Sei sulla pagina 1di 5

ROUTE Chapter 1 CCNP 6.

0 2012 2013 100%


January 1, 2012 by Son Trinh Leave a Comment

Take Assessment ROUTE Chapter 1 CCNP ROUTE: Implement n! C s"# IP R#$t n! %&ers #n 6.0' Ans(ers 2012 2013
1. Whichroutedescriptionbest definesa floatingstatic route? a route with a metric equal to the metric of a corresponding dynamic route a route with a metric less than the metric of a corresponding dynamic route a route with a metric greater than the metric of a corresponding dynamic route a route with an administrative distance less than the administrative distance of a corresponding dynamic route a route with an administrative distance greater than the administrative distance of a corresponding dynamic route 2. TheOSPFroutingprotocolis enabledon a network.Theadministratorwouldlike to enablea floatingstatic routeto be usedas a backup.Whichis the correctsettingfor the administrativedistanceof the floatingstatic route? 0 1 50 100 120 3. Thefollowingline wasdisplayedin the outputof the showip routecommand: 192.168.3.0/24[120/2]via 192.168.2.2,00:00:30,Serial0/0 Whichroutingprotocolis the sourcefor this route? BGP EIGRP ODR OSPF RIP

4. Whatis the administrativedistanceof EIGRPlearnedroutesthat havebeeninjectedinto EIGRPvia redistribution? 1 90 100 110 170 180 5. For ODRlearnedroutes,whatis the defaultadministrativedistanceand metricthat is displayedby the showip routecommand? [160/0] [160/1] [170/0] [170/1] 6. Whichtypeof traffic shouldreceivethe highestlevel of priorityby QoSmechanismsin a convergednetworkdesign? real-time traffic transactional traffic routing protocol traffic network management traffic 7. In a convergednetwork,whichtwo typesof traffic wouldbe categorizedas real-time traffic?(Choosetwo.) e-mail file transfer web browsing videoconferencing voice over IP 8. Whatis the role of QoSin a convergednetwork? to ensure that real-time traffic is not delayed to give highest priority to transactional traffic to ensure that all traffic above available bandwidth levels is dropped to protect against the impact of worms, viruses, and other network attacks 9. Whatare two IntelligentInformationNetworkphasesthat involvesharingresourcesand makingthe networkapplicationaware?(Choosetwo.) integrated applications integrated standards integrated services

integrated security integrated transport 10. Whichstatementaboutthe IntelligentInformationNetwork(IIN) is true? The IIN is an industry-standard approach to designing a modern network. The IIN is a framework that describes how to build a Service-Oriented Network Architecture (SONA). The IIN defines a network design of three hierarchal layers consisting of the core, distribution, and access layers. The IIN offers end-to-end functionality and a centralized, unified control that promotes true business transparency and agility. 11. Whichfeaturedefinesfunctionalitythat is foundin the integratedservicesphaseof IIN? making the network application-aware pooling and sharing IT resources through virtualization consolidating voice, video, and data into the IP network content caching, load balancing, and application-level security 12. In whichPPDIOOphasedo key decisionmakersidentifythe initial businessand technicalrequirements? Design Phase Implement Phase Operate Phase Optimize Phase Plan Phase Prepare Phase 13. In whichPPDIOOphaseis the actualnetworkconfiguredand verified? Design Phase Implement Phase Operate Phase Optimize Phase Plan Phase Prepare Phase 14. Whichtwo statementsare true aboutan implementationplan approach?(Choosetwo.) In an ad hoc approach, the Cisco Lifecycle Services framework could be used to complete a task. In an ad hoc approach, the network engineer identifies the need for a change and implements the solution without planning any of the tasks. In an ad hoc approach, the network engineer identifies the need for a change and starts with planning as the first step. In a structured approach, it is more likely that scalability issues, suboptimal routing, and security issues will occur.

In a structured approach, the Fault, Configuration, Accounting, Performance, and Security (FCAPS) model could be used to complete a task. In a structured approach, the network engineer identifies the need for an upgrade and starts with configuring as the first step. 15. Whichtwo statementsare true aboutthe structuredapproachmodel?(Choosetwo.) The Cisco Lifecycle Services approach defines six phases including the prepare, plan, design, implement, operate, and optimize phases. The Fault, Configuration, Accounting, Performance, and Security (FCAPS) model identifies the implementation plan in the Fault management category. The Fault, Configuration, Accounting, Performance, and Security (FCAPS) model identifies the implementation plan and the implementation as part of FCAPS best practices. The IT Infrastructure Library (ITIL) model is defined by the International Organization for Standardization (ISO). The Prepare, Plan, Design, Implement, Operate, and Optimize (PPDIOO) model identifies the implementation plan as part of the Design phase and the actual implementation as part of the Implement phase. The Telecommunications Management Network (TMN) model is similar to the PPDIOO model. 16. Whichthreestepsare completedin the first threephasesof the Prepare,Plan, Design, Implement,Operate,andOptimize(PPDIOO)model?(Choosethree.) Archive the documentation for future use. Characterize the existing network and sites. Design the network topology and solutions. Identify customer requirements. Implement and verify the design. Monitor and optionally redesign. 17. Whichtwo stepsare completedin the last threephasesof the Prepare,Plan, Design, Implement,Operate,andOptimize(PPDIOO)model?(Choosetwo.) Characterize the existing network and sites. Configure and verify the design. Design the network topology and solutions. Document the existing network information. Identify customer requirements. Monitor and optionally redesign. 18. TheABCCorporationimplementsthe networkfor its newheadquartersvia the use of the CiscoEnterpriseArchitecture.Thenetworkadministratorwantsto filter the traffic from and to the outsideworld. Whereshouldthe administratordeploya firewall device? server farm enterprise edge

enterprise campus service provider edge 19. Whendesigninga networkinfrastructure,a networkengineerwill use the hierarchical networkmodel. Whattwo factorsmustbe takeninto accountwhendesigningthe core layer?(Choosetwo.) packet manipulation to prioritize the flow of core data redundant links to ensure fault tolerance routing protocols that are chosen for the speed of network convergence access control lists to curtail core layer traffic star network topologies to reduce core layer latency 20. Whichtwo functionsare performedat the distributionlayerof the hierarchicalnetwork model?(Choosetwo.) summarizing routes from the access layer providing high-speed backbone switching services allowing end users to access the local network providing the gateway of last resort for core layer devices isolating network problems to prevent them from affecting the core layer

Potrebbero piacerti anche