Cisco Exam #642-871: ARCH Exam (MeasureUp, set 2)
Work on your understanding of network design and technologies for the CCDP with these 10 sample questions from MeasureUp.
courtesy of MeasureUp
Question:
1. Which instances listed below indicate appropriate use of DDR? (Choose two.)
a. A branch office has low-volume, periodic traffic.
b. A telecommuter needs to occasionally connect to the central office.
c. A branch office has high-volume, constant traffic.
d. An off-site sales force requires constant connectivity to the central office.
e. A distribution center has a low-volume, constant data flow.
2. Which multicast address is used to send a multicast to all systems on a subnet?
a. 240.0.0.1
b. 240.0.0.2
c. 240.0.0.5
d. 240.0.0.22
3. On a router, which Cisco proprietary protocol is used to enable a router to inform Layer 2 switches that its interfaces are connected to multicast receivers?
a. IGMP
b. CGMP
c. IGMPv2
d. IGMPv3
4. Which statements describe fiber channel technology? (Choose two.)
a. It encapsulates data into IP packets.
b. Authentication can occur using a Radius or TACACS+ server.
c. iSCSI can span the entire area of the WAN.
d. It can transfer data at rates exceeding 100 Mbps.
e. It logically bundles multiple physical connections.
f. It interconnects to SAN islands using FCIP.
5. How much bandwidth must you allocate to support 10,000 busy hour call attempts (BHCA) over a WAN using a clustered Cisco CallManager?
a. 450 Kbps
b. 900 Kbps
c. 1 Mbps
d. 1.5 Mbps
6. You are designing a content networking solution for an enterprise campus network. Where should you locate the proxy servers for the network?
a. Building access layer
b. Building distribution layer
c. Server farm layer
d. Campus backbone layer
7. Which multicast group address is used to support multicast music-on-hold on a network?
a. 239.192.240.0/22
b. 239.192.248.0/22
c. 239.192.244.0/22
d. 239.255.0.0/16
8. Which enterprise campus design requirement has the following characteristics?
- Layer 3 switching
- Low scalability
- Medium availability
- Medium performance
- Medium cost per port
a. Building distribution
b. Campus backbone
c. Server farm
d. Edge distribution
9. What does QoS rely on to ensure timely or high quality delivery of Internet media services?
a. RSVP
b. VLSM
c. SNMP
d. CoS
10. When securing an Internet connectivity module, what should you implement to prevent a compromise of an exposed host? (Choose four.)
a. Firewalls
b. Routers
c. Network intrusion detection system (IDS)
d. Host hardening
e. Host intrusion detection system (IDS)
f. DMZ networks
g. LAN switching access control
1. Answers A and B are correct. Dial on Demand Routing (DDR) is by its nature an event driven technology that relies on certain conditions known as interesting traffic to initiate connectivity, otherwise. Low volume, periodic, on-demand traffic is ideal for a DDR solution. The term interesting traffic means that when traffic meeting a pre-determined type or load is seen by the router, it knows that an ISDN call is warranted to pass that traffic to its destination. Any other form of network traffic not deemed interesting will not prompt the router to initiate a call. Since DDR (via ISDN) has the potential to result in costly ISDN calls, you want to carefully control the events that result in ISDN routing invoking a connection attempt.
The other options requiring constant connectivity and/or high bandwidth are incorrect because ISDN constant connectivity is too expensive (especially since DSL is so widely available and much cheaper), and the bandwidth is too low to support high bandwidth.
2. Answer A is correct. The multicast address 240.0.0.1 is used to send a multicast to all systems on a subnet.
The multicast address 240.0.0.2 is used to send a multicast to all routers on a subnet.
The multicast address 240.0.0.5 is used to send a multicast to all Open Shortest Path First (OSPF) routers on a network.
The multicast address 240.0.0.22 is used to send a multicast to all Internet Group Management Protocol (IGMP) v3 devices on a network.
3. Answer B is correct. Cisco Group Management Protocol (CGMP) is used to enable a router to send two Media Access Control (MAC) addresses to a switch when the router receives an Internet Group Management Protocol (IGMP) join report. One of these IP addresses is the unicast source address, and the other is the multicast group's MAC address.
Internet Group Management Protocol (IGMP) is used to organize a multicast group. IGMPv2 enhances the original IGMP protocol by allowing users to send a leave message indicating that they no longer want to be a part of the multicast group. IGMPv3 further enhances IGMPv2 by adding functionality to indicate that a user wants to receive multicast group content.
4. Answers D and F are correct. Fiber channel can transfer data at rates exceeding 100 Mbps and uses Fiber Channel over IP (FCIP) to interconnect storage area network (SAN) islands.
Internet small computer systems interface (iSCSI) can span the entire area of a wide area network (WAN) and is used to encapsulate data into IP packets. In addition, it can be authenticated using either remote authentication dial-in user service (RADIUS) or a terminal access controller access control system plus (TACACS+) server.
EtherChannel logically bundles multiple physical connections.
5. Answer B is correct. A BHCA is the number of calls that can be processed during the busy part of the day. Cisco recommends that you plan for 6 calls per person per hour. To calculate the number of BHCA you divide the BHCA by the expected number of calls per hour. For instance, 10,000 BHCA would plan for 1,666 users (10000/6=1,666.67). You must allocate 900 kilobits per second (Kbps) to have sufficient bandwidth for 10,000 BHCA.
6. Answer C is correct. Proper placement of the proxy servers in content networking is crucial to minimize network traffic and server loads. In an enterprise campus network, proxy servers should be placed in the server farm layer.
The building access layer connects end users to the network.
The building distribution layer is composed of the building access switches and performs Layer 3 switching.
The campus backbone layer provides inter-building connectivity at very high speeds.
7. Answer A is correct. The multicast address range of 239.192.240.0/22 (239.192.240.0-239.142.243.255) is used to support music-on-hold.
The multicast address range of 239.255.0.0/16 (239.255.0.0-239.255.255.255) is used to support Internet Protocol/Television (IP/TV) high-rate traffic.
The multicast address range of 239.192.244.0/22 (239.192.244.0-239.142.247.255) is used to support IP/TV low-rate traffic.
The multicast address range of 239.192.248.0/22 (239.192.248.0-239.142.251.255) is used to support IP/TV medium-rate traffic.
8. Answer D is correct.
The edge distribution enterprise campus design requirement has the following characteristics:
- Layer 3 switching
- Low scalability
- Medium availability
- Medium performance
- Medium cost per port
The server farm enterprise campus design requirement has the following characteristics:
- Layer 3 switching
- Medium scalability
- High availability
- High performance
- High cost per port
The campus backbone enterprise campus design requirement has the following characteristics:
- Layer 2 and 3 switching
- Low scalability
- High availability
- High performance
- High cost per port
The building distribution enterprise campus design requirement has the following characteristics:
- Layer 2 and 3 switching
- Medium scalability
- Medium availability
- Medium performance
- Medium cost per port
9. Answer A is correct. Resource Reservation Protocol (RSVP) works in conjunction with routing protocols to provide Quality of Service (QoS) to Internet applications. RSVP applies the equivalent of access lists to data paths, thus ensuring that data flows of a specific nature have specialized access to those paths.
RSVP only works on routers with IOS 11.2 and above. There are three types of traffic that can be handled by RSVP:
- Best Effort - standard IP traffic (mail, FTP, HTTP, etc.)
- Rate Sensitive - traffic that is afforded a specific transfer rate in exchange for waiting longer than is normal for delivery
- Delay Sensitive - traffic that would suffer if delays of any kind are encountered
VLSM (variable length subnet mask) is a feature of routing protocols that allows variable subnet masks on the same network.
Simple Network Management Protocol (SNMP) is used to monitor network performance.
Cost of Service (CoS) is the counterpart of QoS, except it emphasizes cost instead of quality.
10. Answers A, C, D and E are correct. To prevent an Internet connectivity module from a compromise of an exposed host, you should implement firewalls, host hardening, and network and host IDS. Host hardening involves making each single host as secure as possible. A firewall is a router or access server that creates a buffer zone between public networks and a private network. The combination of these three measures secures everything on the private side of the network against a compromise of an exposed host.
To prevent an Internet connectivity module from network mapping attacks, you should implement firewalls, routers, and network IDS.
To prevent an Internet connectivity module from being access from another local host that has been hacked, you should implement demilitarized zones (DMZs), firewalls, host hardening, local area network (LAN) switch access control, and network and host IDS.
Questions and answers provided by MeasureUp. To order the full version of this exam simulation, click here.
More Pop Quiz:
|