-
Which two of these are characteristics of Metro Ethernet?()
A . class of service
B . bandwidth profiles
C . user-network interface
D . Ethernet LAN circuit attributes
E . Ethernet virtual circuit attribute
-
Which of these best describes the Cisco Lifecycle Services approach? ()
A . a methodology for proactively updating equipment before it reaches the end of its life
B . a methodology for introducing new technologies
C . a methodology for creating a business plan
D . a methodology for determining total cost or ownershi
-
Which of these best identifies the types of prefixes a router running BGP will advertise to an EBGP peer? ()
A . prefixes received from any other BGP peer and prefixes locally originated via networkstatements or redistributed to BGP
B . all prefixes in its IP routing table
C . only prefixes received from EBGP peers and prefixes locally originated via network statements or redistributed
D . only prefixes received from EBGP peers and prefixes received from route reflectors
E . all prefixes in its routing table except the prefixes received from other EBGP peers
F . all prefixes in its routing table except the prefixes received from other IBGP peer
-
Which two of these statements best describe the benefits of WPAv1? ()
A . SSID broadcast prevention
B . Improved mutual authentication
C . Improved encryption through AES
D . Improved protection against sniffing initialization vectors
E . RF jamming preventio
-
Which of these is a correct description of SSO?()
A . It will only become active after a software failure.
B . It will only become active after a hardware failure.
C . It requires that Cisco NSF be enabled in order to work successfully.
D . It synchronizes the MAC·, FIB·, and adjacency tables between Active and Standby RouteProcessors.
-
Which three of these are characteristics of UTP cable?()
A . The wires in each pair are wrapped around each other
B . An insulating material covers each of the individual copper wires in it
C . It comes in eight-pair wire bindles
D . EMI and RFI cause only limited degradation to signals running over it
E . It comes in seven categories
F . IT has an external diameter of approximately 0 28 inche
-
Which two of these are characteristics of MPLS VPNs? ()
A . Layer 3 MPLS VPNs can forward only IP packets
B . Layer 2 MPLS VPNs can forward any network protocol
C . MPL S label paths are automatically formed based on Layer 2 frames
D . Layer 3 MPLS VPNs can forward any network protocol based on Layer 2 frames
E . In Layer 2 MPLS VPNS, the service provider controls the customer Layer 3 policie
-
Which of these statements best describes VPLS?()
A . Neither broadcast nor multicast traffic is ever flooded in VPLS.
B . Multicast traffic is flooded but broadcast traffic is not flooded in VPLS.
C . VPLS emulates an Ethernet switch, with each EMS being analogous to a VLAN.
D . Because U-PE devices act as IEEE 802.1 devices, the VPLS core must use STP.
E . When the provider experiences an outage, IP re-routing restores PW connectivity and MAC re-learning is needed.
-
Telepresence and video conferencing have been an increasingly important component of the overall collaboration marker, which indicator is the best measure of the continued importance of these technologies going forward?()
A . generation Y ,raised on video, comprises 17 percent of the world population
B . the annual growth rate of the video-conferencing market is 23 percent
C . the U.S internet traffic annual growth rate is more than 40 percent
D . thecisco long-term growth-rate target is 12 percent to 17 percent
-
Which of these is the best way to convince a prospect of the benefits of the S-Series?()
A . show them independent tests and reviews
B . describe the theory of operation and system internals
C . give a Microsoft PowerPoint presentation
D . give a demonstration that could lead to an evaluatio
-
Which of these best describes the actions taken when a VTP message is received on a switch configuredwith the VTP mode "transparent"?()
A . VTP updates are ignored and forwarded out all ports.
B . VTP updates are ignored and forwarded out trunks only.
C . VTP updates are made to the VLAN database and are forwarded out trunks only.
D . VTP updates are ignored and are not forwarded.
-
Which of these best describes the actions taken when a VTP message is received on a switch configured with the VTP mode "transparent"? ()
A . VTP updates are ignored and forwarded out all ports.
B . VTP updates are ignored and forwarded out trunks only.
C . VTP updates are made to the VLAN database and are forwarded out trunks only.
D . VTP updates are ignored and are not forwarded.
-
Which two of these statements best describe the benefits of Cisco’s wireless IDS functionality? (Choose two.) ()
A . AirDefense for wireless IDS is required by autonomous APs.
B . 2.40Hz CK management can monitor both 802.11 and non-802.11 CK interference.
C . APs only monitor the RF channels that are servicing the clients.
D . Cisco or CCX compatible client cards can extend the CK IDS service for autonomous APs.
E . Autonomous APs must be dedicated IDS sensors while lightweight APs can combine client traffic and RF monitoring.
-
Which two of these statements best describe fast secure roaming for the wireless core feature set using autonomous access points? (Choose two.) ()
A . It is compatible with all wireless clients.
B . It reduces roaming latency through reduced client RF channel scanning enhancements.
C . It reduces roaming latency to targeted times of less than 75ms.
D . Roaming occurs without reauthentication through a centralized RADIUS server.
E . It is enabled through WLSE deployment.
-
You are implementing basic switch security best practices. Which of these is a tactic that you can use to mitigate compromises from being launched through the switch?()
A . Make all ports private VLAN ports.
B . Place all unused ports in native VLAN 1 until needed.
C . Proactively configure unused switch ports as access ports.
D . Disable Cisco Discovery Protocol globally.
-
Which two of these statements best describe the benefits of the Cisco Compatible Extensions Program? (Choose two.)()
A . offers a feature-rich implementation alternative to Wi-Fi certification
B . accelerates the availability of innovative features while maintaining interoperability
C . provides innovative features only on Cisco’s wireless client adapters
D . provides an evolving set of specifications for interoperability
E . eliminates the need for testing by providing innovative features to wireless client vendors through a one-time license fee
-
Which of these statements best describes the major difference between an IPv4-compatible tunnel and a 6to4 tunnel?()
A . An IPv4-compatible tunnel is a static tunnel, but an 6to4 tunnel is a semiautomatic tunnel.
B . The deployment of a IPv4-compatible tunnel requires a special code on the edge routers, but a 6to4 tunnel does not require any special code.
C . An IPv4-compatible tunnel is typically used only between two IPv6 domains, but a 6to4 tunnel is used to connect to connect two or more IPv6 domains.
D . For an IPv4-compatible tunnel, the ISP assigns only IPv4 addresses for each domain, but for a 6to4 tunnel, the ISP assigns only IPv6 addresses for each domain.
-
Which of these is the best definition of the Cisco Lifecycle Services approach? Select exactly 1 answer(s) from the following:()。
A . It defines the minimum set of services required to successfully deploy and operate a set of Cisco technologies
B . It determines how best to price Cisco products
C . It provides partners with a useful way to leverage Cisco resources
D . It consists of these phases: plan, deploy, support, and troubleshoot
-
Which of these statements best describes VPLS?()
A . Neither broadcast nor multicast traffic is ever flooded in VPLS.
B . Multicast traffic is flooded but broadcast traffic is not flooded in VPLS.
C . VPLS emulates an Ethernet switch, with eachEMS being analogous to a VLAN.
D . Because U-PE devices act as IEEE 802.1 devices, the VPLS core must use STP.
E . When the provider experiences an outage, IP re-routing restores PW connectivity and MAC relearning is needed.
-
Which two of these statements best describe fast secure roaming? (Choose two.)()
A . available only in autonomous APs
B . available in autonomous and lightweight APs
C . a feature of WDS in autonomous APs
D . a feature of WDS in lightweight APs
E . requires at least one AP and one Wireless LAN Services Module
-
A customer requires a 2-way solution now that will be the easiest and least disruptive to upgrade to a 4-way in the future. Which of the following solutions best matches these requirements?()
A . p630 2-way Active 2-way Inactive
B . p655 2-way Active 2-way Inactive
C . p5-520 2-way Active 2-way Inactive
D . p5-550 2-way Active 2-way Inactive
-
Which of these user ICAP?()
A . anti-malware scanning
B . data loss prevention polices
C . decryption policies
D . CiscoIronPort Data Security policie
-
The best way to wash down one of these sticky cakes is with a cup of Chinese tea, especially or Chrysanthemum tea, which aids the .
-
An administrator needs to authenticate users to the network, authorize network activities, andaccount for activities done.Which of the following are services that will BEST meet these goals?()(Select TWO).
A.TACACS+
B.RADIUS
C.Kerberos
D.802.1X
E.RRAS