-
Which two of these are characteristics of Metro Ethernet?()
A . class of service
B . bandwidth profiles
C . user-network interface
D . Ethernet LAN circuit attributes
E . Ethernet virtual circuit attribute
-
Which two of these are correct regarding access control lists? (Choose two.) ()
A . An ACL can be applied to multiple interlaces.
B . An ACL wildcard mask is identical to an IP subnet mask.
C . There may be multiple ACLs per protocol, per direction, and per interface.
D . There is an "implicit deny" at the end of an ACL and will result in a dropped packet.
E . An ACL acts on all packets, those flowing thru the router and those originated by the router itself.
F . An ACL will be processed from top to bottom and may have multiple matches that will act on the packet that is being tested.
-
Which two of these are characteristics of the 802.1Q protocol?()
A . it is a layer 2 messaging protocol which maintains vlan configurations across network.
B . it includes an 8-bit field which specifies the priority of a frame.
C . it is used exclusively for tagging vlan frames and dose not address network reconvergence following switched network topology changes.
D . it modifies the 802.3 frame header,and thus requires that the FCS be recomputed.
E . it is a trunking protocol capable of carring untagged frames.
-
Which two of these are recommended practices with trunks? ()
A . use ISL encapsulation
B . use 802.1q encapsulation
C . set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiation
D . use VTP server mode to support dynamic propagation of VLAN information across the network
E . set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation.
-
Which two of these statements best describe the benefits of WPAv1? ()
A . SSID broadcast prevention
B . Improved mutual authentication
C . Improved encryption through AES
D . Improved protection against sniffing initialization vectors
E . RF jamming preventio
-
Which two of these are characteristics of MPLS VPNs? ()
A . Layer 3 MPLS VPNs can forward only IP packets
B . Layer 2 MPLS VPNs can forward any network protocol
C . MPL S label paths are automatically formed based on Layer 2 frames
D . Layer 3 MPLS VPNs can forward any network protocol based on Layer 2 frames
E . In Layer 2 MPLS VPNS, the service provider controls the customer Layer 3 policie
-
Which two of these statements are true of IPv6 address representation?()
A . There are four types of IPv6 addresses: unicast, multicast, anycast, and broadcast.
B . A single interface may be assigned multiple IPv6 addresses of any type.
C . Every IPv6 interface contains at least one loopback address.
D . The first 64 bits represent the dynamically created interface ID.
E . Leading zeros in an IPv6 16 bit hexadecimal field are mandatory.
-
Which two of these correctly describe Fibre Channel? ()
A . supports multiple protocols
B . works only in a shared or loop environment
C . allows addressing for up to 4 million nodes
D . allows addressing for up to 8 million nodes
E . provides a high speed transport for SCSI payloads
F . may stretch to a distance of up to100 km before needing extender
-
Which two of these are characteristics of an IDS sensor?()
A . passively listens to network traffic
B . is an active device in the traffic path
C . has a permissive interface that is used to monitor networks
D . traffic arrives on one IDS interface and exits on another
E . has a promiscuous interface that is used to monitor the network
-
Which two of these statements regarding RSTP are correct?()
A . RSTP cannot operate with PVST+.
B . RSTP defines new port roles.
C . RSTP defines no new port states.
D . RSTP is a proprietary implementation of IEEE 802.1D STP.
E . RSTP is compatible with the original IEEE 802.1D STP.
-
Which two of these are recommended practices with trunks? ()
A . use ISL encapsulation
B . use 802.1q encapsulation
C . set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiation
D . use VTP server mode to support dynamic propagation of VLAN information across the network
E . set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation.
-
Which two of these are recommended practices with trunks?()
A . use ISL encapsulation
B . use 802.1q encapsulation
C . set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiation
D . use VTP server mode to support dynamic propagation of VLAN information across the network
E . set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiatio
-
Which two of these correctly describe asymmetric routing and firewalls?()
A . only operational in routed mode
B . only operational in transparent mode
C . only eight interfaces can belong to an asymmetric routing group
D . operational in both failover and non-failover configurations
E . only operational when the firewall has been configured for failover
-
Which two of these statements best describe the benefits of Cisco’s wireless IDS functionality? (Choose two.) ()
A . AirDefense for wireless IDS is required by autonomous APs.
B . 2.40Hz CK management can monitor both 802.11 and non-802.11 CK interference.
C . APs only monitor the RF channels that are servicing the clients.
D . Cisco or CCX compatible client cards can extend the CK IDS service for autonomous APs.
E . Autonomous APs must be dedicated IDS sensors while lightweight APs can combine client traffic and RF monitoring.
-
Which two of these are characteristics of Metro Ethernet? ()
A . class of service
B . bandwidth profiles
C . user-network interface
D . Ethernet LAN circuit attributes
E . Ethernet virtual circuit attribute
-
Which two of these correctly describe Fibre Channel?()
A . supports multiple protocols
B . works only in a shared or loop environment
C . allows addressing for up to 4 million nodes
D . allows addressing for up to 8 million nodes
E . provides a high speed transport for SCSI payloads
F . may stretch to a distance of up to 100 km before needing extender
-
Which two of these are characteristics of an IPS device?()
A . passively listens to network traffic
B . is an active device in the traffic path
C . has a permissive interface that is used to monitor networks
D . traffic arrives on one IPS interface and exits on another
-
Which two of these statements best describe the benefits of the Cisco Compatible Extensions Program? (Choose two.)()
A . offers a feature-rich implementation alternative to Wi-Fi certification
B . accelerates the availability of innovative features while maintaining interoperability
C . provides innovative features only on Cisco’s wireless client adapters
D . provides an evolving set of specifications for interoperability
E . eliminates the need for testing by providing innovative features to wireless client vendors through a one-time license fee
-
Which two of these are characteristics of multicast routing? ()
A . multicast routing uses RPF
B . multicast routing is connectionless.
C . In multicast routing, the source of a packet is known.
D . When network topologies change, multicast distribution trees are not rebuilt, but use the originalpath
E . Multicast routing is much like unicast routing, with the only difference being that it has a a groupof receivers rather than just one destinatio
-
Which two of these statements regarding RSTP are correct?()
A . RSTP cannot operate with PVST+.
B . RSTP defines new port roles.
C . RSTP defines no new port states.
D . RSTP is a proprietary implementation of IEEE 802.1D STP.
E . RSTP is compatible with the original IEEE 802.1D STP.
-
Which two of these statements describe important aspects of performing a wireless site survey? (Choose two.) ()
A . An 802.11 g access point with a variety of antennas can be used in all standard site surveys.
B . Site surveys can be performed manually or through assisted site survey.
C . Channel power during testing starts at the default minimum and gradually increases to the maximum.
D . Overlapping access points can create performance problems.
E . Surveys should be done after hours in an office building or during reduced inventory levels in warehouses.
-
Which two of these are characteristics of an IPS device?()
A . passively listens to network traffic
B . is an active device in the traffic path
C . has a permissive interface that is used to monitor networks
D . traffic arrives on one IPS interface and exits on another
-
Which two of these correctly describe asymmetric routing and firewalls? ()
A . only operational in routed mode
B . only operational in transparent mode
C . only eight interfaces can belong to an asymmetric routing group
D . operational in both failover and non-failover configurations
E . only operational when the firewall has been configured for failover
-
Which two of these are characteristics of the 802.1Q protocol?()
A . it is a layer 2 messaging protocol which maintains vlan configurations across network.
B . it includes an 8-bit field which specifies the priority of a frame.
C . it is used exclusively for tagging vlan frames and dose not address network reconvergence following switched network topology changes.
D . it modifies the 802.3 frame header,and thus requires that the FCS be recomputed.
E . it is a trunking protocol capable of carring untagged frames.