TEST

Description

EMULADOR DE EXAMEN
kenmike
Quiz by kenmike, updated more than 1 year ago
kenmike
Created by kenmike over 8 years ago
91
1

Resource summary

Question 1

Question
You want to gather as much detail as possible during a network audit, to include data time stamping across a large number of interfaces, customized according to interface, with a minimal impact on the network devices themselves. Which tool would you use to meet these requirements?
Answer
  • RMON
  • SNMPv3
  • NetFlow
  • Cisco Discovery Protocol

Question 2

Question
You want to gather as much detail as possible during a network audit with a minimal impact on the network devices themselves. Which tool would you use to include data time stamping across a large number of interfaces while being customized according to each interface?
Answer
  • RMON
  • SNMPv3
  • NetFlow
  • Cisco Discovery Protocol

Question 3

Question
In which phase of PPDIOO are the network requirements identified?
Answer
  • Design
  • Plan
  • Prepare
  • Implement
  • Operate
  • Optimize

Question 4

Question
Which is part of the Prepare phase of PPDIOO?
Answer
  • Obtain site contact information
  • Perform network audit
  • Identify customer requirements
  • Perform gap analysis

Question 5

Question
When designing the identity and access control portions for the enterprise campus network, which of these solutions would be the most appropriate solution to consider?
Answer
  • 802.1X
  • ACLs in the core layer
  • Cisco Security MARS
  • NetFlow

Question 6

Question
Which is the purpose of the Cisco NAC Profiler?
Answer
  • Automates discovery and inventory of all LAN attached devices
  • Generates a profile based on username and group
  • Learns and creates a database of virus definitions based on LAN traffic
  • A database used to map user VPN accounts

Question 7

Question
Cisco Identity-Based Networking Services relies heavily on the 802.1X protocol. Which other authentication solution is used hand-in-hand with 802.1X to authenticate users for network access?
Answer
  • RADIUS
  • LEAP
  • IPsec
  • TACACS
  • SAKMP

Question 8

Question
Which protocol is used for voice bearer traffic?
Answer
  • MGCP
  • RTP
  • SCCP
  • CDP
  • CMP

Question 9

Question
Which protocol is used to reserve bandwidth for the transport of a particular application data flow across the network?
Answer
  • cRTP
  • IEEE 802.1P
  • RSVP
  • LFI
  • Auto QOS

Question 10

Question
Which two features are supported by single wireless controller deployments? (Choose two.)
Answer
  • automatic detection and configuration of LWAPPs
  • LWAPP support across multiple floors and buildings
  • automatic detection and configuration of RF parameters
  • Layer 2 and Layer 3 roaming
  • controller redundancy
  • mobility groups

Question 11

Question
Which four services does the architecture for Media Services contain? (Choose four.)
Answer
  • access services
  • transport services
  • storage services
  • forwarding services
  • session control services
  • security services
  • filtering services
  • remote access services

Question 12

Question
Refer to the exhibit. Which layer is the distribution layer?
Answer
  • Layer A
  • Layer B
  • Layer C
  • Layers A and B form a consolidated core and distribution layer

Question 13

Question
Which IPv6 feature enables routing to distribute connection requests to the nearest content server?
Answer
  • Link-local
  • Site-local
  • Anycast
  • Multicast
  • Global aggregatable

Question 14

Question
What is the recommended spanning tree protocol to use for all Layer 2 deployments in a branch office environment?
Answer
  • CST
  • RSPT
  • PVST
  • MISTP
  • Rapid PVST +

Question 15

Question
Refer to the exhibit. A standard, Layer 2 campus network design is pictured. Which numbered box represents the distribution layer?
Answer
  • #1
  • #2
  • #3
  • #4

Question 16

Question
Which two are types of network virtualization? (Choose two.)
Answer
  • VSS: Virtual Switching System
  • VRF: virtual routing and forwarding
  • VCI: virtual channel identifier
  • VLSM: variable length subnet masking
  • VM: virtual machine
  • VMP: Virtual Memory Pool

Question 17

Question
You are tasked with designing a new branch office that will support 75 users with possible expansion in the future and will need a highly available network. Which of the branch design profiles should be implemented?
Answer
  • large branch design
  • medium branch design
  • teleworker design
  • small branch design

Question 18

Question
Which two can be used as a branch office WAN solution? (Choose two.)
Answer
  • frame relay
  • MPLS
  • Metro Ethernet
  • GPRS
  • dial-up modem
  • 3G USB modems

Question 19

Question
What is the acceptable amount of one-way network delay for voice and video applications?
Answer
  • 300 bytes
  • 1 sec
  • 150 ms
  • 500 ms

Question 20

Question
Which mode is used to exclusively look for unauthorized access points?
Answer
  • monitor mode
  • sniffer mode
  • rogue detector mode
  • local mode

Question 21

Question
Which of the following three options represents the components of the Teleworker Solution? (Choose three.)
Answer
  • Cisco Unified IP Phone
  • Cisco 880 Series Router
  • Aironet Office Extend Access Point
  • Catalyst 3560 Series Switch
  • Cisco 2900 Series Router
  • MPLS Layer 3 VPN
  • Leased lines

Question 22

Question
Which three types of WAN topologies can be deployed in the Service Provider Module? (Choose three.)
Answer
  • ring
  • star
  • full mesh
  • core/edge
  • collapsed core
  • partial mesh

Question 23

Answer
  • Redundant Links
  • Internet Deployment model
  • Redundant devices
  • Private WAN deployment
  • Redundant Links and Devices
  • MPLS Deployment Model

Question 24

Question
Which statement describes the recommended deployment of DNS and DHCP servers in the Cisco Network Architecture for the Enterprise?
Answer
  • Place the DHCP and DNS servers in the Enterprise Campus Access layer and Enterprise branch.
  • Place the DHCP and DNS servers in the Enterprise Campus Server Farm layer and Enterprise branch.
  • Place the DHCP server in the Enterprise Campus Core layer and Remote Access_VPN module with the DNS server in the Internet Connectivity module.
  • Place the DHCP server in the Enterprise Campus Distribution layer with the DNS server in the Internet Connectivity module.

Question 25

Question
Your company's Cisco routers are operating with EIGRP. You need to join networks with an acquisition's heterogeneous routers at 3 sites, operating with EIGRP and OSPF. Which describes the best practice for routing protocol deployment?
Answer
  • Apply OSPF throughout both networks
  • Apply one-way redistribution exclusively at each location
  • Apply two-way redistribution exclusively at each location
  • Apply two-way redistribution at each location with a route filter at only one location
  • Apply two-way redistribution at each location with a route filter at each location
  • Apply EIGRP with the same autonomous system throughout both networks

Question 26

Question
Which two routing protocols converge most quickly? (Choose two.)
Answer
  • RIPv1
  • RIPv2
  • BGP
  • OSPF
  • EIGRP

Question 27

Question
Which of these is the equation used to derive a 64 Kbps bit rate?
Answer
  • 2 x 8 kHz x 4-bit code words
  • 8 kHz x 8-bit code words
  • 2 x 4-bit code words x 8 kHz
  • 2 x 4 kHz x 8-bit code words

Question 28

Question
Which one of these statements is an example of how trust and identity management solutions should be deployed in the enterprise campus network?
Answer
  • Authentication validation should be deployed as close to the data center as possible.
  • Use the principle of top-down privilege, which means that each subject should have the privileges that are necessary to perform their defined tasks, as well as all the tasks for those roles below them.
  • Mixed ACL rules, using combinations of specific sources and destinations, should be applied as close to the source as possible.
  • For ease of management, practice defense in isolation - security mechanisms should be in place one time, in one place.

Question 29

Question
With deterministic Wireless LAN Controller redundancy design, the different options available to the designer have their own strengths. Which one of these statements is an example of such a strength?
Answer
  • Dynamic load balancing, or salt-and-pepper access point design, avoids the potential impact of oversubscription on aggregate network performance.
  • N+N redundancy configuration allows logically grouping access points on controllers to minimize intercontroller roaming events.
  • N+N+1 redundancy configuration has the least impact to system management because all of the controllers are colocated in an NOC or data center.
  • N+1 redundancy configuration uses Layer 3 intercontroller roaming, maintaining traffic on the same subnet for more efficiency.

Question 30

Question
When designing the threat detection and mitigation portion for the enterprise data center network, which of the following would be the most appropriate solution to consider?
Answer
  • 802.1X
  • ACLs in the core layer
  • Cisco Security MARS
  • Cisco Firewall Services Module

Question 31

Question
You have a campus network that consists of only Cisco devices. You have been tasked to discover the device platforms, the IOS versions, and an IP address of each device to map the network. Which proprietary protocol will assist you with this task?
Answer
  • SNMP
  • TCP
  • CDP
  • ICMP
  • LLDP

Question 32

Question
Which three technologies are recommended to be used for WAN connectivity in today's Enterprise Edge designs? (Choose three.)
Answer
  • DWDM
  • Metro Ethernet
  • Frame Relay
  • MPLS VPN
  • ISDN
  • DSL
  • Wireless

Question 33

Question
WAN backup over the Internet is often used to provide primary connection redundancy. Which is the most important consideration when passing corporate traffic over the public Internet?
Answer
  • security
  • static versus dynamic routing
  • bandwidth
  • QoS
  • latency

Question 34

Question
To provide Layer 2 connectivity between the primary and remote data centers, given that the two data centers are using Layer 3 routed DCIs, which NX-OS technology can be used to facilitate this requirement?
Answer
  • VRF
  • OTV
  • MPLS
  • SPT
  • VPC

Question 35

Question
Which WLC interface is dedicated for WLAN client data?
Answer
  • virtual interface
  • dynamic interface
  • management interface
  • AP manager interface
  • service port interface

Question 36

Question
According to Cisco, which four improvements are the main benefits of the PPDIOO lifecycle approach to network design? (Choose four.)
Answer
  • faster ROI
  • improved business agility
  • increased network availability
  • faster access to applications and services
  • lower total cost of network ownership
  • better implementation team engagement

Question 37

Answer
  • Email and HTTP
  • IP telephony and video
  • Budget
  • Security
  • Application compatibility

Question 38

Question
During which phase of the PPDIOO model would you conduct interviews with supporting staff to develop and propose a viable solution?
Answer
  • Prepare
  • Plan
  • Design
  • Implement
  • Operate
  • Optimize

Question 39

Question
Which three are considered as technical constraints when identifying network requirements? (Choose three.)
Answer
  • support for legacy applications
  • bandwidth support for new applications
  • limited budget allocation
  • policy limitations
  • limited support staff to complete assessment
  • support for existing legacy equipment
  • limited timeframe to implement

Question 40

Answer
  • Define how information is exchanged.....
  • provides complete network visibility....
  • runs iver the data link layer using a...
  • processes large ACLs efficiently for ...

Question 41

Answer
  • Prepare
  • Plan
  • Desing
  • Implement
  • Operate
  • Optimize

Question 42

Question
Characterizing an existing network requires gathering as much information about the network as possible. Which of these choices describes the preferred order for the information-gathering process?
Answer
  • site and network audits, traffic analysis, existing documentation and organizational input
  • existing documentation and organizational input, site and network audits, traffic analysis
  • traffic analysis, existing documentation and organizational input, site and network audits
  • site and network audits, existing documentation and organizational input, traffic analysis

Question 43

Question
QUESTION NO: 43 Which three terms describe the primary functions of the distribution layer of the campus network design hierarchy? (Choose three.)
Answer
  • provides end-user connectivity
  • provides high speed transport
  • provides QoS services
  • enforces security policies
  • provides WAN connections
  • connects access devices to the core backbone

Question 44

Question
QUESTION NO: 44 Refer to the exhibit. Which statement accurately represents the characteristics of the core layer in this design?
Answer
  • QoS should only be performed only in the core.
  • Load balancing should never be implemented or used.
  • Access lists should be used in the core to perform packet manipulation.
  • Partial mesh should be used as long as it is connected to each device by multiple paths.
  • Policy-based traffic control should be implemented to enable prioritization and ensure the best performance for all time-critical applications.

Question 45

Question
QUESTION NO: 45 Which two of the following are benefits of using a modular approach to network design? (Choose two.)
Answer
  • improves flexibility
  • facilitates implementation
  • lowers implementation costs
  • improves customer participation in the design process

Question 46

Question
QUESTION NO: 46 Which three modular components are part of the Cisco Enterprise Edge Architecture? (Choose three.)
Answer
  • e-commerce module
  • Internet connectivity module
  • server farm module
  • remote access and VPN module
  • PSTN services module
  • enterprise branch module
  • building distribution module

Question 47

Question
QUESTION NO: 47 Which of the following is a component within the Cisco Enterprise Campus module?
Answer
  • Teleworker
  • E-Commerce
  • Internet Connectivity
  • Building Distribution
  • WAN/MAN Site-to-Site VPN

Question 48

Question
QUESTION NO: 48 What are the three primary functions of the distribution layer of the campus network design hierarchy? (Choose three.)
Answer
  • provide end-user connectivity
  • provide high speed transport
  • provide QoS services
  • enforce security policies
  • provide WAN connections
  • connect access devices to the core backbone

Question 49

Question
QUESTION NO: 49 DRAG DROP
Answer
  • The most feature-rich part of the campus
  • Provides security. QoS, and IP Multicast
  • Routing boundary (Dynamic, sumarization
  • Enforce Policy within the network
  • High leve of availability, scalability..
  • Provides a limited set of services

Question 50

Question
QUESTION NO: 50 DRAG DROP
Answer
  • enables intelligent route and switch....
  • aggregates connectivity to voice, video.
  • supports application traffic througth th
  • provides internal users with external HT
  • terminates traffic that us forwarded by.
  • enables services-oriented architectures

Question 51

Question
QUESTION NO: 51 Where in the Cisco Enterprise Architecture model does network management reside?
Answer
  • Enterprise data center module
  • Enterprise campus module
  • Enterprise edge module
  • Service Provider edge module
  • Service Provider data center module

Question 52

Question
QUESTION NO: 52 DRAG DROP
Answer
  • Protect network services including DHCP,
  • Protect against inadvertent loops
  • Protect the endpoints using network-base
  • Protect the infrastructure using NFP bes
  • Does not perform security functions to m
  • Filter and rate-limit control plane traf

Question 53

Question
QUESTION NO: 53 Which three solutions are part of the Borderless Network Services? (Choose three.)
Answer
  • Wireless
  • Routing
  • TrustSec
  • MediaNet
  • Switching
  • EnergyWise
  • Next-Gen WAN

Question 54

Question
QUESTION NO: 54 Refer to the exhibit. Which two statements correctly identify the layers of the Enterprise Campus module? (Choose two.)
Answer
  • A is the Data Center Module and C is the Campus Core layer.
  • A is the Data Center Module and D is the Building Access layer.
  • B is the Campus Core layer and C is the Building Distribution layer.
  • B is the Building Distribution layer and C is the Campus Core layer.
  • A is the Internet Connectivity layer and B is the Campus Core layer.
  • B is the Building Distribution layer and D is the Building Access layer.

Question 55

Question
QUESTION NO: 55 The evolution of the Data Center is best represented by the 3.0 architecture component of virtualization. Which of the following is not an example of the virtualization taking place in the Data Center?
Answer
  • Virtualized media access utilizing Fiber Channel over Ethernet
  • VLANs and virtual storage area networks (VSANs) provide for virtualized LAN and SAN connectivity, separating physical networks and equipment into virtual entities
  • Virtual Machines that run an application within the client operating system, which is further virtualized and running on common hardware
  • Storage devices virtualized into storage pools, and network devices are virtualized using device contexts

Question 56

Question
QUESTION NO: 56 When there is a need for immunity to EMI for connecting locations that are greater than 100 meters apart, which two solutions can be utilized? (Choose two.)
Answer
  • multimode fiber
  • Fiber Channel
  • HVDC transmission lines
  • single-mode fiber
  • serial RS-232
  • Gigabit Ethernet 1000BASE-CX

Question 57

Question
QUESTION NO: 57 Which layer of the OSI model does Cisco recommend to place the enterprise network core layer, when designing a network based on its switched hierarchical design?
Answer
  • Layer 1
  • Layer 2
  • Layer 3
  • Layer 4

Question 58

Question
QUESTION NO: 58 OSPF will be used as the IGP within a campus network. Which two things should you consider before deployment? (Choose two.)
Answer
  • All areas need to connect back to area 0.
  • The OSPF process number on each router should match.
  • NSSA areas should be used when an area cannot connect directly to area 0.
  • Stub areas should be connected together using virtual links.
  • ECMP may cause undesired results depending on the environment.

Question 59

Question
QUESTION NO: 59 Which Cisco technology using Nexus NX-OS infrastructure allows the network architect to create up to four separate control and data plane instances of the Nexus chassis?
Answer
  • virtual port-channel
  • virtual routing and forwarding
  • virtual switching system
  • virtual device context

Question 60

Question
QUESTION NO: 60 Which three options are valid Cisco STP tools used to ensure best-practice access layer design for the enterprise campus? (Choose three.)
Answer
  • Port fast
  • UDLD
  • Root Guard
  • BPDU Guard
  • Flex Links
  • SPAN
  • Ether Channel

Question 61

Question
QUESTION NO: 61 Spanning Layer 2 across geographically separate data centers is a key consideration for current data center designs. Which is the name of the NX-OS technology that facilitates MAC in IP transport for Layer 2 VLANs across any IP network?
Answer
  • Overlay Transport Virtualization
  • Virtual Private LAN Services
  • Generic Routing Encapsulation
  • QinQ tunneling

Question 62

Question
QUESTION NO: 62 Which two statements about designing the Data Center Access layer are correct? (Choose two.)
Answer
  • Multiport NIC servers should each have their own IP address.
  • Layer 3 connectivity should never be used in the access layer.
  • Layer 2 connectivity is primarily implemented in the access layer.
  • Multiport NIC servers should never be used in the access layer.
  • Layer 2 clustering implementation requires servers to be Layer 2 adjacent.

Question 63

Question
QUESTION NO: 63 What is the primary consideration when choosing a routed network design over a traditional campus network design?
Answer
  • Layer 3 service support at the network edge
  • the routing protocol choice: open (OSPF) or proprietary (EIGRP)
  • the routing abilities of the host devices
  • the need to control the broadcast domains within the campus core

Question 64

Question
QUESTION NO: 64 When selecting which hardware switches to use throughout an enterprise campus switched network, which consideration is not relevant?
Answer
  • whether data link layer switching based upon the MAC address is required
  • the number of shared media segments
  • which infrastructure service capabilities are required
  • whether to support Layer 3 services at the network edge

Question 65

Question
QUESTION NO: 65 Which two of these practices are considered to be best practices when designing the access layer for the enterprise campus? (Choose two.)
Answer
  • Implement all of the services (QoS, security, STP, and so on) in the access layer, offloading the work from the distribution and core layers.
  • Always use a Spanning Tree Protocol; preferred is Rapid PVST+.
  • Use automatic VLAN pruning to prune unused VLANs from trunked interfaces to avoid broadcast propagation.
  • Avoid wasted processing by disabling STP where loops are not possible.
  • Use VTP transparent mode to decrease the potential for operational error.

Question 66

Question
QUESTION NO: 66 The enterprise campus core layer has requirements that are unique from the distribution and access layers. Which of the following is true about the core layer?
Answer
  • The core layer provides convergence using Layer 2 and Layer 3 services and features.
  • The core layer provides high availability to support the distribution layer connections to the enterprise edge.
  • The campus core layer is optional.
  • The core layer requires high performance to manage the traffic policing across the backbone.

Question 67

Question
QUESTION NO: 67 Which of these statements is true concerning the data center access layer design?
Answer
  • The access layer in the data center is typically built at Layer 3, which allows for better sharing of services across multiple servers.
  • With Layer 2 access, the default gateway for the servers can be configured at the access or aggregation layer.
  • A dual-homing NIC requires a VLAN or trunk between the two access switches to support the dual IP addresses on the two server links to two separate switches.
  • The access layer is normally not required, as dual homing is standard from the servers to the aggregation layer.

Question 68

Question
QUESTION NO: 68 Which one of these statements is true concerning the data center distribution (aggregation) layer design?
Answer
  • With Layer 3 at the aggregation layer, the physical loops in the topology must still be managed by STP.
  • The boundary between Layer 2 and Layer 3 must reside in the multilayer switches, independent of any other devices such as firewalls or content switching devices.
  • A mix of both Layer 2 and Layer 3 access is sometimes the most optimal.
  • In a small data center, the aggregation layer can connect directly to the campus core, exchanging IP routes and MAC address tables.

Question 69

Question
QUESTION NO: 69 DRAG DROP
Answer
  • vPC
  • VLAN
  • VRF
  • Asa Firewall context
  • IPS
  • VDC

Question 70

Question
QUESTION NO: 70 Refer to the exhibit. Which statement is true concerning enterprise edge distribution switches?
Answer
  • The speed of switching is the most critical feature.
  • Security requirements are offloaded to the other modules for performance reasons.
  • Edge distribution switches are only required when using a collapsed core backbone.
  • Enterprise edge distribution switches are similar to the building distribution layer.

Question 71

Question
An enterprise campus module is typically made up of four sub modules, as described by the Cisco Enterprise Architecture Model. Which two sub modules are part of this module?
Answer
  • DMZ
  • enterprise branch
  • building distribution
  • server farm/data center
  • MAN

Question 72

Question
QUESTION NO: 72 Which is a factor in enterprise campus design decisions?
Answer
  • network application characteristics
  • routing protocol characteristics
  • switching latency characteristics
  • packet filtering characteristics

Question 73

Question
QUESTION NO: 73 Which network virtualization technology involves creating virtual routers with its own individual routing tables on a physical router?
Answer
  • VSS
  • vPC
  • VRF
  • VLAN

Question 74

Question
QUESTION NO: 74 Which protocol is the recommended first-hop redundancy protocol for an existing infrastructure that contains multiple vendors and platforms?
Answer
  • HSRP
  • VRRP
  • IGRP
  • OSPF

Question 75

Question
QUESTION NO: 75 Which IGP provides the fastest convergence by default?
Answer
  • EIGRP
  • OSPF
  • IS-IS
  • RSTP
  • BGP

Question 76

Question
QUESTION NO: 76 Which three are valid Layer 2 access designs? (Choose three.)
Answer
  • Looped Triangle
  • Looped Square
  • Looped U
  • Loop-Free Triangle
  • Loop-Free Square
  • Loop-Free U

Question 77

Question
QUESTION NO: 77 Which Gigabit Ethernet media type provides the longest reach without a repeater?
Answer
  • 1000Base-CX
  • 1000Base-LX
  • 1000Base-SX
  • 1000Base-T

Question 78

Question
QUESTION NO: 78 DRAG DROP
Answer
  • Support Layer 2 VLANs spanning multiple
  • FHRP for convergence, no VLANs span betw
  • Convergence (FHRP) is not an issue

Question 79

Question
QUESTION NO: 79 Which three are associated with the distribution layer within the campus design? (Choose three.)
Answer
  • access layer aggregation
  • route summarization
  • network trust boundary
  • next-hop redundancy
  • layer 2 switching
  • port security
  • broadcast suppression

Question 80

Question
QUESTION NO: 80 High availability is a key design consideration in the enterprise campus network. In a fully redundant topology, which is likely to provide faster IGP convergence during a failure?
Answer
  • redundant supervisors
  • redundant supervisors with Cisco Nonstop Forwarding (NSF) and Stateful Switchover (SSO)
  • single supervisors with tuned IGP timers
  • single supervisors

Question 81

Question
QUESTION NO: 81 Which two enterprise campus layers are combined in a medium-sized LAN? (Choose two.)
Answer
  • core
  • distribution
  • access
  • backbone
  • aggregation

Question 82

Question
QUESTION NO: 82 What is a characteristic of campus core designs?
Answer
  • fast transport
  • security
  • summarization
  • redistribution

Question 83

Question
QUESTION NO: 83 In the enterprise data center, which are the three main components? (Choose three.)
Answer
  • Network Infrastructure
  • Interactive services
  • Data Center Management
  • Internet services
  • WAN services
  • VPN and remote access

Question 84

Question
QUESTION NO: 84 Which two common cable management strategies are used in high-density server deployments in the data center? (Choose two.)
Answer
  • top-of-rack
  • middle-of-rack
  • bottom-of-rack
  • beginning-of-row
  • middle-of-row
  • end-of-row

Question 85

Question
QUESTION NO: 85 Which servers that reside in the data center require direct links to all other enterprise modules?
Answer
  • network management servers
  • DHCP servers
  • Active Directory servers
  • IP SLA servers
  • web servers

Question 86

Question
QUESTION NO: 86 DRAG DROP
Answer
  • Cisco VN-Link techologies, including the
  • VSAN, virtual devices contents and unifi
  • Cisco Unifien Computing System
  • VLANs and VSANs

Question 87

Question
QUESTION NO: 87 When designing using the Cisco Enterprise Architecture, in which Enterprise Campus layer does the Remote Access and VPN module establish its connection?
Answer
  • Building Access
  • Campus Core
  • Enterprise Branch
  • Enterprise Data Center

Question 88

Question
QUESTION NO: 88 DRAG DROP
Answer
  • TDM
  • SONET
  • Frame Relay
  • MPLS

Question 89

Question
QUESTION NO: 89 Which three describe challenges that are faced when deploying an environment for teleworkers? (Choose three.)
Answer
  • supporting a mix of technically knowledgeable and nontechnical users
  • simplifying router installation and configuration
  • verifying available power at employee's house for necessary equipment
  • avoiding situations where employees might use nonstandard hardware or configurations
  • reducing daily commuting time to main office location
  • providing access to FTP servers located in main office location
  • implementing leased line connectivity between main office and employee's home location

Question 90

Question
QUESTION NO: 90 You need to connect to a remote branch office via an Internet connection. The remote office does not use Cisco equipment. This connection must be secure and must support OSPF. Which of the following can be used to transport data to the branch office?
Answer
  • GRE over IPsec
  • IPsec
  • GRE
  • IPsec VTI

Question 91

Question
QUESTION NO: 91 Which two are characteristics of a Lightweight Access Point? (Choose two.)
Answer
  • managed via a central wireless LAN controller
  • code upgrade performed via a TFTP server
  • CAPWAP tunnels
  • managed directly via CLI or web interface
  • facilitates the creation of its own WLANs and port mappings

Question 92

Question
QUESTION NO: 92 Which one of these statements describes why, from a design perspective, a managed VPN approach for enterprise teleworkers is most effective?
Answer
  • A managed VPN solution uses a cost-effective, on-demand VPN tunnel back to the enterprise.
  • This solution supports all teleworkers who do not require voice or video.
  • This architecture provides centralized management where the enterprise can apply security policies and push configurations.
  • It provides complete flexibility for remote access through a wireless hotspot or a guest network at a hotel, in addition to a home office.

Question 93

Question
QUESTION NO: 93 What are three key areas that need to be considered when designing a remote data center? (Choose three.)
Answer
  • power diversity
  • active directory services
  • Cisco IOS versions
  • data storage
  • applications
  • user access
  • packet routing

Question 94

Question
QUESTION NO: 94 If a teleworker is required to access the branch office via a secure IPSEC VPN connection, which technology is recommended to provide the underlying transport?
Answer
  • ISDN
  • Metro Ethernet
  • Frame Relay
  • ADSL
  • ATM

Question 95

Question
QUESTION NO: 95 Which model of ISR is utilized for the teleworker design profile?
Answer
  • Cisco 1900 Series
  • Cisco 1800 Series
  • Cisco 800 Series
  • Cisco 500 Series

Question 96

Question
QUESTION NO: 96 When designing a WAN backup for voice and video applications, what three types of connections should be used? (Choose three.)
Answer
  • Private WAN
  • internet
  • ISDN
  • MPLS
  • dial-up
  • ATM
  • DSL

Question 97

Question
QUESTION NO: 97 Which three options represents the components of the Teleworker Solution? (Choose three.)
Answer
  • Cisco Unified IP Phone
  • Cisco 880 Series Router
  • Aironet Office Extend Access Point
  • Catalyst 3560 Series Switch
  • Cisco 2900 Series Router
  • MPLS Layer 3 VPN
  • Leased lines

Question 98

Question
QUESTION NO: 98 Which three service categories are supported by an ISR? (Choose three.)
Answer
  • voice
  • security
  • data
  • Internet
  • storage
  • satellite

Question 99

Question
QUESTION NO: 99 When designing for a remote worker, which two are typical requirements? (Choose two.)
Answer
  • best-effort interactive and low-volume traffic patterns
  • connections to the enterprise edge using Layer 2 WAN technologies
  • always-on connection with SLA from ISP
  • voice and IPsec VPN support
  • high-end security devices with stateful firewall filtering
  • dual or multihoming to ISPs

Question 100

Question
QUESTION NO: 100 What is the maximum number of groups that is supported by GLBP?
Answer
  • 64
  • 256
  • 512
  • 1024

Question 101

Question
QUESTION NO: 101 DRAG DROP
Answer
  • window size
  • data compression
  • queuing
  • traffic policing

Question 102

Question
QUESTION NO: 102 Which two routing protocols usually converge most quickly? (Choose two.)
Answer
  • RIPv1
  • RIPv2
  • BGP
  • OSPF
  • EIGRP

Question 103

Question
QUESTION NO: 103 Which two routing protocols operate over NBMA point-to-multipoint networks without the use of point-to-point sub interfaces? (Choose two.)
Answer
  • RIPv1
  • RIPv2
  • IS-IS
  • EIGRP
  • OSPF

Question 104

Question
QUESTION NO: 104 Refer to the exhibit. Which three modules would typically utilize public IPv4 addressing? (Choose three.)
Answer
  • Access
  • Distribution
  • Core
  • Data Center
  • E-Commerce
  • Internet Connectivity
  • Remote Access/VPN
  • WAN/MAN
  • Branch
  • Branch Data Center

Question 105

Question
QUESTION NO: 105 With respect to IPv6 addressing, from a design perspective, which of these statements is it important to keep in mind?
Answer
  • IPv6 addressing provides convenience of anycast addressing without any configuration requirements.
  • IPv6 does not use multicast addressing.
  • An IPv6 router will not forward packets from one link to other links if the packet has either a linklocal source or a link-local destination address.
  • Dynamic address assignment requires DHCPv6.

Question 106

Question
QUESTION NO: 106 Which consideration is the most important for the network designer when considering IP routing?
Answer
  • convergence
  • scalability
  • on-demand routing
  • redistribution

Question 107

Question
QUESTION NO: 107 Your supervisor has asked you to deploy a routing protocol within the lab environment that will allow for unequal cost multipath routing. Which should you choose?
Answer
  • EIGRP
  • OSPF
  • IS-IS
  • RIP

Question 108

Question
QUESTION NO: 108 Which two methods are used to reduce the mesh links required between iBGP peers in the same AS? (Choose two.)
Answer
  • community
  • router reflectors
  • local preference
  • confederations
  • atomic aggregate
  • MED

Question 109

Question
QUESTION NO: 109 A company wants to use private IP addresses for all its internal hosts. Which technology can the company use to provide access to the Internet using a single public IP address?
Answer
  • static NAT
  • source routing
  • ACL
  • PAT

Question 110

Question
QUESTION NO: 110 At which layer of the network is route summarization recommended?
Answer
  • data link layer
  • core layer
  • distribution layer
  • access layer

Question 111

Question
QUESTION NO: 111 Which two link state routing protocols support IPv6 routing? (Choose two.)
Answer
  • BGP4+
  • OSPF
  • RIPng
  • EIGRP
  • IS-IS

Question 112

Question
QUESTION NO: 112 Which is the North American RIR for IPv4 addresses?
Answer
  • RIPE
  • ARIN
  • IEEE
  • APNIC

Question 113

Question
QUESTION NO: 113 What is the most compact representation of the following IPv6 address? 2001:db8:0000:0000:cafe:0000:0000:1234
Answer
  • 2001:db8::cafe::1234
  • 2001:db8::cafe:0000:0000:1234
  • 2001:db8:0:0:cafe::1234
  • 2001:db8::cafe:0:1234

Question 114

Question
QUESTION NO: 114 Which type of area should you use in an enterprise OSPF deployment if you want to prevent propagation of type 5 LSAs but still allow the redistribution of external routes?
Answer
  • stub
  • totally stubby
  • backbone
  • NSSA
  • virtual link

Question 115

Question
QUESTION NO: 115 Which is usually used to connect to an upstream ISP?
Answer
  • EIGRP
  • OSPF
  • BGP
  • IS-IS
  • RIPv2

Question 116

Question
QUESTION NO: 116 You are designing a network that requires a routing protocol that will use minimal network bandwidth. Which would satisfy this requirement?
Answer
  • RIPv2
  • RIPng
  • OSPF
  • ARP
  • EGP

Question 117

Question
QUESTION NO: 117 Which two statements best describe an OSPF deployment? (Choose two.)
Answer
  • ABR provides automatic classful network boundary summarization.
  • ABR requires manual configuration for classful network summarization.
  • External routes are propagated into the autonomous system from stub areas via ASBR.
  • External routes are propagated into the autonomous system from regular areas or NSSA via ASBR.
  • External routes are propagated into the autonomous system from regular areas or NSSA via ABR.

Question 118

Question
QUESTION NO: 118 Which three items pertain to EIGRP? (Choose three.)
Answer
  • Can use multiple unequal paths.
  • Routes are redistributed as type 2 by default.
  • ASN and K values must match to form neighbors.
  • Uses multicast address 224.0.0.9 for updates.
  • Exchanges full routing table every 30 seconds.
  • Summary routes have AD of 90.
  • External routes have AD of 170.

Question 119

Question
QUESTION NO: 119 A hierarchical design of the EIGRP domain facilitates which two of the following? (Choose two.)
Answer
  • route summarization
  • faster convergence
  • unequal cost load balancing
  • redistribution
  • virtual links

Question 120

Question
QUESTION NO: 120 Which three protocols support VLSM? (Choose three.)
Answer
  • RIPv2
  • RIPv1
  • EIGRP
  • OSPF
  • IGRP

Question 121

Question
QUESTION NO: 121 Which statement should the designer keep in mind when considering the advanced routing features?
Answer
  • One-way route redistribution avoids the requirement for static or default routes.
  • Redistribution, summarization, and filtering are most often applied between the campus core and enterprise edge.
  • Filtering only occurs on the routing domain boundary using redistribution.
  • Summarize routes at the core toward the distribution layer.
  • The hierarchical flexibility of IPv6 addressing avoids the requirement for routing traffic reduction using aggregation.

Question 122

Question
QUESTION NO: 122 When designing an EIGRP network, which two things should you take into consideration? (Choose two.)
Answer
  • ASN and K values must match.
  • The neighbor command can be used to enable unicast communication.
  • The neighbor diameter cannot exceed a 15-hops limit.
  • NSSA areas can be used to redistribute external routes.
  • Neighbor relationship can be established with non-Cisco routers.

Question 123

Question
QUESTION NO: 123 Which statement describes a unique advantage of EIGRP?
Answer
  • It enables unequal-cost load balancing.
  • It enables equal-cost load balancing.
  • It enables source-based load balancing.
  • It enables port-based load balancing.

Question 124

Question
QUESTION NO: 124 ACME corporation is implementing dynamic routing on the LAN at its corporate headquarters. The interior gateway protocol that they select must support these requirements: multivendor environment, efficient subnetting, high scalability, and fast convergence. Which interior gateway protocol should they implement?
Answer
  • EIGRP
  • OSPF
  • RIPng
  • BGP

Question 125

Question
QUESTION NO: 125 Which routing protocol classification should you use when full topology information is needed?
Answer
  • link-state
  • distance vector
  • stateful
  • path vector

Question 126

Question
QUESTION NO: 126 When you are designing a large IPv6 multivendor network, which IGP does Cisco recommend that you use?
Answer
  • OSPFv3
  • EIGRP for IPv6
  • BGP
  • RIPng

Question 127

Question
QUESTION NO: 127 When designing the infrastructure protection portion for the enterprise edge, which solution would be the most appropriate solution to consider?
Answer
  • 802.1X
  • ACLs in the core layer
  • Cisco Security MARS
  • AAA

Question 128

Question
QUESTION NO: 128 Which two design approaches provide management of enterprise network devices? (Choose two.)
Answer
  • in-band
  • out-of-line
  • out-of-band
  • in-line

Question 129

Question
QUESTION NO: 129 You are asked to design a new branch office that will need to support 25 users. These users will be using an ISP connection and will need to connect to the main office for network services. Which two Cisco devices are the most appropriate to fulfill all of these requirements? (Choose two.)
Answer
  • Cisco IPS
  • Cisco ISR G2
  • Cisco ASA
  • Cisco 2960
  • Cisco CRS-1
  • Cisco ACS

Question 130

Question
QUESTION NO: 130 What are the three modes of unicast reverse path forwarding? (Choose three.)
Answer
  • strict
  • loose
  • VRF
  • global
  • PIM
  • local

Question 131

Question
QUESTION NO: 131 Which network access control technology is recommended to use with Layer 2 access layer switches?
Answer
  • 802.1q
  • 802.1x
  • 802.3af
  • 802.3q
  • 802.11n

Question 132

Question
QUESTION NO: 132 Refer to the list of requirements. Which IP telephony design model should you implement to fulfill these requirements? - must be a single, large location with many remote sites - must have multisite WAN connectivity - requires SRST for call processing redundancy
Answer
  • centralized
  • distributed
  • clustered
  • decentralized

Question 133

Question
Which is the equation used to derive a 64 Kbps bit rate?
Answer
  • 2 x 8 kHz x 4-bit code words
  • 8 kHz x 8-bit code words
  • 2 x 4-bit code words x 8 kHz
  • 2 x 4 kHz x 8-bit code words

Question 134

Question
QUESTION NO: 134 Which three statements are true regarding the virtual interface on a Cisco Wireless LAN Controller? (Choose three.)
Answer
  • supports mobility management
  • serves as a DHCP relay
  • used for all controller to AP communication
  • supports embedded Layer 3 security
  • default for out-of-band management
  • default for in-band management
  • provides connectivity to AAA servers

Question 135

Question
QUESTION NO: 135 A campus network needs end-to-end QoS tools to manage traffic and ensure voice quality. Which three types of QoS tools are needed? (Choose three.)
Answer
  • interface queuing and scheduling
  • congestion management
  • compression and fragmentation
  • bandwidth provisioning
  • traffic classification
  • buffer management

Question 136

Question
QUESTION NO: 136 Which technology enables WLCs to peer with each other to enable roaming support?
Answer
  • WAP profiles
  • roaming profiles
  • mobility groups
  • peer groups

Question 137

Question
QUESTION NO: 137 Which IP telephony component supports VoIP, PoE, and QoS?
Answer
  • client endpoints
  • voice-enabled infrastructure
  • Cisco Unified Communications Manager
  • Cisco Unified Contact Center

Question 138

Question
QUESTION NO: 138 Your supervisor wants you to recommend a management protocol that will allow you to track overall bandwidth utilization, utilization by traffic type, and utilization by source and destination. Which is ideally suited for this function?
Answer
  • MRTG
  • NetFlow
  • RRD
  • SNMP

Question 139

Question
QUESTION NO: 139 Which factor would be most influential in choosing multimode fiber optic connections over UTP?
Answer
  • signal attenuation
  • required bandwidth
  • required distance
  • electromagnetic interference
  • cost

Question 140

Question
QUESTION NO: 140 Which WAN technology is a cost-effective method to deliver 100Mb of bandwidth to multiple branch offices?
Answer
  • DSL
  • DWDM
  • ISDN
  • Metro Ethernet

Question 141

Question
QUESTION NO: 141 Which subnet address and mask would you use for all Class D multicast addresses to be matched within an access list?
Answer
  • 224.0.0.0/20
  • 224.0.0.0/4
  • 239.0.0.0/24
  • 239.0.0.0/8
  • 225.0.0.0/8

Question 142

Question
QUESTION NO: 142 A company is implementing an Identity Management solution with these characteristics: 1) existing AAA Server 2) Cisco Catalyst switches 3) minimal added investments Which Cisco Trust and Identity Management solution would you recommend?
Answer
  • NAC Appliance
  • Cisco IBNS
  • CSM
  • Cisco Security MARS

Question 143

Question
QUESTION NO: 143 When considering the three VoIP design models - single site, centralized multisite, and distributed multisite - which question below would help to eliminate one of the options?
Answer
  • Will the switches be required to provide inline power?
  • Will users need to make offsite calls, beyond the enterprise?
  • Will users require applications such as voice mail and interactive voice response?
  • Are there users whose only enterprise access is via a QoS-enabled WAN?

Question 144

Question
QUESTION NO: 144 Which two devices would you place in your DMZ to ensure enterprise edge security? (Choose two.)
Answer
  • IPS
  • NAC
  • ASA
  • ACS
  • WCS

Question 145

Question
QUESTION NO: 145 Which three are security services offered through Cisco Router Security? (Choose three.)
Answer
  • Trust and Identity
  • Integrated Threat Control
  • Unified Wireless Network Security Solution
  • Secure Connectivity
  • Voice-Messaging Security
  • Endpoint Security
  • Virtual Security Gateway

Question 146

Question
QUESTION NO: 146 Which voice codec should you use in order to provide toll quality calls?
Answer
  • G.711
  • G.718
  • G.722
  • G.729

Question 147

Question
QUESTION NO: 147 Which three are features of LWAPP? (Choose three.)
Answer
  • firmware synchronization
  • local management of APs
  • configuration changes manually synced
  • encryption of control channel
  • configuration data only on the WLC
  • wireless control free operation
  • replaces 802.1x for authentication in wireless connections

Question 148

Question
QUESTION NO: 148 Which Cisco device has the sole function at looking at threat detection and mitigation at the Enterprise edge?
Answer
  • Cisco IOS router
  • Cisco ASA
  • Cisco Catalyst FWSM
  • Cisco IPS

Question 149

Question
QUESTION NO: 149 Which three of these are layers in the Cisco SONA Architecture? (Choose three.)
Answer
  • Applications
  • Physical Infrastructure
  • Presentation
  • Integrated Transport
  • Core Common Services
  • Networked Infrastructure

Question 150

Question
QUESTION NO: 150 What business trend allows employees to use personal devices to access enterprise data and systems?
Answer
  • ISE
  • BYOD
  • SAN
  • IOE

Question 151

Question
QUESTION NO: 151 What three customer supported details identifies network requirements based on the PPDIOO design model? (Choose three.)
Answer
  • goals
  • budget
  • user needs
  • locations
  • policies
  • tasks

Question 152

Question
QUESTION NO: 152 An engineer receives a resource utilization alert on a router. What command should be used to investigate the issue?
Answer
  • show processes cpu
  • show memory
  • show running-config
  • show version

Question 153

Question
QUESTION NO: 153 What part of the network does a top-down network design focus on for solution development?
Answer
  • presentation
  • hardware
  • session
  • application
  • data link
  • transport

Question 154

Question
QUESTION NO: 154 An engineer has configured a router to send level 7 messages to a syslog server. What severity level are these messages?
Answer
  • error
  • warning
  • debug
  • informational
  • notice

Question 155

Question
QUESTION NO: 155 A network engineer must implement a design where LAN clients are to connect to various access layer devices, while remaining on the same VLAN . What type of design would support this requirement?
Answer
  • routed
  • switched
  • tunneled
  • virtual

Question 156

Question
QUESTION NO: 156 When evaluating network designs, what indicator demonstrates that the modular approach was followed?
Answer
  • ability to scale
  • follows best practices
  • redundant connectivity
  • easy to deploy

Question 157

Question
QUESTION NO: 157 A network engineer is following the Cisco enterprise architecture model. To which network layer would a branch office connect to using a private WAN?
Answer
  • Enterprise Campus
  • Enterprise Edge
  • SP Edge Premise
  • Remote Module

Question 158

Question
QUESTION NO: 158 A network engineer is following the three tiered Network Hierarchical Model. At which tier is route summarization implemented?
Answer
  • core
  • distribution
  • backbone
  • access

Question 159

Question
QUESTION NO: 159 A network engineer is using the Cisco enterprise architecture model. In what module do network management servers reside?
Answer
  • Enterprise Campus
  • Enterprise Edge
  • Remote Modules
  • SP Edge WAN/internet

Question 160

Question
QUESTION NO: 160 What three design requirements are key to designing a campus core? (Choose three.)
Answer
  • low latency
  • access control
  • traffic filtering
  • high speed
  • redundant links
  • QoS tagging

Question 161

Question
QUESTION NO: 161 What type of device can be installed to increase a broadcast domain?
Answer
  • router
  • switch
  • IDS
  • IPS

Question 162

Question
QUESTION NO: 162 To what Layer 2 technology does VRF closely compare?
Answer
  • VSS
  • VPC
  • VLAN
  • VTP

Question 163

Question
QUESTION NO: 163 What network virtualization technology can be leveraged within the data center to reduce the number of physical devices?
Answer
  • VLANs
  • VPLS
  • VDC
  • VSS

Question 164

Question
QUESTION NO: 164 During the design of a new campus network, the customer requests the ability to route overlapping IP addresses. What technology can be leveraged to meet this request?
Answer
  • VRF
  • VLANs
  • VSS
  • VPC

Question 165

Question
QUESTION NO: 165 A network engineer is attempting to separate routing domains using a virtualization technology. What protocol can be configured to perform this task?
Answer
  • VLAN
  • VSAN
  • VRF
  • VPC

Question 166

Question
QUESTION NO: 166 What device virtualization technology allows for a single point of management and a centralized routing instance?
Answer
  • ACE
  • VSS
  • VDC
  • VM

Question 167

Question
QUESTION NO: 167 What two performance considerations must be taken into account when designing a remote worker access solution? (Choose two.)
Answer
  • simultaneous VPN connections
  • port density
  • throughput capacity
  • packet size
  • latency

Question 168

Question
QUESTION NO: 168 In which network location should an external DNS server be placed?
Answer
  • campus data center
  • enterprise branch
  • internet
  • remote access

Question 169

Question
QUESTION NO: 169 What submodule is found within the Enterprise Edge module?
Answer
  • enterprise WAN
  • remote branch
  • campus IPS
  • building distribution

Question 170

Question
QUESTION NO: 170 A company requires a managed WAN solution that supports Layer 2 adjacency across remote offices for applications and services. What solution should be selected?
Answer
  • DMVPN
  • MPLS
  • VPLS
  • FR

Question 171

Question
QUESTION NO: 171 A circuit order has been placed for Gigabit Ethernet and is 80KM from the carrier equipment. What type of SFP will be required?
Answer
  • TX
  • SX
  • ZX
  • LX

Question 172

Question
QUESTION NO: 172 A company has dark fiber between headquarters and its data center. It is presently configured as a 10GbE connection. Network utilization shows high utilization on the connection. What technology can be implemented to increase capacity without acquiring another circuit?
Answer
  • MPLS
  • DWDM
  • VPLS
  • DMVPN

Question 173

Question
QUESTION NO: 173 A secure WAN design requires dynamic routing and IP multicast. What two VPN protocols meet these requirements? (Choose two.)
Answer
  • Standard IPsec
  • P2P GRE over IPsec
  • DMVPN
  • AnyConnect
  • PPTP
  • Easy VPN
  • SSL/TLS

Question 174

Question
QUESTION NO: 174 What branch design supports 100 to 1000 users and integrates ASA firewalls?
Answer
  • small
  • medium
  • large
  • extra large

Question 175

Question
QUESTION NO: 175 A network engineer is designing an enterprise managed VPN solution for a large number of remote offices that do not have on-site IT support and communicate only with the home office. What type of VPN solution should be implemented?
Answer
  • VPLS
  • GRE
  • IPsec
  • EVPN
  • DMVPN
  • SSL client

Question 176

Question
QUESTION NO: 176 A remote office has a T1 WAN link to headquarters and a T1 Internet connection. The client requests WAN redundancy to headquarters with similar bandwidth. What two connection types satisfy this requirement? (Choose two.)
Answer
  • Secondary T1 WAN circuit
  • ISDN BRI
  • IPSec Tunnel over the Internet
  • DWDM l
  • POTS Line T1 WAN

Question 177

Question
QUESTION NO: 177 What two features are advantages of adding a secondary WAN link at the enterprise edge? (Choose two.)
Answer
  • provides additional bandwidth and load balancing capabilities
  • acts as a backup link in event the primary link fails
  • reduces capital and operational costs
  • improves security and prevents against denial of service attacks
  • distributes traffic proactively based on link utilization

Question 178

Question
QUESTION NO: 178 What technology can secure data over an insecure medium and provide WAN redundancy in the event of a primary connection failure?
Answer
  • virtual private network
  • shadow PVC
  • dial-up ISDN
  • GRE Tunnel

Question 179

Question
QUESTION NO: 179 A client wants to consolidate applications that are currently housed at multiple sites to a remote data center. What two design requirements are unique to this scenario? (Choose two.)
Answer
  • bandwidth
  • security
  • latency
  • storage
  • availability

Question 180

Question
QUESTION NO: 180 What IPv4 addressing technique allows for the division of addresses into subnets of different sizes?
Answer
  • VLSM
  • RIR
  • CIDR
  • NAT

Question 181

Question
QUESTION NO: 181 An organization is conducting an evaluation on the migration to IPv6 within the enterprise network and has requested clarification on recommended migration strategies. What three migration models would accomplish the organization's goal? (Choose three.)
Answer
  • Dual Stack
  • Service Block
  • Top-Down
  • Hybrid
  • Tunneled
  • Fork-Lift

Question 182

Question
QUESTION NO: 182 An application uses broadcast traffic to send data to IPv4 hosts. How can the application communicate using IPv6?
Answer
  • Anycast
  • Unicast
  • Broadcast
  • Multicast

Question 183

Question
QUESTION NO: 183 What significant advantage does EIGRP have over OSPF?
Answer
  • easy summarization
  • shorter convergence times
  • single area operation
  • low processor utilization

Question 184

Question
QUESTION NO: 184 What routing protocol requires full mesh between internal peers in an enterprise network?
Answer
  • OSPF
  • EIGRP
  • BGP
  • ISIS
  • RIP

Question 185

Question
QUESTION NO: 185 What three considerations should be taken into account when selecting a routing protocol? (Choose three.)
Answer
  • classful routing
  • scalability
  • default route origination
  • multi vendor support
  • link load balancing
  • hop count

Question 186

Question
QUESTION NO: 186 By default, how does EIGRP's metric differ from OSPF?
Answer
  • hops
  • cost
  • bandwidth
  • delay

Question 187

Question
QUESTION NO: 187 What characteristic separates link state routing protocols from a distance vector?
Answer
  • creates a topological view of the entire network
  • path calculation utilizes a more granular metric
  • does not scale well for large networks
  • constantly shares link state updates throughout the topology

Question 188

Question
QUESTION NO: 188 A company must deploy an IGP routing protocol on an Enterprise Network. Where should route summarization be implemented?
Answer
  • distribution
  • core
  • access
  • backbone

Question 189

Question
QUESTION NO: 189 What routing configuration can prevent routing loops between IGPs?
Answer
  • route filters
  • route reflectors
  • auto summarization
  • virtual links

Question 190

Question
QUESTION NO: 190 What is the first step when creating a network security policy?
Answer
  • define what should be protected
  • investigate how likely an attack is to occur
  • implement measures to protect assets
  • hire a security firm to perform penetration tests

Question 191

Question
QUESTION NO: 191 A customer requests a filtering design based on the need to scan all internet traffic, including remote workers. What solution meets these requirements?
Answer
  • Cisco Cloud Web Security
  • Cisco Network Admission Control
  • Cisco Identity Services Engine
  • Cisco Adaptive Security Appliance

Question 192

Question
QUESTION NO: 192 A customer wants to support a BYOD environment. What two products allow for posture assessment? (Choose two.)
Answer
  • ACS
  • NAC
  • ASA
  • ISE
  • WAAS
  • IDS

Question 193

Question
QUESTION NO: 193 What two CoS values are used by voice traffic? (Choose two.)
Answer
  • COS1
  • COS2
  • COS3
  • COS4
  • COS5

Question 194

Question
QUESTION NO: 194 A client wants to deploy a video conferencing platform in a multisite WAN environment. What two design considerations need to be evaluated? (Choose two.)
Answer
  • CODECs supported by the video units
  • buffer sizes on the routers
  • POE capabilities of the switches
  • number of current calls
  • number of hops between sites

Question 195

Question
QUESTION NO: 195 What wireless authentication option requires a Public Key Infrastructure?
Answer
  • EAP-TLS
  • PEAP
  • LEAP
  • EAP-FAST

Question 196

Question
QUESTION NO: 196 What two access point modes support the transmission of user traffic over a LWAPP/CAPWAP tunnel? (Choose two.)
Answer
  • local
  • H-REAP
  • rogue detector
  • monitor
  • sniffer
  • standalone

Question 197

Question
QUESTION NO: 197 What is the primary advantage of implementing a wireless LAN controller in a wireless LAN design?
Answer
  • roaming between APs
  • RADIUS user authentication
  • radio resource management
  • accelerated data transfer

Question 198

Question
QUESTION NO: 198 A wireless LAN client is sending traffic to the wired LAN client. What path will the packet take to reach the destination endpoint in a lightweight wireless deployment?
Answer
  • switch > controller > ap > client
  • controller > ap > switch > client
  • ap > controller > switch > client
  • switch > ap > controller > client

Question 199

Question
QUESTION NO: 199 What Cisco product is designed to improve the performance of Windows file and exchange services in remote data centers?
Answer
  • Application Control Engine
  • Wide Area Application Services
  • Cisco Application Policy Infrastructure Controller
  • Cisco Prime Network Services Controller
Show full summary Hide full summary

Similar

Todos mis RECURSOS...
Ulises Yo
Test de Inglés para la Prepa Abierta 3
Raúl Fox
NÚMEROS ROMANOS
JL Cadenas
PASAPALABRA  sobre  ANATOMÍA
JL Cadenas
CÁLCULOS con [ 3 · 5 · 7 ]
JL Cadenas
QUÍMICA, PASAPALABRA...
JL Cadenas
MATEMÁTICAS PRIMARIA
Ulises Yo
MATEMÁTICAS: ARITMÉTICA...
Ulises Yo
PINTURAS FAMOSAS: Título y Autor...
Ulises Yo
HISTORIA de ESPAÑA
Ulises Yo
CÁLCULO MENTAL - De Mapa Mental
JL Cadenas