<< Prev Question Next Question >>

Question 353/361

What will extend a trust boundary (there is switch interface configuration with separate voice VLAN and data VLAN configured where the phone is connected to, also small diagram showing endpoint (host), IP Phone, Access Switch, Distribution Switch, Core Switch and Data Centre Aggregation switch)?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (361q)
Question 1: Which one of the following represent correct IPv6 Global Uni...
Question 2: Which network management protocol allows a network device to...
Question 3: A consulting engineer is tasked with designing a company LAN...
Question 4: What should be considered when scaling EIGRP? (Choose three)...
Question 5: Which H.323 protocol monitors calls for factors such as pack...
Question 6: Which feature must be configured on a switch port that conne...
Question 7: In telephony, the local loop is the physical link or circuit...
Question 8: A routing protocol neighbor relationship has been establishe...
Question 9: When you make change on Network, what the consideration of e...
Question 10: Which feature will not transfer packets when there is silenc...
Question 11: What three design requirements are key to designing a campus...
Question 12: The BodMech online fitness organization specializes in creat...
Question 13: Where do you put DNS and DHCP on Enterprise model? (Choose t...
Question 14: Which type of DSL does residential service use?...
Question 15: Which IETF standard technology can be used with data center ...
Question 16: What Cisco product is designed to improve the performance of...
Question 17: Which technology allows remote networks to be connected via ...
Question 18: Consider the reservation of IP Addressing what mask you will...
Question 19: A network engineer is using the Cisco enterprise architectur...
Question 20: A data center is being deployed, and one design requirement ...
Question 21: Which Cisco Wireless LAN Controller interface is used for ou...
Question 22: Two companies that want to connect with multiple providers v...
Question 23: When collecting information about a customer's existing netw...
Question 24: What is the maximum RIPv2 hop count for a reachable route?...
Question 25: Which two design decisions can improve network resiliency? (...
Question 26: (Exhibit) Refer to the exhibit. Which three OSPF routers are...
Question 27: Directory services and electronic messaging are performed at...
Question 28: The network-design process is limited by many external const...
Question 29: Which routing protocol is classful?...
Question 30: Which modules are found in the Enterprise Edge functional ar...
Question 31: Which two descriptions of Cisco Application Centric Infrastr...
Question 32: (Exhibit) Refer to the exhibit. When a VSS configuration is ...
Question 33: Which subnet mask should you use on point-to-point links to ...
Question 34: Where in the network hierarchy should network access control...
Question 35: What DNS entry to use for WLC with firmware version 6.0 or l...
Question 36: What is the length of the key used with Triple Data Encrypti...
Question 37: What two access point modes support the transmission of user...
Question 38: Refer to the exhibit. (Exhibit) A standard Layer 2 campus ne...
Question 39: Which parameters does the computation of the EIGRP composite...
Question 40: SNMP is short for Simple Network Management Protocol. Which ...
Question 41: An engineer has configured a router to send level 7 messages...
Question 42: What is SNMP?
Question 43: Which two design methodology steps relate, at least in part,...
Question 44: In a network with Enhanced Interior Gateway Routing Protocol...
Question 45: Which two states are RSTP port states? (Choose two.)...
Question 46: Data link switching is typically used in which Enterprise Ca...
Question 47: Which three options are characteristics of data center evolu...
Question 48: For the following items, which component of the CiscoWorks p...
Question 49: A network engineer is following the Cisco enterprise archite...
Question 50: What significant advantage does EIGRP have over OSPF?...
Question 51: Which three Cisco technologies can you use to detect and mit...
Question 52: What is the virtual information store used within SNMP calle...
Question 53: What characteristic separates link state routing protocols f...
Question 54: Why would an engineer implement variable-length subnet masks...
Question 55: Which mechanism will be often used by service providers to d...
Question 56: Which standard language will be used by SNMP to define the d...
Question 57: Which WAN technology is a cost-effective method to deliver 1...
Question 58: Which Cisco proprietary protocol will be used in LAN switche...
Question 59: Which two options should be considered when designing an OSP...
Question 60: As a network engineer, can you tell me accounting management...
Question 61: An organization is conducting an evaluation on the migration...
Question 62: In which operation mode does the AP act as a dedicated senso...
Question 63: Which option is an advanced congestion management mechanism ...
Question 64: During the design of a new campus network, the customer requ...
Question 65: In which layer of the OSI model does Real-Time Transport Pro...
Question 66: Which hierarchical layer has functions such as High availabi...
Question 67: A network engineer is attempting to separate routing domains...
Question 68: Directory services and electronic messaging are performed at...
Question 69: When building Global network businesses, which three princip...
Question 70: What tool would you use to decode protocols?...
Question 71: Refer to the exhibit. (Exhibit) Which functionality must be ...
Question 72: For a VLAN that requires 70 hosts, which subnet is the most ...
Question 73: Which interior routing protocol has the most preferable admi...
Question 74: Refer to the exhibit. (Exhibit) You are designing routing be...
Question 75: Your boss is interested in a wireless WAN solution which pro...
Question 76: Which data center connection supports QoS, full mesh deploym...
Question 77: Which option is used by OSPF to reduce the flooding domain o...
Question 78: How many more bits does IPv6 use for addresses than IPv4?...
Question 79: Which type of structure consists of the addressing, routing ...
Question 80: Which two features are Cisco recommended best practices for ...
Question 81: What is important for the top-down design concept?...
Question 82: Which first-hop redundancy protocol dynamically distributes ...
Question 83: Which two encryption transforms will be used by both ESP and...
Question 84: What is the maximum number of switches in VSS?...
Question 85: What kind of servers you should place in DMZ?...
Question 86: What phase of Cisco's PPDIOO includes the identification and...
Question 87: In Cisco ACI, which option is the unified point of automatio...
Question 88: A network architect working for a large financial institutio...
Question 89: What access policies to set up for remote VPN access (Choose...
Question 90: Which item is the fundamental basis of a virtual network?...
Question 91: What does FCAPS stand for?
Question 92: Which WAN scenario might be appropriate for queuing solution...
Question 93: ISDN is short for Integrated Services Digital Network. Under...
Question 94: A network engineer is using the traditional switched hierarc...
Question 95: What branch design supports 100 to 1000 users and integrates...
Question 96: You design a network with the following network addresses: 1...
Question 97: What is DHCP?
Question 98: A company has dark fiber between headquarters and its data c...
Question 99: Which HSRP parameters must match, to ensure proper functiona...
Question 100: A data center is reaching its power and cooling capacity. Wh...
Question 101: Which two of these are scalability benefits of designing a n...
Question 102: Which types of communicating devices compose RMON architectu...
Question 103: What VPN tunneling technology supports multicast?...
Question 104: What is ASBR short for?
Question 105: In IS-IS networks, which routers does the backup designated ...
Question 106: Which option is an example of physical device virtualization...
Question 107: What are two benefits of the bottom-up design approach? (Cho...
Question 108: Which phase of cisco design life cycle the validation of net...
Question 109: What is the acronym PDIOO short for?...
Question 110: Which two of these are the most accurate characteristics of ...
Question 111: Which three of these are components of the North American Nu...
Question 112: Which option is an advantage of the bottom-up design model?...
Question 113: A network engineer is tasked to upgrade and expand a large e...
Question 114: What is the first step when creating a network security poli...
Question 115: What device virtualization technology allows for a single po...
Question 116: How to reduce the size of a routing table? (Choose two):...
Question 117: Multicast has been enabled and configured in the Enterprise,...
Question 118: Which type of routing protocol will be used when connecting ...
Question 119: A network engineer requires that an OSPF ASBR must only floo...
Question 120: Which option is a benefit of Cisco Discovery Protocol?...
Question 121: In an EAP-enabled WLAN, which component sends the EAP identi...
Question 122: What are the three models that are required in the systemati...
Question 123: A wireless LAN client is sending traffic to the wired LAN cl...
Question 124: In which two places is redundancy recommended in an enterpri...
Question 125: Which IP address can be routed to cross the public Internet?...
Question 126: What type of device can be installed to increase a broadcast...
Question 127: Which two high-level design components are included in Unifi...
Question 128: What are two purposes of route redundancy? (Choose two.)...
Question 129: What is the benefit of using VLSM?...
Question 130: Which method will be used to secure a network against man-in...
Question 131: Refer to the exhibit. (Exhibit) Assuming that a network will...
Question 132: (Exhibit) Refer to the exhibit. A network engineer at a tech...
Question 133: Which address type is 225.10.1.1?...
Question 134: In which network location should an external DNS server be p...
Question 135: For a VLAN that requires 60 hosts, which subnet is the most ...
Question 136: Which H.323 protocol is in charge of call setup and signalin...
Question 137: Which two Cisco products can be used in a data center to sup...
Question 138: Which IGP protocol is a common choice to EIGRP and OSPF as a...
Question 139: Company ABC has intermittent problems registering remote-sit...
Question 140: When is the Cisco FlexConnect design model recommended?...
Question 141: What two features are advantages of adding a secondary WAN l...
Question 142: What two CoS values are used by voice traffic? (Choose two.)...
Question 143: (Exhibit) Refer to the exhibit. Which element or elements of...
Question 144: You are performing an audit of a customer's existing network...
Question 145: Which two options should be used to achieve fast convergence...
Question 146: (Exhibit) Refer to the exhibit. Which next hop will the rout...
Question 147: Which DHCP option do you need to configure to ensure that an...
Question 148: DRAG DROP Drag the term on the left to the matching deployme...
Question 149: Which Cisco device management feature is most suited to mete...
Question 150: Which option is an advantage of a Layer 3 access model over ...
Question 151: Which answer is correct about routing metrics?...
Question 152: Which H.323 protocol is responsible for the exchanging of ca...
Question 153: A circuit order has been placed for Gigabit Ethernet and is ...
Question 154: Which two processes are included in the Build phase of the C...
Question 155: Which network virtualization technique can you implement wit...
Question 156: (Exhibit) Refer to the exhibit. The organization is migratin...
Question 157: Which queuing mechanism establishes four interface output qu...
Question 158: A customer wants to support a BYOD environment. What two pro...
Question 159: Which three options are examples of network logical virtuali...
Question 160: Which two wireless attributes should be considered during a ...
Question 161: What does CDP stand for?
Question 162: For the following protocols, which one maps names to IPv6 ad...
Question 163: Which three series of Cisco wireless controllers support wir...
Question 164: Router A has three feasible successors to the 192.168.1.0/24...
Question 165: Which statement is true about the Cisco NAC Appliance?...
Question 166: GRE has been used to establish a routing-protocol neighbor r...
Question 167: While designing the LAN core to distribution infrastructure ...
Question 168: An organization is deciding what routing protocol to use thr...
Question 169: Which two Cisco data center devices can participate in Cisco...
Question 170: When designing a high availability network, which option can...
Question 171: Which item is not a part of the process recommended by Cisco...
Question 172: What query should you make if you want to find all objects o...
Question 173: An internal network has servers with private IPv4 addresses ...
Question 174: Which QOS level should VOIP set on WLC?...
Question 175: When designing using the Cisco Enterprise Architecture, in w...
Question 176: Which option can use deep-packet examination to determine th...
Question 177: Which application can provide AAA services for Cisco Devices...
Question 178: A remote user for a company must periodically connect to the...
Question 179: Study the following options carefully. The corporate Interne...
Question 180: A consultant at Company XYZ connects to the Guest wireless n...
Question 181: A network engineer is implementing a new mesh WAN topology. ...
Question 182: Which technology should a company use to connect a branch of...
Question 183: What are two advantages of employing scalability when design...
Question 184: By default, how does EIGRP's metric differ from OSPF?...
Question 185: For the following items, which is an SP Edge module in the E...
Question 186: What describes the link performance?...
Question 187: Which attack type would you expect on segments that have man...
Question 188: (Exhibit) Refer to the exhibit. In this suboptimal design of...
Question 189: What two SAN protocols will allow a customer to utilize 10Gb...
Question 190: A network engineer is following the three tiered Network Hie...
Question 191: What tool would you use to capture, segregate and analyse IP...
Question 192: Which two statements are true regarding a hierarchical netwo...
Question 193: You are a network technician. Can you tell me how many IP ad...
Question 194: Which two options best describe the top-down design approach...
Question 195: Which protocol will be used to exchange IP routes between au...
Question 196: What three design best practices are key functions of the di...
Question 197: Which option is a benefit of the modular approach to network...
Question 198: Observe the following options, what is the hierarchy for IPv...
Question 199: What are two important aspects to consider when looking at b...
Question 200: Which two considerations are important when designing the co...
Question 201: DRAG DROP Drag the characteristic on the left to the correct...
Question 202: What three primary sources of information are needed to perf...
Question 203: Which FCAPS function includes finding network problems that ...
Question 204: DRAG DROP Drag the STP toolkit term on the left to the defin...
Question 205: An application uses broadcast traffic to send data to IPv4 h...
Question 206: What is the best point to deploy the IPS, not to have false ...
Question 207: Which design is the recommended geometric design for routed ...
Question 208: Cisco FabricPath brings the benefits of routing protocols to...
Question 209: Which option is an object instance than an API identifies us...
Question 210: Developing a network design according to layers such as core...
Question 211: Your company uses OSPF for internal routing. The company wil...
Question 212: What is the technology that allows you to combine more than ...
Question 213: In an enterprise Layer 2 switched network, which protocol mu...
Question 214: What technology can secure data over an insecure medium and ...
Question 215: What branch connection type supports SLAs, Full-Mesh connect...
Question 216: Which two mechanisms are used by distance vector protocols t...
Question 217: What is the vlan subnet that can handle 60 hosts?...
Question 218: What is the name of the organization that is in charge of cr...
Question 219: For the following options, which International Telecommunica...
Question 220: Examine the following protocols, which two are used for IP S...
Question 221: What does the Cisco SLM define as the component used to spec...
Question 222: A company requires a managed WAN solution that supports Laye...
Question 223: A remote office has a T1 WAN link to headquarters and a T1 I...
Question 224: What routing protocol requires full mesh between internal pe...
Question 225: Observe the following options, in which section of the netwo...
Question 226: What does IGMP stand for?
Question 227: (Exhibit) Refer to the exhibit. Which configuration can be u...
Question 228: A remote worker for a sales company must submit daily update...
Question 229: What wireless authentication option requires a Public Key In...
Question 230: What are three valid methods of gathering information about ...
Question 231: For the following options, which emerging WAN technology use...
Question 232: With which of the following capabilities does RIPv2 improve ...
Question 233: Which option is the greatest concern when a network design r...
Question 234: When designing a new enterprise campus network, what topolog...
Question 235: A network engineer has been asked to follow a top down desig...
Question 236: Which RFC defines the IPv6 standard?...
Question 237: DRAG DROP Drag the security term on the left to the matching...
Question 238: Which is the maximum segment distance for Fast Ethernet over...
Question 239: What are two advantages of a modular design? (Choose two)...
Question 240: What three customer supported details identifies network req...
Question 241: What is the key limitation of using Internet circuits as a b...
Question 242: Which statement about using STP in a redundant-link scenario...
Question 243: What is the reason for switching preferred on shared segment...
Question 244: Which advantage is of security systems that are part of the ...
Question 245: Which packet-switching topology approach typically requires ...
Question 246: A company must deploy an IGP routing protocol on an Enterpri...
Question 247: A customer requests a filtering design based on the need to ...
Question 248: Which of the following is a modular component within the Cis...
Question 249: What phase of Cisco's PPDIOO is the final test of the approp...
Question 250: Which one of the following QoS mechanisms is recommended for...
Question 251: Which two options are benefits of using a modular network ar...
Question 252: According to fundamental design principles, which location i...
Question 253: An organization is redesigning a 3-tier hierarchical network...
Question 254: Which layer is in charge of fast transport in the hierarchic...
Question 255: Refer to the exhibit. (Exhibit) Which location is best for p...
Question 256: In which two modes can you deploy Cisco IPS appliances? (Cho...
Question 257: What is the optimal device and location to fulfill these req...
Question 258: Based on best practices, which QoS profile should be configu...
Question 259: Which is the remote monitoring agent in the RMON architectur...
Question 260: Which two of these are functions of an access point in a Spl...
Question 261: What Cisco router configuration component does an implemente...
Question 262: To what Layer 2 technology does VRF closely compare?...
Question 263: An engineer receives a resource utilization alert on a route...
Question 264: Which benefit is an advantage of route summarization?...
Question 265: Which three sources does a network designer use to collect i...
Question 266: What are two benefits of a structured IPv4 addressing scheme...
Question 267: A client wants to deploy a video conferencing platform in a ...
Question 268: Choose considerations for access layer design? (Choose two.)...
Question 269: What part of the network does a top-down network design focu...
Question 270: Which statement describes an advantage of the Layer 2 access...
Question 271: Which Cisco security mechanism has the attributes listed bel...
Question 272: Which IPv4 addressing technique can be used with proper addr...
Question 273: Which one of the following is "synchronous link" design?...
Question 274: Which command is correct for creating a virtual interface on...
Question 275: An organization needs a WAN Transport technology that meets ...
Question 276: In layer 2 design approach, how you can describe STP redunda...
Question 277: Refer to the exhibit. On which router should you configure r...
Question 278: A wireless LAN or WLAN is a wireless local area network, whi...
Question 279: What statement about EVN is true?...
Question 280: When monitoring voice traffic on a converged network, which ...
Question 281: Which two solutions are parts of the Cisco Security Manageme...
Question 282: Which level needed to be set on Cisco WLC for VoIP traffic:...
Question 283: An engineer is designing a solution for multiple multihomed ...
Question 284: A network engineer is designing an enterprise managed VPN so...
Question 285: A large company requests a hierarchical design model. What t...
Question 286: A company would like to distribute a VM hosting cluster betw...
Question 287: Define some of the activities, tools, and techniques used in...
Question 288: Which statement about VSS is true?...
Question 289: An organization needs to implement isolated logical structur...
Question 290: When designing changes to an existing network, which two opt...
Question 291: A common response to an attack by this device can be either ...
Question 292: What is a benefit of IPv6 over IPv4 addresses?...
Question 293: According to Cisco best practices, which traffic control sho...
Question 294: What does ODR stand for?
Question 295: A network engineer needs to create a controller-based, high-...
Question 296: A network engineer is tasked with summarizing the routes to ...
Question 297: NAT-PT is an IPv6-IPv4 translation mechanism. What is NAT-PT...
Question 298: When evaluating network designs, what indicator demonstrates...
Question 299: Which item is not a true disadvantage of the full-mesh topol...
Question 300: If two routing protocols have the same route and prefix, whi...
Question 301: A dynamically routed private line and a statically routed IP...
Question 302: What routing configuration can prevent routing loops between...
Question 303: Which statement is true about WANs?...
Question 304: What design requirement is necessary for campus network acce...
Question 305: How often does a RIPv1 router broadcast its routing table by...
Question 306: What is the maximum switch in VSS?...
Question 307: A network design shows two routers that are directly connect...
Question 308: Which item is not an SNMP operation?...
Question 309: Which two issues are typical challenges to network stability...
Question 310: Which design enables easy and flexible scaling in the Cisco ...
Question 311: Refer to the exhibit. (Exhibit) The red lines refer to STP b...
Question 312: What submodule is found within the Enterprise Edge module?...
Question 313: Which of these domain-of-trust security statements is correc...
Question 314: Which two options can be virtual networking devices? (Choose...
Question 315: What are two reasons discontinuous IPv4 networks hinder scal...
Question 316: What IPv4 addressing technique allows for the division of ad...
Question 317: How many switches can be combined into a single network elem...
Question 318: What three considerations should be taken into account when ...
Question 319: DRAG DROP Drag the technology on the left to the matching ro...
Question 320: A network engineer must collect application-level informatio...
Question 321: Which network layer is the best fit for security features su...
Question 322: Which option is not valid for using the public Internet as a...
Question 323: Which statement describes the methodology that supports the ...
Question 324: Application servers require load balancing and security serv...
Question 325: A network engineer is using the traditional switched hierarc...
Question 326: Which protocol is best when there are circuit connections wi...
Question 327: Which two design criteria require VLANs in a proposed soluti...
Question 328: What does Compressed Real-Time Transport Protocol (CRTP) com...
Question 329: What is the benefit of VLSM?
Question 330: Which three QoS levels should VoIP clients be set to on a Ci...
Question 331: A company is using a dynamically routed private line and a s...
Question 332: What network virtualization technology can be leveraged with...
Question 333: Which statement about modular network design in true?...
Question 334: Which two considerations are important when designing the ac...
Question 335: A network engineer has finished designing and implementing a...
Question 336: A spanning tree topology can be simplified by deploying what...
Question 337: Under which phase of the Cisco Design Lifecycle would you ev...
Question 338: Which virtualization deployment an engineer will execute to ...
Question 339: (Exhibit) Refer to the exhibit. Where should routes in the r...
Question 340: Which technology allows multiple instances of a routing tabl...
Question 341: Which three pieces of information should be documented for e...
Question 342: Area Border Router (ABR) is defined by which protocol?...
Question 343: A network design engineer is seeking a dynamic routing proto...
Question 344: Which IPv4 field are the precedence bits located in?...
Question 345: What are two components of the Build phase in the Cisco Desi...
Question 346: Which Cisco technology can connect more than two switches so...
Question 347: Which two statements about the Enterprise Data Center Aggreg...
Question 348: A network engineer must connect two sites. Each site has a d...
Question 349: What is SLC?
Question 350: Which two network services should you host on the DMZ? (Choo...
Question 351: A secure WAN design requires dynamic routing and IP multicas...
Question 352: A network engineer must implement a design where LAN clients...
Question 353: What will extend a trust boundary (there is switch interface...
Question 354: Which three layers comprise the traditional hierarchical mod...
Question 355: Which option characterizes normal traffic flow and performan...
Question 356: Which term accurately describes a specific measure of delay ...
Question 357: What two performance considerations must be taken into accou...
Question 358: What does the Cisco security architecture called SAFE stand ...
Question 359: What is the primary advantage of implementing a wireless LAN...
Question 360: A client wants to consolidate applications that are currentl...
Question 361: When designing IP addressing schemes, which options are two ...