SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/

CCNA 4 Chapter 4 V4.0

Labels: CCNA 4 Chapter 4 V4.0
1
In addition to the technical considerations, what other major factor is used to evaluate
the
success of a network installation?

final project costs

maintenance costs

user satisfaction

statistics describing the performance of network devices


2
Which two network applications are most affected by network congestion and delays?
(Choose two.)

IP telephony

live video webcasts

audio file downloads

online banking services

file archival and retrieval


3
What two Cisco tools can be used to analyze network application traffic? (Choose
two.)

NBAR

NetFlow

AutoQoS

Wireshark

Custom Queuing


4
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/

In network design, which technology can be implemented to prioritize traffic based on
its
importance and technical requirements?

STP

QoS

RTP

TCP

VPN


5
What are two characteristics of voice over IP traffic? (Choose two.)

Voice packets tend to be small.

Voice packets must be processed in real time.

Voice packets can effectively use TCP reliability features.

Voice traffic can survive packet drops and retransmission delays.

Voice packets must be converted to analog before being sent across the IP network.

Voice packets automatically receive a higher priority value than other types of
packets.


6
What are two things that a network designer can do to determine current and
anticipated network
traffic flows? (Choose two.)

Survey end users to obtain customer input.

Upgrade the Cisco IOS software in all networking devices to optimize traffic flow.

Limit the analysis to host-to-server traffic because host-to-host traffic is unimportant.

Run a network traffic analysis to determine which applications are in use and by
whom.

Conduct an inventory of all networking devices that includes model numbers and
memory configurations
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/



7
A company that has a traditional telephone system wants to convert to IP telephony.
Which two
factors should be considered for the design? (Choose two.)

Digital communications systems have greater noise than analog systems when
processing voice traffic.

Voice-enabled routers or a server must be used for call control and signaling.

Voice to IP conversions can cause router overhead.

Power to the phones can be supplied through properly equipped patch panels or
switches.

The cost to combine voice and data VLANs can be a considerable amount.


8
Several web and email servers have recently been installed as part of an enterprise
network. The
security administrator has been asked to provide a summary of security features that
can be
implemented to help prevent unauthorized traffic from being sent into or out of
sensitive internal
networks. Which three features should the security administrator recommend?
(Choose three.)

firewalls

priority queuing

access control lists

intrusion detection systems

DHCP

128-bit WEP


9
The design of an IP telephony system needs to meet the technical requirements to
provide a
connection to the PSTN as well as provide high-quality voice transmissions using the
campus
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/

network. Which two elements directly affect the ability of the design to meet these
requirements?(Choose two.)

voice-enabled firewall

PoE switches and patch panels

redundant backbone connectivity

voice-enabled router at the enterprise edge

separate voice and data VLANs with QoS implemented


10
When implementing VoIP services, which two design considerations should be
followed?(Choose two.)

Confirm that network jitter is minimal.

Use TCP to reduce delays and dropped packets.

Establish priority queuing to ensure that large data packets are sent uninterrupted.

Disable real-time protocols to reduce queuing strategy demands.

Ensure that packet delays do not exceed 150 ms.


11
What design strategy should be followed when designing a network that uses video on
demand?

implement the appropriate routing protocol to ensure that data segments arrive in
order

implement different QoS queues based on the type of video traffic being distributed

install servers to store the data in a centrally located server farm

configure queuing in the core routers to ensure high availability


12
When implementing QoS in traffic queues, what is the first step the designer should
take to
ensure that traffic is properly prioritized?
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/

define QoS policies

define traffic classes

determine traffic patterns

identify traffic requirements

identify networking equipment


13
Which two statements are characteristics of file transfer traffic flows? (Choose two.)

RTP should be used.

Traffic is predictable.

Packets are small in size.

Transfers are throughput intensive.

Response-time requirements are low.


14
Which two items can be determined by diagramming internal traffic flow? (Choose
two.)

the type of ISP services needed

the capabilities of end-user devices

the areas where network congestion may occur

the location of VPN servers used to connect teleworkers

locations where high-bandwidth connections are required


15
Which two traffic types are examples of external traffic flows? (Choose two.)

A user in the IT department telnets to the core layer router.

A user in marketing connects to the web server of a competitor.

A user in the IT department telnets into the access layer switch.
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/


A user in the services department logs in to a web-based email program.

A user in accounting connects to an FTP server that is connected to the access layer
switch.


16
Which service can be provided by the NetFlow Cisco utility?

network planning and mapping

IDS and IPS capabilities

peak usage times and traffic routing

network billing and accounting application

security and user account restrictions

source and destination UDP port mapping


17
Refer to the exhibit. If ACL 150 identifies only voice traffic from network
192.168.10.0/24 and no
other traffic, which queue will voice traffic from other networks use?

high

normal

medium

default


18
Refer to the exhibit. After configuring QoS, a network administrator issues the
command show
queueing interface s0/1. What two pieces of information can an administrator learn
from the
output of this command? (Choose two.)

queue traffic definitions

priority list protocol assignments
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/

type of queuing being implemented

number of packets placed in each queue

queuing defaults that have been changed

queuing has not been applied to this interface


19
An analysis of network protocols reveals that RTP and RTCP are being used. What
uses these
protocols?

IDS

VPN

WLAN

firewall

real-time video


20
A company is considering adding voice and video to the data networks. Which two
statements are
true if voice and video are added? (Choose two.)

PoE switches must be purchased.

More UDP-based traffic flows will be evident.

Response times will be increased even if QoS is implemented.

QoS will most likely be implemented to prioritize traffic flows.

VPNs will most likely be implemented to protect the voice traffic.


21
Refer to the exhibit. Which option correctly matches the terms on top with its
definition on the
bottom?

A=1, B=3, C=2, D=4
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/

A=2, B=1, C=4, D=3

A=2, B=4, C=1, D=3

A=3, B=2, C=4, D=1

A=4, B=3, C=1, D=2

A=4, B=2, C=3, D=1


22
A database server is configured to purge all data that is 60 days old. Ten data items
that are 60
days old are to be purged. However, there is a failure halfway through the transaction,
and the
entire transaction is voided. What type of transaction action occurred?

atomic

consistent

durable

isolated


23
What is the primary goal of QoS?

classification of traffic

filtering and queuing voice traffic

reducing bandwidth requirements

providing priority service to selected traffic


24
Which technology provides a mechanism for implementing QoS at Layer 2?

ToS

CoS

DSCP
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/

IP precedence


25
A customer purchases tickets online and pays using a credit card, but the
system goes down before the transaction is complete. What transaction type retains a
record of this transaction after the system failure so that the customer will still receive
the
tickets and the credit card account will be debited accordingly?

atomic

consistent

durable

isolated


26
Refer to the exhibit. The network design documents include requirements to prevent
switching loops, to provide link-specific failover, and to provide Layer 3 recovery.
Which
two protocols would be needed to provide the support? (Choose two.)

HDLC

HSRP

PPP

RSTP

VTP


27
network design must minimize latency to support real-time streaming
applications. Which two protocols enable control and scalability of the network
resources
and minimize latency by incorporating QoS mechanisms? (Choose two.)

RTCP

HSRP

RSTP
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/

RTP

RPC


28
Which two major differences are associated with IP telephony when
compared to traditional telephony that uses a PBX? (Choose two.)

manages phones centrally

utilizes centralized call routing

creates peer-to-peer relationships between phones

requires a separate infrastructure to support data transfer

requires significant manual configuration when adding, moving, or changing phones


29
When QoS is implemented in a converged network, which two factors can
be controlled to improve performance? (Choose two.)

link speed

delay

packet routing

jitter

packet addressing

Weitere ähnliche Inhalte

Was ist angesagt?

Diameter based Interfaces and description
Diameter based Interfaces and descriptionDiameter based Interfaces and description
Diameter based Interfaces and descriptionManjeet Kaur
 
Introduction to DIAMETER
Introduction to DIAMETERIntroduction to DIAMETER
Introduction to DIAMETERHossein Yavari
 
5.2 qos priority_preemption-alu
5.2 qos priority_preemption-alu5.2 qos priority_preemption-alu
5.2 qos priority_preemption-aluMilind Gunjan
 
LTE EPC Technology Essentials
LTE EPC Technology EssentialsLTE EPC Technology Essentials
LTE EPC Technology EssentialsHussien Mahmoud
 
Introduction to sandvine dpi
Introduction to sandvine dpiIntroduction to sandvine dpi
Introduction to sandvine dpiMohammed Abdallah
 
DPI BOX: deep packet inspection for ISP traffic management
DPI BOX: deep packet inspection for ISP traffic managementDPI BOX: deep packet inspection for ISP traffic management
DPI BOX: deep packet inspection for ISP traffic managementIlya Mikov
 
Insights on the configuration and performances of SOME/IP Service Discovery
Insights on the configuration and performances of SOME/IP Service DiscoveryInsights on the configuration and performances of SOME/IP Service Discovery
Insights on the configuration and performances of SOME/IP Service DiscoveryNicolas Navet
 
Scalable Service Oriented Architecture for Audio/Video ...
Scalable Service Oriented Architecture for Audio/Video ...Scalable Service Oriented Architecture for Audio/Video ...
Scalable Service Oriented Architecture for Audio/Video ...Videoguy
 
PathTrak™ Video Monitoring System for Cable TV
PathTrak™ Video Monitoring System for Cable TVPathTrak™ Video Monitoring System for Cable TV
PathTrak™ Video Monitoring System for Cable TVAndrew Tram
 
Go with the Flow-v2
Go with the Flow-v2Go with the Flow-v2
Go with the Flow-v2Zobair Khan
 
Example of One of my Desgins for Cyber &Networking Solutions for Customers ...
Example of One  of my Desgins  for Cyber &Networking Solutions for Customers ...Example of One  of my Desgins  for Cyber &Networking Solutions for Customers ...
Example of One of my Desgins for Cyber &Networking Solutions for Customers ...chen sheffer
 
PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...
PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...
PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...PROIDEA
 
F5 link controller
F5  link controllerF5  link controller
F5 link controllerJimmy Saigon
 
Sapc upcc-pcrf- part 2 tbp
Sapc upcc-pcrf- part 2 tbpSapc upcc-pcrf- part 2 tbp
Sapc upcc-pcrf- part 2 tbpMustafa Golam
 

Was ist angesagt? (20)

Diameter based Interfaces and description
Diameter based Interfaces and descriptionDiameter based Interfaces and description
Diameter based Interfaces and description
 
Introduction to DIAMETER
Introduction to DIAMETERIntroduction to DIAMETER
Introduction to DIAMETER
 
5.2 qos priority_preemption-alu
5.2 qos priority_preemption-alu5.2 qos priority_preemption-alu
5.2 qos priority_preemption-alu
 
IMS Standards
IMS  StandardsIMS  Standards
IMS Standards
 
LTE EPC Technology Essentials
LTE EPC Technology EssentialsLTE EPC Technology Essentials
LTE EPC Technology Essentials
 
Introduction to sandvine dpi
Introduction to sandvine dpiIntroduction to sandvine dpi
Introduction to sandvine dpi
 
DPI BOX: deep packet inspection for ISP traffic management
DPI BOX: deep packet inspection for ISP traffic managementDPI BOX: deep packet inspection for ISP traffic management
DPI BOX: deep packet inspection for ISP traffic management
 
Insights on the configuration and performances of SOME/IP Service Discovery
Insights on the configuration and performances of SOME/IP Service DiscoveryInsights on the configuration and performances of SOME/IP Service Discovery
Insights on the configuration and performances of SOME/IP Service Discovery
 
Scalable Service Oriented Architecture for Audio/Video ...
Scalable Service Oriented Architecture for Audio/Video ...Scalable Service Oriented Architecture for Audio/Video ...
Scalable Service Oriented Architecture for Audio/Video ...
 
Very High Density (vhd) 802.11ac Wireless Network Design and Deployment Basics
Very High Density (vhd) 802.11ac Wireless Network Design and Deployment BasicsVery High Density (vhd) 802.11ac Wireless Network Design and Deployment Basics
Very High Density (vhd) 802.11ac Wireless Network Design and Deployment Basics
 
PathTrak™ Video Monitoring System for Cable TV
PathTrak™ Video Monitoring System for Cable TVPathTrak™ Video Monitoring System for Cable TV
PathTrak™ Video Monitoring System for Cable TV
 
Go with the Flow-v2
Go with the Flow-v2Go with the Flow-v2
Go with the Flow-v2
 
Lakhan_Gupta_CV
Lakhan_Gupta_CVLakhan_Gupta_CV
Lakhan_Gupta_CV
 
Example of One of my Desgins for Cyber &Networking Solutions for Customers ...
Example of One  of my Desgins  for Cyber &Networking Solutions for Customers ...Example of One  of my Desgins  for Cyber &Networking Solutions for Customers ...
Example of One of my Desgins for Cyber &Networking Solutions for Customers ...
 
Outdoor MIMO Wireless Networks
Outdoor MIMO Wireless NetworksOutdoor MIMO Wireless Networks
Outdoor MIMO Wireless Networks
 
PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...
PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...
PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...
 
F5 link controller
F5  link controllerF5  link controller
F5 link controller
 
Sapc upcc-pcrf- part 2 tbp
Sapc upcc-pcrf- part 2 tbpSapc upcc-pcrf- part 2 tbp
Sapc upcc-pcrf- part 2 tbp
 
IETF 79 - Diameter Over SCTP
IETF 79 - Diameter Over SCTPIETF 79 - Diameter Over SCTP
IETF 79 - Diameter Over SCTP
 
Wireless LAN Design Fundamentals in the Campus
Wireless LAN Design Fundamentals in the CampusWireless LAN Design Fundamentals in the Campus
Wireless LAN Design Fundamentals in the Campus
 

Ähnlich wie Ccna 4 Chapter 4 V4.0 Answers

Ccna 4 Chapter 1 V4.0 Answers
Ccna 4 Chapter 1 V4.0 AnswersCcna 4 Chapter 1 V4.0 Answers
Ccna 4 Chapter 1 V4.0 Answersccna4discovery
 
Ccna 4 chapter 1 v4.0 answers 2011
Ccna 4 chapter 1 v4.0 answers 2011Ccna 4 chapter 1 v4.0 answers 2011
Ccna 4 chapter 1 v4.0 answers 2011Dân Chơi
 
Ccna 4 Chapter 8 V4.0 Answers
Ccna 4 Chapter 8 V4.0 AnswersCcna 4 Chapter 8 V4.0 Answers
Ccna 4 Chapter 8 V4.0 Answersccna4discovery
 
Ccna 4 Chapter 5 V4.0 Answers
Ccna 4 Chapter 5 V4.0 AnswersCcna 4 Chapter 5 V4.0 Answers
Ccna 4 Chapter 5 V4.0 Answersccna4discovery
 
Ccna 4 final exam answer v5
Ccna 4 final exam answer v5Ccna 4 final exam answer v5
Ccna 4 final exam answer v5friv4schoolgames
 
Ccnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_examCcnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_examĐồng Quốc Vương
 
Ccna 3 chapter 1 v4.0 answers 2011
Ccna 3 chapter 1 v4.0 answers 2011Ccna 3 chapter 1 v4.0 answers 2011
Ccna 3 chapter 1 v4.0 answers 2011Dân Chơi
 
Ccna 4 chapter 6 v4.0 answers 2011
Ccna 4 chapter 6 v4.0 answers 2011Ccna 4 chapter 6 v4.0 answers 2011
Ccna 4 chapter 6 v4.0 answers 2011Dân Chơi
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reportsShakib Ansaar
 
M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxAngel Garcia
 
17 - Building small network.pdf
17 - Building small network.pdf17 - Building small network.pdf
17 - Building small network.pdfPhiliphaHaldline
 
A REPORT ON CITRIX INDEPENDENT COMPUTING ARCHITECTURE (ICA) PROTOCOL
A REPORT ON CITRIX INDEPENDENT COMPUTING  ARCHITECTURE (ICA) PROTOCOL A REPORT ON CITRIX INDEPENDENT COMPUTING  ARCHITECTURE (ICA) PROTOCOL
A REPORT ON CITRIX INDEPENDENT COMPUTING ARCHITECTURE (ICA) PROTOCOL chaitanya ivvala
 
ETE405-lec9.ppt
ETE405-lec9.pptETE405-lec9.ppt
ETE405-lec9.pptmashiur
 
CCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptxCCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptxParthaDas754073
 
Ccna 4 chapter 8 v4.0 answers 2011
Ccna 4 chapter 8 v4.0 answers 2011Ccna 4 chapter 8 v4.0 answers 2011
Ccna 4 chapter 8 v4.0 answers 2011Dân Chơi
 
NUVX Technologies general solutions
NUVX Technologies general solutionsNUVX Technologies general solutions
NUVX Technologies general solutionsNUVX
 

Ähnlich wie Ccna 4 Chapter 4 V4.0 Answers (20)

Ccna 4 Chapter 1 V4.0 Answers
Ccna 4 Chapter 1 V4.0 AnswersCcna 4 Chapter 1 V4.0 Answers
Ccna 4 Chapter 1 V4.0 Answers
 
Ccna 4 chapter 1 v4.0 answers 2011
Ccna 4 chapter 1 v4.0 answers 2011Ccna 4 chapter 1 v4.0 answers 2011
Ccna 4 chapter 1 v4.0 answers 2011
 
Ccna 4 Chapter 8 V4.0 Answers
Ccna 4 Chapter 8 V4.0 AnswersCcna 4 Chapter 8 V4.0 Answers
Ccna 4 Chapter 8 V4.0 Answers
 
Ccna 4 Chapter 5 V4.0 Answers
Ccna 4 Chapter 5 V4.0 AnswersCcna 4 Chapter 5 V4.0 Answers
Ccna 4 Chapter 5 V4.0 Answers
 
Ccna 4 final exam answer v5
Ccna 4 final exam answer v5Ccna 4 final exam answer v5
Ccna 4 final exam answer v5
 
Ccnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_examCcnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_exam
 
Ccna 3 chapter 1 v4.0 answers 2011
Ccna 3 chapter 1 v4.0 answers 2011Ccna 3 chapter 1 v4.0 answers 2011
Ccna 3 chapter 1 v4.0 answers 2011
 
Ccna 4 chapter 6 v4.0 answers 2011
Ccna 4 chapter 6 v4.0 answers 2011Ccna 4 chapter 6 v4.0 answers 2011
Ccna 4 chapter 6 v4.0 answers 2011
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
 
Tutorial 1 chapter 1
Tutorial 1 chapter 1Tutorial 1 chapter 1
Tutorial 1 chapter 1
 
Wan networks
Wan networksWan networks
Wan networks
 
M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptx
 
17 - Building small network.pdf
17 - Building small network.pdf17 - Building small network.pdf
17 - Building small network.pdf
 
A REPORT ON CITRIX INDEPENDENT COMPUTING ARCHITECTURE (ICA) PROTOCOL
A REPORT ON CITRIX INDEPENDENT COMPUTING  ARCHITECTURE (ICA) PROTOCOL A REPORT ON CITRIX INDEPENDENT COMPUTING  ARCHITECTURE (ICA) PROTOCOL
A REPORT ON CITRIX INDEPENDENT COMPUTING ARCHITECTURE (ICA) PROTOCOL
 
Examen1ccna3v5.0
Examen1ccna3v5.0Examen1ccna3v5.0
Examen1ccna3v5.0
 
ETE405-lec9.ppt
ETE405-lec9.pptETE405-lec9.ppt
ETE405-lec9.ppt
 
CCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptxCCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptx
 
Chapter04
Chapter04Chapter04
Chapter04
 
Ccna 4 chapter 8 v4.0 answers 2011
Ccna 4 chapter 8 v4.0 answers 2011Ccna 4 chapter 8 v4.0 answers 2011
Ccna 4 chapter 8 v4.0 answers 2011
 
NUVX Technologies general solutions
NUVX Technologies general solutionsNUVX Technologies general solutions
NUVX Technologies general solutions
 

Mehr von ccna4discovery

Ccna 4 Chapter 9 V4.0 Answers
Ccna 4 Chapter 9 V4.0 AnswersCcna 4 Chapter 9 V4.0 Answers
Ccna 4 Chapter 9 V4.0 Answersccna4discovery
 
Ccna 4 Chapter 7 V4.0 Answers
Ccna 4 Chapter 7 V4.0 AnswersCcna 4 Chapter 7 V4.0 Answers
Ccna 4 Chapter 7 V4.0 Answersccna4discovery
 
Ccna 4 Chapter 3 V4.0 Answers
Ccna 4 Chapter 3 V4.0 AnswersCcna 4 Chapter 3 V4.0 Answers
Ccna 4 Chapter 3 V4.0 Answersccna4discovery
 
Ccna 4 Chapter 2 V4.0 Answers
Ccna 4 Chapter 2 V4.0 AnswersCcna 4 Chapter 2 V4.0 Answers
Ccna 4 Chapter 2 V4.0 Answersccna4discovery
 
Ccna 3 Final V4.0 Answers
Ccna 3 Final V4.0 AnswersCcna 3 Final V4.0 Answers
Ccna 3 Final V4.0 Answersccna4discovery
 
Ccna 3 Chapter 9 V4.0 Answers
Ccna 3 Chapter 9 V4.0 AnswersCcna 3 Chapter 9 V4.0 Answers
Ccna 3 Chapter 9 V4.0 Answersccna4discovery
 
Ccna 3 Chapter 6 V4.0 Answers
Ccna 3 Chapter 6 V4.0 AnswersCcna 3 Chapter 6 V4.0 Answers
Ccna 3 Chapter 6 V4.0 Answersccna4discovery
 
Ccna 2 Chapter 8 V4.1 Answers
Ccna 2 Chapter 8 V4.1 AnswersCcna 2 Chapter 8 V4.1 Answers
Ccna 2 Chapter 8 V4.1 Answersccna4discovery
 
Ccna 2 Chapter 8 V4.0 Answers
Ccna 2 Chapter 8 V4.0 AnswersCcna 2 Chapter 8 V4.0 Answers
Ccna 2 Chapter 8 V4.0 Answersccna4discovery
 
Ccna 1 Chapter 1 V4.0 Answers
Ccna 1 Chapter 1 V4.0 AnswersCcna 1 Chapter 1 V4.0 Answers
Ccna 1 Chapter 1 V4.0 Answersccna4discovery
 

Mehr von ccna4discovery (10)

Ccna 4 Chapter 9 V4.0 Answers
Ccna 4 Chapter 9 V4.0 AnswersCcna 4 Chapter 9 V4.0 Answers
Ccna 4 Chapter 9 V4.0 Answers
 
Ccna 4 Chapter 7 V4.0 Answers
Ccna 4 Chapter 7 V4.0 AnswersCcna 4 Chapter 7 V4.0 Answers
Ccna 4 Chapter 7 V4.0 Answers
 
Ccna 4 Chapter 3 V4.0 Answers
Ccna 4 Chapter 3 V4.0 AnswersCcna 4 Chapter 3 V4.0 Answers
Ccna 4 Chapter 3 V4.0 Answers
 
Ccna 4 Chapter 2 V4.0 Answers
Ccna 4 Chapter 2 V4.0 AnswersCcna 4 Chapter 2 V4.0 Answers
Ccna 4 Chapter 2 V4.0 Answers
 
Ccna 3 Final V4.0 Answers
Ccna 3 Final V4.0 AnswersCcna 3 Final V4.0 Answers
Ccna 3 Final V4.0 Answers
 
Ccna 3 Chapter 9 V4.0 Answers
Ccna 3 Chapter 9 V4.0 AnswersCcna 3 Chapter 9 V4.0 Answers
Ccna 3 Chapter 9 V4.0 Answers
 
Ccna 3 Chapter 6 V4.0 Answers
Ccna 3 Chapter 6 V4.0 AnswersCcna 3 Chapter 6 V4.0 Answers
Ccna 3 Chapter 6 V4.0 Answers
 
Ccna 2 Chapter 8 V4.1 Answers
Ccna 2 Chapter 8 V4.1 AnswersCcna 2 Chapter 8 V4.1 Answers
Ccna 2 Chapter 8 V4.1 Answers
 
Ccna 2 Chapter 8 V4.0 Answers
Ccna 2 Chapter 8 V4.0 AnswersCcna 2 Chapter 8 V4.0 Answers
Ccna 2 Chapter 8 V4.0 Answers
 
Ccna 1 Chapter 1 V4.0 Answers
Ccna 1 Chapter 1 V4.0 AnswersCcna 1 Chapter 1 V4.0 Answers
Ccna 1 Chapter 1 V4.0 Answers
 

Kürzlich hochgeladen

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 

Kürzlich hochgeladen (20)

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 

Ccna 4 Chapter 4 V4.0 Answers

  • 1. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ CCNA 4 Chapter 4 V4.0 Labels: CCNA 4 Chapter 4 V4.0 1 In addition to the technical considerations, what other major factor is used to evaluate the success of a network installation? final project costs maintenance costs user satisfaction statistics describing the performance of network devices 2 Which two network applications are most affected by network congestion and delays? (Choose two.) IP telephony live video webcasts audio file downloads online banking services file archival and retrieval 3 What two Cisco tools can be used to analyze network application traffic? (Choose two.) NBAR NetFlow AutoQoS Wireshark Custom Queuing 4
  • 2. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ In network design, which technology can be implemented to prioritize traffic based on its importance and technical requirements? STP QoS RTP TCP VPN 5 What are two characteristics of voice over IP traffic? (Choose two.) Voice packets tend to be small. Voice packets must be processed in real time. Voice packets can effectively use TCP reliability features. Voice traffic can survive packet drops and retransmission delays. Voice packets must be converted to analog before being sent across the IP network. Voice packets automatically receive a higher priority value than other types of packets. 6 What are two things that a network designer can do to determine current and anticipated network traffic flows? (Choose two.) Survey end users to obtain customer input. Upgrade the Cisco IOS software in all networking devices to optimize traffic flow. Limit the analysis to host-to-server traffic because host-to-host traffic is unimportant. Run a network traffic analysis to determine which applications are in use and by whom. Conduct an inventory of all networking devices that includes model numbers and memory configurations
  • 3. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ 7 A company that has a traditional telephone system wants to convert to IP telephony. Which two factors should be considered for the design? (Choose two.) Digital communications systems have greater noise than analog systems when processing voice traffic. Voice-enabled routers or a server must be used for call control and signaling. Voice to IP conversions can cause router overhead. Power to the phones can be supplied through properly equipped patch panels or switches. The cost to combine voice and data VLANs can be a considerable amount. 8 Several web and email servers have recently been installed as part of an enterprise network. The security administrator has been asked to provide a summary of security features that can be implemented to help prevent unauthorized traffic from being sent into or out of sensitive internal networks. Which three features should the security administrator recommend? (Choose three.) firewalls priority queuing access control lists intrusion detection systems DHCP 128-bit WEP 9 The design of an IP telephony system needs to meet the technical requirements to provide a connection to the PSTN as well as provide high-quality voice transmissions using the campus
  • 4. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ network. Which two elements directly affect the ability of the design to meet these requirements?(Choose two.) voice-enabled firewall PoE switches and patch panels redundant backbone connectivity voice-enabled router at the enterprise edge separate voice and data VLANs with QoS implemented 10 When implementing VoIP services, which two design considerations should be followed?(Choose two.) Confirm that network jitter is minimal. Use TCP to reduce delays and dropped packets. Establish priority queuing to ensure that large data packets are sent uninterrupted. Disable real-time protocols to reduce queuing strategy demands. Ensure that packet delays do not exceed 150 ms. 11 What design strategy should be followed when designing a network that uses video on demand? implement the appropriate routing protocol to ensure that data segments arrive in order implement different QoS queues based on the type of video traffic being distributed install servers to store the data in a centrally located server farm configure queuing in the core routers to ensure high availability 12 When implementing QoS in traffic queues, what is the first step the designer should take to ensure that traffic is properly prioritized?
  • 5. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ define QoS policies define traffic classes determine traffic patterns identify traffic requirements identify networking equipment 13 Which two statements are characteristics of file transfer traffic flows? (Choose two.) RTP should be used. Traffic is predictable. Packets are small in size. Transfers are throughput intensive. Response-time requirements are low. 14 Which two items can be determined by diagramming internal traffic flow? (Choose two.) the type of ISP services needed the capabilities of end-user devices the areas where network congestion may occur the location of VPN servers used to connect teleworkers locations where high-bandwidth connections are required 15 Which two traffic types are examples of external traffic flows? (Choose two.) A user in the IT department telnets to the core layer router. A user in marketing connects to the web server of a competitor. A user in the IT department telnets into the access layer switch.
  • 6. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ A user in the services department logs in to a web-based email program. A user in accounting connects to an FTP server that is connected to the access layer switch. 16 Which service can be provided by the NetFlow Cisco utility? network planning and mapping IDS and IPS capabilities peak usage times and traffic routing network billing and accounting application security and user account restrictions source and destination UDP port mapping 17 Refer to the exhibit. If ACL 150 identifies only voice traffic from network 192.168.10.0/24 and no other traffic, which queue will voice traffic from other networks use? high normal medium default 18 Refer to the exhibit. After configuring QoS, a network administrator issues the command show queueing interface s0/1. What two pieces of information can an administrator learn from the output of this command? (Choose two.) queue traffic definitions priority list protocol assignments
  • 7. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ type of queuing being implemented number of packets placed in each queue queuing defaults that have been changed queuing has not been applied to this interface 19 An analysis of network protocols reveals that RTP and RTCP are being used. What uses these protocols? IDS VPN WLAN firewall real-time video 20 A company is considering adding voice and video to the data networks. Which two statements are true if voice and video are added? (Choose two.) PoE switches must be purchased. More UDP-based traffic flows will be evident. Response times will be increased even if QoS is implemented. QoS will most likely be implemented to prioritize traffic flows. VPNs will most likely be implemented to protect the voice traffic. 21 Refer to the exhibit. Which option correctly matches the terms on top with its definition on the bottom? A=1, B=3, C=2, D=4
  • 8. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ A=2, B=1, C=4, D=3 A=2, B=4, C=1, D=3 A=3, B=2, C=4, D=1 A=4, B=3, C=1, D=2 A=4, B=2, C=3, D=1 22 A database server is configured to purge all data that is 60 days old. Ten data items that are 60 days old are to be purged. However, there is a failure halfway through the transaction, and the entire transaction is voided. What type of transaction action occurred? atomic consistent durable isolated 23 What is the primary goal of QoS? classification of traffic filtering and queuing voice traffic reducing bandwidth requirements providing priority service to selected traffic 24 Which technology provides a mechanism for implementing QoS at Layer 2? ToS CoS DSCP
  • 9. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ IP precedence 25 A customer purchases tickets online and pays using a credit card, but the system goes down before the transaction is complete. What transaction type retains a record of this transaction after the system failure so that the customer will still receive the tickets and the credit card account will be debited accordingly? atomic consistent durable isolated 26 Refer to the exhibit. The network design documents include requirements to prevent switching loops, to provide link-specific failover, and to provide Layer 3 recovery. Which two protocols would be needed to provide the support? (Choose two.) HDLC HSRP PPP RSTP VTP 27 network design must minimize latency to support real-time streaming applications. Which two protocols enable control and scalability of the network resources and minimize latency by incorporating QoS mechanisms? (Choose two.) RTCP HSRP RSTP
  • 10. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ RTP RPC 28 Which two major differences are associated with IP telephony when compared to traditional telephony that uses a PBX? (Choose two.) manages phones centrally utilizes centralized call routing creates peer-to-peer relationships between phones requires a separate infrastructure to support data transfer requires significant manual configuration when adding, moving, or changing phones 29 When QoS is implemented in a converged network, which two factors can be controlled to improve performance? (Choose two.) link speed delay packet routing jitter packet addressing