तपाईँलाई अस्थायी रूपमा ब्लक गरिएको छतपाईँलाई अस्थायी रूपमा ब्लक गरिएको छतपाईँले धेरै छिटो गरेर यस सुविधाको दुरुपयोग गर्नुभएको जस्तो देखिन्छ। तपाईँलाई यसको प्रयोग गर्नबाट अस्थायी रूपमा ब्लक गरिएको छ। Refer to the exhibit. Which devices exist in the failure domainwhen switch S3 loses power?
1. A network administrator is planning redundant devices and cabling in a switched network to support high availability. Which benefit will implementing the Spanning Tree Protocol provide to this design? Faster convergence is available for advanced routing protocols. Multiple physical interfaces can be combined into a single EtherChannel interface. Redundant paths can be available without causing logical Layer 2 loops. Network access can be expanded to support both wired and wireless devices. 2. Refer to the exhibit. Which devices exist in the failure domain when switch S3 loses power? PC_3 and AP_2 PC_3 and PC_2 S4 and PC_2 AP_2 and AP_1 S1 and S4 3. Which two features of enterprise class equipment assists an enterprise network in maintaining 99.999 percent up-time? (Choose two.) services module failover capabilities collapsed core redundant power supplies failure domains 4. Which design feature will limit the size of a failure domain in an enterprise network? the installation of redundant power supplies the use of a collapsed core design the use of the building switch block approach the purchase of enterprise equipment that is designed for large traffic volume 5. What are two expected features of modern enterprise networks? (Choose two.) support for critical applications support for limited growth support for converged network traffic support for distributed administrative control support for 90 percent reliability 6. What network design would contain the scope of disruptions on a network should a failure occur? the reduction in the number of redundant devices and connections in the network core the installation of only enterprise class equipment throughout the network the deployment of distribution layer switches in pairs and the division of access layer switch connections between them the configuration of all access layer devices to share a single gateway 7. What are two ways to access a Cisco switch for out-of-band management? (Choose two.) a connection that uses SSH a connection that uses Telnet a connection that uses HTTP a connection that uses the AUX port a connection that uses the console port 8. In which situation would a network administrator install a Cisco Nexus Series or Cisco Catalyst 6500 Series switch to promote infrastructure scalability? To enable virtual stacking of switches to provide cloud-managed access on a campus LAN network as access layer switches on a service provider network to promote integrated security, and simplified management on a data center network to provide expansion and transport flexibility 9. What capability is provided by the use of application-specific integrated circuits in Cisco multilayer switches? aggregating physical ports into a single logical interface forwarding of IP packets independent of the CPU providing user authentication and authorization protecting data traffic in the event of a failed circuit 10. Which statement describes a characteristic of Cisco Catalyst 2960 switches? They are modular switches. New Cisco Catalyst 2960-C switches support PoE pass-through. They are best used as distribution layer switches. They do not support an active switched virtual interface (SVI) with IOS versions prior to 15.x. 11. Match the purpose to the related configuration item. (Not all options are used.) assignment of IP address to interface -> connectivity hostname -> identification routing protocols -> access remote networks passwords -> security 12. Which type of information is displayed by the show ip protocols command that is issued from a router command prompt? interfaces with line (protocol) status and I/O statistics interface information, including whether an ACL is enabled on the interface the configured routing protocols and the networks that the router is advertising the routed protocol that is enabled and the protocol status of interfaces 13. Which action should be taken when planning for redundancy on a hierarchical network design? continually purchase backup equipment for the network add alternate physical paths for data to traverse the network implement STP portfast between the switches on the network immediately replace a non-functioning module, service or device on a network 14. What term is used to express the thickness or height of a switch? module size domain size rack unit port density 15. Immediately after a router completes its boot sequence, the network administrator wants to check the routers configuration. From privileged EXEC mode, which of the following commands can the administrator use for this purpose? (Choose two.) show flash show running-config show version show NVRAM show startup-config 16. A network technician needs to connect a PC to a Cisco network device for initial configuration. What is required to perform this device configuration? HTTP access at least one operational network interface on the Cisco device Telnet access terminal emulation client 17. What is a characteristic of in-band device management? It is used to monitor and make configuration changes to a network device over a network connection. It uses a terminal emulation client. It is used for initial configuration or when a network connection is unavailable. It uses a direct connection to a console or AUX port. 18. In the Cisco Enterprise Architecture, which two functional parts of the network are combined to form a collapsed core design? (Choose two.) enterprise edge provider edge distribution layer access layer core layer 19. Which statement describes a characteristic of Cisco Meraki switches? They promote infrastructure scalability, operational continuity, and transport flexibility. They are cloud-managed access switches that enable virtual stacking of switches. They are campus LAN switches that perform the same functions as Cisco 2960 switches. They are service provider switches that aggregate traffic at the edge of the network. 20. What are two benefits of extending access layer connectivity to users through a wireless medium? (Choose two.) decreased number of critical points of failure increased flexibility reduced costs increased network management options increased bandwidth availability 21. What is the function of ASICs in a multilayer switch? They aggregate multiple physical switch ports into a single logical port. They provide power to devices such as IP phones and wireless access points through Ethernet ports. They streamline forwarding of IP packets in a multilayer switch by bypassing the CPU. They prevent Layer 2 loops by disabling redundant links between switches. 22. A network engineer is reviewing a network design that uses a fixed configuration enterprise router that supports both LAN and WAN connections. However, the engineer realizes that the router does not have enough interfaces to support growth and network expansion. Which type of device should be used as a replacement? another fixed configuration router a Layer 3 switch a modular router a PoE device 23. What are two functions of a router? (Choose two.) It controls the flow of data via the use of Layer 2 addresses. It manages the VLAN database. It increases the size of the broadcast domain. It determines the best path to send packets. It connects multiple IP networks. 24. When a Cisco IOS device is being selected or upgraded, which option indicates the capabilities of the Cisco IOS device? Platform release number version number feature set 25. What are three access layer switch features that are considered when designing a network? (Choose three.) Power over Ethernet forwarding rate failover capability speed of convergence broadcast traffic containment port density 26. As the network administrator you have been asked to implement EtherChannel on the corporate network. What does this configuration consist of? providing redundant links that dynamically block or forward traffic grouping two devices to share a virtual IP address providing redundant devices to allow traffic to flow in the event of device failure grouping multiple physical ports to increase bandwidth between two switches 27. Which two requirements must always be met to use in-band management to configure a network device? (Choose two.) a direct connection to the console port at least one network interface that is connected and operational Telnet, SSH, or HTTP access to the device a terminal emulation client a direct connection to the auxiliary port 28. Refer to the exhibit. Which command was issued on a Cisco switch that resulted in the exhibited output? show vlan summary show vlan brief show mac-address-table show port-security address |