A large company plans to add several servers and requires that the...
Refer to the exhibit. Which type of application communication model...
A network technician needs to install a four-port switch module in an...
Refer to the exhibit. An administrator installs a WIC-2T module into a...
Which technical requirement is satisfied when providing QoS for delay...
An administrator is charged with providing guaranteed quality of...
What can be broadcast over the wireless network to help a user connect...
Which protocol allows redundant Layer 2 links without switching loops?
Refer to the exhibit. The routers are configured with RIPv2 with...
A technician adds the command Router(config-router)# variance 5 to a...
A company has an IT staff that is not highly trained. What two...
Refer to the exhibit. A pre-sales system engineer receives a diagram...
A network engineer is designing a LAN prototype for a medium-sized...
What type of system uses a PBX for call control and connection to the...
Which protocol is enabled by default to dynamically discover and...
What makes the Cisco EasyVPN application a useful tool for VPN...
A network administrator has changed the VLAN configurations on his...
Why is it difficult for network designers to predict the patterns and...
Refer to the exhibit. The routers are configured with RIPv2 with...
Refer to the exhibit. What does the TOR router do with traffic that is...
A customer of a large multisite organization has asked a network...
Refer to the exhibit. Which summarized route would be advertised Which...
Refer to the exhibit. What is an accurate description of the...
A user in a large office calls tech support to complain that the PC no...
A WIC-1T module needs to be installed in a Cisco 1841 router that...
In order for the IT staff of a company to understand the basic...
Refer to the exhibit. An extended ACL has been created to deny traffic...
NetworkingCompany engineer is on a support call resolving...
A small bookstore would like to offer wireless connectivity for...
Which IOS component can be used for classification and protocol...
Refer to the exhibit. A networking engineer is characterizing an...
Which IOS component can be used to classify and monitor network...
Which characteristic should be considered by a network designer when...
Which feature relies on prioritization of network traffic and is used...
A new WIC is installed in an available router slot. At what point...
When implementing an IP telephony solution, why should VLANs be used?
Refer to the exhibit. A networking company designer is reviewing a...
Which technology will prioritize traffic based upon the technical...
A network designer has chosen to specify the use of a dedicated...
A network administrator is given a network address of 192.168.1.64/26...
When implementing a security policy, which two actions should be...
Using the show frame-relay pvc and debug frame-relay lmi commands to...
What is the advantage of choosing EasyVPN for a new VPN...
A network administrator of a middle-sized company is asked to upgrade...
Which two security best practices are recommended for a router...
Several key servers in an organization must be directly accessible...
How should a network engineer determine if a router module is...
What is a function that is associated with the access layer in a...
A network engineer is prototyping a new IP addressing and...
*** If a router is unable to find a suitable IOS to load into RAM, in...
In a converged network, which two types of traffic would be...
Refer to the exhibit. A network associate is configuring a new router...
On a Monday morning the help desk at a large company receives an...
What is a characteristic of voice traffic in a converged network?
What is tunneling?
Which combination of Layer 2 protocol and authentication should be...
Which feature of network design and configuration would be considered...
What is meant by "tunneling" in the context of migrating...
Which command can be used to load a new Cisco IOS image on a router?
A network administrator has moved the company intranet web server from...
During prototype testing, the network designer performs a test to...
What value is an alternative representation of the IPv6...
Which option correctly defines the capacity through the local loop...
Refer to the exhibit. Following a test plan, the network systems...
A network administrator needs to transfer an IOS image to a router...
A company has its headquarters office in Dallas and five branch...
What is used locally by a router to identify each Frame Relay PVC?
Which type of network attack exploits vulnerabilities in the...
When configuring Frame Relay, what identifies a virtual circuit to the...
As part of network monitoring, a network administrator receives an...
Refer to the exhibit. EIGRP has been configured as a routing protocol...
An administrator learns of an e-mail that has been received by a...
Which statement is true about PAP in the authentication of a PPP...
Which two technologies can provide data integrity in a VPN connection?...
During prototype testing, a LAN switch fails. As the switch...
During a review of the proposed bill of materials, an account manager...
Which two processes allow a smooth transition from IPv4 to IPv6?...
Refer to the exhibit. All router interfaces are up and RIP version 2...
Refer to the exhibit. A technician at the ISP site asks the network...
Refer to the exhibit. A network administrator is configuring a new...
A company uses the Frame Relay network to establish a VPN connection...
A NetworkingCompany engineer is on a support call resolving technical...
Refer to the exhibit. The named ACL "Managers" already exists on the...
Refer to the exhibit. This serial interface is not functioning...
Refer to the exhibit. Following a test plan, the network systems...
A user in a large office calls technical support to complain that a PC...
What is the result when the command permit tcp 10.25.132.0 0.0.0.255...
A network engineer is at a customer site. After resolving technical...
The network designer recommends using RSTP in the design of a new data...
Which task would typically only require services that are located at...
What is the purpose of a network baseline?
Company XYZ needs a WAN connection between headquarters and branch...
A school district decides to use the 172.30.0.0/16 network for its LAN...
Which statement is true about the pairing of services and transport...
A DHCP server is configured with a block of excluded addresses. What...
Refer to the exhibit. A new host needs to be connected to the switch...
Where does a service provider assume responsibility from a customer...
What should be considered in the design of a wireless LAN on a...
A company has help desk staff that is not highly trained in VPNs. What...
A web-based retail company is considering updating its WAN connection...
What type of Frame Relay subinterface must be used to connect remote...
Company XYZ requires a WAN solution that provides flexible bandwidth...
Which statement describes the use of a network baseline?
What is the result when the command permit tcp 10.25.132.0 0.0.0.255...
...
Which two pieces of information are needed before an IOS image may be...
Refer to the exhibit. A NetworkingCompany designer is reviewing a...
What functionality do access control lists provide in the...
A network administrator is validating the routing for the new network...
The main office of a NetworkingCompany customer currently connects to...
Refer to the exhibit. A pre-sales systems engineer receives a diagram...
In what situation would the router display theROMMON> prompt at the...
Which two Frame Relay header bits are used to indicate possible...
Refer to the exhibit. RIPv2 has been configured on all routers in the...
While troubleshooting a Frame Relay link, the network administrator...
A network administrator is integrating IPv6 into an IPv4 network by...
Which option represents a best practice for applying ACLs?
Refer to the exhibit. From the output of the show...
Who provides technical support and training after deploying a network...
What is a characteristic of FTP traffic flows?
What type of ACL permits outbound traffic, but permits inbound traffic...
Refer to the exhibit. What can be concluded from the output that is...
A network administrator has configured Frame Relay on a serial...
When NAT is in use, what is used to determine the addresses that can...
A company plans to establish Frame Relay connections between corporate...
Refer to the exhibit. All devices are configured as shown in the...
What will prevent workstations with unauthorized MAC addresses from...
What type of system connects to the PSTN and uses a PBX to route calls...
Refer to the exhibit. Based on the EIGRP configuration that is shown,...
Which data link layer encapsulation protocol is used by default for...
A company is concerned with protecting internal e-commerce servers...
A company establishes a Frame Relay connection between corporate...
A network administrator determines that falsified routing...
At what physical location does the responsibilty for a WAN connection...
A network administrator has removed a router from the network for...
Which two pieces of information should a network administrator have...
Refer to the exhibit. Computers on the internal network need access to...
Refer to the exhibit. What is the spanning-tree role of all the...
Compared with IDS systems, what can IPS systems do to provide further...
What will be the result of adding the command ip dhcp excluded-address...
Which two values represent valid IPv6 addresses? (Choose two.)
A datacenter designer considers using a traditional DMZ to protect a...
Refer to the exhibit. A customer has a problem with connectivity in...
What value is an alternative representation of the IPv6 address...
Refer to the exhibit. A NetworkingCompany engineer is characterizing...
At the distribution layer of a hierarchical network, what are two...
A bank is planning to add a secure, authenticated WAN connection to a...
What information does an administrator require before saving the...
If traditional phones are used when introducing VoIP to a network,...
Refer to the exhibit. Access list 100 is applied inbound to interface...
Refer to the exhibit. A company decides to install a new data center...
Refer to the exhibit. A network administrator is attempting to...
Which component in a Frame Relay WAN would set the BECN bit in the...
A wireless survey has been conducted before the deployment of a...
Which characteristic of VPN technology prevents the contents of data...
A designer is creating a test plan to validate a WAN design that is...
Refer to the exhibit. A network administrator is creating a prototype...
Refer to the exhibit. WestSW is supposed to send VLAN information to...
An administrator is configuring a dual stack router with IPv6...
Which address provides an example of an IPv6 link-local address?
What two factors can increase the amount of time that is required for...
What is a function of software queuing?
Which IP address and wildcard mask would be used in an ACL to block...
Refer to the exhibit. A network engineer issues the show ip route...
Refer to the exhibit. What will be the result of entering the commands...
To reduce unwanted incoming traffic from the outside, a network...
While troubleshooting a problem with an e-mail server, an...
When designing a prototype network for a new server farm, a network...
A network designer must select a routing protocol for the network of a...
Which three guidelines would help contribute to creating a strong...
Refer to the exhibit. A company with four servers in its server farm...
Refer to the exhibit. An extended ACL has been created to deny traffic...
A network administrator is tasked with maintaining two remote...
What are two main components of data confidentiality? (Choose two.)
Refer to the exhibit. Based on the output as shown, which two...
The network infrastructure at the headquarters of an organization...
What are two advantages of using Layer 3 devices instead of Layer 2...
Refer to the exhibit. What can be determined about the operation of...
What is the result of implementing a Frame Relay service with a CIR...
What are two accurate descriptors of a DLCI? (Choose two.)
In the Cisco Enterprise Architecture, which module would include web...
Refer to the exhibit. Results of the show vlan and show vtp status...
An employee of XYZ corporation will begin working from home. The...
A network administrator is asked to upgrade the enterprise network...
A company would like to ensure that the failure of a single access...
A network administrator wants to configure a router that is running...
A company has branch offices at several locations across the country....
Because of a remote-procedure call failure, a user is unable to access...
Refer to the exhibit. Headquarters is connected through the Internet...