Specialist - Implementation Engineer, Campus Networking Exam v1.0 (DES-5121)

Page:    1 / 5   
Total 71 questions

Which AAA method is only used for 802.1x and never returns an error?

  • A. local
  • B. enable
  • C. ias
  • D. line


Answer : C

Reference:
http://ftp.dell.com/manuals/all-products/esuprt_ser_stor_net/esuprt_networking/powerconnect-8100_concept%20guide2_en-us.pdf page 209

Which Layer 3 protocol does MLAG support?

  • A. None
  • B. Static Routing
  • C. OSPF
  • D. RIPv2


Answer : A

Reference:
http://files.rakurs.su/IT/Kommytatory/Dell/N4000/powerconnect_nx00-usingmlag-whtppr_en-us.pdf

In a PoE environment, what information does the Network Policy TLV exchange between the PSE and PD?

  • A. Required Power, VLAN ID, and DSCP Value
  • B. VLAN ID, IEEE Priority, and DSCP Value
  • C. IEEE Priority, Required Power, and VLAN ID
  • D. DSCP Value, Required Power, and IEEE Priority


Answer : B

Reference:
http://ftp.dell.com/manuals/all-products/esuprt_ser_stor_net/esuprt_networking/poweredge-m-io-aggregator_Concept-Guide4_en-us.pdf page 162

Which function does a VRRP backup router perform?

  • A. Sends keepalive advertisements to the other backup routers
  • B. Processes and responds to ARP requests
  • C. Forwards packets to the Master with a destination IP of the virtual IP address
  • D. Receives packets with the virtual MAC address as the destination for other backup routers


Answer : D

Which commands should a network administrator use to configure a RADIUS server on a Dell EMC N-Series switch?

  • A. Switch-1(config)# radius 10.1.1.111 Switch-1(config-radius)# name RADIUS-Server Switch-1(config-radius)# key secretkey
  • B. Switch-1(config)# radius server auth 10.1.1.111 Switch-l(config-radius)# name RADIUS-Server Switch-1(config-radius)# key "secretkey"
  • C. Switch-1(config)# radius auth 10.1.1.111 Switch-1(config-radius)# name "RADIUS-Server" Switch-1(config-radius)# key "secretKey"
  • D. Switch-1(config)# radius auth server 10.1.1.111 Switch-1(config-radius)# name RADIUS-Server Switch-1(config-radius)# key "secretKey"


Answer : B

A network administrator is planning a PoE budget for their network.
What is the PoE source maximum power budget for a Class 4 end device?

  • A. 12.95 watts
  • B. 15.4 watts
  • C. 34.2 watts
  • D. 60 watts


Answer : page 82C

Reference:
http://ftp.dell.com/manuals/all-products/esuprt_ser_stor_net/esuprt_networking/esuprt_net_fxd_prt_swtchs/networking-n3000-series_User's-

Guide10_en-us.pdf -

A Dell EMC N-Series switch is configured to uplink to a customer switch using two separate 4-port port-channels configured as trunks. Both switches are configured with 16 VLANs and RSTP.
How will VLAN traffic be distributed across the port-channels?

  • A. All VLANs are allowed across a single port-channel
  • B. A single VLAN is allowed across each port-channel
  • C. All VLANs are allowed across both port-channels
  • D. Eight VLANs are allowed across each port-channel


Answer : A

N4032F#show interfaces status -


N4032F#show interfaces port-channel 1


Hash Algorithm Type -
1 - Source MAC, VLAN, EtherType, source module and port Id
2 - Destination MAC, VLAN, EtherType, source module and port Id
3 - Source IP and source TCP/UDP port
4 - Destination IP and destination TCP/UDP port
5 - Source/Destination MAC, VLAN, EtherType, source MODID/port
6 - Source/Destination IP and source/destination TCP/UDP port
7 - Enhanced hashing mode
A network administrator has reported poor network performance to an application server. After reviewing the logs, you determine that the server is using 100 percent of the available bandwidth on its network port. As shown in the exhibit, you configure a second link and a 2-member port-channel to an application server in an effort to increase performance. However, during testing, the network performance has not improved.
What is a possible reason why there has been no increase in the performance?

  • A. Application is using a single I/O flow
  • B. File server needs to be configured with LACP
  • C. Minimum links needs to be increased to "2"
  • D. Port-channel needs load balancing enabled


Answer : A

What is a recommended configuration for an MLAG peer-link on a Dell EMC N-Series switch?

  • A. Spanning tree must be disabled
  • B. Spanning tree must be enabled
  • C. Link must be a trunk port
  • D. Link must contain multiple interfaces


Answer : B

Which type of an attack is considered MAC poisoning?

  • A. Duplicating the MAC address of a legitimate device so frames are forwarded to the incorrect port
  • B. Host imitating a trunk port by using tagging and trunking protocols
  • C. Flooding MAC addresses to the switch to fill its CAM table, causing the switch to act as a hub
  • D. Host on a VLAN gaining unauthorized access to other VLANs on the network


Answer : A

N4032F#show interfaces status -


N4032F#show interfaces port-channel 1


Hash Algorithm Type -
1 - Source MAC, VLAN, EtherType, source module and port Id
2 - Destination MAC, VLAN, EtherType, source module and port Id
3 - Source IP and source TCP/UDP port
4 - Destination IP and destination TCP/UDP port
5 - Source/Destination MAC, VLAN, EtherType, source MODID/port
6 - Source/Destination IP and source/destination TCP/UDP port
7 - Enhanced hashing mode
N4032F#
A Dell EMC N-Series switch has been configured with a 2-member port-channel; however, only one link is currently active.
Based on the exhibit, why is only one link active?

  • A. Minimum links value for Po1 is set to "1"
  • B. Hash algorithm is configured for active-passive
  • C. Te1/0/6 interface is administratively disabled
  • D. Speed setting is different between ports


Answer : D

If VoIP traffic uses multiple QoS prioritization schemes, what refers to VoIP traffic?

  • A. COS 2, DSCP 22, AF
  • B. COS 2, DSCP 46, EF
  • C. COS 5, DSCP 42, AF
  • D. COS 5, DSCP 46, EF


Answer : D

In order to alter a packet"™s routing direction, which packet layers can policy-based routing use?

  • A. Transport, Network, Link Layer, and Physical
  • B. Link Layer, Physical, Presentation, and Session
  • C. Network, Link Layer, Physical, and Session
  • D. Application, Transport, Network, and Link Layer


Answer : A

A network administrator wants to configure an ACL to deny traffic for a specific source IP and source UDP port.
Which type of ACL should be used?

  • A. Layer 2 Standard ACL
  • B. Layer 2 Extended ACL
  • C. Layer 3 Standard ACL
  • D. Layer 3 Extended ACL


Answer : D

How does the weighted Queue Scheduler prioritize packets?

  • A. Scheduler prioritizes weighted queues over any strict queues
  • B. Weights are calculated based on the number of packets
  • C. Weights are used to calculate the number of bytes
  • D. Weight is assigned to each port


Answer : C

Reference:
https://infohub.delltechnologies.com/static/media/6582046d-70f0-4ab6-ba72-2c0b9cf26649.pdf page 6

Page:    1 / 5   
Total 71 questions