Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "GB0-320" Exam

Constructing Enterprise-level Switching Networks

 Question 1.
Which of the following configurations on Quidway S3026 is true?( )

A. The user privilege level command is used to set the command level that can be accessed after 
     the user log in from a certain interface and to execute the command within this level.
B. In default, the command level that can be accessed after AUX login is level 0.
C. In default, the command level that can be accessed after VTY login is level 3.

Answer: A

Question 2.
Which command is used to set the maximum learned addresses by the port?

A. mac-address max_mac_count
B. mac-address max-mac-count max_mac_count
C. max-mac-count max_mac_count

Answer: A

Question 3.
Which command is used to set the login password in the user interface on the Quidway S3026 switch?

A. password { simple | cipher } password
B. set authentication password { simple | cipher } password
C. enable password { simple | cipher } password
D. password enable password

Answer: B

Question 4.
On Quidway S3026 switch, the address learning function of the port is enabled by defaultA.

A. True
B. False

Answer: A

Question 5.
If executing the [Quidway-ui-vty0]user privilege level 3 command to configure the user priority, which of the following descriptions is true?

A. The user is not affected and can see all the commands
B. The user is affected and can only see the commands of level 3.
C. The user is affected and can only see the commands below level 3.

Answer: C

Question 6.
If executing the display users all command on the console terminal, the result is as. 
[Quidway]display users all
UI Delay IPaddress Username
I 0 AUX 0 00.00.00
* 1 VTY 0 00.00.23 10.110.34.125
2 VTY 1
3 VTY 2
4 VTY 3
5 VTY 4

Which of the following descriptions is true?

A. *. Terminal that are being used
B. I. Terminal that are being used works in the asynchronous interaction status
C. Username. This stands for the user names of the users using this user-interface, also the login 
    username.
D. Delay. The time interval from the login till now with minute as the unit

Answer: C

Question 7.
For the resource exhaustion of the switch address table caused by the attack by the frames with different source addresses, which of the following security measures can be adopted?

A. Configure the user priority
B. Set the maximum learned address by the port
C. Set whether the port continues to learn addresses
D. Set the timeout disconnection function of EXEC users.

Answer: B, C

Question 8.
As shown in the following figure, the corresponding links of Port 1 ~ Port 4 are the trunk links allowing all the VLANs to pass and the GVRP protocol is activated. The GVRP registration mode of Port 4-switch 3 is set to be Forbidden and the GVRP registration modes of the ports on other switches are set to be Normal. VLAN5 and VLAN6 are configured on the switch 1 and VLAN 6 and VLAN 7 are configured on the switch 3. The following are the VLAN configuration situations of the ports of the switch except the default VLAN. 

Which of the items are true?

 

A. VLAN 5 and VLAN 6 are configured over port 1.
B. VLAN 5~VLAN 6 are configured over port 2.
C. VLAN 6 and VLAN 7 are configured over port 3.
D. VLAN 6 and VLAN 7 are configured over port 4.

Answer: A, B

Question 9.
The layer 2 switch supporting VLAN has solved the following problem.

A. Security
B. High efficiency
C. Flexible management
D. All the above items are false.

Answer: A, B, C

Question 10.
Which of the following descriptions of the transparent bridge is false?( )

A. The transparent bridge can learn the MAC address by itselB.
B. The transparent bridge can expand LAN.
C. The transparent bridge needs to modify the IP packet first, and then forward iA.
D. The transparent bridge is the equipment working on the layer 2.

Answer: C


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 646-204 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "646-204" Exam

Cisco Sales Expert

 Question 1.
Which two characteristics of optical networks data to be transmitted over extremely long distances? (Choose two.)

A. No electromagnetic interference (EMI)
B. Minimal signal loss
C. No bandwidth limits
D. No encryption

Answer: A, B

Question 2.
What is a wide-area network (WAN)?

A. A network that is restricted to a single building, a group of buildings, or even a single room
B. A network that connects client devices wirelessly using radio waves
C. A network that crosses metropolitan, regional or national boundaries
D. A network that encompasses an entire city or metropolitan area and connects multiple local-
    area networks (LANs)

Answer: C

Question 3.
Which IP telephony component provides call processing, such as signaling that in a traditional voice network is provided by switching equipment, such as a PBX?

A. Voice gateways, such as the Cisco VG248 analog phone gateway
B. Call-management hardware and software, such as Cisco Call Manager
C. Client-based software, such as Cisco SoftPhone
D. Advanced call-handling software, such as Cisco Unity

Answer: B

Question 4.
A software engineering firm wants to streamline call center operations to reduce customer wait times and improve employee productivity. 

Which Cisco solution best matches this business need?

A. IP Telephony
B. DSL
C. WLAN
D. Optical Network

Answer: A

Question 5.
A growing publishing firm needs a secure way for remote content editors to connect through the Internet to the company extranet.

Which Cisco solution best matches this business need?

A. IP telephony
B. Virtual Private Network (VPN)
C. Content Networking
D. Wireless network

Answer: B

Question 6.
What creates an encrypted tunnel through a shared public network infrastructure, such as the Internet to provide a secure connection between remote users and a private network?

A. VPN
B. HTTP
C. DSL
D. Optical Networking

Answer: A

Question 7.
What does a router do?

A. Reads Media Access Control (MAC) addresses to forward messages to the correct location 
    and connects the local-area network (LAN) to the wide-area network (WAN)
B. Stores data on network and connects the local-area network (LAN) to the wide-area network 
    (WAN)
C. Routes traffic down alternative paths and connects the local-area network (LAN) to the wide-
    area network (WAN)
D. Broadcasts data to all devices that are connected to it across the local-area network (LAN) and 
    wide-area network (WAN)

Answer: C

Question 8.
Which device is used in wireless networks to send transmission to a target area?

A. Directional Antenna
B. Optical fiber
C. Omni-directional antenna
D. Access point

Answer: A

Question 9.
Which wireless local-area network (WLAN) device is often used to make wireless connections between buildings or campuses?

A. Access Point
B. Bridge
C. Router
D. Client Adapter

Answer: B

Question 10.
On what type of network does the Cisco Unified Communications system reside?

A. A single, joined voice, video and data network
B. Voice networks only
C. Wireless networks only
D. Data networks only
E. Independent voice, video and data networks

Answer: A


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.