Designing Enterprise-level Networks
to www.exams.ws for providing helpful material
QUESTION NO: 1
Which of the following descriptions about dynamic
routing protocol is correct? ( )
A. The fundamentals ofRIPng are the same as those
of RIP, but RIPng speeds up convergence compared with
B. The packet format of OSPFv3 is the same as that
of OSPF, but OSPFv3 can support IPv6.
C. MBGP is the unique EGP routing protocol in the
D. IS-ISsupports multiple protocols so that it can
support IPv6 without any modification.
QUESTION NO: 2
Which of the following addresses should not be aggregated?
A. Loopback address
B. Inter-connecting address of the equipments
C. User subnet address
D. None of the above
QUESTION NO: 3
Which of the following descriptions about L2TP VPN
design is/are correct? ( )
A. In the L2TP VPN, IP address can be assigned to
the remote access users based on user name, and different
access control policies can be deployed for these
addresses on the firewall to realize multi-level control
over different VPN users.
B. In the case that the LNS uses agent authentication,
the authentication will fail if the Virtual- Template
interface is configured with CHAP authentication while
the LAC is configured with PAP authentication.
C. In the case that the LNSuses LCP renegotiation,
it will not apply secondary authentication to the
access user if no authentication is configured on
the Virtual-Template interface. In this case, the
user is authenticated at the LAC side only.
D. In the case that the LNS uses LCP renegotiation,
the L2TP will fail to set up the connection if no
authentication is configured on the Virtual-Template
E. The combination of L2TP and IPSec can provide security
encryption for VPN data.
QUESTION NO: 4
The equipment with carrier-class reliability refers
to the equipment that supports large capacity, non-stop
running, key module redundancy, and high stability.
QUESTION NO: 5
VPNs that provide data encryption include IPSec VPN,
SSL VPN, DVPN 1.0 and DVPN 2.0.
QUESTION NO: 6
Which of the following descriptions about VPN is correct?
A. VPN indicates that the user leases a line by itself
and the line shall be secure and separated from the
public network completely and physically.
B. VPN refers to a temporary and secure connection
established by the user over the public network.
C. VPN cannot provide information authentication or
D. VPN provides identity authentication only and does
not offer data encryption.
QUESTION NO: 7
The security services in the Open System Interconnection
security architecture include ( ) and anti-DoS.
2) Access control
3) Data privacy service
4) Data integrity service
A. 1) and 2)
B. 1), 2) and 3)
C. 2) and 4)
D. 1), 2), 3) and 4)
QUESTION NO: 8
During the IP address planning for an enterprise network,
we should use the private addresses in principle.
In case of insufficiency of the private address space,
we can use the public addresses as long as NAT is
applied for Internet access.
QUESTION NO: 9
Which of the following should be taken into consideration
during the IP planning? ( )
D. Saving IP address
QUESTION NO: 10
If the external path cost of the imported external
route is comparable with the internal path cost of
OSPF, or the internal path cost of OSPF can influence
the selection of the egresses to reach the external
network, the type of the imported external route should
be set to Type 2.
QUESTION NO: 11
The ABR is defined in OSPF as ( ).
A. A router configured with multiple areas
B. A router configured with multiple areas, including
the backbone area
C. A router configured with multiple areas, including
the backbone area where there is at least one peer
in the FULL state
D. A router configured with multiple areas, including
the backbone area, and with at least one peer in each