Network Design Ch. 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

So as not to compromise network integrity, access is granted only to authenticated users or devices at which layer of the Cisco Hierarchical Network Model? Physical Core Access Distribution

Access

Which Cisco component of the Enterprise Teleworker module supports teleworkers and employees at remote locations? wireless bridging SNMP management campus VLANs Cisco Virtual Office

Cisco Virtual Office

Which layer should not perform any packet manipulation, such as checking access lists or filtering, which would slow down the switching of packets? Distribution Core Physical Access

Core

In a campus environment, this layer aggregates wiring closet bandwidth by concentrating multiple low-speed access links into a high speed link and uses switches to segment workgroups and isolate network problems to prevent them from affecting other layers? Core Access Physical Distribution

Distribution

You need to design a network that allows for packet load-sharing betwen a group of redundant routers. Which protocol allows you to do this? GLBP VRRP AARP HSRP

GLBP

Which of the following modules are connected to the remote access and VPN submodule? Internet connectivity module service provider module server farm module LAN module

Internet connectivity module

Which of the following are Enterprise WAN technologies used in the Enterprise Edge module? Choose three. Dial-in Access Multi Protocol Label Switching IPsec Tunnels Leased Lines ATM

Multi Protocol Label Switching Leased Lines ATM

Which type of redundancy is in effect when deploying Cisco Unified Communications Manager (CUCM) in a cluster? Link Media Redundancy Server Redundancy Workstation-to-Router Redundancy Route Redundancy

Server Redundancy

In the Collapsed Core Design, the core and distribution layers are merged. True or False

True

Remote Offices and Mobile Users can connect to enterprise resources via secured IPsec tunnels through the VPN submodule True or False

True

Which of the following are methods of workstation-to-router redundancy in the Access Layer? Choose two. ICMP Router Discovery Protocol (RDP) AppleTalk Address Resolution Protocol (AARP) Virtual Router Redundancy Protocol (VRRP) Hot Standby Router Protocol (HSRP)

Virtual Router Redundancy Protocol (VRRP) Hot Standby Router Protocol (HSRP)

Which feature allows a distribution switch pair to run as a single logical switch? spanning-tree algorithm Virtual Switching System IGMP DHCP snooping

Virtual Switching System

Which three types of servers does the e-commerce module use for web communication with users who are running applications and storing data? (Choose three.) public application web database Internet

application web database

Which module or layer in the enterprise campus interconnects with the server farm module and enterprise edge modules? building distribution layer enterprise distribution module campus core layer server distribution module network management module

campus core layer

Which three components are parts of the enterprise campus infrastructure module? (Choose three.) enterprise edge modules campus core layer building access layer network management module building distribution layer

campus core layer building access layer building distribution layer

Which three modules provide network infrastructure and services for remote enterprise users? (Choose three.) enterprise branch module enterprise teleworker module enterprise remote database module enterprise data center module enterprise home office module

enterprise branch module enterprise remote database module enterprise data center module

Which three statements describe the key features of the distribution layer? (Choose three.) provides policy-based connectivity represents a routing boundary between the access and core layers provides connectivity to the network aggregates access layer links concentrates user access by providing fast throughput

provides policy-based connectivity represents a routing boundary between the access and core layers aggregates access layer links

Which type of server is typically located in the Internet connectivity module? public Internet private corporate

public

Which three are the roles of the core layer in a LAN design? (Choose three.) serves as a fast convergent infrastructure with a high level of redundancy avoids data manipulation provides high-speed data transport performs mainly policy-based decisions performs packet filtering

serves as a fast convergent infrastructure with a high level of redundancy avoids data manipulation provides high-speed data transport


Conjuntos de estudio relacionados

Women's health/Disorders & Childbearing

View Set

MUSIC 351: Music Of Motown Part 2

View Set

Causes and Results of 1848 Revolutions-Chap. 16

View Set

History/Systems of Psych, Exam 2 AB

View Set

PrepU Chapter 2: Theory, Research, and Evidence-Informed Practice

View Set

ANS 100 Study Guide for Midterm #2 final

View Set

IndiaBix - Flip-Flops and Timers

View Set