Escolar Documentos
Profissional Documentos
Cultura Documentos
Which of these Layer 2 access designs does not support VLAN extensions?
A. FlexLinks
B. loop-free U
C. looped square
D. looped triangle
E. loop-free inverted U
Answer: B
QUESTION NO: 2
m
optimized for data based on a dual (counter-rotating) ring topology?
A. DTP
B. RPR
.co
C. SDH
sts
D. CWDM
E. DWDM
lTe
Answer: B
tua
QUESTION NO: 3
Which three of these are elements of the Cisco Unified Wireless Network architecture? (Choose
Ac
three)
A. cell phones
B. remote access
C. mobility services
D. network management
E. network unification
F. network decentralization
Answer: C,D,E
QUESTION NO: 4
m
.co
sts
lTe
Answer: A,D
QUESTION NO: 5
Which of these terms refers to call issues that cause variations in timing or time of arrival?
A. queuing
B. jitter
C. packet loss
D. digitized sampling
E. signal-to-noise ratio ratio
QUESTION NO: 6
Answer: A,E
m
QUESTION NO: 7
.co
In base e-Commerce module designs, where should firewall perimeters be placed?
A. core layer
sts
B. Internet boundary
C. aggregation layer
D. aggregation and core layers
lTe
Answer: A
tua
QUESTION NO: 8
Ac
In which two locations in an enterprise network can an IPS sensor be placed? (Choose two.
Answer: C,D
QUESTION NO: 9
Answer: C
QUESTION NO: 10
In a VoWLAN deployment, what is the recommended separation between cells with the same
channel?
m
A. 19 dBm
B. 7 dBm
.co
C. 10dBm
D. 6 dBm
sts
E. 5 dbmto 10 dBm
Answer: A
lTe
QUESTION NO: 11
tua
Answer: B
QUESTION NO: 12
Which site-to-site VPN solution allows Cisco routers, PIX Firewalls, and Cisco hardware clients to
act as remote VPN clients in order to receive predefined security policies and configuration
parameters from the VPN headend at the central site?
Answer: A
QUESTION NO: 13
Which two design concerns must be addressed when designing a multicast implementation?
(Choose two.)
A. only the low-order 23 bits of the MAC address are used to map IP addresses
B. only the low-order 24 bits of the MAC address are used to map IP addresses
m
C. only the high-order 23 bits of the MAC address are used to map IP addresses
.co
D. only the low-order 23 bits of the IP address are used to map MAC addresses
E. the 0x01004f MAC address prefix is used for mapping IP addresses to MAC addresses
F. the 0x01005e MAC address prefix is used for mapping IP addresses to MAC addresses
sts
Answer: A,F
lTe
QUESTION NO: 14
Which two of these are recommended practices with trunks? (Choose two.)
tua
C. set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiation
D. use VTP server mode to support dynamic propagation of VLAN information across the network
E. set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol
negotiation.
Answer: B,E
QUESTION NO: 15
For acceptable voice calls, the packet error rate should be no higher than what value?
A. 0.1%
B. 1%
Answer: B
QUESTION NO: 16
Answer: A
m
QUESTION NO: 17
.co
Which statement is correct regarding NBAR and NetFlow?
sts
Answer: B
Ac
QUESTION NO: 18
Answer: A
When BGP tuning is used, how is packet flow into the e-commerce module controlled?
A. by tracking the status of objects along the path to the e-commerce module
B. by detecting undesirable conditions along the path to the e-commerce module
C. by using the MED to communicate the site preferences for traffic to multiple ISPs
D. by communicating the available prefixes, routing policies, and preferences of each site to its
ISP
E. by moving the SLB to a position where selected traffic to and from the servers does not go
through the SLB
Answer: D
QUESTION NO: 20
m
Which three Layer 2 access designs have all of their uplinks in an active state? (Choose three.)
A. Flex Links
.co
B. loop-free U
sts
C. looped square
D. looped triangle
E. loop-free inverted U
lTe
Answer: B,C,E
tua
QUESTION NO: 21
Ac
Which signal and noise values will result in the best phone communication with an access point?
Answer: A
QUESTION NO: 22
A remote user needs a static IP address to support a specific application. Which remote access
VPN addressing technique supports this?
Answer: A
QUESTION NO: 23
m
D. traffic arrives on one IPS interface and exits on another
.co
E. has a promiscuous interface that is used to monitor the network
Answer: B,D
sts
QUESTION NO: 24
lTe
Which four Cisco Spanning Tree Protocol enhancements are supported with rapid per-VLAN
Spanning-Tree plus? (Choose four.)
tua
A. PortFast
B. UplinkFast
C. loop guard
Ac
D. root guard
E. BPDU guard
F. BackboneFast
Answer: A,C,D,E
QUESTION NO: 25
A customer has eight sites and plans to increase that number in the future. Branch site to branch
site traffic is approaching 30 percent. The customer's goals are to make it easier to add branch
sites in the future and to reduce traffic through the hub.
Which VPN topology should you recommend to this customer?
Answer: D
QUESTION NO: 26
Which two of these key fields are used to identify a flow in a traditional NetFlow implementation?
(Choose two.)
A. source port
B. output interface
m
C. next-hop IP address
D. source MAC address
E. destination IP address
.co
F. next-hop MAC address
sts
Answer: A,E
lTe
QUESTION NO: 27
Answer: A,C
QUESTION NO: 28
Answer: A
m
.co
Answer:
sts
lTe
tua
Explanation:
Ac
Answer:
m
.co
sts
lTe
tua
Explanation:
Ac
QUESTION NO: 31
Answer: A,C
QUESTION NO: 32
m
A. multicast routing uses RPF
B. multicast routing is connectionless.
.co
C. In multicast routing, the source of a packet is known.
D. When network topologies change, multicast distribution trees are not rebuilt, but use the original
path
sts
E. Multicast routing is much like unicast routing, with the only difference being that it has a a group
of receivers rather than just one destination
lTe
Answer: A,C
tua
QUESTION NO: 33
Refer to the exhibit. When deploying an MSFC and an FWSM, which statement is correct?
Ac
m
.co
sts
lTe
Answer: A
Ac
QUESTION NO: 34
Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will
keep them on the same IP subnet?
Answer: B
QUESTION NO: 35
Which three of these are major scaling, sizing, and performance considerations for an IPsec
design? (Choose three.)
A. connection speed
B. number of remote sites
C. features to tie supported
D. types of devices at the remote site
E. whether packets are encrypted using 3DES or AES
F. number of routes in the routing table at the remote site
Answer: A,B,C
m
QUESTION NO: 36 .co
Which two statements about SCSI are true? (Choose two.)
sts
A. The bus is limited to 32 devices.
B. It is a full-duplex serial standard.
C. It is a halF. duplex serial standard.
lTe
Answer: C,E
Ac
QUESTION NO: 37
One of your customers is using the G.711 codec with 802.11a access point radios. This can
support a maximum of how many phones per access point?
A. 7
B. 8
C. 14
D. 19
E. 23
Answer: C
Answer:
m
.co
sts
Explanation:
lTe
tua
Ac
QUESTION NO: 39
A customer has seven sites, three of which process a large amount of traffic among them. The
customer plans to grow the number of sites in the future. Which is the most appropriate design
topology?
A. full mesh
B. peer-to-peer
C. partial mesh
D. hub and spoke
QUESTION NO: 40
A. An IPS should be deployed if the security policy does not support the denial of traffic.
B. An IDS analyzes a copy of the monitored traffic and not the actual forwarded packet,
C. Traffic impact considerations are increased when deploying an IDS over an IPS sensor.
D. Bandwidth considerations must be taken into account since IDS is deployed inline to traffic flow.
Answer: B
m
QUESTION NO: 41 DRAG DROP
.co
sts
lTe
tua
Answer:
Ac
Drag and drop question. Drag the items to the proper locations.
m
QUESTION NO: 42
.co
Which two settings must be configured in order to use the GUI to configure applications? (Choose
two.)
sts
Answer: A,B
Ac
QUESTION NO: 43
At a certain customer's site, a NAS is both physically and logically in the traffic path. The NAS
identifies clients solely based on their MAC addresses. In which access mode has this NAS been
configured to operate?
A. Layer 2 mode
B. Layer 3 Edge mode C. Layer 3 Central mode D. Layer 3 In-Band mode
Answer: A
QUESTION NO: 44
Answer: C
QUESTION NO: 45
m
D. Because U-PE devices act as IEEE 802.1 devices, the VPLS core must use STP.
.co
E. When the provider experiences an outage, IP re-routing restores PW connectivity and MAC re-
learning is needed.
Answer: C
sts
lTe
QUESTION NO: 46
How does ERS use the VLAN tag? ~i A. to provide service internetworking
tua
D. to provide a trunk by which all VLANs can navigate from one site to one or multiple sites
Answer: C
QUESTION NO: 47
Answer: A,E
QUESTION NO: 48
What method does the Cisco MDS 9000 Series use to support trunking?
A. ISL
B. IVR
C. VoQ
D. VSANs
E. Enhanced ISL
Answer: E
m
QUESTION NO: 49 DRAG DROP
.co
sts
lTe
tua
Answer:
Ac
Explanation:
QUESTION NO: 50
In which NAS operating mode are ACL filtering and bandwidth throttling only provided during
posture assessment?
m
A. Layer2
B. Layer 3
C. in-band
.co
D. out-oF. band
E. edge
sts
F. central
Answer: D
lTe
QUESTION NO: 51
tua
Which two statements about Layer 3 access designs are correct? (Choose two.)
Ac
Answer: A,E
QUESTION NO: 52
Answer: C
QUESTION NO: 53
m
E. The TCO is higher because of the cost of director class storage switches.
Answer: B,D
.co
sts
QUESTION NO: 54
Which of these is least important when determining how many users a NAS can support?
lTe
A. bandwidth
B. number of plug-ins per scan
tua
Answer: A
QUESTION NO: 55
Answer: A
QUESTION NO: 56
Answer: F
m
QUESTION NO: 57
a
.co
Refer to the exhibit. Which two characteristics are true of a firewall running in routed mode?
(Choose two)
sts
lTe
tua
Ac
QUESTION NO: 58
Which of these practices should you follow when designing a Layer 3 routing protocol?
Answer: D
m
QUESTION NO: 59
.co
What is the recommended radius of a cell for a voice-ready wireless network?
A. 6 dBm
sts
B. 7 dBm
C. 19dBm
D. 5 dBm
lTe
Answer: B
tua
QUESTION NO: 60
Ac
Which three implementation modes may be used to deploy SLB? (Choose three.)
A. Router mode
B. One-arm mode
C. Three-arm mode
D. Bridge mode inline
E. Bridge mode passive
F. Combo Bridge router mode
Answer: A,B,D
QUESTION NO: 61
Answer: A
QUESTION NO: 62
a
Refer to the exhibit. Which two statements about the topologies shown are correct? (Choose two.)
m
.co
sts
lTe
D. Both designs support stateful services at the aggregation layer. J E. Design 2 is the most widely
deployed in enterprise data centers.
Ac
Answer: A,D
QUESTION NO: 63
What is the term for a logical SAN which provides isolation among devices physically connected to
the same fabric?
A. ISL
B. IVR
C. VoQ
D. VSANs
E. Enhanced ISL
QUESTION NO: 64
Which technology allows centralized storage services to be shared across different VSANs?
A. IVR
B. FSPF
C. FICON
D. SANTap
Answer: A
m
QUESTION NO: 65
Which two statements are correct regarding Flex Links? (Choose two.)
Answer: B,D
tua
QUESTION NO: 66
Ac
Lafeyette Productions is looking for a new ISP that has improved availability, load balancing, and
catastrophe protection. Which type of ISP connectivity solution would be best?
A. single run
B. direct BGP peering
C. stub domain EBGP
D. multi-homed
Answer: D
QUESTION NO: 67
Acme Nutrition manufactures a wide variety of vitamin supplements. It has a single manufacturing
facility with 3 regional warehouses and 16 district sales offices. Currently the manufacturing facility
If Acme Nutrition plans for 20 percent growth in facilities, how many Class C subnets will the
district sales offices require?
A. 20 (4 from the warehouse range,15 from a separate Class C block and 1 from the IP WAN
block)
B. 19 (3 from the warehouse range and 16 from a separate Class C address)
C. 16 (3 from the warehouse range and 13 from a separate Class C address)
D. 19 (3 from the warehouse block, 15 from a separate Class C block and 1 from the IP WAN
block)
Answer: D
m
QUESTION NO: 68
A. (I)-(3);(II)-(2);(III)-(4);(IV)-(1)
B. (I)-(1);(II)-(2);(II)-(3);(IV)-(4)
C. (I)-(3);(II)-(2);(III)-(1);(IV)-(4)
D. (I)-(2);(II)-(3);(III)-(4);(IV)-(1)
Answer: A
QUESTION NO: 69
When designing a converged network, which measures can be taken at the building access layer
to help eliminate latency and ensure end-to-end quality of service can be maintained? (Choose
three.)
Answer: A,C,D
QUESTION NO: 70
Users at the Charleville Company began experiencing high network delays when Internet
connectivity was enabled for all users. After investigating the traffic flow, you determine that peer-
to-peer traffic from a music download site is consuming a large amount of bandwidth. Which QoS
mechanism can you implement to improve the network response time?
m
B. Use class-based policing to limit the peer-to-peer traffic rate.
.co
C. Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions.
D. Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.
Answer: B
sts
lTe
QUESTION NO: 71
With Call Manager v3.1, what is the maximum number of servers in a Cluster?
tua
A. 8
B. 3
C. 7
Ac
D. 6
Answer: A
QUESTION NO: 72
QUESTION NO: 73
Which routing protocol supports a flexible area structure using routing levels one and two?
A. IS-IS
B. EIGRP
C. BGP
D. OSPF
Answer: A
m
QUESTION NO: 74
Scalability is provided in the server farm module by which of the following design strategies?
Answer: C
tua
QUESTION NO: 75
Which VPN management feature would be considered to ensure that the network had the least
Ac
Answer: B
QUESTION NO: 76
Which IOS QoS enhancement was created to address scalability and bandwidth guarantee
issues?
Answer: A
QUESTION NO: 77
You are the Cisco Network Designer. What is the term for a logical SAN which provides isolation
among devices physically connected to the same fabric?
m
D. InterSwitch Link
Answer: A
.co
sts
QUESTION NO: 78
A security analysis at The Potomac Canal Company recommends installing an IDS appliance and
lTe
a firewall appliance. These appliances should connect directly into a Layer 3 switch. A load
balancer and SSL termination have also been recommended.Potomac's management have
expressed concern over the cost. You suggest using integrated blades. What is one advantage
tua
B. Putting all security devices in a single chassis provides a single point of failure.
C. Using integrated blades would only require two devices.
D. The data center would need several devices to achieve its goal.
Answer: B,C
QUESTION NO: 79
Which typical enterprise campus requirement ensures that the network supports the required
applications and that data flows within the required time frames?
A. manageability
B. availability
Answer: C
QUESTION NO: 80
A. IS-IS
m
B. OSPF
C. RIPv2
D. EIGRP
.co
Answer: C
sts
lTe
QUESTION NO: 81
Please match the Cisco client security software application to its description.
tua
A. (I)-(1);(II)-(4);(III)-(2);(IV)-(3)
B. (I)-(4);(II)-(1);(III)-(3);(IV)-(2)
C. (I)-(2);(II)-(4);(III)-(3);(IV)-(1)
D. (I)-(1);(II)-(4);(III)-(3);(IV)-(2)
Answer: D
QUESTION NO: 82
Answer: B
QUESTION NO: 83
m
You are the Cisco Network Designer. Which layer NAS operating mode are ACL filtering and
bandwidth throttling only provided during posture assessment?
A. Layer 3
.co
B. out-of-band
sts
C. Layer 4
D. Layer 2
lTe
Answer: B
tua
QUESTION NO: 84
(1) PortFast
(2) UplinkFast
(3) BackboneFast
(4) Loop guard
(5) Root guard
A. (I)-(4);(II)-(2);(III)-(3);(IV)-(5);(V)-(1)
Answer: A
QUESTION NO: 85
When designing the WAN module within the enterprise edge, which document is used to specify
the connectivity and performance agreements with the service provider?
A. RFP
B. RFC
C. SOW
D. SLC/SLA
m
Answer: D
.co
QUESTION NO: 86
sts
(1) CST
(2) MST
(3) STP
tua
(4) RSTP
(5) PVST+
Ac
(I)icentical to 802.1w
(II)assurnes one spraining-tree instance for each bridged network regardless of number of VLANs
(III)provides a separate instance of 802.1w for each VLAN
(IV)Cisco STP enhancement providing a separate 802.1D spanning tree instance for each VLAN
(V)original 802.1D version providing loo-free topology in a network with red-indant links
A. (I)-(2);(II)-(5);(III)-(1);(IV)-(4);(V)-(3)
B. (I)-(2);(II)-(5);(III)-(4);(IV)-(1);(V)-(3)
C. (I)-(1);(II)-(5);(III)-(2);(IV)-(4);(V)-(3)
D. (I)-(2);(II)-(5);(III)-(3);(IV)-(4);(V)-(1)
Answer: A
Which content networking device allows bandwidth configuration settings so that streaming
content will not interfere with other network traffic?
A. Content Engine
B. IP/TV Control Server
C. IP/TV Broadcast Server
D. Content Distribution Manager
Answer: B
QUESTION NO: 88
What is the first step that you would use Cisco Product Advisor for when selecting a router for an
m
Edge solution?
Answer: D
lTe
QUESTION NO: 89
tua
Answer: D
QUESTION NO: 90
To securely transport EIGRP traffic, a network administrator will build VPNs between sites. What
is the best method to accomplish the transport of EIGRP traffic?
Answer: D
QUESTION NO: 91
What are disadvantages to storage directly attached to the application servers? (Choose three.)
A. reliability
B. scalability
C. manageability
D. redundancy
Answer: B,C,D
m
QUESTION NO: 92
.co
What four functions does Web Cache Communication Protocol (WCCP) incorporate? (Choose
sts
four.)
A. scalability
lTe
B. service assurance
C. load balancing
D. fault tolerance
tua
E. remote management
Answer: A,B,C,D
Ac
QUESTION NO: 93
The network administrator would like to generate synthetic traffic using the Service Assurance
Agent contained in Cisco IOS. Which CiscoWorks network management application will be used to
report the latency and availability for configured traffic operations on an end-to-end and hop-by-
hop (router-to-router) basis?
QUESTION NO: 94
Which three things can be restricted by the Class of Service in a traditional PBX? (Choose three.)
A. dialed numbers
B. dial plans
C. voice mail prompts
D. phone features
Answer: A,B,D
m
QUESTION NO: 95
A. reduced MTBF
.co
B. redundant infrastructure
sts
C. continuous operation of computing systems
D. clustering of computer systems
lTe
Answer: C
tua
QUESTION NO: 96
What two choices can you make when redundancy is required from a branch office to a regional
Ac
Answer: A,D
QUESTION NO: 97
ABC Company has 1500 managed devices and 15,000 end users on a campus network. LAN
Management Solution (LMS) is being deployed as the network management application. What is
the recommended number of network management server(s)?
Answer: C
QUESTION NO: 98
When dealing with transparent caching, where should the Content Engines be placed?
m
Answer: B
.co
QUESTION NO: 99
sts
Which one is not the feature of the Cisco Unified Wireless Network architecture?
lTe
A. mobility services
B. network unification
C. remote access
tua
D. network management
Answer: C
Ac
Sun Stable is a global insurance company with headquarters located in Houston, Texas. The
campus there is made up of a number of office buildings located within the same vicinity. In 2003,
a new building, Building 331B was added. The additional building houses approximately 1000
employees. Rather than deploy a private branch exchange (PBX) in the new building, Sun Stable
has decided to implement an IP telephony solution. External calls will be carried across a MAN link
to another building, where a gateway connects into the worldwide PBX network of Sun Stable.
Voice mail and unified messaging components are required and all IP phones and workstations
should be on separate VLANs and IP subnets.
Answer: A
The Schuyler and Livingston Iron Works has been working on getting its network security under
control.
It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to
proactively identify areas of weakness, and it monitors and responds to security events as they
m
occur. It also employs extensive access control lists, stateful firewall implementations, and
dedicated firewall appliances. The company has been growing very fast lately and wants to make
sure it is up to date on security measures. .co
Which two areas of security would you advise the company to strengthen? (Choose two.)
sts
A. secure connectivity
B. security management
lTe
C. identity
D. intrusion protection
tua
Answer: B,C
Ac
Answer: C
____ dBm is the recommended radius of a cell for a voice-ready wireless network.
Answer: B
m
Answer: A,C,D
.co
QUESTION NO: 105
sts
A virtual storage area network (VSAN) is a collection of ports from a set of connected Fibre
Channel switches, that form a virtual fabric. Which technology allows centralized storage services
lTe
A. FSPF
tua
B. FICON
C. SANTap
D. IVR
Ac
Answer: D
For acceptable voice calls, the packet error rate should be less than___%
A. 2.5
B. 0.01
C. 1
D. 0.1
Answer: C
Users of a site-to-site VPN are reporting performance problems. The VPN connection employs
IPSec and GRE and traverses several Ethernet segments. The VPN packets are being
fragmented as they traverse the links. What would be two methods to overcome this problem?
(Choose two.)
Answer: B,D
m
QUESTION NO: 108 .co
Which three are used in configuring Call Manager dial plans? (Choose three.)
sts
A. route pattern
B. route list
C. route group
lTe
D. gateway list
Answer: A,B,C
tua
A. bandwidth efficiency
B. congestion notification
C. heterogeneous network
D. cell-switching
Answer: A,B
Which two statements are true about MLP interleaving? (Choose two.)
Answer: C,D
What are two design guidelines for VoIP networks? (Choose two.)
m
B. Delay should be no more than 10 ms.
.co
C. Managed bandwidth is strongly recommended for voice control traffic.
D. Loss should be no more than 1 percent.
Answer: C,D
sts
lTe
Which enterprise caching mode eliminates the need for Layer 4 switches or WCCP enabled
routers to intercept user requests?
tua
A. transparent
B. reverse proxy
Ac
C. proxy
D. direct
Answer: C
What is the device weight limit per CallManager in a Cisco IP phone configuration?
A. 3000
B. 5000
C. 2500
D. 6500
Which protocol would provide block access to remote storage over WAN links?
A. SCSI-FP
B. FCIP
C. iSCSI
D. eSCSI
Answer: C
m
QUESTION NO: 115
Which three objectives would be met by designing Layer 3 switching in the Campus Backbone of a
medium size installation? (Choose three.)
.co
A. provide a flexible topology with no spanning tree loops
sts
B. increase router peering
C. scale to a large size
D. control broadcasts in the backbone
lTe
Answer: A,C,D
tua
What are three primary activities in the cycle of building an enterprise security strategy? (Choose
three.)
A. administration
B. activity audit
C. policy establishment
D. technology implementation
Answer: B,C,D
Captain Marion's Videography delivers Internet digital video using 9 MPEG video encoders and a
statistical multiplexer. Channels are packed into a 6-MHz channel bandwidth.The MPEG
These bandwidth and traffic requirements work best with which mode of video delivery?
A. quality equalization
B. fixed broadcast
C. open looped
D. VoD delivery
Answer: B
m
QUESTION NO: 118
.co
A company is using a multi-site centralized call processing model. Which feature ensures that the
remote site IP phones will still have limited functionality given a WAN outage?
A. TAPI
sts
D. MGCP
Answer: C
tua
Which three LAN routing protocols would be appropriate for a small retail organization with a multi-
vendor LAN infrastructure? (Choose three.)
A. IGRP
B. RIPv2
C. RIP
D. OSPF
Answer: B,C,D
What is one of the reasons that custom QoS ACLs are recommended over automatic QoS when
configuring ports on a Catalyst 6500 for use with IP phones?
"Pass Any Exam. Any Time." - www.actualtests.com 43
Cisco 642-873: Practice Exam
A. 79xx IP phones use a custom protocol to communicate CDP information to the switch.
B. 79xx IP phones do not mark voice packets with optimal DSCP values.
C. 79xx IP phones do not automatically mark voice packets with non-zero DSCP values.
D. 79xx IP phones do not mark protocol packets such as DHCP, DNS, or TFTP with non-zero
DSCP values.
Answer: D
What type of Call Admission control in CallManager allows for limits to the bandwidth consumed
by active calls?
A. locations
B. regions
m
C. partitions
D. device Pools .co
Answer: A
sts
Which three components are part of the Intelligent Network Services provided by the Cisco AVVID
framework? (Choose three.)
tua
A. security
B. IP multicasting
C. QoS
Ac
D. IP telephony
Answer: A,B,C
A network vulnerability scanner is part of which critical element of network and system security?
A. perimeter security
B. security monitoring
C. host security
D. policy management
Which IP telephony deployment model uses an H.225 Gatekeeper-Controlled trunk for call
admission control within existing H.323 environments?
Answer: C
m
QUESTION NO: 125
.co
Which two of the following Cisco router platforms support Multicast Distributed Fast Switching?
(Choose two.)
sts
A. 7500 series
B. 12000 series
C. 7200 series with NSE-1
lTe
D. 3600 series
Answer: A,B
tua
You are the Cisco Network Designer. Which of these is a Layer 2 transport architecture that
provides packet-based transmission optimized for data based on a dual ring topology?
Answer: A
A. classification
B. traffic shaping
C. prioritization
D. fragmentation
Answer: B
Which three best practices should be implemented at the campus backbone submodule to support
the server farm module? (Choose three.)
m
A. Implement server load balancing.
B. Implement intrusion detection with automatic notification of intrusion attempts in place.
.co
C. Implement highly redundant switching and links with no single points or paths of failure.
D. Implement the Hot Standby Router Protocol (HSRP) for failover protection.
sts
Answer: B,C,D
lTe
A. (I)-(2);(II)-(3);(III)-(4);(IV)-(1)
B. (I)-(2);(II)-(4);(III)-(3);(IV)-(1)
C. (I)-(3);(II)-(2);(III)-(4);(IV)-(1)
D. (I)-(2);(II)-(3);(III)-(1);(IV)-(4)
Answer: A
Acme Costume Company is connecting its manufacturing facilties to its stores with a small point-
to-multipoint Frame Relay IP WAN. Little growth is expected in the network infrastructure.Up to
this point the company has been using a dial-on-demand network. Dropping WAN costs, however,
have led them to consider using a high-speed WAN solution to improve access.
Which two routing protocols could you deploy to support the new larger network while keeping
costs down? (Choose two.)
A. RIP
B. EIGRP
C. RIPv2
m
D. OSPF
Answer: C
Ac
Answer: A,B