-
What three statements are true about the various deployments of the 802.1x Extensible Authentication Protocol (EAP)?()
A . EAP-FAST has the ability to tie login with non-Microsoft user databases
B . EAP-TLS supports static passwords
C . PEAP supports one-time passwords
D . LEAP does not support multiple operating systems
E . LEAP supports Layer 3 roaming
F . PEAP does not work with WPA
-
Which three protocols can be used to back up a UCS system?()
A . FTP
B . RCP
C . SCP
D . TFTP
-
Which three protocols should be explicitly managed by using Control Plane Policing on an Internet borderrouter?()
A . LDAP
B . ICMP
C . RTP
D . BGP
E . SSH
F . RDP
-
Which three protocols or applications should be placed in a class that is configured with WRED?()
A . HTTP
B . RTP
C . streaming video
D . BitTorrent
E . POP3
-
Which three configuration tasks are required to successfully deploy NBAR to recognize TCP and UDP stateful protocols? ()
A . over leased lines, use the multilink ppp command to reduce latency and jitter, and to create Distributed Link Fragmentation and interleaving
B . use the service-policy command to attach a traffic flow to an interface on the router
C . use the ip rsvp bandwidth command to set a strict upper limit on the bandwidth NBAR uses, and to guarantee admission of any flows
D . use the policy-map command to define one or more QoS policies (such as shaping, policing, and so on) to apply to traffic defined by a class map
E . use the random-detect dscp command to modify the default minimum and maximum thresholds for the DSCP value
F . use the class-map command to define one or more traffic classes by specifying the criteria by which traffic is classified
-
Which three of these statements about Dynamic Trunking Protocol are correct?()
A . It supports autonegotiation for both ISL and IEEE 802.1Q trunks.
B . It must be disabled on an interface if you do not want the interface to work as a trunk or start negotiation to become a trunk.
C . It is a point-to-multipoint protocol.
D . It is a point-to-point protocol.
E . It is not supported on private VLAN ports or tunneling ports.
-
When analog signals are digitized using the G.711 codec, voice samples are encapsulated into protocol data units (PDUs) involving which three headers? ()
A . IP
B . TCP
C . RTP
D . UDP
E . H323
F . CRTP
-
Which three of the protocols below belong to the application layer?()
A . ARP
B . HTTPS
C . SMTP
D . CDP
E . TFTP
F . ICMP
-
The Company network utilizes the Multiple-instance Spanning Tree protocol in its switched LAN. Which three statements about the MST protocol (IEEE 802.1S) are true? ()
A . To verify the MST configuration, the show pending command can be used in MST configuration mode.
B . When RSTP and MSTP are configured; UplinkFast and BackboneFast must also be enabled.
C . All switches in the same MST region must have the same VLAN-to-instance mapping, but different configuration revision numbers.
D . All switches in an MST region, except distribution layer switches, should have their priority lowered from the default value 32768.
E . An MST region is a group of MST switches that appear as a single virtual bridge to adjacent CST and MST regions.
F . Enabling MST with the "spanning-tree modemst" global configuration command also enables RSTP.
-
Which three protocols use TLVs to carry attributes?()
A . Cisco Discovery Protocol
B . Label Discovery Protocol
C . Border Gateway Protocol
D . OSPF
E . RIP version 2
-
Which three protocols should be explicitly managed by using a CoPP policy on an Internet border router?()
A . SMTP
B . ICMP
C . BGP
D . SSH
E . RTP
F . BitTorrent
G . VTP
-
Which three statements are true about the Internet Group Management Protocol (IGMP)? ()
A . There are three IGMP modes: dense mode, sparse mode, and sparse - dense mode
B . IGMP is used to register individual hosts with a multicast group
C . IGMP version 3 enables a multicast receiving host to specify to the router which sources it should forward traffic from
D . IGMP messages a re IP datagrams with a protocol value of 2, destination address of 224.0.0.2, and a TTL value of 1
E . IGMP is a multicast routing protocol that makes packet - forwarding decisions independent of other routing protocols such as EIGRP
F . IGMP snooping ru ns on Layer 3 router
-
What three statements are true about the various deployments of the 802.1x Extensible Authentication Protocol (EAP)? ()
A . EAP-FAST has the ability to tie login with non-Microsoft user databases
B . EAP-TLS supports static passwords
C . PEAP supports one-time passwords
D . LEAP does not support multiple operating systems
E . LEAP supports Layer 3 roaming
F . PEAP does not work with WPA·
-
Which three configuration tasks are required to successfully deploy NBAR to recognize TCP and UDP stateful protocols?()
A . Over leased lines,use the multilink ppp command to reduce latency and jitter,and to create Distributed Link Fragmentation and interleaving.
B . Use the service-policy command to attach a traffic flow to an interface on the router.
C . Use the ip rsvp bandwidth command to set a strict upper limit on the bandwidth NBAR uses,and toguarantee admission of any flows.
D . Use the policy-map command to define one or more QoS policies (such as shaping,policing,and so on) to apply to traffic defined by a class map.
E . Use the random-detect dscp command to modify the default minimum and maximum thresholds for the DSCP value.
F . Use the class-map command to define one or more traffic classes by specifying the criteria by which traffic is classified.
-
Which three protocols should be explicitly managed by using Control Plane Policing on an Internet border router?()
A . LDAP
B . ICMP
C . RTP
D . BGP
E . SSH
F . RDP
-
What are three characteristics of the OSPF routing protocol?()
A . It converges quickly.
B . OSPF is a classful routing protocol.
C . It uses cost to determine the best route.
D . It uses the DUAL algorithm to determine the best route.
E . OSPF routers send the complete routing table to all directly attached routers.
F . OSPF routers discover neighbors before exchanging routing information.
-
In a VoIP network, which three call signaling protocols are supported by the Cisco CallManager for call setup, call maintenance, and call teardown? ()
A . H·323
B . UDP
C . RTP
D . TCP
E . Media Gateway Control Protocol (MGCP)
F . session initiation protocol (SIP)
-
What are three features of the IPV6 protocol?()
A . complicated header
B . plug-and-play
C . no broadcasts
D . checksums
E . optional IPsec
F . autoconfiguratio
-
Which three statements about the EIGRP routing protocol are true?()
A . EIGRP supports five generic packet types, including hello, database description (DBD), link state request (LSR), link - state update (LSU), and LSAck.
B . EIGRP sends periodic hello packets to the multicast IP address 224.0.0.10.
C . EIGRP will not form a neighbor relationship with another peer when their K values are mismatched.
D . EIGRP sends periodic hello packets to the multicast IP address 224.0.0.9.
E . E IGRP will form a neighbor relationship with another peer even when their K values are mismatched.
F . EIGRP supports five generic packet types, including hello, update, query, reply, and ACK packets.
-
pany is implementing 802.1X in order to increase network security. In the use of 802.1X access control, which three protocols are allowed through the switch port before authentication takes place? ()
A . EAP-over-LAN
B . EAP MD5
C . STP
D . protocols not filtered by an ACL
E . CDP
F . TACACS+
-
In a VoIP network, which three call signaling protocols are supported by the Cisco CallManager for call setup, call maintenance, and call teardown?()
A . H323
B . UDP
C . RTP
D . TCP
E . Media Gateway Control Protocol (MGCP)
F . session initiation protocol (SIP)&e
-
Which three protocols should be explicitly managed by using a CoPP policy on an Internet border router?()
A . SMTP
B . ICMP
C . BGP
D . SSH
E . RTP
F . BitTorrent
G . VTP
-
Which three techniques should be used to secure management protocols?()
A . Configure SNMP with only read-only community strings.
B . Encrypt TFTP and syslog traffic in an IPSec tunnel.
C . Implement RFC 3704 filtering at the perimeter router when allowing syslog access from devices on the outside of a firewall.
D . Synchronize the NTP master clock with an Internet atomic clock.
E . Use SNMP version 2.
F . Use TFTP version 3 or above because these versions support a cryptographic authentication mechanism between peers.