Sunteți pe pagina 1din 6

www.passforsure.

co

200-120

www.passforsure.co

QUESTION NO: 1
Which statement describes the process ID that is used to run OSPF on a router?
A. It is globally significant and is used to represent the AS number.
B. It is locally significant and is used to identify an instance of the OSPF database.
C. It is globally significant and is used to identify OSPF stub areas.
D. It is locally significant and must be the same throughout an area.
Answer: B

QUESTION NO: 2
Which three are the components of SNMP? (Choose three)
A. MIB
B. SNMP Manager
C. SysLog Server
D. SNMP Agent
E. Set
Answer: A,B,D

QUESTION NO: 3
What are the Popular destinations for syslog messages to be saved?
A. Flash
B. The logging buffer .RAM
C. The console terminal
D. Other terminals
E. Syslog server
Answer: B,C,E

QUESTION NO: 4
Syslog was configured with a level 3 trap. Which 3 types of logs would be generated
(choose three)

A. Emergencies
B. Alerts
C. Critical
D. Errors
E. Warnings
Answer: A,B,C

QUESTION NO: 5
Which protocol can cause overload on a CPU of a managed device?
A. Netflow
B. WCCP
C. IP SLA
D. SNMP
Answer: D

QUESTION NO: 6
What are the three things that the Netflow uses to consider the traffic to be in a same
flow?
A. IP address
B. Interface name
C. Port numbers
D. L3 protocol type
E. MAC address
Answer: A,C,D

QUESTION NO: 7
What is the alert message generated by SNMP agents called ?

A. TRAP
B. INFORM
C. GET
D. SET
Answer: A,B

QUESTION NO: 8
Which three features are added in SNMPv3 over SNMPv2?
A. Message Integrity
B. Compression
C. Authentication
D. Encryption
E. Error Detection
Answer: A,C,D

QUESTION NO: 9
In a GLBP network, who is responsible for the arp request?
A. AVF
B. AVG
C. Active Router
D. Standby Router
Answer: B

QUESTION 10
Which type of cable is used to connect the COM port of a host to the COM port of a
router or switch?
A. crossover
B. straight-through
C. rolled
D. shielded twisted-pair

Answer: C

QUESTION 11
When a host transmits data across a network to another host, which process does
the data go through?
A. standardization
B. conversion
C. encapsulation
D. synchronization
www.passforsure.co
Answer: C

QUESTION 12
For what two purposes does the Ethernet protocol use physical addresses? (Choose
two.)
A. to uniquely identify devices at Layer 2
B. to allow communication with devices on a different network
C. to differentiate a Layer 2 frame from a Layer 3 packet
D. to establish a priority system to determine which device gets to transmit first
E. to allow communication between different devices on the same network
F. to allow detection of a remote device when its physical address is unknown
Answer: AE

QUESTION 13
What can be done to secure the virtual terminal interfaces on a router? (Choose
two)
A. Administratively shut down the interface.
B. Physically secure the interface.
C. Create an access list and apply it to the virtual terminal interfaces with the
access-group command.

D. Configure a virtual terminal password and login process.


E. Enter an access list and apply it to the virtual terminal interfaces using the
access-class command.
Answer: DE

www.passforsure.co

S-ar putea să vă placă și