A.RIP
B.EIGRP
C.OSPF
D.Static and default routes
您可能感興趣的試卷
你可能感興趣的試題
A.Perform
B.Position
C.Develop
D.Prepare
E.Plan
F.Design
A.The Cisco Control VLAN carries only Layer 2 control traffic
B.802.1Q trunking is used between the access switch and the router
C.There is no 802.1Q trunking used in these designs
D.When 802.1Q trunks are configured, they are also called Native VLANs
E.Trunking Ensures that traffic from only one VLAN is carried on that trunk
A.It encompasses the validate and solve steps
B.It encompasses the Discovery, Validate and Solve steps
C.It encompasses the Discover, Validate, Solve and Present Steps
D.It encompasses the Discovery, Solve and Close steps
E.It encompasses the Discovery, Validate and Present Steps
A.On the RAM of the ISR
B.On the USB memory stick of the ISR
C.On the NVRAM of the ISR
D.On the IPS Module of the ISR
E.On the Flash memory of the ISR
You work as a network technician at Certkiller .com. Please study the exhibit carefully. The exhibit is an example of which technology being implemented?()
A.Spanning-tree
B.802.1Q
C.VLANs
D.PAT
E.QoS
A.1 Cisco 2811 ISR,1 Catalyst Express 500G-12TC,2 Catalyst Express 500-24PC
B.1 Cisco 2851 ISR, Catalyst Express 500G-12TC,3 catalyst Express 500-24PC
C.1 Cisco 2821 ISR,Catalyst Express 500G-12TC,2 Catalyst Express 500-24PC
D.1 Cisco 2801 ISR,1 Catalyst Express 500-24PC
A.Phone+Desktop
B.Desktop
C.Switch
D.Router
E.Trunk
A.Network Codec Aggregator Tool
B.Bandwidth Estimator Tool
C.Unified Communication Bandwidth Tool
D.Voice Bandwidth Calculator
E.Voice Codec Bandwidth Calculator
A.They are separate from the central site and use NAT to route through the Internet to the Central Site
B.They are part of the VLANs at the Central Site; they are in the same subnets
C.They use public IP Addresses that are routable through the Internet
D.They are in separate subnets but are part of the private address space of the network
最新試題
To protect the network from external and internal threats, where should Cisco IPS be enabled on an ISR?()
During which phase of the steps to success methodology for Cisco SMB security solutions would the Network Readiness Assessment be used to assess the readiness of an existing network infrastructure and determine which, if any, modification should be made prior to implementation?()
You work as a network technician at Certkiller .com. Your boss, Mrs. Certkiller, is interested in SMB wireless solutions. You are required to produce the correct order for performing a Technology Strategy Development. Choose only steps that apply.
Which WAN connection requires a different interface than the standard interface provided in the Cisco Single-Site Secure Network Foundation deployment design?()
When using the steps to success methodology, where does Quote Builder fit into the deal process flow?()
You work as a network technician at Certkiller .com. Please study the exhibit carefully. The exhibit is an example of which technology being implemented?()
You are designing a solution that needs to support 40 IP phone users. Which routers model does the Cisco Single-Site Secure Network Foundation 1.1 Designing and Implementation Guide suggest for this Solution?()
Which three of these are characteristics of UTP cable?()
When determining a customer’s technical requirements for a Cisco Unified Communications solution, which important tool can be used to determine the bandwidth used by different codecs with various protocols over different media?()
Which two statements about configuration an unconnected Catalyst Express 500 switch from setup mode using a PC are true?()