1.  In addition to the technical considerations, what other major factor is  used to evaluate the success of a network installation? 
• final project costs 
• maintenance costs 
• user satisfaction  
• statistics describing the performance of network devices 
2. Which two network applications are most affected by network  congestion and delays? (Choose two.) 
• IP telephony 
• live video webcasts 
• audio file downloads 
• online banking services 
• file archival and retrieval 
3. What two Cisco tools can be used to analyze network application  traffic? (Choose two.) 
• NBAR 
• NetFlow 
• AutoQoS 
• Wireshark 
• Custom Queuing 
4. In network design, which technology can be implemented to prioritize  traffic based on its importance and technical requirements? 
• STP 
• QoS 
• RTP 
• TCP 
• VPN 
5. What are two characteristics of voice over IP traffic? (Choose two.) 
• Voice packets  tend to be small. 
• Voice packets must be processed in real time. 
• Voice packets can effectively use TCP reliability features. 
• Voice traffic can survive packet drops and retransmission delays. 
• Voice packets must be converted to analog before being sent across the  IP network. 
• Voice packets automatically receive a higher priority value than other  types of packets. 
6. What are two things that a network designer can do to determine  current and anticipated network traffic flows? (Choose two.) 
• Survey end users  to obtain customer input. 
• Upgrade the Cisco IOS software in all networking devices to optimize  traffic flow. 
• Limit the analysis to host-to-server traffic because host-to-host  traffic is unimportant. 
• Run a network traffic analysis to determine which applications are in  use and by whom. 
• Conduct an  inventory of all networking devices that includes model numbers and  memory configurations 
7. A company that has a traditional telephone system wants to convert to  IP telephony. Which two factors should be considered for the design?  (Choose two.) 
• Digital communications systems have greater noise than analog systems  when processing voice traffic. 
• Voice-enabled  routers or a server must be used for call control and signaling. 
• Voice to IP conversions can cause router overhead. 
• Power to the  phones can be supplied through properly equipped patch panels or  switches. 
• The cost to combine voice and data VLANs can be a considerable amount.  
8. Several web and email servers have recently been installed as part of  an enterprise network. The security administrator has been asked to  provide a summary of security features that can be implemented to help  prevent unauthorized traffic from being sent into or out of sensitive  internal networks. Which three features should the security  administrator recommend? (Choose three.) 
• firewalls 
• priority queuing 
• access control  lists 
• intrusion detection systems 
• DHCP 
• 128-bit WEP 
9. The design of an IP telephony system needs to meet the technical  requirements to provide a connection to the PSTN as well as provide  high-quality voice transmissions using the campus network. Which two  elements directly affect the ability of the design to meet these  requirements?(Choose two.) 
• voice-enabled firewall 
• PoE switches and patch panels 
• redundant backbone connectivity 
• voice-enabled  router at the enterprise edge 
• separate voice and data VLANs with QoS implemented 
10. When implementing VoIP services, which two design considerations  should be followed?(Choose two.) 
• Confirm that  network jitter is minimal. 
• Use TCP to reduce delays and dropped packets. 
• Establish priority queuing to ensure that large data packets are sent  uninterrupted. 
• Disable real-time protocols to reduce queuing strategy demands. 
• Ensure that  packet delays do not exceed 150 ms. 
11. What design strategy should be followed when designing a network  that uses video on demand? 
• implement the appropriate routing protocol to ensure that data  segments arrive in order 
• implement different QoS queues based on the type of video traffic  being distributed 
• install servers  to store the data in a centrally located server farm 
• configure queuing in the core routers to ensure high availability 
12. When implementing QoS in traffic queues, what is the first step the  designer should take to ensure that traffic is properly prioritized? 
• define QoS policies 
• define traffic classes 
• determine traffic patterns 
• identify traffic  requirements 
• identify networking equipment 
13. Which two statements are characteristics of file transfer traffic  flows? (Choose two.) 
• RTP should be used. 
• Traffic is predictable. 
• Packets are small in size. 
• Transfers are  throughput intensive. 
• Response-time requirements are low. 
14. Which two items can be determined by diagramming internal traffic  flow? (Choose two.) 
• the type of ISP services needed 
• the capabilities of end-user devices 
• the areas where  network congestion may occur 
• the location of VPN servers used to connect teleworkers 
• locations where  high-bandwidth connections are required 
15. Which two traffic types are examples of external traffic flows?  (Choose two.) 
• A user in the IT department telnets to the core layer router. 
• A user in  marketing connects to the web server of a competitor. 
• A user in the IT department telnets into the access layer switch. 
• A user in the  services department logs in to a web-based email program. 
• A user in accounting connects to an FTP server that is connected to  the access layer switch. 
16. Which service can be provided by the NetFlow Cisco utility? 
• network planning and mapping 
• IDS and IPS capabilities 
• peak usage times  and traffic routing 
• network billing and accounting application 
• security and user account restrictions 
• source and destination UDP port mapping 
17. Refer to the exhibit. If ACL 150 identifies only voice traffic from  network 192.168.10.0/24 and no other traffic, which queue will voice  traffic from other networks use? 
• high 
• normal 
• medium 
• default 
18. Refer to the exhibit. After configuring QoS, a network administrator  issues the command show queueing interface s0/1. What two pieces of  information can an administrator learn from the output of this command?  (Choose two.) 
• queue traffic definitions 
• priority list protocol assignments 
• type of queuing  being implemented 
• number of packets placed in each queue 
• queuing defaults that have been changed 
• queuing has not been applied to this interface 
19. An analysis of network protocols reveals that RTP and RTCP are being  used. What uses these protocols? 
• IDS 
• VPN 
• WLAN 
• firewall 
• real-time video  
20. A company is considering adding voice and video to the data  networks. Which two statements are true if voice and video are added?  (Choose two.) 
• PoE switches must be purchased. 
• More UDP-based  traffic flows will be evident. 
• Response times will be increased even if QoS is implemented. 
• QoS will most  likely be implemented to prioritize traffic flows. 
• VPNs will most likely be implemented to protect the voice traffic. 
21. Refer to the exhibit. Which option correctly matches the terms on  top with its definition on the bottom? 
• A=1, B=3, C=2, D=4 
• A=2, B=1, C=4, D=3 
• A=2, B=4, C=1, D=3 
• A=3, B=2, C=4, D=1 
• A=4, B=3, C=1,  D=2 
• A=4, B=2, C=3, D=1 
22. A database server is configured to purge all data that is 60 days  old. Ten data items that are 60 days old are to be purged. However,  there is a failure halfway through the transaction, and the entire  transaction is voided. What type of transaction action occurred? 
• atomic 
• consistent 
• durable 
• isolated 
23. What is the primary goal of QoS? 
• classification of traffic 
• filtering and queuing voice traffic 
• reducing bandwidth requirements 
• providing  priority service to selected traffic 
24. Which technology provides a mechanism for implementing QoS at Layer  2? 
• ToS 
• CoS 
• DSCP 
• IP precedence 
25. A customer purchases tickets online and pays using a credit card,  but the system goes down before the transaction is complete. What  transaction type retains a record of this transaction after the system  failure so that the customer will still receive the tickets and the  credit card account will be debited accordingly? 
• atomic 
• consistent 
• durable 
• isolated 
26. Refer to the exhibit. The network design documents include  requirements to prevent switching loops, to provide link-specific  failover, and to provide Layer 3 recovery. Which two protocols would be  needed to provide the support? (Choose two.) 
• HDLC 
• HSRP 
• PPP 
• RSTP 
• VTP 
27. network design must minimize latency to support real-time streaming  applications. Which two protocols enable control and scalability of the  network resources and minimize latency by incorporating QoS mechanisms?  (Choose two.) 
• RTCP 
• HSRP 
• RSTP 
• RTP 
• RPC 
28. Which two major differences are associated with IP telephony when  compared to traditional telephony that uses a PBX? (Choose two.) 
• manages phones  centrally 
• utilizes centralized call routing 
• creates peer-to-peer relationships between phones 
• requires a  separate infrastructure to support data transfer 
• requires significant manual configuration when adding, moving, or  changing phones 
29. When QoS is implemented in a converged network, which two factors  can be controlled to improve performance? (Choose two.) 
• link speed 
• delay 
• packet routing 
• jitter 
• packet addressing
 
Tidak ada komentar:
Posting Komentar