CCNA_3_UPD (1130970), страница 6
Текст из файла (страница 6)
When a collision occurs in a network using CSMA/CD, how do hosts withdata to transmit respond after the backoff period has expired?The hosts return to a listen-before-transmit mode.The hosts creating the collision have priority to send data.The hosts creating the collision retransmit the last 16 frames.The hosts extend their delay period to allow for rapid transmission.comments (1)TOP05:27CCNA 3:Module 1POSTED BY ADMINOptions With Highlight Colours are Correct Answer1.
A network technician is asked to examine an existing switched network.Following this examination, the technician makes recommendations foradding new switches where needed and replacing existing equipment thathampers performance. The technician is given a budget and asked toproceed. Which two pieces of information would be helpful in determiningnecessary port density for new switches? (Choose two.)forwarding ratetraffic flow analysisexpected future growthnumber of required core connectionsnumber of hubs that are needed in the access layer to increase performance2.
Configuring communication between devices on different VLANs requiresthe use of which layer of the OSI model?Layer 1Layer 3Layer 4Layer 53. What is the likely impact of moving a conventional company architectureto a completely converged network?Local analog phone service can be completely outsourced to cost-effectiveproviders.The Ethernet VLAN structure is less complex.A shared infrastructure is created resulting in a single network to manage.QoS issues are greatly reduced.There is less bandwidth competition between voice and video streams4.
Which hierarchical design model layer controls the flow of network trafficusing policies and delineates broadcast domains by performing routingfunctions between virtual LANs (VLANs)?applicationaccessdistributionnetworkcore5. A network administrator is selecting a switch that will operate at theСтр. 14 из 1701.04.2009 0:46CISCO CCNA Certifications: CCNA 3 UPDATEDfile:///D:/botalka/%D1%81%D0%B8%D1%81%D1%8C%D0%BA...network core. Which three features should the switch support for optimumnetwork performance and reliability? (Choose three.)port securitysecurity policies10 Gigabit Ethernetquality of service (QoS)hot-swappable hardwarePower over Ethernet (PoE)6. Which three features are commonly supported at the distribution layer ofthe Cisco hierarchical network model? (Choose three.)security policiesPower over Ethernetswitch port securityquality of serviceLayer 3 functionalityend user access to network7.
Which two features are supported at all three levels of the Ciscothree-layer hierarchical model? (Choose two.)Power over Ethernetload balancing across redundant trunk linksredundant componentsQuality of Servicelink aggregation8. Which two characteristics are associated with enterprise level switches?(Choose two.)low port densityhigh forwarding ratehigh latency levelsupport link aggregationpredefined number of ports9. Link aggregation should be implemented at which layer of thehierarchical network?core onlydistribution and coreaccess and distributionaccess, distribution, and core10. For organizations that are implementing a voice over IP solution, whatfunctionality should be enabled at all three layers of the hierarchicalnetwork?Power over Ethernetquality of serviceswitch port securityinter-VLAN routing11. Which layer of the hierarchical design model provides a means ofconnecting devices to the network and controlling which devices areallowed to communicate on the network?applicationaccessdistributionnetworkcore12.
At which heirarchical layer are switches normally not required toprocess all ports at wire speed?core layerdistribution layeraccess layerentry layer13. Which layer of the OSI model does an access layer LAN switch use tomake a forwarding decision?Layer 1Layer 2Layer 3Layer 414. Refer to the exhibit.
What characteristic of hierarchical network designsis exhibited by having SW3 connected to both SW1 and Sw2?scalabilitysecurityredundancymaintainability15. Which layer of the hierarchical network design model is refered to asthe high-speed backbone of the internetwork, where high availability andredundancy are critical?access layercore layerdata-link layerdistribution layernetwork layerphysical layer16. What statement best describes a modular switch?a slim-line chassisallows interconnection of switches on redundant backplaneСтр. 15 из 1701.04.2009 0:46CISCO CCNA Certifications: CCNA 3 UPDATEDfile:///D:/botalka/%D1%81%D0%B8%D1%81%D1%8C%D0%BA...defined physical characteristicsflexible characteristics17.
A technician is attempting to explain Cisco StackWise technology to aclient that is setting up three stackable switches. Which explanationaccurately describes StackWise technology?StackWise technology allows up to eight ports to be bound together to increaseavailable bandwidth.StackWise technology allows the switch to deliver power to end devices by usingexisting Ethernet cabling.StackWise technology allows the switch capabilities and ports to be expanded by theaddition of line cards.StackWise technology allows up to nine switches to be interconnected via the use ofa fully redundant backplane.18.
Which hierarchical design characteristic would be recommended at boththe core and distribution layers to protect the network in the case of a routefailure?PoEredundancyaggregationaccess lists19. Which feature supports higher throughput in switched networks bycombining multiple switch ports?convergenceredundant linkslink aggregationnetwork diameter20. Refer to the exhibit. Beginning with HR servers and workstations, anetwork engineer is designing a new security structure for the network.Which set of policies adheres to the hierarchical network model designprinciples?Implement Layer 3 switching on S1 to reduce the packet processing load on D1 andD2. Install all security processing on S1 to reduce network traffic load.Configure port security options on S1.
Use Layer 3 access control features on D1 andD2 to limit access to the HR servers to just the HR subnet.Move all HR assets out of the data center and connect them to S1. Use Layer 3security functions on S1 to deny all traffic into and out of S1.Perform all port access and Layer 3 security functions on C1.comments (0)TOP|Newer Posts Older Posts| |HomeSubscribe to: Posts (Atom)mobile-spy.ruСтр. 16 из 17Обратная связь - Реклама от GoogleAdvertise Here01.04.2009 0:46CISCO CCNA Certifications: CCNA 3 UPDATEDСтр. 17 из 17file:///D:/botalka/%D1%81%D0%B8%D1%81%D1%8C%D0%BA...Advertise HereИмеется информация, что этот сайт атакует01.04.2009 0:46.















