Successfully reported this slideshow.

Cisco discovery drs ent module 7 - v.4 in english.

542 views

Published on

  • Be the first to comment

  • Be the first to like this

Cisco discovery drs ent module 7 - v.4 in english.

  1. 1. Cisco Discovery - DRSEnt Module 7 - V.4 in english.Q.1 Why are Network Control Protocols used in PPP? to establish and terminate data links to provide authentication capabilities to PPP to manage network congestion and to allow quality testing of the link to allow multiple Layer 3 protocols to operate over the same physical linkQ.2 What is the data transmission rate for the DS0 standard? 44 kb/s 64 kb/s 1.544 Mb/s 44.736 Mb/sQ.3 In which two layers of the OSI model are key differences found between a LAN and a WAN. (Choosetwo.) Layer 1 Layer 2 Layer 3 Layer 4 Layer 6 Layer 7Q.4 Which statement is true about the Cisco implementation of the HDLC protocol?
  2. 2. It supports authentication. It has a universally compatible frame format. It is the default encapsulation for serial interfaces on Cisco routers. It does not support multiple protocols across a single link.Q.5 Refer to the exhibit. A network administrator has a connectivity problem between the serialinterfaces of Merida and Vargas. What is the cause of the problem? Authentication is required on the serial link. The encapsulation is misconfigured. The IP addresses are on different subnets. The serial interface on Vargas is shutdown. The loopback interfaces on both routers are not configured.Q.6 Refer to the exhibit. What statement is true about the exhibited output? LCP is in the process of negotiating a link. LCP and NCP are waiting for CHAP authentication to complete. LCP negotiation has completed successfully, but NCP negotiation is in progress. LCP and NCP negotiation is complete, and the data link service is available to carry packets.Q.7 Which three statements are true regarding LCP? (Choose three.) It is responsible for negotiating link establishment. It negotiates options for Layer 3 protocols running over PPP. It uses MD5 encryption while negotiating link-establishment parameters. It terminates the link upon user request or the expiration of an inactivity timer. It can test the link to determine if link quality is sufficient to bring up the link. It monitors the link for congestion and dynamically adjusts the acceptable window size.
  3. 3. Q.8 Why are Frame Relay paths referred to as virtual? Frame Relay PVCs are created and discarded on demand. The connections between PVC endpoints act like dialup circuits. There are no dedicated circuits to and from the Frame Relay carrier. The physical circuits inside the Frame Relay cloud do not contain exclusive links for a specific FrameRelay connection.Q.9 What best describes the use of a data-link connection identifier (DLCI)? an address identifying a virtual circuit a logical address identifying the DCE device an address identifying a Layer 3 service across a Frame Relay network a logical address identifying the physical interface between a router and a Frame Relay switchQ.10 What two services allow the router to dynamically map data link layer addresses to network layeraddresses Frame Relay network? (Choose two.) ARP ICMP Proxy ARP Inverse ARP LMI status messagesQ.11 Which three statements describe functions of the Point-to-Point Protocol with regards to the OSImodel?(Choose three.) operates at all layers of the OSI model provides a mechanism to multiplex several network layer protocols
  4. 4. can be configured on both synchronous and asynchronous serial interfaces uses Layer 3 of the OSI model to establish and maintain a session between devices uses the data link layer to configure such options as error detection and compression uses network control protocols to test and maintain connectivity between devicesQ.12 At what physical location does the responsibility for a WAN connection change from the user tothe service provider? demilitarized zone (DMZ) demarcation point local loop cloudQ.13 What does a Frame Relay switch use to inform the sender that there is congestion? FECN BECN DE FCSQ.14 Refer to the exhibit. What statement is true about the debug output? R2 is using PAP instead of CHAP. The routers have different CHAP passwords configured. The administrator performed a shutdown on the R2 PPP interface during negotiation. The Layer 3 protocol negotiation caused the connection failure.Q.15 Which two statements describe the function of time-division multiplexing? (Choose two.)
  5. 5. Multiple data streams share one common channel. Conversations that require extra bandwidth receive any unused time slices. Time slots are utilized on a first-come, first-served basis. Time slots go unused if a sender has nothing to transmit. Priority can be dedicated to one data source.Q.16 When customers use credit cards to make purchases at a small business, a modem is heard dialinga telephone number to transfer the transaction data to the central office. What type of WAN serialconnection is in use? leased line point-to-point circuit switched packet switchedQ.17 Which best describes data communications equipment (DCE)? serves as data source and/or destination responsible for negotiating windowing and acknowledgements physical devices such as protocol translators and multiplexers equipment that forwards data and is responsible for the clocking signalQ.18 Permanent virtual circuits and switched virtual circuits are both part of which option for WANconnectivity? leased line cell switching packet switching circuit switching
  6. 6. Q.19 Which field of a frame uses error detection mechanisms to verify that the frame is not damagedintransit? FCS MTU flag control protocolQ.20 What occurs in the encapsulation process as a data packet moves from a LAN across a WAN? The Layer 2 encapsulation changes to a format that is appropriate for the WAN technology. The Layer 3 encapsulation changes to a format that is appropriate for the WAN technology. Both Layer 2 and Layer 3 encapsulation change to a technology that is appropriate for the WAN. Both Layer 2 and Layer 3 encapsulation remain constant as the data packet travels throughout thenetwork.Q.21 Refer to the exhibit. The network administrator is configuring R1 to connect to R2, which is a non-Cisco router. Which encapsulation method will need to be configured for communication to occur? HDLC HSSI ISDN IPCP PPPQ.22 A company is implementing dialup services for remote workers to connect to the local network.The company uses multiple Layer 3 protocols and requires authentication for security. Which protocolshould be used for this remote access?
  7. 7. LMI PPP HDLC Frame RelayQ.23 Which two options can LCP negotiate? (Choose two.) compression authentication dynamic flow control network layer address for IP connection-oriented or connectionless communication methodsQ.24 What statement best describes cell switching? It uses a dedicated path between endpoints. It creates a permanent physical link between two points. It uses DLCIs to identify virtual circuits. It creates fixed-length packets that traverse virtual circuits.

×