CISCOKILLERS

CCNA, CCNP, WLAN ANSWERS AND MUCH MOREEEEE!!
 
HomeFAQSearchRegisterMemberlistUsergroupsLog in

Share | 
 

 Module1

Go down 
AuthorMessage
Admin
Admin


Number of posts : 72
Age : 31
Localisation : Cyprus
Registration date : 2007-02-22

PostSubject: Module1   Thu Nov 29, 2007 7:06 pm

CCNP1
Chapter 1

Which layer of the three-layer hierarchical design model is responsible for providing reliable, high-speed traffic forwarding?

core *
access
workgroup
distribution
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Which series of Cisco routers are recommended for use in the access layer?

2600, 2500, 1700, and 1600 *
12000, 7500, 7200, and 7000
3600, 4500, and 4000
12000, 3600, and 2600
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Which characteristics of redundant core links provide the best reliability?

dedicated and symmetrical *
dedicated and asymmetrical
dialup and symmetrical
dialup and asymmetrical
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
For traffic manipulation and routing updates, routers use access lists, route summarization, distribute lists, and route maps. At which layer of the three-layer design model are these policy techniques used?

core
access
workgroup
distribution *
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
How do core routers maintain reliability and availability when a link fails?

reroute traffic *
load balancing
protocol tunnels
snapshot routing
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Which Cisco IOS feature allows distance-vector routers on backup links to exchange complete routing tables during the first connection and subsequently during active periods?

compression
snapshot routing *
incremental updates
dial-on-demand routing
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
What are two characteristics of a secure but accessible network? (Choose two.)

access lists *
authentication protocols *
route redistribution
snapshot routing
IP unnumbered
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Which characteristic of a scalable network allows for easy and safe connectivity over a variety of network technologies?

accessible *
reliable
responsive
efficient
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
An administrator is running an IP network with a few remote sites utilizing IPX. Which mechanism will allow IPX traffic to cross the network over IP links, while still allowing IPX hosts at separate remote locations to communicate?

quality of service
per-packet load balancing
protocol tunneling *
scalable routing protocols
compression
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Which type of load balancing allows throughput that is proportional to the metrics of unequal paths?

per packet *
per destination
per flow
per source
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
A network administrator wants to use the distribute-list command to determine which routing updates a router will forward. Which layer in the graphic should the administrator configure with this command?

access layer
distribution layer *
core layer
all three layers
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Which statement best describes the distribution layer?

allows telecommuter access to the network using WAN technology
supplies traffic to the network and performs network entry control
provides optimized and reliable transport by routing without any packet manipulation
defines policies for the network with route summarization and VLAN implementation *
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Which three bandwidth optimization features are supported by the Cisco IOS? (Choose three.)

security
route summarization *
VLAN routing
incremental updates *
dial-on-demand routing *
IP tunneling
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
How does route redistribution support making a network adaptable?

allows non-routable traffic to be routed
allows routing information to be shared among different routing protocols *
allows routing information to be shared among routable and non-routable protocols
allows routing information to be shared among different non-routing protocols
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Which layer of the three-layer hierarchical design model is responsible for performing network entry control?

core
access *
workgroup
distribution
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Which layer of the hierarchical network design model is best suited to limit traffic to and from the corporate backbone?

access layer
distribution layer *
core layer
network layer
data-link layer
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
A network administrator would like to configure a network so that mission-critical and delay sensitive traffic, such as voice data, is processed first. What should the administrator configure to accomplish this?

queuing *
tunneling
snapshot routing
incremental updates
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Which statement best describes responsiveness in a scalable network?

the ability to provide a robust network that can adapt to failures quickly and effectively
the ability to prevent unnecessary traffic from traversing the WAN and minimize the size and frequency of routing updates
the ability to handle the addition and coexistence of multiple routed and routing protocols
the ability to route traffic while providing Quality of Service (QoS) for various applications and protocols *
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
How does a router configured with queuing make a network more responsive?

It can distribute the traffic load across multiple links to the same destination.
It can prevent traffic that the administrator defines as unnecessary, undesirable, or unauthorized from crossing the network.
It can schedule packets for transmission based on priority during periods of congestion. *
It can reduce the number of entries in a routing table by using a mask that represents multiple networks or subnetworks.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Which layer in the three-layer design model accepts traffic into the network from end users and remote sites?

core
access *
workgroup
distribution
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
At which layer of the hierarchical network design model would Cisco 7x00 series routers be implemented for an enterprise network?

access
distribution
core *
network
data-link
_________________
Back to top Go down
View user profile http://www.ciscokillers.tk
 
Module1
Back to top 
Page 1 of 1

Permissions in this forum:You cannot reply to topics in this forum
CISCOKILLERS :: CCNP :: CCNP 1-
Jump to: