s4 ch exams 2011
TRANSCRIPT
-
8/3/2019 s4 ch exams 2011
1/25
Chapter 1 sem 4
This item references content from the following areas:CCNA Discovery: Designing and Supporting Computer Networks
1.3.5 Routing Protocols at the Distribution Layer
What address can be used to summarize only networks 172.16.0.0/24, 172.16.1.0/24, 172.16.2.0/24, and
172.16.3.0/24?
172.16.0.0/21172.16.0.0/22
172.16.0.0 255.255.255.248
172.16.0.0 255.255.254.0
Observable Description Max Value Earned Value
1 correctness of response 2 points for Option 20 points for any other option
This item references content from the following areas:
CCNA Discovery: Designing and Supporting Computer Networks
1.6.2 Considerations Unique to WLAN
What are three ways to ensure that an unwanted user does not connect to a wireless network and view the data(Choose three.)
Disable SSID broadcasting.Configure filters to restrict IP addresses.
Use authentication between clients and the wireless device.
Use NetBIOS name filtering between clients and the wireless device.Configure strong encryption such as WPA.
Use a WEP compression method.
Observable Description Max Value Earned Value1 correctness of response Option 1, Option 3, and Option 5 are correct.
1 point for each correct option.
0 points if more options are selected than required.
This item references content from the following areas:
CCNA Discovery: Designing and Supporting Computer Networks1.1.2 The Benefits of a Hierarchical Network Design
1.2.1 What Happens at the Core Layer?
1.3.1 What Happens at the Distribution Layer?
1.4.1 What Happens at the Access Layer?
Which three statements describe the functions of the Cisco hierarchical network design model? (Choose three
Route summarization is not necessary at the core and distribution layers.
The distribution layer is responsible for traffic filtering and isolating failures from the core.Two goals of the core layer are 100 percent uptime and maximizing throughput.
The access layer provides a means of connecting end devices to the network.
-
8/3/2019 s4 ch exams 2011
2/25
The distribution layer distributes network traffic directly to end users.
The core layer usually employs a star topology.
Observable Description Max Value Earned Value
1 correctness of response Option 2, Option 3, and Option 4 are correct.
1 point for each correct option.0 points if more options are selected than required.
This item references content from the following areas:
CCNA Discovery: Designing and Supporting Computer Networks1.2.1 What Happens at the Core Layer?
A network designer is creating a new network. The design must offer enough redundancy to provide protectioagainst a single link or device failure, yet must not be too complex or expensive to implement. What topology
would fill these needs?
star
full mesh
partial mesh
extended star
hub and spoke
Observable Description Max Value Earned Value1 correctness of response 2 points for Option 3
0 points for any other option
This item references content from the following areas:
CCNA Discovery: Designing and Supporting Computer Networks1.3.1 What Happens at the Distribution Layer?
Which three functions are performed at the distribution layer of the hierarchical network model? (Choose
three.)
summarizing routes from the access layer
allowing end users to access the local network
providing the gateway of last resort for core layer devicespreserving bandwidth at the access layer by filtering network functions
isolating network problems to prevent them from affecting the core layer
utilizing redundant links for load balancing to increase available bandwidth
Observable Description Max Value Earned Value
1 correctness of response Option 1, Option 5, and Option 6 are correct.
1 point for each correct option.0 points if more options are selected than required.
This item references content from the following areas:CCNA Discovery: Designing and Supporting Computer Networks
1.3.4 Traffic Filtering at the Distribution Layer
Which Cisco IOS function can be configured at the distribution layer to filter unwanted traffic and provide
traffic management?
-
8/3/2019 s4 ch exams 2011
3/25
virus protection
spyware protectionVPNs
access control lists
Observable Description Max Value
1 correctness of response 2 points for Option 4
0 points for any other option
This item references content from the following areas:
CCNA Discovery: Designing and Supporting Computer Networks
1.2.1 What Happens at the Core Layer?1.5.1 What is a Server Farm?
Centralizing servers in a data center server farm can provide which benefit over a distributed serverenvironment?
It keeps client-to-server traffic local to a single subnet.
Servers located in a data center require less bandwidth.
It is easier to filter and prioritize traffic to and from the data center.Server farms are not subject to denial of service attacks.
Observable Description Max Value Earned Value
1 correctness of response 2 points for Option 3
0 points for any other option
This item references content from the following areas:
CCNA Discovery: Designing and Supporting Computer Networks1.3.4 Traffic Filtering at the Distribution Layer
Refer to the exhibit. The network administrator creates a standard access control list to prohibit traffic from th
192.168.1.0/24 network from reaching the 192.168.2.0/24 network while still permitting Internet access for all
networks. On which router interface and in which direction should it be applied?
interface fa0/0, inbound
interface fa0/0, outbound
-
8/3/2019 s4 ch exams 2011
4/25
interface fa0/1, inbound
interface fa0/1, outbound
Observable Description Max Value Earned Value
1 correctness of response 2 points for Option 4
0 points for any other option
This item references content from the following areas:
CCNA Discovery: Designing and Supporting Computer Networks
1.7.2 Integrating Remote Sites Into the Network Design
The ability to connect securely to a private network over a public network is provided by which WAN
technology?
DSL
Frame RelayISDN
PSTN
VPN
Observable Description Max Value Earned Value1 correctness of response 2 points for Option 5
0 points for any other option
This item references content from the following areas:CCNA Discovery: Designing and Supporting Computer Networks
1.4.1 What Happens at the Access Layer?
-
8/3/2019 s4 ch exams 2011
5/25
Refer to the exhibit. Which two devices are part of the access design layer? (Choose two.)
Edge2
ISP4
BR4FC-AP
FC-CPE-1
FC-ASW-2
Observable Description Max Value Earned Value
1 correctness of response Option 4 and Option 6 are correct.
1 point for each correct option.0 points if more options are selected than required.
This item references content from the following areas:
CCNA Discovery: Designing and Supporting Computer Networks
1.4.2 Network Topologies at the Access Layer
In a well-designed, high-availability network, which device significantly affects the most users if a failure
occurs?
desktop PC of the user
large switch in the network core layer
large switch in the network distribution layersmall workgroup switch in the network access layer
Observable Description Max Value Earned Value1 correctness of response 2 points for Option 40 points for any other option
This item references content from the following areas:CCNA Discovery: Designing and Supporting Computer Networks
1.2.3 Network Convergence
Which two statements are true regarding network convergence? (Choose two.)
In a large network, using the EIGRP or OSPF routing protocols rather than RIPv2 may improve convergence
time.Using STP at the core layer improves convergence time by allowing the use of redundant links between
devices.
Route summarization improves convergence time by minimizing the size of the routing table.A full mesh topology improves convergence time by allowing load balancing.
ACLs can be configured to improve convergence time.
Option 1 and Option 3 are correct.1 point for each correct option.0 points if more options are selected than required.
This item references content from the following areas:CCNA Discovery: Designing and Supporting Computer Networks
1.3.4 Traffic Filtering at the Distribution Layer
-
8/3/2019 s4 ch exams 2011
6/25
Refer to the exhibit. What effect does the ACL shown have on network traffic, assuming that it is correctly applied to the interface?
All traffic to network 172.16.0.0 is denied.All TCP traffic is denied to and from network 172.16.0.0.All Telnet traffic from the 172.16.0.0 network to any destination is denied.All port 23 traffic to the 172.16.0.0 network is denied.All traffic from the 172.16.0.0 network is denied to any other network.
Observable Description Max Value Earned Value1 correctness of response 2 points for Option 30 points for any other option
This item references content from the following areas:CCNA Discovery: Designing and Supporting Computer Networks
1.3.3 Building a Redundant Network
Refer to the exhibit. The server broadcasts an ARP request for the MAC address of its default gateway. If STPis not enabled, what is the result of this ARP request?
Router_1 contains the broadcast and replies with the MAC address of the next-hop router.Switch_A replies with the MAC address of the Router_1 E0 interface.
Switch_A and Switch_B continuously flood the message onto the network.
Switch_B forwards the broadcast request and replies with the Router_1 address.
Observable Description Max Value Earned Value
1 correctness of response 2 points for Option 3
0 points for any other option
This item references content from the following areas:
CCNA Discovery: Designing and Supporting Computer Networks1.7.3 Redundancy and Backup Links
-
8/3/2019 s4 ch exams 2011
7/25
The network administrator is designing network connectivity for a home teleworker. The teleworker needs
secure access to download and upload documents on the network file server. What network connection would
be most cost efficient while still meeting the security and connectivity needs of this teleworker?
dedicated leased line connection with a dialup backup link
Frame Relay connection with a DSL backup link
DSL VPN connection with a dialup backup linkATM connection with a DSL VPN backup link
DSL connection with no backup link
Observable Description Max Value Earned Value
1 correctness of response 2 points for Option 3
0 points for any other option
This item references content from the following areas:
CCNA Discovery: Designing and Supporting Computer Networks
1.3.4 Traffic Filtering at the Distribution Layer
What kind of ACL inspects outbound UDP, TCP, and ICMP traffic and allows inbound access only to traffic
that belongs to these established sessions?
dynamic ACL
time-based ACLreflexive ACL
lock and key ACL
Observable Description Max Value Earned Value
1 correctness of response 2 points for Option 3
0 points for any other option
This item references content from the following areas:
CCNA Discovery: Designing and Supporting Computer Networks
1.5.1 What is a Server Farm?
What is true about implementing a centralized server farm topology?
requires direct cabling from the MPOE to enhance the performance of servers
requires the addition of high-capacity switches to each workgroupprovides defined entry and exit points so that filtering and securing traffic is easier
allows for placement of workgroup servers at the access layer
Observable Description Max Value Earned Value
1 correctness of response 2 points for Option 3
0 points for any other option
This item references content from the following areas:
CCNA Discovery: Designing and Supporting Computer Networks1.5.2 Security, Firewalls, and DMZs
-
8/3/2019 s4 ch exams 2011
8/25
Refer to the exhibit. If the firewall module has been correctly configured using best practices for network
security, which statement is true about the security design for the network?
Servers in the network are not protected from internal attacks.
Servers in the DMZ are protected from internal and external attacks.Servers in the server farm are protected from internal and external attacks.
Traffic from the external networks is not able to access the servers in the DMZ.
Observable Description Max Value Earned Value
1 correctness of response 2 points for Option 20 points for any other option
This item references content from the following areas:
CCNA Discovery: Designing and Supporting Computer Networks1.5.3 High Availability
What are two mechanisms that provide redundancy for server farm implementations? (Choose two.)
host intrusion prevention systems
virtual private networks
network intrusion prevention systemsRapid Spanning Tree Protocol
Hot Standby Routing Protocol
Observable Description Max Value Earned Value1 correctness of response Option 4 and Option 5 are correct.
1 point for each correct option.
0 points if more options are selected than required.
This item references content from the following areas:CCNA Discovery: Designing and Supporting Computer Networks
-
8/3/2019 s4 ch exams 2011
9/25
1.4.6 Security Measures
Refer to the exhibit. What happens when Host 1 attempts to send data?
Frames from Host 1 are dropped, but no other action is taken.
Frames from Host 1 cause the interface to shut down, and a log message is sent.
Frames from Host 1 are forwarded, but a log message is sent.Frames from Host 1 are forwarded, and the mac-address table is updated.
Observable Description Max Value Earned Value
1 correctness of response 2 points for Option 20 points for any other option
This item references content from the following areas:
CCNA Discovery: Designing and Supporting Computer Networks
1.6.2 Considerations Unique to WLAN
What are two best practices in wireless LAN design to ensure secure wireless access to the corporate network(Choose two.)
Configure APs for broadcast SSID.
Place APs as far apart as possible.Use a separate WLAN for employees.
Configure WPA.
Use wireless routers in all IDFs.
Observable Description Max Value Earned Value1 correctness of response Option 3 and Option 4 are correct.1 point for each correct option.
0 points if more options are selected than required.
This item references content from the following areas:CCNA Discovery: Designing and Supporting Computer Networks
1.5.2 Security, Firewalls, and DMZs
-
8/3/2019 s4 ch exams 2011
10/25
Which statement is true about a DMZ in a traditional network firewall design?
A DMZ is designed to provide service for external access but not for internal access.Servers in the DMZ provide limited information that can be accessed from external networks.
User access to the DMZ from the Internet and the internal network usually is treated the same way.
All servers in the enterprise network should be located in a DMZ because of enhanced security measures.
Observable Description Max Value Earned Value
1 correctness of response 2 points for Option 2
0 points for any other option
This item references content from the following areas:
CCNA Discovery: Designing and Supporting Computer Networks
1.6.1 Considerations Unique to WLAN
Which two items in a physical WLAN design can be identified through a site survey? (Choose two.)
the types of antennas that are required
the encryption techniques that are requiredthe access point hardware that is required
the different levels of access that are required
the connection reliability that is required
Observable Description Max Value Earned Value
1 correctness of response Option 1 and Option 3 are correct.1 point for each correct option.0 points if more options are selected than required.
This item references content from the following areas:CCNA Discovery: Designing and Supporting Computer Networks
1.4.3 How VLANs Segregate and Control Network Traffic
-
8/3/2019 s4 ch exams 2011
11/25
Refer to the exhibit. Which two statements correctly describe the benefits of the network access layer designthat is shown? (Choose two.)
If host A sends a broadcast message, only hosts in VLAN10 receive the broadcast frame.
If host A attempts to transmit data at the same time as another host, only hosts in VLAN10 are affected by thecollision.
Segmenting all voice traffic on a separate VLAN facilitates the implementation of QoS.
VLANs improve network performance by facilitating the use of route summarization.VLANs at the access layer help guarantee network availability by facilitating load balancing.
This item references content from the following areas:CCNA Discovery: Designing and Supporting Computer Networks
1.4.6 Security Measures
1.5.2 Security, Firewalls, and DMZs1.6.1 Considerations Unique to WLAN
Which two considerations are valid when designing access layer security? (Choose two.)
In a large wireless network, the most efficient method to secure the WLAN is MAC address filtering.
DoS attacks are normally launched against end-user PCs and can be mitigated by installing personal firewalls
on all company PCs.SSH is more secure than Telnet to administer network devices.
Disabling unused ports on the switches helps prevent unauthorized access to the network.
All Telnet passwords are at least 6 characters long.
Observable Description Max Value Earned Value
1 correctness of response Option 3 and Option 4 are correct.1 point for each correct option.0 points if more options are selected than required
Chapter 2 sem 4
This item references content from the following areas:
CCNA Discovery: Designing and Supporting Computer Networks2.1.3 The Network Lifecycle Plan Phase
-
8/3/2019 s4 ch exams 2011
12/25
During an evaluation of the currently installed network, the IT staff performs a gap analysis to determine
whether the existing network infrastructure can support the desired new features. At which stage of the Cisco
Lifecycle Services approach does this activity occur?
Prepare Phase
Plan PhaseDesign Phase
Implement Phase
Operate Phase
Optimize Phase
Observable Description Max Value Earned Value
1 correctness of response 2 points for Option 20 points for any other option
This item references content from the following areas:
CCNA Discovery: Designing and Supporting Computer Networks
2.2.1 Respond to a Customer Request for a Proposal or Quote
Which stage of the Cisco Lifecycle Services strategy is usually completed before an organization issues aRequest For Proposal (RFP) or Request For Quotation (RFQ)?
Prepare PhasePlan Phase
Design Phase
Implement PhaseOperate Phase
Optimize Phase
Observable Description Max Value Earned Value1 correctness of response 2 points for Option 1
0 points for any other option
This item references content from the following areas:
CCNA Discovery: Designing and Supporting Computer Networks
2.4.2 Identifying Constraints
What is a business constraint that may impact the WAN design of a company?
company policy regarding specific operating systems on LAN devices
current monitoring protocols implemented on end-user devicesnon-availability of end users during implementation
company policy requiring the use of specific vendor networking equipment due to partnerships
Observable Description Max Value Earned Value
1 correctness of response 2 points for Option 4
-
8/3/2019 s4 ch exams 2011
13/25
0 points for any other option
This item references content from the following areas:
CCNA Discovery: Designing and Supporting Computer Networks
2.2.1 Respond to a Customer Request for a Proposal or Quote
Which two statements are true regarding the response to an RFQ? (Choose two.)
The response should be brief.
It should strictly conform to the formatting requirements specified by the RFQ.Only the items that the contracting company will be addressing should be answered.
The response helps the customer compare pricing with other potential contractors.
The response is more complicated than a response to an RFP.
Observable Description Max Value Earned Value
1 correctness of response Option 2 and Option 4 are correct.
1 point for each correct option.
0 points if more options are selected than required.
This item references content from the following areas:
CCNA Discovery: Designing and Supporting Computer Networks
2.5.2 Monitoring Network Operations
What is the purpose of SNMP?
to facilitate the exchange of information between devices and the NMSto monitor and control IP address allocation in a networkto report user login to a monitoring station
to verify traffic throughout the network and keep a log of all activity
Observable Description Max Value Earned Value
1 correctness of response 2 points for Option 1
0 points for any other option
This item references content from the following areas:
CCNA Discovery: Designing and Supporting Computer Networks2.1.2 The Network Lifecycle Prepare Phase
What is the purpose of preparing a business case?
to justify the financial investment in implementing the technology change
to provide an example of a previous job done in the RFP
to define the technical requirements of the networkto define timelines and critical milestones
-
8/3/2019 s4 ch exams 2011
14/25
Observable Description Max Value Earned Value
1 correctness of response 2 points for Option 1
0 points for any other option
This item references content from the following areas:CCNA Discovery: Designing and Supporting Computer Networks
2.2.5 Explain the Role of the Account Manager
Which two statements best describe the responsibilities of an account manager? (Choose two.)
acts as the primary point of contact between the company and the client
directs the sales teams and support personnel
provides technical support to critical clientsselects the equipment and technologies to be used for the client solution
acts as the network design lead
Observable Description Max Value Earned Value
1 correctness of response Option 1 and Option 2 are correct.1 point for each correct option.
0 points if more options are selected than required.
This item references content from the following areas:CCNA Discovery: Designing and Supporting Computer Networks
2.2.5 Explain the Role of the Account Manager
2.2.6 Explain the Role of the Pre-Sales Systems Engineer
A network engineer is analyzing the network of a potential client company to identify problems and determinwhether a network upgrade or addition is needed. Which role in the sales team is this engineer assuming?
post-sales field engineerpre-sales engineer
account manager
network designer
Observable Description Max Value Earned Value
1 correctness of response 2 points for Option 2
0 points for any other option
This item references content from the following areas:
CCNA Discovery: Designing and Supporting Computer Networks2.1.5 The Network Lifecycle Implement Phase
What is the purpose of system-level acceptance testing?
to develop an installation plan for the newly designed network
to train end users and support personnel on the newly installed network
-
8/3/2019 s4 ch exams 2011
15/25
to check that the newly installed network meets the business goals and design requirements
to justify the financial investment required to implement the technology change
Observable Description Max Value Earned Value
1 correctness of response 2 points for Option 3
0 points for any other option
This item references content from the following areas:
CCNA Discovery: Designing and Supporting Computer Networks
2.2.2 Attend a Pre-bid Meeting
A network engineer working for a contracting company is informed of a pre-bid meeting with a potential clien
What purpose does the network engineer have for attending the pre-bid meeting?
to submit request for proposal responses
to discuss proposed installation and monitoring plans
to perform system-level acceptance tests on the current network
to clarify project scope and timelines not included in the original request for proposal
to create a business case outlining reasons for financial investment in a network upgradeObservable Description Max Value Earned Value
1 correctness of response 2 points for Option 40 points for any other option
This item references content from the following areas:
CCNA Discovery: Designing and Supporting Computer Networks
2.2.3 Explain the Request for Proposal (RFP)
A major corporation has decided to hire someone to upgrade their network infrastructure. A network consultincompany wants the job. What document must the network consulting company obtain to learn about the
business goals, the project scope, the requirements for the new network and the expected deliverables?
Business Case
Project Plan
Request for ProposalRequest for Comments
Observable Description Max Value Earned Value
1 correctness of response 2 points for Option 30 points for any other option
This item references content from the following areas:CCNA Discovery: Designing and Supporting Computer Networks
2.2.4 Explain the Request for Quote (RFQ)
A corporation (client) wants a network upgrade and is putting out a request for services to various networkconsulting companies (contractors). Which statement is true concerning the required RFQ?
-
8/3/2019 s4 ch exams 2011
16/25
sent from the contractors to the client in response to a RFP
sent from the client to the contractors along with the RFP to provide more specific technical details
sent from the client to the contractors in place of a RFP when the technical specifications of a project areknown
sent from the contractors to the client outlining reasons for financial investments for the network upgrade
Observable Description Max Value Earned Value
1 correctness of response 2 points for Option 3
0 points for any other option
This item references content from the following areas:CCNA Discovery: Designing and Supporting Computer Networks
2.3.3 Identifying Business Goals and Priorities
Why is it important to prioritize business goals when developing network design?
to ensure that the least expensive technologies are implemented first
to simplify the configuration, administration, and monitoring of the newly installed network
to anticipate the effects of changes and growth of the business
to adhere to the best opportunities to contribute to the success of the business
Observable Description Max Value Earned Value1 correctness of response 2 points for Option 4
0 points for any other option
This item references content from the following areas:
CCNA Discovery: Designing and Supporting Computer Networks
2.2.1 Respond to a Customer Request for a Proposal or Quote
A network engineer working for ABC company is writing a response to an RFP for a network upgrade andmust create an executive summary. Which statement describes the basic components of an executive summary
quick overview of the problem, the recommended solution, and the justification for ABC company doing thejob
detailed description of the solution, including but not limited to, timelines, turn-over schedule, warranty
information, and emergency recovery informationdetailed description of costs including, the cost of software and hardware components, licensing requirements
labor cost, and other applicable fees
multiple page document containing additional information such as detailed lists of equipment required,
diagrams, company background information, and insurance coverage
Observable Description Max Value Earned Value
1 correctness of response 2 points for Option 10 points for any other option
This item references content from the following areas:CCNA Discovery: Designing and Supporting Computer Networks
2.5.2 Monitoring Network Operations
-
8/3/2019 s4 ch exams 2011
17/25
In a network management architecture, which statement best describes a management agent?
standardized database storing network performance parameterscommunication protocol used between a management station and managed device
host with the management application loaded that is used by the administrator to monitor and configure
network devicessoftware running on a managed device to collect network information and allow that device to be managed by
management station
Observable Description Max Value Earned Value1 correctness of response 2 points for Option 4
0 points for any other option
This item references content from the following areas:
CCNA Discovery: Designing and Supporting Computer Networks
2.4.1 Defining Technical Requirements
What is the purpose of creating a prioritized list of technical requirements?
defines the project scope
determines the business profitabilitycreates a feasibility report for analysis
identifies existing and new user groups
Observable Description Max Value Earned Value
1 correctness of response 2 points for Option 1
0 points for any other option
This item references content from the following areas:
CCNA Discovery: Designing and Supporting Computer Networks2.1.7 The Network Lifecycle Optimize Phase
Which stage of the Cisco Lifecycle Services involves proactive management to identify and resolve issues
before the organization is affected?
Prepare Phase
Plan Phase
Design Phase
Implement PhaseOperate Phase
Optimize Phase
Observable Description Max Value Earned Value
1 correctness of response 2 points for Option 6
0 points for any other option
This item references content from the following areas:
CCNA Discovery: Designing and Supporting Computer Networks2.1.6 The Network Lifecycle Operate Phase
-
8/3/2019 s4 ch exams 2011
18/25
What is a purpose of establishing a network baseline?
It provides a statistical average for network performance.
It manages the performance of network devices.It creates a point of reference for future network evaluations.
It checks the security configuration of network devices.
Observable Description Max Value Earned Value1 correctness of response 2 points for Option 3
0 points for any other option
This item references content from the following areas:
CCNA Discovery: Designing and Supporting Computer Networks2.1.6 The Network Lifecycle Operate Phase
When should a network baseline be performed within the stages of the Cisco Lifecycle Services?
Prepare PhasePlan Phase
Design Phase
Implement PhaseOperate Phase
Observable Description Max Value Earned Value1 correctness of response 2 points for Option 5
0 points for any other option
This item references content from the following areas:
CCNA Discovery: Designing and Supporting Computer Networks
2.3.3 Identifying Business Goals and Priorities
Which two items help identify business goals and priorities before a new network project starts? (Choose two
installation
motivationprofitability
trustworthiness
customer satisfaction
Observable Description Max Value Earned Value
1 correctness of response Option 3 and Option 5 are correct.1 point for each correct option.
0 points if more options are selected than required
This item references content from the following areas:
CCNA Discovery: Designing and Supporting Computer Networks
-
8/3/2019 s4 ch exams 2011
19/25
2.5.1 Using the Top Down Design Approach
What are two benefits of using a top-down approach instead of a bottom-up approach to network design?
(Choose two.)
incorporates organizational requirements
allows for a quick response to a design request
requires less time up front to create a network designclarifies design goals from the perspective of applications and network solutions
facilitates a design by using devices and technologies that are based on previous experience
Observable Description Max Value Earned Value
1 correctness of response Option 1 and Option 4 are correct.
1 point for each correct option.0 points if more options are selected than required
This item references content from the following areas:
CCNA Discovery: Designing and Supporting Computer Networks
2.5.2 Monitoring Network Operations
Which software component is installed on network devices that are managed through SNMP?
management agents
management stations
network management protocolManagement Information Base (MIB)
Observable Description Max Value Earned Value1 correctness of response 2 points for Option 10 points for any other option
Chapter 3 sem 4
This item references content from the following areas:CCNA Discovery: Designing and Supporting Computer Networks
3.2.4 Download and Install Cisco IOS Software
A company is beginning to analyze their new Cisco IOS upgrade requirements. What is one of the router
components that a network administrator must consider when selecting a new Cisco IOS version?
processor type
storage space in NVRAMinterfaces and modules to be supported
compatibility of the bootstrap version with the new Cisco IOS software
Observable Description Max Value Earned Value
1 correctness of response 2 points for Option 3
-
8/3/2019 s4 ch exams 2011
20/25
0 points for any other option
This item references content from the following areas:CCNA Discovery: Designing and Supporting Computer Networks
3.5.3 Project Scope
It is important to identify the details of network sections and devices that will be affected or involved in a new
design. This information is included in which section of the Network Design Requirements Document?
Project Goal
Project ScopeTechnical Requirements
Current State of the Network
Observable Description Max Value Earned Value
1 correctness of response 2 points for Option 2
0 points for any other option
This item references content from the following areas:CCNA Discovery: Designing and Supporting Computer Networks
3.2.3 Choosing an Appropriate Cisco IOS Image
When planning an IOS upgrade, what are two pieces of information that need to be collected before selecting
the new IOS? (Choose two.)
amount of installed NVRAM
model number of the router
number of interfaces and installed HWICsinstalled Cisco IOS feature set and versionerror statistics for each interface
Observable Description Max Value Earned Value1 correctness of response Option 2 and Option 4 are correct.
1 point for each correct option.
This item references content from the following areas:
CCNA Discovery: Designing and Supporting Computer Networks
3.3.3 Installing a New Hardware Option
What are two practices a network technician should follow when installing a new interface card in a router?(Choose two.)
Be sure the interface card faceplate does not touch the chassis rear panel.Do not tighten the captive screws until the router has been powered on and recognizes the card.
Store the blank faceplate inside the card slot to be used if the card is removed.
Handle the interface card by the edges to avoid static discharge.Push the interface card into place until the edge connector is seated securely.
-
8/3/2019 s4 ch exams 2011
21/25
Observable Description Max Value Earned Value
1 correctness of response Option 4 and Option 5 are correct.
1 point for each correct option.0 points if more options are selected than required
This item references content from the following areas:
CCNA Discovery: Designing and Supporting Computer Networks3.3.3 Installing a New Hardware Option
The new serial interface card for the router arrives and the network technician reads that it is hot-swappable.
What does this mean?
The card cannot be installed while the router is powered on because static discharge could damage the card.
The card cannot be installed until the router is powered off and completely cooled down.
The card can be installed while the router is powered on if the router supports this technology.The card is a replacement and must be installed in the same slot as the card it is replacing.
Observable Description Max Value Earned Value
1 correctness of response 2 points for Option 3
0 points for any other option
This item references content from the following areas:
CCNA Discovery: Designing and Supporting Computer Networks
3.1.1 Creating a Network Diagram
Refer to the exhibit. A network administrator issues the command shown to gain knowledge about a poorlydocumented network. Which two pieces of information can the network administrator discover from the
command output? (Choose two.)
One connected device has router capability.
The entire network contains a total of five Cisco devices with CDP enabled.
None of the directly connected network devices have been configured with an IP address.Device EDGE_2811 is connected to port Fast Ethernet 0/0 on device C3750-24_MDF.
Five Cisco devices with CDP enabled are directly connected to device C3750-24_MDF.
Observable Description Max Value Earned Value1 correctness of response Option 1 and Option 5 are correct.
1 point for each correct option.
0 points if more options are selected than required
-
8/3/2019 s4 ch exams 2011
22/25
This item references content from the following areas:
CCNA Discovery: Designing and Supporting Computer Networks3.2.3 Choosing an Appropriate Cisco IOS
Refer to the exhibit. The top of the output shows the Cisco Feature Navigator regarding a Cisco IOS image thathe administrator wants to install on a router. Below it is the output from the show version command for that
router. Which statement is true regarding the capacity of the router to run this Cisco IOS image?
There is not enough DRAM and flash.
There is enough DRAM and flash.
There is enough DRAM but not enough flash.
There is enough flash but not enough DRAM.
Observable Description Max Value Earned Value 1 correctness of response 2 points for Option 1
0 points for any other option
This item references content from the following areas:
CCNA Discovery: Designing and Supporting Computer Networks
-
8/3/2019 s4 ch exams 2011
23/25
3.4.3 Wireless Site Survey and Planning
Which two items are objectives of a WLAN design site survey? (Choose two.)
identify coverage areas
determine primary AP locations
determine what AP equipment should be purchased
determine how many users will access the WLANidentify the bottleneck of the LAN infrastructure
Observable Description Max Value Earned Value1 correctness of response Option 1 and Option 2 are correct.
1 point for each correct option.
0 points if more options are selected than required.
This item references content from the following areas:
CCNA Discovery: Designing and Supporting Computer Networks
3.1.4 Strengths and Weaknesses of the Existing Network
Refer to the exhibit. Which two actions would improve the weaknesses of the exhibited topology,
assuming that each access layer segment is in its own subnet? (Choose two.)
Implement redundant links to each server by adding additional NICs.
Implement a redundant link from all access layer switches to Admin, Dist, and Server Farm.
Implement a backup firewall with a link to a secondary ISP and implement a redundant link to the DMZ.
Implement redundant links from the existing firewall to all access layer switches.Implement redundant links from the DMZ to Admin and Dist.
Observable Description Max Value Earned Value
1 correctness of response Option 1 and Option 3 are correct.
1 point for each correct option.0 points if more options are selected than required
This item references content from the following areas:
CCNA Discovery: Designing and Supporting Computer Networks3.4.1 Visiting the Customer Site
-
8/3/2019 s4 ch exams 2011
24/25
An employee at a company notices that the wireless signal strength indicator on his laptop fluctuates fromgood to low. The network administrator decides to do a site survey of that area. Which three factors need
to be included in the survey? (Choose three.)
type and model number of the WNIC of the laptop
number of users in the area
location of the AP
list of MAC addresses filtered by the APnumber of simultaneous applications running on the laptop of the employee
location of walls and filing cabinets in the office
Observable Description Max Value Earned Value
1 correctness of response Option 2, Option 3, and Option 6 are correct.
1 point for each correct option.0 points if more options are selected than required
This item references content from the following areas:
CCNA Discovery: Designing and Supporting Computer Networks
3.3.1 Investigating Installed Hardware Features
The new network design for AnyCompany must include support of voice and video traffic. Beforeupgrading, the network designer checks whether the existing devices can support the new requirements.
Which three items does the designer need to check? (Choose three.)
number of routers and switches owned by AnyCompany
routers that will support extra ASICs and WWICs
size of DRAM and flash on each devicerouters that will support HWICs and VWICs
system bootstrap version on each router and switch
modules supported on the loaded Cisco IOS
Observable Description Max Value Earned Value
1 correctness of response Option 3, Option 4, and Option 6 are correct.
1 point for each correct option.0 points if more options are selected than required
This item references content from the following areas:CCNA Discovery: Designing and Supporting Computer Networks
3.2.4 Download and Install Cisco IOS Software
-
8/3/2019 s4 ch exams 2011
25/25
Refer to the exhibit. Which of the three Cisco IOS images shown will load into RAM?
The router selects the first image stored in flash.The router selects the third Cisco IOS image because it is the most recent IOS image.
The router selects the second Cisco IOS image because it is the smallest IOS image.
The router selects an image depending on the boot system command in the configuration.The router selects the third Cisco IOS image because it contains the advipservicesk9 image.
Observable Description Max Value Earned Value
1 correctness of response 2 points for Option 40 points for any other option
This item references content from the following areas:CCNA Discovery: Designing and Supporting Computer Networks
3.2.4 Download and Install Cisco IOS Software
A new Cisco IOS version has been copied into flash from a TFTP server. When a reload is issued to
upgrade the Cisco IOS, the router freezes part of the way through the loading process. What could be the
problem?
There is enough flash but not enough RAM in the router.The new HWIC cards have not been installed yet.
The TFTP server needs to be present during a reload.The new Cisco IOS should have been loaded into NVRAM.
The new bootstrap version is not compatible with the original version on the router.
Observable Description Max Value Earned Value
1 correctness of response 2 points for Option 1
0 points for any other option
14)