Chapter 1 Quiz 1. After an evaluation of the business needs and current network infrastructure of ABC Company. The network designer includes the item ?install a second UPS for the core web server? in the network upgrade proposal. Which network design goal is being met? 1. Security 2. Scalability 3. Availability 4. Performance 5. Manageability 2. Match the definition to the corresponding function Definition A: Degree of resource accessibility B: Restriction of unauthorized traffic C: Ability to grow as users and applications are added D: Designed so support personnel can always fix it Function 1. Scalability 2. Availability 3. Security 4. Manageability 3. When designing a network infrastructure, a network engineer will use the hierarchical network model. What two factors must be taken into account when designing the core layer? (Choose two.) 1. Packet manipulation to prioritize the flow of core data 2. Redundant links to ensure fault tolerance 3. Routing protocols chosen for the speed of network convergence 4. Access control lists to control core layer traffic 5. Star network topologies to reduce core layer latency 4. A company needs to redesign the Distribution Layer of their enterprise network. What area should be the focus of the new design? 1. Direct connections to hosts in a local Ethernet network 2. Layer 3 interconnections between smaller local networks 3. High-speed connections between Layer 2 devices 4. Interconnections between hosts in a flat network 5. A network engineer is planning the WAN connectivity for critical network traffic. Why would the engineer plan a backup WAN link? 1. to provide extra bandwidth during system 2. to provide a development environment for WAN 3. to provide extra bandwidth for Voice over 4. to provide an alternate path for data in case the primary link fails 6. Which two are advantages of using a star topology at the Access Layer of a network? (Choose two.) 1. Ease of installation 2. Redundant traffic pathways 3. Minimal configuration needed 4. Ease of recovery after failure 5. Capabilities of central devices can limit network 7. Network traffic between a PC and a printer on the same local network is usually contained within which layer of the hierarchical design model? 1. Core Layer 2. Access Layer 3. Distribution Layer 4. Enterprise Edge 5. Server Farms 8. Which statement best describes the purpose of deploying a sever farm? 1. A server farm is necessary in deploying enterprise-level applications. 2. A server farm is required in the DMZ design of an enterprise network. 3. A server farm provides efficient management of the mission-critical servers for the enterprise. 4. A server farm is designed to provide secure network services and applications to clients on internal networks only. 9. Why is the older DMZ firewall model not sufficient to secure mission critical servers and applications? 1. Only servers located on the DMZ network were adequately protected. 2. The older model did not offer servers enough protection from internally initiated attacks. 3. End-user PCs were not protected in the older model, so they were more frequently hacked. 4. Servers on the DMZ were not adequately protected from external attacks. 10. How can wireless network design provide open access for guest users and secure access for employees? 1. Broadcast the SSID so that all users are able to access the network. 2. Enable WEP to authenticate both sets of users. 3. Create separate SSID and separate VLAN for guest users. 4. Put all access points on the same VLAN and require employees to use WEP. 11. Which functional area of the network contains the devices that provide an interface between high-speed LAN technologies, such as Ethernet, and slower speed wide area technologies? 1. Core Layer 2. Server farm 3. Access Layer 4. Transport Layer 5. Enterprise Edge 6. Distribution Layer 12. A company has decided to allow workers to work from home but does not want to compromise network security. The network administrator has proposed connecting remote users to the company network using virtual private networks. Why are VPNs good choices for connecting remote workers? 1. Allow secure connections over public broadband networks 2. Provide secure connections over dedicated public WAN circuits 3. Segment traffic into logical networks for better bandwidth utilization 4. Provide simple remote access without having to filter special packets 13. A technician is recovering the password on a router. The technician has entered ROMMON mode, changed the configuration register to 0x2142, and reset the router. The technician enters configuration mode on the router, changes the password, and enters the copy running-config startup?config command. After changing the configuration register to 0x2102, the technician reloads the router. When the router reloads, the technician finds that only the password is in the configuration. What could be the problem? The technician changed the configuration register to the wrong value. The technician should have changed the configuration register to 0x2100. The router ignored NVRAM and did not load the startup configuration file when it rebooted. The technician did not copy the running configuration to the startup configuration before changing the password. 14. Which ACL permits host 10.220.158.10 access to the web server 192.18.3.244? 1. access-list 101 permit tcp host 10.220.158.10 eq 80 host 192.168.3.224 2. access-list 101 permit tcp 10.220.158.10 0.0.0.0 host 192.168.3.224 0.0.0.0 eq 80 3. access-list 101 permit host 10.220.158.10 0.0.0.0 host 192.168.3.224 0.0.0.0 eq 80 4. access-list 101 permit tcp 10.220.158.10 0.0.0.0 host 192.168.3.224 eq 80 15. Refer to the exhibit. Host C is unable to transfer data because it does not have the MAC address of the destination host. If Host C sends out an ARP request, which of the other hosts will see this message? Exhibit Two Switches (S1, S2) S1 is connected to S2 (VLAN2) S1 has VLAN1, VLAN2 each with one host attached (VLAN1: HostA, VLAN2: HostB) S2 has VLAN2, VLAN3 each with one host attached (VLAN2: HostC, VLAN3: HostD) 1. Host A 2. Host B 3. Host A and B 4. Hosts A and D 5. Hosts B and D 6. Hosts A, B, and D