EnsurepassQUESTION 11 What are three valid methods of gathering information about an existing data network? (Choose three.)   A. Use organizational input. B. Perform a traffic analysis. C. Analyze the user-mapping of a running application. D. Perform a packet-level audit to verify carrier service guarantees. E. Perform a network audit to gather more detail about the network. F. Use reports that analyze the metrics of the customer's existing network.   Correct Answer: Read more [...]
EnsurepassQUESTION 21 Which mode is used to exclusively look for unauthorized access points?   A. monitor mode B. sniffer mode C. rogue detector mode D. local mode   Correct Answer: C     QUESTION 22 OSPF will be used as the IGP within a campus network. Which two things should you consider before deployment? (Choose two.)   A. All areas need to connect back to area 0. B. The OSPF process number on each router should match. C. NSSA areas should be Read more [...]
EnsurepassQUESTION 31 Which RFC defines the IPv6 standard?   A. RFC 1918 B. RFC 2338 C. RFC 2460 D. RFC 2740   Correct Answer: C     QUESTION 32 What is the maximum RIPv2 hop count for a reachable route?   A. 13 B. 14 C. 15 D. 16   Correct Answer: C       QUESTION 33 Which Cisco Wireless LAN Controller interface is used for out-of-band management?   A. service port B. management port C. controller port D. Read more [...]
EnsurepassQUESTION 1 Which two statements about designing the Data Center Access layer are correct? (Choose two.)   A. Multiport NIC servers should each have their own IP address. B. Layer 3 connectivity should never be used in the access layer. C. Layer 2 connectivity is primarily implemented in the access layer. D. Multiport NIC servers should never be used in the access layer. E. Layer 2 clustering implementation requires servers to be Layer 2 adjacent.   Correct Answer: Read more [...]