You are on page 1of 11

1.

Which two statements are reasons why UDP is used for voice and video traffic i
nstead of TCP? (Choose two.) TCP requires all data packets to be delivered for t
he data to be usable. The acknowledgment process of TCP introduces delays that b
reak the streams of data. UDP does not have mechanisms for retransmitting lost p
ackets. UDP tolerates delays and compensates for them. TCP is a connectionless p
rotocol that provides end-to-end reliability. UDP is a connection-oriented proto
col that provides end-to-end reliability.
Reset View
Scoring Rule For: correctness of response Option 2 and Option 3 are correct. 1 p
oint for each correct option. 0 points if more options are selected than require
d. Max Value = 2
2. Why is TCP the preferred Layer 4 protocol for transmitting data files? TCP is
more reliable than UDP because it requires lost packets to be retransmitted. TC
P requires less processing by the source and destination hosts than UDP. UDP int
roduces delays that degrade the quality of the data applications. TCP ensures fa
st delivery because it does not require sequencing or acknowledgements.
Reset View
Scoring Rule For: correctness of response 2 points for Option 1 0 points for any
other option Max Value = 2
3. Which two solutions would an enterprise IT department use to facilitate secur
e intranet access for remote workers? (Choose two.) VPN NAT user authentication
client firewall software packet sniffing
Reset View
Scoring Rule For: correctness of response
Option 1 and Option 3 are correct. 1 point for each correct option. 0 points if
more options are selected than required. Max Value = 2
4.What is the purpose of the Cisco Enterprise Architecture? remove the three-lay
er hierarchical model and use a flat network approach divide the network into fu
nctional components while still maintaining the concept of Core, Distribution, a
Access Layers provide services and functionality to the core layer by grouping
various components into a single compon located in the access layer reduce overa
ll network traffic by grouping server farms, the management server, corporate in
tranet, and ecommerce routers in the same layer
Reset View
Scoring Rule For: correctness of response 2 points for Option 2 0 points for any
other option Max Value = 2
5. In which functional area of the Cisco Enterprise Architecture should IDS and
IPS be located to detect and prevent malicious activity from outside? enterprise
campus WAN and Internet enterprise edge service provider edge
Reset View
Scoring Rule For: correctness of response 2 points for Option 3 0 points for any
other option Max Value = 2
6.What is a benefit of having an extranet? It provides web-like access to compan
y information for employees only. It limits access to corporate information to s
ecure VPN or remote access connections only. It allows customers and partners to
access company information by connecting to a public web server. It allows supp
liers and contractors to access confidential internal information using controll
ed external connections.
Reset View
Scoring Rule For: correctness of response 2 points for Option 4 0 points for any
other option Max Value = 2
7.What does VoIP provide to telecommuters? high-quality, live-video presentation
s real-time voice communications over the Internet ability to share desktop appl
ications simultaneously secure, encrypted data transmissions through the Interne
t
Reset View
Scoring Rule For: correctness of response 2 points for Option 2 0 points for any
other option Max Value = 2
8. Which functional component of the Cisco Enterprise Architecture is responsibl
e for hosting internal servers? enterprise campus enterprise edge service provid
er edge building distribution
Reset View
Scoring Rule For: correctness of response 2 points for Option 1 0 points for any
other option Max Value = 2
9. Which task would typically only require services located at the access layer
of the hierarchical design model? connecting to the corporate web server to upda
te sales figures
using a VPN from home to send data to the main office servers printing a meeting
agenda on a local departmental network printer placing a VoIP call to a busines
s associate in another country responding to an e-mail from a co-worker in anoth
er department
Reset View
Scoring Rule For: correctness of response 2 points for Option 3 0 points for any
other option Max Value = 2
10. What are two important characteristics or functions of devices at the Enterp
rise Edge? (Choose two.) providing Internet, telephone, and WAN services to the
enterprise network providing a connection point for end-user devices to the ente
rprise network providing high-speed backbone connectivity with redundant connect
ions providing intrusion detection and intrusion prevention to protect the netwo
rk against malicious activity providing packet inspection to determine if incomi
ng packets should be allowed on the enterprise network
Reset View
Scoring Rule For: correctness of response Option 4 and Option 5 are correct. 1 p
oint for each correct option. 0 points if more options are selected than require
d. Max Value = 2
11.The ABC Corporation implements the network for its new headquarters using the
Cisco Enterprise Architecture. The network administrator wants to filter the tr
affic from and to the outside world. Where shou the administrator deploy a firew
all device? server farm enterprise edge enterprise campus service provider edge
Reset View
Scoring Rule For: correctness of response 2 points for Option 2 0 points for any
other option Max Value = 2
12. Which two measures help ensure that a hardware problem does not cause an out
age in an enterprise LAN that supports mission critical services? (Choose two.)
providing failover capability installing redundant power supplies purchasing mor
e bandwidth from the ISP enabling half-duplex connectivity to access layer devic
es installing routers that can handle a greater amount of throughput
Reset View
Scoring Rule For: correctness of response Option 1 and Option 2 are correct. 1 p
oint for each correct option. 0 points if more options are selected than require
d. Max Value = 2
13. Which statement describes the difference between an enterprise WAN and an en
terprise extranet? An enterprise WAN is designed to interconnect local LANs, whi
le an enterprise extranet is designed to interconnect remote branch offices. An
enterprise WAN is designed to interconnect branch offices, while an enterprise e
xtranet is designed to access to external business partners. An enterprise WAN i
s designed to provide remote access for its teleworkers, while an enterprise ext
ranet i designed to provide Internet connectivity for the enterprise. An enterpr
ise WAN is designed to provide Internet connectivity for the enterprise, while a
n enterprise extr is designed to provide remote access to the enterprise network
for teleworkers.
Reset View
Scoring Rule For: correctness of response 2 points for Option 2 0 points for any
other option Max Value = 2
14. What can be found at the enterprise edge? Internet, VPN, and WAN modules Int
ernet, PSTN, and WAN services server farms and network management campus infrast
ructure, including access layer devices
Reset View
Scoring Rule For: correctness of response 2 points for Option 1 0 points for any
other option Max Value = 2
15. A remote user needs to access a networking device on the internal network of
the company. The transact between the remote user and the device must be secure
. Which protocol enables this to happen securely? HTTP SSH Telnet FTP
Reset View
Scoring Rule For: correctness of response 2 points for Option 2 0 points for any
other option Max Value = 2
16. A business consultant must use Internet websites to research a report on the
e-business strategies of sever firms and then electronically deliver the report
to a group of clients in cities throughout the world. Which tw teleworker tools
can the consultant use to accomplish this project? (Choose two.) VoIP VPN HTTP
Telnet email
Reset View
Scoring Rule For: correctness of response Option 3 and Option 5 are correct. 1 p
oint for each correct option. 0 points if more options are selected than require
d. Max Value = 2
17. How does a VPN work to support remote user productivity? It uses SSL to encr
ypt remote user logins to the corporate intranet. It uses secure Telnet for remo
te user connections to internal network devices.
It creates a virtual circuit that allows real-time communications between any tw
o Internet endpoints. It uses encapsulation to create a secure tunnel for transm
ission of data across non-secure networks.
Reset View
Scoring Rule For: correctness of response 2 points for Option 4 0 points for any
other option Max Value = 2
18. What is the main purpose of the Access Layer in a hierarchically designed ne
twork? performs routing and packet manipulation supplies redundancy and failover
protection provides a high-speed, low-latency backbone serves as a network conn
ection point for end-user devices
Reset View
Scoring Rule For: correctness of response 2 points for Option 4 0 points for any
other option Max Value = 2
19. What type of traffic flow is always considered to be external? file sharing
traffic system updates company e-mail Internet bound traffic transaction process
ing
Reset View
Scoring Rule For: correctness of response 2 points for Option 4 0 points for any
other option Max Value = 2
20. What are two benefits of controlling the flow of traffic in an enterprise ne
twork? (Choose
two.) security smaller failure domains more reliable transaction processing band
width optimization local control of network services
Reset View
Scoring Rule For: correctness of response Option 1 and Option 4 are correct. 1 p
oint for each correct option. 0 points if more options are selected than require
d. Max Value = 2
21. What are two important guidelines when using packet sniffers to determine tr
affic flow patterns? (Choos two.) Capture only traffic from a single application
at a time. Perform the capture on several different network segments. Create a
baseline capture during a low or non-utilization period. Relocate highly active
servers before attempting the capture. Capture traffic during peak utilization t
imes.
Reset View
Scoring Rule For: correctness of response Option 2 and Option 5 are correct. 1 p
oint for each correct option. 0 points if more options are selected than require
d. Max Value = 2
22. Which three items can be discovered by using a packet sniffer application? (
Choose three.) network transmission speed source IP address Ethernet frame type
duplex operational status near-end crosstalk (NEXT) level TCP sequence number
Reset View
Scoring Rule For: correctness of response
Option 2, Option 3, and Option 6 are correct. 1 point for each correct option. 0
points if more options are selected than required. Max Value = 3
23. What are two benefits to an employee of teleworking? (Choose two.) reduced c
ommuting costs reduced network complexity reduced need for support staff reduced
need for expensive business attire reduced security risks to the network infras
tructure
Reset View
Scoring Rule For: correctness of response Option 1 and Option 4 are correct. 1 p
oint for each correct option. 0 points if more options are selected than require
d. Max Value = 2
24. Which protocol and process could be implemented on a network to ensure that
a telecommuter can attend a training presentation via the use of VoIP and still
experience uninterrupted data streams and quality conversations? TCP and QoS UDP
and QoS TCP and queuing UDP and VPN TCP and VPN
Scoring Rule For: correctness of response 2 points for Option 2 0 points for any
other option Max Value = 2
Reset View
Reset View

You might also like