Qa

As mentioned in the Introduction, you have two choices for review questions: here in the book or the exam questions on the CD-ROM. The answers to these questions appear in Appendix A.

For more practice with exam format questions, use the exam engine on the CD-ROM.

1. True or false: Layer 2 switches control network broadcasts.

2. What technology can you use to limit multicasts at Layer 2?

3. True or false: Packet marking is also called coloring.

4. True or false: Usually the distribution and core layers are collapsed in medium-sized networks.

5. What are two methods to mark frames to provide CoS?

6. Which of the following is an example of a peer-to-peer application?

a. IP phone call b. Client accessing file server c. Web access d. Using a local server on the same segment

7. What primary design factors affect the design of a campus network? (Select three.)

a. Environmental characteristics b. Number of file servers c. Infrastructure devices d. Fiber and UTP characteristics e. Network applications f. Windows, Linux, and mainframe operating systems

8. You need to connect a building access switch to the distribution switch. The cable distance is 135 m. What type of cable do you recommend?

b. Coaxial cable c. Multimode fiber d. Single-mode fiber

9. Which layer of the campus network corresponds to the data center aggregation layer?

a. Core layer b. Distribution layer c. Access layer d. Server farm

10. Which of the following is an access layer best practice?

a. Reduce switch peering and routing b. Use HSRP and summarize routes c. Disable trunking and use RPVST+

d. Offload SSL sessions and use load balancers

11. Which of the following is a distribution layer best practice?

a. Reduce switch peering and routing b. Use HSRP and summarize routes c. Disable trunking and use RPVST+

d. Offload SSL sessions and use load balancers

12. Which of the following is a core layer best practice?

a. Reduce switch peering and routing b. Use HSRP and summarize routes c. Disable trunking and use RPVST+

d. Offload SSL sessions and use load balancers

13. Which of the following is a DC aggregation layer best practice?

a. Reduce switch peering and routing b. Use HSRP and summarize routes c. Disable trunking and use RPVST+

d. Offload SSL sessions and use load balancers

14. Which of the following are threats to the edge distribution?

a. IP spoofing b. Network discovery c. Packet-capture devices d. All of the above

15. An enterprise network has grown to multiple buildings supporting multiple departments. Clients access servers that are in local and other buildings. The company security assessment has identified policies that need to be applied. What would you recommend?

a. Move all departments to a single building to prevent unauthorized access.

b. Move all servers to one of the LAN client segments.

c. Move all servers to a server farm segment that is separate from client LANs.

d. Move all servers to the building distribution switches.

16. Link redundancy and infrastructure services are design considerations for which layer(s)?

a. Core layer b. Distribution layer c. Access layer d. All of the above

17. Which of the following are server connectivity methods in the server farm?

a. Single NIC

b. EtherChannel c. Content switch d. All of the above

18. What is the recommended method to connect the distribution switches to the core?

a. Redundant triangle links b. Redundant cross-connect links c. Redundant Layer 3 squares d. Redundant Layer 2 links

19. A campus network of four buildings is experiencing performance problems. Each building contains 400 to 600 devices, all in one IP subnet. The buildings are connected in a hub-and-spoke configuration back to building 1 using Gigabit Ethernet with multimode fiber. All servers are located in building 1. What would you recommend to improve performance?

a. Connect all buildings in a ring topology b. Implement multiple VLANs in each building c. Move servers to the buildings d. Use single-mode fiber to make the Gigabit Ethernet links faster

20. What of the following is true about data link layer broadcasts?

a. Not controlled by routers b. Not forwarded by routers c. Not forwarded by switches d. Not controlled by VLANs

21. Match each LAN medium with its original physical specification:

i. Fast Ethernet ii. Gigabit Ethernet iii. WLAN

iv. Token Ring v. 10Gigabit Ethernet a. IEEE 802.3ab b. IEEE 802.11b c. IEEE 802.3u d. IEEE 802.3ae e. IEEE 802.5

22. True or false: Layer 3 switches bound Layer 2 collision and broadcast domains.

23. Match each Enterprise Campus component with its description:

i. Campus infrastructure ii. Server farm iii. Edge distribution a. Consists of backbone, building-distribution, and building-access modules b. Connects the campus backbone to the Enterprise Edge c. Provides redundancy access to the servers

24. Match each LAN device type with its description:

i. Hub ii. Bridge iii. Switch iv. Layer 3 switch v. Router a. Legacy device that connects two data link layer segments b. Network layer device that forwards packets to serial interfaces connected to the WAN

c. High-speed device that forwards frames between two or more data link layer segments d. High-speed device that bounds data link layer broadcast domains e. Device that amplifies the signal between connected segments

25. Match each application type with its description:

i. Peer-to-peer ii. Client-local server iii. Client/server farm iv. Client-Enterprise Edge a. Server on the same segment b. IM

c. Web access d. Client accesses database server

26. Match each transmission medium with its upper-limit distance:

ii. Wireless iii. Single-mode fiber iv. Multimode fiber a. 2 km b. 100 m c. 90 km d. 500 m

27. True or false: IP phones and LAN switches can reassign a frame's CoS bits.

28. Name two ways to reduce multicast traffic in the access layer.

29. What are two VLAN methods you can use to carry marking CoS on frames?

30. True or false: You can configure CGMP in mixed Cisco switch and non-Cisco router environments.

Use Figure 3-19 to answer the following questions.

Figure 3-19 Enterprise Campus Diagram

L3 Switches L2 Switches IP Phones

Workstations

To WAN

L3 Switches L2 Switches IP Phones

Workstations

31. What medium would you recommend for the campus LAN backbone?

32. The workstations send frames with the CoS set to 5. What should the IP phones do so that the network gives preference to VoIP traffic over data traffic?

33. If the Layer 2 switches in Building A cannot look at CoS and ToS fields, where should these fields be inspected for acceptance or reclassification: in the building Layer 3 switches or in the backbone Layer 3 switches?

34. Does the network have redundant access to the WAN?

35. Does the network have redundant access to the Internet?

36. Does Figure 3-19 use recommended devices for networks designed using the Enterprise Architecture model?

Was this article helpful?

+1 0

Post a comment