Access, Distribution, and Core: Model? (Choose Two.)

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

1 Link aggregation should be implemented at which layer of the hierarchical network?

Core only

Distribution and core

Access and distribution

Access, distribution, and core

2 Which two features are supported at all three levels of the Cisco three-layer hierarchical
model? (Choose two.)

Power over Ethernet

Load balancing across redundant trunk links

Redundant components

Quality of Service

Link aggregation
3 Which hierarchical design model layer controls the flow of network traffic using policies
and delineates broadcast domains by performing routing functions between virtual LANs
(VLANs)?

Application

Access

Distribution

Network

Core

4 Which layer of the hierarchical design model provides a means of connecting devices to
the network and controlling which devices are allowed to communicate on the network?

Application

Access

Distribution

Network
Core

5 A technician is attempting to explain Cisco StackWise technology to a client that is setting


up three stackable switches.Which explanation accurately describes StackWise technology?

StackWise technology allows up to eight ports to be bound together to increase available


bandwidth.

StackWise technology allows the switch to deliver power to end devices by using existing
Ethernet cabling.

StackWise technology allows the switch capabilities and ports to be expanded by the addition of
line cards.

StackWise technology allows up to nine switches to be interconnected via the use of a fully
redundant backplane.

6 Configuring communication between devices on different VLANs requires the use of


which layer of the OSI model?

Layer 1

Layer 3
Layer 4

Layer 5

7 Which three features are commonly supported at the distribution layer of the Cisco
hierarchical network model? (Choose three.)

Security policies

Power over Ethernet

Switch port security

Quality of service

Layer 3 functionality

End user access to network

8
Refer to the exhibit. Beginning with HR servers and workstations, a network engineer is
designing a new security structure for the network. Which set of policies adheres to the
hierarchical network model design principles?

Implement Layer 3 switching on S1 to reduce the packet processing load on D1 and D2. Install
all security processing on S1 to reduce network traffic load.

Configure port security options on S1. Use Layer 3 access control features on D1 and D2 to
limit access to the HR servers to just the HR subnet.

Move all HR assets out of the data center and connect them to S1. Use Layer 3 security functions
on S1 to deny all traffic into and out of S1.

Perform all port access and Layer 3 security functions on C1.

9 A network technician is asked to examine an existing switched network. Following this


examination, the technician makes recommendations for adding new switches where
needed and replacing existing equipment that hampers performance. The technician is
given a budget and asked to proceed. Which two pieces of information would be helpful in
determining necessary port density for new switches? (Choose two.)

Forwarding rate

Traffic flow analysis

Expected future growth

Number of required core connections

Number of hubs that are needed in the access layer to increase performance
10 Which layer of the hierarchical network design model is referred to as the high-speed
backbone of the internetwork? Where high availability and redundancy are critical?

Access layer

Core layer

Data-link layer

Distribution layer

Network layer

Physical layer

11 What statement best describes a modular switch?

A slim-line chassis

Allows interconnection of switches on redundant backplane

Defined physical characteristics

Flexible characteristics

12 Which hierarchical design characteristic would be recommended at both the core and
distribution layers to protect the network in the case of a route failure?

PoE

Redundancy

Aggregation

Access lists

13 Which two characteristics are associated with enterprise level switches? (Choose two.)

Low port density


High forwarding rate

High latency level

Support link aggregation

Predefined number of ports

14 Which feature supports higher throughput in switched networks by combining multiple


switch ports?

Convergence

Redundant links

Link aggregation

Network diameter

15 At which hierarchical layer are switches normally not required to process all ports at
wire speed?

Core layer

Distribution layer

Access layer

Entry layer

16 For organizations that are implementing a voice over IP solution, what functionality
should be enabled at all three layers of the hierarchical network?

Power over Ethernet

Quality of service

Switch port security

Inter-VLAN routing

17 Which layer of the OSI model does an access layer LAN switch use to make a
forwarding decision?
Layer 1

Layer 2

Layer 3

Layer 4

18 What is the likely impact of moving a conventional company architecture to a


completely converged network?

Local analog phone service can be completely outsourced to cost-effective providers.

The Ethernet VLAN structure is less complex.

A shared infrastructure is created resulting in a single network to manage.

QoS issues are greatly reduced.

There is less bandwidth competition between voice and video streams.

19 A network administrator is selecting a switch that will operate at the network core.
Which three features should the switch support for optimum network performance and
reliability? (Choose three.)

Port security

Security policies

10 Gigabit Ethernet

Quality of service (QoS)

Hot-swappable hardware

Power over Ethernet (PoE)

20
Refer to the exhibit. What characteristic of hierarchical network designs is exhibited by
having SW3 connected to both SW1 and Sw2?

Scalability

Security

Redundancy

Maintainability

The Result is satisfactory. If you find any wrong answer please don't hesitate to comment or
email me. Thanks for visiting the blog.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy