.

ccna 1 chapter 11 answers 2013

CCNA 1 Chapter 11 v5.0 Exam Answers 

2013CCNA 1 Chapter 11

 


ccna 1 chapter 11 answers 2013

1
ccna 1 chapter 11 answers 2013
ccna 1 chapter 11 answers 2013

2
The failure rate in a certain brand of network interface card has been determined to be 15%. How many cards could be expected to fail in a company that has 80 of the cards installed? 10
12*
15
8
3
If a technician uses an average of 2 cans of compressed air per week for cleaning, how many cans should be ordered for 8 technicians over the next 10 weeks?
16
20
200
80
160*
4
A local real estate company can have its 25 computer systems upgraded for $1000. If the company chooses only to upgrade 10 systems, how much will the upgrade cost if the same rate is used?
$100
$200
$400*
$600
$500
5
Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below.
11100111*
11100101
11101110
11110110
11011011
11110010
6
Which is a characteristic of the Internet?
It is not centrally governed.*
It is localized to specific geographic locations.
It uses only physical addresses.
It uses private IP addressing.
7
Which command can be used to test connectivity between two computers that are attached to a network?
nbtstst -s
ifconfig
winipcfg
ping*
ipconfig
8
Which two devices provide permanent data storage? (Choose two.)
hard drive*
keyboard
Blu-Ray disc*
RAM
monitor
9
ccna 1 chapter 11 answers 2013

ccna 1 chapter 11 answers 2013
10
Convert the binary number 10111010 into its hexadecimal equivalent. Select the correct answer from the list below.
A1
BA*
85
B3
1C
90
11
What is a function of the BIOS?
provides graphic capabilities for games and applications
provides temporary data storage for the CPU
enables a computer to connect to a network
performs a power-on self test of internal components*
12
A person-hour is the amount of work that the average worker can do in one hour. It is anticipated that a company-wide system upgrade will take approximately 60 person-hours to complete. How long will it take five technicians to perform the refresh?
8 hours
10 hours
5 hours
12 hours*
13
p13 exa11 ccna1
p13 exa11 ccna1 respuesta
14
p14 exa11 ccna1
p14 exa11 ccna1 respuesta
15
p15 exa11 ccna1
p15 exa11 ccna1 respuesta
16
A company is expanding its business to other countries. All branch offices must remain connected to corporate headquarters at all times. Which network technology is required to support this requirement?
MAN
WAN*
WLAN
LAN
17
Which subnet would include the address 192.168.1.96 as a usable host address?
192.168.1.64/29
192.168.1.64/26*
192.168.1.32/28
192.168.1.32/27
18
What is the purpose of having a converged network?
to achieve fault tolerance and high availability of data network infrastructure devices
to reduce the cost of deploying and maintaining the communication infrastructure*
to provide high speed connectivity to all end devices
to make sure that all types of data packets will be treated equally
19
A user is having problems accessing the Internet. The command ping www.cisco.com fails. However, pinging the IP address of cisco.com with the command ping 198.133.219.25 is successful. What is the problem?
The default gateway is incorrect.
There is a problem with DNS.*
The address of the ARP cache is incorrect.
The web server is down.
20
p20 exa11 ccna1
Refer to the exhibit. Host_A is preparing to send data to Server_B. How will Host_A address the packets and frames that will carry this data? (Choose two.)
The packet destination will be addressed with the IP address of the Router_B interface that is attached to Router_A.
The frame destination will be addressed with the MAC address of Server_B.
The packet destination will be addressed with the IP address of Server_B.*
The frame destination will be addressed with the MAC address of Switch_A.
The packet destination will be addressed with the IP address of the Router_A LAN interface.
The frame destination will be addressed with the MAC address of the Router_A LAN interface.*
21
Which three IP addresses are private ? (Choose three.)
10.1.1.1*
224.6.6.6
172.32.5.2
172.16.4.4*
192.167.10.10
192.168.5.5*
22
What is the general term that is used to describe a piece of data at any layer of a networking model?
segment
frame
protocol data unit*
packet
23
Which function is provided by TCP?
detection of missing packets*
path determination for data packets
communication session control
data encapsulation
24
Which option shows the proper notation for an IPv6 address?
2001.0db8.3c55.0015.abcd.ff13
2001-0db8-3c55-0015-abcd-ff13
2001,0db8,3c55,0015,abcd,ff13
2001:0db8:3c55:0015::abcd:ff13*
25
p25 exa11 ccna1
Refer to the exhibit.
Using the network in the exhibit, what would be the default gateway address for host A in the 192.133.219.0 network?
192.133.219.1*
192.133.219.0
192.135.250.1
192.31.7.1
26
Which technology provides a solution to IPv4 address depletion by allowing multiple devices to share one public IP address?
NAT*
DHCP
SMB
HTTP
ARP
DNS
27
A technician uses the ping 127.0.0.1 command. What is the technician testing?
the TCP/IP stack on a network host*
connectivity between two adjacent Cisco devices
connectivity between two PCs on the same network
physical connectivity of a particular PC and the network
connectivity between a PC and the default gateway
28
What is the purpose of ICMP messages?
to ensure the delivery of an IP packet
to inform routers about network topology changes
to provide feedback of IP packet transmissions*
to monitor the process of a domain name to IP address resolution
29
Which basic process is used to select the best path for forwarding data?
encapsulation
addressing
routing*
switching
30
Which wireless security procedure should be used to hide the WLAN ID from wireless clients?
Configure WEP only on the access point.
Configure MAC address filtering on the access point.
Decrease the antenna spectrum on each wireless client.
Install WAP on the wireless clients.
Disable the broadcast of the SSID on the access point.*
31
What statement describes the function of the Address Resolution Protocol?
ARP is used to discover the MAC address of any host on the local network.*
ARP is used to discover the IP address of any host on the local network.
ARP is used to discover the IP address of any host on a different network.
ARP is used to discover the MAC address of any host on a different network.
32
A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?
dial-up
cell modem
satellite
DSL*
cable modem
33
What is an advantage of using IPv6 ?
higher bandwidth
more addresses for networks and hosts*
more frequencies
faster connectivity
34
Which device should be used for enabling a host to communicate with another host on a different network?
router*
hub
switch
host
35
What is the purpose of the routing process?
to encapsulate data that is used to communicate across a network
to select the paths that are used to direct traffic to destination networks*
to convert a URL name into an IP address
to provide secure Internet file transfer
to forward traffic on the basis of MAC addresses
36
Which type of connector does a network interface card use?
DIN
RJ-11
RJ-45*
PS-2
37
Why would a network administrator use the tracert utility?
to display the IP address, default gateway, and DNS server address for a PC
to check information about a DNS name in the DNS server
to determine the active TCP connections on a PC
to identify where a packet was lost or delayed on a network*
38
How does a networked server manage requests from multiple clients for different services?
The server uses IP addresses to identify different services.
Each request is tracked through the physical address of the client.
The server sends all requests through a default gateway.
Each request is assigned source and destination port numbers.*
39
Which protocol translates a website name such as www.cisco.com into a network address?
FTP
DHCP
HTTP
DNS*
40
p40 exa11 ccna1
Refer to the exhibit. Consider the IP address configuration shown from PC1. What is a description of the default gateway address?
It is the IP address of the Router1 interface that connects the PC1 LAN to Router1.*
It is the IP address of Switch1 that connects PC1 to other devices on the same LAN.
It is the IP address of the Router1 interface that connects the company to the Internet.
It is the IP address of the ISP network device located in the cloud.

ccna 1 chapter 11 answers 2013 ,ccna 1,ccna 1,chapter 11,ccna 1 chapter 11 exam,cisco, sico ccna 1

How to upgrade upload internet speed?


How to upgrade upload internet speed? 

how to increase my internet upload speed?

Anyone who has used the Internet has experienced a slow connection. Be it cable, dial up or DSL, if you're on the Internet, you're going to experience bad connection rates. Slow upload speed can cause the normally docile computer owner to want to pull his hair out and throw the computer out the window. A slow upload speed can be due to a number of reasons.

 An out of date browser, add-ons and malicious software can all be causes for your slow upload speed. The best way to increase your upload speed is to increase your overall Internet speed.


for upgrade upload internet speed red this instructions  click here

CCNA 3 Chapter 1 Answers



CCNA 3 Chapter 1

CCNA 3 Chapter 1 V4.0 Answers

CCNA 3 Chapter 1 Answers


1. Which layer of the hierarchical network design model is refered to as the high-speed backbone of the internetwork, where high availability and redundancy are critical?
access layer
core layer
data-link layer
distribution layer
network layer
physical layer

2. Which two characteristics are associated with enterprise level switches? (Choose two.)
low port density
high forwarding rate
high latency level support link aggregation
predefined number of ports


3. Which feature supports higher throughput in switched networks by combining multiple switch ports?
convergence
redundant links
link aggregation
network diameter

4. Which hierarchical design model layer controls the flow of network traffic using policies and delineates broadcast domains by performing routing functions between virtual LANs (VLANs)?
application
access
distribution
network
core

5. What is the likely impact of moving a conventional company architecture to a completely converged network?
Local analog phone service can be completely outsourced to cost-effective providers.
The Ethernet VLAN structure is less complex.
A shared infrastructure is created resulting in a single network to manage.
QoS issues are greatly reduced.
There is less bandwidth competition between voice and video streams.

6.
CCNA3Chapter11 thumb CCNA 3 Chapter 1 V4.0 Answers
Refer to the exhibit. Beginning with HR servers and workstations, a network engineer is designing a new security structure for the network. Which set of policies adheres to the hierarchical network model design principles?
Implement Layer 3 switching on S1 to reduce the packet processing load on D1 and D2. Install all security processing on S1 to reduce network traffic load.
Configure port security options on S1. Use Layer 3 access control features on D1 and D2 to limit access to the HR servers to just the HR subnet.
Move all HR assets out of the data center and connect them to S1. Use Layer 3 security functions on S1 to deny all traffic into and out of S1.
Perform all port access and Layer 3 security functions on C1.

7. Which three features are commonly supported at the distribution layer of the Cisco hierarchical network model? (Choose three.)
security policies
Power over Ethernet
switch port security
quality of service
Layer 3 functionality
end user access to network

8. Configuring communication between devices on different VLANs requires the use of which layer of the OSI model?
Layer 1
Layer 3
Layer 4
Layer 5

9. Which layer of the OSI model does an access layer LAN switch use to make a forwarding decision?
Layer 1
Layer 2
Layer 3
Layer 4

10. Which two features are supported at all three levels of the Cisco three-layer hierarchical model? (Choose two.)
Power over Ethernet
load balancing across redundant trunk links
redundant components
Quality of Service
link aggregation

11. A network technician is asked to examine an existing switched network. Following this examination, the technician makes recommendations for adding new switches where needed and replacing existing equipment that hampers performance. The technician is given a budget and asked to proceed. Which two pieces of information would be helpful in determining necessary port density for new switches? (Choose two.)
forwarding rate
traffic flow analysis
expected future growth
number of required core connections
number of hubs that are needed in the access layer to increase performance

12. Which hierarchical design characteristic would be recommended at both the core and distribution layers to protect the network in the case of a route failure?
PoE
redundancy
aggregation
access lists

13. At which heirarchical layer are switches normally not required to process all ports at wire speed?
core layer
distribution layer
access layer
entry layer

14. For organizations that are implementing a voice over IP solution, what functionality should be enabled at all three layers of the hierarchical network?
Power over Ethernet
quality of service
switch port security
inter-VLAN routing

15. A network administrator is selecting a switch that will operate at the network core. Which three features should the switch support for optimum network performance and reliability? (Choose three.)
port security
security policies
10 Gigabit Ethernet
quality of service (QoS)
hot-swappable hardware
Power over Ethernet (PoE)

16. Link aggregation should be implemented at which layer of the hierarchical network?
core only
distribution and core
access and distribution
access, distribution, and core

17. What statement best describes a modular switch?
a slim-line chassis
allows interconnection of switches on redundant backplane
defined physical characteristics
flexible characteristics

18. Which layer of the hierarchical design model provides a means of connecting devices to the network and controlling which devices are allowed to communicate on the network?
application
access
distribution
network
core

19. A technician is attempting to explain Cisco StackWise technology to a client that is setting up three stackable switches. Which explanation accurately describes StackWise technology?
StackWise technology allows up to eight ports to be bound together to increase available bandwidth.
StackWise technology allows the switch to deliver power to end devices by using existing Ethernet cabling.
StackWise technology allows the switch capabilities and ports to be expanded by the addition of line cards.
StackWise technology allows up to nine switches to be interconnected via the use of a fully redundant backplane.

20.
CCNA3Chapter12 thumb CCNA 3 Chapter 1 V4.0 Answers
Refer to the exhibit. What characteristic of hierarchical network designs is exhibited by having SW3 connected to both SW1 and Sw2?
scalability
security
redundancy
maintainability

ccna 3 final exam, ccna 3 chapter 1, ccna 3 chapter 5 answers, CCNA 1 chapter 3 answers, ccna 3 chapter 1 answers, CCNA 1 Chapter 3, ccna 3 answers, Refer to the exhibit A network administrator has designed and implemented a hierarchical network What is the maximum network diameter between any two hosts on the network?, ccna3 chapter 1, Which layer of the hierarchical network design model is refered to as the high-speed backbone of the internetwork where high availability and redundancy are critical?

Tags: , , , , , , ,

CCNA 3 Chapter 2 Answers

 CCNA 3 Chapter 2 V4.0 Answers

 CCNA 3 Chapter 2
 Answers CCNA 3 Chapter 2

CCNA 3 Chapter Answers

1. If a network administrator enters these commands on a switch, what will be the result?
Switch1(config-line)# line console 0
Switch1(config-line)# password cisco
Switch1(config-line)# login
to secure the console port with the password "cisco"
to deny access to the console port by specifying 0 lines are available
to gain access to line configuration mode by supplying the required password
to configure the privilege exec password that will be used for remote access

2. Which command line interface (CLI) mode allows users to configure switch parameters, such as the hostname and password?
user EXEC mode
privileged EXEC mode
global configuration mode
interface configuration mode




3. What happens when the transport input ssh command is entered on the switch vty lines?

The SSH client on the switch is enabled.
Communication between the switch and remote users is encrypted.
A username/password combination is no longer needed to establish a secure remote connection to the switch.
The switch requires remote connections via proprietary client software.

4. A network administrator uses the CLI to enter a command that requires several parameters. The switch responds with "% Incomplete command". The administrator cannot remember the missing parameters. What can the administrator do to get the parameter information?
append ? to the last parameter
append a space and then ? to the last parameter
use Ctrl-P to show a parameter list use the Tab key to show which options are available

5. When a switch receives a frame and the source MAC address is not found in the switching table, what action will be taken by the switch to process the incoming frame?
The switch will request that the sending node resend the frame.
The switch will issue an ARP request to confirm that the source exists.
The switch will map the source MAC address to the port on which it was received.
The switch ends an acknowledgement frame to the source MAC of this incoming frame.

6.
CCNA3Chapter21 thumb CCNA 3 Chapter 2 V4.0 Answers
Refer to the exhibit. The switch and workstation are administratively configured for full-duplex operation. Which statement accurately reflects the operation of this link?
No collisions will occur on this link.
Only one of the devices can transmit at a time.
The switch will have priority for transmitting data.
The devices will default back to half duplex if excessive collisions occur.

7.
CCNA3Chapter22 thumb CCNA 3 Chapter 2 V4.0 Answers
Refer to the exhibit. The exhibit shows partial output of the show running-config command. The enable password on this switch is "cisco." What can be determined from the output shown?
The enable password is encrypted by default.
An MD5 hashing algorithm was used on all encrypted passwords.
Any configured line mode passwords will be encrypted in this configuration.
This line represents most secure privileged EXEC mode password possible.

8. Which two statements about Layer 2 Ethernet switches are true? (Choose two.)
Layer 2 switches prevent broadcasts.
Layer 2 switches have multiple collision domains.
Layer 2 switches route traffic between different networks.
Layer 2 switches decrease the number of broadcast domains.
Layer 2 switches can send traffic based on the destination MAC address.

9. Which statement is true about the command banner login "Authorized personnel Only" issued on a switch?
The command is entered in privileged EXEC mode.
The command will cause the message Authorized personnel Only to display before a user logs in.
The command will generate the error message % Ambiguous command: "banner motd" ” to be displayed.
The command will cause the message End with the character “%” to be displayed after the command is entered into the switch.

10. When a collision occurs in a network using CSMA/CD, how do hosts with data to transmit respond after the backoff period has expired?
The hosts return to a listen-before-transmit mode.
The hosts creating the collision have priority to send data.
The hosts creating the collision retransmit the last 16 frames.
The hosts extend their delay period to allow for rapid transmission.

11. Which two statements are true about EXEC mode passwords? (Choose two.)
The enable secret password command stores the configured password in plain text.
The enable secret password command provides better security than the enable password.
The enable password and enable secret password protect access to privileged EXEC mode.
The service password-encryption command is required to encrypt the enable secret password.
Best practices require both the enable password and enable secret password to be configured and used simultaneously.

12.
CCNA3Chapter23 thumb CCNA 3 Chapter 2 V4.0 Answers
Refer to the exhibit. How many collision domains are depicted in the network?
1
2
4
6
7
8

13. Which two statements are true regarding switch port security? (Choose two.)
The three configurable violation modes all log violations via SNMP.
Dynamically learned secure MAC addresses are lost when the switch reboots.
The three configurable violation modes all require user intervention to re-enable ports.
After entering the sticky parameter, only MAC addresses subsequently learned are converted to secure MAC addresses.
If fewer than the maximum number of MAC addresses for a port are configured statically, dynamically learned addresses are added to CAM until the maximum number is reached.

CCNA 3 Chapter  Answers



14. What are two ways to make a switch less vulnerable to attacks like MAC address flooding, CDP attacks, and Telnet attacks? (Choose two.)
Enable CDP on the switch.
Change passwords regularly.
Turn off unnecessary services.
Enable the HTTP server on the switch.
Use the enable password rather than the enable secret password.

15.
CCNA3Chapter24 thumb CCNA 3 Chapter 2 V4.0 Answers
Refer to the exhibit. What action does SW1 take on a frame sent from PC_A to PC_C if the MAC address table of SW1 is empty?
SW1 drops the frame.
SW1 floods the frame on all ports on SW1, except port Fa0/1.
SW1 floods the frame on all ports on the switch, except Fa0/23 and Fa0/1.
SW1 uses the CDP protocol to synchronize the MAC tables on both switches and then forwards the frame to all ports on SW2.

16.
CCNA3Chapter25 thumb CCNA 3 Chapter 2 V4.0 Answers
Refer to the exhibit. The network administrator has decided to allow only Secure Shell connections to Switch1. After the commands are applied, the administrator is able to connect to Switch1 using both Secure Shell and Telnet. What is most likely the problem?
incorrect vty lines configured
incorrect default gateway address
incompatible Secure Shell version
missing transport input ssh command
vty lines that are configured to allow only Telnet

17. Where is the startup configuration stored?
DRAM
NVRAM
ROM
startup-config.text

CCNA 3 Chapter  Answers



18.
CCNA3Chapter26 thumb CCNA 3 Chapter 2 V4.0 Answers
Refer to the exhibit. The switch and the hub have default configurations, and the switch has built its CAM table. Which of the hosts will capture a copy of the frame when workstation A sends a unicast packet to workstation C?
workstation C
workstations B and C
workstations A, B, C, and the interfaces of the router
workstations B, C, D, E, F, and interfaces of the router

19.
CCNA3Chapter27 thumb CCNA 3 Chapter 2 V4.0 Answers
Refer to the exhibit. What happens when Host 1 attempts to send data?
Frames from Host 1 cause the interface to shut down.
Frames from Host 1 are dropped and no log message is sent.
Frames from Host 1 create a MAC address entry in the running-config.
Frames from Host 1 will remove all MAC address entries in the address table.

20.
CCNA3Chapter28 thumb CCNA 3 Chapter 2 V4.0 Answers
Refer to the exhibit. Which hosts will receive a broadcast frame sent from Host A?
hosts A and B
hosts B and C
hosts D and E
hosts A, B, and C
hosts B, C, D, and E
hosts A, B, C, D, E, and F


ccna answers, ccna 3 chapter 2, ccna 3 chapter 2 answers, ccna 1 final, What are two purposes for configuring a banner on a router, When a switch receives a frame and the source MAC address is not found in the switching table what action will be taken by the switch to process the incoming frame?, What are the default terminal emulation software settings when configuring a Cisco device through a console port?, cisco 3 chapter 2 answers, ccna 3 chapter 2 exam answers, ccna3 chapter 2

cana 4 chapter 3 answers 2013

Take Assessment – EWAN Chapter 3 – CCNA Exploration: Accessing the WAN (Version 4.0) - Answers – 2012 – 2013

 
cana 4 chapter 3 answers 2013

cana 4 chapter 3 answers 2013

1. Which three actions might a Frame Relay switch perform when it detects an excessive build-up of frames in its queue? (Choose three.)
puts a hold on accepting frames in excess of the CIR
drops frames from the queue that have the DE bit set
reduces the number of frames it sends over the link
re-negotiates flow control with the connected device
sets the FECN bit on all frames it receives on the congested link
sets the BECN bit on all frames it places on the congested link
2. Which best describes the benefit of using Frame Relay as opposed to a leased line or ISDN service?
Customers can define their virtual circuit needs in far greater combinations, with increments as small as 64 kbps.
Customers pay for an end-to-end connection that includes the local loop and the network link.
Customers only pay for the local loop and the bandwidth they purchase from the network provider.
Connecting new sites requires new lower cost circuit installations when compared to ISDN dialup costs or adding additional hardware for leased service.
3.
cana 4 chapter 3 answers 2013
Refer to the exhibit. Router R1 has been configured for Frame Relay connectivity to routers R2 and R3. What configuration option should be configured on the R2 and R3 serial interfaces in order for all routers to ping each other successfully?
R2(config-if)# frame-relay interface-dlci 201 broadcast
R3(config-if)# frame-relay interface-dlci 301 broadcast
R2(config-if)# frame-relay map ip 10.1.1.1 201 broadcast
R3(config-if)# frame-relay map ip 10.1.1.1 301 broadcast
R2(config-if)# frame-relay map ip 10.1.1.3 201 broadcast
R3(config-if)# frame-relay map ip 10.1.1.2 301 broadcast
R2(config-if)# frame-relay map ip 10.1.1.1 201 broadcast
R2(config-if)# frame-relay map ip 10.1.1.3 201 broadcast
R3(config-if)# frame-relay map ip 10.1.1.1 301 broadcast
R3(config-if)# frame-relay map ip 10.1.1.2 301 broadcast
4. Which two items allow the router to map data link layer addresses to network layer addresses in a Frame Relay network? (Choose two.)
ARP
RARP
Proxy ARP
Inverse ARP
LMI status messages
ICMP
5.
cana 4 chapter 3 answers 2013
Refer to the exhibit. Which two outcomes occur from the configuration shown? (Choose two.)
The broadcasts will be forwarded to 10.1.1.1.
The router will use DLCI 22 to forward data to 10.1.1.1.
DLCI 22 will replace the MAC address in the ARP table for entry 10.1.1.1
Inverse-ARP will now add an entry for 10.1.1.1 into the Frame Relay map table using DLCI 22.
Frames sent by 10.1.1.1 arriving on interface serial 0/0/0 of RT_1 will have a data link layer address of 22.
6. Refer to the exhibit. What can be determined about the Frame Relay switch from the output shown?
It is currently not transmitting data.
It is in the process of establishing the PVC.
It has put a hold on processing frames in excess of the CIR.
It is experiencing congestion.
7.
cana 4 chapter 3 answers 2013
Refer to the exhibit. What can be determined from the output?
Serial 0/0/0 has been configured with an DLCI of 201.
Serial 0/0/0 has the feature frame-relay inverse-arp enabled.
Serial 0/0/0 has been configured with an IP address of 172.16.4.3.
Serial 0/0/0 has been configured with the command frame-relay map ip 172.16.4.3 201 broadcast.
8.
071 EWAN Chapter 3 CCNA 4 4.0 2012 2013 100%
Refer to the exhibit. What effect does the point-to-point configuration on subinterface S0/0.110 have on the operation of the router?
It helps to conserve IP addresses.
It establishes multiple PVC connections to multiple physical interfaces.
It eliminates split horizon issues without increasing the likelihood of routing loops.
It requires the configuration of the encapsulation command on the subinterface.
9.
161 EWAN Chapter 3 CCNA 4 4.0 2012 2013 100%
Refer to the exhibit. Which statement explains why the Frame Relay connection between R1 and R2 is failing?
Split horizon must be disabled.
The LMI type must be specified.
Logical subinterfaces must be used instead.
The frame-relay map commands are using incorrect DLCIs.
10. What best describes the use of a data-link connection identifier (DLCI)?
local address identifying a destination router across a Frame Relay network
locally significant address used to identify a virtual circuit
logical address identifying the interface between a router and a Frame Relay switch
logical address used to identify the DCE
11.
171 EWAN Chapter 3 CCNA 4 4.0 2012 2013 100%
Refer to the exhibit. Router R1 has been configured for Frame Relay connectivity to routers R2 and R3. Which set of configuration options for routers R2 and R3 would provide each router connectivity to R1?
R2(config)# interface serial0/0/1
R2(config-if)# frame-relay map ip 10.1.1.1 102
R3(config)# interface serial0/0/1
R3(config-if)# frame-relay map ip 10.1.2.1 103
R2(config)# interface serial0/0/1
R2(config-if)# frame-relay map ip 10.1.1.1 102
R2(config-if)# frame-relay map ip 10.1.2.3 301
R3(config)# interface serial0/0/1
R3(config-if)# frame-relay map ip 10.1.2.1 103
R3(config-if)# frame-relay map ip 10.1.1.2 201
R2(config)# interface serial0/0/1.201 point-to-point
R2(config-if)# no frame-relay invers-arp
R3(config)# interface serial0/0/1.301 point-to-point
R3(config-if)# no frame-relay invers-arp
R2(config)# interface serial0/0/1.201 point-to-point
R2(config-if)# frame-relay interface-dlci 201
R3(config)# interface serial0/0/1.301 point-to-point
R3(config-if)# frame-relay interface-dlci 301
12.
121 EWAN Chapter 3 CCNA 4 4.0 2012 2013 100%
Refer to the exhibit. Frame Relay connectivity has been configured in the network and OSPF is used as the routing protocol. Router R1 can successfully ping the router R2 serial interface. When R1 attempts to ping network 192.168.3.0/24 the ping fails. What additional configuration should be applied on all routers to remedy the problem?
Add the broadcast keyword in the Frame Relay map command on both routers.
Issue the frame-relay interface-dlci command in addition to the frame-relay map command on both router interfaces.
Remove the frame-relay map command and replace with the frame-relay interface-dlci command on both router interfaces.
Apply the no frame-relay inverse-arp command on both router interfaces.
13. Which statement about Frame Relay subinterfaces is correct?
Multipoint interfaces will automatically forward routing broadcasts but will consume more IP addresses than point-to-point subinterfaces will consume.
Point-to-point subinterfaces act like leased lines and eliminate split-horizon routing issues.
Interfaces with multiple PVCs require a separate subinterface for each PVC.
Multipoint configurations cannot use subinterfaces.
14.
1911 EWAN Chapter 3 CCNA 4 4.0 2012 2013 100%
Refer to the exhibit. What can be determined about the configuration of router R1 from the exhibited output?
LMI updates are not being received properly.
The LMI type for the Serial 0/0/0 interface has been left to its default configuration.
Cisco HDLC is used as a Layer 2 encapsulation protocol on the Serial 0/0/0 interface.
The Serial 0/0/0 interface has been configured as a data communications equipment device.
15. What is created between two DTEs in a Frame Relay network?
ISDN circuit
limited access circuit
switched parallel circuit
virtual circuit
16. Which Frame Relay topology is a compromise of costs, reliability, and complexity when the WAN contains one headquarters site, 40 regional sites, and several sites within each regional site?
star
full mesh
partial mesh
point-to-multipoint
point-to-point
17.
06 EWAN Chapter 3 CCNA 4 4.0 2012 2013 100%
Refer to the exhibit. A ping is sent to address 192.168.50.10 from the Peanut router. Which DLCI will be used to send the ping?
110
115
220
225
18. What two methods does Frame Relay technology use to process frames that contain errors? (Choose two.)
Frame Relay services depend on the upper layer protocols to handle error recovery.
It requires the receiving device to request that the sender retransmit erroneous frames.
FECN, BECN, and DE bits are set in the frames to minimize errors.
The receiving device drops any frames that contain errors without notifying the sender.
The frame relay switch notifies the sender that errors were detected.
19.
091 EWAN Chapter 3 CCNA 4 4.0 2012 2013 100%
Refer to the exhibit. Which two statements are true given the output shown? (Choose two.)
The IP address of the local Frame Relay interface is 172.16.1.4.
The local DLCI number is 401.
Inverse ARP is being used on this connection.
This interface is in the active state and in the process of negotiating configuration parameters.
Multicast is not enabled on this connection.
20.
182 EWAN Chapter 3 CCNA 4 4.0 2012 2013 100%
Refer to the exhibit. What can be known about the configuration of router R1 from the output?
The Frame Relay LMI DLCI has been incorrectly configured as DLCI 1023.
The Frame Relay LMI type has been changed from its default.
The Serial 0/0/0 interface has been configured as a data communications equipment device.
The command encapsulation frame-relay ietf has been used on the Serial 0/0/0 interface.
21. What consideration must be taken into account if RIP is used on Frame Relay multiaccess networks?
To forward routing updates, address-to-DLCI mapping must be done via the use of the frame-relay map command coupled with the broadcast keyword.
Inverse ARP must be enabled to turn routing update broadcasts into unicast traffic that can be propagated to other Frame Relay nodes.
Because broadcast traffic is not supported, RIPv1 cannot be implemented on Frame Relay networks.
To forward broadcast routing updates, dynamic mapping must be enabled.
22.
141 EWAN Chapter 3 CCNA 4 4.0 2012 2013 100%
Refer to the exhibit. You are a network administrator who has been tasked with completing the Frame Relay topology that interconnects two remote sites. Router HQ belongs to both the 172.16.1.0/24 and 172.16.2.0/24 subnets with IP addresses of 172.16.1.3 and 172.16.2.3 respectively. Traffic between R1 and R2 must travel through HQ first. How should the serial interface on HQ be configured to complete the topology?
one multipoint subinterface
two point-to-point subinterfaces
with the physical interface configured with two ip addresses
one IP address on a point-to-point subinterface and one IP address on the physical interface

ccna 4 chapter 3 answers 2013

tags ccna 4 chapter 3 answers 2013,ccna 4 chapter 3 answers,ccna 4,cisco,ccna 4 chapter 3

ccna 4 chapter 9

1
Which two statements describe factors that influence the layout of a
proposal? (Choose two.)

Proposal layouts are required to use sans serif typefaces.

A specific proposal layout is followed when one is specified in the RFP.

A designer chooses the layout if a written RFP does not specify an outline.


The software that is used to create the proposal dictates the proposal layouts.

Proposal layouts are required to use a format that is designed by the network engineer.


2
What two items are typically included in the executive summary of a
proposal? (Choose two.)

project scope summary

high-level implementation plan

quotes for all needed equipment

technical requirements for the design

emphasis on the benefits that meet the goals of the customer


3
Which proposal section describes the intended routing protocol, security
mechanisms, and addressing for the planned network?

logical design
physical design

executive summary

implementation plan

network requirements


4
Which occurrence would indicate a failure of the design phase?

The incorrect model switches were ordered.

There is no customer signoff for task completion.

New requirements are identified after implementation begins.

The new network capacity is inadequate to support required traffic.


5
A network installation team is assigned to replace all core switches in an
existing data center. No other upgrades are planned. Which kind of installation is this?

a new installation

a fork-lift installation

a phased installation

a green field installation

ccna 4 chapitre 9
 
6
What service is provided Cisco standard warranty?

software application maintenance

replacement of defected hardware

next business day delivery of replacement parts

access to the Cisco Technical Assistance Center (TAC) 24 hours a day, 7 days a week


7
An upgraded version of the Cisco IOS has been purchased. However,
the CD arrived damaged. How will this loss be covered?

a hardware warranty

a software warranty

the Cisco SMARTnet Service

an additional service contract


8
A company informs the account manager that the installation of a new
edge router at the customer remote branch location cannot be done at the scheduled time
because of a large order that the branch office needs to complete. As a result, the end date of the
project must be adjusted to accommodate the additional time. What is the action should the
account manager take?

Cancel the order for the new edge router.

Work with designer to redesign the branch network.

Instruct the technician to complete the install of the router at on the date in the contract.

Adjust the timeline documentation to show the company how the delay will affect the
project completion date.



9
NetworkingCompany completes the installation of a network upgrade for
a retail customer. All of the onsite tests complete successfully and the customer IT staff approves
the results of the tests. The manager of the retail store contacts NetworkingCompany to inform
the company that the store will not pay for the upgrade until a recently purchased software
package is installed and tested on the network. Which two items that are contained in the
proposal can the account manager refer to when discussing this issue with the store manager?(Choose two.)

the project scope

the bill-of-material

the project timeline

the terms and conditions

the business goals of the customer

the evaluation of the current network


10
The operation of a new branch location network is delayed because a
VPN cannot be configured and established between the branch location and the main office. It is
determined that the router at the main office does not have enough memory and does not have
the correct Cisco IOS version image to support the VPN features. To prevent this delay, this
problem should have been identified and corrected during which part of the design project?

the preparation of the business case

the prioritizing of the technical goals

the characterization of the existing network

the implementation of the approved design


11
The NetworkingCompany team is tasked to prepare an implementation
schedule for a customer. It is determined that the new firewalls and wireless controllers that are
specified in the design cannot be delivered and installed within the agreed upon time frame. The
NetworkingCompany informs the customer of the problem. What two options can the
NetworkingCompany team take to ensure the success of the project? (Choose two.)

plan to add additional staff and resources to shorten the installation time after the new
equipment is delivered


eliminate redundancy in the design to reduce the amount of equipment that is needed

renegotiate a new time frame with the customer to accommodate the delay

delay the installation of the security devices and controllers until a later time

redesign the network to use only readily available equipment and software


12
AAA Financial Services Company is performing implementation planning
for a core switch upgrade. The company has 200 financial software programmers that work
billable hours during the week. They have critical, scheduled money transfer transmissions that
occur at hourly intervals every night. There are two, two-hour long IT maintenance windows
scheduled for software upgrades, one on Saturday and one on Sunday. The bank advertises
online banking as available 24 hours on business days and 21 hours on the weekends. However,
a network upgrade that is necessary to replace some switches is expected to take four hours.
Because of rack constraints, this time includes three hours to remove the old switches before the
new switches can be installed and one hour to test the logical configuration. How should the
implementation scheduling be handled

Defer the software upgrades. Use the Saturday window to perform the hardware
installation. Use the Sunday window to perform the logical testing.

Coordinate and publish a separate four-hour downtime during Friday to perform the
complete switch installation and testing process. Use the Saturday and Sunday windows to
correct any outage problems after the Friday window.

Coordinate and publish two, four-hour downtimes incorporating the published Saturday
and Sunday windows. Defer any software upgrades until the new network is proven to be working
correctly with the old software. Use the Sunday window as a fallback scheduling period if there
are problems necessitating backing out of the Saturday window.

Coordinate and publish an eight-hour downtime incorporating the Saturday window. This
will allow four hours for installation and logical testing, one hour for troubleshooting and decision,
and three hours to roll back to the previous configuration if the new switching cannot pass the
logical testing. Defer any software upgrades until the new network is proven to be working
correctly with the old software.



13
Included in a Bill of Materials (BOM) for a SOHO wired implementation is
a Cisco 2811 router, Catalyst 2560 switch, four PCs, three laptops, and a networked printer.
Wireless LAN capability will be implemented on this network. Which two equipment types must be
added to the BOM to implement this request? (Choose two.)

DNS server

LAN switch

wireless NICs

DHCP server

wireless access points


14
A customer has just taken delivery of a Cisco 2811 router and Catalyst
3560 switch. Included with the purchase is the SMARTnet Service. Which two resources are
included with SMARTnet Service? (Choose two.)

signature file updates

technical support from TAC

maintenance releases for OS


software application major releases

software application maintenance and minor releases


15
A Cisco 1841 router has been purchased without an agreement for
SMARTnet Service. What two items are guaranteed under the standard warranty? (Choose two.)

access to TAC

replacement of defective physical media

advanced replacement of hardware parts

access to a renewable standard warranty contract

under normal use, replacement of defective hardware



16
Upon completion of a proposal, a network design team must sell their
ideas to two key stakeholders. Who are these two stakeholders? (Choose two.)

customers

licensing boards

cabling contractors

internal management

project implementation team


17
What are two important guidelines when creating a slide presentation for
a meeting with a customer? (Choose two.)

Use all capital letters on words and phrases when possible for added emphasis.

Provide varied background graphics to enhance viewer interest.

Use contrasting colors for background and text to aid visibility.

Change fonts frequently to denote differences in subject matter.

Use bulleted text to lead the discussion.



18
In order to finalize a project proposal, an account manager of a
networking company creates the terms and conditions section. What are two clauses that should
be included in this section? (Choose two.)

cost summary

installation steps

change order procedures

problem resolution process


maintenance contract quotation


19
Which two items will a systems engineer include in an implementation plan? (Choose two.)

references to design documents

the business goals of the customer

diagrams of the existing traffic flows

the steps to install and test the network

cost of each network device and component


20
Which statement describes a phased installation into an existing network?

A phased installation generally takes less time and expense than a green-field installation.

A phased installation is not suitable for large, multi-site network installations or upgrades.

A phased installation requires detailed planning in order to avoid disruption of user services.
A phased installation involves building an entire replacement network and migrating users
over to it.
tag: ccna 4 chapter 9 answers,ccna 4,ccna 4 chapter 9 ,chapter 9 ccna 4,ccna,cisco,ccna 4,ccna 2,ccna 4 chapter 9 answers

How to Uninstall Windows 8-Install Windows 7 on Your PC




How to Uninstall Windows 8-Install Windows 7 on Your PC



If you're fed up with the Windows 8 operating system that came on your new laptop, and just want to switch back to Windows 7, I've got good news, and bad news. The good news is that it is possible. You can remove Windows 8, install Windows 7, and go about your life as if Windows 8 never happened. The bad news is that it's a complicated endeavor.

In addition to the expected BIOS wrangling, drive formatting, and reinstalling device drivers, Microsoft has actually added extra layers of complexity. The BIOS has the added obstacle of the Unified Extensible Firmware Interface (UEFI). Drives are partitioned and protected so that it's difficult to reclaim all of the space on your hard drive. And finally, manufacturers are spotty at best when it comes to offering Windows 7 drivers and rarely support users in making the switch. The result is a snarled Gordian Knot of complications, but there's not necessarily a sword available to simplify the issue. This guide, however, should help you navigate the many twists and turns.

If you don't want to remove Windows 8 completely but still want to have your familiar Windows 7 experience, want to avoid compatibility issues with programs and games, or need a feature that's gone missing in the new OS, there are other options. Your best bet is actually running Windows 7 on a virtual machine—and we can suggest several.

If you're ready to embark on the journey back to Windows 7—it feels wrong to simply call it a downgrade—then gather your supplies, muster your courage, and let's dive in.

A Few Words of Warning

Microsoft does offer downgrade rights, complete with support services and a clear downgrade path to Windows 7, but only for systems with Windows 8 Pro. If you've just got plain old Windows 8—and most mainstream systems do—you're on your own. Switching between the two operating systems is still very doable, but you'll be doing it without Microsoft's blessing.

Related to this, you may also run into trouble getting support from your manufacturer, as most do not provide legacy support for Windows 7 on systems that were factory-shipped with Windows 8. This extends to drivers. You'll need to do your homework as to what your devices are, what drivers they require, and whether or not there are Windows 7 drivers available. Unfortunately, this will vary from model to model, and even from one configuration to the next.


Start by opening the device manager in your control panel. It will provide you with a list of all the different devices found on the system, from touchpad and keyboard to networking and Wi-Fi adapters. Don't skip this step, because you can't use the device without a working driver—meaning that without the proper drivers, you can easily find yourself stuck with a nearly unusable machine.

By digging into the properties of each device individually, you should be able to find the specific part model name, and information about the drivers. Some searching online will help you discover whether or not Windows 7 drivers are available for each part, but you will often need to track do each driver individually. The one exception to this is when the manufacturer offers two versions of the same model PC—both a Windows 8 configuration, and a Windows 7 version

The first place to check is the PC manufacturer's product support page. By looking up your specific PC model number, you should be able to locate a list of all the needed drivers for the laptop's hardware. If you're lucky, the manufacturer support page includes drivers for both Windows 8 and Windows 7, giving you everything you need for your entire PC. With one of our test PCs, this was all we needed to do, because all the device drivers were available.

If not, you'll need to take it one device at a time. Find the name of the manufacturer for each device and search for that company's website, which should have its own driver download page. If even this doesn't seem to help, you can always fire up your search engine and search for "[Device name] + Windows 7 Driver." That should bring up plenty of resources.

Be aware, however, that for some newer devices, drivers may not be available for Windows 7 and older operating systems. If this is the case, you may be out of luck—which is why you're looking all of this up beforehand.
Backing Up

Back up everything. Tech journalists often preach the importance of regularly backing up, but this is more than the usual preparation against hypothetical disaster—you're about to overwrite your hard drive. Everything on that drive will be gone. Files, programs, and the original operating system, all gone. Just because you want to ditch Windows 8 now doesn't mean you won't change your mind in the future. Additionally, you may want a way to revert back to Windows 8 should you ever need to take advantage of the warranty—there's worry that some manufacturers will void the warranty on the system if Win 8 is removed.

What You Need

First, you'll need Windows 7 installation media, either on disc or on a USB Key. Yes, Microsoft still sells it, as does Amazon. In addition to your installation media, you'll need a valid Windows 7 Product Key, the 25-digit alphanumeric code used to activate your copy of Windows. If you're installing from a brand-new copy of Windows, you're fine to use the product key that was included, but if you're using an older copy (or a copy of a copy) you'll need to pay for a new valid key.

You will also need a USB key (separate from your installation media) with drivers loaded on it. This is the result of the aforementioned homework—you really don't want to install Windows 7 without it.



windows 8 Open Settings by going to the Charms Bar and clicking on the Gear icon.

windows 8 Go to "Change PC Settings" at the bottom right corner of the screen, below the icons. On the left, scroll down and select "General Settings." On the right, scroll down through the settings options to find "Advanced Options."

Back to Windows 7 - UEFI Firmware Settings This will close out of the standard Metro interface and open up a blue screen with several tiles. Select "UEFI Firmware Settings"—you may need to first select "Tools and Settings" and then "Advance Options"—and then follow the prompt to restart and change settings.

Back to Windows 7 - Boot Options Upon rebooting, the system should produce a startup menu. Select "BIOS setup." Under the "System Configuration" tab, find "Boot Options." (In some instances, Boot Options will instead be found under the "Security" tab.)

Back to Windows 7 - Secure Boot/Legacy Support Once into the Boot Options menu, you will first find "Secure Boot" and disable it. Still in the Boot Options menu, find "Legacy Boot" and change it to enabled. You will now be able to boot into your Windows 7 installation media. Depending upon whether you will be installing it from a disc or a USB key, you will want to change the Legacy Boot Order so that either the optical drive or USB device take priority. Finally, exit the BIOS, saving changes. 


 
Commence Installing Windows 7
With Legacy Boot enabled and your boot order changed, you should now be able to boot into your installation media to begin installing Windows 7.

Back to Windows 7 - Install Start
The first thing you'll see is a prompt to begin installation. Back to Windows 7 - Language
Back to Windows 7 - License

Start the installation process, choose your language and region, and press "Install Now" to begin the process. Back to Windows 7 - Custom Installation

You'll be asked to agree to Microsoft's software license, and then to choose between an Upgrade or Custom installation. In this instance, you'll want to choose Custom. Back to Windows 7 - Drive Partitions

The next step is to choose the destination drive for the installed OS. At the very least, you'll want to install Windows 7 to your C: drive. If you want to wipe Windows 8 completely off of your system, this is the time to do it. Select the various partitions on the hard drive and go through the process of deleting each, and consolidating the free space. This all handled in the installer, which gives you the option to delete or format each partition as it's selected. But beware—this is the Rubicon of OS installation. Once those drives are gone, they are gone, and rebooting the system without finishing the Windows 7 installation will leave you with a PC that has no operating system. Next, the installer will go through the process of extracting and expanding all of the necessary installation folders. Kick back and relax for a while, because this part is automatic. During this process, the PC will also restart on its own—don't panic, that's just part of the installation process.
Back to Windows 7 - Finished
Finally, your laptop will boot into Windows, and you should see a more familiar version of the Windows logo come up.
Once you boot into Windows, you'll be asked to provide a 25-digit Product Key. You can proceed without one, but you'll be forever hounded by warnings about using a pirated version of Windows, even if it's a brand new store-bought copy.

Install Drivers from USB key

Once you've got Windows 7 installed on your system, it's time to install your drivers. As a rule, I always start by installing networking drivers—once you've got your Wi-Fi or Ethernet connection up and running, you can hunt down the rest and troubleshoot online as needed.
Once you've got your drivers installed for everything else (trackpad, graphics processing, USB 3.0 ports, Bluetooth, etc.) do one final reboot. Viola! You've now got a pristine Windows 7 PC, ready and waiting for all of your software and files.

Hopefully, this little guide has helped you to navigate the minefield of switching from Windows 8 to Windows 7 without the loss of a limb. Enjoy your Start Menu, and bask in the light of a tile-free existence, free to use Windows as you always have. With any luck, the next version of Windows will be a little easier to adjust to.


How to Uninstall Windows 8, Install Windows 7 on Your PC





 source : http://www.pcmag.com/

tags: Wi-Fi ,install Windows 7, windows, Windows 8, Uninstall Windows 8, How to Uninstall Windows 8, Install Windows 7 on Your PC,  Back to Windows 7