Daftar dan Nikmati Penyimpanan Gratis Sampai 20 GB, Gabung di Dropbox dapat Free 500 MB, daftar sekarang juga
=> DAFTAR GRATIS <=

CCNA 4 - Chapter 4





1. In addition to the technical considerations, what other major factor is used to evaluate the success of a network installation? 
   final project costs 
   maintenance costs 
   user satisfaction 
   statistics describing the performance of network devices 

2. Which two network applications are most affected by network congestion and delays? (Choose two.) 
   IP telephony
   live video webcasts
 
   audio file downloads 
   online banking services 
   file archival and retrieval 

3. What two Cisco tools can be used to analyze network application traffic? (Choose two.) 
   NBAR
   NetFlow
 
   AutoQoS 
   Wireshark 
   Custom Queuing 

4. In network design, which technology can be implemented to prioritize traffic based on its importance and technical requirements? 
   STP 
   QoS    RTP 
   TCP 
   VPN 

5. What are two characteristics of voice over IP traffic? (Choose two.) 
   Voice packets tend to be small.
   Voice packets must be processed in real time.
 
   Voice packets can effectively use TCP reliability features. 
   Voice traffic can survive packet drops and retransmission delays. 
   Voice packets must be converted to analog before being sent across the IP network. 
   Voice packets automatically receive a higher priority value than other types of packets. 

6. What are two things that a network designer can do to determine current and anticipated network traffic flows? (Choose two.) 
   Survey end users to obtain customer input. 
   Upgrade the Cisco IOS software in all networking devices to optimize traffic flow. 
   Limit the analysis to host-to-server traffic because host-to-host traffic is unimportant. 
   Run a network traffic analysis to determine which applications are in use and by whom. 
   Conduct an inventory of all networking devices that includes model numbers and memory configurations 

7. A company that has a traditional telephone system wants to convert to IP telephony. Which two factors should be considered for the design? (Choose two.) 
   Digital communications systems have greater noise than analog systems when processing voice traffic. 
   Voice-enabled routers or a server must be used for call control and signaling.    Voice to IP conversions can cause router overhead. 
   Power to the phones can be supplied through properly equipped patch panels or switches. 
   The cost to combine voice and data VLANs can be a considerable amount. 

8. Several web and email servers have recently been installed as part of an enterprise network. The security administrator has been asked to provide a summary of security features that can be implemented to help prevent unauthorized traffic from being sent into or out of sensitive internal networks. Which three features should the security administrator recommend? (Choose three.) 
   firewalls    priority queuing 
   access control lists
   intrusion detection systems
 
   DHCP 
   128-bit WEP 

9. The design of an IP telephony system needs to meet the technical requirements to provide a connection to the PSTN as well as provide high-quality voice transmissions using the campus network. Which two elements directly affect the ability of the design to meet these requirements?(Choose two.) 
   voice-enabled firewall 
   PoE switches and patch panels 
   redundant backbone connectivity 
   voice-enabled router at the enterprise edge
   separate voice and data VLANs with QoS implemented
 

10. When implementing VoIP services, which two design considerations should be followed?(Choose two.) 
   Confirm that network jitter is minimal. 
   Use TCP to reduce delays and dropped packets. 
   Establish priority queuing to ensure that large data packets are sent uninterrupted. 
   Disable real-time protocols to reduce queuing strategy demands. 
   Ensure that packet delays do not exceed 150 ms. 

11. What design strategy should be followed when designing a network that uses video on demand? 
   implement the appropriate routing protocol to ensure that data segments arrive in order 
   implement different QoS queues based on the type of video traffic being distributed 
   install servers to store the data in a centrally located server farm 
   configure queuing in the core routers to ensure high availability 

12. When implementing QoS in traffic queues, what is the first step the designer should take to ensure that traffic is properly prioritized? 
   define QoS policies 
   define traffic classes 
   determine traffic patterns 
   identify traffic requirements 
   identify networking equipment 

13. Which two statements are characteristics of file transfer traffic flows? (Choose two.) 
   RTP should be used. 
   Traffic is predictable. 
   Packets are small in size. 
   Transfers are throughput intensive.
   Response-time requirements are low.
 

14. Which two items can be determined by diagramming internal traffic flow? (Choose two.) 
   the type of ISP services needed 
   the capabilities of end-user devices 
   the areas where network congestion may occur 
   the location of VPN servers used to connect teleworkers 
   locations where high-bandwidth connections are required 

15. Which two traffic types are examples of external traffic flows? (Choose two.) 
   A user in the IT department telnets to the core layer router. 
   A user in marketing connects to the web server of a competitor. 
   A user in the IT department telnets into the access layer switch. 
   A user in the services department logs in to a web-based email program. 
   A user in accounting connects to an FTP server that is connected to the access layer switch. 

16. Which service can be provided by the NetFlow Cisco utility? 
   network planning and mapping 
   IDS and IPS capabilities 
   peak usage times and traffic routing 
   network billing and accounting application 
   security and user account restrictions 
   source and destination UDP port mapping 

17. Refer to the exhibit. If ACL 150 identifies only voice traffic from network 192.168.10.0/24 and no other traffic, which queue will voice traffic from other networks use? 
   high 
   normal 
   medium 
   default 

18. Refer to the exhibit. After configuring QoS, a network administrator issues the command show queueing interface s0/1. What two pieces of information can an administrator learn from the output of this command? (Choose two.) 
   queue traffic definitions 
   priority list protocol assignments 
   type of queuing being implemented
   number of packets placed in each queue
 
   queuing defaults that have been changed 
   queuing has not been applied to this interface 

19. An analysis of network protocols reveals that RTP and RTCP are being used. What uses these protocols? 
   IDS 
   VPN 
   WLAN 
   firewall 
   real-time video 

20. A company is considering adding voice and video to the data networks. Which two statements are true if voice and video are added? (Choose two.) 
   PoE switches must be purchased. 
   More UDP-based traffic flows will be evident. 
   Response times will be increased even if QoS is implemented. 
   QoS will most likely be implemented to prioritize traffic flows. 
   VPNs will most likely be implemented to protect the voice traffic. 

21. Refer to the exhibit. Which option correctly matches the terms on top with its definition on the bottom? 
   A=1, B=3, C=2, D=4 
   A=2, B=1, C=4, D=3 
   A=2, B=4, C=1, D=3 
   A=3, B=2, C=4, D=1 
   A=4, B=3, C=1, D=2 
   A=4, B=2, C=3, D=1 

22. A database server is configured to purge all data that is 60 days old. Ten data items that are 60 days old are to be purged. However, there is a failure halfway through the transaction, and the entire transaction is voided. What type of transaction action occurred? 
   atomic 
   consistent 
   durable 
   isolated 

23. What is the primary goal of QoS? 
   classification of traffic 
   filtering and queuing voice traffic 
   reducing bandwidth requirements 
   providing priority service to selected traffic 

24. Which technology provides a mechanism for implementing QoS at Layer 2? 
   ToS 
   CoS 
   DSCP 
   IP precedence 

25. A customer purchases tickets online and pays using a credit card, but the system goes down before the transaction is complete. What transaction type retains a record of this transaction after the system failure so that the customer will still receive the tickets and the credit card account will be debited accordingly? 
   atomic 
   consistent 
   durable 
   isolated 

26. Refer to the exhibit. The network design documents include requirements to prevent switching loops, to provide link-specific failover, and to provide Layer 3 recovery. Which two protocols would be needed to provide the support? (Choose two.) 
   HDLC 
   HSRP 
   PPP 
   RSTP    VTP 

27. network design must minimize latency to support real-time streaming applications. Which two protocols enable control and scalability of the network resources and minimize latency by incorporating QoS mechanisms? (Choose two.) 
   RTCP 
   HSRP 
   RSTP 
   RTP 
   RPC 

28. Which two major differences are associated with IP telephony when compared to traditional telephony that uses a PBX? (Choose two.) 
   manages phones centrally 
   utilizes centralized call routing 
   creates peer-to-peer relationships between phones 
   requires a separate infrastructure to support data transfer 
   requires significant manual configuration when adding, moving, or changing phones 

29. When QoS is implemented in a converged network, which two factors can be controlled to improve performance? (Choose two.) 
   link speed 
   delay 
   packet routing 
   jitter 
   packet addressing

1 Response to "CCNA 4 - Chapter 4"

Saran dan Masukan lebih diutamakan, tidak suka menerima cacian tapi suka menerima sumbangan