ActualTests.Cisco.640-802.Exam.Q.and.A.08.15.08-DDU (1130589), страница 2
Текст из файла (страница 2)
What are two advantages of using Layer 2Ethernet switches over hubs? (Choose two)A. Allowing simultaneous frame transmissionsB. Increasing the size of broadcast domainsC. Increasing the maximum length of UTP cabling between devicesD. Filtering frames based on MAC addressesE. Decreasing the number of collision domainsAnswer: A, DExplanation:A: A half duplex connection is where only one device can send or receive at a time. Afull duplex connection is where both devices can send and receive at the same time.Thus, if you have a 100Mb half-duplex connection, only sending at 100Mb OR receivingat 100Mb can happen at the same time.
If you have a 100Mb full duplex connection, youcan effectively get 200Mb out of the link because you could be sending 100Mb andreceiving 100Mb at the same time.D: Switches are capable of filtering frames based on any Layer 2 fields. For example, aswitch can be programmed to reject (not forward) all frames sourced from a particularnetwork. Because link layer information often includes a reference to an upper-layerActualtests.com - The Power of Knowing640-802protocol, switches usually can filter on this parameter.
Furthermore, filters can be helpfulin dealing with unnecessary broadcast and multicast packets.QUESTION 10:CDP is being used throughout the Certkiller network. What are two reasons why theCertkiller network administrator would use CDP? (Choose two)A. To determine the status of network services on a remote deviceB. To obtain the IP Address of a connected device in order to telnet to the deviceC. To verify the type of cable interconnecting two devicesD. To verify Layer 2 connectivity between two devices when Layer 3 failsE.
To obtain VLAN information from directly connected switchesF. To determine the status of the routing protocols between directly connected routersG. To support automatic network failover during outagesAnswer: B, DExplanation:Cisco Discovery Protocol (CDP) is a proprietary protocol designed by Cisco to helpadministrators collect information about both locally attached and remote devices. Byusing CDP, you can gather hardware and protocol information about neighbor devices,which is useful info for troubleshooting and documenting the network.You can use:Show cdp neighborShow cdp neighbor detailsCommands to gather the information of connected neighbors.QUESTION 11:CDP is running between two Certkiller devices.
What information is supplied byCDP? (Select three)A. Device IdentifiersB. Capabilities listC. PlatformD. Route identifierE. Neighbor traffic dataAnswer: A, B, CActualtests.com - The Power of Knowing640-802Explanation:QUESTION 12:Two Certkiller offices are connected as shown below:Two buildings on the London campus of a the Certkiller corporation must beconnected to use Ethernet with a bandwidth of at least 100 Mbps.
Certkiller isconcerned about possible problems from voltage potential differences between thetwo buildings. Which media type should be used for the connection?A. Coaxial cableB. Fiber optic cableC. UTP cableD. STP cableE. None of the aboveAnswer: BExplanation:Current Ethernet technology typically comes via either copper UTP or fiber cables. Inthis scenario the distance between the buildings is only 55 meters so either copper orfiber could be used, as the distance limitation for 100M UTP Ethernet is 100 meters.However, fiber would be a better fit as it is not prone to errors that could occur due to thevoltage potential differences.
Because fiber is a dielectric material, it's not susceptible toelectrical interference. FO-product vendors also claim that fiber systems make securecommunications easier. Interference immunity and lack of emissions are givens in FOsystems and in the fiber medium itself.Actualtests.com - The Power of Knowing640-802QUESTION 13:Refer to the Certkiller network shown below:You work as a network technician at Certkiller .com. Please study the exhibitcarefully.
Based on the information shown above, what is needed to allow hostCertkiller 1 to ping host Certkiller 2?A. a crossover cable connecting the switchesB. a backbone switch connecting the switches with either fiber optic or straight-throughcablesC. a straight-through cable connecting the switchesD. a CSU/DSU connected to the switches with straight-through cablesE. a router connected to the switches with straight-through cablesAnswer: EExplanation:Routers are Layers 3 devices used for inter-network communication.
In this scenariothere are two different networks, so both switches need to connect to a router usingstraight-through cables.A straight-through cable is used to connect two different devices like, switch to router,host to switch. Since we need to insert a router for communication between the twoswitches, straight through cables will be used between the switches and the router.QUESTION 14:Exhibit:Actualtests.com - The Power of Knowing640-802A new Certkiller office is opening, and a network device needs to be installed in theplace of the icon labeled Network Device to accommodate a leased line T1 to theInternet. Which network device and interface configuration meets the minimumrequirements for this installation?A.
A switch with two Ethernet interfacesB. A router with two Ethernet interfacesC. A switch with one Ethernet and one serial interfaceD. A router with one Ethernet and one serial interfaceE. A router with one Ethernet and one modem interfaceF. None of the aboveAnswer: DExplanation:Only a router can terminate a leased line T1 access circuit, and only a router can connecttwo different IP networks. Here, we will need a router with two interfaces, one serialconnection for the T1 and one Ethernet interface to connect to the switch on the LAN.QUESTION 15:As a CCNA candidate, you must know the various layers of the OSI model. Atwhich layers of the OSI Model do Wide Area Networks operate in? (Choose two)A. Physical LayerB. Datalink LayerC. Network LayerD.
Session LayerE. Transport LayerF. Presentation LayerG. Application LayerAnswer: A, BExplanation:Actualtests.com - The Power of Knowing640-802A WAN is a data communications network that covers a relatively broad geographic areaand that often uses transmission facilities provided by common carriers, such astelephone companies. WAN technologies generally function at the lower two layers ofthe OSI reference model: the physical layer and the data link layer as shown below.Note: Occasionally WAN's would also be considered to operate at layer 3, but since thisquestion asked for only 2 choices layers 1 and 2 are better choices.QUESTION 16:While troubleshooting a connectivity problem on the network, you issue the pingcommand from your PC command prompt, but the output shows "request timesout."At which OSI layer is this problem associated with?A.
The data link layerB. The application layerC. The access layerD. The session layerE. The network layerAnswer: EExplanation:TCP/IP includes ICMP, a protocol designed to help manage and control the operation ofa TCP/IP network. The ICMP protocol provides a wide variety of information about anetwork's health and operational status.
Control message is the most descriptive part of aname. ICMP helps control and manage IP's work and therefore is considered part ofTCP/IP's network layer.Actualtests.com - The Power of Knowing640-802Reference:CCNA Self-Study CCNA ICND exam certification Guide (Cisco Press, ISBN1-58720-083-X) page 277.QUESTION 17:You download a file from an FTP site on the Internet.
What is the highest layer in theOSI model used in this FTP operation?A. ApplicationB. PresentationC. SessionD. TransportE. InternetF. Data LinkG. PhysicalAnswer: AExplanation:Layer 7 is the application layer, which is the highest layer in the OSI model. This layerdescribes the use of end user applications, such as opening movie files (avi, mpeg, etc)used Microsoft Office applications, using WWW browsers, using Telnet, and using FTP.QUESTION 18:A host computer has been correctly configured with a static IP address, but thedefault gateway is incorrectly set.
Which layer of the OSI model will be firstaffected by this configuration error?A. Layer 1B. Layer 2C. Layer 3D. Layer 4E. Layer 5F. Layer 6E. Layer 7Answer: CExplanation:IP Addressing and IP routing resides on the OSI Network layer, which is layer 3.Actualtests.com - The Power of Knowing640-802QUESTION 19:Which layer of the OSI reference model is responsible for ensuring reliableend-to-end delivery of data?A. ApplicationB. PresentationC. SessionD.
TransportE. NetworkF. Data-LinkAnswer: DExplanation:A key function of the transport layer is to provide connection services for the protocolsand applications that run at the levels above it. These can be categorized as eitherconnection-oriented services or connectionless services. Some protocol suites, such asTCP/IP, provide both a connection-oriented and a connectionless transport layerprotocol, to suit the needs of different applications.The transport layer is also the place in the layer stack where functions are normallyincluded to add features to end-to-end data transport.
Where network layer protocols arenormally concerned with just "best effort" communications, where delivery is notguaranteed. Transport layer protocols are given intelligence in the form of algorithms thatensure that reliable and efficient communication between devices takes place. Thisencompasses several related jobs, including lost transmission detection and handling, andmanaging the rate at which data is sent to ensure that the receiving device is notoverwhelmed.Transmission quality, meaning ensuring that transmissions are received as sent, is soimportant that some networking references define the transport layer on the basis ofreliability and flow-control functions.
However, not all transport layer protocols providethese services. Just as a protocol suite may have a connection-oriented and aconnectionless transport layer protocol, it may also have one that provides reliability anddata management services, and one that does not. Again, this is the case with TCP/IP:there is one main transport layer protocol; TCP, that includes reliability and flow controlfeatures, and a second, UDP, that doesn't.QUESTION 20:At which OSI layer is a logical path created between two host systems named CK1and CK2 on the Certkiller LAN?A. PhysicalB.
SessionActualtests.com - The Power of Knowing640-802C. Data linkD. TransportE. NetworkF. ApplicationG. PresentationAnswer: EExplanation:The Network layer (also called layer 3) manages device addressing, tracks the location ofdevices on the network, and determines the best way to move data, which means that theNetwork layer must transport traffic between devices that aren't locally attached. Routers(layer 3 devices) are specified at the Network layer and provide the routing serviceswithin an internetwork.QUESTION 21:Which OSI layer is associated with the following: The acknowledgement oftransmissions, sequencing, and flow control across a network?A. Layer 2B.
Layer 3C. Layer 4D. Layer 5E. Layer 6F. Layer 7Answer: CExplanation:The Transport layer (Layer 4) defines several functions, including the choice ofprotocols. The most important Layer 4 functions are error recovery and flow control. Thetransport layer may provide for retransmission, i.e., error recovery, and may use flowcontrol to prevent unnecessary congestion by attempting to send data at a rate that thenetwork can accommodate, or it might not, depending on the choice of protocols.Multiplexing of incoming data for different flows to applications on the same host is alsoperformed. Reordering of the incoming data stream when packets arrive out of order isincluded.