|
Question 1. Which of the following configurations on Quidway S3026 is true?( ) A. The user privilege level command is used to set the command level that can be accessed after the user log in from a certain interface and to execute the command within this level. B. In default, the command level that can be accessed after AUX login is level 0. C. In default, the command level that can be accessed after VTY login is level 3. Answer: A Question 2. Which command is used to set the maximum learned addresses by the port? A. mac-address max_mac_count B. mac-address max-mac-count max_mac_count C. max-mac-count max_mac_count Answer: A Question 3. Which command is used to set the login password in the user interface on the Quidway S3026 switch? A. password { simple | cipher } password B. set authentication password { simple | cipher } password C. enable password { simple | cipher } password D. password enable password Answer: B Question 4. On Quidway S3026 switch, the address learning function of the port is enabled by defaultA. A. True B. False Answer: A Question 5. If executing the [Quidway-ui-vty0]user privilege level 3 command to configure the user priority, which of the following descriptions is true? A. The user is not affected and can see all the commands B. The user is affected and can only see the commands of level 3. C. The user is affected and can only see the commands below level 3. Answer: C Question 6. If executing the display users all command on the console terminal, the result is as. [Quidway]display users all UI Delay IPaddress Username I 0 AUX 0 00.00.00 * 1 VTY 0 00.00.23 10.110.34.125 2 VTY 1 3 VTY 2 4 VTY 3 5 VTY 4 Which of the following descriptions is true? A. *. Terminal that are being used B. I. Terminal that are being used works in the asynchronous interaction status C. Username. This stands for the user names of the users using this user-interface, also the login username. D. Delay. The time interval from the login till now with minute as the unit Answer: C Question 7. For the resource exhaustion of the switch address table caused by the attack by the frames with different source addresses, which of the following security measures can be adopted? A. Configure the user priority B. Set the maximum learned address by the port C. Set whether the port continues to learn addresses D. Set the timeout disconnection function of EXEC users. Answer: B, C Question 8. As shown in the following figure, the corresponding links of Port 1 ~ Port 4 are the trunk links allowing all the VLANs to pass and the GVRP protocol is activated. The GVRP registration mode of Port 4-switch 3 is set to be Forbidden and the GVRP registration modes of the ports on other switches are set to be Normal. VLAN5 and VLAN6 are configured on the switch 1 and VLAN 6 and VLAN 7 are configured on the switch 3. The following are the VLAN configuration situations of the ports of the switch except the default VLAN. Which of the items are true? A. VLAN 5 and VLAN 6 are configured over port 1. B. VLAN 5~VLAN 6 are configured over port 2. C. VLAN 6 and VLAN 7 are configured over port 3. D. VLAN 6 and VLAN 7 are configured over port 4. Answer: A, B Question 9. The layer 2 switch supporting VLAN has solved the following problem. A. Security B. High efficiency C. Flexible management D. All the above items are false. Answer: A, B, C Question 10. Which of the following descriptions of the transparent bridge is false?( ) A. The transparent bridge can learn the MAC address by itselB. B. The transparent bridge can expand LAN. C. The transparent bridge needs to modify the IP packet first, and then forward iA. D. The transparent bridge is the equipment working on the layer 2. Answer: C
|
Question 1. Which two characteristics of optical networks data to be transmitted over extremely long distances? (Choose two.) A. No electromagnetic interference (EMI) B. Minimal signal loss C. No bandwidth limits D. No encryption Answer: A, B Question 2. What is a wide-area network (WAN)? A. A network that is restricted to a single building, a group of buildings, or even a single room B. A network that connects client devices wirelessly using radio waves C. A network that crosses metropolitan, regional or national boundaries D. A network that encompasses an entire city or metropolitan area and connects multiple local- area networks (LANs) Answer: C Question 3. Which IP telephony component provides call processing, such as signaling that in a traditional voice network is provided by switching equipment, such as a PBX? A. Voice gateways, such as the Cisco VG248 analog phone gateway B. Call-management hardware and software, such as Cisco Call Manager C. Client-based software, such as Cisco SoftPhone D. Advanced call-handling software, such as Cisco Unity Answer: B Question 4. A software engineering firm wants to streamline call center operations to reduce customer wait times and improve employee productivity. Which Cisco solution best matches this business need? A. IP Telephony B. DSL C. WLAN D. Optical Network Answer: A Question 5. A growing publishing firm needs a secure way for remote content editors to connect through the Internet to the company extranet. Which Cisco solution best matches this business need? A. IP telephony B. Virtual Private Network (VPN) C. Content Networking D. Wireless network Answer: B Question 6. What creates an encrypted tunnel through a shared public network infrastructure, such as the Internet to provide a secure connection between remote users and a private network? A. VPN B. HTTP C. DSL D. Optical Networking Answer: A Question 7. What does a router do? A. Reads Media Access Control (MAC) addresses to forward messages to the correct location and connects the local-area network (LAN) to the wide-area network (WAN) B. Stores data on network and connects the local-area network (LAN) to the wide-area network (WAN) C. Routes traffic down alternative paths and connects the local-area network (LAN) to the wide- area network (WAN) D. Broadcasts data to all devices that are connected to it across the local-area network (LAN) and wide-area network (WAN) Answer: C Question 8. Which device is used in wireless networks to send transmission to a target area? A. Directional Antenna B. Optical fiber C. Omni-directional antenna D. Access point Answer: A Question 9. Which wireless local-area network (WLAN) device is often used to make wireless connections between buildings or campuses? A. Access Point B. Bridge C. Router D. Client Adapter Answer: B Question 10. On what type of network does the Cisco Unified Communications system reside? A. A single, joined voice, video and data network B. Voice networks only C. Wireless networks only D. Data networks only E. Independent voice, video and data networks Answer: A
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.