-
You need to decide on the best router redundancy protocol to use in the Company network. Which two statements are true about HSRP, VRRP, and GLBP?()
A . GLBP and VRRP allow for MD5 authentication, whereas HSRP does not.
B . HSRP allows for multiple upstream active links being simultaneously used, whereas GLBP does not.
C . GLBP allows for router load balancing of traffic from a network segment without the different host IP configurations required to achieve the same results with HSRP.
D . Unlike HSRP and VRRP, GLBP allows automatic selection and simultaneous use of multiple available gateways.
E . GLBP allows for router load balancing of traffic from a network segment by utilizing the creation of multiple standby groups.
-
Which statement best describes the Turbo ACL feature? ()
A . The Turbo ACL feature processes ACLs into lookup tables for greater efficiency
B . The Turbo ACL feature leads to increased latency, because the time it takes to match the packet isvariable
C . The Turbo ACL feature leads to reduced latency, because the time it takes to match the packet is fixedand consistent
D . Turbo ACLs increase the CPU load by matching the packet to a predetermined list
-
Which two of these statements best describe the benefits of WPAv1? ()
A . SSID broadcast prevention
B . Improved mutual authentication
C . Improved encryption through AES
D . Improved protection against sniffing initialization vectors
E . RF jamming preventio
-
You need to design the VLAN scheme for the Company network. Which two statements are true about best practices in VLAN design?()
A . Routing should occur at the access layer ifvoice VLANs are utilized. Otherwise, routing should occur at the distribution layer.
B . Routing should always be performed at the distribution layer.
C . VLANs should be localized to a switch.
D . VLANs should be localized to a single switch unlessvoice VLANs are being utilized.
E . Routing should not be performed between VLANs located on separate switches.
-
Which two statements best describe enhanced wireless security encryption?()
A . TKIP protects RC4 encryption keys
B . CKIP and TKIP protect AES encryption keys
C . TKIP encryption is more processor intensive than AES encryption is
D . WPA requires TKIP encryption, whereas WPA2 supports AES encryption
E . WPA requires AES encryption, whereas WPA2 supports TKIP encryptio
-
Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。
A . It specifies use of a static encryption key that must be changed frequently to enhance security
B . It requires use of an open authentication method
C . It specifies the use of dynamic encryption keys that change each time a client establishes a connection
D . It requires that all access points and wireless devices use the same encryption key
E . It includes authentication by PSK
-
A network administrator is configuring ACLs on a cisco router,to allow traffic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0and192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()
A . access-list 10 permit ip 192.168.147.0 0.0.0.255.255
B . access-list 10 permit ip 192.168.149.0 0.0.0.255.255
C . access-list 10 permit ip 192.168.146.0 0.0.0.0.255
D . access-list 10 permit ip 192.168.146.0 0.0.0.1.255
E . access-list 10 permit ip 192.168.148.0 0.0.0.1.255
F . access-list 10 permit ip 192.168.146.0 255.255.255.0
-
Which of these statements best describes VPLS?()
A . Neither broadcast nor multicast traffic is ever flooded in VPLS.
B . Multicast traffic is flooded but broadcast traffic is not flooded in VPLS.
C . VPLS emulates an Ethernet switch, with each EMS being analogous to a VLAN.
D . Because U-PE devices act as IEEE 802.1 devices, the VPLS core must use STP.
E . When the provider experiences an outage, IP re-routing restores PW connectivity and MAC re-learning is needed.
-
Which statement best describes OSPF external LSAs (type 5)?()
A . OSPF external LSAs are automatically flooded into all OSPF areas, unlike type 7 LSAs, which require that redistribution be configured.
B . External LSAs (type 5) are automatically changed to type 1 LSAs at ASBRs.
C . Type 5 LSAs are route summaries describing routes to networks outside the OSPF Autonomous System.
D . External network LSAs (type 5) redistributed from other routing protocols into OSPF are not permitted to flood into a stub area.
-
Which statement best describes echo?()
A . Echo is the discernable leak-through of your own Rx path into your own Tx path.
B . Echo is the discernable leak-through of the packets of your Rx path into your own Tx path.
C . Echo is the nonaudible leak-through of the packets of your Rx path into your own Tx path.
D . Echo is the audible leak-through of the packets from the transmit path into your own receive path.
E . Echo is the nonaudible leak-through of the packets of your Tx path into your own Rx path.
-
Which two statements best describe CBWFQ?()
A . The CBWFQ scheduler provides a guaranteed minimum amount of bandwidth to each class.
B . CBWFQ services each class queue using a strict priority scheduler.
C . The class-default queue only supports WFQ.
D . Inside a class queue, processing is always FIFO, except for the class-default queue.
-
Which two of these statements best describe the benefits of Cisco’s wireless IDS functionality? (Choose two.) ()
A . AirDefense for wireless IDS is required by autonomous APs.
B . 2.40Hz CK management can monitor both 802.11 and non-802.11 CK interference.
C . APs only monitor the RF channels that are servicing the clients.
D . Cisco or CCX compatible client cards can extend the CK IDS service for autonomous APs.
E . Autonomous APs must be dedicated IDS sensors while lightweight APs can combine client traffic and RF monitoring.
-
Which two of these statements best describe fast secure roaming for the wireless core feature set using autonomous access points? (Choose two.) ()
A . It is compatible with all wireless clients.
B . It reduces roaming latency through reduced client RF channel scanning enhancements.
C . It reduces roaming latency to targeted times of less than 75ms.
D . Roaming occurs without reauthentication through a centralized RADIUS server.
E . It is enabled through WLSE deployment.
-
Which two statements best describe Cisco IOS IP SLA?()
A . only implemented between Cisco source and destination-capable devices
B . statistics provided by syslog, CLI, and SNMP
C . measures delay, jitter, packet loss, and voice quality
D . only monitors VoIP traffic flows
E . provides active monitoring
F . provides passive monitoring
-
Which two statements best describe the Cisco Unified Wireless Network?()
A . The Cisco Unified Wireless Network provides the framework to segregate wired and wirelessnetworks to deliver the best security for companies that are deploying WLANs.
B . The Cisco Unified wireless Network provides the framework to integrate and extend wired andwireless networks to deliver the lowest-possible total cost or ownership for companies that aredeploying WLANs
C . The Cisco Unified Wireless Network extends "wireless awareness" into important elements ofthe network infrastructure, providing the same level of security for WLANs that organizations havecome to expect from their VPNs.
D . The Cisco unified Wireless Network extends "wireless awareness" into important elements ofthe network infrastructure, providing the same level of security scalability, reliability ease ofdeployment and management for WLANs that organizations have come to expect from their wiredLANs.
-
Which two of these statements best describe the benefits of the Cisco Compatible Extensions Program? (Choose two.)()
A . offers a feature-rich implementation alternative to Wi-Fi certification
B . accelerates the availability of innovative features while maintaining interoperability
C . provides innovative features only on Cisco’s wireless client adapters
D . provides an evolving set of specifications for interoperability
E . eliminates the need for testing by providing innovative features to wireless client vendors through a one-time license fee
-
Which two statement best describes the Cisco Unified Wireless Network? ()
A . The Cisco Unified Wireless Network provides the framework to segregate wired and wireless networks to deliver the best security for companies that are deploying WLANs
B . The Cisco Unified Wireless Network provides the framework to integrate and extend wired and wireless networks to deliver the lowest-possible total cost of ownership for companies that are deploying WLANs
C . The Cisco Unified Wireless Network extends wireless awareness into important elements of the network infrastructure, providing the same level of security for WLANs that organizations have come to expect from their VPNs
D . The Cisco Unified Wireless Network extends wireless awareness into important elements of the network infrastructure, providing the same level of security, sociability, reliability, ease of deployment, and management for WLANs that organizations have come to expect from their wired LAN
-
Which of these statements best describes VPLS?()
A . Neither broadcast nor multicast traffic is ever flooded in VPLS.
B . Multicast traffic is flooded but broadcast traffic is not flooded in VPLS.
C . VPLS emulates an Ethernet switch, with eachEMS being analogous to a VLAN.
D . Because U-PE devices act as IEEE 802.1 devices, the VPLS core must use STP.
E . When the provider experiences an outage, IP re-routing restores PW connectivity and MAC relearning is needed.
-
Which two of these statements best describe fast secure roaming? (Choose two.)()
A . available only in autonomous APs
B . available in autonomous and lightweight APs
C . a feature of WDS in autonomous APs
D . a feature of WDS in lightweight APs
E . requires at least one AP and one Wireless LAN Services Module
-
A network administrator is configuring ACLs on a cisco router, to allow affic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0 and 192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()
A . access-list 10 permit ip 192.168.147.0 0.0.0.255.255
B . access-list 10 permit ip 192.168.149.0 0.0.0.255.255
C . access-list 10 permit ip 192.168.146.0 0.0.0.0.255
D . access-list 10 permit ip 192.168.146.0 0.0.1.255
E . access-list 10 permit ip 192.168.148.0 0.0.1.255
F . access-list 10 permit ip 192.168.146.0 255.255.255.0
-
Which two statements about the best effort model for QoS are true?()
A . delay sensitive packets are given preferential treatment
B . the default policy identifies a delay sensitive class and default class
C . the default policy identifies a delay sensitive class, best effort class, and default class
D . the model is highly scalable
E . the model is still predominant on the internet F the model provides guaranteed service
-
Which two statements best describe spanning-tree BPDU processing for a blocking port?()
A . BPDUs that enter a blocking port are discarded.
B . BPDUs that enter a blocking port are processed.
C . Loopguard puts an interface into a loop-inconsistent state when BPDUs stop being received on a blocking port.
D . BPDUs are only processed on forwarding ports.
-
A router has two paths to reach another network in a different autonomous system. Neither route was generated by the local router and both routes have the same default weight an d local preference values.Which statement is true about how BGP would select the best path?()
A. To influence one route to be preferred, its default local preference value will be changed via the use of the command bgp default local - preference 50
B. Th e router will prefer the shortest autonomous system path
C. If the command bgp always - compare - med has been given, then the router will prefer the route with the highest MED
D. The router will prefer the route with the lower MED
-
Directions: In this part, there are two statements related to the video you have just watched. To each statement there are four choices. Choose the best one() to each question. Which of the following
A.In American culture friendship means a strong life-long bond between two peopl
E.Friendships develop slowly, since they are built to last.
B.I n C hina there are few limits on what you can ask or expect of a frien
D.You can feel free to tell your friend what he or she can or should do to help you.
C.In China,friendships are based on common interests. When the shared activity ends, the friendship may fade
D.Americans expect their friends to be independent , so they do not feel comfortable in a relationship in which one person is giving more and the other person is dependent on what is being given.
此题为多项选择题。