Home > Miscellaneous Questions

Miscellaneous Questions

September 1st, 2010 in CCDA Go to comments

Here you will find answers to Miscellaneous Questions

Question 1

Which statement accurately describes one difference between a small office and medium office topology?

A. Small offices commonly use Rapid PVST+ for Layer 3 deployments.
B. Medium offices commonly use integrated route and switching platforms.
C. Medium offices use integrated 10/100/1000 interfaces as Layer 2 trunks.
D. Medium offices use external access switches to support LAN connectivity.


Answer: D

Question 2

Which statement can a network designer use to describe route summarization to an IT manager?

A. It is the grouping of multiple contiguous subnets into one Class A, B, or C IP address to minimize routing table size.
B. It is the grouping of multiple discontiguous subnets to increase routing performance.
C. It is the grouping of multiple contiguous networks and advertising as one large network.
D. It is the grouping of ISP network addresses to minimize the number of routes to the Internet.


Answer: C

Question 3

Refer to the exhibit.

recommend_model.jpg

Which two statements describe why Model A is the recommended design for routing between Building Distribution switches and Campus Core switches? (Choose two)

A. It uses timer-based non-deterministic convergence.
B. It is software-based, providing fast convergence to the remaining path.
C. Routes are not summarized from distribution to the core.
D. The Layer 3 redundant equal cost links support fast convergence.
E. A link or box failure does not require routing protocol convergence.


Answer: D E

Question 4

RST Corporation is planning to upgrade its current network. The chief technology officer has supplied a topology diagram and an IP addressing scheme of the current network during an interview. RST has been growing at about twenty percent per year. It has been difficult to maintain customer support at a satisfactory level. Therefore, the RST board has met with and directed the chief technology officer to look into network improvements. Which two items are most relevant in documenting RST’s business requirements? (Choose two)

A. projected growth estimates
B. network performance requirements
C. existing network topologies
D. improved customer support requirements
E. the IP addresses assigned by the ISP


Answer: A D

Question 5

You are designing a small branch office that requires these attributes:
support for 60 users
the growth capacity to add another 15 users soon
redundant access higher bandwidth between the Layer 2 switch and routing to the WAN

Which branch office topology or technology must be used?

A. two-tier
B. loop-free
C. three-tier
D. EtherChannel
E. integrated routing and switching


Answer: D

Question 6

A campus network needs end-to-end QoS tools to manage traffic and ensure voice quality. Which three types of QoS tools are needed? (Choose three)

A. interface queuing and scheduling
B. congestion management
C. compression and fragmentation
D. bandwidth provisioning
E. traffic classification
F. buffer management


Answer: A D E

Question 7

After a period of rapid growth, FloCzar Boats is seeking better network management tools.
Managers have developed this needs list:
Move from static to dynamic device information.
Gain information to assist in long-term trend analysis.
Concentrate on Layer 4 monitoring.

Which management protocol will most help FloCzar achieve its goals?

A. Cisco Discovery Protocol
B. RMON
C. SNMP
D. RMON2
E. NetFlow


Answer: D

Question 8

A network design document is being prepared for a customer. Which three network design elements must be included? (Choose three)

A. data sources
B. design details
C. proof of concept
D. implementation plan
E. organizational policies


Answer: B C D

Question 9

A company is implementing an Identity Management solution with these characteristics:
existing Cisco ACS 4.0
Cisco Catalyst switches
minimal added investments

Which Cisco Trust and Identity solution would you recommend?

A. NAC Appliance (Cisco Clean Access)
B. Cisco IBNS
C. NAC Framework
D. Cisco Security Agent
E. CSM
F. Cisco Security MARS


Answer: B

Question 10

The BodMech online fitness organization specializes in creating fitness plans for senior citizens. The company recently added a health-products retail inventory. Which E-Commerce module device will allow customers to interact with the company and purchase products?

A. application server
B. database server
C. public server
D. web server
E. NIDS appliance
F. SMTP mail server


Answer: D

Question 11

A network design includes private addressing, but there is also a need for two or three network devices to each be assigned a unique public address so they can be accessed from the Internet. Which technique will satisfy this requirement?

A. Dynamic NAT
B. Static NAT
C. DHCP
D. VPN tunneling


Answer: B

Question 12

In a Cisco CatOS switch, what is the recommended practice when configuring switch-to-switch intercommunications to carry multiple VLANs for Dynamic Trunk Protocol?

A. auto to auto_negotiate
B. auto to auto_no_negotiate
C. on to on_negotiate
D. desirable to desirable_negotiate
E. desirable to desirable_no_negotiate
F. disable Dynamic Trunk Protocol when operating in the distribution layer


Answer: D

Question 13

The topology map in the draft design document should cover which two layers of the OSI model? (Choose two)

A. physical
B. data link
C. network
D. transport
E. session
F. application


Answer: A C

Question 14

Which statement correctly describes queuing in environments supporting teleworkers?

A. CQ is for time-sensitive protocols.
B. Queuing occurs on the outbound interface.
C. Priority queuing guarantees some level of sen/ice to all traffic.
D. Hardware queues are configured for appropriate PQ, CQ, or WFQ.
E. WFQ is the Cisco IOS default on all WAN links regardless of speed.


Answer: B

Question 15

Which two methods are used to enhance VPN performance on Cisco ISRs? (Choose two)

A. built-in hardware-based encryption acceleration
B. SSL Acceleration Network Module
C. high-performance VPN encryption AIM
D. VPN Service Adapter
E. VPN Acceleration Module
F. VPN Shared Port Adapter


Answer: A C

Question 16

Refer to the exhibit.

core_layer.jpg

A standard Layer 2 campus network design is pictured. Which numbered box represents the core layer?

A. #1
B. #2
C. #3
D. #4
E. #5


Answer: C

Question 17

What is the recommended spanning tree protocol to use for all Layer 2 deployments in a branch office environment?

A. CST
B. RSPT
C. PVST
D. MISTP
E. Rapid PVST+VP


Answer: E

Question 18

Which two of these are scalability benefits of designing a network that utilizes VPNs?(Choose two)

A. extends the network to remote users
B. allows networks to be set up and restructured quickly
C. reduces dial infrastructure expenditures
D. reduces the number of physical connections
E. simplifies the underlying structure of a customer WAN


Answer: D E

Question 19

Which two capabilities of NetFlow accounting assist designers with network planning?(Choose two)

A. the decoding and analyzing of packets
B. the monitoring of processor time on network devices
C. the monitoring of user network utilization
D. the calculation of packet and byte counts of network traffic
E. the presentation of a time-based view of application usage on the network


Answer: C D

Question 20

Refer to the exhibit.

435 Cisco model 2800 routers
129 Cisco model 3800 routers
10 Cisco model 7500 routers

You are documenting the existing network of a customer with a large installed Cisco network. The routers listed are in use on the network. Which two additional pieces of information would be the most valuable in completing your documentation of these routers? (Choose two)

A. error statistics
B. interface options
C. software revisions
D. power requirements
E. management protocols


Answer: B C

Question 21

Which two design criteria require VLANs in a proposed solution? (Choose two)

A. video streaming on the LAN
B. security between departments
C. the segmenting of collision domains
D. the segmenting of broadcast domains
E. the use of multivendor equipment
F. a limited corporate budget


Answer: B D

Comments
  1. dOuBleThumb
    November 6th, 2010

    Question 9 ; i think the answer should be the NAC framework

  2. dOuBleThumb
    November 6th, 2010

    Question 18 l A B D E are correct …

  3. DragonNetwork
    January 5th, 2011

    A company is implementing an Identity Management solution with these characteristics:
    existing Cisco ACS 4.0
    Cisco Catalyst switches
    minimal added investments

    NAC Framework doesn’t work because they don’t want any added investments.

    From Cisco Press CCDA OECG 3rd

    pg 471
    The NAC Framework is an integrated solution led by Cisco that incorporates the network infrastructure and third-party software to impose security policy on the attached endpoints.

    The key section is “third-party software”.

    IBNS uses 802.1x and a backend RADIUS server, like Cisco ACS.

    So, IBNS is the only one that fulfills all of the customer requirements.

  4. stefan
    December 18th, 2011

    Question 12
    When configuring switch-to-switch interconnections to carry multiple VLANs, set DTP to on/on with no negotiate to avoid DTP protocol negotiation. This tuning can save seconds of outage when restoring a failed link or node.
    http://www.cisco.com/en/US/docs/solutions/Enterprise/Campus/HA_campus_DG/hacampusdg.html

  5. Best Guess
    January 18th, 2012

    @stefan

    I agree with you at the on/on_no negotiate as the most correct. The key on saving time there is the “no negotiate” part. Of the answers provided, there are only two with “no negotiate” –> auto-to-auto or desirable-to-desirable. And only one of those will even make a trunk.

  6. anonymous
    February 5th, 2012

    Q12
    The question mentions DTP “to carry multiple VLANs for Dynamic Trunk Protocol?”.

    And for E,there is no option in CatOS to configure des-des with nonego.

  7. anonymous
    February 5th, 2012

    In other words, answer provided is correct

  8. Anonymous
    April 13th, 2012

    http://www.cisco.com/en/US/products/hw/switches/ps4324/products_tech_note09186a0080094713.shtml#dtp

    Recommendation
    Cisco recommends an explicit trunk configuration of desirable at both ends. In this mode, network operators can trust syslog and command line status messages that a port is up and trunking, unlike on mode, which can make a port appear up even though the neighbor is misconfigured. In addition, desirable mode trunk provides stability in situations where one side of the link cannot become a trunk or drops trunk state. Issue this command in order to set desirable mode:

    set trunk mod/port desirable ISL | dot1q

  9. Fair
    May 2nd, 2012

    Question 18

    Which two of these are scalability benefits of designing a network that utilizes VPNs?(Choose two)

    A. extends the network to remote users
    B. allows networks to be set up and restructured quickly
    C. reduces dial infrastructure expenditures
    D. reduces the number of physical connections
    E. simplifies the underlying structure of a customer WAN

    Answer: C D

  10. Fair
    May 2nd, 2012

    Question 12

    In a Cisco CatOS switch, what is the recommended practice when configuring switch-to-switch intercommunications to carry multiple VLANs for Dynamic Trunk Protocol?

    A. auto to auto_negotiate
    B. auto to auto_no_negotiate
    C. on to on_negotiate
    D. desirable to desirable_negotiate
    E. desirable to desirable_no_negotiate
    F. disable Dynamic Trunk Protocol when operating in the distribution layer

    Answer: C

  11. Anonymous
    May 13th, 2012

    Guys take a close look to the question. It is asking about scalability benefits, so eliminate cost benefits.

    Question 18
    Which two of these are SCALABILITY benefits of designing a network that utilizes VPNs?(Choose two)
    A. extends the network to remote users
    B. allows networks to be set up and restructured quickly
    C. reduces dial infrastructure expenditures
    D. reduces the number of physical connections
    E. simplifies the underlying structure of a customer WAN
    My answer: A and D

  12. Theos
    September 21st, 2012

    Question 12

    In a Cisco CatOS switch, what is the recommended practice when configuring switch-to-switch intercommunications to carry multiple VLANs for Dynamic Trunk Protocol?

    A. auto to auto_negotiate
    B. auto to auto_no_negotiate
    C. on to on_negotiate
    D. desirable to desirable_negotiate
    E. desirable to desirable_no_negotiate
    F. disable Dynamic Trunk Protocol when operating in the distribution layer

    There is a typing mistake…
    it shoud be C. on to no_negotiate becouse on_negotiate is not exist.
    So the wright answer is C from the dump is just a typing mistake.

    Take care.

  13. Delta
    October 19th, 2012

    A campus network needs end-to-end QoS tools to manage traffic and ensure voice quality. Which three types of QoS tools are needed? (Choose three)

    A. interface queuing and scheduling
    B. congestion management
    C. compression and fragmentation
    D. bandwidth provisioning
    E. traffic classification
    F. buffer management

    Answer: A D E
    Why isn’t this A B E.
    Congestion management is listed as one of the QoS and Bandwidth mechanism for VOIP and Video networks. p.555 Official Cert Guide 640-864.

  14. Delta
    October 19th, 2012

    Q6:
    http://www.cisco.com/en/US/docs/voice_ip_comm/cucm/srnd/4x/42nstrct.html#wp1063074
    I found this which would seem to state that 6 is correct as A D E.

  15. lonsomeboy
    December 14th, 2012

    Q3. Got to say that this is again not correct. Any failure of a single device HAS to have a convergence event. This preculdes

    E. A link or box failure does not require routing protocol convergence.

    Leaving options. One of these can be removed because it is always deterministic i.e. a routing protocol

    A. It uses timer-based non-deterministic convergence.

    So we’re left with

    B. It is software-based, providing fast convergence to the remaining path.
    C. Routes are not summarized from distribution to the core.
    D. The Layer 3 redundant equal cost links support fast convergence.

    with C being obviosly wrong. I suggest the answer is clearly B & D because BFD and neibour adjacencies are software based and cause fast convergence when failure is detected and ECMP means fast convergence times.

    Thanks DSTUT.

  16. lonsomeboy
    December 14th, 2012

    Q5. This is clearly not EtherChannel as they are asking about medium office sized designs which require a two-tier approach therefore A is correct:

    A. two-tier

    Thanks.

  17. lonsomeboy
    December 14th, 2012

    Q6. Again it has to include the queuing and scheduling plus traffic classification, A & E. I would say congestion management is more of a QoS mechanism than simply throwing bandwidth at the probem so would go with B.

    A. interface queuing and scheduling
    B. congestion management
    C. compression and fragmentation
    D. bandwidth provisioning
    E. traffic classification
    F. buffer management

    A, B, E.

  18. Julian
    February 3rd, 2013

    Q5 is incorrect. I think the answer should be the letter A -> two-tier.

  19. Engineer
    February 9th, 2013

    I totally agree with @lonsomeboy about question 6

    A. interface queuing and scheduling
    B. congestion management
    C. compression and fragmentation
    D. bandwidth provisioning
    E. traffic classification
    F. buffer management

    A, B, E.

  20. remoj
    May 14th, 2013

    hi Guys regarding Q6, have you encountered this question in the real exam? Thanks, I’ll be taking my examination this week. Hope you can help me with this.

  21. sigh
    May 27th, 2013

    @ lonsomeboy = “Q3. Got to say that this is again not correct. Any failure of a single device HAS to have a convergence event”

    The question and the graphic clearly show a failure of a LINK and not a DEVICE

    @ lonsomeboy again and Julian = “Q5. This is clearly not EtherChannel as they are asking about medium office sized designs which require a two-tier approach therefore A is correct”

    Yes medium size has two-tier design thus a collapsed core/distribution (L3 router) and an access layer (switch). The question is asking for the parameter of providing redundancy and higher bandwidth,……between these two tiers,….what could that be,…yay etherchannel. Which is a technology, the question asked for a topology or a technology. It is a good question, it tricks you if you don’t fully understand or read carefully.

    @ lonsomeboy once more = “Q6. Again it has to include the queuing and scheduling plus traffic classification, A & E. I would say congestion management is more of a QoS mechanism than simply throwing bandwidth at the probem so would go with B.”

    It isn’t throwing bandwidth at it, it is provisioning it, reserving it, having it ready to support a critical traffic source that is voice which requires realtime levels of transmission.

    Someone even provided a link for you 2months before you claimed the answer was wrong. See Delta’s post on Oct 19th 2012

    Be 100% certain, otherwise you end up confusing others with your own confusion.

  22. Anonymous
    June 22nd, 2013

    Q6 ask: Which three types of QoS TOOLS are needed?

    QoS tools are: Classification en marking, congestion management (queeing), shaping e policing, congestion avoidance, link-efficency and call admission control, from Cisco Qos exam certification guide.

    The right answers are:

    B. congestion management
    C. compression and fragmentation (link-efficency)
    E. traffic classification

  23. kino
    July 3rd, 2013

    Can I use my CCNA Wireless Voucher over CCDA Exam.? Both exams are Associate level and have same price of $250.

  24. Anonymous
    March 27th, 2014

    Find you one these questions in the current examination CCDA?

  25. Anonymous
    November 24th, 2014

    About question 6:

    The following types of QoS tools are needed from end to end on the network to manage traffic and ensure voice quality:

    •Traffic classification

    Classification involves the marking of packets with a specific priority denoting a requirement for class of service (CoS) from the network. The point at which these packet markings are trusted or not trusted is considered the trust boundary. Trust is typically extended to voice devices (phones) and not to data devices (PCs).

    •Queuing or scheduling

    Interface queuing or scheduling involves assigning packets to one of several queues based on classification for expedited treatment throughout the network.

    •Bandwidth provisioning

    Provisioning involves accurately calculating the required bandwidth for all applications plus element overhead.

    Source: http://www.cisco.com/en/US/docs/voice_ip_comm/cucm/srnd/4x/42nstrct.html#wp1063074

    P.S.: This is one of the worst exams Cisco ever made.

  1. No trackbacks yet.
Add a Comment

CAPTCHA Image
Reload Image