0 Comments

Quiz 3

Question 1 1
/ 1 point

Which of the following best describes jitter? (Select the best answer.)

A)

serialization delay

B)

packet loss

C)

variation in delay

D)

roaming delay

E)

end-to-end delay

Question 2 1
/ 1 point

In a hierarchical network model, which layer of the network
handles ACLs and IPS filtering? (Select
the best answer.)

A)

core

B)

services block

C)

access

D)

distribution

Question 3 1
/ 1 point

Which of the following Cisco NAC appliance components is
responsible for enforcing network policies between a trusted network and an
untrusted network? (Select the best
answer.)

A)

Cisco NAM

B)

Cisco NAA

C)

Cisco SSC

D)

Cisco NAS

Question 4 1
/ 1 point

In which of the following layers of the hierarchical network
design model should you implement QoS?
(Select the best answer.)

A)

in the core, distribution, and access layers

B)

in the access and distribution layers only

C)

in the distribution layer only

D)

in the core and distribution layers only

E)

in the access layer only F.in the core layer only

Question 5 1
/ 1 point

Which of the following can create multiple virtual
firewalls? (Select the best answer.)

A)

an ASA

B)

a VPC

C)

an IPS

D)

a VRF

Question 6 1
/ 1 point

Which of the following best describes how Cisco defines a
medium branch office? (Select the best
answer.)

A)

an office that contains between 50 and 100 users and that
implements a two-tier design

B)

an office that contains between 100 and 200 users and that
implements a two-tier design

C)

an office that contains up to 50 users and that implements a
one-tier design

D)

an office that contains between 50 and 100 users and that
implements a three-tier design

Question 7 1
/ 1 point

The bit rate of analog voice signals being converted into
digital data streams is calculated by using which formula? (Select the best answer.)

A)

one-fourth of the highest input frequency

B)

twice the highest input frequency times the sampling rate

C)

the sampling rate times the size of the code words

D)

one-half of the sampling rate times the size of the code
words

Question 8 0.6
/ 1 point

Which of the following two statements describe a medium
branch office design?

Answer

A)

Rapid PVST+ should be configured to prevent Layer 2 loops.

B)

A collapsed core should not be implemented.

Answer

C)

ISR integrated 10/100/1000 interfaces should be configured
as Layer 3 trunks.

D)

A single ISR platform is recommended for WAN access.

E)

A medium branch office design is ideal for up to 200 users.

Question 9 1
/ 1 point

Which of the following statements best describes
deterministic redundancy in WLCs?
(Select the best answer.)

A)

Deterministic redundancy involves APs that are configured
with primary, secondary, and tertiary WLCs.

B)

Deterministic redundancy failover is slower than dynamic
redundancy failover.

C)

Deterministic redundancy designs are less predictable and
less stable than dynamic designs.

D)

Deterministic redundancy is frequently implemented in a
salt-and-pepper design.

Question 10 1
/ 1 point

Which of the following is a Cisco IOS feature that can
collect timestamps of traffic sent between a particular source and destination
for the purpose of reviewing in an audit?
(Select the best answer.)

A)

CS-MARS

B)

SNMPv3

C)

NetFlow

D)

RMON

Question 11 1
/ 1 point

Rapid PVST+ is a Cisco enhancement of which of the following
IEEE protocols? (Select the best answer.)

A)

802.1Q

B)

802.1w

C)

802.1s

D)

802.1t

E)

802.1D

Question 12 1
/ 1 point

According to the Nyquist theorem, what is the minimum rate
that should be used when an analog voice signal is sampled? (Select the best answer.)

A)

two times the highest input frequency

B)

equal to the highest input frequency

C)

one-half of the highest input frequency

D)

one-fourth of the highest input frequency

E)

four times the highest input frequency

Question 13 1
/ 1 point

Which of the following values is the maximum end-to-end
transit time that can adequately support voice traffic on a VoWLAN? (Select the best answer.)

A)

150 ms

B)

100 ms

C)

1 ms

D)

15 ms

E)

10 ms

Question 14 0.4
/ 1 point

Which of the following statements are true about an 802.11b
VoWLAN design that is based on best practices?
(Select 2 choices.)

A)

The QBSS load of each AP should be no greater than 33
percent.

B)

The overlap between adjacent channels should be between 10
and 15 percent.

C)

The packet error rate of the network should be no greater
than 5 percent.

Answer

D)

The end-to-end transfer time should be less than 150 ms for
each voice packet.

Answer

E)

The number of simultaneous G.711 calls for an AP should be
no greater than seven.

Question 15 0
/ 1 point

Which of the following statements describes Layer 2
inter-controller roaming? (Select the
best answer.)

A)

roaming between LAPs managed by the same WLC on the same IP
subnet

Answer

B)

roaming between LAPs managed by different WLCs on the same
IP subnet

C)

roaming between LAPs managed by different WLCs on different
IP subnets

D)

roaming between LAPs managed by the same WLC on different IP
subnets

E)

roaming between LAPs managed by different WLCs in different
mobility groups

Question 16 1
/ 1 point

What is the bit rate of analog voice signals being converted
into digital data streams with an input frequency of 4 kHz and 8-bit code
words? (Select the best answer.)

A)

24 Kbps

B)

32 Kbps

C)

12 Kbps

D)

64 Kbps

Question 17 1
/ 1 point

Which of the following is the first action performed on a
packet when it is received on a QoS-enabled interface? (Select the best answer.)

A)

scheduling

B)

queuing

C)

shaping

D)

classification

Question 18 1
/ 1 point

According to Cisco best practices, which of the following
percentages is the maximum amount of bandwidth that should be reserved for
voice traffic? (Select the best answer.)

A)

50 percent

B)

66 percent

C)

25 percent

D)

75 percent

E)

33 percent

Question 19 0.6
/ 1 point

Which of the following statements are true regarding the
Cisco Unified Wireless Network architecture?
(Select 2 choices.)

Answer

A)

A wireless client can be located without the use of a Cisco
Wireless Location Appliance.

B)

A LAP uses LWAPP to communicate with its associated wireless
clients.

C)

A LAP can function independently of a WLC.

D)

A wireless client can roam between LAPs without refreshing
its IP address.

Answer

E)

A WCS server is required for WLAN management.

Question 20 1
/ 1 point

Which of the following statements are true regarding the
G.711 codec? (Select 2 choices.)

A)

G.711 is a Cisco-proprietary codec.

B)

G.711 has an MOS of 5.

C)

G.711 is supported on the Cisco 7921G WIP.

D)

G.711 can provide fewer simultaneous calls than G.729 with
the same amount of bandwidth.

E)

G.711 requires a bit rate of 32 Kbps to support toll-quality
voice.

Question 21 0.6
/ 1 point

Cisco IBNS solutions use which of the following technologies
to provide security for a network?
(Select 3 choices.)

A)

PAP

Answer

B)

RADIUS

Answer

C)

EAP

D)

CHAP

Answer

E)

TACACS+ F.IEEE 802.1x

Question 22 0
/ 1 point

Which of the following statements best describes voice
traffic? (Select the best answer.)

Answer

A)

Voice traffic is not tolerant of delay.

B)

Voice traffic uses TCP to carry audio data.

C)

Voice traffic uses large packets.

D)

Voice traffic is not deterministic.

Question 23 1
/ 1 point

Which of the following wireless standards are used on the
backhaul link of a Cisco AP1510 MAP?
(Select 2 choices.)

A)

802.11n

B)

802.11i

C)

802.11b

D)

802.11g

E)

802.11a

Question 24 1
/ 1 point

Which of the following are required components in a Cisco
wireless outdoor mesh deployment?
(Select 3 choices.)

A)

a RAP

B)

a WLC

C)

an autonomous AP

D)

a MAP

Question 25 1
/ 1 point

Which of the following statements best describes the Cisco
Security Management Suite? (Select the
best answer.)

A)

it is a tool that facilitates and simplifies the operations
and management of a Cisco Self-Defending Network.

B)

It separates the configuration and management to each
individual security device on a network.

C)

It is based on the framework of the PIX that provides
firewall and VPN services.

D)

It is security software that functions primarily as a HIDS
and that can be installed on laptops.

Question 26 1
/ 1 point

Which of the following protocols can IPSec use to provide
data authentication and data integrity?
(Select 2 choices.)

A)

AH

B)

ESP

C)

DES

D)

AES

E)

GRE

Question 27 1
/ 1 point

Which of the following protocols can IPSec use to provide
data authentication and data integrity?
(Select 3 choices.)

A)

data origin authentication

B)

multicast packet encapsulation

C)

data integrity

D)

broadcast packet encapsulation

E)

data confidentiality

Question 28 1
/ 1 point

Which of the following statements is true regarding the
G.729 codec? (Select the best answer.)

A)

G.729 is a medium-complexity codec.

B)

G.729 is commonly used on the PSTN.

C)

G.729 requires the least bandwidth out of all the codecs
supported on Cisco routers.

D)

G.729 has the highest MOS score out of all the codecs
supported on Cisco routers.

E)

G.729 is the default codec supported on Cisco routers.

Question 29 1
/ 1 point

Which of the following refers to the process of buffering
packets in a software queue on a QoS-enabled interface? (Select the best answer.)

A)

traffic policing

B)

scheduling

C)

classification

D)

queuing

Question 30 1
/ 1 point

Which of the following is a critical component of the
Self-Defending Network framework that relies on 802.1x and IBNS? (Select the best answer.)

A)

trust and identity management

B)

threat defense

C)

operational management and policy control

D)

secure connectivity

E)

secure network platform

Order Solution Now

Categories: