SlideShare a Scribd company logo
1 of 12
1. Which of the following is a Cisco IOS feature that can collect
timestamps of traffic sent between a particular source and
destination for the purpose of reviewing in an audit? (Select the
best answer.)
a. CS-MARS
b. SNMPv3
c. NetFlow
d. RMON
2. Which of the following are not components of a typical CVO
implementation? (Select 3 choices.)
a. a Cisco 800 series ISR
b. a Cisco Unified IP Phone
c. a Cisco 3900 series ISR
d. a Cisco 600 series AP
e. a Cisco 5500 series WLC
f. a Cisco 2500 series WLC
3. In a hierarchical network model, which layer of the network
handles ACLs and IPS filtering? (Select the best answer.)
a. core
b. services block
c. access
d. distribution
4. Which of the following statements are true about a medium
branch office design? (Select 2 choices.)
a. Rapid PVST+ should be configured to prevent Layer 2 loops.
b. A collapsed core should not be implemented.
c. ISR integrated 10/100/1000 interfaces should be configured
as Layer 3 trunks.
d. A single ISR platform is recommended for WAN access.
e. A medium branch office design is ideal for up to 200 users.
5. Which of the following best describes how Cisco defines a
medium branch office? (Select the best answer.)
a. an office that contains between 50 and 100 users and that
implements a two-tier design
b. an office that contains between 100 and 200 users and that
implements a two-tier design
c. an office that contains up to 50 users and that implements a
one-tier design
d. an office that contains between 50 and 100 users and that
implements a three-tier design
6. In which of the following layers of the hierarchical network
design model should you implement QoS? (Select the best
answer.)
a. in the core, distribution, and access layers
b. in the access and distribution layers only
c. in the distribution layer only
d. in the core and distribution layers only
e. in the access layer only F.in the core layer only
7. In the Cisco enterprise architecture model, which of the
following best describes the switches used in the enterprise
edge module? (Select the best answer.)
a. Both inner and outer switches should use Layer 3 switching
exclusively.
b. Inner switches should use Layer 2 switching exclusively;
outer switches should use a combination of Layer 2 and Layer 3
switching.
c. Inner switches should use Layer 3 switching exclusively;
outer switches should use a
d. combination of Layer 2 and Layer 3 switching.
e. Both inner and outer switches should use Layer 2 switching
exclusively.
f. Inner switches should use a combination of Layer 2 and Layer
3 switching; outer switches should use Layer 3 switching
exclusively.
g. Inner switches should use a combination of Layer 2 and
Layer 3 switching; outer switches should use Layer 2 switching
exclusively.
h. Inner switches should use Layer 2 switching exclusively;
outer switches should use Layer 3 switching exclusively.
8. Which of the following can be used to configure router
command authorization? (Select the best answer.)
a. Cisco Secure ACS
b. Cisco Security MARS
c. Cisco Security Agent
d. Cisco UCM
9. Which of the following can be used to monitor Cisco network
security devices as well as third-party network devices and
applications? (Select the best answer.)
a. CS-MARS
b. CSM
c. ACS
d. SDM
10. Which of the following can create multiple virtual
firewalls? (Select the best answer.)
a. an ASA
b. a vPC
c. an IPS
d. a VRF
11. The bit rate of analog voice signals being converted into
digital data streams is calculated by using which
formula? (Select the best answer.)
a. one-fourth of the highest input frequency
b. twice the highest input frequency times the sampling rate
c. the sampling rate times the size of the code words
d. one-half of the sampling rate times the size of the code words
12. Which of the following Cisco NAC appliance components is
an optional Windows client-based agent? (Select the best
answer.)
a. Cisco SSC
b. Cisco NAA
c. Cisco NAS
d. Cisco NAM
13. Which of the following statements best describes
deterministic redundancy in WLCs? (Select the best answer.)
a. Deterministic redundancy involves APs that are configured
with primary, secondary, and tertiary WLCs.
b. Deterministic redundancy failover is slower than dynamic
redundancy failover.
c. Deterministic redundancy designs are less predictable and
less stable than dynamic designs.
d. Deterministic redundancy is frequently implemented in a salt-
and-pepper design.
14. The network you administer has a 1-Gbps link that is used
to carry voice and data traffic. Which of the following
represents the maximum total bandwidth that should be reserved
for voice and data traffic? (Select the best answer.)
a. 750 Mbps
b. 500 Mbps
c. 333 Mbps
d. 1,000 Mbps
15. Rapid PVST+ is a Cisco enhancement of which of the
following IEEE protocols? (Select the best answer.)
a. 802.1Q
b. 802.1w
c. 802.1s
d. 802.1t
e. 802.1D
16. Which of the following Cisco NAC appliance components is
responsible for enforcing network policies between a trusted
network and an untrusted network? (Select the best answer.)
a. Cisco NAM
b. Cisco NAA
c. Cisco SSC
d. Cisco NAS
17. Which of the following is responsible for ascertaining the
status of security applications and management tools that are
installed on a client? (Select the best answer.)
a. CSA
b. Cisco NAS
c. CTA
d. Cisco SSC
18. Which of the following best describes jitter? (Select the
best answer.)
a. serialization delay
b. packet loss
c. variation in delay
d. roaming delay
e. end-to-end delay
19. Which of the following values is the maximum end-to-end
transit time that can adequately support voice traffic on a
VoWLAN? (Select the best answer.)
a. 150 ms
b. 100 ms
c. 1 ms
d. 15 ms
e. 10 ms
20. Which of the following statements are true about an 802.11b
VoWLAN design that is based on best practices? (Select 2
choices.)
a. The QBSS load of each AP should be no greater than 33
percent.
b. The overlap between adjacent channels should be between 10
and 15 percent.
c. The packet error rate of the network should be no greater than
5 percent.
d. The end-to-end transfer time should be less than 150 ms for
each voice packet.
e. The number of simultaneous G.711 calls for an AP should be
no greater than seven.
21. Which of the following statements are true regarding the
Cisco Unified Wireless Network architecture? (Select 2
choices.)
a. A wireless client can be located without the use of a Cisco
Wireless Location Appliance.
b. A LAP uses LWAPP to communicate with its associated
wireless clients.
c. A LAP can function independently of a WLC.
d. A wireless client can roam between LAPs without refreshing
its IP address.
e. A WCS server is required for WLAN management.
22. What is the bit rate of analog voice signals being converted
into digital data streams with an input frequency of 4 kHz and
8-bit code words? (Select the best answer.)
a. 24 Kbps
b. 32 Kbps
c. 12 Kbps
d. 64 Kbps
23. Which of the following is the first action performed on a
packet when it is received on a QoS-enabled interface? (Select
the best answer.)
a. scheduling
b. queuing
c. shaping
d. classification
24. According to Cisco best practices, which of the following
percentages is the maximum amount of bandwidth that should
be reserved for voice traffic? (Select the best answer.)
a. 50 percent
b. 66 percent
c. 25 percent
d. 75 percent
e. 33 percent
25. Which of the following statements are true regarding the
G.711 codec? (Select 2 choices.)
a. G.711 is a Cisco-proprietary codec.
b. G.711 has an MOS of 5.
c. G.711 is supported on the Cisco 7921G WIP.
d. G.711 can provide fewer simultaneous calls than G.729 with
the same amount of bandwidth.
e. G.711 requires a bit rate of 32 Kbps to support toll-quality
voice.
26. Which of the following statements best describes voice
traffic? (Select the best answer.)
a. Voice traffic is not tolerant of delay.
b. Voice traffic uses TCP to carry audio data.
c. Voice traffic uses large packets.
d. Voice traffic is not deterministic.
27. Which of the following wireless standards are used on the
backhaul link of a Cisco AP1510 MAP? (Select 2 choices.)
a. 802.11n
b. 802.11i
c. 802.11b
d. 802.11g
e. 802.11a
28. Which of the following statements describes Layer 2 inter-
controller roaming? (Select the best answer.)
a. roaming between LAPs managed by the same WLC on the
same IP subnet
b. roaming between LAPs managed by different WLCs on the
same IP subnet
c. roaming between LAPs managed by different WLCs on
different IP subnets
d. roaming between LAPs managed by the same WLC on
different IP subnets
e. roaming between LAPs managed by different WLCs in
different mobility groups
29. Which of the following statements best describes the Cisco
Security Management Suite? (Select the best answer.)
a. it is a tool that facilitates and simplifies the operations and
management of a Cisco Self-Defending Network.
b. It separates the configuration and management to each
individual security device on a network.
c. It is based on the framework of the PIX that provides firewall
and VPN services.
d. It is security software that functions primarily as a HIDS and
that can be installed on laptops.
30. Which of the following protocols can IPSec use to provide
data authentication and data integrity? (Select 2 choices.)
a. AH
b. ESP
c. DES
d. AES
e. GRE
31. Which of the following statements is true regarding the
G.729 codec? (Select the best answer.)
a. G.729 is a medium-complexity codec.
b. G.729 is commonly used on the PSTN.
c. G.729 requires the least bandwidth out of all the codecs
supported on Cisco routers.
d. G.729 has the highest MOS score out of all the codecs
supported on Cisco routers.
e. G.729 is the default codec supported on Cisco routers.
32. Which of the following features are provided by
IPSec? (Select 3 choices.)
a. data origin authentication
b. multicast packet encapsulation
c. data integrity
d. broadcast packet encapsulation
e. data confidentiality
33. Cisco IBNS solutions use which of the following
technologies to provide security for a network? (Select 3
choices.)
a. PAP
b. RADIUS
c. EAP
d. CHAP
e. TACACS+ F.IEEE 802.1x
34. Which of the following refers to the process of buffering
packets in a software queue on a QoS-enabled
interface? (Select the best answer.)
a. traffic policing
b. scheduling
c. classification
d. queuing
35. Which of the following is a security appliance that serves as
the focal point for security events on a network? (Select the
best answer.)
a. SNMP
b. ASA
c. CS-MARS
d. IPS
36. Which of the following is a critical component of the Self-
Defending Network framework that relies on 802.1x and
IBNS? (Select the best answer.)
a. trust and identity management
b. threat defense
c. operational management and policy control
d. secure connectivity
e. secure network platform
37. According to the Nyquist theorem, what is the minimum rate
that should be used when an analog voice signal is
sampled? (Select the best answer.)
a. two times the highest input frequency
b. equal to the highest input frequency
c. one-half of the highest input frequency
d. one-fourth of the highest input frequency
e. four times the highest input frequency
38. Q38: Which of the following are not components of a
typical CVO implementation? (Select 3 choices.)
a. a Cisco 2500 series WLC
b. a Cisco 5500 series WLC
c. a Cisco 600 series AP
d. a Cisco 3900 series ISR
e. a Cisco Unified IP Phone
f. a Cisco 800 series ISR
39. Q39: Which of the following managed VPN services can use
ATM to transport data over a point-to-point link? (Select the
best answer.)
a. MPLS L3VPN
b. L2VPN
c. L3VPN using the Internet
d. DMVPN
40. Q40: Which of the following are required components in a
Cisco wireless outdoor mesh deployment? (Select 3 choices.)
a. a RAP
b. a WLC
c. an autonomous AP
d. a MAP

More Related Content

Similar to 1. Which of the following is a Cisco IOS feature that can collect .docx

Cisco Certification 500-240 Questions and Answers
Cisco Certification 500-240 Questions and AnswersCisco Certification 500-240 Questions and Answers
Cisco Certification 500-240 Questions and Answersdouglascarnicelli
 
Test King Virtual Test--Network+
Test King Virtual Test--Network+ Test King Virtual Test--Network+
Test King Virtual Test--Network+ kappi98a
 
Ccna 4 final exam answer v5
Ccna 4 final exam answer v5Ccna 4 final exam answer v5
Ccna 4 final exam answer v5friv4schoolgames
 
Cisco CCNP Enterprise ENCOR 350-401 Real Questions
Cisco CCNP Enterprise ENCOR 350-401 Real QuestionsCisco CCNP Enterprise ENCOR 350-401 Real Questions
Cisco CCNP Enterprise ENCOR 350-401 Real QuestionsPassquestionExamTrai
 
Ccna 3 chapter 1 v4.0 answers 2011
Ccna 3 chapter 1 v4.0 answers 2011Ccna 3 chapter 1 v4.0 answers 2011
Ccna 3 chapter 1 v4.0 answers 2011Dân Chơi
 
640 802 exam
640 802 exam640 802 exam
640 802 examliemgpc2
 
352-001-Exam-ADVDESIGN
352-001-Exam-ADVDESIGN352-001-Exam-ADVDESIGN
352-001-Exam-ADVDESIGNKylieJonathan
 
Đề Thi Trắc Nghiệm CCNA Full
Đề Thi Trắc Nghiệm CCNA Full Đề Thi Trắc Nghiệm CCNA Full
Đề Thi Trắc Nghiệm CCNA Full nataliej4
 
CCNP Enterprise 300-425 ENWLSD Questions and Answers
CCNP Enterprise 300-425 ENWLSD Questions and AnswersCCNP Enterprise 300-425 ENWLSD Questions and Answers
CCNP Enterprise 300-425 ENWLSD Questions and Answersdouglascarnicelli
 
H12-811_V1.0-ENU HCIA-Datacom V1.0 Real Questions
H12-811_V1.0-ENU HCIA-Datacom V1.0 Real QuestionsH12-811_V1.0-ENU HCIA-Datacom V1.0 Real Questions
H12-811_V1.0-ENU HCIA-Datacom V1.0 Real QuestionswilliamLeo13
 
Ccna 4 Chapter 1 V4.0 Answers
Ccna 4 Chapter 1 V4.0 AnswersCcna 4 Chapter 1 V4.0 Answers
Ccna 4 Chapter 1 V4.0 Answersccna4discovery
 

Similar to 1. Which of the following is a Cisco IOS feature that can collect .docx (20)

Cisco Certification 500-240 Questions and Answers
Cisco Certification 500-240 Questions and AnswersCisco Certification 500-240 Questions and Answers
Cisco Certification 500-240 Questions and Answers
 
200-301-demo.pdf
200-301-demo.pdf200-301-demo.pdf
200-301-demo.pdf
 
Cisco 200-301 Exam Dumps
Cisco 200-301 Exam DumpsCisco 200-301 Exam Dumps
Cisco 200-301 Exam Dumps
 
Cisco 200-301 Exam Dumps
Cisco 200-301 Exam DumpsCisco 200-301 Exam Dumps
Cisco 200-301 Exam Dumps
 
On tap ccent
On tap ccentOn tap ccent
On tap ccent
 
Test King Virtual Test--Network+
Test King Virtual Test--Network+ Test King Virtual Test--Network+
Test King Virtual Test--Network+
 
Ccna 4 final exam answer v5
Ccna 4 final exam answer v5Ccna 4 final exam answer v5
Ccna 4 final exam answer v5
 
Network (FE)
Network (FE)Network (FE)
Network (FE)
 
Cisco 200-301 Exam Dumps.pdf
Cisco 200-301 Exam Dumps.pdfCisco 200-301 Exam Dumps.pdf
Cisco 200-301 Exam Dumps.pdf
 
Cisco CCNP Enterprise ENCOR 350-401 Real Questions
Cisco CCNP Enterprise ENCOR 350-401 Real QuestionsCisco CCNP Enterprise ENCOR 350-401 Real Questions
Cisco CCNP Enterprise ENCOR 350-401 Real Questions
 
Ccna 3 chapter 1 v4.0 answers 2011
Ccna 3 chapter 1 v4.0 answers 2011Ccna 3 chapter 1 v4.0 answers 2011
Ccna 3 chapter 1 v4.0 answers 2011
 
640 802 exam
640 802 exam640 802 exam
640 802 exam
 
352-001-Exam-ADVDESIGN
352-001-Exam-ADVDESIGN352-001-Exam-ADVDESIGN
352-001-Exam-ADVDESIGN
 
Đề Thi Trắc Nghiệm CCNA Full
Đề Thi Trắc Nghiệm CCNA Full Đề Thi Trắc Nghiệm CCNA Full
Đề Thi Trắc Nghiệm CCNA Full
 
CCNA 200-120 Exam Questions
CCNA 200-120 Exam QuestionsCCNA 200-120 Exam Questions
CCNA 200-120 Exam Questions
 
CCNP Enterprise 300-425 ENWLSD Questions and Answers
CCNP Enterprise 300-425 ENWLSD Questions and AnswersCCNP Enterprise 300-425 ENWLSD Questions and Answers
CCNP Enterprise 300-425 ENWLSD Questions and Answers
 
H12-811_V1.0-ENU HCIA-Datacom V1.0 Real Questions
H12-811_V1.0-ENU HCIA-Datacom V1.0 Real QuestionsH12-811_V1.0-ENU HCIA-Datacom V1.0 Real Questions
H12-811_V1.0-ENU HCIA-Datacom V1.0 Real Questions
 
Ccna 4 Chapter 1 V4.0 Answers
Ccna 4 Chapter 1 V4.0 AnswersCcna 4 Chapter 1 V4.0 Answers
Ccna 4 Chapter 1 V4.0 Answers
 
Ccna dumps
Ccna dumpsCcna dumps
Ccna dumps
 
Ccna guide
Ccna guideCcna guide
Ccna guide
 

More from jackiewalcutt

briefly summarize how the Electoral College works. Explain some of t.docx
briefly summarize how the Electoral College works. Explain some of t.docxbriefly summarize how the Electoral College works. Explain some of t.docx
briefly summarize how the Electoral College works. Explain some of t.docxjackiewalcutt
 
Briefly summarize and analyze two primary sources, identifying their.docx
Briefly summarize and analyze two primary sources, identifying their.docxBriefly summarize and analyze two primary sources, identifying their.docx
Briefly summarize and analyze two primary sources, identifying their.docxjackiewalcutt
 
Briefly respond to the following questions. Use facts and examples t.docx
Briefly respond to the following questions. Use facts and examples t.docxBriefly respond to the following questions. Use facts and examples t.docx
Briefly respond to the following questions. Use facts and examples t.docxjackiewalcutt
 
Briefly in your own words describe the distinction between explicit .docx
Briefly in your own words describe the distinction between explicit .docxBriefly in your own words describe the distinction between explicit .docx
Briefly in your own words describe the distinction between explicit .docxjackiewalcutt
 
Briefly explain   Victoria Australia Covid19 update and impact.docx
Briefly explain   Victoria Australia Covid19 update and impact.docxBriefly explain   Victoria Australia Covid19 update and impact.docx
Briefly explain   Victoria Australia Covid19 update and impact.docxjackiewalcutt
 
Briefly introduce the détente policies of the early 1970s, and des.docx
Briefly introduce the détente policies of the early 1970s, and des.docxBriefly introduce the détente policies of the early 1970s, and des.docx
Briefly introduce the détente policies of the early 1970s, and des.docxjackiewalcutt
 
Briefly explain the role of information systems in an organization.docx
Briefly explain the role of information systems in an organization.docxBriefly explain the role of information systems in an organization.docx
Briefly explain the role of information systems in an organization.docxjackiewalcutt
 
briefly describe, in 2-3 pages, the problemissue and the proble.docx
briefly describe, in 2-3 pages, the problemissue and the proble.docxbriefly describe, in 2-3 pages, the problemissue and the proble.docx
briefly describe, in 2-3 pages, the problemissue and the proble.docxjackiewalcutt
 
Briefly explain the mission of the OSH Act. What is the rationale be.docx
Briefly explain the mission of the OSH Act. What is the rationale be.docxBriefly explain the mission of the OSH Act. What is the rationale be.docx
Briefly explain the mission of the OSH Act. What is the rationale be.docxjackiewalcutt
 
Briefly discuss the various organizational approaches to managing .docx
Briefly discuss the various organizational approaches to managing .docxBriefly discuss the various organizational approaches to managing .docx
Briefly discuss the various organizational approaches to managing .docxjackiewalcutt
 
Briefly explain the identified security issues during Risk Assessmen.docx
Briefly explain the identified security issues during Risk Assessmen.docxBriefly explain the identified security issues during Risk Assessmen.docx
Briefly explain the identified security issues during Risk Assessmen.docxjackiewalcutt
 
Briefly discuss some KSAs for Fighting Cybercrime and submit in a wo.docx
Briefly discuss some KSAs for Fighting Cybercrime and submit in a wo.docxBriefly discuss some KSAs for Fighting Cybercrime and submit in a wo.docx
Briefly discuss some KSAs for Fighting Cybercrime and submit in a wo.docxjackiewalcutt
 
Briefly describe what a monopoly is and give an example using the ch.docx
Briefly describe what a monopoly is and give an example using the ch.docxBriefly describe what a monopoly is and give an example using the ch.docx
Briefly describe what a monopoly is and give an example using the ch.docxjackiewalcutt
 
Briefly describe the spread of industry throughout Europe and into.docx
Briefly describe the spread of industry throughout Europe and into.docxBriefly describe the spread of industry throughout Europe and into.docx
Briefly describe the spread of industry throughout Europe and into.docxjackiewalcutt
 
Briefly describe the path of food through the digestive system and e.docx
Briefly describe the path of food through the digestive system and e.docxBriefly describe the path of food through the digestive system and e.docx
Briefly describe the path of food through the digestive system and e.docxjackiewalcutt
 
Briefly describe the different parenting styles discussed in this we.docx
Briefly describe the different parenting styles discussed in this we.docxBriefly describe the different parenting styles discussed in this we.docx
Briefly describe the different parenting styles discussed in this we.docxjackiewalcutt
 
Briefly describe how the BIOS boots or starts the computer and.docx
Briefly describe how the BIOS boots or starts the computer and.docxBriefly describe how the BIOS boots or starts the computer and.docx
Briefly describe how the BIOS boots or starts the computer and.docxjackiewalcutt
 
Briefly describe how to deploy a Continuous Improvement effort.W.docx
Briefly describe how to deploy a Continuous Improvement effort.W.docxBriefly describe how to deploy a Continuous Improvement effort.W.docx
Briefly describe how to deploy a Continuous Improvement effort.W.docxjackiewalcutt
 
briefly define democracy and evaluate in detail THREE of.docx
briefly define democracy and evaluate in detail THREE of.docxbriefly define democracy and evaluate in detail THREE of.docx
briefly define democracy and evaluate in detail THREE of.docxjackiewalcutt
 
Briefly define, listcontrast, identify the significance of, or .docx
Briefly define, listcontrast, identify the significance of, or .docxBriefly define, listcontrast, identify the significance of, or .docx
Briefly define, listcontrast, identify the significance of, or .docxjackiewalcutt
 

More from jackiewalcutt (20)

briefly summarize how the Electoral College works. Explain some of t.docx
briefly summarize how the Electoral College works. Explain some of t.docxbriefly summarize how the Electoral College works. Explain some of t.docx
briefly summarize how the Electoral College works. Explain some of t.docx
 
Briefly summarize and analyze two primary sources, identifying their.docx
Briefly summarize and analyze two primary sources, identifying their.docxBriefly summarize and analyze two primary sources, identifying their.docx
Briefly summarize and analyze two primary sources, identifying their.docx
 
Briefly respond to the following questions. Use facts and examples t.docx
Briefly respond to the following questions. Use facts and examples t.docxBriefly respond to the following questions. Use facts and examples t.docx
Briefly respond to the following questions. Use facts and examples t.docx
 
Briefly in your own words describe the distinction between explicit .docx
Briefly in your own words describe the distinction between explicit .docxBriefly in your own words describe the distinction between explicit .docx
Briefly in your own words describe the distinction between explicit .docx
 
Briefly explain   Victoria Australia Covid19 update and impact.docx
Briefly explain   Victoria Australia Covid19 update and impact.docxBriefly explain   Victoria Australia Covid19 update and impact.docx
Briefly explain   Victoria Australia Covid19 update and impact.docx
 
Briefly introduce the détente policies of the early 1970s, and des.docx
Briefly introduce the détente policies of the early 1970s, and des.docxBriefly introduce the détente policies of the early 1970s, and des.docx
Briefly introduce the détente policies of the early 1970s, and des.docx
 
Briefly explain the role of information systems in an organization.docx
Briefly explain the role of information systems in an organization.docxBriefly explain the role of information systems in an organization.docx
Briefly explain the role of information systems in an organization.docx
 
briefly describe, in 2-3 pages, the problemissue and the proble.docx
briefly describe, in 2-3 pages, the problemissue and the proble.docxbriefly describe, in 2-3 pages, the problemissue and the proble.docx
briefly describe, in 2-3 pages, the problemissue and the proble.docx
 
Briefly explain the mission of the OSH Act. What is the rationale be.docx
Briefly explain the mission of the OSH Act. What is the rationale be.docxBriefly explain the mission of the OSH Act. What is the rationale be.docx
Briefly explain the mission of the OSH Act. What is the rationale be.docx
 
Briefly discuss the various organizational approaches to managing .docx
Briefly discuss the various organizational approaches to managing .docxBriefly discuss the various organizational approaches to managing .docx
Briefly discuss the various organizational approaches to managing .docx
 
Briefly explain the identified security issues during Risk Assessmen.docx
Briefly explain the identified security issues during Risk Assessmen.docxBriefly explain the identified security issues during Risk Assessmen.docx
Briefly explain the identified security issues during Risk Assessmen.docx
 
Briefly discuss some KSAs for Fighting Cybercrime and submit in a wo.docx
Briefly discuss some KSAs for Fighting Cybercrime and submit in a wo.docxBriefly discuss some KSAs for Fighting Cybercrime and submit in a wo.docx
Briefly discuss some KSAs for Fighting Cybercrime and submit in a wo.docx
 
Briefly describe what a monopoly is and give an example using the ch.docx
Briefly describe what a monopoly is and give an example using the ch.docxBriefly describe what a monopoly is and give an example using the ch.docx
Briefly describe what a monopoly is and give an example using the ch.docx
 
Briefly describe the spread of industry throughout Europe and into.docx
Briefly describe the spread of industry throughout Europe and into.docxBriefly describe the spread of industry throughout Europe and into.docx
Briefly describe the spread of industry throughout Europe and into.docx
 
Briefly describe the path of food through the digestive system and e.docx
Briefly describe the path of food through the digestive system and e.docxBriefly describe the path of food through the digestive system and e.docx
Briefly describe the path of food through the digestive system and e.docx
 
Briefly describe the different parenting styles discussed in this we.docx
Briefly describe the different parenting styles discussed in this we.docxBriefly describe the different parenting styles discussed in this we.docx
Briefly describe the different parenting styles discussed in this we.docx
 
Briefly describe how the BIOS boots or starts the computer and.docx
Briefly describe how the BIOS boots or starts the computer and.docxBriefly describe how the BIOS boots or starts the computer and.docx
Briefly describe how the BIOS boots or starts the computer and.docx
 
Briefly describe how to deploy a Continuous Improvement effort.W.docx
Briefly describe how to deploy a Continuous Improvement effort.W.docxBriefly describe how to deploy a Continuous Improvement effort.W.docx
Briefly describe how to deploy a Continuous Improvement effort.W.docx
 
briefly define democracy and evaluate in detail THREE of.docx
briefly define democracy and evaluate in detail THREE of.docxbriefly define democracy and evaluate in detail THREE of.docx
briefly define democracy and evaluate in detail THREE of.docx
 
Briefly define, listcontrast, identify the significance of, or .docx
Briefly define, listcontrast, identify the significance of, or .docxBriefly define, listcontrast, identify the significance of, or .docx
Briefly define, listcontrast, identify the significance of, or .docx
 

Recently uploaded

MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 

Recently uploaded (20)

MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 

1. Which of the following is a Cisco IOS feature that can collect .docx

  • 1. 1. Which of the following is a Cisco IOS feature that can collect timestamps of traffic sent between a particular source and destination for the purpose of reviewing in an audit? (Select the best answer.) a. CS-MARS b. SNMPv3 c. NetFlow d. RMON 2. Which of the following are not components of a typical CVO implementation? (Select 3 choices.) a. a Cisco 800 series ISR b. a Cisco Unified IP Phone c. a Cisco 3900 series ISR d. a Cisco 600 series AP e. a Cisco 5500 series WLC f. a Cisco 2500 series WLC 3. In a hierarchical network model, which layer of the network handles ACLs and IPS filtering? (Select the best answer.) a. core b. services block c. access d. distribution 4. Which of the following statements are true about a medium branch office design? (Select 2 choices.) a. Rapid PVST+ should be configured to prevent Layer 2 loops. b. A collapsed core should not be implemented. c. ISR integrated 10/100/1000 interfaces should be configured
  • 2. as Layer 3 trunks. d. A single ISR platform is recommended for WAN access. e. A medium branch office design is ideal for up to 200 users. 5. Which of the following best describes how Cisco defines a medium branch office? (Select the best answer.) a. an office that contains between 50 and 100 users and that implements a two-tier design b. an office that contains between 100 and 200 users and that implements a two-tier design c. an office that contains up to 50 users and that implements a one-tier design d. an office that contains between 50 and 100 users and that implements a three-tier design 6. In which of the following layers of the hierarchical network design model should you implement QoS? (Select the best answer.) a. in the core, distribution, and access layers b. in the access and distribution layers only c. in the distribution layer only d. in the core and distribution layers only e. in the access layer only F.in the core layer only 7. In the Cisco enterprise architecture model, which of the following best describes the switches used in the enterprise edge module? (Select the best answer.) a. Both inner and outer switches should use Layer 3 switching exclusively. b. Inner switches should use Layer 2 switching exclusively; outer switches should use a combination of Layer 2 and Layer 3 switching. c. Inner switches should use Layer 3 switching exclusively;
  • 3. outer switches should use a d. combination of Layer 2 and Layer 3 switching. e. Both inner and outer switches should use Layer 2 switching exclusively. f. Inner switches should use a combination of Layer 2 and Layer 3 switching; outer switches should use Layer 3 switching exclusively. g. Inner switches should use a combination of Layer 2 and Layer 3 switching; outer switches should use Layer 2 switching exclusively. h. Inner switches should use Layer 2 switching exclusively; outer switches should use Layer 3 switching exclusively. 8. Which of the following can be used to configure router command authorization? (Select the best answer.) a. Cisco Secure ACS b. Cisco Security MARS c. Cisco Security Agent d. Cisco UCM 9. Which of the following can be used to monitor Cisco network security devices as well as third-party network devices and applications? (Select the best answer.) a. CS-MARS b. CSM c. ACS d. SDM 10. Which of the following can create multiple virtual firewalls? (Select the best answer.) a. an ASA b. a vPC c. an IPS
  • 4. d. a VRF 11. The bit rate of analog voice signals being converted into digital data streams is calculated by using which formula? (Select the best answer.) a. one-fourth of the highest input frequency b. twice the highest input frequency times the sampling rate c. the sampling rate times the size of the code words d. one-half of the sampling rate times the size of the code words 12. Which of the following Cisco NAC appliance components is an optional Windows client-based agent? (Select the best answer.) a. Cisco SSC b. Cisco NAA c. Cisco NAS d. Cisco NAM 13. Which of the following statements best describes deterministic redundancy in WLCs? (Select the best answer.) a. Deterministic redundancy involves APs that are configured with primary, secondary, and tertiary WLCs. b. Deterministic redundancy failover is slower than dynamic redundancy failover. c. Deterministic redundancy designs are less predictable and less stable than dynamic designs. d. Deterministic redundancy is frequently implemented in a salt- and-pepper design. 14. The network you administer has a 1-Gbps link that is used to carry voice and data traffic. Which of the following represents the maximum total bandwidth that should be reserved for voice and data traffic? (Select the best answer.)
  • 5. a. 750 Mbps b. 500 Mbps c. 333 Mbps d. 1,000 Mbps 15. Rapid PVST+ is a Cisco enhancement of which of the following IEEE protocols? (Select the best answer.) a. 802.1Q b. 802.1w c. 802.1s d. 802.1t e. 802.1D 16. Which of the following Cisco NAC appliance components is responsible for enforcing network policies between a trusted network and an untrusted network? (Select the best answer.) a. Cisco NAM b. Cisco NAA c. Cisco SSC d. Cisco NAS 17. Which of the following is responsible for ascertaining the status of security applications and management tools that are installed on a client? (Select the best answer.) a. CSA b. Cisco NAS c. CTA d. Cisco SSC 18. Which of the following best describes jitter? (Select the best answer.)
  • 6. a. serialization delay b. packet loss c. variation in delay d. roaming delay e. end-to-end delay 19. Which of the following values is the maximum end-to-end transit time that can adequately support voice traffic on a VoWLAN? (Select the best answer.) a. 150 ms b. 100 ms c. 1 ms d. 15 ms e. 10 ms 20. Which of the following statements are true about an 802.11b VoWLAN design that is based on best practices? (Select 2 choices.) a. The QBSS load of each AP should be no greater than 33 percent. b. The overlap between adjacent channels should be between 10 and 15 percent. c. The packet error rate of the network should be no greater than 5 percent. d. The end-to-end transfer time should be less than 150 ms for each voice packet. e. The number of simultaneous G.711 calls for an AP should be no greater than seven. 21. Which of the following statements are true regarding the Cisco Unified Wireless Network architecture? (Select 2 choices.) a. A wireless client can be located without the use of a Cisco
  • 7. Wireless Location Appliance. b. A LAP uses LWAPP to communicate with its associated wireless clients. c. A LAP can function independently of a WLC. d. A wireless client can roam between LAPs without refreshing its IP address. e. A WCS server is required for WLAN management. 22. What is the bit rate of analog voice signals being converted into digital data streams with an input frequency of 4 kHz and 8-bit code words? (Select the best answer.) a. 24 Kbps b. 32 Kbps c. 12 Kbps d. 64 Kbps 23. Which of the following is the first action performed on a packet when it is received on a QoS-enabled interface? (Select the best answer.) a. scheduling b. queuing c. shaping d. classification 24. According to Cisco best practices, which of the following percentages is the maximum amount of bandwidth that should be reserved for voice traffic? (Select the best answer.) a. 50 percent b. 66 percent c. 25 percent d. 75 percent e. 33 percent
  • 8. 25. Which of the following statements are true regarding the G.711 codec? (Select 2 choices.) a. G.711 is a Cisco-proprietary codec. b. G.711 has an MOS of 5. c. G.711 is supported on the Cisco 7921G WIP. d. G.711 can provide fewer simultaneous calls than G.729 with the same amount of bandwidth. e. G.711 requires a bit rate of 32 Kbps to support toll-quality voice. 26. Which of the following statements best describes voice traffic? (Select the best answer.) a. Voice traffic is not tolerant of delay. b. Voice traffic uses TCP to carry audio data. c. Voice traffic uses large packets. d. Voice traffic is not deterministic. 27. Which of the following wireless standards are used on the backhaul link of a Cisco AP1510 MAP? (Select 2 choices.) a. 802.11n b. 802.11i c. 802.11b d. 802.11g e. 802.11a 28. Which of the following statements describes Layer 2 inter- controller roaming? (Select the best answer.) a. roaming between LAPs managed by the same WLC on the same IP subnet b. roaming between LAPs managed by different WLCs on the same IP subnet c. roaming between LAPs managed by different WLCs on
  • 9. different IP subnets d. roaming between LAPs managed by the same WLC on different IP subnets e. roaming between LAPs managed by different WLCs in different mobility groups 29. Which of the following statements best describes the Cisco Security Management Suite? (Select the best answer.) a. it is a tool that facilitates and simplifies the operations and management of a Cisco Self-Defending Network. b. It separates the configuration and management to each individual security device on a network. c. It is based on the framework of the PIX that provides firewall and VPN services. d. It is security software that functions primarily as a HIDS and that can be installed on laptops. 30. Which of the following protocols can IPSec use to provide data authentication and data integrity? (Select 2 choices.) a. AH b. ESP c. DES d. AES e. GRE 31. Which of the following statements is true regarding the G.729 codec? (Select the best answer.) a. G.729 is a medium-complexity codec. b. G.729 is commonly used on the PSTN. c. G.729 requires the least bandwidth out of all the codecs supported on Cisco routers. d. G.729 has the highest MOS score out of all the codecs supported on Cisco routers.
  • 10. e. G.729 is the default codec supported on Cisco routers. 32. Which of the following features are provided by IPSec? (Select 3 choices.) a. data origin authentication b. multicast packet encapsulation c. data integrity d. broadcast packet encapsulation e. data confidentiality 33. Cisco IBNS solutions use which of the following technologies to provide security for a network? (Select 3 choices.) a. PAP b. RADIUS c. EAP d. CHAP e. TACACS+ F.IEEE 802.1x 34. Which of the following refers to the process of buffering packets in a software queue on a QoS-enabled interface? (Select the best answer.) a. traffic policing b. scheduling c. classification d. queuing 35. Which of the following is a security appliance that serves as the focal point for security events on a network? (Select the best answer.) a. SNMP b. ASA c. CS-MARS
  • 11. d. IPS 36. Which of the following is a critical component of the Self- Defending Network framework that relies on 802.1x and IBNS? (Select the best answer.) a. trust and identity management b. threat defense c. operational management and policy control d. secure connectivity e. secure network platform 37. According to the Nyquist theorem, what is the minimum rate that should be used when an analog voice signal is sampled? (Select the best answer.) a. two times the highest input frequency b. equal to the highest input frequency c. one-half of the highest input frequency d. one-fourth of the highest input frequency e. four times the highest input frequency 38. Q38: Which of the following are not components of a typical CVO implementation? (Select 3 choices.) a. a Cisco 2500 series WLC b. a Cisco 5500 series WLC c. a Cisco 600 series AP d. a Cisco 3900 series ISR e. a Cisco Unified IP Phone f. a Cisco 800 series ISR 39. Q39: Which of the following managed VPN services can use ATM to transport data over a point-to-point link? (Select the best answer.)
  • 12. a. MPLS L3VPN b. L2VPN c. L3VPN using the Internet d. DMVPN 40. Q40: Which of the following are required components in a Cisco wireless outdoor mesh deployment? (Select 3 choices.) a. a RAP b. a WLC c. an autonomous AP d. a MAP