-
As a Cisco Network Engineer, you have to master the knowledge of the Cisco Storage Area Network solution for the data center. Which three of the following are features of it? ()(Choose three.)
A . It provides multiprotocol support.
B . It allows you to create separate networks on the VSAN.
C . It allows you to migrate to new technologies without a complete equipment upgrade.
D . It reduces cost and complexity by providing an easy transition to evolving technologies.
-
As a Network Engineer, you decide to apply Cisco enterprise solution throughout the CIS network. What are the two advantages? ()(Choose two.)
A . cost savings
B . product variety
C . well-tested interoperability
D . regular upgrade proce
-
As a network engineer, study the exhibit carefully. Router Net is unable to establish an ADSLconnection with its provider. Which action would correct this problem?()https://assets.asklib.com/images/image2/2018072709173169055.jpg
A . On the Dialer0 interface, add the pppoe enable command
B . On the Dialer0 Interface, add the ip mtu 1496 command
C . On the ATM0/0 interface, add the dialer pool-member 1 command
D . On the ATM0/0 interface, add the dialer pool-member 0 command
-
You work as a network engineer for . You study the exhibit carefully.
What happens when the switch 2 is connected to the rest of the network in the VTP domain Lab_Network?()
Exhibit:
https://assets.asklib.com/images/image2/2018073016373365008.jpg
A . The recently introduced switch 2 removes all configured VLANs throughout the VTP domain.
B . The recently introduced switch 2 creates a STP loop in the VTP domain.
C . The recently introduced switch 2 switches over to VTP transparent mode in order to be included into the VTP domain.
D . A trunk should be configured between the two switches in order to integrate 2 into the VTP domain.
E . The recently introduced switch 2 adds one more VLAN to the VLAN database in the VTP domain.
-
As a network technician, do you know what is a recommended practice for secure configurationmanagement?()
A . Disable post scan
B . Use SSH or SSL
C . Enable trust levels
D . Deny echo replies on all edge router
-
As a Network Engineer, you have to master how to deploy Virtual Storage Area Network and what are the results of the deployment. Which two of the following are resulting from its deployment?()
A . reduced backup
B . increased security
C . greater storage demand
D . improved availability
-
You work as a network technician at Certkiller .com. Please study the exhibit carefully. From this Cisco SDM security Audit Wizard screen, what should you do to secure the Router?()https://assets.asklib.com/images/image2/2018073114365065712.jpg
A . Click Next
B . Click Fix All, then Next
C . Click Fix All, then clear CDP check box, then Next, then manually disable CDP on the WAN interface
D . Click Fix All, the clear CDP check box, the Next
E . Click Fix All, then Clear CDP check box, then Next, then Immediately reboot the router
-
As an experienced Network Engineer, you are required to implement the security architecture assessment. Which of the following statement describes the most important reason for that?()
A . Create a design specification document.
B . Integrate routing and switching components.
C . Document power and UPS availability
D . Document the customer's current and future technology projects.
-
Network topology Exhibit:
https://assets.asklib.com/images/image2/2018073108484671566.jpg
You work as a network engineer for. You are required to set up the network being displayed in the network topology exhibit through the console using IOS commands.
A . 正确
B . 错误
-
As a network engineer, you responsibility is to install, configure, operate, and troubleshoot networks. In your company’s network, EIGRP is the routing protocol. You have just discovered that two routers restarted the neighbor relationship.Why? ()
A . An update packet with init flag set from a known, already established neighbor relationship was received by one of the routers.
B . The counters were deleted.
C . The ARP cache was removed.
D . The IP EIGRP neighbor relationship was cleared manually.
-
As an experienced Network Engineer, you are responsible for network connectivity and system configuration. Which of the following protocols will be supported by Cisco Nonstop Forwarding (NSF)?()
A . ISSU,OSPF,IS-IS
B . IETF,OSPF,ISSU
C . IS-IS,EIGRP,SSO,BGP
D . EIGRP,BGP,OSPF,IS-IS
-
Exhibit:
https://assets.asklib.com/images/image2/2018073015201011761.jpg
Exhibit:
You work as a network engineer at Company. You study the exhibit carefully. Which GLBP device hosts receive the MAC address assignment?()
A . R1
B . R2
C . The AVG
D . The AVF
E . None of the other alternatives apply
-
As a Cisco Network Engineer, you have to master the knowledge of the Cisco validated Design (CVD) program. Which three of the following descriptions are appropriate about the CVD program?() (Choose three.)
A . It incorporates a narrow range of technologies and products.
B . It facilitates faster and more reliable customer deployments.
C . It extends the value of designs through a sustained development plan.
D . It incorporates products and technologies into enterprise, service provider, and commercial systems.
-
As a Cisco Network Engineer, you have to master the knowledge of the Cisco validated Design program. Which two of the following descriptions correctly identify its features? ()(Choose two.)
A . It strives to protect access to design documentation.
B . It facilitates customer deployments that are more predictable.
C . It facilitates customer deployments that are less reliable.
D . It incorporates products and technologies into a broad portfolio.
-
You work as a network engineer for . You study the exhibit carefully. From the configuration shown,
what can be determined?()
Exhibit:
https://assets.asklib.com/images/image2/2018073016525496857.jpg
A . The remaining secure MAC addresses will be dynamically learned, converted to sticky secure MAC addresses, and added to the running configuration.
B . Since a voice VLAN is configured in this example, port security should be set for a maximum of 2.
C . The sticky addresses will only be those manually configured MAC addresses enabled with the sticky keyword.
D . A security violation will restrict the number of addresses to a maximum of 10 addresses per access VLAN and voice VLAN. The port will be shut down if more than 10 devices per VLAN attempt to access the port.
-
You work as a network engineer at TestKing.com. You are required to allow establishment of a Telnet session with a router TestKingC.Which set command must be configured?()
A .https://assets.asklib.com/images/image2/2018072717510448028.jpg
B .https://assets.asklib.com/images/image2/2018072717511289780.jpg
C .https://assets.asklib.com/images/image2/2018072717511936039.jpg
D .https://assets.asklib.com/images/image2/2018072717512431070.jpg
E .https://assets.asklib.com/images/image2/2018072717513262336.jpg
F .https://assets.asklib.com/images/image2/201807271751385786.jpg
-
As a Network Engineer in a large-sized company, you have to master the knowledge of the Cisco mobility solution. Which of the following statement most appropriately identifies the characteristics of it?()
A . It provides high-level integrated security from the wireless access point to the client and automatically encrypts voice and data in transit.
B . It allows you to centralize management, automate repetitive tasks, and provision IP services easily.
C . It centralizes your infrastructure and allows you to share resources more effectively by combining separate data centers into an interconnected SAN.
D . It authenticates users and devices so that it is impossible for a rogue device to be connected to the network.
-
You work as a network engineer for. You study the exhibit carefully.
What type of attack would be mitigated by this configuration?()
https://assets.asklib.com/images/image2/201807301624156941.jpg
A . CDP manipulation
B . VLAN hopping
C . MAC spoofing
D . MAC flood attack
E . ARP spoofing
F . spanning tree compromise
-
As an experienced Network Engineer, you are required to characterize an existing CIS network. In such a situation, what is the last step to take?()
A . Perform a network audit.
B . Form an impression about the network.
C . Use traffic analysis to augment organizational input.
D . Prepare and add to the network description.
-
You work as a network engineer for . You study the switch exhibit carefully.
Which two statements are true? ()
Exhibit:
https://assets.asklib.com/images/image2/2018073016342661542.jpg
A . The trust boundary is not on this switch.
B . It is displaying the AutoQos configuration that was initially applied.
C . Interface Fa0/3 trusts allCoS values.
D . The switch does not trust theCoS values of a Cisco IP phone attached to port Fa0/3.
E . The show auto qos command shows the user-defined QoS settings.
F . The show auto qos command does not display user configuration changes currently in effect.
-
You work as a network engineer for . You study the exhibit carefully. Based upon the output shown,
what can you determine?()
Exhibit:
https://assets.asklib.com/images/image2/201807301716517586.jpg
A . VLAN 30 is not operational due to the fact that there are no packet or byte counts indicated.
B . The IP Cisco Express Forwarding configuration is capable of supporting IPv6.
C . Cisco Express Forwarding load balancing has been disabled.
D . SVI VLAN 30 connects directly to the 10.1.30.0/24 network due to a valid glean adjacency.
-
You work as a network engineer, do you know an IPsec tunnel is negotiated within the protection of whichtype of tunnel?()
A . L2F tunnel
B . L2TP tunnel
C . GRE tunnel
D . ISAKMP tunnel
-
https://assets.asklib.com/images/image2/2018073017084243089.jpg
You work as a network engineer for . You study the exhibit carefully.
What best describes the Cisco IOS IP SLA command and output in the exhibit?()
A . verifies which operation types have been enabled for IP SLA source
B . verifies which operation types have been enabled for IP SLA responder
C . verifies which operation types are supported in software
D . verifies enabled operation types that are not running
-
In some ways, the human body is both like a furnace and like an engine. It must have fuel to produce heat as a furnace【C1】______. It must have fuel to produce motion and do【C2】______as an engine does. The nutrients(营养物)which【C3】______energy best are carbohydrates(碳水化合物)and fats. Protein can also be used as fuel. Minerals, vitamins, and water,【C4】______extremely valuable to the body, cannot be used as fuel.
If the body takes in more carbohydrates【C5】______are used for energy, the【C6】______is stored. Two storage places are the liver(肝)and muscles. There is a【C7】______, however, to the amount of carbohydrates they can【C8】______. When they are filled and they always【C9】______be for you to feel your best, excess carbohydrates are changed to fat and【C10】______around the body.
If the body does not take【C11】______a sufficient amount of food, it will use its stored fat for energy. If you【C12】______at all, the body would use up all the stored fats and【C13】______it would use its own protein in order to keep【C14】______as long as possible.
Therefore, the【C15】______amount of food you eat should be in【C16】______with your energy requirements. It is not necessary,【C17】______, for you to go【C18】______counting calories(卡路里)and weighing food. If a person is the【C19】______weight, it is safe to【C20】______that he is eating enough.
【C1】
A.has
B.needs
C.does
D.is