You are on page 1of 11

1

In addition to the technical considerations, what other major factor is used to


evaluate the
success of a network installation?

final project costs

maintenance costs

user satisfaction

statistics describing the performance of network devices

2
Which two network applications are most affected by network congestion and
delays? (Choose two.)

IP telephony

live video webcasts

audio file downloads

online banking services

file archival and retrieval

3
What two Cisco tools can be used to analyze network application traffic?
(Choose two.)

NBAR

NetFlow

AutoQoS

Wireshark

Custom Queuing

4
Cisco-Training.net
In network design, which technology can be implemented to prioritize traffic
based on its
importance and technical requirements?

STP

QoS

RTP

TCP

VPN

5
What are two characteristics of voice over IP traffic? (Choose two.)

Voice packets tend to be small.

Voice packets must be processed in real time.

Voice packets can effectively use TCP reliability features.

Voice traffic can survive packet drops and retransmission delays.

Voice packets must be converted to analog before being sent across the IP
network.

Voice packets automatically receive a higher priority value than other types of
packets.

6
What are two things that a network designer can do to determine current and
anticipated network
traffic flows? (Choose two.)

Survey end users to obtain customer input.

Upgrade the Cisco IOS software in all networking devices to optimize traffic
flow.

Limit the analysis to host-to-server traffic because host-to-host traffic is


unimportant.
Cisco-Training.net
Run a network traffic analysis to determine which applications are in use and by
whom.

Conduct an inventory of all networking devices that includes model numbers


and memory configurations

7
A company that has a traditional telephone system wants to convert to IP
telephony. Which two
factors should be considered for the design? (Choose two.)

Digital communications systems have greater noise than analog systems when
processing voice traffic.

Voice-enabled routers or a server must be used for call control and signaling.

Voice to IP conversions can cause router overhead.

Power to the phones can be supplied through properly equipped patch panels or
switches.

The cost to combine voice and data VLANs can be a considerable amount.

8
Several web and email servers have recently been installed as part of an
enterprise network. The
security administrator has been asked to provide a summary of security features
that can be
implemented to help prevent unauthorized traffic from being sent into or out of
sensitive internal
networks. Which three features should the security administrator recommend?
(Choose three.)

firewalls

priority queuing

access control lists

intrusion detection systems

DHCP
Cisco-Training.net
128-bit WEP

9
The design of an IP telephony system needs to meet the technical requirements
to provide a
connection to the PSTN as well as provide high-quality voice transmissions
using the campus
network. Which two elements directly affect the ability of the design to meet
these requirements?(Choose two.)

voice-enabled firewall

PoE switches and patch panels

redundant backbone connectivity

voice-enabled router at the enterprise edge

separate voice and data VLANs with QoS implemented

10
When implementing VoIP services, which two design considerations should be
followed?(Choose two.)

Confirm that network jitter is minimal.

Use TCP to reduce delays and dropped packets.

Establish priority queuing to ensure that large data packets are sent
uninterrupted.

Disable real-time protocols to reduce queuing strategy demands.

Ensure that packet delays do not exceed 150 ms.

11
What design strategy should be followed when designing a network that uses
video on demand?

implement the appropriate routing protocol to ensure that data segments arrive in
order
Cisco-Training.net
implement different QoS queues based on the type of video traffic being
distributed

install servers to store the data in a centrally located server farm

configure queuing in the core routers to ensure high availability

12
When implementing QoS in traffic queues, what is the first step the designer
should take to
ensure that traffic is properly prioritized?

define QoS policies

define traffic classes

determine traffic patterns

identify traffic requirements

identify networking equipment

13
Which two statements are characteristics of file transfer traffic flows? (Choose
two.)

RTP should be used.

Traffic is predictable.

Packets are small in size.

Transfers are throughput intensive.

Response-time requirements are low.

14
Which two items can be determined by diagramming internal traffic flow?
(Choose two.)

the type of ISP services needed


Cisco-Training.net
the capabilities of end-user devices

the areas where network congestion may occur

the location of VPN servers used to connect teleworkers

locations where high-bandwidth connections are required

15
Which two traffic types are examples of external traffic flows? (Choose two.)

A user in the IT department telnets to the core layer router.

A user in marketing connects to the web server of a competitor.

A user in the IT department telnets into the access layer switch.

A user in the services department logs in to a web-based email program.

A user in accounting connects to an FTP server that is connected to the access


layer
switch.

16
Which service can be provided by the NetFlow Cisco utility?

network planning and mapping

IDS and IPS capabilities

peak usage times and traffic routing

network billing and accounting application

security and user account restrictions

source and destination UDP port mapping

17
Refer to the exhibit. If ACL 150 identifies only voice traffic from network
192.168.10.0/24 and no
Cisco-Training.net
other traffic, which queue will voice traffic from other networks use?

high

normal

medium

default

18
Refer to the exhibit. After configuring QoS, a network administrator issues the
command show
queueing interface s0/1. What two pieces of information can an administrator
learn from the
output of this command? (Choose two.)

queue traffic definitions

priority list protocol assignments

type of queuing being implemented

number of packets placed in each queue

queuing defaults that have been changed

queuing has not been applied to this interface

19
An analysis of network protocols reveals that RTP and RTCP are being used.
What uses these
protocols?

IDS

VPN

WLAN

firewall

real-time video
Cisco-Training.net
20
A company is considering adding voice and video to the data networks. Which
two statements are
true if voice and video are added? (Choose two.)

PoE switches must be purchased.

More UDP-based traffic flows will be evident.

Response times will be increased even if QoS is implemented.

QoS will most likely be implemented to prioritize traffic flows.

VPNs will most likely be implemented to protect the voice traffic.

21
Refer to the exhibit. Which option correctly matches the terms on top with its
definition on the
bottom?

A=1, B=3, C=2, D=4

A=2, B=1, C=4, D=3

A=2, B=4, C=1, D=3

A=3, B=2, C=4, D=1

A=4, B=3, C=1, D=2

A=4, B=2, C=3, D=1

22
A database server is configured to purge all data that is 60 days old. Ten data
items that are 60
days old are to be purged. However, there is a failure halfway through the
transaction, and the
entire transaction is voided. What type of transaction action occurred?

atomic

Cisco-Training.net
consistent

durable

isolated

23
What is the primary goal of QoS?

classification of traffic

filtering and queuing voice traffic

reducing bandwidth requirements

providing priority service to selected traffic

24
Which technology provides a mechanism for implementing QoS at Layer 2?

ToS

CoS

DSCP

IP precedence

25
A customer purchases tickets online and pays using a credit card, but the
system goes down before the transaction is complete. What transaction type
retains a
record of this transaction after the system failure so that the customer will still
receive the
tickets and the credit card account will be debited accordingly?

atomic

consistent

durable

Cisco-Training.net
isolated

26
Refer to the exhibit. The network design documents include requirements to
prevent
switching loops, to provide link-specific failover, and to provide Layer 3
recovery. Which
two protocols would be needed to provide the support? (Choose two.)

HDLC

HSRP

PPP

RSTP

VTP

27
network design must minimize latency to support real-time streaming
applications. Which two protocols enable control and scalability of the network
resources
and minimize latency by incorporating QoS mechanisms? (Choose two.)

RTCP

HSRP

RSTP

RTP

RPC

28
Which two major differences are associated with IP telephony when
compared to traditional telephony that uses a PBX? (Choose two.)

manages phones centrally

utilizes centralized call routing


Cisco-Training.net
creates peer-to-peer relationships between phones

requires a separate infrastructure to support data transfer

requires significant manual configuration when adding, moving, or changing


phones

29
When QoS is implemented in a converged network, which two factors can
be controlled to improve performance? (Choose two.)

link speed

delay

packet routing

jitter

packet addressing

Cisco-Training.net

You might also like