tag:blogger.com,1999:blog-74284460171435146052024-03-08T11:58:36.861-08:00CCDA TRAINING Wjcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.comBlogger24125tag:blogger.com,1999:blog-7428446017143514605.post-50791232918541911232015-07-18T10:04:00.008-07:002015-08-20T03:52:07.794-07:00Share your CCDE Practical Experience<h1>
Share your CCDE Practical Experience</h1>
<div class="info">
<span class="date"></span><span class="comments"><br /></span>
</div>
<span class="pinkandbold">Please share with us your experience
after taking the new CCDE Practical exam, your materials, the way you
learned, your recommendations…</span><br />
Your posts are warmly welcome!jcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-7428446017143514605.post-7927267898011742922015-07-18T10:04:00.004-07:002015-07-18T10:04:29.610-07:00Share your CCDE Written Experience<h1>
Share your CCDE Written Experience</h1>
<div class="info">
<span class="date"></span><span class="comments"><br /></span>
</div>
<span class="pinkandbold">Please share with us your experience
after taking the new CCDE Written exam, your materials, the way you
learned, your recommendations…</span><br />
Your posts are warmly welcome!jcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-7428446017143514605.post-69536391643129223482015-07-18T10:04:00.001-07:002015-07-18T10:04:12.798-07:00Share your ARCH Experience<h1>
Share your ARCH Experience</h1>
<div class="info">
<span class="date"></span><span class="comments"><br /></span>
</div>
<div class="pinkandbold">
Please share with us your experience after
taking the ARCH v2.1 642-874 exam, your materials, the way you learned,
your recommendations…</div>
Your posts are warmly welcome!<br />
Please don’t ask for links to download copyright materials herejcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-7428446017143514605.post-56335464493025328092015-07-18T10:03:00.005-07:002015-07-18T10:03:53.139-07:00Share your CCDA Experience<div class="post" id="post-4">
<h1>
Share your CCDA Experience</h1>
<div class="info">
<span class="date"></span><span class="comments"><br /></span>
</div>
<div class="content">
<div class="pinkandbold">
Please share with us your experience after
taking the CCDA 640-863 exam, your materials, the way you learned, your
recommendations…</div>
Your posts are warmly welcome!<br />
Please don’t ask for links to download copyright materials here…<br />
</div>
</div>
jcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-7428446017143514605.post-89372711658686382752015-07-18T10:03:00.002-07:002015-08-20T03:52:26.734-07:00Miscellaneous Questions<h1>
Miscellaneous Questions</h1>
<div class="info">
<span class="date"></span><span class="comments"><br /></span>
</div>
Here you will find answers to Miscellaneous Questions<br />
<div class="ccnaquestionsnumber">
Question 1</div>
Which statement accurately describes one difference between a small office and medium office topology?<br />
A. Small offices commonly use Rapid PVST+ for Layer 3 deployments.<br />
B. Medium offices commonly use integrated route and switching platforms.<br />
C. Medium offices use integrated 10/100/1000 interfaces as Layer 2 trunks.<br />
D. Medium offices use external access switches to support LAN connectivity.<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> D<br />
<div class="ccnaquestionsnumber">
Question 2</div>
Which statement can a network designer use to describe route summarization to an IT manager?<br />
A. It is the grouping of multiple contiguous subnets into one Class A, B, or C IP address to minimize routing table size.<br />
B. It is the grouping of multiple discontiguous subnets to increase routing performance.<br />
C. It is the grouping of multiple contiguous networks and advertising as one large network.<br />
D. It is the grouping of ISP network addresses to minimize the number of routes to the Internet.<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> C<br />
<span class="ccnaquestionsnumber">Question 3</span><br />
Refer to the exhibit.<br />
<div style="text-align: center;">
<img alt="recommend_model.jpg" src="http://www.dstut.com/images/CCDA/Miscellaneous/recommend_model.jpg" height="333" width="640" /></div>
Which two statements describe why Model A is the recommended design
for routing between Building Distribution switches and Campus Core
switches? (Choose two)<br />
A. It uses timer-based non-deterministic convergence.<br />
B. It is software-based, providing fast convergence to the remaining path.<br />
C. Routes are not summarized from distribution to the core.<br />
D. The Layer 3 redundant equal cost links support fast convergence.<br />
E. A link or box failure does not require routing protocol convergence.<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> D E<br />
<span class="ccnaquestionsnumber">Question 4</span><br />
RST Corporation is planning to upgrade its current network. The chief
technology officer has supplied a topology diagram and an IP addressing
scheme of the current network during an interview. RST has been growing
at about twenty percent per year. It has been difficult to maintain
customer support at a satisfactory level. Therefore, the RST board has
met with and directed the chief technology officer to look into network
improvements. Which two items are most relevant in documenting RST’s
business requirements? (Choose two)<br />
A. projected growth estimates <br />
B. network performance requirements<br />
C. existing network topologies <br />
D. improved customer support requirements <br />
E. the IP addresses assigned by the ISP<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> A D<br />
<span class="ccnaquestionsnumber">Question 5</span><br />
You are designing a small branch office that requires these attributes: <br />
support for 60 users <br />
the growth capacity to add another 15 users soon <br />
redundant access higher bandwidth between the Layer 2 switch and routing to the WAN<br />
Which branch office topology or technology must be used?<br />
A. two-tier<br />
B. loop-free<br />
C. three-tier<br />
D. EtherChannel<br />
E. integrated routing and switching<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> D<br />
<span class="ccnaquestionsnumber">Question 6</span><br />
A campus network needs end-to-end QoS tools to manage traffic and
ensure voice quality. Which three types of QoS tools are needed? (Choose
three)<br />
A. interface queuing and scheduling<br />
B. congestion management<br />
C. compression and fragmentation<br />
D. bandwidth provisioning<br />
E. traffic classification<br />
F. buffer management<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>A D E<br />
<span class="ccnaquestionsnumber">Question 7</span><br />
After a period of rapid growth, FloCzar Boats is seeking better network management tools.<br />
Managers have developed this needs list:<br />
Move from static to dynamic device information.<br />
Gain information to assist in long-term trend analysis.<br />
Concentrate on Layer 4 monitoring.<br />
Which management protocol will most help FloCzar achieve its goals?<br />
A. Cisco Discovery Protocol<br />
B. RMON<br />
C. SNMP<br />
D. RMON2<br />
E. NetFlow<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> D<br />
<span class="ccnaquestionsnumber">Question 8</span><br />
A network design document is being prepared for a customer. Which three network design elements must be included? (Choose three)<br />
A. data sources<br />
B. design details<br />
C. proof of concept<br />
D. implementation plan<br />
E. organizational policies<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>B C D<br />
<span class="ccnaquestionsnumber">Question 9</span><br />
A company is implementing an Identity Management solution with these characteristics: <br />
existing Cisco ACS 4.0 <br />
Cisco Catalyst switches <br />
minimal added investments<br />
Which Cisco Trust and Identity solution would you recommend?<br />
A. NAC Appliance (Cisco Clean Access)<br />
B. Cisco IBNS<br />
C. NAC Framework<br />
D. Cisco Security Agent<br />
E. CSM<br />
F. Cisco Security MARS<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> B<br />
<div class="ccnaquestionsnumber">
Question 10</div>
The BodMech online fitness organization specializes in creating
fitness plans for senior citizens. The company recently added a
health-products retail inventory. Which E-Commerce module device will
allow customers to interact with the company and purchase products?<br />
A. application server<br />
B. database server<br />
C. public server<br />
D. web server<br />
E. NIDS appliance<br />
F. SMTP mail server<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> D<br />
<span class="ccnaquestionsnumber">Question 11</span><br />
A network design includes private addressing, but there is also a
need for two or three network devices to each be assigned a unique
public address so they can be accessed from the Internet. Which
technique will satisfy this requirement?<br />
A. Dynamic NAT<br />
B. Static NAT<br />
C. DHCP<br />
D. VPN tunneling<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>B<br />
<span class="ccnaquestionsnumber">Question 12</span><br />
In a Cisco CatOS switch, what is the recommended practice when
configuring switch-to-switch intercommunications to carry multiple VLANs
for Dynamic Trunk Protocol?<br />
A. auto to auto_negotiate<br />
B. auto to auto_no_negotiate<br />
C. on to on_negotiate<br />
D. desirable to desirable_negotiate<br />
E. desirable to desirable_no_negotiate<br />
F. disable Dynamic Trunk Protocol when operating in the distribution layer<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> D<br />
<span class="ccnaquestionsnumber">Question 13</span><br />
The topology map in the draft design document should cover which two layers of the OSI model? (Choose two)<br />
A. physical<br />
B. data link<br />
C. network<br />
D. transport<br />
E. session<br />
F. application<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>A C<br />
<span class="ccnaquestionsnumber">Question 14</span><br />
Which statement correctly describes queuing in environments supporting teleworkers?<br />
A. CQ is for time-sensitive protocols.<br />
B. Queuing occurs on the outbound interface.<br />
C. Priority queuing guarantees some level of sen/ice to all traffic.<br />
D. Hardware queues are configured for appropriate PQ, CQ, or WFQ.<br />
E. WFQ is the Cisco IOS default on all WAN links regardless of speed.<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> B<br />
<span class="ccnaquestionsnumber">Question 15</span><br />
Which two methods are used to enhance VPN performance on Cisco ISRs? (Choose two)<br />
A. built-in hardware-based encryption acceleration<br />
B. SSL Acceleration Network Module<br />
C. high-performance VPN encryption AIM<br />
D. VPN Service Adapter<br />
E. VPN Acceleration Module<br />
F. VPN Shared Port Adapter<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>A C<br />
<span class="ccnaquestionsnumber">Question 16</span><br />
Refer to the exhibit.<br />
<div style="text-align: center;">
<img alt="core_layer.jpg" src="http://www.dstut.com/images/CCDA/Miscellaneous/core_layer.jpg" height="417" width="627" /></div>
A standard Layer 2 campus network design is pictured. Which numbered box represents the core layer?<br />
A. #1 <br />
B. #2 <br />
C. #3 <br />
D. #4 <br />
E. #5<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>C<br />
<span class="ccnaquestionsnumber">Question 17</span><br />
What is the recommended spanning tree protocol to use for all Layer 2 deployments in a branch office environment?<br />
A. CST<br />
B. RSPT<br />
C. PVST<br />
D. MISTP<br />
E. Rapid PVST+VP<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> E<br />
<span class="ccnaquestionsnumber">Question 18</span><br />
Which two of these are scalability benefits of designing a network that utilizes VPNs?(Choose two)<br />
A. extends the network to remote users<br />
B. allows networks to be set up and restructured quickly<br />
C. reduces dial infrastructure expenditures<br />
D. reduces the number of physical connections<br />
E. simplifies the underlying structure of a customer WAN<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> D E<br />
<span class="ccnaquestionsnumber">Question 19</span><br />
Which two capabilities of NetFlow accounting assist designers with network planning?(Choose two)<br />
A. the decoding and analyzing of packets<br />
B. the monitoring of processor time on network devices<br />
C. the monitoring of user network utilization<br />
D. the calculation of packet and byte counts of network traffic<br />
E. the presentation of a time-based view of application usage on the network<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> C D<br />
<span class="ccnaquestionsnumber">Question 20</span><br />
Refer to the exhibit.<br />
<table border="1" style="background-color: #ffffcc;">
<tbody>
<tr>
<td>435 Cisco model 2800 routers <br />
129 Cisco model 3800 routers <br />
10 Cisco model 7500 routers</td>
</tr>
</tbody>
</table>
You are documenting the existing network of a customer with a large
installed Cisco network. The routers listed are in use on the network.
Which two additional pieces of information would be the most valuable in
completing your documentation of these routers? (Choose two)<br />
A. error statistics<br />
B. interface options<br />
C. software revisions<br />
D. power requirements<br />
E. management protocols<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> B C<br />
<span class="ccnaquestionsnumber">Question 21</span><br />
Which two design criteria require VLANs in a proposed solution? (Choose two)<br />
A. video streaming on the LAN<br />
B. security between departments<br />
C. the segmenting of collision domains<br />
D. the segmenting of broadcast domains<br />
E. the use of multivendor equipment<br />
F. a limited corporate budget<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> B Djcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-7428446017143514605.post-67877931657065542382015-07-18T10:02:00.006-07:002015-07-18T10:02:59.593-07:00WAN Design<h1>
WAN Design</h1>
<div class="info">
<span class="date"></span><span class="comments"><br /></span>
</div>
Here you will find answers to WAN Questions<br />
<div class="ccnaquestionsnumber">
Question 1</div>
Which three factors best justify WAN link redundancy between geographically dispersed sites? (Choose three)<br />
A. important traffic flows<br />
B. lack of speed<br />
C. high link utilization<br />
D. uncertain reliability<br />
E. excessive packet transmission rate<br />
F. high expense of transmitting data<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>A B D<br />
<div class="ccnaquestionsnumber">
Question 2</div>
Which of these accurately describes dial backup routing?<br />
A. it always uses distance vector routing protocols<br />
B. it always uses permanent static routes<br />
C. the router inflates the dial backup link when a failure is detected on the primary link<br />
D. it is supplied by the setvice provider as a secondary PVC at no additional charge<br />
E. once the backup link is activated it will remain active even after the primary link is restored<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>C<br />
<div class="ccnaquestionsnumber">
Question 3</div>
Refer to the exhibit.<br />
<div style="text-align: center;">
<img alt="WAN_Module.jpg" height="440" src="http://www.dstut.com/images/CCDA/WANDesign/WAN_Module.jpg" width="647" /></div>
Which module is the Enterprise WAN module?<br />
A. Enterprise A<br />
B. Enterprise B<br />
C. Enterprise C<br />
D. Enterprise D<br />
E. Enterprise E<br />
F. Enterprise F<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>C<br />
<div class="ccnaquestionsnumber">
Question 4</div>
Western Associated News Agency recently acquired a large news
organization with several sites, which will allow it to expand to
worldwide markets. The new acquisition includes these connectivity
technologies:<br />
Frame Relay<br />
ATM<br />
SONET<br />
cable<br />
DSL<br />
wireless<br />
From a Layer 1 viewpoint, which Enterprise Edge module will be most affected?<br />
A. ISP<br />
B. PSTN<br />
C. E-Commerce<br />
D. WAN/MAN<br />
E. Edge Distribution<br />
F. Internet Connectivity<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> D<br />
<div class="ccnaquestionsnumber">
Question 5</div>
Which three mechanisms are required to deploy QoS on an IP WAN? (Choose three)<br />
A. traffic classification<br />
B. Call Admission Control<br />
C. queuing and scheduling<br />
D. link efficiency techniques<br />
E. traffic shaping<br />
F. bandwidth provisioning<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> B D E<br />
<div class="ccnaquestionsnumber">
Question 6</div>
Which three types of WAN topologies can be deployed in the Cisco
Enterprise Architecture Enterprise Edge WAN module? (Choose three)<br />
A. ring<br />
B. star<br />
C. full mesh<br />
D. core/edge<br />
E. collapsed core<br />
F. partial mesh<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> B C F<br />
<div class="ccnaquestionsnumber">
Question 7</div>
Which two of these best describe the implementation of a WAN Backup design over the Internet? (Choose two)<br />
A. a best-effort method<br />
B. requires no ISP coordination or involvement<br />
C. bandwidth guaranteed based on interface configuration<br />
D. designed as an alternative to a failed WAN connection<br />
E. implemented with a point-to-point logical link using a Layer 2 tunnel<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> A D<br />
<div class="ccnaquestionsnumber">
Question 8</div>
Refer to the exhibit.<br />
<img alt="backup_links.jpg" height="408" src="http://www.dstut.com/images/CCDA/WANDesign/backup_links.jpg" width="590" /><br />
All primary links are T1 s. The customer wants to have a backup to
each remote office from the Headquarters office. Which two types of
backup links would be viable solutions? (Choose two)<br />
A. VPDN<br />
B. shadow SVC<br />
C. dial backup routing<br />
D. permanent secondary WAN link<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> C D<br />
<div class="ccnaquestionsnumber">
Question 9</div>
When designing using the Cisco Enterprise Architecture, in which
Enterprise Campus layer do the Enterprise Edge and Enterprise WAN
modules establish their connection?<br />
A. Campus Core<br />
B. Building Access<br />
C. Enterprise Branch<br />
D. Building Distribution<br />
E. Enterprise Data Center<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> A<br />
<div class="ccnaquestionsnumber">
Question 10</div>
When designing using the Cisco Enterprise Architecture, in which
Enterprise Campus layer does the Enterprise Teleworker module establish
its connection?<br />
A. Building Core<br />
B. Building Access<br />
C. Enterprise Branch<br />
D. Enterprise Data Center<br />
E. WAN/Internet<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> E<br />
<div class="ccnaquestionsnumber">
Question 11</div>
An organization needs a WAN Transport technology that meets these criteria:<br />
has a low initial cost<br />
provides low-to-medium BW<br />
has medium-to-high latency and jitter<br />
Which technology would you suggest?<br />
A. DSL<br />
B. X.25<br />
C. ISDN<br />
D. wireless<br />
E. analog modem<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> A<br />
<div class="ccnaquestionsnumber">
Question 12</div>
Which two statements best describe the implementation of Overlay VPN
connectivity for remote access in the Enterprise Edge WAN module?
(Choose two)<br />
A. It must use Layer 2 labels to forward packets<br />
B. It uses dedicated point-to-point links.<br />
C. Bandwidth is provisioned on a site-to-site basis.<br />
D. The ISP actively participates in customer routing.<br />
E. Optimum routing between customer sites requires a full mesh of virtual circuits.<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>C E<br />
<div class="ccnaquestionsnumber">
Question 13</div>
Which codec does Cisco recommend for WAN links?<br />
A. G.711 <br />
B. G.723 <br />
C. G.728 <br />
D. G.729<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> Djcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-7428446017143514605.post-40690854816820961282015-07-18T10:02:00.003-07:002015-07-18T10:02:20.440-07:00Other Routing Protocols<h1>
Other Routing Protocols</h1>
<div class="info">
<span class="date"></span><span class="comments"><br /></span>
</div>
Here you will find answers to Other Routing Questions<br />
<div class="ccnaquestionsnumber">
Question 1</div>
Which of these is the best routing deployment for a single dedicated link to an ISP for Internet access?<br />
A. EIGRP<br />
B. RIP<br />
C. BGP<br />
D. Static<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> D<br />
<div class="ccnaquestionsnumber">
Question 2</div>
Which two routing protocols operate over NBMA point-to-multipoint
networks without the use of point-to-point subinterfaces? (Choose two)<br />
A. RIPv1 <br />
B. RIPv2 <br />
C. IGRP <br />
D. EIGRP <br />
E. OSPF <br />
F. IS-IS<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>D E<br />
<div class="ccnaquestionsnumber">
Question 3</div>
For which network scenario is static routing most appropriate?<br />
A. parallel WAN links<br />
B. IPSec VPN<br />
C. expanding networks<br />
D. hierarchical routing<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> B<br />
<div class="ccnaquestionsnumber">
Question 4</div>
Your company uses OSPF for internal routing. The company will be
connected to VendorA via a single dedicated link and to VendorB via
redundant dedicated links. Both vendors also use OSPF for internal
routing. Which of the following deployments describes the best
intra-domain routing practice in this situation?<br />
A. Connect your company to both VendorA and VendorB using existing OSPF.<br />
B. Redistribute the routes on each link between your company and the vendors to a shared EIGRP routing protocol.<br />
C. Use IBGP to reach VendorA and EBGP to reach VendorB.<br />
D. Use static routes to reach VendorA and EBGP to reach VendorB.<br />
E. Use static routes to reach both VendorA and VendorB.<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> Djcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-7428446017143514605.post-2288450672636102752015-07-18T10:01:00.002-07:002015-07-18T10:01:20.499-07:00IPv6 Questions<h1>
IPv6 Questions</h1>
<div class="info">
<span class="date"></span><span class="comments"><br /></span>
</div>
Here you will find answers to IPv6 Questions<br />
<div class="ccnaquestionsnumber">
Question 1</div>
A very large organization has received its IPv6 address range from
its Internet Service Provider and intends to use only IPv6 addresses
internally. Employees will access the Internet using port address
translation. What is a requirement for their DNS servers?<br />
A. They no longer need DNS servers.<br />
B. Their DNS servers need to support both IPv4 and IPv6 addresses.<br />
C. Their DNS servers need to support only IPv6 addresses.<br />
D. Their DNS servers need to support only IPv4 addresses.<br />
E. They need additional DNS servers in their network just for IPv6 addresses.<br />
F. There are no changes required to their DNS servers.<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>B<br />
<div class="ccnaquestionsnumber">
Question 2</div>
A global corporation has an internal network with the following characteristics: <br />
2,000,000+hosts <br />
10,000+ routers <br />
Internet connectivity<br />
high traffic volumes with business partners and customers<br />
Which statement best describes what a flexible IPv6 strategy would look like for this corporation?<br />
A. Both hosts and routers would run dual stack.<br />
B. Hosts would run IPv4 and routers would run native IPv6.<br />
C. Hosts would run dual stack and routers would run IPv4 only.<br />
D. Hosts would run IPv6 and routers would run native IPv6.<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> A<br />
<div class="ccnaquestionsnumber">
Question 3</div>
Which two statements about IPv6 addresses are true? (Choose two)<br />
A. Leading zeros are required.<br />
B. Two colons (::) are used to represent successive hexadecimal fields of zeros.<br />
C. Two colons (::) are used to separate fields.<br />
D. A single interface will have multiple IPv6 addresses of different types.<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> B D<br />
<div class="ccnaquestionsnumber">
Question 4</div>
Which IPv6 feature enables routing to distribute connection requests to the nearest content server?<br />
A. Link-local<br />
B. Site-local<br />
C. Anycast<br />
D. Multicast<br />
E. Global aggregatable<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>C<br />
<div class="ccnaquestionsnumber">
Question 5</div>
A company is designing a worldwide IPv6 network with duplicated file
servers at multiple locations. Each file server contains identical
reference information. Which IPv6 address type would be used to allow
each end station to send a request to the nearest file server using the
same destination address, regardless of the location of that end
station?<br />
A. unicast<br />
B. anycast<br />
C. multicast<br />
D. broadcast<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> B<br />
<div class="ccnaquestionsnumber">
Question 6</div>
Which two link state routing protocols support IPv6 routing? (Choose two)<br />
A. BGP4+<br />
B. OSPF<br />
C. RIPng<br />
D. EIGRP<br />
E. IS-IS<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> B Ejcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-7428446017143514605.post-27064727214183328712015-07-18T10:00:00.006-07:002015-07-18T10:00:53.114-07:00IPv4 Questions<h1>
IPv4 Questions</h1>
<div class="info">
<span class="date"></span><span class="comments"><br /></span>
</div>
Here you will find answers to IPv4 Questions<br />
<div class="ccnaquestionsnumber">
Question 1</div>
Which statement describes the recommended deployment of IPv4 addressing in the Cisco Enterprise Architecture model?<br />
A. private addressing throughout with public addressing in the Internet Connectivity module<br />
B. private addressing throughout with public addressing in the Internet Connectivity and E-Commerce modules<br />
C. private addressing throughout with public addressing in the Internet
Connectivity, E-Commerce, and Remove Access (VPN) modules<br />
D. private addressing throughout with public addressing in the Internet Connectivity,E-Commerce, and Enterprise Branch modules<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> C<br />
<div class="ccnaquestionsnumber">
Question 2</div>
Which route address is the best summary of these network addresses?<br />
A. 192.128.0.0/24<br />
B. 192.128.171.128/3<br />
C. 192.128.168.0/21<br />
D. 192.128.175.0/3<br />
E. 192.128.0.0/16<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> C<br />
<div class="ccnaquestionsnumber">
Question 3</div>
An internal network has servers with private IPv4 addresses that must
be visible from the public network. Which kind of address translation
should be used to ensure this?<br />
A. many-to-one translation (PAT)<br />
B. many-to-one translation (Dynamic NAT)<br />
C. one-to-one translation (Static NAT)<br />
D. one-to-one translation (NAT Traversal)<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> C<br />
<div class="ccnaquestionsnumber">
Question 4</div>
You are designing IPv6 into an existing IPv4 network. Which strategy
can you use to allow both address schemes to coexist, thus facilitating
migration?<br />
A. bridge between the two networks<br />
B. deploy stateful address assignments<br />
C. run both the IPv6 and IPv4 stacks on devices<br />
D. redistribute between IPv6-capable and non-IPv6-capable routing protocols<br />
E. enable anycast capability in the routing protocol<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>C<br />
<div class="ccnaquestionsnumber">
Question 5</div>
You are designing IPv6 into an existing IPv4 network. Which two
strategies can you use to allow both address schemes to coexist, thus
facilitating migration? (Choose two)<br />
A. translate one protocol into the other<br />
B. redistribute between IPv6-capable and non-IPv6-capable routing protocols <br />
C. encapsulate IPv6 packets within IPv4 packets <br />
D. bridge between the IPv6 and IPv4 networks <br />
E. enable anycast capability in the routing protocol<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> A Cjcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-7428446017143514605.post-87646563633328664372015-07-18T10:00:00.003-07:002015-07-18T10:00:26.562-07:00EIGRP Questions<h1>
EIGRP Questions</h1>
<div class="info">
<span class="date"></span><span class="comments"><br /></span>
</div>
Here you will find answers to EIGRP Questions<br />
<div class="ccnaquestionsnumber">
Question 1</div>
Which two of these are the most accurate characteristics of EIGRP deployment? (Choose two)<br />
A. Provides features for most Ethernet, Frame Relay, and dial-up network deployment types.<br />
B. Provides routing for IPv4, IPv6, Appletalk, and IPX.<br />
C. Provides default hierarchical routing and summarization of a VLSM IP address deployment.<br />
D. Provides quick convergence through neighbor relationships and topology backup routes.<br />
E. Provides the best route selection on combined default metrics of
active bandwidth,delay, load, reliability, and MTU parameters.<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> B D<br />
<div class="ccnaquestionsnumber">
Question 2</div>
Your company’s Cisco routers are operating with EIGRP. You need to
join networks with an acquisition’s heterogeneous routers at 3 sites,
operating with EIGRP and OSPF. Which describes the best practice for
routing protocol deployment?<br />
A. apply OSPF throughout both networks<br />
B. apply one-way redistribution exclusively at each location<br />
C. apply two-way redistribution exclusively at each location<br />
D. apply two-way redistribution at each location with a route filter at only one location<br />
E. apply two-way redistribution at each location with a route filter at each location<br />
F. apply EIGRP with the same autonomous system throughout both networks<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> E<br />
<div class="ccnaquestionsnumber">
Question 3</div>
A network is being designed to meet the requirements listed. Within the enterprise network:<br />
All routers are Cisco 3800 Series routers running the latest Cisco IOS release.<br />
The fastest convergence time possible is required.<br />
Unequal cost load-balancing is required.<br />
For Internet connections:<br />
A single link is used to connect to a single ISP.<br />
Which two routing protocols should be used?(Choose two)<br />
A. Use OSPF as the IGP within the enterprise.<br />
B. Use EIGRP as the IGP within the enterprise.<br />
C. Use Internal BGP as the IGP within the enterprise.<br />
D. Use External BGP between the enterprise and the ISP.<br />
E. Use EIGRP between the enterprise and the ISP.<br />
F. Use Static (Default) routing between the enterprise and the ISP.<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> B F<br />
<div class="ccnaquestionsnumber">
Question 4</div>
Which two statements best describe intradomain route summarization? (Choose two)<br />
A. OSPF and RIP automatically summarize at classful network boundaries.<br />
B. EIGRP and OSPF automatically summarize at classful network boundaries.<br />
C. EIGRP and RIP automatically summarize at classful network boundaries.<br />
D. EIGRP and OSPF must be manually configured to summarize at non-classful boundaries.<br />
E. EIGRP and OSPF automatically summarize at non-classful boundaries.<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>C Djcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-7428446017143514605.post-69820671143644232842015-07-18T10:00:00.000-07:002015-07-18T10:00:01.497-07:00OSPF Questions<h1>
OSPF Questions</h1>
<div class="info">
<span class="date"></span><span class="comments"><br /></span>
</div>
Here you will find answers to OSPF Questions<br />
<div class="ccnaquestionsnumber">
Question 1</div>
Which two routing protocols usually converge most quickly? (Choose two)<br />
A. RIPv1<br />
B. RIPv2<br />
C. BGP<br />
D. IGRP<br />
E. EIGRP<br />
F. OSPF<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> E F<br />
<div class="ccnaquestionsnumber">
Question 2</div>
Which two statements best describe an OSPF deployment? (Choose two)<br />
A. ABR provides automatic classful network boundary summarization.<br />
B. ABR requires manual configuration for classful network summarization.<br />
C. External routes are propagated into the autonomous system from stub areas via ASBR.<br />
D. External routes are propagated into the autonomous system from regular areas or NSSA via ASBR.<br />
E. External routes are propagated into the autonomous system from regular areas or NSSA via ABR.<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>B Djcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-7428446017143514605.post-46549809618934001442015-07-18T09:59:00.006-07:002015-07-18T09:59:40.684-07:00Security in Design<h1>
Security in Design</h1>
<div class="info">
<span class="date"></span><span class="comments"><br /></span>
</div>
Here you will find answers to Security in Design Questions<br />
<div class="ccnaquestionsnumber">
Question 1</div>
Which Cisco security solution offers protection against “day zero” attacks?<br />
A. Cisco Adaptive Security Appliance<br />
B. Cisco Security Agent<br />
C. Cisco IOS Firewall<br />
D. Cisco IOS IPS<br />
E. Cisco Traffic Anomaly Detector<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>B<br />
<div class="ccnaexplanation">
Explanation</div>
The Cisco Security Agent (CSA) software protects server and desktop
endpoints from the latest threats caused by malicious network attacks.
CSA can identify and prevent network attacks that are considered unknown
or “Day Zero”-type threats. CSAs are packed with many features,
including firewall capabilities, intrusion prevention, malicious mobile
code protection, operating-system integrity assurance, and audit log
consolidation.<br />
<div>
(Reference: CCDA Official Exam Certification Guide 3rd)</div>
<div class="ccnaquestionsnumber">
Question 2</div>
Which two solutions are parts of the Cisco Security Management Suite? (Choose two)<br />
A. ASA<br />
B. Cisco Security Agent<br />
C. NAC Appliance<br />
D. CSM<br />
E. PIX<br />
F. Cisco Security MARS<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> D F<br />
<div class="ccnaexplanation">
Explanation</div>
Solutions of the Cisco Security Management Suite are:<br />
<strong>+ Cisco Security Manager</strong> (CSM) is an integrated solution for configuration management of firewall, VPN, router, switch module, and IPS devices.<br />
+ <strong>Cisco Secure Access Control Server</strong> (ACS) provides centralized control for administrative access to Cisco devices and security applications.<br />
+ <strong>Cisco Security Monitoring, Analysis, and Response System</strong>
(MARS) is an appliance-based solution for network security
administrators to monitor, identify, isolate, and respond to security
threats.<br />
+ <strong>Management Center for CSA</strong> (CSA MC) is an SSL web-based tool for managing Cisco Security Agent configurations.<br />
+ <strong>Cisco Router and Security Device Manage</strong>r (SDM) is a web-based tool for routers and supports a wide range of IOS software.<br />
+ <strong>Cisco Adaptive Security Device Manager</strong> (ASDM) is a
web-based tool for managing Cisco ASA 5500 series appliances, PIX 500
series appliances (version 7.0 or higher), and Cisco Catalyst 6500
Firewall Services Modules (FWSM version 3.1 or higher).<br />
+ <strong>Cisco Intrusion Prevention System Device Manager</strong> (IDM) is a web-based application that configures and manages IPS sensors.<br />
(Reference: CCDA Official Exam Certification Guide 3rd)<br />
<div class="ccnaquestionsnumber">
Question 3</div>
A manufacturing company has decided to add a website to enhance
sales. The web seivers in the E-Commerce module must be accessible
without compromising network security. Which two design recommendations
can be made to meet these requirements? (Choose two)<br />
A. Use private and public key encryption.<br />
B. Move the E-Commerce seivers to the WAN module.<br />
C. Use intrusion detection on the E-Commerce setverfarm.<br />
D. Limit the number of incoming connections to the E-Commerce module.<br />
E. Place E-Commerce seivers and application seivers on isolated LANs (DMZs).<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> C E<br />
<div class="ccnaquestionsnumber">
Question 4</div>
Which Cisco security solution can quarantine and prevent
non-compliant end stations from accessing the network until they achieve
security policy compliance?<br />
A. Cisco Secure Connectivity<br />
B. Adaptive Security Appliance<br />
C. Access Control Server<br />
D. Network Admission Control<br />
E. Network Intrusion Prevention System<br />
F. Cisco Security Monitoring, Analysis, and Response System<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> D<br />
<div class="ccnaexplanation">
Explanation</div>
The Network Admission Control protects the network from threats by
enforcing security compliance on all devices attempting to access the
network. It only allows access to endpoints only after they have passed
authentication based on security policies.<br />
<div class="ccnaquestionsnumber">
Question 5</div>
A Cisco Self-Defending Network has been installed, but DoS attacks
are still being directed at e-commerce hosts. The connection rate at the
Internet firewall was limited, but the problem persists. What more can
be done?<br />
A. Move the seivers to the DMZ. <br />
B. Install all relevant operating system patches. <br />
C. Block the servers’ TCP traffic at the Internet firewall. <br />
D. Block the servers’ UDP traffic at the Internet firewall.<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>B<br />
<div class="ccnaquestionsnumber">
Question 6</div>
Which three security measures can be used to mitigate DoS attacks
that are directed at exposed hosts within the E-Commerce module? (Choose
three)<br />
A. Partition the exposed hosts into a separate LAN or VLAN.<br />
B. Use firewalls to block all unnecessary connections to the exposed hosts.<br />
C. Use a VPN concentrator (IPSec) to protect and verify each connection to the exposed host or hosts.<br />
D. Use LAN switch VTP pruning to separate hosts on the same segment.<br />
E. Use NIDSs and HIPSs to detect signs of attack and to identify potentially successful breaches.<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>A B E<br />
<div class="ccnaquestionsnumber">
Question 7</div>
Which Cisco security management solution provides the means to identify, isolate, and counter security threats to the network?<br />
A. Adaptive Security Device Manager<br />
B. Intrusion Prevention Device Manager<br />
C. Security Device Manager<br />
D. Cisco Security Manager<br />
E. Cisco Security Monitoring, Analysis, and Response System<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>E<br />
<div class="ccnaexplanation">
Explanation</div>
Cisco Security Monitoring, Analysis, and Response System (Cisco
Security MARS) is an appliance-based solution for network security
administrators to monitor, identify, isolate, and respond to security
threats. MARS understands the network topology and device configurations
from routers, switches, firewalls, and IPS devices. MARS also can model <br />
packet flows on the network.<br />
<div class="ccnaquestionsnumber">
Question 8</div>
A large enterprise requires sensitive information be transmitted over
a public infrastructure. It requires confidentiality, integrity, and
authenticity. Which security solution best meets these requirements?<br />
A. Cisco IOS Firewall<br />
B. Intrusion Prevention<br />
C. Secure Connectivity<br />
D. AAA<br />
E. Traffic Guard Protector<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>C<br />
<div class="ccnaquestionsnumber">
Question 9</div>
Which technology can ensure data confidentiality, data integrity, and authentication across a public IP network?<br />
A. GRE<br />
B. IPsec<br />
C. VLANs<br />
D. VSANs<br />
E. VPDNs<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> B<br />
<div class="ccnaquestionsnumber">
Question 10</div>
For which technology is IPsec required for a site-to-site enterprise WAN/MAN architecture?<br />
A. ATM<br />
B. ISP Service<br />
C. Frame Relay<br />
D. SP MPLS VPN<br />
E. self-deployed MPLS<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> B<br />
<div class="ccnaquestionsnumber">
Question 11</div>
A Cisco security mechanism has the following attributes: <br />
it is a sensor appliance<br />
it searches for potential attacks by capturing and analyzing traffic<br />
it is a “purpose-built device”<br />
it is installed passively<br />
it introduces no delay or overhead<br />
Which Cisco security mechanism is this?<br />
A. IKE<br />
B. PIX<br />
C. HIPS<br />
D. NIDS<br />
E. HMAC<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> D<br />
<div class="ccnaquestionsnumber">
Question 12</div>
Which of these domain-of-trust security statements is correct?<br />
A. Segments within a network should have the same trust models.<br />
B. An administrator should apply consistent security controls between segments.<br />
C. Communication between trusted entities needs to be carefully managed and controlled.<br />
D. Segment security policy decisions are based on trust.<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> Djcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-7428446017143514605.post-41655472116766612882015-07-18T09:59:00.003-07:002015-07-18T09:59:12.523-07:00Voice Design<h1>
Voice Design</h1>
<div class="info">
<span class="date"></span><span class="comments"><br /></span>
</div>
Here you will find answers to Voice Design Questions<br />
<div class="ccnaquestionsnumber">
Question 1</div>
Which type of trunk is required in order to connect a fax machine to a PBX?<br />
A. inter-office<br />
B. Foreign Exchange Office<br />
C. central office<br />
D. Foreign Exchange Station<br />
E. intra-office<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> D<br />
<div class="ccnaquestionsnumber">
Question 2</div>
When monitoring voice traffic on a converged network, which are the
three most important QoS characteristics to pay attention to? (Choose
three)<br />
A. delay<br />
B. jitter<br />
C. packet loss<br />
D. bit error rate<br />
E. CRTP hop configuration<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> A B C<br />
<div class="ccnaquestionsnumber">
Question 3</div>
Which H.323 protocol is responsible for the exchanging of capabilities and the opening and closing of logical channels?<br />
A. H.225 <br />
B. H.245 <br />
C. RAS <br />
D. RTCP<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>B<br />
<div class="ccnaquestionsnumber">
Question 4</div>
Which statement best describes Call Admission Control?<br />
A. It extends QoS capabilities to protect voice from excessive data traffic.<br />
B. It provides endpoint registration control.<br />
C. It protects voice from voice.<br />
D. It provides endpoint bandwidth control.<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>C<br />
<div class="ccnaquestionsnumber">
Question 5</div>
Which H.323 protocol monitors calls for factors such as packet counts, packet loss, and arrival jitter?<br />
A. H.225<br />
B. H.245<br />
C. RAS<br />
D. RTCP<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>D<br />
<div class="ccnaquestionsnumber">
Question 6</div>
Given a VoIP network with these attributes:<br />
Codec: G.728<br />
Bit rate: 16 Kbps<br />
WAN Bandwidth: 256 Kbps<br />
Packet Header: 6 bytes<br />
Payload: 40 bytes<br />
CRTP: Yes<br />
How many calls can be made?<br />
A. 7 calls<br />
B. 8 calls<br />
C. 13 calls<br />
D. 14 calls<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> C<br />
<div class="ccnaquestionsnumber">
Question 7</div>
Which H.323 protocol controls call setup between endpoints?<br />
A. H.225<br />
B. H.245<br />
C. RAS<br />
D. RTCP<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> A<br />
<div class="ccnaquestionsnumber">
Question 8</div>
Which two VoIP characteristics are affected most by codec choice? (Choose two)<br />
A. voice quality<br />
B. silent packet handling<br />
C. voice packet header size<br />
D. bandwidth required for voice calls<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> A D<br />
<div class="ccnaquestionsnumber">
Question 9</div>
What are the two most likely driving forces motivating businesses to
integrate voice and data into converged networks? (Choose two)<br />
A. Voice has become the primary traffic on networks.<br />
B. WAN costs can be reduced by migrating to converged networks.<br />
C. Their PSTNs cannot deploy features quickly enough.<br />
D. Data, voice, and video cannot converge on their current PSTN structures.<br />
E. Voice networks cannot carry data unless the PRI circuits aggregate the BRI circuits.<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>D E<br />
<div class="ccnaquestionsnumber">
Question 10</div>
Which two techniques can reduce voice packet transfer delay across a link of less than 512 kbps? (Choose two)<br />
A. deploy LFI<br />
B. increase queue depth<br />
0 C. increase link bandwidth<br />
D. extend the trust boundary<br />
E. deploy software compression<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> A C<br />
<div class="ccnaquestionsnumber">
Question 11</div>
Given a VoIP network with these attributes:<br />
Codec: G.711<br />
WAN bandwidth: 768Kbps<br />
Packet Header: 6 bytes<br />
Payload: 160 bytes<br />
CRTP: No<br />
How many calls can be made?<br />
A. 7 calls<br />
B. 8 calls<br />
C. 9 calls<br />
D. 11 calls<br />
E. 13 calls<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> C<br />
<div class="ccnaquestionsnumber">
Question 12</div>
What is the benefit of deploying a gatekeeper in an H.323 IP telephony network?<br />
A. increases redundancy by allowing each gateway to maintain a copy of the dial plan<br />
B. reduces configuration complexity by centralizing the dial plan<br />
C. provides spatial redundancy through the use of HSRP<br />
D. provides load balancing via GUP when alternate gatekeepers are deployed<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>B<br />
<div class="ccnaquestionsnumber">
Question 13</div>
A customer wishes to implement VoIP using centralized
call-processing. In addition, the customer wishes to establish a balance
between good voice quality and good bandwidth utilization. Which codec
would you suggest?<br />
A. G.711 <br />
B. G.723.1 <br />
C. G.726 <br />
D. G.729<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> Djcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-7428446017143514605.post-45112599598943176962015-07-18T09:58:00.005-07:002015-07-18T09:58:34.497-07:00Wireless Questions<h1>
Wireless Questions</h1>
<div class="info">
<span class="date"></span><span class="comments"><br /></span>
</div>
Here you will find answers to Wireless Questions<br />
<div class="ccnaquestionsnumber">
Question 1</div>
Which two of these are functions of an access point in a Split MAC Network Architecture? (Choose two)<br />
A. EAP Authentication<br />
B. MAC layer encryption or decryption<br />
C. 802.1Q encapsulation<br />
D. Process probe response<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>B D<br />
<div class="ccnaquestionsnumber">
Question 2</div>
Lightweight access points are being deployed in remote locations where others are already operational.<br />
The new access points are in a separate IP subnet from the wireless controller. OTAP has not been enabled at any locations.<br />
Which two methods can the AP use to locate a wireless controller? (Choose two)<br />
A. local subnet broadcast<br />
B. NV-RAM IP address<br />
C. DHCP<br />
D. primary, secondary, tertiary<br />
E. DNS<br />
F. master<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>C E<br />
<div class="ccnaquestionsnumber">
Question 3</div>
Which two of the following statements represent a preferred wireless LWAPP implementation? (Choose two)<br />
A. verify open ports for:<br />
Layer 2 LWAPP on ethertype OxABAB <br />
Layer 3 LWAPP on TCP 12222 and TCP 12223<br />
B. verify open ports for:<br />
Layer 2 LWAPP on ethertype OxBBBB <br />
Layer 3 LWAPP on UDP 12222 and UDP 12223<br />
C. verify open ports for:<br />
Layer 2 LWAPP on ethertype OxBABA <br />
Layer 3 LWAPP on UDP 12222 and TCP 12223<br />
D. use of Layer 3 LWAPP is preferred over Layer 2 LWAPP<br />
E. use of Layer 2 LWAPP is preferred over Layer 3 LWAPP<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>B D<br />
<div class="ccnaquestionsnumber">
Question 4</div>
A lightweight access point is added to a working network. Which
sequence will it use to associate itself with a wireless LAN controller?<br />
A. master, primary, secondary, tertiary, greatest AP capacity<br />
B. greatest AP capacity, primary, secondary, tertiary, master<br />
C. primary, secondary, tertiary, master, greatest AP capacity<br />
D. primary, secondary, tertiary, greatest AP capacity, master<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>C<br />
<div class="ccnaquestionsnumber">
Question 5</div>
Which three of these describe the best practice for Cisco wireless outdoor Mesh network deployment? (Choose three)<br />
A. RAP implemented with 20 to 32 MAP nodes<br />
B. RAP implemented with 20 or fewer MAP nodes<br />
C. mesh hop counts of 8 to 4<br />
D. mesh hop counts of 4 or fewer<br />
E. client access via 802.11 b/g and backhaul with 802.11 a<br />
F. client access via 802.11 a and backhaul with 802.11 b/g<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> B D E<br />
<div class="ccnaquestionsnumber">
Question 6</div>
Which two of these represent a best practice implementation of a
Split MAC LWAPP deployment in a Cisco Unified Wireless Network? (Choose
two)<br />
A. Each wireless client authentication type maps to a shared SSID which in turn maps to a common shared VLAN.<br />
B. Each wireless client authentication type maps to a unique SSID which in turn maps to a unique VLAN.<br />
C. Each wireless client authentication type maps to a unique SSID which in turn maps to a common shared VLAN. <br />
D. 802.1 Q trunking extends from the wired infrastructure to the access point for translation into SSID(s).<br />
E. 802.1 Q trunking extends from the wired infrastructure to a wireless LAN controller for translation into SSID(s).<br />
F. 802.1 Q trunking extends from the wired infrastructure to a wireless LAN controller.<br />
Then the 802.1 Q packet is encapsulated in LWAPP and sent to the access point for transmission over the SSID(s).<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> B E<br />
<div class="ccnaquestionsnumber">
Question 7</div>
Which two of these are required for wireless client mobility
deployment when using a Cisco Unified Wireless Network? (Choose two)<br />
A. assigned master controller<br />
B. matching mobility group name<br />
C. matching RF group name<br />
D. matching RF power<br />
E. matching security<br />
F. matching RF channel<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>B E<br />
<div class="ccnaquestionsnumber">
Question 8</div>
Which two wireless attributes should be considered during a wireless site survey procedure? (Choose two)<br />
A. encryption<br />
B. channel<br />
C. authentication<br />
D. power<br />
E. SSID<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>B D<br />
<div class="ccnaquestionsnumber">
Question 9</div>
Which two statements best describe Cisco Wireless LAN Guest Access in a Cisco Unified Wireless Network? (Choose two)<br />
A. Dedicated guest VLANs are extended throughout the network to the access points for path isolation.<br />
B. Dedicated guest VLANs are only extended to the wireless controllers in the network to ensure path isolation.<br />
C. Dedicated guest access in the DMZ extends from the origination to the termination controllers without dedicated guest VLANs.<br />
D. Guest tunnels can originate and terminate on any wireless controller platform.<br />
E. Guest tunnels have limitations on which wireless controllers can originate the tunnel.<br />
F. Guest tunnels have limitations on which wireless controllers can terminate the tunnel.<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> C Fjcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-7428446017143514605.post-1821518513449288042015-07-18T09:58:00.002-07:002015-07-18T09:58:09.650-07:00Network Management<h1>
Network Management</h1>
<div class="info">
<span class="date"></span><span class="comments"><br /></span>
</div>
Here you will find answers to Network Management Questions<br />
<div class="ccnaquestionsnumber">
Question 1</div>
What are three valid methods of gathering information about an existing data network? (Choose three)<br />
A. Use organizational input.<br />
B. Perform a traffic analysis.<br />
C. Analyze the user-mapping of a running application.<br />
D. Perform a packet-level audit to verify carrier service guarantees.<br />
E. Perform a network audit to gather more detail about the network.<br />
F. Use reports that analyze the metrics of the customer’s existing network.<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>A B E<br />
<div class="ccnaquestionsnumber">
Question 2</div>
Which of the following Cisco router services performs network traffic
analysis to assist in documenting a customer’s existing network?<br />
A. MRTG<br />
B. NetMon<br />
C. NetFlow<br />
D. SNMP MIB compiler<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>C<br />
<div class="ccnaquestionsnumber">
Question 3</div>
You are performing an audit of a customer’s existing network and need to obtain the following router information:<br />
interfaces<br />
running processes<br />
IOS image being executed<br />
Which command should you use?<br />
A. show version<br />
B. show tech-support<br />
C. show startup-config<br />
D. show running-config<br />
E. show processes memory<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> B<br />
<div class="ccnaquestionsnumber">
Question 4</div>
Which Cisco device management feature is most suited to metering network traffic and providing data for billing network usage?<br />
A. BGP<br />
B. Cisco Discovery Protocol <br />
C. QoS <br />
D. RMON <br />
E. NetFlow<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> E<br />
<div class="ccnaquestionsnumber">
Question 5</div>
Which network management protocol allows a network device to have vendor-specific objects for management?<br />
A. SNMPv1<br />
B. SNMP v2<br />
C. SNMP v3<br />
D. MIB<br />
E. RMON1<br />
F. RMON2<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> D<br />
<div class="ccnaquestionsnumber">
Question 6</div>
Which three sources does a network designer use to collect information for characterizing an existing network? (Choose three)<br />
A. staff input<br />
B. visual inventory<br />
C. network audit<br />
D. traffic analysis<br />
E. server statistics<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> A C Djcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-7428446017143514605.post-2077973170659042132015-07-18T09:57:00.005-07:002015-07-18T09:57:45.729-07:00PPDIOO Methodology<h1>
PPDIOO Methodology</h1>
<div class="info">
<span class="date"></span><span class="comments"><br /></span>
</div>
Note:<br />
Cisco has formalized a network’s life cycle into six phases: Prepare, Plan, Design, Implement, Operate, and<br />
Optimize. These phases are collectively known as PPDIOO.<br />
<div class="ccnaquestionsnumber">
Question 1</div>
At which stage in the PPDIOO process would you analyze a customer’s
network in order to discover opportunities for network improvement?<br />
A. Plan<br />
B. Prepare<br />
C. Design<br />
D. Implement<br />
E. Operate<br />
F. Design Assessment<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> C<br />
<div class="ccnaexplanation">
Explanation</div>
<strong>Design phase</strong>: Developing a detailed design is
essential to reducing risk, delays, and the total cost of network
deployments. A design aligned with business goals and technical
requirements can <strong>improve network performance</strong> while supporting high availability, reliability, security, and scalability.<br />
<br />
<div class="ccnaquestionsnumber">
Question 2</div>
Which of these is the next step after the design phase in the PPDIOO process?<br />
A. Order the equipment.<br />
B. Develop a high-level migration plan.<br />
C. Create a pilot or a prototype network.<br />
D. Develop the implementation plan in as much detail as possible.<br />
E. Identify which network management protocol will be used for which function.<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> D<br />
<div class="ccnaexplanation">
Explanation</div>
The Implement phase begins after the design phase has been finished.
In this phase, new devices are installed, configured and tested
according to the design specifications.<br />
<div class="ccnaquestionsnumber">
Question 3</div>
According to Cisco, which four improvements are the main benefits of
the PPDIOO lifecycle approach to network design? (Choose four)<br />
A. faster ROI<br />
B. improved business agility<br />
C. increased network availability<br />
D. faster access to applications and services<br />
E. lower total cost of network ownership<br />
F. better implementation team engagement<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> B C D E<br />
<div class="ccnaexplanation">
Explanation</div>
The PPDIOO life cycle provides four main benefits:<br />
+ It improves <strong>business agility</strong> by establishing business requirements and technology strategies.<br />
+ It increases <strong>network availability</strong> by producing a sound network design and validating the network<br />
operation.<br />
+ It speeds access to applications and services by improving availability, reliability, security, scalability, and<br />
performance.<br />
+ It lowers the total cost of ownership by validating technology requirements and planning for infrastructure<br />
changes and resource requirements.<br />
(Reference: Cisco CCDA Official Exam Certification Guide, 3rd Edition)<br />
Question 4<br />
Refer to the exhibit<br />
<div style="text-align: center;">
<img alt="PPDIOO.jpg" height="357" src="http://www.dstut.com/images/CCDA/PPDIOO/PPDIOO.jpg" width="318" /></div>
During which stage of the PPDIOO process are implementation procedures prepared?<br />
A. Prepare<br />
B. Plan<br />
C. Design<br />
D. Implement<br />
E. Operate<br />
F. Optimize<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> C<br />
<div class="ccnaexplanation">
Explanation</div>
The Design phase includes network diagrams and an equipment list. The project plan is updated with more granular<br />
information for implementation. This is the so-called “prepare implementation procedures”.<br />
<div class="ccnaquestionsnumber">
Question 5</div>
Which two design methodology steps relate, at least in part, to the implement phase of the PPDIOO process? (Choose two)<br />
A. verifying the network<br />
B. testing design<br />
C. determining customer requirements<br />
D. characterizing the existing network<br />
E. establishing the organizational requirements<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> A B<br />
<div class="ccnaexplanation">
Explanation</div>
The Implement phase relates to implement new devices, including verifying and testing so A and B are the most suitable options.<br />
“Determining customer requirements” occurs in the Prepare phase,
which identifies requirements and builds a conceptual architecture.<br />
“Characterizing the existing network” belongs to the Plan phase; this
step is performed to determine the infrastructure necessary to meet the
requirements.<br />
In the “establishing the organizational requirements” step, the
network topology is designed to meet the requirements and close the
network gaps identified in the previous steps. This step is related to
the Design Phase of the PPDIOO process.<br />
Question 6<br />
Which two statements represent advantages that the top-down network
design process has over the bottom-up network design process? (Choose
two)<br />
A. is able to provide the big picture<br />
B. utilizes previous experience<br />
C. takes less time to design a network<br />
D. identifies appropriate technologies first<br />
E. provides a design for current and future development<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> A E<br />
<div class="ccnaexplanation">
Explanation</div>
By incorporating the organization’s requirements, the top-down
network design process provide the big picture that meets current and
future requirements.<br />
<div class="ccnaquestionsnumber">
Question 7</div>
Which statement identifies a benefit obtained when using a top-down network design plan?<br />
A. allows quick responses to design requests<br />
B. facilitates design based on previous experience<br />
C. incorporates customer organizational requirements<br />
D. is less time-consuming than using a bottom-up approach<br />
E. provides a more detailed picture of the desired network<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> C<br />
<div class="ccnaexplanation">
Explanation</div>
The top-down approach begins with the organization’s requirements
before looking at technologies. Network designs are tested using a pilot
or prototype network before moving into the Implement phase.jcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-7428446017143514605.post-85337892364448507072015-07-18T09:57:00.000-07:002015-07-18T09:57:04.862-07:00Cisco SONA Architecture<h1>
Cisco SONA Architecture</h1>
<div class="info">
<span class="date"></span><span class="comments"><br /></span>
</div>
Here you will find answers to Cisco SONA Architecture Questions<br />
<div class="ccnaquestionsnumber">
Question 1</div>
The Cisco Data Center Network Architecture comprises which two Cisco SONA layers? (Choose two)<br />
A. Interactive Services<br />
B. Business Applications<br />
C. Network Infrastructure<br />
D. Collaboration Applications<br />
E. WAN/Internet<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>A C<br />
<div class="ccnaexplanation">
Explanation</div>
The SONA framework defines the following three layers:<br />
+ <strong>Networked Infrastructure layer:</strong> Where all the IT
resources interconnect across a converged network foundation. The
objective of this layer is to provide connectivity, anywhere and
anytime.<br />
+ <strong>Interactive Services layer:</strong> Includes both
application networking services and infrastructure services. This layer
enables efficient allocation of resources to applications and business
processes delivered through the networked infrastructure.<br />
+ <strong>Application layer:</strong> Includes business applications
and collaboration applications. The objective of this layer is to meet
business requirements and achieve efficiencies by leveraging the
Interactive Services layer.<br />
With above information, you can answer question 2 and 3 below.<br />
<div class="ccnaquestionsnumber">
Question 2</div>
Which three of these are layers in the Cisco SONA Architecture? (Choose three)<br />
A. Application<br />
B. Physical<br />
C. Presentation<br />
D. Integrated Transport<br />
E. Interactive Services<br />
F. Networked Infrastructure<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>A E F<br />
<span class="ccnaquestionsnumber">Question 3</span><br />
A Cisco SONA architecture layer is described as follows:<br />
The layer’s IT resources are interconnected across a converged network foundation.<br />
The layer’s IT resources include servers, storage, and clients.<br />
The layer represents how resources exist across the network.<br />
The customer objective for the layer is to have anywhere/anytime connectivity.<br />
Which Cisco SONA architecture layer is being described?<br />
A. Application<br />
B. Physical<br />
C. Integrated Transport<br />
D. Interactive Services<br />
E. Networked Infrastructure<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>Ejcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-7428446017143514605.post-73621634196975135992015-07-18T09:55:00.004-07:002015-07-18T09:55:57.337-07:00Cisco Enterprise Architecture Model<h1>
Cisco Enterprise Architecture Model</h1>
<div class="info">
<span class="date"></span><span class="comments"><br /></span>
</div>
<strong>Note:</strong><br />
The six modules of the Cisco Enterprise Architecture are:<br />
+ Enterprise Campus module<br />
+ Enterprise Edge module<br />
+ Enterprise WAN module<br />
+ Enterprise Data Center module<br />
+ Enterprise Branch module<br />
+ Enterprise Teleworker module<br />
The purpose of the access layer is to grant end-user access to network resources.<br />
The distribution layer provides aggregation for the access layer
devices and uplinks to the core layer. It is also used to enforce policy
within the network.<br />
The core layer provides a high-speed, highly available backbone designed to switch packets as fast as possible.<br />
<div class="ccnaquestionsnumber">
Question 1</div>
Data link switching is typically used in which Enterprise Campus Module layer?<br />
A. Server Farm<br />
B. Campus Core<br />
C. Building Access<br />
D. Building Distribution<br />
E. Internet Connectivity<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> C<br />
<div class="ccnaexplanation">
Explanation</div>
In the most general model, the Building Access layer uses Layer 2
switching (or Data link switching), and the Building Distribution layer
uses multilayer switching.<br />
<div class="ccnaquestionsnumber">
Question 2</div>
Which two statements about designing the Enterprise Data Center Access submodule are correct? (Choose two)<br />
A. Multiport NIC servers should each have their own IP address.<br />
B. Layer 3 connectivity should never be used in the access layer.<br />
C. Layer 2 connectivity is primarily implemented in the access layer.<br />
D. Multiport NIC servers should never be used in the access layer.<br />
E. Layer 2 clustering implementation requires servers to be Layer 2 adjacent.<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> C E<br />
<div class="ccnaexplanation">
Explanation</div>
Data link layer switches are often used to connect end devices in the
access layer (while distribution and core layer typically use
multilayer switches -> C is correct.<br />
The use of Layer 2 clustering requires the servers to be Layer 2–adjacent -> E is correct.<br />
<div class="ccnaquestionsnumber">
Question 3</div>
Which two statements about the Enterprise Data Center Aggregation submodule are correct? (Choose two)<br />
A. it provides Layer 4 7 services<br />
B. it should never support STP<br />
C. it is the critical point for control and application services<br />
D. it typically provides Layer 2 connectivity from the data center to the core<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>A C<br />
<div class="ccnaexplanation">
Explanation</div>
This submodule provides Layer 4 through Layer 7 services through
security and application service devices such as load-balancing devices,
SSL offloading devices, firewalls, and IDS devices.<br />
The Data Center Aggregation (distribution) layer aggregates the
uplinks from the access layer to the Data Center Core layer and is the
critical point for control and application services.<br />
<div class="ccnaquestionsnumber">
Question 4</div>
Which of the following is a modular component within the Cisco
Enterprise Campus module in the Cisco Enterprise Architecture framework?<br />
A. Teleworker<br />
B. E-Commerce<br />
C. Internet Connectivity<br />
D. Building Distribution<br />
E. WAN/MAN Site-to-Site VPN<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> D<br />
<div class="ccnaquestionsnumber">
Question 5</div>
DataQuirk is a web-based medical transcription company for
exotic-animal veterinarians. The company recently added a third ISP for
international business. They are organizing the enterprise network into
a fully operational Enterprise Edge. To which two modules will the
three ISPs be directly related? (Choose two)<br />
A. PSTN<br />
B. E-Commerce<br />
C. WAN/MAN<br />
D. Edge Distribution<br />
E. Internet Connectivity<br />
F. Remote Access VPN<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> B E<br />
<div class="ccnaexplanation">
Explanation</div>
The Enterprise Edge Module consists of the following modules:<br />
+ E-commerce module: includes the devices and services necessary for an organization to provide e-commerce applications.<br />
+ Internet connectivity module: provides enterprise users with Internet access.<br />
+ VPN and remote access module: terminates VPN traffic and dial-in connections from external users.<br />
+ WAN/ MAN and site-to-site module: provides connectivity between
remote sites and the central site over various WAN technologies.<br />
In these modules, only E-Commerce and Internet Connectivity modules will be directly related to the three ISPs.<br />
<div style="text-align: center;">
<img alt="Enterprise_Edge_Modules.jpg" height="450" src="http://www.dstut.com/images/CCDA/CiscoEnterpriseArchitectureModel/Enterprise_Edge_Modules.jpg" width="600" /></div>
<div class="ccnaquestionsnumber">
Question 6</div>
Which statement decribes the recommended deployment of DNS and DHCP servers in the Cisco Enterprise Architecture Model?<br />
A. Place the DHCP and DNS servers in the Enterprise Campus Access layer and Enterprise branch.<br />
B. Place the DHCP and DNS servers in the Enterprise Campus Server Farm layer and Enterprise branch.<br />
C. Place the DHCP server in the Enterprise Campus Core layer and Remote
Access/VPN module with the DNS server in the Internet Connectivity
module.<br />
D. Place the DHCP server in the Enterprise Campus Distribution layer with the DNS server in the Internet Connectivity module.<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>B<br />
<div class="ccnaexplanation">
Explanation</div>
For the Enterprise Campus, DHCP and internal DNS servers should be
located in the Server Farm and they should be redundant. External DNS
servers can be placed redundantly at the service provider facility and
at the Enterprise branch.<br />
<br class="spacer_" />
<div class="ccnaquestionsnumber">
Question 7</div>
Which two modules are found in the Enterprise Edge functional area of the Cisco Enterprise Architecture? (Choose two)<br />
A. Teleworker<br />
B. WAN/MAN<br />
C. Server Farm<br />
D. E-Commerce<br />
E. Internet Connectivity<br />
F. Remote Access/VPN<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> D E<br />
<div class="ccnaexplanation">
Explanation</div>
I am not sure about the answers! The Enterprise Edge functional area
consists of four main modules: E-commerce module, Internet Connectivity
module, Remote Access and VPN module, WAN and MAN and Site-to-Site VPN
module. So B and F are correct too. Hope someone will describe this
question clearly after taking the exam!jcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-7428446017143514605.post-48009636510429301172015-07-18T09:55:00.001-07:002015-07-18T09:55:28.995-07:00Design Fundamentals<h1>
Design Fundamentals</h1>
<div class="info">
<span class="date"></span><span class="comments"><br /></span>
</div>
Here you will find answers to Design Fundamentals Questions<br />
<div class="ccnaquestionsnumber">
Question 1</div>
Which of these is the equation used to derive a 64 Kbps bit rate?<br />
A. 2×8 kHz x 4-bit code words<br />
B. 8 kHz x 8-bit code words<br />
C. 2 x 4-bit code words x 8 kHz<br />
D. 2×4 kHz x 8-bit code words<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> D<br />
<div class="ccnaexplanation">
Explanation</div>
While the human ear can sense sounds from 20 to 20,000 Hz, and speech
encompasses sounds from about 200 to 9000 Hz, the telephone channel
was designed to operate at about 300 to 3400 Hz. This economical range
carries enough fidelity to allow callers to identify the party at the
far end and sense their mood. Nyquist decided to extend the digitization
to 4000 Hz, to capture higher-frequency sounds that the telephone
channel may deliver. Therefore, the highest frequency for voice is 4000
Hz. According to Nyquist theory, we must double the highest frequency,
so 2x4kHz = 8kHz.<br />
Each sample will be encoded into a 8-bit code. Therefore 8kHz x 8-bit
code = 64 Kbps (notice about the unit Kbps: 8kHz = 8000 samples per
second so 8000 x 8-bit = 64000 bit per second = 64 Kilobit per second =
64 Kbps)<br />
<strong>Note:</strong><br />
Nyquist theory:<br />
“When sampling a signal (e.g., converting from an analog signal to
digital), the sampling frequency must be greater than twice the
bandwidth of the input signal in order to be able to reconstruct the
original perfectly from the sampled version.”<br />
<div class="ccnaquestionsnumber">
Question 2</div>
Which three of these are components of the North American Numbering Plan? (Choose three)<br />
A. Numbering Plan Area<br />
B. country code<br />
C. prefix<br />
D. zone<br />
E. line number<br />
F. trunk channel<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> A C E<br />
<div class="ccnaexplanation">
Explanation</div>
NANP has the address format of NXX-NXX-XXXX, where N is any number
from 2 to 9 and X is any number from 0 to 9. The first three digits
identify the numbering plan area and are commonly called the area code.
The address is further divided into the office code (also known as
prefix) and line number. The prefix is three digits, and the line number
is four digits. The line number identifies the phone.<br />
<div class="ccnaquestionsnumber">
Question 3</div>
A customer has the following Enterprise Campus design requirements:<br />
at least 10 Gbps of bandwidth<br />
network runs of up to 40km<br />
no concern for transmission medium cost<br />
Which transmission medium should you recommend to this customer?<br />
A. shielded twisted pair<br />
B. unshielded twisted pair<br />
C. multimode fiber<br />
D. single-mode fiber<br />
E. wireless<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> D<br />
<div class="ccnaexplanation">
Explanation</div>
Below is the comparison of transmission media<br />
<table border="1">
<tbody>
<tr>
<td>Media</td>
<td>Bandwidth</td>
<td>Distance</td>
</tr>
<tr>
<td>Twisted pair</td>
<td>Up to 1 Gbps</td>
<td>100 m</td>
</tr>
<tr>
<td>Multimode fiber</td>
<td>Up to 1 Gbps</td>
<td>2 km (FE) 550 m<br />
(GE)</td>
</tr>
<tr>
<td>Single-mode fiber</td>
<td>10 Gbps</td>
<td>90 km (FE) 40 km<br />
(GE)</td>
</tr>
<tr>
<td>Wireless</td>
<td>54 Mbps (27 Mbps effective)</td>
<td>500 m at 1 Mbps</td>
</tr>
</tbody>
</table>
(Reference from CCDA Official Exam Certification Guide. Some other
books have different figures but we should answer it according to the
“Official” book)<br />
<div class="ccnaquestionsnumber">
Question 4</div>
In the Cisco branch office design, what categorizes an office as large?<br />
A. between 50 and 100 users and a three-tier design<br />
B. between 50 and 100 users and a single-tier design<br />
C. between 100 and 200 users and a two-tier design<br />
D. between 100 and 200 users and a three-tier design<br />
E. over 200 users and a two-tier design<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> D<br />
<div class="ccnaquestionsnumber">
Question 5</div>
Which layer is the distribution layer?<br />
<div style="text-align: center;">
<img alt="distribution_layer.jpg" height="431" src="http://www.dstut.com/images/CCDA/DesignFundamentals/distribution_layer.jpg" width="640" /></div>
A. Layer A<br />
B. Layer B<br />
C. Layer C<br />
D. Layers A and B form a consolidated core and distribution layer<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>B<br />
<div class="ccnaquestionsnumber">
Question 6</div>
Which two implementation plan principles best describe how to deal with potential failures?(Choose two)<br />
A. A good implementation plan.<br />
B. A successful test network test.<br />
C. A test should be included at every step.<br />
D. A detailed rollback procedure for each implementation step.<br />
E. A table of failure points, rollback steps, and estimated rollback times.<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> C D<br />
<div class="ccnaquestionsnumber">
Question 7</div>
Refer to the exhibit.<br />
<div style="text-align: center;">
<img alt="distribution_layer_box.jpg" height="369" src="http://www.dstut.com/images/CCDA/DesignFundamentals/distribution_layer_box.jpg" width="589" /></div>
A standard, Layer 2 campus network design is pictured. Which numbered box represents the distribution layer?<br />
A. #1<br />
B. #2<br />
C. #3<br />
D. #4<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> B<br />
<div class="ccnaquestionsnumber">
Question 8</div>
Which three pieces of information should be documented for each step
of each phase in a design implementation plan? (Choose three)<br />
A. step description<br />
B. design document references<br />
C. easy guidelines in case of failure<br />
D. estimated implementation time<br />
E. simple implementation guidelines<br />
F. estimated rollback time in case of failure<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> A B D<br />
<div class="ccnaquestionsnumber">
Question 9</div>
Which three terms describe the primary functions of the distribution
layer of the campus network design hierarchy? (Choose three)<br />
A. provides end-user connectivity<br />
B. provides high speed transport<br />
C. provides QoS services<br />
D. enforces security policies<br />
E. provides WAN connections<br />
F. connects access devices to the core backbone<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> C D F<br />
<div class="ccnaquestionsnumber">
Question 10</div>
Refer to the exhibit<br />
<div style="text-align: center;">
<img alt="Enterprise_Campus_Module.jpg" height="533" src="http://www.dstut.com/images/CCDA/DesignFundamentals/Enterprise_Campus_Module.jpg" width="371" /></div>
Which two statements correctly identify the layers of the Enterprise Campus module? (Choose two)<br />
A. A is the Server Farm layer and C is the Campus Core layer.<br />
B. A is the Server Farm layer and D is the Building Access layer.<br />
C. B is the Campus Core layer and C is the Building Distribution layer.<br />
D. B is the Building Distribution layer and C is the Campus Core layer.<br />
E. A is the Internet Connectivity layer and B is the Campus Core layer.<br />
F. B is the Building Distribution layer and D is the Building Access layer.<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>B C<br />
<div class="ccnaquestionsnumber">
Question 11</div>
Refer to the exhibit.<br />
<div style="text-align: center;">
<img alt="distribution_layer.jpg" height="431" src="http://www.dstut.com/images/CCDA/DesignFundamentals/distribution_layer.jpg" width="640" /></div>
<div style="text-align: left;">
Which statement accurately represents the characteristics of the core layer in this design?</div>
<div style="text-align: left;">
A. QoS should be performed only in the core.<br />
B. Load balancing should never be implemented or used in the core.<br />
C. Access lists should be used in the core to perform packet manipulation.<br />
D. It is acceptable to use a partial mesh in the core if it is connected to each device by multiple paths.</div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
<span class="ccnacorrectanswers">Answer: </span>D</div>
<div class="ccnaquestionsnumber" style="text-align: left;">
Question 12</div>
<div style="text-align: left;">
Refer to the exhibit</div>
<div style="text-align: center;">
<img alt="network_application.jpg" height="464" src="http://www.dstut.com/images/CCDA/DesignFundamentals/network_application.jpg" width="640" /></div>
<div style="text-align: left;">
Which element or elements of the existing network infrastructure does this network map emphasize?</div>
<div style="text-align: left;">
A. network services <br />
B. network protocols<br />
C. the OSI data link layer<br />
D. network applications</div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
<span class="ccnacorrectanswers">Answer: </span>D</div>
<div class="ccnaquestionsnumber" style="text-align: left;">
Question 13</div>
<div style="text-align: left;">
Which two of the following are benefits of using a modular approach to network design? (Choose two)</div>
<div style="text-align: left;">
A. improves flexibility<br />
B. facilitates implementation<br />
C. lowers implementation costs<br />
D. improves customer participation in the design process</div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
<span class="ccnacorrectanswers">Answer:</span> A B</div>
jcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-7428446017143514605.post-10820859906082052002015-07-18T09:53:00.001-07:002015-07-18T09:53:08.024-07:00Drag and Drop Questions<h1>
Drag and Drop Questions</h1>
<div class="info">
<span class="date"></span><span class="comments"><br /></span>
</div>
Here you will find answers to Drag and Drop Questions<br />
<div class="ccnaquestionsnumber">
Question 1</div>
Click and drag the QoS feature type on the left to the category of QoS mechanism on the right.<br />
<div style="text-align: center;">
<img alt="QoS_Feature.jpg" height="226" src="http://www.dstut.com/images/CCDA/DragAndDrop/QoS_Feature.jpg" width="550" /></div>
<br class="spacer_" />
<div class="ccnacorrectanswers">
Answer:</div>
+ classification and marking: ACLs<br />
+ congestion avoidance: WRED<br />
+ traffic conditioners: CAR<br />
+ congestion management: LLQ<br />
+ link efficiency: LFI<br />
<div class="ccnaexplanation">
Explanation</div>
<strong>Classification</strong> is the process of partitioning traffic
into multiple priority levels or classes of service. Information in the
frame or packet header is inspected, and the frame’s priority is
determined.<strong>Marking </strong>is the process of changing the
priority or class of service (CoS) setting within a frame or packet to
indicate its classification. Classification is usually performed with <strong>access control lists</strong> (ACL), QoS class maps, or route maps, using various match criteria.<br />
<strong>Congestion-avoidance</strong> techniques monitor network
traffic loads so that congestion can be anticipated and avoided before it
becomes problematic. Congestion-avoidance techniques allow packets from
streams identified as being eligible for early discard (those with lower
priority) to be dropped when the queue is getting full. Congestion
avoidance techniques provide preferential treatment for high priority
traffic under congestion situations while maximizing network throughput
and capacity utilization and minimizing packet loss and delay.<br />
<strong>Weighted random early detection</strong> (WRED) is the Cisco
implementation of the random early detection (RED) mechanism. WRED
extends RED by using the IP Precedence bits in the IP packet header to
determine which traffic should be dropped; the drop-selection process is
weighted by the IP precedence.<br />
<strong>Traffic conditioner</strong> consists of policing and
shaping. Policing either discards the packet or modifies some aspect of
it, such as its IP Precedence or CoS bits, when the policing agent
determines that the packet meets a given criterion. In comparison,
traffic shaping attempts to adjust the transmission rate of packets that
match a certain criterion. Shaper typically delays excess traffic by
using a buffer or queuing mechanism to hold packets and shape the flow
when the source’s data rate is higher than expected. For example,
generic traffic shaping uses a weighted fair queue to delay packets to
shape the flow. Traffic conditioner is also referred to as <strong>Committed Access Rate (CAR)</strong>.<br />
<strong>Congestion management</strong> includes two separate
processes: queuing, which separates traffic into various queues or
buffers, and scheduling, which decides from which queue traffic is to be
sent next. There are two types of queues: the hardware queue (also
called the transmit queue or TxQ) and software queues. Software queues
schedule packets into the hardware queue based on the QoS requirements
and include the following types: weighted fair queuing (WFQ), priority
queuing (PQ), custom queuing (CQ), class-based WFQ (CBWFQ), and <strong>low latency queuing</strong> (LLQ).<br />
LLQ is also known as Priority Queuing–Class-Based Weighted Fair
Queuing (PQ-CBWFQ). LLQ provides a single priority but it’s preferred
for VoIP networks because it can also configure guaranteed bandwidth for
different classes of traffic queue. For example, all voice call traffic
would be assigned to the priority queue, VoIP signaling and video would
be assigned to a traffic class, FTP traffic would be assigned to a
low-priority traffic class, and all other traffic would <br />
be assigned to a regular class.<br />
<strong>Link efficiency</strong> techniques, including <strong>link fragmentation and interleaving (LFI) </strong>and
compression. LFI prevents small voice packets from being queued behind
large data packets, which could lead to unacceptable delays on low-speed
links. With LFI, the voice gateway fragments large packets into smaller
equal-sized frames and interleaves them with small voice packets so
that a voice packet does not have to wait until the entire large data
packet is sent. LFI reduces and ensures a more predictable voice delay.<br />
(Reference: Cisco Press Designing for Cisco Internetwork Solutions)<br />
<div class="ccnaquestionsnumber">
Question 2</div>
Click and drag the Cisco Self-Defending Network term on the left to
the SDN description on the right. Not all terms will be used.<br />
<div style="text-align: center;">
<img alt="Cisco-Self-Defending.jpg" height="226" src="http://www.dstut.com/images/CCDA/DragAndDrop/Cisco-Self-Defending.jpg" width="550" /></div>
<br class="spacer_" />
<div class="ccnacorrectanswers">
Answer:</div>
+ provides secure network access, isolates and controls infected devices attempting access: Trust and Identity Management<br />
+ uses encryption and authentication to provide secure transport across untrusted networks: Secure Connectivity<br />
+ uses security integrated into routers, switches, and appliances to defend against attacks: Threat Defense<br />
+ integrates security into the network to identify, prevent, and adapt to threats: Cisco Self-Defending Network<br />
<div class="ccnaexplanation">
Explanation</div>
<strong>Trust and identity management </strong>solutions provide
secure network access and admission at any point in the network and
isolate and control infected or unpatched devices that attempt to access
the network. If you are trusted, you are granted access.<br />
We can understand “trust” is the security policy applied on two or
more network entities and allows them to communicate or not in a
specific circumstance. “Identity” is the “who” of a trust relationship.<br />
The main purpose of <strong>Secure Connectivity</strong> is to
protect the integrity and privacy of the information and it is mostly
done by encryption and authentication. The purpose of encryption is to
guarantee confidentiality; only authorized entities can encrypt and
decrypt data. Authentication is used to establish the subject’s
identity. For example, the users are required to provide username and
password to access a resource…<br />
<div class="ccnaquestionsnumber">
Question 3</div>
Match the Cisco security solution on the left to its function on the right.<br />
<div style="text-align: center;">
<img alt="Cisco Security.jpg" height="226" src="http://www.dstut.com/images/CCDA/DragAndDrop/Cisco%20Security.jpg" width="550" /></div>
<br class="spacer_" />
<div class="ccnacorrectanswers">
Answer:</div>
+ protects the endpoints (desktops, laptops and servers): Cisco Security Agent<br />
+ provides multiple functions as a high performance security appliance: ASA<br />
+ prevents DDoS attacks: Anomaly Guard and Detector<br />
+ provides Web-Based VPN services: SSL Service Module<br />
+ prevents attacks inline: IPS Appliance<br />
<div class="ccnaquestionsnumber">
Question 4</div>
<div style="text-align: center;">
<img alt="Bandwidth_Usage.jpg" height="180" src="http://www.dstut.com/images/CCDA/DragAndDrop/Bandwidth_Usage.jpg" width="550" /></div>
<div style="text-align: center;">
<br /></div>
<div class="ccnacorrectanswers" style="text-align: left;">
Answer:</div>
<div style="text-align: left;">
+ limits the number of frames transmitted before an acknowledgement is received: window size<br />
+ reduces data size to save transmission time, optimizing the use of WAN bandwidth: data compression<br />
+ allows network administrators to manage the varying demands generated by applications: queuing<br />
+ discards packets or modifies some aspect of them (such as IP precedence): traffic policing</div>
<div class="ccnaquestionsnumber" style="text-align: left;">
Question 5</div>
<div style="text-align: left;">
Place the PPDIOO Methodology in the correct order</div>
<table align="center" border="1">
<tbody>
<tr>
<td>Optimize</td>
<td>Step 1</td>
</tr>
<tr>
<td>Design</td>
<td>Step 2</td>
</tr>
<tr>
<td>Prepare</td>
<td>Step 3</td>
</tr>
<tr>
<td>Implement</td>
<td>Step 4</td>
</tr>
<tr>
<td>Operate</td>
<td>Step 5</td>
</tr>
<tr>
<td>Plan</td>
<td>Step 6</td>
</tr>
</tbody>
</table>
<br class="spacer_" />
<div class="ccnacorrectanswers">
Answer:</div>
Step 1: Prepare<br />
Step 2: Plan<br />
Step 3: Design<br />
Step 4: Implement<br />
Step 5: Operate<br />
Step 6: Optimizejcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-7428446017143514605.post-66781309189325056212015-07-06T06:30:00.003-07:002015-07-06T06:30:30.452-07:00Share your CCDA v2.1 Experience<div class="content" style="background-color: white; color: #333333; font-family: Verdana, 'BitStream vera Sans', Tahoma, Helvetica, sans-serif; font-size: 12px; line-height: 17.3999996185303px; margin: 0px; overflow: hidden; padding: 5px 0px 0px 5px;">
<div style="margin-bottom: 10px; padding: 0px;">
<br /></div>
<div style="margin-bottom: 10px; padding: 0px;">
<span class="pinkandbold" style="color: magenta; font-weight: bold;">Please share with us your experience after taking the new CCDA 640-864 (CCDA v2.1) exam, your materials, the way you learned, your recommendations…</span></div>
<div style="margin-bottom: 10px; padding: 0px;">
Your posts are warmly welcome!</div>
</div>
jcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-7428446017143514605.post-77473090678329905642015-07-06T06:29:00.002-07:002015-07-06T06:29:39.570-07:00Drag and Drop Questions 2<div class="content" style="background-color: white; color: #333333; font-family: Verdana, 'BitStream vera Sans', Tahoma, Helvetica, sans-serif; font-size: 12px; line-height: 17.3999996185303px; margin: 0px; overflow: hidden; padding: 5px 0px 0px 5px;">
<div style="margin-bottom: 10px; padding: 0px;">
Here you will find answers to Drag and Drop Questions – Part 2</div>
<div style="margin-bottom: 10px; padding: 0px;">
</div>
<div class="ccnaquestionsnumber" style="color: #ff3300; font-weight: bold; margin-bottom: 10px; padding: 0px;">
Question 1</div>
<div style="margin-bottom: 10px; padding: 0px;">
Drag the network characteristic on the left to the design method on the right which will best ensure redundancy at the building distribution layer</div>
<div style="margin-bottom: 10px; padding: 0px;">
<img alt="Redundancy_Distribution_Layer.jpg" class="aligncenter" height="150" src="http://www.dstut.com/images/CCDA_640_864/DragDrop/Redundancy_Distribution_Layer.jpg" style="border: 0px; display: block; margin-left: auto; margin-right: auto; max-width: 800px;" width="600" /></div>
<div style="margin-bottom: 10px; padding: 0px;">
<br class="spacer_" /></div>
<div class="ccnacorrectanswers" style="color: #3333cc; font-weight: bold; margin-bottom: 10px; padding: 0px;">
Answer:</div>
<div style="margin-bottom: 10px; padding: 0px;">
<strong>Layer 2 between distribution and access layers, with a Layer 3 link between the distribution switches</strong>:<br />FHRP for convergence, no VLANs span between access layer switches across the distribution switches</div>
<div style="margin-bottom: 10px; padding: 0px;">
<strong>Layer 3 between distribution and access layers, with a Layer 3 link between the distribution switches</strong>:<br />Support Layer 2 VLANs spanning multiple access layer switches across the distribution switches</div>
<div style="margin-bottom: 10px; padding: 0px;">
<strong>VSS</strong>: Convergence (FHRP) is not an issue</div>
<div class="ccnaquestionsnumber" style="color: #ff3300; font-weight: bold; margin-bottom: 10px; padding: 0px;">
Question 2</div>
<div style="margin-bottom: 10px; padding: 0px;">
Click and drag the QoS feature type on the left to the category of QoS mechanism on the right.</div>
<div style="margin-bottom: 10px; padding: 0px; text-align: center;">
<img alt="QoS_Feature.jpg" height="226" src="http://www.dstut.com/images/CCDA/DragAndDrop/QoS_Feature.jpg" style="border: 0px; max-width: 800px;" width="550" /></div>
<div style="margin-bottom: 10px; padding: 0px;">
<br class="spacer_" /></div>
<div class="ccnacorrectanswers" style="color: #3333cc; font-weight: bold; margin-bottom: 10px; padding: 0px;">
Answer:</div>
<div style="margin-bottom: 10px; padding: 0px;">
+ classification and marking: ACLs<br />+ congestion avoidance: WRED<br />+ traffic conditioners: CAR<br />+ congestion management: LLQ<br />+ link efficiency: LFI</div>
<div class="ccnaexplanation" style="color: #66ff00; font-weight: bold; margin-bottom: 10px; padding: 0px;">
Explanation</div>
<div style="margin-bottom: 10px; padding: 0px;">
<strong>Classification</strong> is the process of partitioning traffic into multiple priority levels or classes of service. Information in the frame or packet header is inspected, and the frame’s priority is determined.<strong>Marking </strong>is the process of changing the priority or class of service (CoS) setting within a frame or packet to indicate its classification. Classification is usually performed with <strong>access control lists</strong> (ACL), QoS class maps, or route maps, using various match criteria.</div>
<div style="margin-bottom: 10px; padding: 0px;">
<strong>Congestion-avoidance</strong> techniques monitor network traffic loads so that congestion can be anticipated and avoided before it becomes problematic. Congestion-avoidance techniques allow packets from streams identified as being eligible for early discard (those with lower priority) to be dropped when the queue is getting full. Congestion avoidance techniques provide preferential treatment for high priority traffic under congestion situations while maximizing network throughput and capacity utilization and minimizing packet loss and delay.</div>
<div style="margin-bottom: 10px; padding: 0px;">
<strong>Weighted random early detection</strong> (WRED) is the Cisco implementation of the random early detection (RED) mechanism. WRED extends RED by using the IP Precedence bits in the IP packet header to determine which traffic should be dropped; the drop-selection process is weighted by the IP precedence.</div>
<div style="margin-bottom: 10px; padding: 0px;">
<strong>Traffic conditioner</strong> consists of policing and shaping. Policing either discards the packet or modifies some aspect of it, such as its IP Precedence or CoS bits, when the policing agent determines that the packet meets a given criterion. In comparison, traffic shaping attempts to adjust the transmission rate of packets that match a certain criterion. Shaper typically delays excess traffic by using a buffer or queuing mechanism to hold packets and shape the ?ow when the source’s data rate is higher than expected. For example, generic traffic shaping uses a weighted fair queue to delay packets to shape the flow. Traffic conditioner is also referred to as<strong>Committed Access Rate (CAR)</strong>.</div>
<div style="margin-bottom: 10px; padding: 0px;">
<strong>Congestion management</strong> includes two separate processes: queuing, which separates traffic into various queues or buffers, and scheduling, which decides from which queue traffic is to be sent next. There are two types of queues: the hardware queue (also called the transmit queue or TxQ) and software queues. Software queues schedule packets into the hardware queue based on the QoS requirements and include the following types: weighted fair queuing (WFQ), priority queuing (PQ), custom queuing (CQ), class-based WFQ (CBWFQ), and <strong>low latency queuing</strong> (LLQ).</div>
<div style="margin-bottom: 10px; padding: 0px;">
LLQ is also known as Priority Queuing–Class-Based Weighted Fair Queuing (PQ-CBWFQ). LLQ provides a single priority but it’s preferred for VoIP networks because it can also configure guaranteed bandwidth for different classes of traffic queue. For example, all voice call traffic would be assigned to the priority queue, VoIP signaling and video would be assigned to a traffic class, FTP traffic would be assigned to a low-priority traffic class, and all other traffic would<br />be assigned to a regular class.</div>
<div style="margin-bottom: 10px; padding: 0px;">
<strong>Link efficiency</strong> techniques, including <strong>link fragmentation and interleaving (LFI) </strong>and compression. LFI prevents small voice packets from being queued behind large data packets, which could lead to unacceptable delays on low-speed links. With LFI, the voice gateway fragments large packets into smaller equal-sized frames and interleaves them with small voice packets so that a voice packet does not have to wait until the entire large data packet is sent. LFI reduces and ensures a more predictable voice delay.</div>
<div style="margin-bottom: 10px; padding: 0px;">
(Reference: Cisco Press Designing for Cisco Internetwork Solutions)</div>
<div style="margin-bottom: 10px; padding: 0px;">
<span id="more-407"></span></div>
<div class="ccnaquestionsnumber" style="color: #ff3300; font-weight: bold; margin-bottom: 10px; padding: 0px;">
Question 3</div>
<div style="margin-bottom: 10px; padding: 0px;">
Click and drag the Cisco Self-Defending Network term on the left to the SDN description on the right. Not all terms will be used.</div>
<div style="margin-bottom: 10px; padding: 0px; text-align: center;">
<img alt="Cisco-Self-Defending.jpg" height="226" src="http://www.dstut.com/images/CCDA/DragAndDrop/Cisco-Self-Defending.jpg" style="border: 0px; max-width: 800px;" width="550" /></div>
<div style="margin-bottom: 10px; padding: 0px;">
<br class="spacer_" /></div>
<div class="ccnacorrectanswers" style="color: #3333cc; font-weight: bold; margin-bottom: 10px; padding: 0px;">
Answer:</div>
<div style="margin-bottom: 10px; padding: 0px;">
+ provides secure network access, isolates and controls infected devices attempting access: Trust and Identity Management<br />+ uses encryption and authentication to provide secure transport across untrusted networks: Secure Connectivity<br />+ uses security integrated into routers, switches, and appliances to defend against attacks: Threat Defense<br />+ integrates security into the network to identify, prevent, and adapt to threats: Cisco Self-Defending Network</div>
<div class="ccnaexplanation" style="color: #66ff00; font-weight: bold; margin-bottom: 10px; padding: 0px;">
Explanation</div>
<div style="margin-bottom: 10px; padding: 0px;">
<strong>Trust and identity management </strong>solutions provide secure network access and admission at any point in the network and isolate and control infected or unpatched devices that attempt to access the network. If you are trusted, you are granted access.</div>
<div style="margin-bottom: 10px; padding: 0px;">
We can understand “trust” is the security policy applied on two or more network entities and allows them to communicate or not in a specific circumstance. “Identity” is the “who” of a trust relationship.</div>
<div style="margin-bottom: 10px; padding: 0px;">
The main purpose of <strong>Secure Connectivity</strong> is to protect the integrity and privacy of the information and it is mostly done by encryption and authentication. The purpose of encryption is to guarantee confidentiality; only authorized entities can encrypt and decrypt data. Authentication is used to establish the subject’s identity. For example, the users are required to provide username and password to access a resource…</div>
<div style="margin-bottom: 10px; padding: 0px;">
</div>
<div class="ccnaquestionsnumber" style="color: #ff3300; font-weight: bold; margin-bottom: 10px; padding: 0px;">
Question 4</div>
<div style="margin-bottom: 10px; padding: 0px;">
Match the Cisco security solution on the left to its function on the right.</div>
<div style="margin-bottom: 10px; padding: 0px; text-align: center;">
<img alt="Cisco Security.jpg" height="226" src="http://www.dstut.com/images/CCDA/DragAndDrop/Cisco%20Security.jpg" style="border: 0px; max-width: 800px;" width="550" /></div>
<div style="margin-bottom: 10px; padding: 0px;">
<br class="spacer_" /></div>
<div class="ccnacorrectanswers" style="color: #3333cc; font-weight: bold; margin-bottom: 10px; padding: 0px;">
Answer:</div>
<div style="margin-bottom: 10px; padding: 0px;">
+ protects the endpoints (desktops, laptops and servers): Cisco Security Agent<br />+ provides multiple functions as a high performance security appliance: ASA<br />+ prevents DDoS attacks: Anomaly Guard and Detector<br />+ provides Web-Based VPN services: SSL Service Module<br />+ prevents attacks inline: IPS Appliance</div>
<div class="ccnaquestionsnumber" style="color: #ff3300; font-weight: bold; margin-bottom: 10px; padding: 0px;">
Question 5</div>
<div style="margin-bottom: 10px; padding: 0px; text-align: center;">
<img alt="Bandwidth_Usage.jpg" height="180" src="http://www.dstut.com/images/CCDA/DragAndDrop/Bandwidth_Usage.jpg" style="border: 0px; max-width: 800px;" width="550" /></div>
<div style="margin-bottom: 10px; padding: 0px; text-align: center;">
<br /></div>
<div class="ccnacorrectanswers" style="color: #3333cc; font-weight: bold; margin-bottom: 10px; padding: 0px;">
Answer:</div>
<div style="margin-bottom: 10px; padding: 0px;">
limits the number of frames transmitted before an acknowledgement is received: window size<br />reduces data size to save transmission time, optimizing the use of WAN bandwidth: data compression<br />allows network administrators to manage the varying demands generated by applications: queuing<br />discards packets or modifies some aspect of them (such as IP precedence): traffic policing</div>
<div class="ccnaquestionsnumber" style="color: #ff3300; font-weight: bold; margin-bottom: 10px; padding: 0px;">
Question 6</div>
<div style="margin-bottom: 10px; padding: 0px;">
Place the PPDIOO Methodology in the correct order</div>
<table align="center" border="1" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border-collapse: collapse; border: 2px solid rgb(204, 204, 204); margin: 5px 0px 10px;"><tbody>
<tr><td style="border: 1px solid rgb(204, 204, 204); padding: 3px 10px; vertical-align: top;">Optimize</td><td style="border: 1px solid rgb(204, 204, 204); padding: 3px 10px; vertical-align: top;">Step 1</td></tr>
<tr><td style="border: 1px solid rgb(204, 204, 204); padding: 3px 10px; vertical-align: top;">Design</td><td style="border: 1px solid rgb(204, 204, 204); padding: 3px 10px; vertical-align: top;">Step 2</td></tr>
<tr><td style="border: 1px solid rgb(204, 204, 204); padding: 3px 10px; vertical-align: top;">Prepare</td><td style="border: 1px solid rgb(204, 204, 204); padding: 3px 10px; vertical-align: top;">Step 3</td></tr>
<tr><td style="border: 1px solid rgb(204, 204, 204); padding: 3px 10px; vertical-align: top;">Implement</td><td style="border: 1px solid rgb(204, 204, 204); padding: 3px 10px; vertical-align: top;">Step 4</td></tr>
<tr><td style="border: 1px solid rgb(204, 204, 204); padding: 3px 10px; vertical-align: top;">Operate</td><td style="border: 1px solid rgb(204, 204, 204); padding: 3px 10px; vertical-align: top;">Step 5</td></tr>
<tr><td style="border: 1px solid rgb(204, 204, 204); padding: 3px 10px; vertical-align: top;">Plan</td><td style="border: 1px solid rgb(204, 204, 204); padding: 3px 10px; vertical-align: top;">Step 6</td></tr>
</tbody></table>
<div style="margin-bottom: 10px; padding: 0px;">
<br class="spacer_" /></div>
<div class="ccnacorrectanswers" style="color: #3333cc; font-weight: bold; margin-bottom: 10px; padding: 0px;">
Answer:</div>
<div style="margin-bottom: 10px; padding: 0px;">
Step 1: Prepare<br />Step 2: Plan<br />Step 3: Design<br />Step 4: Implement<br />Step 5: Operate<br />Step 6: Optimize</div>
<div class="ccnaquestionsnumber" style="color: #ff3300; font-weight: bold; margin-bottom: 10px; padding: 0px;">
Question 7</div>
<div style="margin-bottom: 10px; padding: 0px; text-align: center;">
<img alt="Network_Management.jpg" height="200" src="http://www.dstut.com/images/CCDA_640_864/DragDrop/Network_Management.jpg" style="border: 0px; max-width: 800px;" width="600" /></div>
<div style="margin-bottom: 10px; padding: 0px;">
<br class="spacer_" /></div>
<div class="ccnacorrectanswers" style="color: #3333cc; font-weight: bold; margin-bottom: 10px; padding: 0px;">
Answer:</div>
<div style="margin-bottom: 10px; padding: 0px;">
Agent: generate traps of events<br />MIB: store information about network objects<br />SNMP: management transport mechanism<br />Manager: periodically collects object information</div>
<div class="ccnaexplanation" style="color: #66ff00; font-weight: bold; margin-bottom: 10px; padding: 0px;">
Explanation</div>
<div style="margin-bottom: 10px; padding: 0px;">
The SNMP system consists of three parts: SNMP manager, SNMP agent, and MIB.</div>
<div style="margin-bottom: 10px; padding: 0px;">
The agent is the network management software that resides in the managed device. The agent gathers the information and puts it in SNMP format. It responds to the manager’s request for information and also generates traps.</div>
<div style="margin-bottom: 10px; padding: 0px;">
A Management Information Base (MIB) is a collection of information that is stored on the local agent of the managed device. MIBs are databases of objects organized in a tree-like structure, with each branch containing similar objects</div>
</div>
jcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-7428446017143514605.post-78104853623316775422015-07-06T06:28:00.002-07:002015-07-06T06:28:43.672-07:00Drag and Drop Questions 1<div class="content" style="background-color: white; color: #333333; font-family: Verdana, 'BitStream vera Sans', Tahoma, Helvetica, sans-serif; font-size: 12px; line-height: 17.3999996185303px; margin: 0px; overflow: hidden; padding: 5px 0px 0px 5px;">
<div style="margin-bottom: 10px; padding: 0px;">
Here you will find answers to Drag and Drop Questions – Part 1</div>
<div style="margin-bottom: 10px; padding: 0px;">
</div>
<div class="ccnaquestionsnumber" style="color: #ff3300; font-weight: bold; margin-bottom: 10px; padding: 0px;">
Question 1</div>
<div style="margin-bottom: 10px; padding: 0px;">
Drag the data center property on the left to the design aspect on the right it is most apt to affect</div>
<div style="margin-bottom: 10px; padding: 0px; text-align: center;">
<img alt="data_center_property.jpg" height="270" src="http://www.dstut.com/images/CCDA_640_864/DragDrop/data_center_property.jpg" style="border: 0px; max-width: 800px;" width="550" /></div>
<div style="margin-bottom: 10px; padding: 0px;">
<br class="spacer_" /></div>
<div class="ccnacorrectanswers" style="color: #3333cc; font-weight: bold; margin-bottom: 10px; padding: 0px;">
Answer:</div>
<div style="margin-bottom: 10px; padding: 0px;">
<strong>Space</strong>: amount of racks, equipment, cabling, people<br /><strong>Weight load</strong>: rack servers vs blade servers<br /><strong>Power</strong>: variability of computing load, computing power and memory requirements<br /><strong>Cooling</strong>: arranging equipment racks face-to-face or back-to-back<br /><strong>Cabling</strong>: abundant, variable, well organized and easy to maintain<br /><strong>Security</strong>: disasters, fire suppression and alarm systems</div>
<div class="ccnaexplanation" style="color: #66ff00; font-weight: bold; margin-bottom: 10px; padding: 0px;">
Explanation</div>
<div style="margin-bottom: 10px; padding: 0px;">
The <strong>data center space</strong> includes number of racks for equipment that will be installed. Other factor needs to be considered is the number of employees who will work in that data center.</div>
<div style="margin-bottom: 10px; padding: 0px;">
Rack servers are low cost and provide high performance, unfortunately they take up space and consume a lot of energy to operate. Blade servers provide similar computing power when compared to rack mount servers, but require less space, power, and cabling. The chassis in most blade servers allows for shared power, Ethernet LAN, and Fibre Channel SAN connections, which reduce the number of cables needed.</div>
<div style="margin-bottom: 10px; padding: 0px;">
The <strong>power </strong>in the data center facility is used to power cooling devices, servers, storage equipment, the network, and some lighting equipment. In server environments, the power usage depends on the computing load place on the server. For example, if the server needs to work harder by processing more data, it has to draw more AC power from the power supply, which in turn creates more heat that needs to be cooled down.</div>
<div style="margin-bottom: 10px; padding: 0px;">
<strong>Cooling </strong>is used to control the temperature and humidity of the devices. The cabinets and racks should be arranged in the data center with an alternating pattern of “cold” and “hot” aisles. The cold aisle should have equipment arranged face to face, and the hot aisle should have equipment arranged back to back. In the cold aisle, there should be perforated floor tiles drawing cold air from the floor into the face of the equipment. This cold air passes through the equipment and flushes out the back into the hot aisle. The hot aisle does not have any perforated tiles, and this design prevents the hot air from mixing with the cold air.</div>
<div style="margin-bottom: 10px; padding: 0px;">
The <strong>cabling </strong>in the data center is known as the passive infrastructure. Data center teams rely on a structured and well-organized cabling plant. It is important for cabling to be easy to maintain, abundant and capable of supporting various media types and requirements for proper data center operations.</div>
<div style="margin-bottom: 10px; padding: 0px;">
Fire suppression and alarm systems are considered physical <strong>security </strong>and should be in place to protect equipment and data from natural disasters and theft.</div>
<div style="margin-bottom: 10px; padding: 0px;">
(Reference: CCDA 640-864 Official Cert Guide)</div>
<div style="margin-bottom: 10px; padding: 0px;">
<span id="more-409"></span></div>
<div class="ccnaquestionsnumber" style="color: #ff3300; font-weight: bold; margin-bottom: 10px; padding: 0px;">
Question 2</div>
<div style="margin-bottom: 10px; padding: 0px;">
Drag the WAN characteristic on the left to the branch office model where it would most likely be used on the right</div>
<div style="margin-bottom: 10px; padding: 0px; text-align: center;">
<img alt="WAN_characteristics.jpg" height="350" src="http://www.dstut.com/images/CCDA_640_864/DragDrop/WAN_characteristics.jpg" style="border: 0px; max-width: 800px;" width="500" /></div>
<div style="margin-bottom: 10px; padding: 0px;">
<br class="spacer_" /></div>
<div class="ccnacorrectanswers" style="color: #3333cc; font-weight: bold; margin-bottom: 10px; padding: 0px;">
Answer:</div>
<div style="margin-bottom: 10px; padding: 0px;">
<strong>Small Office:</strong><br />+ redundant links<br />+ internet deployment model</div>
<div style="margin-bottom: 10px; padding: 0px;">
<strong>Medium Office:</strong><br />+ redundant devices<br />+ private WAN deployment</div>
<div style="margin-bottom: 10px; padding: 0px;">
<strong>Large Office:</strong><br />+ MPLS deployment model<br />+ redundant links and devices</div>
<div class="ccnaexplanation" style="color: #66ff00; font-weight: bold; margin-bottom: 10px; padding: 0px;">
Explanation</div>
<div style="margin-bottom: 10px; padding: 0px;">
<strong>Small Office:</strong></div>
<div style="margin-bottom: 10px; padding: 0px;">
The small office is recommended for offices that have up to 50 users. The Layer 3 WAN services are based on the WAN and Internet deployment model. A T1 is used for the primary link, and an ADSL secondary link is used for backup.</div>
<div style="margin-bottom: 10px; padding: 0px;">
<strong>Medium Office:</strong></div>
<div style="margin-bottom: 10px; padding: 0px;">
The medium branch design is recommended for branch offices of 50 to 100 users. Medium Offices often use redundancy gateway services like Hot Standby Router Protocol (HSRP) or Gateway Load Balancing Protocol (GLBP).</div>
<div style="margin-bottom: 10px; padding: 0px;">
Private WAN generally consists of Frame Relay, ATM, private lines, and other traditional WAN connections. If security is needed, private WAN connections can be used in conjunction with encryption protocols such as Digital Encryption Standard (DES), Triple DES (3DES), and Advanced Encryption Standard (AES). This technology is best suited for an enterprise with moderate growth outlook where some remote or branch offices will need to be connected in the future.</div>
<div style="margin-bottom: 10px; padding: 0px;">
Dual Frame Relay links in medium office provide the private WAN services, which are used to connect back to the corporate offices via both of the access routers.</div>
<div style="margin-bottom: 10px; padding: 0px;">
<strong>Large Office:</strong></div>
<div style="margin-bottom: 10px; padding: 0px;">
The large office supports between 100 and 1000 users. The WAN services use an MPLS deployment model with dual WAN links into the WAN cloud -> MPLS & redundant links.</div>
<div style="margin-bottom: 10px; padding: 0px;">
(Reference: CCDA 640-864 Official Cert Guide)</div>
<div class="ccnaquestionsnumber" style="color: #ff3300; font-weight: bold; margin-bottom: 10px; padding: 0px;">
Question 3</div>
<div style="margin-bottom: 10px; padding: 0px;">
Drag the security provision on the left to the appropriate network module on the right</div>
<div style="margin-bottom: 10px; padding: 0px; text-align: center;">
<img alt="security_provision.jpg" height="350" src="http://www.dstut.com/images/CCDA_640_864/DragDrop/security_provision.jpg" style="border: 0px; max-width: 800px;" width="500" /></div>
<div style="margin-bottom: 10px; padding: 0px;">
<br class="spacer_" /></div>
<div class="ccnacorrectanswers" style="color: #3333cc; font-weight: bold; margin-bottom: 10px; padding: 0px;">
Answer:</div>
<div style="margin-bottom: 10px; padding: 0px;">
<strong>Access: </strong><br />+ Protect network services including DHCP, ARP, and IP spoofing protection<br />+ Protect against inadvertent loops</div>
<div style="margin-bottom: 10px; padding: 0px;">
<strong>Distribution:</strong><br />+ Protect the endpoints using network based intrusion prevention<br />+ Protect the infrastructure using NFP best practices</div>
<div style="margin-bottom: 10px; padding: 0px;">
<strong>Core:</strong><br />+ Does not perform security functions to mitigate transit threats<br />+ Filter and rate-limit control plane traffic</div>
<div class="ccnaexplanation" style="color: #66ff00; font-weight: bold; margin-bottom: 10px; padding: 0px;">
Explanation</div>
<div style="margin-bottom: 10px; padding: 0px;">
Rate limiting controls the rate of bandwidth that incoming traffic is using, such as ARPs and DHCP requests.</div>
<div style="margin-bottom: 10px; padding: 0px;">
<strong>Access layer:</strong></div>
<div style="margin-bottom: 10px; padding: 0px;">
Some security measures used for securing the campus access layer, including the following:<br />* Securing the endpoints using endpoint security software<br />* Securing the access infrastructure and protecting network services including <span style="text-decoration: underline;">DHCP, ARP, IP spoofing protection</span> and protecting against <span style="text-decoration: underline;">inadvertent loops</span> using Network Foundation Protection (NFP) best practices and Catalyst Integrated Security Features (CISF).</div>
<div style="margin-bottom: 10px; padding: 0px;">
<strong>Distribution layer:</strong></div>
<div style="margin-bottom: 10px; padding: 0px;">
Security measures used for securing the campus distribution layer including the following:<br />* Protecting the endpoints using network-based intrusion prevention<br />* Protection the infrastructure using NFP best practices</div>
<div style="margin-bottom: 10px; padding: 0px;">
<strong>Core layer:</strong></div>
<div style="margin-bottom: 10px; padding: 0px;">
The primary role of security in the enterprise core module is to protect the core itself, <span style="text-decoration: underline;">not to apply policy to mitigate transit threats</span> traversing through the core.</div>
<div style="margin-bottom: 10px; padding: 0px;">
The following are the key areas of the Network Foundation Protection (NFP) baseline security best practices applicable to securing the enterprise core:</div>
<div style="margin-bottom: 10px; padding: 0px;">
* Infrastructure device access—Implement dedicated management interfaces to the out-of-band (OOB) management network, limit the accessible ports and restrict the permitted communicators and the permitted methods of access, present legal notification, authenticate and authorize access using AAA, log and account for all access, and protect locally stored sensitive data (such as local passwords) from viewing and copying.</div>
<div style="margin-bottom: 10px; padding: 0px;">
* Routing infrastructure—Authenticate routing neighbors, implement route filtering, use default passive interfaces, and log neighbor changes.</div>
<div style="margin-bottom: 10px; padding: 0px;">
* Device resiliency and survivability—Disable unnecessary services, <span style="text-decoration: underline;">filter and rate-limit control-plane traffic</span>, and implement redundancy.</div>
<div style="margin-bottom: 10px; padding: 0px;">
* Network telemetry—Implement NTP to synchronize time to the same network clock; maintain device global and interface traffic statistics; maintain system status information (memory, CPU, and process); and log and collect system status, traffic statistics, and device access information.</div>
<div style="margin-bottom: 10px; padding: 0px;">
(Reference: Above information is extracted from</div>
<div style="margin-bottom: 10px; padding: 0px;">
+ <a href="http://www.cisco.com/en/US/docs/solutions/Enterprise/Security/SAFE_RG/chap5.html" style="color: #2970a6; text-decoration: none;" target="_blank">http://www.cisco.com/en/US/docs/solutions/Enterprise/Security/SAFE_RG/chap5.html</a> for Access & Distribution Layers<br />+ <a href="http://www.cisco.com/en/US/docs/solutions/Enterprise/Security/SAFE_RG/chap3.html" style="color: #2970a6; text-decoration: none;" target="_blank">http://www.cisco.com/en/US/docs/solutions/Enterprise/Security/SAFE_RG/chap3.html</a> for Core Layer)</div>
<div style="margin-bottom: 10px; padding: 0px;">
</div>
<div class="ccnaquestionsnumber" style="color: #ff3300; font-weight: bold; margin-bottom: 10px; padding: 0px;">
Question 4</div>
<div style="margin-bottom: 10px; padding: 0px;">
Drag the Campus Layer Design on the left to the appropriate location on the right</div>
<div style="margin-bottom: 10px; padding: 0px; text-align: center;">
<img alt="Campus_Layer_Design.jpg" height="350" src="http://www.dstut.com/images/CCDA_640_864/DragDrop/Campus_Layer_Design.jpg" style="border: 0px; max-width: 800px;" width="500" /></div>
<div style="margin-bottom: 10px; padding: 0px;">
<br class="spacer_" /></div>
<div class="ccnacorrectanswers" style="color: #3333cc; font-weight: bold; margin-bottom: 10px; padding: 0px;">
Answer:</div>
<div style="margin-bottom: 10px; padding: 0px;">
<strong>Access: </strong><br />+ routing boundary (dynamic, summarization, static)<br />+ the most feature-rich parts of the campus network</div>
<div style="margin-bottom: 10px; padding: 0px;">
<strong>Distribution:</strong><br />+ enforces policy within the network<br />+ provide security, QoS, and IP multicast to network</div>
<div style="margin-bottom: 10px; padding: 0px;">
<strong>Core:</strong><br />+ high level of availability, scalability and fast convergence<br />+ provides a limited set of services</div>
<div class="ccnaexplanation" style="color: #66ff00; font-weight: bold; margin-bottom: 10px; padding: 0px;">
Explanation</div>
<div style="margin-bottom: 10px; padding: 0px;">
<strong>Campus Access Layer Network Design</strong></div>
<div style="margin-bottom: 10px; padding: 0px;">
The access layer is the first tier or edge of the campus, where end devices such as PCs, printers, cameras, Cisco TelePresence, etc. attach to the wired portion of the campus network. The wide variety of possible types of devices that can connect and the various services and dynamic configuration mechanisms that are necessary make the access layer one of <span style="text-decoration: underline;">the most feature-rich parts of the campus network</span>.</div>
<div style="margin-bottom: 10px; padding: 0px;">
<strong>Campus Distribution Layer</strong></div>
<div style="margin-bottom: 10px; padding: 0px;">
The campus distribution layer provides connectivity to the enterprise core for clients in the campus access layer. It aggregates the links from the access switches and serves as an integration point for campus security services such as IPS and <span style="text-decoration: underline;">network policy enforcement</span>.</div>
<div style="margin-bottom: 10px; padding: 0px;">
Distribution layer switches perform network foundation technologies such as routing, <span style="text-decoration: underline;">quality of service (QoS)</span>, and security.</div>
<div style="margin-bottom: 10px; padding: 0px;">
<strong>Core Layer</strong></div>
<div style="margin-bottom: 10px; padding: 0px;">
The core layer provides scalability, high availability, and fast convergence to the network. The core layer is the backbone for campus connectivity, and is the aggregation point for the other layers and modules in the Cisco Enterprise Campus Architecture. The core provides a high level of redundancy and can adapt to changes quickly. Core devices are most reliable when they can accommodate failures by rerouting traffic and can respond quickly to changes in the network topology. The core devices implement scalable protocols and technologies, alternate paths, and load balancing. The core layer helps in scalability during future growth.</div>
<div style="margin-bottom: 10px; padding: 0px;">
The campus core is in some ways the simplest yet most critical part of the campus. It provides <span style="text-decoration: underline;">a very limited set of services</span> and is designed to be highly available and operate in an “always-on” mode. In the modern business world, the core of the network must operate as a non-stop 7x24x365 service.</div>
<div style="margin-bottom: 10px; padding: 0px;">
<strong>Note:</strong></div>
<div style="margin-bottom: 10px; padding: 0px;">
It is a difficult question! Some characteristics are present at more than one layer so it is difficult to classify correctly. For example, a Cisco site says:</div>
<div style="margin-bottom: 10px; padding: 0px;">
“The campus distribution layer acts as a <span style="text-decoration: underline;">services and control boundary</span> between the campus access layer and the enterprise core. It is an aggregation point for all of the access switches providing policy enforcement, access control, <span style="text-decoration: underline;">route and link aggregation</span>, and the isolation demarcation point between the campus access layer and the rest of the network.”</div>
<div style="margin-bottom: 10px; padding: 0px;">
It means that the “routing boundary” should belong to the Distribution Layer instead of Access Layer. But the Distribution Layer also “enforces policy within the network” & “provide security, QoS, and IP multicast to network”.</div>
<div style="margin-bottom: 10px; padding: 0px;">
After a lot of research, I decide to put the “routing boundary” to the Access Layer because this feature seems to be at the border of Access & Distribution layers so we can choose either. The “provide security, QoS, and IP multicast to network” features mainly belong to the Distribution layer (the Official 640-864 CCDA mentions about <span style="text-decoration: underline;">QoS</span>, <span style="text-decoration: underline;">Security filtering</span> & <span style="text-decoration: underline;">Broadcast or multicast domain definition</span> in the Distribution layer)</div>
<div style="margin-bottom: 10px; padding: 0px;">
<strong>Reference:</strong></div>
<div style="margin-bottom: 10px; padding: 0px;">
<a href="http://www.cisco.com/en/US/docs/solutions/Enterprise/Campus/Borderless_Campus_Network_1.0/BN_Campus_Models.html" style="color: #2970a6; text-decoration: none;" target="_blank">http://www.cisco.com/en/US/docs/solutions/Enterprise/Campus/Borderless_Campus_Network_1.0/BN_Campus_Models.html</a></div>
<div style="margin-bottom: 10px; padding: 0px;">
<a href="http://www.cisco.com/en/US/docs/solutions/Enterprise/Campus/campover.html" style="color: #2970a6; text-decoration: none;" target="_blank">http://www.cisco.com/en/US/docs/solutions/Enterprise/Campus/campover.html</a></div>
<div style="margin-bottom: 10px; padding: 0px;">
<a href="http://www.cisco.com/en/US/docs/solutions/Enterprise/Security/SAFE_RG/chap5.html" style="color: #2970a6; text-decoration: none;" target="_blank">http://www.cisco.com/en/US/docs/solutions/Enterprise/Security/SAFE_RG/chap5.html</a></div>
<div class="ccnaquestionsnumber" style="color: #ff3300; font-weight: bold; margin-bottom: 10px; padding: 0px;">
Question 5</div>
<div style="margin-bottom: 10px; padding: 0px;">
Drag the WAN technology on the left to the most appropriate category on the right</div>
<div style="margin-bottom: 10px; padding: 0px; text-align: center;">
<img alt="WAN_technologies.jpg" height="235" src="http://www.dstut.com/images/CCDA_640_864/DragDrop/WAN_technologies.jpg" style="border: 0px; max-width: 800px;" width="500" /></div>
<div style="margin-bottom: 10px; padding: 0px;">
<br class="spacer_" /></div>
<div class="ccnacorrectanswers" style="color: #3333cc; font-weight: bold; margin-bottom: 10px; padding: 0px;">
Answer:</div>
<div style="margin-bottom: 10px; padding: 0px;">
<strong>Leased:</strong><br />+ TDM<br />+ SONET</div>
<div style="margin-bottom: 10px; padding: 0px;">
<strong>Shared:</strong><br />+ Frame-Relay<br />+ MPLS</div>
<div class="ccnaexplanation" style="color: #66ff00; font-weight: bold; margin-bottom: 10px; padding: 0px;">
Explanation</div>
<div style="margin-bottom: 10px; padding: 0px;">
TDM & SONET are circuit-based so they are leased-line while Frame-Relay & MPLS are shared-circuit or packet-switched WAN</div>
<div class="ccnaquestionsnumber" style="color: #ff3300; font-weight: bold; margin-bottom: 10px; padding: 0px;">
Question 6</div>
<div style="margin-bottom: 10px; padding: 0px;">
Drag the technology on the left to the type of enterprise virtualization where it is most likely to be found on the right</div>
<div style="margin-bottom: 10px; padding: 0px; text-align: center;">
<img alt="Enterprise_Virtualization.jpg" height="290" src="http://www.dstut.com/images/CCDA_640_864/DragDrop/Enterprise_Virtualization.jpg" style="border: 0px; max-width: 800px;" width="500" /></div>
<div style="margin-bottom: 10px; padding: 0px;">
<br class="spacer_" /></div>
<div class="ccnacorrectanswers" style="color: #3333cc; font-weight: bold; margin-bottom: 10px; padding: 0px;">
Answer:</div>
<div style="margin-bottom: 10px; padding: 0px;">
<strong>Network Virtualization:</strong><br />+ VLAN<br />+ vPC<br />+ VRF</div>
<div style="margin-bottom: 10px; padding: 0px;">
<strong>Device Virtualization:</strong><br />+ ASA firewall context<br />+ IPS<br />+ VDC</div>
<div class="ccnaexplanation" style="color: #66ff00; font-weight: bold; margin-bottom: 10px; padding: 0px;">
Explanation</div>
<div style="margin-bottom: 10px; padding: 0px;">
Network virtualization encompasses logical isolated network segments that share the same physical infrastructure. Each segment operates independently and is logically separate from the other segments. Each network segment appears with its own privacy, security, independent set of policies, QoS levels, and independent routing paths.</div>
<div style="margin-bottom: 10px; padding: 0px;">
Here are some examples of <strong>network virtualization</strong> technologies:<br />* VLAN: Virtual local-area network<br />* VSAN: Virtual storage-area network<br />* VRF: Virtual routing and forwarding<br />* VPN: Virtual private network<br />* vPC: Virtual Port Channel</div>
<div style="margin-bottom: 10px; padding: 0px;">
Device virtualization allows for a single physical device to act like multiple copies of itself. Device virtualization enables many logical devices to run independently of each other on the same physical piece of hardware. The software creates virtual hardware that can function just like the physical network device. Another form of device virtualization entails using multiple physical devices to act as one logical unit.</div>
<div style="margin-bottom: 10px; padding: 0px;">
Here are some examples of <strong>device virtualization </strong>technologies:<br />* Server virtualization: Virtual machines (VM)<br />* Cisco Application Control Engine (ACE) context<br />* Virtual Switching System (VSS)<br />* Cisco Adaptive Security Appliance (ASA) firewall context<br />* Virtual device contexts (VDC)</div>
<div style="margin-bottom: 10px; padding: 0px;">
(Reference: CCDA 640-864 Official Cert Guide)</div>
<div class="ccnaquestionsnumber" style="color: #ff3300; font-weight: bold; margin-bottom: 10px; padding: 0px;">
Question 7</div>
<div style="margin-bottom: 10px; padding: 0px;">
Drag the network function on the left to the functional area or module where it is most likely to be performed in the enterprise campus infrastructure on the right</div>
<div style="margin-bottom: 10px; padding: 0px; text-align: center;">
<img alt="Network_function_Enterprise_Campus.jpg" height="270" src="http://www.dstut.com/images/CCDA_640_864/DragDrop/Network_function_Enterprise_Campus.jpg" style="border: 0px; max-width: 800px;" width="550" /></div>
<div style="margin-bottom: 10px; padding: 0px;">
<br class="spacer_" /></div>
<div class="ccnacorrectanswers" style="color: #3333cc; font-weight: bold; margin-bottom: 10px; padding: 0px;">
Answer:</div>
<div style="margin-bottom: 10px; padding: 0px;">
<strong>Enterprise Campus:</strong> enables intelligent route and switch, high availability resilient multilayer design and integrated security<br /><strong>Enterprise Edge:</strong> aggregates connectivity to voice, video, and data outside the enterprise with Qos and security<br /><strong>E-Commerce:</strong> supports application traffic through the Internet, initiated outside the enterprise network<br /><strong>Internet Connectivity:</strong> provides internal users with external HTTP, FTP, SMTP and DNS connectivity<br /><strong>Remote Access and VPN:</strong> terminates traffic that is forwarded by the Internet connectivity module<br /><strong>Data Center</strong>: enables service-oriented architectures, virtualization and secure computing with load balancing, redundancy</div>
<div style="margin-bottom: 10px; padding: 0px;">
<strong>Access: </strong><br />+ Protect network services including DHCP, ARP, and IP spoofing protection<br />+ Protect against inadvertent loops</div>
<div style="margin-bottom: 10px; padding: 0px;">
<strong>Distribution:</strong><br />+ Protect the endpoints using network based intrusion prevention<br />+ Protect the infrastructure using NFP best practices</div>
<div style="margin-bottom: 10px; padding: 0px;">
<strong>Core:</strong><br />+ Does not perform security functions to mitigate transit threats<br />+ Filter and rate-limit control plane traffic</div>
</div>
jcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-7428446017143514605.post-43630441154589431342015-07-02T04:41:00.002-07:002015-08-20T03:54:42.584-07:00CCDA TRAINING<div class="sidebar" id="eastsidebar" style="background-color: #f7f7f7; color: #333333; font-family: Verdana, 'BitStream vera Sans', Tahoma, Helvetica, sans-serif; font-size: 10.8299999237061px; line-height: 16.5300006866455px; margin: 0px; overflow: hidden; padding: 0px; width: 229px;">
<div class="widget widget_categories" style="margin: 0px 0px 15px; padding: 0px;">
<h2 style="font-family: 'Segoe UI', Arial, Helvetica, sans-serif; font-size: 18.4109992980957px; margin: 0px; padding: 0px;">
CCDA 640-864 v2.1</h2>
<ul style="margin: 0px; padding: 0px;">
<li style="background: url(http://www.dstut.com/wp-content/themes/inove/img/hdot2.gif) 50% 100% repeat-x scroll transparent; display: block; font-size: 12px; list-style: none; margin: 5px 0px 0px; padding: 5px 0px;"><a href="http://ccdat.blogspot.com/2015/07/drag-and-drop-questions-1.html" style="color: #2970a6; text-decoration: none;">Drag and Drop Questions 1</a></li>
<li style="background: url(http://www.dstut.com/wp-content/themes/inove/img/hdot2.gif) 50% 100% repeat-x scroll transparent; display: block; font-size: 12px; list-style: none; margin: 5px 0px 0px; padding: 5px 0px;"><a href="http://ccdat.blogspot.com/2015/07/drag-and-drop-questions-2.html" style="color: #2970a6; text-decoration: none;">Drag and Drop Questions 2</a></li>
<li style="background: url(http://www.dstut.com/wp-content/themes/inove/img/hdot2.gif) 50% 100% repeat-x scroll transparent; display: block; font-size: 12px; list-style: none; margin: 5px 0px 0px; padding: 5px 0px;"><a href="http://ccdat.blogspot.com/2015/07/share-your-ccda-v21-experience.html" style="color: #2970a6; text-decoration: none;">Share your CCDA v2.1 Experience</a> *</li>
</ul>
</div>
<br />
<div class="widget widget_categories" style="margin: 0px 0px 15px; padding: 0px;">
<h2 style="font-family: 'Segoe UI', Arial, Helvetica, sans-serif; font-size: 18.4109992980957px; margin: 0px; padding: 0px;">
CCDA 640-863</h2>
<ul style="margin: 0px; padding: 0px;">
<li style="background: url(http://www.dstut.com/wp-content/themes/inove/img/hdot2.gif) 50% 100% repeat-x scroll transparent; display: block; font-size: 12px; list-style: none; margin: 5px 0px 0px; padding: 5px 0px;"><a href="http://ccdat.blogspot.com/2015/07/drag-and-drop-questions.html" style="color: #2970a6; text-decoration: none;">Drag and Drop Questions</a></li>
<li style="background: url(http://www.dstut.com/wp-content/themes/inove/img/hdot2.gif) 50% 100% repeat-x scroll transparent; display: block; font-size: 12px; list-style: none; margin: 5px 0px 0px; padding: 5px 0px;"><a href="http://ccdat.blogspot.com/2015/07/design-fundamentals.html" style="color: #2970a6; text-decoration: none;">Design Fundamentals</a></li>
<li style="background: url(http://www.dstut.com/wp-content/themes/inove/img/hdot2.gif) 50% 100% repeat-x scroll transparent; display: block; font-size: 12px; list-style: none; margin: 5px 0px 0px; padding: 5px 0px;"><a href="http://ccdat.blogspot.com/2015/07/cisco-enterprise-architecture-model.html" style="color: #2970a6; text-decoration: none;">Cisco Enterprise Architecture Model</a></li>
<li style="background: url(http://www.dstut.com/wp-content/themes/inove/img/hdot2.gif) 50% 100% repeat-x scroll transparent; display: block; font-size: 12px; list-style: none; margin: 5px 0px 0px; padding: 5px 0px;"><a href="http://ccdat.blogspot.com/2015/07/cisco-sona-architecture.html" style="color: #2970a6; text-decoration: none;">Cisco SONA Architecture</a></li>
<li style="background: url(http://www.dstut.com/wp-content/themes/inove/img/hdot2.gif) 50% 100% repeat-x scroll transparent; display: block; font-size: 12px; list-style: none; margin: 5px 0px 0px; padding: 5px 0px;"><a href="http://ccdat.blogspot.com/2015/07/ppdioo-methodology.html" style="color: #2970a6; text-decoration: none;">PPDIOO Methodology</a></li>
<li style="background: url(http://www.dstut.com/wp-content/themes/inove/img/hdot2.gif) 50% 100% repeat-x scroll transparent; display: block; font-size: 12px; list-style: none; margin: 5px 0px 0px; padding: 5px 0px;"><a href="http://ccdat.blogspot.com/2015/07/network-management.html" style="color: #2970a6; text-decoration: none;">Network Management</a></li>
<li style="background: url(http://www.dstut.com/wp-content/themes/inove/img/hdot2.gif) 50% 100% repeat-x scroll transparent; display: block; font-size: 12px; list-style: none; margin: 5px 0px 0px; padding: 5px 0px;"><a href="http://ccdat.blogspot.com/2015/07/wireless-questions.html" style="color: #2970a6; text-decoration: none;">Wireless Questions</a></li>
<li style="background: url(http://www.dstut.com/wp-content/themes/inove/img/hdot2.gif) 50% 100% repeat-x scroll transparent; display: block; font-size: 12px; list-style: none; margin: 5px 0px 0px; padding: 5px 0px;"><a href="http://ccdat.blogspot.com/2015/07/voice-design.html" style="color: #2970a6; text-decoration: none;">Voice Design</a></li>
<li style="background: url(http://www.dstut.com/wp-content/themes/inove/img/hdot2.gif) 50% 100% repeat-x scroll transparent; display: block; font-size: 12px; list-style: none; margin: 5px 0px 0px; padding: 5px 0px;"><a href="http://ccdat.blogspot.com/2015/07/security-in-design.html" style="color: #2970a6; text-decoration: none;">Security in Design</a></li>
<li style="background: url(http://www.dstut.com/wp-content/themes/inove/img/hdot2.gif) 50% 100% repeat-x scroll transparent; display: block; font-size: 12px; list-style: none; margin: 5px 0px 0px; padding: 5px 0px;"><a href="http://ccdat.blogspot.com/2015/07/ospf-questions.html" style="color: #2970a6; text-decoration: none;">OSPF Questions</a></li>
<li style="background: url(http://www.dstut.com/wp-content/themes/inove/img/hdot2.gif) 50% 100% repeat-x scroll transparent; display: block; font-size: 12px; list-style: none; margin: 5px 0px 0px; padding: 5px 0px;"><a href="http://ccdat.blogspot.com/2015/07/eigrp-questions.html" style="color: #2970a6; text-decoration: none;">EIGRP Questions</a></li>
<li style="background: url(http://www.dstut.com/wp-content/themes/inove/img/hdot2.gif) 50% 100% repeat-x scroll transparent; display: block; font-size: 12px; list-style: none; margin: 5px 0px 0px; padding: 5px 0px;"><a href="http://ccdat.blogspot.com/2015/07/ipv4-questions.html" style="color: #2970a6; text-decoration: none;">IPv4 Questions</a></li>
<li style="background: url(http://www.dstut.com/wp-content/themes/inove/img/hdot2.gif) 50% 100% repeat-x scroll transparent; display: block; font-size: 12px; list-style: none; margin: 5px 0px 0px; padding: 5px 0px;"><a href="http://ccdat.blogspot.com/2015/07/ipv6-questions.html" style="color: #2970a6; text-decoration: none;">IPv6 Questions</a></li>
<li style="background: url(http://www.dstut.com/wp-content/themes/inove/img/hdot2.gif) 50% 100% repeat-x scroll transparent; display: block; font-size: 12px; list-style: none; margin: 5px 0px 0px; padding: 5px 0px;"><a href="http://ccdat.blogspot.com/2015/07/other-routing-protocols.html" style="color: #2970a6; text-decoration: none;">Other Routing Protocols</a></li>
<li style="background: url(http://www.dstut.com/wp-content/themes/inove/img/hdot2.gif) 50% 100% repeat-x scroll transparent; display: block; font-size: 12px; list-style: none; margin: 5px 0px 0px; padding: 5px 0px;"><a href="http://ccdat.blogspot.com/2015/07/wan-design.html" style="color: #2970a6; text-decoration: none;">WAN Design</a></li>
<li style="background: url(http://www.dstut.com/wp-content/themes/inove/img/hdot2.gif) 50% 100% repeat-x scroll transparent; display: block; font-size: 12px; list-style: none; margin: 5px 0px 0px; padding: 5px 0px;"><a href="http://ccdat.blogspot.com/2015/07/miscellaneous-questions.html" style="color: #2970a6; text-decoration: none;">Miscellaneous Questions</a></li>
<li style="background: url(http://www.dstut.com/wp-content/themes/inove/img/hdot2.gif) 50% 100% repeat-x scroll transparent; display: block; font-size: 12px; list-style: none; margin: 5px 0px 0px; padding: 5px 0px;"><a href="http://ccdat.blogspot.com/2015/07/share-your-ccda-experience.html" style="color: #2970a6; text-decoration: none;">Share your CCDA Experience</a></li>
</ul>
</div>
<br />
<div class="widget widget_categories" style="margin: 0px 0px 15px; padding: 0px;">
<h2 style="font-family: 'Segoe UI', Arial, Helvetica, sans-serif; font-size: 18.4109992980957px; margin: 0px; padding: 0px;">
CCDP Exam</h2>
<br />
<h2 style="font-family: 'Segoe UI', Arial, Helvetica, sans-serif; font-size: 18.4109992980957px; margin: 0px; padding: 0px;">
ARCH 642-874</h2>
<ul style="margin: 0px; padding: 0px;">
<li style="background: url(http://www.dstut.com/wp-content/themes/inove/img/hdot2.gif) 50% 100% repeat-x scroll transparent; display: block; font-size: 12px; list-style: none; margin: 5px 0px 0px; padding: 5px 0px;"><a href="http://ccdat.blogspot.com/2015/07/share-your-arch-experience.html" style="color: #2970a6; text-decoration: none;">Share your ARCH Experience</a></li>
</ul>
</div>
<div class="widget widget_categories" style="margin: 0px 0px 15px; padding: 0px;">
<h2 style="font-family: 'Segoe UI', Arial, Helvetica, sans-serif; font-size: 18.4109992980957px; margin: 0px; padding: 0px;">
CCDE Exam</h2>
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<li style="background: url(http://www.dstut.com/wp-content/themes/inove/img/hdot2.gif) 50% 100% repeat-x scroll transparent; display: block; font-size: 12px; list-style: none; margin: 5px 0px 0px; padding: 5px 0px;"><a href="http://ccdat.blogspot.com/2015/07/share-your-ccde-written-experience.html" style="color: #2970a6; text-decoration: none;">Share your CCDE Written Experience</a></li>
<li style="background: url(http://www.dstut.com/wp-content/themes/inove/img/hdot2.gif) 50% 100% repeat-x scroll transparent; display: block; font-size: 12px; list-style: none; margin: 5px 0px 0px; padding: 5px 0px;"><a href="http://ccdat.blogspot.com/2015/07/share-your-ccde-practical-experience.html" style="color: #2970a6; text-decoration: none;">Share your CCDE Practical Experience</a></li>
</div>
</div>
<br style="background-color: #f7f7f7; color: #333333; font-family: Verdana, 'BitStream vera Sans', Tahoma, Helvetica, sans-serif; font-size: 11.3999996185303px; line-height: 16.5300006866455px;" />
<div class="widget widget_categories" style="background-color: #f7f7f7; color: #333333; font-family: Verdana, 'BitStream vera Sans', Tahoma, Helvetica, sans-serif; font-size: 11.3999996185303px; line-height: 16.5300006866455px; margin: 0px; padding: 0px;">
<h2 style="color: black; font-family: 'Segoe UI', Arial, Helvetica, sans-serif; font-size: 19.3799991607666px; font-stretch: normal; line-height: 16.5300006866455px; margin: 0px; padding: 0px; position: relative;">
Network Resources</h2>
<h2 style="color: black; font-family: 'Segoe UI', Arial, Helvetica, sans-serif; font-size: 19.3799991607666px; font-stretch: normal; line-height: normal; margin: 0px; padding: 0px; position: relative;">
<ul style="font-family: Verdana, 'BitStream vera Sans', Tahoma, Helvetica, sans-serif; font-size: 11.3999996185303px; font-weight: normal; line-height: 16.5300006866455px; margin: 0px; padding: 0px;">
<li class="cat-item" style="background: url(http://www.wirelesstut.com/wp-content/themes/inove/img/hdot2.gif) 50% 100% repeat-x scroll transparent; display: block; font-size: 12px; list-style: none; margin: 5px 0px 0px; padding: 5px 0px;"><a href="http://www.ccna.ma/" style="color: #2970a6; text-decoration: none;" target="_blank">CCNA Website</a></li>
</ul>
<ul style="font-family: Verdana, 'BitStream vera Sans', Tahoma, Helvetica, sans-serif; font-size: 11.3999996185303px; font-weight: normal; line-height: 16.5300006866455px; margin: 0px; padding: 0px;">
<li class="cat-item" style="background: url(http://www.wirelesstut.com/wp-content/themes/inove/img/hdot2.gif) 50% 100% repeat-x scroll transparent; display: block; font-size: 12px; list-style: none; margin: 5px 0px 0px; padding: 5px 0px;"><a href="http://routep.blogspot.com/" style="color: #2970a6; text-decoration: none;" target="_blank">ROUTE Website</a></li>
</ul>
<ul style="font-family: Verdana, 'BitStream vera Sans', Tahoma, Helvetica, sans-serif; font-size: 11.3999996185303px; font-weight: normal; line-height: 16.5300006866455px; margin: 0px; padding: 0px;">
<li class="cat-item" style="background: url(http://www.wirelesstut.com/wp-content/themes/inove/img/hdot2.gif) 50% 100% repeat-x scroll transparent; display: block; font-size: 12px; list-style: none; margin: 5px 0px 0px; padding: 5px 0px;"><a href="https://switchp.blogspot.com/" style="color: #2970a6; text-decoration: none;" target="_blank">SWITCH Website</a></li>
</ul>
<ul style="font-family: Verdana, 'BitStream vera Sans', Tahoma, Helvetica, sans-serif; font-size: 11.3999996185303px; font-weight: normal; line-height: 16.5300006866455px; margin: 0px; padding: 0px;">
<li class="cat-item" style="background: url(http://www.wirelesstut.com/wp-content/themes/inove/img/hdot2.gif) 50% 100% repeat-x scroll transparent; display: block; font-size: 12px; list-style: none; margin: 5px 0px 0px; padding: 5px 0px;"><a href="http://tshoott.blogspot.com/" style="color: #2970a6; text-decoration: none;" target="_blank">TSHOOT Website</a></li>
</ul>
<ul style="font-family: Verdana, 'BitStream vera Sans', Tahoma, Helvetica, sans-serif; font-size: 11.3999996185303px; font-weight: normal; line-height: 16.5300006866455px; margin: 0px; padding: 0px;">
<li class="cat-item" style="background: url(http://www.wirelesstut.com/wp-content/themes/inove/img/hdot2.gif) 50% 100% repeat-x scroll transparent; display: block; font-size: 12px; list-style: none; margin: 5px 0px 0px; padding: 5px 0px;"><a href="http://ccnavo.blogspot.com/" style="color: #2970a6; text-decoration: none;" target="_blank">CCNA Voice Website</a></li>
</ul>
<ul style="font-family: Verdana, 'BitStream vera Sans', Tahoma, Helvetica, sans-serif; font-size: 11.3999996185303px; font-weight: normal; line-height: 16.5300006866455px; margin: 0px; padding: 0px;">
<li class="cat-item" style="background: url(http://www.wirelesstut.com/wp-content/themes/inove/img/hdot2.gif) 50% 100% repeat-x scroll transparent; display: block; font-size: 12px; list-style: none; margin: 5px 0px 0px; padding: 5px 0px;"><a href="http://ccnase.blogspot.com/" style="color: #2970a6; text-decoration: none;" target="_blank">CCNA Security Website</a></li>
</ul>
<ul style="font-family: Verdana, 'BitStream vera Sans', Tahoma, Helvetica, sans-serif; font-size: 11.3999996185303px; font-weight: normal; line-height: 16.5300006866455px; margin: 0px; padding: 0px;">
<li class="cat-item" style="background: url(http://www.wirelesstut.com/wp-content/themes/inove/img/hdot2.gif) 50% 100% repeat-x scroll transparent; display: block; font-size: 12px; list-style: none; margin: 5px 0px 0px; padding: 5px 0px;"><a href="http://ccdat.blogspot.com/" style="color: #2970a6; text-decoration: none;" target="_blank">CCDA Website</a></li>
</ul>
<ul style="font-family: Verdana, 'BitStream vera Sans', Tahoma, Helvetica, sans-serif; font-size: 11.3999996185303px; font-weight: normal; line-height: 16.5300006866455px; margin: 0px; padding: 0px;">
<li class="cat-item" style="background: url(http://www.wirelesstut.com/wp-content/themes/inove/img/hdot2.gif) 50% 100% repeat-x scroll transparent; display: block; font-size: 12px; list-style: none; margin: 5px 0px 0px; padding: 5px 0px;"><a href="http://ccipt.blogspot.com/" style="color: #2970a6; text-decoration: none;" target="_blank">CCIP Website</a></li>
</ul>
<ul style="font-family: Verdana, 'BitStream vera Sans', Tahoma, Helvetica, sans-serif; font-size: 11.3999996185303px; font-weight: normal; line-height: 16.5300006866455px; margin: 0px; padding: 0px;">
<li class="cat-item" style="background: url(http://www.wirelesstut.com/wp-content/themes/inove/img/hdot2.gif) 50% 100% repeat-x scroll transparent; display: block; font-size: 12px; list-style: none; margin: 5px 0px 0px; padding: 5px 0px;"><a href="http://cciet.blogspot.com/" style="color: #2970a6; text-decoration: none;" target="_blank">CCIE Website</a></li>
</ul>
</h2>
<ul style="margin: 0px; padding: 0px;">
</ul>
</div>
<a href="http://www.ba7tdirasi.us/" style="color: #000099;" target="_blank">ba7tdirasi.us</a> <a href="https://manage.www.namecheap.com/myaccount/domain-list.asp#" style="color: #000099;"><img align="bottom" alt="Info" border="0" height="10" src="https://files.namecheap.com/graphics/icons/popup.gif" style="border: 0px;" title="Info" width="8" /></a><br />
<br />
<a href="http://www.droitcasa.us/" style="color: #000099;" target="_blank">droitcasa.us</a> <a href="https://manage.www.namecheap.com/myaccount/domain-list.asp#" style="color: #000099;"><img align="bottom" alt="Info" border="0" height="10" src="https://files.namecheap.com/graphics/icons/popup.gif" style="border: 0px;" title="Info" width="8" /></a><br />
<br />
<a href="http://www.footkoora.us/" style="color: #000099;" target="_blank">footkoora.us</a> <a href="https://manage.www.namecheap.com/myaccount/domain-list.asp#" style="color: #000099;"><img align="bottom" alt="Info" border="0" height="10" src="https://files.namecheap.com/graphics/icons/popup.gif" style="border: 0px;" title="Info" width="8" /></a><br />
<br />
<a href="http://www.nabolsi.link/" style="color: #000099;" target="_blank">nabolsi.link</a> <a href="https://manage.www.namecheap.com/myaccount/domain-list.asp#" style="color: #000099;"><img align="bottom" alt="Info" border="0" height="10" src="https://files.namecheap.com/graphics/icons/popup.gif" style="border: 0px;" title="Info" width="8" /></a><br />
<br />
<a href="http://www.shahiya.us/" style="color: #000099;" target="_blank">shahiya.us</a> <a href="https://manage.www.namecheap.com/myaccount/domain-list.asp#" style="color: #000099;"><img align="bottom" alt="Info" border="0" height="10" src="https://files.namecheap.com/graphics/icons/popup.gif" style="border: 0px;" title="Info" width="8" /></a><br />
<br />
<a href="http://www.top8top.com/" style="color: #000099;" target="_blank">top8top.com</a> <a href="https://manage.www.namecheap.com/myaccount/domain-list.asp#" style="color: #000099;"><img align="bottom" alt="Info" border="0" height="10" src="https://files.namecheap.com/graphics/icons/popup.gif" style="border: 0px;" title="Info" width="8" /></a><br />
<br />
<a href="http://www.willbepro.us/" style="color: #000099;" target="_blank">willbepro.us</a> <a href="https://manage.www.namecheap.com/myaccount/domain-list.asp#" style="color: #000099;"><img align="bottom" alt="Info" border="0" height="10" src="https://files.namecheap.com/graphics/icons/popup.gif" style="border: 0px;" title="Info" width="8" /></a>
jcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0