CCNA Discovery 3 Chapter 6 V4.0 Answers

CCNA Discovery 3 Chapter 6 V4.0 Answers

1. If a network has converged, what is true about the link-state database held by each router in the same OSPF area?

Each router has a link-state database containing the same status information.

Each router has a different link-state database depending on its position within the network.

The link-state database is stored in a designated router and is accessed by each router in the area as needed.

The link-state database in each router only contains information about adjacent routers and the status of their links.

 

2. What is always required for OSPF routers to share routing information?

designated routers

a backup designated router

neighbor adjacencies

an NBMA network topology

links that are configured on the 224.0.0.0 network

CCNA Discovery 3 Chapter 4 V4.0 Answers

CCNA Discovery 3 Chapter 4 V4.0 Answers

DRSEnt Chapter 4 – CCNA Discovery: Introducing Routing and Switching in the Enterprise (Version 4.0)

1. What are two benefits of implementing a VLSM addressing scheme? (Choose two.)

allows efficient use of address space

supports hierarchical addressing capability

supports only one subnet mask length throughout the entire network

allows efficient use of larger routing tables to eliminate the need for route summarization

solves the problem of discontiguous networks with classful routing protocols

 

2. When running NAT, what is the purpose of address overloading?

limit the number of hosts that can connect to the WAN

allow multiple inside addresses to share a single global address

force hosts to wait for an available address

allow an outside host to share inside global addresses

CCNA Discovery 3 Chapter 3 V4.0 Answers

DRSEnt Chapter 3 – CCNA Discovery: Introducing Routing and Switching in the Enterprise (Version 4.0)

1. Which statement describes a difference between STP and RSTP?

RSTP is proprietary while STP is defined by IEEE.

RSTP defines four port states while STP defines five port states.

When a topology changes, RSTP reconfigures the spanning tree in less than 1 second.

STP is more commonly used in large switched enterprise networks that require faster recovery.

 

2. In an enterprise network, why would voice traffic typically require a dedicated VLAN?

It guarantees end-to-end delivery for voice traffic.

It guarantees higher bandwidth for voice traffic.

It separates voice traffic from data traffic so data traffic does not impact voice traffic.

It provides backup support for voice traffic because voice traffic is more critical than data traffic.

CCNA Discovery 3 Chapter 2 V4.0 Answers

DRSEnt Chapter 2 – CCNA Discovery: Introducing Routing and Switching in the Enterprise (Version 4.0)

1. Which two router parameters can be set from interface configuration mode? (Choose two.)

IP address

Telnet password

hostname

console password

subnet mask

enable secret password

 

2. An investment company has multiple servers that hold mission critical data. They are worried that if something happens to these servers, they will lose this valuable information. Which type of plan is needed for this company to help minimize loss in the event of a server crash?

business security

business continuity

network maintenance

service level agreement

CCNA Discovery 3 Chapter 1 V4.0 Answers

DRSEnt Chapter 1 - CCNA Discovery: Introducing Routing and Switching in the Enterprise (Version 4.0)

1. The ABC Corporation implements the network for its new headquarters using the Cisco Enterprise Architecture. The network administrator wants to filter the traffic from and to the outside world. Where should the administrator deploy a firewall device?

server farm

enterprise edge

enterprise campus

service provider edge

 

2. How does a VPN work to support remote user productivity?

It uses SSL to encrypt remote user logins to the corporate intranet.

It uses secure Telnet for remote user connections to internal network devices.

It creates a virtual circuit that allows real-time communications between any two Internet endpoints.

It uses encapsulation to create a secure tunnel for transmission of data across non-secure networks.

CCNA Discovery 2 Final Exam V4.1 Answers

CCNA Discovery 2 Final Exam V4.1 Answers

DsmbISP Final Exam - CCNA Discovery: Working at a Small-to-Medium Business or ISP (Version 4.1)

1. Which statement is true about FTP implementations?

The protocol interpreter (PI) function engages once the data transfer process (DTP) function is complete.

The DTP function is responsible for the login sequence.

FTP requires two connections, one for control and one for data.

Both the PI and the DTP close automatically when the transfer is complete.

 

2. A user is able to ping an FTP server across a WAN but is unable to download files from the server. What should be checked to resolve this problem?

the NIC drivers

the IP configuration

the LED status of the NIC

firewall settings

CCNA Discovery 2 Chapter 9 V4.1 Answers

CCNA Discovery 2 Chapter 9 V4.1 Answers

DsmbISP Chapter 9 – CCNA Discovery: Working at a Small-to-Medium Business or ISP (Version 4.1)

1. A user can access any web page on the Internet but cannot access e-mail. What troubleshooting method would be most efficient for troubleshooting this issue?

top-down

bottom-up

divide-and-conquer

impossible to determine from this information

 

2. Hosts on two separate subnets cannot communicate. The network administrator suspects a missing route in one of the routing tables. Which three commands can be used to help troubleshoot Layer 3 connectivity issues? (Choose three.)

ping

show arp

traceroute

show ip route

show controllers

show cdp neighbor

CCNA Discovery 2 Chapter 8 V4.1 Answers

DsmbISP Chapter 8 – CCNA Discovery: Working at a Small-to-Medium Business or ISP (Version 4.1)

1. A company wants to configure a firewall to monitor all channels of communication and allow only traffic that is part of a known connection. Which firewall configuration should be deployed?

packet filtering

proxy

stateful packet inspection

stateless packet inspection

 

2. Which three items are normally included when a log message is generated by a syslog client and forwarded to a syslog server? (Choose three.)

date and time of message

ID of sending device

length of message

message ID

checksum field

community ID

CCNA Discovery 2 Chapter 7 V4.1 Answers

CCNA Discovery 2 Chapter 7 V4.1 Answers

DsmbISP Chapter 7 – CCNA Discovery: Working at a Small-to-Medium Business or ISP (Version 4.1)

1. Which DNS zone resolves an IP address to a qualified domain name?

dynamic lookup

forward lookup

resolution lookup

reverse lookup

 

2. To meet customer expectations, an ISP must guarantee a level of service that is based on what two factors? (Choose two.)

accessibility

adaptability

availability

reliability

scalability