Discovery 3 Module 1 quiz Chapter 1 Quiz 1. What are two benefits of using VPN? (Choose two.) A. They allow precise configuration of which ports are forwarded to the Internet office servers. B. They allow a remote worker to have access to network resources as if they were physically located in the office. C. They provide a faster connection to the office by providing direct access to the Internal network. D. They encrypt all communications between the remote worker and internal network resources. E. They block unsolicited traffic that does not have the proper tunneling protocol. F. They reduce malicious attacks by identifying them when they hit the VPN. 2. When planning to identify traffic flows and network applications that run on an enterprise network, why is it best for a network engineer to sample traffic during times of peak utilization? A. During peak utilization times, most traffic is localised in a single segment and can be more easily analysed. B. The network engineer does not want to confuse traffic from network backups done at night with normal business traffic. C. The network is busiest and the most critical business applications are in use, providing an accurate sampling of network activities. D. The network is slowest during this time and the sampling will not interfere with the normal business traffic 3. What are two resources to analyze multiple network segments when identifying network traffic? (Choose two.) A. Network segments may have varying traffic patterns exclusive to that segment. B. Network traffic should always be monitored on a core device because all network traffic needs to pass through it. C. Network traffic that passes between segments may be reduced if a server accessed primarily by on segment is relocated to that segment. D. Network traffic on a single segment is not important because traffic on a local segment does not affect the network traffic as a whole. E. Network traffic on a single segment does not consume much bandwidth within that segment and can be overloaded. 4. Why do VoIP and video network traffic use UDP instead of TCP? A. Voice and video applications require receipt of all packets regardless of delay. B. The three-way handshake used in UDP speeds up the voce and video streams. C. Voice and video applications cannot tolerate the delay caused by retransmissions. D. UDP allows for segment receipt and acknowledgement, ensuring guaranteed segment delivery. 5. Refer tho the exhibit. If SW1 stops working, which statement will be true? Exhibit The picture depicts a network. One Router(RTA) Two Switches(SW1, SW2) RTA connects SW1, and SW2 SW1 has Hosts A and B connected to it. SW2 has Hosts C, D and a server connected to it. A. Hosts A and B will not be able to reach each other or hosts C, D, and the server. B. Hosts A and B will be able to reach each other, but not hosts C, D, or the server. C. Hosts A, B, C, and D will be able to reach each other, but not the server. D. All hosts will still be able to reach each other. 6. Match each Cisco Enterprise Architecture to it?s corresponding definition (Not all definitions will be uses) A. Cisco Enterprise Architectures B. Enterprise Campus C. Enterprise Edge D. Service Provider Edge Definitions 1. Consists of Internet, VPN, and WAN modules 2. Consists of remote users and branch offices 3. Consists of the campus infrastructure with server farms. 4. Provides Internet, WAN, and PSTN services 7. Which two technologies enhance the ability of remote workers to connect securely to internal company resources? (Choose two.) A. Telnet B. SSH C. VPN D. FTP E. HTTP 8. A company has hired a new employee who will be working remotely. What should the IT administrator do so that the employee can connect to the internal network using the existing VPN infrastructure of the company? A. Configure the WAN router to allow incoming connections. B. Allow tunnelling within the Intrusion Prevention System (IPS). C. Add the credentials of the user to the DMZ. D. Configure the VPN client application on the laptop of the remote employee. 9. A remote IT engineer needs to simultaneously demonstrate how to operate a software application to multiple people, Which tool can be used to perform the task? A. FTP B. e-mail C. Telnet D. Desktop sharing 10. Match the network types with their corresponding description. Network Type LAN, WAN, Intranet, Extranet, Internet Descriptions A. Provides Internet-like services for company employees only B. Global public network that operates using a common set of communication protocols C. Private network that allows access by specified external users like contractors and suppliers D. Private network that connects geographically dispensed sites using public or private services E. Private network controlled by a single organization usually limited to a single campus 11. Which statement is true about the three-layer hierarchical design mode? A. Core and access layer functions can be combined. B. Smaller networks can use the core layer services offered by their ISP. C. The distribution layer consists of high-end routers that interconnect geographically dispensed locations. D. The access layer can be spread across multiple geographical locations. 12. When designing a network based on the Cisco Enterprise Architecture, which two items would be included in the enterprise edge functional component? (Choose two.) A. Internal web servers B. Core layer routers C. VPN servers D. Server farm E. Intrusion detection system