Some questions will relate to case studies you have covered in this CCDA preparation course. You can review these case studies by clicking on the relevant hyperlink in the question. Read over the case studies and answer the questions with the best answer. When you take the exam at a Sylvan testing center, new case studies will be used that are not covered in this course.
Each question is designed to test a specific objective
of the course. We recommend that you review the sections that you answered
incorrectly in this sample test before going to the Sylvan testing center.
Question 1
To help reduce the complexity associated with customer problem identification, analysis, and solution design, Cisco has developed a basic framework into which most customer problems fit. The framework is a triangle that contains the following three components:
a. Protocols, Transport, and NetManagement
b. Protocols, Transport, and Media
c. Transport, Media, and NetManagement
d. Media, Protocols, and NetManagement
Question 2
To list the network protocols and the number of users
and hosts, the following job aid can be used. Which category would "X.25"
belong to?
|
|
|
|
|
|
a. Name of protocol
b. Type of protocol
c. Number of users
d. Number of hosts or servers
a. New facilities are being built.
b. The two facilities are across town from each other.
c. The parent company is responsible for the WAN and SNA.
d. The company may be acquired within the next six months by a larger competitor.
Question 4
Before making network design recommendations, you will need to characterize the existing network's availability and performance. As a general guideline, WAN links are saturated when network utilization exceeds ____________.
a. 20 percent
b. 30 percent
c. 40 percent
d. 70 percent
Question 5
In the CareTaker case study, there will be ________ users who will be accessing the mainframe via Open Connect TN3270 emulation.
a. 40
b. 73
c. 97
d. 113
Question 6
In the CareTaker case study, the peak hours for accessing e-mail using Microsoft Exchange are:
a. early in the morning.
b. from 9 to 11 a.m.
c. during all business hours.
d. unknown by the information given.
a. a high-level topology of the customers network.
b. e-mail packet flow.
c. TN3270 packet flow.
d. office productivity application packet flow.
Question 8
Which performance requirement is true in regard to the CareTaker case study?
a. The network in the new building must be partially installed and tested before the move.
b. The servers should be distributed throughout the building to be closer to their appropriate
workgroups.
c. It does not appear that there are any unusable or demanding performance requirements other than the
load of 113 office applications and e-mail users.
d. The corporate link must be tested before the move of the ES9000 systems to test the IPX routing for
e-mail and Internet access.
Question 9
In the CareTaker case study, the IS manager is not sure that she has the personnel it will take to manage the new network. Her administrators are junior and have never worked with routers before. She understands the need for training and has planned for it, but she still is concerned. Of the following network management tools, which would be the best and most cost-effective for this case study?
a. CiscoWorks Windows
b. Cisco Fast Step
c. CiscoWorks ConfigMaker
d. NETSYS Enterprise/Solver
Question 10
Which protocol(s) are used for terminal and PC connection to the ES9000 in the CareTaker case study?
a. TCP/IP and TN3270
b. TCP/IP
c. TCP/IP and IPX
d. IPX
Question 11
In the following diagram, the Cisco Catalyst 5002 switch represents the _________ of the network design.
a. core layer
b. distribution layer
c. access layer
d. workgroup layer
Question 12
The following diagram is taken from the Pretty Paper Ltd. case study. It represents a:
a. high-level topology map that meets the customer's needs.
b. high-level topology map of the customer's current network.
c. high-level topology map of the customer's proposed intranet security system.
d. high-level topology map of the customer's proposed e-mail packet flow.
Question 13
If the number of users were to double over the next year in the CareTaker case study, which of the following is the least acceptable scalability solution?
a. The five file servers will allow traffic to be segmented for file and print sharing.
b. With proper segmentation in the design, there should be no problem with growth.
c. The TN3270 traffic is not significant and should not require segmentation.
d. We do not know how heavy the use of e-mail will be, so we must consider that it may be heavy.
Question 14
In the CareTaker case study a good selection for the router to be installed into CareTaker's new office would be the Cisco 3640. Which statement accurately describes this product?
a. The Cisco 3640 router is equipped with two network module slots that can accept a variety of
network module interface cards.
b. The Cisco 3640 router has an 80-MHz RISC processor and can be fitted with 4 to 32 MB of Flash
memory.
c. Dial connectivity is supported with a series of network modules offering ISDN Primary Rate
Interface (PRI), ISDN Basic Rate Interface (BRI), and asynchronous/synchronous serial interfaces.
d. LAN and WAN connectivity are provided by a series of mixed-media cards that support Ethernet
only, and a variety of WAN technologies.
Question 15
The following diagram represents a:
a. high-level topology map that meets the customer's needs.
b. high-level topology map of the customer's current network.
c. high-level topology map of the customer's proposed e-mail packet flow.
d. high-level topology map of the customer's current e-mail packet flow.
a. The central site has a fractional T1 connection and each remote site has a full T1 connection to the
central site.
b. The central site uses a hub-and-spoke topology including an Ethernet concentrator that has multiple
WAN interfaces.
c. Each remote site has a router with one ISDN BRI and the central site has a router with ISDN PRI.
d. The central site has a multiservice WAN ATM switch that offers Personal Communication Services
to the remote sites.
Question 17
When comparing the advantages and disadvantages of a full-mesh versus a partial-mesh Frame Relay design, which statement is most accurate?
a. A full mesh is more expensive due to more routers.
b. Split horizon limits connectivity in a full mesh.
c. A partial mesh is less expensive due to fewer virtual circuits.
d. Broadcast copying overhead is higher in a partial mesh.
Question 18
In the CareTaker case study, the company plans to add leased lines but has not made a determination on the protocol, interface, and media. This decision will not be made for another six months or so. Of the following products, which one would be the best solution for this scenario? (Remember to use the Cisco Reseller Product Selection Tool and the "Small and Medium Business Solution Guide" to help answer this question.)
a. Cisco 770
b. Cisco 2503
c. Cisco 2514
d. Cisco 3640
Question 19
Which one of the following is the first step in designing network-layer addressing and naming for a network?
a. Design a hierarchy for addressing autonomous systems, areas, networks, subnetworks, and end
stations
b. Design route summarization (aggregation)
c. Design a plan for distributing administrative authority for addressing and naming at the lower levels
of the hierarchy
d. Design a method for mapping geographical locations to network numbers
Question 20
In the Virtual University case study, the Class B network number of 172.16.0.0 was divided into the following four areas:
172.16.0.0 was assigned to the BackboneThe ________of the third octet can be used to identify the area portion of the networking addressing scheme.
172.16.64.0 was assigned to the North Campus
172.16.128.0 was assigned to the Central Campus
172.16.192.0 was assigned to the South Campus
a. first bit
b. first 2 bits
c. first 3 bits
d. last 6 bits
a. DNS/DHCP Manager
b. CiscoWorks Windows
c. Cisco Fast Step
d. Netsys Enterprise/Solver
Question 22
The IP Routing Information Protocol (RIP):
a. handles the process of updating the Time To Live field in an IP header.
b. specifies no more than 15 hops between end stations.
c. is the same as the IPX RIP implementation.
d. sends network numbers, subnets masks, and hop count in its routing updates.
Question 23
In the CareTaker case study which routing protocol is the most efficient between the warehouse and CareTaker facilities?
a. RIP
b. RIPv2
c. OSPF
d. IGRP
Question 24
Access lists allow you to:
a. reduce the size of a frame of data to be transmitted over a network link.
b. control whether network traffic is forwarded or blocked at a routers interfaces.
c. let a network administrator manage the varying demands applications put on networks and routers.
d. assign different amounts of queue space to different protocols and handle the queues in round-robin
fashion.
Question 25
Which statement is true about network security policies?
a. Security policies should be based on an understanding of which company assets are most valuable.
b. Security systems should be designed to maximize the number of secrets, for example, passwords and
encryption keys.
c. End users do not need training on network security.
d. A company that has an inflexible security policy that is hard to change is less vulnerable than a
company with a flexible policy.
Question 26
Of the following network management tools, which one would be the best and most cost-effective for the CareTaker case study?
a. CiscoWorks Windows
b. Cisco ConfigMaker
c. DNS/DHCP Manager
d. Netsys/Enterprise/Solver
Question 27
As companies recognize the strategic importance of their internetworks and intranets, more emphasis is being placed on ________ network management.
a. reactive
b. security
c. proactive
d. PC-based
Question 28
Which one of the following sections of the design document best summarizes how your solution solves the client's requirements and identifies Cisco's key discriminators?
a. Synopsis
b. Design solution
c. Graphics of network designs
d. Executive summary
Question 29
Netsys Enterprise/Solver Connectivity Tools:
a. display graphical device views.
b. are used to configure one or more Cisco devices.
c. provide simulation-based planning and problem-solving.
d. are a rich set of tools for SNA and IP environments.
Question 30
Which of the following tasks is the first step in building a prototype network structure to prove to a customer that your design works?
a. Reviewing the extracted new customer requirements
b. Determining how much of the network structure must be built to prove the design concept
c. Gaining an understanding of what your competition plans to propose
d. Developing a test plan
Question 31
If the CareTaker network manager wanted to identify Layer 2 errors, router errors such as dropped or ignored packets, and broadcast rates, which Cisco IOS software command would the manager use?
a. show interface
b. show processes
c. show buffers
d. ping
Question 32
In the CareTaker case study, both the parent corporations and CareTakers management have repeatedly expressed the requirement that everything will work before the move takes place. Read the following solution and select the best answer.
Because the network will be installed in a new building, your proposal is that the new communication lines be installed between the three locations in parallel with the existing lines. One of the new servers would be used as a test server. A minimum of one PC would be attached to each LAN segment in the new building. This attachment should be done in the computer room at the Catalyst 5002 switch to eliminate cable issues, which are not the responsibility of the internetwork design. The server would be placed on a 100-Mbps port of the switch. A single PC at the warehouse would be connected to the Cisco 2503 router. All circuits and paths would then be tested.
Will error-free pinging and tracing of packets on the various segments and the WAN links test the network design enough to validate that the pilot is successful?
a. Yes. For a network this size, error-free pinging and tracing of packets on the various segments and
the WAN segments will be adequate.b. No. Additional and more through testing should be done using various Cisco IOS software commands
and possibly a protocol analyzer.