Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "GB0-280" Exam

Constructing Enterprise-level Routing Networks

 Question 1.
Which of the following are the right description to the backbone area?

A. The backbone area ID is 0.0.0.0.
B. All other areas must connect to the backbone area.
C. Between the backbone areas it can be disconnected.
D. Each ABR (Area Border Router) should be connected to at least one backbone area.

Answer: ABD

Question 2.
Which of the following are the right description to the adjacency between routers in the OSPF protocol?

A. Two routers, if they are in bidirectional adjacency, that is, they receive the Hello message from 
    each other, they automatically become adjacent.
B. If two routers are adjacent, the underlying network between them is probably Point-to-Point.
C. If two routers are adjacent, the underlying network between them is probably Point-to-
    MultiPoint.
D. If two routers are adjacent, the underlying network between them is probably Broadcast. One 
    of them must be a DR or BDR.
E. Only when the two routers are adjacent will they exchange the LSA message.

Answer: BCDE

Question 3.
Two routers running the OSPF protocol are synchronizing the Link State Database. When you check the peer state machine on one of them, it indicates it has reached the FULL state. 

Therefore, such a conclusion can be drawn that if you check the peer state machine from the other router, it should also indicate that it has reached the FULL state.

A. True
B. False

Answer: B

Question 4.
To view the information of the DR and BDR in the OSPF area, you can use

A. Display ospf
B. Display ospf error
C. Display ospf interface
D. Display ospf peer

Answer: A

Question 5.
Which is wrong about the BGP protocol?

A. BGP is a robust routing protocol.
B. BGP is to check the route loop.
C. BGP can not summary routes of the same type.
D. BGP inherits from EGP

Answer: C

Question 6.
Which of the following is the way to avoid loop in the BGP protocol?

A. Record the source of the route in the attribute: origin
B. Record the AS route in the attribute: AS-Path
C. Record the next hop in the Next-Hop attribute
D. Affect the choice of egress for another AS in the MED attribute

Answer: B

Question 7.
In the BGP protocol, the function of the community attribute NO-EXPORT is to

A. Indicate that the route with this attribute should not be notified to any peer out of the alliance
B. Indicate that the route with this attribute, once received, should not be notified to any BGP 
    peer.
C. Indicate that the route with this attribute, once received, should not be notified to any EBGP 
    peer.
D. None of the above

Answer: A

Question 8.
BGP community is a group of destinations with public attributes. For a network or an AS there can be only one community.

A. True
B. False

Answer: B

Question 9.
RTA notifies RTB about a learned route 1.1.1.0/24 from the EBGP peer. RTA and
RTB are in the same AS.
 
The attributes of the route are listed as the following:
local preference:100
MED: 100
AS_PATH: 200
Origine: EGP
Next_hop: 88.8.8.1/16

The attributes of the received route by RTB will be

A. Local preference: null, MED: 100, 
     AS_PATH: 200 100 ,Origine :EGP, next_hop: 10.110.20.1/16
B. Local preference:100, MED: 100,
    AS_PATH: 200 ,Origine: EGP, next_hop: 88.8.8.1/16
C. Local preference:100, MED: null,
    AS_PATH: EGP, Origine :EGP, next_hop: 10.110.10.1/16
D. Local preference: null, MED: 0,
     AS_PATH: 100 200, Origine: EGP, next_hop: 88.8.8.1/16

Answer: B

Question 10.
Bi-directional Import refers to that routes are imported mutually between routing protocols. To prevent route loop, you can

A. prohibit route redistributing from 2 different routing processes which runs over the same router 
    into each other.
B. Use filter-policy import
C. Use filter-policy export
D. Use fire-wall

Answer: ABC



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for HP0-752 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "HP0-752" Exam

ProCurve Mobility

 Question 1.
Which authentication method can be combined with any other supplemental authentication method?

A. preshared keys
B. MAC authentication
C. 802.1X authentication
D. Extensible Authentication Protocol (EAP)

Answer: B

Question 2.
Your network features a full public key infrastructure (PKI) with digital certificates for users and workstations, as well as for servers. You are now adding a wireless LAN (WLAN) that implements 802.1X authentication with Extensible Authentication Protocol (EAP). 

Which EAP method should you select for the highest security?

A. Protected EAP (PEAP)
B. EAP-Tunneled TLS (TTLS)
C. EAP-Message Digest 5 (MD5)
D. EAP-Transport Layer Security (TLS)

Answer: D

Question 3.
Your company uses Wi-Fi Protected Access (WPA) encryption. 

Where is traffic encrypted?

A. over wireless bridges only
B. over the wired network only
C. over the wireless network only
D. over the wireless and wired network

Answer: C

Question 4.
Match the encryption method to the security standard.
Drag and drop the boxes on the right to the left and match the description to the security option.
 
Answer:

Question 5.
Your company wants to implement the highest security authentication possible without installing certificates on each user's station. 

Which Extensible Authentication Protocol (EAP) method should you choose?

A. EAP-Message Digest 5 (MD5)
B. EAP-Transport Layer Security (TLS)
C. Protected EAP (PEAP) MS-CHAPv2
D. EAP-Subscriber Identity Module (SIM)

Answer: C

Question 6.
You are providing consulting services to a bookstore that wants to set up a wireless network to provide complimentary Internet access. 

Which security option should you choose to provide the widest support for customers who bring their own equipment?

A. Web authentication (Web-Auth)
B. MAC authentication (MAC-Auth)
C. dynamic Wired Equivalent Privacy (WEP)
D. Wi-Fi Protected Access (WPA) with preshared keys (PSK)

Answer: A

Question 7.
Which action does an 802.1X authenticator take if its Extensible Authentication Protocol (EAP) messages to the supplicant time out?

A. keeps the port closed
B. opens the port, by default
C. contacts the authentication server
D. sends a wake-up message to the supplicant

Answer: A

Question 8.
Which mechanisms are part of the 802.11h standard? (Select two.)

A. fast roaming for 802.1X
B. Transmit Power Control (TPC)
C. Inter-Access Point Protocol (IAPP)
D. fast roaming for Voice over IP (VoIP)
E. Dynamic Frequency Selection (DFS)
F. Quality of Service (QoS) for wireless stations

Answer: B, E

Question 9.
A station is configured for passive scanning. 

Which statement describes its behavior?

A. The station sends probe requests on only one channel.
B. The station sends probe requests on all supported channels.
C. The station listens for beacon frames from any access point (AP) within range.
D. The station listens only for beacon frames for previously-accessed wireless LANs (WLANs).

Answer: C

Question 10.
Which mode allows you to connect two wired networks through a wireless connection?

A. in-cell relay mode
B. internetwork mode
C. peer-to-peer mode
D. infrastructure mode

Answer: A


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.