该用户从未签到
|
5 H! n5 \, d, _4 n
( b$ ^7 L8 @# T* D# R
文章摘自 www.killtest.cn
q3 X+ @" T$ V* V5 z1.Which typical enterprise campus requirement ensures that the network supports the required applications and that data flows within the required time frames?
3 r" Y7 L' l0 m5 C# S" DA.availability
# m9 s- f6 g) l; `4 x4 VB.performance4 k% E* [: @7 x4 N& V
C.functionality
) l' u5 V3 Y5 A. w: R5 N/ F" {D.manageability- f* D7 T8 z; {
E.scalability" I9 J) q; W2 q7 _. W' f
Correct:C
" s" @" |/ ^" S. Z6 W! D3 T; I2.What two choices can you make when redundancy is required from a branch office to a regional office? (Choose two.)
! F( x9 J6 B: ^( OA.multiple Frame Relay PVCs8 O! J. W. U4 ], B+ x
B.dual Wan links to the regional office' K1 c% [* I6 I0 k8 Z
C.dual Wan links to another branch office
4 N6 @ t* F: F' i% ND.single links - one to the regional office and one to another branch office* Y2 d, b) _# J1 F- D! N
Correct:B D
' L. c$ b0 C' n* T; ^3.What type of Call Admission control in CallManager allows for limits to the bandwidth consumed by active calls?
! J4 n4 i0 u# W. gA.regions' U$ i' X0 m' e8 i2 y
B.partitions
! S" ^7 Q; Q' l! jC.locations
5 ]$ y, q+ s' r! _' `D.device Pools. P" v; P' H: ]
Correct:C 1 @) _7 o3 F6 v6 y3 |2 t3 ?, R
4.Which VPN management feature would be considered to ensure that the network had the least disruption of service when making topology changes?
- m2 R. [4 ~* n5 ]8 k6 r0 e! s% w/ l. w1 ?A.dynamic reconfiguration5 ?: ]$ D9 r8 X( j" q
B.path MTU discovery
' F+ O- U4 d# ^/ |, [ w( IC.auto setup& q0 R r; b/ {$ [- ?. a$ c/ ~( `
D.remote management
0 v1 }& \; D+ l5 I0 F4 ACorrect:A
2 @0 ]8 K7 J) z1 P8 W5.Refer to the exhibit. CCC Machine has decided to deploy a Voice over IP solution in its main campus headquarters. The design calls for the insertion of a Cisco CallManager, Cisco IP phones, and a voice gateway. Due to the new application requirements, what three changes should be made to the access layer of the CCC network design? (Choose three.)
( }+ _ P t# tA.The trust boundary should be extended from the 3524-PWR access switches to include the IP phones.
: |7 Z/ V- J/ D( ^/ \* A' O6 bB.Ingress rate-limiting should be configured on 3524-PWR access switches to ensure Voice over IP bandwidth guarantees." ^3 O/ r+ C+ H+ e5 Y9 R+ l) q
C.A new voice-only VLAN should be established and extended from the IP phones throughout the campus.
" ?7 U4 _ ~' H" l7 r& \5 [D.Configure the 3524-PWR access switches to ensure Voice over IP packets are given preferential treatment by enabling voice traffic to use separate queues.
& p B( r& p7 C' A6 BE.Since end-user workstations cannot run CDP, disable it on the IP phones to improve performance and increase security.1 w5 h4 P- w4 \1 w: Q+ a8 x2 {
Correct:A C D ! w/ [$ ~. _: r$ I+ J
6.Which three components are part of the Intelligent Network Services provided by the Cisco AVVID framework? (Choose three.) @; J% v; \' ~4 {( I. z$ S+ c
A.IP telephony
, B# T) O V% ^B.security0 B2 ?4 e Z% n4 U i Z
C.IP multicasting6 V5 n9 B; V( ~6 L& J
D.work force optimization4 @# o6 q- D ~6 P. L( m% c
E.e-business infrastructure* |; }! ^" S, }& P; K2 ]( s
F.QoS
- J$ S) i! r# P9 r% G: `Correct:B C F
' d0 @, X8 J, ~0 ^! h: s7.Which three best practices should be implemented at the campus backbone submodule to support the server farm module? (Choose three.)
$ q* r( y5 [6 X: dA.Implement highly redundant switching and links with no single points or paths of failure.
7 _8 z- I/ u6 l# \1 ^B.Implement server load balancing.; [8 b5 D! e4 b/ ~0 |0 j. W- A" W
C.Implement the Hot Standby Router Protocol (HSRP) for failover protection.
6 y; R, U% d# K0 A% O6 oD.Dual home all servers.
" \- {9 b H! E8 L, gE.Implement intrusion detection with automatic notification of intrusion attempts in place.
! y" Q6 o( {) V) M' v/ q& N% i% wF.Deploy caching systems.
% B) U+ H, C, Q" }' \- W; mCorrect:A C E {0 ^# `- z, {: ?. I. b7 d
8.The network administrator would like to generate synthetic traffic using the Service Assurance Agent contained in Cisco IOS. Which CiscoWorks network management application will be used to report the latency and availability for configured traffic operations on an end-to-end and hop-by-hop (router-to-router) basis?6 I1 u: U$ k/ _
A.nGenius Real-Time Monitor- U4 ?# }) _$ a
B.CiscoView
# i+ s; t0 H/ F# Z2 jC.Device Fault Manager
9 G4 }! ?& I! P. O, V8 Y+ F" yD.Internetwork Performance Monitor
8 }5 N- E. f& q! F' `' aCorrect
4 B. x3 s2 s* V5 }7 m* V9.Look at the picture.
. f, q6 [2 p) j5 y. W9 _Correct:
M% |* c* v0 O# a( M10.Which protocol would provide block access to remote storage over WAN links?' G6 k5 M3 I# P( G$ l8 R
A.iSCSI4 D/ `2 q$ C4 v, K- ~! b
B.FCIP
% H5 C0 ]; s' Z& |+ e& {# F# \( @C.SCSI-FP( V5 F, L" u% n8 S+ R+ V
D.eSCSI- N7 K3 a' q/ w* [& I
E.CIFS; l ?$ d, ^0 d* s& O; m
Correct:A
8 e- Z8 D8 z% N& w: t& p- q o# p11.What is the device weight limit per CallManager in a Cisco IP phone configuration?9 x4 F8 T. J- C; q: ?2 H
A.2500' {7 I; k3 d$ q2 N# v- h! b
B.3000& i7 m' e& q* p% q ^; X
C.5000" \8 S: F* M: c7 [3 Z' p) f
D.6500
8 j0 M! L$ E4 }' HCorrect:C
9 x; Y7 V% h9 [7 k; R1 g12.Acme Nutrition manufactures a wide variety of vitamin supplements. It has a single manufacturing facility with 3 regional warehouses and 16 district sales offices. Currently the manufacturing facility requires 210 IP addresses; each warehouse requires 51 IP addresses; each district sales office requires 11 IP addresses; and the IP WAN requires 38 IP addresses. If Acme Nutrition plans for 20 percent growth in facilities, how many Class C subnets will the district sales offices require?
9 V# g) N. Y/ o8 s. gA.19 (3 from the warehouse range and 16 from a separate Class C address)
$ a. t; w& j* c1 }4 m+ ]- m, gB.19 (3 from the warehouse block, 15 from a separate Class C block and 1 from the IP WAN block) ?7 Q$ Z& R$ D( o# M$ d& ~' C. D
C.20 (4 from the warehouse range,15 from a separate Class C block and 1 from the IP WAN block)
! {& _4 K7 Y! W& U9 QD.16 (3 from the warehouse range and 13 from a separate Class C address)& R; I; F5 `: {3 J- O4 F
E.18 (2 from the Warehouse range and 14 from a separate Class C address) h& |7 {7 D. q0 g& i/ |) Q; ]
F.16 (all from a separate Class C address)
9 d; e$ _7 h% S* I* t; s( t9 FCorrect:B
+ j, Y& m8 q2 \5 Y& n4 H4 q13.With Call Manager v3.1, what is the maximum number of servers in a Cluster?
' n8 A3 E8 ]' k& Y0 vA.3
' _& L% {6 \7 o. P3 r9 }1 bB.6, E) F) O' U3 K, O; ]5 j
C.78 {# ~/ z* k6 O7 c
D.8
5 a9 q% F2 U" y) C5 [: j; VCorrect / g- g. Y* J5 O3 a$ @
14.What are three features of the Cisco Product Advisor tool? (Choose three.)
0 a. F* Y B- [5 SA.It can be used in a novice, question-and-answer mode.
! S5 ~" K6 w! uB.You can begin searching categories that include routing, switching, and IP telephony./ B/ J( W( A& p l& c* V; P
C.It covers only select routers from the 800 Series through the 7400 Series.+ ^) C, z6 w6 I4 o1 C: h
D.It includes a wireless product search category.
0 b3 e' r4 [+ Q* j8 NE.It covers select switches from the Catalyst 2800 Series through the Catalyst 8500 Series.
3 J( ^6 H, c/ O( J: L/ f6 `F.It narrows down Cisco networking products based on product cost and network requirements.
+ z% [ x( G0 N5 |" P: F& c, wCorrect:A C D 4 B7 R9 a; ?8 _. {+ H9 g( N5 r
15.Morris Prosthetics is having problems with serialization delay on its WAN links. The links currently carry less than 768 Kbps. Which Layer 2 mechanism can help solve the problem?
% z- n6 W: i/ e7 R5 k5 F0 U3 a( g4 X3 n! uA.Compressed Real-Time Transfer Protocol3 L: ]& d- |- P4 H* x
B.link fragmentation and interleaving
6 N! q* D3 u" d; P( HC.differentiated service code points
6 y! c( {0 D7 s7 Z. h/ yD.Integrated Services module
8 c- M) I- x, ^, `3 V$ yCorrect:B
% W6 @$ c, K e* p) C$ d0 `16.Look at the picture.
% e9 T& e* H$ T8 dCorrect:
- v8 |$ I" o" z9 ^0 aGreen choice5---->Yellow Choice1+ X$ X/ H( }% M3 I. w1 `) }
Green choice6---->Yellow Choice2
+ W/ Z; Y3 \# M4 N2 S% g+ J# ?Green choice4---->Yellow Choice33 o3 o {& a$ i( [2 \8 ^$ o
Green choice1---->Yellow Choice4
O4 K% B0 F; H4 F8 nGreen choice2---->Yellow Choice5
4 h! B" x& h' P% v/ u( YGreen choice3---->Yellow Choice6
; i, r; P, E' Y6 I( r% b" i* }5 {) P17.In an Internet e-commerce, browser-based application, which method can have the greatest impact on optimizing WAN bandwidth usage?
/ u |( A# a( ^! rA.multiplexing
2 h( \5 I& g$ q( `B.compression
3 m/ |' l& [1 l7 {4 c$ |C.content networking
9 A6 @" W6 E! k* R, Z8 x, y6 `# cD.secure sockets layer (SSL)
: x! \+ E6 M) c; J3 s0 VCorrect:C " @9 o0 ], t5 [' }) D* |2 k; F
18.When designing the WAN module within the enterprise edge, which document is used to specify the connectivity and performance agreements with the service provider?
) f) f) ~7 D) q) o! CA.RFP8 o1 M- N5 c8 N6 X- p o
B.RFC
9 \( J+ P& b i$ y: m0 `4 D# xC.SLC/SLA
% N" Z. i( n- V9 t5 UD.SOW
% O4 f* _ O/ e# N4 `& Y& w4 vCorrect:C
2 I/ u m6 S( q! U' P8 ?19.Which four QoS design requirements are the closest to Cisco recommendations for VoIP traffic? (Choose four).0 }4 ?9 b. k7 P9 i0 y
A.one-way latency of 150 ms to 200 ms1 _6 X* f3 ~5 M8 i- Z/ ?
B.serialization delay of 100 ms to 150 ms2 ^* m9 H' u' @5 o, n/ d5 h$ K% Y* l4 |3 g
C.less than 30 ms of jitter" Y8 O" V$ Q; L# o# e
D.less than 1 percent of packet loss( j+ Q# j/ g6 a, k& \
E.fixed 64 kbps of guaranteed priority bandwidth per call
) U& A3 ?, w% o1 {- Q+ uF.150 bps (+ Layer 2 overhead) of guaranteed bandwidth for voice control traffic per call
, s) m6 y, d+ RCorrect:A C D F
/ u4 q$ y3 w6 F, |/ u20.Which routing protocol supports a flexible area structure using routing levels one and two? l# ~ @8 Y+ E' M, N# i
A.OSPF5 N8 g T5 [% D k
B.EIGRP, n/ w: g& A5 Q- s) a' k
C.IS-IS/ o7 {$ a1 J- O. Q& C
D.BGP
8 X _* {1 m5 I8 R" G5 NE.RIPv2
: Q8 S8 T, F* D+ r& R/ F$ PF.IGRP' `3 c8 r F$ T: Q
Correct:C 2 Z; p! n8 g& x
21.The Acme Anvil Corporation has two manufacturing sites and six sales offices. Each sales office requires 25 public IP addresses, and each manufacturing facility requires 210 public IP addresses. If the company plans for 20 percent growth for each facility, how many Class C addresses will it require?- M6 e' N% l, @; p& o7 b; A% y7 u
A.three
5 E% e5 l& t% \B.four2 B3 H5 I: q9 a6 w& D; E
C.five
) N! H/ P4 k( @5 u, JD.six9 o8 q: p$ i& ]4 ]3 ~' ^
E.seven
; q, X4 E4 M7 s/ d$ d9 h# [F.eight5 n1 q+ T3 o" Q; A4 Y3 `0 b$ h/ j. T. B
Correct:A
) j; T' H# y3 y0 l% L( T( [! I. h* G22.When is the site-to-site remote access model appropriate? (Choose one.)
4 _5 X( J* Q- \7 Z: HA.for multiple ISDN connections9 ]1 m+ c( Z5 A, P
B.for modem concentrated dial-up connections
( \4 _8 q; ]$ J5 m5 yC.for a group of users in the same vicinity sharing a connection x& o6 |* @9 s
D.for use by mobile users2 D; N8 |" S7 k1 l6 K1 X7 E+ ^
Correct:C
4 D8 y' F* |% e' o! W- ~1 L6 r/ F/ J23.Look at the picture.
/ b+ [. E% x5 x/ {: k* Z3 F& ]Correct:" a7 Y$ ]0 ^7 y
Green choice1---->Yellow Choice14 b! L% Z0 K" d- ]( i- A2 b1 p
Green choice4---->Yellow Choice2
2 z! Y( y/ q! WGreen choice2---->Yellow Choice3" u) H! Q+ t' R6 w1 K
Green choice3---->Yellow Choice4
$ X+ {! ?0 b/ d' b) W9 S0 e24.What are three primary activities in the cycle of building an enterprise security strategy? (Choose three.)
# i7 r# C( Y0 o4 N' x3 H6 nA.activity audit" E/ n# \, k# ]. ^9 D- [- i7 x! w
B.administration
2 c! Z( r/ g2 ^6 iC.feature evaluation
/ Z' L" b9 c4 c6 v8 @+ SD.ACL documentation1 T8 O% L$ ~4 A ]* j% }9 D
E.policy establishment9 s8 J9 |# T2 s- B+ o6 S5 {
F.technology implementation
- J1 L% Q' o* G! n# L1 h1 Z/ wCorrect:A E F 4 B! \- N9 M' @$ l* B
25.What are two design guidelines for VoIP networks? (Choose two.)
; L: s" Y* A5 d. L4 iA.Delay should be no more than 10 ms.% z% o/ ?! y4 Q; g3 k5 e
B.Loss should be no more than 1 percent., l( u. C0 G1 d/ p' V
C.Jitter should be less then 40 ms.: s t( F( _3 C
D.Managed bandwidth is strongly recommended for voice control traffic.4 x' y9 A1 H# N
E.One-way latency should be no more than 50 ms./ \6 O5 v; q) H! m3 t
Correct:B D
3 d% ]9 G/ a+ b$ @26.Users of a site-to-site VPN are reporting performance problems. The VPN connection employs IPSec and GRE and traverses several Ethernet segments. The VPN packets are being fragmented as they traverse the links. What would be two methods to overcome this problem? (Choose two.)0 @, k2 Q" l) N7 C4 y
A.Employ path MTU discovery.# c5 g. k1 v% N+ t
B.Set the MTU higher than 1500 bytes.: k" o( V" T6 j5 S/ p
C.Turn off pre-fragmentation for IPSec.
7 b Z4 L. U( ]8 Q a/ K! nD.Set the MTU value to 1400 bytes.3 ]8 r' t/ X. g) q
Correct:A D $ N. l" y' K' n
27.Look at the picture.$ N+ a" u; Z, {5 A9 U' ~
Correct:
/ c+ {- m" J* PGreen choice3---->Yellow Choice1# W1 h: D1 `: Q5 c" h y
Green choice4---->Yellow Choice2
. i. t1 A* c \" _Green choice1---->Yellow Choice31 t+ T; {% A9 @& I
Green choice2---->Yellow Choice4
; @# o' f, s/ F5 V( \/ s" A9 H' L28.Lafeyette Productions is looking for a new ISP that has improved availability, load balancing, and catastrophe protection. Which type of ISP connectivity solution would be best?: `7 w5 s2 N5 A: L" R& F7 C9 [
A.single run
- V2 |, o8 a& f4 q7 v% S/ xB.multi-homed' l. e# r: g8 _- u
C.stub domain EBGP
' T( j7 [8 P# x6 Q# yD.direct BGP peering
B+ R8 t* ~6 r" O8 NE.autonomous-route injection
. ^, @7 u9 G, Q" m! g: Q9 \1 W. lCorrect:B " i) f9 d$ _ Q2 o, ?" H; h' k
29.To securely transport EIGRP traffic, a network administrator will build VPNs between sites. What is the best method to accomplish the transport of EIGRP traffic?' h$ P5 D! Z8 f% x' A/ k* Y' a
A.IPSec in tunnel mode* s( t8 N1 l k! V: y) s
B.IPSec in transport mode
8 r f8 ]6 ]9 F. h+ zC.GRE with IPSec in transport mode
* r9 _2 |( `+ e) X7 P# ?$ w. {D.GRE with IPSec in tunnel mode
0 e T u* ~! i3 |Correct:C
& C+ d$ h+ n4 z# b' k; ?30.Which three objectives would be met by designing Layer 3 switching in the Campus Backbone of a medium size installation? (Choose three.)& _/ I/ ~* x5 u U- j6 P
A.scale to a large size& @2 O5 V& s$ T' u
B.increase router peering* C0 u- Y5 A: L& e2 m0 I+ J
C.provide a flexible topology with no spanning tree loops
' d9 O6 V) N) q* r JD.control broadcasts in the backbone3 K# t! h, D+ {
E.reduce complexity
1 G$ r" Y' D1 v6 A/ R+ vCorrect:A C D |
|