Vous êtes sur la page 1sur 20

CHAPTER QUIZES

CHAPTER 1 QUIZ 1
After an evaluation of the business needs and current network infrastructure of ABC Company, the network designer includes the item install a second UPS for the core web server in the network upgrading proposal. Which network design goal is being met? Security Scalability Availability Performance Manageability Drag each definition on the left to the correct functionality on the right Degree of resource accessibility availability Restriction of unauthorized traffic security Ability to grow as users and applications are scalability added Designed to support personnel can always manageability fix it When designing a network infrastructure, a network engineer will use the hierarchical network model. What two factors must be taken into account when designing the core layer? Packet manipulation to prioritize the flow of core data Redundant links to ensure fault tolerance Routing protocols chosen for the speed of network convergence Access control lists to curtail core layer traffic Star network topologies to reduce core layer latency A company needs to redesign the distribution Layer of their enterprise network. What area should be the focus of the new design? Direct connection to hosts in the local Ethernet network Layer 3 interconnections between smaller local networks High speed connections between Layer 2 devices Interconnections between hosts in a flat network A network engineer is planning the WAN connectivity for critical network traffic. Why would the engineer plan a backup WAN link? To provide extra bandwidth during system backups To provide a development environment for WAN testing To provide extra bandwidth for Voice over IP To provide an alternative path for data in case the primary link fails

Which two are advantages of using a star topology at the access layer of a network? Ease of installation Redundant traffic pathways Minimal configuration needed Ease of recovery after failure Capabilities of central devices can limit network Network traffic between a PC and a printer on the same local network is usually contained within which layer of the hierarchical design model? Core Layer Access Layer Distribution Layer Enterprise Edge Sever Farms Which statement best describes the purpose of deploying a server farm? A server farm is necessary in deploying enterprise-level applications A server farm is required in the DMZ design of an enterprise network A server farm provides efficient management of the mission-critical servers for the enterprise A server farm is designed to provide secure network services and applications to clients on internal networks only Why is the older DMZ firewall model not sufficient to secure mission critical servers and applications? Only servers located on the DMZ network were adequately protected The older model did not offer servers enough protection from internally initiated attacks End-user PCs were not protected in the older model, so they were more frequently hacked Servers on the DMZ were not adequately protected from external attacks How can a wireless network design provide open access for guest users and secure access for employees? Broadcast the SSID so that all users are able to access the network Enable WEP to authenticate both sets of users Create a separate SSID and separate VLAN for guest users Put all access points on the same VLAN and require employees to use WEP Which functional area of the network contains the devices that provide an interface between high speed LAN technologies, such as Ethernet, and slower speed wide area technologies? Core Layer Server Farm Access Layer Transport Layer Enterprise Edge Distribution Layer

10

11

12

13

14

15

A company has decided to allow workers to work from home but does not want to compromise network security. The network administrator has proposed connecting remote users to the company network using virtual private networks? Why are VPNs good choices for connecting remote workers? Allow secure connections over public broadband networks Provide secure connections over dedicated public WAN circuits Segment traffic into logical networks for better bandwidth utilization Provide simple remote access without having to filter special packets A technician is recovering the password on a router. The technician had entered ROMMON mode, changed the configuration register to 0x2142, and reset the router. The technician enters configuration mode on the router, changes the password, and enters the copy run start command. After changing the configuration register to 0x2102, the technician reloads the router. When the router reloads, the technician finds that only the password is in the configuration. What could be the problem? The technician changed the configuration register to the wrong value The technician did not copy the startup configuration to the running configuration before changing the password The technician should have changed the configuration register to 0x2100 The router ignored NVRAM and did not load the startup configuration file when it rebooted The technician did not copy the running configuration to the startup configuration before changing the password Which ACL permits host 10.220.158.10 access to the web server 192.168.3.244? access-list 101 permit tcp host 10.220.158.10 eq 80 host 192.168.3.224 access-list 101 permit tcp host 10.220.158.10 0.0.0.0 host 192.168.3.224 0.0.0.0 eq 80 access-list 101 permit host 10.220.158.10 0.0.0.0 host 192.168.3.224 0.0.0.0 eq 80 access-list 101 permit tcp 10.220.158.10 0.0.0.0 host 192.168.3.224 eq 80 Refer to the exhibit. Host C is unable to transfer data because it does not have the MAC address of the destination host. If host C sends out an ARP request, which of the other hosts will see this message? Host A Host B Hosts A and B Hosts A and D Hosts B and D Hosts A, B and D

CHAPTER 2 QUIZ 1
Drag each Cisco Lifecycle Services stage on the left to its corresponding position on the right. Stage 1 Prepare Stage 2 Plan Stage 3 Design Stage 4 Implement Stage 5 Operate Stage 6 Optimize Which two tasks are conducted during the PPDIOO Prepare phase? Develop an implementation plan Choose vendors and technical partners Establish organizational requirements Identify financial justification for upgrade Compare network performance with design goals Identify the network requirements Building a network according to the design and verifying that it performs according to specifications are part of which phase of the Cisco Lifecycle Services strategy? Prepare Plan Design Implement Operate Optimize Which phase of the Cisco Lifecycle Services strategy addresses the impact of changing business goals? Prepare Plan Design Implement Operate Optimize At which point in the PPDIOO cycle is a RFQ typically generated? During the planning phase At the end of the prepare phase Before the beginning of the design phase Before the PPDIOO cycle begins Match the description on the left to the RFQ section it belongs in on the right. Large hospital in Beijing Organizational overview Six remote offices affiliated with the hospital Install wireless connectivity at the remote clinics Required Deliverables Install a VPN between hospital and clinics Submission date is November 10 Assumptions/Agreements All services must be approved by IT manager

10

In which phases of the PPDIOO is the pre-sales system engineer involved in? Plan and operate Plan and design Design and implement Implement and operate A company is currently in the implementation phase of the PPDIOO cycle. They have a question about the new equipment being installed in the wiring closet. Which two people should they contact for assistance? Account manager Pre-sales system engineer Network designer Post-sale field engineer What are two disadvantages to using a top-down approach to network design? This approach can result in an inappropriate network design A new design cannot be implemented right away This approach contains very little organization requirements This approach is not as familiar to many network designers During an interview with the IT manager, it was discussed that the organization has two critical communication links to its main supplier. These links require an uptime of 24/7. Which part of the PPDIOO process is most affected by this information? Implementation phase Design phase Routing protocol selection Prototype design plan

CHAPTER 3 QUIZ 1
A network consulting company is preparing a network requirements document for a new client. The network design team is in the process of detailing the both physical and logical infrastructure, as well as the equipment and applications in use on the network. Which part of the network design requirements document is the design team preparing? Overall goal Project scope Current state of the network Network requirements A new technician has been hired in the company IT department. The IT manager gives the new technician the most current logical and physical network diagrams to review. Which two pieces of information should the technician be able to learn from the diagrams? Credentials for configuring devices Contact information for installation technicians Location of networking equipment Cost analysis of networking equipment Standard naming conventions Status of routing device links A new technician is assigned a task of updating the existing documentation for a single branch network that consists of all Cisco devices. The technician runs the Cisco Network Assistant at the workstation and issues the commands show cdp neighbors detail and show ip route on each device. Which two pieces of information can be determined by using these tools? Device types and software versions of connected equipment Workstation IP addresses Network hierarchy Total number of devices and hosts on the network Strengths and weaknesses of the current network During the initial redesign of a company network, the IT administrator has requested that the accounting department LAN be exempt from the new network design changes. In which area of the network design is this exemption defined? Overall project goal Request for information Current state of the network Request for proposal Network requirements Project scope Refer to the exhibit. What piece of information can be obtained from the output of the show cdp neighbors detail command? The device is a 2600 series router The neighboring device is a switch The neighboring device is using interface serial 1/0 to connect to this device The hostname of this device is RICHMOND

A technician is dispatched to perform a wireless site survey at a stadium. What three tools or items does the technician need to take along? Laptop Floor plan and tape measure Ethernet switch Pc with terminal emulation software Access point LAN, WAN and USB interface cables Match the activity on the left with the appropriate wireless site survey step on the right Determine service level expectations Define customer requirements Determine possible causes of interference Measure signal stergth Determine which areas have power and how Determine preliminary AP locations the AP will connect to the wired network Estimate number of potential users and identify coverage areas determine expected peak usage Technician performing a wireless site survey use a laptop computer equipped with a site survey utility on its wireless interface card to measure the signal strength and speed of a link as they move away from an AP. Which two things do they do with this information? They mark the areas where signals are acceptable on a floor plan They determine if the area can support advanced wireless technologies They record the readings and measure the distance from the AP when the quality or link speed changes They ensure compliance with all local, state, and national fire and electrical codes They use the results to estimate the number of potential users and to determine the expected peak usage Network designers are accessing the current network infrastructure for a client to prepare a proposal for a network upgrade. Which two items should they include in the Current State of the Network report? Applications used on the network Budget allocated for the project Diagram of the physical topology Projected business growth of the client User groups that might be affected by the network upgrade process A network technician has just completed the installation of a Gigabit Ethernet HWIC into a Cisco 1841 router. After connecting a PC to the console port of the router and powering it on, what two things should the network technician do before configuring the device? Verify that the new interface card is recognized by the Cisco IOS software Note the serial number and speed of the new interface card on the inventory sheet Record the interface designation given to the new interface card on the topology diagram Observe the routing table to make sure that the new interface card is sending and receiving updates

10

11

12

13

Drag the steps of the bootup process on the left to the correct order of occurance on the right Step 1 POST Step 2 load bootstrap program Step 3 locate and load Cisco IOS Step 3 locate and load startup files What happens when the command dir flash is issued on a router The flash memory is erased The flash memory is reformatted The contents of the flash memory are displayed The contents of the flash media are moved to the NVRAM Which two conditions should the network administrator verify before attempting to upgrade a Cisco IOS image using TFTP server? Verify the name of the TFTP server using the show hosts command Verify that the TFTP server is running using the TFTPDNLD command Verify that the checksum for the image is valid using the show version command Verify connectivity between the router and TFTP server using the ping command Verify that there is enough flash memory for the new Cisco IOS image using the show flash command

CHAPTER 4 QUIZ
1 Which two items do end-users consider the main criteria for judging network performance? Network availability Routing efficiency Network design hierarchy Application responsiveness Link utilization Why would a network administrator implement Rapid Spanning Tree Protocol (RSTP) is an enterprise network? To prevent switching loops To load balance traffic over redundant links To implement full duplex uplinks To autonegotiate switch trunks What are two steps that network administrators can take to ensure that users have immediate, reliable access to their emails and shared files? Place FTP and email servers in separate locations for security Provide FTP and email servers suited for low-volume traffic Secure the server location from unauthorized access both physically and logically Ensure that redundant paths exists to all servers Which recommendations should the network designer make to ensure that the web based ecommerce servers are secure and highly available? Two DNS servers should be configured for redundancy Allow inbound Telnet traffic from the internet only from specified networks Two WLC servers should be configured for redundancy Internet traffic should be filtered using firewall features and intrusion Customer access to the e-commerce across the Internet should be WPA encrypted When an IP Telephony design is being implemented, what other feature must also be implemented? Qos Firewall DMZ ACLs Which two statements are true of an IP Telephony system? End users can use digital or analog phones to make a call Analog to digital conversion occurs at a voice-enabled router A Cisco Unified Communications Manager is used for call control Directories and web pages are available for use to end users Which two statements are true regarding IP video communications? Video servers should be distributed across the enterprise to conserve bandwidth in the server farm Live video does not require a waiting period for viewing VOD minimizes the effects on system resources Live video requires large media file storage

10

11

Drag the definition on the left to its correct applicational characteristic on the right. Collect existing network documentation and Organizational input verbal input Gather information about network devices Network audit and details of current configurations Provide information about how the Traffic analysis applications and protocols use the network Which two physical elements of the network infrastructure must be examined by the network administrator prior to implementing a new real-time application? Hardware devices and connections Office locations Network topology IP addressing The administrator is setting up priority queuing. Which classification should be given to VoIP traffic? High Medium Normal Low Which tool can be used to conduct traffic analysis, identify and classify types of traffic in order to apply the correct QoS mechanisms? NBAR NetFlow IDS Priority queuing

CHAPTER 5 QUIZ
1 What three multilayer switch features support the network design goal of availability? In-band and out-of-band management Efficient load balancing of routed traffic Software based packet forwarding or prioritized traffic with QoS Redundant power supplies and fans Route summarization that reduces the impact of a lower level device failure Security features preventing unauthorized or unwanted network traffic A network administrator would like to improve transactional processing time as well as voice and video quality. What three things can be done to help achieve these goals? Reduce traffic and network broadcasts Construction of VLANs for different traffic types Remove high speed storage and content servers Implement QoS on the network Increase traffic filtering Lengthen the end-points of traffic How should the information gathered during risk assessment be used to support the network design? To help identify unknown traffic To establish firewall rule sets To determine redundancy requirements To isolate and identify a security attact Drag the design requirement on the left to the associated design layer of the right Create VLANs Access QoS classification High speed connectivity to distribution layer switches Core 24x7 Availability Aggregate traffic Distribution Traffic filtering A network administrator has been asked to provide a report on any measures taken to ensure full availability at the Core Layer of an enterprise network. If the network has been configured correctly, which three options will the administrator be able to include as part of the report? Redundant links between the Core and Distribution Layers Backup power supply and functioning air conditioning systems EIGPR routing protocols Access control lists Switch port security QoS mechanisms

10

Which design implementation eliminates the need to create a single end-to-end VLAN for wireless roaming? Using a lightweight access point solution with wireless LAN controllers Configuring each standalone access point with a different VLAN address Putting all of the standalone access points in the same IP subnet Configuring all of the access points to use the same channel A local bookstore manager asks one of his employees who is studying networking to implement a wireless network to provide connectivity to the Internet for customers and employees. The wireless network should be able to function even if AP fails because other competitors nearby also offer this service. The bookstore owner is planning to expand into another area of their current building and wants to be able to install Aps easily. The bookstore staff do not have a lot of technical expertise so they want the configuration of the security parameters to be automatic on all wireless Aps. The networking student recommends the following: 1. Install a twelve port Layer 2 switch and attach two wireless access points to the switch in the same VLAN, but on different channels 2. Train the staff to install the Aps using the default security settings Which statement best describes how the recommendation supports the goals of the bookstore? The recommendation meets all of the technical goals of the customer The recommendation does not meet the goal of scalability The recommendation does not meet the goal of availability The recommendation does not meet the goal of security The recommendation does not meet the goal of manageability A large company requires their external workers to have internal access to the information stored on the company server. What method provides secure tunneling through the Internet? Virtual private network Public wireless access point Intrusion detection system SSH protocol In which circumstances would a point-to-point T1 connection be preferred over Frame Relay? Cost concerns are the highest priority QoS is the highest priority Only data traffic uses the connection Connectivity to multiple sites over the same physical connection is required Refer to the exhibit. Where would the network administrator place a standard ACL to prevent the users in the 10.10.10.0/24 subnet from accessing the server in the 10.10.20.0/24 subnet? Router RTR1, Fa0/0 interface, inbound Router RTR1, S0/0 interface, outbound Router RTR2, S0/0 interface, inbound Router RTR2, Fa0/0 interface, outbound

CHAPTER 6 QUIZ
1 Which are two characteristics of a hierarchical addressing scheme? Larger broadcast domain Network modularity Routing stability Private addressing support Increased security What could be two results of having a discontiguous IP addressing scheme? Layer 2 loop Routing loop Security hole NAT cannot function properly Automatic summarization issues Spanning tree convergence time increase What must an administrator do to ensure that summarization will work effectively? Enable CIDR Enable the use of subnet zero Implement a classful routing protocol Assign addresses in a hierarchical scheme What are two ways that some networks can use IPv6 and still communicate over the internet with their other IPv4 networks? Enable tunneling to allow IPv6 packets to be encapsulated and travel over IPv4 networks Buy new interface cards that can read IPv6 packets Upgrade the IOS on the IPv6 edge routers to an image that can translate IPv6 packets to IPv4 packets Increase the IPv4 header size to include the IPV6 packets Use a Microsoft gateway to convert from IPv6 to IPv4 Refer to the following command: RouterX(Config-if)# ipv6 address 2001:DB8:2222:7272::72/64 Which statement is true? No other commands are necessary to allow IPv6 traffic to pass though the router The MAC address of the interface card will be used as the network portion of the IPv6 address A 6-to-4 tunneling method will be used when IPv4 addresses pass through the router The complete IPv6 address is manually specified for the interface Refer to the exhibit. The number of required host addresses for each subnet in a network is listed in the exhibit. This number includes the host address requirements for all router ports and hosts on the subnet. After all device and router port address assignments are determined, what will be the total number of unused host addresses available? Net A 6hosts /29, Net B 14 hosts /28, Net C 33 hosts /26, Net D 126 hosts /25 14 29 34 40 62

10

11

A network administrator is tasked with dividing up a class C network among the QA, Sales, and Administration departments. The QA department is made up of 10 people, the Sales is made up of 28 people, and the Administration has 6. Which two subnets masks adequately address the QA and sales departments? 255.255.255.252 for QA 255.255.255.224 for Sales 255.255.255.240 for QA 255.255.255.248 for QA 255.255.255.0 for Sales Refer to the exhibit. A new PC was deployed int eh Sales network. It was given the host address of 192.168.10.31 with a default gateway of 192.168.10.17. The PC is not communicating with the network properly. What is the cause? (Sales 192.168.10.16/28) The address is in the wrong subnet 192.168.10.31 is the broadcast address for this subnet The default gateway is incorrect The host address and default gateway are swapped Refer to the exhibit. What single address and mask can be used to summarize the networks shown? 172.16.0.0/16, 172.18.0.0/16, 172.20.0.0/16, 172.22.0.0/16 172.16.0.0/13 172.16.0.0/14 172.16.0.0/20 172.16.0.0/22 172.16.0.0/24 What does VLSM allow a network administrator do? Use on subnet mask throughout an autonomous system Use multiple subnet masks in the same IP address space Use RIPv1 as the routing protocol in an entire autonomous system Use multiple routing protocols within an autonomous system Refer to the exhibit. An additional subnet is required for a new Ethernet link between Router1 and Router2. Which subnet address can be configured in this network to provide a maximum of 14 useable addresses for this link while wasting the fewest addresses? Networks:192.168.1.64/26, 128/26, 208/28, 192/28, 248/30, 244/30 192.168.1.16/16 192.168.1.96/28 192.168.1.160/28 192.168.1.196/27 192.168.1.224/28 192.168.1.240/28

CHAPTER 7 QUIZ
1 Which three descriptions accurately define the concept of a pilot network? User traffic not affected by changes Highly-controlled and simulated environment Requires real-world network traffic Not as easily controlled as a prototype network High visibility and risk Flexibility and manageability When building a prototype to test a network design, why is it important to create a test plan before beginning the process? To ensure that the goals of the test are clear and measurable To record a baseline of network activity on the production network To provide a step-by-step guide for implementation of the network design To ensure that network resources are adequate to support additional traffic generated by the test Identify the testing tool or command on the left with its purpose on the right Arp commands Show layer 2 to layer 3 mapping Debug commands Provides real time analysis Ping commands Verifies layer 3 connectivity Software logging Supports trend analysis Show commands Provides current state of routing tables telnet commands Allows terminal sessions on remote devices Traceroute commands Confirms layer 3 path end-to-end What is a common way of load balancing traffic over redundant links? EtherChannel STP Unequal cost routed links Separate ISP connections A network administrator is testing the redundant links between switches. What state will the redundant link reach after the active link is disconnected? Blocking Forwarding Listening Learning disbled A network designer wishes to add another server to the current network. What risk does the designer avoid by implementing two servers? Limited scalability Large failure domain Possible bottlenecks Single point of failure

10

A new company will have several buildings and use the network for voice, video and data. Two proposals have been made: 1. Use a flat switched network design to connect all the buildings and a single router for internet access 2. Use a hierarchical infrastructure with switches at the access layer and routers for data transport between buildings and internet access. Which statement about the competing designs is correct? Proposal 1 meets all design goals Proposal 2 meets all design goals Proposal 2 is only adequate for data traffic Proposal 1 works well for video, but not VoIP Which Cisco switching protocol provides resiliency when a network experiences problems and ensures near 100% uptime? VTP RSTP BPDU EIGRP A web content hosting company has been granted a new contract to host an online ordering service for large retail chain. The content hosting company asks a networking consulting firm to examine the current network infrastructure to prepare for the launch of the online ordering service. The examination reveals that the content hosting company has two T1 lines connected to two separated ISPs. The server farm provides each customer with a separate web server. Each server is running Linux with Apache on one 30-gigabyte hard disk? What are the two greatest potential risks in the current network infrastructure of the content hosting company? Single point of failure of the web server Large failure domain if the web server fails Potential bottle necks on the internet connection Single point of failure if their ISP fails to provide connection Limited scalability of web servers due to their hard disk capacity Refer to the exhibit. Port Fa 0/0 on router R1 is connected to pot Fa0/1 on switch S1. After the commands shown are entered on both devices, the network administrator determines that the devices on VLAN 2 are unable to ping the devices on VLAN 1. What is likely the problem? S1 is not configured for trunking R1 does not have the VLANs entered in the VLAN database Spanning tree protocol is blocking port Fa0/0 on R1 The VLANs do not match the subinterface numbers

CHAPTER 8 QUIZ
1 What three things can be done to simulate a DSL or cable WAN connection in a lab environment? Use 100Mbps serial links between the routers Use 10Mbps Ethernet connections between the routers via a crossover cable Use 100Mbps Ethernet links to connect the routers via a straight-through cable Use 10Mbps Ethernet connections between the routers via a straight-through cable Change static route preference by increasing the administrative distance assigned to the route Use the bandwidth command on the Ethernet links to adjust the routing metric Drag the network simulation software on the left to the benefit on the right Test software is cheaper than a test network Low overall cost Changing device types and topologies is easy Flexibility Traffic can be observed and packets can be examined Control Faster to build large networks with software Scalability A ping is sent to address 192.168.50.10 from the Peanut router. Which DLCI will be used to send the ping? 110 115 220 225 Refer to the exhibit. Given the topology as shown, a network administrator configures a Frame Relay connection to allow each of the routers to communicate with each other. Upon completing the task, the administrator makes a routing change on R2 but notes that the update is only being reflected at R1. How should the network administrator resolve this problem? Reconfigure the routing protocol on each of the routers Configure sub-interfaces on R1 instead of using single interface Routing protocols cannot update across a Frame Relay connection Shut down and restart the S0/0/0 interface on R1 as this will trigger a routing update A network administrator has configured a Frame Relay connection between the corporate network and a local Internet service provider (ISP) to supply the network database servers with a dedicated circuit. During routine monitoring, the network administrator notices that during periods of high traffic, the servers need to retransmit the same data multiple times in order to complete file transfers. A packet capture of the data headers indicates that the Discard Eligible (DE) bit is set to one. What must the administrator do to correct this problem? Have the ISP increase the local access rate Replace the cables connecting the server to the CSU/DSU Switch to a different ISP which will provide better QoS Contact the ISP to have the Committed Interface Rate (CIR) increased

10

What is the purpose of encrypting traffic on a secure VPN? To ensure that traffic is routed along the VPN To ensure that data sent across the VPN between both authenticated endpoints is not viewable as clear text To ensure that traffic coming from unauthorized personnel does not conflict with traffic from authorized personnel To ensure that all traffic coming from the internet is not viewable in clear text Drag the encapsulation protocol on the left with the correct description on the right GRE Can encapsulate a wide variety of protocol packet types inside IP tunnels IPSec A framework of open standards and functions at the network layer L2F A protocol that supports the creation of secure virtual private dialup networks over the internet by tunneling Layer 2 frames PPTP A protocol developed by Microsoft used to create VPNs across TCP/IP networks L2TP An IETF standard protocol used to tunnel layer 2 PPP packets through a public network using IP Where should the VPN server be located on the network to handle the encrypted data? After the traffic has entered the internal network Before the flow of traffic reaches the internal network At the used endpoint At the service provider edge as traffic arrives from the user endpoint When troubleshooting a Frame Relay connection, an administrator entered the show interfaces s0/0/0 command and received the output shown in the exhibit. What are two probable reasons for this problem? The cable between the CSU/DSU and the other router is disconnected The serial 0/0/0 interface is shutdown The router is not configured for the same Frame Relay PVC as the switch The LMI type of the Frame Relay switch is not ANSI The address of the Frame Relay switch is not in the routing table What provides data confidentiality in a VPN? Hashing Tunneling Encryption Data headers Encapsulation SHA OR MD5

CHAPTER 9 QUIZ
1 Which section of the network proposal appears in the beginning and covers benefits to the customer and summarizes the prioritized goals and project scope? Network requirements and current network environment Physical and logical design Cost proposal Executive summary Implementation plan What are two benefits with a green field installation? A green field or new installation is cheaper than other implementation methods There are no users or services to disrupt A phased approach makes implementation quicker All of the equipment and services can be installed at the same time Outdated equipment can be replaced with newer equipment Which two are benefits to purchasing a Cisco SMARTnet contract? Access to Cisco TAC 24 hours a day 7 days a week Free equipment based on the contract coverage Free training for equipment confirmation Advanced replacement of hardware parts Free shipping to customers that adhere to the Cisco SMARTnet contracts Which section of the network proposal contains escalations and complaint resolutions? Network requirements Terms and signatures Executive summary Implementation plan When can the implementation phase of a network project begin? On the date that was set in the network proposal As soon as the network design is completed As soon as the customer approves the implementation plan As soon as the planning phase has ended
Which three types of documentation are required for each task in the implementation plan of the network proposal?

Rollback guidelines in case of failure Estimated costs associated with new hardware References to design documents Estimated time required for completion Training requirements for the end users Maintenance schedule

A company has requested the IT department to upgrade the backbone of their network to increase throughput and productivity. Management has requested that the services remain stable and usable during this update. In addition, the management has decided to replace all of the existing backbone devices and has agreed to purchase all new devices and cabling. Which installation method is best for this company?

New installation Phased installation Complete replacement Partial installation

Vous aimerez peut-être aussi