|
) O6 w0 E3 ^$ p- g
3 }" T1 f# C# w# b- i& O* n
文章摘自 www.killtest.cn
2 F! b( E8 D7 V+ ~( T4 d1.Which typical enterprise campus requirement ensures that the network supports the required applications and that data flows within the required time frames?9 O6 M# w) P" m7 ^5 g7 n# [
A.availability
# F& ]8 L3 A5 B+ MB.performance4 \9 o+ l. U1 Z$ b
C.functionality
+ J0 G5 t; M/ w7 n, s6 [7 r; ]D.manageability
5 ]2 N( |0 g5 R4 _6 p: PE.scalability
6 j' a7 o& M1 j: G; DCorrect:C
. H4 b8 O7 |' V# n& d' N2.What two choices can you make when redundancy is required from a branch office to a regional office? (Choose two.)
. x: B/ {2 l- m8 |% j" r0 F dA.multiple Frame Relay PVCs/ |) v0 U& a: d2 T2 w& z
B.dual Wan links to the regional office% A8 O" w. ]/ {9 f0 }
C.dual Wan links to another branch office8 g2 L( G' r9 X3 z9 }6 f$ A: N
D.single links - one to the regional office and one to another branch office
! H5 H/ A% k9 T& FCorrect:B D 8 e; [0 d& z/ H' d8 F- c: o
3.What type of Call Admission control in CallManager allows for limits to the bandwidth consumed by active calls?/ y H; r4 G/ p4 H
A.regions
. q; u) r* }5 z* x1 W& {B.partitions: e- u7 H5 I& O# n
C.locations( Y' {: h! D- B( p8 L5 A$ E
D.device Pools. \/ i# m" W: M8 |
Correct:C
# ?# b( b$ {1 L1 C4.Which VPN management feature would be considered to ensure that the network had the least disruption of service when making topology changes?" N; [6 ~4 p1 y/ R
A.dynamic reconfiguration( {1 e1 N7 L/ s4 v0 n8 s
B.path MTU discovery8 v7 y% I, K1 @/ A7 b
C.auto setup0 c' {+ Y- E! \& ]
D.remote management( E" i/ C' w& i v6 L! P/ T
Correct:A
3 g% p/ L! K! J: v1 y. C/ u! s5.Refer to the exhibit. CCC Machine has decided to deploy a Voice over IP solution in its main campus headquarters. The design calls for the insertion of a Cisco CallManager, Cisco IP phones, and a voice gateway. Due to the new application requirements, what three changes should be made to the access layer of the CCC network design? (Choose three.)
5 A$ R0 x8 s) |4 u+ [1 p1 N* TA.The trust boundary should be extended from the 3524-PWR access switches to include the IP phones.$ {) v" B: h, q) m1 ~2 V! z$ ]
B.Ingress rate-limiting should be configured on 3524-PWR access switches to ensure Voice over IP bandwidth guarantees.
" V# f4 y- G5 n: A5 ^. e: JC.A new voice-only VLAN should be established and extended from the IP phones throughout the campus.+ R1 W9 W. r' b- A5 t: @" F
D.Configure the 3524-PWR access switches to ensure Voice over IP packets are given preferential treatment by enabling voice traffic to use separate queues.2 \& c+ K9 h) [0 j1 ^. y
E.Since end-user workstations cannot run CDP, disable it on the IP phones to improve performance and increase security.6 i9 B% o8 A. V0 J9 A. K1 o
Correct:A C D ! G: d6 ~( v- l* M
6.Which three components are part of the Intelligent Network Services provided by the Cisco AVVID framework? (Choose three.)
1 R% d# ]3 z0 {& {A.IP telephony6 E5 k7 C6 [. X; P5 f$ e
B.security
, v- [9 h) i3 W7 R5 l9 EC.IP multicasting
: I' \2 |# m) {: L; vD.work force optimization7 @+ J, b/ H, W7 c, ?- Y
E.e-business infrastructure' l8 l9 J+ H) I
F.QoS, u" F- f; @+ f; p
Correct:B C F * W$ j! k) H# _& _0 v) {
7.Which three best practices should be implemented at the campus backbone submodule to support the server farm module? (Choose three.) c3 n" r: y+ n& {% [1 J! }* s# x
A.Implement highly redundant switching and links with no single points or paths of failure.
& o, {; T& Q( X8 O' m0 m; Q AB.Implement server load balancing.
: \6 T& t5 V3 G6 f3 uC.Implement the Hot Standby Router Protocol (HSRP) for failover protection.
/ f- G7 Q! n# S" \D.Dual home all servers.
! b# T, _& Q3 z: WE.Implement intrusion detection with automatic notification of intrusion attempts in place.
; k$ h# f, Q& oF.Deploy caching systems.
2 o; L5 c C; g+ w* q3 F# RCorrect:A C E
0 B# d$ x8 A+ p+ F" D8.The network administrator would like to generate synthetic traffic using the Service Assurance Agent contained in Cisco IOS. Which CiscoWorks network management application will be used to report the latency and availability for configured traffic operations on an end-to-end and hop-by-hop (router-to-router) basis?
3 K, b0 {6 _5 g' B+ a9 vA.nGenius Real-Time Monitor
7 E" H! z8 j: @1 N( RB.CiscoView
3 X+ O* F' }" ?C.Device Fault Manager: L8 X! Z$ K$ A
D.Internetwork Performance Monitor
0 S# p' w: i+ w' tCorrect 0 {/ B. |7 I+ ]4 p
9.Look at the picture.7 x7 v1 ^. u; r( h& e6 n
Correct:
" a' ^' S4 Q3 Z/ T! j; K10.Which protocol would provide block access to remote storage over WAN links?
6 x5 n3 R8 r* ^( i4 T! M! c; xA.iSCSI
6 R9 ?2 b) S+ F* u4 NB.FCIP2 K& G* @, o; }5 I2 v
C.SCSI-FP
7 }6 x% D! j) A3 j0 i T; Q; C( fD.eSCSI5 K+ s& d) Q$ r- S4 q; n+ ]
E.CIFS
2 i; y8 V+ ~. q" r3 eCorrect:A
- W$ N" W6 L N7 Q0 v( K8 t( u# w11.What is the device weight limit per CallManager in a Cisco IP phone configuration?
, a# d" N5 e' m l" P2 h% FA.2500* a% A8 a5 r, x1 j6 y3 Q7 R
B.3000
, t# Z" s0 K! I( r8 i6 qC.5000% p R/ S" _" F0 k
D.6500
. c: Y, l1 t! p% BCorrect:C 6 m. t% q O9 s% Q
12.Acme Nutrition manufactures a wide variety of vitamin supplements. It has a single manufacturing facility with 3 regional warehouses and 16 district sales offices. Currently the manufacturing facility requires 210 IP addresses; each warehouse requires 51 IP addresses; each district sales office requires 11 IP addresses; and the IP WAN requires 38 IP addresses. If Acme Nutrition plans for 20 percent growth in facilities, how many Class C subnets will the district sales offices require?$ h- P: v2 N5 Q0 z
A.19 (3 from the warehouse range and 16 from a separate Class C address)4 O/ A7 I8 @; j; d: J5 l! \) T
B.19 (3 from the warehouse block, 15 from a separate Class C block and 1 from the IP WAN block)0 H$ H0 I5 d) H9 p
C.20 (4 from the warehouse range,15 from a separate Class C block and 1 from the IP WAN block)
1 ^$ s" U! s+ x# n6 [- rD.16 (3 from the warehouse range and 13 from a separate Class C address)
0 j( T6 X: W! G7 \2 M& VE.18 (2 from the Warehouse range and 14 from a separate Class C address)
- j. ~( r7 b7 ]F.16 (all from a separate Class C address)
7 `( ?( }, N; @/ rCorrect:B
7 L# _8 s( Y" A4 q/ r! W% K13.With Call Manager v3.1, what is the maximum number of servers in a Cluster?
/ _( X# J5 q+ yA.3
1 K- K, M/ L) d0 g1 F' cB.6
8 e6 q( x' k; Q: M0 ^- tC.79 K8 e" u N5 \8 t: @- a1 [3 J% F
D.87 {2 L- ~$ U" ^8 C8 v$ ?
Correct 5 I8 P2 Q* {: Z+ M! x1 v
14.What are three features of the Cisco Product Advisor tool? (Choose three.)
* ~! l& y' i) @3 _( eA.It can be used in a novice, question-and-answer mode.% t, C5 A" ]3 p- x3 `1 j
B.You can begin searching categories that include routing, switching, and IP telephony. b* ~8 A% q! l/ d
C.It covers only select routers from the 800 Series through the 7400 Series.
# H) i3 H" ~1 u/ k6 PD.It includes a wireless product search category.
* U4 d6 K0 c; z0 f! vE.It covers select switches from the Catalyst 2800 Series through the Catalyst 8500 Series.6 i0 L* E2 I3 C2 g
F.It narrows down Cisco networking products based on product cost and network requirements.
7 E6 T$ b9 p$ D5 n6 ~4 o0 tCorrect:A C D
' s% x( ~4 x" c$ ~15.Morris Prosthetics is having problems with serialization delay on its WAN links. The links currently carry less than 768 Kbps. Which Layer 2 mechanism can help solve the problem?
' Y3 I7 x9 L6 r* PA.Compressed Real-Time Transfer Protocol
, [! p. ~4 S t* R4 ]! p% |+ IB.link fragmentation and interleaving
3 m; A: n- O. J* {, TC.differentiated service code points4 r! q/ J! F, C6 v& J: f
D.Integrated Services module
4 z2 A: Y( ?/ bCorrect:B 9 i6 [0 I; C7 Z9 y4 Y; M+ Q
16.Look at the picture.
7 _4 ^/ `4 f# c3 f8 HCorrect:
( A# g& F- v/ zGreen choice5---->Yellow Choice1
/ ]6 z J/ g0 \Green choice6---->Yellow Choice2* _4 m7 U4 }+ C7 A% {) q! ]
Green choice4---->Yellow Choice3- J' G+ C% r4 j! S4 ~& E4 O0 E
Green choice1---->Yellow Choice4
( z2 }' ^, x8 Q; l2 yGreen choice2---->Yellow Choice5( B* ]: u; O+ g& v8 S6 g4 f9 f
Green choice3---->Yellow Choice6
8 T4 C0 {. Q) d17.In an Internet e-commerce, browser-based application, which method can have the greatest impact on optimizing WAN bandwidth usage?6 g/ G1 `6 L8 y0 K
A.multiplexing) n+ O' y$ y5 e* ~, g: ^
B.compression
! u% l5 e% s6 C( J. M4 P4 ?' J+ LC.content networking
3 X$ ~, B1 I, CD.secure sockets layer (SSL)
- F5 o1 L' P! ^- M% RCorrect:C
, u. Q2 v* K! k9 R- Z9 i, h0 h18.When designing the WAN module within the enterprise edge, which document is used to specify the connectivity and performance agreements with the service provider?
8 M) B$ i% V. l5 A2 k1 ZA.RFP1 u$ q1 s5 S9 l: ]( X3 }& k2 D
B.RFC1 e; {3 a8 s1 w% ^- O
C.SLC/SLA
# k9 I! P# u2 ]* B3 t r4 s4 b8 QD.SOW( [9 G c" |0 ]6 L% g
Correct:C % h8 Y& R u5 |- H, A
19.Which four QoS design requirements are the closest to Cisco recommendations for VoIP traffic? (Choose four).
* j, r: p& R) F% R7 q. ~+ D5 k9 BA.one-way latency of 150 ms to 200 ms
0 L9 [0 x/ f2 {2 Q' B" LB.serialization delay of 100 ms to 150 ms$ v+ d# Y! W/ @9 A
C.less than 30 ms of jitter1 d9 C/ M q( J% ^
D.less than 1 percent of packet loss
7 `- a# A: r+ v5 F7 d% lE.fixed 64 kbps of guaranteed priority bandwidth per call9 c8 N* K2 _ C$ u. f+ T. e( D
F.150 bps (+ Layer 2 overhead) of guaranteed bandwidth for voice control traffic per call
+ h% t: Q. p# T8 c) m) JCorrect:A C D F
% i4 r3 x5 T; p! j3 x20.Which routing protocol supports a flexible area structure using routing levels one and two?
9 g( ?; r, F! b# Y. s6 A: eA.OSPF* Y0 y( i- ]- j j0 Y, T: z
B.EIGRP3 ~* J. H g: D* `/ p
C.IS-IS
( H8 K' k) E6 t. rD.BGP
9 ]& T3 K6 n. mE.RIPv2
0 |9 j5 p% F. N; ^, o! v& X. PF.IGRP- k' [2 L9 n/ b, L5 q
Correct:C
# N6 f0 `: H, K8 ^/ ^( l21.The Acme Anvil Corporation has two manufacturing sites and six sales offices. Each sales office requires 25 public IP addresses, and each manufacturing facility requires 210 public IP addresses. If the company plans for 20 percent growth for each facility, how many Class C addresses will it require?
8 Z& w1 A+ E% x* J0 p/ ^& B' n2 gA.three
3 W: ], j; ], [' ?B.four
; ~! z. r3 _& @+ MC.five
) Y* q4 L1 O! l5 `; {D.six
7 R# y4 @' ?: v4 F! ~% SE.seven
+ z; z q* |: o. \. g) l" NF.eight$ ]1 D/ ]5 S+ }! ~) W g. b0 l9 K3 n
Correct:A
: m: V/ n9 H% g% `1 i, K22.When is the site-to-site remote access model appropriate? (Choose one.)
% c1 S2 x' [# K) M' z" cA.for multiple ISDN connections+ O5 l- g9 b) ~5 k) a( k
B.for modem concentrated dial-up connections3 f6 u9 }3 Y% x- d5 p7 {7 e
C.for a group of users in the same vicinity sharing a connection
7 J! U3 q0 R6 Y0 }D.for use by mobile users. K5 C, N( }: ?9 n6 M
Correct:C . i9 ~/ J, t; X& J, }- ?+ ?
23.Look at the picture.
& q+ R, I" m1 MCorrect:
+ W: Y$ h3 E3 ?Green choice1---->Yellow Choice1
" j4 A' B! X- w t) b3 P: x0 KGreen choice4---->Yellow Choice2
( E2 S Q7 i" n2 L# K/ H$ R$ WGreen choice2---->Yellow Choice3
0 t3 W% O# ?# IGreen choice3---->Yellow Choice42 u" s/ v8 G# d2 ]6 _
24.What are three primary activities in the cycle of building an enterprise security strategy? (Choose three.)( \% R2 P/ p: M' d8 O8 b
A.activity audit; V) u% w, ?2 I& T
B.administration
4 I c9 A$ N5 p1 Z0 aC.feature evaluation
, V$ d/ H* a# DD.ACL documentation
/ ?. U4 R9 F y3 s% DE.policy establishment& u+ G/ ]% `( y( _1 S% A
F.technology implementation1 o4 E( x9 Z/ y
Correct:A E F 4 j( G" T4 F3 L+ f1 D
25.What are two design guidelines for VoIP networks? (Choose two.)* v9 a4 X; M- _8 \7 P! X
A.Delay should be no more than 10 ms.7 a; D4 y2 g8 {2 N
B.Loss should be no more than 1 percent.% i$ [3 } ]2 g0 g% @
C.Jitter should be less then 40 ms.
: ?, h# \0 \. BD.Managed bandwidth is strongly recommended for voice control traffic.3 S" J9 t9 n9 j
E.One-way latency should be no more than 50 ms.% `8 ~! Y* D1 Y/ h9 \ M2 ~2 Q
Correct:B D : d0 G* g' I% d( _$ r
26.Users of a site-to-site VPN are reporting performance problems. The VPN connection employs IPSec and GRE and traverses several Ethernet segments. The VPN packets are being fragmented as they traverse the links. What would be two methods to overcome this problem? (Choose two.)
, O: n b' p9 S8 d& tA.Employ path MTU discovery.- K7 {3 w! g4 ^; k8 c" S
B.Set the MTU higher than 1500 bytes.
+ V' b0 K/ g$ P7 EC.Turn off pre-fragmentation for IPSec.4 b6 r& H5 U: X$ P' H$ t
D.Set the MTU value to 1400 bytes.
7 U8 ~0 t- Z2 T( ?" R1 U. p, ]Correct:A D 2 A. @3 j* p4 w+ U9 B2 l
27.Look at the picture.6 @$ }9 ]" ]7 _( v
Correct: X6 Q0 X6 c4 f; j7 r% N
Green choice3---->Yellow Choice1
( ]( `& z$ W4 ~4 F- x2 H5 U, S+ `Green choice4---->Yellow Choice2
4 O( \. V$ {6 E$ j4 i" H+ `& oGreen choice1---->Yellow Choice3; r* j0 D8 m! F* G
Green choice2---->Yellow Choice4
4 J( W8 d. F6 O( _3 S28.Lafeyette Productions is looking for a new ISP that has improved availability, load balancing, and catastrophe protection. Which type of ISP connectivity solution would be best?
8 S: x8 {. _+ _% ^+ K0 ZA.single run4 y* H B; g( V6 C" z
B.multi-homed$ N3 ^! ~, ?: m
C.stub domain EBGP
- y7 E- M6 b& V, U: sD.direct BGP peering1 g; m. n S w/ T4 K: j9 C
E.autonomous-route injection
+ r$ c% \" t$ t" ?5 {2 |# R% tCorrect:B
& c4 j+ i8 S" R9 [' P3 c29.To securely transport EIGRP traffic, a network administrator will build VPNs between sites. What is the best method to accomplish the transport of EIGRP traffic?
0 a! J/ { H9 { J% Q ]' TA.IPSec in tunnel mode
5 ?6 x2 i4 \4 y1 M# g7 oB.IPSec in transport mode
6 n5 A3 r( V2 O* H/ j1 V$ H1 OC.GRE with IPSec in transport mode8 J6 F+ R0 Z! ^- e9 j& j& w
D.GRE with IPSec in tunnel mode# B( }7 n! d0 k* y6 E3 |3 i
Correct:C
2 M% g) O3 C/ s' @" S4 Q2 H2 i: J30.Which three objectives would be met by designing Layer 3 switching in the Campus Backbone of a medium size installation? (Choose three.)
# O7 i; V/ E) E0 K* I0 q) AA.scale to a large size8 t7 j4 S8 [9 T: ^% C9 Q3 s# \
B.increase router peering' e$ Z) A- B+ n. r2 `' e
C.provide a flexible topology with no spanning tree loops
4 M# u6 K9 ]. O+ fD.control broadcasts in the backbone
0 U& P6 m5 f' |1 UE.reduce complexity
. c0 L4 S- S V2 PCorrect:A C D |
|