A Cisco Self-Defending Network has been installed, but DoS attacks are still being directed at ecommerce
hosts. The connection rate at the Internet firewall was limited, but the problem persists.
What more can be done?
A. Move the servers to the DMZ.
B. Install all relevant operating system patches.
C. Block the servers’ TCP traffic at the Internet firewall.
D. Block the servers’ UDP traffic at the Internet firewall.
RST Corporation is planning to upgrade its current network. The chief technology officer has
supplied a topology diagram and an IP addressing scheme of the current network during an
RST has been growing at about twenty percent per year. It has been difficult to maintain customer
support at a satisfactory level. Therefore, the RST board has met with and directed the chief
technology officer to look into network improvements.
Which two items are most relevant in documenting RST’s business requirements? (Choose two.)
A. existing network topologies
B. network performance requirements
C. the IP addresses assigned by the ISP
D. improved customer support requirements
E. projected growth estimates
Refer to the exhibit. Which module is the Enterprise WAN module?
A. Enterprise A
B. Enterprise B
C. Enterprise F
D. Enterprise C
E. Enterprise D
F. Enterprise E
Which two of these best describe the implementation of a WAN Backup design over the Internet?
A. a best-effort method
B. bandwidth guaranteed based on interface configuration
C. designed as an alternative to a failed WAN connection
D. implemented with a point-to-point logical link using a Layer 2 tunnel
E. requires no ISP coordination or involvement
Which two design criteria require VLANs in a proposed solution? (Choose two.)
A. the segmenting of collision domains
B. a limited corporate budget
C. the use of multivendor equipment
D. security between departments
E. video streaming on the LAN
F. the segmenting of broadcast domains
Which two methods are used to enhance VPN performance on Cisco ISRs? (Choose two.)
A. SSL Acceleration Network Module
B. VPN Shared Port Adapter
C. VPN Acceleration Module
D. high-performance VPN encryption AIM
E. VPN Service Adapter
F. built-in hardware-based encryption acceleration
Which three factors best justify WAN link redundancy between geographically dispersed sites?
A. high expense of transmitting data
B. important traffic flows
C. excessive packet transmission rate
D. uncertain reliability
E. high link utilization
F. lack of speed
Which three pieces of information should be documented for each step of each phase in a design
implementation plan? (Choose three.)
A. easy guidelines in case of failure
B. estimated rollback time in case of failure
C. simple implementation guidelines
D. estimated implementation time
E. design document references
F. step description
The topology map in the draft design document should cover which two layers of the OSI model?
B. data link
In a Cisco CatOS switch, what is the recommended practice when configuring switch-to-switch
intercommunications to carry multiple VLANs for Dynamic Trunk Protocol?
A. auto toauto_negotiate
B. disable Dynamic Trunk Protocol when operating in the distribution layer
C. auto toauto_no_negotiate
D. desirable todesirable_no_negotiate
E. on toon_negotiate
F. desirable todesirable_negotiate