-
For the following statements, which one is the strongest symmetrical encryption algorithm?()
A . AES
B . 3DES
C . DES
D . Diffie-Hellma
-
When BGP is used as the PE-CE routing protocol, which of these statements is correct?()
A . On the CE router, PE neighbors must be configured in the VRF context on the CE router
B . On PE routers, the CE IBGP neighbors are configured in the global BGP configuration
C . On PE routers, the CE EBGP neighbors are configured in the VRF context
D . A separate BGP process must be used on the PE routers for CE routers so that they do not use the same BGP routing process as that used for the PE router's other provider neighbor
-
You want to use RMAN to create compressed backups.Which statement is true about the compression algorithms that RMAN can use?()
A . The BZIP2 compression algorithm consumes more CPU resources than the ZLIB compression algorithm.
B . The ZLIB compression algorithm consumes more CPU resources than the BZIP2 compression algorithm.
C . The ZLIB compression algorithm provides maximum compression and produces smaller backups than the BZIP2 compression algorithm.
D . Only the BZIP2 compression algorithm can be used to make compressed backups to disk.
-
Which statement is true, as relates to classful or classless routing?()
A . Automatic summarization at classful boundries can cause problems on discontinuous subnets
B . EIGRP and OSPF are classful routing protocols and summarize routes by default
C . RIPv1 and OSPF are classless routing protocols
D . Classful routing protocols send the subnet mask in routing update
-
You want to use RMAN to create compressed backups. Which statement is true about the compression algorithms that RMAN can use?()
A . The BZIP2 compression algorithm consumes more CPU resources than the ZLIB compression algorithm.
B . The ZLIB compression algorithm consumes more CPU resources than the BZIP2 compression algorithm.
C . The ZLIB compression algorithm provides maximum compression and produces smaller backups than the BZIP2 compression algorithm.
D . Only the BZIP2 compression algorithm can be used to make compressed backups to disk.
-
Which two statements are true about IS -IS routing?()
A . Based on the default timers, OSPF d etects a failure faster than IS - IS does.
B . OSPF default timers permit more tuning than IS - IS does.
C . IS - IS is more efficient than OSPF in the use of CPU resources.
D . OSPF is more scalable than IS - IS because of its ability to identify normal, stub, an d NSSA areas.
E . IS - IS and OSPF are both Open Standard, link - state routing protocols which support VLSM.
-
Which two statements about the IS -IS routing protocol are true?()
A . IS - IS is capable of supporting IPv4 and IPv6.
B . IS - IS is only capable of supporting IPv4 and CLNS.
C . IS - IS routers use ES - IS hellos (ESH) to establish and to maintain neighbor relationships.
D . IS - IS routers run the Bellman - Ford algorithm against their LSDBs to pick the best paths.
E . Level 1 routers learn about paths within the area of which they are a part.
F . Level 2 routers learn about paths both within areas and between areas.
-
In which Cisco IOS configuration mode is the route distinguisher (RD) configured?()
A . R1(config-route-at)#
B . R1(config-route-map)#
C . R1(config-it)#
D . R1(config-vrf)#
E . R1(config)#
F . R1(router)#
-
Which of the following statements about MD5 Routing Updates authentication is valid? ()
A . The MD5 algorithm inputs the routing updates of arbitrary length and outputs a 128-bit hash
B . The MD5 algorithm inputs the routing updates of every 64bit length and outputs an 8-bit hash
C . Multiple keys are supported
D . Routing updates packets are delivered in encrypted messages
E . Shared secret keys are delivered in encrypted message
-
In a base e-Commerce module design, which routing statement is correct?()
A . Routing is mostly static.
B . Hardcoded IP addresses are used to support failover.
C . Inbound servers use the CSM or ACE as the default gateway.
D . VLANs between the access layer switches are used for FHRP protocols.
-
Which statement is true, as relates to classful or classless routing?()
A . Automatic summarization at classful boundries can cause problems on discontinuous subnets
B . EIGRP and OSPF are classful routing protocols and summarize routes by default
C . RIPv1 and OSPF are classless routing protocols
D . Classful routing protocols send the subnet mask in routing update
-
Which of the following is the encryption algorithm used for priv option when using SNMPv3?()
A . HMAC-SHA
B . HMAC-MD5
C . CBC-DES
D . AES
E . 3DES
-
Which command is used to configure a default route?()
A . ip route 172.16.1.0 255.255.255.0 0.0.0.0
B . ip route 172.16.1.0 255.255.255.0 172.16.2.1
C . ip route 0.0.0.0 255.255.255.0 172.16.2.1
D . ip route 0.0.0.0 0.0.0.0 172.16.2.1
-
Which statement about the use of Route Target Rewrite is true?()
A . It is mainly used in Intra-AS MPLS VPLS deployments and is configured at the ASBR to avoid misconfiguration of the Route Target assignment for VPN configurations
B . It is mainly used in Inter-AS MPLS VPN deployments and is configured at the ASBR to avoid misconfiguration of the Route Target assignment for VPN configurations
C . It is mainly used in Intra-AS MPLS VPLS deployments and is configured at the Router Reflectorto avoid misconfiguration in Route Target assignment for VPN configurations
D . It is mainly used in Inter-AS MPLS VPLS deployments and is configured at the Router Reflectorto avoid misconfiguration of the Route Target assignment for VPN configurations
E . It is mainly used in Inter-AS MPLS VPLS deployments and is configured at the PE router to avoid to misconfiguration of the Route Target assignment for VPN configuratio
-
When EIGRP is used as the PE-CE routing protocol which of these statements is correct?()
A . EIGRP can be used only as the PE-CE routing protocol if the PE and CE routers are in the same AS
B . Other EIGRP AS routes are automatically advertised to the CE router and do not require a redistribution configuration command to be configured
C . Unlike other routing protocols that are used between PE and CE routers, EIGRP supports backdoor links
D . Configure of the VPN is only required on the PE router
-
Which BGP attribute is used by BGP to prevent routing loops?()
A . AS - path
B . next - hop
C . MED
D . weight
E . local preference
F . origi
-
Which description about asymmetric encryption algorithms is correct?()
A . They use the same key for encryption and decryption of data.
B . They use different keys for decryption but the same key for encryption of data.
C . They use different keys for encryption and decryption of data.
D . They use the same key for decryption but different keys for encryption of data.
-
what is the routing family which the router has to build map for the routing domain?
-
Which of the following specifications is a companion to the IEEE 802.1w Rapid Spanning Tree Protocol (RSTP) algorithm, and warrants the use multiple spanning-trees? ()
A . IEEE 802.1s (MST)
B . IEEE 802.1Q (CST)
C . Cisco PVST+
D . IEEE 802.1d (STP)
E . None of the other alternatives apply
-
The routing system which aimed at reducing the risk of casualties is called as().
A . traffic separation schemes
B . recommended tracks
C . precautionary areas
D . inshore traffic zone
-
Which two static routes are typically configured on your router when a Routed 1483 network is grouping ATM PVCs intoalarge subnet?()
A.host route
B.default route
C.customer network
D.ISP’s routing domain
-
In the following essay, each blank has four choices. Choose the most suitable one from the four choices and write down in the answer sheet.Open Shortest Path First(OSPF) is a(36)routing algorithm that(37)work clone on the OSI IS-IS intradomain routing protocol. This routing, as compared to distance-vector routing, requires(38)processing power. The(39)algorithm is used to calculate routes. OSPF routing table updates only take place when necessary,(40)at regular intervals.
A.distance-vector
B.link-state
C.flow-based
D.selective flooding
-
Regarding the route of administration in mice, which of the following statements is false
Animals were fasted for a period of time prior to administration in experiments using gavage
Tail vein injection in mice should start at the base of the tail
During gavage administration, if the animal struggles violently, the intragastric needle should be withdrawn and then injected
During intraperitoneal injection, the needle should not be penetrated too deep or too high, so as not to damage the internal organs