HassanAddan
Newbie level 5
ccna discovery 1 final
After comparing a previous baseline to current network statistics, the network engineer has discovered a significant increase in unwarranted traffic to the extranet. Which two steps simplify administration and control the unwanted traffic? (Choose two.)
define an ACL at the distribution layer to isolate packets
add an ACL at the router in the enterprise edge to block the traffic
deploy a Layer 3 switch to contain broadcasts
connect remote locations directly to the intranet
configure all hosts with the same default gateway to eliminate unnecessary broadcasts
deploy one core ISP router to reduce the delay in path determination
What do companies gain from the services performed at the enterprise edge?
faster communication with server farms
stronger security against malicious attacks
faster communication with Internet destinations
enhanced performance and reliability through VLANs and redundant trunk links
A sales representative is using a wireless connection to make a VoIP call. Which protocol will be used to transport the voice packets?
TCP
UDP
PPP
HDLC
A company is using a Class B IP addressing scheme and expects to need as many as 150 networks. What is the correct subnet mask to use with the network configuration?
255.255.0.0
255.255.240.0
255.255.254.0
255.255.255.0
255.255.255.128
255.255.255.192
Refer to the exhibit. If R4 is announcing all shown internal networks as a summary address to the ISP, which summary address will be most specific?
192.168.1.0/22
192.168.4.0/21
192.168.6.0/23
192.168.8.0/21
192.168.4.0/22
If an authentication protocol is configured for PPP operation, when is the client or user workstation authenticated?
prior to link establishment
during the link establishment phase
before the network layer protocol configuration begins
after the network layer protocol configuration has ended
Refer to the exhibit. R1 and R2 are connected via serial interfaces. Both interfaces show that there is Layer 2 connectivity between them. The administrator verifies that CDP is operational; however, pings between the two interfaces are unsuccessful. What is the cause of this connectivity problem?
no set loopback
incorrect subnet mask on R2
incompatible bandwidth
incorrect IP address on R1
incompatible encapsulation
What are two benefits of implementing VLANs in an enterprise network? (Choose two.)
eliminates the need for a Layer 3 device
provides segmentation of broadcast domains
allows for the propagation of broadcasts from one local network to another
allows for the logical grouping of devices despite physical location
prevents issues such as broadcast storms by ensuring a loop free environment
In which VTP mode can a switch create VLANs, ignore VTP messages, and not pass local VLAN information to other VTP domain members?
client
server
pruning
transparent
Refer to the exhibit. A network support technician has been asked to set an IP address on one of the FastEthernet interfaces on a new router. What is causing the interface to reject the address?
The IP address is already in use.
The technician is using a network address.
The technician is using the wrong subnet mask for /26.
The technician must enable VLSM on the interface.
A sales representative is preparing to send sensitive information to corporate headquarters from a hotel room using the Internet. Prior to the trip, the IT staff made the necessary provisions to allow secure Internet access. What solution was implemented for the sales representative?
VPN
Frame Relay
PPP with CHAP authentication
PPP with PAP authentication
After comparing a previous baseline to current network statistics, the network engineer has discovered a significant increase in unwarranted traffic to the extranet. Which two steps simplify administration and control the unwanted traffic? (Choose two.)
define an ACL at the distribution layer to isolate packets
add an ACL at the router in the enterprise edge to block the traffic
deploy a Layer 3 switch to contain broadcasts
connect remote locations directly to the intranet
configure all hosts with the same default gateway to eliminate unnecessary broadcasts
deploy one core ISP router to reduce the delay in path determination
What do companies gain from the services performed at the enterprise edge?
faster communication with server farms
stronger security against malicious attacks
faster communication with Internet destinations
enhanced performance and reliability through VLANs and redundant trunk links
A sales representative is using a wireless connection to make a VoIP call. Which protocol will be used to transport the voice packets?
TCP
UDP
PPP
HDLC
A company is using a Class B IP addressing scheme and expects to need as many as 150 networks. What is the correct subnet mask to use with the network configuration?
255.255.0.0
255.255.240.0
255.255.254.0
255.255.255.0
255.255.255.128
255.255.255.192
Refer to the exhibit. If R4 is announcing all shown internal networks as a summary address to the ISP, which summary address will be most specific?
192.168.1.0/22
192.168.4.0/21
192.168.6.0/23
192.168.8.0/21
192.168.4.0/22
If an authentication protocol is configured for PPP operation, when is the client or user workstation authenticated?
prior to link establishment
during the link establishment phase
before the network layer protocol configuration begins
after the network layer protocol configuration has ended
Refer to the exhibit. R1 and R2 are connected via serial interfaces. Both interfaces show that there is Layer 2 connectivity between them. The administrator verifies that CDP is operational; however, pings between the two interfaces are unsuccessful. What is the cause of this connectivity problem?
no set loopback
incorrect subnet mask on R2
incompatible bandwidth
incorrect IP address on R1
incompatible encapsulation
What are two benefits of implementing VLANs in an enterprise network? (Choose two.)
eliminates the need for a Layer 3 device
provides segmentation of broadcast domains
allows for the propagation of broadcasts from one local network to another
allows for the logical grouping of devices despite physical location
prevents issues such as broadcast storms by ensuring a loop free environment
In which VTP mode can a switch create VLANs, ignore VTP messages, and not pass local VLAN information to other VTP domain members?
client
server
pruning
transparent
Refer to the exhibit. A network support technician has been asked to set an IP address on one of the FastEthernet interfaces on a new router. What is causing the interface to reject the address?
The IP address is already in use.
The technician is using a network address.
The technician is using the wrong subnet mask for /26.
The technician must enable VLSM on the interface.
A sales representative is preparing to send sensitive information to corporate headquarters from a hotel room using the Internet. Prior to the trip, the IT staff made the necessary provisions to allow secure Internet access. What solution was implemented for the sales representative?
VPN
Frame Relay
PPP with CHAP authentication
PPP with PAP authentication