1. Which term is used to describe a network that is always accessible? Hierarchical Modular Resilient Flexible 2. Which characteristic of a network allows it to expand and provide on-demand services? Hierarchical Modularity Resilient Flexible 3. Which term describes the ability of a network to use all available …
Refer to the following syslog output to answer the questions. *Jun 12 17:46:01.619: %IFMGR-7-NO_IFINDEX_FILE: Unable to open nvram:/ifIndex-table No such file or directory 1. Refer to the syslog output. What security level generated the message? Error Informational Warning Debugging 2. Refer to the syslog output. What is the …
1. Which SNMP version authenticates the source of management messages? Version 2 Version 3 Both 2. Which SNMP version provides services for security models? Version 2 Version 3 Both 3. Which SNMP version does not provide encrypted management messages? Version 2 Version 3 Both 4. Which SNMP version …
1. Which protocol is used to gather information about Cisco devices which share the same data link? CDP LLDP 2. Which protocol works with network devices, such as routers, switches, and wireless LAN access points across multiple manufacturers’ devices? CDP LLDP
1. Which detects when traffic rates reach a configured maximum rate and drops excess traffic? traffic policing traffic shaping classification 2. Which determines what class of traffic packets or frames belong to. marking classification traffic shaping 3. Which adds a value to the packet header? marking classification 802.1Q …
1. Which QoS model provides per-request policy admission control? best effort integrated services differential services 2. Which QoS model requires no special QoS mechanisms? best effort integrated services differential services 3. Which QoS model provides many different levels of quality? best effort integrated services differential services 4. Which …
1. Which queuing algorithm simultaneously schedules interactive traffic to the front of a queue to reduce response time? FIFO WFQ CBWFQ LLQ 2. Which queuing algorithm provides support for user-defined traffic classes? FIFO WFQ CBWFQ LLQ 3. Which queuing algorithm is effective for large links that have little …
1. Which type of traffic tends to consume a large portion of network capacity? voice video data 2. Which type of traffic requires at least 384 Kbs of bandwidth? voice video data 3. Which type of traffic is unpredictable, inconsistent, and bursty? voice video data 4. Which type …
1. What is the variable amount of time it takes for a frame to traverse the links between the source and destination? serialization delay propagation delay code delay 2. What happens when congestion occurs? packet loss jitter code delay 3. What is the fixed amount of time it …
1. IPsec can protect traffic in which OSI layers? (Choose four.) Layer 1 Layer 2 Layer 3 Layer 4 Layer 5 Layer 6 Layer 7 2. Which IPsec function uses pre-shared passwords, digital certificates, or RSA certificates? IPsec protocol Confidentiality Integrity Authentication Diffie-Hellman 3. True or False: The …