Which remote access VPN addressing technique supports a static IP address to support a specific application?
Which remote access VPN addressing technique supports a static IP address to support a specific
application?
Which three are used in configuring Call Manager dial plans?
Which three are used in configuring Call Manager dial plans? (Choose three.)
Which two of these are characteristics of an IPS device?
Which two of these are characteristics of an IPS device? (Choose two.)
Which three LAN routing protocols would be appropriate for a small retail organization with a multivendor LAN
Which three LAN routing protocols would be appropriate for a small retail organization with a multivendor LAN infrastructure? (Choose three.)
Which is the most appropriate design topology?
One of your customer has six sites, three of which process a large amount of traffic among them.
He plans to grow the number of sites in the future. Which is the most appropriate design topology?
What is the recommended number of network management server(s)?
ABC Company has 1500 managed devices and 15,000 end users on a campus network. LAN
Management Solution (LMS) is being deployed as the network management application. What is
the recommended number of network management server(s)?
Which VPN topology should you recommend?
You are the network consultant from Cisco.com.Your customer has eight sites and will add in the
future.
Branch site to branch site traffic is approaching 30 percent. The customer’s goals are to make it
easier to add branch sites in the future and to reduce traffic through the hub. Which VPN topology
should you recommend?
Which two areas of security would you advise the company to strengthen?
The Schuyler and Livingston Iron Works has been working on getting its network security under
control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability
scanners to proactively identify areas of weakness, and it monitors and responds to security
events as they occur. It also employs extensive access control lists, stateful firewall
implementations, and dedicated firewall appliances. The company has been growing very fast
lately and wants to make sure it is up to date on security measures. Which two areas of security
would you advise the company to strengthen? (Choose two.)
Which two of these key fields are used to identify a flow in a traditional NetFlow implementation?
Which two of these key fields are used to identify a flow in a traditional NetFlow implementation?
(Choose two.)
Which QoS mechanism can you implement to improve the network response time?
Users at the Charleville Company began experiencing high network delays when Internet
connectivity was enabled for all users. After investigating the traffic flow, you determine that peerto-peer traffic from a music download site is consuming a large amount of bandwidth. Which QoS
mechanism can you implement to improve the network response time?