-
A network host is configured as follows: Host IP address: 192.168.16.183 Subnet mask: 255.255.255.224 Default gateway: 192.168.16.190 Which of the following statements describe the network to which this host is attached?()
A . The default gateway is configured on a different subnet form this host.
B . The host is a member of the fifth usable subnet of the 192.168.16.0 network.
C . The subnetwork address for this host is 192.168.16.160/28.
D . The address of the next higher subnet is 192.168.16.192.
E . The address of the router interface that is attached to this subnetwork is 192.168.16.190.
F . There are 60 usable host addresses on this subnet.
-
Part of the job as a network administrator is being able to make a distinction between routed protocols and routing protocols. Which of the following statements is true regarding them?()
A . A routing protocol is assigned to an interface and determines the method of packet delivery.
B . A routed protocol is assigned to an interface and determines the method of packet delivery.
C . A routing protocol determines the path of a packet through a network.
D . A routed protocol determines the path of a packet through a network.
E . A routing protocol operates at the transport layer of the OSI model.
F . A routed protocol updates the routing table of a router.
-
As a network technician, do you know what is a recommended practice for secure configurationmanagement?()
A . Disable post scan
B . Use SSH or SSL
C . Enable trust levels
D . Deny echo replies on all edge router
-
As a network administrator, you issue the interface auto qos voip cisco-phone command on a port in an edge network. It is possible for a Cisco Catalyst switch to check if a Cisco IP Phone is directly attached to that port by:()
A . using DHCP snooping
B . snooping the incoming 802.1Q VLAN tag
C . using CDP
D . snooping the CoS marking on the incoming frame
-
You work as a network technician. Your boss is interested in the QoS technology in the context ofvideo traffic. What can be said of application of this technology in this type of network?()
A . The access layer is the initial point at which traffic enters the network. Traffic is marked (orremarked) at Layers 2 and 3 by the access switch as it enters the network, or is "trusted" that it isentering the network with the appropriate tag
B . No traffic marking occurs at the core layer. Layer 2/3 QoS tags are trusted from distributionlayer switches and used to prioritize and queue the traffic as it traverses the core
C . Traffic inbound from the access layer to the distribution layer can be trusted or reset dependingupon the ability of the access layer switches. Priority access into the core is provided based onLayer 3 QoS tags
D . IP precedence, DSCP, QoS group, IP address, and ingress interface are Layer 2 characteristics that are set by the access layer as it passes traffic to the distribution layer. Thedistribution layer, once it has made a switching decision to the core layer, strips these off
E . MAC address, Multiprotocol Label Switching (MPLS); the ATM cell loss priority (CLP) bit, theFrame Relay discard eligible (DE) bit, and ingress interface are established by the voicesubmodule (distribution layer) as traffic passes to the core layer
F . The distribution layer inspects a frame to see if it has exceeded a predefined rate of trafficwithin a certain time frame, which is typically a fixed number internal to the switch. If a frame isdetermined to be in excess of the predefined rate limit, the CoS value can be marked up in a waythat results in the packet being dropped
-
You work as a network technician at Company. Your boss, Mrs., is interested in the Cisco Compatible Extensions program. What are three features of this program? ()
A . Accounting
B . Analog and digital voice
C . Mobility
D . Security
E . Routing and switching
F . VLAN and QoS
-
As a network administrator, you are required to deploy MPLS technology. During the deployment, it is recommended to apply conditional label advertising. What is most probably the reason for that?()
A . to enable label switching on the frame mode interface
B . to restrict MPLS availability to predefined time periods
C . to restrict end users from seeing the routers in the MPLS network
D . to restrict label switching to a limited number of network
-
A machine must have the most direct access possible to two different networks. However, it cannot act as a router between the networks. Which of the following arrangements is most appropriate to facilitate the machine’s accessibility?()
A . ipforwarding turned on and two adapters
B . One adapter, with a route to a default gateway
C . An adapter in each network, and ipforwarding off
D . An adapter in each network, with a route only to the default gateway
-
You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()
A . Campus
B . Teleworker
C . Branch
D . Data center
-
You work as a network technician at Company. Your boss, Ms. , is interested in the Aironet enterprise solutions. What should you tell her regarding this?()
A . The Cisco Aironet AP handles real-time portions of the LWAPP protocol, and the WLAN controller handles those items which are not time sensitive.
B . A Cisco Aironet AP handles the transmission of beacon frames and also handles responses to probe-request frames from clients.
C . Virtual MAC architecture allows the splitting of the 802.11 protocol between the Cisco Aironet AP and a LAN switch.
D . A Cisco Aironet solution includes intelligent Cisco Aironet access point (APs) and Cisco Catalyst switches.
E . In the Cisco Aironet solution, each AP is locally configured by the use of either a web interface or the command line interface.
-
What is needed to allow IT managers to design, control, and monitor their wireless networks form a centralized location as wireless networks grow in scale and complexity?()
A . network unification
B . network management
C . mobility platform
D . client device
-
A network administrator needs to force a high-performance switch that is located in the MDF to become the root bridge for a redundant path switched network. What can be done to ensure that this switch assumes the role as root bridge?()
A . Establish a direct link from the switch to all other switches in the network.
B . Assign the switch a higher MAC address than the other switches in the network have.
C . Configure the switch so that it has a lower priority than other switches in the network.
D . Configure the switch for full-duplex operation and configure the other switches for half-duplex operation.
E . Connect the switch directly to the MDF router, which will force the switch to assume the role of root bridge.
-
The connection between two networks from an intemet is handled by a machine known as a()
A . bridge
B . server
C . router
D . switch
-
EIGRP is being used as the routing protocol on the PassGuide network. Whiletroubleshooting some network connectivity issues,you notice a large number of EIGRP SIA(StuckinActive)messages. What causes these SIA routes()
A . The neighboring router stops receiving ACK packets from this router.
B . The neighboring router starts receiving route updates from this router.
C . The neighboring router is too busy to answer the query(generally caused by high CPU utilization).
D . The neighboring router is having memory problems and cannot allocate the memory to process the query or build the reply packet.
-
A default Frame Relay WAN is classified as what type of physical network?()
A . point-to-point
B . broadcast multi-access
C . nonbroadcast multi-access
D . nonbroadcast multipoint.broadcast point-to-multipoint
-
A default Frame Relay WAN is classified as what type of physical network?()
A . point-to-point
B . broadcast multi-access
C . nonbroadcast multi-access
D . nonbroadcast multipoint
E . broadcast point-to-multipoint&e
-
As a network engineer, you responsibility is to install, configure, operate, and troubleshoot networks. In your company’s network, EIGRP is the routing protocol. You have just discovered that two routers restarted the neighbor relationship.Why? ()
A . An update packet with init flag set from a known, already established neighbor relationship was received by one of the routers.
B . The counters were deleted.
C . The ARP cache was removed.
D . The IP EIGRP neighbor relationship was cleared manually.
-
You are planning a new VLAN-based network solution. What is one item you should consider when creating your implementation plan as it concerns VLANs?()
A . generic router and switch configuration parameters
B . end-to-end test plan after all components have been installed and configured
C . administrator assignments
D . rollback pla
-
ABC Company has 1500 managed devices and 15,000 end users on a campus network. LAN Management Solution (LMS) is being deployed as the network management application. What is the recommended number of network management server(s)?()
A . 1
B . 2
C . 3
D . 4
-
Since rail network is not as extensive as highway network in most countries and its limitation to fixed track facilities, as a result, railroads provide () service.
A . Door to door
B . Door to cy
C . Door to cfs
D . Terminal to terminal
-
As an experienced Network Engineer, you are required to characterize an existing CIS network. In such a situation, what is the last step to take?()
A . Perform a network audit.
B . Form an impression about the network.
C . Use traffic analysis to augment organizational input.
D . Prepare and add to the network description.
-
You work as a network engineer, do you know an IPsec tunnel is negotiated within the protection of whichtype of tunnel?()
A . L2F tunnel
B . L2TP tunnel
C . GRE tunnel
D . ISAKMP tunnel
-
In regard to a hub and spoke Frame-Relay data network, what kind of physical network is it classified as?()
A . point-to-point
B . broadcast multi-access
C . nonbroadcast multipoint
D . nonbroadcast multi-access
E . broadcast point-to-multipoint
-
One use of networks is to let several computers share(75)such as file systems, printers, a
One use of networks is to let several computers share(75)such as file systems, printers, and tape drives.
A.CPU
B.memory
C.resources
D.information