Будь умным!


У вас вопросы?
У нас ответы:) SamZan.net

Homed 5 Which circumstnce would result in n enterprise deciding to implement corporte WN when its employees become distributed cross mny brnch loctions 6 Wht is disdvntge of pcketswitche.html

Работа добавлена на сайт samzan.net: 2016-01-17

Поможем написать учебную работу

Если у вас возникли сложности с курсовой, контрольной, дипломной, рефератом, отчетом по практике, научно-исследовательской и любой другой работой - мы готовы помочь.

Предоплата всего

от 25%

Подписываем

договор

Выберите тип работы:

Скидка 25% при заказе до 18.5.2024

1 Why is it useful to categorize networks by size when discussing network design?

The complexity of networking infrastructure will vary according to the number of connected devices.

2 What is one advantage to designing networks in building block fashion for large companies?

ailure isolation

3 Which network module maintains the resources that employees, partners, and customers rely on to effectively create, collaborate, and interact with information?

data center

4 A company connects to one ISP via multiple connections. What is the name given to this type of connection?

dual-homed

5 Which circumstance would result in an enterprise deciding to implement a corporate WAN?

when its employees become distributed across many branch locations

6 What is a disadvantage of a packet-switched network compared to a circuit-switched network?

higher latency

7 Which statement describes a characteristic of dense wavelength division multiplexing (DWDM)?​

It can be used in long-range communications, like connections between ISPs.

8 Under which two categories of WAN connections does Frame Relay fit? (Choose two.)

private infrastructure

packet-switched

9 Which WAN technology can serve as the underlying network to carry multiple types of network traffic such as IP, ATM, Ethernet, and DSL?

MPLS

10 The security policy in a company specifies that the staff in the sales department must use a VPN to connect to the corporate network to access the sales data when they travel to meet customers. What component is needed by the sales staff to establish a remote VPN connection?

VPN client software

11 An intercity bus company wants to offer constant Internet connectivity to the users traveling on the buses. Which two types of WAN infrastructure would meet the requirements? (Choose two.)

public infrastructure

cellular

12 How many 64 kb/s voice channels are combined to produce a T1 line?

24

13 Which two characteristics describe time-division multiplexing? (Choose two.)

Traffic is allocated bandwidth across a single wire based on preassigned time slots.

Data capacity across a single link increases as bits from multiple sources are transmitted using interleaved slices of time.

14 A branch office uses a leased line to connect to the corporate network. The lead network engineer confirms connectivity between users in the branch office, but none of the users can access corporate headquarters. System logs indicate that nothing has changed in the branch office network. What should the engineer consider next to resolve this network outage?

The service provider for the branch office should troubleshoot the issue starting from the point of demarcation.

15 Which two statements are true regarding a PPP connection between two Cisco routers? (Choose two.)

LCP tests the quality of the link.

LCP manages compression on the link.

16

Refer to the exhibit. Which three steps are required to configure Multilink PPP on the HQ router? (Choose three.)

Assign the serial interfaces to the multilink bundle.

Enable PPP encapsulation on the serial interfaces.

Create and configure the multilink interface.

17 A network administrator is configuring a PPP link with the commands:

R1(config-if)# encapsulation ppp
R1(config-if)# ppp quality 70

What is the effect of these commands?

The PPP link will be closed down if the link quality drops below 70 percent.

18 What are three benefits of using Frame Relay for WAN connectivity? (Choose three.)

one physical interface that can be used for several circuits

mature technology

reasonable cost

19 Which three parts of a Frame Relay Layer 2 PDU are used for congestion control? (Choose three.)

the FECN bit

the BECN bit

the DE bit

20 What is a characteristic of Frame Relay that allows customer data transmissions to dynamically "burst" over their CIR for short periods of time?

The physical circuits of the Frame Relay network are shared between subscribers and there may be times when unused bandwidth is available.

21

Refer to the exhibit. A network administrator has implemented the configuration in the displayed output. What is missing from the configuration that would be preventing OSPF routing updates from passing to the Frame Relay service provider?

The broadcast keyword has not been issued.

22 The DLCI number assigned to a Frame Relay circuit is to be manually added on a point-to-point link. Which three subinterface commands could be used to complete the configuration? (Choose three.)

bandwidth kilobits

frame-relay interface-dlci dlci

ip address ip-address mask

23 Which command can be used to check the information about congestion on a Frame Relay link?

show frame-relay pvc

24 A network administrator is asked to design a system to allow simultaneous access to the Internet for 250 users. The ISP can only supply five public IP addresses for this network. What technology can the administrator use to accomplish this task?

port-based Network Address Translation

25 Which type of traffic would most likely have problems when passing through a NAT device?

IPsec

26

Refer to the exhibit. The inside local IP address of PC-A is 192.168.0.200. What will be the inside global address of packets from PC-A after they are translated by R1?

209.165.200.225

27

Refer to the exhibit. What kind of NAT is being configured on R1?

port forwarding

28 What benefit does NAT64 provide?

It allows sites to connect IPv6 hosts to an IPv4 network by translating the IPv6 addresses to IPv4 addresses.

29

Refer to the exhibit. An administrator is configuring NAT to provide Internet access to the inside network. After the configuration is completed, users are unable to access the Internet. What is the cause of the problem?

The NAT inside source command is referring to the wrong ACL.

30 Which two technologies are implemented by organizations to support teleworker remote connections? (Choose two.)

VPN

IPsec

31 Which two statements about DSL are true? (Choose two.)

local loop can be up to 3.5 miles (5.5km)

user connections are aggregated at a DSLAM located at the CO

32 Which IEEE standard defines the WiMax technology?

802.16

33 Which broadband technology would be best for a small office that requires fast upstream connections?

fiber-to-the-home

34 Which broadband solution is appropriate for a home user who needs a wired connection not limited by distance?

Cable

35 Which technology requires the use of PPPoE to provide PPP connections to customers?

DSL

36 What is the expected behavior of an ADSL service?

The download rate is faster than the upload rate.

37 What is a type of VPN that is generally transparent to the end user?

site-to-site

38 Which two statements describe remote access VPNs? (Choose two.)

Client software is usually required to be able to access the network.

Remote access VPNs support the needs of telecommuters and mobile users.

39 What are three characteristics of the generic routing encapsulation (GRE) protocol? (Choose three.)

GRE tunnels support multicast traffic.

By default, GRE does not include any flow control mechanisms.

GRE creates additional overhead for packets that are traveling through the VPN.

40

 

Refer to the exhibit. Which IP address is configured on the physical interface of the CORP router?

209.165.202.133

41 Which algorithm is considered insecure for use in IPsec encryption?

3DES

42 Which two statements correctly describe asymmetric encryption used with an IPsec VPN? (Choose two.)

Encryption and decryption use a different key.

Public key encryption is a type of asymmetric encryption.

43 What is the purpose of a message hash in a VPN connection?'

It ensures that the data has not changed while in transit.

44 What is required for a host to use an SSL VPN to connect to a remote network device?

A web browser must be installed on the host.

45 What is the default location for Cisco routers and switches to send critical logging events?

console port

46

Refer to the exhibit. Which three events will occur as a result of the configuration shown on R1? (Choose three.)

Messages that are sent to the syslog server will be limited to levels 3 or lower.

Messages that are sent to the syslog server will use 192.168.1.5 as the destination IP address.

The syslog messages will contain the IP address the GigabitEthernet 0/1 interface.

47 Which statement is a characteristic of SNMP MIBs?

The NMS must have access to the MIB in order for SNMP to operate properly.

48 Which SNMP message type informs the network management system (NMS) immediately of certain specified events?

Trap

49

Refer to the exhibit. Router R1 was configured by a network administrator to use SNMP version 2. The following commands were issued:

R1(config)# snmp-server community batonaug ro SNMP_ACL
R1(config)# snmp-server contact Wayne World
R1(config)# snmp-server host 192.168.1.3 version 2c batonaug
R1(config)# ip access-list standard SNMP_ACL
R1(config-std-nacl)# permit 192.168.10.3

Why is the administrator not able to get any information from R1?

There is a problem with the ACL configuration.

50 In the data gathering process, which type of device will listen for traffic, but only gather traffic statistics?

NetFlow collector

51 What type of information is collected by Cisco NetFlow?

traffic statistics

52 Which three flows associated with consumer applications are supported by NetFlow collectors? (Choose three.)

Accounting

Billing

network monitoring

53 Users are reporting longer delays in authentication and in accessing network resources during certain time periods of the week. What kind of information should network engineers check to find out if this situation is part of a normal network behavior?

the network performance baseline

54 Which two specialized troubleshooting tools can monitor the amount of traffic that passes through a switch? (Choose two.)

NAM

portable network analyzer

55 What are two examples of network problems that are found at the data link layer? (Choose two.)

encapsulation errors

framing errors

56

Refer to the exhibit. A network administrator is troubleshooting the OSPF network. The 10.10.0.0/16 network is not showing up in the routing table of Router1. What is the probable cause of this problem?

There is an incorrect wildcard mask statement for network 10.10.0.0/16 on Router2.

57 A group of Windows PCs in a new subnet has been added to an Ethernet network. When testing the connectivity, a technician finds that these PCs can access local network resources but not the Internet resources. To troubleshoot the problem, the technician wants to initially confirm the IP address and DNS configurations on the PCs, and also verify connectivity to the local router. Which three Windows CLI commands and utilities will provide the necessary information? (Choose three.)

Ipconfig

Nslookup

Ping

58

Refer to the exhibit. On the basis of the output, which two statements about network connectivity are correct? (Choose two.)

There is connectivity between this device and the device at 192.168.100.1.

There are 4 hops between this device and the device at 192.168.100.1.

59 PAP CHAP

Place the options in the following order:

[+] uses two-way handshake  

[+] single challenge  

[+] weak authentication  

[+] clear text passwords  

[#] uses three-way handshake  

[#] repeated challenges  

[#] strong authentication  

[#] encrypted passwords  

[+]  Order does not matter within this group.

[#]  Order does not matter within this group.

60

Place the options in the following order:

Outside global  

-  not scored -

Outside local  

Inside global  

-  not scored -

Inside local  




1. Тема Особенности перевода юридических текстов Курсовая работа Студентки 4 курса группы ldquo;Жrdquo; анг
2. на тему- Особенности предвыборной борьбы непарламентских партий.
3. 20 р. Голова- Пічугін А
4. Курсовая работа- Доказывание и доказательства в арбитражном процессе
5. Лабораторна робота ’7 Аналіз конкурентів та конкурентоспроможності фірми План Визначення рівня кон
6.  Молодые годы и становления Ибрая Алтынсарина как педагогического деятеля
7. Методология теория и методы психологических исследований Становление позитивистской методологии в
8. Психологическая теория права по Петражицкок
9. Лекция 1 ПР как коммуникационный менеджмент
10. Статья 1 Сфера действия настоящего Закона Настоящий Закон устанавливает правовые экономические и орга
11. Тема 23 Классификация и кодирование товаров Цель работы- Ознакомиться с Гармонизован
12. Анализ деятельности кредитных организаций
13. Электрический ток Источники электрического тока
14. Удосконалення механізму оподаткування юридичних осіб у сучасних умовах
15. користувач пк прізвище Створити таблицю результати ~ дані імпортувати з файлу конкурс.
16. Бюджетний процес України та етапи його реалізації
17. koobru Теренс Маккенна Пища Богов Copyright- Перевод с английского Р
18. Конституционные и уставные суды
19. Карри Блейк Урок 8 Слово Божьеэто надежный завет
20. Анализ рассказа Чехова Палата 6