|
Question 1. Which statement best describes V3PN? A. enables triple AES encryption B. allows customers to divide a router into multiple independent address spaces and routing tables using Multi-VRF functionality. C. Enables dynamic mesh tunnels between sites D. Relies on NHRP E. Enables concurrent IPSec, QoS, and IP telephony Answer: E Question 2. Which two statements about LMI auto sensing are true? (Choose two.) A. It is used to tell the router about LMI type. B. It only works if the Frame Relay type is Cisco. C. It involves sending full status requests to the Frame Relay switch. D. It is used to automatically detect the Frame Relay CIRC of each PVC. Answer: A, C Question 3. Which statement best describes 802.3af? A. provides QoS tagging for voice packets B. enables call accounting and billing C. provides inline power to IP phones D. enables separate broadcast domains (voice VLANs) for IP phones E. enables VLAN tagging Answer: C Question 4. From the figure, which command would enable the central router to dynamically fluctuate the rate at which it sends packets to the branch site over the Frame Relay network? A. frame-relay traffic-rate adaptive B. frame-relay adaptive-shaping fecn C. frame-relay adaptive-shaping becn D. frame-relay traffic-rate dynamic Answer: C Question 5. Which IOS configuration command is used to define interesting packets to trigger a DDR call? A. dialer-list B. dialer-group C. dialer in-band D. dialer rotary-group Answer: A Question 6. What are three features of the VAM? (Choose three.) A. compression B. key generation C. software assisted encryption D. hardware assisted encryption Answer: A, B, D Question 7. Which multilayer switching concept determines how entries are created in the MLS cache? A. HSRP B. XTAGs C. Trunking D. Flow masks E. Tag switching Answer: D Question 8. The multilayer switching process is based on which concept? A. Switch once, route many B. Route once, switch many C. Route when you can, switch when you must D. Separate the functions of routing and switching Answer: B Question 9. Which three are contained in MLS-RP advertisements? (Choose three) A. Topology changes B. ARP cache changes C. Access list information D. Route additions and deletions E. The MAC addresses used by the MLS-RP interfaces Answer: C, D, E Question 10. When does the MLS-SE create a candidate MLS cache entry? (Choose two) A. When it receives a TCP SYN packet. B. When an MSL cache entry did not exist for the flow. C. When the frame was destined for the MLS-RP MAC address. D. After it forwards a pre-determined number of frames for the same flow. E. When it receives an MLSP message from the MLS-RP to create a candidate entry. Answer: B, C Question 11. Which Native IOS feature supports a forwarding approach that eliminates the supervisor from touching a frame for forwarding decisions? A. FIB B. MLS C. CEF D. DCEF Answer: C Question 12. Using switch clustering, how many ports can users manage from a single IP address? A. 240 B. 380 C. 500 D. 680 E. 800 Answer: B Explanation: With Cisco Switch Clustering, users can manage over 380 ports from a single IP address, and connect up to 16 switches, regardless of physical location, with a broad range of Ethernet, Fast Ethernet, and Gigabit Ethernet media http://www.cisco.com/en/US/products/hw/switches/ps637/index.html Question 13. Which statement describes the term "multilayer switching"? A. switches that operate at the access, distribution, and core layer of the design model B. an OSI Layer 1 and 2 bridging technique C. a technique to provide hardware switching of Layer 3unicastpackets D. a flow-based Layer 3 packet routing methodology Answer: C Question 14. Which command configures a default gateway on a Catalyst 3500XL switch? A. Switch (config) ip route ip address B. Switch (config) set ip route address C. Switch (config) ip route-default-gateway ip address D. Switch (enable) set default-gateway ip address Answer: D Question 15. Which method of layer 3 switching uses a forwarding information base? (FIB) A. Route caching B. Flow-based switching C. Demand-based switching D. Topology-based switching Answer: D Note: EF is a topology-based forwarding model in which all routing information is pre-populated into a forwarding information base (FIB).As a result of the pre-population of routing information, Catalyst switches can quickly look up routing information such as IP adjacencies and next-hop IP and MAC addresses.
|
Question 1. An Acceptable Use Policy for the network should define: A. Which types of traffic trusted users only are allowed to generate on the network B. Which types of traffic untrusted users only are allowed to generate on the network C. Which types of traffic trusted and untrusted users are allowed to generate on the network D. Which types of traffic guest users only are allowed to generate on the network Answer: C Question 2. A new virus has been identified on the Internet causing an infected system to listen to TCP port X for allowing remote connections to the infected device. If a network administrator desires to prevent infected devices from being further exploited within the enterprise network, the network administrator should configure and enforce policy for infected devices to the Active Edge of the network that: A. Discards traffic destined to TCP port X B. Discards traffic sourced from TCP port X C. Prioritizes traffic destined or sourced to TCP port X to a low priority D. Rate limit traffic destined or sourced to TCP port X Answer: B Question 3. Which of the following services, as defined by demo.pmd in NetSight Policy Manager, reduces network congestion by removing legacy protocols from the network such as IPX? A. Deny Unsupported Protocol Access service B. Deny Spoofing & other Administrative Protocols service C. Threat Management service D. Limit Exposure to DoS Attacks service Answer: A Question 4. In a multi-vendor environment where 3 rd party devices are located at the edge of the network and are not policy-capable, installing a policy-capable device in the distribution layer: A. Protects the network core from internally sourced attacks B. Protects the server farm from internally sourced attacks C. Secures other access layer segments connected through the policy-capable distribution layer device D. All of the above Answer: D Question 5. In a multi-vendor environment, where is the placement of a policy capable device most effective in discarding malicious traffic and protecting the entire network: A. At the access layer edge B. At the distribution layer C. In the DMZ D. In the core Answer: A Question 6. Which of the following services, as defined by demo.pmd in NetSight Policy Manager, protects the network from Denial of Service attacks on the network? A. Deny Unsupported Protocol Access service B. Deny DoS Attacks service C. Limit Exposure to DoS Attacks service D. Application Provisioning - AUP service Answer: C Question 7. As defined in NetSight Policy Managers demo.pmd file, the Secure Guest Access Service Group: A. Allows PPTP and HTTP traffic only, and discards all other traffic B. Allows HTTP, DNS, and DHCP traffic only, and discards all other traffic C. Allows PPTP, HTTP, DNS, and DHCP traffic, and denies access to all other TCP/UDP ports and unsupported protocols on the network D. Discards all traffic Answer: C Question 8. The RADIUS Filter-ID parameter is used to: A. Authenticate users B. Authenticate a RADIUS client C. Pass policy information to a switch to authorize an authenticated user with a level of network access D. Discard traffic destined for a RADIUS server Answer: C Question 9. Which of the following services, as defined by demo.pmd in NetSight Policy Manager, protects the network from a user masquerading as a valid service on the network? A. Deny Unsupported Protocol Access service B. Deny Spoofing & other Administrative Protocols service C. Application Provisioning AUP service D. Limit Exposure to DoS Attacks service Answer: B Question 10. A new virus has been identified on the Internet causing an infected system to listen to TCP port X for allowing remote connections to the infected device. If a network administrator desires to prevent an internal user from connecting to an infected device, the network administrator should configure and enforce policy for malicious users to the Active Edge of the network that: A. Discards traffic destined to TCP port X B. Discards traffic sourced from TCP port X C. Prioritizes traffic destined or sourced to TCP port X to a low priority D. Rate limit traffic destined or sourced to TCP port X Answer: A
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.