CCDA: Cisco Certified Design Associate Study Guide, 2nd Edition (640-861)

1.

Which of the following statements is true regarding traffic shaping?

  1. Traffic shaping eliminates bottlenecks by throttling back traffic volume at the source end.

  2. Traffic shaping only works at Layer 3.

  3. Traffic shaping cannot be used with Frame Relay or Switched Multimegabit Data Service (SMDS).

  4. Traffic shaping only works on Cisco switch technology.

2.

Which of the following might be logged when IP access list logging is enabled? (Choose all that apply.)

  1. Source address

  2. Source port

  3. Destination address

  4. Destination port

  5. Time

  6. Protocol

  7. Access list line number

  8. Access list number

3.

Which of the following are reasons why access lists are used? (Choose all that apply.)

  1. To improve security

  2. To reduce routing protocols

  3. To save bandwidth

  4. To speed convergence

4.

Which of the following will allow IP devices to simply ARP for remote devices and receive the MAC address of a default gateway?

  1. IPX Watchdog ARP

  2. Proxy ARP

  3. Spoofed ARP

  4. DDR

  5. None of the above

5.

Which of the following would be most useful on a subnet without a DHCP server that required DHCP services?

  1. IPX watchdog spoofing

  2. Responding to IPX GNS requests

  3. Proxy ARP

  4. IP helper address

  5. None of the above

6.

In which of the following situations would compression be most useful?

  1. Insufficient bandwidth

  2. Time-sensitive traffic

  3. Multiple routing protocols

  4. High router CPU utilization

7.

Which of the following are valid types of compression?

  1. Header compression

  2. Data compression

  3. Payload compression

  4. Link compression

8.

When using numbered access lists, which range of numbers is used for extended IP access lists?

  1. 0–99

  2. 100–199

  3. 800–899

  4. 900–999

9.

To which type of traffic does weighted fair queuing assign the highest priority?

  1. SNA

  2. IPX

  3. High volume

  4. Low volume

10.

When should weighted fair queuing be used?

  1. To provide priority to interactive traffic

  2. To provide priority to file transfers

  3. To allow all traffic to be forwarded

  4. A and C

  5. A and B

11.

Where is the most effective place to implement queuing?

  1. High-speed LAN links

  2. T1/E1 links only

  3. Any WAN link whose capacity is 2Mbps and slower

  4. All interfaces

12.

When should priority queuing be used?

  1. When traffic has a hierarchical order of importance

  2. When delay doesn’t matter

  3. When all traffic must be forwarded

  4. None of the above

13.

When should custom queuing be used?

  1. When traffic has a hierarchical order of importance

  2. To overcome the possible problem that is introduced with priority queuing

  3. When trying to provide bandwidth sharing for all traffic

  4. When delay is not important

14.

Which step is not part of configuring custom queuing?

  1. Defining the custom queuing filter

  2. Assigning a default queue

  3. Configuring the transfer rate per queue

  4. Assigning a priority queue list to the interface

15.

Which statement best describes weighted fair queuing?

  1. The queues are based on the source and destination of the packets.

  2. Bandwidth is shared among all traffic types, giving priority to low-volume traffic.

  3. Bandwidth is shared among high-priority traffic only.

  4. The queues use FIFO.

16.

Which statement best describes priority queuing?

  1. It processes all queues in a round-robin fashion.

  2. The queues are based on the destination address of the packet.

  3. The queues are based on the traffic type; all queues are processed equally.

  4. The queues are based on the traffic type; the highest priority traffic is always processed first.

17.

Which of the following statements is true regarding traffic shaping?

  1. Frame Relay can use traffic shaping to adapt dynamically to available bandwidth using the BECN mechanism.

  2. IP can use traffic shaping to adapt dynamically to available bandwidth using the BECN mechanism.

  3. Traffic shaping does not work with Layer 2 technologies.

  4. Traffic shaping processes packets based on the destination address.

18.

In which of the following situations would RSVP be useful? (Choose all that apply.)

  1. Insufficient bandwidth

  2. Time-sensitive traffic

  3. Multiple routing protocols

  4. High router CPU utilization

19.

What is the maximum router CPU utilization for enabling compression?

  1. 10 percent

  2. 100 percent

  3. 50 percent

  4. 65 percent

20.

Named access lists are available since which IOS revision?

  1. 10.2

  2. 10.3

  3. 11.2

  4. 11.3

Answers

1.

A Access lists, along with the Frame Relay BECN mechanism, can be used for traffic shaping to help eliminate network bottlenecks.

2.

A, B, C, D, E, F, H All items are logged either to the console or to a Syslog server for later review except for access list line number.

3.

A, C The primary uses of access lists are traffic control. Security and bandwidth are methods of traffic control.

4.

B Proxy ARP can minimize the need for client reconfiguration of default router addresses.

5.

D IP helper addresses can be configured on the Cisco router and allow for central services network designs.

6.

A Traffic compression is best applied to WAN links where bandwidth is at a premium.

7.

A, C, D Header, payload, and link compression are supported by the Cisco IOS. Header compression only affects the IP header, payload compression only affects the data, and link compression works on both the IP header and data.

8.

B Extended IP access lists are numbered using numbers between 100 and 199.

9.

D Weighted fair queuing assigns the highest priority to low-volume traffic.

10.

A Interactive traffic is time-sensitive and is sensitive to delay.

11.

C Queuing is most effective on WAN links.

12.

A Priority queuing guarantees that higher priority traffic will get sent first.

13.

B Custom queuing allows the network designer to classify traffic at the router interface.

14.

D Defining the filter, assigning the queue, and configuring the transfer rate are all configurations required to configure custom queuing.

15.

B Weighted fair queuing assigns a higher priority to low-volume traffic.

16.

D Traffic type (i.e., high-priority), will be processed through the queue first.

17.

A Frame Relay uses the BECN notification method to dynamically accomplish traffic shaping.

18.

A, B RSVP is used by end stations and routers to guarantee the passage of time-sensitive traffic.

19.

D Cisco recommends that compression be disabled on the router if CPU utilization is greater than 65 percent.

20.

C Named access lists have been available since IOS release 11.2.

Категории