Chapter 1: Hierarchical Network Design

Ace your homework & exams now with Quizwiz!

*At which layer of the hierarchical network model do users connect to the network?* A. Access B. Application C. Core D. Distribution E. Network

*A. Access*

*Which two statements correctly describe a collapsed core network design? (Choose two)* A. Also called a two-tier hierarchical network design B. Also called a three-tier hierarchical network design C. Consists of the access layer and distribution layer in one device D. Consists of the access layer and core layer in one device E. Consists of the distribution and core layer in one device

*A. Also called a two-tier hierarchical network design* *E. Consists of the distribution and core layer in one device*

*Which network architecture functions through a combination of technologies that include wired, wireless, security, and more?* A. Cisco Borderless Network B. Cisco Enterprise Branch C. Cisco Enterprise Campus D. Cisco Enterprise Edge E. Cisco Enterprise Teleworker

*A. Cisco Borderless Network*

*Which network architecture combines individual components to provide a comprehensive solution allow people to cooperate and contribute to the production of something?* A. Cisco Collaboration Architecture B. Cisco Enterprise Campus Architecture C. Cisco Enterprise Branch Architecture D. Cisco Enterprise Data Center Architecture E. Cisco Borderless Network Architecture F. Cisco Enterprise Teleworker module

*A. Cisco Collaboration Architecture*

*Which two statements regarding the Cisco AnyConnect software are true? (Choose two)* A. It is part of the borderless end-point/user services. B. It is part of the borderless network services. C. It is used to connect any device to the network. D. It is used to connect from anywhere. E. It is used to connect without an Internet connection. F. It is used to establish a secure, persistent, policy-based connection.

*A. It is part of the borderless end-point/user services.* *F. It is used to establish a secure, persistent, policy-based connection.*

*What layer of the hierarchical network design model is often called the backbone?* A. Access B. Core C. Distribution D. Network E. WAN F. Workgroup

*B. Core*

*Which goal can be accomplished by implementing the Cisco enterprise teleworker module?* A. It allows the enterprise to add large branch sites that span geographic areas. B. It allows the enterprise to deliver secure voice and data services to workers no matter where or when they work. C. To reduce remote security threats, it forces users who are located at main sites to log on to resources. D. It satisfies telephony requirements for users who are located at medium to large enterprise sites.

*B. It allows the enterprise to deliver secure voice and data services to workers no matter where or when they work.*

*Which three devices are found in the access layer of the hierarchical network model? (Choose three)* A. Firewall appliance B. Layer 2 switch C. Layer 3 switch D. Modular multi-layer switch E. VoIP phones F. Wireless access point

*B. Layer 2 switch* *E. VoIP phones* *F. Wireless access point*

*What are the four structured design principles?* A. Availability, flexibility, modularity, and security B. Availability, hierarchy, modularity, quality of service (QoS) C. Flexibility, hierarchy, modularity, resiliency D. Flexibility, modularity, resiliency, and security E. Hierarchy, quality of service (QoS), resiliency, and security F. Hierarchy, modularity, resiliency, and security G. Modularity, quality of service (QoS), resiliency, and security

*C. Flexibility, hierarchy, modularity, resiliency*

*What does the application and device layer of the Cisco Collaboration Architecture do?* A. It contains applications such as Cisco WebEx Meetings, Cisco Jabber, and TelePresence to help users stay connected and productive. B. It is responsible for allowing collaboration anytime, from anywhere, on any device. C. It supports collaboration applications with presence, location, session management, contact management, client frameworks, tagging, and policy and security management.

*C. It supports collaboration applications with presence, location, session management, contact management, client frameworks, tagging, and policy and security management.*

*What should be considered first when starting the network design?* A. Connectivity to the data center B. Connectivity to the branch site C. Protocols required D. Size of the network E. Type of security implemented F. Type of applications

*D. Size of the network*


Related study sets

Personal Finance 10, HDFS 3350 MASTER 13

View Set

Ch 7 Standard Costs and Variances

View Set

American Government Chapter 3: Federalsim Connect Questions

View Set

LAW Chapter 26 - Consumer Protection

View Set