You are on page 1of 8

1.

Which of the following is a Cisco IOS feature that can collect timestamps of traffic sent between
a particular source and destination for the purpose of reviewing in an audit? (Select the best
answer.)

a. CS-MARS
b. SNMPv3
c. NetFlow
d. RMON

2. Which of the following are not components of a typical CVO implementation? (Select 3
choices.)

a. a Cisco 800 series ISR
b. a Cisco Unified IP Phone
c. a Cisco 3900 series ISR
d. a Cisco 600 series AP
e. a Cisco 5500 series WLC
f. a Cisco 2500 series WLC

3. In a hierarchical network model, which layer of the network handles ACLs and IPS
filtering? (Select the best answer.)

a. core
b. services block
c. access
d. distribution

4. Which of the following statements are true about a medium branch office design? (Select 2
choices.)

a. Rapid PVST+ should be configured to prevent Layer 2 loops.
b. A collapsed core should not be implemented.
c. ISR integrated 10/100/1000 interfaces should be configured as Layer 3 trunks.
d. A single ISR platform is recommended for WAN access.
e. A medium branch office design is ideal for up to 200 users.

5. Which of the following best describes how Cisco defines a medium branch office? (Select the
best answer.)

a. an office that contains between 50 and 100 users and that implements a two-tier design
b. an office that contains between 100 and 200 users and that implements a two-tier
design
c. an office that contains up to 50 users and that implements a one-tier design
d. an office that contains between 50 and 100 users and that implements a three-tier
design

6. In which of the following layers of the hierarchical network design model should you implement
QoS? (Select the best answer.)

a. in the core, distribution, and access layers
b. in the access and distribution layers only
c. in the distribution layer only
d. in the core and distribution layers only
e. in the access layer only F.in the core layer only

7. In the Cisco enterprise architecture model, which of the following best describes the switches
used in the enterprise edge module? (Select the best answer.)

a. Both inner and outer switches should use Layer 3 switching exclusively.
b. Inner switches should use Layer 2 switching exclusively; outer switches should use a
combination of Layer 2 and Layer 3 switching.
c. Inner switches should use Layer 3 switching exclusively; outer switches should use a
d. combination of Layer 2 and Layer 3 switching.
e. Both inner and outer switches should use Layer 2 switching exclusively.
f. Inner switches should use a combination of Layer 2 and Layer 3 switching; outer
switches should use Layer 3 switching exclusively.
g. Inner switches should use a combination of Layer 2 and Layer 3 switching; outer
switches should use Layer 2 switching exclusively.
h. Inner switches should use Layer 2 switching exclusively; outer switches should use Layer
3 switching exclusively.

8. Which of the following can be used to configure router command authorization? (Select the
best answer.)

a. Cisco Secure ACS
b. Cisco Security MARS
c. Cisco Security Agent
d. Cisco UCM

9. Which of the following can be used to monitor Cisco network security devices as well as third-
party network devices and applications? (Select the best answer.)

a. CS-MARS
b. CSM
c. ACS
d. SDM

10. Which of the following can create multiple virtual firewalls? (Select the best answer.)

a. an ASA
b. a vPC
c. an IPS
d. a VRF

11. The bit rate of analog voice signals being converted into digital data streams is calculated by
using which formula? (Select the best answer.)

a. one-fourth of the highest input frequency
b. twice the highest input frequency times the sampling rate
c. the sampling rate times the size of the code words
d. one-half of the sampling rate times the size of the code words

12. Which of the following Cisco NAC appliance components is an optional Windows client-based
agent? (Select the best answer.)

a. Cisco SSC
b. Cisco NAA
c. Cisco NAS
d. Cisco NAM

13. Which of the following statements best describes deterministic redundancy in WLCs? (Select
the best answer.)

a. Deterministic redundancy involves APs that are configured with primary, secondary, and
tertiary WLCs.
b. Deterministic redundancy failover is slower than dynamic redundancy failover.
c. Deterministic redundancy designs are less predictable and less stable than dynamic
designs.
d. Deterministic redundancy is frequently implemented in a salt-and-pepper design.

14. The network you administer has a 1-Gbps link that is used to carry voice and data traffic. Which
of the following represents the maximum total bandwidth that should be reserved for voice and
data traffic? (Select the best answer.)

a. 750 Mbps
b. 500 Mbps
c. 333 Mbps
d. 1,000 Mbps

15. Rapid PVST+ is a Cisco enhancement of which of the following IEEE protocols? (Select the best
answer.)

a. 802.1Q
b. 802.1w
c. 802.1s
d. 802.1t
e. 802.1D

16. Which of the following Cisco NAC appliance components is responsible for enforcing network
policies between a trusted network and an untrusted network? (Select the best answer.)

a. Cisco NAM
b. Cisco NAA
c. Cisco SSC
d. Cisco NAS

17. Which of the following is responsible for ascertaining the status of security applications and
management tools that are installed on a client? (Select the best answer.)

a. CSA
b. Cisco NAS
c. CTA
d. Cisco SSC

18. Which of the following best describes jitter? (Select the best answer.)

a. serialization delay
b. packet loss
c. variation in delay
d. roaming delay
e. end-to-end delay

19. Which of the following values is the maximum end-to-end transit time that can adequately
support voice traffic on a VoWLAN? (Select the best answer.)

a. 150 ms
b. 100 ms
c. 1 ms
d. 15 ms
e. 10 ms

20. Which of the following statements are true about an 802.11b VoWLAN design that is based on
best practices? (Select 2 choices.)

a. The QBSS load of each AP should be no greater than 33 percent.
b. The overlap between adjacent channels should be between 10 and 15 percent.
c. The packet error rate of the network should be no greater than 5 percent.
d. The end-to-end transfer time should be less than 150 ms for each voice packet.
e. The number of simultaneous G.711 calls for an AP should be no greater than seven.

21. Which of the following statements are true regarding the Cisco Unified Wireless Network
architecture? (Select 2 choices.)

a. A wireless client can be located without the use of a Cisco Wireless Location Appliance.
b. A LAP uses LWAPP to communicate with its associated wireless clients.
c. A LAP can function independently of a WLC.
d. A wireless client can roam between LAPs without refreshing its IP address.
e. A WCS server is required for WLAN management.

22. What is the bit rate of analog voice signals being converted into digital data streams with an
input frequency of 4 kHz and 8-bit code words? (Select the best answer.)

a. 24 Kbps
b. 32 Kbps
c. 12 Kbps
d. 64 Kbps

23. Which of the following is the first action performed on a packet when it is received on a QoS-
enabled interface? (Select the best answer.)

a. scheduling
b. queuing
c. shaping
d. classification


24. According to Cisco best practices, which of the following percentages is the maximum amount of
bandwidth that should be reserved for voice traffic? (Select the best answer.)

a. 50 percent
b. 66 percent
c. 25 percent
d. 75 percent
e. 33 percent

25. Which of the following statements are true regarding the G.711 codec? (Select 2 choices.)
a. G.711 is a Cisco-proprietary codec.
b. G.711 has an MOS of 5.
c. G.711 is supported on the Cisco 7921G WIP.
d. G.711 can provide fewer simultaneous calls than G.729 with the same amount of
bandwidth.
e. G.711 requires a bit rate of 32 Kbps to support toll-quality voice.

26. Which of the following statements best describes voice traffic? (Select the best answer.)

a. Voice traffic is not tolerant of delay.
b. Voice traffic uses TCP to carry audio data.
c. Voice traffic uses large packets.
d. Voice traffic is not deterministic.

27. Which of the following wireless standards are used on the backhaul link of a Cisco AP1510
MAP? (Select 2 choices.)

a. 802.11n
b. 802.11i
c. 802.11b
d. 802.11g
e. 802.11a

28. Which of the following statements describes Layer 2 inter-controller roaming? (Select the best
answer.)

a. roaming between LAPs managed by the same WLC on the same IP subnet
b. roaming between LAPs managed by different WLCs on the same IP subnet
c. roaming between LAPs managed by different WLCs on different IP subnets
d. roaming between LAPs managed by the same WLC on different IP subnets
e. roaming between LAPs managed by different WLCs in different mobility groups

29. Which of the following statements best describes the Cisco Security Management Suite? (Select
the best answer.)

a. it is a tool that facilitates and simplifies the operations and management of a Cisco Self-
Defending Network.
b. It separates the configuration and management to each individual security device on a
network.
c. It is based on the framework of the PIX that provides firewall and VPN services.
d. It is security software that functions primarily as a HIDS and that can be installed on
laptops.

30. Which of the following protocols can IPSec use to provide data authentication and data
integrity? (Select 2 choices.)

a. AH
b. ESP
c. DES
d. AES
e. GRE

31. Which of the following statements is true regarding the G.729 codec? (Select the best answer.)

a. G.729 is a medium-complexity codec.
b. G.729 is commonly used on the PSTN.
c. G.729 requires the least bandwidth out of all the codecs supported on Cisco routers.
d. G.729 has the highest MOS score out of all the codecs supported on Cisco routers.
e. G.729 is the default codec supported on Cisco routers.

32. Which of the following features are provided by IPSec? (Select 3 choices.)

a. data origin authentication
b. multicast packet encapsulation
c. data integrity
d. broadcast packet encapsulation
e. data confidentiality

33. Cisco IBNS solutions use which of the following technologies to provide security for a
network? (Select 3 choices.)
a. PAP
b. RADIUS
c. EAP
d. CHAP
e. TACACS+ F.IEEE 802.1x

34. Which of the following refers to the process of buffering packets in a software queue on a QoS-
enabled interface? (Select the best answer.)

a. traffic policing
b. scheduling
c. classification
d. queuing

35. Which of the following is a security appliance that serves as the focal point for security events
on a network? (Select the best answer.)

a. SNMP
b. ASA
c. CS-MARS
d. IPS

36. Which of the following is a critical component of the Self-Defending Network framework that
relies on 802.1x and IBNS? (Select the best answer.)

a. trust and identity management
b. threat defense
c. operational management and policy control
d. secure connectivity
e. secure network platform

37. According to the Nyquist theorem, what is the minimum rate that should be used when an
analog voice signal is sampled? (Select the best answer.)

a. two times the highest input frequency
b. equal to the highest input frequency
c. one-half of the highest input frequency
d. one-fourth of the highest input frequency
e. four times the highest input frequency

38. Q38: Which of the following are not components of a typical CVO implementation? (Select 3
choices.)

a. a Cisco 2500 series WLC
b. a Cisco 5500 series WLC
c. a Cisco 600 series AP
d. a Cisco 3900 series ISR
e. a Cisco Unified IP Phone
f. a Cisco 800 series ISR

39. Q39: Which of the following managed VPN services can use ATM to transport data over a point-
to-point link? (Select the best answer.)

a. MPLS L3VPN
b. L2VPN
c. L3VPN using the Internet
d. DMVPN

40. Q40: Which of the following are required components in a Cisco wireless outdoor mesh
deployment? (Select 3 choices.)

a. a RAP
b. a WLC
c. an autonomous AP
d. a MAP

You might also like