Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "642-801" Exam

Building Scalable Cisco InterNetworks (BSCI)

 Question 57.
Which routing protocol is defined by the OSI protocol suite at the network layer?

A. End System-to End System
B. Routing Information Protocol
C. Interior Gateway Routing Protocol
D. Intermediate System-to-Intermediate System
E. End system to intermediate system

Answer: D

Explanation:
Intermediate System-to-Intermediate System (IS-IS) Protocol is an intradomain Open System Interconnection (OSI) dynamic routing protocol specified in International Organization for Standardization (ISO) 10589. The protocol is designed to operate in OSI Connectionless Network Service (CLNS). Data is carried using the protocol specified in ISO 8473.

OSI CLNS is a network layer service similar to bare IP service. A CLNS entity communicates over Connectionless Network Protocol (CLNP) with its peer CLNS entity.

Reference:
http://www.cisco.com/en/US/tech/CK365/CK381/technologies_white_paper09186a00800a3e6f.shtml 

Question 58.
Which two benefits are associated with classless routing protocols? (Choose two)

A. Support for VLSM.
B. Support for FLSM.
C. Summarization of discontinuous subnets.
D. Auto-summarization across network boundaries.
E. The ip classless command improves convergence.

Answer: A, C

Explanation:
A. Classless routing protocols support VLSM, and that, in turn, leads to more efficient allocation of subnet asks to meet different host requirements on different subnetworks, resulting in better utilization of host addresses.
C. Because subnets routes are propagated throughout the routing domain, summarization is often required to keep the routing tables at a manageable size.

Reference:
Building Scalable Cisco Networks (Ciscopress) page 19 + 20

Question 59.
Given the following partial configuration for Router A:
interface serial0
ip address 10.1.1.1 255.255.255.0
encapsulation frame-relay
ip ospf network point-to-multipoint
router ospf7
network 10.1.1.0 0.0.0255 area 0

Which two statements are correct? (Choose two)

A. DB/BDR elections do not take place.
B. The router is restricted to a hub and spoke topology.
C. The area 0 NBMA cloud is configured as more than one subnet.
D. Neighbor statements are required.

Answer: A, D

Explanation:
When configuring OSPF in a point-to-multipoint environment, DR/BDR elections do not take place. Neighbor statements must be statically defined due to the NBMA architecture. The point-to-multipoint environment removes the assumption that there is a full mesh and communication between neighbors is done via unicast.
Chapter: 1

Question 60.
What is the proper command to display the Level-2 routing table in Integrated IS-IS?

A. show isis database
B. show clns traffic
C. show ip route
D. show clns route
E. traceroute

Answer: D

Explanation:
On page 245 of the Cisco Press CCNP Flash Cards, the correct command to view the L2 routing table is SHOW CLNS ROUTE.

Question 61.
Why should subinterfaces be configured in an OSPF NBMA topology?

A. To converse IP addressing space.
B. To avoid split-horizon issues with the routing protocol.
C. Because logical interfaces are more reliable than physical interfaces.
D. Subinterfaces remain up when the physical interface changes to a down state.

Answer: B

Explanation:
When configuring routers in a NBMA topology, subinterfaces are typically used. A physical interface can be split into multiple logical interfaces, called subinterfaces, with each subinterface being defined as point-to-multipoint interface. Subinterfaces originally were created to better handle issues caused by spilt horizon over NBMA and distance vector-based routing protocols. 

Reference:
Building Scalable Cisco Networks (Ciscopress) page 120

Question 62
You are a technician at ITCertKeys. Your newly appointed ITCertKeys trainee wants to know why it is necessary to redistribute or advertise IGP routes into BGP.

What would your reply be?

A. so BGP can propagate this information to other IGP neighbors
B. so BGP can propagate this information to other IBGP neighbors
C. so BGP can propagate this information to other OSPF neighbors
D. so BGP can propagate this information to other EBGP neighbors

Answer: D

Explanation:
When BGP is used between autonomous systems (AS), the protocol is referred to as External
BGP (EBGP).

Note:
Customer networks usually employ an Interior Gateway Protocol (IGP) such as RIP or OSPF for the exchange of routing information within their networks

Reference:
Border Gateway Protocol
http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/bgp.htm 

Question 63.
Exhibit:
ip router isis

Your trainee is configuring a router. He wants to configure Integrated IS-IS to route IP. He knows that he must use the command listed in the exhibit. 

In which mode should he use this command?

A. Line configuration mode
B. Router configuration mode
C. Global configuration mode
D. Interface configuration mode

Answer: D

Explanation:
To configure an IS-IS routing process for IP on an interface, use the ip router isis interface configuration command.

Note:
To enable IS-IS, perform the following tasks starting in global configuration mode:
Step 1: router isis 
Enable IS-IS routing and specify an IS-IS process for IP, which places you in router configuration mode.
Step 2: net network-entity-title
Configure NETs for the routing process; you can specify a name for a NET as well as an address.
Step 3: interface type number
Enter interface configuration mode.
Step 4: ip router isis [tag]
Specify the interfaces that should be actively routing IS-IS.

Reference:
Cisco, Configuring Integrated IS-IS

Incorrect Answers
A, B; C: The ip router isis cannot be used in either line, router or Global configuration mode.

Question 64.
You want to retrieve the Level-2 routing table in Integrated IS-IS. 
Which IOS command should you use?

A. show isis route
B. show clns route
C. show isis database
D. show clns neighbors

Answer: B

Explanation:
The show clns route command is used to display all of the destinations to which this router knows how to route packets. The output includes the IS-IS Level 2 routing table as well as static and ISO-IGRP learned prefix routes.

Reference:
Cisco, ISO CLNS Commands

Incorrect Answers
A: The show isis routes command is used to display the IS-IS Level 1 forwarding table for IS-IS learned routes.
C: The show isis database command is used to display the IS-IS link state database.
D: The show clns neighbors command displays both CK and IS neighbors.

Question 65.
Your trainee is curious why Integrated IS-IS Level-3 area routing is not supported by Cisco routers. What should you tell her?

A. The System ID on a Cisco router is limited to 6 bytes.
B. The NET on a Cisco router is restricted to a maximum of 8 bytes.
C. The lack of Domain portion of the NSAP only accommodates for 2 levels of routing hierarchy.
D. Cisco routers cannot route CLNS data that use the ISO/IEC 10589 standard of NSAP 
     addressing.
E. Since the NSAP service identifier (N-SEL) must always be set to 00, no other service types are 
    available.

Answer: C

Explanation:
Integrated IS-IS is a version of the OSI IS-IS routing protocol that uses a single routing algorithm to support more network layer protocols than just CLNP. Integrated IS-IS sometimes is called Dual IS-IS, named after a version designed for IP and CLNP networks. Only one IS-IS process is allowed whether you run it in integrated mode, ISO CLNS only, or IP only.

Question 66.
What representation is used in IS-IS to identify LAN interfaces?

A. broadcast
B. point-to-point
C. pseudo-node
D. non-broadcast
E. point-to-multipoint

Answer: A

Explanation:
The types of networks that IS-IS defines include Point-to-point networks and Broadcast networks.

Reference:
Cisco, Introduction to Intermediate, System-to-Intermediate System Protocol
http://www.cisco.com/warp/public/cc/pd/iosw/prodlit/insys_wp.htm 

Incorrect Answers
B: Point-to-point networks, such as serial lines, connect a single pair of routers.
C: A Designated Intermediate System (DIS) creates a pseudonode (a virtual node), and all the routers on a LAN, including the DIS, form an adjacency with the pseudonode instead of forming n*(n-1) order adjacencies with each other in a full mesh. DIS are not used by default however.
D: Non-broadcast is not used by IS-IS.
E: Point-to-multipoint is not used by IS-IS.

Question 67.
IS-IS routers can be classified into different types. 

Which two IS-IS router types provide intra-area routing services? (Choose two)

A. L1 IS
B. L1 CK
C. L2 IS
D. L2 CK
E. L1/L2 IS
F. None of the above

Answer: A, E

Explanation:
L1 IS and L1/L2 IS routers provide intra-area routing services.

Reference:
RFC2966


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for JN0-562 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "JN0-562" Exam

Certified Internet Associate (JNCIA-SSL)

 Question 1.
You want to configure Network Connect to allow users to connect through a tunnel, connect to hosts on the same subnet as their local adapter, and shut down any attempt to extend the network boundaries. 

How do you proceed?

A. Enable split tunneling.
B. Disable split tunneling.
C. Enable split tunneling with route change monitor.
D. Allow access to local subnet with route change monitor.

Answer: D

Question 2.
Which three authentication servers are included with a baseline license? (Choose three.)

A. NIS
B. ACE
C. SAML
D. LDAP
E. SiteMinder

Answer: A, B, D

Question 3.
You create a set of role mapping rules. You select "Merge settings for all assigned roles." The second role mapping rule has the "Stop processing rules when this rule matches" option selected. 

A user logs in that matches the first three rules. What happens?

A. This is not a valid combination. The system displays an error message and does not update 
    The configuration.
B. The merge settings override the stop processing option. The user matches all three roles and  
    merging follows the standard merging criteria.
C. The Stop rule prevents any more rule matching after checking the second rule. The merge  
    option only merges the roles of the first two rules following the IVE's built-in permissive  
    merging rules.
D. The Stop rule prevents any more rule matching after checking the second rule. The user now 
    just matches the second rule. The merge option is overridden and the user is given only the  
   privileges defined by the second role.

Answer: C

Question 4.
When using the J-SAM, where on a client machine would you look to verify that the loopback addresses are assigned correctly?

A. HOSTS file
B. ARP cache
C. LMHOSTSfile
D. local route table

Answer: A

Question 5.
What is Cache Cleaner used for?

A. to prevent users from signing in from insecure machines
B. to remove content downloaded during the IVE session
C. to remove Web content cached by the IVE on behalf of the user
D. to determine which files should be cached between remote access sessions

Answer: B

Question 6.
Which role-based session option would an administrator configure to allow a user to connect from different source IP addresses within the same user session?

A. roaming session
B. persistent session
C. persistent password caching
D. browser request follow-through

Answer: A

Question 7.
Which two Web Resource Policy features provide you with the capability to configure the IVE to work with corporate Proxy Servers? (Choose two.)

A. Web Proxy Policies
B. Web Proxy Servers
C. Web Cache Policies
D. Web Passthrough Proxy

Answer: A, B

Question 8.
Which two statements about SSL VPNs are true? (Choose two.)

A. SSL VPNs provide better security than IPSEC.
B. SSL VPNs provide a dedicated, point to point connection.
C. SSL VPNs provide high performance for individual connections.
D. SSL VPNs use well-known technologies for secure individual connections.

Answer: C, D

Question 9.
You are using RADIUS as your authorization server. Other than username, which two attributes are available for creating role mapping rules? (Choose two.)

A. Certificate
B. User Attribute
C. RSA Attributes
D. Group Membership

Answer: A, B

Question 10.
Where is the IVE typically deployed in the network?

A. behind the Internet firewall
B. internally with all clients directly cabled to the IVE
C. both interfaces on the outside of the Internet firewall
D. parallel to the Internet firewall with one interface on the outside and one on the inside

Answer: A


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.