1. Which two statements describe factors that influence the layout of a proposal? (Choose two.)
• A specific proposal layout is followed when one is specified in the RFP.
• A designer chooses the layout if a written RFP does not specify an outline.
2 . What two items are typically included in the executive summary of a proposal? (Choose two.)
• project scope summary
• emphasis on the benefits that meet the goals of the customer
3. Which proposal section describes the intended routing protocol, security mechanisms, and addressing for the planned network?
• logical design
4. Which occurrence would indicate a failure of the design phase?
• The new network capacity is inadequate to support required...
Jumat, 31 Desember 2010
CCNA Discovery 4 Module 9 Exam Answers Version 4.0
Diposting oleh flavia | di 18.42 | 0 komentar
Read more...
CCNA Discovery 4 Module 8 Exam Answers Version 4.0
Diposting oleh flavia | di 18.34 | 0 komentar1. Which mechanism is used to create a floating static route?
• administrative distance
2. IPSec operates at which layer of the OSI model?
• network
3. Which is true regarding Frame Relay LMI?
• There are three LMI types standardized by ANSI, ITU-T, and Cisco.
4. Which statement identifies the IP address design for subinterfaces that are configured for a Frame Relay network?
• Multipoint configurations require IP addresses for each subinterface on each router to be a part of the same subnet.
5. Which three algorithms can be used to encrypt user data in an IPSec VPN framework? (Choose three.)
• 3DES
• AES
• DES
6. Which flag is set by a Frame Relay switch to inform the receiving...
CCNA Discovery 4 Module 7 Exam Answers Version 4.0
Diposting oleh flavia | di 18.28 | 0 komentar1. A network engineer has decided to pilot test a portion of a new network design rather than rely on a prototype for proof-of-concept. What are two advantages of pilot testing a design concept?(Choose two.)
• The test network experiences real-world network traffic.
• Network response can be tested in unplanned and unpredictable situations.
2. While preparing a network test plan document, a network designer records all initial and modified device configurations. Which section of the document typically contains this information?
• Appendix
3. Refer to the exhibit. A network designer creates a test plan that includes the specification shown. In which section of the test plan would this specification...
CCNA Discovery 4 Module 6 Exam Answers Version 4.0
Diposting oleh flavia | di 18.23 | 0 komentar1. A network engineer researched whether there are mechanisms available to help with the transition from an IPv4 addressing structure to IPv6. What three options did the engineer find?(Choose three.)
• A protocol translation mechanism allows communication between the IPv4 and IPv6 networks.
• A dual-stack network design allows both IPv4 and IPv6 addressing to be used on all network devices.
• Tunneling allows IPv4 packets to be encapsulated so that they can traverse IPv6 networks and vice versa.
2. When should the command no auto-summary be used?
• with RIP version 2, when discontigous networks exist
3. Refer to the exhibit. What must an administrator do on R3 to ensure that update packets...
CCNA Discovery 4 Module 5 Exam Answers Version 4.0
Diposting oleh flavia | di 17.41 | 0 komentar1. Which rule should be followed when implementing the security requirements of a network design?• Avoid reducing security in order to add additional network capabilities.
2. What limitations of the 2960 switch prevent it from providing the services needed in the Distribution layer?• It does not support route summarization.
3. When considering converged network designs, it is important to identify appropriate service demands. What is a concern when preparing a network design to fit this environment?• voice-level quality of service
4. Which three design requirements are implemented at the access layer? (Choose three.)• PoE• VLANs• QoS traffic classification and marking
5. Refer to the exhibit....
Kamis, 30 Desember 2010
proposal upgrade jaringan dilabor
Diposting oleh flavia | di 07.45 | 0 komentar1.Masalah jaringan karena kegagalan piranti jaringan
Skala gangguan akibat dari kegagalan piranti jaringan juga bisa bervariasi, dari hanya sebuah komputer karena kegagalan NIC – lan card; beberapa komputer karena kegagalan switch; atau bahkan berskala luas karena kegagalan pada switch central yang menghubungkan jaringan server. Untuk kegagalan lan card di salah satu komputer bisa diganti dengan network card cadangan anda.
Terus bagaimana kalau kegagalan jaringan itu akibat kerusakan pada switch? Design anda mengenai redundansi jaringan akan sangat membantu dalam menyelamatkan kegagalan jaringan anda. Kebutuhan load balancing dan redundansi haruslah dikaji untuk setiap kebutuhan berdasarkan...
Kamis, 23 Desember 2010
CCNA Discovery 4 Module 4
Diposting oleh flavia | di 06.26 | 0 komentar1. In addition to the technical considerations, what other major factor is used to evaluate the success of a network installation?
• user satisfaction
2. Which two network applications are most affected by network congestion and delays? (Choose two.)
• IP telephony
• live video webcasts
3. What two Cisco tools can be used to analyze network application traffic? (Choose two.)
• NBAR
• NetFlow
4. In network design, which technology can be implemented to prioritize traffic based on its importance and technical requirements?
• QoS
5. What are two characteristics of voice over IP traffic? (Choose two.)
• Voice packets tend to be small.
• Voice packets must be processed in real time....
CCNA Discovery 4 Module 3
Diposting oleh flavia | di 06.14 | 0 komentar1. It is important to identify the details of network sections and devices that will be affected or involved in a new design. This information is included in which section of the Network Design Requirements Document?
• Project Scope
2. Which two pieces of information does the network designer need to determine if the Cisco IOS of a router requires an upgrade? (Choose two.)
• model number of the router
• installed Cisco IOS feature set and version
3. Which three pieces of information need to be considered when selecting the proper Cisco IOS version for an upgrade? (Choose three.)
• amount of DRAM
• device make and model
• size of system flash memory
4. What are two practices a network technician...
CCNA Discovery 4 Module 2
Diposting oleh flavia | di 06.00 | 0 komentar1. During an evaluation of the currently installed network, the IT staff performs a gap analysis to determine whether the existing network infrastructure can support the desired new features. At which stage of the Cisco Lifecycle Services approach does this activity occur?
• Plan Phase
2. Which stage of the Cisco Lifecycle Services strategy is usually completed before an organization issues a Request For Proposal (RFP) or Request For Quotation (RFQ)?
• Prepare Phase
3. What is the purpose of SNMP?
• to facilitate the exchange of information between devices and the NMS
4. During an analysis of a customer network, several possible opportunities for network improvement are identified....
CCNA Discovery 4 Module 1
Diposting oleh flavia | di 05.51 | 0 komentar
1. What are two mechanisms that provide redundancy for server farm implementations? (Choose two.)
• Rapid Spanning Tree Protocol
• Hot Standby Routing Protocol
2. The ability to connect securely to a private network over a public network is provided by which WAN technology?
• VPN
3. Which three statements describe the functions of the Cisco hierarchical network design model? (Choose three.)
• The distribution layer is responsible for traffic filtering and isolating failures from the core.
• Two goals of the core layer are 100 percent uptime and maximizing throughput.
• The access layer provides a means of connecting end devices to the network.
4. A network designer is creating...
CCNA3 - Lab 8.3.3 Configuring and Verifying Standard ACLs
Diposting oleh flavia | di 03.47 | 0 komentarStep 1: Connect the equipmentConnect the Serial 0/0/0 interface of Router 1 to the Serial 0/0/0 interface of Router 2 using a serial cable.
Connect the Fa0/0 interface of Rourter 1 to the Fa0/1 port of Switch 1 using a straight-through cable.
Connect a console cable to the PC to perform configurations on the routers and switch.
Connect H1 to the Fa0/2 port of Switch 1 using a straight-through cable.
Step 2: Perform basic configuration on Router 1Connect a PC to the console port of the router to perform configurations using a terminal emulation program.
On Router 1, configure the hostname, interfaces, passwords, and message-of-the-day banner and disable DNS lookups according to the addressing...
CCNA3 - Lab 8.3.4 Planning, Configuring and Verifying Extended ACLs
Diposting oleh flavia | di 03.46 | 0 komentarStep 1: Connect the equipmentConnect the Serial 0/0/0 interface of Router 1 to the Serial 0/0/0 interface of Router 2 using a serial cable.
Connect the Fa0/0 interface of Router 1 to the Fa0/1 port of Switch 1 using a straight-through cable.
Connect a console cable to each PC to perform configurations on the routers and switch.
Connect Host 1 to the Fa0/3 port of Switch 1 using a straight-through cable.
Connect Host 2 to the Fa0/2 port of Switch 1 using a straight-through cable.
Connect a crossover cable between Host 3 and the Fa0/0 interface of Router 2.
Step 2: Perform basic configuration on Router 1Connect a PC to the console port of the router to perform configurations using a terminal emulation...
CCNA3 - Lab 8.3.5 Configuring and Verifying Extended Named ACLs
Diposting oleh flavia | di 03.44 | 0 komentarStep 1: Connect the equipmentConnect the Serial 0/0/0 interface of Router 1 to the Serial 0/0/0 interface of Router 2 using a serial cable as shown in the diagram and addressing table.
Connect the Fa0/0 interface of Router 1 to the Fa0/1 port of Switch 1 using a straight-through cable.
Connect Host 1 to the Fa0/2 port of Switch 1 using a straight-through cable.
Connect Host 2 to the Fa0/3 port of Switch 1 using a straight-through cable.
Step 2: Perform basic configuration on Router 1Connect a PC to the console port of the router to perform configurations using a terminal emulation program.
On Router 1 configure the hostname, interfaces, passwords, and message-of-the-day banner and disable DNS...
CCNA3 - Lab 8.3.6 Configuring and Verifying VTY Restrictions
Diposting oleh flavia | di 03.38 | 0 komentarStep 1: Connect the equipmentConnect the S0/0/0 interface of Router 1 to the S0/0/0 interface of Router 2 using a serial cable as shown in the diagram and addressing table.
Connect the Fa0/0 interface of Router 1 to the Fa0/1 port of Switch 1 using a straight-through cable.
Connect Host 1 to the Fa0/2 port of Switch 1 using a straight-through cable, and connect Host 2 to the Fa0/3 port of Switch 1 using a straight-through cable.
Connect Host 3 to the Fa0/2 port of Switch 2 using a straight-through cable, and connect Host 4 to the Fa0/3 port of Switch 2 using a straight-through cable.
Step 2: Perform basic configuration on Router 1Connect a PC to the console port of the router to perform configurations...
Langganan:
Postingan (Atom)