1.
While you MPLS score is using Cisco Routers, the core of a company you have acquired is not. After extending your MPLS VPN networks by integrating the cores, you discover that the end-to-end LPS path between PE
routers can't be established. Which of the following may have caused this problem?
2.
What is the default severity level of syslog trap messages?
3.
Which version of NTP was the first to support cryptographic authentication?
4.
Why is it appropriate to use conditional label advertising when deploying MPLS?
5.
Which command retrieves and displays information about each Cisco product in the form of a UDI?
6.
What is required to enable fragmentation of large FTP packets when voice quality on the network is affected by FTP transfers?
7.
You are working with Certkiller .com. who has identified the following IP applications on their network: IP voice and voice signaling, streaming video, PeopleSoft, Microsoft SQL, e-mail, and Internet traffic. If the voice traffic
was classified as EF and AF31, the e-mail was classified as AF11, and the Internet traffic was classified as DSCP 0, how would the transactional traffic represented as PeopleSoft and Microsoft SQL be classified?
8.
Which one of these class maps was configured to match traffic for CS5?
9.
When you enter the interface command auto qos voip cisco-phone on a port at the edge of a network, how does the Cisco Catalyst switch detect if a Cisco IP Phone is connected to the port?
10.
Which keyword is used with the show ip bgp neighbors [keyword] command to display all routes that are received and accepted from a neighbor?