2012 CCDA Training

70 terms by usrcnt11 

Create a new folder

Advertisement Upgrade to remove ads

Which consideration is the most important for the network designer when considering IP routing?

convergence

You want to gather as much detail as possible during a network audit, to include data time
stamping across a large number of interfaces, customized according to interface, with a minimal
impact on the network devices themselves. Which tool would you use to meet these
requirements?

NetFlow

DataQuirk is a web-based medical transcription company for exotic-animal veterinarians. The
company recently added a third ISP for international business. They are organizing the enterprise
network into a fully operational Enterprise Edge.
To which two modules will the three ISPs be directly related? (Choose two)

E- Commerce, Internet Connectivity

Which two of these practices are considered to be best practices when designing the access layer
for the enterprise campus? (Choose two)

Always use a Spanning Tree Protocol; preferred is Rapid PVST+.,

Use VTP transparent mode to decrease the potential for operational error

With deterministic Wireless LAN Controller redundancy design, the different options available to
the designer have their own strengths. Which one of these statements is an example of such a
strength?

N+N redundancy configuration allows logically grouping access points on controllers to minimize intercontroller roaming events.

Which of these statements is true concerning the data center access layer design?

With Layer 2 access, the default gateway for the servers can be configured at the access or aggregation layer.

Which one of these statements should the designer keep in mind when considering the advanced routing features?

Redistribution, summarization, and filtering are most often applied between the campus core and enterprise edge.

Which two statements about designing the Data Center Access layer are correct? (Choose two)

Layer 2 connectivity is primarily implemented in the access layer.,

Layer 2 clustering implementation requires servers to be Layer 2 adjacent

Which IPv6 feature enables routing to distribute connection requests to the nearest content
server?

Anycast

Which one of these statements is true about addressing redundancy within the WAN
environment?

The failure of a single SONET/SDH link or network element does not lead to failure of the entire network.

See Test

...

Which one of these statements is true concerning the enterprise data center?

The data center designs will differ substantially depending on whether the location is on campus or remote.

Which Cisco security management solution provides the means to identify, isolate, and counter
security threats to the network?

Cisco Security Monitoring, Analysis, and Response System

A global corporation has an internal network with the following characteristics:
2,000,000+ hosts
10,000 + routers
Internal connectivity
high traffic volumes with business partners and customers
Which statement best describes what a flexible IPv6 strategy would look like for this corporation?

Both hosts and routers would run dual stack

Which of these is the best routing deployment for a single dedicated link to an ISP for Internet access?

Static

In terms of remote office design, which one of these statements is a characteristics only of a small remote office (up to 50 user), and not of medium or remote offices?

There are no loops in the network design.

Which two statements about the data Center Aggregation layer are correct? (Choose two)

Layer 4 through layer 7 services are provided in that layer.

That layer is the critical point for control and application services

According to Cisco, which four improvements are the main benefits of the PPDIOO lifecycle
approach to network design? (Choose four)

improved business agility
increased network availability
faster access to applications and services
lower total cost of network ownership

With respect to IPv6 addressing, from a design perspective, which of these statements is it
important to keep in mind?

An IPv6 router will not forward packets from one link to other links if the packet has either a link-local source or a link-local destination address.

When designing the infrastructure protection portion for the enterprise edge, which of these
solutions would be the most appropriate solution to consider?

AAA

What is primary consideration when choosing a routed network design over a traditional campus
network design?

Layer 3 service support at the network edge

See Drag and Drop Sheet

...

Which two statements best describe an OSPF deployment? (Choose two)

ABR requires manual configuration for classful network summarization

External routes are propagated into the autonomous system from regular areas or NSSA via
ASBR.

See Exhibit in Test

Enterprise C

A large enterprise requires sensitive information be transmitted over a public infrastructure. It
requires confidentiality, integrity, and authenticity. Which security solution best meets these
requirements?

IPSEC

See Drag and Drop Section

...

There are a number of advantages to using virtualization within the data center module. Which the following two are samples of these advantages?

Virtualization consolidates many low-performance devices into a few high-performance devices,providing a more efficient utilization of hardware and increasing the price/performance ratio.

Virtualization compartmentalizes a single device into a few high-performance devices, providing a more efficient utilization of hardware and increasing the price/performance ratio.

See Drag and Drop Section

...

When selecting which hardware switches to use throughout an enterprise campus switched
network, which consideration is not relevant?

the number of shared media segments

Layer 2 switching is exclusively used in which Enterprise Campus Module layer?

Building Access

Which one of these statements describes why, from a design perspective, a managed VPN
approach for enterprise teleworkers is a most effective?

This architecture provides centralized management where the enterprise can apply security policies and push configurations.

Which one of these statements is true when considering the design of voice and video services for the enterprise campus network?

Access layer switches should support 802.1Q trunking and 802.1p for Layer 2 CoS packet marking on Layer 2 ports with IP phones connected.

See Drag and Drop Section

...

Refer to Exhibit in Test

A is the Data Center Module and D is the Building Access layer

B is the Campus Core layer and C is the Building Distribution layer

See Drag and Drop Section

...

See Drag and Drop Section

...

During which stage of the PPDIOO process are implementation procedures prepared?

Design

Which statement describes the recommended deployments of IPv4 addressing in the Cisco
Network Architecture for the Enterprise?

private addressing throughout with public addressing in the Internet Connectivity, E-Commerce, and Remote Access and VPN modules

For which network scenario is static routing most appropriate?

IPSec VPN

When considering the three VoIP design models single site, centralized multisite, and distributed
multisite which question below would help to eliminate one of these questions?

Are there users whose only enterprise access is via a QoS-enabled WAN?

Which aspect would most likely be found in the draft design document?

a list of QoS requirements

Your company's Cisco routers are operating with EIGRP. You need to join networks with an acquisition's heterogeneous routers at 3 sites, operating with EIGRP and OSPF. Which describes
the best practice for routing protocol deployment?

apply two-way redistribution at each location with a route filter at each location

When considering the enterprise campus design, which network application category most
influences the network design?

client-server farm

Which two link state routing protocols support IPv6 routing? (Choose two)

OSPF

IS-IS

When designing the wireless portion of an enterprise campus network, which one of these
statements should serve as a strict guideline?

Wireless controllers should be centralized in the core layer

When designing using the Cisco Enterprise Architecture, in which Enterprise Campus layer does the remote Access and VPN module establish its connection?

Campus Core

Which one of these statements is an example of how trust and identity management solutions
should be deployed in the enterprise campus network?

Mixed ACL rules, using combinations of specific sources and destinations, should be applied as
close to the source as possible.

Which of these is the equation used to derive a 64 Kbps bit rate?

2 x 4 kHz x 8-bit code words

Which one of these statements best describes the challenge of the designer when dealing with IP
routing?

Effective scalability with OSPF requires the designer to pay strict attention to the hierarchical
network structure, localizing topology changes.

When designing the identity and access control portions for the enterprise campus network, which of these solutions would be the most appropriate solution to consider?

802.1x

Which three terms describe the primary functions of the distribution layer of the campus network
design hierarchy? (Chose three)

provides QoS services
enforces security policies
connects access devices to the core backbone

DataQuirk is a web-based medical transcription company for exotic-animal veterinarians. The
company recently added a third ISP for international business. They are organizing the enterprisenetwork into a fully operational Enterprise Edge.

To which two modules will the three ISPs be directly related? (Choose two.)

E-commerce
internet Connectivity

See Drag and Drop Section

...

Which codec does Cisco recommend tor WAN link?

G 729

See Drag and Drop Section

...

See Exhibit: A standard, Layer 2 campus network design is pictured. Which numbered box represents the distribution layer?

#2

Which codec does Cisco recommend for WAN links?

G.729

When considering the three VoIP design modelssingle site, centralized multisite, and distributed multisite which question below would help to eliminate one of the options?

Are there users whose only enterprise access is via a QoS-enabled WAN?

The enterprise campus core layer has requirements that are unique from the distribution and access layers. Which of the following is true about the core layer?

The campus core layer is optional.

Which statement is true concerning enterprise edge distribution switches?

Enterprise edge distribution switches are similar to the building distribution layer.

Which one of these statements is true concerning the data center distribution (aggregation) layer
design?

A mix of both Layer 2 and Layer 3 access is sometimes the most optimal.

When designing the threat detection and mitigation portion for the enterprise data center network,
which of the following would be the most appropriate solution to consider?

Cisco Security MARS

A Cisco Self-Defending Network has been installed, but DoS attacks are still being directed at ecommerce hosts. The connection rate at the Internet firewall was limited, but the problem persists. What more can be done?

Install all relevant operating system patches

RST Corporation is planning to upgrade its current network. The chief technology officer has
supplied a topology diagram and an IP addressing scheme of the current network during an
interview.

RST has been growing at about twenty percent per year. It has been difficult to maintain customer
support at a satisfactory level. Therefore, the RST board has met with and directed the chief
technology officer to look into network improvements.

Which two items are most relevant in documenting RST's business requirements? (Choose two.)

improved customer support requirements

projected growth estimates

Which two of these best describe the implementation of a WAN Backup design over the Internet? (Choose two.)

a best-effort method

designed as an alternative to a failed WAN connection

Which two design criteria require VLANs in a proposed solution? (Choose two.)

security between departments

the segmenting of broadcast domains

Which two methods are used to enhance VPN performance on Cisco ISRs? (Choose two.)

high-performance VPN encryption AIM

built-in hardware-based encryption acceleration

Which three factors best justify WAN link redundancy between geographically dispersed sites? (Choose three.)

important traffic flows
uncertain reliability
lack of speed

Which three pieces of information should be documented for each step of each phase in a design implementation plan? (Choose three.)

estimated implementation time
design document references
step description

The topology map in the draft design document should cover which two layers of the OSI model?
(Choose two.)

physical
network

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set