-
The Company is rolling out Cisco’s Architecture for Voice, Video and Integrated Data (AVVID).Which of the following choices represent the fundamental intelligent network services in Cisco’sAVVID?()
A . Quality of Service (QoS)
B . Intelligent platforms
C . Mobility and scalability
D . Security
E . High availability
-
You are the Cisco Network Designer in Cisco.com. Your company is using the G.711 codec with 802.11a access point radios. This can support a maximum of how many phones per access point?()
A . 5
B . 10
C . 14
D . 20
-
Which three are characteristics of voice traffic in the Company VOIP campus network?()
A . TCP retransmits
B . UDP priority
C . Bursty
D . Delay sensitive
E . Greedy
F . Drop sensitive
-
EIGRP is being used as the routing protocol on the company network. While troubleshooting somenetwork connectivity issues, you notice a large number of EIGRP SIA (Stuck in Active) messages.What causes these SIA routes?()
A . The neighboring router stops receiving ACK packets from this router
B . The neighboring router starts receiving route updates from this router
C . The neighboring router is too busy to answer the query (generally caused by high CPUutilization)
D . The neighboring router is having memory problems and cannot allocate the memory to processthe query or build the reply packet
-
Company.com is adding a new I/O drawer to an existing p5-570 with four LPARs and wants to re-balance the network cards in the I/O drawers. What is the best way to accomplish this?()
A . Add the devices as virtual adapters to a VIO server first,then add the I/O drawer and create the shared ethernet adapters
B . Power down the partitions,run the diag a command when the system is brought back up and reconfigure the network cards
C . Use the rmdev command to remove the devices,shut down the partitions and move the cads,then run the cfgmgr command after reboot
D . Detach the network cards,run rmdev on the devices and then dynamically reassign theadapters to the partitions and reconfigure
-
You need make configuration changes to an existing layer 3 switch in the Company network. On a multilayer Catalyst switch, which interface command is used to convert a Layer 3 interface to a Layer 2 interface?()
A . switchport access vlan vlan-id
B . switchport
C . switchport mode access
D . no switchport
E . None of the other alternatives apply
-
VOIP is being implemented on the Company network. In a properly designed network, what is the maximum amount of time a voice package should spend crossing a network? ()
A . 90 milliseconds
B . 120 milliseconds
C . 150 milliseconds
D . 240 millisecond
-
LDAP is being used throughout the Company wireless network. Which statement about the Lightweight Access Point Protocol (LWAPP) protocol is true?()
A . The processing of 802.11 data and management protocols and access point capabilities is distributed between a lightweight access point and a centralized WLAN controller.
B . LWAPP advertises its WDS capability and participates in electing the best WDS device for the wireless LAN.
C . LWAPP aggregates radio management forward information and sends it to a wireless LAN solution engine.
D . LWAPP authenticates all access points in the subnet and establishes a secure communication channel with each of them.
E . None of the other alternatives apply
-
You work as a network technician at Company. Your boss, Mrs., is interested in the Cisco Compatible Extensions program. What are three features of this program? ()
A . Accounting
B . Analog and digital voice
C . Mobility
D . Security
E . Routing and switching
F . VLAN and QoS
-
Static VLANs are being used on the Company network. What is true about static VLANs?()
A . Devices use DHCP to request their VLAN.
B . Attached devices are unaware of any VLANs.
C . Devices are assigned to VLANs based on their MAC addresses.
D . Devices are in the same VLAN regardless of which port they attach to.
-
You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()
A . Campus
B . Teleworker
C . Branch
D . Data center
-
You work as a network technician at Company. Your boss, Ms. , is interested in the Aironet enterprise solutions. What should you tell her regarding this?()
A . The Cisco Aironet AP handles real-time portions of the LWAPP protocol, and the WLAN controller handles those items which are not time sensitive.
B . A Cisco Aironet AP handles the transmission of beacon frames and also handles responses to probe-request frames from clients.
C . Virtual MAC architecture allows the splitting of the 802.11 protocol between the Cisco Aironet AP and a LAN switch.
D . A Cisco Aironet solution includes intelligent Cisco Aironet access point (APs) and Cisco Catalyst switches.
E . In the Cisco Aironet solution, each AP is locally configured by the use of either a web interface or the command line interface.
-
As a network engineer, you responsibility is to install, configure, operate, and troubleshoot networks. In your company’s network, EIGRP is the routing protocol. You have just discovered that two routers restarted the neighbor relationship.Why? ()
A . An update packet with init flag set from a known, already established neighbor relationship was received by one of the routers.
B . The counters were deleted.
C . The ARP cache was removed.
D . The IP EIGRP neighbor relationship was cleared manually.
-
You work as a network technician at Company. Your boss, Mrs. , is interested in GLBP. In particular, she wants to know the multicast address that this protocol uses. What should you tell her? ()
A . 224.0.0.100
B . 224.0.0.1
C . 224.0.0.102
D . 224.0.0.10
E . 224.0.0.101
F . None of the other alternatives apply
-
The Lightweight Access Point Protocol (LWAPP) is in use within the Company wireless network. Which two statements correctly describe features of this protocol? ()
A . Control traffic between an access point and a controller is encrypted within LWAPP.
B . Data traffic between an access point and a controller is encrypted within LWAPP.
C . Layer 3 mode packets are transmitted in TCP frames.
D . Data traffic between an access point and a controller is encapsulated within LWAPP.
E . VLAN tagging and QoS markings are applied at the access point.
-
What are three functions of the Cisco wireless LAN controller, which is being used in the Company Centralized WLAN solution network? ()
A . Authentication
B . Mobility
C . Security management
D . Transmission of beacon frames
E . Real-time portions of MAC management
F . Real-time aspects of the 802.11 prtocol management
G . SNMP collectio
-
The Company is rolling out Cisco’s Architecture for Voice, Video and Integrated Data (AVVID). Which of the following choices represent the fundamental intelligent network services in Cisco’s AVVID? ()
A . Quality of Service (QoS)
B . Intelligent platforms
C . Mobility and scalability
D . Security
E . High availability
-
Which set of statements describes the correct order and process of a Company wireless user client associating with a wireless access point in the Company network? ()
A . 1. Access point sends probe request .2. Client sends probe response.3. Client initiates association.4. Access point accepts association.5. Client adds access point MAC address to association table.
B . 1. Client sends probe request.2. Access point sends probe response.3. Client initiates association.4. Access point accepts association.5. Access point adds client MAC address to association table.
C . 1. Client sends probe request.2. Access point sends probe response.3. Access point initiates association.4. Client accepts association.5. Access point adds client MAC address to association table.
D . 1. Access point sends probe request .2. Client sends probe response.3. Client initiates association.4. Access point accepts association.5. Access point adds client MAC address to association table.
E . 1. Client sends probe request.2. Access point sends probe response.3. Client initiates association.4. Access point accepts association.5. Client adds access point MAC address to association table.
F . None of the other alternatives apply.
-
Jitter is causing problems with the VOIP application in the Company network. What causes network jitter?()
A . Variable queue delays
B . Packet drops
C . Transmitting too many small packets
D . Compressio
-
Which one of the statements below correctly describes the Virtual Router Redundancy Protocol (VRRP), which is being used in the Company network to provide redundancy?()
A . A VRRP group has one active and one or more standby virtual routers.
B . A VRRP group has one master and one or more backup virtual routers.
C . A VRRP group has one master and one redundant virtual router.
D . None of the other alternatives apply
-
You need to troubleshoot some problems in the Company VOIP network associated with jitter. What is the cause of jitter? ()
A . Packet drops
B . Transmitting too many small packets
C . Variable queue delays
D . Compression
E . None of the other alternatives apply
-
You work as a network technician at Company. Your boss, Mrs. , is interested in switch spoofing. She asks you how an attacker would collect information with VLAN hoping through switch spoofing. You should tell her that the attacking station... ()
A . ...uses VTP to collect VLAN information that is sent out and then tags itself with the domain information in order to capture the data.
B . ...will generate frames with two 802.1Q headers to cause the switch to forward the frames to a VLAN that would be inaccessible to the attacker through legitimate means.
C . ...uses DTP to negotiate trunking with a switch port and captures all traffic that is allowed on the trunk.
D . ...tags itself with all usable VLANs to capture data that is passed through the switch, regardless of the VLAN to which the data belongs.
E . None of the other alternatives apply
-
You are the network administrator in the New York office of TestKing.The company net
You are the network administrator in the New York office of TestKing.
The company network consists of a single Active Directory domain The New York office currently contains one Windows Server 2003 file server named TestKingA.
All file servers in the New York office are in an organizational unit (OU) named
New York Servers. You have been assigned the Allow - Change permission for a
Group Policy object (GPO) named NYServersGPO, which is linked to the New
York Servers OU.
The written company security policy states that all new servers must be configured
with specified predefined security settings when the servers join the domain. These
settings differ slightly for the various company offices.
You plan to install Windows Sever 2003, on 15 new computers, which all functions
as file servers. You will need to configure the specified security settings on the new
file servers.
TestKingA currently has the specified security settings configured in its local
security policy. You need to ensure that the security configuration of the new file
servers is identical to that of TestKingA. You export a copy of TestKingA‘s local
security policy settings to a template file.
You need to configure the security settings of the new servers, and you want to use
the minimum amount of administrative effort.
What should you do?()
-
You are the network administrator for your company. All network servers run Windows Server 2003.One of your servers contains a RAID-5 volume. Routine monitoring reveals a failed disk in the set. Theserver is running and users are connecting to shared folders on the RAID-5 volume.You shut down the server and replace the failed disk.Now you need to ensure that the RAID-5 volume is redundant.What should you do? ()
A. Initialize the new disk. Select the failed region and then select the Repair Volume option.
B. Import the foreign disk. Select the failed region and then select the Repair Volume option.
C. Initialize the new disk. Select the failed region and then select the Reactivate Disk option.
D. Import the foreign disk. Select the failed region and then select the Reactivate Disk option.