CertCities.com -- The Ultimate Site for Certified IT Professionals
Register today for a Free Web Seminar and you could WIN!
  Microsoft®
  Cisco®
  Security
  Oracle®
  A+/Network+"
  Linux/Unix
  More Certs
  Newsletters
  Salary Surveys
  Forums
  News
  Exam Reviews
  Tips
  Columns
  Features
  PopQuiz
  RSS Feeds
  Press Releases
  Contributors
  About Us
  Search
 

Advanced Search
  Free Newsletter
  Sign-up for the #1 Weekly IT
Certification News
and Advice.
Subscribe to CertCities.com Free Weekly E-mail Newsletter
CertCities.com

See What's New on
Redmondmag.com!

Cover Story: Secrets of the Windows Gurus

Reader Review: Word 2007 -- Not Exactly a Must-Have

Access Anywhere

Windows Vista: Learning To Play Nice

Product Review: WhatsUp Gold 11.0, Premium Edition


CertCities.com
Let us know what you
think! E-mail us at:



Visit Redmond Media Group
 
 
...Home ... Editorial ... Pop Quiz ..Pop Quiz Article Saturday: November 17, 2007
TechBusiness: Resources for Innovation Through Software Technology on Redmond Developer News
Secure Computing: Visit SWAT Now!
Dice: The Career Hub for Tech Insiders


Cisco Exam #642-871: ARCH Exam (MeasureUp, set 2)
Work on your understanding of network design and technologies for the CCDP with these 10 sample questions from MeasureUp.


courtesy of   MeasureUp

Question:
1. Which instances listed below indicate appropriate use of DDR? (Choose two.)

a. A branch office has low-volume, periodic traffic.

b. A telecommuter needs to occasionally connect to the central office.

c. A branch office has high-volume, constant traffic.

d. An off-site sales force requires constant connectivity to the central office.

e. A distribution center has a low-volume, constant data flow.

···> read answer

2. Which multicast address is used to send a multicast to all systems on a subnet?

a. 240.0.0.1

b. 240.0.0.2

c. 240.0.0.5

d. 240.0.0.22

···> read answer

3. On a router, which Cisco proprietary protocol is used to enable a router to inform Layer 2 switches that its interfaces are connected to multicast receivers?

a. IGMP

b. CGMP

c. IGMPv2

d. IGMPv3

···> read answer

4. Which statements describe fiber channel technology? (Choose two.)

a. It encapsulates data into IP packets.

b. Authentication can occur using a Radius or TACACS+ server.

c. iSCSI can span the entire area of the WAN.

d. It can transfer data at rates exceeding 100 Mbps.

e. It logically bundles multiple physical connections.

f. It interconnects to SAN islands using FCIP.

···> read answer

5. How much bandwidth must you allocate to support 10,000 busy hour call attempts (BHCA) over a WAN using a clustered Cisco CallManager?

a. 450 Kbps

b. 900 Kbps

c. 1 Mbps

d. 1.5 Mbps

···> read answer

6. You are designing a content networking solution for an enterprise campus network. Where should you locate the proxy servers for the network?

a. Building access layer

b. Building distribution layer

c. Server farm layer

d. Campus backbone layer

···> read answer

7. Which multicast group address is used to support multicast music-on-hold on a network?

a. 239.192.240.0/22

b. 239.192.248.0/22

c. 239.192.244.0/22

d. 239.255.0.0/16

···> read answer

8. Which enterprise campus design requirement has the following characteristics?

  • Layer 3 switching
  • Low scalability
  • Medium availability
  • Medium performance
  • Medium cost per port

a. Building distribution

b. Campus backbone

c. Server farm

d. Edge distribution

···> read answer

9. What does QoS rely on to ensure timely or high quality delivery of Internet media services?

a. RSVP

b. VLSM

c. SNMP

d. CoS

···> read answer

10. When securing an Internet connectivity module, what should you implement to prevent a compromise of an exposed host? (Choose four.)

a. Firewalls

b. Routers

c. Network intrusion detection system (IDS)

d. Host hardening

e. Host intrusion detection system (IDS)

f. DMZ networks

g. LAN switching access control

···> read answer

1. Answers A and B are correct. Dial on Demand Routing (DDR) is by its nature an event driven technology that relies on certain conditions known as interesting traffic to initiate connectivity, otherwise. Low volume, periodic, on-demand traffic is ideal for a DDR solution. The term interesting traffic means that when traffic meeting a pre-determined type or load is seen by the router, it knows that an ISDN call is warranted to pass that traffic to its destination. Any other form of network traffic not deemed interesting will not prompt the router to initiate a call. Since DDR (via ISDN) has the potential to result in costly ISDN calls, you want to carefully control the events that result in ISDN routing invoking a connection attempt.

The other options requiring constant connectivity and/or high bandwidth are incorrect because ISDN constant connectivity is too expensive (especially since DSL is so widely available and much cheaper), and the bandwidth is too low to support high bandwidth.


2. Answer A is correct. The multicast address 240.0.0.1 is used to send a multicast to all systems on a subnet.

The multicast address 240.0.0.2 is used to send a multicast to all routers on a subnet.

The multicast address 240.0.0.5 is used to send a multicast to all Open Shortest Path First (OSPF) routers on a network.

The multicast address 240.0.0.22 is used to send a multicast to all Internet Group Management Protocol (IGMP) v3 devices on a network.


3. Answer B is correct. Cisco Group Management Protocol (CGMP) is used to enable a router to send two Media Access Control (MAC) addresses to a switch when the router receives an Internet Group Management Protocol (IGMP) join report. One of these IP addresses is the unicast source address, and the other is the multicast group's MAC address.

Internet Group Management Protocol (IGMP) is used to organize a multicast group. IGMPv2 enhances the original IGMP protocol by allowing users to send a leave message indicating that they no longer want to be a part of the multicast group. IGMPv3 further enhances IGMPv2 by adding functionality to indicate that a user wants to receive multicast group content.


4. Answers D and F are correct. Fiber channel can transfer data at rates exceeding 100 Mbps and uses Fiber Channel over IP (FCIP) to interconnect storage area network (SAN) islands.

Internet small computer systems interface (iSCSI) can span the entire area of a wide area network (WAN) and is used to encapsulate data into IP packets. In addition, it can be authenticated using either remote authentication dial-in user service (RADIUS) or a terminal access controller access control system plus (TACACS+) server.

EtherChannel logically bundles multiple physical connections.


5. Answer B is correct. A BHCA is the number of calls that can be processed during the busy part of the day. Cisco recommends that you plan for 6 calls per person per hour. To calculate the number of BHCA you divide the BHCA by the expected number of calls per hour. For instance, 10,000 BHCA would plan for 1,666 users (10000/6=1,666.67). You must allocate 900 kilobits per second (Kbps) to have sufficient bandwidth for 10,000 BHCA.


6. Answer C is correct. Proper placement of the proxy servers in content networking is crucial to minimize network traffic and server loads. In an enterprise campus network, proxy servers should be placed in the server farm layer.

The building access layer connects end users to the network.

The building distribution layer is composed of the building access switches and performs Layer 3 switching.

The campus backbone layer provides inter-building connectivity at very high speeds.


7. Answer A is correct. The multicast address range of 239.192.240.0/22 (239.192.240.0-239.142.243.255) is used to support music-on-hold.

The multicast address range of 239.255.0.0/16 (239.255.0.0-239.255.255.255) is used to support Internet Protocol/Television (IP/TV) high-rate traffic.

The multicast address range of 239.192.244.0/22 (239.192.244.0-239.142.247.255) is used to support IP/TV low-rate traffic.

The multicast address range of 239.192.248.0/22 (239.192.248.0-239.142.251.255) is used to support IP/TV medium-rate traffic.


8. Answer D is correct.

The edge distribution enterprise campus design requirement has the following characteristics:

  • Layer 3 switching
  • Low scalability
  • Medium availability
  • Medium performance
  • Medium cost per port

The server farm enterprise campus design requirement has the following characteristics:

  • Layer 3 switching
  • Medium scalability
  • High availability
  • High performance
  • High cost per port

The campus backbone enterprise campus design requirement has the following characteristics:

  • Layer 2 and 3 switching
  • Low scalability
  • High availability
  • High performance
  • High cost per port

The building distribution enterprise campus design requirement has the following characteristics:

  • Layer 2 and 3 switching
  • Medium scalability
  • Medium availability
  • Medium performance
  • Medium cost per port

9. Answer A is correct. Resource Reservation Protocol (RSVP) works in conjunction with routing protocols to provide Quality of Service (QoS) to Internet applications. RSVP applies the equivalent of access lists to data paths, thus ensuring that data flows of a specific nature have specialized access to those paths.

RSVP only works on routers with IOS 11.2 and above. There are three types of traffic that can be handled by RSVP:

  • Best Effort - standard IP traffic (mail, FTP, HTTP, etc.)
  • Rate Sensitive - traffic that is afforded a specific transfer rate in exchange for waiting longer than is normal for delivery
  • Delay Sensitive - traffic that would suffer if delays of any kind are encountered

VLSM (variable length subnet mask) is a feature of routing protocols that allows variable subnet masks on the same network.

Simple Network Management Protocol (SNMP) is used to monitor network performance.

Cost of Service (CoS) is the counterpart of QoS, except it emphasizes cost instead of quality.


10. Answers A, C, D and E are correct. To prevent an Internet connectivity module from a compromise of an exposed host, you should implement firewalls, host hardening, and network and host IDS. Host hardening involves making each single host as secure as possible. A firewall is a router or access server that creates a buffer zone between public networks and a private network. The combination of these three measures secures everything on the private side of the network against a compromise of an exposed host.

To prevent an Internet connectivity module from network mapping attacks, you should implement firewalls, routers, and network IDS.

To prevent an Internet connectivity module from being access from another local host that has been hacked, you should implement demilitarized zones (DMZs), firewalls, host hardening, local area network (LAN) switch access control, and network and host IDS.


Questions and answers provided by MeasureUp. To order the full version of this exam simulation, click here.


More Pop Quiz:


There are 3 CertCities.com user Comments for “Cisco Exam #642-871: ARCH Exam (MeasureUp, set 2)”
Page 1 of 1
3/2/07: giancana from indonesia says: answer module 6
4/3/07: Anonymous says: "which term describe the process of adding of headers to data as it moves down OSI layer"
11/17/07: relaccal from bocvaro says: bovitrbocre
Your comment about: “Cisco Exam #642-871: ARCH Exam (MeasureUp, set 2)”
Name: (optional)
Location: (optional)
E-mail Address: (optional)
Comment:
   

top


Sponsored Links
Work Smarter with Citrix Education
Learn how to maximize the performance of your IT environment
Get 25% Off Certification Practice Exams
Introductory offer at SybexTestsuccess.com through November
Capella U. IT career with a degree online.
Click here to learn about our many specializations



Home | Microsoft® | Cisco® | Oracle® | A+/Network+" | Linux/Unix | MOS | Security | List of Certs
Advertise | Contact Us | Contributors | Features | Forums | News | Pop Quiz | Tips | Press Releases | RSS Feeds RSS Feeds from CertCities.com
Search | Site Map | Redmond Media Group | TechMentor Conferences | Tech Library Webcasts
This Web site is not sponsored by, endorsed by or affiliated with Cisco Systems, Inc., Microsoft Corp., Oracle Corp., The Computing Technology Industry Association, Linus Torvolds, or any other certification or technology vendor. Cisco® and Cisco Systems® are registered trademarks of Cisco Systems, Inc. Microsoft, Windows and Windows NT are either registered trademarks or trademarks of Microsoft Corp. Oracle® is a registered trademark of Oracle Corp. A+®, i-Net+T, Network+T, and Server+T are trademarks and registered trademarks of The Computing Technology Industry Association. (CompTIA). LinuxT is a registered trademark of Linus Torvalds. All other trademarks belong to their respective owners.
Reprints allowed with written permission from the publisher. For more information, e-mail
Application Development Trends | Campus Technology | CertCities.com | The Data Warehousing Institute
E-Gov | EduHound | ENTmag.com | Enterprise Systems | Federal Computer Week | FTPOnline.com | Government Health IT
IT Compliance Institute | MCPmag.com | Recharger | Redmond Developer News | Redmond
Redmond Channel Partner | TCPmag.com | T.H.E. Journal | TechMentor Conferences | Visual Studio Magazine | VSLive!
Copyright 1996-2007 1105 Media, Inc. See our Privacy Policy.
1105 Redmond Media Group