Tải bản đầy đủ (.pdf) (103 trang)

Tài liệu Designing for Cisco Internetwork Solutions (DESGN) Exam 640-861 Edition 2.0 pdf

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (640.37 KB, 103 trang )






Fravo.com
Certification Made Easy



MCSE, CCNA, CCNP, OCP, CIW, JAVA, Sun Solaris, Checkpoint
World No1 Cert Guides




Designing for Cisco Internetwork
Solutions (DESGN)
Exam 640-861


Edition 2.0







© Copyrights 1998-2005 Fravo Technologies. All Rights Reserved.
640-861


1
Congratulations!!

You have purchased a Fravo Technologies. Study Guide.

This study guide is a complete collection of questions and answers that have
been developed by our professional & certified team. You must study the
contents of this guide properly in order to prepare for the actual certification test.
The average time that we would suggest you for studying this study guide is
approximately 15 to 20 hours and you will surely pass your exam. We guarantee
it!

GOOD LUCK!




DISCLAIMER
This study guide and/or material is not sponsored by, endorsed by or affiliated
with Microsoft, Cisco, Oracle, Citrix, CIW, CheckPoint, Novell, Sun/Solaris,
CWNA, LPI, ISC, etc. All trademarks are properties of their respective owners.




Guarantee
If you use this study guide correctly and still fail the exam, send a scanned copy
of your official score notice at:

We will gladly refund the cost of this study guide or give you an exchange of

study guide of your choice of the same or lesser value.




This material is protected by copyright law and international treaties.
Unauthorized reproduction or distribution of this material, or any portion thereof,
may result in severe civil and criminal penalties, and will be prosecuted to the
maximum extent possible under law.


© Copyrights 1998-2005 Fravo Technologies. All Rights Reserved.



640-861
2

Q1. Which solution can be deployed at the receiving end of a converged network to help
smooth voice traffic that has been affected by variable delay?

A. Dejitter buffers
B. Higher compression
C. Reduces compression
D. Link fragmentation and interleaving

Answer: A


Q2. When designing a network that will incorporate fault management, you must

incorporate components that will achieve which three goals? (Choose three.)

A. Incorporate intrusion detection
B. Detect network error conditions
C. Log network events
D. Notify network administrators
E. Discover network topology

Answer: B, C, D


Q3. What is the first task that a network designer should perform when documenting the
customer requirements and existing environment of a network design project?

A. Assess the scope of the design project.
B. Identify applications, both planned and installed.
C. Identify the customer’s business constraints.
D. Assess the customer’s business goals.

Answer: D


Q4. Network security design involved these steps: (Choose all that apply.)

A. Analysis of security risks.
B. Training of users, managers, and technical staff.
C. Identification of network assets.
D. Identification of routing protocol metrics.
E. Analysis of security requirements and tradeoffs.


Answer: A, B, C, E


Q5. When are SNMP Trap messages sent?

A. When NMS need to initialize agents.
B. When agents have events to report to an NMS.
C. When an NMS wants agents to begin recording events.
640-861
3
D. When an NMS wants a proxy station to take over agent monitoring.

Answer: B


Q6. AAA Video operates a chain of 50 video rental stores located in the Northwestern
United States. They currently have a Point-of-Sale (POS) system in which each store
posts its daily sales data and inventory changes to a central database through dial-up
communication. There is no interaction between the stores and the central system
during business hours. The central site runs on an Ethernet LAN. The only always-on
WAN link is an Internet connection using wireless broadband to a local ISP.

AAA wants to enhance their service offering by creating a new E-Commerce web site
where customers can browse and search a catalog of video titles and select the ones
they want for rental. The system will instantly communicate the order to the nearest store
where employees pull the order and hold it until the customer picks it up. The service
must operate on a 24x7 basis. AAA sees this new business strategy as a means to
increase revenue and expand the business nationally. They see an opportunity to
expand the web site in the future to video, DVD and music sales on a worldwide level.


The company wants all stored to be connected to the central site through WAN links.
The company is upgrading the central inventory database so that sales and rentals can
be posted immediately in real-time. An Internet-based email and instant-messaging
system will be set up for all headquarters employees and store managers to use. AAA
believes that networking the stores will improve order fulfillment processes, which will
improve customer satisfaction and thus, boost revenue. It will also help communication
with store employees.

AAA wants to upgrade the local LAN to a Gigabit and Fast Ethernet system to facilitate
the demands of the new and upgraded systems. They have budgeted $500,000 for the
networking equipment and another $10,000/month for the WAN charges including a
faster Internet connection. They believe that 256Kbps speeds will be adequate to the
stores. Since they have no staff capable of managing the new network, they will hire two
engineers that already have the training and experience. The project must be complete
in 6 months when the new inventory system goes online.

The IT manager has concerns about the security of the servers and workstations on the
network when all stores become connected. He doesn’t want any Internet access to or
from the stores. He is depending on you to recommend an effective yet affordable
solution that will protect his system from intruders.

Which two are business goals of AAA video that apply to this network design project?
(Choose two.)

A. Improvement of the order fulfillment process.
B. Production deployment in 6 months.
C. New messaging systems.
D. The hiring of skilled IT staff.
E. Increase revenue through the E-Commerce site.


Answer: A, E
640-861
4

Explanation: Since the company now requires all stores to communicate full-time to the
central site, a much better order fulfillment process can be achieved.
The company is investing in a new network design in order to generate more revenue by
applying a more hierarchical management approach.

Incorrect Answers:
B: This is a constraint, not a goal.
C: This is an improvement.
D: This is an expenditure concern.


Q7. Before any changes are made to a customer network the current network must be
documented.

What should be included in this documentation? (Choose all that apply.)

A. Addressing schemes
B. Concerns about the network
C. Protocol analysis
D. Network topology

Answer: A, B, D


Q8. A company is expanding into a multinational organization and has hired a network
consultant to assist them with planning a new network design. At a monthly presentation

the consultant is going to recommend that the company use a routing protocol that will
support a network design that cannot be structured into a hierarchy.

Which routing protocol should he recommend?

A. OSPF
B. EIGRP
C. IS-IS
D. GR
E. BGP

Answer: E


Q9. Which three describe the primary functions of the Access Layer of the campus
network design hierarchy? (Choose three.)

A. Provides end-user connectivity.
B. Provides route summarization.
C. Provides remote office connectivity.
D. Provides policy-based routing.
E. Connects shared LAN devices.

Answer: A, C, E
640-861
5


Q10. A prototype network is used to test a proposed network redesign solution. Although
the test seemed to be successful, network performance is unacceptable when

implemented in the live network.

What was wrong with the prototype network test?

A. The prototype should have been built on the live network.
B. The prototype failed to test for the proper characteristics.
C. The prototype network didn’t match the live network exactly.
D. Different configuration parameters existed in the prototype network.

Answer: B


Q11. The successful implementation of which two testing techniques can be used for
proof of concept of a network design? (Choose two.)

A. Pilot network
B. Simulation lab
C. Prototype network
D. Verification network
E. Modular network

Answer: A, C


Q12. When are SNMP Trap messages sent?

A. When NMS need to initialise agents.
B. When agents have events to report to an NMS
C. When an NMS wants agents to begin recording events.
D. When an NMS wants a proxy station to take over agent monitoring.


Answer: B


Q13. The West Ridge School District in North Carolina has approximately 2,800
students occupying five schools: three grade schools, one junior high, and one high
school. All telephone service is handled by the local phone company. Every phone call is
switched by the providers centrex switch, then routed to the appropriate school.

Each school is networked with fractional T1 Frame Relay and Cisco routers. The users
are on a switched 10/1/100 network utilizing Cisco switched and Category 5 cable.
Internet access is through the high school, which has an Internet connection through a
provider 35 miles away via a T1 Frame Relay.

The school district needs to put phones in each classroom for compliance with the Safe-
Schools initiative, but the cost is high and facilities are lacking. In addition to the phones,
640-861
6
the district would like to install video in each school for video conference and for distance
learning in the high school. Video partners will be connected with ISDN PRI LINKS.

There is also a need to protect the student information stored on local serves and shared
between the schools are as students graduate from elementary school to junior high,
and students transfer in and out of the district.

How can you protect the student records when in transit between schools and when
being shared with other school districts over the Internet?

A. Authenticate users
B. Secure fingerprints

C. Encrypt the data
D. Log all access attempts

Answer: C

Explanation: All the options seem to be correct. But, if I have to choose one, then I will
go with encryption of the data. It is the single item that will cause any illegal acquisition
of the data unusable.


Q14. An SNMP-managed network consists of which principal components? (Choose all
that apply.)

A. Firewalls
B. Agents
C. Network-management systems
D. Managed devices

Answer: B, C, D


Q15. To ensure that productivity remains high and the quantity of user complaints is low,
network response time should be a maximum of?

A. 150 milliseconds
B. 50 milliseconds
C. 25 milliseconds
D. 100 milliseconds

Answer: D



Q16. SNMPv3 added which enhancement to the protocol that did not exist in version 1
or 2?

A. Http transport
B. Vendor-specific MIBs
C. Increased performance
D. Secure transmission
640-861
7

Answer: D


Q17. When choosing a route, which metric can be used by the IGRP protocol? (Choose
all that apply)

A. Bandwidth
B. Hops
C. Reliability
D. Fault Tolerance
E. Link Cost

Answer: A, C


Q18. AAA Video operates a chain of 50 video rental stores located in the Northwestern
United States. They currently have a Point-of-Sale (POS) system in which each store
posts its daily sales data and inventory changes to a central database through dial-up

communication. There is no interaction between the stores and the central system
during business hours. The central site runs on an Ethernet LAN. The only always-on
WAN link is an Internet connection using wireless broadband to a local ISP.

AAA wants to enhance their service offering by creating a new E-Commerce web site
where customers can browse and search a catalog of video titles and select the ones
they want for rental. The system will instantly communicate the order to the nearest store
where employees pull the order and hold it until the customer picks it up. The service
must operate on a 24x7 basis. AAA sees this new business strategy as a means to
increase revenue and expand the business nationally. They see an opportunity to
expand the web site in the future to video, DVD and music sales on a worldwide level.
The company wants all stored to be connected to the central site through WAN links.

The company is upgrading the central inventory database so that sales and rentals can
be posted immediately in real-time. An Internet-based email and instant-messaging
system will be set up for all headquarters employees and store managers to use. AAA
believes that networking the stores will improve order fulfillment processes, which will
improve customer satisfaction and thus, boost revenue. It will also help communication
with store employees.

AAA wants to upgrade the local LAN to a Gigabit and Fast Ethernet system to facilitate
the demands of the new and upgraded systems. They have budgeted $500,000 for the
networking equipment and another $10,000/month for the WAN charges including a
faster Internet connection. They believe that 256Kbps speeds will be adequate to the
stores. Since they have no staff capable of managing the new network, they will hire two
engineers that already have the training and experience. The project must be complete
in 6 months when the new inventory system goes online.

The IT manager has concerns about the security of the servers and workstations on the
network when all stores become connected. He doesn’t want any Internet access to or

from the stores. He is depending on you to recommend an effective yet affordable
solution that will protect his system from intruders.
640-861
8

Which are three technical constraints imposed by AAA Video on this network design
project? (Choose three.)

A. The POS system.
B. Improved employee communication through instant messaging.
C. The wireless Internet connection.
D. 24x7 availability
E. The central site Ethernet LAN.

Answer: C, D, E

Explanation: Wireless Internet connection is a constraint because of the limited
bandwidth it is able to provide.
To provide 24x7 availability will require redundancy configurations, which is technical in
nature.
The central site Ethernet LAN is also a technical constraint because it is a hub-spoke
topology where a single point of failure (central) will cause the whole network dead.

Incorrect Answers:
A: This is an Application layer concern.
B: This is a business/customer service concern.


Q19. Each set of an implementation plan should consist of which three items of
information? (Choose three.)


A. A description of the step’s objective.
B. A detailed implementation guidelines.
C. A reference to a section in the design document.
D. Summary of requirements to be fulfilled by the step.
E. Listing of applicable device configurations.

Answer: A, B, C


Q20. Exhibit: (Refer the EXHIBIT given below.)


640-861
9



The exhibit shows a customers network as diagramed by the network manager. Based
on the information in the diagram, which two Layer 2 or Layer 3 protocols must be
supported in the new network design? (Choose two.)

A. Appletalk
B. SNA
C. Token Ring
D. IPX
E. NFS

Answer: B, C



Q21. Which two methods provide data integrity? (Choose two.)

A. Token cards
B. Digital signatures
C. Two-factor authentication
D. Secure fingerprints

Answer: B, D


Q22. Match the network management component with its function. (Refer the EXHIBIT
given below.)


640-861
10


Answer:

Agent: Generate traps of events
MIB: store information about network objects
SNMP: management transport mechanism
Manager: periodically collects object information


Q23. The advantages of using static routes are: (Choose all that apply.)

A. Efficient use of router resources.

B. Increased security due to known routes.
C. A single path into and out of a network.
D. Route calculations made by network administrators.

Answer: A, B


Q24. Which of the following are components included in the Cisco SAFE architecture?
(Choose three.)

A. Multicast Router
B. Enterprise Edge
C. Dynamic VLANs
D. Enterprise Campus
E. SP Edge

Answer: B, D, E


Q25. A newly hired sales representative is trying to decide upon a WAN solution that will
allow her to communicate with the corporate office located over 500 miles from her
home. She most be able to access the company web server and send e-mail with
attachments throughout her entire 8-hour workday.

Which of the following would be the most cost effective for her to use?

640-861
11
A. ISDN
B. Satellite

C. Leased Line
D. DSL
E. ARM

Answer: D


Q26. Which two characteristics are affected by choice of codec when designing
networks to carry IP telephony? (Choose two.)

A. Voice quality
B. Silence packet handling
C. Voice packet header size
D. Bandwidth required for voice calls

Answer: A, D


Q27. Why would you recommend classless routing protocols for a network?

A. Minimize convergence time.
B. Increase security and availability.
C. Suit the flat structure of the network.
D. Accommodate mixed vendor environment.
E. Support variable length subnet masking.

Answer: E


Q28. Cisco Systems uses a three-layer hierarchical model to describe network design

topologies.

Which three layers are included in this model? (Choose three.)

A. Designated
B. Distribution
C. Core
D. Access

Answer: B, C, D


Q29.Exhibit: (Refer the EXHIBIT given below.)


640-861
12


A timber wholesaler in China has four servers accessible via the Internet and
approximately 100 users. They primarily deal with 20 customers locate din eight different
countries. They want to improve availability of their servers to their customers (see
diagram).

Which three components would you duplicate to achieve this? (Choose three.)

A. Layer 3 switch
B. Layer 2 switch
C. User connections
D. ATM connection

E. Customers connection to the network

Answer: A, B, D


Q30. Which two Cisco router services perform network traffic analysis to assist in
documenting a customer’s existing network? (Choose two.)

A. NetFlow
B. CDP
C. MRTG
D. NetMon
E. SNMP MIB compiler

Answer: A, B


Q31. You’ve designed a converged network to carry voice calls on-net as close as
possible to the destination to avoid long distance charges.

640-861
13
Which two are reasons that a VoIP call could go off-net earlier than designed? (Choose
two)

A. Remote voice gateway sending busy-back signal.
B. Destination routing not configured on local and remote gateways.
C. Call manager server is too busy to process the call.
D. The telephone user dials an access code.


Answer: A, D


Q32. Which items are important when documenting the business requirements of a
company? (Choose two.)

A. Fixture company growth
B. IP address assignments
C. Current network topology
D. Router software upgrades
E. Customer support improvements
F. Fixture software applications

Answer: A, E


Q33. What topology is represented in Diagram 1?

A. High-level topology map of the customers current network.
B. High-level topology map of the customers proposed e-mail packet flow.
C. High-level topology map that meets the customers requirements.
D. High-level topology map of the customers proposed intranet security system.

Answer: A


Q34. Which three modules comprise the Enterprise Composite Network Model?
(Choose three.)

A. Enterprise Campus

B. Enterprise Edge
C. Enterprise Server Edge
D. Enterprise Core Backbone
E. Service Provider Edge

Answer: A, B, E


Q35. Which three terms describe the primary functions of the core layer of the campus
network design hierarchy? (Choose three.)

A. High-speed transport
B. Fault tolerance
640-861
14
C. Packet filtering
D. Security
E. Manageability

Answer: A, B, E


Q36. Which of the following statements regarding SNMP commands is false?

A. Control of managed devices occurs when the NMS issues the write command.
B. An agent reports an event when the managed device issues the trap command.
C. Managed devices use the trap command when reporting events to the NMS.
D. The NMS requests events from the managed devices when it issues the trap
command.


Answer: D


Q37. A small state college is planning to improve the security of their campus network, in
particular the dorm network.

Which information provided by the college is most relevant to the new design?

A. User policy
B. Number of users
C. Applications permitted
D. Speed of the network

Answer: A


Q38. You need to show proof of concept for a proposed new campus network that
utilizes Layer 3 switching. The production network is business critical and no network
disruptions are tolerated.

Which approach should be used for this test?

A. Pilot network
B. Prototype network
C. Live network
D. Verification design

Answer: B



Q39. When designing IPv6 into an existing IPv4 network, which two strategies allow the
two address schemes to coexist to facilitate a migration? (Choose two.)

A. Translate one protocol into the other.
B. Encapsulate IPv6 packets into IPv4 packets.
C. Bridge between the IPv6 IPv4 networks.
640-861
15
D. Enable anycast capability in the routing protocol.

Answer: A, B


Q40. According to the Cisco SAFE Architecture, the Enterprise Campus consists of
which modules? (Choose three.)

A. Server
B. WAN
C. Corporate Internet
D. Building Distribution
E. Core

Answer: A, D, E


Q41. What is the third step in building a pilot network?

A. Investigate the competition.
B. Test the design.
C. Practice the demonstration.

D. Schedule and present the demonstration.
E. Script a demonstration of the test results.

Answer: E


Q42. AAA Video operates a chain of 50 video rental stores located in the Northwestern
United States. They currently have a Point-of-Sale (POS) system in which each store
posts its daily sales data and inventory changes to a central database through dial-up
communication. There is no interaction between the stores and the central system
during business hours. The central site runs on an Ethernet LAN. The only always-on
WAN link is an Internet connection using wireless broadband to a local ISP. AAA wants
to enhance their service offering by creating a new E-Commerce web site where
customers can browse and search a catalog of video titles and select the ones they want
for rental. The system will instantly communicate the order to the nearest store where
employees pull the order and hold it until the customer picks it up. The service must
operate on a 24x7 basis. AAA sees this new business strategy as a means to increase
revenue and expand the business nationally. They see an opportunity to expand the web
site in the future to video, DVD and music sales on a worldwide level.

The company wants all stored to be connected to the central site through WAN links.
The company is upgrading the central inventory database so that sales and rentals can
be posted immediately in real-time. An Internet-based email and instant-messaging
system will be set up for all headquarters employees and store managers to use. AAA
believes that networking the stores will improve order fulfillment processes, which will
improve customer satisfaction and thus, boost revenue. It will also help communication
with store employees.

640-861
16

AAA wants to upgrade the local LAN to a Gigabit and Fast Ethernet system to facilitate
the demands of the new and upgraded systems. They have budgeted $500,000 for the
networking equipment and another $10,000/month for the WAN charges including a
faster Internet connection. They believe that 256Kbps speeds will be adequate to the
stores. Since they have no staff capable of managing the new network, they will hire two
engineers that already have the training and experience. The project must be complete
in 6 months when the new inventory system goes online.

The IT manager has concerns about the security of the servers and workstations on the
network when all stores become connected. He doesn’t want any Internet access to or
from the stores. He is depending on you to recommend an effective yet affordable
solution that will protect his system from intruders.

What are three technical goals of AAA Video with regard to this network design project?
(Choose three.)

A. Sell merchandise through the E-Commerce site.
B. Real-time posting of sales.
C. Network security measures.
D. Hire two new network engineers.
E. Upgrade to a high-performance LAN.
F. Enhance service offerings.

Answer: B, C, E


Q43. You are designing an IP addressing system for a large home, which has IP
enabled end-systems (appliance, light switches, security systems, heating/coding
systems and video cameras). This network is connected to the Internet 24 hours a day
via an ADSL connection and uses Network Address Translation (NAT). The end-

systems on this network are remotely accessed by the home owner to monitor the
activities in her home.

What IP addressing system would be most suitable for these end-systems?

A. Public IPv4 addresses
B. Private IPv4 addresses
C. A combination of Private and Public IPv4 addresses
D. Micro-IP addresses
E. IPv6 addresses

Answer: B


Q44. A very large organization has received its IPv6 address range from their Internet
Service Provider and intend to use only IPv6 addresses internally. They will access the
Internet through port address translation (PAT).

What is a requirement for their Domain Name Servers, DNS?

A. They no longer need DNS servers.
640-861
17
B. Their DNS servers need to support both IPv4 and IPv6 addresses.
C. Their DNS servers need to support only IPv6 addresses.
D. Their DNS servers need to support only IPv4 addresses.
E. They need additional DNS servers in their network just for IPv6 addresses.
F. There are no changed required to their DNS servers.

Answer: B



Q45. WAN technologies operate at which three layers of the Open Systems Interconnect
(OSI) model? (Choose three.)

A. Presentation
B. Data Link
C. Transport
D. Physical
E. Session
F. Network

Answer: B, D, F


Q46. Which step should you consider when an inexperienced network engineer is
implementing the design?

A. Make the design implementation description as detailed as possible.
B. Have the designer carry out the complex implementation steps.
C. Prevent detailed steps that require the involvement of other staff members.
D. Create less detailed implementation steps that exclude the direct involvement of the
designer.

Answer: A


Q47. In which network is the IP address 144.10.63.0 a valid node address that can be
used on a workstation or other network device?


A. 144.10.62.0 /23
B. 144.10.62.0 /24
C. 144.10.63.0 /24
D. 144.10.63.0 /25

Answer: A


Q48. Upon visiting a customer site it is determined that a three-part firewall system
should be implemented as a security measure.

Which of the following components would be included? (Choose all that apply.)

A. A router acting as an inside packet filter.
640-861
18
B. An independent WAN.
C. An isolation LAN.
D. A router acting as an outside packet filter.

Answer: A, C, D


Q49. What information will you need to include in your implementation to allow the
engineer to gather further details?

A. Corporate policies regarding protocols, standards, vendors, and applications.
B. Reference to design documents.
C. Availability of trained personnel within the organization.
D. Budgetary resource limitations.


Answer: B


Q50. Under ideal network design conditions, at which layer are most Layer 3 routing
features such as summarization and redistribution performed?

A. Core
B. Distribution
C. Access
D. External

Answer: B


Q51. What is a function of a firewall?

A. Maintains separate routing information for each protocol supported on a router.
B. Provides a security buffer between connected public networks and a private network.
C. Provides user authentication between connected public networks and a private
network.
D. Reduces routing loops by preventing the flow of routing information to the source
where that information was learned.

Answer: B


Q52. The routers on a network are being documented for a technical report.
Choose the items that should be included in his report. (Choose three.)


A. Interface error statistics
B. Router software revision
C. Router power requirements
D. Interface loads
E. Interface configurations

Answer: A, B, E
640-861
19


Q53. Your IP addressing requirements exceed the public class C address range
assigned to your company, so you’ve implemented private addressing.
Which mechanism would allow all your users simultaneous access to the Internet?

A. Translate using static NAT.
B. Translate using dynamic NAT.
C. Implement VLANs.
D. Secondary IP network.

Answer: B


Q54. The Mean Time Between Failure (MTBF) is a measurement of:

A. Capacity
B. Response time
C. Utilization
D. Efficiency
E. Availability


Answer: E


Q55. Why are the PCM codecs uses in Europe and parts of Asia incompatible with those
used in North America and Japan?

A. Echo cancellation
B. Code companding
C. Pulse sampling
D. Noise suppression
E. Band limiting

Answer: B


Q56. User A and User B work in separate buildings on a campus network. User A sends
a packet to use B with an instant messaging application. Please place the actions that
are performed on the packet in the proper sequential order as it travels from UserA to
UserB. (Refer the EXHIBIT given below.)

640-861
20


Answer: The correct order of the steps is as given below:

Step 1: Layer-2 switched toward the distribution switch
Step 2: Layer-3 switched through Distribution toward core
Step 3: Layer-3 switched across LAN core

Step 4: Layer-3 switched through Distribution toward access
Step 5: Layer-2 switched across access LAN to target host

Explanation: Typically implementations follow the Layer2-Layer3-Layer2 model in the
Cisco Model. Only without budget constraints is the Layer2-Layer3-Layer3 model used
to provide extra features like redundancy in the Core Layer. But in this case, since User
A and User B are in separate buildings, the Layer2-Layer3-Layer3 implementation is to
be used. What happens is that the packet will go from access->distribution->core->
distribution->access.


Q57. You are in the process of designing some changes to a customers network. The
design calls for replacing hubs in several wiring closets with switches. You are planning
for 30% more ports than exist now on the hubs. The customer wants Fast Ethernet
speeds to the workstations. Each closet will be separated into a different IP subnet. All of
the users that will connect to these switches use standard file and print applications plus
Internet browsing.

When designing the access layer of the network, which three questions should be asked
to gain necessary additional information regarding the access layer? (Choose three.)

A. How will VLANs be deployed?
B. What uplink cabling exists?
C. What level of redundancy is needed?
D. Will QoS be needed?
E. Will Gigabit uplinks be used?

Answer: B, C, E



640-861
21
Q58. Steps for designing Network layer addressing and naming include all but the
following:

A. Proposing a method for mapping geographical locations to router clusters.
B. Developing a plan for configuring user station addresses.
C. Designing a hierarchy for addressing.
D. Designing route summarization.
E. Designing a scheme for naming servers, routers, and user stations.

Answer: A


Q59. You are helping a customer design some enhancements to her network for
scalability and availability. You discover that all routers on her network are Cisco but
many of her switches come from different vendors and are owned by the departments
where they are located. She has an outsourcing agreement for the maintenance of the
network equipment. This outsourced service vendor has implemented CiscoWorks with
SAA to manage the network.

What are three Service Level Management challenges that you would need to address
in your design proposal? (Choose three.)

A. Your customer does not own the switches on the network.
B. The switches and routers come from different vendors.
C. She cannot utilize NetFlow on the network.
D. She has no way to monitor SLA conformance.
E. She does not manage the network with her own staff.


Answer: A, B, E


Q60. Which three are essential elements of a network design document that is ready to
be presented to a customer? (Choose three.)

A. Design specifications
B. Organizational chart
C. Implementation plan
D. Proof of concept
E. Data source

Answer: A, C, D


Q61. In a large campus network design, the server farm would normally connect to
which layer in the design hierarchy?

A. Distribution
B. Access
C. Core
D. Edge
E. External
640-861
22

Answer: C


Q62. A medium sized accounting firm has four offices around the country: head office in

Phoenix, and branches in Boston, Chicago and Los Angeles. They want connectivity
between their branches with full redundancy and high availability.
What topology would you recommend for this firm?

A. Point to point
B. Partial mesh
C. Start hub and spoke
D. Full mesh

Answer: D


Q63. Which three steps are used to characterize an existing network? (Choose three.)

A. Customer input
B. Visual inventory
C. Network audit
D. Traffic analysis
E. Server statistics
F. Ping analysis

Answer: A, C, D


Q64. Network Performance is defined by which of the following items? (Choose all that
apply.)

A. Capacity
B. Response time
C. Packet size

D. Utilization
E. Efficiency

Answer: A, B, D, E


Q65. Which statement about developing a network design implementation plan is true?

A. The implementation of a design must be overseen by the designer to ensure
success.
B. Implementation steps described in detail can be performed by a less-experienced
engineer.
C. Fallback steps can be reduced if a detailed pilot completes successfully.
D. Many implementation steps can be performed simultaneously.

Answer: B
640-861
23


Q66. While examining the existing system of a new customer, you discover that their
network management facilities provide a means to detect and correct network device
failures, monitor device and bandwidth utilization, and they use SSH to manage devices.

Which two functional areas of network management has this customer failed to fulfill?
(Choose two.)

A. Fault management
B. Configuration management
C. Accounting management

D. Performance management
E. Security management

Answer: B, C


Q67. What does a tie trunk (tie line) interconnect?

A. PBX switch with another PBX switch.
B. PBX and CO switch (exchange).
C. PBX and remote telephone.
D. CO switch (exchange) and a remote telephone.
E. CO switch (exchange) with another CO switch.

Answer: A


Q68. Virtual Private Networking (VPN) functionality can be provided at Layer 2 by which
two mechanisms? (Choose two.)

A. Leased Line
B. IPSec
C. Sonet/SDH
D. Tunnelling/GRE
E. Frame Relay
F. ATM

Answer: E, F



Q69. Encryption addresses which network security concern?

A. Data integrity
B. User authentication
C. Data authentication
D. Data confidentiality

Answer: D

640-861
24

Q70. An Executive Summary contains all except which items?

A. Benefits of the solution.
B. Strategic recommendations.
C. Purpose of the project
D. Implementation considerations.
E. Cost of the project.

Answer: E


Q71. A multi-layer LAN switches data outside of the source network based on
information stored in which location?

A. RIP tables
B. OSPF tables
C. Bridging tables
D. Route processors


Answer: D


Q72. AAA Video operates a chain of 50 video rental stores located in the Northwestern
United States. They currently have a Point-of-Sale (POS) system in which each store
posts its daily sales data and inventory changes to a central database through dial-up
communication. There is no interaction between the stores and the central system
during business hours. The central site runs on an Ethernet LAN. The only always-on
WAN link is an Internet connection using wireless broadband to a local ISP.

AAA wants to enhance their service offering by creating a new E-Commerce web site
where customers can browse and search a catalog of video titles and select the ones
they want for rental. The system will instantly communicate the order to the nearest store
where employees pull the order and hold it until the customer picks it up. The service
must operate on a 24x7 basis. AAA sees this new business strategy as a means to
increase revenue and expand the business nationally. They see an opportunity to
expand the web site in the future to video, DVD and music sales on a worldwide level.

The company wants all stored to be connected to the central site through WAN links.
The company is upgrading the central inventory database so that sales and rentals can
be posted immediately in real-time. An Internet-based email and instant-messaging
system will be set up for all headquarters employees and store managers to use. AAA
believes that networking the stores will improve order fulfillment processes, which will
improve customer satisfaction and thus, boost revenue. It will also help communication
with store employees.

AAA wants to upgrade the local LAN to a Gigabit and Fast Ethernet system to facilitate
the demands of the new and upgraded systems. They have budgeted $500,000 for the
networking equipment and another $10,000/month for the WAN charges including a

faster Internet connection. They believe that 256Kbps speeds will be adequate to the
stores. Since they have no staff capable of managing the new network, they will hire two

×