Which of these is true of a Layer 3 out-of-band NAS deployment?()
A . The NAS acts as a gateway for all Layer 3 traffic.
B . Only the MAC address is used to identify the client device.
C . User traffic remains on the same VLAN for the duration of the connection.
D . After authentication and posture assessment, client traffic no longer passes through the NAS.
-
Which of these statements concerning the collection interfaces are true?()
A . Set extends Collection.
B . All methods defined in Set are also defined in Collection.
C . List extends Collection.
D . All methods defined in List are also defined in Collection.
E . Map extends Collection.
-
Which one of these statements is true regarding hot pluggable PCIe and PCI-X slots in a Power 550?()
A . Cards can be added and then enabled via Hardware Management Console (HMC) GUI or command line.
B . The HMC allows access to the Advanced System Management Interface (ASMI), where the slots can be managed.
C . If the empty slot was already allocated to an LPAR, the LPAR can use the card after the cfgmgr script has been run.
D . The Hardware Management Console (HMC) GUI can guide a customer through the process of adding a card to an empty slot.&e
-
Refer to the exhibit. The output that is shown is generated at a switch. Which three of these statements are true? ()
A . All ports will be in a state of discarding, learning, or forwarding.
B . Thirty VLANs have been configured on this switch.
C . The bridge priority is lower than the default value for spanning tree.
D . All interfaces that are shown are on shared media.
E . All designated ports are in a forwarding state.
F . The switch must be the root bridge for all VLANs on this switch.
-
Which of these is a correct description of SSO?()
A . It will only become active after a software failure.
B . It will only become active after a hardware failure.
C . It requires that Cisco NSF be enabled in order to work successfully.
D . It synchronizes the MAC·, FIB·, and adjacency tables between Active and Standby RouteProcessors.
-
You are the Cisco Network Designer in Cisco.com. Which of these statements is true of clientlessend-user devices?()
A . They do not receive unique IP addresses.
B . RADIUS or LDAP is required.
C . They are assigned addresses from the internal DHCP pool.
D . Their traffic appears to originate from the originating host network.
-
Which three of these statements about penultimate hop popping are true?()
A . It is used only for directly connected subnets or aggregate routes.
B . It can only be used with LDP.
C . It is only used when two or more labels are stacked.
D . It enables the Edge LSR to request a label pop operation from its upstream neighbors.
E . It is requested through TDP using a special label value that is also called the implicit-null value.
F . It is requested through LDP using a special label value that is also called the implicit-null value.
-
Which of these statements about penultimate hop popping are true?()
A . It is used only for directly connected subnets or aggregate routes
B . It can only be used with LDP.
C . It is only used when two or more labels are stacked.
D . It enables the Edge LSR to request a label pop operation from Its upstream neighbors
E . It is requested through TDP using a special label value that is also called the implicit-null value.
F . It is requested through LDP using a special label value that is also called the implicit-null value.
-
Which three of these statements about PPPoE are true?()
A . PPPoE can provide a host with access to a destination over Ethernet. You can have only one PPPoE session per PVC
B . You must install PPPoE client software on all hosts that connect to the Ethernet segment. This means that the access provider must maintain a CPE
C . You cannot use PPPoE with Cisco Service Selection Gateway
D . PPPoE implementation is susceptible to broadcast storms and possible denial-of-service attacks
E . Per-session accounting is possible, which allows the service provider to charge the subscriber based on session time for various services offered. The service provider can also require a minimum access charge
-
Which two of these statements are true of IPv6 address representation?()
A . There are four types of IPv6 addresses: unicast, multicast, anycast, and broadcast.
B . A single interface may be assigned multiple IPv6 addresses of any type.
C . Every IPv6 interface contains at least one loopback address.
D . The first 64 bits represent the dynamically created interface ID.
E . Leading zeros in an IPv6 16 bit hexadecimal field are mandatory.
-
Which of these is true of a Layer 3 out-of-band NAS deployment?()
A . The NAS acts as a gateway for all Layer 3 traffic.
B . Only the MAC address is used to identify the client device.
C . User traffic remains on the same VLAN for the duration of the connection.
D . After authentication and posture assessment, client traffic no longer passes through the NAS.
-
Which one of these statements is true of OSPF type 5 LSAs?()
A . They are used to summarize area routes to other areas.
B . They are used in not-so-stubby areas to propagate external routes.
C . They are used to notify areas of the ASBR.
D . They are flooded to all areas except stub areas (external route).
-
Which of these is true regarding the configuration and application of port access control lists? ()
A . PACLs can be applied in the inbound or outbound direction of a Layer 2 physical interface.
B . At Layer 2, a MAC address PACL will take precedence over any existing Layer 3 PACL.
C . When you apply a port ACL to a trunk port, the ACL filters traffic on all VLANs present on the trunk port.
D . PACLs are not supported on EtherChannel interfaces.
-
Which one of these statements is true of OSPF type 5 LSAs? ()
A . They are used to summarize area routes to other areas.
B . They are used in not-so-stubby areas to propagate external routes.
C . They are used to notify areas of the ASBR.
D . They are flooded to all areas except stub areas (external route).
-
You are about to migrate a customer network to use a VSS. Which of these statements is true about a VSS? ()
A . The VSS switch must be the root bridge for all VLANs and is automatically designated
B . The VSS switch is defined in RFC 4318 as a managed object
C . The PAgP+ or LACP protocols are used to maintain the operational state of the VSS devices
D . A VSS interoperates with a virtual port channel
E . The 802.1Q or ISL protocols are used to maintain the operational state of the VSS devices
F . A VSS increases the size of the spanning-tree domai
-
Which of these statements about FSPF is true?()
A . It supports multipath routing
B . It can run any type of storage ports
C . When it is used, hop-by-hop routes are based only on the switch ID
D . When it is used, path status is based on the functionality of attached ports
E . It runs only on a switch fabric and cannot function in a VSAN
-
You are the Cisco Network Designer in Cisco.com. Which of these statements is true of clientless end-user devices?()
A . They do not receive unique IP addresses.
B . RADIUS or LDAP is required.
C . They are assigned addresses from the internal DHCP pool.
D . Their traffic appears to originate from the originating host network.
-
Which of these statements is true of routing protocols in a hub-and-spoke IPsec VPN topology?()
A . EIGRP can summarize per interface.
B . OSPF router databases remain independent.
C . When they are configured with stubs, EIGRP regularly floods the topology.
D . OSPF topology decisions are made independent of hierarchy or area.
-
You have a durable subscriber, and the subscriber is down or not reachable when the message is produced. Which two options regarding the expiry of these messages are true?()
A . after the subscriber is unavailable for 10 minutes
B . when the subscriber is available
C . after the subscriber is unavailable for after an hour
D . are available until the specified time elapses
E . are expired instantly
-
The VPN termination function provides the ability to connect two networks together securely over the internet. Which of these is true of IP addressing with regard to VPN termination?()
A . termination devices need routable addresses inside the VPN
B . termination devices need not routable addresses inside the VPN
C . IGP routing protocols will update their routing tables over anIPsec VPN
D . addressing designs need to allow for summarizatio
-
You are about to migrate a customer network to use a VSS. Which of these statements is true about a VSS?()
A . The VSS switch must be the root bridge for all VLANs and is automatically designated.
B . The VSS switch is defined in RFC 4318 as a managed object.
C . The PAgP+ or LACP protocols are used to maintain the operational state of the VSS devices.
D . A VSS interoperates with a virtual port channel.
E . The 802.1Q or ISL protocols are used to maintain the operational state of the VSS devices.
F . A VSS increases the size of the spanning-tree domain.
-
Which of these statements is true about ssids configured in cisco adu?()
A . ssids are not case-sensitive.
B . ssids must be listed in the same order in the adu as they are in the access point.
C . a maximum of three ssids may be configured.
D . ssids may have a maximum of 16 characters.
-
The VPN termination function provides the ability to connect two networks together securely overthe internet. Which of these is true of IP addressing with regard to VPN termination?()
A . termination devices need routable addresses inside the VPN
B . termination devices need not routable addresses inside the VPN
C . IGP routing protocols will update their routing tables over an IPsec VPN
D . addressing designs need to allow for summarizatio
-
Which of these statements about the Confucian idea of personal development is NOT TRUE?
-
Scientists now believe that artificial-hip implants, previously thought to be safe, may actually increase the risk of cancer in recipients after about 45 years of use. Though these implants do improve the quality of recipients lives, the increased risk of cancer is an unacceptable price to pay for these improvements. Therefore, they should be banned. Which of the following, if true, is the strongest counterargument to the argument above?
A.Artificial-hip implant surgery can cause severe complications, such as infection, chronic fever, and bone degeneration, and these complications can themselves be crippling or even fatal.
B.Almost all artificial-hip implant recipients receive their implants at an age when they are unlikely to live more than an additional 30 years.
C.Although artificial-hip implants increase the risk of cancer after about 45 years of use, a few of the cancers they induce are not fatal.
D.Since artificial-hip implants are not very common, banning them would cause little hardship.
E.Although the benefits of artificial-hip implant surgery have remained substantially the same over the past decade, the price of the surgery has risen considerably.