企业形象-cisco无线专业化认证AM习题 646-671 10年5月
最新Cisco 640-721考题赏析
最新Cisco 640-721考题赏析CCNA认证标志着具备安装、配置、运行中型路由和交换网络,并进行故障排除的能力。
获得CCNA认证的专业人士拥有相应的知识和技能,能够通过广域网与远程站点建立连接,消除基本的安全威胁,了解无线网络接入的要求。
Cisco认证将帮助你真正开始和发展IT网络职业生涯,选择一条符合你目标的职业道路,并获得专业技能和丰厚的回报。
要获得Cisco认证相应的知识,你可以通过自学或者参加Cisco推荐的与考试要求最匹配的课程培训。
640-721 考试是Cisco 公司的Implementing Cisco Unified Wireless Networking Essentials (IUWNE) 认证考试官方代号,同样也是思科最新推出的一项很重要的认证考试。
思科总裁John Chambers指出:未来思科考试模拟操作题将会增加,以提高思科认证权威性,有些考试中心的旧设备可能已不能应付需求,因此新的CISCO的考试的推出,在一定程度上减少了CISCO考试中心的数目。
而Testinside的640-721 权威考试题库软件是Cisco 认证厂商的授权产品,其所提供的640-721 题库根据640-721 考试的变化动态更新,在Cisco公司考题每次发生变化后,都会承诺2天内更新640-721 题库。
在您使用Testinside的产品之后,还将提供90天的免费更新。
确保640-721 考题的覆盖率始终都在95%以上;并且提供2种640-721 考题大师版本供你选择。
这里给出免费下载640-721 认证考题----下载640-721 PDF 认证考试题库下载TestInside 测试引擎Exam : Cisco 640-721Title : Implementing Cisco Unified Wireless Networking Essentials (IUWNE)1. Cisco Client Management Frame Protection is running on a mobility group with two controllers. For the following options ,which two MFP requirements protect the network? (Choose two.)A. requires the use of a nonbroadcast SSIDB. requires CCXv5C. implements the validation of wireless management framesD. forces clients to authenticate, using a secure EAP method onlyAnswer: BC2. What are the four types of wireless networks?(Choose four)A. Wireless PANB. LANC. MAND. VLANE. WANAnswer: ABCE3. You work as a network technician at , read this subject carefully ,then answer the question. The existing Cisco Unified Wireless Controller is running v5.0 code for both the controllers and the Cisco WCS. A controller has been configured with an appropriate rogue rule condition to report discovered APs to the Cisco WCS. What default alarm level is used to display all rogue APs in the Alarm Summary?A. MajorB. CriticalC. FlashD. MinorAnswer: D4. As a network technician ,you must know Cisco WiSMs . Up to how many Cisco WiSMs are supported in a single mobility group operating under v5.0 code?A. 16B. 12C. 24D. 5Answer: B5. For the following items ,which one correctly describes fading?A. A function of the frequency and should be provided in the cable specification by the vendor.B. Another signal source is producing energy on the channel in which you are trying to operate.C. A time-varying change in the path loss of a link with the time variance governed by the movement of objects in the environment, including the transmitter and receiver themselves.D. The desired signal reaches the receiving antenna via multiple paths, each of which has a different propagation delay and path loss.Answer: C6. The central office is currently using a combination of 4400 and 2100 series WLAN controllers running v4.2 and a variety of LW APP-enabled access points servicing both 2.4 GHz and 5 GHz. The WLAN deployment has been extended to each remote office by implementing a 526 WLAN controller running v4.1 and several 521 access points. Wireless client deployment uses EAP-TLS authentication by use of a centralized RAD IUS server plus 802.11n for performance. After the first remote office deployment, remote office users complain that they are not connecting via 802.11n. Which will most likely cause this problem?A. The 521 AP does not support 5 GHz, which prohibits 802.11n.B. The 521 AP and 526 WLAN controllers do not support A ES, which prohibits 802.11n.C. The 526 WLAN controller does not support external authentication via RAD IUS, prohibiting authentication.D. The 526 WLAN controller does not support 802.11n with either v4.1 or v4.2.Answer: D7. What happens when client exclusion is enabled with a timeout value of zero ?A. Clients are excluded indefinitely.B. Client exclusion is disabled.C. Clients are never excluded.D. Clients must be explicitly included by specifying the MAC address.Answer: A8. Observe the following statements, which limitation applies to the use of the Cisco WLAN Solution Management over Wireless feature?A. Read-write access is not available; only read-only access is supported.B. Controllers must be managed using only secure protocols (that is, SSH and HTTPS), not nonsecure protocols (that is, HTTP and Telnet).C. Uploads and downloads from the controller are not allowed.D. Wireless clients can manage other controllers however not the same controller and AP to which the client is associated.Answer: C相关科目640-802640-816640-553。
Cisco CCNA 认证考试最新真题
Cisco CCNA 认证考试最新真题体验1. The command frame-relay map ip 10.121.16.8 102 broadcast was entered on the router. Which of the following statements is true concerning this command?A.This command should be executed from the global configuration mode.B.The IP address 10.121.16.8 is the local router port used to forward data.C.102 is the remote DLCI that will receive the information.D.The broadcast option allows packets, such as RIP updates, to be forwarded across the PVC2. While troubleshooting a network connectivity problem, a technician observes steady link lights on both the workstation NIC and the switch port to which the workstation is connected. However, when the ping command is issued from the workstation, the output message "Request timed out." is displayed. At which layer of the OSI model does the problem most likely exist?A.the session layerB.the network layerC.the data link layerD.the access layer3. In order to allow the establishment of a Telnet session with a router, which set of commands must be configured?A.router(config)# line console 0router(config-line)# enable password ciscoB.router(config)# line console 0router(config-line)# enable secret ciscorouter(config-line)# loginC.router(config)# line console 0router(config-line)# password ciscorouter(config-line)# loginD.router(config)# line vty 0router(config-line)# password cisco router(config-line)# login4. On point-to-point networks, OSPF hello packets are addressed to which address?A.127.0.0.1B.192.168.0.5C.224.0.0.5D.254.255.255.2555. What should be part of a comprehensive network security plan?A.Allow users to develop their own approach to network security.B.Physically secure network equipment from potential access by unauthorized individualsC.Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgottenD.Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported6. During startup, the router displays the following error message:boot: cannot open "flash:" What will the router do next?A.Because of damaged flash memory, the router will fail the POST.B.It will attempt to locate the IOS from a TFTP server. If this fails, it will initiate the setup dialogC.It will attempt to locate the IOS from a TFTP server. If this fails, it will load a limited IOS from ROM.D.It will attempt to locate the configuration file from a TFTP server. If this fails, it will initiate the setup dialog7. At which OSI layer is a logical path created between two host systems?A.sessionB.transportworkD.physical8. A routing protocol is required that supports:1) routing update authentication2) an addressing scheme that conserves IP addresses3) multiple vendors4) a network with over 50 routersWhich routing protocol fulfills these requirements?A.RIPv1B.RIPv2C.EIGRPD.OSPF9. When a new trunk is configured on a 2950 switch, which VLANs by default are allowed over the trunk link?A.no VLANsB.all VLANsC.only VLANs 1 - 6D.only the VLANs that are specified when creating the trunk10. Which protocol provides a method of sharing VLAN configuration information between switches?A.VTPB.STPC.ISLD.802.1QDBDCB CCDBA博主的更多文章>>CCNA第一学期《Final Examination》2009-02-27 08:58:47 标签:CCNA[推送到技术圈]1请参见图示。
思科认证考试试题
思科认证考试试题该公司针对其产品的网络规划和网络支持推出了工程师资格认证计划(Cisco Career Certification Program,简称CCCP),并要求其在各国的代理拥有这样的工程师,以提高对用户的'服务质量,建立Cisco产品网络工程师的资格认证体系。
ip classlessip default-network 198.0.18.0ip route 0.0.0.0 0.0.0.0 198.0.18.5ip http serverRTR_1#show ip route192.168.36.0/30 is subnetted, 1 subnetsC 192.168.36.12 is directly connected, Serial 0/0192.168.60.0/24 is variably subnetted, 5 subnets, 2 masksC 192.168.60.24/30 is directly connected, Serial0/1D 192.168.60.128/28 [ 90/21026560 ] via 192.168.60.26, 00:00:57, Serial 0/1D 192.168.60.144/28 [ 90/21026560 ] via 192.168.60.26, 00:00:57, Serial 0/1D 192.168.60.96/28 [ 90/21026560 ] via 192.168.36.14, 00:00:57, Serial 0/0192.168.77.0/30 is subnetted, 1 subnetsC 192.168.77.32 is directly connected, FastEthernet0/0C 192.0.18.0/24 is directly connected, Serial 1/0*S 0.0.0.0 via 198.0.18.5Explanation:Step1:Identify the faults in configuration on RTR_1 and RTR_2. As the SIM specifies all other inter connectivity and internet access for the existing locations of the company are working properly.Routing Protocols used in the SIM is EIGRP with AS 212 as provided by exhibit.Faults Identified:Wrong AS (EIGRP 22) provided at RTR_2 (New router)RTR_1 does not advertise the new network between RTR_1 and RTR_2 into EIGRP.We need to correct the above two configuration mistakes to have full connectivityStep2: Correcting the EIGRP AS to 212Wrong AS (EIGRP 22) provided at RTR_2 (New router)All routers that want to exchange routes within EIGRP needs to be in same Autonomous System.Step 2.1:First we need to remove the current wrong EIGRP AS 22 from Router RTR_2Click on Host-F to get CLI of RTR_2RTR_2>enablePassword : cisco (Provided by SIM Q )RTR_2#conf tRTR_2(conf)#Step 2.2:Removing the wrong EIGRP routing process with AS 22RTR_2(conf)#no router eigrp 22The above statement removes all the EIGRP configuration configured for AS 22 .Step 2.3:Adding the correct EIGRP configurationStart the EIGRP routing process with AS 212RTR_2(conf)#router eigrp 212Step 2.4:Advertise the directly connected networks into EIGRP on RTR_2Fa 0/0 - 192.168.77.34Fa 1/0 - 192.168.60.81Fa 0/1 - 192.168.60.65RTR_2(config-router)#network 192.168.60.0RTR_2(config-router)#network 192.168.77.0RTR_2(config-router)#no auto-summaryRTR_2(config-router)#endStep 2.5:Important save the changes made to router RTR_2RTR_2#copy run startStep 3:RTR_1 does not advertise the new network between RTR_1 and RTR_2 into EIGRP.Click on Host-G to get CLI of RTR_1The network 192.168.77.0 is used between RTR_1 Fa0/0 - RTR_2 Fa 0/0This network needs to be advertise into EIGRP routing process at RTR_1RTR_1>enablePassword : cisco (Provided by SIM Q )RTR_1#conf tRTR_1(conf)#Step 3.1:Enter EIGRP routing process for AS 212RTR_1(conf)#router eigrp 212Step 3.2:The network 192.168.77.0 is used between RTR_1 Fa0/0 - RTR_2 Fa 0/0 . Advertise this network into EIGRPRTR_1(config-router)#network 192.168.77.0RTR_1(config-router)#endStep 3.3:Important save the changes made to router RTR_1RTR_1#copy run startVerification:From RTR_2 CLIping RTR_1 Serial 1/0 IP address 198.0.18.6RTR_2#ping 198.0.18.6!!!!!A successful ping shows the new RTR_2 will have fullconnectivity with other routers.Any Questions are welcomed!!!!!。
思科认证CCNA认证试题与答案中文版
思科认证CCNA认证试题与答案中文版思科认证CCNA认证试题与答案中文版思科认证的考试内容包括笔试和实验。
笔试在全球认证的考试中心进行,时间为两个小时。
实验考试只限于思科在全世界范围内指定的6个考点,分别位于美国、澳大利亚、比利时、日本、北京的新世纪饭店以及香港。
实验室考试分为2天,第一天要求学生利用实验室提供的设备建立网络。
第二天由考官故意破坏学员的网络,学员则要想办法查出故障并加以解决。
下面是店铺为大家搜集的相关试题,供大家参考练习。
21、一个B类网络,有5位掩码加入缺省掩码用来划分子网,每个子网最多( )台主机(A) 510(B) 512(C) 1022(D) 2046答案:D22、在路由器中,能用以下命令察看路由器的路由表( )(A) arp -a(B) traceroute(C) route print(D) display ip routing-table答案:D23、DHCP客户端是使用地址( )来申请一个新的IP地址的(A) 0.0.0.0(B) 10.0.0.1(C) 127.0.0.1(D) 255.255.255.255答案:D注释:255.255.255.255是全网广播,DHCP客户端发送全网广播来查找DHCP服务器.24、下面有关NAT叙述正确的是( )(A) NAT是英文“地址转换”的缩写,又称地址翻译(B) NAT用来实现私有地址与公用网络地址之间的转换(C) 当内部网络的主机访问外部网络的时候,一定不需要NAT(D) 地址转换的.提出为解决IP地址紧张的问题提供了一个有效途径答案:ABD25、以下属于正确的主机的IP地址的是( )(A) 224.0.0.5(B) 127.32.5.62(C) 202.112.5.0(D) 162.111.111.111答案:D注释:这个题目不是太严谨,应该加上子网掩码.A:224.0.0.5是多播地址B:127.0.0.0保留作为测试使用C:网络地址26、设置主接口由up转down后延迟30秒切换到备份接口,主接口由down转up后60秒钟切换回主接口的配置为( )(A) standby timer 30 60(B) standby timer 60 30(C) standby timer enable-delay 60 disable-delay 30(D) standby timer enable-delay 30 disable-delay 60答案:D27、在一个以太网中,30台pc通过Quidway R2501路由器s0口连接internet,Quidway R2501路由器配置如下:[Quidway-Ethernet0]ip address 192.168.1.1 255.255.255.0 [Quidway-Ethernet0]quit[Quidway]interface s0[Quidway-Serial0]ip address 211.136.3.6 255.255.255.252[Quidway-Serial0]link-protocol ppp一台PC机默认网关为192.168.2.1,路由器会怎样处理发自这台PC 的数据包?(A) 路由器会认为发自这一台PC的数据包不在同一网段,不转发数据包(B) 路由器会自动修正这一台PC机的IP地址,转发数据包(C) 路由器丢弃数据包,这时候需要重启路由器,路由器自动修正误配(D) 路由器丢弃数据包,不做任何处理,需要重配PC网关为192.168.1.1答案:D注释:PC的默认网关要指向路由器的以太网口的IP地址.28、ISDN B信道速率是()(A) 16kbps(B) 64kbps(C) 144kbps(D) 2048kbps答案:B参考知识点:综合数字业务网(ISDN)由数字电话和数据传输服务两部分组成,一般由电话局提供这种服务。
Cisco认证模拟题
Cisco认证模拟题篇一:思科认证CCNP经典试题第一部分填空题1、在Cisco体系的IGP协议中,RIP的A-D管理距离是,EIGRP的域内A-D管理距离是,EIGRP的域外A-D管理距离是OSPF的A-D管理距离是。
BGP从EBGP学习到的路由学到路由的A-D管理距离是; BGP 从IBGP学习到的路由学到路由的A-D管理距离是。
2、BGP的默认MED值为;其中MED越越优选被用于选路;BGP 从邻居哪里学到的权重为;BGP自己本路由产生的路由(始发路由)产生权重是;BGP的默认本地优先级为:。
3、BGP的邻居分为和。
4、OSPF在那个区域(有区域0,区域1,区域2)广播多路访问(比如以太网,没有出现外部网络),在区域0可以看到类LSA。
如果想看到2类LSA,必须在网络类型;在NSSA区域可以看到类LSA,在纯粹的NASS区域内是否有5类LSA?(回答是或者否)。
5、HSRP包括哪六种状态?6、OSPF在MA网络链路类型的HELLO报文作用?(3种)7、IPV6的本地链路地址是。
(没有/10的写法)8、在选择STP的角色(身份)有哪些?默认STP的收敛时间为配置了portfast后,收敛时间会小于。
9、OSPF发送hello包的组播地址是,EIGRP组播地址是;HSRP发送hello包组播地址是;VRRP发送hello包的组播地址是。
10、目前以太通道最多可以使用通道方式有。
11、BGP在EBGP中使用AS间的环路(确保无环),该属性属于BGP的必遵属性,其中还有哪两个是BGP公认必遵属性为和。
第二部分选择1、在对基于CEF的多层交换(MLS)进行排错的时候,例如解决无法到达特定的IP目标等问题,首先需要先查看哪两张表去验证错误?()A、IP路由表和路由表B、IP路由和CEF邻接关系表C、TCAM中的IPCEFFIB和邻接关系表D、IP路由表和ARP表2、EIGRP位一个混合距离矢量协议,在METRIC值中使用K1-K5五个K值,默认情况下,使用K值分别是()A、K1,K2BK3,K4C、K1,K5D、K1,K33、OSPF中router-id能标识一台设备的身份,下面说法正确的是()A、先选举手工配置,然后选择设备loopback地址大的,在选运行了宣告进OSPF最大的物理接口最大的地址。
CISCO资格认证考试:CISCO试题回忆
CISCO资格认证考试:CISCO试题回忆CISCO资格认证考试:CISCO试题回忆CISCO资格认证考试:CISCO试题回忆hello everyone,i have pass the ccna2.0exam at 2000.8.13.my grade is 870.exam number is 640-507.it has 65 items.given time is 135min,passing score is 822. in my pinion,ccna2.0is a bit hard than mcse,but not so mush if you pass the mcse by yourself(i meannot dumped).the mcse course will help you a lot, as the basis of it is veryhelpful for you to understand the osi 7 models and tcp/ip subnet addressing.ifyou are not a mcse,please study these concepts carefully as it has up to 10items at lease in my exam. i have read my icnd book for three times hardly,anddo the bosom exam software(it s realy a good one). the icnd book is veryimportant as there in my exam are 2 -3 items are taken from the book without alittle changed. the following is my memory about the exam: (the words of thequestion may different)1.drag drop item:just remember:data-- segment-- packet-- fram-- bit2.what command to show hostname with ip address: show host3.in 100baset ,what is base stand for: signal type4.which three way will reset the holdtimer?a.hd timer expiresb.the link state has been changed 04-5-27 22:13:54c.the propotional?? link about the web(i can not remember the details)5.ip address rule:such as network.type6.ip configuration item about subneting,3-4 items(it s easy for mcse)7.the concept about the switch type fragment free :a.read the 50% of the data before forwardb.read the all of the data before forwardanswer: anote: there are 4 answers,one with the word latancy ,the other is with wirespeed and these two are nothing with the question.but the fragment just readthe first 64 bytes before forward,and nothing with the remained two answer,ithink there may be a bug. so i chose a8.identify the start-up file loading from the exibit about the router s setup9.to retrieve the config file:copy start run10.encapsulation: there are 2 items which would give youa graphic aboutseveral node with some encapsulation type.the graphic is just the same one onthe icnd book.just remember to communication,the encapsulation type on both endmust be the same.11.which command can show you the dlci s: show frame-relay12.what is ipx access-list 1 deny 2b 4a stand for?13.config the igrp,which is right?a.igrp 100 network 192.168.1.0 network 10.0.0.0b.igrp 100 network 192.168.1.0 network 10.2.0.0answer: a14.what is vlan s benifit: increase the broadcast domain15.router segement benifit:one broadcast domain,one colliction domain persegment16.after you have delete the startup-configration in the nvram,what mode wouldyou in when you start the router again? setup mode17.to config the initial configuration of the router,which type will you in?setup mode18.which command to set serial0 s clock? clock rate 56000 s019.the concept about the oriented connection.20.which layer should icmp belongs to :network layer21.which command to show the details of the access-list? show access-listsCISCO资格认证考试:CISCO试题回忆相关内容:。
Cisco企业网络、安全和自动化期末考试答案
Cisco企业⽹络、安全和⾃动化期末考试答案1 ⽤户接到⼀个电话,对⽅声称⾃⼰是 IT 服务代表,然后要求⽤户确认⽤户名和⼝令供审计之⽤。
这个电话代表了哪⼀种安全威胁?垃圾邮件匿名键盘记录社会⼯程DDoS2 如果⾮对称算法使⽤公钥加密数据,则使⽤什么来解密数据?私钥其他公钥DH数字证书3 在安全攻击中,僵⼫以哪种⽅式使⽤?它们探查⼀组机器的开放端⼝,以了解正在运⾏哪些服务。
它们是执⾏ DDoS 攻击的受感染的机器。
它们以特定的个⼈为⽬标以获取公司或个⼈信息。
它们是恶意形成的代码段,⽤于取代合法应⽤。
4 下列哪种类型的⿊客会被激发去抗议政治和社会问题?脚本⼩⼦激进⿊客漏洞经纪⼈⽹络犯罪分⼦5 通过实施 MD5 或 SHA 散列⽣成算法确保了哪种安全通信要求?保密性认证完整性不可否认性6 IPS 具有哪项功能?可阻⽌恶意数据包。
对时延没有影响。
主要侧重于识别可能发⽣的事件。
在离线模式下部署。
7请参见图⽰。
很多员⼯会在办公电脑上访问社交媒体,浪费了⼯作时间。
公司希望能够拒绝这种访问。
在这种情况下,最佳的ACL类型是什么,应⽤位置是哪⾥?在R1 G0/0和G0/1接⼝的⼊站⽅向上应⽤扩展ACL在R2连接互联⽹的WAN接⼝的⼊站⽅向上应⽤标准ACL在R1 G0/0接⼝的⼊站⽅向上应⽤标准ACL在R1 G0/0接⼝的出站⽅向上应⽤标准ACL8 以下哪个术语描述了这类⼈:他们是不道德的罪犯,他们破坏计算机或⽹络安全完全是为了个⼈利益,或者纯粹出于恶意?脚本⼩⼦漏洞经纪⼈激进⿊客⿊帽⿊客9请参见图⽰。
在标准 ACL 中,哪⼀命令将⽤于仅允许连接⾄ R2 G0/0 接⼝的⽹络上设备访问连接⾄ R1 的⽹络?access-list 1 permit 192.168.10.96 0.0.0.31access-list 1 permit 192.168.10.0 0.0.0.63access-list 1 permit 192.168.10.0 0.0.0.255access-list 1 permit 192.168.10.128 0.0.0.6310请参见图⽰。
思科考试认证(CISCO)CCNA认证 笔试和实验内容!(1)-思科认证试题
思科考试认证(CISCO)CCNA认证笔试和实验内容!(1)-思科认证试题CCNA (Cisco Certified Network Associate) Certification Exam ObjectivesThe CCNA (640-407) exam will consist of a combination of the following objectives:1) Identify and describe the functions of each of the seven layers of the OSI reference model.2) Describe connection-oriented network service and connectionless network service, and identify the key differences between them.3) Describe data link addresses and network addresses, and identify the key differences between them.4) Define and describe the function of a MAC address.5) Define flow control and describe the three basic methods used in networking.6) Differentiate between the following WAN services: Frame Relay, ISDN/LAPD, HDLC, & PPP.7) Log into a router in both user and privileged modes.8) Use the context-sensitive help facility.9) Use the command history and editing features.10) Examine router elements (RAM, ROM, CDP, show).11) Manage configuration files from the privileged exec mode.12) Control router passwords, identification, and banner.13) Identify the main Cisco IOS commands for router startup.14) Check an initial configuration using the setup command.15) Copy and manipulate configuration files.16) List the commands to load Cisco IOS software from: flash memory, a tftp server, or ROM.17) Prepare to backup, upgrade, and load a backup Cisco IOS software image.18) List the key internetworking functions of the OSI Network layer and how they are performed in a router.19) Describe the two parts of network addressing, then identify the parts in specific protocol address examples.20) List problems that each routing type encounters when dealing with topology changes and describe techniques to reduce the number of these problems.21) Explain the services of separate and integrated multiprotocol routing.22) Describe the different classes of IP addresses [and subnetting].23) Configure IP addresses.24) Verify IP addresses.25) Prepare the initial configuration of your router and enable IP.26) Add the RIP routing protocol to your configuration.27) Add the IGRP routing protocol to your configuration.28) List the required IPX address and encapsulation type.29) Enable the Novell IPX protocol and configure interfaces.30) Monitor Novell IPX operation on the router.<BR。
cisco 642-631最新题库85题
A c t u al T es t s .c omWhich service component in the wireless operate phase helps isolate and resolve an incident?A. Change ManagementB. Configuration ManagementC. Incident ManagementD. Acceptance Test PlanAnswer: CQUESTION NO: 2On a Cisco Aironet 1240AG Series standalone access point, the radio LED is dark blue and blinking,but the status LED and Ethernet LED are both off. What does this indicate?A. A firmware upgrade is in progress.B. An access point buffer overflow is occurring.C. The access point is booting.D. The internal radio has failed.Answer: AQUESTION NO: 3You want to dynamically assign users to an 802.1Q VLAN as a result of their authentication. In order toaccomplish this, which two IETF RADIUS attributes should you configure on the Cisco Secure ACS?(Choose two.)A. 083 Tunnel-PreferenceB. 066 Tunnel-Client-EndpointC. 064 Tunnel-TypeD. 082 Tunnel-Assignment-IDE. 081 Tunnel-Private-Group-IDF. 067 Tunnel-Server-EndpointAnswer: C,EA ct u al T es t s .c omYou are charged with implementing a secure wireless installation which will provide Internetaccess to client devices but will not allow communications between wireless clients. In addition to implementing PSPF or peer-to-peer blocking on the wireless side, which of the following actions should you perform on the wired infrastructure?A. Implement a Cisco Secure IPS sensor.B. Implement 802.1X on the switch ports.C. Take no action, you have achieved your goal.D. Implement a protected port on the access switches.Answer: DQUESTION NO: 5A mobility group is created by a Cisco WLCM and 4402 Series Wireless LAN Controller. A client that isanchored on the Cisco WLCM roams to an access point on the 4402 controller. You then run a debugcommand on the 4402 controller.Which message would best describe the establishment of the tunnel from the foreign controller's perspective?A. Received Mobile Anchor Export messageB. Transmit Plumbing duplex mobility tunnel messageC. Received Plumbing duplex mobility tunnel messageD. Transmit Mobile Anchor Export messageAnswer: DQUESTION NO: 6In order for a controller-based access point to be allowed to participate in aggressive load balancing, itmust have heard the client within how many seconds?A. 15B. 10C. 1D. 5A ct u al T es t s .c omQUESTION NO: 7Which command will enable DHCP debugging on a WLAN controller?A. debugdhcp enableB. debugdhcp packet enableC. enabledebugdhcp packetD. debugdhcp status enableAnswer: BQUESTION NO: 8Choose the service component in the optimize phase which assesses the WLAN system and drivescontinuous improvements by recommending remediation measures including device configuration optimization, capacity planning, traffic analysis, security assessment, and quality issue resolution.A. Technology AssessmentB. Operations AssessmentC. Security AssessmentD. Security AdministrationE. Change ManagementF. Operations Readiness AssessmentAnswer: AQUESTION NO: 9In the operate phase, providing and maintaining reliable, current information about the WLAN systemhardware, software, and applications pertinent to the system's individual components and attributes is part of which service component?A. Problem ManagementB. Configuration ManagementC. Incident ManagementD. Change ManagementA ct u al T es t s .c omQUESTION NO: 10The IOS of a North American Cisco Aironet 1130AG Series standalone access point has become corrupt. You must therefore reload the TFTP firmware. Before you press and hold the MODE button, youshould verify that the file name is which of the following?A. c1130-k9w7-tar.bootB. c1130-k9w7-tar.123-7.JA1.tarC. c1130-k9w7-tar.defaultD. c1130-k9w7-tar.recoverAnswer: CQUESTION NO: 11Which of the following statements explains why it is normally best to have more than one controller-based access point participate in the containment of one rogue access point?A. Clients connected to the rogue access point must be able to connect to the containment controller-based access point.B. Multiple controller-based access points will load-balance the containment task using fewer resourcesthan a single access point.C. Clients connected to the rogue access point may be out of the range of the controller-based access pointproviding containment.D. Each controller-based access point can handle only a limited amount of clients connected to the rogueaccess points.Answer: CQUESTION NO: 12By default, on the WLAN controller for a voice application using Cisco 7921 wireless IP phones,A ct u al T es t s .c omB. 85 percentC. 56 percentD. 55 percentAnswer: AQUESTION NO: 13You are installing a Cisco 4402 Series Wireless LAN Controller. Which type of interface should you useon the controller's distribution port?A. 1000BASE-SX SFPB. 10/100/1000 Mbps RJ45C. 10/100 Mbps RJ45D. 10000BASE-SXAnswer: AQUESTION NO: 14When configuring a WLAN controller for a voice application using Cisco 7920 wireless IP phones,whichtwo general control settings should you select? (Choose two.)A. Multicast onB. Aggressive Load Balancing offC. Multicast offD. AP Fallback onE. Aggressive Load Balancing onF. AP Fallback offAnswer: B,CQUESTION NO: 15You are configuring an RF group of controllers that coordinate Radio Resource Management calculations. What is the maximum number of WLAN controllers that you can add?A ct u al T es t s .c omB. 20C. 12D. 24Answer: BQUESTION NO: 16During the installation of the Cisco WCS version 4.0, an error occurs. Where would you look for theinstallation log, in order to learn more about this error?A. at the root of the installation driveB. in the Cisco WCS installation directoryC. on the desktop of the serverD. in the Cisco WCS\Logs directoryAnswer: CQUESTION NO: 17You review the Failed Attempts logs on an AAA server and find: "unknown network access server error."Which failure could produce this error?A. AAA client and AAA server handshake failureB. supplicant authentication failureC. wrong password used by the supplicantD. failure of the wireless client and AAA server handshakeAnswer: AQUESTION NO: 18When optimizing a standalone point-to-multipoint bridge installation with eight non-root bridges,whichof the following RTS threshold and CWmin settings would be correct for the non-root bridges?A. RTS threshold = 1,CWmin = 4B. RTS threshold = 4000,CWmin = 5A ct u al T es t s .c omD. RTS threshold = 1,CWmin = 5Answer: DQUESTION NO: 19Which service component in the implement phase is typically performed prior to the handover of a wireless solution to the customer's operations organization?A. Systems IntegrationB. Skill AssessmentC. Systems Acceptance TestingD. Wireless CheckE. Project Close OutAnswer: CQUESTION NO: 20Which parameter, when enabled on a standalone access point, gives the highest priority to a voice packet even when QoS is not enabled?A. IGMP SnoopingB. WMMC. QoS Element for Wireless PhonesD. AVVID Priority MappingAnswer: CQUESTION NO: 21One of your customers has decided to deploy location-based services in addition to existing wirelessservices. The customer requires that the additional access points to be deployed in monitor-only mode. The most likely reason for this requirement is that the customer has which of these existing wireless devices?A. Data CollectionB. 802.11b/g VoIPC. 802.11b and g clientsA ct u al T es t s .c omQUESTION NO: 22When assigning a standalone access point a non-root role, which two parameters, other than Role inthe radio network settings, must be configured on the SSID Manager page? (Choose two.)A. Force Infrastructure Devices to associate only to this SSIDB. Set Infrastructure SSIDC. Multiple BSSIDD. Set Data Beacon RateE. Enable IP redirection on this SSIDAnswer: A,BQUESTION NO: 23Which definition best describes the staff training service component within the wireless implement phase?A. develops a training plan and delivers via a custom workshop or e-learningB. helps improve the performance and functionality of the infrastructure operations and network management systemC. reduces the risk of downtime caused by facilities-related problemsD. provides a step-by-step plan detailing the installation and service-commission requirement tasks to bestaged in a controlled implementation environment that emulates a customer networkAnswer: AQUESTION NO: 24Which protocol does the RADIUS server use inside the secure tunnel of EAP-FAST to authenticate theclient when one-time passwords are in use?A. GTCB. MD5C. MS-CHAP v2A ct u al T es t s .c omQUESTION NO: 25What is the recommended distance between controller-based access points for support of roaming?A. 50 feet [15 meters]B. 200 feet [60 meters]C. 150 feet [45 meters]D. 100 feet [30 meters]Answer: DQUESTION NO: 26A Cisco 4404 WLAN controller is being connected to a Cisco 6500 Catalyst Series Switch. How wouldyou interconnect and configure LAG for connectivity and ensure redundancy?A. All four ports from the Cisco WLC terminated to the same Catalyst gigabit module and channel group.B. Ports 1 and 2 from Cisco WLC to Catalyst gigabit module slot 1 channel group 10 and Cisco WLC ports3 and4 to Catalyst gigabit module slot 2 channel group 10.C. All four ports from the Cisco WLC terminated to the same Catalyst gigabit module using twochannel groups.D. Ports 1 and 2 from Cisco WLC to Catalyst gigabit module slot 1 channel group 20 and Cisco WLC ports 3 and 4 to Catalyst gigabit module slot 2 channel group 40.Answer: BQUESTION NO: 27How many WLANs can a Cisco Aironet 1242 in H-REAP mode support when actively connected to awireless controller? A. 4A ct u al T es t s.c omC. 8D. 16Answer: CQUESTION NO: 28Your customer has deployed a Cisco Wireless Location Appliance within its warehouse environment.However, employees there have been experiencing problems when tracking objects using active RFID tags.You use an access point scan to determine if the Location Appliance has been deployed correctly.Making which change to warehouse deployment location services will most likely correct the problem?A. ensure channels are deployed such that they do not overlapB. allow for the automatic containment of rogue access pointsC. ensure each area is covered by a minimum of three access pointsD. ensure a minimum RSSI value of -50Answer: CQUESTION NO: 29Cisco WCS version 4.0 is supported on which operating system?A. Windows 2000 SP4B. Windows Server 2003C. Solaris 10D. VistaE. Windows XP ProAnswer: BQUESTION NO: 30You have very few Cisco 7920 wireless IP phones on your network, but lots of wireless laptops.Youwant to increase the bandwidth available for the laptops by decreasing the bandwidth reserved for theA ct u al T es t s .c omWLAN controller?A. 55 percentB. 75 percentC. 40 percentD. 25 percentAnswer: CQUESTION NO: 31On a Cisco Aironet 802.11 a/b/g wireless LAN client adapter, the status LED and activity LED are alternating on and off. What does this indicate?A. The client card is not associated to the network.B. The client card has awakened from power-save mode.C. The driver has been installed incorrectly.D. The client card has failed.Answer: AQUESTION NO: 32Which Cisco Aironet Series has a built-in digital thermometer designed to protect the radio?A. CiscoAironet 1500 SeriesB. CiscoAironet 1400 SeriesC. CiscoAironet 1200 SeriesD. CiscoAironet 1300 SeriesAnswer: DQUESTION NO: 33Which of the following wireless service components occur in the implement phase?A. Project Kickoff, Staging, Systems Acceptance Testing, Ongoing Support Handoff MeetingB. WLAN Change Management, Security Administration, Technology Assessment, Operations PlanC. Security Assessment, Operations Assessment, Supplier ManagementD. Operations Readiness Assessment, Systems Requirements Validation, Planning Project Kickoff, ServiceA ct u al T es t s .c omAssuranceAnswer: AQUESTION NO: 34Which of the following best describes the purpose of using lifecycle services for deploying an advanced wireless solution?A. Create a more effective sales strategy for partners.B. Reinforce customer confidence in partners selling products.C. Provide a consistent, repeatable, and proven method to ensure the network solution that is deployeddelivers upon the customer's goals for reliability and availability.D. Maximize the number of services required to support advanced technologies.E. More clearly define the roles of account managers, systems engineers, and field engineers.Answer: CQUESTION NO: 35You are configuring a wireless LAN controller for QoS. Which 802.11e user priority tag should you applyto voice applications? A. 3B. 6C. 4D. 1Answer: BQUESTION NO: 36Clients using Cisco-LEAP and EAP-FAST authentication are having no problems logging on to the wireless network, but clients using PEAP are failing to log on. Which situation would result in this type of problem?A. Posture validation has not been enabled.B. The AAA server is set to accept both MS-CHAP v2 and GTC for PEAP authentication.A ct u al T es t s .c omC. Clients and server are not using certificates.D. Clients have been set to validate the server identity.Answer: CQUESTION NO: 37Which three of these user groups are available on Cisco WCS version 4.0? (Choose three.)A. AdminB. Users AssistantC. System MonitoringD. Power UsersE. AdministratorsF. Network OperatorAnswer: A,B,CQUESTION NO: 38On a Cisco 1000 Series controller-based access point, the alarm LED is flashing red, but the other LEDs are off. What is this access point indicating?A. Its IP address already exists.B. It is operating normally.C. It requires a code upgrade.D. It has lost contact with the controller.Answer: AQUESTION NO: 39In which service component of the wireless operate phase are incident trends analyzed to identify patterns and systemic conditions?A. System MonitoringB. Security AdministrationC. Operations SetupD. Problem ManagementAnswer: DA ct u al T es t s .c omYou are trying to change the polling parameters used by the location manager via the Cisco WCS,andyour request is being denied. What is wrong?A. Polling values can be changed only in the maintenance window.B. Polling values can be changed only on the location server.C. Your login does not have the correct permissions.D. You must wait for the location server to become available.Answer: CQUESTION NO: 41A client roams from H-REAP AP1 to H-REAP AP2. The client is unable to associate to H-REAP AP2.H-REAP AP2 has six other clients associated to it, which continue to pass traffic. What has caused this problem?A. H-REAP AP1 has reached its client limit.B. H-REAP AP2 has reached its client limit.C. H-REAP AP2 lost its connection to the controller.D. H-REAP AP1 lost its connection to the controller.Answer: CQUESTION NO: 42If it is properly deployed, a controller-based access point is capable of monitoring all VLANs on a network when you select which of the following modes from the AP Mode drop-down menu on the controller?A. MirrorB. Rogue DetectorC. SnifferD. MonitorAnswer: BA ct u al T es t s .c omThe tag timeout value for a Cisco Wireless Location Appliance should be set to which tag beacon rate?A. 4 to 6 times the tag beaconing rateB. 10 to 12 times the tab beaconing rateC. 8 to 10 times the tag beaconing rateD. 6 to 8 times the tag beaconing rateAnswer: CQUESTION NO: 44Which two service components are performed during the wireless implement phase? (Choose two.)A. Project PlanningB. Configuration ManagementC. Wireless Readiness AssessmentD. Systems Acceptance TestingE. Site Readiness SpecificationAnswer: A,DQUESTION NO: 45The WLAN controller maintains up to how many controller crash files?A. 10B. 5C. 15D. 20Answer: BQUESTION NO: 46What is the maximum number of WLAN controllers that can join a single mobility group?A ct u al T es t s .c omD. 24Answer: DQUESTION NO: 47When configuring Cisco Secure ACS to support wireless EAP authentication, which device must beconfigured as a AAA client?A. Location ApplianceB. controller-based access pointsC. wireless clientsD. Wireless Control SystemE. wireless controllersAnswer: EQUESTION NO: 48How many RADIUS servers can be added to a controller and thereafter assigned to the authentication oraccounting of individual WLAN IDs?A. 14B. 15C. 17D. 16Answer: CQUESTION NO: 49When configuring QoS on a wireless controller, the per-user, real-time bandwidth contract is enforced forwhich of the following protocols?A. IPXA ct u al T es t s .c omAnswer: CQUESTION NO: 50You are installing a Cisco Aironet 1000 Series controller-based access point. When you boot it, all theLEDs on the access point blink together. What does this indicate about the access point?A. duplicate IP addressB. code upgrade in progressC. normal operationD. searching for primary controllerAnswer: BQUESTION NO: 51Your customer has deployed a Cisco Wireless Location Appliance within its warehouse environment.However, employees there have been experiencing problems when tracking objects using active RFID tags.The RFID beacon rate is 10 seconds and you have discovered an issue with the RFID timeout value.Where and how should the RFID value be changed?A. on the Cisco WCS, to 95 secondsB. on the wireless controller, to 45 secondsC. on the wireless controller, to 95 secondsD. on the Cisco WCS, to 45 secondsAnswer: CQUESTION NO: 52EAP-FAST provides a secure tunnel during Phase One to protect the user's authentication credentials.Which of these entities initializes the secure tunnel?A ct u al T es t s .c omA. x.509 certificateB. generic token cardC. preshared keyD. Protected Access CredentialAnswer: DQUESTION NO: 53Which of the following settings will reduce packet overhead and overall latency in a standalone point-to-point bridge deployment?A. enable concatenation on the non-root bridge onlyB. enable concatenation on the root bridge onlyC. enable concatenation on both the root bridge and non-root bridgeD. enable concatenation on the root bridge and set it as desirable on the non-root bridgeE. set concatenation as desirable on the root bridge and enable it on the non-root bridgeAnswer: CQUESTION NO: 54When configuring a Cisco 3845 Integrated Services Router to support 802.11b and g clients,which of the following commands would be correct?A. router (config-if)# speed basic-1.0 2.0 5.5 6.0 9.0 11.0 12.0 18.0 24.0 36.0 48.0 54.0B. router (config-if)# speed 1.0 2.0 5.5 6.0 9.0 basic-11.0 12.0 basic-18.0 24.0 36.0 48.0 54.0C. router (config-if)# speed basic-1.0 2.0 5.5 basic-6.0 9.0 11.0 12.0 18.0 24.0 36.0 48.0 54.0D. router (config-if)# speed 1.0 2.0 5.5 basic-6.0 9.0 11.0 12.0 18.0 24.0 36.0 48.0 54.0Answer: AQUESTION NO: 55You are using standalone Cisco Aironet 1400 Series Wireless Bridges for a nine-mile point-to-pointwireless link between two buildings. Which distance setting should you use for the bridge configured as the root?A. 20 km [12.4 miles]A ct u al T es t s .c omB. 10 km [6.2 miles]C. 5 km [3.1 miles]D. 25 km [15.5 miles]E. 15 km [9.3 miles]Answer: EQUESTION NO: 56Which authentication types are allowed with the Cisco ADU when selecting WPA/WPA2/CCKM underthe security options?A. Cisco-LEAP, EAP-FAST, EAP-PEAP (GTC), EAP-TLSB. Cisco-LEAP, EAP-PSK, EAP-PEAP (MS-CHAP v2), EAP-TLSC. Cisco-LEAP, EAP-FAST, EAP-PEAP (MS-CHAP v2), EAP-TTLSD. Cisco-LEAP, EAP-MD5, EAP-PEAP (GTC), EAP-TTLSAnswer: AQUESTION NO: 57If all client exclusion policies are enabled, on which number of tries will 802.1X authentications be excluded using controller-based access points?A. fiveB. threeC. sixD. fourAnswer: DQUESTION NO: 58The Cisco Lifecycle Services approach for wireless solutions provides a framework for which of thefollowing opportunities?A. partners having a discussion with customers about the minimum service components needed to successfully deploy a wireless solutionB. customers determining a competitor's strategy for adopting advanced technologiesA ct u al T es t s.c omC. partners choosing the right products for their customersD. customers choosing the right products for their networkE. customers defining the correct strategy for advanced technology adoptionAnswer: AQUESTION NO: 59Your customer has deployed a Cisco Wireless Location Appliance within its warehouse environment.However, employees there have been experiencing problems when tracking objects using active RFID tags.The RFID tag data is not being collected.On which device would you verify that RFIDs have been enabled?A. access pointB. location managerC. wireless controllerD. Cisco WCSAnswer: CQUESTION NO: 60Which of the following commands on the wireless interface of a Cisco 3845 Integrated Services Routerallows the SSID to broadcast?A. router (config-ssid)# guest-modeB. router (config-ssid)# advertiseC. router (config-ssid)# enableD. router (config-ssid)# broadcastAnswer: AQUESTION NO: 61In a deployment using standalone access points, clients set up to authenticate with EAP-PEAP or EAP-Cisco Wireless (Cisco-LEAP) cannot authenticate. When you inspect the Failed Attempts report onthe Cisco Secure ACS, you find this error: "Unknown network access server NAS." Which problemA ct u al T es t s .c omhave caused this failure?A. misconfigured IP address of the AAA server on the access pointB. misconfigured EAP type on the access pointC. misconfigured IP address of the access point on the AAA serverD. misconfigured EAP type on the AAA serverAnswer: CQUESTION NO: 62On a Cisco Aironet 1130AG Series standalone access point, the status LED is dark blue and blinking.What does this indicate?A. The internal radio has failed.B. A firmware upgrade is in progress.C. An access point buffer overflow is occurring.D. The access point is booting.Answer: BQUESTION NO: 63Which Cisco Aironet Series devices can be powered using 802.3af inline power?A. CiscoAironet 1400 SeriesB. CiscoAironet 1300 SeriesC. CiscoAironet 1100 SeriesD. CiscoAironet 1240AG SeriesAnswer: DQUESTION NO: 64Which three wireless service components belong to the operate phase? (Choose three.)A. Operations PlanB. Operations AssessmentC. Security AdministrationA ct u al T es t s .c omE. Operations ImplementationF. Incident ManagementAnswer: C,D,FQUESTION NO: 65You are troubleshooting a one-way call problem with a Cisco 7920 wireless IP phone on a standaloneWLAN. What may have caused this problem?A. The minimum data rate is not set to 11 Mbps.B. Publicly Secure Packet forwarding is enabled.C. The access point is set to the least congested channel.D. An address resolution protocol has been disabled.Answer: DQUESTION NO: 66How does a controller-based access point configured to operate in sniffer mode behave?A. allows client traffic, captures data on all channelsB. allows client traffic, captures data on a single channelC. allows no client traffic, captures data on all channelsD. allows no client traffic, captures data on a single channelAnswer: DQUESTION NO: 67Which of these statements is true about SSIDs configured in Cisco ADU?A. SSIDs are not case-sensitive.B. SSIDs must be listed in the same order in the ADU as they are in the access point.C. A maximum of three SSIDs may be configured.D. SSIDs may have a maximum of 16 characters.Answer: CA ct u al T es t s .c omYou have just finished aligning a Cisco Aironet 1400 Series Wireless Bridge link using installation mode.When you set the link back to operational mode you loose association to the root bridge. Which action will correct the problem?A. Configure the bridge to force infrastructure devices to associate only to the SSID parameter.B. Enable passwords on both bridges.C. Configure the distance parameter value.D. Configure the proper channel.Answer: CQUESTION NO: 69On a standalone access point, client association using EAP-Cisco Wireless (Cisco-LEAP) is failing, butassociation using EAP-PEAP is functioning. What needs to be enabled on the standalone access point to correct this issue?A. network EAPB. open authentication plus MACC. open authentication plus EAPD. a shared keyAnswer: AQUESTION NO: 70Select the wireless service component in the implement phase in which operations responsibilities aredefined and transferred to the operate phase team.A. Ongoing Support Handoff MeetingB. Staff TrainingC. Detailed Design DevelopmentD. Staging and System MigrationAnswer: AA ct u al T es t s .c omWhich wireless service component is associated with maintaining historical and current informationabout the WLAN solution?A. Acceptance Test PlanB. Change ManagementC. Incident ManagementD. Configuration ManagementAnswer: DQUESTION NO: 72A Cisco Aironet 1020 controller-based access point has been connected to a Catalyst 3550-24PWRSwitch. However, when it is powered up, the access point fails. What has caused this problem?A. access point does not support 802.11hB. incorrect switch power supplyC. switch port is not enabledD. switch does not support 802.3afE. access point has not been initialized with the primary controllerAnswer: DQUESTION NO: 73You have been called upon to add location-based services into an existing controller-based wireless design which primarily encompasses handheld devices such as barcode scanners and Cisco 7920 wireless IP phones. In which mode should you deploy the additional access points to achieve the density required without excessive co-channel interference?A. tracking modeB. monitor modeC. location modeD. sniffer modeAnswer: BA ct u al T es t s .c omWhich of the following parameter sets must be configured on the Cisco Wireless Location Appliance?A. network connectionsB. location viewsC. access pointsD. object definitionsAnswer: AQUESTION NO: 75A Cisco Wireless Location Appliance has been added to track RFID tags placed on laptops being usedin a school. Classrooms at the school have concrete block walls. During testing, you discover that theaccuracy of the system needs to be improved. You decide to edit the map in the Cisco WCS to add theinterior walls.How many interior walls can you add to improve the accuracy of the location appliance?A. 50B. 150C. 100D. 200Answer: AQUESTION NO: 76You are using ADU and are authenticated and associated to an access point. However, you are unableto obtain an IP address. Which of these has caused this problem?A. invalid SSIDB. invalid WEP keyC. invalid encryption typeD. invalid 802.1X authentication type。
思科认证考试(CCNA)考试模拟题集锦(1-71题)及答案培训资料
思科认证考试(C C N A)考试模拟题集锦(1-71题)及答案思科认证考试(CCNA)考试模拟题集锦(1-71题)及答案19及答案1. [OxNx] During a TFTP transfer using Cisco Routers what is the numeric value, in decimal, of the destination port field of the User Datagram Protocol (UDP) header? a) 96b) 47c) a random number above 1024d) 69e) none of the above2. [CxNx] What is the standard encapsulation method used by Cisco routers for the Internet Protocol (IP) on it’s Ethernet interfaces?a) SNAPb) ARPAc) NOVELL-ETHERd) DARPAe) Ethernet_802.33. [CxNx] What will be the correct command on a Cisco router to set the IP address of an interface assuming you are at the "router(config-if)#" prompt?a) ip address 1.1.1.1 255.255.255.0b) ip address 1.1.1.1c) ip 1.1.1.1d) ip 1.1.1.1 255.255.255.0e) none of the above4. [CxNx] Which commands will display the IP addresses of all interfaces on a Cisco Router? (Choose all that apply)a) show ip routeb) show ip addressc) show ip interfaced) show interfacee) display ip addresses5. [CxNx] Which of the following commands will display the contents of the ARP cache of your Cisco router?a) show ip arp cacheb) show ip routec) show ip arpd) show arpe) there is no way to display the ARP cache6. [CxNx] Reverse Address Resolution Protocol (RARP) is the process:a) Where an IP host resolves it’s IP address by broadcasting it’s MAC address to the network and a BOOTP server assigns it an IP address.b) Where an IP host resolves it’s MAC address by broadcasting to the local network it’s IP address.c) Where an IP host tries to resolve the MAC address of a destination by sending a network broadcast. The destination responds to the broadcast with it’s MAC address.d) Where an IP host resolves a destination IP address by sending a broadcast on the local network and the destination host responds with it’s IP address.7. [OxNx] Which of the following applications requires the connection-oriented layer four protocol, TCP? (Choose all that apply)a) Telnetb) FTPc) TFTPd) SNMPe) none of the above8. [RxNx] Which of the following are link state Routing Protocols.(Choose all that apply.)a) IPb) OSPFc) RIPd) EIGRPe) IS-IS9. [CxNx] Of the following commands, identify the correct one for clearing the IP arp table in memory of the router.a) clear ip arp-cacheb) clear ip arp-tablec) clear arp-cached) clear arp-tablee) clear arp-ram10. [CxNx] Which of the following explains the correct definition of administrative distance as it pertains to Cisco’s IOS?a) The process by which routers select an administrator for an autonomous system.b) The process where a router will select the best path to a destination network.c) The process where a router will distance itself from other routers due to it’s lack of administrative experience.d) The process where a router will prioritize routing protocols so that in the event two routing protocols have conflicting next hop addresses, the routing protocol with the lowest administrative distance will take priority.e) The process where a router will prioritize routing protocols so that in the event two routing protocols have conflicting next hop addresses, the routing protocol with the highest administrative distance will take priority.11. [ExNx] Collisions occur whena) multiple packets are placed on a serial linkb) multiple stations listen for traffic and transmit at the same timec) when multiple tokens are on a ring simultaneouslyd) beaconing process takes place12. [RINx] How many subnets are possible with a Class C address and a subnet mask of255.255.255.252?a) 32b) 30c) 60d) 62e) 413. [RxNx] What commands will list all protocols that are currently being routed? (Choosea) show ip protocolb) show protocolc) show rund) show starte) All of the above14. [xxNx] Which of the following are true of access lists?a) Access list should have at least one permit statement.b) The last configured line should always be a permit statement.c) Every access-list will implicitly deny all traffic.d) Access-lists are processed top down.e) All of the above.15. [xxNx] If the access-group command is configured on an interface and there is noaccess-list created which of the following is most correct?a) An error message will appear.b) The command will be executed and deny all traffic out.c) The command will be executed and permit all traffic out.d) The command will be executed and permit all traffic in and out.e) The command will be executed and deny all traffic in and out.16. [xxNx] What is the result of the command?" access-list 101 permit tcp any 172.16.0.0 0.0.255.255 established"a) telnet sessions will be permitted regardless of the source addressb) telnet sessions will be denied regardless of the source addressc) telnet sessions will be denied if initiated from any address other than 172.16.0.0networkd) telnet sessions will be permitted to the 172.16.0.0 network onlye) telnet sessions will be denied to the 172.16.0.0 network only17. [xxNx] Which is generally true of the location of access-lists? (Choose all that apply.)a) Standard lists will most likely be placed close to the destination.b) Standard lists will most likely be placed close to the source.c) Extended lists will most likely be placed close to the destination.d) Extended lists will most likely be placed close to the source.e) It does not matter.18. [RxNx] Which of the following is most correct?a) IP is to TCP. as IPX is to SPX.b) RTMP is to Appletalk as IP RIP is to IP.c) NLSP is to IPX as OSPF is to IP.d) a is true.e) b is true.f) a & b are true.g) c is true.h) b & c are true.i) a, b and c are true.19. [ExNx] If Host A sends a packet to Host B over ethernet and Host B is not active:a) The packet will time out.b) The packet will be removed by Host A.c) The NVRAM of Host B will remove the packet.e) The packet will be removed by the token monitor.Coding Key and InformationThe first character represents the category of question.A - ATMB - BridgingC - Cisco specificE - EthernetF - Frame relayH - HDLCI - FDDIN - ISDNO - OSI modelP - PPPR - RoutingS - SwitchingT - Token ringX - X.25x - Not applicableThe second character represents protocol.A - AppletalkB - Banyan VinesD - DecnetI - IPL - Dial on DemandN - NLSPO - OSPFX - IPXx - Not ApplicableThe third character represents the certification that the question will help you prepare for.N - CCNA Exam #640-407P - CCNPAdvanced Cisco Router Configuration (ACRC) Exam 640-403Cisco LAN Switch Configuration (CLSC) Exam #640-404Cisco Monitoring and Troubleshooting Dial-up Services Exam #640-405Cisco Internetworking Troubleshooting ( CIT) Exam #640-406D - CCDA & CCDPCisco Design Specialist Exam #9E0-004Cisco Internetwork Design#640-025We will reserve the fourth character for future use.As an example, when you come across a question coded "BXDx", it signifies a question that will help you gain the CCDA or CCDP certification.CCNA试题1-19答案1. [OxNx] During a TFTP transfer using Cisco Routers what is the numeric value, in decimal,a) 96b) 47c) a random number above 1024d) 69e) none of the aboveAnswerd) 69Here is a sampling of other port numbers and the application they are associated with. The first 8 of these protocols are automatically forwarded through the router by using thehelper-address commandTrivial File Transfer (TFTP) (port 69)Domain Name System (port 53)IEN-116 Name Server (port 42)Time service (port 37)NetBIOS Name Server (port 137)NetBIOS Datagram Server (port 138)Boot Protocol (BootP) client and server datagrams (port 67)TACACS service (port 49)Simple Mail Transfer Protocol (25)File Transfer Protocol (21)Simple Network Management Protocol (161)2. [CxNx] What is the standard encapsulation method used by Cisco routers for the Internet Protocol (IP) on it’s Ethernet inte rfaces?a) SNAPb) ARPAc) NOVELL-ETHERd) DARPAe) Ethernet_802.3Answerb) ARPASNAP is the default encapsulation for a token ring interface NOVELL-ETHER is the default encapsulation for a ipx interface.3. [CxNx] What will be the correct command on a Cisco router to set the IP address of an interface assuming you are at the "router(config-if)#" prompt?a) ip address 1.1.1.1 255.255.255.0b) ip address 1.1.1.1c) ip 1.1.1.1d) ip 1.1.1.1 255.255.255.0e) none of the aboveAnswera) ip address 1.1.1.1 255.255.255.0If you are not in the configuration mode, the ip address can be set by using the setup mode. Configuring interface Ethernet0/0:Is this interface in use? [yes]:IP address for this interface [10.10.10.1]: 10.10.10.1Number of bits in subnet field [16]: 16Class A network is 10.0.0.0, 16 subnet bits; mask is /24Take note when using the setup mode the mask is configured using the number of subnet bits.4. [CxNx] Which commands will display the IP addresses of all interfaces on a Cisco Router? (Choose all that apply)a) show ip routeb) show ip addressc) show ip interfaced) show interfacee) display ip addressesAnswerc) show ip interfaced) show interfaceExamples of each of these commands are shown below:Router_A#sh int e0/0Ethernet0/0 is up, line protocol is upHardware is AmdP2, address is0010.7b15.bd41(bia 0010.7b15.bd41)Internet address is 10.10.10.1/24MTU 1500 bytes, BW 10000 Kbit,DLY 1000 usec,rely 255/255, load 1/255Encapsulation ARPA, loopback not set,keepalive set (10 sec)ARP type: ARPA, ARP Timeout 04:00:00Last input never, output 00:00:06,output hang neverLast clearing of "show interface"counters neverQueueing strategy: fifoOutput queue 0/40, 0 drops;input queue 0/75,0 drops5 minute input rate 0 bits/sec,0 packets/sec5 minute output rate 0 bits/sec,0 packets/sec0 packets input, 0 bytes,0 no bufferReceived 0 broadcasts, 0 runts,0 giants,0 throttles, 0 input errors, 0 CRC,0 frame, 0 overrun, 0 ignored,0 input packets with dribblecondition detected127 packets output, 11802 bytes,0 underruns0 output errors, 0 collisions,2 interface resets0 babbles, 0 late collision,0 deferred0 lost carrier, 0 no carrier0 output buffer failures, 0 outputbuffers swapped outRouter_A#sh ip int e0/0Ethernet0/0 is up, line protocol is upInternet address is 10.10.10.1/24Broadcast address is 255.255.255.255Address determined bynon-volatile memoryMTU is 1500 bytesHelper address is not setDirected broadcast forwarding is enabledOutgoing access list is not setInbound access list is not setProxy ARP is enabledSecurity level is defaultSplit horizon is enabledICMP redirects are always sentICMP unreachables are always sentICMP mask replies are never sentIP fast switching is enabledIP fast switching on the sameinterface is disabledIP multicast fast switching is enabledRouter Discovery is disabledIP output packet accounting is disabledIP access violation accounting isdisabledTCP/IP header compression is disabledProbe proxy name replies are disabledGateway Discovery is disabledPolicy routing is disabledNetwork address translation is disabled5. [CxNx] Which of the following commands will display the contents of the ARP cache of your Cisco router?a) show ip arp cacheb) show ip routed) show arpe) there is no way to display the ARP cacheAnswerc) show ip arpExample:Router_A#sh ip arpProtocol Address Age(min) Hardware Address Type InterfaceInternet 1.1.1.2 - 0010.7b15.bd50 ARPA FastEthernet1/0Internet 10.10.10.1 - 0010.7b15.bd41 ARPA Ethernet0/06. [CxNx] Reverse Address Resolution Protocol (RARP) is the process:a) Where an IP host resolves it’s IP address by broadcasting it’s MAC address to the network and a BOOTP server assigns it an IP address.b) Where an IP host resolves it’s MAC address by broadcasting to the local network it’s IP address.c) Where an IP host tries to resolve the MAC address of a destination by sending a network broadcast. The destination responds to the broadcast with it’s MAC address.d) Where an IP host resolves a destination IP address by sending a broadcast on the local network and the destination host responds with it’s IP address.e)There is no such process.Answera) Where an IP host resolves it’s IP address by broadcasting it’s MAC address to the network and a BOOTP server assigns it an IP address.Choice C describes Address Resolution Protocol (ARP). A host never has to resolve it’s o wn MAC address. The MAC address is burned into the Network Interface card. When the host is booted the MAC address will be loaded into memory.7. [OxNx] Which of the following applications requires the connection-oriented layer four protocol, TCP? (Choose all that apply)a) Telnetb) FTPc) TFTPd) SNMPe) none of the aboveAnswera) Telnetb) FTPTFTP and SNMP use layer 4 UDP.8. [RxNx] Which of the following are link state Routing Protocols.(Choose all that apply.)a) IPb) OSPFc) RIPd) EIGRPe) IS-ISb) OSPFe) IS-ISA link state routing protocol advertises, to it’s neighbors, the state of the link whenthe state of the link changes.A distance vector routing protocol advertises its routing table periodically.9. [CxNx] Of the following commands, identify the correct one for clearing the IP arp table in memory of the router.a) clear ip arp-cacheb) clear ip arp-tablec) clear arp-cached) clear arp-tablee) clear arp-ramAnswerc) clear arp-cacheIf you have changed an ip address or a NIC card on a host you might use this command toreset the cache.10. [CxNx] Which of the following explains the correct definition of administrativedistance as it pertains to Cisco’s IOS?a) The process by which routers select an administrator for an autonomous system.b) The process where a router will select the best path to a destination network.c) The process where a router will distance itself from other routers due to it’s lack of administrative experience.d) The process where a router will prioritize routing protocols so that in the event two routing protocols have conflicting next hop addresses, the routing protocol with the lowest administrative distance will take priority.e) The process where a router will prioritize routing protocols so that in the event two routing protocols have conflicting next hop addresses, the routing protocol with thehighest administrative distance will take priority.Answerd) The process where a router will prioritize routing protocols so that in the event two routing protocols have conflicting next hop addresses, the routing protocol with the lowest administrative distance will take priority.Cisco uses administrative distances (AD) to measure the reliability of the routing protocol. The lower the (AD) the more reliable the protocol.Router_C#sh ip routeCodes: C - connected, S - static,I - IGRP, R - RIP,M - mobile, B - BGPD - EIGRP, EX - EIGRP external, O - OSPF,IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPFNSSA external type 2E1 - OSPF external type 1,E2 - OSPF external type 2,i - IS-IS, L1 - IS-IS level-1,L2 - IS-IS level-2, * -candidate defaultU - per-user static route, o - ODRGateway of last resort is not set172.16.0.0/24 is subnetted, 2 subnetsC 172.16.1.0 is directly connected,Serial1C 172.16.2.0 is directly connected,Serial0I 10.0.0.0/8 [100/8576] via 172.16.1.1,00:00:09, Serial1[100/8576] via 172.16.2.1, 00:00:19,Serial0The 100 in bold is the administrativedistance for IGRP.A partial list of administrative distances is included below:Protocol ADEIGRP 90IGRP 100OSPF 110RIP 120BGP 180If a router hears a IP RIP and a IGRP update for the same network the router will discard the rip information. IP RIP uses h op count as it’s metric, while IGRP uses a composite metric including bandwidth and load, speed is the primary consideration.11. [ExNx] Collisions occur whena) multiple packets are placed on a serial linkb) multiple stations listen for traffic and transmit at the same timec) when multiple tokens are on a ring simultaneouslyd) beaconing process takes placeAnswerb) multiple stations listen for traffic and transmit at the same timeCollisions is a term that is used in an ethernet environment. Ethernet can be described as a listen then transmit scenario. First a station will listen for traffic if no traffic is sensed then a transmission will take place. If two stations transmit at the same time collisions will occur. The first station to detect the collision sends out a jamming signal to alert all stations a collision has occurred. At this point these stations set up a random interval timer when the timer expires re-transmission will occur.Token ring is a token passing process a station can transmit only when he has the token. There never can be multiple tokens on the ring. Early token release allows up to two data frames to be transmitted on a token ring LAN at the same time. Collisions do not occur on a token ring.Because of the point to point nature of serial links collisions do not occur.Beaconing is a term used in a token passing environment.12. [RINx] How many subnets are possible with a Class C address and a subnet mask of 255.255.255.252?a) 32b) 30c) 60d) 62e) 4Answerd) 62The above mask is using 6 bits to describe subnets. The formula used to determine the number of subnets (not including the all 0’s or all 1’s subnet) is 2n - 2 were n is the number of subnet bits. This is the number to use when configuring a ip address with the setup dialog.13. [RxNx] What commands will list all protocols that are currently being routed? (Choose all that apply.)a) show ip protocolb) show protocolc) show rund) show starte) All of the aboveAnswerb) show protocolc) show runShow ip protocol will show just the ip routing protocols that are currently configured. Show start may or may not show the current routed protocols.Below is the output of show protocolRouter_B#show protocolGlobal values:Internet Protocol routing is enabledAppletalk routing is enabledBRI0 is administratively down, line protocol is downBRI0:1 is administratively down, line protocol is downBRI0:2 is administratively down, line protocol is downSerial0 is administratively down, line protocol is downSerial1 is administratively down, line protocol is downSerial2 is administratively down, line protocol is downSerial3 is administratively down, line protocol is downTokenRing0 is administratively down, line protocol is down14. [xxNx] Which of the following are true of access lists?a) Access list should have at least one permit statement.b) The last configured line should always be a permit statement.c) Every access-list will implicitly deny all traffic.d) Access-lists are processed top down.e) All of the above.Answere) All of the above.Every access list has an implicit deny all at the end. What would the need be to create a access list with just deny statements. Access-list are processed from the top downtherefore the order of each statement could be critical, for instance suppose you createdan access list and the first line was a permit any and the next line was a deny. Sinceit’s top down processing a packet would be permitted to pass on the first line and the second line would never be executed. An extended list will give you a "match count" thatwill help in determining what the most efficient order should be.15. [xxNx] If the access-group command is configured on an interface and there is noaccess-list created which of the following is most correct?a) An error message will appear.b) The command will be executed and deny all traffic out.c) The command will be executed and permit all traffic out.d) The command will be executed and permit all traffic in and out.e) The command will be executed and deny all traffic in and out.Answerd) The command will be executed and permit all traffic in and out.There are two steps to use an access list .1. Create the list2. Place the access list on a interfaceThe analogy I use in class is:Suppose you reside in a gated community. The community is not protected until you hire the guard and then place him at the gate. If you hire the guard and never place him at the gateall traffic will be permitted.When there is no access list on an interface it is implicit permit anyWhen an access list is placed on a interface it is implicit deny any16. [xxNx] What is the result of the command?" access-list 101 permit tcp any 172.16.0.0 0.0.255.255 established"a) telnet sessions will be permitted regardless of the source addressb) telnet sessions will be denied regardless of the source addressc) telnet sessions will be denied if initiated from any address other than 172.16.0.0networkd) telnet sessions will be permitted to the 172.16.0.0 network onlye) telnet sessions will be denied to the 172.16.0.0 network onlyAnswerc) telnet sessions will be denied if initiated from any address other than 172.16.0.0networkThe secret to this question is the key word "established." Established means that thepacket will be permitted unless it is the first part of the three way handshake. Recallthat when we initiate a TCP connection we have no ACK. How can we acknowledge a sequence number from the other side when we have not established a session with him?17. [xxNx] Which is generally true of the location of access-lists? (Choose all that apply.)a) Standard lists will most likely be placed close to the destination.b) Standard lists will most likely be placed close to the source.c) Extended lists will most likely be placed close to the destination.d) Extended lists will most likely be placed close to the source.e) It does not matter.Answera) Standard lists will most likely be placed close to the destination.d) Extended lists will most likely be placed close to the source.A standard list will only check the source address. It makes no difference where the packet is going. If you place a standard list close to the source you could very well be denying that traffic to go to other destinations. An extended list can be placed close to the source because we can permit or deny traffic based upon the source and destination address. This insures that only traffic we wish to have denied is denied.18. [RxNx] Which of the following is most correct?a) IP is to TCP. as IPX is to SPX.b) RTMP is to Appletalk as IP RIP is to IP.c) NLSP is to IPX as OSPF is to IP.d) a is true.e) b is true.f) a & b are true.g) c is true.h) b & c are true.i) a, b and c are true.Answeri) a, b and c are true.19. [ExNx] If Host A sends a packet to Host B over ethernet and Host B is not active:a) The packet will time out.b) The packet will be removed by Host A.c) The NVRAM of Host B will remove the packet.d) The packet will "die" when it reaches the terminator.e) The packet will be removed by the token monitor.Answerd) The packet will "die" when it reaches the terminator.20—39及答案20. [TxNx] If Host A sends a packet to Host B over token ring, and Host B is not active: a) The packet will time out.b) The packet will be removed by Host A.c) The NVRAM of Host B will remove the packet.d) The packet will "die" when it reaches the terminator.e) The packet will be removed by the token monitor.21. [TxNx] If Host A sends a packet to Host B over token ring: Host A dies after transmitting, and Host B is not active:a) The packet will time out.b) The packet will be removed by Host A.c) The NVRAM of Host B will remove the packet.d) The packet will "die" when it reaches the terminator.e) The packet will be removed by the Active monitor.22. [FxNx] BECN and FECN are:a) Used to provide keepalives in a Frame Relay environmentb) Used to provide error checking in a Frame Relay environmentc) Used to provide congestion information in a Frame Relay environmentd) Used to provide flow control parameters in a Frame Relay environmente) BECN and FECN are not used in a Frame Relay environment.23. [RxNx] Which of the following are benefits of a Link-State routing protocol? (Chooseall that apply.)a) Allows the use of a more robust addressing scheme.b) Allows for a larger scalable networkc) Reduces convergence timed) Allows "supernetting"e) All of the above.24. [OxNx] Which of the following are reasons for the OSI model?a) Standardizes interfacesb) Allows modular engineeringc) Facilitates learning and teachingd) All of the above.25. [RxNx] Which of the following is NOT a ROUTING protocol:a) OSPFb) RIPc) IPXd) EIGRPe) NLSP26. [RxNx] Which statement is NOT true about link state protocols:a) Link state advertisements are sent to all routers in an area.b) Each router executes the SPF algorithm.c) Link state routers keep a topological database of the network.d) Link state routers include the originating router s routing table.e) Link state routers know of possible alternate paths to a particular network.27. [RxNx] Which of the following would NOT appear in a routing table?a) Next hop addressb) Interface Port referencesc) MAC addressd) Network addresse) Metrics28. [OxNx] Which statement is true of the Datalink OSI layer ?a) 802.3 is the MAC sub layer.b) No such thingc) MAC sublayer provides the connection to the network layer.d) MAC sublayer uses SAPS to access the network layer.e) SAP sublayer uses the MAC layer to access the LAN medium.29. [RINx] Given the IP address of 193.243.12.43 and a subnet mask of 255.255.255.128, what is the subnet address?a) 194.243.12.32b) 193.243.0.0c) 194.243.12.43d) 193.243.12.128e) None of the above.30. [CxNx] Cisco uses a naming convention to identify frame types. Which four of the following mappings are correct?Cisco_name = Common_namea) cisco_II = Ethernet_IIb) arpa = Ethernet_IIc) sap = Ethernet_802.3d) sap = Ethernet_802.2 LLCe) Novell Ether = Ethernet_802.2 LLCf) cisco_802 = Ethernet_802.2 LLCg) snap = Token Ring Snaph) snap = Ethernet_SNAP31. [RxNx] In order to communicate throughout an internetwork, which of the following are required. Choose Two.a) The use of a routable protocol such as NetBEUI or LATb) A hierarchical naming scheme server such as DNSc) A host file at each communicating deviced) A two part network addressing scheme such as Network/Hoste) The use of a routable protocol such as IP or IPXf) The use of a routable protocol such as TCP or IPX32. [CxNx] What is the default route on an IP network? Choose one.a) This is the route that will be chosen first by IP for delivery of a datagram.b) The address of the nearest downstream neighbor in a Token ring network.c) At the router, it is the route used to direct frames for which the next hop has not been explicitly listed in the routing table.d) Any static route listing in a routing table.e) When all conditions are equal, the best route for delivery of IP datagrams.33. [CxNx] A caret symbol (^) inserted into a failed command indicates which of the following. Choose one.a) Numeric data is required for this command.b) The point in a command where you can simply press return to complete the syntax string.c) The point in a command where you have entered an incorrect command, keyword or argument.d) The point in a command where you must enter a required value.e) This is a normal indicator for any failed command.34. [RXNx] The metric used by IPX RIP is:a) hopsb) ticksc) costd) ticks and hopse) None of the above.35. [xINx] Which one of the following masks has the nickname of the "serial mask"?a) 255.255.255.192b) 255.255.255.224c) 255.255.255.240d) 255.255.255.248e) 255.255.255.252。
ccnp测试题及答案
ccnp测试题及答案1. 在CCNP认证中,关于VLAN的以下哪个说法是正确的?A. VLAN是将交换机端口划分为多个广播域B. VLAN是将路由器端口划分为多个广播域C. VLAN是将无线接入点划分为多个广播域D. VLAN是将服务器划分为多个广播域答案:A2. 在Cisco网络设备中,哪个命令用于创建一个新的VLAN?A. `switchport mode access`B. `switchport mode trunk`C. `vlan database`D. `configure terminal`答案:C3. 以下哪个协议用于在不同VLAN之间路由?A. EIGRPB. OSPFC. RIPD. VTP答案:A4. 在Cisco设备上,如何将接口配置为Trunk模式?A. `switchport mode access`B. `switchport mode trunk`C. `interface vlan 1`D. `interface fastethernet 0/1`答案:B5. 以下哪个命令用于在Cisco设备上查看VLAN信息?A. `show vlan`B. `show interfaces`C. `show ip interface brief`D. `show running-config`答案:A6. 在CCNP考试中,关于EIGRP协议的以下哪个说法是错误的?A. EIGRP是一个距离矢量路由协议B. EIGRP使用DUAL算法计算最短路径C. EIGRP支持VLSM和CIDRD. EIGRP仅在Cisco设备上可用答案:D7. 在Cisco设备上,如何配置EIGRP的自动汇总?A. `router eigrp 100`B. `no auto-summary`C. `ip summary-address eigrp 100 0.0.0.0 0.0.0.0`D. `metric weights 0 1 1 1 0 0 0 1`答案:C8. 以下哪个命令用于在Cisco设备上查看EIGRP邻居?A. `show ip eigrp neighbors`B. `show ip ospf neighbors`C. `show ip rip neighbors`D. `show ip eigrp interface`答案:A9. 在CCNP考试中,关于OSPF协议的以下哪个说法是正确的?A. OSPF仅在Cisco设备上可用B. OSPF使用RIP算法计算最短路径C. OSPF支持VLSM和CIDRD. OSPF使用广播来发现邻居答案:C10. 在Cisco设备上,如何配置OSPF的Hello和Dead间隔?A. `ip ospf hello-interval 10`B. `ip ospf dead-interval 40`C. `timers 10 40`D. `ospf hello-interval 10 dead-interval 40`答案:C结束语:以上是CCNP测试题及答案,希望对您的学习和准备有所帮助。
网络原理与CISCO认证(二)复习题及参考答案
网络原理与CISCO 认证(二)一. . 单选单选单选 1. 1. 1. 下面哪一项不是添加完下面哪一项不是添加完VLAN 以后所得到的益处以后所得到的益处? ? ? ((2分)分) A. A. A.交换机确实需要交换机确实需要得到配置B.B.在一个在一个VLAN 范围内物理上被移动的节点不改变网络地址C.C.机密数据可以得到保护机密数据可以得到保护D.D.可以取消那些阻碍用户分组的物理界限可以取消那些阻碍用户分组的物理界限★标准答案:★标准答案:A A2. 2. 标准的访问列表在数据包源标准的访问列表在数据包源IP 地址和它被指定协议组的基础上禁止或允许对一个数据包进行路由选。
A.A.正确正确B.B.错误错误★标准答案:★标准答案:B B3. 3. 哪种广域网服务可被路由器使用哪种广域网服务可被路由器使用哪种广域网服务可被路由器使用? A.? A.? A.帧中继帧中继B.ISDNC.PPPD.D.以上都是以上都是★标准答案:★标准答案:D D4. PPP 使用哪种协议建立和维持点到点的连接使用哪种协议建立和维持点到点的连接? A.HDLC ? A.HDLCB.LCPPDD.Cisco IETF ★标准答案:★标准答案:B B5. 5. 一个基本的数据链路层设计目标是选择一个基本的数据链路层设计目标是选择一个基本的数据链路层设计目标是选择__________________设备,例如网桥或局域网交换机,来连接设备,例如网桥或局域网交换机,来连接____________介质从而形成局域网段。
介质从而形成局域网段。
A.A.第第3层;第2层B.B.第第1层;第2层C.C.第第2层;第1层D.D.第第2层;第3层★标准答案:★标准答案:C C6. 6. 何种设备提供局域网的逻辑分段何种设备提供局域网的逻辑分段何种设备提供局域网的逻辑分段? ?A. A.路由器路由器B.B.网桥网桥C.C.交换机交换机D.D.集线器集线器★标准答案:★标准答案:A A7. 7. 使用命令使用命令使用命令"Router(config)#access-list 156.1.0.0 0.0.255.255""Router(config)#access-list 156.1.0.0 0.0.255.255""Router(config)#access-list 156.1.0.0 0.0.255.255"等同于下面哪一个说等同于下面哪一个说法?A." A."只拒绝我的网络只拒绝我的网络只拒绝我的网络" "B."B."允许一个特别的主机允许一个特别的主机允许一个特别的主机" "C."C."拒绝一个特别的主机拒绝一个特别的主机拒绝一个特别的主机" "D."D."以上都不是以上都不是以上都不是" "★标准答案:★标准答案:D D8. 8. 命令命令show access-list 用来做什么用来做什么? ? A. A.监视监视ACL 是否已经设置B.B.监视监视ACL 语句语句C.C.监视监视ACL 的调试的调试D.D.监视分组情况监视分组情况监视分组情况★标准答案:★标准答案:B B9. 9. 当配置一个按要求拨号的路由时,人们使用当配置一个按要求拨号的路由时,人们使用当配置一个按要求拨号的路由时,人们使用__________________来过滤来过滤来过滤__________________流量。
思科认证考试题库
CCNA640-802 V13题库试题分析题库讲解:吴老师(艾迪飞CCIE实验室首发网站:http://bbs。
1. What are two reasons that a network administrator would use access lists? (Choose two.)A。
to control vty access into a routerB. to control broadcast traffic through a routerC. to filter traffic as it passes through a routerD. to filter traffic that originates from the routerE。
to replace passwords as a line of defense against security incursionsAnswer: AC解释一下:在VTY线路下应用ACL,可以控制从VTY线路进来的telnet的流量.也可以过滤穿越一台路由器的流量。
2。
A default Frame Relay WAN is classified as what type of physical network?A。
point-to—pointB。
broadcast multi-accessC. nonbroadcast multi—accessD。
nonbroadcast multipointE. broadcast point—to—multipointAnswer: C解释一下:在默认的情况下,帧中继为非广播多路访问链路.但是也可以通过子接口来修改他的网络的类型。
3.Refer to the exhibit。
How many broadcast domains exist in the exhibited topology?A. oneB。
最新CCNA认证试题及答案「中文版」
最新CCNA认证试题及答案「中文版」1、对于这样一个地址,192.168.19.255/20,下列说法正确的是: ( )(A) 这是一个广播地址(B) 这是一个网络地址(C) 这是一个私有地址(D) 地址在192.168.19.0网段上(E) 地址在192.168.16.0网段上(F) 这是一个公有地址答案:CE注:IP地址中关键是看她的主机位,将子网掩码划为二进制,1对应上面的地址是网络位,0对应的地址是主机位192.168.19.255/20划为二进制为:11000000.10101000.00010011.1111111111111111.11111111.11110000.00000000主机位变成全0表示这个IP的网络地址主机槐涑扇?表示这个IP的广播地址RFC1918文件规定了保留作为局域网使用的私有地址:10.0.0.0 - 10.255.255.255 (10/8 prefix)172.16.0.0 - 172.31.255.255 (172.16/12 prefix)192.168.0.0 - 192.168.255.255 (192.168/16 prefix)2、目前,我国应用最为广泛的LAN标准是基于()的以太网标准.(A) IEEE 802.1(B) IEEE 802.2(C) IEEE 802.3(D) IEEE 802.5答案:C参考知识点:现有标准:IEEE 802.1 局域网协议高层IEEE 802.2 逻辑链路控制IEEE 802.3 以太网IEEE 802.4 令牌总线IEEE 802.5 令牌环IEEE 802.8 FDDIIEEE 802.11 无线局域网记住IEEE802.1-------IEEE802.5的定义以太网是一种计算机局域网组网技术。
IEEE制定的IEEE 802.3标准给出了以太网的技术标准。
它规定了包括物理层的连线、电信号和介质访问层协议的内容。
最新-Cisco认证模拟题 精品
Cisco认证模拟题篇一:思科认证经典试题第一部分填空题1、在体系的协议中,的-管理距离是,的域内-管理距离是,的域外-管理距离是的-管理距离是。
从学习到的路由学到路由的-管理距离是;从学习到的路由学到路由的-管理距离是。
2、的默认值为;其中越越优选被用于选路;从邻居哪里学到的权重为;自己本路由产生的路由(始发路由)产生权重是;的默认本地优先级为:。
3、的邻居分为和。
4、在那个区域(有区域0,区域1,区域2)广播多路访问(比如以太网,没有出现外部网络),在区域0可以看到类。
如果想看到2类,必须在网络类型;在区域可以看到类,在纯粹的区域内是否有5类?(回答是或者否)。
5、包括哪六种状态?6、在网络链路类型的报文作用?(3种)7、6的本地链路地址是。
(没有10的写法)8、在选择的角色(身份)有哪些?默认的收敛时间为配置了后,收敛时间会小于。
9、发送包的组播地址是,组播地址是;发送包组播地址是;发送包的组播地址是。
10、目前以太通道最多可以使用通道方式有。
11、在中使用间的环路(确保无环),该属性属于的必遵属性,其中还有哪两个是公认必遵属性为和。
第二部分选择1、在对基于的多层交换()进行排错的时候,例如解决无法到达特定的目标等问题,首先需要先查看哪两张表去验证错误?()、路由表和路由表、路由和邻接关系表、中的和邻接关系表、路由表和表2、位一个混合距离矢量协议,在值中使用1-5五个值,默认情况下,使用值分别是()、1,23,4、1,5、1,33、中-能标识一台设备的身份,下面说法正确的是()、先选举手工配置,然后选择设备地址大的,在选运行了宣告进最大的物理接口最大的地址。
、先选择设备地址大的,然后选举手工配置,在选运行了宣告进最大的物理接口最大的地址。
、先选举手工配置,然后选择设备地址大的,在选设备的物理接口最大的地址。
、在6中-选择跟4一样,当-必须是6地址。
4、在下列哪些情况下,管理员在多层交换机配置命令?()、当正在为某个给定的提供交换机连接时。
(企业形象)CISA新增中文模拟题(答案)精编
(企业形象)CISA新增中文模拟题(答案)题号:1题型:单选题内容:以下哪一项属于所有指令均能被执行的操作系统模式?选项:A、问题B、中断C、监控D、标准处理标准答案:B题号:2题型:单选题内容:企业将其技术支持职能(helpdesk)外包出去,下面的哪一项指标纳入外包服务等级协议(SLA)是最恰当的?选项:A、要支持用户数B、首次请求技术支持,即解决的(事件)百分比C、请求技术支持的总人次D、电话响应的次数标准答案:B题号:3题型:单选题内容:IS审计师检查组织的数据文件控制流程时,发现交易事务使用的是最新的文件,而重启动流程使用的是早期版本,那么,IS审计师应该建议:选项:A、检查源程序文档的保存情况B、检查数据文件的安全状况C、实施版本使用控制D、进行一对一的核查标准答案:C题号:4题型:单选题内容:将输出结果及控制总计和输入数据及控制总计进行匹配可以验证输出结果,以下哪一项能起上述作用?选项:A、批量头格式B、批量平衡C、数据转换差错纠正D、对打印池的访问控制标准答案:B题号:5题型:单选题内容:审计客户/服务器数据库安全时,IS审计师应该最关注于哪一方面的可用性?选项:A、系统工具B、应用程序生成器C、系统安全文文件D、访问存储流程标准答案:A题号:6题型:单选题内容:测试程序变更管理流程时,IS审计师使用的最有效的方法是:选项:A、由系统生成的信息跟踪到变更管理文档B、检查变更管理文档中涉及的证据的精确性和正确性C、由变更管理文档跟踪到生成审计轨迹的系统D、检查变更管理文档中涉及的证据的完整性标准答案:A题号:7题型:单选题内容:分布式环境中,服务器失效带来的影响最小的是:选项:A、冗余路由B、集群C、备用电话线D、备用电源标准答案:B题号:8题型:单选题内容:实施防火墙最容易发生的错误是:选项:A、访问列表配置不准确B、社会工程学会危及口令的安全C、把modem连至网络中的计算机D、不能充分保护网络和服务器使其免遭病毒侵袭标准答案:A题号:9题型:单选题内容:为确定异构环境下跨平台的数据访问方式,IS审计师应该首先检查:选项:A、业务软件B、系统平台工具C、应用服务D、系统开发工具标准答案:C题号:10题型:单选题内容:数据库规格化的主要好处是:选项:A、在满足用户需求的前提下,最大程度地减小表内信息的冗余(即:重复)B、满足更多查询的能力C、由多张表实现,最大程度的数据库完整性D、通过更快地信息处理,减小反应时间标准答案:A题号:11题型:单选题内容:以下哪一种图像处理技术能够读入预定义格式的书写体并将其转换为电子格式?选项:A、磁墨字符识别(MICR)B、智能语音识别(IVR)C、条形码识别(BCR)D、光学字符识别(OCR)标准答案:D题号:12题型:单选题内容:代码签名的目的是确保:选项:A、软件没有被后续修改B、应用程序可以与其它已签名的应用安全地对接使用C、应用(程序)的签名人是受到信任的D、签名人的私钥还没有被泄露标准答案:A题号:13题型:单选题内容:检查用于互联网Internet通讯的网络时,IS审计应该首先检查、确定:选项:A、是否口令经常修改B、客户/服务器应用的框架C、网络框架和设计D、防火墙保护和代理服务器标准答案:C题号:14题型:单选题内容:企业正在与厂商谈判服务水平协议(SLA),首要的工作是:选项:A、实施可行性研究B、核实与公司政策的符合性C、起草其中的罚则D、起草服务水平要求标准答案:D题号:15题型:单选题内容:电子商务环境中降低通讯故障的最佳方式是:选项:A、使用压缩软件来缩短通讯传输耗时B、使用功能或消息确认(机制)C、利用包过滤防火墙,重新路由消息D、租用异步传输模式(ATM)线路标准答案:D题号:16题型:单选题内容:以下哪一项措施可最有效地支持24/7可用性?选项:A、日常备份B、异地存储C、镜像D、定期测试标准答案:C题号:17题型:单选题内容:某制造类公司欲建自动化发票支付系统,要求该系统在复核和授权控制上花费相当少的时间,同时能识别出需要深入追究的错误,以下哪一项措施能最好地满足上述需求?选项:A、建立一个与供货商相联的内部客户机用及服务器网络以提升效率B、将其外包给一家专业的自动化支付和账务收发处理公司C、与重要供货商建立采用标准格式的、计算机对计算机的电子业务文文件和交易处理用EDI系统D、重组现有流程并重新设计现有系统标准答案:C题号:18题型:单选题内容:以下哪一项是图像处理的弱点?选项:A、验证签名B、改善服务C、相对较贵D、减少处理导致的变形标准答案:C题号:19题型:单选题内容:某IS审计人员需要将其微机与某大型机系统相连,该大型机系统采用同步块数据传输通讯,而微机只支持异步ASCII字符数据通讯。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Question: 1What is the best description of the Cisco Unified Wireless Network?A. It enables public sector agencies to deploy a secure, scalable, broadband network thatintegrates wired and wireless IP infrastructures, delivering network intelligence andapplications for mobile users across a city.B. It is a powerful solution for enterprises that want to combine the best elements of wireless andwired networking to deliver scalable, manageable, and secure wireless LANs with a low total cost of ownership.C. It uses a single network infrastructure for the transmission of data, voice, and video traffic,delivering the business benefits of a converged, wireless network to enterprise-levelorganizations.D. It is the only unified wired and wireless solution for service providers in the industry. It is cost-effective and addresses the WLAN security, deployment, management, and control issues facing service providers today.Answer: BQuestion: 2Which of the following lists the six phases of the Cisco Lifecycle Services framework?A. Prepare, Plan, Create, Implement, Operate, and ImproveB. Prepare, Plan, Design, Apply, Operate, and ManageC. Prepare, Plan, Design, Implement, Operate, and ManageD. Prepare, Plan, Design, Implement, Operate, and OptimizeE. Prepare, Plan, Design, Apply, Operate, and ImplementAnswer: DQuestion: 3Which three of the following value propositions are most suited to wireless LAN enterprise solutions? (Choose three.)A. creation of a collaborative work environmentB. security of a unified LAN solutionC. minimal capital expenditureD. time savings offered by mobility-services solutionsE. satisfaction of a single-vendor LAN solutionF. minimal time to deploymentAnswer: A, B, DQuestion: 4Which two of the following situations are examples of Voice over Wi-Fi services being used in a wireless network? (Choose two.)A. A university can provide secure access to visitors regardless of where they move about oncampus.B. A hotel can reroute calls to wherever employees are located, if they are not at their desks.C. A financial services firm can determine whether a server is in or out of use at any point in time.D. A retail store improves communications among its employees regardless of their location onthe sales floor.E. Guests visiting a hospital can have their cellular calls forwarded to the patient's room. Answer: B, DQuestion: 5Which three of the following Cisco Advanced Security Services are part of the base-level Mobility Service enablers? (Choose three.)A. authentication and encryptionB. virus trapC. firewallD. threat eliminationE. client identity discriminationF. intrusion detection and preventionAnswer: A, C, FQuestion: 6Which method was devised to mitigate the 802.11 security issues and requires the next-generation Advanced Encryption Standard?A. Temporal Key Integrity ProtocolB. Wired Equivalent PrivacyC. Extensible Authentication ProtocolD. Wi-Fi Protected Access 2Answer: DQuestion: 7When implementing a WLAN for hospitality markets, which three benefits will increase the return on investment? (Choose three.)A. Bandwidth and high availability are primary considerations for hotel patrons.B. Business travelers can assume that they will have access to wireless connectivity.C. The speed and ease of guest check-in are improved.D. Lightweight access points provide centralized control and configuration for hoteladministration.E. Wireless connectivity is provided for conventions and business meetings.F. The 802.1x security standards help hotels comply with industry regulations.Answer: B, C, EQuestion: 8Select two activities that form part of the wireless migration plan development service component in the wireless design phase. (Choose two.)A. Collect and Verify Site Specific Implementation RequirementsB. Gather and Verify Migration RequirementsC. Confirm Project and Milestone DatesD. Define Migration Team Roles and ResponsibilitiesE. Create Detailed Staff Training MatrixF. Verify Migration Address and Available StopsAnswer: B, DQuestion: 9A large brokerage firm needs a more cost-effective network solution. When positioning the return on investment (ROI) case to a high-level executive who is directly responsible for the financialsuccess of the company, which two aspects of the Cisco Unified Wireless Network solution should you emphasize? (Choose two.)A. The Cisco solution preserves the majority of your wired investment.B. The Cisco solution enables customers to quickly reconfigure workspaces to accommodategrowth or changing needs.C. The Cisco solution provides ROI by enabling better productivity for mobile workers.D. The Cisco solution provides tangible cost savings and ROI through investment in mobileapplications.E. The Cisco solution has a TCO for the system providing a savings of up to $350 per wiredlocation.Answer: C, DQuestion: 10Which activity is associated with the wireless technology assessment service component?A. Perform Infrastructure AuditB. Execute Test CasesC. Develop Escalation PlanD. Develop Project Management PlanAnswer: AQuestion: 11Which two of the following are benefits associated with WLANs? (Choose two.)A. WLANs are more secure than wired LANs.B. WLANs enable mobile users to connect to a LAN through a wireless radio connection.C. WLANs provide LAN access to users anywhere they travel.D. WLANs eliminate the need for cables to transport data.E. WLAN client cards are included by all laptop manufacturers, so you get it automatically. Answer: B, DQuestion: 12An enterprise company hires a management consultant, Mary Hunt, to improve corporate knowledge-management systems. The role requires her to be highly mobile within the enterprise as she gathers information from a variety of employees. When Mary is back at her desk, she must compare her new data with the data hosted on the corporate servers. After she logs in, the network recognizes her consultant status and allocates her the appropriate access rights. Which of the following enables this scenario?A. location-based servicesB. guest accessC. enhanced securityD. network admission control (NAC)Answer: BQuestion: 13Which three of the following service components are included in the design phase? (Choose three.)A. Account Qualification and PlanningB. Detailed Design Customer SignoffC. Staff TrainingD. Migration Plan DevelopmentE. Staging Plan DevelopmentF. System Requirements ValidationAnswer: B, D, EQuestion: 14Which wireless service component within the prepare phase creates a business case that provides both business and financial justification for a customer to use in evaluating adoption of a WLAN system?A. Business Case DevelopmentB. Customer EducationC. Proposal DevelopmentD. Business Requirements DevelopmentE. Account PlanningAnswer: AQuestion: 15The IT director of a major metropolitan hotel in Jakarta, Indonesia, would like to provide wireless connectivity for hotel guests and staff. While this can be accomplished through a single wireless network, the IT director is concerned about the security of the internal network, which transmits sensitive financial information. He is also concerned about potential malicious attacks from outside the network. Based on these concerns, what is the recommended Cisco product or solution?A. The Cisco Wireless Services Module (WiSM) provides real-time communication betweenlightweight access points and other wireless LAN controllers to deliver a secure and unified wireless solution.B. The Cisco Unified Wireless Network solution with enhanced security and secure guest-accessservices enables security-threat protection and allows guests to access network resources without compromising the security of the internal network.C. Cisco Wireless LAN Controllers enable systemwide wireless LAN functions, including securitypolicies, intrusion prevention, RF management, quality of service (QoS), and mobility.D. The Cisco Wireless Control System (WCS) enables the security of enterprise networksthrough RF prediction, policy provisioning, user tracking, and security monitoring from acentralized location.Answer: BQuestion: 16An enterprise recently acquired several smaller companies. Following a massive reorganization, the management decides to close the corporate headquarters of the acquired companies and relocate the remaining executive staff to one central location. To accommodate the influx of new employees at the central site, the enterprise will lease five additional floors of its current office building. The IT director is concerned about the scalability of the current network as the number of users increases. Which two facts should you emphasize when discussing a Cisco wireless LAN solution with this potential customer? (Choose two.)A. Cisco wireless LAN solutions easily scale to accommodate thousands of users: you can addaccess points as needed to support increasing numbers of users.B. Customers who are satisfied with the initial wireless LAN solution are more likely to considerimplementing mobile applications.C. Cell sizes of access points can be decreased for high user-density environments toaccommodate more users per access point.D. Cisco Wireless LAN Controllers enable IT Staff to view RF heat maps to determine wirelesscoverage.E. Customers can bring the equipment from the remote sites regardless of the manufacturer andadd it to their existing wireless LAN solution.Answer: A, CQuestion: 17What differentiates Cisco wireless LAN building-to-building products from the competition?A. standard cell coverageB. plastic access pointsC. Wi-Fi certificationD. decreased throughputAnswer: CQuestion: 18Which of the following WLAN service components all occur in the prepare phase?A. High-Level Design, Proof of Concept, Technology Strategy DevelopmentB. System Requirements Validation, WLAN Wired Network Integration Assessment, OperationsReadiness AssessmentC. Proposal Development, Customer Education, Service AssuranceD. Security Assessment, Security Administration, Staging Plan DevelopmentAnswer: AQuestion: 19Which service component in the plan phase identifies current infrastructure modifications required to support an enterprise WLAN?A. Voice Over WLAN AssessmentB. Planning Project KickoffC. WLAN Wired Network Integration AssessmentD. Operations Readiness AssessmentAnswer: CQuestion: 20You are meeting the director of operations at an enterprise company, and he wants to learn how the Cisco voice-over-Wi-Fi service improves productivity. Which statement would you use to describe the service?A. Cisco Voice-over-Wi-Fi when integrated with the wired network, allows a single control point toguarantee the quality of the call, irrespective of the transport over which the call is carried.B. Cisco Voice-over-Wi-Fi provides improved productivity through the convergence ofcommunications devices.C. Cisco Voice-over-Wi-Fi enables the tracking of the physical location of Wi-Fi devices, whichhelps improve productivity.D. With voice-over-Wi-Fi, the telephony system recognizes Wi-Fi handsets in the same way that itrecognizes traditional desktop phones, which allows employees to make and receive calls when they are mobile, thus improving productivity.Answer: DQuestion: 21What is the best response to an IT director at a retail operation who is concerned about keeping track of high-value inventory?A. The Cisco wireless location appliance is an end-to-end solution that can help manage storeinventory.B. WCS offers rogue access point detection that is displayed in visual floor maps.C. The 802.1x security standards will help retail outfits comply with industry regulations.D. Wireless connectivity can help bridge any gaps in the supply chain, from planning activitiesthrough sales associates at stores.Answer: AQuestion: 22What are the three best responses that you can give about a Cisco WLAN to a director of a healthcare facility whose primary concerns include HIPAA compliance and decreasing long wait-times for wheelchairs? (Choose three.)A. A Cisco WLAN extends to each patient room, allowing tracking of patient information at thebedside at all times.B. A Cisco WLAN enables real-time location tracking of important equipment and key personnel.C. A Cisco WLAN enables visual tracking of its mobile devices and their activity, which providesthe ability to track where and when patient records are accessed or revised.D. A Cisco WLAN provides support for Layer 3 roaming, which ensures that sensitive healthcaredata is not compromised by unauthorized, unsecured access points.E. A Cisco WLAN provides robust wireless security with WPA2 and 802.11i, which meets keyregulatory requirements for all healthcare providers.F. A Cisco WLAN will automatically correct changes in the Rf environment to help maintainconnectivity.Answer: B, C, EQuestion: 23Which two of the following are primary benefits of voice-over-Wi-Fi services? (Choose two.)A. reduced cellular phone costsB. reduced cost of replacing lost assetsC. increased employee productivityD. a single profile across all network typesE. enhanced 911 services for tracking cellular usersAnswer: A, CQuestion: 24A growing healthcare organization with a combined staff of 500 employees has a standalone wireless solution that is deployed in selective areas of the facility. The IT director of the company is considering migrating the network to a controller-based solution. Which of the following statements best describes the security benefits of the Cisco Unified Wireless Network solution for this company?A. The Cisco solution allows for the distribution of Preshared Security Keys to provide robustsecurity on client devices that are easily distributed throughout the organization.B. The Cisco solution offers visibility into the entire office RF environment. With instant alerts andanalysis of wireless threats, IT managers can react and protect their network integrity with one click, but true security is achieved only by using a pervasive WLAN.C. The Cisco solution provides a multilayered security approach for ensuring confidentialcommunications and policy compliance, as well as threat control and containment. With this comprehensive approach, IT managers have an indepth view of network events, enabling end-to-end protection of both the wired and wireless network against malicious user and network threats.D. The Cisco solution allows data to be sent in a secure network environment and supportsAdvanced Encryption Standard (AES) encryption on backhaul links.Answer: CQuestion: 25Ray Thomas, a global sales manager at a mid-sized, commercial company, is on his way from the conference room to his office. At the same time, a client who wants to complete a large business transaction with Ray's company is trying to reach Ray by phone. The Cisco Unified Communications System determines that Ray is not at his desk and automatically routes the call to his current location. Ray accepts the call while walking back to his office. After he arrives, he transparently transfers the call to his desk phone, freeing his hands to access the information on his computer to complete the transaction. Which of the following services enables this scenario?A. location-based servicesB. voice-over-Wi-FiC. guest accessD. Intrusion Protection ServicesAnswer: BQuestion: 26Which three of the following are security components of the Cisco Unified Wireless Network? (Choose three.)A. intrusion prevention systemB. packet switchingC. cryptographyD. network admission controlE. intrusion detection systemF. video surveillanceAnswer: A, D, EQuestion: 27Which service component within the prepare phase recommends the appropriate wireless technology to address a business requirement of the customer?A. Account Qualification and PlanningB. Business Case DevelopmentC. Technology Strategy DevelopmentD. Proof of ConceptAnswer: CQuestion: 28Which two of the following statements about the Cisco Outdoor Wireless Network solution are most important to emphasize to a mayor who wants to improve city management?(Choose two.)A. The Cisco Outdoor Mesh Solution's location services will efficiently be able to locate valuablemunicipal assets and important public safety personnel.B. The Cisco solution allows city agencies to deliver reliable, performance-based services on acitywide wireless network, with centralized monitoring and management capability.C. The Cisco Solution helps provide internet access to underserved populations to help limit orclose the "Digital Divide".D. The Cisco solution helps monitor problems like traffic accidents or crime scenes that are notpermanent, or do not always happen in the same location, or both.Answer: B, DQuestion: 29When attending a meeting with the CTO of a manufacturing firm, it becomes clear that adding the resources of an ecosystem partner would help build a solution that would help close the deal. Which two Ecosystem partner technologies would you recommend to the CTO at this manufacturing company?A. Handheld scanning devicesB. Passive RFIDC. Active RFID TagsD. Global Positioning Services (GPS)E. Network Management ServicesAnswer: A, CQuestion: 30The CIO of a small, commercial company wants to learn about the cost benefits of enabling voice-over-Wi-Fi services. How do you describe the service to him?A. Voice-over-Wi-Fi that is integrated into the wired network allows a single control point toguarantee the quality of the call, regardless of the transport over which the call is carried. This leads to significant cost savings.B. Voice-over-Wi-Fi provides continued cost savings through the convergence of communicationsdevices.C. With voice-over-Wi-Fi, the Cisco Unified wireless solution supports quality of service.D. With voice-over-Wi-Fi, the telephony system recognizes Wi-Fi handsets in the same way that itrecognizes traditional desktop phones, which allows employees to make and receive calls when they are mobile.Answer: BQuestion: 31Which security protocol is both an inherently flawed, one-way, device-centric form of authentication and a 40-bit encryption key?A. Secure Socket LayerB. Hypertext Transfer Protocol over Secure Socket LayerC. Secure Shell ProtocolD. Wired Equivalent PrivacyAnswer: DQuestion: 32A customer needs a location solution for more than a thousand simultaneous devices for true asset visibility. The solution needs to identify and locate rogue access points and devices to enforce security policies. What is the recommended Cisco technology?A. Cisco Network Admission Control ApplianceB. Cisco wireless location applianceC. Cisco wireless LAN controllerD. Cisco Wireless Control SystemAnswer: BQuestion: 33Which Cisco technology can be used to create a detailed wireless LAN design, including access point placement, configuration, and performance estimates?A. Cisco Network Admission Control ApplianceB. Cisco wireless location applianceC. Cisco wireless LAN controllerD. Cisco Wireless Control SystemAnswer: DQuestion: 34Which two are benefits of a wireless bridge? (Choose two.)A. allows multiple sites to share a single, high-speed network connectionB. provides faster data transfer speeds than a wired networkC. enables cost-effective, secure deployment of enterprise campus to metropolitan-scale outdoorWi-Fi networksD. supports global radio-frequency standards without configuration requirementsE. provides a cost-effective method to connect networks despite limited physical distances orbarriers, such as across campus or over lakesAnswer: A, EQuestion: 35What is an accurate description of a Cisco Wireless Control System?A. provides an enterprise-ready, standards-based, WLAN security solution that gives networkadministrators confidence that their data will remain private and secureB. handles real-time 802.11 radio functions within a Cisco centralized wireless LAN system,including radio transmit and receive, client probe requests, and air monitoringC. provides a powerful foundation upon which IT managers can design, control, and monitorCisco wireless networks from a centralized location, simplifying operations and reducing TCO D. communicates with Cisco 1000 Series lightweight access points over any Layer 2 (Ethernet) orLayer 3 (IP) infrastructure using LWAPPAnswer: CQuestion: 36When positioning a Cisco in-building solution, which three key benefits should you emphasize to differentiate Cisco from competitive offerings? (Choose three.)A. greater user flexibilityB. workforce optimizationC. 802.11a, 802.11b, and 802.11g complianceD. increased adaptabilityE. enhanced securityF. richness in intelligent featuresAnswer: A, E, FQuestion: 37A growing retail company with 600 employees is considering a Cisco Unified Wireless Network solution. In meeting with many members of the executive team, you have learned that the main concern of the company is the lack of time that the sales staff has on the sales floor to interact with customers because of time spent doing inventory management. Which of the following is the most appropriate point to focus on when proposing a Cisco Unified Wireless Network solution to the executive team of the company?A. With the Cisco solution, you can provide voice-over-Wi-Fi phones to all your staff for free,which improves their productivity, allowing them to spend more time with customers.B. With the Cisco solution, you can enable mobile applications, which provide tangible costsavings and return on investment (ROI) through improved productivity.C. The Cisco solution allows sales staff to do inventory ordering right at the product shelf, whichincreases the opportunities for customer interactions and raises the possibility of higher sales.D. The Cisco solution enables improved productivity due to mobility, which leads to quickerinventory management.Answer: CQuestion: 38Your customer says, "Mobility services are not a budget priority. If we need mobility services later, we can always expand our network then." Which of the following statements would be your best response?A. A pervasive deployment of the Cisco Unified Wireless Network solution with integrated securityservices delivers the required level of security that allows you to proactively secure yourbusiness.B. Seizing this opportunity before the competition will allow you to be more proactive and set thebusiness pace.C. It will be difficult to react quickly when a competitor deploys mobility services. If you wait, youwill need to upgrade your network and deploy the service at the same time.D. The costs of a wireless network are very likely to rise in the future. Customers are much betteroff in the long term to invest in a WLAN today.Answer: CQuestion: 39Which three are capabilities of the intelligent RF control plane of the Cisco Unified Wireless Network? (Choose three.)A. intrusion preventionB. dynamic channel assignmentC. interference detection and avoidanceD. coverage hole detection and correctionE. advanced location servicesF. zero-touch access point configuration and managementAnswer: B, C, DQuestion: 40The Cisco Secure Wireless solution incorporates the integrated security services of the Cisco Unified Wireless Network solution. Which three of the following features are inherent to the Cisco Unified Wireless Network? (Choose three.)A. policy controlB. video surveillanceC. threat defenseD. proprietary encapsulationE. intrusion detectionAnswer: A, C, EQuestion: 41Which value proposition best addresses the needs of an IT director at a university who is concerned that the institution is spending considerable amounts of money to connect buildings on the campus?A. Cisco WLANs can automate search and inventory mechanisms.B. Cisco WLANs offer an open infrastructure to provide flexibility, thereby enabling a network togrow with demand.C. Cisco WLANs automate often-repeated transactions and consolidate data analysis andstorage.D. Cisco WLANs provide a cost-effective alternative to leased-line connectivity.Answer: DQuestion: 42What is the best response to a university administrator who is complaining about the high IT costs that are associated with changing a classroom to a different building across the campus?A. WLAN technology allows organizations to add wireless access points without having to makehuge investments in costly infrastructure upgrades.B. Wireless connections can replace existing wired connections, providing a more cost-effectivesolution.C. Using a wireless bridge from Cisco, the bandwidth can be increased up to 108 Mbps.D. WLANs allow higher education institutions to deliver curriculum material and have studentsaccess it in real time.Answer: AQuestion: 43In the United States, what has ultimate jurisdiction over radio frequency regulations?A. Institute of Electrical and Electronics EngineersB. Wi-Fi AllianceC. Federal Communications CommissionD. Wireless Ethernet Compatibility AllianceE. World Wide Web ConsortiumAnswer: CQuestion: 44Which two components would you find in a WLAN? (Choose two.)A. fiber-optic cablingB. access pointsC. high-speed satellite transmissionsD. client adaptersE. MPLS NetworksAnswer: B, DQuestion: 45You are meeting with a city manager of a small town who wants to introduce video surveillance as part of a public-safety initiative. Which of the following benefits is the most important to emphasize when describing the Cisco Outdoor Wireless Network solution?A. The Cisco solution allows cities to extend services beyond a wired backbone to more remoteareas of the city without the trouble and expense of laying cable underground.B. The Cisco solution allows city agencies to deliver reliable, performance-based services on acitywide wireless network, with centralized monitoring and management capability.C. The Cisco solution enables IP-based camera solutions to provide real-time situationalawareness for law enforcement usage.D. The Cisco Solution helps provide internet access to underserved populations to help limit orclose the "Digital Divide".Answer: CQuestion: 46Which two of the following statements about the Cisco Outdoor Wireless Network solution are the most important to emphasize to a city manager who wants to improve the economic development of the city? (Choose two.)A. The Cisco solution improves operation with real-time data and video information exchange toensure timely departures and arrivals and minimize delays because of accidents orcongestion.B. The Cisco solution enables real-time location tracking of important equipment and keypersonnel.C. The Cisco solution connects distant administration buildings, enables broadband access forunderserved areas, and supports deployment of hotspots.D. The Cisco Outdoor Mesh Solution will support WIMAX clients to "future proof" the outdoornetwork.E. The Cisco solution helps enable hot spots and revenue generation services for localcommunity users.Answer: A, CQuestion: 47Which two accurately describe ways in which Cisco has shaped the development of the wireless industry? (Choose two.)A. Cisco has been recognized by the CNET Networks UK Technology Awards Program forleading innovation over the past 10 years.。