Thursday, December 29, 2016

JN0-633 Security, Professional (JNCIP-SEC) Exam

JN0-633 Security, Professional (JNCIP-SEC) Exam

Application-Aware Security Services
Describe the concepts, operation and functionality of AppSecure
AppSecure traffic processing
AppID
AppTrack
User FW
SSL proxy
AppFW
AppQoS
Given a scenario, demonstrate knowledge of how to configure, monitor and troubleshoot the various AppSecure modules

Virtualization
Describe the concepts, operation and functionality of various virtualization components on SRX Series Services Gateways
Routing instances
RIB groups
Routing between instances
Logical systems (LSYS)
Intra-LSYS and Inter-LSYS communication
Given a scenario, demonstrate knowledge of how to configure, monitor and troubleshoot the various elements of virtualization
Given a scenario, describe and implement filter-based forwarding (FBF)

Advanced NAT
Describe the concepts, operation and functionality of various types of NAT
NAT traffic processing
Destination NAT
Source NAT
Persistent NAT
Static NAT
Double NAT
NAT traversal
DNS doctoring
IPv6 NAT (Carrier-grade NAT) - NAT64, NAT46, NAT444, DS-Lite
Routing
NAT and FBF
NAT and security policy
Given a scenario, demonstrate knowledge of how to configure, monitor and troubleshoot advanced NAT implementations

Advanced IPSec VPNs
Describe the concepts, operation and functionality of various IPSec VPN implementations
IPSec traffic processing
Site-to-site VPNs
Hub-and-spoke VPNs
Group VPNs
Dynamic VPNs
Routing over VPNs
VPNs and NAT
Public key infrastructure (PKI) for IPSec VPNs
Traffic Selectors
VPNs and dynamic gateways
Given a scenario, demonstrate knowledge of how to configure, monitor and troubleshoot advanced IPSec VPN implementations

Intrusion Prevention
Describe the concepts, operation and functionality of Junos Intrusion Prevention System (IPS) for SRX Series Services Gateways
IPS packet inspection process
IPS rules and rulebases
Signature-based attack detection
Reconnaissance scans and fingerprinting
Flooding, attacks and spoofing
Describe how to perform setup and initial configuration for SRX Series Services Gateways with IPS functionality
IPS deployment options and considerations
Network settings
Attack database
Given a scenario, demonstrate knowledge of how to configure mechanisms to detect and protect against scans and attacks
Custom signatures
Scan prevention

Transparent Mode
Describe the concepts, operation and functionality of various transparent mode implementations
High Availability
VLAN translation
Layer 2 security
IRB
Bridge groups
Spanning tree traffic processing
Given a scenario, demonstrate knowledge of how to configure, monitor and troubleshoot transparent mode implementations

Troubleshooting
Given a scenario, demonstrate knowledge of how to troubleshoot Junos OS security issues
Flow analysis
SNMP
show commands
Logging and syslog
Tracing, including flow traceoptions
Policy flow
Packet capture


QUESTION 1
Which AppSecure module provides Quality of Service?

A. AppTrack
B. AppFW
C. AppID
D. AppQoS

Answer: D


QUESTION 2
You are asked to configure your SRX Series device to support IDP SSL inspections for up to 6,000 concurrent HTTP sessions to a server within your network.
Which two statements are true in this scenario? (Choose two.)

A. You must add at least one PKI certificate.
B. Junos does not support more than 5000 sessions in this scenario.
C. You must enable SSL decoding.
D. You must enable SSL inspection.

Answer: C,D


QUESTION 3
You are troubleshooting an SRX240 acting as a NAT translator for transit traffic. Traffic is dropping at the SRX240 in your network.Which three tools would you use to troubleshoot the issue? (Choose three.)

A. security flow traceoptions
B. monitor interface traffic
C. show security flow session
D. monitor traffic interface
E. debug flow basic

Answer: A,B,C
Reference: http://kb.juniper.net/InfoCenter/index?page=content&id=KB16110


QUESTION 4
You are asked to establish a baseline for your company's network traffic to determine the bandwidth usage per application. You want to undertake this task on the central SRX device that connects all segments together.What are two ways to accomplish this goal? (Choose two.)

A. Configure a mirror port on the SRX device to capture all traffic on a data collection server for further investigation.
B. Use interface packet counters for all permitted and denied traffic and calculate the values using Junos scripts.
C. Send SNMP traps with bandwidth usage to a central SNMP server.
D. Enable AppTrack on the SRX device and configure a remote syslog server to receive AppTrack messages.

Answer: A,D

Explanation:
AppTrack is used for visibility for application usage and bandwidth
Reference:http://www.juniper.net/us/en/local/pdf/datasheets/1000327-en.pdf





Monday, December 26, 2016

JPR-932 Juniper Networks Certified Internet Expert-SEC (JNCIE-SEC)

JNCIE-SEC Exam Objectives (Exam: JPR-932)

Infrastructure Concepts
Security Forwarding Options
Packet-based
MPLS
inet6
Flow-Based
inet6
Security Zones
Configure security zones
Device Management
User accounts
System services

High Availability
HA Clustering
Active-active
Active-passive
Reth interfaces
Link aggregation
Control and data plane
Dual fabric links
Redundancy groups

Firewall Policies
Security Polices
Policy configuration
Advanced policy options
Schedulers
ALGs
Authorization
Bypass flow forwarding
Logging
Data and control plane logs
Forward logs to the RE
Send logs to external collectors
UTM
Anti-virus
Web filtering

IPSec VPNs
Implementation of IPSec VPNs
Multipoint tunnels
Policy-based VPNs
Route-based VPNs
Traffic selectors
Proxy ID
Traceoptions
Dual and backup tunnels
On-demand tunnels
DRP over a tunnel
Dynamic VPNs
Certificate-based VPNs
PKI
Interoperability with 3rd party devices

NAT
Implementation of NAT
Source NAT
Destination NAT
Static NAT
NAT64
Implementation of NAT with IPSec
Overlapping IPs between sites

Advanced Security Services
AppSecure
AppTrack
AppFW
AppQoS
AppDoS
Application Identification
User Firewall
SSL Forward Proxy
Integration with IPS
IDP
Logs
Custom polices
Automatic updates
L3/L4/L7 DoS
Stateless filters
Screens
Flow options
App DDos
Active Directory Integration

IGPs
OSPF
Multi-area OSPF topologies
Filter and summarize routes
Network and link types
Route selection process
Redistribution
IPv6

BGP
Implementation
Routing policy
Route selection
IPv6

Protocol-Independent Routing
Filter-based Forwarding
Based on Layer 4
Based on IFL
Configuring Routes
Aggregate
Static
Generated
Policies

Extended Implementation Concepts
Transparent mode
Configure transparent mode


Wednesday, December 21, 2016

JN0-1360 Juniper Networks Certified Design Specialist, WAN (JNCDS-WAN)

JNCDS-WAN Exam Objectives (Exam: JN0-1360)

WAN Connectivity
Describe the various methods of WAN connectivity
Public/Private/Managed
Service Provider connectivity
Service Provider hand-off methods
Service Provider MPLS services
Enterprise Internet transport
Enterprise Layer 2/Layer 3 handoff services
Enterprise private connections

Network Availability and Traffic Prioritization
Describe network availability concepts
Calculating availability
Physical redundancy
Logical redundancy
Fate sharing (e.g., high availability)
Capacity planning
Describe class of service concepts
Diffserv
CoS processing

Service Provider Core WAN Design
Describe the design considerations of a Service Provider's core WAN
Network segmentation
IGP design
BGP design
MPLS design

Service Provider Edge WAN Design
Describe the design considerations of a Service Provider's edge WAN
Layer 2 Services
Layer 3 services
Metro Ethernet
Subscriber services
Multicast services

Enterprise WAN
Describe the design considerations of an Enterprise WAN
Private WANs
Large Enterprise WAN design
SME WAN design

Data Center WAN
Describe the design considerations of a data center WAN
Gateway and fabric connectivity
L2 WAN extensions
EVPN
VXLAN

WAN Security
Describe the design considerations for security in the WAN
Platform security
BGP Flowspec
MACsec
IPsec
Subscriber access security

WAN Management
Describe the design considerations for WAN management
OOB management design
Junos Space management platform
Best practices

SDN in the WAN
Describe the design considerations of SDN in the WAN
SD-WAN (protocols, considerations, benefits)
Northstar
WANDL
Contrail Cloud CPE

Thursday, December 15, 2016

JN0-690 Junos Troubleshooting

Junos Troubleshooting Exam Objectives (Exam: JN0-691)

Troubleshooting Methodology
Identify the elements to build a framework for approaching troubleshooting Junos devices
General troubleshooting methodology
Broad troubleshooting steps
Identify tools that can be used to troubleshoot Junos devices
CLI
Craft interface
Logging
Traceoptions
Real-time monitoring
Core files
Port mirroring
Identify tools that can be used for device and network monitoring
SNMP
RMON
Sampling

Chassis Monitoring and Troubleshooting
Identify the concepts, tools and features used to monitor and troubleshoot chassis-related components of Junos devices
Chassis
RE and PFE components
Fans and power supplies
System
Storage and file system
Boot media and start-up sequence
System software
Backups
Given a scenario, demonstrate knowledge of how to monitor and troubleshoot the chassis and core system components of Junos devices
show commands
Logging

Control Plane Monitoring and Troubleshooting
Identify the concepts, tools and features used to monitor and troubleshoot the control plane of Junos devices
System processes
User processes
ARP
RIB/FIB
Given a scenario, demonstrate knowledge of how to monitor and troubleshoot the control plane of Junos devices
show commands
clear commands
monitor commands
Logging
Traceoptions

Data Plane Monitoring and Troubleshooting
Identify the concepts, tools and features used to monitor and troubleshoot the data plane of Junos devices
PFE issues
Ethernet interfaces
MTU issues
Link flapping
Forwarding table issues
PFE load balancing
Local vs. transit traffic
Firewall filters and policers
Given a scenario, demonstrate knowledge of how to monitor and troubleshoot the data plane of Junos devices
request commands
show commands
monitor commands
clear commands
Loopback testing

Layer 2 and Layer 3 Protocol Monitoring and Troubleshooting
Identify the concepts, tools and features used to monitor and troubleshoot Layer 3 protocols on Junos devices
Routing table information
Routing loops
OSPF neighbors
OSPF adjacencies
BGP peering and peer groups
BGP neighbor states
Identify the concepts, tools and features used to monitor and troubleshoot Layer 2 protocols on Junos devices
VLAN’s
bridging concepts
xSTP protocols
switching table
Given a scenario, demonstrate knowledge of how to perform basic monitoring and troubleshooting of Layer 3 protocols on Junos devices
show commands
clear commands
Traceoptions
Given a scenario, demonstrate knowledge of how to perform basic monitoring and troubleshooting of Layer 2 protocols on Junos devices
show commands
clear commands
Traceoptions

High Availability (HA) Monitoring and Troubleshooting
Identify the concepts, tools and features used to monitor and troubleshoot HA components for Junos devices
Graceful Routing Engine switchover (GRES)
Graceful restart (GR)
Nonstop active routing/bridging
Virtual router redundancy protocol (VRRP)
Link aggregation groups (LAG)
Unified in-service software upgrade (ISSU)
Given a scenario, demonstrate knowledge of how to perform monitoring and troubleshooting of HA features on Junos devices
monitor commands
show commands
request commands

QUESTION 1
Which CLI command is used to restart a software process?

A. restart
B. reboot
C. commit
D. reload

Answer: A

Explanation: To restart a process one have to use restart , reboot is not even a
valid command.
Possible completions:
restart Restart software process


QUESTION 2
Which CLI command applies the candidate configuration to the active configuration?

A. load
B. merge
C. copy run start
D. commit

Answer: D

Explanation: Copy run start is a Cisco specific command and is nowhere to be found in Junos.
>commit Commit current set of changes


QUESTION 3
Which operational CLI command would you use to troubleshoot hardware-related problems?

A. show system
B. show chassis
C. show route
D. show cli

Answer: B

Explanation: Show route will only show you routing, show chassis will show you hardware related
information.
>show chassis ?
Possible completions:
alarms Show alarm status
cluster Show chassis cluster information
craft-interface Show craft interface status
environment Show component status and temperature, cooling system speeds
fan Show fan and fan tray information
firmware Show firmware and operating system version for components
forwarding Show forwarding process (fwdd) status
fpc Show Flexible PIC Concentrator status
hardware Show installed hardware components
location Show physical location of chassis
mac-addresses Show media access control addresses
pic Show Physical Interface Card state, type, and uptime
routing-engine Show Routing Engine status
temperature-thresholds Show chassis temperature threshold settings
usb Show chassis USB status


QUESTION 4
In the Junos OS, which type of file dumps the program’s environment in the form of memory
pointers, instructions, and register data to a file in the event of a panic or other serious
malfunction?

A. log file
B. backup file
C. configuration file
D. core file

Answer: D

Explanation: Junos will under a panic create a core-dump file, definitely not a backup file.
> show system core-dumps
/var/crash/*core*: No such file or directory
/var/tmp/*core*: No such file or directory
/var/tmp/pics/*core*: No such file or directory
/var/crash/kernel.*: No such file or directory
/tftpboot/corefiles/*core*: No such file or directory


QUESTION 5
Which operational CLI command would you use to display information about the system and
software processes?

A. show system
B. show chassis
C. show route
D. show cli

Answer: A

Explanation: Show route will only show you routing, show system will show you software related
information:
>show system ?
Possible completions:
alarms Show system alarm status
audit Show file system MD5 hash and permissions
auto-snapshot Show auto-snapshot status when system booted from alternate slice
autoinstallation Show autoinstallation information
autorecovery Show autorecovery information
boot-messages Show boot time messages
buffers Show buffer statistics
certificate Show installed X509 certificates
commit Show pending commit requests (if any) and commit history
configuration Show configuration information
connections Show system connection activity
core-dumps Show system core files
directory-usage Show local directory information
download Show status of downloads
firmware Show all firmware version information
health Show online diagnostic status
license Show feature licenses information
login Show system login state
memory Show system memory usage
processes Show system process table
queues Show queue statistics
reboot Show any pending halt or reboot requests
resource-cleanup Show resource cleanup information
rollback Show rolled back configuration
services Show service applications information
snapshot Show snapshot information
software Show loaded JUNOS extensions
statistics Show statistics for protocol
storage Show local storage data
threads Show system threads table
uptime Show time since system and processes started
users Show users who are currently logged in
virtual-memory Show kernel dynamic memory usage

Tuesday, December 13, 2016

JN0-694 Enterprise Routing and Switching Support, Professional (JNCSP-ENT)

JNCSP-ENT Exam Objectives (Exam: JN0-694)

IGP Troubleshooting
Given a scenario, demonstrate knowledge of how to troubleshoot OSPFv2 and OSPFv3 issues on Junos devices
Routing issues
Neighbor/adjacency issues
Configuration issues

BGP Troubleshooting
Given a scenario, demonstrate knowledge of how to troubleshoot BGP issues on Junos devices
Peering issues
Routing issues
Next hop resolution issues
Configuration issues

Routing Policy Troubleshooting
Given a scenario, demonstrate knowledge of how to troubleshoot routing policy issues on Junos devices
Forwarding table policy issues
Routing instance issues
IGP policy issues
BGP policy issues
Configuration issues

Layer 2 Switching Troubleshooting
Given a scenario, demonstrate knowledge of how to troubleshoot Spanning Tree issues on Junos devices
STP
RSTP
MSTP
VSTP
Configuration issues
Given a scenario, demonstrate knowledge of how to troubleshoot other Layer 2 switching and High Availability issues on Junos devices
VLAN issues
Q-in-Q tunneling and L2PT issues
Layer 2 port security issues
Authentication and access control issues
Virtual chassis
Configuration issues

Multicast Troubleshooting
Given a scenario, demonstrate knowledge of how to troubleshoot multicast issues on Junos devices
RP issues
SPT issues
PIM issues
IGMP issues
Configuration issues

Class of Service (CoS) Troubleshooting
Given a scenario, demonstrate knowledge of how to troubleshoot CoS issues
Classification and rewrite issues
Policer issues
Queuing/scheduling issues
Packet drop issues
Configuration issues



QUESTION 1
You are implementing Q-in-Q tunneling on an EX Series switch. You want the tunnel to support all
C-VLANs; however, only some VLANs are able to send traffic across the tunnel. Switch-1 has the
following configuration:
[edit vlans]
user@Switch-1# show
v100 {
vlan-id 100;
interface {
ge-0/0/0.10;
ge-0/0/1.20;
}
dot1q-tunneling {
customer-vlans [ ];
}
}
What would solve this problem?

A. Add family ethernet-switching to the tunnel-side interface on Switch-1.
B. Implement RSTP.
C. Q-in-Q tunneling will not work in this scenario; use a Layer 2 VPN instead.
D. Remove the customer-vlans statement.

Answer: C

Explanation:


QUESTION 2
You are troubleshooting a problem where an OSPF adjacency between two neighboring routers will not form.
What are two reasons for this problem? (Choose two.)

A. One or both of the connected interfaces are missing the family inet statement.
B. One or both of the connected interfaces are missing the family iso statement.
C. The connected interfaces are not on the same subnet.
D. Another IGP is running on one or both of the routers, overriding OSPF.

Answer: B,D

Explanation:


QUESTION 3
Your Junos device is dropping certain traffic flows, while allowing other traffic flows to pass through the device unaffected.
Which CoS component is causing this problem?

A. BA classification
B. RED
C. MF classification
D. Rewrite rules

Answer: D

Explanation:


QUESTION 4
Two neighboring routers are able to form an OSPF adjacency, but are not able to establish an IBGP neighborship.
What are two reasons for the IBGP neighborship problem? (Choose two.)

A. One of the devices has a misconfigured BGP peer address.
B. One or both of the connected interfaces are missing the family iso statement.
C. OSPF has a lower route preference than BGP.
D. A firewall filter on one of the interfaces is blocking TCP traffic.

Answer: B,C

Explanation:

Tuesday, December 6, 2016

JN0-380 Wireless LAN, Specialist (JNCIS-WLAN)

JNCIS-WLAN Exam Objectives (Exam: JN0-380)

Wireless LAN Overview
Identify concepts, general features and functionality of the Juniper Networks wireless LAN product line
WLAN standards
WLC protocols
WLAN authentication, authorization and encryption
Hardware - APs, controllers, servers
Software - RingMaster
Licensing

Planning
Describe the elements of coverage area model and requirements
RF environment
Device requirements
Site visit
Describe the elements of predictive planning with RingMaster
AutoCAD file requirements
Site creation
Area planning
Identify various other planning parameters
Sites, buildings and floors
Coverage areas
RF obstacles
APs
Redundancy options
Data and VoIP capacity options

Initial Setup and Installation
Identify wireless LAN hardware, software and licensing requirements
WLAN controllers (WLCs)
RingMaster
Demonstrate knowledge of how to perform setup and initial installation of Juniper Networks wireless LAN hardware and software
AP boot and configuration options
WLC configuration using QuickStart and RingMaster
RingMaster installation and setup

Deployment and Configuration
Describe the elements of planning and data gathering for a deployment project
Data forwarding models
Centralized vs. distributed controllers
Capacity planning and bandwidth considerations
Redundancy planning
Coverage details
Network details
Site visit
Demonstrate knowledge of how to implement services for the Juniper Networks wireless LAN
Service types and characteristics
Radio profile
Service profile
AAA server definitions
Network access rules
Service mapping

Domains and High Availability
Describe the concepts, benefits and operation of domains and high availability
Mobility Domain seed
Synchronization
Redundancy and interleaving
Security
Clustering guidelines
Cluster AP affinity groups
Demonstrate knowledge of how to configure and monitor domains and high availability
Mobility Domain
Clusters
Network Domain

Architecture
Describe various architecture considerations for a Juniper Networks wireless LAN environment
Voice support - SIP recognition, call admission control, QoS
Mesh services - mesh APs, wireless bridging
Spectrum analysis
Remote AP
Client load balancing
Bandwidth control
NAT/PAT implementation options
Advanced RADIUS implementation
Location detection
VLAN pooling
High-latency network support
Adaptive channel (Auto-tune enhancements)
Transmit beam-forming
IPv6 support

Wireless LAN Services
Describe the concepts, operation and functionality of various wireless LAN services
Open, 802.1x, Web Portal, voice, and mesh concepts and characteristics
Services configuration options
Describe and configure 802.1x options
Pass through mode vs offload mode
EAP Protocols
Describe and configure Web portal options
Local vs external Web portal configuration
Certificate and encryption options

Security
Describe the steps and components for securing a WLAN
Threat evaluation
Access control
Securing and separating services
Client protection
Intrusion detection and protection systems (IDS/IPS)
802.1x
Certificates

Management and Reporting
Demonstrate knowledge of how to manage a Juniper Networks wireless LAN environment
RingMaster server and client
WLCs
Hardware upgrades
System recovery
Configuration management (backup and restore)
Demonstrate knowledge of how to implement RingMaster reporting
Report definition and generation
Scheduling

Integration
Describe how the WLS can integrate with other network technologies
RADIUS
DHCP options
LDAP
Snoop
DNS for APs and WLCs

Monitoring and Troubleshooting
Demonstrate knowledge of how to monitor the Juniper Networks wireless LAN environment
SNMP
Polling
Dashboard
System status
Clients
Traffic
Alarms
Security
Event log
Demonstrate knowledge of how to troubleshoot the Juniper Networks wireless LAN environment
Troubleshooting process and flow
Network troubleshooting tools
Trace messages
MSS commands
AP issues
Client issues
Controller issues
Configuration issues
RingMaster issues
Network integration issues
Services issues
Clustering issues

QUESTION 1
Which RingMaster license is needed to enable the RingMaster API?

A. base license
B. USM license
C. Agent license
D. AP license

Answer: C

Explanation:


QUESTION 2
A small business is using Radio Frequency (RF) planning to establish and limit the number of
access points (APs) needed for a coverage area. The company is trying to decide what to use for
the baseline association rate for clients to connect to the access points.
Which two statements are correct? (Choose two.)

A. A baseline association rate of 54 Mbps requires more APs than a baseline association rate of
18 Mbps.
B. A baseline association rate of 18 Mbps requires more APs than a baseline association rate of
54 Mbps.
C. A baseline association rate of 54 Mbps requires the client to be farther away from the AP to
reach the targeted rate.
D. A baseline association rate of 18 Mbps requires the client to be farther away from the AP to
reach the targeted rate.

Answer: A,D

Explanation:


QUESTION 3
You are using the RF Planning tool in RingMaster to configure a data capacity plan for a client.
Which three settings are required on the Data Capacity Options page? (Choose three.)

A. AP authentication mode
B. Per Station Throughput
C. Expected Station Count
D. Coverage Area
E. Station Oversubscription Ratio

Answer: B,C,E

Explanation:


QUESTION 4
Multiple users are complaining that their wireless connections are not working.
Which RingMaster screen would the administrator use for troubleshooting?

A. Alarms
B. Clients
C. Monitor
D. Verification

Answer: C

Explanation:


QUESTION 5
A network administrator must perform a software upgrade of a factory-default wireless LAN
controller (WLC) using the CLI.
Which three actions are required? (Choose three.)

A. Set the inactive boot partition to the active boot partition.
B. Add an upgraded license for the new image.
C. Copy the new image to the inactive boot partition using TFTP.
D. Reboot the controller.
E. Upgrade the connected access points (APs) before upgrading the controller.

Answer: A,C,D

Explanation:

Monday, November 28, 2016

650-148 ISEE Cisco IronPort Sales Specialist — Email


Exam Number 650-148
Last day to test: December 31, 2016
Duration 45 minutes (25-30 questions)
Available Languages English

The 650-148 ISSE Cisco IronPort Sales Specialist — Email exam tests your knowledge of how to position and sell Cisco IronPort email security solutions.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

QUESTION 1
Which of the following is a good feature to enable during email security appliance (ESA)
evaluations?

A. Bounce verification
B. Unwanted Market Message Detection
C. Mail Flow Central
D. Centralized Management

Answer: A

Explanation:

QUESTION 2
Your prospect says they aren't willing to make big changes to their networks to try a Cisco IronPort
solution. That's a problem because Cisco IronPort appliances can't be tested unless they are the
primary gateway or filter?

A. True for both ESA and WSA
B. False for both ESA and WSA
C. True for ESA but not WSA
D. True for WSA but not ESA

Answer: B

Explanation:

QUESTION 3
Most of the features on the M-Series management appliance are specifically for

A. ScanSafe customers
B. Email Security Customers
C. Web Security Customers

Answer: B

Explanation:

QUESTION 4
Multi-scan is associated with which of the following?

A. Anti-Spam Engine
B. Reputation Filtering
C. Anti-Virus Engine

Answer: C

Explanation:

Wednesday, November 9, 2016

650-669 CSPVDMD Cisco SP Video Digital Media Design for SE for Validating Knowledge

650-669 CSPVDMD Cisco SP Video Digital Media Design for SE
for Validating Knowledge (not for Cisco Certification)


2013 Cisco Systems, Inc. This document is Cisco Public. Page 1
Cisco SP Video Digital Media Design for SE (650-669)
Exam Description: The 650-669 Cisco SP Video Digital Media Design for SE (CSPVDMD) exam is a 45-minute test with 25–35 questions. The exam tests a candidate's knowledge on designing a digital media solution, configuring and testing the solution, and comparing it against competitive solutions by articulating key differentiators. Candidates can prepare for this exam by taking the Authorized Service Provider Video Partner Digital Media track of training, including Phases I, II, and III.

The following topics are general guidelines for the content that is likely to be included on the exam. However, other related topics may also appear on any specific instance of the exam. To better reflect the contents of the exam and for clarity purposes, these guidelines may change at any time without notice.

100% 1.0 SE Cisco SP Video Digital Media Design
QUESTION 1
Which two video formats are supported by the Cisco OCMG? (Choose two.}

A. ATSC
B. 3G
C. HD
D. DVB-C

Answer: C,D

Explanation:


QUESTION 2
When configuring backup on the Cisco ROSA EM. What information must be entered for each
device that is connected to a video router?

A. the physical port connections of the backup equipment to the router
B. the physical port connections of the primary equipment to the router
C. the physical port connections of the backup and primary equipment to the router relations
D. relations between the router and the primary and backup equipment in the DHB

Answer: C

Explanation:


QUESTION 3
Which two SDI input hardware configurations are available on one Cisco DCM IP gateway card?
(Choose two.)

A. 3 input and 3 output
B. 6 input
C. 6 input and 6 output
D. 12 input
E. 12 output

Answer: A,C

Explanation:

Friday, October 28, 2016

820-427 BTBBSS Building Business Specialist Skills (BTBBSS)

Exam Number 820-427 BTBBSS
Associated Certifications Cisco Enterprise IT Business Specialist
Duration 90 Minutes (60 - 70 questions)
Available Languages English
The 820-427 Building Business Specialist Skills exam tests a candidate's knowledge of skills to effectively discover opportunities for IT value, design, and ability to oversee development of business-focused solutions plus translate among business and IT language. These abilities are highly valued by IT and Line of Business leaders, as indicators than an IT professional has the expertise and influence to deliver superior business impacts.

This exam tests a candidate's knowledge of skills to effectively discover opportunities for IT value, design, and oversee development of business-focused solutions plus translate among business and IT language. These abilities are highly valued by IT and Line of Business leaders, as indicators that an IT professional has the expertise and influence to deliver superior business impacts. Candidates can prepare for this exam by taking the Building Business Specialist Skills course (BTBBSS).

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

1.0 Business Context 9%

1.1 Describe the purpose of an organization's vision, mission, strategy, objectives, and initiatives

1.2 Compare and contrast Critical Success Factors (CSFs) and Key Performance Indicators (KPIs)

1.3 Contrast strategy, management, and operations

1.4 Compare frameworks used across business and IT efforts

1.4.a Enterprise architecture (i.e., TOGAF, COBIT)
1.4.b Quality (i.e., Six Sigma)
1.4.c Service management (i.e., ITIL)
1.4.d Program management (i.e., MSP, MOP)
1.4.e Project management (i.e., PMBOK, Prince II, APMP)

2.0 Research Techniques and Tools 10%

2.1 Compare and contrast business-focused investigative techniques and tools (i.e., workshops, observation, primary research, questionnaires, interviews, focus groups)

2.2 Use and apply business-focused investigative techniques and tools

2.3 Apply technology discovery methods to gather information (i.e., usage patterns, external industry research papers, conferences, monitoring tools)

3.0 Business Analysis and Business Case 17%

3.1 Create a stakeholder map and conduct stakeholder analysis

3.2 Identify relevant business scenarios

3.3 Create an analysis of business capabilities

3.4 Construct gap analysis and document pain points/opportunities.

3.5 Identify elements of a cross-functional business diagram.

3.6 Describe the structure of a business case.

3.7 Create and verify the value proposition as the foundation of the business case.

3.8 Describe how to use a business case through the life cycle, to approval for investments

4.0 Technology and Trends 13%

4.1 Describe the as-is state: current services and how to optimize them for maximum value

4.2 Describe how technology impacts an organization's business capabilities

4.2.a Describe consequences of not changing outdated technologies
4.2.b Describe consequences of adopting emerging or new technologies

4.3 Identify the enterprise architecture taxonomy and how its components interrelate

4.4 Demonstrate ability to work with business and technology subject matter experts to research and assess options for technology improvement

4.5 Discover technology advances and explain how they impact business value

5.0 Technology Analysis 16%

5.1 Analyze business requirements to determine technology requirements

5.2 Identify existing technology capabilities

5.3 Formulate needed technology capabilities

5.4 Evaluate technology gaps

5.5 Compare possible technology solutions and map them to existing technology capabilities and stakeholder viewpoints

5.6 Formulate one or more recommendations based on possible technology solutions

5.7 Design a Proof of Concept and analyze the results

5.8 Employ techniques to align technology requirements with business capabilities

5.9 Evaluate potential internal and external technology solutions

5.9.a Analyze whether existing technology can be leveraged to solve business problems
5.9.b Provide technology requirements (domain knowledge) to include within RFIs/RFPs/RFQs
5.9.c Grade the responses to RFIs/RFPs/RFQs
5.9.d Assess considerations of different IT solution deployment strategies

5.10 Evaluate the non-financial impact of technologies, trends, and consumption models as they apply to business solutions

6.0 Finance Basics and Project Management 13%

6.1 Apply financial terms in the context of evaluating a simple business case

6.2 Describe and apply technology consumption and pricing models in a business context

6.2a Hardware
6.2b Software Licensing
6.2c Internal and external support and professional services
6.2d Cost of operations
6.2e Lifecycle management
6.2f Pay as you use models
6.2g CAPEX to OPEX

6.3 Describe implications of budgeting practices

6.3.a How budgets affect decisions within an organization
6.3.b Charge back, show back
6.3.c Project bundling

6.4 Describe how value is created and managed within an enterprise

6.4.a Defining Value
6.4.b Balancing risk versus rewards
6.4.c Approaches and influences on financial investment decisions

6.5 Develop portions of a financially justified business case, to answer key questions and support achievement of results

6.5.a Calculate return on the investment
6.5.b Compare against cost of capital
6.5.c Identify level of risk
6.5.d Define how the business cases helps in translating benefits into financial value
6.5.e Calculate ROI, Total cost of ownership, time to value, break-even point

6.6 Explain how project management helps to promote successful outcomes

6.7 Explain core principles, methods, and techniques for effectively managing projects

6.8 Describe how to influence a project implementation to ensure success

6.9 Demonstrate ability to perform risk analysis (financial, operational, and strategic)

6.10 Create a risk mitigation plan

7.0 Implementation and Adoption 10%

7.1 Demonstrate ability to work with delivery teams to ensure implementations meet requirements

7.2 Demonstrate ability to work with management team to plan for and ensure successful adoption of technology solutions

7.3 Collect metrics, analyze against KPIs and CSFs, and report back to senior management

7.4 Create the phased roadmap for implementation and adoption

7.5 Calculate the impact of technological change on people and processes

7.6 Demonstrate ability to incorporate IT change management best practice principles within a solution proposal

7.7 Construct requirements for adoption of IT solutions into the business

8.0 Communications and Influence 12%

8.1 Articulate technical information in a clear and concise manner

8.2 Apply core communication skills effectively

8.3 Demonstrate ability to deliver information effectively

8.3.a Vary communications level of detail, style, scope, by audience (i.e.one on one, group, executive)
8.3.b Align messages to the audience
QUESTION 1
What two statements correctly describe vision or mission? (Choose two.)

A. A mission is a statement of the purpose of a company.
B. A vision is what a company wants to become in the mid-term or long-term future.
C. A vision describes actions the organization will take to achieve specific goals.
D. A mission identifies the company's planned investments to increase revenue.
E. A vision is only used by for-profit companies.
F. A mission is only used by public sector organizations.

Answer: A,B

Explanation:


QUESTION 2
What two statements are true about Key Performance Indicators (KPIs)? (Choose two.)

A. A KPI is a quantifiable metric of the performance of essential operations and/or processes in an organization.
B. A KPI provides the focal point for identifying how much risk a company can take in trying to avoid government fines.
C. A KPI could reflect the performance of Service Providers in achieving their goals and objectives.
D. KPIs are based on judgment, and therefore should be used carefully when defining the value of a technology solution.

Answer: A,C

Explanation:


QUESTION 3
Which is a critical first step when thinking about how to communicate technical content to a senior business manager?

A. Identify a person on her staff who can explain details.
B. Listen to the customer to understand her KPIs.
C. Plan out your message to explain potential options.
D. Draft a high level message using language pulled from the top IT vendors.

Answer: B

Explanation:


QUESTION 4
Your company wants to increase sales by selling in new countries and by getting more repeat
orders and revenue from current customers. What is one technique that can help to communicate
how technology solutions can improve business outcomes?

A. Prepare a detailed cause and effect model.
B. Benchmark different technology solutions to identify the best mix of hardware and software.
C. Prepare a visual diagram showing the current business operation and possible future scenarios
with different technology solutions in place.
D. Create a document that has a summary of current problems followed by detailed descriptions of
technology features that reduce operating costs.

Answer: C

Explanation:


QUESTION 5
When asked about IT skills gaps, where does "Speak business language" fall in a list of concerns?

A. "Speak business language" would be helpful to improve, but not among the most critcal gaps.
B. The ranking varies depending on the industry and whether the business person is new in their job.
C. "Speak business language" is consistently mentioned as a top concern for IT professionals.
D. "Speak business language" is a very low priority but moving higher because business people
need to learn the terms for technologies like cloud.

Answer: C

Explanation:

Wednesday, October 26, 2016

200-105 ICND2 Interconnecting Cisco Networking Devices Part 2

Exam Number 200-105 ICND2
Associated Certifications CCNA Routing & Switching
Duration 90 Minutes (45-55 questions)
Available Languages English, Japanese

This exam tests a candidate's knowledge and skills related to LAN switching technologies, IPv4 and IPv6 routing technologies, WAN technologies, infrastructure services, and infrastructure maintenance.

The Interconnecting Cisco Networking Devices Part 2 (200-105 ICND2) exam is a 90-minute, 45–55 question assessment that is associated with the associated with the CCNA Routing and Switching certification. This exam tests a candidate's knowledge and skills related to LAN switching technologies, IPv4 and IPv6 routing technologies, WAN technologies, infrastructure services, and infrastructure maintenance.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.


Subscribe to Cisco Learning Network Premium and access the most comprehensive e-learning training, resources and tools you’ll need to prepare for your CCENT, CCNA and CCNP Routing and Switching certifications.

1.0 LAN Switching Technologies 26%

1.1 Configure, verify, and troubleshoot VLANs (normal/extended range) spanning multiple switches

1.1.a Access ports (data and voice)
1.1.b Default VLAN

1.2 Configure, verify, and troubleshoot interswitch connectivity

1.2.a Add and remove VLANs on a trunk
1.2.b DTP and VTP (v1&v2)

1.3 Configure, verify, and troubleshoot STP protocols

1.3.a STP mode (PVST+ and RPVST+)
1.3.b STP root bridge selection

1.4 Configure, verify, and troubleshoot STP-related optional features

1.4.a PortFast
1.4.b BPDU guard

1.5 Configure, verify, and troubleshoot (Layer 2/Layer 3) EtherChannel

1.5.a Static
1.5.b PAGP
1.5.c LACP

1.6 Describe the benefits of switch stacking and chassis aggregation

1.7 Describe common access layer threat mitigation techniques

1.7.a 802.1x
1.7.b DHCP snooping
1.7.c Nondefault native VLAN

2.0 Routing Technologies 29%

2.1 Configure, verify, and troubleshoot Inter-VLAN routing

2.1.a Router on a stick
2.1.b SVI

2.2 Compare and contrast distance vector and link-state routing protocols

2.3 Compare and contrast interior and exterior routing protocols

2.4 Configure, verify, and troubleshoot single area and multiarea OSPFv2 for IPv4 (excluding authentication, filtering, manual summarization, redistribution, stub, virtual-link, and LSAs)

2.5 Configure, verify, and troubleshoot single area and multiarea OSPFv3 for IPv6 (excluding authentication, filtering, manual summarization, redistribution, stub, virtual-link, and LSAs)

2.6 Configure, verify, and troubleshoot EIGRP for IPv4 (excluding authentication, filtering, manual summarization, redistribution, stub)

2.7 Configure, verify, and troubleshoot EIGRP for IPv6 (excluding authentication, filtering, manual summarization, redistribution, stub)

3.0 WAN Technologies 16%

3.1 Configure and verify PPP and MLPPP on WAN interfaces using local authentication

3.2 Configure, verify, and troubleshoot PPPoE client-side interfaces using local authentication

3.3 Configure, verify, and troubleshoot GRE tunnel connectivity

3.4 Describe WAN topology options

3.4.a Point-to-point
3.4.b Hub and spoke
3.4.c Full mesh
3.4.d Single vs dual-homed

3.5 Describe WAN access connectivity options

3.5.a MPLS
3.5.b MetroEthernet
3.5.c Broadband PPPoE
3.5.d Internet VPN (DMVPN, site-to-site VPN, client VPN)

3.6 Configure and verify single-homed branch connectivity using eBGP IPv4 (limited to peering and route advertisement using Network command only)

4.0 Infrastructure Services 14%

4.1 Configure, verify, and troubleshoot basic HSRP

4.1.a Priority
4.1.b Preemption
4.1.c Version

4.2 Describe the effects of cloud resources on enterprise network architecture

4.2.a Traffic path to internal and external cloud services
4.2.b Virtual services
4.2.c Basic virtual network infrastructure

4.3 Describe basic QoS concepts

4.3.a Marking
4.3.b Device trust
4.3.c Prioritization
4.3.c. [i] Voice
4.3.c. [ii] Video
4.3.c. [iii] Data
4.3.d Shaping
4.3.e Policing
4.3.f Congestion management

4.4 Configure, verify, and troubleshoot IPv4 and IPv6 access list for traffic filtering

4.4.a Standard
4.4.b Extended
4.4.c Named

4.5 Verify ACLs using the APIC-EM Path Trace ACL analysis tool

5.0 Infrastructure Maintenance 15%

5.1 Configure and verify device-monitoring protocols

5.1.a SNMPv2
5.1.b SNMPv3

5.2 Troubleshoot network connectivity issues using ICMP echo-based IP SLA

5.3 Use local SPAN to troubleshoot and resolve problems

5.4 Describe device management using AAA with TACACS+ and RADIUS

5.5 Describe network programmability in enterprise network architecture

5.5.a Function of a controller
5.5.b Separation of control plane and data plane
5.5.c Northbound and southbound APIs

5.6 Troubleshoot basic Layer 3 end-to-end connectivity issues

QUESTION 1
Which layer in the OSI reference model is responsible for determining the availability of the receiving program and checking to see if enough resources exist
for that communication?

A. transport
B. network
C. presentation
D. session
E. application

Answer: E

Explanation:
This question is to examine the OSI reference model.
The Application layer is responsible for identifying and establishing the availability of the intended communication partner and determining whether sufficient resources for the intended communication exist.

QUESTION 2
A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the network administrator is using for this operation?

A. application
B. presentation
C. session
D. transport
E. internet
F. data link

Answer: A
Explanation:
FTP belongs to Application layer and it is also the highest layer of the OSI model.

QUESTION 3
Which of the following correctly describe steps in the OSI data encapsulation process? (Choose two.)

A. The transport layer divides a data stream into segments and may add reliability and flow control information.
B. The data link layer adds physical source and destination addresses and an FCS to the segment.
C. Packets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information.
D. Packets are created when the network layer adds Layer 3 addresses and control information to a segment.
E. The presentation layer translates bits into voltages for transmission across the physical link.

Answer: A,D

Explanation:
The transport layer segments data into smaller pieces for transport. Each segment is assigned a sequence number, so that the receiving device can reassemble the data on arrival.
The transport layer also use flow control to maximize the transfer rate while minimizing the requirements to retransmit. For example, in TCP, basic flow control is implemented by acknowledgment by the receiver of the receipt of data; the sender waits for this acknowledgment before sending the next part.
The Network layer (Layer 3) has two key responsibilities. First, this layer controls the logical addressing of devices. Second, the network layer determines the best path to a particular destination network, and routes the data appropriately.

QUESTION 4
Where does routing occur within the DoD TCP/IP reference model?

A. application
B. internet
C. network
D. transport

Answer: B

QUESTION 5
A network interface port has collision detection and carrier sensing enabled on a shared twisted pair network. From this statement, what is known about the network interface port?

A. This is a 10 Mb/s switch port.
B. This is a 100 Mb/s switch port.
C. This is an Ethernet port operating at half duplex.
D. This is an Ethernet port operating at full duplex.
E. This is a port on a network interface card in a PC.

Answer: C

Explanation:
Modern Ethernet networks built with switches and full-duplex connections no longer utilize CSMA/CD. CSMA/CD is only used in obsolete shared media Ethernet (which uses repeater or hub).


QUESTION 6
Which three statements accurately describe Layer 2 Ethernet switches? (Choose three.)

A. Spanning Tree Protocol allows switches to automatically share VLAN information.
B. Establishing VLANs increases the number of broadcast domains.
C. Switches that are configured with VLANs make forwarding decisions based on both Layer 2 and Layer 3 address information.
D. Microsegmentation decreases the number of collisions on the network.
E. In a properly functioning network with redundant switched paths, each switched segment will contain one root bridge with all its ports in the forwarding state. All other switches in that broadcast domain will have only one root port.
F. If a switch receives a frame for an unknown destination, it uses ARP to resolve the address.

Answer: B,D,E

Explanation:
Microsegmentation is a network design (functionality) where each workstation or device on a network gets its own dedicated segment (collision domain) to the switch. Each network device gets the full bandwidth of the segment and does not have to share the segment with other devices. Microsegmentation reduces and can even eliminate collisions because each segment is its own collision domain ->.
Note: Microsegmentation decreases the number of collisions but it increases the number of collision domains.


Monday, October 17, 2016

300-360 WIDESIGN Designing Cisco Wireless Enterprise Networks

Exam Number 300-360
Associated Certifications CCNP Wireless
Duration 90 Minutes (60 – 70 questions)
Available Languages English
This exam tests a candidate’s knowledge of identifying customer and application requirements, applying predictive wireless design principles and conducting site surveys needed to design and optimize Enterprise wireless networks
The Designing Cisco Wireless Enterprise Networks (WIDESIGN) exam (300-360) is a 90-minute, 60-70 question assessment that is associated with the CCNP Wireless certification. This exam tests a candidate’s knowledge of identifying customer and application requirements, applying predictive wireless design principles and conducting site surveys needed to design and optimize Enterprise wireless networks.
The following topics are general guidelines for the content that is likely to be included on the exam. However, other related topics may also appear on any specific instance of the exam. To better reflect the contents of the exam and for clarity purposes, these guidelines may change at any time without notice. Candidates can prepare for this exam by taking the Designing Cisco Wireless Enterprise Networks (WIDESIGN) course.
1.0 Obtaining Customer Requirements as Related to the WLAN Installation 12%

1.1 Identify business and RF application needs
1.2 Identify client density, capabilities and their impact on the wireless network
1.2.a Client quantity, radio type, spatial streams
1.3 Identify the challenges of setting up a wireless network by various vertical markets
1.4 Describe required site survey documentation
1.4.a Customer questionnaire
1.4.b Floor plans & their quality
1.4.c Describe the deliverables of the site survey
1.5 Identify coverage area requirements
1.5.a Mesh
1.5.b High density
1.5.c Security sensitive
1.5.d Real time applications
2.0 Determine Facility Type and Constraints Related to WLAN Deployments 12%

2.1 Describe impact of regulatory domains
2.1.a Mesh
2.1.b Channel and power
2.1.c Multi-national deployments
2.2 Identify deployment location safety considerations
2.3 Identify the impact of customer aesthetic limitations on the installation
2.4 Assess the existing wired and wireless infrastructure
2.4.a Determine high-throughput and very high throughput (VHT) protocol (n/ac) impact
2.4.b Determine existing wireless infrastructure if required
2.5 Identify impact of material attenuation
2.5.a Walls, cubicles, and the likes
2.5.b Single/multi-floor
2.5.c Campus
2.5.d Warehouse/retail
2.5.e Subtitle number 2.2
3.0 WLAN Predictive Design 14%

3.1 Select the criteria used for coverage design
3.1.a Data vs voice vs video vs location
3.2 Demonstrate the impact of frequency planning in a high density environment
3.2.a Band select for high density
3.2.b Optimize 2.4 GHz radio utilization
3.2.c Legacy devices
3.2.d Channel width
3.3 Use PI and Ekahau planning tools to make network plan
3.3.a Enter network requirements in the tool
3.3.a.[i] Capacity requirements
3.3.a.[ii] Coverage requirements
3.3.b Define the environment
3.3.b.[i] Maps and scale
3.3.b.[ii] Types of RF obstacles
3.3.c Place and configure simulated APs and antennas
3.3.c.[i] Place simulated APs (manual, automatics)
3.3.c.[ii] Adjust APs and Antennas / AP TX power height and down tilt
3.3.d Analyze key network metrics using heat maps for 2.4 and 5GHz
3.3.d.[i] Analyze coverage, SNR, and channel overlap
3.3.d.[ii] Analyze AP placements in regards to real time handoffs around corner
4.0 Pre-Deployment Site Survey 14%

4.1 Identify the appropriate site survey equipment and access requirements based on environmental needs
4.2 Complete the Layer 2 site survey for indoor, and outdoor MESH environments
4.2.a Select proper AP and antenna for conducting site survey
4.2.b Configure AP
4.2.c Survey for worst case client
4.3 Complete Layer 1 survey (Cisco CleanAir, Metageek Chanalyzer)
5.0 Post-Deployment Site Survey 15%

5.1 Verify RF coverage
5.1.a Utilize tools (Ekahau) for audit
5.1.b RRM, controller
5.1.c Analyze SNR, channel overlap, and packet loss
5.2 Verify network applications and performance
5.2.a Apply PI tools (voice readiness, location readiness, site calibration)
5.3 Reconcile any deployment issues
5.4 Assemble and deliver installation report to customer
5.4.a Indoor
5.4.b Outdoor MESH
6.0 Design the Infrastructure of the Wireless Network 15%

6.1 Determine physical infrastructure requirements
6.1.a AC Power and POE
6.1.b Understand cable plant considerations
6.1.c Mounting considerations: NEMA
6.1.d Outdoor grounding and lighting protection
6.1.e Rack capacity
6.1.f Switch port capacity
6.2 Determine logical infrastructure requirements
6.2.a Determine AP count, controller count, and license requirements
6.2.b Decide the type of architecture for the deployment
6.3 Describe IPv6 optimization on the WLC
6.3.a RA filter
6.3.b DHCP Server guard
6.3.c DHCPv6 Source guard
7.0 Describe and Design Wireless Architecture for Real time Applications 18%

7.1 Describe the relationship between real time applications & the wireless networks
7.1.a Packet Error Rate (PER)
7.1.b RF Coverage
7.1.c Bit Error Rate (BER)
7.1.d QoS
7.1.e Call Admission Control (CAC)
7.1.f Client roaming decision algorithm
7.2 Describe voice and video as they apply to the wireless network
7.2.a Device capabilities (hardware and software)
7.2.b Call setup/data flow overview
7.2.c Other wireless voice and video services (i.e. Jabber, Lync, Skype, Viber, Facetime)
7.2.d Standards and WIFI Alliance (WFA) certifications (.11r, .11e, .11n/ac, .11k, CCKM, voice enterprise, voice personal, WMM, UAPSD)
7.2.e Cisco Compatible Extensions (voice features)
7.2.f Voice and video codecs
7.2.g Skinny Client Control Protocol (SCCP)
7.2.h Session Initiation Protocol (SIP)
7.3 Describe real time applications (other than voice and video) as they apply to the wireless network
7.3.a Session based and non-session based
7.3.b Roaming sensitivity
7.3.c Disconnection issue
7.4 Design wireless roaming parameters for supporting real time applications
7.4.a 802.11 r/k, CCKM, OKC, mobility groups, interface groups,
7.4.b Tuning RF parameters
7.4.c AP placement considerations
7.5 Design wireless parameters for supporting real time applications
7.5.a Minimum speed requirements-RSSI and SNR
7.5.b Client transmit and receive sensitivity / mismatch with AP
7.5.c Cell overlap requirements
7.5.d Cell separations
7.5.e Traffic control and management, QoS, VLAN, WMM, AVC
7.5.f Delay and jitter requirements
7.5.g CAC and TSPEC
7.5.h Spectrum
7.5.i 802.11n/ac enhancements
7.5.j Concurrent client connections
7.5.k Band select
QUESTION 1
An engineer is conducting a location readiness test and wants a selected point to be considered location-ready. Which three possible configurations reflect the minimum number of APs needed? (Choose three.)
A. One AP is resident in each quadrant surrounding the point-in-question.
B. One AP per 1400 sq. ft. on the map.
C. Two APs are resident in each quadrant surrounding the point-in- question.
D. Four APs are deployed on the floor.
E. Three APs are within 70 feet (21 meters) of the point-in- question
F. Three APs are deployed on the floor.
Answer: A,D,E
Explanation:
A point in a WLAN deployment is location ready if the following are all determined to be true:
At least four access points are deployed on the floor.
At least one access point is found to be resident in each quadrant surrounding the point-in-QUESTION NO:. At least one access point residing in each of at least three of the surrounding quadrants is located within 70 feet of the point-in-QUESTION NO:. Reference:
http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Borderless_Networks/Unified_Ac cess/ CMX/CMX_LocFund.pdf

QUESTION 2
A customer has a business-critical voice network and wants to be alerted whenever voice clients move out of a coverage area and experience RSSI below -67 dBm on the 5 GHz band. Which option can be configured on the wireless controller to alert network administrators when this limit is surpassed?
A. EDCA; voice optimized
B. SIP voice sample interval
C. 802.11a voice RSSI coverage threshold
D. traffic stream metrics
Answer: C

QUESTION 3
Which two factors influence the density of APs in a data-only WLAN environment? (Choose two.)
A. the number of clients that will roam through the facility
B. the type of controller chosen
C. the defined coverage area and customer needs
D. the number of APs dedicated to voice services
E. channel reuse and WLAN bandwidth
Answer: C,E

Thursday, September 29, 2016

650-127 CGE Authorized Connected Grid Engineer Knowledge Verification

Exam Number 650-127
Duration 60 minutes (55-60 questions)
Available Languages English

This exam will test the knowledge of system engineers and field engineers regarding the features, functions, design, and planning for deployment of the Cisco Connected Grid technology solution. There will be a focus on the features and benefits of the Cisco 2010 Connected Grid Router (CGR 2010) and the Cisco 2500 Series Connected Grid Switch (CGS 2500). The solution deployment planning will include design, configuration, implementation, and integration.

Exam Topics
The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

Introduction to Cisco Connected Grid Go-to-Market and Product Positioning
How to Sell
Cisco Connected Grid Ordering and Support
Cisco 2010 Connected Grid Router (CGR) Product Overview
Cisco 2500 Connected Grid Switch (CGS) Product Overview
Cisco Connected Grid Solutions


QUESTION 1
Which of the following models supports Power over Ethernet?

A. CGS-2520-24TC
B. CGS-2520-16S-8PC
C. All CGS models
D. None of the modelsupportsPOE

Answer: C

Explanation:


QUESTION 2
Which of the following is not a supported PDI Help Desk function?

A. design and configuration support
B. technical product question
C. implementation questions and support
D. On site support
E. RFP review

Answer: D

Explanation:


QUESTION 3
Which function is available on the Cisco Series 2500 Connected Grid Switch?

A. EnergyWise
B. inputs and outputs for alarms
C. GRWIC modules
D. StackWise

Answer: C

Explanation:

Wednesday, September 28, 2016

650-082 MITSE Mobile Internet Technology for System Engineers

Exam Number 650-082
Duration 60 minutes (55-65 questions)
Available Languages English

This exam will test System Engineer's knowledge of features, functions and design of the Cisco ASR 5000 mobile internet solution. There will be a focus on design and planning for deployment. Candidates should prepare for this exam by taking the Mobile Internet Technology for Account Managers course as the MIT SE exam covers content from both the AM and SE training courses.

Exam Topics
The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

Describe ASR 5000 Hardware and Software
Describe Understanding the StarOS Command Line Interface (CLI)
Describe Software Licensing and Upgrade
Describe ASR 5000 Core services for GPRS/UMTS - SGSN and GGSN Functionalities
Describe the Design and Implementation of xGSN
Describe Billing & Policy
Describe Statistics and Alarms
Describe Services Overview
Describe the Design and Implementation of LTE


QUESTION 1
What Cisco ASR 5000 services are needed for communication between a Serving Gateway and
Packet Data Network Gateway?

A. EGTP and GTPU
B. GTPU and PGW
C. SGW and GTPU
D. EGTP and SGW

Answer: B


QUESTION 2
Which option helps to define activities that are needed to successfully deploy and operate Cisco
technologies?

A. Smart Services
B. Cisco lifecycle Services
C. TAC
D. Cisco Technical Services

Answer: A


QUESTION 3
Which card has the resources to run multiple services?

A. system management card
B. switch processor I/O card
C. packet service card
D. redundant crossbar card

Answer: C

Sunday, September 25, 2016

650-059 LCSARS Lifecycle Services Advanced Routing and Switching

Exam Number 650-059
Duration 60 minutes (45-55 Questions)
Available Languages English and Japanese
Register Pearson VUE

The 650-059 LCSARS Lifecycle Services Advanced Routing and Switching exam tests a candidate's knowledge and skills for the Cisco Lifecycle Services approach to help successfully sell, deploy, and support Cisco technologies and optimize their performance. Candidates can prepare for this exam by taking the LCSARS Lifecycle Services Advanced Routing and Switching course.

Exam Topics
The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

Describe the value of Cisco Lifecycle Services for Advanced Routing & Switching
Identify the phases of the Cisco Lifecycle Services for Advanced Routing & Switching
Identify the value of the Cisco Lifecycle Services for Advanced Routing & Switching
Describe the value of the service components included in the Prepare phase
Describe the value of the service components included in the Plan phase
Describe the value of the service components included in the Design phase
Describe the value of the service components included in the Implement phase
Describe the value of the service components in the Operate phase
Describe the value of the Service Component in the Optimize phase

Describe the value of the activities in each phase of the Cisco Lifecycle Services approach
Describe the value of the activities included in the Prepare phase
Describe the value of the activities included in the Plan phase
Describe the value of the activities included in the Design phase
Describe the value of the activities in the Implement phase
Describe the value of the activities included in the Operate phase
Describe the value of the activities included in the Optimize phase


QUESTION 1
Which two of these activities comprise the problem management service component in the operat
phase? (choose two.)

A. send a replacement module
B. schedule a maintenance window
C. manage the problem
D. identify the problem
E. confirm roles and responsibilities

Answer: C,D


QUESTION 2
Identify a customer support model for the solution is an activity thet is part of which service
component in the plan phase?

A. operations readiness assessment
B. planning project kickoff (deployment project management)
C. operations plan development
D. system requirements validation

Answer: A


QUESTION 3
Which three of these service components are included in the optimize phase? (choose three.)

A. change management
B. security administration
C. technology assessment
D. operations assessment
E. operations readiness assessment
F. security assessment

Answer: C,D,F

Thursday, September 22, 2016

Exam 70-981 Recertification for MCSE: Private Cloud

Published: August 13, 2014
Languages: English, Japanese
Audiences: IT professionals
Technology: Windows Server 2012
Credit toward certification: MCP, MCSE

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Configure data center process automation
Implement workflows
Implement SCO Runbook automation; automate remediation of incidents, including resolution of System Center Virtual Machine‒based incidents; design and build end-to-end automation, incorporating System Center 2012 technologies; implement change control and problem resolution workflows
Implement service offerings
Add a new service offering to the service catalog, create a custom workflow using the Service Manager console, reference Orchestrator workflows in Service Manager, implement self-service provisioning of virtual machines

Deploy resource monitoring
Deploy end-to-end monitoring
Deploy agents, discover and deploy network device monitoring, import and configure management packs, deploy and configure monitoring of a heterogeneous virtualization infrastructure
Configure end-to-end monitoring
Configure overrides, create synthetic transactions, configure Outside-In monitoring, configure application performance monitoring (APM), create distributed application models, integrate the monitoring infrastructure with Global Service Monitor (GSM)
Create monitoring reports and dashboards
Implement service-level tracking; implement reports, including chargeback reports and System Center Manager data warehouse reports; implement dashboards

Configure and maintain service management
Implement service level management
Define service level objectives (SLOs) and service level agreements (SLAs); implement SLA management and escalation; maintain SLAs, including planning for future growth; analyze SLAs (reporting)
Manage problems and incidents
Customize problem management, link incidents to problems, and resolve problems; raise, assign, and resolve incidents; perform root cause analysis/diagnosis; integrate problem and incident resolution with change management; create and manage a knowledge base
Manage cloud resources
Deploy new applications to private and public clouds; deploy virtual machine (VM)/service (applications, SQL, roles), deploy multi-tier applications by using service templates, manage applications in private and public clouds, manage VM hardware (CPUs, dynamic memory), manage self service

Configure the fabric
Configure the storage fabric
Classification and pools, providers, arrays, file server cluster, storage pools, file shares
Configure the network fabric
Logical networks; VM networks; IP/MAC resource pools; VIP templates; load balancing; logical switches; network isolation, including network virtualization with Windows Server Gateway; private VLANs and VLANs
Configure and manage the deployment and update servers
Integrate a Windows Server Update Services (WSUS) server into the Virtual Machine Manager fabric; configure and manage a library server; integrate Windows Deployment Services (WDS)/PXE into the Virtual Machine Manager fabric, including virtualization host deployment using Windows Deployment Services (WDS)
Configure clouds and virtualization hosts
Clouds and host groups, configure and deploy virtualization hosts

Configure System Center integration
Configure private cloud integration
Configure Operations Manager connectors; Orchestrator integration packs; Service Manager connectors; SharePoint integration; configure IP Address Management (IPAM) server integration, configure AppController
Configure integration of private and public clouds
Configure Service Provider Framework (SPF), configure Windows Azure Pack for Windows Server
QUESTION 1
You need to implement a solution to meet the IM requirements for the help desk users.
What should you do?

A. Install Unified Communications Managed API 3.0 Runtime on LON-SM1.
B. Install the Lync 2010 client on LON-SM1.
C. Create a Service Manager workflow.
D. Create an IM channel.

Answer: B

Explanation:
Ref: http://technet.microsoft.com/en-us/library/hh495482.aspx

QUESTION 2
You need to implement the alert notifications. The solution must meet the technical requirements. A Lync Server administrator enables an account named ADATUM\IMUser for Unified Communications. What should you do next?

A. Configure ADATUM\IMUser as a Run As Account. Install the Lync Management Pack. Create a notification subscriber and an IM channel.
B. Create a mailbox for the ADATUM\IMUser account Install the Exchange Server Management Pack. Create a notification subscriber and an SMTP channel.
C. Create a mailbox for the ADATUM\IMUser account. Install Microsoft Visual C++ 2008 Runtime. Create a notification subscriber and an SMTP channel.
D. Configure ADATUM\IMUser as a Run As Account. Install Unified Communications
Managed API 3.0 Runtime. Create a notification subscriber and an IM channel.

Answer: D

QUESTION 3
You need to recommend a solution to remediate the Exchange Server 2010 service failures. The solution must meet the technical requirements.
What should you include in the recommendation?

A. Create a service request workflow that triggers a dependent activity.
B. Create an incident event workflow that triggers a dependent activity.
C. Create an incident event workflow that triggers a runbook activity.
D. Create a service request workflow that triggers a runbook activity.

Answer: C

QUESTION 4
You need to recommend a solution to meet the monitoring requirements for App2.
What should you include in the recommendation? (More than one answer choice may achieve the goal. Select the BEST answer.)

A. An aggregate rollup monitor
B. A distributed application
C. A dependency rollup monitor
D. Service monitors

Answer: B

QUESTION 5
You need to recommend a solution to ensure that the sales department managers can create instances of App1 in Cloud1.
What should you include in the recommendation?

A. A subscription in App Controller and a task in Service Manager
B. A dashboard in Operations Manager and a distributed application
C. A task in Operations Manager and a distributed application
D. A service offering in Service Manager and a runbook in Orchestrator

Answer: D

Tuesday, September 20, 2016

650-032 MITAM Mobile Internet Technology for Account Managers


QUESTION 1
Which two features are benefits of CDMA? (Choose two)

A. Rich VPN features
B. Fully standard complaint
C. Requirements of ANSI-41 GSM MAP conversion mode
D. Application transparency
E. Extensive QOS functionality

Answer: C,D


QUESTION 2
Which feature allows the MITG to provide industry-leading reliability?

A. ECS
B. ICSR
C. ATCS
D. Packet service card

Answer: B


QUESTION 3
Which company offers seamless migration to 4G?

A. Nokia Siemens Network
B. Cisco
C. Ericson
D. Huawei

Answer: B