Question 1.1. (TCO 1) At which layer of the OSI model do routing protocols operate? (Points : 5)
Question 2.2. (TCO 2) What is a common organizational constraint? (Points : 5)
The size of the overhead cabling trays
Forcing policy alternations
The schedule and timeframe of the project
The skill set of the technical staff
Question 3.3. (TCO 2) End device access is typically provided in a campus design by using (Points : 5)
Layer 2 switching.
Layer 3 switching.
Layer 1 hubs.
Layer 3 routers.
Question 4.4. (TCO 3) What is the function of CDP? (Points : 5)
To enable discovery of Cisco devices
To create a connection among active directory servers
To create redundant links
To provide a backup to EIGRP
Question 5.5. (TCO 3) Network applications can be categorized into four types. Which one of these is NOT one of the four types? (Points : 5)
Question 6.6. (TCO 4) This WAN connection type was developed in the 1980s as a packet switching technology using PVCs. (Points : 5)
Question 7.7. (TCO 4) Packet loss is expressed as a(n) (Points : 5)
Question 8.8. (TCO 5) An IPV4 address uses how many bits? (Points : 5)
Question 9.9. (TCO 5) The leading zeros in an IPV6 address are (Points : 5)
only used in emergencies.
replaced by question marks.
Question 10.10. (TCO 6) The metric for RIP is (Points : 5)
Question 11.11. (TCO 7) The protocol used to carry voice conversations when using VOIP is (Points : 5)
Question 1. 1. (TCO 1) Redundancy in switch-based networks is arbitrated by what protocol? How does this protocol do this function? (Points : 35)
Question 2. 2. (TCO 2) Describe what is meant by high-availability network services. (Points : 35)
Question 3. 3. (TCO 3) When RSTP is not available, STP can be better managed using several options. Name and describe four of these options. (Points : 35)
Question 4. 4. (TCO 4) What is MPLS? How does it work when used as a WAN link between two locations? (Points : 35)
Question 5. 5. (TCO 5) What are the three types of IPV6 addresses? (Points : 35)
Question 7. 7. (TCO 7) List and explain the impact to network security of one of the four main pieces of legislation that deal with network security. (Points : 35)