You are on page 1of 5

Which route description best defines a floating static route?

a route with a metric equal to the metric of a corresponding dynamic route
a route with a metric less than the metric of a corresponding dynamic route
a route with a metric greater than the metric of a corresponding dynamic route
a route with an administrative distance less than the administrative distance of a
corresponding dynamic route
a route with an administrative distance greater than the administrative distance of a
corresponding dynamic route

The OSPF routing protocol is enabled on a network. The administrator would like to enable a floating static
route to be used as a backup. Which is the correct setting for the administrative distance of the floating static
route?
0
1
50
100
120

The following line was displayed in the output of the show ip route command:

192.168.3.0/24 [120/2] via 192.168.2.2, 00:00:30, Serial0/0

Which routing protocol is the source for this route?
BGP
EIGRP
ODR
OSPF
RIP

What is the administrative distance of EIGRP-learned routes that have been injected into EIGRP
via redistribution?
1
90
100
110
170
180
For ODR learned routes, what is the default administrative distance and metric that is displayed
by the show ip route command?
[160/0]
[160/1]
[170/0]
[170/1]

Which type of traffic should receive the highest level of priority by QoS mechanisms in a
converged network design?
real-time traffic
transactional traffic
routing protocol traffic
network management traffic

In a converged network, which two types of traffic would be categorized as real-time traffic?
(Choose two.)
e-mail
file transfer
web browsing
videoconferencing
voice over IP

What is the role of QoS in a converged network?
to ensure that real-time traffic is not delayed
to give highest priority to transactional traffic
to ensure that all traffic above available bandwidth levels is dropped
to protect against the impact of worms, viruses, and other network attacks

What are two Intelligent Information Network phases that involve sharing resources and making
the network "application aware"? (Choose two.)
integrated applications
integrated standards
integrated services
integrated security
integrated transport
Which statement about the Intelligent Information Network (IIN) is true?
The IIN is an industry-standard approach to designing a modern network.
The IIN is a framework that describes how to build a Service-Oriented Network Architecture
(SONA).
The IIN defines a network design of three hierarchal layers consisting of the core,
distribution, and access layers.
The IIN offers end-to-end functionality and a centralized, unified control that promotes true
business transparency and agility.

Which feature defines functionality that is found in the integrated services phase of IIN?
making the network application-aware
pooling and sharing IT resources through virtualization
consolidating voice, video, and data into the IP network
content caching, load balancing, and application-level security

In which PPDIOO phase do key decision makers identify the initial business and technical
requirements?
Design Phase
Implement Phase
Operate Phase
Optimize Phase
Plan Phase
Prepare Phase

In which PPDIOO phase is the actual network configured and verified?
Design Phase
Implement Phase
Operate Phase
Optimize Phase
Plan Phase
Prepare Phase

Which two statements are true about an implementation plan approach? (Choose two.)
In an ad hoc approach, the Cisco Lifecycle Services framework could be used to complete a
task.
In an ad hoc approach, the network engineer identifies the need for a change and implements
the solution without planning any of the tasks.
In an ad hoc approach, the network engineer identifies the need for a change and starts with
planning as the first step.
In a structured approach, it is more likely that scalability issues, suboptimal routing, and
security issues will occur.
In a structured approach, the Fault, Configuration, Accounting, Performance, and Security
(FCAPS) model could be used to complete a task.
In a structured approach, the network engineer identifies the need for an upgrade and starts
with configuring as the first step.

Which two statements are true about the structured approach model? (Choose two.)
The Cisco Lifecycle Services approach defines six phases including the prepare, plan,
design, implement, operate, and optimize phases.
The Fault, Configuration, Accounting, Performance, and Security (FCAPS) model identifies
the implementation plan in the Fault management category.
The Fault, Configuration, Accounting, Performance, and Security (FCAPS) model identifies
the implementation plan and the implementation as part of FCAPS best practices.
The IT Infrastructure Library (ITIL) model is defined by the International Organization for
Standardization (ISO).
The Prepare, Plan, Design, Implement, Operate, and Optimize (PPDIOO) model identifies
the implementation plan as part of the Design phase and the actual implementation as part of
the Implement phase.
The Telecommunications Management Network (TMN) model is similar to the PPDIOO
model.

Which three steps are completed in the first three phases of the Prepare, Plan, Design,
Implement, Operate, and Optimize (PPDIOO) model? (Choose three.)
Archive the documentation for future use.
Characterize the existing network and sites.
Design the network topology and solutions.
Identify customer requirements.
Implement and verify the design.
Monitor and optionally redesign.

Which two steps are completed in the last three phases of the Prepare, Plan, Design, Implement,
Operate, and Optimize (PPDIOO) model? (Choose two.)
Characterize the existing network and sites.
Configure and verify the design.
Design the network topology and solutions.
Document the existing network information.
Identify customer requirements.
Monitor and optionally redesign.
The ABC Corporation implements the network for its new headquarters via the use of the Cisco
Enterprise Architecture. The network administrator wants to filter the traffic from and to the
outside world. Where should the administrator deploy a firewall device?
server farm
enterprise edge
enterprise campus
service provider edge

When designing a network infrastructure, a network engineer will use the hierarchical network
model. What two factors must be taken into account when designing the core layer? (Choose
two.)
packet manipulation to prioritize the flow of core data
redundant links to ensure fault tolerance
routing protocols that are chosen for the speed of network convergence
access control lists to curtail core layer traffic
star network topologies to reduce core layer latency

Which two functions are performed at the distribution layer of the hierarchical network model?
(Choose two.)
summarizing routes from the access layer
providing high-speed backbone switching services
allowing end users to access the local network
providing the gateway of last resort for core layer devices
isolating network problems to prevent them from affecting the core layer