-
What is a design consideration when using existing PCIe I/O drawers in a maximum bandwidth/throughput configuration on a new Power 750 system?()
A . The new system requires 1 installed processor card for the GX++ bus adapter
B . The new system requires a minimum of 2 installed processor cards for the GX++ bus adapter
C . The new system requires a minimum of 3 installed processor cards and the HPC InfiniBand cluster adapter
D . The new system requires 1 installed processor card for the GX++ bus adapter and the HPC InfiniBand cluster adapter
-
What is one of the reasons that custom QoS ACLs are recommended over automatic QoS when configuring ports on a Catalyst 6500 for use with IP phones?()
A . 79xx IP phones do not automatically mark voice packets with non-zero DSCP values.
B . 79xx IP phones do not mark protocol packets such as DHCP, DNS, or TFTP with non-zero DSCP values.
C . 79xx IP phones do not mark voice packets with optimal DSCP values.
D . 79xx IP phones use a custom protocol to communicate CDP information to the switch.
-
What are three of the functions that AutoQoS performs when it is configured on a switch?()
A . synchronizes FIFO, PQ, CQ, and MDRR, with WFQ, CBWFQ, and LLQ
B . enables strict priority queuing for voice traffic, and weighted round robin queuing for data traffic
C . enables low latency queuing to ensure that voice traffic receives priority treatment
D . enforces a trust boundary on switch access ports and uplinks/downlinks
E . modifies queue sizes as well as queue weights where required
F . adjusts link speeds to adapt to QoS need
-
A network administrator is configuring ACLs on a cisco router,to allow traffic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0and192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()
A . access-list 10 permit ip 192.168.147.0 0.0.0.255.255
B . access-list 10 permit ip 192.168.149.0 0.0.0.255.255
C . access-list 10 permit ip 192.168.146.0 0.0.0.0.255
D . access-list 10 permit ip 192.168.146.0 0.0.0.1.255
E . access-list 10 permit ip 192.168.148.0 0.0.0.1.255
F . access-list 10 permit ip 192.168.146.0 255.255.255.0
-
When configuring a serial interface on a router, what is the default encapsulation?()
A . atm-dxi
B . frame-relay
C . hdlc
D . lapb
E .
-
Refer to the exhibit. GLBP has been configured on the network. When the interface serial0/0/1 on router R1 goes down,
how is the traffic coming from Host1 handled? ()
https://assets.asklib.com/images/image2/2018073015230243383.jpg
A . The traffic coming from Host2 is forwarded through router R2 with no disruption. The traffic from Host1 is dropped due to the disruption of the load balancing feature configured for the glbp group.
B . The traffic coming from both hosts is temporarily interrupted while the switchover to make R2 active occurs.
C . The traffic coming from Host2 is forwarded through router R2 with no disruption. Host1 sendsan ARP request to resolve the MAC address for the new virtual gateway.
D . The traffic coming from Host1 and Host2 is forwarded through router R2 with no disruption.
-
When a new trunk link is configured on an IOS based switch, which VLANs are allowed over the link?()
A . All defined VLANs are allowed on the trunk by default.
B . Each VLAN, or VLAN range, that is specified with the switchport mode command.
C . Each VLAN, or VLAN range, that is specified with the vtp domain command.
D . Each VLAN, or VLAN range, that is specified with the vlan database command.
-
Which of these best describes the actions taken when a VTP message is received on a switch configured with the VTP mode "transparent"? ()
A . VTP updates are ignored and forwarded out all ports.
B . VTP updates are ignored and forwarded out trunks only.
C . VTP updates are made to the VLAN database and are forwarded out trunks only.
D . VTP updates are ignored and are not forwarded.
-
When you enable port security on an interface that is also configured with a voice VLAN, what is the maximum number of secure MAC addresses that should be set on the port?()
A . No more than one secure MAC address should be set.
B . The default will be set.
C . The IP phone should use a dedicated port, therefore only one MAC address is needed per port.
D . No value is needed if the switchport priority extend command is configured.
E . No more than two secure MAC addresses should be set.
-
Which three statements best describe HSRP configuration on Cisco Nexus switches?()
A . In a vPC topology, the primary HSRP router will respond to ARP requests, but both HSRP routers will forward data traffic. No additional configuration is required.
B . In a vPC topology, the primary HSRP router will respond to ARP requests, but both HSRP routers will forward data traffic if the peer-gateway feature is enabled.
C . You can configure two overlapping HSRP groups to load share traffic from the connected hosts while providing the default router redundancy.
D . You can use the show standby command to verify HSRP operation and configuration.
E . If you remove the feature hsrp command, all relevant HSRP configuration information isalso removed.
-
You have a portable computer that runs Windows 7. Windows Backup is configured to run every day at15:00. You need to prevent backups from automatically running when the computer is running on thebattery. What should you do?()
A . From Backup and Restore, click Change settings.
B . From Task Scheduler, modify the AutomaticBackup task.
C . From Power Options, modify the settings of the current power plan.
D . From the local computer policy, modify the power management settings.
-
When a new trunk is configured on a 2950 switch, which VLANs by default are allowed over the trunk link?()
A . no VLANs
B . all VLANs
C . only VLANs 1 - 64
D . only the VLANs that are specified when creating the trunk
-
When configuring qos on a wireless controller, the per-user, real-time bandwidth contract is enforced for which of the following protocols?()
A . ipx
B . ip
C . udp
D . tc
-
Refer to the exhibit.
What is the effect when the switchport priority extend cos 3 command is configured on the switch port interface connected to the IP phone?()
https://assets.asklib.com/images/image2/2018073014514766413.jpg
A . The IP phone is enabled to override with aCoS value of 3 the existing CoS marking of the PC attached to the IP phone.
B . The switch will no longer tag incoming voice packets and will extend the trust boundary to the distribution layer switch.
C . RTP will be used to negotiate aCoS value based upon bandwidth utilization on the link.
D . Effectively, the trust boundary has been moved to the PC attached to the IP phone.
E . The computer is now establishing theCoS value and has effectively become the trust boundary.
-
When HSRP is configured on a network, which two of these items are provided, which are shared between the routers that run HSRP ?() (choose two)
A . Shared single interface
B . IP Address
C . TCP-based hello packets
D . MAC addre
-
When a new trunk is configured on a 2950 switch, which VLANs by default are allowed over the trunk link()。
A . no VLANs
B . all VLANs
C . only VLANs 1 - 64
D . only the VLANs that are specified when creating the trunk
-
On an existing two-node cluster, the system is configured with RAID5 SSA as the shared disk. When adding a new node to the cluster, what must be taken into consideration?()
A . Nothing,SSA can support a maximum of 8 initiators per loop.
B . The RAID5 implementation on SSA will only support two initiators per loop.
C . SSA can only support four initiators per lop when using the fat write option.
D . The RAID implementation can be used with three initiators only if the fast write cache option is used on all adapters.
-
Router R1 is configured for HSRP. Which of the following are valid HSRP states on R1? ()
A . Init
B . Idle
C . Active
D . Standby
E . Established
F . Backu
-
When configuring port security on a Cisco Catalyst switch port, what is the default action taken by the switch if a violation occurs? ()
A . protect (drop packets with unknown source addresses)
B . restrict (increment SecurityViolation counter)
C . shut down (access or trunk port)
D . transition (the access port to a trunking port)
-
A network administrator is configuring ACLs on a cisco router, to allow affic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0 and 192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()
A . access-list 10 permit ip 192.168.147.0 0.0.0.255.255
B . access-list 10 permit ip 192.168.149.0 0.0.0.255.255
C . access-list 10 permit ip 192.168.146.0 0.0.0.0.255
D . access-list 10 permit ip 192.168.146.0 0.0.1.255
E . access-list 10 permit ip 192.168.148.0 0.0.1.255
F . access-list 10 permit ip 192.168.146.0 255.255.255.0
-
When CONFIGURE CONTROLFILE AUTOBACKUP is set to ON, RMAN automatically performs a control file autobackup in which three situations?()
A . At the end of every RUN block.
B . After every SET CONTROLFILE AUTOBACKUP FORMAT command.
C . After every BACKUP or COPY command issued at the RMAN prompt.
D . At the end of every RUN block if the last command in the block was either BACKUP or COPY.
E . Whenever a BACKUP or COPY command within a RUN block is followed by a command that is neither BACKUP nor COPY.
F . After every BACKUP or COPY command within a RUN block that is followed by the CONFIGURE CONTROLFILE AUTOBACKUP FORMAT command.
-
When configuring a routed port on a Cisco multilayer switch, which of these is a required configuration task that you must perform to enable that port to function as a routed port? ()
A . Enable the switch to participate in routing updates from external devices with the router command in global configuration mode.
B . Enter the no switchport command to disable Layer 2 functionality at the interface level.
C . Each port participating in routing of Layer 3 packets must have an IP routing protocol assigned on aperinterface level.
D . Routing is enabled by default on a multilayer switch, so the port can become a Layer 3 routing interface by assigning the appropriate IP address and subnet information.
-
On a 3550 EMI switch, which three types of interfaces can be used to configure HSRP? ()
A . Loopback interface
B . SVI interfac
C . Routed port
D . Access port
E . EtherChannel port channel
F . BVI interface
-
Which two static routes are typically configured on your router when a Routed 1483 network is grouping ATM PVCs intoalarge subnet?()
A.host route
B.default route
C.customer network
D.ISP’s routing domain