-
You work as a network technician at. Your boss, Mrs. , is interested in the Spanning Tree Protocol timers. What can you tell her regarding the default STP timers? ()
A . The hello time is 5 seconds.
B . The forward delay is 10 seconds.
C . The hello time is 2 seconds.
D . The forward delay is 15 seconds
E . The max_age timer is 15 seconds.
F . The hello time is 10 seconds.
G . The max_age timer is 20 seconds.
H . The forward delay is 20 seconds.
I . The max_age timer is 30 seconds.
-
You work as a database administrator for Certkiller .com. You enabled tracing while creating a listener to your database. What additional information is available to you when you enable tracing?()
A . Information about each Oracle Net connection.
B . Information about each entry in theLinstener.orafile
C . Information about the changed done in the database
D . Information about the different listeners in your system
E . Information about all thenondatabasefiles required to operate the database
-
As an experienced technician, you are responsible for Technical Support. A customer calls to ask the best signal level and noise level for cell phone. How to respond?()
A . -40dBm signal and -90dBm noise
B . -50dBm signal and -90dBm noise
C . -30dBm signal and -90dBm noise
D . -20dBm signal and -90dBm noise
-
You work as a network technician at Certkiller .com. Please study the exhibit carefully. What does "locking Down" the router entail?()https://assets.asklib.com/images/image2/2018073114272525417.jpg
A . Disabling HTTPS access to Cisco SDM
B . Prohibiting console access to Router
C . Preventing any alterations to the router’s running configuration
D . Disabling all vulnerable Services on the Router
E . Shutting down all the router’s interface
-
As a network technician, do you know what is a recommended practice for secure configurationmanagement?()
A . Disable post scan
B . Use SSH or SSL
C . Enable trust levels
D . Deny echo replies on all edge router
-
You work as a network technician. Your boss is interested in the QoS technology in the context ofvideo traffic. What can be said of application of this technology in this type of network?()
A . The access layer is the initial point at which traffic enters the network. Traffic is marked (orremarked) at Layers 2 and 3 by the access switch as it enters the network, or is "trusted" that it isentering the network with the appropriate tag
B . No traffic marking occurs at the core layer. Layer 2/3 QoS tags are trusted from distributionlayer switches and used to prioritize and queue the traffic as it traverses the core
C . Traffic inbound from the access layer to the distribution layer can be trusted or reset dependingupon the ability of the access layer switches. Priority access into the core is provided based onLayer 3 QoS tags
D . IP precedence, DSCP, QoS group, IP address, and ingress interface are Layer 2 characteristics that are set by the access layer as it passes traffic to the distribution layer. Thedistribution layer, once it has made a switching decision to the core layer, strips these off
E . MAC address, Multiprotocol Label Switching (MPLS); the ATM cell loss priority (CLP) bit, theFrame Relay discard eligible (DE) bit, and ingress interface are established by the voicesubmodule (distribution layer) as traffic passes to the core layer
F . The distribution layer inspects a frame to see if it has exceeded a predefined rate of trafficwithin a certain time frame, which is typically a fixed number internal to the switch. If a frame isdetermined to be in excess of the predefined rate limit, the CoS value can be marked up in a waythat results in the packet being dropped
-
You work as a network technician at Certkiller .com. Please study the exhibit carefully. The exhibit is an example of which technology being implemented?()https://assets.asklib.com/images/image2/2018073114112240664.jpg
A . Spanning-tree
B . 802.1Q
C . VLANs
D . PAT
E . QoS
-
You work as a network technician at Company. Your boss, Mrs., is interested in the Cisco Compatible Extensions program. What are three features of this program? ()
A . Accounting
B . Analog and digital voice
C . Mobility
D . Security
E . Routing and switching
F . VLAN and QoS
-
As the network technician at Company, you need to configure DHCP snooping on a new switch. Which three steps are required? ()
A . Configure the switch to insert and remove DHCP relay information (option-82 field) in forwarded DHCP request messages.
B . Configure DHCP snooping globally.
C . Configure the switch as a DHCP server.
D . Configure DHCP snooping on an interface.
E . Configure all interfaces as DHCP snooping trusted interfaces.
F . Configure DHCP snooping on a VLAN or range of VLANs.
-
You work as a network technician at Certkiller .com. Please study the exhibit carefully. From this Cisco SDM security Audit Wizard screen, what should you do to secure the Router?()https://assets.asklib.com/images/image2/2018073114365065712.jpg
A . Click Next
B . Click Fix All, then Next
C . Click Fix All, then clear CDP check box, then Next, then manually disable CDP on the WAN interface
D . Click Fix All, the clear CDP check box, the Next
E . Click Fix All, then Clear CDP check box, then Next, then Immediately reboot the router
-
You work as a network technician at Company. Your boss, Ms. , is interested in the Aironet enterprise solutions. What should you tell her regarding this?()
A . The Cisco Aironet AP handles real-time portions of the LWAPP protocol, and the WLAN controller handles those items which are not time sensitive.
B . A Cisco Aironet AP handles the transmission of beacon frames and also handles responses to probe-request frames from clients.
C . Virtual MAC architecture allows the splitting of the 802.11 protocol between the Cisco Aironet AP and a LAN switch.
D . A Cisco Aironet solution includes intelligent Cisco Aironet access point (APs) and Cisco Catalyst switches.
E . In the Cisco Aironet solution, each AP is locally configured by the use of either a web interface or the command line interface.
-
You work as a network technician at Company. Your boss, Mrs., is interested in LWAPP (Lightweight Access Point Protocol). What should you tell her regarding this technology? ()
A . LWAPP is a proprietary protocol, and because of its very high overhead it is not widely adopted.
B . Control traffic is encapsulated in UDP packets with a source port of 1024 and a destination port of 12223.
C . Layer 3 LWAPP is a UDP/IP Frame that requires a Cisco Aironet AP to obtain an IP address using DHCP.
D . Data traffic is encapsulated in UDP packets with a source port of 1024 and a destination port of 12223.
E . Control traffic is encapsulated in TCP packets with a source port of 1024 and a destination port of 12223.
F . Data traffic is encapsulated in TCP packets with a source port of 1024 and a destination port of 12223.
-
You work as a network technician at Company. Your boss, Ms., is interested LWAPP (Lightweight Access Point Protocol). In particular she wants to know which type of activities this protocol defines. What should you tell her? ()
A . Layer 3 addressing and distribution
B . SNMP monitoring services
C . Access point certification and software control
D . Packet encapsulation, fragmentation, and formatting
E . Compression and Layer 3 address mapping
F . User behavior
-
You work as a network technician at Company. Your boss, Mrs. , is interested in GLBP. In particular, she wants to know the multicast address that this protocol uses. What should you tell her? ()
A . 224.0.0.100
B . 224.0.0.1
C . 224.0.0.102
D . 224.0.0.10
E . 224.0.0.101
F . None of the other alternatives apply
-
You work as a network engineer at TestKing.com. You are required to allow establishment of a Telnet session with a router TestKingC.Which set command must be configured?()
A .https://assets.asklib.com/images/image2/2018072717510448028.jpg
B .https://assets.asklib.com/images/image2/2018072717511289780.jpg
C .https://assets.asklib.com/images/image2/2018072717511936039.jpg
D .https://assets.asklib.com/images/image2/2018072717512431070.jpg
E .https://assets.asklib.com/images/image2/2018072717513262336.jpg
F .https://assets.asklib.com/images/image2/201807271751385786.jpg
-
I would be very much()if you could arrange for a radio technician to come on board as soon as possible for my radar repair.
A . obliged
B . obliging
C . oblige
D . being obliged
-
Exhibit:
https://assets.asklib.com/images/image2/20180726110937488.jpg
You work as a network technician. You trainee shows you the IOS command output displayed inthe exhibit. What command did Tess use to produce this output?()
A . show ip RIP
B . show ipv6 ospf
C . show ip ospf
D . show ip ospf interface
E . show ipv6 ospf interface
F . show ipv4 ospf
G . None of the other alternatives apply
-
You work as a network technician at Company. Your boss, Mrs. , is interested in switch spoofing. She asks you how an attacker would collect information with VLAN hoping through switch spoofing. You should tell her that the attacking station... ()
A . ...uses VTP to collect VLAN information that is sent out and then tags itself with the domain information in order to capture the data.
B . ...will generate frames with two 802.1Q headers to cause the switch to forward the frames to a VLAN that would be inaccessible to the attacker through legitimate means.
C . ...uses DTP to negotiate trunking with a switch port and captures all traffic that is allowed on the trunk.
D . ...tags itself with all usable VLANs to capture data that is passed through the switch, regardless of the VLAN to which the data belongs.
E . None of the other alternatives apply
-
You work as a network technician at Certkiller .com. Please study the exhibit carefully. Which two interfaces are enabled for 802.1Q encapsulation?()https://assets.asklib.com/images/image2/2018073114345074049.jpg
A . Router Certkiller 2,Gig 0/1
B . Switch Certkiller B,Fast Port 1 to 24
C . Switch Certkiller A,Gig Port 9
D . Router Certkiller 2,Gig 0/0
-
You should save your work often as a()against computer failure.
A、sanction
B、precaution
C、shield
D、shelter
-
Other people see you as hard-working, a little pessimistic and very cautious.
-
If you work from home, you’d better have a desalinated part as your office work place.
-
The harder you work, the______likely you are to qualify as a doctor by the time you graduate.
A.much
B.more
C.fewer
D.less
-
You?work?as?a?network?Exchange?administrator?at?Co...
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2000 and Microsoft Exchange Server 2003 Service Pack 2 (SP2) as their messaging solution.During the course of the business week you receive instruction from Company.com to transition the Exchange organization to Microsoft Exchange Server 2010 whilst preparing the Exchange organization for the deployment of the Exchange Server 2010 Hub Transport servers, Client Access and Mailbox servers.What should you do?()
A. You should consider having the Microsoft Exchange Server 2010 Edge Transport server deployed first.
B. You should consider having the Microsoft Exchange Server 2000 servers removed from the organization first.
C. You should consider having the Active Directory Connector (ADC) installed first.
D. You should consider having the Recipient Update service (RUS) objects deleted first.