-
Which two of these are characteristics of Metro Ethernet?()
A . class of service
B . bandwidth profiles
C . user-network interface
D . Ethernet LAN circuit attributes
E . Ethernet virtual circuit attribute
-
Which two of these are correct regarding access control lists? (Choose two.) ()
A . An ACL can be applied to multiple interlaces.
B . An ACL wildcard mask is identical to an IP subnet mask.
C . There may be multiple ACLs per protocol, per direction, and per interface.
D . There is an "implicit deny" at the end of an ACL and will result in a dropped packet.
E . An ACL acts on all packets, those flowing thru the router and those originated by the router itself.
F . An ACL will be processed from top to bottom and may have multiple matches that will act on the packet that is being tested.
-
Which two of these are characteristics of the 802.1Q protocol?()
A . it is a layer 2 messaging protocol which maintains vlan configurations across network.
B . it includes an 8-bit field which specifies the priority of a frame.
C . it is used exclusively for tagging vlan frames and dose not address network reconvergence following switched network topology changes.
D . it modifies the 802.3 frame header,and thus requires that the FCS be recomputed.
E . it is a trunking protocol capable of carring untagged frames.
-
Which two of these are recommended practices with trunks? ()
A . use ISL encapsulation
B . use 802.1q encapsulation
C . set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiation
D . use VTP server mode to support dynamic propagation of VLAN information across the network
E . set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation.
-
Regarding disk scrub, which two of these occur to the data on any local drives upon disassociation? ()
A . If disk scrub is enabled, all BIOS settings for the server are erased.
B . If disk scrub is enabled, all the data access on any local drives is destroyed.
C . If disk scrub is enabled, the LSI active RAID is destroyed but data is still preserved.
D . If disk scrub is disabled, all data on any local drives is preserved, including the local storage configuration.
E . If disk scrub is enabled, all data on any local drives is preserved, including the local storage configuration.
-
Which two of these are characteristics of MPLS VPNs? ()
A . Layer 3 MPLS VPNs can forward only IP packets
B . Layer 2 MPLS VPNs can forward any network protocol
C . MPL S label paths are automatically formed based on Layer 2 frames
D . Layer 3 MPLS VPNs can forward any network protocol based on Layer 2 frames
E . In Layer 2 MPLS VPNS, the service provider controls the customer Layer 3 policie
-
Which two demonstrate encapsulation of data? ()
A . Member data have no access modifiers.
B . Member data can be modified directly.
C . The access modifier for methods is protected.
D . The access modifier to member data is private.
E . Methods provide for access and modification of data.
-
Which two of these correctly describe Fibre Channel? ()
A . supports multiple protocols
B . works only in a shared or loop environment
C . allows addressing for up to 4 million nodes
D . allows addressing for up to 8 million nodes
E . provides a high speed transport for SCSI payloads
F . may stretch to a distance of up to100 km before needing extender
-
Which the two demonstrate encapsulation of data?()
A . Member data have no access modifiers.
B . Member data can be modified directly.
C . The access modifier for methods is protected.
D . The access modifier to member data is private.
E . Methods provide for access and modification of data.
-
Which two of these are characteristics of an IDS sensor?()
A . passively listens to network traffic
B . is an active device in the traffic path
C . has a permissive interface that is used to monitor networks
D . traffic arrives on one IDS interface and exits on another
E . has a promiscuous interface that is used to monitor the network
-
Which two of these statements regarding RSTP are correct?()
A . RSTP cannot operate with PVST+.
B . RSTP defines new port roles.
C . RSTP defines no new port states.
D . RSTP is a proprietary implementation of IEEE 802.1D STP.
E . RSTP is compatible with the original IEEE 802.1D STP.
-
Which two of these are recommended practices with trunks? ()
A . use ISL encapsulation
B . use 802.1q encapsulation
C . set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiation
D . use VTP server mode to support dynamic propagation of VLAN information across the network
E . set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation.
-
Which three of these are optical channel data unit (ODU) overhead fields? ()
A . general communication channel 0 (GCC0)
B . section monitoring
C . reserved (RES)
D . general communication channels 1 and 2 (GCC1 GCC2)
E . tandem connection monitoring activation deactivation (TCM ACT)
-
Which two of these are recommended practices with trunks?()
A . use ISL encapsulation
B . use 802.1q encapsulation
C . set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiation
D . use VTP server mode to support dynamic propagation of VLAN information across the network
E . set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiatio
-
Which two demonstrate encapsulation of data?()
A . Member data have no access modifiers.
B . Member data can be modified directly.
C . The access modifier for methods is protected.
D . The access modifier to member data is private.
E . Methods provide for access and modification of data.
-
Which two of these are characteristics of Metro Ethernet? ()
A . class of service
B . bandwidth profiles
C . user-network interface
D . Ethernet LAN circuit attributes
E . Ethernet virtual circuit attribute
-
Which two of these correctly describe Fibre Channel?()
A . supports multiple protocols
B . works only in a shared or loop environment
C . allows addressing for up to 4 million nodes
D . allows addressing for up to 8 million nodes
E . provides a high speed transport for SCSI payloads
F . may stretch to a distance of up to 100 km before needing extender
-
Which two of these are characteristics of an IPS device?()
A . passively listens to network traffic
B . is an active device in the traffic path
C . has a permissive interface that is used to monitor networks
D . traffic arrives on one IPS interface and exits on another
-
Which two of these are characteristics of multicast routing? ()
A . multicast routing uses RPF
B . multicast routing is connectionless.
C . In multicast routing, the source of a packet is known.
D . When network topologies change, multicast distribution trees are not rebuilt, but use the originalpath
E . Multicast routing is much like unicast routing, with the only difference being that it has a a groupof receivers rather than just one destinatio
-
A customer wants to configure two resource groups and create the following shared filesystem structure:Resource GroupFilsystem Mount Point Rg1/app1 Rg2/app1/data Which of the following will ensure the proper mount order for these filesystems?()
A . Set filesystem recovery method to parallel
B . Set filesystem recovery method to sequential
C . Set filesystem recovery method to parallel and configure a parent/child relationship for the resourcegroups
D . Set filesystem recovery method to sequential and configure a parent/child relationship for the resourcegrou
-
Which two of these statements best describe fast secure roaming? (Choose two.)()
A . available only in autonomous APs
B . available in autonomous and lightweight APs
C . a feature of WDS in autonomous APs
D . a feature of WDS in lightweight APs
E . requires at least one AP and one Wireless LAN Services Module
-
Which two of these statements regarding RSTP are correct?()
A . RSTP cannot operate with PVST+.
B . RSTP defines new port roles.
C . RSTP defines no new port states.
D . RSTP is a proprietary implementation of IEEE 802.1D STP.
E . RSTP is compatible with the original IEEE 802.1D STP.
-
Which two of these are characteristics of an IPS device?()
A . passively listens to network traffic
B . is an active device in the traffic path
C . has a permissive interface that is used to monitor networks
D . traffic arrives on one IPS interface and exits on another
-
Which two of these are characteristics of the 802.1Q protocol?()
A . it is a layer 2 messaging protocol which maintains vlan configurations across network.
B . it includes an 8-bit field which specifies the priority of a frame.
C . it is used exclusively for tagging vlan frames and dose not address network reconvergence following switched network topology changes.
D . it modifies the 802.3 frame header,and thus requires that the FCS be recomputed.
E . it is a trunking protocol capable of carring untagged frames.