CCNA 3.txt

  1. Which of the three options correctly associate a layer of the hierarchical design model with its function? (Choose three.)
    A. Core - interface for the end devices
    B. Distribution - traffic control and security policies

    C. Access - interface for end devices
    D. Distribution - high-speed backbone
    E. Core - high-speed backbone
    F. Access - implementation of security policies
    • B. Distribution - traffic control and security policies
    • C. Access - interface for end devices
    • E. Core - high-speed backbone

    • These are the principal characteristics of the respective design layers
  2. With respect to network design, what is convergence?
    A. Implementation of standard equipment sets for LAN design
    B. Implementation of a core-distribution-access design model for all sites in an enterprise.
    C. A point in the network where all traffic "converges" before transmission to the destination, normally the core switch
    D. Combining conventional data with voice and video on a common network
  3. Which three options are potential benefits of a converged network? (Choose three.)

    A. Simplified data network configuration
    B. Combines voice and data network staffs
    C. Combines voice, video, and applications in one computer
    D. Simpler maintenance than hierarchical networks
    E. Simplified network changes
    F. Lower quality of service configuration requirements
  4. Which four options describe data store and data server analysis actions? (Choose four.)

    A) Workstation ports required for a department
    B) Amount of server-to-server traffic
    C) Intensity of use of a department application server
    D) Amount of traffic for a SAN
    E) Anticipated department port growth
    F) Data backed up to tape
    G) Network attached to storage
  5. Describes the portion of the network where devices connect to the network and includes controls for allowing devices to communicate on the network.
    Access Layer
  6. In the hierarchical network design model, the later that invokes policy and routing control. 
    Distribution Layer
  7. At which layer in the hierarchical network design model are VLANs typically defined?
    Distribution Layer
  8. The backbone of a switched LAN. All traffic to end from peripheral networks must pass through this layer. It includes high-speed switching devices that can handle relatively large amounts of traffic. 
    Core Layer
  9. A desirable property of a network to handle growing amounts of traffic in a graceful manner. 
    Scalability
  10. The duplication of devices, services, or connections so that, in the event of a failure, the redundant devices, services, or connections can perform the work of those that failed. 
    Redundancy
  11. A loosely defined networking measure based on throughput and error rates.
    Performance
  12. An encompasing term describing the prevention and means of prevention of unauthorized access to an entity, location, or system.
    Security
  13. A measure of the lack of difficulty in a managing network devices and associated software in working order.
    Manageability
  14. A measure of the lack of difficulty in keeping network devices and associated software in working order. 
    Maintainability
  15. The capability to carry voice traffic over an IP-based network with POTS-like functionality, reliability, amd voice quility. Enables a router to corry voice traffic over an IP network. 
    Voice Over IP (VoIP)
  16. Voice packets are transported using...
    IP in compliance with ITU-T spcification H.323
  17. The speed and compatibility of a group of switches running STP to agree on a loop-free Layer 2 topology for a switched LAN.
    Convergence
  18. A measure of performance for a transmission system that reflects its transmission quality and service available.
    Quality of Service (QoS)
  19. A digital or analog telephone switchboard located on the subscriber premises and used to connect private and public telephone networks.
    Private Branch Exchange (PBX)
  20. A large and diverse network connecting major sites within a company or other organization. 
    Enterprise Network
  21. How does a enterprise network differ from a WAN?
    An enterprise network is privately owned and maintained
  22. The powering of network devices over Ethernet cable. 
    Power over Ethernet (PoE)
  23. Filters and forewards packets based on OSI layer 2 through Layer 7 information at wire-speed by utilizing dedicated hardware that stores data structures mirroring routing table, ARP table, and ACL information.
    Multilayer Switch
  24. Which three options correctly associate a layer of the hierarchical design model with its function? (Choose three.)

    Core - interface for end devices
    Distribution - traffic control and security policies
    Access - interface for end devices
    Distribution - high-speed backbone
    Core - high-speed backbone
    Access - implementation of security policies
    • Distribution - traffic control and security policies
    • Access - interface for end devices
    • Core - high-speed backbone
  25. With respect to network design, what is convergence?
    a) implementation of standard equipment sets for LAN design
    b) implementation of a core-distribution-access design model for all sites in an enterprise
    c) a point in the network where all traffic "converges" before transmission to the destination, normally the core switch
    d) combining conventional data with voice on a common network
    d) combining conventional data with voice on a common network
  26. Name three potential benefits of a converged network.
    combines voice, video, and applications in one computer

    simplified network changes

    combines voice and data network staffs
  27. What factor may complicate user communities analysis?

    a) application changes may radically affect predicted data growth
    b) server to server traffic may skew user port usage data
    c) application usage is now always bound by department, or physical location
    d) different organization applications may share data stores
    c) application usage is now always bound by department, or physical location
  28. Data rate that each port on the switch is capable of attaining
    Wire Speed
  29. number of ports available on a single switch
    Port Density
  30. Processing apabilities of a switch by quantifying performance of the switch by how much data it can process per second
    Forwarding Rates
  31. Ability to utilize multiple switch ports currently for higher throughput data communication
    Link Aggregation
  32. What would be the port capacity of a single port on a 48-port Gigabit Ethernet switch?

    a) 48 Gbps
    b) 10 Mbps
    c)1000 Mbps
    d)100 Mbps
    c)1000 Mbps
  33. A switch that uses MAC addresses to foreward frames operated at which layer of the OSI model?

    a) Layer 1
    b) Layer 2
    c) Layer 3
    d) Layer 4
    b) Layer 2
  34. What is a feature offered by all stackable switches?

    a) predetermined number of ports
    b) fully redundant backplane
    c) support for Gigabit connectivity
    d) low bandwidth for inter-switch communications
    e) PoE Capability
    b) fully redundant backplane
  35. What function is performed by a Cisco access level switch?

    a) inter-VLAN support
    b) routing
    c) providing PoE
    d) link aggregation
    c) providing PoE
  36. Classifying and prioritizing traffic based on type of data.
    QoS (Quality of Service)
  37. Allow you to segment the traffic on a switch into separate subnetworks.
    VLANs
  38. Controls which end devices are allowed to communicate on the network.
    Access Layer
  39. Distribution layer and core layer are combined into one layer.
    collapsed core
  40. High-speed backbone of the internetwork capable of forwarding large amounts of data quickly.
    Core Layer
  41. Determine the design requirements for a network
    Business Goals
  42. Access layer switches can be configured with this option to provide control over which devices are allowed to connect to the network
    port security
  43. Cisco proproetary link aggregation technology
    EtherChannel
  44. Properly designed hierarchical networks can achieve near wire speed between all devices
    Performance
  45. Consistency between switches at each layer allows for rapid recovery and simplified troubleshooting.
    manageability
  46. Dramatically increases availability
    redundancy
  47. Controls the flow of the network traffic using policies and delineates breadcast domains be performing rounting functions between virtual LANs(VLANs).
    Distribution Layer
  48. The process of combining voice and video communications on a data network
    Convergence
  49. The modularity of the hierarchical design facilitates ease of network expansion.
    scalability
  50. A graphical representation of a network infrastructure.
    topology diagram
  51. Cannot add hardware features or options beyond those that originally came with the switch
    fixed configuration switches
  52. allow installation of different line cards
    modular switches
  53. A process of measuring the bandwidth usage on a network and analyzing the data for the purpose of performance tuning, capacity planning, and making hardware improvement decisions.
    traffic flow analysis
  54. Reduces bottlenecks of traffic by allowing up to eight switch ports to be bound together for data communications.
    link aggregation
  55. The number of ports available on a single switch.
    port density
  56. Uses the network cable to deliver electicity to devices.
    Power over Ethernet (PoE)
  57. Generated between data storage devices on the network.
    Server-server traffic
  58. Interconnected using a special backplane cable
    stackable switches
  59. Typically traverses multi[le switches to reach its destination
    client-server traffic
  60. Defines the capabilities of a switch by classifying how much data the switch can process per second
    forwarding rates
  61. also know as Layer 3 switches
    multilayer switches
  62. A process of idenifying various groups and their impact on network performance.
    user community analysis
  63. Features of the Access Layer (6)
    • Bandwidth Aggregation
    • Fast Ethernet/Gigabit Ethernet
    • Port Security
    • Power over Ethernet (PoE)
    • Quality of Service (QoS)
    • VLANs
  64. Features of hte Distribution Layer (7)
    • Bandwidth Aggregation
    • Gigabit Ethernet/10-Gigabit Ethernet
    • High Forwarding Rate
    • Layer 3 support
    • Quality of Service (QoS)
    • Redundant Components
    • Security Policies/Access Control Lists
  65. Features of the Core Layer (6)
    • Bandwidth Aggregation
    • Gigabit Ethernet/10-Gigabit Ethernet
    • Very High Forwarding Rate
    • Layer 3 Support
    • QoS
    • Redundant Components
  66. What is the effect of entering the banner login #Authorized Personnel Only!# command?

    a) #Authorized Personnel Only!# appears after the user logs  in.
    b) Authorized Personnel Only! appears only when the user makes a Telnet connection.
    c) #Authorized Personell Only!# appears only when the user enters the global configuration mode.
    d) Authorized Personnel Only! appears before the username and password login prompts for any connection.
    d) Authorized Personnel Only! appears before the username and password login prompts for any connection.
  67. Nonvolatile memory that can be read, but not written to, by the microprocessor
    Read-Only Memory (ROM)
  68. A 3-byte hexadecimal number that IEEE Registration Authority assigns to any company that manufactures components under the ISO/IEC 8802 standard.
    Original Unique Identifier (OUI)
  69. Refers to the transmission of data just one direction at a time. At any given instant, the device can transmit or receive but not both simultaneously
    Half Duplex
  70. The capability of a port for simultaneous data transmission and reception
    Full Duplex
  71. When this feature is enabled, the switch detects the required cable type for copper Ethernet connections and configures the interface pin-outs accordingly, enabling the use of either a crossover cable or a straight-through cable for commections to a 10/100/1000 port on the switch, regardless of the type of device on the other end of the connection.
    Auto-MDIX
  72. The data trafficking technique used by switches in which traffic received on an interface is sent out to all the other interfaces of the switch.
    Flooding
  73. A group of hosts with a common set of requirements that communicate as if they were attached to the same sire, regardless of their physical location
    Virtual LAN (VLAN)
  74. The time lag between the departure of a signal from the source and the arival of the signal at the destination.
    Propagation Delay
  75. A technique in which frames are completely processed before being forwarded out the appropriate port. The processing includes calculating the CRC and checking the destination address. In addition, frames must be temporarily stored until network resources are available to forward the message.
    Store-and-forward Switching
  76. An Ethernet frame switching approach that streams data through a switch so that the leading edge of a packet exits the switch at the egress port before the packet finishes entering the ingress port.
    Cut-through Switching
  77. An environment that uses pictorial as well as textual representations of the input and output of applications and tha data structure in which info is stored.
    Graphical User Interface (GUI)
  78. Used to monitor and control network devices, and to manage configurations, statistics collection, performance, and security.
    Simple Network Management Protocol (SNMP)
  79. RAM that retains its contents when a device is powered off. Used to store configuration files.
    Nonvolative RAM (NVRAM)
  80. A simplified version of FTP that allows files to be transferred from one computer to another over a network in clear text without authentication.
    Trivial File Transfer Prolotoc (TFTP)
  81. The application of a specific algorithm to data so as to alter the appearance of the data, making it incomprehensible to those who are not authorzed to see the info.
    Encryption
  82. The act of a packet or frame being represented with a false source address to mask its true source. Designed to fail network security mechanisms such as filters and access lists.
    Spoofing
  83. A media-and-protocol-independent device-discovery protocol that runs on all Cisco-manufactured equipment, including routers, access servers, bridges, and switches. Using this, a device can advertise its existence to other devices and receive info about other devices on the same LAN or on the remote side of a WAN.
    Cisco Discovery Protocol (CDP)
  84. bidirectional data flow
    half-duplex communication
  85. A special set of rules used in Ethernet LANs operating in half-duplex mode
    CSMA/CD
  86. Unidirectional data flow
    full-duplex communication
  87. A frame is sent to a specific group of devices or clients
    multicast transmission
  88. the average amount of data that is actually transmitted as opposed to the rating of the port
    throughput
  89. the time a frame of a packet takes to travel from the source to the destination
    latency
  90. Layer 2 identifier for the frame's originating NIC
    Source MAC Address
  91. A type of checksum used to detect errors in a transmitted frame
    cyclical redundancy chech
  92. Time it takes to place a fron on the wire or read the frame off the wire.
    NIC delay
  93. Dedicated connection between two hosts
    microsegment
  94. Time it takes for a signal to travel through the media
    propagation delay
  95. the network area where frames originate and collide
    collision domain
  96. A fram is sent from one host to on specific destination
    unicast transmission
  97. A frame is send from one address to all other addresses
    broadcast transmission
  98. Integrated circuits that control the data paths through the switch
    switch fabric
  99. Layer 2 identifier for the intended recipient
    Destination MAC address
  100. Bounded by a router or a switch with VLANs
    broadcast domans
  101. Automatically detects the required cable type for copper Ethernet connections
    Auto-MDIX
  102. 7 Parts of an Ethernet frame and how many bits each
    • Preamble - 7
    • Start of Frame Delimiter - 1
    • Destination Address - 6
    • Source Address - 6
    • Length/Type- 2
    • 802.2 Header and Data - 46-1500
    • Frame check sequence - 4
  103. Catalyst switch VLAN configuration info is stored with a VLAN database file. Located in the flash memory of a switch. 
    vlan.dat
  104. Technology developed by Intel and licensed to other semiconductor companies. Allows software images to be stored, booted, and rewritten as necessary.
    Flash
  105. A Cisco-proprietary Layer 2 protocol that enables a network manager to configure a single switch so that it propagates VLAN configuration info to other switches in the network, as well as synchronizes the info with the switches in the VTP domain.
    VLAN Trunking Protocol (VTP)
  106. A VLAN that is configured to carry only user-generated traffic. Does not carry voice-based traffic or traffic used to manage a switch.
    Data VLAN
  107. The VLAN that all the ports are on a switch are members of when a switch is reset to factory defaults. All switch ports are members of the VLAN after the initial boot of the switch.
    Default VLAN
  108. A dummy VLAN distinct from all other VLANs. All unused ports are assigned to this VLAN so that any device connecting to an unused switch port will be assigned to this VLAN. Any traffic associated with this VLAN is not allowed on trunk links, thus preventing any device associated with this VLAN from communicating beyond the switch to which it is connected.
    Black Hole VLAN
  109. A project in the IEEE 802 standards process to develop a mechanism to allow multiple bridged networks to transparently share the same physical network link without leaking info between networks. Also the name of the encapsulation protocol used to implement this mechanism over Ethernet networks.
    IEEE 802.1Q
  110. A means of accessing the management capabilities of a switch.
    Management VLAN
  111. Designed for and dedicated to the transmission of voice traffic involving Cisco IP phones or Cisco Softphones.
    Voice VLAN
  112. IP telephony traffic responsible for call setup, progress, and teardown, traversing the network end-to-end.
    Signaling Traffic
  113. One in which ports on the switch are manually assigned.
    Static VLAN
  114. A Layer 3 logical interface associated with a specific VLAN.
    Switch Virtual Interface (SVI)
  115. An Ethernet point-to-point link between an Ethernet switch interface and an Ethernet interface on another networking device, such as a router or a switch, carrying the traffic of multiple VLANs over the singular link. Allows you to extend the VLANs across an entire switched LAN.
    VLAN Trunk
  116. A standard that provides traffic class expediting. It provides a mechanism for implementing QoS at the MAC sublayer.
    IEEE 802.1p
  117. A single bit flag value in the IEEE 802.1Q header. Indicates that all MAC address info present in the MAC address data.
    Canonical Format Identifier (CFI)
  118. The parameter in the IEEE 802.1Q tag that indicates the VLAN the frame is associated with.
    VLAN ID (VID)
  119. A normal Ethernet frame in a switched LAN.
    Untagged Frame
  120. A Cisco-proprietary protocol that maintains VLAN info as traffic flows between switches and routers, or switches and switches. Used by trunk ports to encapsulate Ethernet frames between network devices.
    Inter-Switch Link (ISL)
  121. A Cisco-proprietary protocol that negotiates both the status and encapsulation of trunk ports.
    Dynamic Trunking Protocol (DTP)
  122. Used by DTP to negotiate the status of a trunk port.
    Trunking Mode
  123. The trunking option that sets the local port to be in an unconditional trunking state with DTP disabled. Use this feature when you need to configure a trunk with a switch from another switch vendor.
    Nonegotiate
  124. A DTP setting whereby the local switch port advertises to the remote switch port it is able to trunk but does not request to go to the trunking state.
    Dynamic Auto
  125. A DTP setting whereby the local switch port advertises to the remote switch port that it is able to trunk and ask the remote switch port to go to the trunking state.
    Dynamic Desirable
  126. Each VLAN trunk supports a set of allowed VLANs. Data associated with these VLANs is transmitted over the respective trunk link; remaining data is not transmitted over the link.
    Allowed VLAN
  127. A Cisco-proprietary Layer 2 protocol that enables a network manager to configure a single switch so that it propagates VLAN configuration info to other switches in the network, as well as synchronizes the info with the switches in this domain.
    VLAN Trunking Protocol (VTP)
  128. A set of Catalyst switches with the same VTP domain name; all switches share the same synchronized VTP info.
    VTP Domain
  129. Messages transmitted between Catalyst switches to share and synchronize VLAN configuration details in the switched LAN.
    VTP Advertisements
  130. VTP has three operating modes: server, client, and transparent. The operating mode determines how the switch uses and shares VLAN info within the VTP domain.
    VTP Modes
  131. VTP server advertise the VTP domain VLAN info to other VTP-enabled switches in the same VTP domain. VTP servers store the VLAN info for the entire domain in NVRAM. The server is where VLANs can be created, deleted, or renamed for the domain. It may take multiple subset advertisements to fully update the VLAN info.
    VTP Server
  132. VTP clients participate in VTP operation, but do not permit creating, changing, or deleting of VLANs on the client itself. A VTP domain only while the switch is powered on. A switch reset deletes the VLAN info. A switch must be manually configured to change its mode from VTP server to VTP client. 
    VTP Client
Author
jal128
ID
176520
Card Set
CCNA 3.txt
Description
CCNA 3
Updated