CCNA Discovery 4 Chapter 6 V4.0 Answers

1.

What are the broadcast addresses for each subnet

Refer to the exhibit. What are the broadcast addresses for each subnet?

• Admin – 172.16.31.0
QA – 172.16.1.127
Development – 172.16.2.255
Sales – 172.16.32.255

• Admin – 172.16.31.0
Development – 172.16.2.255
QA – 172.16.1.255
Sales – 172.16.63.255

Admin – 172.16.31.255
Development – 172.16.3.255
QA – 172.16.1.127
Sales – 172.16.63.255

• Admin – 172.16.31.0
QA – 172.16.1.255
Development – 172.16.2.255
Sales – 172.16.32.255

 

2. How many bits make up an IPv6 address?

• 32

• 48

• 64

128

• 132

CCNA Discovery 4 Chapter 5 V4.0 Answers

CCNA Discovery 4 Chapter 5 V4.0 Answers

1. What is a primary function of a wireless LAN controller?

tuning each AP channel for optimal coverage

providing PoE to the wireless clients

distributing VLAN information to the wireless clients

serving as the point of connection between wireless clients and the wired LAN

 

2. Which statement applies to a large network with thousands of nodes?

Each wireless phone is normally in a separate VLAN for security reasons.

Multiple firewalls exist throughout the access layer for maximum security protection.

Firewalls cannot be implemented in the multilayer switches and routers.

Intrusion detection is more likely to be performed by a separate device rather than integrated into a switc router.

CCNA Discovery 4 Chapter 4 V4.0 Answers

CCNA Discovery 4 Chapter 4 V4.0 Answers

1. The design of an IP telephony system needs to meet the technical requirements to provide a connection to the PSTN as well as provide high-quality voice transmissions using the campus network. Which two elements directly affect the ability of the design to meet these requirements? (Choose two.)

• voice-enabled firewall

• PoE switches and patch panels

• redundant backbone connectivity

voice-enabled router at the enterprise edge

separate voice and data VLANs with QoS implemented

 

2. Which technology provides a mechanism for implementing QoS at Layer 2?

• ToS

CoS

• DSCP

• IP precedence

CCNA Discovery 4 Chapter 3 V4.0 Answers

1.

Based upon the Cisco IOS file naming convention

Refer to the exhibit. Based upon the Cisco IOS file naming convention, what is represented by the value ipvoicek9 listed in the IOS filename?

version

file format

feature set

hardware platform

 

2. During a wireless site survey, a consultant is determining the hours of peak usage and the estimated number users in each location. The consultant is currently in what step of the site survey process?

the defining of customer requirements

the identification of coverage areas

the determining of preliminary AP locations

the measurement of signal strength

CCNA Discovery 4 Chapter 2 V4.0 Answers

1. A major corporation has decided to hire someone to upgrade their network infrastructure. A network consulting company wants the job. What document must the network consulting company obtain to learn about the business goals, the project scope, the requirements for the new network and the expected deliverables?

• Business Case

• Project Plan

Request for Proposal

• Request for Comments

 

2. What is a purpose of establishing a network baseline?

• It provides a statistical average for network performance.

• It manages the performance of network devices.

It creates a point of reference for future network evaluations.

• It checks the security configuration of network devices.

CCNA Discovery 4 Chapter 1 V4.0 Answers

1.

If the firewall module has been correctly configured

Refer to the exhibit. If the firewall module has been correctly configured using best practices for network security, which statement is true about the security design for the network?

Servers in the network are not protected from internal attacks.

Servers in the DMZ are protected from internal and external attacks.

Servers in the server farm are protected from internal and external attacks.

Traffic from the external networks is not able to access the servers in the DMZ.

 

2. A network designer is creating a new network. The design must offer enough redundancy to provide protect against a single link or device failure, yet must not be too complex or expensive to implement. What topolo would fill these needs?

star

full mesh

partial mesh

extended star

hub and spoke

CCNA Discovery 3 Final V4.0 Answers

1.

R1 and R2 are connected via serial interfaces

Refer to the exhibit. R1 and R2 are connected via serial interfaces. Both interfaces show that there is Layer 2 connectivity between them. The administrator verifies that CDP is operational; however, pings between the two interfaces are unsuccessful. What is the cause of this connectivity problem?

no set loopback

incorrect subnet mask on R2

incompatible bandwidth

incorrect IP address on R1

incompatible encapsulation

 

2. What are two benefits of using ACLs? (Choose two.)

They provide IP filtering.

They reduce the processing load on the router.

They simplify the configuration of inter-VLAN routing.

They prevent routing loops and facilitate convergence.

They identify traffic for multiple uses such as QoS and NAT.

CCNA Discovery 3 Chapter 9 V4.0 Answers

1. An employee called the help desk to report a laptop that could not access a web-based application on the Internet. The help desk technician asked the employee to open a Windows command prompt and type the ipconfig /all command. Which problem-solving technique did the technician choose?

top-down

bottom-up

substitution

divide-and-conquer

 

2.

Given the output generated by the debug ppp negotiation command

Refer to the exhibit. Given the output generated by the debug ppp negotiation command, which statement is true?

The line protocol of the local router is now up.

The hostname of the local router is Goleta.

The command ppp authentication pap is configured on both routers.

The local router requested to terminate the session.

CCNA Discovery 3 Chapter 8 V4.0 Answers

1. Which wildcard mask would match the host range for the subnet 192.16.5.32 /27?

0.0.0.32

0.0.0.63

0.0.63.255

0.0.0.31

 

2.

The new security policy for the company allows all IP traffic from the Engineering LAN to the Internet while only web traffic from the Marketing LAN is allowed to the Internet

Refer to the exhibit. The new security policy for the company allows all IP traffic from the Engineering LAN to the Internet while only web traffic from the Marketing LAN is allowed to the Internet. Which ACL can be applied in the outbound direction of Serial 0/1 on the Marketing router to implement the new security policy?

access-list 197 permit ip 192.0.2.0 0.0.0.255 any
access-list 197 permit ip 198.18.112.0 0.0.0.255 any eq www

access-list 165 permit ip 192.0.2.0 0.0.0.255 any
access-list 165 permit tcp 198.18.112.0 0.0.0.255 any eq www
access-list 165 permit ip any any

access-list 137 permit ip 192.0.2.0 0.0.0.255 any
access-list 137 permit tcp 198.18.112.0 0.0.0.255 any eq www

access-list 89 permit 192.0.2.0 0.0.0.255 any
access-list 89 permit tcp 198.18.112.0 0.0.0.255 any eq www

CCNA Discovery 3 Chapter 7 V4.0 Answers

CCNA Discovery 3 Chapter 7 V4.0 Answers

1. Why are Network Control Protocols used in PPP?

to establish and terminate data links

to provide authentication capabilities to PPP

to manage network congestion and to allow quality testing of the link

to allow multiple Layer 3 protocols to operate over the same physical link

 

2. What is the data transmission rate for the DS0 standard?

44 kb/s

64 kb/s

1.544 Mb/s

44.736 Mb/s