14.1.4 Optimization
Match the Class of Service (CoS) priority on the left with its corresponding value on the right.
0 Best effort (default) 1 Background 2 Excellent effort 3 Critical applications 4 Video (< 100ms latency) 5 Voice (< 10ms latency) 6 Internetwork control 7 Network control
Which Class of Service (CoS) priority value should be assigned to a video conference call?
4 EXPLANATION A priority value of 4 should be assigned to the video data stream. Each CoS priority value goes with a specific traffic type: 0 - Best effort (default) 1 - Background 2 - Excellent effort 3 - Critical applications 4 - Video (< 100ms latency) 5 - Voice (< 10ms latency) 6 - Internetwork control 7 - Network control
Which of the following components do switches use to optimize network performance by performing switching operations in hardware rather than using the CPU and software?
An application-specific integrated circuit EXPLANATION Switches use specialized hardware called an application-specific integrated circuit (ASIC), which performs switching functions in hardware rather than using the CPU and software. ASIC allows switches to perform the switching function at wire speed.
Your organization uses a time-keeping application that only runs on Windows 2000 and does not run on newer OS versions. Because of this, there are several Windows 2000 workstations on your network. Last week, you noticed unusual activity on your network coming from the workstations. After further examination, you discover that they were victims of a malicious attack and were being used to infiltrate the network. You find out that the attackers were able to gain access to the workstations because of the legacy operating system being used. Your organization still needs to use the Windows 2000 workstations (which need to be connected to the internet) but you want to make sure that the network is protected from future attacks. Which solution should you implement to protect the network while also allowing operations to continue as normal?
Configure VLAN membership so that the Windows 2000 workstations are on their own VLAN. EXPLANATION The best solution is to place the Windows 2000 workstations in their own VLAN. If you use VLAN network segmentation, the workstations will still have access to the internet, but network access can be heavily restricted. This greatly reduces the damage a workstation can cause if it were to become compromised again
You have a website that uses multiple servers for different types of transactions. For example, one server is responsible for static web content, while another is responsible for secure transactions. You would like to implement a device to speed up access to your web content. The device should be able to distribute requests between the various web servers using specialized hardware, not just software configurations. In addition, SSL sessions should use the hardware components in the device to create the sessions. Which type of device should you use to accomplish this?
Content switch EXPLANATION Use a content switch to perform these functions. Switches use specialized hardware modules to perform common tasks. For example, you can have a switch with a special hardware module that's used for SSL connections. Using the hardware module in a specialized switch is faster than using the CPU or software in another device.
A web server on your network hosts your company's public website. You want to make sure that an NIC failure doesn't prevent the website from being accessible on the internet. Which solution should you implement?
Ethernet bonding EXPLANATION Ethernet bonding (also called NIC teaming) logically groups two or more physical connections to the same network. If one NIC fails, the second one with a connection to the same network can still be used.
What is the purpose of using Ethernet bonding? (Select two.)
Increases network performance. Provides a failover solution for network adapters. EXPLANATION In a true fault-tolerant strategy, you must consider all the system components. Ethernet bonding (also called adapter teaming) is a fault-tolerant strategy that uses multiple network adapters configured as a failover solution. In the event of a NIC failure, other adapters automatically provide link redundancy.
Which of the following statements about DSCP are true? (Select two.)
It uses the DiffServ field to add precedence values. Classification occurs at Layer 3. EXPLANATION The Differentiated Services Code Point (DSCP) classification system has the following characteristics: Classification occurs at Layer 3. Precedence values are inserted in an IP packet's DiffServ field. Up to 64 different classifications are possible, but most networks use only the following ones:Default Best EffortExpedited Forwarding (EF) - low loss, low latencyAssured Forwarding (AF) - assured delivery under prescribed conditionsClass Selector - maintains backward compatibility with the IP Precedence field
Which type of switch optimizes network performance by using ASIC to perform switching at wire speed?
Multilayer switch EXPLANATION A multilayer switch uses specialized hardware called an application-specific integrated circuit (ASIC) to perform switching functions in hardware rather than using the CPU and software. ASIC allows switches to perform the switching function at wire speed.
You are in the process of implementing a network access protection (NAP) infrastructure to increase your network's security. You are currently configuring the remediation network that non-compliant clients will connect to in order to become compliant. You need to isolate the remediation network from the secure network. Which technology should you implement to accomplish this task?
Network segmentation EXPLANATION Implementing network segmentation would isolate the remediation server from the rest of the network while still allowing the remediation server to contact the NAP infrastructure.