Fravo.com
Certification Made Easy
MCSE, CCNA, CCNP, OCP, CIW, JAVA, Sun Solaris, Checkpoint
World No1 Cert Guides
Designing Cisco Network Services
Architecture
Exam 642-871
Edition 1.0
© Copyrights 1998-2005 Fravo Technologies. All Rights Reserved.
642-871
Congratulations!!
You have purchased a Fravo Technologies. Study Guide.
This study guide is a complete collection of questions and answers that have
been developed by our professional & certified team. You must study the
contents of this guide properly in order to prepare for the actual certification test.
The average time that we would suggest you for studying this study guide is
approximately 15 to 20 hours and you will surely pass your exam. We guarantee
it!
GOOD LUCK!
DISCLAIMER
This study guide and/or material is not sponsored by, endorsed by or affiliated
with Microsoft, Cisco, Oracle, Citrix, CIW, CheckPoint, Novell, Sun/Solaris,
CWNA, LPI, ISC, etc. All trademarks are properties of their respective owners.
Guarantee
If you use this study guide correctly and still fail the exam, send a scanned copy
of your official score notice at:
We will gladly refund the cost of this study guide or give you an exchange of
study guide of your choice of the same or lesser value.
This material is protected by copyright law and international treaties.
Unauthorized reproduction or distribution of this material, or any portion thereof,
may result in severe civil and criminal penalties, and will be prosecuted to the
maximum extent possible under law.
© Copyrights 1998-2005 Fravo Technologies. All Rights Reserved.
1
http://www. fravo.com
642-871
Note 1: Answers to the unanswered questions will be provided shortly.
Note 2: Section A contains 73 questions.
Section B contains 263 questions.
The total number of questions is 336.
Section A
QUESTION 1 Which step would you do last in the Enterprise Campus Design
Methodology?
A. Design the physical network.
B. Select the routing protocols.
C. Determine the data and application requirements.
D. Design the edge distribution module.
E. Select an IP addressing strategy and numbering scheme.
Answer:
QUESTION 2 Where would you locate the device for the Management Module and Server
Farm?
A. In the Administration building.
B. In the Engineering building.
C. In the Information-processing building.
D. In all buildings.
Answer:
QUESTION 3 What is the definition of a fault tolerant device?
A. A backup path exists for every link between the client and the server.
B. Key components can be replaced within the device without turning off power.
C. A backup device exists for every device between the client and the server.
D. Devices can be replaced in the network without interrupting the network operation.
E. The device provides redundant backup within the device for each of its key components.
Answer:
QUESTION 4 What is the first step in the Enterprise Edge design methodology?
A. Select a service provider.
B. Select a Layer 1 technology.
C. Select a Layer 2 technology.
D. Characterize applications.
Answer:
QUESTION 5 Which three components would you expect to find in the VPN/Remote
Access module?(Choose three)
A. PSTN
B. Access server
C. ISDN
D. IDS
E. Firewall
Answer:
2
http://www. fravo.com
642-871
QUESTION 6 Which requirement for an Enterprise Campus network is associated with the
increasing amountof users, data, and applications that the network must expand to
support?
A. Functionality
B. Performance
C. Scalability
D. Manageability
Answer:
QUESTION 7 Exhibit:
What is the VPN topology shown in the graphic?
A. Full-mesh VPN
B. Hub-and-spoke VPN
C. Hierarchical VPN
D. Private WAN
Answer:
QUESTION 8 Which three modules of the Enterprise Network model will you include in
your design? (Choosethree)
A. The Campus Core module
B. The Edge Distribution module
C. The Management Module
D. The Corporate Internet module
E. The Server Farm module
F. The building Distribution module
Answer:
QUESTION 9 Contoso is a small company that has a campus consisting of three buildings
that are 150 feet apart. The buildings are connected with single-mode fiber using fast
Ethernet. Access to the network is provided by 10 Mbps hubs with 100 Mbps Ethernet
uplinks over multi-mode mode fiber to a switch within each building.There are over 200
users connected to the hubs by Category 5 wiring. Management has asked for a new
network design that considers scalability, performance, availability, manageability, and
security. Because Contoso is a small company, cost is a major factor.What wiring
infrastructure recommendations would you include in your network design?
A. Install Category 5e copper to the desktop from the wiring closets.
B. Install multi-mode fiber to the desktop from the wiring closets.
C. Replace the multi-mode fiber within the buildings with single-mode fiberD. Maintain the current wiring structure.
Answer:
QUESTION 10 Which high availability design relies more on networks than devices?
A. Clustering
B. Fault tolerance
C. Redundant topology
D. Parallel processing
3
http://www. fravo.com
642-871
E. Tripe modular redundancy
Answer:
QUESTION 11 What is the recommended maximum number of clients that an individual
wireless access pointshould support?
A. Between 1 and 8
B. Between 10 and 30
C. Between 32 and 48
D. Between 64 and 96
Answer:.
QUESTION 12 To keep complexity of VLAN design to a minimum, you would choose which
of thefollowing?
A. Use campus wide VLANs.
B. Use building distribution level VLANs.
C. Use per-switch VLANs at the access layer.
D. Use VLANs in the campus backbone.
Answer:
QUESTION 13 When using Cisco equipment, what model is used if you are connecting
PBX systems that usenonstandard signaling?
A. Translate model
B. Transport model
C. Cross over model
D. Trans -cross model
Answer:.
QUESTION 14 What are two business concerns increasing the need for remote access?
(Choose two)
A. The increased cost of office space.
B. The ability to provide a more flexible work environment.
C. The need for authentication.
D. The need for a method to charge back department cost.
Answer:
QUESTION 15 Which recommendations would you make based on the provided
parameters? (Choose two)
A. Use existing copper wiring to the desktop.
B. Use existing copper wiring between buildings.
C. Use single mode fiber to the desktop.
D. Use multi-mode fiver to the desktop.
E. Use single mode fiber between buildings.
F. Use multi-mode fiver between buildings.
Answer:
4
http://www. fravo.com
642-871
QUESTION 16 Which four components are part of the Enterprise Edge functional area in
the EnterpriseComposite Network Model? (Choose four)
A. Internet connectivity
B. Management module
C. VPN/Remote access
D. WAN module
E. Server farm
Answer:
QUESTION 17 What are two advantages of designing a high availability network based on
a redundantnetwork topology? (Choose two)
A. The cost of the network is reduced.
B. Network availability can be guaranteed.
C. Redundant topologies are easier to manage and troubleshoot.
D. The traffic load can be shared between primary and secondary paths.
E. The probability of problems with the physical environment interrupting service is reduced.
Answer:
QUESTION 18 What are two considerations in planning for high availability? (Choose two)
A. Company size
B. Hardware costs
C. Cost of downtime
D. Performance requirements
Answer:
QUESTION 19 What four functions does Web Cache Communication Protocol (WCCP)
incorporate? (Choosefour)
A. Load balancing
B. Scalability
C. Remote management
D. Fault tolerance
E. Network address translation
F. Service assurance
Answer:
QUESTION 20 Which three objectives meet the requirements for the Server Farm module?
(Choose three)
A. Provide remote dial-up access.
B. Provide up to 10 Gbps of outbound capacity.
C. Provide scalability with switches and server load balancing.
D. Provide availability with overall network design.
E. Provide high switch port density.
Answer:
QUESTION 21 What are two considerations to using IP Multicast delivery? (Choose two)
5
http://www. fravo.com
642-871
A. No congestion avoidance.
B. Not for bandwidth intensive applications.
C. No guaranteed delivery mechanism.
D. Source sends multiple data streams out each interface.
E. Ordered delivery of packets.
Answer:
QUESTION 22 Contoso wants you to design and implement a new Server Farm module with high
availability and performance.Which three technologies would you implement at the Server Farm
Distribution layer? (Choose three)
A. Mid-range switches
B. Server load balancing
C. Redundant firewalls
D. Redundant switching and links with no single paths or points of failure
E. Caching systems where appropriate
Answer:
QUESTION 23 What helps maximize throughput in a wireless LAN? (Choose two)
A. Minimize broadcast.
B. Enable IPSec.
C. Increase size of roaming domains.
D. Use static WEP.
E. Filter multicast traffic.
Answer:
QUESTION 24 What are the two basic approaches for high-availability design? (Choose
two)
A. Redundant Topologies
B. Fault Tolerant Devices
C. Public bandwidth sharing
D. Extremely high MTTR
E. Extremely low MTBF
Answer:
QUESTION 25 What does the Cisco IP phone set the CoS/ToS value for voice packets to?
A.
B.
C.
D.
1
3
5
7
Answer:
QUESTION 26 Which component of high availability architecture includes a good software
version controland device configuration control?
A. Network design
B. Operational best practices
C. Device-level hardware reliability
6
http://www. fravo.com
642-871
D. Fault management and diagnosis
Answer:
QUESTION 27 What is a primary tool to provide perimeter security to a network?
A. VPN
B. L2TP
C. Kerberos
D. Content filter
Answer:
QUESTION 28 What are two possible advantages of designing a high availability network
based on aredundant network topology? (Choose two)
A. The cost of the network is reduced.
B. Quality of service can be guaranteed.
C. Redundant topologies are easier to configure.
D. The secondary path can automatically take over for the primary path..
E. Individual network device fault tolerance is less critical.
Answer:
QUESTION 29 Which two characteristics drive the choice of a Layer 1 technology for WAN,
remote, orInternet access at the Enterprise Edge? (Choose two)
A. Services offered by the provider.
B. Layer 2 technology.
C. Layer 1 media
D. Transportability
E. Loss
Answer:
QUESTION 30 The list on the left contains characteristic and applications that are
consistent with either theSAN or NAS storage network model. Drag each option to the
appropriate box.
Answer:
QUESTION 31 Which ATM service class is appropriate for traffic that cannot tolerate delay
or loss?
A. Available Bit Rate (ABR)
B. Unspecified Bit Rate (UBR)
C. Real Time Variable Bit Rate (rt-VBR)
D. Constant Bit Rate (CBR)
E. Non-Real Time Bit Rate (nrt-VBR)
Answer:
QUESTION 32 Which three application characteristics are important to the Enterprise Edge
design process?(Choose three)
A. Data content
7
http://www. fravo.com
642-871
B. Bandwidth usage
C. Database size
D. Delay sensitivity
E. Loss tolerance
Answer:
QUESTION 33 Scalability is provided in the server farm module by which of the following
strategies?
A. Up to 10 Gbps of bandwidth at the access level.
B. Redundant servers at the access level.
C. Modular block design at the access level.
D. High port densities at the access level.
Answer:
QUESTION 34 Users of a site-to-site VPN are reporting performance problems. The VPN
connection employsIPSec and GRE and traverses several Ethernet segments. The VPN
packets are being fragmented as theytraverse the links. What would be two methods to
overcome this problem? (Choose two)
A. Employ path MTU discovery.
B. Set the MTU higher than 1500 bytes.
C. Turn off pre-fragmentation for IPSec.
D. Set the MTU value to 1400 bytes.
Answer:
QUESTION 35 What can be done to limit area coverage of a wireless access point to
provide added security?
A. Lower Mbps data rates.
B. Increases Mbps data rates.
C. Group access point frequency channels.
D. Enable multicasting.
Answer:
QUESTION 36 When dealing with transparent caching, where should the Content Engines
be placed?
A. Close to the servers.
B. Close to the end users.
C. At the Internet edge.
D. In front of web server farms.
Answer:
QUESTION 37 In which four environments would OSPF be a viable choice for a routing
protocol? (Choosefour)
A. Authentication is required.
B. Load balancing between multiple routes is required.
C. Fast convergence is necessary.
D. External routes are not a concern.
8
http://www. fravo.com
642-871
E. NBMA connections exist.
F. The network is non-hierarchical.
Answer:
QUESTION 38 Note: The following 3 questions relate to the scenario below:
Contoso is manufacturer and importer of fasteners, including nuts and bolts. The main
campus is composed ofthree buildings that are less than 200 meters apart. All campus
wiring is Category 5e copper. Network accessand distribution devices are currently 100
Mbps hubs, and the core is a 100 Mbps Layer-2 switch. Developmentof the network has
taken place over the past eight years in a series of steps that involved minimal planning,
withthe exception of the WAN links, which have been recentlyredesigned. The current
network is characterized by slow response and frequent outages. The engineering
department uses a database server located in the engineering building. This server
processes heavy local trafficthat keeps the local network at 70% of bandwidth. Accounting
uses commercial package for general ledger,accounts payable, and accounts receivable;
these packages are located on a server in the administrationbuilding. This server
processes heavy local traffic and light traffic from other buildings. All other servers
arelocated in the information-processing center. All employee use e-mail located on one
server in the information-processing center. There is a web server that is available for
public use and an internal web server that is available to employees for company news
items and for human resource applications, such as an internal jobs-available database.
The external web server is in a new Corporate Internet module.The internal network traffic
is expected to grow at 10% per year for the next five years. The IT manager of Contoso has
asked you to design an up-to-date, high-performance, scalable, secure, manageable, and
reliable campus network to meet the strategic goals of Contoso. Finances are limited, so
the design needs to meet requirements but with minimum cost.
QUESTION 39 Redundancy requirements of the WAN from the branch office to a regional
office depend onwhich two chara cteristics? (Choose two)
A. Routing requirements
B. Critical importance of the site and the number of users.
C. Impact if the site is an aggregation point..
D. Impact of the site is offline or unavailable.
Answer:
QUESTION 40 Which protocol can be used to provide WLAN redundancy and low
downtime?
A. EAP
B. SNMP
C. WEP
D. HSRP
Answer:
QUESTION 41 Which codec is recommended for higher quality voice over a data network?
A. G.711
B. G.723.
C. G.726
D. G.728
E. G.729
9
http://www. fravo.com
642-871
Answer:
QUESTION 42 Which three characteristics do you need to observe to analyze an
application? (Choose three)
A. Number of servers and users
B. Application type
C. User's operating system
D. Bandwidth, loss tolerance, and delay characteristics
E. Server speed
Answer:
QUESTION 43 Which VPN management feature would be considered to ensure that the
network had the leastdisruption of service when making topology changes?
A. Dynamic reconfiguration
B. Path MTU discovery
C. Auto setup
D. Remote management
Answer:
QUESTION 44 Which protocol would provide block access to remote storage over WAN
links?
A. iSCSI
B. FCIP.
C. SCSI-FP
D. eSCSI
E. CIFS
Answer:
QUESTION 45 Which networking technology can provide guaranteed availability of
network resources formission-critical, interactive, and time-sensitive Internet business
applications?
A. QoS
B. Resiliency
C. Redundancy
D. Fault tolerance
E. Load balancing
Answer:.
QUESTION 46 To ensure voice packets are kept within the Committed Information Rate
(CIR) of a Frame Relay link, what should be used in the CPE?
A. Prioritization
B. Classification
C. Fragmentation
D. Traffic shaping
E. Traffic policing
Answer:
10
http://www. fravo.com
642-871
QUESTION 47 Which IOS queuing feature is the currently recommended method for
queuing when voicetraffic is being sent?
A. CQ
B. PQ
C. LLQ
D. WFQ
E. IO RTP Priority
Answer:
QUESTION 48 Which statement characterizes a network well designed for QoS?
A. Packets are classified at each router within the network. The classification is based on as
many details as possible, typically using extended IP ACLs to match the packets.
B. Packets are classified and marked, close to the edge of the network. The packets are treated
differently based on this marking at the routers in the middle of the network.
C. Packets are classified based on different parameters, but close to the edge of the network.
The packets are characterized automatically based on flow at the routers in the middle of the
network.
D. Packets are classified based on socket address, at the router closets to the source of the
traffic. The packets are characterized automatically based on flow at the routers in the middle of
the network.
Answer:
QUESTION 49 Which three characteristics normally define a Campus Backbone sub
module? (Choose three)
A. Provides high speed, low overhead of low latency switching.
B. Implements policy-based filtering.
C. Transports aggregate traffic from the other sub modules and functional areas.
D. Partial mesh generally used to avoid redundant links.
E. Generally, no policy enforcement.
Answer:
QUESTION 50 What would be a result of failing to check the LAN/WAN utilization before
implementing aVoIP design?
A. An echo due to excessive delays.
B. An improper codec selection.
C. The data link being oversubscribed.
D. A decrease in the probability of call blocking
Answer:
QUESTION 51 Which set of rules governs the handling of both incoming and outgoing
calls for a voicesystem?
A. Dial plan
B. Route plan
C. Dial pattern
D. Call handler
E. Route pattern
11
http://www. fravo.com
642-871
Answer:
QUESTION 52 What is the first step that you would use Cisco Product Advisor for when
selecting a router foran Edge solution?
A. Determine types of protocols to be supported.
B. Determine the environment in which the router will be used.
C. Select the number of WAN ports required.
D. Select the number of LAN ports required.
Answer:
QUESTION 53 Choose the technology required for a VPN when multicast, broadcast, and
non IP packets needto be tunneled.
A. Triple-DES
B. IPSec
C. GRE
D. IKE
E. ISAKMP
Answer:.
QUESTION 54 What causes Egress Blocking?
A. Large data packets blocking voice packets.
B. Large voice packets blocking data packets.
C. Re-transmission of packets blocking all traffic.
D. Excessive data fragmentation.
Answer:
QUESTION 55 Which three are IOS queuing techniques? (Choose three)
A. CQ
B. PQ
C. LLQ
D. CAR
E. NBAR
Answer:
QUESTION 56 When using a centralized call-processing model, what should be
implemented at the remotelocations for failover purposes?
A. HSRP
B. PSTN
C. SNAP
D. SRST
Answer:
QUESTION 57 Static routing is usually used in networks that have which of the
followingcharacteristics?(Choose two)
12
http://www. fravo.com
642-871
A. Stub networks
B. Multi-homed networks
C. Dial-on-demand networks
D. Smaller expanding networks
Answer:
QUESTION 58 You are designing a network that requires private internal addressing for
users within the Contoso organization and also requires a website for external users.
Contoso has been issued a portion of a Class C address from their ISP. There are 320
users that will need access to the Internet. Which two types ofNetwork Address
Translation would you propose? (Choose two)
A. Persistent
B. Dynamic
C. Static
D. Overlapping
Answer:.
QUESTION 59 What type of Cal Admission control in Call Manager allows for limits to the
bandwidthconsumed by active calls?
A. Regions
B. Partitions
C. Locations
D. Device Pools
Answer:
QUESTION 60 Mid-town College wants you to design and implement a new Campus
Backbone module that has multicast and broadcast control, flexible topology, and no
spanning tree loops. Cost effectiveness is a secondary consideration. Which equipment
type would you recommend?
A. High-end routers
B. Mid-level Layer 2 switches
C. High-level Layer 2 switches
D. Layer 3 switches
Answer:
QUESTION 61 You are asked to design a VPN for a medium sized company, Contoso Ltd.
Contoso has 12 stationary offices and one main office. Each office is more than 80 miles
away from the next.What type of VPN would you design for this situation?
A. Remote access VPN
B. Site to site VPN
C. Enterprise remote access VPN
D. Wireless VPN
Answer:
QUESTION 62 Which Layer 3 protocol is used to provide data integrity, privacy, and
security on an IP basedVPN?
13
http://www. fravo.com
642-871
A. GRE
B. MD5
C. PKI
D. IPSec
E. L2TP
Answer:
QUESTION 63 What is the device weight limit per Call Manager in a Cisco IP phone
configuration?
A. 2500.
B. 3000
C. 5000
D. 6500
Answer:
QUESTION 64 Which of the following is a web-browser based tool designed to provide
administrative accessfor content networking?
A. Content Distribution Manager (CDM)
B. Self-Organizing Distributed Architecture (SODA)
C. Web Cache Communication Protocol (WCCP)
D. Cisco Call Manager
E. Hypertext Administration Design (HAD)
Answer:
QUESTION 65 Which Cisco network management tools is targeted toward small to
medium-size business?
A. Netsys
B. Cisco Assure
C. Cisco Works Lite
D. Cisco Works Blue
E. Cisco Works for Windows
Answer:
QUESTION 66 Which Cisco Works VPN/Security Management Solution gives
administrators access todevices showing real-time status along with operational and
configuration functions through a web browser?
A. VPN Monitor
B. CSPM
C. Resource Manager (RME)
D. Cisco View
E. IDS Host Sensor
Answer:
QUESTION 67 Which signaling technique is used for Intercluster calls between Call
Manager clusters?
A. SS7
14
http://www. fravo.com
642-871
B. H.323
C. MGCP
D. Skinny
Answer:
QUESTION 68 Which IEEE wireless standard provides backward compatibility with
802.11b?
A. 802.11a
B. 802.1q
C. 802.11g
D. 802.11p
Answer:
QUESTION 69 You have just completed determining the application and data requirements for a
new network design.Which design step would you do next?
A. Select the IP addressing strategy and numbering.
B. Select the routing protocols.
C. Design the physical network.
D. Design the logical network.
Answer:
QUESTION 70 What are two design options to provide network segmentation? (Choose
two)
A. Ethernet Trunking
B. Separate, flat networks.
C. VLANs
D. Rapid Spanning Tree (RST)
Answer:
QUESTION 71 In which Frame Relay PVC configuration, carrying both voice and data, is
the potential voiceload better understood and partially isolated from the data load?
A. Duplex PVCs
B. Simplex PVCs
C. Separate PVCs
D. Combined PVCs
Answer:
QUESTION 72 What device acts as a bridge between the IP network and a Fiber Channel
SAN?
A. FC-HBA attached host
B. FC Switch
C. Storage Router
D. NAS GE Switch
Answer:
15
http://www. fravo.com
642-871
QUESTION 73 Contoso is a small company that has a campus consisting of three
buildings that are 150 feet apart. The buildings are connected with single-mode fiber using
fast Ethernet. Access to the network is provided by 10 Mbps hubs with 100 Mbps Ethernet
uplinks over multi-mode fiber to a switch within each building.There are over 200 users
connected to the hubs by Category 5 wiring. Management has asked for a new network
design that considers scalability, performance, availability, manageability, and security.
Because Contoso is a small company, cost is a major factor Which modular network
recommendation would you make to meet their requirements? (Choose one)
A. A three-level campus infrastructure model with a high-speed core using Layer 3 switches, a
distribution level using mid-level, Layer 2 switches and an access level using low-level Layer 2
switches.
B. A three-level campus infrastructure model with a high-speed core using Layer 2 switches, a
distribution level using mid-level, Layer 2 switches, and an access level using low-level Layer 2
switches.
C. A two-level campus infrastructure model with combined high-speed core and distribution layer
using high-speed Layer 3 switches and low-level Layer 2 switches at the access layer.
D. A two-level campus infrastructure model with combined high-speed core and distribution layer
using mid-level Layer 3 switches and mid-level Layer 2 switches at the access layer.
Answer:
Section B - Practice Questions
QUESTION 1 A master domain trusts ______.
A. No one.
B. All other master domains.
C. Only directly-connected master domains.
D. All devices in the domain.
Answer: A
QUESTION 2 Which is the remote LAN access connectivity method use for a specific
purpose (i.e., email)?
A. Remote gateway.
B. Remote control.
C. Remote virtual LAN.
D. Remote node.
Answer: A.
QUESTION 3 What is the fundamental aspect in a firewall design?
A. Host security.
B. Data compression.
C. Company policy.
D. Access to services.
Answer: C
QUESTION 4 If you turn off the IGRP hold down timer, you can ______.
16
http://www. fravo.com
642-871
A. Reduce the time to detect carrier loss.
B. Introduce problems because of bad routes.
C. Reduce the likelihood of routing loops.
D. Reduce convergence time.
Answer: D
QUESTION 5 In a Novell environment, it is often a good idea to implement policies
controlling resourcesaccess by configuring SAP filters
A. On all routers.
B. On access-layer routers.
C. On distribution-layer routers..
D. On core-layer routers.
Answer: C
QUESTION 6 What does NetBIOS se nd to identify itself?
A. Unicast.
B. Multicast.
C. Broadcast.
D. SAP advertisement.
Answer: C
QUESTION 7 Out-of-band call setup is accomplished in Strata COM environments by
______.
A. The Intelligent Network Server (INS).
B. Soft PVCs.
C. Fast Packet call setup protocol.
D. Signaling System 7 (SS7).
Answer: A
QUESTION 8 What happens after an SNA SSCP-LU and SSCP-PU connection is made?
A. An LU-LU session occurs.
B. An LU-PU session occurs.
C. A PU-PU session occurs.
D. Nothing, because this should never occur.
Answer: A
QUESTION 9 At what layer does ZIP work?
A. Application
B. Network
C. Transport
D. Session
E. Data Link
Answer: D
17
http://www. fravo.com
642-871
QUESTION 10 If ATM becomes ubiquitous and is offered by third party carriers, which
design model willgain popularity?
A. ATM router cluster backbone.
B. ATM subnet.
C. ATM WAN.
D. ATM point-to-multipoint.
Answer: C
QUESTION 11 Which of the following is not a role of routers in an ATM network?
A. Connecting diverse media to the ATM network.
B. Acting as an ARP serve r.
C. Retransmitting lost cells.
D. Acting as a broadcast and unknown server.
Answer: C
QUESTION 12 Which of the following policies would most likely be implemented at the
distribution layer of the hierarchical model?
A. Charging for internet work usage (accounting).
B. Controlling email privacy.
C. Controlling access to resources.
D. Controlling names used for servers and users workstations.
Answer: C
QUESTION 13 Which of the following corporate policies is least relevant to
internetworking design?
A. List of approved vendors.
B. Email privacy guidelines.
C. Distributed authority for device naming and addressing..
D. Distribution of mission-critical operations.
Answer: B
QUESTION 14 What is the primary function of WINS?
A. IP address to MAC address resolution.
B. MAC address to IP address resolution.
C. Internet names to IP address resolution.
D. NetBIOS names to IP address resolution.
Answer: D
QUESTION 15 Multi chasis Multilink PPP is a feature which ______.
A. Provides a mechanism to aggregate B channels transparently across multiple router servers.
B. Provides a mechanism to aggregate B channels transparently across multiple AS5200 servers
C. Provides a mechanism to aggregate B channels transparently across multiple routers servers
so long as the number does not exceed four.
D. Provides a mechanism to aggregate B channels transparently across multiple access servers.
18
http://www. fravo.com
642-871
Answer: A
QUESTION 16 NetBIOS can be transported across a network via ______.
A. A broadcast method involving NetBEUI.
B. A bridged method involving NetBEUI.
C. A routed method involving IPX or TCP/IP.
D. A broadcast method involving RIP.
Answer: B
QUESTION 17 What do you need in order for Mac IP to work? (Choose two)
A. RTMP updates.
B. Tunneling IP in DDP datagrams.
C. A Mac IP server
D. ZIP Filters
Answer: B, C
QUESTION 18 Routing protocols ______.
A. Perform metric calculation and transport.
B. Transmit routing updates.
C. Update static routes and advertisements.
D. Perform path determination.
Answer: D
QUESTION 19 What would you use on an AppleTalk network to control overhead traffic?
A. One large managed, centralized zone.
B. EIGRP and AURP
C. APPN
D. Zip Reply Filters.
Answer: B
QUESTION 20 OSPF supports which of the following types of connections?
A. Non-broadcast multi-access.
B. Point-to-point.
C. Broadcast multi-access.
Answer: A, B, C
QUESTION 21 Which of the following is one aspect of the Internet work design step of
developing theInternet work structure?
A. Designing a name space.
B. Monitoring network performance.
C. Assessing costs and risks.
D. Analyzing user requirements.
Answer: D
19
http://www. fravo.com
642-871
QUESTION 22 What are the four categories of OSPF routers?
A. Internal, area border, boundary, and external.
B. Internal, area border, autonomous system boundary.
C. Internal, area border, backbone, and autonomous.
D. Local, area border, remote, and autonomous system.
Answer: C
QUESTION 23 Axis shelf is part of which switch?
A. BPX
B. IPX
C. IGX
D. APEX
Answer: A
QUESTION 24 After implementing a new internet work desi gn you should ______.
A. Develop the internet work structure.
B. Monitor network performance.
C. Analyze business and technical requirements.
D. Configure routers.
Answer: B
QUESTION 25 Your client has recently upgraded the users in a Token Ring network to PC
running 3270 emulation software. What would you recommend to provide access to an
SNA mainframe in New York across a serial link?
A. RSRB
B. APPN
C. SDLLC
D. STUN
Answer: D
Explanation: The correct answer is STUN as per the Cisco Internet work Design version 3.0
courseware, P 2224. "SDLC tunneling (STUN) has fewer encapsulation options than RSRB: Serial direct between serial ports on the router ... ". The question is here, is this connection in
New York local or not? Since the question has the work "serial" in it, the correct answer should be
STUN, since no-where does is the word "serial" used when
discussing RSRB. If the question say WAN or Frame relay, the answer would be RSRB, but
because they actually say Serial it must be STUN.
QUESTION 26 You have a PRI and 10 users needing dial-in access. The appropriate
recommendation is ______.
A. A 2500 series access server with external modems.
B. A 2500 series access server with internal modems.
C. An AS5100 access server.
D. An AS5200 access server.
Answer: A
QUESTION 27 To authenticate remote users, which of the following should be used?
20
http://www. fravo.com
642-871
A. Per-user access lists at the access server.
B. A server using TACACS + or RADIUS.
C. An NT server set up as a PDC.
D. An NT server set up as a BDC.
Answer: B
QUESTION 28 A router using EIGRP will have a routing table that will contain routes that
______.
A. Are its own and all routers in the segment.
B. Are its own and all adjacent routers.
C. Are its own.
D. Are its own and its neighbors.
Answer: D
Explanation: The correct answer is "Are its own and its neighbors" as per the Cisco Internet work
Design version 3.0 courseware, P 10-23: "In addition to the local routing table, Enhanced IGRP
keeps the active routing table of each adjacent router, which gives the Enhanced IGRP router a
fast way to predict how routing will change when a network link changes state"
QUESTION 29 A broadcast domain:
A. Is all devices contending for the same bandwidth.
B. Does not usually cross routers.
C. Is also called a collision domain in Ethernet terminology.
D. Forwards Domain Name System lookups.
Answer: B
QUESTION 30 Which of the following is not a rule associated with the hierarchical design
model?
A. Use a consistent number of layers throughout the internet work.
B. Use consistent bandwidth links within each layer of the model.
C. Design the core for maximum availability.
D. Implement policy and security at the access layer.
Answer: D
QUESTION 31 Connecting two Novell NetWare Ethernet networks that use different
encapsulation ______.
A. Can be done by configuring sub interfaces on a Cisco router.
B. Can be done by using Enhanced IGRP instead of IPX RIP.
C. Cannot be done.
D. Has no effect on network performance.
Answer: A
Explanation: Per the Cisco Internet work Design version 3.0 courseware, P 12-7: "Sub interfaces
can be. configured on the router to support several IPX networks on the same LAN. Hosts on
different networks do not communicate directly and can use different encapsulations"
QUESTION 32 When assigning a logical address to a network segment, which layer of the
OSI model is used?
21
http://www. fravo.com
642-871
A. Layer two.
B. Layer three.
C. Layer four.
D. Layer seven.
Answer: B
QUESTION 33 What are the three options available for routing in AppleTalk networks?
A. RIP
B. RTMP.
C. AURP
D. EIGRP
Answer: B, C, D
QUESTION 34 The AXIS shelf is used with which Strata COM nodes?
A. BPX
B. IGX
C. IPX
D. Fast Packet
Answer: A
Explanation: AXIS shelf is connected to the BPX. IGX and IPX are other valid kinds of strata
COM nodes.
QUESTION 35 What does IPX use to locate servers?
A. DNS
B. SAP
C. Name Queries
D. SPX
Answer: B
QUESTION 36 Routing convergence ______.
A. Is determined by the Network Time Protocol (NTP).
B. Is affected by the data link technology in use.
C. Includes the time to determine a new route, but not the time to detect a fault.
D. Is the same for distance vector protocols and link-state protocols.
Answer: B Not D: The convergence time is different for different routing protocols.
QUESTION 37 What is the relationship between routing metric and Frame Relay CIR?
A. CIR affects the bandwidth metric.
B. CIR affects IPX ticks.
C. CIR is ignored for router metric computation.
D. CIR affects the MTU metric.
Answer: A.
QUESTION 38 What version of IOS supports PIM?
22
http://www. fravo.com
642-871
A. 11.2 and later.
B. 10.3(9) and later.
C. 10.8 and later.
D. 10.2 and later.
Answer: D
QUESTION 39 Which of the following is an advantage to controlling internet work
diameter?
A. Predictable latency.
B. Complex topologies supported.
C. Limited broadcast forwarding.
D. Improved load balancing.
Answer: C
QUESTION 40 In addition to a hierarchical design, apple Talk network designers should
use _________ to control overhead traffic?
A. One large, centrally administered zone.
B. Advanced routing protocols, such as EIGRP and AURP.
C. System 7.5 on all client devices..
D. Nothing
Answer: B
QUESTION 41 Which of the following is not a characteristic of a well-designed core layer
in the hierarchicaldesign model?
A. Manageability.
B. User services support.
C. Redundancy and fault tolerance.
D. Fast convergence time.
Answer: B
QUESTION 42 A typical internet work design goal is to:
A. Minimize the size of an internet work.
B. Analyze business requirements.
C. Maximize scalability.
D. Maximize client/server traffic.
Answer: C.
QUESTION 43 Which of the following approaches is not an aspect of a secure network
design?
A. Data encryption.
B. Access management.
C. Data compression.
D. Firewall devices.
Answer: C
23
http://www. fravo.com
642-871
QUESTION 44 You are designing an internet work for a customer who has given you
information requirements, new access requirements, and policies regarding approved
protocols. What should you ask for next?
A. Current router configurations.
B. Budget available for the internet work design project.
C. Job satisfaction level of network managers.
D. Naming and addressing standards.
Answer: B
QUESTION 45 If you wanted to link discontinuous subnets, what could you do? (Choose
two)
A. Use a classful routing protocol.
B. Use secondary interfaces or tunnels.
C. Use a classless routing protocol.
D. Re-address the entire network.
Answer: B, C
QUESTION 46 Which is not a method to prevent routing loops in distance vector routing
protocols?
A. Poison reverse
B. Hold down times
C. Split horizon
D. HSRP
Answer: D.
QUESTION 47 Which of the following are Point-to-Point and Multipoint Protocols?
A. Frame Relay
B. SMDS
C. X.25
D. ATM
Answer: A, D
QUESTION 48 A Cisco router can be configured to perform the network address
translation function; this software feature is first available in which version of the Cisco
IOS?
A. 11.0
B. 11.1
C. 11.2
D. 11.3
Answer: C.
QUESTION 49 Which of the following rules is least relevant to IGRP convergence time?
A. The faster the data link, the lower the update interval can be set.
B. Make the invalid timer three times greater than the update interval.
24
http://www. fravo.com