ActualTest 642-871
ActualTest 642-871
Ver: 11-15-06
642-871
QUESTION 1:
Answer: E
Explanation:
Device fault tolerance and redundancy: This is often the
first level of availability in the network. Fault-tolerant
devices provide a high level of reliability. Cisco offers
options for redundant supervisor engines and dual power
supplies, which provide the first backstop against a network
failure.
Reference: Arch student guide p.1-13.
QUESTION 2:
Answer: A, C, D
Official Cisco ARCH course material, pg. 2-12
QUESTION 3:
Which of the following metrics are used to measure performance in the Enterprise
A. grade of service
B. response time
C. throughput
D. transmit jitter
E. utilization
Answer: B, C, E
Explanation:
Performance might be the least understood term in networking. Typically, performance is
defined as throughput and packets per second (pps). These are easy numbers to gauge
and report, but these values relate to a single switch or router and make no sense when
measuring an entire network.
The point is that there is no one metric for determining performance. Instead, gauge
network performance by these three metrics:
1) Responsiveness.
2) Throughput.
3) Utilization.
Reference: Arch student guide p. 1-10.
QUESTION 4:
Which of the following is considered part of a Fault Tolerant Device? (Choose three)
Answer: A, B, C
Explanation:
This is often the first level of availability in the network. Fault-tolerant devices provide a
high level of reliability. Cisco offers options for redundant supervisor engines and dual
power supplies, which provide the first backstop against a network failure.
Reference: Arch student guide p.1-13
QUESTION 5:
Answer: D
Reference: Cisco Systems Inc. course material, pages 2-10 and 2-11
QUESTION 6:
Which location would be the best locale for the device for
the Management Module and Server Farm?
Answer: B
QUESTION 7:
Answer: B
QUESTION 8:
A. WAN module
B. Server farm
C. E-Commerce module
D. Access server
E. Internet connectivity
F. Management module
G. VPN/Remote access
H. All of the above.
Answer: A, C, E, G
QUESTION 9:
Answer: B
Explanation:
1) Determine application and data requirements for each
campus location on the enterprise network
2) Design the logical network.
Reference: Arch student guide p.2-10.
QUESTION 10:
Answer: A, B, D
QUESTION 11:
Answer: F
QUESTION 12:
A. user types
B. traffic types
C. file server types
D. sampling method
E. media types
F. traffic load measurement
Answer: B, D, F
Cisco ARCH course material, pg. 2-13
QUESTION 13:
You are the network administrator at Certkiller .Your newly appointed Certkiller
trainee wants to know which components are part of the Internet connectivity
module for a network.
What will your reply be? (Choose three.)
A. DNS servers
B. security servers
C. SMTP servers
D. management servers
E. corporate servers
Answer: A, B, C
Explanation:
QUESTION 14:
Answer: D
Reference: Arch student guide p.2-10
QUESTION 15:
Your Certkiller .com trainee Doug asks you to characterize Layer 3 switching.
What should you tell him? (Select three).
Answer: B, D, E
* IP, IPX, and IP multicast routing and forwarding between Ethernet ports
* AppleTalk 1 and 2 routing
* Constrained Multicast Flooding (CMF)
* Up to 128 IP multicast groups
* QoS-based forwarding based on IP-precedence-based forwarding
*
Load balancing among equal cost paths based on source and destination IP and IPX addresses
QUESTION 16:
Dr Bill your supervisor at Certkiller .com asks you to tell him about the enterprise
composite network model. What should you tell him?
Answer: D
Explanation:
Enterprise Composite Network Model defines a deterministic network with clearly
defined boundaries between modules. The model has clear demarcation points to aid the
designer in knowing exactly where traffic is.
Reference: Arch student guide p.1-31
QUESTION 17:
A. QoS
B. Connectivity
C. Accessibility
D. Network and system management
E. Topology definition and management
Answer: D
Explanation: The Network Management Module can support both in-band and
out-of-band (OOB) networks for administration and or management of network
equipment and client server components.
QUESTION 18:
A modular design using the Enterprise Composite Model consists of which three
functional areas? (Choose three)
A. Enterprise Campus
B. Enterprise Edge
C. Campus Backbone
D. Service Provider Edge
E. Network Management
Answer: A, B, D
Explanation:
The Enterprise Composite Network Model introduces additional modularity into the
network structure. The entire network is divided into functional areas that contain the
hierarchical model access, distribution, and core layers.
The Enterprise Composite Network Model contains three major functional areas:
1) Enterprise Campus.
2) Enterprise Edge.
3) Service Provider Edge.
Reference: Arch student guide p.1-30
QUESTION 19:
Answer: C
Cisco ARCH course material, pg. 1-31
QUESTION 20:
A. Implement highly redundant switching and links with no single points or paths of
failure.
Answer: A, C, E
Explanation: According to Cisco Design standards, the Campus Back Bone must have
High Availability. Cisco design best practices guidelines require redundancy for mission
critical devices.
Cisco ARCH course material, pg. 2-69
QUESTION 21:
Which three objectives would be met by designing Layer 3 switching in the Campus
Backbone of a medium size installation? (Choose three)
Answer: A, C, D
Explanation
The most flexible and scalable campus backbone consists of Layer 3 switches. The
backbone switches are connected by routed Gigabit Ethernet or Gigabit EherChannel
links. Layer 3 switched backbones offer these advantages:
1) Reduced router peering (not B)
2) Flexible topology with no spanning-tree loops (C)
3) Multicast and broadcast control in the backbone (D)
4) Scalability to arbitrarily large size (A)
Reference: Arch student guide p.2-35, 2-36
QUESTION 22:
Which three objectives meet the requirements for the Server Farm module?
(Choose three)
Answer: B,C,D
Explanation:
1) Performance: Up to 10 Gbps outbound bandwidth capacity is required from the server
farm for most enterprises.
2) Scalability: Scalability is a critical requirement in every server farm. Server load
balancing is most often deployed. As the number of servers requiring higher-bandwidth
connections increases, port densities can exceed the capacity of a single switch or server
farm block. Applying a modular block design to server farm deployment permits flexible
growth.
3) Availability: Availability is generally ensured through the overall network design.
Networks are designed to minimize the occurrence of service problems and the time to
recover from problems, for example with backup recovery policies.
Reference: Arch student guide p.2-65
QUESTION 23:
A. Functionality
B. Performance
C. Scalability
D. Administration
E. Expandability
Answer: C
The ability of a campus network to expand so as to
accommodate more users and resources is referred to as
scalability.
QUESTION 24:
A. routing requirements
B. critical importance of the site and number of users
C. impact if the site is an aggregation point
Answer: B, D
QUESTION 25:
Certkiller wants you to design and implement a new Campus Backbone module that
has multicast and broadcast control, flexible topology, and no spanning tree loops.
Cost effectiveness is a secondary consideration.
Which equipment type would you recommend?
A. High-end routers
B. Mid-level Layer 2 switches
C. High-level Layer 2 switches
D. Layer 3 switches
Answer: D
Explanation:
The most flexible and scalable campus backbone consists of Layer 3 switches, as shown
in the figure. The backbone switches are connected by routed Gigabit Ethernet or Gigabit
EherChannel links. Layer 3 switched backbones offer these advantages:
5) Reduced router peering
6) Flexible topology with no spanning-tree loops
7) Multicast and broadcast control in the backbone
8) Scalability to arbitrarily large size
Reference: Arch student guide p.2-35
QUESTION 26:
Answer: A
Explanation:
Availability is a measurable quantity. The factors affecting availability are mean time to
repair (MTTR), the time it takes to recover from a failure, and mean time between failure
(MTBF) the time that passes between network outages or device failures.
Decreasing MTTR and increasing MTBF increase availability. Dividing MTBF by the
sum of MTBF and MTTR results in a percentage indicating availability.
Rerference: Arch student guide p.5-7
QUESTION 27:
Which action indicates the optimal level of functional process recovery in a high
availability architecture?
Answer: B
QUESTION 28:
A. Mid-range switches
B. Redundant switching and links with no single paths or
points of failure
C. Caching systems where appropriate
D. Server load balancing
E. Redundant firewalls
F. All of the above.
Answer: B, C, D
QUESTION 29:
C. High-end routers
D. High-end hubs
E. Layer 3 switches
Answer: E
Explanation:
The most flexible and scalable campus backbone consists of Layer 3 switches, as shown
in the figure. The backbone switches are connected by routed Gigabit Ethernet or Gigabit
EherChannel links. Layer 3 switched backbones offer these advantages:
9) Reduced router peering
10) Flexible topology with no spanning-tree loops
11) Multicast and broadcast control in the backbone
12) Scalability to arbitrarily large size
Reference: Arch student guide p.2-35
QUESTION 30:
Answer: D
QUESTION 31:
Answer: B
QUESTION 32:
Answer: B
Explanation:
Campus Manager: Campus Manager provides the administrator with tools to configure,
manage, and understand the physical and logical aspects of a Catalyst-based local-area
network. Campus Manager offers these applications:
1) Topology Services.
2) User Tracking.
3) Path Analysis.
4) VLAN Port Assignment.
5) Discrepancy Reports.
Reference: Arch student guide p.4-21
QUESTION 33:
You work as a network consultant at Certkiller .com. One of Certkiller 's customers
wants to implement a new company-wide intranet application. You are carefully
going through the steps of determining the requirements of the customers for this
application, when you determine that the company will need to track and monitor
performance data. In which step in determining the requirements of the customer
for the new application does this fit?
Answer: D
QUESTION 34:
A. LAPD
B. Kerberos
C. VPN
D. L2TP
E. Content filter
Answer: C
Explanation:
Perimeter security: This element provides the means to
control access to critical network applications, data, and
services so that only legitimate users and information can
pass through the network. Routers and switches with
Access Control Lists, stateful firewall implementations, and
dedicated firewall appliances provide perimeter security
control. Complementary tools, including virus scanners and
content filters, also help control network perimeters.
Firewall and Pixes use VPNs.
Reference: Arch student guide p.6-21.
QUESTION 35:
An administrator is securing the building access module of the network and does
not want users on the same subnet to be able to communicate without passing
through a Layer 3 device first.
Which should the administrator do?
Answer: D
QUESTION 36:
A. Clustering
B. Token Ring
C. Parallel processing
D. Fault tolerance
E. Redundant topology
F. Tripe modular redundancy
Answer: E
QUESTION 37:
A. Company size
B. Performance requirements
C. Hardware costs
D. Cost of downtime
Answer: C, D
QUESTION 38:
Answer: C, F
QUESTION 39:
A. Redundant Topologies
B. Public bandwidth sharing
C. Fault management.
D. Extremely high MTTR
E. Fault Tolerant Devices
F. Extremely low MTBF
Answer: A, E
Explanation:
Key availability issues to address include:
1)Device fault tolerance and redundancy: This is often the
first level of availability in the network. Fault-tolerant
devices provide a high level of reliablility. Cisco offers
options for redundant supervisor engines and dual power
supplies, which provide the first backstop against a network
failure.
2) link redundancy
3) Protocol resiliency.
4) Network capacity design.
Reference: Arch student guide p.1-13.
QUESTION 40:
A. Network design
B. Operational best practices
C. Fault tolerance
D. Device-level hardware reliability
E. Fault management and diagnosis
Answer: B
QUESTION 41:
A. Resiliency
B. Redundancy
C. QoS
D. Fault tolerance
E. Loss tolerance
F. Load balancing
Answer: C
Explanation:
QoS technologies make certain that the WAN is used
efficiently by mission-critical applications that are most
important to the business, that bandwidth and minimum
delays required by time-sensitive multimedia and voice
applications are available, and that other applications using
the link get fair service without interfering with
mission-critical traffic.
Reference: Arch student guide p.7-6.
QUESTION 42:
You are a network administrator at Certkiller . You have designed a high availability
network based on a redundant network topology. Your newly appointed Certkiller
trainee wants to know what the main disadvantage of this design is.
What will your reply be?
E. Redundant topologies are more costly and can be more difficult to manage.
Answer: E
Explanation:
Redundant topologies cost not cheap, because they need additional hardware and links.
They are also difficult to manage since the networks consist of more hardware and the
additional protocols and features are realized.
QUESTION 43:
You work as a network consultant. Your client, Certkiller .com, plans to promote an
e-commerce website heavily, and expect to achieve a high volume of transactions.
Downtime must be kept to an absolute minimum.
What should you include in your proposed availability model?
Answer: C
QUESTION 44:
A. Redundant infrastructure
B. Clustering of computer systems
C. Reduced MTBF
D. Continuous operation of computing systems
Answer: D
QUESTION 45:
You are creating a high availability architecture for a client with a limited budget.
Which network equipment has lowest priority for redundancy?
A. Core switches
B. Access routers
C. Access servers
D. Distribution switches
E. Server access switches
F. End-user access switches
Answer: F
QUESTION 46:
A. Cost
B. Hardware
C. Reliability
D. Processing power
Answer: A
Explanation:
Redundancy and other network features which the high availability needs cost not cheap.
QUESTION 47:
A. .9992
B. .9996
C. .9997
D. 1.999
Answer: A
Explanation:
To calculate the availability of the complex system or device, multiply the availability of
all of its parts. For example:
1) Switch fabric availability = .99997
2) Route processor availability = .99996
3) System availability = .99997* .99996 = 0.99992
As system complexity increases, availability decreases. If a failure of any one part causes
QUESTION 48:
What are the two most significant disadvantages of designing a high availability
network solely based on fault tolerant devices? (Choose two)
Answer: A, E
QUESTION 49:
Answer: B
QUESTION 50:
A. SNAP
B. SRST
C. CHAP
D. HSRP
E. PSTN
Answer: B
Explanation:
QUESTION 51:
You are a network administrator at Certkiller . You want to implement QoS tools to
protect voice-from-voice. What tools should you use?
A. prioritization tools
B. link efficiency tools
C. traffic shaping tools
D. call admission tools
E. All of the above
Answer: D
Explanation:
Call admission control ensures that voice quality of service (QoS) is maintained across
constricted WAN links, and automatically diverts calls to alternative PSTN routers when
WAN bandwidth is not available.
Reference: Arch student guide p.11-7
QUESTION 52:
You are the network administrator at Certkiller .Your newly appointed Certkiller
trainee wants to know what IP telephony deployment model uses an H.225
Gatekeeper-Controlled trunk for call admission control within existing H.323
environments.
What will your reply be?
Answer: D
QUESTION 53:
A. Bandwidth efficiency
B. Cell-switching
C. Congestion notification
D. Heterogeneous network
Answer: A, C
Explanation:
These features are offered with Voice over Frame Relay:
1) Enables real-time, delay-sensitive voice traffic to be carried over slow Frame Relay
links
2) Allows replacement of dedicated 64-kbps time-division multiplexing (TDM)
telephony circuits with more economical Frame Relay PVCs or SVCs
3) Uses voice compression technology that conforms to International Telecommunication
Union Telecommunication Standardization Sector (ITU-T) specifications
4) Allows intelligent setup of proprietary-switched Voice over Frame Relay connections
between two Voice over Frame Relay endpoints
5) Supports standards-based FRF.11 and FRF.12 functionality
Reference: Arch student guide p.11.62
QUESTION 54:
What are two design guidelines for VoIP networks? (Choose two)
Answer: B, D
Not C: C is close. But actually 40 ms should be 30 ms
QUESTION 55:
Answer: D
Explanation:
Survivable Remote Site Telephony (SRST) that provides basic call processing at remote
QUESTION 56:
A. Between 1 and 10
B. Between 10 and 30
C. Between 32 and 48
D. Between 56 and 128
Answer: B
Explanation:
For a given data rate, the WLAN designer can alter the
power level or choose a different antenna to change the
coverage area and/or coverage shape.
Access points have an aggregate throughput of about 6
Mbps. With this in mind, the maximum suggested number
of active clients is between 10 and 30. The precise number
of active clients depends on the data rates supported. That
is, active clients with higher data rates necessitate fewer
active clients for each access point.
Reference: Arch student guide p.10-8.
QUESTION 57:
A. EAP
B. BRI
C. SNMP
D. HSRP
E. WEP
Answer: D
Explanation:
Hot standby is not the same as HSRP. Hot standby mode
designates an access point as a backup for another access
point. The standby access point is placed near the access
point it monitors and is configured exactly the same as the
monitored access point (except for its role in the radio
network and IP address). The standby access point
associates with the monitored access point as a client and
queries the monitored access point regulary through both
the Ethernet interface and the radio interface. If the
monitored access point fails to respond, the standby access
point comes online, signals the primary access point radio
to become quiescent, and takes the monitored access point's
place in the network.
Reference: Arch student guide p.10-30.
QUESTION 58:
Answer: B
Explanation:
If an 11-Mbps service has been specified and provisioned
with access points to support this level of service, allowing
clients to associate at lower rates will create a coverage
area greater than planned, increasing the security exposure
and potentially interfering with other WLANs
Reference: Arch student guide p.10-22.
QUESTION 59:
Answer: B, E
Explanation:
Broadcast and multicast are sent at the slowest data rate (to
ensure that all clients can see them), which reduces the
throughput of the WLAN because traffic must wait until
frames are processed at the slower rate.
Reference: Arch student guide p.10.22
QUESTION 60:
A. 802.1q
B. 802.11g
C. 802.11a
D. 802.1g
E. 802.11p
Answer: B
Explanation:
The 802.11g standard operates in the same unlicensed
portion of the 2.4-GHz spectrum as 802.11b. Both the IEEE
802.11g and 802.11a standards provide a 54-Mbps data
rate. IEEE 802.11g provides the benefit of backward
compatibility with IEEE 802.11b equipment, preserving
users investment in their existing WLAN infrastructure.
Reference: Arch student guide p.10-10
QUESTION 61:
You are a technician at Certkiller . Your newly appointed Certkiller trainee wants to
know what the maximum number of wireless IP phones that can register with an
Access point is.
What would your reply be?
A. 3
B. 7
C. 8
D. 15
E. 33
F. 35
G. 40
H. 57
Answer: B
QUESTION 62:
Answer: D
Explanation:
The 802.11b Standard
Long established, the 802.11b standard is used today by the majority of
installed wireless LANs.
General Features:
Has a maximum transmission rate per channel of 11Mbps (actual throughput
is about 6 to 7Mbps).
Operates in the 2.4GHz radio band.
Supports three channels at distances up to 350 feet.
QUESTION 63:
Answer: C
Explanation:
QUESTION 64:
Your Certkiller .com trainee Sandra is curios about Cisco wireless LAN.
What should you tell Sandra? (Select two.)
Answer: B, D
Explanation:
A WLAN consists of an access point communicating over radio frequency to wireless
clietnts. The data rate, power level, and antenna choice affect the size of the coverage
area of a single wireless cell, which in turn affects how many access points are required
in a specific implementation. This topic describes the wireless communication
architecture.
Only one station in a wireless cell, including the access point, can send data at any one
time (D).
The bandwidth is shared among all stations (B). If a station wishes to send, it listens and
waits for an available slot. WLANs use carrier sense multiple access collision avoidance
(CSMA/CA).
Reference: Arch student guide p.10-6.
QUESTION 65:
You are the network administrator at Certkiller . Certkiller has an IEEE 802.11b
wireless environment. What is the maximum recommended number of calls using
G.711 per access point?
A. 7
B. 15
C. 30
D. 50
E. 100
Answer: A
Explanation:
The maximum recommended number of phones per access point is seven. This limitation
is due to the number of packets that can be forwarded per second over an 802.11 link and
minimizing transmission delays, rather than a bandwidth limitation of the link.
Reference: ARCH student guide p.10-35
QUESTION 66:
What can be done to ensure connections to workstations that are placed on the edge
of a wireless access point's coverage area?
Answer: A
Explanation:
Data rates affect cell size. Lower data rates (such as 1 Mbps) can extend farther from the
access point than can higher data rates (such as 11 Mbps). Therefore, the data rate (and
power level) affects cell coverage and consequently the number of access points required.
Reference: Arch student guide p.10-21
QUESTION 67:
A. 5 GHz
B. 2.4 GHz
C. 1.4 GHz
D. 11 MHz
Answer: B
Explanation: Both 802.11b and 802.11g use frequency 2.4GHz. 802.11b is rated at
11Mbps while 802.11g is rated at 54 Mpbs. 802.11g is backwards capable with 802.11b.
Incorrect:
A. 5 GHz - 802.11A
QUESTION 68:
A. Full-mesh VPN
B. Hub-and-spoke VPN
C. Hierarchical VPN
D. Token Ring
E. Private WAN
Answer: B
QUESTION 69:
A. IPSec
B. GRE
C. Triple-DES
D. IKE
E. None of the above.
Answer: B
Explanation:
In site-to-site VPNs, the principal tunneling is generic
routing encapsulation (GRE). If only IP-unicast packets are
being tunneled, simple encapsulation provided by IPSec is
suffiecient. GRE is used when multicast, broadcast, and
no-IP packets need to be tunneld.
Reference: Arch student guide p.9-7
QUESTION 70:
A. Packet flooding.
B. Re-transmission of packets blocking all traffic.
C. Large data packets blocking voice packets.
D. Large voice packets blocking data packets.
E. Excessive data fragmentation.
Answer: C
QUESTION 71:
Answer: D
Explanation:
Since the company is not big the solution may be cost
effective. The offices are very far so the internet connection
may be used. The best solution here would be site-to-site
VPN.
Site-to-Site VPNs are an alternative WAN infrastructure
used to connect branch offices, home offices, or business
partners sites to all or portions of an enterprise's network.
VPNs do not inherently change private WAN requirements,
such as support for multiple protocols, high reliablility, and
extensive scalability, but instead meet these requirements
more cost-effectively and with greater flexibility.
Site-to-site VPNs utilize the most pervasive transport
technologies available today, such as the public Internet or
service provider IP networks, by employing tunneling and
encryption for data privacy and QoS for transport
reliability.
QUESTION 72:
You are a network administrator at Certkiller . You have designed a high availability
network based on a redundant network topology. Your newly appointed Certkiller
trainee wants to know what the advantages of this design are.
What will your reply be? (Choose two.)
Answer: D, E
Explanation:
Loss of IP connectivity can be caused by local-link failure,
full-loss connectivity by the service provider, or device
failure. For a typical remote site, an alternate path
(dedicated or dial-on-demand) to the head-end site can
protect against local-link failure or loss of service provider
connectivity. Protection against a local-device failure at a
remote site I is not usually provided unless the importance
of connectivity for the remote site warrants the cost. For a
typical head-end site, you can achieve redundancy by
implementing multiple provider connections and by
deploying multiple head-end routers.
Reference: Arch student guide p.9-34
QUESTION 73:
Answer: D
QUESTION 74:
A. PAT
B. PAT-T
C. Dynamic NAT
D. IPSec ESP NAT
Answer: B
Explanation:
NAT Traversal (NAT-T) lets IPSec peers establish a connection through a NAT device.
It does this by encapsulating IPSec traffic in UDP datagrams, using port 4500, thereby
providing NAT devices with port information. NAT-T autodetects any NAT devices, and
only encapsulates IPSec traffic when necessary.
Reference: Arch student guide p.9-64
QUESTION 75:
What are two benefits of choosing a site-to-site VPN instead of a private WAN?
(Choose two)
Answer: A, C
Explanation:
Site-to-site VPNs are primarily deployed to connect office locations of an enterprise.
They provide an alternative to the WAN infrastructure, while offering significant cost
benefits. They enable new infrastructure applications such as extrantet, and extend and
enhance network connectivity.
Enterprise WAN requirements for traditional private WAN services, such as
multiprotocol support, high -availability, scalability, and security, are also requirements
for VPNs. VPNs can often meet these requirements more cost-effectively and with
greater flexibility than private WAN services using leased lines or virtual circuit
technologies such as Frame Relay and ATM.
Reference: Arch student guide p.9-27,9-28.
QUESTION 76:
Which typical enterprise campus requirement ensures that the network supports
the required applications and that data flows within the required time frames?
A. Availability
B. Performance
C. Functionality
D. Manageability
E. Scalability
Answer: C
QUESTION 77:
A. Scalability.
B. Transportability
C. Loss
D. Layer 2 technology
E. Layer 1 media
F. All of the above.
Answer: C, E
QUESTION 78:
A. Database magnitude
B. Delay sensitivity
C. Data content
D. Bandwidth usage
E. Loss tolerance
F. All of the above.
Answer: B, D, E
QUESTION 79:
Answer: C
QUESTION 80:
Answer: D
QUESTION 81:
A. Authentication is required.
Answer: A, B, E, F
Explanation:
OSPF offers these features:
1) With OSPF, there is no limitation on the hop count. The
intelligent use of VLSM is very useful in IP address
allocation.
2) OSPF uses IP multicast to send link-state updates. This
ensures less processing on routers that are not listening to
OSPF packets. Updates are only sent when routing changes
occur rather than periodically. This ensures a better use of
bandwidth.
3) OSPF offers fast convergence because routing changes
are propagated instantaneously and not periodically (a
characteristic of distance vector routing protocols).
4) OSPF allows for effective load balancing
5) OSPF allows for routing authentication by using
different methods of password authentication
6) OSPF allows for the transfer and tagging of external
routes injected into an autonomous system. This keeps
track of external routes injected by exterior protocols such
as Border Gateway Protocol (BGP).
Reference: Arch student guide p.2-49
QUESTION 82:
Answer: A, E
QUESTION 83:
A. Dial-on-demand networks
B. Smaller expanding networks
C. Stub networks
D. Token ring networks.
E. Multi-homed networks
F. Not so stubby network
Answer: A, C
Explanation:
Static routing is primarily use for:
1) Routing to and from stub networks. A stub network only
carries traffic for local hosts, and typically has only one
entry/ xit point. Even if it has paths to more than one other
network, it does not carry traffic for other networks.
2) Smaller network that are noet expected to grow
significantly.
3) Supporting special features such as dial-on-demand
routing (DDR) and on-demand routing
4) Specifying routes toward dialing peers in dial-in
environments.
Reference: Arch student guide p.2-46.
QUESTION 84:
Answer: A
QUESTION 85:
Answer: B, C, F
QUESTION 86:
A. VLANs
B. Token Ring
C. Ethernet Trunking
D. Separate, flat networks
E. Rapid Spanning Tree (RST)
Answer: A, D
QUESTION 87:
A. data content
B. bandwidth usage
C. database size
D. delay sensitivity
E. loss tolerance
Answer: B, D, E
QUESTION 88:
(Choose two)
A. IGRP
B. RIPv2
C. EIGRP
D. OSPF
Answer: C, D
Explanation:
D: Intitialy OSPF was designed for networks that consisted of point-to-point links, but
later it was successfully adapted for operation in LAN and NBMA environments.
C: EIGRP is suitable for nonbroadcast multi-access (NBMA) environments where there
are split horizon issues, such as with Frame Relay or ATM multipoint interfaces.
Not B,A: Use of RIP and RIPv2 in NBMA networks is not appropriate because of large
bandwidth requirements.
at the Network Management module of a campus network design
(4 questions)
QUESTION 89:
A. Netsys
B. CiscoWorks Lite
C. CiscoWorks Standard
D. CiscoWorks Premium
E. CiscoWorks for Windows
Answer: E
QUESTION 90:
Certkiller has 1500 managed devices and 15,000 end users on a campus network.
LAN Management Solution (LMS) is being deployed as the network management
application.
What is the recommended number of network management server(s)?
A. 1
B. 2
C. 3
D. 4
Answer: A
QUESTION 91:
Answer: B
Explanation:
Inventory Manager: Inventory Manager provides current inventory of all Cisco devices
(routers, switches, firewalls) in the network, including support for Cisco CallManager,
VPN concentrator, and WAN switches. Hardware and software summary information,
includes detailed reports for groups of devices, memory, flash, software version,
interface, and stack modules.
Reference: Arch student guide p.4-19
QUESTION 92:
Answer: A, C, E
QUESTION 93:
Answer: A, C
Explanation:
A. Having remote users will decrease the need for additional office space.
C. Allowing users to work from home provide a more flexible work environment.
Incorrect.
B. The need for authentication would not suggest a need for remote access.
D. Irrelevant
QUESTION 94:
Answer: B, D
Explanation:
The correct answers should be:
- criticality of the site
- number of users
According to Cisco.
Not A: The official Cisco course notes "Designing Cisco Network Service
Architectures (ARCH) v1.2" states on page 3-16 "Branch offices normally do not act as
aggregation points. Redundancy depends on the criticality of the site and the number of
users".
QUESTION 95:
Answer: B
Explanation:
Constant bit rate (CBR): This traffic category has a
bandwidth guarantee. Use it for traffic least tolerant of
delay or loss.
Reference: Arch student guide p.3-35.
QUESTION 96:
A. low cost
B. high bandwidth
C. high link quality
D. always on
E. all of the above
Answer: C
Explanation:
Enterprises are increasingly turning to DSL to expand the
use of telecommuting, reduce costs, and provide
Internet-based services. DSL offers always-on access,
allowing users to work at remote offices as if they were on
site.
Reference: Arch student guide p.3-66
QUESTION 97:
When designing a network for an online bookstore, the availability of which two
Enterprise Edge modules would be the most critical issue? (Select two)
A. WAN module
B. Internet Connectivity module
C. Remote Access and VNP module
D. E-commerce module
Answer: B, D
Explanation:
For book store the most critical are E-Commerce and Internet Connectivity module.
E-Commerce: Enables enterprises to deploy e-commerce applications and take advantage
of the Internet. All e-commerce transactions pass through a series of intelligent services
to provide performance, scalability, and availability within the overall e-commerce
network design.
Internet connectivity: Provides internal users with connectivity to Internet services.
Internet users can access the information on publicly available servers. Additionally, this
module accepts Virtual Private Network (VPN) traffic from remote users and remote
sites and forwards it to the Remote Access and VPN module.
Reference: Arch student guide p.3-5
QUESTION 98:
A. CCS
B. FRF.11
C. increased MTU
D. separate VCs for data and voice
Answer: D
Explanation:
All other answers are wrong. With separate Vc you could easily assign
different QOS parameters
QUESTION 99:
Answer: B, D
Explanation:
If the branch office requires redundant links, the design will use either dual WAN links to
two different regions or connect to another branch that connects to a regional site. The
link between two branch offices is generally the minimum amount of bandwidth to
support each branch. In that case, oversize the link between the branch and regional site
to support a fraction of the bandwidth (usually half) of the other branch site. A third
method is to implement a dial-on-demand circuit through either ISDN or the PSTN.
Reference: Arch student guide p.3-22.
QUESTION 100:
Which two statements are true about MLP interleaving? (Choose two)
Answer: B, D
Previous implementations of Cisco IOS Multilink PPP (MLP) include support for Link
Fragmentation Interleaving (LFI). This feature allows the delivery of delay-sensitive
packets, such as the packets of a Voice call, to be expedited by omitting the PPP
Multilink Protocol header and sending the packets as raw PPP packets in between the
fragments of larger data packets. This feature works well on bundles consisting of a
single link. However, when the bundle contains multiple links there is no way to keep the
interleaved packets in sequence with respect to each other.
Interleaving on MLP allows large packets to be multilink encapsulated and fragmented
into a small enough size to satisfy the delay requirement of real-time traffic; small
real-time packets are not multilink encapsulated and are transmitted between fragments
of the large packets.
QUESTION 101:
A network administrator is designing the routing schema to be used for the WAN
connections between the corporate headquarters and the branch offices. Each of the
branch offices has its own network server providing most of the local services
needed. The branch offices need only periodic connectivity to the corporate
headquarters, so ISDN BRI in a DDR configuration was chosen for WAN
connectivity.
Which two routing protocols are most appropriate for this network? (Choose two)
A. RIPv2
B. IGRP
C. EIGRP
D. OSPD
E. IS-IS
Answer: A, B
Because both these routing protocol have a feature call snapshot routing.
The following routing protocols are supported for snapshot routing :
1- RTMP.
2- RTP.
3- RIPv2.
4- IGRP.
5- Novel IPX - RIP and SAP
QUESTION 102:
A. Static
B. Overlapping
C. Persistent
D. Dynamic
Answer: A, D
Explanation:
Static NAT would be good for the Web server. Dynamic
NAT should be used for the 320 users of the company.
Static NAT: Maps an unregistered IP address to a registered IP address on a
one-to-one basis. Static NAT is particularly useful when a device needs to be accessible
from outside the network.
Dynamic NAT: Maps an unregistered IP address to a registered IP address from
a group of registered IP addresses.
QUESTION 103:
Certkiller has obtained a block of public Internet addresses to provide addresses for
their publicly accessed services. Part of the Certkiller .com corporate network is
illustrated in the network topology exhibit.
Which one of the following statements is the best design for the Internet
connectivity solution?
A. To facilitate Internet connection load sharing, static routing should be used on the
Internet routers, with static routes on each Internet router pointing to the networks hosted
by the ISP connected to the router.
B. To enable the proper redundancy capabilities of multi-homing, a BGP connection
should be made to ISP A, and floating static routes should be installed to direct traffic to
ISP B.
C. To enable the proper redundancy capabilities of multi-homing, a BGP connection
should be made both ISP A and ISP B.
D. To facilitate Internet connection load sharing, the Internet routers should be
configured to run HSRP.
Answer: C
QUESTION 104:
Certkiller .com, an insurance company, has a single link to the Internet through a
local ISP. The ISP provides web hosting for Certkiller .com. E-mail is the main
application for 175 users at Certkiller .com's single office. The remaining 750
employees at Certkiller .com are involved in the manufacturing process and do not
have network access. Fifteen host devices, available in kiosks to all employees, are
used for internal human resource applications.
You are now required to recommend a suitable routing mechanism for the
Certkiller .com enterprise edge.
A. RIP V2
B. BGP
C. Default route
D. IBGP
E. EBGP
Answer: C
Explanation:
When Implementing a single-homed system, the routing decision is to use default routes
pointing to the network that connects the site to the ISP. The default route is then
advertised throughout the corporate site, so that any packets with an unknown destination
are forwarded to the ISP.
Reference: Arch student guide p.3-57.
QUESTION 105:
Answer: B
Explanation:
ISP multi-homing solutions improve availability and load balancing for WANs that use
the Internet. Multiple connections, known as multi-homing, reduce the chance of a
potentially catastrophic shutdown if one of the connections should fail.
Multi-homing really makes a difference if one connection to an ISP fails. As soon as the
router assigned to connect to that ISP determines that the connection is down, it will
reroute all data through one of the other routers.
Reference: Arch student guide p.3-89
QUESTION 106:
A. Multiplexing
B. Compression
C. Content networking
D. Secure sockets layer (SSL)
Answer: C
Explanation:
Content networking with its WCCP mechanism provides cashing of web pages and
pictures which user already loaded so if he want to load the webpage again it loads from
the local cash, not from the Internet.
This optimizes WAN bandwidth usage.
QUESTION 107:
The SAFE medium network design suggest which of the following modules?
Answer: C
Reference: Arch student guide p.6-82
QUESTION 108:
A. Host security
B. Perimeter security
C. Security monitoring
D. Policy management
Answer: C
Explanation:
Intrusion protection: To ensure that a network remains secure, it is important to regularly
test and monitor the state of security preparation. Network vulnerability scanners can
proactively identify areas of weakness, and intrusion detection systems can monitor and
respond to security events as the occur. Using security monitoring solutions,
organizations can obtain unprecedented visibility into both the network data stream and
the security posture of the network.
Reference: Arch student guide p.6-22
QUESTION 109:
Answer: C
Reference: Arch student guide p.9-40, 9-41.
QUESTION 110:
A. WFQ
B. IO RTP Priority
C. CQ
D. PQ
E. Codec
F. LLQ
G. ARQ
Answer: F
Explanation:
In choosing from among the many available prioritization
sc hemes, the major factors to consider include the type of
traffic involved and the type of media on the WAN. For
multiservice traffic over an IP WAN, Cisco recommends
low-latency queuing (LLQ) for low-speed links. LLQ
allows up to 64 traffic classes with the ability to specify, for
example, strict priority queuing behavior for voice and
interactive video. A minimum bandwidth for Systems
Network Architecture (SNA) data and market data feeds,
and weighted fair queuing for other traffic types.
Reference: Arch student guide p.11-77.
QUESTION 111:
A. LLQ
B. CAR
C. CQ
D. PQ
E. WFQ
F. NBAR
Answer: A, C, D, E
Explanation:
Not B,F: CAR is a term of traffic shaping. NBAR is not
a queuing technique.
Reference: Arch student guide p.7-22.
QUESTION 112:
Answer: D
Explanation:
Network design practice emphasizes that you should
classify or mark traffic as close to the edge of the network
as possible. Traffic class is a criterion for queue selection in
the various queuing schemes used at interfaces within the
campus switches and WAN devices. When you connect an
IP phone using a single cable, the phone becomes the edge
of the managed network. As the edge device, the IP phone
can and should classify and mark traffic flows so that
QUESTION 113:
A. Prioritization
B. Traffic shaping
C. Traffic policing
D. Segmentation
E. Classification
F. Fragmentation
Answer: B
QUESTION 114:
Answer: D
QUESTION 115:
Within the IP header, which fields of the ToS byte provide Layer 3 classification?
(Choose two.)
A. CoS
B. TTL
C. SNAP
D. DSCP
E. IP Precedence
Answer: D, E
QUESTION 116:
Answer: B, C
QUESTION 117:
Answer: D
Explanation:
Packet classification features provide the capability to partition network traffic into
multiple priority levels or classes of service. For example, by using the three precedence
bits in the type of service (ToS) field of the IP packet header (two of the values are
reserved for other purposes), you can categorize packets into a limited set of up to six
traffic classes. After you classify packets, you can utilize other QoS features to assign the
appropriate traffic handling policies, including congestion management, bandwidth
allocation, and delay bounds for each traffic class.
Reference: ARCH student guide p.7-18.
QUESTION 118:
Certkiller, the CEO of Toronto division of Certkiller .com, want to know what the
characteristics of RSVP are.
What should you tell Mrs. Bill?
Answer: B, D
Explanation:
Resource Reservation Protocol. Protocol that supports the reservation of resources across
an IP network. Applications running on IP end systems can use RSVP to indicate to other
nodes the nature (bandwidth, jitter, maximum burst, and so on) of the packet streams they
want to receive. Also known as Resource Reservation Setup Protocol.
Resource Reservation Protocol (RSVP) is an IETF-draft networking protocol dedicated
to being the facilitator and carrier of standardized QOS information and parameters.
RSVP carries generic (industry-defined) QOS parameters from end nodes (inclusive) to
each QOS-aware network device included in the path between RSVP session members.
That is, RSVP is a means by which end nodes and network devices can communicate and
negotiate QOS parameters and network usage admission.
Reference: Arch student guide p. B-23.
QUESTION 119:
Which two of the following factors are typically used to determine QoS
requirements for real-time applications such as IP Telephony?
A. latency
B. jitter
C. echo delay
D. two-way latency
E. propagation delay
Answer: A, B
Explanation:
Voice, as a class of IP network traffic, has strict requirements concerning delay and delay
variation (also known as jitter). Compared to most data, it is relatively tolerant of loss. To
meet the requirements for voice traffic, the Cisco AVVID IP telephony solution uses a
wide range of IP QoS features such as classification, queuing, congestion detection,
traffic shaping, and compression.
Reference: Arch student guide p.11-76.
QUESTION 120:
Answer: D
Explanation:
Link efficiency interleaving is used on links at or below 768 Kbps.
Reference: Arch student guide p.7-29
QUESTION 121:
The ITU G.114 recommendation specifies which end-to-end delay as the threshold
for high-quality voice.
A. 125 ms
B. 150 ms
C. 200 ms
D. 250 ms
Answer: B
Explanation:
When addressing the QoS needs of voice traffic, keep in mind.
1) One-way latency should be no more than 150-200 ms.
2) Jitter should be no more than 30 ms.
3) Loss should be no more than one percent.
Reference: Arch student guide p.7-45
QUESTION 122:
What can be done when voice frames are delayed by large numbers of data packets
at an interface?
Answer: B
Explanation:
Allow applications to reserve bandwidth to meet their requirements. For example, a
Voice over IP (VoIP) applications can reserve 32 kbps end-to-end using this kind of
service. Cisco IOS QoS uses weighted fair queueing (WFQ) with RSVP to provide this
QUESTION 123:
Which IOS QoS enhancement was created to address scalability and bandwidth
guarantee issues?
A. DiffServ
B. IntServ
C. RSVP
D. WFQ
Answer: C
DiffServ and IntServ are not IOS enhancements, but models of QoS implementations.
WFQ is a basic queueing mechanism.
QUESTION 124:
A. ISL
B. Q.931
C. G.729a
D. 802.1p/Q
E. Spanning Tree
Answer: D
Explanation:
Streaming video applications, such as IPTV video on demand (VoD) programs, are
relatively high bandwidth applications with a high tolerance for loss, delay, and delay
variation. As such, significant QoS tools are not required to meet the needs of these
applications. However, in most enterprise environments, these types of applications are
considered more important than regular background applications (such as e-mail and web
browsing) and should be given preferential treatment. A Layer 2 classification of CoS 1
in 8021.Q/802.1p environments should be used for these applications.
Reference: Arch student guide p.7-48
QUESTION 125:
What problem does WFQ introduce when used in networks that have delay
sensitive traffic like voice and video?
A. WFQ weights by giving preference to TCP-based flows whereas voice and video is
UDP/RTP-based.
B. WFW weights by giving preference to UDP-based flows whereas voice and video is
TCP/RTP-based.
C. WFQ becomes too fair in the presence of many flows so that an individual flow might
not get enough bandwidth.
D. WFQ provides configuration settings that only permit data traffic, which is the root
cause of WFQ's inability to provide good service to voice and video traffic.
Answer: C
Explanation:
WFQ is to fair.
WFQ classifies traffic into different flows based on such characteristics as source and
destination address, protocol, and port and socket of the session. WFQ is a default
queueing discipline on links at and below 2.048 Mbps.
QUESTION 126:
What is one of the reasons that custom QoS ACLs are recommended over automatic
QoS when configuring ports on a Catalyst 6500 for use with IP phones?
A. 79xx IP phones do not automatically mark voice packets with non-zero DSCP values.
B. 79xx IP phones do not mark protocol packets such as DHCP, DNS or TFP with
non-zero DSCP values.
C. 79xx IP phones do not mark voice packets with optimal DSCP values.
D. 79xx IP phones use a custom protocol to communicate CDP information to the switch.
Answer: C
QUESTION 127:
A. Translate model
B. Cross over model
C. Interprete model
D. Transport model
E. Trans-cross model
Answer: A
QUESTION 128:
A. Voice plan
B. Route plan
C. Route pattern
D. Dial pattern
E. Call handler
F. Dial plan
Answer: F
QUESTION 129:
A. Simplex PVCs
B. Separate PVCs
C. Half Duplex PVCs
D. Duplex PVCs
E. Combined PVCs
Answer: B
QUESTION 130:
A. G.711
B. G.714
C. G.723
D. G.726
E. Q.728
F. G.729
Answer: A
QUESTION 131:
A. 1
B. 3
C. 5
D. 7
E. None of the above.
Answer: C
Explanation:
Ports that are in the data VLAN have a default class of
service (CoS) of zero. Ports that are a member of the voice
VLAN have a default CoS of 5
Reference: Arch student guide p.11-49
QUESTION 132:
A. Departments
B. Regions
C. Partitions
D. Locations
E. Device Pools
F. All of the above
Answer: D
QUESTION 133:
In a voice system, what set of rules governs the handling of incoming and outgoing
calls?
A. A dial plan
B. The route table
C. The dial pattern
D. A call handler
E. A route pattern
Answer: E
QUESTION 134:
With regard to voice calls, which tool is used to reduce IP header size?
A. cRTP
B. RTCP
C. transcoder
D. coded (compression / decompression)
E. A and D
Answer: A
Explanation:
Header Compression - Compresses a header at various layers of the Open
System
Interconnection (OSI) reference model. Examples include Transmission
Control
Protocol (TCP) header compression, compressed RTP (cRTP), and compressed
Internet Protocol/User Datagram Protocol (IP/UDP).
QUESTION 135:
A. Peer-client
B. Server-peer
C. Peer-to-peer
D. Client-server
Answer: D
SIP stands for Session Initiation Protocol. SIP was published as a proposed standard by
the Internet Engineering Task Force (IETF) in 1999. It is a signaling protocol for
multimedia session control. This includes signaling for voice, data, and video sessions
between just two parties or for multiparty conferencing sessions. SIP end-points negotiate
the media parameters using Session Description Protocol (SDP). SDP allows the SIP
terminal or application to negotiate media type (audio, video or data), transport protocol
(RTP), and media encoding method. Unlike the switched circuit network of today, IP
networks developed using SIP will easily support the concepts of presence, availability,
and mobility since it is part of the SIP standard.
The IETF defines standard behavior for key SIP Server elements such as registration,
redirect and proxy servers. SIP registration servers allow users to register with the SIP
network using a SIP address that is similar to a URL or Web site location. Once a user
registers, the local SIP proxy server routes messages on behalf of the user to the proper
destination address. The SIP redirect server is a special server that returns a new or
changed address for the destination party that may have temporarily changed locations
(from work to home for example). Each of these servers have a particular behavior
defined in the IETF standard and maintain session state information in a standard
manner, leading to interoperability.
SIP's main advantages over H.323 are its extensibility and flexibility for adding new
features. H.323 is a more complex architecture and uses binary encoding of message
parameters. The simplicity of SIP makes it easier to develop and debug applications
leading to lower product costs for equipment providers.
The SIP client-server and header format design is based on proven Internet standards
such as Hyper Text Transfer Protocol (used on commercial web servers) and Simple Mail
Transfer Protocol (used for internet e-mail services). The Client-Server design means that
each SIP request will result in a well-defined set of SIP responses. This modular design
makes it easy to extend SIP to support new operations by simply adding a new request
(or SIP Method) and its corresponding response message. Because SIP is text based, it is
easy to parse the various SIP commands.
QUESTION 136:
When enabling traffic shaping on a Frame Relay interface supporting voice and
data, which three parameters should be configured to protect voice traffic? (Choose
three)
A. Bt
B. Bc
C. Be
D. CIR
E. LMI
F. DLCI
Answer: B, C, D
QUESTION 137:
Your boss at Certkiller .com is curios as to which type of applications benefit from IP
Multicast.
What should you tell her? (Select three).
Answer: A, D, E
QUESTION 138:
A. No congestion avoidance.
B. Not for bandwidth intensive applications.
C. No guaranteed delivery mechanism.
D. Source sends multiple data streams out each interface.
E. Ordered delivery of packets.
Answer: C, E
QUESTION 139:
What are potential issues when using PIM-SM for multicast networks? (Choose
two)
Answer: D, E
Explanation:
Potential issues with PIM-SM include:
1) PIM-SM requires an RP during the initial setup of the distribution tree (it can switch to
the shortest-path tree once RP is established and determined as optimal). RPs can become
bottlenecks if not selected with great care.
2) PIM-SM's complex behavior is difficult to understand and therefore difficult to debug.
Reference: Arch student guide p.8-29
QUESTION 140:
A. No congestion avoidance.
B. Low end routers in use.
C. No guaranteed delivery mechanism.
D. Source sends multiple data streams out each interface.
E. Ordered delivery of packets.
F. Not for bandwidth intensive applications.
Answer: C, E
QUESTION 141:
You are the network administrator at Certkiller .Your newly appointed Certkiller
trainee wants to know what the source address of IP multicast traffic is.
What will your reply be?
Answer: A
QUESTION 142:
Answer: C, D, E
Explanation:
IP Multicast Source Distribution Trees
1) uses more memory (Router maintenance of complete path information for each source)
2) Supports optimal paths from source to all receivers
3) Minimizes delay
Reference: Arch student guide p.8-20
QUESTION 143:
What are two potential issues when using PIM-SM for multicast networks? (Choose
two)
Answer: D, E
Explanation:
Potential issues with PIM-SM include:
1) PIM-SM requires an RP during the initial setup of the distribution tree (it can switch to
the shortest-path tree once RP is established and determined as optimal). RPs can become
bottlenecks if not selected with great care.
2) PIM-SM's complex behavior is difficult to understand and therefore difficult to debug.
Reference: Arch student guide p.8-29
QUESTION 144:
A. ISDN
B. IDS
C. Firewall
D. PSTN
E. Access server
F. All of the above.
Answer: B, C, E
QUESTION 145:
A. Auto setup
B. Remote management
C. Dynamic reconfiguration
D. Automatic reconfiguration.
E. Path MTU discovery
Answer: C
Explanation:
Dynamic reconfiguration: All configuration changes should
take effect without requiring a reboot of the device.
Disruption of service with a fully loaded VPN device can
QUESTION 146:
A. GRE
B. PKI
C. IPSec
D. L2TP
E. Kerberos
F. MD5
Answer: C
Explanation:
IPSec is a set of standards that specify various options for
providing VPN data privacy. Packet authentication protects
the information flow from being tampered with or even
repeated, thereby minimizing disruption to the
communication.
An IPSec networking architecture has been specifically
designed to address these issues. The framework set forth
by the IPSec working group, Internet Engineering Task
Force (IETF), pofides data integrity checks for tamper
detection, source address verification, and data privacy for
the packet data nad data path.
Reference: Arch student guide p.9-9.
QUESTION 147:
Answer: A, B
QUESTION 148:
Answer: B
Explanation:
The CiscoWorks VPN/Security Management Solution
includes VPN Monitor.
VPN Monitor: Collects, stores, and reports on IPsec-based
site-to-site and remote-access VPNs. VPN Monitor
supports the Cisco VPN concentrators and routers.
Reference: Arch student guide p.9-19.
QUESTION 149:
A. CiscoView
B. ACL Manager
C. Cisco Netsys
D. Resource Manager
Answer: B
Explanation:
ACL Manager manages the access lists of Cisco devices. ACLM provides tools to set up
and manage IP and IPX filtering and device access control. These tools include: access
list editors, policy template managers, network and service class managers for scalability,
access list navigation tools for troubleshooting, optimization of access lists, and
automated distribution of access list updates.
Reference: Arch student guide p.4-25
QUESTION 150:
NO: 1
You are a technician at Certkiller . Your newly appointed
Certkiller trainee wants to know what the device weight
limit per CallManager in a Cisco IP phone configuration
would be.
What would your reply be?
A. 800
B. 5000
C. 6500
D. 2500
Answer: B
Explanation:
The clustering option relate to the grouping of devices,
usually phones and gateways. With the limits imposed on a
single CallManager (device weights of 5,000 per
CallManager, not IP phones) and good design practices, the
minimum configuration consists of two CallManagers,
which will support up to 2,500 IP phones. Cisco
recommends four CallManagers to support 5,000 IP phones
and up to six CallManagers to support up to 10,000 IP
phones.
Reference: Arch student guide p.11-28
QUESTION 151:
A. SS7
B. H.323
C. MGCP
D. BRI2
Answer: B
QUESTION 152:
You are a technician at Certkiller . Your newly appointed Certkiller trainee wants to
know what the maximum number of CallManager servers you can have in a cluster
is.
What would your reply be?
A. 3
B. 7
C. 8
D. 56
Answer: C
QUESTION 153:
With Call Manager v3.1, what is the maximum number of servers in a Cluster?
A. 3
B. 6
C. 7
D. 8
Answer: D
Explanation:
The primary advantage of the distributed call processing model is that, by using local call
processing, it provides the same level of features and capabilities whether the IP WAN is
available or not. Each site can have from one to eight Cisco CallManager servers in a
cluster based on the number of users.
Reference: Arch student guide p.11-43
QUESTION 154:
Which three are used in configuration Call Manager dial plans? (Choose three)
A. route list
B. route group
C. gateway list
D. route keeper
E. route pattern
F. first digit pattern
Answer: A, B, E
QUESTION 155:
A. Fault tolerance
B. Network address translation
C. Load balancing
D. Scalability
E. Remote management
F. Service assurance
G. Redundancy allowance
Answer: A, C, D, F
Explanation:
Cisco routers and switches incorporate Web Cache
Communication Protocol (WCCP) software to enable
content routing capabilities. Additionally, Cisco offers
content routers specifically designed to support large-scale
mirrored web sites.
Content routing routes user requests to the
replicated-content site (typically a mirror site) that can
serve them most quickly and efficiently. The content
routing software redirects a user request to the closest
(best) replicated-content site, based on network delay,
using a software process called boomerang. The content
routing software load balances up to 500 sites for each
domain it is configured to support.
Reference: Arch student guide p.12-6
QUESTION 156:
A. Cisco CallManager
B. Hypertext Administration Design (HAD)
C. Access Point
D. Content Distribution Manager (CDM)
E. Self-Organizing Distributed Architecture (SODA)
F. Web Cache Communication Protocol (WCCP)
Answer: D
Explanation:
The Cisco Content Distribution Manager (CDM) is a
web-browser-based tool that provides the administrative
function for content networking. With the CDM, you can
configure and monitor Content Engines, import and
preview media, and generate media URLs for access from
web sites. You also set maximum bandwidth usage over the
WAN from the CDM to the remote Content Engines, as
well as maximum LAN bandwidth usage from the Content
Engines to end-user desktops.
Reference: Arch student guide p.12-9
QUESTION 157:
Answer: E
QUESTION 158:
As a network consultant at Certkiller .com you are required to speed up services for
external users and minimize load on network servers on a LAN.
Which of the following should you implement?
A. VPN networking
B. CSPM
C. content networking
D. fault tolerance
Answer: C
QUESTION 159:
You are the network administrator at Certkiller .Your newly appointed Certkiller
trainee wants to know what enterprise caching mode eliminates the need for Layer 4
switches or WCCP enabled routers to intercept user requests.
What will your reply be?
A. transparent
B. proxy
C. reverse proxy
D. direct
Answer: B
Explanation:
In proxy mode, end-user web browsers need to be explicitly configured to the IP address
or host name of the Content Engine, and there is no need for additional hardware such as
Layer 4 switches or Web Cache Communication Protocol (WCCP)-enabled routers to
intercept user requests, as in transparent caching. Enterprises are normally interested in
deploying transparent network caching, but some enterprises may have a legacy
requirement for a proxy (nontransparent) cache.
Reference: Arch student guide p.12-12
QUESTION 160:
Answer:
QUESTION 161:
Answer: B
Explanation:
The CDM enables you to configure bandwidth and distribution settings such that the
streaming content will no interfere with other network traffic. It is also the central control
point where the CEs that will carry the broadcast media are identified. The CDM is
typically located in the server farm
Reference: Arch student guide p.12-42
QUESTION 162:
A. SCSI-FP
B. SIP
C. iSCSI
D. FCIP
E. eSCSI
F. CIFS
Answer: C
QUESTION 163:
Answer:
QUESTION 164:
A. Storage Router
B. Switching hub
C. FC-HBA attached host
D. FC Switch
E. NAS GE Switch
Answer: A
Explanation:
The Cisco storage router delivers redundant iSCSI paths to
a pair of Fibre Channel switches. iSCSI takes advantage of
the connection-oriented TCP protocol for reliable service.
Ethernet was already part of the IT network. This meant
trained personnel were on board, and simplified the storage
networking installation shown in the figure.
Cost was an important factor in choosing iSCSI. Because
the research facility already had TCP/IP and Gigabit
CertGuaranteed. Study Hard and Pass Your Exam
642-871
QUESTION 165:
You are the network administrator at Certkiller . Your newly appointed Certkiller
trainee wants to know which protocol encapsulates Fiber Channel frames so that
they can be transported transparently over an IP network.
What will your reply be?
A. iSCSO
B. FCIP
C. SCSI-FP
D. eSCSI
E. CIFS
Answer: B
Explanation:
An important technology for linking Fibre Channel SANs is FCIP. FCIP and iSCSI are
complementary solutions for enabling company-wide access to storage. FCIP
transparently interconnects Fibre Channel SAN islands over IP networks through FCIP
tunnels, while iSCSI allows IP-connected hosts to access iSCSI or FC-connected storage.
Reference: Arch student guide p.13-15
QUESTION 166:
You are a network technician at Certkiller .com. The database for Certkiller .com
requires continuous uptime (24x7) and processes many write-intensive applications
from many different sources. The current Certkiller .com LAN network operates at
approximately 50% utilization, with peaks that exceed 70%.
Which storage networking model would you include your network upgrade design?
A. Metro Optical
B. NAS
C. SAN
D. universal IP
Answer: C
QUESTION 167:
Answer: A
Explanation:
SAN provides block-oriented access to native disk storage. It is based on a shared or
switched infrastructure, often Fibre Channel. You can extend SAN to an ip infrastructure.
New protocols and products are emerging that allow the integration of SANs with the IP
network. Historically, SANs have been well suited to high-volume, write-intensive
transaction-driven applications.
Reference: Arch student guide p.13-7.
QUESTION 168:
Answer: C
QUESTION 169:
A. Reliability
B. Scalability
C. Redundancy
D. Manageability
E. Available bandwidth
F. Access speed
Answer: A, B, D
Explanation:
B:
System administrators are faced with the challenging task
to managing storage and making it scalable to
QUESTION 170:
Which protocol enables the location of a fully synchronized hot backup Fiber
Channel storage solution at a remote site over existing optical WAN links?
A. iSCSI
B. SCSI-FCP
C. FCIP
D. HSRP
Answer: C
Explanation:
You can use FCIP to connect two geographically dispersed Fibre Channel storage arrays
for the purpose of synchronous data storage. If the local storage array becomes
unavailable, an application could utilize the FCIP link to access the data on the "hot
backup" storage system at the remote site. It is also possible to implement remote tape
backups to further protect customers' valuable information in the event of disaster at the
primary site.
Reference: Arch student guide p.13-16
QUESTION 171:
Answer: B
QUESTION 172:
Answer: A, B
QUESTION 173:
Answer: D
QUESTION 174:
You would choose IS-IS for a routing protocol to meet the following two
requirements. (Choose two)
Answer: A, D
QUESTION 175:
Which three LAN routing protocols would be appropriate for a small retail
organization with a multi-vendor LAN infrastructure? (Choose three)
A. IGRP
B. RIP
C. RIPv2
D. OSPF
E. EIRGP
F. BGP
Answer: B, C, D
QUESTION 176:
When designing a converged network, which measures can be taken at the building
access layer to help eliminate latency and ensure end-to-end quality of service can
be maintained? (Choose three)
Answer: B, C, E
QUESTION 177:
With which of the following does the Cisco Product Advisor help customers?
(Choose three)
A. design options
B. hardware devices
C. software options
D. hardware options
E. protocol components
Answer: B, C, D
QUESTION 178:
Answer: E
QUESTION 179:
Answer: A
QUESTION 180:
Which two QoS functions are used to prioritize voice over data? (Choose two)
Answer: B, C
QUESTION 181:
Which three routing protocols can minimize the number of routes advertised in the
network? (Choose three)
A. IGRP
B. RIPv2
C. OSPF
D. EIGRP
E. BGP
Answer: B, C, D
QUESTION 182:
A. building distribution
B. building access
C. campus backbone
D. network management
E. server farm
Answer: C
QUESTION 183:
Which three things can be restricted by the Class of Service in a traditional PBX?
(Choose three)
A. dial plans
B. dialled numbers
C. voice mail prompts
D. phone features
E. ring tones
Answer: A, B, D
QUESTION 184:
A. packet looping
B. priority queuing
C. packet forwarding
D. circuit emulation
Answer: D
QUESTION 185:
What happens when packets traversing the network exceed the MTU of an
IPSec/VPN interface?
Answer: D
QUESTION 186:
Which type of disaster recovery application protects from user error or data
corruption, as well as hardware failure?
A. disk mirroring
B. replication
C. backup and off-site storage
D. disk duplexing
E. RAID 5 stripe sets
Answer: C
QUESTION 187:
What are two characteristics of shaping, but not policing? (Choose two)
Answer: B, D
QUESTION 188:
Certkiller .com is a global insurance company with headquarters in Mexico City. The
campus there is made of a number of buildings located in the same vicinity. In 2003,
a new building, Building Certkiller 12A was added. The additional building houses
approximately 1000 employees. Rather than deploy a private branch exchange
(PBX) in the new building, Certkiller .com has decided to implement an IP telephony
solution. External calls will be carried across a MAN link to another building, where
a gateway connects into the worldwide PBX network of Certkiller .com. Voice mail
and unified messaging components are required and all IP phones and workstations
should be on separate VLANs and IP subnets. Which IP technology deployment best
suits their need?
A. single-site
B. multisite with centralized call processing
C. multisite with distributed call processing
D. clustering over the WAN
Answer: A
QUESTION 189:
A. Building Access
B. Building Distribution
C. Campus Backbone
D. Edge Distribution
Answer: B
QUESTION 190:
Answer: A
QUESTION 191:
In which two instances would static routing be preferred over the use of dynamic
routing protocols? (Choose two.)
Answer: B,E
QUESTION 192:
Which two types of attacks are addressed at the Building Access sub-module of the
Enterprise Campus infrastructure? (Choose two.)
A. viruses
B. packet sniffers
C. IP spoofing
D. password attacks
E. unauthorized access
Answer: A,B
QUESTION 193:
Which three components are part of the Intelligent Network Services provided by
the Cisco AVVID framework? (Choose three.)
A. QoS
B. work force optimization
C. security
D. e-business infrastructure
E. IP telephony
F. IP multicasting
Answer: A,C,F
QUESTION 194:
What two choices can you make when redundancy is required from a branch office
to a regional office? (Choose two.)
Answer: B,C
QUESTION 195:
The Acme Anvil Corporation has two manufacturing sites and six sales offices. Each
sales office requires 25 public IP addresses, and each manufacturing facility
requires 210 public IP addresses. If the company plans for 20 percent growth for
each facility, how many Class C addresses will it require?
A. five
B. four
C. six
D. eight
E. seven
F. three
Answer: F
QUESTION 196:
Answer: E
QUESTION 197:
What type of Call Admission control in CallManager allows for limits to the
bandwidth consumed by active calls?
A. locations
B. regions
C. partitions
D. device Pools
Answer: A
QUESTION 198:
Which routing protocol best fits these requirements? - Supported by multiple router
vendors - Requires minimum router CPU and memory resources - Uses a simple
routing metric - Supports manual or automatic route summarization
A. OSPF
B. IS-IS
C. RIPv2
D. IGRP
E. EIGRP
F. BGP
Answer: C
QUESTION 199:
One of the business requirements of New Garden Health, Inc. is a secure connection
to its business partners. Which four components should be included in the topology
diagram of the VPN module? (Choose four.)
A. public servers
B. VPN network management servers
C. firewall
D. perimeter router
E. IDS/IPS
F. VPN concentrator
Answer: C,D,E,F
QUESTION 200:
Exhibit:
Refer to the exhibit. CCC Machine has decided to deploy a Voice over IP solution in
its main campus headquarters. The design calls for the insertion of a Cisco
CallManager, Cisco IP phones, and a voice gateway. Due to the new application
requirements, what three changes should be made to the access layer of the CCC
network design? (Choose three.)
A. Configure the 3524-PWR access switches to ensure Voice over IP packets are
given preferential treatment by enabling voice traffic to use separate queues.
B. Since end-user workstations cannot run CDP, disable it on the IP phones to
improve performance and increase security.
C. The trust boundary should be extended from the 3524-PWR access switches to
include the IP phones.
D. A new voice-only VLAN should be established and extended from the IP phones
throughout the campus.
E. Ingress rate-limiting should be configured on 3524-PWR access switches to
ensure Voice over IP bandwidth guarantees.
Answer: A,C,D
QUESTION 201:
Answer: A,D
QUESTION 202:
Morris Prosthetics is having problems with serialization delay on its WAN links.
The links currently carry less than 768 Kbps. Which Layer 2 mechanism can help
solve the problem?
Answer: C
QUESTION 203:
Lafeyette Productions is looking for a new ISP that has improved availability, load
balancing, and catastrophe protection. Which type of ISP connectivity solution
would be best?
A. autonomous-route injection
B. single run
C. stub domain EBGP
D. multi-homed
E. direct BGP peering
Answer: D
QUESTION 204:
What are three features of the Cisco Product Advisor tool? (Choose three.)
Answer: A,C,D
QUESTION 205:
Answer: E
QUESTION 206:
Captain Marion's Videography delivers Internet digital video using 9 MPEG video
encoders and a statistical multiplexer. Channels are packed into a 6-MHz channel
bandwidth.The MPEG multiplexer monitors and allocates the appropriate
bandwidth. The multiplexer measures available bandwidth and feeds back signaling
to the MPEG encoders. Coding rates are then increased or decreased. Packet
generation from each input source is controlled such that no packets are dropped
and no extra null packets can be generated.These bandwidth and traffic
requirements work best with which mode of video delivery?
A. open looped
B. quality equalization
C. VoD delivery
D. fixed broadcast
Answer: D
QUESTION 207:
The Schuyler and Livingston Iron Works has been working on getting its network
security under control. It has set up VPN with IPSec links to its suppliers. It has
installed network vulnerability scanners to proactively identify areas of weakness,
and it monitors and responds to security events as they occur. It also employs
extensive access control lists, stateful firewall implementations, and dedicated
firewall appliances. The company has been growing very fast lately and wants to
make sure it is up to date on security measures. Which two areas of security would
you advise the company to strengthen? (Choose two.)
A. security management
B. perimeter security
C. identity
D. intrusion protection
E. secure connectivity
F. intrusion detection
Answer: A,C
QUESTION 208:
Which Cisco voice application includes Cisco IP IVR, Cisco IP Integrated Contact
Distribution (ICD), and Cisco IP Queue Manager?
Answer: F
QUESTION 209:
A. intelligence
B. interoperability
C. innovation
D. integration
Answer: D
QUESTION 210:
Exhibit:
Refer to the exhibit. What is the most performance enhancing, cost effective, and
growth oriented media for the connections for the NAS portion of this storage
network design?
A. Gigabit Ethernet
B. FCIP
C. Fiber Channel
D. EtherChannel
Answer: D
QUESTION 211:
Which four QoS design requirements are the closest to Cisco recommendations for
VoIP traffic? (Choose four).
Answer: B,C,D,E
QUESTION 212:
Which two of the following Cisco router platforms support Multicast Distributed
Fast Switching? (Choose two.)
A. 12000 series
B. 7200 series with NSE-1
C. 3600 series
D. 7500 series
E. ISR 1800/2800/3800 series
F. 10000 series
Answer: A,D
QUESTION 213:
When designing the WAN module within the enterprise edge, which document is
used to specify the connectivity and performance agreements with the service
provider?
A. RFC
B. SOW
C. RFP
D. SLC/SLA
Answer: D
QUESTION 214:
Which two statements are correct in regards to the Content Distribution Manager?
(Choose two.)
Answer: A,F
QUESTION 215:
Users at Certkiller .com began experiencing high network delays when Internet
connectivity was enabled for all users. After investigating the traffic flow, you
determine that peer-to-peer traffic from a music download site is consuming a large
amount of bandwidth. Which QoS mechanism can you implement to improve the
network response time?
Answer: B
QUESTION 216:
When designing an IP addressing scheme, how much reserve capacity does Cisco
recommend to plan for in the IP address space?
A. 10-30 percent
B. 25-50 percent
C. 15-35 percent
D. 20-40 percent
Answer: D
QUESTION 217:
A. hardware
B. Q.711
C. VoIP q.933
D. software
E. G.729
F. Skinny
Answer: A
QUESTION 218:
A. When there are two alternate paths to the same target network and they have the
same relative performance, you can direct traffic to the least expensive path.
B. It helps reduce the amount of traffic an ISP has to pay for on its own network.
C. Cold-potato routing keeps traffic on the network of an ISP as short a time as
possible, delivering the traffic to the ingress point as close to the target as possible.
D. Hot-potato routing directs traffic to the closest ingress point of the network.
Traffic remains on the router for a shorter period of time. This is true even when an
even more optimal path exists.
E. In order to avoid routing loops, all BGP routers in the same AS must ultimately
make the best routing decision for their own directly connected network.
F. Policy routing is often used to balance traffic across multiple links.
Answer: A,B,F
QUESTION 219:
Which routing protocol supports a flexible area structure using routing levels one
and two?
A. IGRP
B. BGP
C. OSPF
D. EIGRP
E. RIPv2
F. IS-IS
Answer: F
QUESTION 220:
Answer: B,F
QUESTION 221:
Exhibit:
Refer to the exhibit. Which routing protocol would do the best job of meeting these
requirements?
A. EIGRP
B. RIPv2
C. IGRP
D. OSPF
E. RIP
Answer: D
QUESTION 222:
Exhibit:
Refer to the exhibit. An IT department has configured their Edge as follows:A PIX
firewall:- Using appliance form- Using OSPF- Six interfaces- One interface
connecting to the outside via the Internet router- Three inside interfaces connecting
to the internal network- A DMZ interface connecting to the e-mail and web servers
On their outbound router (where they once had a high incidence of packet drop),
they now have: - 10 Mbps Metro Ethernet link- 10/100BASE-FX (for growth) In
picking an ISP they are looking for: - Growth capacity- RedundancyGiven this
scenario, which ISP is the best fit?
A. ISP A
B. ISP B
C. ISP C
D. ISP A or ISP C
E. ISP B or ISP C
F. ISP A or ISP B
Answer: C
QUESTION 223:
What are the two primary kinds of communication within a Cisco CallManager
cluster? (Choose two.)
Answer: A,C
QUESTION 224:
The network administrator would like to generate synthetic traffic using the Service
Assurance Agent contained in Cisco IOS. Which CiscoWorks network management
application will be used to report the latency and availability for configured traffic
operations on an end-to-end and hop-by-hop (router-to-router) basis?
Answer: D
QUESTION 225:
What are three primary activities in the cycle of building an enterprise security
strategy? (Choose three.)
A. activity audit
B. ACL documentation
C. administration
D. technology implementation
E. policy establishment
F. feature evaluation
Answer: A,D,E
QUESTION 226:
Acme Costume Company is connecting its manufacturing facilties to its stores with
a small point-to-multipoint Frame Relay IP WAN. Little growth is expected in the
network infrastructure.Up to this point the company has been using a
dial-on-demand network. Dropping WAN costs, however, have led them to consider
using a high-speed WAN solution to improve access. Which two routing protocols
could you deploy to support the new larger network while keeping costs down?
(Choose two.)
A. EIGRP
B. OSPF
C. RIP
D. IGRP
E. RIPv2
F. IS-IS
Answer: A,B
QUESTION 227:
Exhibit:
Refer to the exhibit. A central site WAN edge router is connected to the remote site
WAN edge router over a Frame Relay PVC. The central site has a CIR of 384 kbps
and the remote site has a CIR of 128 kbps. Traffic flowing across this Frame Relay
WAN link includes VoIP, SQL, FTP, HTTP, Citrix, Telnet, and other best-effort
class traffic. Which three QoS mechanisms should be implemented on the WAN
edge router Frame Relay WAN link in the outbound direction? (Choose three.)
A. class-based markings
B. LLQ
C. class-based traffic policing
D. Frame Relay traffic shaping
Answer: B,D,E
QUESTION 228:
Which three features are network design requirements that indicate a need for a
highly available network? (Choose three.)
Answer: A,D,E
QUESTION 229:
Answer: A,B,E
QUESTION 230:
Certkiller .com specializes in home theater products. Their campus network has four
buildings in close proximity and another building about four miles away. The
network accommodates close to 500 marketing, sales, finance, and engineering
employees.The IT staff wants to test the the current FDDI backbone to see if it
inhibits network performance. In addition, they need to ensure that a new database
order entry application will not negatively impact the network. Which testing
method will best meet Burgouyne's needs?
performance.
D. Set up a pilot network to simulate their network, and add users to show the
difference.
E. Set up a pilot network to simulate their network, and collect packet traces.
F. Set up a prototype network in a lab.
Answer: C
QUESTION 231:
A. Integrate the test with the production network during business hours.
B. Set up a test network that will operate during off-peak hours.
C. Use a test network in a lab.
D. Integrate testing with the production network during off-hours.
E. Implement live during off-peak hours (although because of the around the clock
nature of the business, you will not be able to test very well).
Answer: C
QUESTION 232:
Answer: A,B,D
QUESTION 233:
Exhibit:
technical issues about the company's Campus LAN. Which three device technologies
will best solve these problems? (Choose three.)
A. ATM switches
B. switch blades
C. routers
D. VPN concentrators
E. LAN switches
F. IPX firewalls
Answer: A,C,E
QUESTION 234:
Which two of the following codecs are recommended in a VoIP network design
when support for fax/modem traffic is required? (Choose two.)
Answer: B,C
QUESTION 235:
Place the network attribute on the left to the network Deployment Concern
Category it belongs on the right.
Answer:
QUESTION 236:
Match the performance metric with the group of people usually most concerned
with that measure.
Answer:
QUESTION 237:
Match the Security activity on the left to the solution it pertains to on the right
Answer:
QUESTION 238:
Match the world on the left to the category for proving a design implementation it
belongs.
Answer:
QUESTION 239:
Answer:
Explanation:
Source CCDP Self Study (Designing Cisco Network Architectures ARCH), page 420
table 10-2 Security Implementation Model Comparison Layer 2 Roaming explains
exactly for "WLAN LAN Extension via EAP", "WLAN LAN Extension via IPSec", and
"WLAN Static WEP".
QUESTION 240:
Match the ISP's definitions (on the left) to the correct terms on the right.
Answer:
Explanation:
Source: http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212768,00.html
"peering"
and http://www.riverstonenet.com/support/mpls/ldp_peering.htm "LDP peering"
QUESTION 241:
Match the attribute on the left to the services codepoint model it describes on the
right.
Answer:
QUESTION 242:
Match the most appropriate definition on the left to the Layer 2 WAN technology
term it describes on the right
Answer:
QUESTION 243:
Match the definition on the left to the form of NAT it describes on the right.
Answer:
Explanation:
NAT provides additional security, effectively hiding the entire internal network from the world
behind that address. NAT takes these forms:
Static NAT: Maps an unregistered IP address to a registered IP address on a one-to-one
basis. Static NAT is particularly useful when a device needs to be accessible from outside
the network.
Dynamic NAT: Maps an unregistered IP address to a registered IP address from a group of
registered IP addresses.
A form of dynamic NAT that maps multiple unregistered IP addresses to a
single registered IP address by using different ports. Known also as PAT, single-address
NAT, or port-level multiplexed NAT.
Overispping: When the IP addresses used on your internal network are registered IP
addresses in use on another network, the router must maintain a lookup table so that it can
intercept and replace these registered addresses with unique IP addresses. The NAT router
must translate the internal addresses into registered unique addresses. It must also translate
the external registered addresses to addresses that are unique to the private network through
static NAT or with dynamic NAT with DNS.
Reference: Designing Cisco Network Service Architectures (ARCH) v1.1, Page 3-77
QUESTION 244:
Match the AVVID element on the left to the Cisco AVVID framework component it
belongs to the right
Answer:
Explanation:
Network Management is Intelligent Network Services and IP Telephony is Network
Solutions.
QUESTION 245:
Answer:
QUESTION 246:
Match the test element on the left to the correct prototype test creation step.
Answer:
Explanation:
Step 1. Review customers requirements
Outline the Proof required to demonstrate that your design works
Step 2. Determine content of Prototpe
Determine how much of the design must be built
Step 3. Understand the competition
Research information on your competitors products
Step 4. Develop a test plan
Draw a network diagram
Step 5. Purchase and prepare your equipment
Athough both Network Management tools and Protocol Analysers are both mentioned, ONLY
PROTOCOL ANALYSERS are mentioned in Step 7. So by Default Network Management tools
must be the answer here
Step6 Practice and Step7 Conduct tests and Demonstarate
By Default (and mentioned in the bookd for step 7) Protocol Analyzers
A. Server Farm
B. Internet Connectivity
C. Campus Core
D. Edge Distribution
E. Management
F. WAN
Answer: A, B, F
QUESTION 248:
A. Certkiller .com needs an address space larger than a single Class C IP address.
B. Certkiller .com can use the current Class C address with EIGPR as the internal routing
protocol.
C. Certkiller .com can use the current Class C address with IGPR as the internal routing
protocol.
D. Certkiller .com can use the current Class C address with the current routing protocol.
Answer: B
QUESTION 249:
Which Layer 2 technology would you recommend to Certkiller .com in your WAN
design?
A. PPP
B. Frame Relay
C. ADSL
D. ATM
Answer: B
Explanation:
Frame Relay meets all clients needs.
Frame Relay is a switched data-link layer protocol that handles multiple virtual circuits
using HDLC-delivered encapsulation between connected devices. Frame Relay is more
bandwidth efficient than X.25, the protocol for which it is generally considered a
replacement. Frame Relay provides cost-effective, high-speed, low-latency virtual
circuits between sites. Frame Relay provides cost-effective, high-speed, low-latency
virtual circuits between sites. Frame Relay runs over DS0, T1/E1, and serial links.
Reference: Arch student guide p.3-30
QUESTION 250:
Your boss at Certkiller .com asks you when the site-to-site access model is
appropriate.
What should you tell him?
Answer: A
Which three modules of the Enterprise Network model will you include in your
design? Select three.
Answer: A, C, E
QUESTION 252:
Answer: A, F
QUESTION 253:
Where would you locate the devices for the Management Module and Server Farm?
Answer: C
Which two features of the Server Farm module will directly address the problems
that the sales department claims have caused lost sales? Select two.
A. firewalls
B. dual-homed servers
C. caching systems
D. mid-range switches
E. redundant switching and links
Answer: B, E
B. Dual-homed servers - Addresses hardware failure
E. Redundant switching and links - Provides more than one path between server and
switches.
Incorrect:
B. Firewall - Nothing to do with availability of servers.
C. Caching Systems - Content Switching not mentioned as an option.
D. Mid-Range Switch - Does not address the availability of servers.
QUESTION 255:
Which two properties of the Server Farm module directly address the concern
expressed by Certkiller, the owner of BAR? Select two.
A. performance
B. security
C. availability
D. scalability
E. manageability
Answer: C, D
C. Availability - The systems need to be up and accessible to customers 24 hours a day.
Up time, MTBF and MTTR are important factors when dealing with critical business
functions and services.
D. Scalability - The Server Farm Module scalability addresses increasing traffic, and not
current traffic which would be performance. Jack has a concern that the network will not
be able to efficiently process all the additional traffic to the new servers.
Incorrect Answers:
QUESTION 256:
Because BAR plans on consolidating its server applications, which feature can be
included in the network redesign proposal to improve scalability?
A. mid-range switches
B. firewalls
C. server load balancing
D. dual-homed servers
E. redundant switching and links
Answer: A
Mid-range switches, such as a 4500, provides layer 2/3/4 functions and support QoS.
This is a proposal from Cisco and not some other vendor. Provide the Cisco solution!
QUESTION 257:
Which Server Farm feature could be added to the BAR network to reduce the time
that customers wait for catalog pages and pictures to display when customers access
them from the web?
Answer: E
Explanation:
When using cashing systems, the pages and pictures on them which user already loaded
in the past are cashed and in the future if he wants to access this page it is loaded from
the local cash, not from the website. It is much faster and it safes the Internet connection
costs.
Exhibit #2:
QUESTION 258:
How would you deploy the IP addressing scheme in the elementary schools?
A. a set of public IP addresses with one Class B address for each elementary school
B. a set of private IP addresses with one Class C address for each elementary school
C. a set of private IP addresses with two Class C addresses subnetted between the
elementary schools
D. a set of public IP addresses with two Class C addresses subnetted between the
elementary schools
Answer: B
QUESTION 259:
How would you deploy the IP addressing scheme in the Admin building?
A. private IP addresses with a public Class C address range and public addresses for the
web server
B. a set of private IP addresses with one Class C address subnetted for the administration
building and public addresses for the web servers
C. a set of private IP addresses with one Class C address for the administration building
and public addresses for the web servers.
D. a set of private IP addresses with one Class C address for the administration building
and private addresses for the web servers
Answer: C
QUESTION 260:
How would you deploy the IP addressing scheme in the middle schools?
A. a set of private IP addresses with four Class C address ranges for each middle school
B. a set of private IP addresses with two Class C address ranges for each middle school
C. a set of private IP addresses with two Class C addresses subnetted for each middle
school
D. a set of private IP addresses with four Class C addresses subnetted between the two
middle schools
Answer: B
QUESTION 261:
How would you deploy the IP addressing scheme in the high school?
A. a set of private IP addresses with three Class C address ranges for the high school
B. a set of private IP addresses with four Class C address ranges for the high school
C. a set of private IP addresses with three Class C addresses subnetted for the high school
D. a set of private IP addresses with four Class C addresses subnetted for the high school
Answer: B
What two network design constraints must Certkiller Mexico consider in order to
accommodate voice over IP traffic?(Choose two.)
A. Voice traffic is variable delay insensitive provided a large enough elasticity buffer
exists in the voice endpoints .
B. Voice traffic requires the round-trip latency be no more than 300 ms.
C. Voice traffic is insensitive to dropping of voice packets since modern codecs use
prediction algorithms capable of rebuilding missing sounds and words.
D. Since voice calls configured for modern codecs use such a small amount of bandwidth
(12kbps) per call, it is generally not a requirement to guarantee bandwidth for voice
traffic.
E. Link fragmentation and interleaving techniques should be applied on all WAN
interfaces with bandwidth less than 768kbps.
Answer: A, E
QUESTION 263:
What two network design constraints must Certkiller Mexico consider in order to
accommodate interactive video traffic?(Choose two.)
A. Interactive video traffic is variable delay insensitive provided a large enough elasticity
buffer exists in the video endpoints.
B. Interactive video traffic requires the round-trip latency be no more than 300 ms.
C. Interactive video traffic is insensitive to dropping of video packets since TCP
guarantees retransmission of any lost video packets.
D. Videoconferencing sessions cannot be established through WAN edge routers
configured for NAT.
E. The minimum amount of guaranteed bandwidth required is the size of the video
conference plus 20 percent.
Answer: B, E
QUESTION 264:
What two network design constraints must Certkiller Mexico consider in order to
accommodate streaming video traffic? (Choose two.)
A. Streaming video traffic is less sensitive to variability of delay than interactive video.
B. Streaming video traffic requires the round-trip latency be no more than 300 ms.
C. Streaming video traffic has a higher tolerance for packet loss than interactive video or
voice traffic.
D. The minimum amount of required bandwidth is the size of the streaming video (CIF.
QCIF, etc.) times the color depth.
E. Streaming video sessions cannot be established through WAN edge routers configured
for NAT.
Answer: A, C