|
Question 57. Which routing protocol is defined by the OSI protocol suite at the network layer? A. End System-to End System B. Routing Information Protocol C. Interior Gateway Routing Protocol D. Intermediate System-to-Intermediate System E. End system to intermediate system Answer: D Explanation: Intermediate System-to-Intermediate System (IS-IS) Protocol is an intradomain Open System Interconnection (OSI) dynamic routing protocol specified in International Organization for Standardization (ISO) 10589. The protocol is designed to operate in OSI Connectionless Network Service (CLNS). Data is carried using the protocol specified in ISO 8473. OSI CLNS is a network layer service similar to bare IP service. A CLNS entity communicates over Connectionless Network Protocol (CLNP) with its peer CLNS entity. Reference: http://www.cisco.com/en/US/tech/CK365/CK381/technologies_white_paper09186a00800a3e6f.shtml Question 58. Which two benefits are associated with classless routing protocols? (Choose two) A. Support for VLSM. B. Support for FLSM. C. Summarization of discontinuous subnets. D. Auto-summarization across network boundaries. E. The ip classless command improves convergence. Answer: A, C Explanation: A. Classless routing protocols support VLSM, and that, in turn, leads to more efficient allocation of subnet asks to meet different host requirements on different subnetworks, resulting in better utilization of host addresses. C. Because subnets routes are propagated throughout the routing domain, summarization is often required to keep the routing tables at a manageable size. Reference: Building Scalable Cisco Networks (Ciscopress) page 19 + 20 Question 59. Given the following partial configuration for Router A: interface serial0 ip address 10.1.1.1 255.255.255.0 encapsulation frame-relay ip ospf network point-to-multipoint router ospf7 network 10.1.1.0 0.0.0255 area 0 Which two statements are correct? (Choose two) A. DB/BDR elections do not take place. B. The router is restricted to a hub and spoke topology. C. The area 0 NBMA cloud is configured as more than one subnet. D. Neighbor statements are required. Answer: A, D Explanation: When configuring OSPF in a point-to-multipoint environment, DR/BDR elections do not take place. Neighbor statements must be statically defined due to the NBMA architecture. The point-to-multipoint environment removes the assumption that there is a full mesh and communication between neighbors is done via unicast. Chapter: 1 Question 60. What is the proper command to display the Level-2 routing table in Integrated IS-IS? A. show isis database B. show clns traffic C. show ip route D. show clns route E. traceroute Answer: D Explanation: On page 245 of the Cisco Press CCNP Flash Cards, the correct command to view the L2 routing table is SHOW CLNS ROUTE. Question 61. Why should subinterfaces be configured in an OSPF NBMA topology? A. To converse IP addressing space. B. To avoid split-horizon issues with the routing protocol. C. Because logical interfaces are more reliable than physical interfaces. D. Subinterfaces remain up when the physical interface changes to a down state. Answer: B Explanation: When configuring routers in a NBMA topology, subinterfaces are typically used. A physical interface can be split into multiple logical interfaces, called subinterfaces, with each subinterface being defined as point-to-multipoint interface. Subinterfaces originally were created to better handle issues caused by spilt horizon over NBMA and distance vector-based routing protocols. Reference: Building Scalable Cisco Networks (Ciscopress) page 120 Question 62 You are a technician at ITCertKeys. Your newly appointed ITCertKeys trainee wants to know why it is necessary to redistribute or advertise IGP routes into BGP. What would your reply be? A. so BGP can propagate this information to other IGP neighbors B. so BGP can propagate this information to other IBGP neighbors C. so BGP can propagate this information to other OSPF neighbors D. so BGP can propagate this information to other EBGP neighbors Answer: D Explanation: When BGP is used between autonomous systems (AS), the protocol is referred to as External BGP (EBGP). Note: Customer networks usually employ an Interior Gateway Protocol (IGP) such as RIP or OSPF for the exchange of routing information within their networks Reference: Border Gateway Protocol http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/bgp.htm Question 63. Exhibit: ip router isis Your trainee is configuring a router. He wants to configure Integrated IS-IS to route IP. He knows that he must use the command listed in the exhibit. In which mode should he use this command? A. Line configuration mode B. Router configuration mode C. Global configuration mode D. Interface configuration mode Answer: D Explanation: To configure an IS-IS routing process for IP on an interface, use the ip router isis interface configuration command. Note: To enable IS-IS, perform the following tasks starting in global configuration mode: Step 1: router isis Enable IS-IS routing and specify an IS-IS process for IP, which places you in router configuration mode. Step 2: net network-entity-title Configure NETs for the routing process; you can specify a name for a NET as well as an address. Step 3: interface type number Enter interface configuration mode. Step 4: ip router isis [tag] Specify the interfaces that should be actively routing IS-IS. Reference: Cisco, Configuring Integrated IS-IS Incorrect Answers A, B; C: The ip router isis cannot be used in either line, router or Global configuration mode. Question 64. You want to retrieve the Level-2 routing table in Integrated IS-IS. Which IOS command should you use? A. show isis route B. show clns route C. show isis database D. show clns neighbors Answer: B Explanation: The show clns route command is used to display all of the destinations to which this router knows how to route packets. The output includes the IS-IS Level 2 routing table as well as static and ISO-IGRP learned prefix routes. Reference: Cisco, ISO CLNS Commands Incorrect Answers A: The show isis routes command is used to display the IS-IS Level 1 forwarding table for IS-IS learned routes. C: The show isis database command is used to display the IS-IS link state database. D: The show clns neighbors command displays both CK and IS neighbors. Question 65. Your trainee is curious why Integrated IS-IS Level-3 area routing is not supported by Cisco routers. What should you tell her? A. The System ID on a Cisco router is limited to 6 bytes. B. The NET on a Cisco router is restricted to a maximum of 8 bytes. C. The lack of Domain portion of the NSAP only accommodates for 2 levels of routing hierarchy. D. Cisco routers cannot route CLNS data that use the ISO/IEC 10589 standard of NSAP addressing. E. Since the NSAP service identifier (N-SEL) must always be set to 00, no other service types are available. Answer: C Explanation: Integrated IS-IS is a version of the OSI IS-IS routing protocol that uses a single routing algorithm to support more network layer protocols than just CLNP. Integrated IS-IS sometimes is called Dual IS-IS, named after a version designed for IP and CLNP networks. Only one IS-IS process is allowed whether you run it in integrated mode, ISO CLNS only, or IP only. Question 66. What representation is used in IS-IS to identify LAN interfaces? A. broadcast B. point-to-point C. pseudo-node D. non-broadcast E. point-to-multipoint Answer: A Explanation: The types of networks that IS-IS defines include Point-to-point networks and Broadcast networks. Reference: Cisco, Introduction to Intermediate, System-to-Intermediate System Protocol http://www.cisco.com/warp/public/cc/pd/iosw/prodlit/insys_wp.htm Incorrect Answers B: Point-to-point networks, such as serial lines, connect a single pair of routers. C: A Designated Intermediate System (DIS) creates a pseudonode (a virtual node), and all the routers on a LAN, including the DIS, form an adjacency with the pseudonode instead of forming n*(n-1) order adjacencies with each other in a full mesh. DIS are not used by default however. D: Non-broadcast is not used by IS-IS. E: Point-to-multipoint is not used by IS-IS. Question 67. IS-IS routers can be classified into different types. Which two IS-IS router types provide intra-area routing services? (Choose two) A. L1 IS B. L1 CK C. L2 IS D. L2 CK E. L1/L2 IS F. None of the above Answer: A, E Explanation: L1 IS and L1/L2 IS routers provide intra-area routing services. Reference: RFC2966
|
Question 1. You want to configure Network Connect to allow users to connect through a tunnel, connect to hosts on the same subnet as their local adapter, and shut down any attempt to extend the network boundaries. How do you proceed? A. Enable split tunneling. B. Disable split tunneling. C. Enable split tunneling with route change monitor. D. Allow access to local subnet with route change monitor. Answer: D Question 2. Which three authentication servers are included with a baseline license? (Choose three.) A. NIS B. ACE C. SAML D. LDAP E. SiteMinder Answer: A, B, D Question 3. You create a set of role mapping rules. You select "Merge settings for all assigned roles." The second role mapping rule has the "Stop processing rules when this rule matches" option selected. A user logs in that matches the first three rules. What happens? A. This is not a valid combination. The system displays an error message and does not update The configuration. B. The merge settings override the stop processing option. The user matches all three roles and merging follows the standard merging criteria. C. The Stop rule prevents any more rule matching after checking the second rule. The merge option only merges the roles of the first two rules following the IVE's built-in permissive merging rules. D. The Stop rule prevents any more rule matching after checking the second rule. The user now just matches the second rule. The merge option is overridden and the user is given only the privileges defined by the second role. Answer: C Question 4. When using the J-SAM, where on a client machine would you look to verify that the loopback addresses are assigned correctly? A. HOSTS file B. ARP cache C. LMHOSTSfile D. local route table Answer: A Question 5. What is Cache Cleaner used for? A. to prevent users from signing in from insecure machines B. to remove content downloaded during the IVE session C. to remove Web content cached by the IVE on behalf of the user D. to determine which files should be cached between remote access sessions Answer: B Question 6. Which role-based session option would an administrator configure to allow a user to connect from different source IP addresses within the same user session? A. roaming session B. persistent session C. persistent password caching D. browser request follow-through Answer: A Question 7. Which two Web Resource Policy features provide you with the capability to configure the IVE to work with corporate Proxy Servers? (Choose two.) A. Web Proxy Policies B. Web Proxy Servers C. Web Cache Policies D. Web Passthrough Proxy Answer: A, B Question 8. Which two statements about SSL VPNs are true? (Choose two.) A. SSL VPNs provide better security than IPSEC. B. SSL VPNs provide a dedicated, point to point connection. C. SSL VPNs provide high performance for individual connections. D. SSL VPNs use well-known technologies for secure individual connections. Answer: C, D Question 9. You are using RADIUS as your authorization server. Other than username, which two attributes are available for creating role mapping rules? (Choose two.) A. Certificate B. User Attribute C. RSA Attributes D. Group Membership Answer: A, B Question 10. Where is the IVE typically deployed in the network? A. behind the Internet firewall B. internally with all clients directly cabled to the IVE C. both interfaces on the outside of the Internet firewall D. parallel to the Internet firewall with one interface on the outside and one on the inside Answer: A
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.