-
R1 and R2 exchange HSRP between each other in the Company network. In which three HSRP states do routers send hello messages?()
A . Learn
B . Speak
C . Standby
D . Listen
E . Active
F . Remove
-
Which three are characteristics of voice traffic in the Company VOIP campus network?()
A . TCP retransmits
B . UDP priority
C . Bursty
D . Delay sensitive
E . Greedy
F . Drop sensitive
-
When using Cisco Network Assistant to configure a WS-CE500-24LC switch, which three are available choices in the port settings window?()
A . Duplex mode selections
B . Auto MDIX selections
C . Status Selections
D . Group mode selections
E . Port security selectio
-
In order to enhance worker productivity, a Cisco wireless network has been implemented at all locations. Which three statements regarding WLAN are true?()
A . A WLAN client will operate in half-duplex mode.
B . The Aironet 1230 access point is an example of an access point that operates solely as a lightweight access point.
C . Ad hoc mode allows mobile clients to connect directly without an intermediate AP.
D . WLANs are designed to share the medium and can easily handle an increased demand of channel contention.
E . A lightweight AP receives control and configuration from a WLAN controller to which it is associated.
F . Another term for infrastructure mode is independent service set (IBSS).
-
Select the three best answers which best describe Private Network-to Network Interface (PNNI) in an ATM network.()
A . It is the Routing protocol used between ATM switches
B . PNNI uses the same Dijsktra algorithm for SPF calculation
C . PNNI and OSPF use the same Database to make cohesive decision for packet forwarding
D . PNNI measures line capacities and delays in addition to simple cost metric
-
Router 1 is configured for BGP as dual-homed on the Cisco network. Which three BGP attributes are carried in every BGP update on this router (both IBGP and EBGP)?()
A . origin
B . router-ID
C . AS-path
D . local-preference
E . next-ho
-
The Company network utilizes the Multiple-instance Spanning Tree protocol in its switched LAN. Which three statements about the MST protocol (IEEE 802.1S) are true? ()
A . To verify the MST configuration, the show pending command can be used in MST configuration mode.
B . When RSTP and MSTP are configured; UplinkFast and BackboneFast must also be enabled.
C . All switches in the same MST region must have the same VLAN-to-instance mapping, but different configuration revision numbers.
D . All switches in an MST region, except distribution layer switches, should have their priority lowered from the default value 32768.
E . An MST region is a group of MST switches that appear as a single virtual bridge to adjacent CST and MST regions.
F . Enabling MST with the "spanning-tree modemst" global configuration command also enables RSTP.
-
Which three options are network evaluation techniques? ()
A . Performing end-user training on the use of antispyware software
B . Performing virus scans
C . Scanning a network for active IP addresses and open ports on those IP addresses
D . Using password-cracking utilitie
-
As an experienced technician, you are responsible for Technical Support in your company. You ask one of the trainees to document the layers of an existing CIS network. Which three statements best characterize this process? ()(Choose three.)
A . It provides reliable input for verifying network consistency.
B . It requires a network audit to support some upgrade decisions.
C . It requires a network audit to support any network restructuring.
D . It begins with gathering organizational input that may be inaccurate.
-
Refer to the exhibit. Which three statements are true about trust boundaries in the campus network? (Choose three.)()https://assets.asklib.com/images/image2/2018072411062788011.jpg
A . A device is trusted if it correctly classifies packets.
B . A device is trusted if it correctly declassifies packets.
C . The outermost trusted devices represent the trust boundary.
D . Classification and marking occur using 802.1ab QoS bits before reaching the trust boundary.
E . Network trust boundaries are automatically configured in IOS version 12.3 and later.
F . For scalability, classification should be done as close to the edge as possible.
-
Which three functions can an Integrated Services Router perform in a VoIP network?()
A . voice stream mixing for conference calling
B . voice gateway
C . call admission control
D . analog or digital phone interfaces
E . XML application services
F . large scale dial plan applicatio
-
In a VoIP network, which three call signaling protocols are supported by the Cisco CallManager for call setup, call maintenance, and call teardown? ()
A . H·323
B . UDP
C . RTP
D . TCP
E . Media Gateway Control Protocol (MGCP)
F . session initiation protocol (SIP)
-
You need to determine the correct wireless LAN topology for use in the Company network. Which three statements are true about the various WLAN topologies?()
A . In ad hoc mode, the Independent Basic Service Set (IBSS) is a framework in which mobile clients connect directly without an intermediate access point.
B . In Infrastructure mode, the Basic Service Set (BSS) is a framework in which mobile clients use a single access point for connecting to each other or to wired network resources.
C . In Infrastructure mode, the Extended Services Set (ESS) is a framework in which two or more Basic Service Sets are connected by a common distribution system (DS).
D . In Infrastructure mode, the Independent Basic Service Setet (IBSS) is a framework in which mobile clients connect directly without an intermediate access point.
E . In ad hoc mode, the Basic Service Set (BSS) is a framework in which mobile clients use a single AP for connecting to each other or to wired network resources.
F . In ad hoc mode, the Extended Services Set (ESS) is a framework in which two or more Basic Service Sets are connected by a common distribution system (DS)
-
What are three functions of the Cisco wireless LAN controller, which is being used in the Company Centralized WLAN solution network? ()
A . Authentication
B . Mobility
C . Security management
D . Transmission of beacon frames
E . Real-time portions of MAC management
F . Real-time aspects of the 802.11 prtocol management
G . SNMP collectio
-
Your company plans on migrating their network from IPv4 to IPv6 in the near future. Which three techniques can be used to transition from IPv4 to IPv6?()
A . Dual stack
B . NAT
C . Flow label
D . Mobile IP
E . 6to4 tunneling
F . Anycast
G . MBGP
-
Which three of the statements below correctly describe the characteristics of Autonomous Systems in routed networks?()
A . Within an AS, all routers must run either BGP or IBGP.
B . An AS uses exterior gatew ay protocols (EGPs) to exchange information with other autonomous systems.
C . An AS is a group of routers under the same technical administration.
D . Within an AS, routes learned through BGP can be redistributed using interior gateway protocols.
E . Wi thin an AS, routes learned through an interior protocol cannot be redistributed using BGP to other autonomous systems.
-
pany is implementing 802.1X in order to increase network security. In the use of 802.1X access control, which three protocols are allowed through the switch port before authentication takes place? ()
A . EAP-over-LAN
B . EAP MD5
C . STP
D . protocols not filtered by an ACL
E . CDP
F . TACACS+
-
In a VoIP network, which three call signaling protocols are supported by the Cisco CallManager for call setup, call maintenance, and call teardown?()
A . H323
B . UDP
C . RTP
D . TCP
E . Media Gateway Control Protocol (MGCP)
F . session initiation protocol (SIP)&e
-
Which three statements are true about implementing wireless LANs in the network using Ciscodevices?()
A . Antenna power is a relative value reference to dBi
B . LWAPP allows encrypted communications between lightweight access points and WLANcontrollers.
C . Characteristics of antennas are directionality, gain, and polarization
D . Power over Ethernet (PoE) is only available when a WLAN controller is integrated into thenetwork
E . The WLAN solution Engine (WLSE) is used to control lightweight access points
F . One of the advantages of the lightweight WLAN solution is that the devices act indepently
-
In which three network technologies is traffic shaping used to prevent and manage congestion?()
A . Asynchronous Transfer Mode (ATM)
B . data-link switching (DLSw)
C . Route Processor Redundancy (RPR)
D . Frame Relay (FR)
E . Metro Ethernet
F . Multiprotocol Label Switching (MPLS)
-
Your Company has migrated to IPv6 in their network. Which three IPv6 notations represent the same address?()
A . 2031::130F::9C0:876A:130B
B . 2031:0000:130F:0000:0000:09C0:876A:130 B
C . 2031:0:130F:::9C0:876A:130B
D . 2031::130F:0::9C0:876A:130B
E . 2031:0:130F:0:0:09C0:876A:130B
F . 2031:0:130F::9C0:876A:130B
-
In IPv6 network, an IPv6 overlay tunnel is required to communicate with isolated IPv6 networks across the existing IPv4 infrastructurE. There are currently fiv e IPv6 overlay tunnel types. Which three IPv6 overlay tunnel statements are true?()
A . Overlay tunnels can only be configured between border routers capable of supporting IPv4 and IPv6.
B . An manual overlay tunnel supports point - to - multipo int tunnels capable of carrying IPv6 and Connectionless Network Service (CLNS) packets.
C . Overlay tunneling encapsulates IPv6 packets in IPv4 packets for delivery across an IPv4 infrastructure.
D . Overlay tunnels can be configured between border route rs or between a border router and a host capable of supporting IPv4 and IPv6.
E . Cisco IOS supports manual, generic routing encapsulation (GRE), IPv4 - compatible, 6to4, and Intra - Site Automatic Tunnel Addressing Protocol (ISATAP) overlay tunneling mechan isms.
F . Cisco IOS supports manual, generic routing encapsulation (GRE), IPv6 - compatible, 4to6, and Multiprotocol Label Switching (MPLS) overlay tunneling mechanisms.
-
Refer to the exhibit.
Which three statements are true about trust boundaries in the campus network?()
https://assets.asklib.com/images/image2/2018073014302987878.jpg
A . Classification and markingoccur using 802.1ab QoS bits before reaching the trust boundary.
B . A device is trusted if it correctly declassifies packets.
C . A device is trusted if it correctly classifies packets.
D . Network trust boundaries are automatically configured in IOS version 12.3 and later.
E . The outermost trusted devices represent the trust boundary.
F . For scalability, classification should be done as close to the edge as possible.
-
Which three characteristics are true about voice traffic in the campus network? ()
A . TCP retransmits
B . benign
C . greedy
D . drop sensitive
E . smooth
F . delay insensitive