-
As a Cisco Network Engineer, you have to master the knowledge of the Cisco Storage Area Network solution for the data center. Which three of the following are features of it? ()(Choose three.)
A . It provides multiprotocol support.
B . It allows you to create separate networks on the VSAN.
C . It allows you to migrate to new technologies without a complete equipment upgrade.
D . It reduces cost and complexity by providing an easy transition to evolving technologies.
-
As a Network Engineer, you decide to apply Cisco enterprise solution throughout the CIS network. What are the two advantages? ()(Choose two.)
A . cost savings
B . product variety
C . well-tested interoperability
D . regular upgrade proce
-
As a network engineer, do you know for what purpose SDM uses Security Device Event Exchange(SDEE)?()
A . to provide a keepalive mechanism
B . to pull event logs from the router
C . to extract relevant SNMP information
D . to perform application-level accounting
-
You work as a network engineer for . You study the exhibit carefully.
What happens when the switch 2 is connected to the rest of the network in the VTP domain Lab_Network?()
Exhibit:
https://assets.asklib.com/images/image2/2018073016373365008.jpg
A . The recently introduced switch 2 removes all configured VLANs throughout the VTP domain.
B . The recently introduced switch 2 creates a STP loop in the VTP domain.
C . The recently introduced switch 2 switches over to VTP transparent mode in order to be included into the VTP domain.
D . A trunk should be configured between the two switches in order to integrate 2 into the VTP domain.
E . The recently introduced switch 2 adds one more VLAN to the VLAN database in the VTP domain.
-
As a network technician, do you know what is a recommended practice for secure configurationmanagement?()
A . Disable post scan
B . Use SSH or SSL
C . Enable trust levels
D . Deny echo replies on all edge router
-
As a Network Engineer, you have to master how to deploy Virtual Storage Area Network and what are the results of the deployment. Which two of the following are resulting from its deployment?()
A . reduced backup
B . increased security
C . greater storage demand
D . improved availability
-
You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()
A . Campus
B . Teleworker
C . Branch
D . Data center
-
You work as a network technician at Company. Your boss, Ms. , is interested in the Aironet enterprise solutions. What should you tell her regarding this?()
A . The Cisco Aironet AP handles real-time portions of the LWAPP protocol, and the WLAN controller handles those items which are not time sensitive.
B . A Cisco Aironet AP handles the transmission of beacon frames and also handles responses to probe-request frames from clients.
C . Virtual MAC architecture allows the splitting of the 802.11 protocol between the Cisco Aironet AP and a LAN switch.
D . A Cisco Aironet solution includes intelligent Cisco Aironet access point (APs) and Cisco Catalyst switches.
E . In the Cisco Aironet solution, each AP is locally configured by the use of either a web interface or the command line interface.
-
As an experienced Network Engineer, you are required to implement the security architecture assessment. Which of the following statement describes the most important reason for that?()
A . Create a design specification document.
B . Integrate routing and switching components.
C . Document power and UPS availability
D . Document the customer's current and future technology projects.
-
Network topology Exhibit:
https://assets.asklib.com/images/image2/2018073108484671566.jpg
You work as a network engineer for. You are required to set up the network being displayed in the network topology exhibit through the console using IOS commands.
A . 正确
B . 错误
-
As an experienced Network Engineer, you are responsible for network connectivity and system configuration. Which of the following protocols will be supported by Cisco Nonstop Forwarding (NSF)?()
A . ISSU,OSPF,IS-IS
B . IETF,OSPF,ISSU
C . IS-IS,EIGRP,SSO,BGP
D . EIGRP,BGP,OSPF,IS-IS
-
Exhibit:
https://assets.asklib.com/images/image2/2018073015201011761.jpg
Exhibit:
You work as a network engineer at Company. You study the exhibit carefully. Which GLBP device hosts receive the MAC address assignment?()
A . R1
B . R2
C . The AVG
D . The AVF
E . None of the other alternatives apply
-
As a Cisco Network Engineer, you have to master the knowledge of the Cisco validated Design (CVD) program. Which three of the following descriptions are appropriate about the CVD program?() (Choose three.)
A . It incorporates a narrow range of technologies and products.
B . It facilitates faster and more reliable customer deployments.
C . It extends the value of designs through a sustained development plan.
D . It incorporates products and technologies into enterprise, service provider, and commercial systems.
-
As a Cisco Network Engineer, you have to master the knowledge of the Cisco validated Design program. Which two of the following descriptions correctly identify its features? ()(Choose two.)
A . It strives to protect access to design documentation.
B . It facilitates customer deployments that are more predictable.
C . It facilitates customer deployments that are less reliable.
D . It incorporates products and technologies into a broad portfolio.
-
You work as a network engineer for . You study the exhibit carefully. From the configuration shown,
what can be determined?()
Exhibit:
https://assets.asklib.com/images/image2/2018073016525496857.jpg
A . The remaining secure MAC addresses will be dynamically learned, converted to sticky secure MAC addresses, and added to the running configuration.
B . Since a voice VLAN is configured in this example, port security should be set for a maximum of 2.
C . The sticky addresses will only be those manually configured MAC addresses enabled with the sticky keyword.
D . A security violation will restrict the number of addresses to a maximum of 10 addresses per access VLAN and voice VLAN. The port will be shut down if more than 10 devices per VLAN attempt to access the port.
-
You work as a network engineer at TestKing.com. You are required to allow establishment of a Telnet session with a router TestKingC.Which set command must be configured?()
A .https://assets.asklib.com/images/image2/2018072717510448028.jpg
B .https://assets.asklib.com/images/image2/2018072717511289780.jpg
C .https://assets.asklib.com/images/image2/2018072717511936039.jpg
D .https://assets.asklib.com/images/image2/2018072717512431070.jpg
E .https://assets.asklib.com/images/image2/2018072717513262336.jpg
F .https://assets.asklib.com/images/image2/201807271751385786.jpg
-
As a Network Engineer in a large-sized company, you have to master the knowledge of the Cisco mobility solution. Which of the following statement most appropriately identifies the characteristics of it?()
A . It provides high-level integrated security from the wireless access point to the client and automatically encrypts voice and data in transit.
B . It allows you to centralize management, automate repetitive tasks, and provision IP services easily.
C . It centralizes your infrastructure and allows you to share resources more effectively by combining separate data centers into an interconnected SAN.
D . It authenticates users and devices so that it is impossible for a rogue device to be connected to the network.
-
You work as a network engineer for. You study the exhibit carefully.
What type of attack would be mitigated by this configuration?()
https://assets.asklib.com/images/image2/201807301624156941.jpg
A . CDP manipulation
B . VLAN hopping
C . MAC spoofing
D . MAC flood attack
E . ARP spoofing
F . spanning tree compromise
-
As an experienced Network Engineer, you are required to characterize an existing CIS network. In such a situation, what is the last step to take?()
A . Perform a network audit.
B . Form an impression about the network.
C . Use traffic analysis to augment organizational input.
D . Prepare and add to the network description.
-
You work as a network engineer for . You study the switch exhibit carefully.
Which two statements are true? ()
Exhibit:
https://assets.asklib.com/images/image2/2018073016342661542.jpg
A . The trust boundary is not on this switch.
B . It is displaying the AutoQos configuration that was initially applied.
C . Interface Fa0/3 trusts allCoS values.
D . The switch does not trust theCoS values of a Cisco IP phone attached to port Fa0/3.
E . The show auto qos command shows the user-defined QoS settings.
F . The show auto qos command does not display user configuration changes currently in effect.
-
You work as a network engineer for . You study the exhibit carefully. Based upon the output shown,
what can you determine?()
Exhibit:
https://assets.asklib.com/images/image2/201807301716517586.jpg
A . VLAN 30 is not operational due to the fact that there are no packet or byte counts indicated.
B . The IP Cisco Express Forwarding configuration is capable of supporting IPv6.
C . Cisco Express Forwarding load balancing has been disabled.
D . SVI VLAN 30 connects directly to the 10.1.30.0/24 network due to a valid glean adjacency.
-
You work as a network engineer, do you know an IPsec tunnel is negotiated within the protection of whichtype of tunnel?()
A . L2F tunnel
B . L2TP tunnel
C . GRE tunnel
D . ISAKMP tunnel
-
https://assets.asklib.com/images/image2/2018073017084243089.jpg
You work as a network engineer for . You study the exhibit carefully.
What best describes the Cisco IOS IP SLA command and output in the exhibit?()
A . verifies which operation types have been enabled for IP SLA source
B . verifies which operation types have been enabled for IP SLA responder
C . verifies which operation types are supported in software
D . verifies enabled operation types that are not running
-
You?work?as?a?network?Exchange?administrator?at?Co...
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2000 and Microsoft Exchange Server 2003 Service Pack 2 (SP2) as their messaging solution.During the course of the business week you receive instruction from Company.com to transition the Exchange organization to Microsoft Exchange Server 2010 whilst preparing the Exchange organization for the deployment of the Exchange Server 2010 Hub Transport servers, Client Access and Mailbox servers.What should you do?()
A. You should consider having the Microsoft Exchange Server 2010 Edge Transport server deployed first.
B. You should consider having the Microsoft Exchange Server 2000 servers removed from the organization first.
C. You should consider having the Active Directory Connector (ADC) installed first.
D. You should consider having the Recipient Update service (RUS) objects deleted first.