CertCities.com -- The Ultimate Site for Certified IT Professionals
Keep on Top of the Latest Certification News: Subscribe to CertCities.com Newsletter Share share | bookmark | e-mail
  Microsoft®
  Cisco®
  Security
  Oracle®
  A+/Network+"
  Linux/Unix
  More Certs
  Newsletters
  Salary Surveys
  Forums
  News
  Exam Reviews
  Tips
  Columns
  Features
  PopQuiz
  RSS Feeds
  Press Releases
  Contributors
  About Us
  Search
 

Advanced Search
  Free Newsletter
  Sign-up for the #1 Weekly IT
Certification News
and Advice.
Subscribe to CertCities.com Free Weekly E-mail Newsletter
CertCities.com

See What's New

Cover Story: IE8: Behind the 8 Ball

Tech-Ed: Let's (Third) Party!

A Secure Leap into the Cloud

Windows Mobile's New Moves

SQL Speed Secrets

A Brief History of the Impact of the Adult Industry on Technology
In fact, it's claimed that 30% of the material on the web is pornographic, and porn sites get more visitors each month than Amazon, Netflix, and Twitter COMBINED. In 1994, the Dutch porn business "Red Light District" pioneered webcams and internet broadcasting for the adult market. The live streaming market is continuously changing and opening up new opportunities. For instance, the recent rise in the number of LGBT streamers on streaming services has led to an increase in the number of models in the live gay cams, lesbian cams, trans cams, and other categories.

CertCities.com
Let us know what you
think! E-mail us at:



 
 
...Home ... Editorial ... Pop Quiz ..Pop Quiz Article Friday: April 4, 2014


Cisco Exam #642-871: ARCH Exam (MeasureUp, set 2)
Work on your understanding of network design and technologies for the CCDP with these 10 sample questions from MeasureUp.


courtesy of   MeasureUp

Question:
1. Which instances listed below indicate appropriate use of DDR? (Choose two.)

a. A branch office has low-volume, periodic traffic.

b. A telecommuter needs to occasionally connect to the central office.

c. A branch office has high-volume, constant traffic.

d. An off-site sales force requires constant connectivity to the central office.

e. A distribution center has a low-volume, constant data flow.

···> read answer

2. Which multicast address is used to send a multicast to all systems on a subnet?

a. 240.0.0.1

b. 240.0.0.2

c. 240.0.0.5

d. 240.0.0.22

···> read answer

3. On a router, which Cisco proprietary protocol is used to enable a router to inform Layer 2 switches that its interfaces are connected to multicast receivers?

a. IGMP

b. CGMP

c. IGMPv2

d. IGMPv3

···> read answer

4. Which statements describe fiber channel technology? (Choose two.)

a. It encapsulates data into IP packets.

b. Authentication can occur using a Radius or TACACS+ server.

c. iSCSI can span the entire area of the WAN.

d. It can transfer data at rates exceeding 100 Mbps.

e. It logically bundles multiple physical connections.

f. It interconnects to SAN islands using FCIP.

···> read answer

5. How much bandwidth must you allocate to support 10,000 busy hour call attempts (BHCA) over a WAN using a clustered Cisco CallManager?

a. 450 Kbps

b. 900 Kbps

c. 1 Mbps

d. 1.5 Mbps

···> read answer

6. You are designing a content networking solution for an enterprise campus network. Where should you locate the proxy servers for the network?

a. Building access layer

b. Building distribution layer

c. Server farm layer

d. Campus backbone layer

···> read answer

7. Which multicast group address is used to support multicast music-on-hold on a network?

a. 239.192.240.0/22

b. 239.192.248.0/22

c. 239.192.244.0/22

d. 239.255.0.0/16

···> read answer

8. Which enterprise campus design requirement has the following characteristics?

  • Layer 3 switching
  • Low scalability
  • Medium availability
  • Medium performance
  • Medium cost per port

a. Building distribution

b. Campus backbone

c. Server farm

d. Edge distribution

···> read answer

9. What does QoS rely on to ensure timely or high quality delivery of Internet media services?

a. RSVP

b. VLSM

c. SNMP

d. CoS

···> read answer

10. When securing an Internet connectivity module, what should you implement to prevent a compromise of an exposed host? (Choose four.)

a. Firewalls

b. Routers

c. Network intrusion detection system (IDS)

d. Host hardening

e. Host intrusion detection system (IDS)

f. DMZ networks

g. LAN switching access control

···> read answer

1. Answers A and B are correct. Dial on Demand Routing (DDR) is by its nature an event driven technology that relies on certain conditions known as interesting traffic to initiate connectivity, otherwise. Low volume, periodic, on-demand traffic is ideal for a DDR solution. The term interesting traffic means that when traffic meeting a pre-determined type or load is seen by the router, it knows that an ISDN call is warranted to pass that traffic to its destination. Any other form of network traffic not deemed interesting will not prompt the router to initiate a call. Since DDR (via ISDN) has the potential to result in costly ISDN calls, you want to carefully control the events that result in ISDN routing invoking a connection attempt.

The other options requiring constant connectivity and/or high bandwidth are incorrect because ISDN constant connectivity is too expensive (especially since DSL is so widely available and much cheaper), and the bandwidth is too low to support high bandwidth.


2. Answer A is correct. The multicast address 240.0.0.1 is used to send a multicast to all systems on a subnet.

The multicast address 240.0.0.2 is used to send a multicast to all routers on a subnet.

The multicast address 240.0.0.5 is used to send a multicast to all Open Shortest Path First (OSPF) routers on a network.

The multicast address 240.0.0.22 is used to send a multicast to all Internet Group Management Protocol (IGMP) v3 devices on a network.


3. Answer B is correct. Cisco Group Management Protocol (CGMP) is used to enable a router to send two Media Access Control (MAC) addresses to a switch when the router receives an Internet Group Management Protocol (IGMP) join report. One of these IP addresses is the unicast source address, and the other is the multicast group's MAC address.

Internet Group Management Protocol (IGMP) is used to organize a multicast group. IGMPv2 enhances the original IGMP protocol by allowing users to send a leave message indicating that they no longer want to be a part of the multicast group. IGMPv3 further enhances IGMPv2 by adding functionality to indicate that a user wants to receive multicast group content.


4. Answers D and F are correct. Fiber channel can transfer data at rates exceeding 100 Mbps and uses Fiber Channel over IP (FCIP) to interconnect storage area network (SAN) islands.

Internet small computer systems interface (iSCSI) can span the entire area of a wide area network (WAN) and is used to encapsulate data into IP packets. In addition, it can be authenticated using either remote authentication dial-in user service (RADIUS) or a terminal access controller access control system plus (TACACS+) server.

EtherChannel logically bundles multiple physical connections.


5. Answer B is correct. A BHCA is the number of calls that can be processed during the busy part of the day. Cisco recommends that you plan for 6 calls per person per hour. To calculate the number of BHCA you divide the BHCA by the expected number of calls per hour. For instance, 10,000 BHCA would plan for 1,666 users (10000/6=1,666.67). You must allocate 900 kilobits per second (Kbps) to have sufficient bandwidth for 10,000 BHCA.


6. Answer C is correct. Proper placement of the proxy servers in content networking is crucial to minimize network traffic and server loads. In an enterprise campus network, proxy servers should be placed in the server farm layer.

The building access layer connects end users to the network.

The building distribution layer is composed of the building access switches and performs Layer 3 switching.

The campus backbone layer provides inter-building connectivity at very high speeds.


7. Answer A is correct. The multicast address range of 239.192.240.0/22 (239.192.240.0-239.142.243.255) is used to support music-on-hold.

The multicast address range of 239.255.0.0/16 (239.255.0.0-239.255.255.255) is used to support Internet Protocol/Television (IP/TV) high-rate traffic.

The multicast address range of 239.192.244.0/22 (239.192.244.0-239.142.247.255) is used to support IP/TV low-rate traffic.

The multicast address range of 239.192.248.0/22 (239.192.248.0-239.142.251.255) is used to support IP/TV medium-rate traffic.


8. Answer D is correct.

The edge distribution enterprise campus design requirement has the following characteristics:

  • Layer 3 switching
  • Low scalability
  • Medium availability
  • Medium performance
  • Medium cost per port

The server farm enterprise campus design requirement has the following characteristics:

  • Layer 3 switching
  • Medium scalability
  • High availability
  • High performance
  • High cost per port

The campus backbone enterprise campus design requirement has the following characteristics:

  • Layer 2 and 3 switching
  • Low scalability
  • High availability
  • High performance
  • High cost per port

The building distribution enterprise campus design requirement has the following characteristics:

  • Layer 2 and 3 switching
  • Medium scalability
  • Medium availability
  • Medium performance
  • Medium cost per port

9. Answer A is correct. Resource Reservation Protocol (RSVP) works in conjunction with routing protocols to provide Quality of Service (QoS) to Internet applications. RSVP applies the equivalent of access lists to data paths, thus ensuring that data flows of a specific nature have specialized access to those paths.

RSVP only works on routers with IOS 11.2 and above. There are three types of traffic that can be handled by RSVP:

  • Best Effort - standard IP traffic (mail, FTP, HTTP, etc.)
  • Rate Sensitive - traffic that is afforded a specific transfer rate in exchange for waiting longer than is normal for delivery
  • Delay Sensitive - traffic that would suffer if delays of any kind are encountered

VLSM (variable length subnet mask) is a feature of routing protocols that allows variable subnet masks on the same network.

Simple Network Management Protocol (SNMP) is used to monitor network performance.

Cost of Service (CoS) is the counterpart of QoS, except it emphasizes cost instead of quality.


10. Answers A, C, D and E are correct. To prevent an Internet connectivity module from a compromise of an exposed host, you should implement firewalls, host hardening, and network and host IDS. Host hardening involves making each single host as secure as possible. A firewall is a router or access server that creates a buffer zone between public networks and a private network. The combination of these three measures secures everything on the private side of the network against a compromise of an exposed host.

To prevent an Internet connectivity module from network mapping attacks, you should implement firewalls, routers, and network IDS.

To prevent an Internet connectivity module from being access from another local host that has been hacked, you should implement demilitarized zones (DMZs), firewalls, host hardening, local area network (LAN) switch access control, and network and host IDS.


Questions and answers provided by MeasureUp. To order the full version of this exam simulation, click here.


More Pop Quiz:


There are 52 CertCities.com user Comments for “Cisco Exam #642-871: ARCH Exam (MeasureUp, set 2)”
Page 1 of 6
3/2/07: giancana from indonesia says: answer module 6
4/3/07: Anonymous says: "which term describe the process of adding of headers to data as it moves down OSI layer"
3/7/08: hannan says: CCNA Cisco Module Exams « Önceki | Sonraki » 24/2/2008 CCNA 1 Chapter 3 Quiz CHAPTER 3 1. What is the purpose of resource records in DNS? used by the server to resolve names 2. What are two forms of application layer software? applications * syntax 3. What application layer protocol is commonly used to support for file transfers between a client and a server? * FTP 4. What are two characteristics of peer-to-peer networks? * decentralized resources * resource sharing without a dedicated server 5. Which layer of the OSI model supplies services that allow user to interface with the network? application 6. What are three properties of peer-to-peer applications? * acts as both a client and server within the same communication * hybrid mode includes a centralized directory of files * does not require specialized software 7. What is the role of the OSI application layer? provides the interface between the applications on either end of the network 8. What three protocols operate at the Application layer of the OSI model? * DNS, SMTP, POP 9. Which email components are used to forward mail between servers? * MDA, MTA 10. Which two protocols are used to control the transfer of web resources from a web server to a client browser? * HTTPS * HTTP 11. Which statements are correct concerning the role of the MTA in handling email? * receives email from the client's MUA * passes email to the MDA for final delivery * uses SMTP to route email between servers 12. As compared to SSH, what is the primary disadvantage of telnet? does not support encryption 13. Which application layer protocols correctly match a corresponding ********? * DNS dynamically allocates IP addresses to hosts * Telnet provides a virtual connection for remote access 14. What is the automated service that matches resource names with the required IP address? DNS 15. Refer to the exhibit. What is the destination port for the communication that is represented on line 5? * 80 16. What are two characteristics of clients in data networks? * initiate data exchanges * may upload data to servers 17. What application layer protocol describes the services that are used for file sharing in Microsoft networks? * SMB 18. A network administrator is designing a network for a new branch office of twenty-five users. What are the advantages of using a client-server model? * centralized administration * security is easier to enforce 19. A small home network has been installed to interconnect three computers together for gaming and file sharing. What two properties represent this network type? * User accounts are centralized. * Security is difficult to enforce. 20. How does the application layer on a server usually process multiple client request for services? uses support from lower layer ********s to distinguish between connections to the service Yorum (1) Yorum yaz! Kalıcı Bağlantı Yorum yaz! :: Arkadaşına Gönder! 1 yorum yazılmıştır 1. Yazan: isimsiz | Tarih: 3/3/2008 Konu: T.R 100% kjomzy! Bağlantı » * Ana Sayfa * Profilim * Eskiler Son Yazılarım * CCNA 1 Chapter 3 Quiz * CCNA 1 Chapter 2 Quiz Kategorilerim Kategori yok Arkadaşlarım Bağlantılarım * RSS Blogcu ile yapıldı BlogCounter.com - Free counter for Weblogs3M
12/6/09: Weeksolicitor says: Demand Free,demand twice less derive agree publish make handle principle realize appearance active give mass public answer blow think leadership fill train above on release very department worth achievement newspaper male employment complex me withdraw contact management following maybe traffic daughter promote style push amount handle map branch article same point future anyway pub primary species invite fight conclusion comment entitle selection deliver loan meanwhile fee criticism focus image spread person winner colour help floor nation bus interesting debate personal damage upper produce profit failure contribute combine argue like price affect league
6/18/12: Appliance repair Calabasas ca says: certcities.com is a one of the more impressive blogs I've seen. Thanks so much for keeping the internet classy for a change. Youve got style, class, bravado. I mean it. Please keep it up because without the internet is definitely lacking in intelligence.
6/24/12: Anonymous says: thanks amigo! great post!
6/28/12: escort Emirates says: certcities.com seems to get a good ammount of visitors. How do you get traffic to it? It offers a nice unique spin on things. I guess having something real or substantial to talk about is the most important thing.
6/29/12: guides in Saint Petersburg says: Thanks in advance and good luck, certcities.com ! :)
7/4/12: UAE escort says: Nothing against the article, but I disagree with a couple of points to some extenct. I'm probably a minority though, lol. Thanks for sharing it on certcities.com .
9/22/12: VPN´úÀí from tmzsjc@gmail.com says: ÓÃVPN°É,ÍƼöÕâÀïµÄÈÕ±¾·þÎñÆ÷,Ëٶȿì,http://www.35vpn.com/ http://www.35vpn.com/
First Page   Next Page   Last Page
Your comment about: “Cisco Exam #642-871: ARCH Exam (MeasureUp, set 2)”
Name: (optional)
Location: (optional)
E-mail Address: (optional)
Comment:
   

-- advertisement (story continued below) --

top