CH3 - Enterprise LAN Design - Q&A, CCDA - Chapter 2, 200-310 Chapter 1 Questions, Final

Ace your homework & exams now with Quizwiz!

VSS is configured only on Cisco __ switches using the VSS Supervisor 720-10G.

6500

A Fast Ethernet uplink is running at 80 percent utilization. Business-critical applications are used. What can be used to minimize packet delay and loss? a. Implement QoS with classification and policing in the distribution layer. b. Add additional VLANs so that the business applications are used on PCs on that VLAN. c. Perform packet bit rewrite in the distribution switches. d. Classify users in the access with different priority bits.

A

A large company has a campus core. What is the best practice for the core campus network? a. Use triangles. b. Use squares. c. Use rectangles. d. Use point-to-point mesh.

A

A network has two distribution switches, A and B, connected via a Layer 2 trunk. Distribution A switch is the STP root and distribution B is the active HSRP gateway. Layer 2 links are used to connect access layer switches to both distribution switches. Which statement is true? a. Traffic will transit from the access switches through distribution switch A through the Layer 2 trunk to distribution switch B. b. An STP loop will be created. c. The access switches will not be able to communicate. d. Loop Guard will prevent the loop from being created.

A

What is an advantage of using the updated Layer 2 access layer design over the traditional model? a. There is an increase of uplink bandwidth. b. The updated model adds routing between distribution and access. c. The access layer switch needs to be able to route. d. Layer 3 load balancing is enabled.

A

Which are *four* best practices used in the access layer? a. Disable trunking in host ports. b. Limit VLANS to one closet. c. Use PVST+ as the STP with multilayer switches. d. Enable trunking on host ports. e. Use VLAN spanning to speed convergence of STP. f. Use VTP Server mode in hierarchical networks. g. Use VTP Transparent mode in hierarchical networks. h. Use RPVST+ as the STP with multilayer switches.

A, B, G, H

Which are *three* best practices used in the distribution layer? a. Use HSRP or GLBP. b. Provide fast transport. c. Use Layer 3 routing protocols to the core. d. Use Layer 2 routing protocols to the core. e. Summarize routes to the core layer. f. Summarize routes to the access layer.

A, C, E

Which are environmental characteristics? *(Select three.)* a. Transmission media characteristics b. Application characteristics c. Distribution of network nodes d. Operating system used e. Remote-site connectivity requirements

A, C, and E.

What primary design factors affect the design of a campus network? *(Select three.)* a. Environmental characteristics b. Number of file servers c. Infrastructure devices d. Fiber and UTP characteristics e. Network applications f. Windows, Linux, and mainframe operating systems

A, C, and E. Network applications, infrastructure devices, and environmental characteristics affect network design.

Which Cisco STP Toolkit mechanisms are recommend on user access ports? a. PortFast b. RootGuard c. UplinkFast d. Loop Guard e. BPDU Guard

A, E

Which are *three* best practices used in the core layer? a. Use routing with no Layer 2 loops. b. Limit VLANs to one closet. c. Use HSRP. d. Use GLBP. e. Use Layer 3 switches with fast forwarding. f. Use Layer 3 routing to the core. g. Use two equal-cost paths to every destination network. h. Use RPVST+ as the STP with multilayer switches.

A, E, G

An isolated network is created to test a new design. What is this type of test called? a. Prototype b. Pilot c. Implementation d. New

A. A prototype network is a subset of the design in an isolated environment.

Which of the following is an example of a peer-to-peer application? a. IP phone call b. Client accessing file server c. Web access d. Using a local server on the same segment

A. IP phone-to-IP phone communication is an example of peer-to-peer communication.

Which design methodology step is important for identifying organizational goals? a. Identify customer requirements. b. Characterize the existing network. c. Design the network topology and solution. d. Examine the architecture. e. Validate the design. f. Obtain the ROI.

A. Identify customer requirements.

What is the recommended method to connect the distribution switches to the core? a. Redundant triangle links b. Redundant cross-connect links c. Redundant Layer 3 squares d. Redundant Layer 2 links

A. The core and the distribution should be connected using redundant Layer 3 triangular links.

High availability, port security, and rate limiting are functions of which hierarchical layer?

Access

Layer 2 switching High availability Port security Broadcast suppression QoS Rate limiting ARP inspection VACLs Spanning tree Trust classification PoE and auxiliary VLANs for VoIP

Access

A company has five floors. It has Layer 2 switches in each floor with servers. It plans to move servers to a new computer room and create a server farm. What should it use? a. Replace all Layer 2 switches with Layer 3 switches. b. Connect the Layer 2 switches to a Layer 3 switch in the computer room. c. Connect the Layer 2 switches to a new Layer 2 switch in the computer room. d. Connect the Layer 2 switches to each other.

B

A network has two distribution switches, A and B, connected via a Layer 2 trunk. Distribution A switch is the HSRP active gateway and STP root. Layer 2 links are used to connect access layer switches to both distribution switches. Which version of spanning tree is recommended? a. PVST+ b. Rapid PVST+ c. MST d. VSS

B

Which requirements drive the use of VLANs in a network? a. Use of non-Cisco equipment b. Separation of broadcast domains and prevention of traffic between departments c. Use of CCTV multicast traffic d. The company budget

B

Why is LAN switching used more than shared LAN technology? *(Select two.)* a. Shared LANs do not consume all available bandwidth. b. Switched LANs offer increased throughput. c. Switched LANs allow two or more ports to communicate simultaneously. d. Switched LANs forward frames to all ports simultaneously.

B, C

Which are the three steps in the design methodology? a. Reviewing the project cost b. Designing the network topology and solution c. Characterizing the network d. Identifying customer requirements e. Validating the design

B, C, and D.

What needs to be obtained prior to designing the network? a. Expected ROI b. Organizational and technical goals c. Technical constraints d. Bill of materials e. Existing and new network applications

B, C, and E.

A company location is used to test a new VoIP solution. What is this type of test called? a. Prototype b. Pilot c. Implementation d. New

B. A pilot site is an actual live location for testing.

Which of the following is true about data link layer broadcasts? a. Not controlled by routers b. Not forwarded by routers c. Not forwarded by switches d. Not controlled by VLANs

B. Broadcasts are not forwarded by routers and are controlled by VLANs.

What type of LAN switches are preferred in the campus backbone of an enterprise network? a. Layer 2 switches b. Layer 3 switches c. Layer 3 hubs d. Hubs

B. Layer 3 switches are recommended for the backbone of campus networks.

The summarization of routes is a best practice at which layer? a. Access layer b. Distribution layer c. Core layer d. WAN layer

B. Routes are summarized at the distribution layer.

Which layer of the campus network corresponds to the data center aggregation layer? a. Core layer b. Distribution layer c. Access layer d. Server farm

B. The DC aggregation layer is similar to the campus distribution layer.

A campus network of four buildings is experiencing performance problems. Each building contains 400 to 600 devices, all in one IP subnet. The buildings are connected in a hub-and-spoke configuration back to building 1 using Gigabit Ethernet with multimode fiber. All servers are located in building 1. What do you recommend to improve performance? a. Connect all buildings in a ring topology. b. Implement multiple VLANs in each building. c. Move servers to the buildings. d. Use single-mode fiber to make the Gigabit Ethernet links faster.

B. The building subnets are too large and should be further segmented to reduce the broadcast domain.

Which of the following is a distribution layer best practice? a. Reduce switch peering and routing. b. Use HSRP and summarize routes. c. Disable trunking on host ports and use RPVST+. d. Offload SSL sessions and use load balancers.

B. The use of HSRP and summarization of routes are best practices in the distribution layer.

Link redundancy and infrastructure services are design considerations for which layers? a. Core layer b. Distribution layer c. Access layer d. All of the above

B. These are design considerations for the distribution layer.

Which are the three Cisco network architectures for the enterprise?

Borderless network, data center/virtualization and collaboration are the three architectures for the enterprise

An application used by some users in a department generates significant amounts of bandwidth. Which is a best design choice? a. Rewrite the application to reduce bandwidth. b. Use Gigabit Ethernet connections for those users. c. Put the application users into a separate broadcast domain. d. Add several switches and divide the users into these switches.

C

Company departments are located across several buildings. These departments use several common servers. Network policy and security are important. Where should servers be placed? a. Within all department buildings, and they should duplicate the common servers in each building. b. Connect the common servers to the campus core. c. Use a server farm. d. Connect the servers to the distribution layer.

C

What is a major requirement if you use a Layer 3 access layer design? a. The distribution switches are configured as a VSS pair. b. The core switches need to support EIGRP. c. The access layer switch needs to be able to route. d. HSRP is configured on the distribution switches.

C

Which network application type is most stringent on the network resources? a. Peer-to-peer b. Client to local server c. Client to server farm d. Client to enterprise edge

C

You want to enable physical device virtualization. Which feature provides that? a. VLAN b. VFR c. VSS d. VPN

C

Which are four best practices used in the distribution layer? a. Disable trunking in host ports. b. Limit VLANs to one closet. c. Use HSRP. d. Use GLBP. e. Use VLAN spanning to speed convergence of STP. f. Use Layer 3 routing to the core. g. Summarize routes. h. Use RPVST+ as the STP with multilayer switches.

C, D, F, G

An enterprise network has grown to multiple buildings supporting multiple departments. Clients access servers that are in local and other buildings. The company security assessment has identified policies that need to be applied. What do you recommend? a. Move all departments to a single building to prevent unauthorized access. b. Move all servers to one of the LAN client segments. c. Move all servers to a server farm segment that is separate from client LANs. d. Move all servers to the building distribution switches.

C. Create a server farm that allows the enforcement of security policies.

Which of the following is an access layer best practice? a. Reduce switch peering and routing. b. Use HSRP and summarize routes. c. Disable trunking on host ports and use RPVST+. d. Offload SSL sessions and use load balancers.

C. Disabling trunking on host ports and using RPVST+ are best practices at the access layer.

Which type of cable is the best solution in terms of cost for connecting an access switch to the distribution layer requiring 140 meters? a. UTP b. Copper c. Multimode fiber d. Single-mode fiber

C. Multimode fiber provides a cost-effective solution for that distance. Single-mode fiber is more expensive. UTP cannot go more than 100 meters.

You need to connect a building access switch to the distribution switch. The cable distance is 135 m. What type of cable do you recommend? a. UTP b. Coaxial cable c. Multimode fiber d. Single-mode fiber

C. Multimode fiber provides the necessary connectivity at the required distance. UTP can reach only 100 m. Single-mode fiber is more expensive.

Which mechanism transitions an access port directly to forwarding state? a. UplinkFast b. RootGuard c. PortFast d. AccessPortFast

C. PortFast bypasses the listening-learning phase for access ports and goes directly to the port-forwarding state.

What is the maximum segment distance for Fast Ethernet over unshielded twisted pair (UTP)? a. 100 feet b. 500 feet c. 100 meters d. 285 feet

C. The maximum distance of 100BASE-T is 100 meters.

Which borderless architecture provides mobility? a. Policy b. Network services c. User services d. Connection management e. Control services

C. The user services architecture provides mobility, performance, and security.

Two workstations are located on separate VLANs. They exchange data directly. What type of application is this? a. Client/server b. Client-peer c. Peer-peer d. Client-enterprise

C. This is a peer-peer application.

Name two ways to reduce multicast traffic in the access layer.

CGMP and IGMP snooping control multicast traffic at Layer 2. The switch and local router exchange CGMP messages. With IGMP snooping, the switch listens to IGMP messages between the host and the router.

What technology can you use to limit multicasts at Layer 2?

CGMP.

The network-management module has tie-ins to which component(s)?

Campus infrastructure, server farm, Enterprise Edge

Fast transport High reliability Redundancy Fault tolerance Low latency and good manageability Avoidance of slow packet manipulation caused by filters or other processes Limited and consistent diameter QoS

Core

In the hierarchical network model, which layer is responsible for fast transport?

Core

Users access servers located on a server VLAN and servers located in departmental VLANs. Users are located in the departmental VLAN. What is the expected traffic flow from users to servers? a. Most traffic is local. b. All traffic requires multilayer switching. c. There is no need for multilayer switching. d. Most of the traffic will have to be multilayer switched.

D

Which Cisco IOS feature simplifies spanning tree topology? a. Rapid PVST+ b. MST c. MISTP 802.1W d. VSS

D

Which of the following are server connectivity methods in the server farm? a. Single NIC b. EtherChannel c. Content switch d. All of the above

D. All are server connectivity options.

Which of the following are threats to the edge distribution? a. IP spoofing b. Network discovery c. Packet-capture devices d. All of the above

D. All are threats to the enterprise edge distribution.

Which of the following is a *DC aggregation* layer best practice? a. Reduce switch peering and routing. b. Use HSRP and summarize routes. c. Disable trunking and use RPVST+. d. Offload SSL sessions and use load balancers.

D. Load balancers, SSL offloading, firewalls, and intrusion detection devices are deployed in the DC aggregation layer.

In the hierarchical network model, at which layer do security filtering, address aggregation, and media translation occur?

Distribution

Policy-based connectivity Redundancy and load balancing Aggregation of LAN wiring closets Aggregation of WAN connections QoS Security filtering Address or area aggregation or summarization Departmental or workgroup access Broadcast or multicast domain definition Routing between VLANs Media translations (for example, between Ethernet and Token Ring) Redistribution between routing domains (for example, between two different routing protocols) Demarcation between static and dynamic routing protocols

Distribution

Which business forces affect decisions for the enterprise network? a. Removal of borders b. Virtualization c. Growth of applications d. 10GigEthernet e. Regulation f. ROI g. Competitiveness

E, F, G. Regulation, ROI, and competitiveness are business forces.

Campus core Building distribution Building access Server farm/data center

Enterprise Campus Module

Which Enterprise Architecture model component interfaces with the service provider (SP)?

Enterprise edge

What device filters broadcasts? a. Layer 3 switch b. Hub c. Layer 2 switch d. Router e. a and c f. a and d g. a, c, and d

F. Routers and Layer 3 switches are Layer 3 devices that control and filter network broadcasts.

True or false: Layer 2 switches control network broadcasts.

False. Layer 2 switches limit only the collision domain.

True or false: You can configure both CGMP and IGMP snooping in mixed Cisco switch and non-Cisco router environments.

False. You can configure the CGMP only if both the router and switch are Cisco devices. IGMP snooping can be configured in mixed environments.

What device limits the collision domain? a. Layer 2 switch b. Hub c. Layer 3 switch d. Router e. a and c f. c and d g. a, c, and d

G. Every port of a Layer 2 switch, Layer 3 switch, or LAN port on a router is a collision domain.

Which of the following is/are method(s) of workstation-to-router redundancy in the access layer?

HSRP, VRRP

What are two VLAN methods you can use to carry marking CoS on frames?

ISL and IEEE 802.1p/Q are two methods for CoS. ISL was created by Cisco and uses an external tag that contains 3 bits for marking. IEEE 802.1p specifies 3 bits for marking that is carried in the internal tag of IEEE 802.1Q. The IEEE 802.1p specification is not included in the IEEE 802.1D-1998 standard.

What are two methods to mark frames to provide CoS?

Inter-Switch Link (ISL) and IEEE 802.1p/802.1Q.

Network resiliency and control occur in which layer of the borderless network architecture?

Network resiliency and control occur in the borderless network service layer

List the PPDIOO phases in order.

Prepare, Plan, Design, Implement, Operate, Optimize.

Presence occurs in which collaboration architecture layer?

Presence occurs under Collaboration Services

Which of the following is an SP edge module in the Cisco Enterprise Architecture model?

Public Switched Telephone Network Service (PSTN)

Which technology forces affect decisions for the enterprise network?

Removal of borders, virtualization, and growth of applications are technology forces

In which module would you place Cisco Unified Communications Manager (CUCM)?

Server Farm

Which PBM process provides dedicated resources to troubleshoot issues within the network?

Solution Support provides dedicated resources to troubleshoot issues within the network.

In which PBM phase is the network designed?

The plan phase is when the network is designed.

What are the three primary sources of information in a network audit?

The primary sources of network audits are listing documentation

Which design solution states that a design must start from the application layer and finish in the physical layer?

The top down design approach started the design from the application layer

Budget and personnel limitations are examples of what?

These are examples of organization constraints.

Improving network response time and reliability are examples of what?

These are examples of technical goals.

True or false: Packet marking is also called coloring.

True.

True or false: Usually, the distribution and core layers are collapsed in medium-size networks.

True.

True or false: IP phones and LAN switches can reassign a frame's CoS bits.

True. IP phones reclassify incoming frames from the PC. Switches can accept or reclassify incoming frames.

True or false: Layer 3 switches bound Layer 2 collision and broadcast domains.

True. Layer 3 switches and routers control both the collision and broadcast domains.

__ solves the STP looping problem by converting the distribution switching pair into a logical single switch

VSS (Virtual Switching System)

The __ layer provides workgroup and user access to the network

access

The __ layer provides fast transport between distribution switches within the enterprise campus

core

When a network uses routers, the number of router hops from edge to edge is called the __

diameter

The __ layer provides policy-based connectivity

distribution

Route __ is configured on interfaces toward the access layer.

filtering

Cost savings, ease of understanding, modular network growth, and improved fault isolation are benefits of the __ __

hierarchical model

Match each enterprise campus component with its description. i. Campus infrastructure ii. Server farm iii. Edge distribution a. Consists of backbone, building-distribution, and building-access modules b. Connects the campus backbone to the enterprise edge c. Provides redundancy access to the servers

i = A, ii = C, iii = B.

Match each application type with its description. i. Peer to peer ii. Client-local server iii. Client/server farm iv. Client-enterprise edge a. Server on the same segment b. IM c. Web access d. Client accesses database server

i = B, ii = A, iii = D, iv = C

Match each transmission medium with its upper-limit distance. i. UTP ii. Wireless iii. Single-mode fiber iv. Multimode fiber a. 2 km b. 100 m c. 90 km d. 500 m

i = B, ii = D, iii = C, iv = A

Match each LAN medium with its original physical specification. i. Fast Ethernet ii. Gigabit Ethernet iii. WLAN iv. Token Ring v. 10 Gigabit Ethernet a. IEEE 802.3ab b. IEEE 802.11b c. IEEE 802.3u d. IEEE 802.3ae e. IEEE 802.5

i = C, ii = A, iii = B, iv = E, v = D.

Match each infrastructure service with its description. i. Identity ii. Mobility iii. Storage iv. Compute v. Security vi. Voice/collaboration a. Access from a remote location b. Improved computational resources c. Unified messaging d. AAA, NAC e. Storage of critical data f. Secure communications

i = D, ii = A, iii = E, iv = B, v = F, vi = C.

Match each PPDIOO phase with its description i. Implement ii. Optimize iii. Design iv. Prepare v. Operate vi. Plan a. Establish requirements b. Gap analysis c. Provides high-availability design d. Installation and configuration e. Day to day f. Proactive management

i = D, ii = F, iii = C, iv = B, v = E, vi = A.

Match each LAN device type with its description. i. Hub ii. Bridge iii. Switch iv. Layer 3 switch v. Router a. Legacy device that connects two data link layer segments b. Network layer device that forwards packets to serial interfaces connected to the WAN c. High-speed device that forwards frames between two or more data link layer segments d. High-speed device that bounds data link layer broadcast domains e. Device that amplifies the signal between connected segments

i = E, ii = A, iii = C, iv = D, v = B

Route __ is configure on interfaces toward the core layer

summarization


Related study sets

U4 L1: Civilizations in Middle America

View Set

Naming & Writing Formulas for Acids

View Set

California - Unit 6, Hunter's Ed, Hunters Education Safety Course, California- Unit 5, California- Unit 8, California- Unit 3, California- Unit 3, Cali..., Hunters Course, California - Unit 6, Hunter's Ed, Hunters Education Safety Course, California-...

View Set

Chapter 6: Markets & Social Security

View Set