1. Layer  2 forwarding protocol
  2. Data Encryption Standard
  3. Secure hash algorithmi
  4. Advanced Encryption Standard
  5. Diffiehellman
  6. RSA
  7. Generic Routing Encapsulation
  8. Layer 2 Tunneling Protocol
  9. 3 DES
  10. IPSEC
  11. PPTD
  12. Message Digests


1. Which mechanism is used to create a floating static route?
• administrative distance
• cost
• hop count
• passive interface

2. IPSec operates at which layer of the OSI model?
• application
• network
• datalink
• transport

3. Which is true regarding Frame Relay LMI?
• There are three LMI types standardized by ANSI, ITU-T, and Cisco.
• Routers at each end of a Frame Relay virtual circuit must always use the same LMI type.
• The LMI type must be manually configured.  (lebih…)

1. A network engineer has decided to pilot test a portion of a new network design rather than rely on a prototype for proof-of-concept. What are two advantages of pilot testing a design concept?(Choose two.)
• The test network experiences real-world network traffic.
• Users within the enterprise are not affected by the test.
• Network response can be tested in unplanned and unpredictable situations.
• Unlikely failure conditions can be conveniently tested.
• Network response can be tested in a highly controlled simulated environment.

2. While preparing a network test plan document, a network designer records all initial and modified device configurations. Which section of the document typically contains this information?
• Appendix
• Test Procedures
• Test Description
• Actual Results and Conclusions
• Anticipated Results and Success Criteria

3. Refer to the exhibit. A network designer creates a test plan that includes the specification shown. In which section of the test plan would this specification be found?
• Test Description
• Test Procedures  (lebih…)

1. A network engineer researched whether there are mechanisms available to help with the transition from an IPv4 addressing structure to IPv6. What three options did the engineer find?(Choose three.)
• A protocol translation mechanism allows communication between the IPv4 and IPv6 networks.
• A packet analyzer determines the addressing structure and converts it to the appropriate IPv4 or IPv6 scheme.
• New Core devices that support IPV6 must be purchased.
• A protocol converter changes IPv4 packets into IPv6 packets and vice versa.
• A dual-stack network design allows both IPv4 and IPv6 addressing to be used on all network devices.
• Tunneling allows IPv4 packets to be encapsulated so that they can traverse IPv6 networks and vice versa.

2. When should the command no auto-summary be used?
• with RIP version 1, to enable classless routing
• with RIP version 2, to enable classless routing
• with RIP version 1, when discontigous networks exist
• with RIP version 2, when discontigous networks exist

3. Refer to the exhibit. What must an administrator do on R3 to ensure that update packets are sent with subnet mask information?
• Add the commands:
R3(config-router)# auto-summary (lebih…)

1. Which two statements describe factors that influence the layout of a proposal? (Choose two.)
• Proposal layouts are required to use sans serif typefaces.
• A specific proposal layout is followed when one is specified in the RFP.
• A designer chooses the layout if a written RFP does not specify an outline.
• The software that is used to create the proposal dictates the proposal layouts.
• Proposal layouts are required to use a format that is designed by the network engineer.

2 . What two items are typically included in the executive summary of a proposal? (Choose two.)
• project scope summary
• high-level implementation plan
• quotes for all needed equipment
• technical requirements for the design
• emphasis on the benefits that meet the goals of the customer

1 Refer to the exhibit. Based on the output shown, to which IP network should the workstations in the Support department belong?

2 Refer to the exhibit. A network administrator is doing proactive network maintenance. The administrator pings and compares the results to the baseline data. Based on the comparison of the two pings, what is one (lebih…)

1 Why are Network Control Protocols used in PPP?

to establish and terminate data links
to provide authentication capabilities to PPP
to manage network congestion and to allow quality testing of the link
to allow multiple Layer 3 protocols to operate over the same physical link