SlideShare a Scribd company logo
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/

CCNA 4 Chapter 4 V4.0

Labels: CCNA 4 Chapter 4 V4.0
1
In addition to the technical considerations, what other major factor is used to evaluate
the
success of a network installation?

final project costs

maintenance costs

user satisfaction

statistics describing the performance of network devices


2
Which two network applications are most affected by network congestion and delays?
(Choose two.)

IP telephony

live video webcasts

audio file downloads

online banking services

file archival and retrieval


3
What two Cisco tools can be used to analyze network application traffic? (Choose
two.)

NBAR

NetFlow

AutoQoS

Wireshark

Custom Queuing


4
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/

In network design, which technology can be implemented to prioritize traffic based on
its
importance and technical requirements?

STP

QoS

RTP

TCP

VPN


5
What are two characteristics of voice over IP traffic? (Choose two.)

Voice packets tend to be small.

Voice packets must be processed in real time.

Voice packets can effectively use TCP reliability features.

Voice traffic can survive packet drops and retransmission delays.

Voice packets must be converted to analog before being sent across the IP network.

Voice packets automatically receive a higher priority value than other types of
packets.


6
What are two things that a network designer can do to determine current and
anticipated network
traffic flows? (Choose two.)

Survey end users to obtain customer input.

Upgrade the Cisco IOS software in all networking devices to optimize traffic flow.

Limit the analysis to host-to-server traffic because host-to-host traffic is unimportant.

Run a network traffic analysis to determine which applications are in use and by
whom.

Conduct an inventory of all networking devices that includes model numbers and
memory configurations
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/



7
A company that has a traditional telephone system wants to convert to IP telephony.
Which two
factors should be considered for the design? (Choose two.)

Digital communications systems have greater noise than analog systems when
processing voice traffic.

Voice-enabled routers or a server must be used for call control and signaling.

Voice to IP conversions can cause router overhead.

Power to the phones can be supplied through properly equipped patch panels or
switches.

The cost to combine voice and data VLANs can be a considerable amount.


8
Several web and email servers have recently been installed as part of an enterprise
network. The
security administrator has been asked to provide a summary of security features that
can be
implemented to help prevent unauthorized traffic from being sent into or out of
sensitive internal
networks. Which three features should the security administrator recommend?
(Choose three.)

firewalls

priority queuing

access control lists

intrusion detection systems

DHCP

128-bit WEP


9
The design of an IP telephony system needs to meet the technical requirements to
provide a
connection to the PSTN as well as provide high-quality voice transmissions using the
campus
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/

network. Which two elements directly affect the ability of the design to meet these
requirements?(Choose two.)

voice-enabled firewall

PoE switches and patch panels

redundant backbone connectivity

voice-enabled router at the enterprise edge

separate voice and data VLANs with QoS implemented


10
When implementing VoIP services, which two design considerations should be
followed?(Choose two.)

Confirm that network jitter is minimal.

Use TCP to reduce delays and dropped packets.

Establish priority queuing to ensure that large data packets are sent uninterrupted.

Disable real-time protocols to reduce queuing strategy demands.

Ensure that packet delays do not exceed 150 ms.


11
What design strategy should be followed when designing a network that uses video on
demand?

implement the appropriate routing protocol to ensure that data segments arrive in
order

implement different QoS queues based on the type of video traffic being distributed

install servers to store the data in a centrally located server farm

configure queuing in the core routers to ensure high availability


12
When implementing QoS in traffic queues, what is the first step the designer should
take to
ensure that traffic is properly prioritized?
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/

define QoS policies

define traffic classes

determine traffic patterns

identify traffic requirements

identify networking equipment


13
Which two statements are characteristics of file transfer traffic flows? (Choose two.)

RTP should be used.

Traffic is predictable.

Packets are small in size.

Transfers are throughput intensive.

Response-time requirements are low.


14
Which two items can be determined by diagramming internal traffic flow? (Choose
two.)

the type of ISP services needed

the capabilities of end-user devices

the areas where network congestion may occur

the location of VPN servers used to connect teleworkers

locations where high-bandwidth connections are required


15
Which two traffic types are examples of external traffic flows? (Choose two.)

A user in the IT department telnets to the core layer router.

A user in marketing connects to the web server of a competitor.

A user in the IT department telnets into the access layer switch.
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/


A user in the services department logs in to a web-based email program.

A user in accounting connects to an FTP server that is connected to the access layer
switch.


16
Which service can be provided by the NetFlow Cisco utility?

network planning and mapping

IDS and IPS capabilities

peak usage times and traffic routing

network billing and accounting application

security and user account restrictions

source and destination UDP port mapping


17
Refer to the exhibit. If ACL 150 identifies only voice traffic from network
192.168.10.0/24 and no
other traffic, which queue will voice traffic from other networks use?

high

normal

medium

default


18
Refer to the exhibit. After configuring QoS, a network administrator issues the
command show
queueing interface s0/1. What two pieces of information can an administrator learn
from the
output of this command? (Choose two.)

queue traffic definitions

priority list protocol assignments
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/

type of queuing being implemented

number of packets placed in each queue

queuing defaults that have been changed

queuing has not been applied to this interface


19
An analysis of network protocols reveals that RTP and RTCP are being used. What
uses these
protocols?

IDS

VPN

WLAN

firewall

real-time video


20
A company is considering adding voice and video to the data networks. Which two
statements are
true if voice and video are added? (Choose two.)

PoE switches must be purchased.

More UDP-based traffic flows will be evident.

Response times will be increased even if QoS is implemented.

QoS will most likely be implemented to prioritize traffic flows.

VPNs will most likely be implemented to protect the voice traffic.


21
Refer to the exhibit. Which option correctly matches the terms on top with its
definition on the
bottom?

A=1, B=3, C=2, D=4
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/

A=2, B=1, C=4, D=3

A=2, B=4, C=1, D=3

A=3, B=2, C=4, D=1

A=4, B=3, C=1, D=2

A=4, B=2, C=3, D=1


22
A database server is configured to purge all data that is 60 days old. Ten data items
that are 60
days old are to be purged. However, there is a failure halfway through the transaction,
and the
entire transaction is voided. What type of transaction action occurred?

atomic

consistent

durable

isolated


23
What is the primary goal of QoS?

classification of traffic

filtering and queuing voice traffic

reducing bandwidth requirements

providing priority service to selected traffic


24
Which technology provides a mechanism for implementing QoS at Layer 2?

ToS

CoS

DSCP
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/

IP precedence


25
A customer purchases tickets online and pays using a credit card, but the
system goes down before the transaction is complete. What transaction type retains a
record of this transaction after the system failure so that the customer will still receive
the
tickets and the credit card account will be debited accordingly?

atomic

consistent

durable

isolated


26
Refer to the exhibit. The network design documents include requirements to prevent
switching loops, to provide link-specific failover, and to provide Layer 3 recovery.
Which
two protocols would be needed to provide the support? (Choose two.)

HDLC

HSRP

PPP

RSTP

VTP


27
network design must minimize latency to support real-time streaming
applications. Which two protocols enable control and scalability of the network
resources
and minimize latency by incorporating QoS mechanisms? (Choose two.)

RTCP

HSRP

RSTP
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/

RTP

RPC


28
Which two major differences are associated with IP telephony when
compared to traditional telephony that uses a PBX? (Choose two.)

manages phones centrally

utilizes centralized call routing

creates peer-to-peer relationships between phones

requires a separate infrastructure to support data transfer

requires significant manual configuration when adding, moving, or changing phones


29
When QoS is implemented in a converged network, which two factors can
be controlled to improve performance? (Choose two.)

link speed

delay

packet routing

jitter

packet addressing

More Related Content

What's hot

Diameter based Interfaces and description
Diameter based Interfaces and descriptionDiameter based Interfaces and description
Diameter based Interfaces and description
Manjeet Kaur
 
Introduction to DIAMETER
Introduction to DIAMETERIntroduction to DIAMETER
Introduction to DIAMETER
Hossein Yavari
 
5.2 qos priority_preemption-alu
5.2 qos priority_preemption-alu5.2 qos priority_preemption-alu
5.2 qos priority_preemption-alu
Milind Gunjan
 
IMS Standards
IMS  StandardsIMS  Standards
IMS Standards
Marie-Paule Odini
 
LTE EPC Technology Essentials
LTE EPC Technology EssentialsLTE EPC Technology Essentials
LTE EPC Technology Essentials
Hussien Mahmoud
 
Introduction to sandvine dpi
Introduction to sandvine dpiIntroduction to sandvine dpi
Introduction to sandvine dpi
Mohammed Abdallah
 
DPI BOX: deep packet inspection for ISP traffic management
DPI BOX: deep packet inspection for ISP traffic managementDPI BOX: deep packet inspection for ISP traffic management
DPI BOX: deep packet inspection for ISP traffic management
Ilya Mikov
 
Insights on the configuration and performances of SOME/IP Service Discovery
Insights on the configuration and performances of SOME/IP Service DiscoveryInsights on the configuration and performances of SOME/IP Service Discovery
Insights on the configuration and performances of SOME/IP Service Discovery
Nicolas Navet
 
Scalable Service Oriented Architecture for Audio/Video ...
Scalable Service Oriented Architecture for Audio/Video ...Scalable Service Oriented Architecture for Audio/Video ...
Scalable Service Oriented Architecture for Audio/Video ...Videoguy
 
Very High Density (vhd) 802.11ac Wireless Network Design and Deployment Basics
Very High Density (vhd) 802.11ac Wireless Network Design and Deployment BasicsVery High Density (vhd) 802.11ac Wireless Network Design and Deployment Basics
Very High Density (vhd) 802.11ac Wireless Network Design and Deployment Basics
Aruba, a Hewlett Packard Enterprise company
 
PathTrak™ Video Monitoring System for Cable TV
PathTrak™ Video Monitoring System for Cable TVPathTrak™ Video Monitoring System for Cable TV
PathTrak™ Video Monitoring System for Cable TVAndrew Tram
 
Go with the Flow-v2
Go with the Flow-v2Go with the Flow-v2
Go with the Flow-v2Zobair Khan
 
Example of One of my Desgins for Cyber &Networking Solutions for Customers ...
Example of One  of my Desgins  for Cyber &Networking Solutions for Customers ...Example of One  of my Desgins  for Cyber &Networking Solutions for Customers ...
Example of One of my Desgins for Cyber &Networking Solutions for Customers ...
chen sheffer
 
Outdoor MIMO Wireless Networks
Outdoor MIMO Wireless NetworksOutdoor MIMO Wireless Networks
Outdoor MIMO Wireless Networks
Aruba, a Hewlett Packard Enterprise company
 
PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...
PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...
PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...
PROIDEA
 
F5 link controller
F5  link controllerF5  link controller
F5 link controllerJimmy Saigon
 
Sapc upcc-pcrf- part 2 tbp
Sapc upcc-pcrf- part 2 tbpSapc upcc-pcrf- part 2 tbp
Sapc upcc-pcrf- part 2 tbp
Mustafa Golam
 
Wireless LAN Design Fundamentals in the Campus
Wireless LAN Design Fundamentals in the CampusWireless LAN Design Fundamentals in the Campus
Wireless LAN Design Fundamentals in the Campus
Aruba, a Hewlett Packard Enterprise company
 

What's hot (20)

Diameter based Interfaces and description
Diameter based Interfaces and descriptionDiameter based Interfaces and description
Diameter based Interfaces and description
 
Introduction to DIAMETER
Introduction to DIAMETERIntroduction to DIAMETER
Introduction to DIAMETER
 
5.2 qos priority_preemption-alu
5.2 qos priority_preemption-alu5.2 qos priority_preemption-alu
5.2 qos priority_preemption-alu
 
IMS Standards
IMS  StandardsIMS  Standards
IMS Standards
 
LTE EPC Technology Essentials
LTE EPC Technology EssentialsLTE EPC Technology Essentials
LTE EPC Technology Essentials
 
Introduction to sandvine dpi
Introduction to sandvine dpiIntroduction to sandvine dpi
Introduction to sandvine dpi
 
DPI BOX: deep packet inspection for ISP traffic management
DPI BOX: deep packet inspection for ISP traffic managementDPI BOX: deep packet inspection for ISP traffic management
DPI BOX: deep packet inspection for ISP traffic management
 
Insights on the configuration and performances of SOME/IP Service Discovery
Insights on the configuration and performances of SOME/IP Service DiscoveryInsights on the configuration and performances of SOME/IP Service Discovery
Insights on the configuration and performances of SOME/IP Service Discovery
 
Scalable Service Oriented Architecture for Audio/Video ...
Scalable Service Oriented Architecture for Audio/Video ...Scalable Service Oriented Architecture for Audio/Video ...
Scalable Service Oriented Architecture for Audio/Video ...
 
Very High Density (vhd) 802.11ac Wireless Network Design and Deployment Basics
Very High Density (vhd) 802.11ac Wireless Network Design and Deployment BasicsVery High Density (vhd) 802.11ac Wireless Network Design and Deployment Basics
Very High Density (vhd) 802.11ac Wireless Network Design and Deployment Basics
 
PathTrak™ Video Monitoring System for Cable TV
PathTrak™ Video Monitoring System for Cable TVPathTrak™ Video Monitoring System for Cable TV
PathTrak™ Video Monitoring System for Cable TV
 
Go with the Flow-v2
Go with the Flow-v2Go with the Flow-v2
Go with the Flow-v2
 
Lakhan_Gupta_CV
Lakhan_Gupta_CVLakhan_Gupta_CV
Lakhan_Gupta_CV
 
Example of One of my Desgins for Cyber &Networking Solutions for Customers ...
Example of One  of my Desgins  for Cyber &Networking Solutions for Customers ...Example of One  of my Desgins  for Cyber &Networking Solutions for Customers ...
Example of One of my Desgins for Cyber &Networking Solutions for Customers ...
 
Outdoor MIMO Wireless Networks
Outdoor MIMO Wireless NetworksOutdoor MIMO Wireless Networks
Outdoor MIMO Wireless Networks
 
PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...
PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...
PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...
 
F5 link controller
F5  link controllerF5  link controller
F5 link controller
 
Sapc upcc-pcrf- part 2 tbp
Sapc upcc-pcrf- part 2 tbpSapc upcc-pcrf- part 2 tbp
Sapc upcc-pcrf- part 2 tbp
 
IETF 79 - Diameter Over SCTP
IETF 79 - Diameter Over SCTPIETF 79 - Diameter Over SCTP
IETF 79 - Diameter Over SCTP
 
Wireless LAN Design Fundamentals in the Campus
Wireless LAN Design Fundamentals in the CampusWireless LAN Design Fundamentals in the Campus
Wireless LAN Design Fundamentals in the Campus
 

Similar to Ccna 4 Chapter 4 V4.0 Answers

Ccna 4 Chapter 1 V4.0 Answers
Ccna 4 Chapter 1 V4.0 AnswersCcna 4 Chapter 1 V4.0 Answers
Ccna 4 Chapter 1 V4.0 Answers
ccna4discovery
 
Ccna 4 chapter 1 v4.0 answers 2011
Ccna 4 chapter 1 v4.0 answers 2011Ccna 4 chapter 1 v4.0 answers 2011
Ccna 4 chapter 1 v4.0 answers 2011Dân Chơi
 
Ccna 4 Chapter 8 V4.0 Answers
Ccna 4 Chapter 8 V4.0 AnswersCcna 4 Chapter 8 V4.0 Answers
Ccna 4 Chapter 8 V4.0 Answers
ccna4discovery
 
Ccna 4 Chapter 5 V4.0 Answers
Ccna 4 Chapter 5 V4.0 AnswersCcna 4 Chapter 5 V4.0 Answers
Ccna 4 Chapter 5 V4.0 Answers
ccna4discovery
 
Ccna 4 final exam answer v5
Ccna 4 final exam answer v5Ccna 4 final exam answer v5
Ccna 4 final exam answer v5friv4schoolgames
 
Ccnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_examCcnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_examĐồng Quốc Vương
 
Ccna 3 chapter 1 v4.0 answers 2011
Ccna 3 chapter 1 v4.0 answers 2011Ccna 3 chapter 1 v4.0 answers 2011
Ccna 3 chapter 1 v4.0 answers 2011Dân Chơi
 
Ccna 4 chapter 6 v4.0 answers 2011
Ccna 4 chapter 6 v4.0 answers 2011Ccna 4 chapter 6 v4.0 answers 2011
Ccna 4 chapter 6 v4.0 answers 2011Dân Chơi
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
Shakib Ansaar
 
Tutorial 1 chapter 1
Tutorial 1 chapter 1Tutorial 1 chapter 1
Tutorial 1 chapter 1
Neda Shekarkhar
 
Wan networks
Wan networksWan networks
Wan networks
Arnold Derrick Kinney
 
M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptx
Angel Garcia
 
17 - Building small network.pdf
17 - Building small network.pdf17 - Building small network.pdf
17 - Building small network.pdf
PhiliphaHaldline
 
A REPORT ON CITRIX INDEPENDENT COMPUTING ARCHITECTURE (ICA) PROTOCOL
A REPORT ON CITRIX INDEPENDENT COMPUTING  ARCHITECTURE (ICA) PROTOCOL A REPORT ON CITRIX INDEPENDENT COMPUTING  ARCHITECTURE (ICA) PROTOCOL
A REPORT ON CITRIX INDEPENDENT COMPUTING ARCHITECTURE (ICA) PROTOCOL
chaitanya ivvala
 
Examen1ccna3v5.0
Examen1ccna3v5.0Examen1ccna3v5.0
Examen1ccna3v5.0
Juan Carlos Banegas
 
ETE405-lec9.ppt
ETE405-lec9.pptETE405-lec9.ppt
ETE405-lec9.pptmashiur
 
CCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptxCCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptx
ParthaDas754073
 
Chapter04
Chapter04Chapter04
Chapter04
Muhammad Ahad
 
Ccna 4 chapter 8 v4.0 answers 2011
Ccna 4 chapter 8 v4.0 answers 2011Ccna 4 chapter 8 v4.0 answers 2011
Ccna 4 chapter 8 v4.0 answers 2011
Dân Chơi
 
NUVX Technologies general solutions
NUVX Technologies general solutionsNUVX Technologies general solutions
NUVX Technologies general solutions
NUVX
 

Similar to Ccna 4 Chapter 4 V4.0 Answers (20)

Ccna 4 Chapter 1 V4.0 Answers
Ccna 4 Chapter 1 V4.0 AnswersCcna 4 Chapter 1 V4.0 Answers
Ccna 4 Chapter 1 V4.0 Answers
 
Ccna 4 chapter 1 v4.0 answers 2011
Ccna 4 chapter 1 v4.0 answers 2011Ccna 4 chapter 1 v4.0 answers 2011
Ccna 4 chapter 1 v4.0 answers 2011
 
Ccna 4 Chapter 8 V4.0 Answers
Ccna 4 Chapter 8 V4.0 AnswersCcna 4 Chapter 8 V4.0 Answers
Ccna 4 Chapter 8 V4.0 Answers
 
Ccna 4 Chapter 5 V4.0 Answers
Ccna 4 Chapter 5 V4.0 AnswersCcna 4 Chapter 5 V4.0 Answers
Ccna 4 Chapter 5 V4.0 Answers
 
Ccna 4 final exam answer v5
Ccna 4 final exam answer v5Ccna 4 final exam answer v5
Ccna 4 final exam answer v5
 
Ccnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_examCcnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_exam
 
Ccna 3 chapter 1 v4.0 answers 2011
Ccna 3 chapter 1 v4.0 answers 2011Ccna 3 chapter 1 v4.0 answers 2011
Ccna 3 chapter 1 v4.0 answers 2011
 
Ccna 4 chapter 6 v4.0 answers 2011
Ccna 4 chapter 6 v4.0 answers 2011Ccna 4 chapter 6 v4.0 answers 2011
Ccna 4 chapter 6 v4.0 answers 2011
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
 
Tutorial 1 chapter 1
Tutorial 1 chapter 1Tutorial 1 chapter 1
Tutorial 1 chapter 1
 
Wan networks
Wan networksWan networks
Wan networks
 
M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptx
 
17 - Building small network.pdf
17 - Building small network.pdf17 - Building small network.pdf
17 - Building small network.pdf
 
A REPORT ON CITRIX INDEPENDENT COMPUTING ARCHITECTURE (ICA) PROTOCOL
A REPORT ON CITRIX INDEPENDENT COMPUTING  ARCHITECTURE (ICA) PROTOCOL A REPORT ON CITRIX INDEPENDENT COMPUTING  ARCHITECTURE (ICA) PROTOCOL
A REPORT ON CITRIX INDEPENDENT COMPUTING ARCHITECTURE (ICA) PROTOCOL
 
Examen1ccna3v5.0
Examen1ccna3v5.0Examen1ccna3v5.0
Examen1ccna3v5.0
 
ETE405-lec9.ppt
ETE405-lec9.pptETE405-lec9.ppt
ETE405-lec9.ppt
 
CCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptxCCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptx
 
Chapter04
Chapter04Chapter04
Chapter04
 
Ccna 4 chapter 8 v4.0 answers 2011
Ccna 4 chapter 8 v4.0 answers 2011Ccna 4 chapter 8 v4.0 answers 2011
Ccna 4 chapter 8 v4.0 answers 2011
 
NUVX Technologies general solutions
NUVX Technologies general solutionsNUVX Technologies general solutions
NUVX Technologies general solutions
 

More from ccna4discovery

Ccna 4 Chapter 9 V4.0 Answers
Ccna 4 Chapter 9 V4.0 AnswersCcna 4 Chapter 9 V4.0 Answers
Ccna 4 Chapter 9 V4.0 Answers
ccna4discovery
 
Ccna 4 Chapter 7 V4.0 Answers
Ccna 4 Chapter 7 V4.0 AnswersCcna 4 Chapter 7 V4.0 Answers
Ccna 4 Chapter 7 V4.0 Answers
ccna4discovery
 
Ccna 4 Chapter 3 V4.0 Answers
Ccna 4 Chapter 3 V4.0 AnswersCcna 4 Chapter 3 V4.0 Answers
Ccna 4 Chapter 3 V4.0 Answers
ccna4discovery
 
Ccna 4 Chapter 2 V4.0 Answers
Ccna 4 Chapter 2 V4.0 AnswersCcna 4 Chapter 2 V4.0 Answers
Ccna 4 Chapter 2 V4.0 Answers
ccna4discovery
 
Ccna 3 Final V4.0 Answers
Ccna 3 Final V4.0 AnswersCcna 3 Final V4.0 Answers
Ccna 3 Final V4.0 Answers
ccna4discovery
 
Ccna 3 Chapter 9 V4.0 Answers
Ccna 3 Chapter 9 V4.0 AnswersCcna 3 Chapter 9 V4.0 Answers
Ccna 3 Chapter 9 V4.0 Answers
ccna4discovery
 
Ccna 3 Chapter 6 V4.0 Answers
Ccna 3 Chapter 6 V4.0 AnswersCcna 3 Chapter 6 V4.0 Answers
Ccna 3 Chapter 6 V4.0 Answers
ccna4discovery
 
Ccna 2 Chapter 8 V4.1 Answers
Ccna 2 Chapter 8 V4.1 AnswersCcna 2 Chapter 8 V4.1 Answers
Ccna 2 Chapter 8 V4.1 Answers
ccna4discovery
 
Ccna 2 Chapter 8 V4.0 Answers
Ccna 2 Chapter 8 V4.0 AnswersCcna 2 Chapter 8 V4.0 Answers
Ccna 2 Chapter 8 V4.0 Answers
ccna4discovery
 
Ccna 1 Chapter 1 V4.0 Answers
Ccna 1 Chapter 1 V4.0 AnswersCcna 1 Chapter 1 V4.0 Answers
Ccna 1 Chapter 1 V4.0 Answers
ccna4discovery
 

More from ccna4discovery (10)

Ccna 4 Chapter 9 V4.0 Answers
Ccna 4 Chapter 9 V4.0 AnswersCcna 4 Chapter 9 V4.0 Answers
Ccna 4 Chapter 9 V4.0 Answers
 
Ccna 4 Chapter 7 V4.0 Answers
Ccna 4 Chapter 7 V4.0 AnswersCcna 4 Chapter 7 V4.0 Answers
Ccna 4 Chapter 7 V4.0 Answers
 
Ccna 4 Chapter 3 V4.0 Answers
Ccna 4 Chapter 3 V4.0 AnswersCcna 4 Chapter 3 V4.0 Answers
Ccna 4 Chapter 3 V4.0 Answers
 
Ccna 4 Chapter 2 V4.0 Answers
Ccna 4 Chapter 2 V4.0 AnswersCcna 4 Chapter 2 V4.0 Answers
Ccna 4 Chapter 2 V4.0 Answers
 
Ccna 3 Final V4.0 Answers
Ccna 3 Final V4.0 AnswersCcna 3 Final V4.0 Answers
Ccna 3 Final V4.0 Answers
 
Ccna 3 Chapter 9 V4.0 Answers
Ccna 3 Chapter 9 V4.0 AnswersCcna 3 Chapter 9 V4.0 Answers
Ccna 3 Chapter 9 V4.0 Answers
 
Ccna 3 Chapter 6 V4.0 Answers
Ccna 3 Chapter 6 V4.0 AnswersCcna 3 Chapter 6 V4.0 Answers
Ccna 3 Chapter 6 V4.0 Answers
 
Ccna 2 Chapter 8 V4.1 Answers
Ccna 2 Chapter 8 V4.1 AnswersCcna 2 Chapter 8 V4.1 Answers
Ccna 2 Chapter 8 V4.1 Answers
 
Ccna 2 Chapter 8 V4.0 Answers
Ccna 2 Chapter 8 V4.0 AnswersCcna 2 Chapter 8 V4.0 Answers
Ccna 2 Chapter 8 V4.0 Answers
 
Ccna 1 Chapter 1 V4.0 Answers
Ccna 1 Chapter 1 V4.0 AnswersCcna 1 Chapter 1 V4.0 Answers
Ccna 1 Chapter 1 V4.0 Answers
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 

Recently uploaded (20)

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 

Ccna 4 Chapter 4 V4.0 Answers

  • 1. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ CCNA 4 Chapter 4 V4.0 Labels: CCNA 4 Chapter 4 V4.0 1 In addition to the technical considerations, what other major factor is used to evaluate the success of a network installation? final project costs maintenance costs user satisfaction statistics describing the performance of network devices 2 Which two network applications are most affected by network congestion and delays? (Choose two.) IP telephony live video webcasts audio file downloads online banking services file archival and retrieval 3 What two Cisco tools can be used to analyze network application traffic? (Choose two.) NBAR NetFlow AutoQoS Wireshark Custom Queuing 4
  • 2. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ In network design, which technology can be implemented to prioritize traffic based on its importance and technical requirements? STP QoS RTP TCP VPN 5 What are two characteristics of voice over IP traffic? (Choose two.) Voice packets tend to be small. Voice packets must be processed in real time. Voice packets can effectively use TCP reliability features. Voice traffic can survive packet drops and retransmission delays. Voice packets must be converted to analog before being sent across the IP network. Voice packets automatically receive a higher priority value than other types of packets. 6 What are two things that a network designer can do to determine current and anticipated network traffic flows? (Choose two.) Survey end users to obtain customer input. Upgrade the Cisco IOS software in all networking devices to optimize traffic flow. Limit the analysis to host-to-server traffic because host-to-host traffic is unimportant. Run a network traffic analysis to determine which applications are in use and by whom. Conduct an inventory of all networking devices that includes model numbers and memory configurations
  • 3. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ 7 A company that has a traditional telephone system wants to convert to IP telephony. Which two factors should be considered for the design? (Choose two.) Digital communications systems have greater noise than analog systems when processing voice traffic. Voice-enabled routers or a server must be used for call control and signaling. Voice to IP conversions can cause router overhead. Power to the phones can be supplied through properly equipped patch panels or switches. The cost to combine voice and data VLANs can be a considerable amount. 8 Several web and email servers have recently been installed as part of an enterprise network. The security administrator has been asked to provide a summary of security features that can be implemented to help prevent unauthorized traffic from being sent into or out of sensitive internal networks. Which three features should the security administrator recommend? (Choose three.) firewalls priority queuing access control lists intrusion detection systems DHCP 128-bit WEP 9 The design of an IP telephony system needs to meet the technical requirements to provide a connection to the PSTN as well as provide high-quality voice transmissions using the campus
  • 4. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ network. Which two elements directly affect the ability of the design to meet these requirements?(Choose two.) voice-enabled firewall PoE switches and patch panels redundant backbone connectivity voice-enabled router at the enterprise edge separate voice and data VLANs with QoS implemented 10 When implementing VoIP services, which two design considerations should be followed?(Choose two.) Confirm that network jitter is minimal. Use TCP to reduce delays and dropped packets. Establish priority queuing to ensure that large data packets are sent uninterrupted. Disable real-time protocols to reduce queuing strategy demands. Ensure that packet delays do not exceed 150 ms. 11 What design strategy should be followed when designing a network that uses video on demand? implement the appropriate routing protocol to ensure that data segments arrive in order implement different QoS queues based on the type of video traffic being distributed install servers to store the data in a centrally located server farm configure queuing in the core routers to ensure high availability 12 When implementing QoS in traffic queues, what is the first step the designer should take to ensure that traffic is properly prioritized?
  • 5. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ define QoS policies define traffic classes determine traffic patterns identify traffic requirements identify networking equipment 13 Which two statements are characteristics of file transfer traffic flows? (Choose two.) RTP should be used. Traffic is predictable. Packets are small in size. Transfers are throughput intensive. Response-time requirements are low. 14 Which two items can be determined by diagramming internal traffic flow? (Choose two.) the type of ISP services needed the capabilities of end-user devices the areas where network congestion may occur the location of VPN servers used to connect teleworkers locations where high-bandwidth connections are required 15 Which two traffic types are examples of external traffic flows? (Choose two.) A user in the IT department telnets to the core layer router. A user in marketing connects to the web server of a competitor. A user in the IT department telnets into the access layer switch.
  • 6. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ A user in the services department logs in to a web-based email program. A user in accounting connects to an FTP server that is connected to the access layer switch. 16 Which service can be provided by the NetFlow Cisco utility? network planning and mapping IDS and IPS capabilities peak usage times and traffic routing network billing and accounting application security and user account restrictions source and destination UDP port mapping 17 Refer to the exhibit. If ACL 150 identifies only voice traffic from network 192.168.10.0/24 and no other traffic, which queue will voice traffic from other networks use? high normal medium default 18 Refer to the exhibit. After configuring QoS, a network administrator issues the command show queueing interface s0/1. What two pieces of information can an administrator learn from the output of this command? (Choose two.) queue traffic definitions priority list protocol assignments
  • 7. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ type of queuing being implemented number of packets placed in each queue queuing defaults that have been changed queuing has not been applied to this interface 19 An analysis of network protocols reveals that RTP and RTCP are being used. What uses these protocols? IDS VPN WLAN firewall real-time video 20 A company is considering adding voice and video to the data networks. Which two statements are true if voice and video are added? (Choose two.) PoE switches must be purchased. More UDP-based traffic flows will be evident. Response times will be increased even if QoS is implemented. QoS will most likely be implemented to prioritize traffic flows. VPNs will most likely be implemented to protect the voice traffic. 21 Refer to the exhibit. Which option correctly matches the terms on top with its definition on the bottom? A=1, B=3, C=2, D=4
  • 8. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ A=2, B=1, C=4, D=3 A=2, B=4, C=1, D=3 A=3, B=2, C=4, D=1 A=4, B=3, C=1, D=2 A=4, B=2, C=3, D=1 22 A database server is configured to purge all data that is 60 days old. Ten data items that are 60 days old are to be purged. However, there is a failure halfway through the transaction, and the entire transaction is voided. What type of transaction action occurred? atomic consistent durable isolated 23 What is the primary goal of QoS? classification of traffic filtering and queuing voice traffic reducing bandwidth requirements providing priority service to selected traffic 24 Which technology provides a mechanism for implementing QoS at Layer 2? ToS CoS DSCP
  • 9. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ IP precedence 25 A customer purchases tickets online and pays using a credit card, but the system goes down before the transaction is complete. What transaction type retains a record of this transaction after the system failure so that the customer will still receive the tickets and the credit card account will be debited accordingly? atomic consistent durable isolated 26 Refer to the exhibit. The network design documents include requirements to prevent switching loops, to provide link-specific failover, and to provide Layer 3 recovery. Which two protocols would be needed to provide the support? (Choose two.) HDLC HSRP PPP RSTP VTP 27 network design must minimize latency to support real-time streaming applications. Which two protocols enable control and scalability of the network resources and minimize latency by incorporating QoS mechanisms? (Choose two.) RTCP HSRP RSTP
  • 10. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ RTP RPC 28 Which two major differences are associated with IP telephony when compared to traditional telephony that uses a PBX? (Choose two.) manages phones centrally utilizes centralized call routing creates peer-to-peer relationships between phones requires a separate infrastructure to support data transfer requires significant manual configuration when adding, moving, or changing phones 29 When QoS is implemented in a converged network, which two factors can be controlled to improve performance? (Choose two.) link speed delay packet routing jitter packet addressing