CCNA Discovery 3 - Introducing Routing and Switching in the Enterprise (Version 4.0)

CCNA Discovery 3 Final V4.0 Answers

1.

R1 and R2 are connected via serial interfaces

Refer to the exhibit. R1 and R2 are connected via serial interfaces. Both interfaces show that there is Layer 2 connectivity between them. The administrator verifies that CDP is operational; however, pings between the two interfaces are unsuccessful. What is the cause of this connectivity problem?

no set loopback

incorrect subnet mask on R2

incompatible bandwidth

incorrect IP address on R1

incompatible encapsulation

 

2. What are two benefits of using ACLs? (Choose two.)

They provide IP filtering.

They reduce the processing load on the router.

They simplify the configuration of inter-VLAN routing.

They prevent routing loops and facilitate convergence.

They identify traffic for multiple uses such as QoS and NAT.

CCNA Discovery 3 Chapter 9 V4.0 Answers

1. An employee called the help desk to report a laptop that could not access a web-based application on the Internet. The help desk technician asked the employee to open a Windows command prompt and type the ipconfig /all command. Which problem-solving technique did the technician choose?

top-down

bottom-up

substitution

divide-and-conquer

 

2.

Given the output generated by the debug ppp negotiation command

Refer to the exhibit. Given the output generated by the debug ppp negotiation command, which statement is true?

The line protocol of the local router is now up.

The hostname of the local router is Goleta.

The command ppp authentication pap is configured on both routers.

The local router requested to terminate the session.

CCNA Discovery 3 Chapter 8 V4.0 Answers

1. Which wildcard mask would match the host range for the subnet 192.16.5.32 /27?

0.0.0.32

0.0.0.63

0.0.63.255

0.0.0.31

 

2.

The new security policy for the company allows all IP traffic from the Engineering LAN to the Internet while only web traffic from the Marketing LAN is allowed to the Internet

Refer to the exhibit. The new security policy for the company allows all IP traffic from the Engineering LAN to the Internet while only web traffic from the Marketing LAN is allowed to the Internet. Which ACL can be applied in the outbound direction of Serial 0/1 on the Marketing router to implement the new security policy?

access-list 197 permit ip 192.0.2.0 0.0.0.255 any
access-list 197 permit ip 198.18.112.0 0.0.0.255 any eq www

access-list 165 permit ip 192.0.2.0 0.0.0.255 any
access-list 165 permit tcp 198.18.112.0 0.0.0.255 any eq www
access-list 165 permit ip any any

access-list 137 permit ip 192.0.2.0 0.0.0.255 any
access-list 137 permit tcp 198.18.112.0 0.0.0.255 any eq www

access-list 89 permit 192.0.2.0 0.0.0.255 any
access-list 89 permit tcp 198.18.112.0 0.0.0.255 any eq www

CCNA Discovery 3 Chapter 7 V4.0 Answers

CCNA Discovery 3 Chapter 7 V4.0 Answers

1. Why are Network Control Protocols used in PPP?

to establish and terminate data links

to provide authentication capabilities to PPP

to manage network congestion and to allow quality testing of the link

to allow multiple Layer 3 protocols to operate over the same physical link

 

2. What is the data transmission rate for the DS0 standard?

44 kb/s

64 kb/s

1.544 Mb/s

44.736 Mb/s

CCNA Discovery 3 Chapter 6 V4.0 Answers

CCNA Discovery 3 Chapter 6 V4.0 Answers

1. If a network has converged, what is true about the link-state database held by each router in the same OSPF area?

Each router has a link-state database containing the same status information.

Each router has a different link-state database depending on its position within the network.

The link-state database is stored in a designated router and is accessed by each router in the area as needed.

The link-state database in each router only contains information about adjacent routers and the status of their links.

 

2. What is always required for OSPF routers to share routing information?

designated routers

a backup designated router

neighbor adjacencies

an NBMA network topology

links that are configured on the 224.0.0.0 network

CCNA Discovery 3 Chapter 5 V4.0 Answers

1.

CCNA Discovery 3 Chapter 5 v4.0

Refer to the exhibit. The routers are configured with EIGRP and with default K values. What is the routing path for a packet from network A to reach network B?

R1, R2, R5

R1, R3, R5

R1, R2, R3, R5

R1, R2, R4, R5

R1, R3, R2, R5

R1, R3, R2, R4, R5

CCNA Discovery 3 Chapter 4 V4.0 Answers

CCNA Discovery 3 Chapter 4 V4.0 Answers

DRSEnt Chapter 4 – CCNA Discovery: Introducing Routing and Switching in the Enterprise (Version 4.0)

1. What are two benefits of implementing a VLSM addressing scheme? (Choose two.)

allows efficient use of address space

supports hierarchical addressing capability

supports only one subnet mask length throughout the entire network

allows efficient use of larger routing tables to eliminate the need for route summarization

solves the problem of discontiguous networks with classful routing protocols

 

2. When running NAT, what is the purpose of address overloading?

limit the number of hosts that can connect to the WAN

allow multiple inside addresses to share a single global address

force hosts to wait for an available address

allow an outside host to share inside global addresses

CCNA Discovery 3 Chapter 3 V4.0 Answers

DRSEnt Chapter 3 – CCNA Discovery: Introducing Routing and Switching in the Enterprise (Version 4.0)

1. Which statement describes a difference between STP and RSTP?

RSTP is proprietary while STP is defined by IEEE.

RSTP defines four port states while STP defines five port states.

When a topology changes, RSTP reconfigures the spanning tree in less than 1 second.

STP is more commonly used in large switched enterprise networks that require faster recovery.

 

2. In an enterprise network, why would voice traffic typically require a dedicated VLAN?

It guarantees end-to-end delivery for voice traffic.

It guarantees higher bandwidth for voice traffic.

It separates voice traffic from data traffic so data traffic does not impact voice traffic.

It provides backup support for voice traffic because voice traffic is more critical than data traffic.

CCNA Discovery 3 Chapter 2 V4.0 Answers

DRSEnt Chapter 2 – CCNA Discovery: Introducing Routing and Switching in the Enterprise (Version 4.0)

1. Which two router parameters can be set from interface configuration mode? (Choose two.)

IP address

Telnet password

hostname

console password

subnet mask

enable secret password

 

2. An investment company has multiple servers that hold mission critical data. They are worried that if something happens to these servers, they will lose this valuable information. Which type of plan is needed for this company to help minimize loss in the event of a server crash?

business security

business continuity

network maintenance

service level agreement

CCNA Discovery 3 Chapter 1 V4.0 Answers

DRSEnt Chapter 1 - CCNA Discovery: Introducing Routing and Switching in the Enterprise (Version 4.0)

1. The ABC Corporation implements the network for its new headquarters using the Cisco Enterprise Architecture. The network administrator wants to filter the traffic from and to the outside world. Where should the administrator deploy a firewall device?

server farm

enterprise edge

enterprise campus

service provider edge

 

2. How does a VPN work to support remote user productivity?

It uses SSL to encrypt remote user logins to the corporate intranet.

It uses secure Telnet for remote user connections to internal network devices.

It creates a virtual circuit that allows real-time communications between any two Internet endpoints.

It uses encapsulation to create a secure tunnel for transmission of data across non-secure networks.