business strategies of several firms and then electronically deliver the report to a group of clients in cities throughout the world. Which two teleworker tools can the consultant use to accomplish this project? (Choose two.)

VoIP

VPN

HTTP

Telnet

2

Page 3: Ccna3 Test 1,2

email

13 What can be found at the enterprise edge?

Internet, VPN, and WAN modules

Internet, PSTN, and WAN services

server farms and network management

campus infrastructure, including access layer devices

14Why is TCP the preferred Layer 4 protocol for transmitting data files?

TCP is more reliable than UDP because it requires lost packets to be retransmitted.

TCP requires less processing by the source and destination hosts than UDP.

UDP introduces delays that degrade the quality of the data applications.

TCP ensures fast delivery because it does not require sequencing or acknowledgements.

15 What is the purpose of the Cisco Enterprise Architecture?

remove the three-layer hierarchical model and use a flat network approach

divide the network into functional components while still maintaining the concept of Core, Distribution, and Access Layers

provide services and functionality to the core layer by grouping various components into a single component located in the access layerreduce overall network traffic by grouping server farms, the management server, corporate intranet, and e-commerce routers in the same layer

16 What are two important characteristics or functions of devices at the Enterprise Edge? (Choose two.)

providing Internet, telephone, and WAN services to the enterprise network

providing a connection point for end-user devices to the enterprise network

providing high-speed backbone connectivity with redundant connections

providing intrusion detection and intrusion prevention to protect the network against malicious activity

providing packet inspection to determine if incoming packets should be allowed on the enterprise network

17What are two benefits of controlling the flow of traffic in an enterprise network? (Choose two.)

security

smaller failure domains

more reliable transaction processing

bandwidth optimization

local control of network services

18 The ABC Corporation implements the network for its new headquarters using the Cisco Enterprise Architecture. The network administrator wants to filter the traffic from and to the outside world. Where should the administrator deploy a firewall device?

server farm

enterprise edge

enterprise campus

service provider edge

3

Page 4: Ccna3 Test 1,2

19Which three items can be discovered by using a packet sniffer application? (Choose three.)

network transmission speed

source IP address

Ethernet frame type

duplex operational status

near-end crosstalk (NEXT) level

TCP sequence number

20 Which protocol and process could be implemented on a network to ensure that a telecommuter can attend a training presentation via the use of VoIP and still experience uninterrupted data streams and quality conversations?

TCP and QoS

UDP and QoS

TCP and queuing

UDP and VPN

TCP and VPN

1 A network manager wants to have processes in place to ensure that network upgrades do not affect business operations. What will the network manager create for this purpose?

business security plan

business continuity plan

service level agreement

network maintenance plan

2A Cisco router needs to be configured from a remote location by the use of out-of-band management. Which method should be used?

Use Telnet or SSH and connect to an IP address of a FastEthernet port.

Use HTTP to connect to an IP address on a FastEthernet port.

Use dial up and a modem to connect to the auxiliary port.

Use a terminal emulation program and connect to the console port.

3 What is the maximum recommended cable length for Fast Ethernet over UTP?

50 meters

75 meters

100 meters

150 meters

4An investment company has multiple servers that hold mission critical data. They are worried that if something happens to these servers, they will lose this valuable information. Which type of plan is needed for this company to help minimize loss in the event of a server crash?

business security

business continuity

network maintenance

4

Page 5: Ccna3 Test 1,2

service level agreement

5 It is crucial that network administrators be able to examine and configure network devices from their homes. Which two approaches allow this connectivity without increasing vulnerability to external attacks? (Choose two.)

Configure a special link at the POP to allow external entry from the home computer.

Set up VPN access between the home computer and the network.

Install a cable modem in the home to link to the network.

Configure ACLs on the edge routers that allow only authorized users to access management ports on network devices.

Configure a server in the DMZ with a special username and password to allow external access.

6 A network administrator needs to configure Telnet access to a router. Which group of commands enable Telnet access to the router?Router(config)# enable password classRouter(config)# line con 0Router(config-line)# loginRouter(config-line)# password ciscoRouter(config)# ip host 192.168.1.1 NewYorkRouter(config)# enable password cisco Router(config)# line aux 0Router(config-line)# loginRouter(config-line)# password ciscoRouter(config)# enable password classRouter(config)# line vty 0 4Router(config-line)# password ciscoRouter(config-line)# login

7What is the demarcation?

physical point where the ISP responsibility ends and the customer responsibility begins

physical location where all server farm connections meet before being distributed into the Core

point of entry for outside attacks and is often vulnerable

point of entry for all Access Layer connections from the Distribution Layer devices

8 A network administrator has just inserted a new WIC2T controller into the first available slot of an 1841 router. The administrator needs to configure the first serial interface of this new controller. Which interface should be used?

s0/0/0

s0/0/1

s1/1/0

s1/0/1

s0/1/1

9Which two statements are true about a network operations center (NOC)? (Choose two.)

Most NOCs only have tower servers or desktop servers that provide high-speed storage capabilities for thousands of clients.

A NOC is typically used only to monitor and maintain the most critical network components.

Because access is secured by firewalls, backup systems are not required in a NOC .

Routers, high-speed switches, and servers are located within a NOC.

High-speed and high-capacity data storage are important aspects of a NOC.

10 Which three items would be found in a NOC? (Choose three.)

5

Page 6: Ccna3 Test 1,2

raised floors

all wireless access points

network monitoring station

departmental printers

customer workstations

data storage devices

11 Which two situations require a network administrator to use out-of-band management to change a router configuration? (Choose two.)

Network links to the router are down.

No Telnet password has been configured on the router.

The administrator can only connect to the router using SSH.

The network interfaces of the router are not configured with IP addresses.

Company security policy requires that only HTTPS be used to connect to routers.

12What device is responsible for moving packets to destination networks outside the local network?

router

switch

IPS device

IDS device

13 What type of connection point is a point of presence (POP)?

between a client and a host

between two local networks

between a computer and a switch

between an ISP and an Enterprise network

14A network administrator must define specific business processes to implement if a catastrophic disaster prevents a company from performing daily business routines. Which portion of the network documentation is the administrator defining?

business security plan

business continuity plan

network solvency plan

service level agreement

network maintenance plan

15 When searching for information about authentication methods and usernames of company personnel, where can a network administrator look?

Business Continuity Plan

Business Security Plan

Network Maintenance Plan

Service Level Agreement

6

Page 7: Ccna3 Test 1,2

16 Which two pieces of information are documented in a logical topology map? (Choose two.)

physical cabling

service level agreements

IP addressing

IDF location

group usage information

facility floor plans

17Which two router parameters can be set from interface configuration mode? (Choose two.)

IP address

Telnet password

hostname

console password

subnet mask

enable secret password

18 What information can an administrator learn using the show version command?

Cisco IOS filename

configured routing protocol

status of each interface

IP addresses of all interfaces

19Which two items protect a corporate network against malicious attacks at the enterprise edge ? (Choose two.)

point of demarcation

IP security (IPSec)

Data Service Unit (DSU)

intrusion prevention system (IPS)

intrusion detection system (IDS)

20 Which type of network map shows the location of hosts, network devices, and media?

physical topology

logical topology

control plane

business continuity

21 Which two solutions would an enterprise IT department use to facilitate secure intranet access for remote workers? (Choose two.)

VPN

NAT

user authentication

7

Page 8: Ccna3 Test 1,2

client firewall software

packet sniffing

22Which task would typically only require services located at the access layer of the hierarchical design model?

connecting to the corporate web server to update sales figures

using a VPN from home to send data to the main office servers

printing a meeting agenda on a local departmental network printer

placing a VoIP call to a business associate in another country

responding to an e-mail from a co-worker in another department

23 In which functional area of the Cisco Enterprise Architecture should IDS and IPS be located to detect and prevent malicious activity from outside?

enterprise campus

WAN and Internet

enterprise edge

service provider edge

24What is the main purpose of the Access Layer in a hierarchically designed network?

performs routing and packet manipulation

supplies redundancy and failover protection

provides a high-speed, low-latency backbone

serves as a network connection point for end-user devices

21 What two features are true of an IDF? (Choose two.)

referred to as a wiring closet

located within the NOC

contains access layer devices for user connectivity

contains firewalls and content filtering devices

alternately called an MDF

22A DoS attack crippled the daily operations of a large company for 8 hours. Which two options could be implemented by the network administrator to possibly prevent such an attack in the future? (Choose two.)

install security devices with IDS and IPS at the enterprise edge

reset all user passwords every 30 days

filter packets based on IP address, traffic pattern, and protocol

deny external workers VPN access to internal resources

ensure critical devices are physically secure and placed behind the demarc

23 Which two types of information should be included in a business continuity plan? (Choose two.)

maintenance time periods

8

Page 9: Ccna3 Test 1,2

intrusion monitoring records

offsite data storage procedures

alternate IT processing locations

problem resolution escalation steps

24

In your opinion (this has no bearing on your grade), please rate your motivation to do well in this course:

25

In your opinion (this has no bearing on your grade), please indicate your interest in this course:

9