Monday, October 28, 2013

CCNA Discovery 3 Chapter 2 V4.0 Answers 2013 - 2014

Chapter 2 – CCNA Discovery: Introducing Routing and Switching in the Enterprise (Version 4.0) Answers


Q.1 Refer to the exhibit. Which statement is true about port Fa5/1? 
 When a violation is detected, the port will log the information to a syslog server.
 When a violation is detected, the port will go into err-disable mod
 There have been 11 security violations since the last reload
 The port is currently in the shutdown state.
Q.2 A network administrator needs to configure Telnet access to a router. Which group of commandsenable Telnet access to the router?

 Router(config)# enable password class
     Router(config)# line con 0
     Router(config-line)# login
     Router(config-line)# password cisco
 Router(config)# ip host 192.168.1.1 NewYork
     Router(config)# enable password cisco
 Router(config)# line aux 0
     Router(config-line)# login
     Router(config-line)# password cisco
 Router(config)# enable password class
     Router(config)# line vty 0 4
     Router(config-line)# login
     Router(config-line)# password cisco

Q.3 Which two types of information should be included in a business continuity plan? (Choose two.)

 maintenance time periods
 intrusion monitoring records
 offsite data storage procedures
 alternate IT processing locations
 problem resolution escalation steps

Q.4 Which two router parameters can be set from interface configuration mode? (Choose two.)

 IP address
 Telnet password
 hostname
 console password
 subnet mask
 enable secret password


Q.5 Which two devices protect a corporate network against malicious attacks at the enterprise edge ?(Choose two.)

 demarc
 IP security (IPSec)
 Data Service Unit (DSU)
 intrusion prevention system (IPS)
 intrusion detection system (IDS)


Q.6 Which three steps must be performed to remove all VLAN information from a switch but retain therest of the configuration? (Choose three.)

 Remove all VLAN associations from the interfaces.
 Remove the 802.1q encapsulation from the interface
 Issue the command copy start run.
 Issue the command delete flash:vlan.dat.
 Issue the command erase start.
 Reload the switch.


Q.7 What is the demarcation?

 physical point where the ISP responsibilty ends and the customer responsibilty begins
 physical location where all server farm connections meet before being distributed into the Core
 point of entry for outside attacks and is often vulnerable
 point of entry for all Access Layer connections from the Distribution Layer devices


Q.8 Which device is responsible for moving packets between multiple network segments?

 router
 switch
 CSU/DSU
 IDS device

Q.10 What information can an administrator learn using the show version command?

 Cisco IOS filename
 configured routing protocol
 status of each interface
 IP addresses of all interfaces


Q.11 Which two situations require a network administrator to use out-of-band management to change arouter configuration? (Choose two.)

 Network links to the router are down.
 No Telnet password has been configured on the router.
 The administrator can only connect to the router using SSH.
 The network interfaces of the router are not configured with IP addresses.
 Company security policy requires that only HTTPS be used to connect to routers.


Q.12 It is crucial that network administrators be able to examine and configure network devices fromtheir homes. Which two approaches allow this connectivity without increasing vulnerability to externalattacks? (Choose two.)

 Configure a special link at the POP to allow external entry from the home computer.
 Set up VPN access between the home computer and the network.
 Install a cable modem in the home to link to the network.
 Configure ACLs on the edge routers that allow only authorized users to access management portson network devices.
 Configure a server in the DMZ with a special username and password to allow external access.


Q.13 A network administrator must define specific business processes to implement if a catastrophicdisaster prevents a company from performing daily business routines. Which portion of the networkdocumentation is the administrator defining?

 business security plan
 business continuity plan
 network solvency plan
 service level agreement
 network maintenance plan


Q.14 A DoS attack crippled the daily operations of a large company for 8 hours. Which two optionscould be implemented by the network administrator to possibly prevent such an attack in the future?(Choose two.)

 install security devices with IDS and IPS at the enterprise edge
 reset all user passwords every 30 days
 filter packets based on IP address, traffic pattern, and protocol
 deny external workers VPN access to internal resources
 ensure critical devices are physically secure and placed behind the demarc


Q.15 A network manager wants to have processes in place to ensure that network upgrades do not affectbusiness operations. What will the network manager create for this purpose?

 business security plan
 business continuity plan
 service level agreement
 network maintenance plan


Q.16 An investment company has multiple servers that hold mission critical datThey are worried that ifsomething happens to these servers, they will lose this valuable information. Which type of plan isneeded for this company to help minimize loss in the event of a server crash?

 business security
 business continuity
 network maintenance
 service level agreement


Q.17 When searching for information about authentication methods and usernames of companypersonnel, where can a network administrator look?

 Business Continuity Plan
 Business Security Plan
 Network Maintenance Plan
 Service Level Agreement


Q.18 What type of connection point is a point of presence (POP)?

 between a client and a host
 between two local networks
 between a computer and a switch

 between an ISP and an Enterprise network

Q.19 Which three items would be found in a NOC? (Choose three.)

raised floors
all wireless access points
network monitoring station
departmental printers

customer workstations
data storage devices

Q20. What two features are true of an IDF? (Choose two.)

referred to as a wiring closet
located within the NOC
contains access layer devices for user connectivity
contains firewalls and content filtering devices
alternately called an MDF

Q21. Which type of network map shows the location of hosts, network devices, and media?

physical topology
logical topology
control plane
business continuity

Q22. Which two pieces of information are documented in a logical topology map? (Choose two.)

physical cabling
service level agreements
IP addressing
IDF location
group usage information
facility floor plans

Q23. A Cisco router needs to be configured from a remote location by the use of out-of-band management. Which method should be used?

Use Telnet or SSH and connect to an IP address of a FastEthernet port.
Use HTTP to connect to an IP address on a FastEthernet port.
Use dial up and a modem to connect to the auxiliary port.
Use a terminal emulation program and connect to the console port.

Q24. What device is responsible for moving packets to destination networks outside the local network?

router
switch
IPS device
IDS device

Q25. Which two items protect a corporate network against malicious attacks at the enterprise edge ? (Choose two.)

point of demarcation
IP security (IPSec)
Data Service Unit (DSU)
intrusion prevention system (IPS)
intrusion detection system (IDS)

Q26. A network administrator has just inserted a new WIC2T controller into the first available slot of an 1841 router. The administrator needs to configure the first serial interface of this new controller. Which interface should be used?

s0/0/0
s0/0/1
s1/1/0
s1/0/1
s0/1/1

Q27. What is the maximum recommended cable length for Fast Ethernet over UTP?

50 meters
75 meters
100 meters
150 meters

Q28. Which two statements are true about a network operations center (NOC)? (Choose two.)

Most NOCs only have tower servers or desktop servers that provide high-speed storage capabilities for thousands of clients.
A NOC is typically used only to monitor and maintain the most critical network components.
Because access is secured by firewalls, backup systems are not required in a NOC.
Routers, high-speed switches, and servers are located within a NOC.
High-speed and high-capacity data storage are important aspects of a NOC.

Phản ứng:

1 comment:

  1. Q.3 Which two types of information should be included in a business continuity plan? (Choose two.)

    maintenance time periods
    intrusion monitoring records
    ***offsite data storage procedures
    ***alternate IT processing locations
    problem resolution escalation steps

    Q.19 Which three items would be found in a NOC? (Choose three.)

    ***raised floors
    all wireless access points
    ***network monitoring station
    departmental printers
    customer workstations
    ***data storage devices

    ReplyDelete

 
Blogger Gadgets