Kamis, 23 Desember 2010

CCNA Discovery 4 Module 4

| |

1. In addition to the technical considerations, what other major factor is used to evaluate the success of a network installation?
• user satisfaction

2. Which two network applications are most affected by network congestion and delays? (Choose two.)
• IP telephony
• live video webcasts

3. What two Cisco tools can be used to analyze network application traffic? (Choose two.)
• NBAR
• NetFlow

4. In network design, which technology can be implemented to prioritize traffic based on its importance and technical requirements?
• QoS

5. What are two characteristics of voice over IP traffic? (Choose two.)
• Voice packets tend to be small.
• Voice packets must be processed in real time.

6. What are two things that a network designer can do to determine current and anticipated network traffic flows? (Choose two.)
• Survey end users to obtain customer input.
• Conduct an inventory of all networking devices that includes model numbers and memory configurations

7. A company that has a traditional telephone system wants to convert to IP telephony. Which two factors should be considered for the design? (Choose two.)
• Voice-enabled routers or a server must be used for call control and signaling.
• Power to the phones can be supplied through properly equipped patch panels or switches.

8. Several web and email servers have recently been installed as part of an enterprise network. The security administrator has been asked to provide a summary of security features that can be implemented to help prevent unauthorized traffic from being sent into or out of sensitive internal networks. Which three features should the security administrator recommend? (Choose three.)
• firewalls
• access control lists
• intrusion detection systems

9. The design of an IP telephony system needs to meet the technical requirements to provide a connection to the PSTN as well as provide high-quality voice transmissions using the campus network. Which two elements directly affect the ability of the design to meet these requirements?(Choose two.)
• voice-enabled router at the enterprise edge
• separate voice and data VLANs with QoS implemented

10. When implementing VoIP services, which two design considerations should be followed?(Choose two.)
• Confirm that network jitter is minimal.
• Ensure that packet delays do not exceed 150 ms.

11. What design strategy should be followed when designing a network that uses video on demand?
• install servers to store the data in a centrally located server farm

12. When implementing QoS in traffic queues, what is the first step the designer should take to ensure that traffic is properly prioritized?
• identify traffic requirements

13. Which two statements are characteristics of file transfer traffic flows? (Choose two.)
• Transfers are throughput intensive.
• Response-time requirements are low.

14. Which two items can be determined by diagramming internal traffic flow? (Choose two.)
• the areas where network congestion may occur
• locations where high-bandwidth connections are required

15. Which two traffic types are examples of external traffic flows? (Choose two.)
• A user in marketing connects to the web server of a competitor.
• A user in the services department logs in to a web-based email program.

16. Which service can be provided by the NetFlow Cisco utility?
• peak usage times and traffic routing

17. Refer to the exhibit. If ACL 150 identifies only voice traffic from network 192.168.10.0/24 and no other traffic, which queue will voice traffic from other networks use?
• default

18. Refer to the exhibit. After configuring QoS, a network administrator issues the command show queueing interface s0/1. What two pieces of information can an administrator learn from the output of this command? (Choose two.)
• type of queuing being implemented
• number of packets placed in each queue

19. An analysis of network protocols reveals that RTP and RTCP are being used. What uses these protocols?
• real-time video

20. A company is considering adding voice and video to the data networks. Which two statements are true if voice and video are added? (Choose two.)
• More UDP-based traffic flows will be evident.
• QoS will most likely be implemented to prioritize traffic flows.

21. Refer to the exhibit. Which option correctly matches the terms on top with its definition on the bottom? 1
• A=4, B=3, C=1, D=2

22. A database server is configured to purge all data that is 60 days old. Ten data items that are 60 days old are to be purged. However, there is a failure halfway through the transaction, and the entire transaction is voided. What type of transaction action occurred?
• atomic

23. What is the primary goal of QoS?
• providing priority service to selected traffic

24. Which technology provides a mechanism for implementing QoS at Layer 2?
• CoS

25. A customer purchases tickets online and pays using a credit card, but the system goes down before the transaction is complete. What transaction type retains a record of this transaction after the system failure so that the customer will still receive the tickets and the credit card account will be debited accordingly?
• durable

26. Refer to the exhibit. The network design documents include requirements to prevent switching loops, to provide link-specific failover, and to provide Layer 3 recovery. Which two protocols would be needed to provide the support? (Choose two.)
• HSRP
• RSTP

27. network design must minimize latency to support real-time streaming applications. Which two protocols enable control and scalability of the network resources and minimize latency by incorporating QoS mechanisms? (Choose two.)
• RTCP
• RTP

28. Which two major differences are associated with IP telephony when compared to traditional telephony that uses a PBX? (Choose two.)
• manages phones centrally
• requires a separate infrastructure to support data transfer

29. When QoS is implemented in a converged network, which two factors can be controlled to improve performance? (Choose two.)
• delay
• jitter

0 komentar:

go-top

Posting Komentar

My Playlist

Blog ArchiveArchive

Pages

Followers

Diberdayakan oleh Blogger.
 
 
 
top