1. Which of the following is a Cisco IOS feature that can collect timestamps of traffic sent between a particular source and destination for the purpose of reviewing in an audit? (Select the best answer.)
a. CS-MARS
b. SNMPv3
c. NetFlow
d. RMON
2. Which of the following are not components of a typical CVO implementation? (Select 3 choices.)
a. a Cisco 800 series ISR
b. a Cisco Unified IP Phone
c. a Cisco 3900 series ISR
d. a Cisco 600 series AP
e. a Cisco 5500 series WLC
f. a Cisco 2500 series WLC
3. In a hierarchical network model, which layer of the network handles ACLs and IPS filtering? (Select the best answer.)
a. core
b. services block
c. access
d. distribution
4. Which of the following statements are true about a medium branch office design? (Select 2 choices.)
a. Rapid PVST+ should be configured to prevent Layer 2 loops.
b. A collapsed core should not be implemented.
c. ISR integrated 10/100/1000 interfaces should be configured as Layer 3 trunks.
d. A single ISR platform is recommended for WAN access.
e. A medium branch office design is ideal for up to 200 users.
5. Which of the following best describes how Cisco defines a medium branch office? (Select the best answer.)
a. an office that contains between 50 and 100 users and that implements a two-tier design
b. an office that contains between 100 and 200 users and that implements a two-tier design
c. an office that contains up to 50 users and that implements a one-tier design
d. an office that contains between 50 and 100 users and that implements a three-tier design
6. In which of the following layers of the hierarchical network design model should you implement QoS? (Select the best answer.)
a. in the core, distribution, and access layers
b. in the access and distribution layers only
c. in the distribution layer only
d. in the core and distribution layers only
e. in the access layer only F.in the core layer only
7. In the Cisco enterprise architecture model, which of the following best describes the switches used in the enterprise edge module? (Select the best answer.)
a. Both inner and outer switches should use Layer 3 switching exclusively.
b. Inner switches should use Layer 2 switching exclusively; outer switches should use a combination of Layer 2 and Layer 3 switching.
c. Inner switches should use Layer 3 switching exclusively; outer switches should use a
d. combination of Layer 2 and Layer 3 switching.
e. Both inner and outer switches should use Layer 2 switching exclusively.
f. Inner switches should use a combination of Layer 2 and Layer 3 switching; outer switches should use Layer 3 switching exclusively.
g. Inner switches should use a combination of Layer 2 and Layer 3 switching; outer switches should use Layer 2 switching exclusively.
h. Inner switches should use Layer 2 switching exclusively; outer switches should use Layer 3 switching exclusively.
8. Which of the following can be used to configure router command authorizati ...
1. Which of the following is a Cisco IOS feature that can collect .docx
1. 1. Which of the following is a Cisco IOS feature that can collect
timestamps of traffic sent between a particular source and
destination for the purpose of reviewing in an audit? (Select the
best answer.)
a. CS-MARS
b. SNMPv3
c. NetFlow
d. RMON
2. Which of the following are not components of a typical CVO
implementation? (Select 3 choices.)
a. a Cisco 800 series ISR
b. a Cisco Unified IP Phone
c. a Cisco 3900 series ISR
d. a Cisco 600 series AP
e. a Cisco 5500 series WLC
f. a Cisco 2500 series WLC
3. In a hierarchical network model, which layer of the network
handles ACLs and IPS filtering? (Select the best answer.)
a. core
b. services block
c. access
d. distribution
4. Which of the following statements are true about a medium
branch office design? (Select 2 choices.)
a. Rapid PVST+ should be configured to prevent Layer 2 loops.
b. A collapsed core should not be implemented.
c. ISR integrated 10/100/1000 interfaces should be configured
2. as Layer 3 trunks.
d. A single ISR platform is recommended for WAN access.
e. A medium branch office design is ideal for up to 200 users.
5. Which of the following best describes how Cisco defines a
medium branch office? (Select the best answer.)
a. an office that contains between 50 and 100 users and that
implements a two-tier design
b. an office that contains between 100 and 200 users and that
implements a two-tier design
c. an office that contains up to 50 users and that implements a
one-tier design
d. an office that contains between 50 and 100 users and that
implements a three-tier design
6. In which of the following layers of the hierarchical network
design model should you implement QoS? (Select the best
answer.)
a. in the core, distribution, and access layers
b. in the access and distribution layers only
c. in the distribution layer only
d. in the core and distribution layers only
e. in the access layer only F.in the core layer only
7. In the Cisco enterprise architecture model, which of the
following best describes the switches used in the enterprise
edge module? (Select the best answer.)
a. Both inner and outer switches should use Layer 3 switching
exclusively.
b. Inner switches should use Layer 2 switching exclusively;
outer switches should use a combination of Layer 2 and Layer 3
switching.
c. Inner switches should use Layer 3 switching exclusively;
3. outer switches should use a
d. combination of Layer 2 and Layer 3 switching.
e. Both inner and outer switches should use Layer 2 switching
exclusively.
f. Inner switches should use a combination of Layer 2 and Layer
3 switching; outer switches should use Layer 3 switching
exclusively.
g. Inner switches should use a combination of Layer 2 and
Layer 3 switching; outer switches should use Layer 2 switching
exclusively.
h. Inner switches should use Layer 2 switching exclusively;
outer switches should use Layer 3 switching exclusively.
8. Which of the following can be used to configure router
command authorization? (Select the best answer.)
a. Cisco Secure ACS
b. Cisco Security MARS
c. Cisco Security Agent
d. Cisco UCM
9. Which of the following can be used to monitor Cisco network
security devices as well as third-party network devices and
applications? (Select the best answer.)
a. CS-MARS
b. CSM
c. ACS
d. SDM
10. Which of the following can create multiple virtual
firewalls? (Select the best answer.)
a. an ASA
b. a vPC
c. an IPS
4. d. a VRF
11. The bit rate of analog voice signals being converted into
digital data streams is calculated by using which
formula? (Select the best answer.)
a. one-fourth of the highest input frequency
b. twice the highest input frequency times the sampling rate
c. the sampling rate times the size of the code words
d. one-half of the sampling rate times the size of the code words
12. Which of the following Cisco NAC appliance components is
an optional Windows client-based agent? (Select the best
answer.)
a. Cisco SSC
b. Cisco NAA
c. Cisco NAS
d. Cisco NAM
13. Which of the following statements best describes
deterministic redundancy in WLCs? (Select the best answer.)
a. Deterministic redundancy involves APs that are configured
with primary, secondary, and tertiary WLCs.
b. Deterministic redundancy failover is slower than dynamic
redundancy failover.
c. Deterministic redundancy designs are less predictable and
less stable than dynamic designs.
d. Deterministic redundancy is frequently implemented in a salt-
and-pepper design.
14. The network you administer has a 1-Gbps link that is used
to carry voice and data traffic. Which of the following
represents the maximum total bandwidth that should be reserved
for voice and data traffic? (Select the best answer.)
5. a. 750 Mbps
b. 500 Mbps
c. 333 Mbps
d. 1,000 Mbps
15. Rapid PVST+ is a Cisco enhancement of which of the
following IEEE protocols? (Select the best answer.)
a. 802.1Q
b. 802.1w
c. 802.1s
d. 802.1t
e. 802.1D
16. Which of the following Cisco NAC appliance components is
responsible for enforcing network policies between a trusted
network and an untrusted network? (Select the best answer.)
a. Cisco NAM
b. Cisco NAA
c. Cisco SSC
d. Cisco NAS
17. Which of the following is responsible for ascertaining the
status of security applications and management tools that are
installed on a client? (Select the best answer.)
a. CSA
b. Cisco NAS
c. CTA
d. Cisco SSC
18. Which of the following best describes jitter? (Select the
best answer.)
6. a. serialization delay
b. packet loss
c. variation in delay
d. roaming delay
e. end-to-end delay
19. Which of the following values is the maximum end-to-end
transit time that can adequately support voice traffic on a
VoWLAN? (Select the best answer.)
a. 150 ms
b. 100 ms
c. 1 ms
d. 15 ms
e. 10 ms
20. Which of the following statements are true about an 802.11b
VoWLAN design that is based on best practices? (Select 2
choices.)
a. The QBSS load of each AP should be no greater than 33
percent.
b. The overlap between adjacent channels should be between 10
and 15 percent.
c. The packet error rate of the network should be no greater than
5 percent.
d. The end-to-end transfer time should be less than 150 ms for
each voice packet.
e. The number of simultaneous G.711 calls for an AP should be
no greater than seven.
21. Which of the following statements are true regarding the
Cisco Unified Wireless Network architecture? (Select 2
choices.)
a. A wireless client can be located without the use of a Cisco
7. Wireless Location Appliance.
b. A LAP uses LWAPP to communicate with its associated
wireless clients.
c. A LAP can function independently of a WLC.
d. A wireless client can roam between LAPs without refreshing
its IP address.
e. A WCS server is required for WLAN management.
22. What is the bit rate of analog voice signals being converted
into digital data streams with an input frequency of 4 kHz and
8-bit code words? (Select the best answer.)
a. 24 Kbps
b. 32 Kbps
c. 12 Kbps
d. 64 Kbps
23. Which of the following is the first action performed on a
packet when it is received on a QoS-enabled interface? (Select
the best answer.)
a. scheduling
b. queuing
c. shaping
d. classification
24. According to Cisco best practices, which of the following
percentages is the maximum amount of bandwidth that should
be reserved for voice traffic? (Select the best answer.)
a. 50 percent
b. 66 percent
c. 25 percent
d. 75 percent
e. 33 percent
8. 25. Which of the following statements are true regarding the
G.711 codec? (Select 2 choices.)
a. G.711 is a Cisco-proprietary codec.
b. G.711 has an MOS of 5.
c. G.711 is supported on the Cisco 7921G WIP.
d. G.711 can provide fewer simultaneous calls than G.729 with
the same amount of bandwidth.
e. G.711 requires a bit rate of 32 Kbps to support toll-quality
voice.
26. Which of the following statements best describes voice
traffic? (Select the best answer.)
a. Voice traffic is not tolerant of delay.
b. Voice traffic uses TCP to carry audio data.
c. Voice traffic uses large packets.
d. Voice traffic is not deterministic.
27. Which of the following wireless standards are used on the
backhaul link of a Cisco AP1510 MAP? (Select 2 choices.)
a. 802.11n
b. 802.11i
c. 802.11b
d. 802.11g
e. 802.11a
28. Which of the following statements describes Layer 2 inter-
controller roaming? (Select the best answer.)
a. roaming between LAPs managed by the same WLC on the
same IP subnet
b. roaming between LAPs managed by different WLCs on the
same IP subnet
c. roaming between LAPs managed by different WLCs on
9. different IP subnets
d. roaming between LAPs managed by the same WLC on
different IP subnets
e. roaming between LAPs managed by different WLCs in
different mobility groups
29. Which of the following statements best describes the Cisco
Security Management Suite? (Select the best answer.)
a. it is a tool that facilitates and simplifies the operations and
management of a Cisco Self-Defending Network.
b. It separates the configuration and management to each
individual security device on a network.
c. It is based on the framework of the PIX that provides firewall
and VPN services.
d. It is security software that functions primarily as a HIDS and
that can be installed on laptops.
30. Which of the following protocols can IPSec use to provide
data authentication and data integrity? (Select 2 choices.)
a. AH
b. ESP
c. DES
d. AES
e. GRE
31. Which of the following statements is true regarding the
G.729 codec? (Select the best answer.)
a. G.729 is a medium-complexity codec.
b. G.729 is commonly used on the PSTN.
c. G.729 requires the least bandwidth out of all the codecs
supported on Cisco routers.
d. G.729 has the highest MOS score out of all the codecs
supported on Cisco routers.
10. e. G.729 is the default codec supported on Cisco routers.
32. Which of the following features are provided by
IPSec? (Select 3 choices.)
a. data origin authentication
b. multicast packet encapsulation
c. data integrity
d. broadcast packet encapsulation
e. data confidentiality
33. Cisco IBNS solutions use which of the following
technologies to provide security for a network? (Select 3
choices.)
a. PAP
b. RADIUS
c. EAP
d. CHAP
e. TACACS+ F.IEEE 802.1x
34. Which of the following refers to the process of buffering
packets in a software queue on a QoS-enabled
interface? (Select the best answer.)
a. traffic policing
b. scheduling
c. classification
d. queuing
35. Which of the following is a security appliance that serves as
the focal point for security events on a network? (Select the
best answer.)
a. SNMP
b. ASA
c. CS-MARS
11. d. IPS
36. Which of the following is a critical component of the Self-
Defending Network framework that relies on 802.1x and
IBNS? (Select the best answer.)
a. trust and identity management
b. threat defense
c. operational management and policy control
d. secure connectivity
e. secure network platform
37. According to the Nyquist theorem, what is the minimum rate
that should be used when an analog voice signal is
sampled? (Select the best answer.)
a. two times the highest input frequency
b. equal to the highest input frequency
c. one-half of the highest input frequency
d. one-fourth of the highest input frequency
e. four times the highest input frequency
38. Q38: Which of the following are not components of a
typical CVO implementation? (Select 3 choices.)
a. a Cisco 2500 series WLC
b. a Cisco 5500 series WLC
c. a Cisco 600 series AP
d. a Cisco 3900 series ISR
e. a Cisco Unified IP Phone
f. a Cisco 800 series ISR
39. Q39: Which of the following managed VPN services can use
ATM to transport data over a point-to-point link? (Select the
best answer.)
12. a. MPLS L3VPN
b. L2VPN
c. L3VPN using the Internet
d. DMVPN
40. Q40: Which of the following are required components in a
Cisco wireless outdoor mesh deployment? (Select 3 choices.)
a. a RAP
b. a WLC
c. an autonomous AP
d. a MAP