-
What two are the prerequisites for enabling Flashback Database?()
A . The database must be in ARCHIVELOG mode
B . The database must be in MOUNT EXCLUSIVE mode
C . The database must be opened in RESTRICTED mode
D . The database instance must be started in the NOMOUNT state
E . The database instance must have the keep buffer pool defined
-
For what two purposes does the Ethernet protocol use physical addresses? ()
A . Network A - 172.16.3.48/26
B . Network A - 172.16.3.128/25
C . Network A - 172.16.3.192/26
D . Link A - 172.16.3.0/30
E . Link A - 172.16.3.40/30
F . Link A - 172.16.3.112/30
-
What two situations could require the use of multiple routing protocols? ()
A . when all equipment is manufactured by Cisco
B . when there are multiple paths to destination networks
C . because having multiple routing protocols confuses hackers
D . when migrating from an older Interior Gateway Protocol (IGP) to a new IGP
E . when using UNIX host - based routers
F . when smaller broadcast domains are desired
-
For what two purposes does the Ethernet protocol use physical addresses?()
A . to uniquely identify devices at Layer 2
B . to allow communication with devices on a different network
C . to differentiate a Layer 2 frame from a Layer 3 packet
D . to establish a priority system to determine which device gets to transmit first
E . to allow communication between different devices on the same network
F . to allow detection of a remote device when its physical address is unknow
-
What are some of the characteristics of the OSPF routing protocol?()
A . It confines network instability to a single area of network.
B . It increases the routing overhead of the network
C . It supports VLSM
D . It routes between Autonomous Systems.
E . It allows extensive control of routing updates
F . None of the above
-
What are the steps for configuring stateful NBAR for dynamic protocols?()
A . Use the command ip nbar protocol-discovery to allow identification of stateful protocols. Use the command ip nbar port-map to attach the protocols to an interface.
B . Use the command match protocol rtp to allow identification of real-time audio and video traffic. Use thecommand ip nbar port-map to extend the NBAR functionality for well-known protocols to new port numbers.
C . Use the command match protocol to allow identification of stateful protocols. Use the command ip nbar port-map to attach the protocols to an interface.
D . Configure a traffic class. Configure a traffic policy. Attach the traffic policy to an interface.
E . Configure video streaming. Configure audio streaming. Attach the codec to an interface.
-
What is the purpose of the cisco Vlan Trunking protocol?()
A . to provide a mechanism to dynamically assign vlan membership to switch ports
B . to allow traffic to be carried from multiple vlans over a single link between switches
C . to allow native vlan information to be carried over a trunk link
D . to provide a mechanism to manually assign vlan membership to switch ports
E . to allow for managing the additions,deletions,and changes of vlans between switch
-
What four functions does Web Cache Communication Protocol (WCCP) incorporate?()
A . load balancing
B . scalability
C . remote management
D . fault tolerance
E . service assurance
-
What are the steps for configuring stateful NBAR for dynamic protocols? ()
A . use the command ip nbar protocol-discovery to allow identification of stateful protocols. Use the command ip nbar port-map to attach the protocols to an interface
B . use the command match protocol rtp to allow identification of real-time audio and video traffic. Use the command ip nbar port-map to extend the NBAR functionality for well-known protocols to new port numbers
C . use the command match protocol to allow identification of stateful protocols. Use the command ip nbar port-map to attach the protocols to an interface
D . configure a traffic class. Configure a traffic policy. Attach the traffic policy to an interface.
E . configure video streaming. Configure audio streaming. Attach the codec to an interface
-
What is the purpose of the NBAR protocol discovery?()
A . to build a Packet Description Language Module (PDLM) file to be used in protocol matching
B . to discover applications and build class maps for data classification
C . to look into the TCP or UDP payload and classify packets based on the content
D . to build a database of all application data that passes through the router and queue the data accordingly
-
Two Cisco routers are connected to each other and are enabled CDP. Serial line is up,protocol is also up but cdp neighbor not working. What layer of the OSI model does the problem most likely exist?
-
What does the protocol field inside the PPP frame indicate?()
A . the protocol used to determine the authentication method
B . the protocol used to identify the data in the Information field
C . the protocol used to carry the PPP frame
D . the protocol used to decode the FCS field
E . the protocol used to detect the number of padding byte
-
What are the basic configuration steps to enable IS - IS?()
A . Configure the net system - id command under routerisis and enable IS - IS on each interface with the ip router isis command.
B . Configure the net sy stem - id and the network net - id commands under routerisis.
C . Configure the network net - id command(s) under routerisis and enable IS - IS on each interface with the ip router isis command.
D . Configure the network net - id command(s) and the is - type level -1- 2 command under routerisis.
E . Configure the net system - id and the network net - id commands under routerisis and enable ISIS on each interface with the ip router isis command.
-
What are the characteristic of link state routing protocols?()
A . The exchange of advertisement is triggered by a change in the network.
B . All routers exchange routing tables with each other iIn a multipoint network.
C . Packets are routed based upon the shortest path to the destination.
D . Paths are chosen depending on the cost efficiency factor.
E . Every router in an OSPF area is capable of representing the entire network topology.
F . Only the designated router in an OSPF area can represent the entire network topology.
-
What are the prerequisites for enabling Flashback Database? ()
A . The database must be started in the MOUNT EXCLUSIVE state.
B . The database must have multiplexed control files.
C . The database must be opened by using a text-based parameter file instead of a server parameter file (SPFILE).
D . The database must be in ARCHIVELOG mode.
E . The database must be in the NOMOUNT state.
F . The database must be opened in RESTRICTED mode.
-
For what two purposes does the Ethernet protocol use physical addresses?()
A . to uniquely identify devices at Layer 2
B . to allow communication with devices on a different network
C . to differentiate a Layer 2 frame from a Layer 3 packet
D . to establish a priority system to determine which device gets to transmit first
E . to allow communication between different devices on the same network
F . to allow detection of a remote device when its physical address is unknow
-
What is a characteristic of Network Time Protocol?()
A . NTP updates are sent in the timezone they are collected in,and the syslog server will adjust based on the input time.
B . NTP authentication verifies the source,not the recipient.
C . NTP authentication requires that the recipient has multiple strata clocks to ensure accuracy.
D . Secure NTP can be configured to use SHA-1 hashing,since NTP is very insecure.
E . A stratum 0 clock should be configured at the core of every network,so it can connect to an accuratetime source.
-
What Cisco technology protects against Spanning-Tree Protocol manipulation?()
A . Spanning tree protect
B . Root Guard and BPDU Guard
C . Unicast Reverse Path Forwarding
D . MAC spoof guard
E . Port Security
-
What are three characteristics of the OSPF routing protocol?()
A . It converges quickly.
B . OSPF is a classful routing protocol.
C . It uses cost to determine the best route.
D . It uses the DUAL algorithm to determine the best route.
E . OSPF routers send the complete routing table to all directly attached routers.
F . OSPF routers discover neighbors before exchanging routing information.
-
The interface is up and protocol is up. What level of logging is enabled when you get these messages?()https://assets.asklib.com/images/image2/2018072413453530905.jpg
A . alerts
B . errors
C . critical
D . notificatio
-
What are three features of the IPV6 protocol?()
A . complicated header
B . plug-and-play
C . no broadcasts
D . checksums
E . optional IPsec
F . autoconfiguratio
-
What four functions does Web Cache Communication Protocol (WCCP) incorporate?()
A . load balancing
B . scalability
C . remote management
D . fault tolerance
E . service assurance
-
You need to configure a new Company switch for trunking. Which switch command enables a trunking protocol that appends a four byte CRC to the packet?()
A . CompanySwitch(config-if)#switchport trunk encapsulation dot1q
B . CompanySwitch(config-if)#switchport trunk encapsulation itef
C . CompanySwitch(config-if)#switchport trunk encapsulation fddi
D . CompanySwitch(config-if)#switchport trunk encapsulation isl
E . None of the other alternatives apply
-
Refer to the exhibit. All routers have Protocol Independent Multicast (PIM) enabled interf
Refer to the exhibit. All routers have Protocol Independent Multicast (PIM) enabled interfaces. On the basis of the configuration provided on routers R1 and R2, which router will take on the func tion of rendezvous point (RP) for the multicast network? ()
<img src='https://img2.soutiyun.com/shangxueba/ask/64284001-64287000/64286717/51a2c983ef58d8ddaf77650bc0427e04.jpg' />
A. both routers R1 and R2
B. router R1
C. router R2
D. none of the routers since they are not configured with static RP