Arale66 Zone Freak

My curiosity is greater than the size of my body

Archive for the category “[TUGAS CCNA]”

CCNA Discovery 4 Module 9 Exam Answers version 4.0

1.      Which two statements describe factors that influence the layout of a proposal? (Choose two.)
• Proposal layouts are required to use sans serif typefaces.
• A specific proposal layout is followed when one is specified in the RFP.
• A designer chooses the layout if a written RFP does not specify an outline.

• The software that is used to create the proposal dictates the proposal layouts.
• Proposal layouts are required to use a format that is designed by the network engineer.

 

2.      What two items are typically included in the executive summary of a proposal? (Choose two.)
• project scope summary
• high-level implementation plan
• quotes for all needed equipment
• technical requirements for the design
• emphasis on the benefits that meet the goals of the customer

 

3.      Which proposal section describes the intended routing protocol, security mechanisms, and addressing for the planned network?
• logical design
• physical design
• executive summary
• implementation plan
• network requirements

 

4.      Which occurrence would indicate a failure of the design phase?
• The incorrect model switches were ordered.
• There is no customer signoff for task completion.
• New requirements are identified after implementation begins.
• The new network capacity is inadequate to support required traffic.

 

5.      A network installation team is assigned to replace all core switches in an existing data center. No other upgrades are planned. Which kind of installation is this?
• a new installation
• a fork-lift installation
• a phased installation
• a green field installation

Baca lebih lanjut…

Iklan

CCNA Discovery 4 Module 8 Exam Answer version 4.0

1.      Which mechanism is used to create a floating static route?
• administrative distance
• cost
• hop count
• passive interface

 

2.      IPSec operates at which layer of the OSI model?
• application
• network
• datalink
• transport

 

3.      Which is true regarding Frame Relay LMI?
• There are three LMI types standardized by ANSI, ITU-T, and Cisco.
• Routers at each end of a Frame Relay virtual circuit must always use the same LMI type.
• The LMI type must be manually configured.
• The only function of LMI is to verify the connection between the router and the Frame Relay switch.

 

4.      Which statement identifies the IP address design for subinterfaces that are configured for a Frame Relay network?
• Multipoint configurations require the IP address of each subinterface on each router to be in its own subnet.
• Multipoint configurations require IP addresses for each subinterface on each router to be a part of the same subnet.
• Point-to-point configurations require IP addresses for each subinterface on each router to be a part of the same subnet.
• Point-to-point configurations do not require IP addresses on each subinterface on each router.
• Multipoint configurations do not require IP addresses on each subinterface on each router.

 

5.      Which three algorithms can be used to encrypt user data in an IPSec VPN framework? (Choose three.)
• 3DES
• AES

• Diffie-Hellman
• DES
• ESP
• SHA

Baca lebih lanjut…

CCNA Discovery 4 Module 7 Exam Answers version 4.0

1.      A network engineer has decided to pilot test a portion of a new network design rather than rely on a prototype for proof-of-concept. What are two advantages of pilot testing a design concept?(Choose two.)
• The test network experiences real-world network traffic.
• Users within the enterprise are not affected by the test.
• Network response can be tested in unplanned and unpredictable situations.
• Unlikely failure conditions can be conveniently tested.
• Network response can be tested in a highly controlled simulated environment.

 

2.      While preparing a network test plan document, a network designer records all initial and modified device configurations. Which section of the document typically contains this information?
• Appendix
• Test Procedures
• Test Description
• Actual Results and Conclusions
• Anticipated Results and Success Criteria

 

3.      Refer to the exhibit. A network designer creates a test plan that includes the specification shown. In which section of the test plan would this specification be found?
• Test Description
• Test Procedures
• Design and Topology Diagram
• Actual Results and Conclusions
• Anticipated Results and Success Criteria

 

4.      What OSI model Layer 2 security measure can a network engineer implement when prototyping network security?
• a firewall at the network edge
• port security at the access design layer
• port security at the distribution design layer
• IP access control lists at the access design layer

 

5.      How do designers decide which network functions need to be included in the prototype test?
• They select the functions that align with the business goals.
• They select the functions that occur at the network core.
• They select the functions that do not exist in the existing network.
• They select the functions from a list of generic network operations.

Baca lebih lanjut…

CCNA Discovery 4 Module 6 Exam Answers version 4.0

1.      A network engineer researched whether there are mechanisms available to help with the transition from an IPv4 addressing structure to IPv6. What three options did the engineer find?(Choose three.)
• A protocol translation mechanism allows communication between the IPv4 and IPv6 networks.
• A packet analyzer determines the addressing structure and converts it to the appropriate IPv4 or IPv6 scheme.
• New Core devices that support IPV6 must be purchased.
• A protocol converter changes IPv4 packets into IPv6 packets and vice versa.
• A dual-stack network design allows both IPv4 and IPv6 addressing to be used on all network devices.
• Tunneling allows IPv4 packets to be encapsulated so that they can traverse IPv6 networks and vice versa.

 

2.      When should the command no auto-summary be used?
• with RIP version 1, to enable classless routing
• with RIP version 2, to enable classless routing
• with RIP version 1, when discontigous networks exist
• with RIP version 2, when discontigous networks exist

 

3.      Refer to the exhibit. What must an administrator do on R3 to ensure that update packets are sent with subnet mask information?
• Add the commands:
R3(config-router)# auto-summary
R3(config-router)# no version 2
• Add the commands:
R3(config-router)# version 2
R3(config-router)# no auto-summary

• Change the network statement on R3:
R3(config)# network 10.10.4.0
• Add the command:
R3(config)# ip route 0.0.0.0 0.0.0.0 s0/0

 

4.      What best describes a discontiguous network?
• combines several classfull networking address
• contains more than one route to a destination
• implements more than one routing protocol
• separated from the rest of the hierarchical group by another network

 

5.      Refer to the exhibit. A company has decided to add a new workgroup. If the subnetting scheme for the network uses contiguous blocks of addresses, what subnet is assigned to WGROUP3?
• 172.16.3.12/29
• 172.16.3.16/29
• 172.16.3.20/29
• 172.16.3.24/29
• 172.16.3.32/29

Baca lebih lanjut…

CCNA Discovery 4 Module 5 Exam Answers version 4.0

1.      Which rule should be followed when implementing the security requirements of a network design?
• Always use a common security plan for all business needs.
• As standard practice, lower access restrictions for users if cost is too high.
• Avoid reducing security in order to add additional network capabilities.
• When possible, implement an IDS to protect users from spam.
2.      What limitations of the 2960 switch prevent it from providing the services needed in the Distribution layer?
• It is limited to copper connections.
• It does not support QoS.
• It does not support voice VLAN capability.
• It does not support route summarization.
3.      When considering converged network designs, it is important to identify appropriate service demands. What is a concern when preparing a network design to fit this environment?
• business data compensation for sensitivity to noise
• location and placement of firewalls
• voice-level quality of service
• security policy requirements
4.      Which three design requirements are implemented at the access layer? (Choose three.)
• PoE
• VLANs
• high-density routing
• packet filtering
• rapidly converging routing protocols
• QoS traffic classification and marking
5.      Refer to the exhibit. Which statement is true regarding how the ISP router filters traffic?
• Traffic from the 64.100.0.1 address to any destination on the Internet is denied.
• Traffic from any source address entering the ISP router interface s0/0/0 is permitted.
• Only traffic with a source address of 64.100.0.1/30 is allowed into the ISP router interface s0/0/0.
• All traffic from the 64.100.0.0/21 network can access the Internet.
• Traffic from any source address can access the 64.100.0.0/21 network.

CCNA Discovery 4 Module 1 Exam Answer version 4.0

1.      What are two mechanisms that provide redundancy for server farm implementations? (Choose two.)
• host intrusion prevention systems
• virtual private networks
• network intrusion prevention systems
• Rapid Spanning Tree Protocol
• Hot Standby Routing Protocol

2.      The ability to connect securely to a private network over a public network is provided by which WAN technology?
• DSL
• Frame Relay
• ISDN
• PSTN
• VPN

3.      Which three statements describe the functions of the Cisco hierarchical network design model? (Choose three.)
• Route summarization is not necessary at the core and distribution layers.
• The distribution layer is responsible for traffic filtering and isolating failures from the core.
• Two goals of the core layer are 100 percent uptime and maximizing throughput.
• The access layer provides a means of connecting end devices to the network.
• The distribution layer distributes network traffic directly to end users.
• The core layer usually employs a star topology.
4.       A network designer is creating a new network. The design must offer enough redundancy to provide protection against a single link or device failure, yet must not be too complex or expensive to implement. What topology would fill these needs?
• star
• full mesh
• partial mesh
• extended star
• hub and spoke
5.       Refer to the exhibit. If the firewall module has been correctly configured using best practices for network security, which statement is true about the security design for the network?
• Servers in the network are not protected from internal attacks.
• Servers in the DMZ are protected from internal and external attacks.
• Servers in the server farm are protected from internal and external attacks.
• Traffic from the external networks is not able to access the servers in the DMZ.

Activity Validate choice of VPN Topology, Devices, and topologies

CCNA Discovery 4 Module 3 Exam Answers 4.0

CCNA Discovery 4 Module 3 Exam Answers Version 4.0

1. It is important to identify the details of network sections and devices that will be affected or involved in a new design. This information is included in which section of the Network Design Requirements Document?
• Project Goal
• Project Scope
• Technical Requirements
• Current State of the Network

2. Which two pieces of information does the network designer need to determine if the Cisco IOS of a router requires an upgrade? (Choose two.)
• amount of NVRAM installed
• model number of the router
• number of interfaces and installed HWICs
• installed Cisco IOS feature set and version
• error statistics for each interface

3. Which three pieces of information need to be considered when selecting the proper Cisco IOS version for an upgrade? (Choose three.)
• processor ID
• interface type
• amount of DRAM
• bootstrap version
• device make and model
• size of system flash memory

4. What are two practices a network technician should follow when installing a new interface card in a router? (Choose two.)
• Be sure the interface card faceplate does not touch the chassis rear panel.
• Do not tighten the captive screws until the router has been powered on and recognizes the card.
• Store the blank faceplate inside the card slot to be used if the card is removed.
• Handle the interface card by the edges to avoid static discharge.
• Push the interface card into place until the edge connector is seated securely

5. The new serial interface card for the router arrives and the network technician reads that it is hotswappable. What does this mean?
• The card cannot be installed while the router is powered on because static discharge could damage the card.
• The card cannot be installed until the router is powered off and completely cooled down.
• The card can be installed while the router is powered on if the router supports this technology.
• The card is a replacement and must be installed in the same slot as the card it is replacing.

Baca lebih lanjut…

CCNA Discovery 4 Module 4 Exam Answers 4.0

CCNA Discovery 4 Module 4 Exam Answers
Version 4.0

1. In addition to the technical considerations, what other major factor is used to evaluate the success of a network installation?
• final project costs
• maintenance costs
• user satisfaction
• statistics describing the performance of network devices

2. Which two network applications are most affected by network congestion and delays? (Choose two.)
• IP telephony
• live video webcasts
• audio file downloads
• online banking services
• file archival and retrieval

3. What two Cisco tools can be used to analyze network application traffic? (Choose two.)
• NBAR
• NetFlow
• AutoQoS
• Wireshark
• Custom Queuing

4. In network design, which technology can be implemented to prioritize traffic based on its importance and technical requirements?
• STP
• QoS
• RTP
• TCP
• VPN

5. What are two characteristics of voice over IP traffic? (Choose two.)
• Voice packets tend to be small.
• Voice packets must be processed in real time.
• Voice packets can effectively use TCP reliability features.
• Voice traffic can survive packet drops and retransmission delays.
• Voice packets must be converted to analog before being sent across the IP network.
• Voice packets automatically receive a higher priority value than other types of packets.

Baca lebih lanjut…

CCNA Discovery 4 Module 2 Exam Answers 4.0

CCNA Discovery 4 Module 2 Exam Answers Version 4.0

1. During an evaluation of the currently installed network, the IT staff performs a gap analysis to determine whether the existing network infrastructure can support the desired new features. At which stage of the Cisco Lifecycle Services approach does this activity occur?
• Prepare Phase
• Plan Phase
• Design Phase
• Implement Phase
• Operate Phase
• Optimize Phase

2. Which stage of the Cisco Lifecycle Services strategy is usually completed before an organization issues a Request For Proposal (RFP) or Request For Quotation (RFQ)?
• Prepare Phase
• Plan Phase
• Design Phase
• Implement Phase
• Operate Phase
• Optimize Phase

3. What is the purpose of SNMP?
• to facilitate the exchange of information between devices and the NMS
• to monitor and control managed network devices
• to report user logins to a monitoring station
• to verify traffic throughout the network and keep a log of all activity

4. During an analysis of a customer network, several possible opportunities for network improvement are identified. At which stage of the Cisco Lifecycle Services does this process occur?
• Prepare Phase
• Plan Phase
• Design Phase
• Implement Phase
• Optimize Phase
• Operate Phase

5. What provides the initial data for the Optimize Phase?
• performance monitoring
• business goals
• technical goals
• RFP

Baca lebih lanjut…

Post Navigation

%d blogger menyukai ini: