1.
The ability to connect securely to a private network over a public network is provided by which WAN technology?
Correct Answer
E. VPN
Explanation
This item references content from the following areas (can be found in the online book):
CCNA Discovery: Designing and Supporting Computer Networks
1.3.5 Routing Protocols at the Distribution Layer
2.
What are two mechanisms that provide redundancy for server farm implementations? (Choose two.)
Correct Answer(s)
D. Rapid Spanning Tree Protocol
E. Hot Standby Routing Protocol
Explanation
This item references content from the following areas (can be found in the online book):
CCNA Discovery: Designing and Supporting Computer Networks
3.
Which three statements describe the functions of the Cisco hierarchical network design model? (Choose three.)
Correct Answer(s)
B. The distribution layer is responsible for traffic filtering and isolating failures from the core.
C. Two goals of the core layer are 100 percent uptime and maximizing throughput.
D. The access layer provides a means of connecting end devices to the network.
Explanation
The first statement is incorrect because route summarization is necessary at the core and distribution layers to reduce the size of routing tables and improve network efficiency. The second statement is correct as the distribution layer does indeed perform traffic filtering and isolates failures to prevent them from affecting the core layer. The third statement is also correct as the core layer is responsible for providing high availability and maximum throughput. The fourth statement is correct as the access layer connects end devices to the network. The fifth statement is incorrect as the distribution layer does not distribute network traffic directly to end users. The sixth statement is not mentioned in the question.
4.
A network designer is creating a new network. The design must offer enough redundancy to provide protection against a single link or device failure, yet must not be too complex or expensive to implement. What topology would fill these needs?
Correct Answer
C. Partial mesh
Explanation
A partial mesh topology would fulfill the requirements of the network designer. In a partial mesh, only some of the devices are directly connected to each other, while others are connected through intermediate devices. This provides redundancy against a single link or device failure, as there are multiple paths for communication. At the same time, it is less complex and expensive to implement compared to a full mesh topology, where every device is directly connected to every other device.
5.
Refer to the exhibit (will add later). If the firewall module has been correctly configured using best practices for network security, which statement is true about the security design for the network?
Correct Answer
B. Servers in the DMZ are protected from internal and external attacks.
Explanation
If the firewall module has been correctly configured using best practices for network security, the statement "Servers in the DMZ are protected from internal and external attacks" is true. The DMZ (Demilitarized Zone) is a network segment that sits between the internal network and the external network. It acts as a buffer zone, providing an additional layer of security by isolating the servers in the DMZ from both internal and external networks. This configuration ensures that any potential attacks originating from either the internal or external network are mitigated, thus protecting the servers in the DMZ.
6.
Which statement is true about a DMZ in a traditional network firewall design?
Correct Answer
B. Servers in the DMZ provide limited information that can be accessed from external networks.
Explanation
A DMZ in a traditional network firewall design is designed to provide services for external access but not for internal access. Servers in the DMZ are isolated from the internal network and provide limited information that can be accessed from external networks. This helps to enhance security by limiting the exposure of sensitive internal resources to external threats. User access to the DMZ from the Internet and the internal network is usually treated differently to ensure proper security measures are in place.
7.
What network connection would be most cost efficient while still meeting the security and connectivity needs of this teleworker?
Correct Answer
C. DSL VPN connection with a dialup backup link
Explanation
A DSL VPN connection with a dialup backup link would be the most cost efficient while still meeting the security and connectivity needs of the teleworker. DSL provides a high-speed internet connection at a relatively low cost, and a VPN ensures secure access to the company's network. The dialup backup link provides a fallback option in case the DSL connection fails, ensuring uninterrupted connectivity for the teleworker.
8.
Refer to the exhibit (will add later). The network administrator creates a standard access control list to prohibit traffic from the 192.168.1.0/24 network from reaching the 192.168.2.0/24 network while still permitting Internet access for all networks. On which router interface and in which direction should it be applied?
Correct Answer
D. Interface fa0/1, outbound
Explanation
The correct answer is to apply the access control list on interface fa0/1 in the outbound direction. This means that the ACL will be applied to traffic leaving the fa0/1 interface. By applying the ACL on this interface and in the outbound direction, it will effectively block traffic from the 192.168.1.0/24 network from reaching the 192.168.2.0/24 network while still allowing Internet access for all networks.
9.
Refer to the exhibit (will add later).The server broadcasts an ARP request for the MAC address of its default gateway. If STP is not enabled, what is the result of this ARP request?
Correct Answer
C. Switch_A and Switch_B continuously flood the message onto the network.
Explanation
If STP (Spanning Tree Protocol) is not enabled, the result of the ARP request would be that Switch_A and Switch_B continuously flood the message onto the network. Without STP, there is no loop prevention mechanism in place, so both switches will forward the broadcast request to all ports, causing the message to be continuously flooded throughout the network.
10.
What are two best practices in wireless LAN design to ensure secure wireless access to the corporate network? (Choose two.)
Correct Answer(s)
C. Use a separate WLAN for employees.
D. Configure WPA.
Explanation
To ensure secure wireless access to the corporate network, it is recommended to use a separate WLAN for employees. This helps in segregating the network and prevents unauthorized access from outsiders. Additionally, configuring WPA (Wi-Fi Protected Access) is crucial as it provides encryption and authentication to secure the wireless communication. By implementing these two best practices, the corporate network can maintain a higher level of security and protect sensitive data from potential threats.
11.
In a well-designed, high-availability network, which device significantly affects the most users if a failure occurs?
Correct Answer
D. Small workgroup switch in the network access layer
Explanation
In a well-designed, high-availability network, the small workgroup switch in the network access layer significantly affects the most users if a failure occurs. This is because the network access layer is responsible for connecting individual devices, such as desktop PCs, to the network. If the small workgroup switch fails, it will result in the loss of network connectivity for all the devices connected to it, affecting a larger number of users compared to other devices in the network. The large switch in the network core layer and distribution layer may have a broader impact on the network, but they do not directly affect individual users as much as the small workgroup switch in the network access layer.
12.
Which two statements are true regarding network convergence? (Choose two.)
Correct Answer(s)
A. In a large network, using the EIGRP or OSPF routing protocols rather than RIPv2 may improve convergence time.
C. Route summarization improves convergence time by minimizing the size of the routing table.
Explanation
Using the EIGRP or OSPF routing protocols instead of RIPv2 can improve convergence time in a large network because these protocols have faster convergence algorithms and support features like fast hellos and incremental updates. Route summarization can also improve convergence time by reducing the size of the routing table, which reduces the time required to calculate and update routes.
13.
Centralizing servers in a data center server farm can provide which benefit over a distributed server environment?
Correct Answer
C. It is easier to filter and prioritize traffic to and from the data center.
Explanation
Centralizing servers in a data center server farm makes it easier to filter and prioritize traffic to and from the data center. When servers are distributed, it becomes more challenging to manage and control the flow of traffic. By centralizing servers, network administrators can implement filters and prioritize certain types of traffic more effectively. This helps in optimizing the network's performance, ensuring that critical traffic receives priority, and enabling better management of resources.
14.
Refer to the exhibit (will add later). What effect does the ACL shown have on network traffic, assuming that it is correctly applied to the interface?
Correct Answer
C. All Telnet traffic from the 172.16.0.0 network to any destination is denied.
Explanation
The ACL shown has the effect of denying all Telnet traffic from the 172.16.0.0 network to any destination. This means that any attempt to establish a Telnet connection from any device within the 172.16.0.0 network to any other destination will be blocked and not allowed to pass through the interface.
15.
Which Cisco IOS function can be configured at the distribution layer to filter unwanted traffic and provide traffic management?
Correct Answer
D. Access control lists
Explanation
Access control lists (ACLs) can be configured at the distribution layer to filter unwanted traffic and provide traffic management. ACLs allow network administrators to control and filter traffic based on various criteria such as source/destination IP addresses, protocols, ports, and other parameters. By configuring ACLs, administrators can restrict or allow specific types of traffic, block malicious traffic, and manage network resources effectively. ACLs are a fundamental feature of Cisco IOS and are commonly used for security and traffic management purposes at different layers of the network.
16.
What kind of ACL inspects outbound UDP, TCP, and ICMP traffic and allows inbound access only to traffic that belongs to these established sessions?
Correct Answer
C. Reflexive ACL
Explanation
A reflexive ACL is a type of ACL that inspects outbound UDP, TCP, and ICMP traffic and allows inbound access only to traffic that belongs to established sessions. It does this by dynamically creating temporary access rules to allow the return traffic for outbound connections. This helps to enhance security by only allowing traffic that is part of an established session to enter the network.
17.
Which three functions are performed at the distribution layer of the hierarchical network model? (Choose three.)
Correct Answer(s)
A. Summarizing routes from the access layer
E. Isolating network problems to prevent them from affecting the core layer
F. Utilizing redundant links for load balancing to increase available bandwidth
Explanation
The functions performed at the distribution layer of the hierarchical network model include summarizing routes from the access layer, which helps in reducing the size of routing tables and improving network efficiency. Another function is isolating network problems to prevent them from affecting the core layer, ensuring that any issues in the distribution layer do not impact the core layer. Lastly, utilizing redundant links for load balancing to increase available bandwidth helps in improving network performance and ensuring high availability.
18.
Refer to the exhibit (will add later). Which two devices are part of the access design layer? (Choose two.)
Correct Answer(s)
D. FC-AP
F. FC-ASW-2
Explanation
The question is asking for the devices that are part of the access design layer. The access layer is responsible for connecting end-user devices to the network. From the given options, FC-AP and FC-ASW-2 are the devices that are part of the access design layer.
19.
What is true about implementing a centralized server farm topology?
Correct Answer
C. Provides defined entry and exit points so that filtering and securing traffic is easier
Explanation
Implementing a centralized server farm topology provides defined entry and exit points, making it easier to filter and secure traffic. This means that network administrators can easily control and monitor the flow of data in and out of the server farm, enhancing security measures. Additionally, having defined entry and exit points allows for efficient traffic management and optimization, ensuring smooth and reliable server performance.
20.
Refer to the exhibit (will add later). What happens when Host 1 attempts to send data?
Correct Answer
B. Frames from Host 1 cause the interface to shut down, and a log message is sent.
21.
Which two considerations are valid when designing access layer security?(Choose two.)
Correct Answer(s)
C. SSH is more secure than Telnet to administer network devices.
D. Disabling unused ports on the switches helps prevent unauthorized access to the network.
Explanation
The first consideration, SSH is more secure than Telnet to administer network devices, is valid because SSH uses encryption to secure the communication between the network device and the administrator, while Telnet sends information in clear text, making it more vulnerable to eavesdropping and unauthorized access. The second consideration, disabling unused ports on the switches helps prevent unauthorized access to the network, is valid because leaving unused ports open increases the potential attack surface and provides an entry point for unauthorized users. By disabling these ports, the network becomes more secure and reduces the risk of unauthorized access.
22.
What address can be used to summarize only networks 172.16.0.0/24, 172.16.1.0/24, 172.16.2.0/24, and 172.16.3.0/24?
Correct Answer
B. 172.16.0.0/22
Explanation
The given networks 172.16.0.0/24, 172.16.1.0/24, 172.16.2.0/24, and 172.16.3.0/24 can be summarized using the address 172.16.0.0/22. This is because a /22 subnet mask allows for a range of IP addresses from 172.16.0.0 to 172.16.3.255, which includes all the given networks.
23.
Which two items in a physical WLAN design can be identified through a site survey? (Choose two.)
Correct Answer(s)
A. The types of antennas that are required
C. The access point hardware that is required
Explanation
A site survey in a physical WLAN design can identify the types of antennas that are required and the access point hardware that is required. A site survey involves physically inspecting the location where the WLAN will be implemented and analyzing factors such as signal strength, interference, and coverage area. By conducting a site survey, the designer can determine the appropriate types of antennas to use based on the specific requirements of the location and the desired coverage. Additionally, the survey helps in identifying the number and placement of access points needed to ensure optimal coverage and performance.
24.
Refer to the exhibit (will add later). Which two statements correctly describe the benefits of the network access layer design that is shown? (Choose two.)
Correct Answer(s)
A. If host A sends a broadcast message, only hosts in VLAN10 receive the broadcast frame.
C. Segmenting all voice traffic on a separate VLAN facilitates the implementation of QoS.
Explanation
The first statement correctly describes the benefits of the network access layer design shown because VLANs allow for logical segmentation of the network, ensuring that broadcast messages are only received by hosts in the same VLAN. The second statement also correctly describes the benefits because segmenting voice traffic on a separate VLAN allows for better quality of service (QoS) implementation, ensuring that voice traffic is prioritized and has sufficient bandwidth.
25.
What are three ways to ensure that an unwanted user does not connect to a wireless network and view the data? (Choose three.)
Correct Answer(s)
A. Disable SSID broadcasting.
C. Use authentication between clients and the wireless device.
E. Configure strong encryption such as WPA.
Explanation
1. Disabling SSID broadcasting prevents the wireless network from being visible to unwanted users.
2. Using authentication between clients and the wireless device ensures that only authorized users can connect to the network.
3. Configuring strong encryption such as WPA encrypts the data transmitted over the network, making it difficult for unauthorized users to view the data.