-
In a VoIP network, which type of interface would an analog fax machine connect to?()
A . Type 1
B . Type 2
C . FXS
D . FXO
E . E&M
-
In which two locations in an enterprise network can an IPS sensor be placed?()
A . bridging VLANs on two switches
B . bridging two VLANs on one switch
C . between two Layer 2 devices with trunking
D . between two Layer 2 devices without trunking
E . between a Layer 2 device and a Layer 3 device with trunking
-
Select the three best answers which best describe Private Network-to Network Interface (PNNI) in an ATM network.()
A . It is the Routing protocol used between ATM switches
B . PNNI uses the same Dijsktra algorithm for SPF calculation
C . PNNI and OSPF use the same Database to make cohesive decision for packet forwarding
D . PNNI measures line capacities and delays in addition to simple cost metric
-
You’re a network administer and you issue the command (show port 3/1) on an Ethernet port. To your surprise you notice a non-zero entry in the ’Giants’ column. What could be the cause of this? ()
A . IEEE 802.1Q
B . IEEE 802.10
C . Misconfigured NIC
D . User configuration
E . All of the above
-
You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()
A . Campus
B . Teleworker
C . Branch
D . Data center
-
Which of the following contribute to congestion on an Ethernet network?()
A . Use of full duplex mode.
B . Creation of new collision domain.
C . Creation of new broadcast domain.
D . Addition of hub to the network.
E . Use of switches in the network.
F . Amount of ARP or IPX SAP traffic.
-
Which two actions, when taken in combination, will result in an effective network security solution?()
A . develop a policy for securing the network
B . monitor and test network activities for vulnerabilities
C . implement reflexive access lists
D . implement dynamic access lists
E . select and implement a single comprehensive virus protection program
-
What is the process for creating an NFS mount between two servers in the same network zone?()
A . Export the desired filesystem in the /etc/nfs file, run ’exportfs -a’,create a mount directory on the desired server, and mount the NFS filesystem.
B . Run ’exportfs -a’,export the desired filesystem in the /etc/nfs file,create a mount directory on the desired server, and mount the NFS filesystem.
C . Export the desired filesystem in the /etc/exports file, run ’exportfs -a’,create a mount directory on the desired server,and mount the NFS filesystem.
D . Run ’exportfs -u’,export the desired filesystem in the /etc/exports file, create a mount directory on the desired server,and mount the NFS filesystem.
-
Which statement correctly describes the disabling of IP TTL propagation in an MPLS network?()
A . The TTL field from the IP packet is copied into the TTL field of the MPLS label header at the ingress edge LSR
B . TTL propagation cannot be disabled in an MPLS domain
C . TTL propagation is only disabled on the ingress edge LSR
D . The TTL field of the MPLS label header is set to 255
E . The TTL field of the IP packet is set to 0
-
In which two locations in an enterprise network can an IPS sensor be placed? ()
A . bridging VLANs on two switches
B . bridging two VLANs on one switch
C . between two Layer 2 devices with trunking
D . between two Layer 2 devices without trunking
E . between a Layer 2 device and a Layer 3 device with trunking
-
While using a packet analyzer, you notice four additional bytes being added to the packets in the Company network. Which protocol inserts a four byte tag into the Ethernet frame and recalculates CRC value? ()
A . DTP
B . VTP
C . 802.1Q
D . ISL
E . None of the other alternatives apply
-
Which three functions can an Integrated Services Router perform in a VoIP network?()
A . voice stream mixing for conference calling
B . voice gateway
C . call admission control
D . analog or digital phone interfaces
E . XML application services
F . large scale dial plan applicatio
-
Which command will show the network configuration settings associated with an Ethernet adapter?()
A . lscfg
B . lsdev
C . netstat
D . ifconfig
-
As an experienced Network Engineer, you are required to characterize an existing CIS network. In such a situation, what is the last step to take?()
A . Perform a network audit.
B . Form an impression about the network.
C . Use traffic analysis to augment organizational input.
D . Prepare and add to the network description.
-
You have an Ethernet network. Which of the conditions below can lead to increased congestion on your network?()
A . The use of Full-Duplex Mode.
B . The Creation on New Collision Domains.
C . The Creation on New Broadcast Domains.
D . The Addition of Hubs to the Network.
E . The use of switches in the Network.
F . The Amount of ARP or IPX SAP Traffic.
-
A network administrator receives an error message while tring to configure the Ethernet interface of a router with IP address 10.24.24.24/29.which statement explains the reason for this issue?()
A . The address is a broadcast address
B . The Ehernet interface is faulty
C . VLSM-capable routing protocols must be enable first on the router.
D . This address is a network address.
-
What is the process for creating an NFS mount between two servers in the same network zone?()
A . Export the desired filesystem in the /etc/nfs file, run 'exportfs -a', create a mount directory on the desired server, and mount the NFS filesystem.
B . Run 'exportfs -a', export the desired filesystem in the /etc/nfs file, create a mount directory on the desired server, and mount the NFS filesystem.
C . Export the desired filesystem in the /etc/exports file, run 'exportfs -a', create a mount directory on the desired server, and mount the NFS filesystem.
D . Run 'exportfs -u', export the desired filesystem in the /etc/exports file, create a mount directory on the desired server, and mount the NFS filesystem.
-
Which one of the following actions would actually increase congestion on an Ethernet network?()
A . Increasing the number of collision domains.
B . Micro-segmenting the network.
C . Adding hubs for connectivity to the network.
D . Putting additional switches in the network.
E . Implementing VLANs in the network.
-
Which of the following commands will NOT determine the slot location of an Ethernet adapter in a system?()
A . lsattr -El
B . lsdev -C
C . prtconf
D . lscfg -l
-
What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()
A . RADIUS or LDAP
B . an internal router running EIGRP
C . Reverse Route Injection and OSPF or RIPv2
D . the VPN appliance to be deployed in line with the firewall
-
Patients can差() the attending doctor in the network hospital to make an appointment
A.A.instruction
B.B.decision
C.C.psychologists
D.D.standardize
-
Wiretapping to obtain data in a network is an interruptive action.()
是
否
-
In PTN sync network, sync Ethernet can realize sync of().
A.phase
B.frequency
C.time
D.amplitude
-
In a Bridged 1483 network, which set of commands is used to configure an ATM subinterface?()
<img src='https://img2.soutiyun.com/shangxueba/ask/17124001-17127000/17126077/dc9fe5064199fb9f9cef6d2afb6f11cc.jpg' /><img src='https://img2.soutiyun.com/shangxueba/ask/17124001-17127000/17126077/ef0d6f202b5ced69b5ea9879bbc5e019.jpg' /><img src='https://img2.soutiyun.com/shangxueba/ask/17124001-17127000/17126077/bbd13fb87c2d391ff28b07beae74c453.jpg' />
A.A
B.B
C.C
D.D