5.7 - Chapter Quiz Diagram 1, Quiz 1. What three multilayer switch feature support the network design goal of availability? (Choose three.) A. In-band and out-of-band management B. Efficient load balancing of routed traffic C. Software-based packet forwarding or prioritized traffic with QoS D. Redundant power supplied and fans E. Route summarization that reduces the impact of a lower level device failure F. Security features preventing unauthorized or unwanted network traffic 2. A network administrator would like to improve transactional processing time as well as voice and video quality. What three things can be done to help achieve these goals? (Choose Three.) A. Reduce traffic and network broadcasts B. Construction of VLANs for different traffic types C. Remove high speed storage and content servers D. Implement QoS on the network E. Increase traffic filtering F. Lengthen the end-point of traffic 3. How should the information gathered during risk assessment be used to support the network design? A. To help identify unknown traffic B. To establish firewall rule sets C. To determine redundancy requirements D. To isolate and identify a security attack 4. Match the design requirement to the associated design layer. Design requirement A. 24x7 availability B. Aggregate traffic C. create VLANs D. high-speed connectivity to Distribution Layer switches E. QoS classification F. Traffic filtering Design Layer (2 requirements to each) A. Access B. Core C. Distribution 5. A network administrator has been asked to provide a report on any measures taken to ensure full availability at the Core Layer of an enterprise network. If the network has been configured correctly, which three options will the administrator be able to include as part of the report? (Choose three.) 1. Redundant link between the Core and Distribution Layers 2. Backup power supply and functioning air conditioning system 3. EIGRP routing protocols 4. Access control lists 5. Switch port security 6. QoS mechanisms 6. Which design implementation eliminated the need to create a single end-to-end VLAN for wireless roaming? 1. Using a lightweight access point solution with wireless LAN controllers 2. Configuring each standalone access point with a different VLAN address 3. Putting all of the standalone access points in the same IP subnet 4. Configuring all of the access points to use the same channel 7. A local bookstore manager asks one of his employees who is studying networking to implement a wireless network to provide connectivity to the internet for customers and employees. The wireless network should be able to function even if an AP fails because other competitors nearby also offer this service. The bookstore owner is planning to expand into another area of their current building and wants to be able to install additional AP easily. The bookstore staff do not have a lot of technical expertise so they want the configuration of the security parameters to be automatic on all the wireless APs. The networking student recommends the following: 1. Install a twelve port Layer 2 switch and attach two wireless access points to the switch in the same VLAN, but on different channels. 2. Train the staff to install the APs using the default security settings. Which statement best describes how the recommendation supports the goals of the bookstore? A. The recommendation meets all of the technical goals of the customer B. The recommendation does not meet the goal of scalability C. The recommendation does not meet the goal of availability D. The recommendation does not meet the goal of security E. The recommendation does not meet the goal of manageability 8. A large company requires their external worker to have internal access to the information stored on the company server. What method provides secure tunneling through the internet? 1. Virtual private network 2. Public wireless access point 3. Intrusion detection system 4. SSH protocol 9. In which circumstances would a point-to-point T1 connection be preferred over Frame Relay? 1. Cost concerns are the highest priority 2. Qos is the highest priority 3. Only data traffic uses the connection 4. Connectivity to multiple sites over the same physical connection is required 10. Where would the network administrator place a standard ACL to prevent the users in the 10.10.10.0/24 subnet from accessing the server in the 10.10.20.0/24 subnet? A user is connected to a switch with the IP address 10.10.10.0/24. The switch is connected to Fa0/0 of router (RTR1). RTR1 is connected via s0/0 to the s0/0 port of router (RTR2). RTR2 is connected to the Internet as well as to a switch via Fa0/0. The switch is connected to a server with the IP address 10.10.20.0/24. A. Router RTR1 interface, inbound B. Router RTR1, s0/0 interface, outbound C. Router RTR2, s0/0 interface, inbound D. Router RTR2, F0/0 interface, outbound