Based on the network shown in the graphic which option contains the potential networking problem and protocol or setting that can to prevent the problem?()https://assets.asklib.com/images/image2/2018072317204037.jpg
A . Routing loops, hold down timers
B . Switching loops, split horizon
C . Routing loops, split horizon
D . Switching loops, VTP
E . Routing loops, STP
F . Switching loops, STP
-
()is based on logistics network but more computerized and systemized than logistics operation.
A . Virtual logistics
B . Imaginary logistics
C . Thinking logistics
D . Logistics planning
-
Based on the show spanning-tree vlan 200 output shown in the exhibit,
which two statements about the STP process for VLAN 200 are true? ()
https://assets.asklib.com/images/image2/2018073109163766061.jpg
A . BPDUs will be sent out every two seconds.
B . The time spent in the listening state will be 30 seconds.
C . The time spent in the learning state will be 15 seconds.
D . The maximum length of time that the BPDU information will be saved is 30 seconds.
E . This switch is the root bridge for VLAN 200.
F . BPDUs will be sent out every 10 seconds.
-
()is based on logistics network, but more computerized and systematized than logistics operation .
A . Virtual logistics
B . Imaginary logistics
C . Thinking logistics
D . logistics planning
-
You are the Cisco Network Designer in Cisco.com. Which of these is a Layer 2 transport architecture that provides packet-based transmission optimized for data based on a dual ringtopology?()
A . Dynamic Trunking Protocol
B . Resilient Packet Ring
C . Synchronous Digital Hierarchy
D . Coarse Wave Division Multiplexing
-
Refer to the exhibit. Based on the VPN connection shown, which statement is true?()https://assets.asklib.com/images/image2/2018072316463026156.jpg
A . Traffic that matches access list 103 will be protected
B . This VPN configuration will not work because the tunnel IP and peer IP are the same
C . The tunnel is down because the transform set needs to include the Authentication Header parameter
D . The tunnel is down as result of being a static rule. It should be configured as a Dynamic IPsec policy
-
Refer to the exhibit. Based on the configuration shown, which queuing mechanism has been configured on interface serial 1/0?()https://assets.asklib.com/images/image2/2018072409525852319.jpg
A . PQ
B . CQ
C . WFQ
D . LLQ
E . CBWFQ
-
Switch 1 was configured as shown below:
https://assets.asklib.com/images/image2/2018073017433720882.jpg
Based on the output shown above,
which statement is true?()
A . IP traffic matching access list is forwarded through VLANs 5-10.
B . All VLAN traffic in VLANs 5-10 that match access list will be forwarded, and all else will be dropped.
C . IP traffic matching VLAN list 5-10 will be forwarded, and all other traffic will be dropped.
D . All VLAN traffic matching VLAN list 5-10 will be forwarded, and all traffic matching access list is dropped.
E . None of the other alternatives apply
-
The user of Host1 wants to ping the DSL modem/router at 192.168.1.254. Based on the Host1 ARP table that is shown in the exhibit, what will Host1 do()。https://assets.asklib.com/images/image2/2018072314352531807.png
A . send a unicast ARP packet to the DSL modem/router
B . send unicast ICMP packets to the DSL modem/router
C . send Layer 3 broadcast packets to which the DSL modem/router responds
D . send a Layer 2 broadcast that is received by Host2, the switch, and the DSL modem/router
-
After implementing EIGRP on your network, you issue the show ip eigrp traffic command on router C. The following output is shown:
https://assets.asklib.com/images/image2/2018073016544395192.jpg
What can you conclude about this network? ()
A . The network has been stable for at least the last 45 minutes
B . There is a flapping link or interf ace, and router C knows an alternate path to the network
C . There is a flapping link or interface, and router A does not know an alternate path to the network
D . EIGRP is not working correctly on router C
E . There is not enough information to make a determinatio
-
Given the exhibit below. You are a network manager of your company. You are reading your Syslog serverreports. On the basis of the Syslog message shown, which two descriptions are correct?()https://assets.asklib.com/images/image2/2018072315532499321.jpg
A . This is a normal system-generated information message and does not require further investigation.
B . Service timestamps have been globally enabled.
C . This message is unimportant and can be ignored.
D . This message is a level 5 notification message.
-
List three benefits of implementing an integrated security solution based on the Cisco Self- Defending Network strategy? (Choose three.)()
A . integrated security
B . collaborative security system
C . self provisioning
D . Adaptive Threat Defense
E . programmable security ASICs
F . Cisco lOS-based security
-
() is based on logistics network, but more computerized and systematized than logistics operation
A . Virtual logistics
B . Imaginary logistics
C . Thinking logistics
D . Logistics planning
-
You work as a network engineer for . You study the exhibit carefully. Based upon the output shown,
what can you determine?()
Exhibit:
https://assets.asklib.com/images/image2/201807301716517586.jpg
A . VLAN 30 is not operational due to the fact that there are no packet or byte counts indicated.
B . The IP Cisco Express Forwarding configuration is capable of supporting IPv6.
C . Cisco Express Forwarding load balancing has been disabled.
D . SVI VLAN 30 connects directly to the 10.1.30.0/24 network due to a valid glean adjacency.
-
Refer to the exhibit. Based on the running configuration that is shown for interface FastEthernet0/2,
what two conclusions can be deduced?()
https://assets.asklib.com/images/image2/2018073010542744892.jpg
A . Connecting a host with MAC address 0000.0000.4147 will move interface FastEthernet0/2 into error disabled state.
B . The host with address 0000.0000.4141 is removed from the secure address list after 5 seconds of inactivity.
C . The sticky secure MAC addresses are treated as static secure MAC addresses after the running configuration is saved to the startup configuration and the switch is restarted.
D . Interface FastEthernet0/2 is a voice VLAN port.
E . The host with address 0000.0000.000b is removed from the secure address list after 300 seconds.
-
After implementing EIGRP on your network, you issue the show ip eigrp traffic command on router C. The following output is shown:
https://assets.asklib.com/images/image2/2018073016572581079.jpg
What information can you determine about this network?()
A . The network is stable
B . There is a flapping link or interface, and router C knows an alternate path to the network
C . There is a flapping link or interf ace, and router C does not know an alternate path to the network
D . EIGRP is not working correctly on router C
E . There is not enough information to make a determinatio
-
Which one is the most important based on the following common elements of a network design?()
A . Business needs
B . Risk analysis
C . Security policy
D . Best practice
-
Switch 1 was configured as shown below:
https://assets.asklib.com/images/image2/2018073016050580058.jpg
Based on the output shown above,
which statement is true? ()
A . IP traffic matching access list is forwarded through VLANs 5-10.
B . All VLAN traffic in VLANs 5-10 that match access list will be forwarded, and all else will be dropped.
C . IP traffic matching VLAN list 5-10 will be forwarded, and all other traffic will be dropped.
D . All VLAN traffic matching VLAN list 5-10 will be forwarded, and all traffic matching access list is dropped.
E . None of the other alternatives apply
-
The following was issues on router TestKingA: TestKingA #show ip ospf neighbor Neigbor ID PRI State Dead Time Address Interface 192.168.1.2 1 Full/- 00:00:37 192.168.1.2 Serial1 Which type of OSPF network will provide the output shown in the graphic?()
A . FDDI
B . nonbroadcast multiaccess
C . broadcast multi-access
D . point-to-point
-
S0/0 on R1 is configured as a multipoint interface to communicate with R2 and R3 in the hub-and-spoke Frame Relay topology shown in the exhibit. Originally, static routes were configured between these routers to successfully route traffic between the attached networks. What will need to be done in order to use RIPv2 in place of the static routes?()
<img src='https://img2.soutiyun.com/shangxueba/ask/64407001-64410000/64409000/17b75ef15006e963a847746eb8ec9a38.png' />
A.Configure the no ip subnet-zero command on R1, R2, and R3.
B.Dynamic routing protocols such as RIPv2 cannot be used across Frame Relay networks.
C.Configure the S0/0 interface on R1 as two subinterfaces and configure point-to-point links to R2 and R3.
D.Change the 172.16.2.0/25 and 172.16.2.128/25 subnetworks so that at least two bits are borrowed from the last octet.
E.Change the network address configuration to eliminate the discontiguous 172.16.2.0/25 and 172.16.2.128/25 subnetwork.
-
While troubleshooting a serial line problem, you enable ppp authentication debugging as shown below:Based on the command output above, what type of ‘handshake‘ was used for PPP authentication?()
<img src='https://img2.soutiyun.com/ask/uploadfile/2019-03-27/8cfeff82ca82832de8d38de7ecc19da4.jpg' />
<img src='https://img2.soutiyun.com/ask/uploadfile/2019-03-27/197d6a90c8ee401b7f6b0bd585a993d7.jpg' />
A. one-way
B. two-way
C. three-way
D. four-way
E. no handshakes required during authentication
F. None of the above
-
The following was issues on router TestKingA:TestKingA show ip ospf neighborNeigbor ID PRI State Dead Time Address Interface192.168.1.2 1 Full/- 00:00:37 192.168.1.2 Serial1Which type of OSPF network will provide the output shown in the graphic?()
A. FDDI
B. nonbroadcast multiaccess
C. broadcast multi-access
D. point-to-point
-
Your network contains a server named Server1 that runs Windows Server 2008 R2. The network contains multiple subnets.An administrator reports that Server1 fails to communicate with computers on remote subnets.You run route.exe print on Server1 as shown in the exhibit. (Click the Exhibit button.)You need to ensure that Server1 can communicate with all computers on the network.What should you do?()
<img src='https://img2.soutiyun.com/ask/uploadfile/2019-03-27/71f5cf6cf8cbfe8d579365ba1e41e844.png' />
A. Disable IPv6.
B. Change the subnet mask.
C. Add a default gateway address.
D. Change the default metric to 100.
-
Based on the configuration shown in the exhibit, what will happen to the traffic matching the securitypolicy?()
<img src='https://img2.soutiyun.com/ask/uploadfile/2019-03-27/704fc9c0bf245b262abb1fe3ed2d7849.jpg' />
A. The traffic is permitted through the myTunnel IPSec tunnel only on Tuesdays.
B. The traffic is permitted through the myTunnel IPSec tunnel daily, with the exception of Mondays.
C. The traffic is permitted through the myTunnel IPSec tunnel all day on Mondays, Wednesdays between 7:00 am and 6:00 pm, and Thursdays between 7:00 am and 6:00 pm.
D. The traffic is permitted through the myTunnel IPSec tunnel all day on Mondays, Wednesdays between 6:01 pm and 6:59 am, and Thursdays between 6:01 pm and 6:59 am.
-
Based on the need to limit processing and bandwidth utilization due to dynamic routing protocol operation, the foll owing routing requirements have been specified for your network.- partial and incremental routing updates-only the devices affected by a topology change perform route recomputation- route recomputation only occurs for routes that were affectedWhich dynamic routing protocol should be deployed in your network to best meet these requirements?()
A. BGP
B. OSPF
C. IS - IS
D. EIGRP
E. RIPv2