Cisco Systems, Inc., Empowering the Internet Generation (SM)
Home ] Up ] CiscoSite ] Petra ] PetraThanks ] Petracronyms ] Books ] Free ]
 

Back ]

EXCELLENT
This sounds great!

RECOMMENDED
Great!

Up to 40% off!

~~~

You are visitor #### to PetraCom since November 1st, 1999.

SIGN | VIEW
GUESTBOOK

Thank You Line

   

27. Recommend Cisco IOS software features that meet a customer's requirements for performance, security, capacity, and scalability.

  1. Access Lists can
    A. Control propagation of service advertisements.
    B. Detect a malicious pattern of behavior in a sequence of packets.
    C. Help select specific packets for encryption.
    D. Provide basic security mechanisms.
  2. Cisco routers support which of the following types of queuing?
    A. Average time queuing
    B. Balance queuing
    C. Custom queuing
    D. First-in, first-out
    E. Last-in, first-out
    F. Priority queuing
    G. Weighted fair queuing
  3. To help prevent certain applications from monopolizing bandwidth, ________________ queues packets based on the arrive time of the last (rather than the first) bit.
    A. RSVP
    B. Priority Queuing
    C. Load balancing
    D. Tag Switching
    E. Weighted Fair Queuing
  4. Custom Queuing
    A. Is enabled by default.
    B. Makes sure that one designated type of traffic gets through, even if at the expense of other traffic.
    C. Provides four queues: high, medium, normal, and low priority.
    D. Provides some level of service to all traffic.
  5. Which statements are true about access list?
    A. A packet is dropped unless it meets each criteria in an access list.
    B. Applied on a per global basis.
    C. Applied on a per interface basis.
    D. Lower bandwidth requirements at the expense of greater CPU utilization.
    E. The ending contains an implicit 'deny' for all traffic.
    F. The ending contains an implicit 'permit' for all traffic.
    G. The order of an access control list is important.
  6. Which of the following is configured to allow “interesting traffic” in a router that uses DDR?
    A. Access list.
    B. ISDN switch type.
    C. Protocol encapsulation.
    D. User response interval.
1-ACD; 2-CFG; 3-Weighted Fair Queuing; 4-D; 5-CDEG; 6-Access list.
   

©2000 PetraCom—The book ranks are according to Amazon book store and will be updated periodically.

1