Trang

Ads by google

ROUTE Chapter 1 CCNP 6.0 2012 100% - Take Assessment – ROUTE Chapter 1 – CCNP ROUTE: Implementing Cisco IP Routing (Version 6.0) – Answers – 2011 – 2012

Tuesday, December 13, 2011

1. Which route description best defines a floating static route?
a route with a metric equal to the metric of a corresponding dynamic route
a route with a metric less than the metric of a corresponding dynamic route
a route with a metric greater than the metric of a corresponding dynamic route
a route with an administrative distance less than the administrative distance of a corresponding dynamic route
a route with an administrative distance greater than the administrative distance of a corresponding dynamic route
2. The OSPF routing protocol is enabled on a network. The administrator would like to enable a floating static route to be used as a backup. Which is the correct setting for the administrative distance of the floating static route?
0
1
50
100
120
3. The following line was displayed in the output of the show ip route command:
192.168.3.0/24 [120/2] via 192.168.2.2, 00:00:30, Serial0/0
Which routing protocol is the source for this route?

BGP
EIGRP
ODR
OSPF
RIP
4. What is the administrative distance of EIGRP-learned routes that have been injected into EIGRP via redistribution?
1
90
100
110
170
180
5. For ODR learned routes, what is the default administrative distance and metric that is displayed by the show ip route command?
[160/0]
[160/1]
[170/0]
[170/1]
6. Which type of traffic should receive the highest level of priority by QoS mechanisms in a converged network design?
real-time traffic
transactional traffic
routing protocol traffic
network management traffic
7. In a converged network, which two types of traffic would be categorized as real-time traffic? (Choose two.)
e-mail
file transfer
web browsing
videoconferencing
voice over IP
8. What is the role of QoS in a converged network?
to ensure that real-time traffic is not delayed
to give highest priority to transactional traffic
to ensure that all traffic above available bandwidth levels is dropped
to protect against the impact of worms, viruses, and other network attacks
9. What are two Intelligent Information Network phases that involve sharing resources and making the network “application aware”? (Choose two.)
integrated applications
integrated standards
integrated services
integrated security
integrated transport
10. Which statement about the Intelligent Information Network (IIN) is true?
The IIN is an industry-standard approach to designing a modern network.
The IIN is a framework that describes how to build a Service-Oriented Network Architecture (SONA).
The IIN defines a network design of three hierarchal layers consisting of the core, distribution, and access layers.
The IIN offers end-to-end functionality and a centralized, unified control that promotes true business transparency and agility.
11. Which feature defines functionality that is found in the integrated services phase of IIN?
making the network application-aware
pooling and sharing IT resources through virtualization
consolidating voice, video, and data into the IP network
content caching, load balancing, and application-level security
12. In which PPDIOO phase do key decision makers identify the initial business and technical requirements?
Design Phase
Implement Phase
Operate Phase
Optimize Phase
Plan Phase
Prepare Phase
13. In which PPDIOO phase is the actual network configured and verified?
Design Phase
Implement Phase
Operate Phase
Optimize Phase
Plan Phase
Prepare Phase
14. Which two statements are true about an implementation plan approach? (Choose two.)
In an ad hoc approach, the Cisco Lifecycle Services framework could be used to complete a task.
In an ad hoc approach, the network engineer identifies the need for a change and implements the solution without planning any of the tasks.
In an ad hoc approach, the network engineer identifies the need for a change and starts with planning as the first step.
In a structured approach, it is more likely that scalability issues, suboptimal routing, and security issues will occur.
In a structured approach, the Fault, Configuration, Accounting, Performance, and Security (FCAPS) model could be used to complete a task.
In a structured approach, the network engineer identifies the need for an upgrade and starts with configuring as the first step.
15. Which two statements are true about the structured approach model? (Choose two.)
The Cisco Lifecycle Services approach defines six phases including the prepare, plan, design, implement, operate, and optimize phases.
The Fault, Configuration, Accounting, Performance, and Security (FCAPS) model identifies the implementation plan in the Fault management category.
The Fault, Configuration, Accounting, Performance, and Security (FCAPS) model identifies the implementation plan and the implementation as part of FCAPS best practices.
The IT Infrastructure Library (ITIL) model is defined by the International Organization for Standardization (ISO).
The Prepare, Plan, Design, Implement, Operate, and Optimize (PPDIOO) model identifies the implementation plan as part of the Design phase and the actual implementation as part of the Implement phase.
The Telecommunications Management Network (TMN) model is similar to the PPDIOO model.
16. Which three steps are completed in the first three phases of the Prepare, Plan, Design, Implement, Operate, and Optimize (PPDIOO) model? (Choose three.)
Archive the documentation for future use.
Characterize the existing network and sites.
Design the network topology and solutions.
Identify customer requirements.
Implement and verify the design.
Monitor and optionally redesign.
17. Which two steps are completed in the last three phases of the Prepare, Plan, Design, Implement, Operate, and Optimize (PPDIOO) model? (Choose two.)
Characterize the existing network and sites.
Configure and verify the design.
Design the network topology and solutions.
Document the existing network information.
Identify customer requirements.
Monitor and optionally redesign.
18. The ABC Corporation implements the network for its new headquarters via the use of the Cisco Enterprise Architecture. The network administrator wants to filter the traffic from and to the outside world. Where should the administrator deploy a firewall device?
server farm
enterprise edge
enterprise campus
service provider edge
19. When designing a network infrastructure, a network engineer will use the hierarchical network model. What two factors must be taken into account when designing the core layer? (Choose two.)
packet manipulation to prioritize the flow of core data
redundant links to ensure fault tolerance
routing protocols that are chosen for the speed of network convergence
access control lists to curtail core layer traffic
star network topologies to reduce core layer latency
20. Which two functions are performed at the distribution layer of the hierarchical network model? (Choose two.)
summarizing routes from the access layer
providing high-speed backbone switching services
allowing end users to access the local network
providing the gateway of last resort for core layer devices
isolating network problems to prevent them from affecting the core layer