|
i got from ITCertkeys great site for me thanks
|
Question 1. Which statement accurately describes one difference between a small office and medium office topology? A. Small offices commonly use Rapid PVST+ for Layer 3 deployments. B. Medium offices use integrated 10/100/1000 interfaces as Layer 2 trunks. C. Medium offices use external access switches to support LAN connectivity. D. Medium offices commonly use integrated route and switching platforms. Answer: C Question 2. ITCertKeys.com is planning to upgrade its current network. The chief technology officer has supplied a topology diagram and an IP addressing scheme of the current network during an interview. ITCertKeys.com has been growing at about twenty percent per year. It has been difficult to maintain customer support at a satisfactory level. Therefore, the RST board has met with and directed the chief technology officer to look into network improvements. Which two items are most relevant in documenting ITCertKeys.com's business requirements? (Choose two.) A. network performance requirements B. existing network topologies C. the IP addresses assigned by the ISP D. improved customer support requirements E. projected growth estimates Answer: D, E Question 3. Which of these accurately describes dial backup routing? A. once the backup link is activated it will remain active even after the primary link is restored B. it always uses permanent static routes C. it is supplied by the service provider as a secondary PVC at no additional charge D. the router intiates the dial backup link when a failure is detected on the primary link E. it always uses distance vector routing protocols Answer: D Explanation: Dial backup routing is a way of using a dialup service for backup purposes. The switched circuit provides the backup service for another type of circuit, such as point-to-point or Frame Relay. The router initiates the dial backup line when it detects a failure on the primary circuit. The dial backup line provides WAN connectivity until the primary circuit is restored, at which time the dial backup connection terminates Question 4. DRAG DROP You work as a network technician at ITCertKeys.com. Your boss, miss ITCertKeys, is interested in QoS features. Match the proper features with appropriate mechanism. Answer: Explanation: 1. LLQ is a congestion management tool, which brings strict PQ (Priority Queuing) to CBWFQ (Class-Based Weighted Fair Queuing). It is a combination of PQ and CBWFQ. Strict PQ allows delay sensitive data such as voice to be dequeued and sent first (before packets in other queues are dequeued), giving delay-sensitive data preferential treatment over other traffic. 2. Congestion-avoidance techniques monitor network traffic loads so that congestion can be anticipated and avoided before it becomes problematic. WRED (Weighted random early detection) is the Cisco implementation of the random early detection (RED) mechanism. RED randomly drops packets when the queue gets to a specified level. 3. ACL (Access Control Lists) is used to control (Permit or Deny) the traffic moving through the network. In QoS implementation, ACL helps to classify the traffic. 4. Link Efficiency techniques like LFI and compression can be applied to WAN paths. The purpose of LFI is to prevents small voice packets from being queued behind large data packets, which could lead to unacceptable delays on low-sped links. 5. CAC (Call Admission Control) is a traffic conditioners mechanisms, which extend the QoS capabilities to protect voice traffic from being negatively affected by other voice traffic by keeping excess voice traffic off the network Question 5. Western Associated News Agency recently acquired a large news organization with several sites, which will allow it to expand to worldwide markets. The new acquisition includes these connectivity technologies: Frame Relay ATM SONET cable DSL wireless From a Layer 1 viewpoint, which Enterprise Edge module will be most affected? A. E-Commerce B. Edge Distribution C. PSTN D. WAN/MAN E. Internet Connectivity F. ISP Answer: D Explanation: Wide Area Network(WAN)/MAN(Metropolitan Area Network) technologies are used to connect the different branches located into different locations. Frame-Relay, ISDN, DSL, Cable, Wireless are the technologies use for WAN/MAN. Question 6. Which H.323 protocol controls call setup between endpoints? A. RAS B. RTCP C. H.245 D. H.225 Answer: D Explanation: The H.225 is called Q.931 standard protocol. It describes call signaling and the Registration, Admission, and Status (RAS) signaling used for H.323 session establishment and packetization between two H.323 devices. Question 7. DRAG DROP You work as a network technician at ITCertKeys.com. Your boss, miss ITCertKeys, is interested in bandwidth usage optimization techniques. Match the proper technique with appropriate defintion Answer: Explanation: Queuing: Queuing is called Congestion Management in Cisco documents and also occasionally called "scheduling" provides the ability to reorder packets when congestion occurs. Traffic Policing Policing can limit bandwidth by discarding traffic that exceeds a specified rate. Policing can discard the packets based on IP Precedence and DSCP value. Class-based traffic policing can be configured to mark packets at layer 2 or layer 3. Policing can apply to either inbound or outbound traffic. Compression reduces bandwidth utilization by making packets smaller before transmission. Two general types of compression tools exist in payload compression and header compression. Payload compression compresses the packet the portion of the data link frame between the frame header and trailer. Header compression compresses just particular headers Question 8. Which two routing protocols operate over NBMA point-to-multipoint networks without the use of point-to-point subinterfaces? (Choose two.) A. OSPF B. IS-IS C. RIPv1 D. EIGRP E. IGRP F. RIPv2 Answer: A, D Explanation: Non-broadcast Multi-access NBMA topologies are similar to broadcast multi-access topologies (multiple devices accessing a medium), except that devices cannot hear each other's broadcasts because the medium is separated by other routers, such as with Frame Relay, ATM. OSPF and EIGRP routing protocols operate over NBMA point-to-multipoint networks without the use of point-to-point subinterface. Question 9. Which two capabilities of NetFlow accounting assist designers with network planning? (Choose two.) A. the monitoring of processor time on network devices B. the calculation of packet and byte counts of network traffic C. the monitoring of user network utilization D. the decoding and analyzing of packets E. the presentation of a time-based view of application usage on the network Answer: B, C Explanation: NetFlow can provide assistance with traffic engineering, network planning, accounting and billing, security monitoring, and information regarding peering arrangements. Enterprises typically use NetFlow for user and Internet access monitoring, application monitoring, charge-back billing for departments, and security monitoring. Question 10. DRAG DROP You work as a network technician at ITCertKeys.com. Your boss, miss ITCertKeys, is interested in Cisco Security solutions. Match the proper solution with appropriate function. Answer: Explanation: IPS: Network-based IPS solutions protect the network by helping detect, classify, and stop threats, including worms, spyware or adware, network viruses, and application abuse on Network. ASA Cisco ASAs consolidate all the foundation security technologies (including high performance firewall, IPS, network antivirus, and IPsec and SSL VPNs) in a single easily managed unified platform. Device consolidation reduces the overall deploymenand operations costs and complexity. ASAs can also be NAC-enabled. The Cisco Security Agent software integrates endpoint server and desktop computers into the Cisco Self-Defending Network. The Cisco Security Agent provides different services like: Spyware and adware protection, Protection against buffer overflows, Distributed firewall capabilities, Malicious mobile code protection.
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.