route chapter 1 - ccnp route (version 6.0)

5

Click here to load reader

Upload: as2205

Post on 10-Apr-2015

43.508 views

Category:

Documents


3 download

DESCRIPTION

100%

TRANSCRIPT

Page 1: ROUTE Chapter 1 - CCNP ROUTE (Version 6.0)

Which route description best defines a floating static route?

a route with a metric equal to the metric of a corresponding dynamic route

a route with a metric less than the metric of a corresponding dynamic route

a route with a metric greater than the metric of a corresponding dynamic route

a route with an administrative distance less than the administrative distance of a

corresponding dynamic route

a route with an administrative distance greater than the administrative distance of a

corresponding dynamic route

The OSPF routing protocol is enabled on a network. The administrator would like to enable a floating static

route to be used as a backup. Which is the correct setting for the administrative distance of the floating static

route?

0

1

50

100

120

The following line was displayed in the output of the show ip route command:

192.168.3.0/24 [120/2] via 192.168.2.2, 00:00:30, Serial0/0

Which routing protocol is the source for this route?

BGP

EIGRP

ODR

OSPF

RIP

What is the administrative distance of EIGRP-learned routes that have been injected into EIGRP

via redistribution?

1

90

100

110

170

180

Page 2: ROUTE Chapter 1 - CCNP ROUTE (Version 6.0)

For ODR learned routes, what is the default administrative distance and metric that is displayed

by the show ip route command?

[160/0]

[160/1]

[170/0]

[170/1]

Which type of traffic should receive the highest level of priority by QoS mechanisms in a

converged network design?

real-time traffic

transactional traffic

routing protocol traffic

network management traffic

In a converged network, which two types of traffic would be categorized as real-time traffic?

(Choose two.)

e-mail

file transfer

web browsing

videoconferencing

voice over IP

What is the role of QoS in a converged network?

to ensure that real-time traffic is not delayed

to give highest priority to transactional traffic

to ensure that all traffic above available bandwidth levels is dropped

to protect against the impact of worms, viruses, and other network attacks

What are two Intelligent Information Network phases that involve sharing resources and making

the network "application aware"? (Choose two.)

integrated applications

integrated standards

integrated services

integrated security

integrated transport

Page 3: ROUTE Chapter 1 - CCNP ROUTE (Version 6.0)

Which statement about the Intelligent Information Network (IIN) is true?

The IIN is an industry-standard approach to designing a modern network.

The IIN is a framework that describes how to build a Service-Oriented Network Architecture

(SONA).

The IIN defines a network design of three hierarchal layers consisting of the core,

distribution, and access layers.

The IIN offers end-to-end functionality and a centralized, unified control that promotes true

business transparency and agility.

Which feature defines functionality that is found in the integrated services phase of IIN?

making the network application-aware

pooling and sharing IT resources through virtualization

consolidating voice, video, and data into the IP network

content caching, load balancing, and application-level security

In which PPDIOO phase do key decision makers identify the initial business and technical

requirements?

Design Phase

Implement Phase

Operate Phase

Optimize Phase

Plan Phase

Prepare Phase

In which PPDIOO phase is the actual network configured and verified?

Design Phase

Implement Phase

Operate Phase

Optimize Phase

Plan Phase

Prepare Phase

Which two statements are true about an implementation plan approach? (Choose two.)

In an ad hoc approach, the Cisco Lifecycle Services framework could be used to complete a

task.

In an ad hoc approach, the network engineer identifies the need for a change and implements

the solution without planning any of the tasks.

In an ad hoc approach, the network engineer identifies the need for a change and starts with

Page 4: ROUTE Chapter 1 - CCNP ROUTE (Version 6.0)

planning as the first step.

In a structured approach, it is more likely that scalability issues, suboptimal routing, and

security issues will occur.

In a structured approach, the Fault, Configuration, Accounting, Performance, and Security

(FCAPS) model could be used to complete a task.

In a structured approach, the network engineer identifies the need for an upgrade and starts

with configuring as the first step.

Which two statements are true about the structured approach model? (Choose two.)

The Cisco Lifecycle Services approach defines six phases including the prepare, plan,

design, implement, operate, and optimize phases.

The Fault, Configuration, Accounting, Performance, and Security (FCAPS) model identifies

the implementation plan in the Fault management category.

The Fault, Configuration, Accounting, Performance, and Security (FCAPS) model identifies

the implementation plan and the implementation as part of FCAPS best practices.

The IT Infrastructure Library (ITIL) model is defined by the International Organization for

Standardization (ISO).

The Prepare, Plan, Design, Implement, Operate, and Optimize (PPDIOO) model identifies

the implementation plan as part of the Design phase and the actual implementation as part of

the Implement phase.

The Telecommunications Management Network (TMN) model is similar to the PPDIOO

model.

Which three steps are completed in the first three phases of the Prepare, Plan, Design,

Implement, Operate, and Optimize (PPDIOO) model? (Choose three.)

Archive the documentation for future use.

Characterize the existing network and sites.

Design the network topology and solutions.

Identify customer requirements.

Implement and verify the design.

Monitor and optionally redesign.

Which two steps are completed in the last three phases of the Prepare, Plan, Design, Implement,

Operate, and Optimize (PPDIOO) model? (Choose two.)

Characterize the existing network and sites.

Configure and verify the design.

Design the network topology and solutions.

Document the existing network information.

Identify customer requirements.

Monitor and optionally redesign.

Page 5: ROUTE Chapter 1 - CCNP ROUTE (Version 6.0)

The ABC Corporation implements the network for its new headquarters via the use of the Cisco

Enterprise Architecture. The network administrator wants to filter the traffic from and to the

outside world. Where should the administrator deploy a firewall device?

server farm

enterprise edge

enterprise campus

service provider edge

When designing a network infrastructure, a network engineer will use the hierarchical network

model. What two factors must be taken into account when designing the core layer? (Choose

two.)

packet manipulation to prioritize the flow of core data

redundant links to ensure fault tolerance

routing protocols that are chosen for the speed of network convergence

access control lists to curtail core layer traffic

star network topologies to reduce core layer latency

Which two functions are performed at the distribution layer of the hierarchical network model?

(Choose two.)

summarizing routes from the access layer

providing high-speed backbone switching services

allowing end users to access the local network

providing the gateway of last resort for core layer devices

isolating network problems to prevent them from affecting the core layer