Mercurial Essays

Free Essays & Assignment Examples

Network Ccnp

Which route description best defines a floating static route? a route with a metric equal to the metric of a corresponding dynamic route a route with a metric less than the metric of a corresponding dynamic route a route with a metric greater than the metric of a corresponding dynamic route a route with an administrative distance less than the administrative distance of a corresponding dynamic route a route with an administrative distance greater than the administrative distance of a corresponding dynamic route The OSPF routing protocol is enabled on a network.

The administrator would like to enable a floating static route to be used as a backup. Which is the correct setting for the administrative distance of the floating static route? 0 1 50 100 120 The following line was displayed in the output of the show ip route command: 192. 168. 3. 0/24 [120/2] via 192. 168. 2. 2, 00:00:30, Serial0/0 Which routing protocol is the source for this route? BGP EIGRP ODR OSPF RIP What is the administrative distance of EIGRP-learned routes that have been injected into EIGRP via redistribution? 1 90 100 110 170 180

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

For ODR learned routes, what is the default administrative distance and metric that is displayed by the show ip route command? [160/0] [160/1] [170/0] [170/1] Which type of traffic should receive the highest level of priority by QoS mechanisms in a converged network design? real-time traffic transactional traffic routing protocol traffic network management traffic In a converged network, which two types of traffic would be categorized as real-time traffic? (Choose two. ) e-mail file transfer web browsing videoconferencing voice over IP What is the role of QoS in a converged network? o ensure that real-time traffic is not delayed to give highest priority to transactional traffic to ensure that all traffic above available bandwidth levels is dropped to protect against the impact of worms, viruses, and other network attacks What are two Intelligent Information Network phases that involve sharing resources and making the network “application aware”? (Choose two. ) integrated applications integrated standards integrated services integrated security integrated transport Which statement about the Intelligent Information Network (IIN) is true? The IIN is an industry-standard approach to designing a modern network.

The IIN is a framework that describes how to build a Service-Oriented Network Architecture (SONA). The IIN defines a network design of three hierarchal layers consisting of the core, distribution, and access layers. The IIN offers end-to-end functionality and a centralized, unified control that promotes true business transparency and agility. Which feature defines functionality that is found in the integrated services phase of IIN? making the network application-aware pooling and sharing IT resources through virtualization consolidating voice, video, and data into the IP network content caching, load balancing, and application-level security

In which PPDIOO phase do key decision makers identify the initial business and technical requirements? Design Phase Implement Phase Operate Phase Optimize Phase Plan Phase Prepare Phase In which PPDIOO phase is the actual network configured and verified? Design Phase Implement Phase Operate Phase Optimize Phase Plan Phase Prepare Phase Which two statements are true about an implementation plan approach? (Choose two. ) In an ad hoc approach, the Cisco Lifecycle Services framework could be used to complete a task.

In an ad hoc approach, the network engineer identifies the need for a change and implements the solution without planning any of the tasks. In an ad hoc approach, the network engineer identifies the need for a change and starts with planning as the first step. In a structured approach, it is more likely that scalability issues, suboptimal routing, and security issues will occur. In a structured approach, the Fault, Configuration, Accounting, Performance, and Security (FCAPS) model could be used to complete a task. In a structured approach, the network engineer identifies the need for an upgrade and starts with configuring as the first step.

Which two statements are true about the structured approach model? (Choose two. ) The Cisco Lifecycle Services approach defines six phases including the prepare, plan, design, implement, operate, and optimize phases. The Fault, Configuration, Accounting, Performance, and Security (FCAPS) model identifies the implementation plan in the Fault management category. The Fault, Configuration, Accounting, Performance, and Security (FCAPS) model identifies the implementation plan and the implementation as part of FCAPS best practices. The IT Infrastructure Library (ITIL) model is defined by the International Organization for Standardization (ISO).

The Prepare, Plan, Design, Implement, Operate, and Optimize (PPDIOO) model identifies the implementation plan as part of the Design phase and the actual implementation as part of the Implement phase. The Telecommunications Management Network (TMN) model is similar to the PPDIOO model. Which three steps are completed in the first three phases of the Prepare, Plan, Design, Implement, Operate, and Optimize (PPDIOO) model? (Choose three. ) Archive the documentation for future use. Characterize the existing network and sites. Design the network topology and solutions. Identify customer requirements. Implement and verify the design.

Monitor and optionally redesign. Which two steps are completed in the last three phases of the Prepare, Plan, Design, Implement, Operate, and Optimize (PPDIOO) model? (Choose two. ) Characterize the existing network and sites. Configure and verify the design. Design the network topology and solutions. Document the existing network information. Identify customer requirements. Monitor and optionally redesign. The ABC Corporation implements the network for its new headquarters via the use of the Cisco Enterprise Architecture. The network administrator wants to filter the traffic from and to the outside world.

Where should the administrator deploy a firewall device? server farm enterprise edge enterprise campus service provider edge When designing a network infrastructure, a network engineer will use the hierarchical network model. What two factors must be taken into account when designing the core layer? (Choose two. ) packet manipulation to prioritize the flow of core data redundant links to ensure fault tolerance routing protocols that are chosen for the speed of network convergence access control lists to curtail core layer traffic star network topologies to reduce core layer latency

Which two functions are performed at the distribution layer of the hierarchical network model? (Choose two. ) summarizing routes from the access layer providing high-speed backbone switching services allowing end users to access the local network providing the gateway of last resort for core layer devices isolating network problems to prevent them from affecting the core layer

x

Hi!
I'm Belinda!

Would you like to get a custom essay? How about receiving a customized one?

Check it out