|
Passed Today. No new questions great collection in itcertkeys.com thanks buddy for help me
|
Question 1. Refer to the exhibit. Which Catalyst switch configuration would protect a customer network from possible disruption in the case in which an unauthorized switch is added to the network? A. Switch0#show running-configuration ! hostname Switch0 ! no spanning-tree optimize bpdu transmission spanning-tree extend system-id ! interface FastEthernet0/1 switchport protected ! B. Switch0#show running-configuration ! hostname Switch0 ! spanning-tree portfast bpduguard default no spanning-tree optimize bpdu transmission spanning-tree extend system-id ! interface FastEthernet0/1 spanning-tree guard root ! C. Switch0#show running-configuration ! hostname Switch0 ! no spanning-tree optimize bpdu transmission spanning-tree extend system-id ! interface FastEthernet0/1 switchport mode access ! D. Switch0#show running-configuration ! hostname Switch0 ! no spanning-tree optimize bpdu transmission spanning-tree extend system-id ! interface FastEthernet0/1 switchport port-security violation restrict i Answer: B Question 2. While troubleshooting a network outage, you discover that an employee brought a switch from home into the office to connect additional equipment to the network. In order to increase his speed, he connected this switch to both network ports in his office, resulting in a bridge loop. Which of these can you implement to prevent future occurrences of this issue? A. RSTP B. root guard C. BPDU guard D. GLBP Answer: C Question 3. Refer to the exhibit. For the given configuration, on packets leaving the router on interface FastEthernet0/0 that matches the high traffic class, what will the MPLS experimental bit be set to? A. 0 B. 1 C. 2 D. 3 E. 4 F- 5 Answer: D Question 4. Which tool allows a LAN client to determine which router should be the first hop to a particular remote destination, allowing simplified client configuration and processing without creating a single point of failure? A. ProxyARP B. Dynamic Routing Protocol C. IRDP D. VRRP Answer: D Question 5. When implementing MPLS VPNs between CE and PE routers, which of these statements is correct? A. If using IS-IS as the PE-CE routing protocol, no redistribution is required. B. If using static routes between the CE and PE routers, no redistribution of other VPN routes is required. C. If the PE-CE protocol is not BGP, redistribution of other VPN routes from MP-BGP is required D. If RIP is the routing protocol that is used between the PE-CE routers, no redistribution is required, but any other protocol will require redistribution. E. If using OSPF or EIGRP as the PE-CE routing protocol, redistribution is not required, but any other protocol or static route will require redistribution. Answer: C Question 6. You would like to log messages up to the severity level "Notification." Which three of these commands will you need to issue in order to enable syslog messages to be sent to the syslog server at the IP address 10.1.5.5? (Choose three.) A. logging on B. logging host 10.1.5.5 C. logging trap notifications D. loggingsyslog notifications E. logging monitor notifications F- logging console notifications Answer: A, B, C Question 7. Refer to the exhibit. What is the HSRP state and priority of this interface after HSRP reaches its steady state? A. Active, Priority 151 B. Active, Priority 201 C. Active, Priority 251 D. Standby, Priority 151 E. Standby, Priority 201 F- Standby, Priority 251 Answer: D Question 8. While your MPLS core is using Cisco routers, the core of a company you have acquired is not. After extending your MPLS VPN networks by integrating the cores, you discover that the end-to end LPS path between PE routers cannot be established. Which of the following may have caused this problem? A. the MTUs do not match B. the BGP protocol versions do not match C. MPLS is not supported between different vendors D. MP-BGP is not supported between different vendors E. you are using Cisco proprietary TDP in your existing core Answer: E Question 9. You are troubleshooting an issue, which is causing full-sized packets entering the MPLS cloud to be dropped. You have discovered that one of the switches in the MPLS core is not a Cisco switch, but otherwise the MPLS MTU size is set to 1508 bytes on the routers. Based on this information, which of these may be the reason the packets are being dropped? A. no switches support oversized packets B. by definition, the maximum MTU is 1500 bytes C. the switch on your MPLS core that was not produced by Cisco does not support oversized packets D. in this situation, the MTU setting is irrelevant; in MPLS the maximum acceptable IP packet size is 1492 bytes E. as MPLS VPN labeling increases the size of the packet by 8 bytes, the IP MTU should have been changed to 1508 Answer: C Question 10. Refer to the exhibit. Which two of these events will be the result of issuing the above command? (Choose two.) A. A 64-bit IPv4 prefix will be created. B. The route distinguisher will be used to indicate VPN membership. C. Extended BGP communities will be used to encode route distinguishers. D. A 96-bit VPNv4 prefix will be created and propagated across the IP network. E. The route distinguisher is 64 bits and will be prepended to an existing IPv4 route to make it globally unique. Answer: D, E
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.