1. A network engineer has decided to pilot test a portion of a new network design rather than rely on a prototype for proof-of-concept. What are two advantages of pilot testing a design concept?(Choose two.) The test network experiences real-world network traffic. Users within the enterprise are not …
1. A network engineer researched whether there are mechanisms available to help with the transition from an IPv4 addressing structure to IPv6. What three options did the engineer find?(Choose three.) A protocol translation mechanism allows communication between the IPv4 and IPv6 networks. A packet analyzer determines the addressing …
1. Which rule should be followed when implementing the security requirements of a network design? Always use a common security plan for all business needs. As standard practice, lower access restrictions for users if cost is too high. Avoid reducing security in order to add additional network capabilities. …
1. In addition to the technical considerations, what other major factor is used to evaluate the success of a network installation? final project costs maintenance costs user satisfaction statistics describing the performance of network devices 2. Which two network applications are most affected by network congestion and delays? …
1. It is important to identify the details of network sections and devices that will be affected or involved in a new design. This information is included in which section of the Network Design Requirements Document? Project Goal Project Scope Technical Requirements Current State of the Network 2. …
1. During an evaluation of the currently installed network, the IT staff performs a gap analysis to determine whether the existing network infrastructure can support the desired new features. At which stage of the Cisco Lifecycle Services approach does this activity occur? Prepare Phase Plan Phase Design Phase …
1. What are two mechanisms that provide redundancy for server farm implementations? (Choose two.) host intrusion prevention systems virtual private networks network intrusion prevention systems Rapid Spanning Tree Protocol Hot Standby Routing Protocol 2. The ability to connect securely to a private network over a public network is …
Lab 8.5.3 – Troubleshooting Enterprise Networks 3 (Answers) Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1 Fa0/0 192.168.10.1 255.255.255.0 N/A Fa0/1 192.168.11.1 255.255.255.0 N/A S0/0/0 10.1.1.1 255.255.255.252 N/A S0/0/1 10.3.3.1 255.255.255.252 N/A R2 Fa0/1 192.168.20.1 255.255.255.0 N/A S0/0/0 10.1.1.2 255.255.255.252 N/A S0/0/1 10.2.2.1 …
Lab 8.5.2 – Troubleshooting Enterprise Networks 2 (Answers) Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1 Fa0/0 192.168.10.1 255.255.255.0 N/A Fa0/1 192.168.11.1 255.255.255.0 N/A S0/0/0 10.1.1.1 255.255.255.252 N/A S0/0/1 10.3.3.1 255.255.255.252 N/A R2 Fa0/1 192.168.20.1 255.255.255.0 N/A S0/0/0 10.1.1.2 255.255.255.252 N/A S0/0/1 10.2.2.1 …
Lab 8.5.1 – Troubleshooting Enterprise Networks 1 (Answers) Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1 Fa0/0 192.168.10.1 255.255.255.0 N/A Fa0/1 192.168.11.1 255.255.255.0 N/A S0/0/0 10.1.1.1 255.255.255.252 N/A S0/0/1 10.3.3.1 255.255.255.252 N/A R2 Fa0/1 192.168.20.1 255.255.255.0 N/A S0/0/0 10.1.1.2 255.255.255.252 N/A S0/0/1 10.2.2.1 …