1.
What can be found at the enterprise edge?
Correct Answer
A. Internet, VPN, and WAN modules
Explanation
At the enterprise edge, various modules and services can be found to facilitate connectivity and communication. This includes internet, VPN (Virtual Private Network), and WAN (Wide Area Network) modules. These modules allow for secure remote access and communication between different locations within the enterprise network. Additionally, these modules enable connectivity to external networks and services, such as the internet and other WAN connections. Therefore, the presence of internet, VPN, and WAN modules at the enterprise edge is essential for maintaining a robust and secure network infrastructure.
2.
In which functional area of the Cisco Enterprise Architecture should IDS and IPS be located to detect and prevent services from accessing hosts?
Correct Answer
C. Enterprise Edge
Explanation
IDS (Intrusion Detection System) and IPS (Intrusion Prevention System) should be located in the Enterprise Edge functional area of the Cisco Enterprise Architecture. The Enterprise Edge is responsible for connecting the internal network to external networks, such as the internet. By placing IDS and IPS in the Enterprise Edge, they can monitor and analyze network traffic coming into the organization from external sources. This allows them to detect and prevent any unauthorized access attempts or malicious activities before they reach the internal hosts, ensuring the security of the network.
3.
A business consultant must use Internet websites to research a report on the e-business strategies of
several firms and then electronically deliver the report to a group of clients in cities throughout the
world. Which two teleworker tools can the consultant use to accomplish this project? (Choose two.)
Correct Answer(s)
C. HTTP
E. E-mail
Explanation
The business consultant can use HTTP and E-mail as teleworker tools to accomplish this project. HTTP (Hypertext Transfer Protocol) allows the consultant to access and research information on Internet websites for the report on e-business strategies. E-mail can be used to electronically deliver the report to clients in different cities around the world.
4.
Which two measures help ensure that a hardware problem does not cause an outage in an enterprise
LAN that supports mission critical services? (Choose two.)
Correct Answer(s)
A. Providing failover capability
B. Installing redundant power supplies
Explanation
Providing failover capability ensures that if there is a hardware problem in one component, the system can automatically switch to a backup component, minimizing or eliminating any downtime or outage. Installing redundant power supplies ensures that if one power supply fails, there is a backup power supply to keep the system running, preventing any interruption in services. Both measures contribute to the overall resilience and reliability of the enterprise LAN, ensuring that mission-critical services are not affected by hardware problems.
5.
Which task would typically only require services located at the access layer of the hierarchical
design model?
Correct Answer
C. Printing a meeting agenda on a local departmental network printer
Explanation
The task of printing a meeting agenda on a local departmental network printer would typically only require services located at the access layer of the hierarchical design model. This is because printing a document does not involve accessing or sending data to remote servers or networks. The access layer provides connectivity to end devices such as printers, allowing users to directly connect and print documents within their local network.
6.
How does a VPN work to support remote user productivity?
Correct Answer
D. It uses encapsulation to create a secure tunnel for transmission of data across non-secure networks
Explanation
A VPN (Virtual Private Network) works by encapsulating data in a secure tunnel, allowing it to be transmitted across non-secure networks. This encapsulation ensures that the data is protected and cannot be intercepted or accessed by unauthorized users. By creating this secure tunnel, VPNs enable remote users to access the corporate intranet or internal network devices securely, thus supporting their productivity.
7.
A remote user needs to access a networking device on the internal network of the company. The
transactions between the remote user and the device must be secure. Which protocol enables this to
happen securely?
Correct Answer
B. SSH
Explanation
SSH (Secure Shell) is the correct answer because it is a protocol that provides secure remote access to network devices. It encrypts the data transmitted between the remote user and the device, ensuring that it cannot be intercepted or tampered with by unauthorized individuals. Unlike Telnet, FTP, and HTTP, which do not provide encryption, SSH ensures the confidentiality and integrity of the transactions, making it the most suitable protocol for secure access to networking devices.
8.
What does VoIP provide to telecommuters?
Correct Answer
B. Real-time voice communications over the Internet
Explanation
VoIP, or Voice over Internet Protocol, allows telecommuters to have real-time voice communications over the Internet. This means that telecommuters can make and receive phone calls using an internet connection instead of traditional phone lines. VoIP provides a cost-effective and convenient solution for telecommuters, as it eliminates the need for separate phone lines and allows for flexibility in communication. It also allows for features such as call forwarding, voicemail, and conference calling. Overall, VoIP enhances communication for telecommuters by providing real-time voice communications over the Internet.
9.
Which functional component of the Cisco Enterprise Architecture is responsible for hosting internal
servers?
Correct Answer
A. Enterprise campus
Explanation
The enterprise campus functional component of the Cisco Enterprise Architecture is responsible for hosting internal servers. This component is designed to provide connectivity and services to the users within the organization's campus environment. It includes the necessary infrastructure, such as switches, routers, and access points, to support the internal network and server resources. By hosting internal servers within the enterprise campus, organizations can ensure efficient and secure access to these resources for their employees.
10.
What is the purpose of the Cisco Enterprise Architecture?
Correct Answer
A. Remove the three-layer hierarchical model and use a flat network approach
divide the network into functional components while still maintaining the concept of Core,
Distribution, and Access Layers
Explanation
The purpose of the Cisco Enterprise Architecture is to remove the three-layer hierarchical model and use a flat network approach. This means that instead of having separate core, distribution, and access layers, the network is divided into functional components while still maintaining the concept of these layers. This approach allows for a more flexible and scalable network design, as well as easier management and troubleshooting. By removing the hierarchical model, the network can adapt to changing business needs and technological advancements more effectively.
11.
Which two solutions would an enterprise IT department use to facilitate secure intranet access for
remote workers? (Choose two.)
Correct Answer(s)
A. VPN
C. User Authentication
Explanation
An enterprise IT department would use VPN (Virtual Private Network) to provide secure intranet access for remote workers. VPN creates a secure connection over a public network, such as the internet, allowing remote workers to access the intranet securely. User Authentication is another solution that would be used to facilitate secure intranet access. It ensures that only authorized users can access the intranet by requiring them to provide valid credentials, such as a username and password.
12.
Which statement describes the difference between an enterprise WAN and an enterprise extranet?
Correct Answer
B. An enterprise WAN is designed to interconnect branch offices, while an enterprise extranet is
designed to give access to external business partners
Explanation
An enterprise WAN is a network that connects multiple local area networks (LANs) within an organization's branches or offices. It is used to facilitate communication and data sharing between these locations. On the other hand, an enterprise extranet is a network that extends the internal network of an organization to external parties such as business partners, suppliers, or customers. It allows these external entities to access specific resources or services of the organization's network. Therefore, the statement correctly describes the difference between an enterprise WAN and an enterprise extranet.
13.
Why would a network administrator want to limit the size of failure domains when designing a
network?
Correct Answer
B. Reduces the impact of a key device or service failure
Explanation
Limiting the size of failure domains in a network helps to reduce the impact of a key device or service failure. By dividing the network into smaller failure domains, the failure of a single device or service will only affect a smaller portion of the network, minimizing the disruption and allowing other parts of the network to continue functioning normally. This improves overall network reliability and ensures that critical services are not completely interrupted in the event of a failure.
14.
What is the main purpose of the Access Layer in a hierarchically designed network?
Correct Answer
D. Serves as a network connection point for end-user devices
Explanation
The main purpose of the Access Layer in a hierarchically designed network is to serve as a network connection point for end-user devices. This layer provides connectivity between end-user devices such as computers, printers, and other network devices, allowing them to access the network resources. It also handles the authentication and security of these devices, ensuring that only authorized users can access the network. Additionally, the Access Layer may include features such as VLANs and QoS to optimize network performance and prioritize traffic.
15.
Which three functions are performed at the Distribution Layer of the hierarchical network model?
(Choose three.)
Correct Answer(s)
A. Forwards traffic that is destined for other networks
B. Isolates problems to prevent them from affecting the Core Layer
D. Provides a connection point for separate local networks
Explanation
At the Distribution Layer of the hierarchical network model, three functions are performed. Firstly, it forwards traffic that is destined for other networks, allowing communication between different networks. Secondly, it isolates problems to prevent them from affecting the Core Layer, ensuring network stability and reliability. Lastly, it provides a connection point for separate local networks, allowing them to connect and communicate with each other.
16.
What is a benefit of having an extranet?
Correct Answer
D. It allows suppliers and contractors to access confidential internal information using controlled
external connections
Explanation
An extranet is a private network that allows authorized external parties, such as suppliers and contractors, to access confidential internal information. This access is granted through controlled external connections, ensuring that only approved individuals can view the information. This benefit of an extranet enables efficient collaboration and communication between a company and its external partners, enhancing productivity and streamlining business processes.
17.
What are two important characteristics or functions of devices at the Enterprise Edge? (Choose two.)
Correct Answer(s)
D. Providing intrusion detection and intrusion prevention to protect the network against malicious
activity
E. Providing packet inspection to determine if incoming packets should be allowed on the enterprise
network
Explanation
The two important characteristics or functions of devices at the Enterprise Edge are providing intrusion detection and intrusion prevention to protect the network against malicious activity and providing packet inspection to determine if incoming packets should be allowed on the enterprise network. These functions are crucial for ensuring the security and integrity of the network, as they help to identify and prevent any potential threats or unauthorized access. Additionally, packet inspection allows for the filtering and management of incoming packets, ensuring that only valid and authorized traffic is allowed into the network.
18.
Why is TCP the preferred Layer 4 protocol for transmitting data files?
Correct Answer
A. TCP is more reliable than UDP because it requires lost packets to be retransmitted
Explanation
TCP is the preferred Layer 4 protocol for transmitting data files because it is more reliable than UDP. TCP ensures reliable delivery of data by requiring lost packets to be retransmitted. This means that if any packets are lost during transmission, TCP will automatically retransmit them, ensuring that all data is received correctly. In contrast, UDP does not have this retransmission mechanism, making it less reliable for transmitting data files.
19.
The ABC Corporation implements the network for its new headquarters using the Cisco Enterprise
Architecture. The network administrator wants to filter the traffic from and to the outside world. Where
should the administrator deploy a firewall device?
Correct Answer
B. Enterprise Edge
Explanation
The network administrator should deploy a firewall device at the Enterprise Edge. The Enterprise Edge is the boundary between the internal network and the outside world. By placing the firewall at this location, the administrator can effectively filter the traffic coming into and going out of the network, ensuring that only authorized and safe traffic is allowed to pass through. This helps to protect the internal network from potential threats and unauthorized access from the outside.
20.
Which two statements are reasons why UDP is used for voice and video traffic instead of TCP?(Choose two.)
Correct Answer(s)
B. The acknowledgment process of TCP introduces delays that break the streams of data
C. UDP does not have mechanisms for retransmitting lost packets
Explanation
TCP requires all data packets to be delivered for the data to be usable, which can cause delays and interruptions in real-time applications like voice and video. The acknowledgment process of TCP introduces additional delays, as it waits for the acknowledgment of each packet before sending the next one. On the other hand, UDP does not have mechanisms for retransmitting lost packets, which means that it does not introduce delays in the transmission. This makes UDP more suitable for voice and video traffic, as it can tolerate delays and compensate for them, ensuring a smoother streaming experience.