Sunteți pe pagina 1din 88

Untitled Exam

Number: 000-000
Passing Score: 800
Time Limit: 120 min
File Version: 1.0
66

QUESTION 1
What is the advantage of STP?

A. Load balancing
B. High availability
C. Redundant link utilization
D.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 2
What are two advantages of a modular design (Choose two)?

A. Increased scalability because modules can be increased with growth


B. Security can be implemented at every module
C. Increased redundancy as you can add modules
D. Hierarchy included in design

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 3
Which option are benefits of the modular approach to network design?

A. higher availability
B. repeatable scalability
C. increased security
D. improved resiliency
Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 4
Which two Cisco products supports virtual contexts? (Choose two.)

A. ASR 1000
B. ASA
C. Cisco Nexus 7000 Series Switches
D.

Correct Answer: BC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 5
In VRRP /FHRP/ if you want the master switch to take over and continue its master role after coming up from failure which option should be used

A. Interface tracking
B. Priority
C. Preemption
D.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 6
What 4 benefits are gained by following the cisco PPDIOO life cycle model?
A. faster ROI
B. improved business agility
C. increased network availability
D. faster access to applications and services
E. lower total cost of network ownership
F. better implementation team engagement

Correct Answer: BCDE


Section: (none)
Explanation

Explanation/Reference:

QUESTION 7
Which two high -level design components are included in Cisco Unified Wireless Network? (Choose two)

A. Local mode
B. Cisco FlexConnect
C. Deterministic
D. Dynamic

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 8
Designing of WAN links, with latency which method should be used to efficiently utilizethe link?

A. Policy based routing


B. Cisco performance routing
C.
D.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 9
While designing a highly resilient infrastructure, which layer is typically a single point of failure?

A. Internet
B. Distribution
C. Access
D. WAN

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 10
What functional components should be placed in a DMZ network that has internet connection?

A. DDOS
B. ASA
C. Web load balancer
D. Web server

Correct Answer: CD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 11
When designing a high availability network, which option can be classified as a fault domain?

A. Every tier in the network design


B. Single power supply devices in a network design
C. Collapsed core in a network design
D. Non-redundant devices in the network design

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 12
What is the benefit of distribution layer (mentioned 3 Tier Hierarchical & Campus in Q too I think)?

A. Security against unauthorized users


B. Fault isolation between Core and Access Layers
C. Access Resiliency
D. Extend boundary L2 L3

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 13
Which two benefits are realized by establishing virtualization in a campus network? (Choose two)

A. Enables path isolation


B. Enhances network agility
C. Consolidates applications
D. Enables unlimited scalability
E. Reduces network bandwidth

Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:

QUESTION 14
Which cisco tool is used for network accounting, monitoring and routing?

A. Cisco Prime (collaboration)


B. Сiscoworks
C. NBAR
D. Netflow

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 15
When integrating services with Cisco ACI Service Graphs, which tool can be used for integrated Configuration management?

A. IOS
B. REST API
C. APIC CLI
D. HTML

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 16
At which layer of the network should you perform traffic filtering and QoS Classification?

A. Session
B. Distribution
C. Application
D. Core

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 17
An engineer is designing a private WAN infrastructure to support an organization and must support quality of service and multicast functionality to the
remote sites. Which WAN technology supports this requirement?

A. DMVPN
B. MPLS
C. IPsec VPN
D. SSL VPN

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 18
What are two industry drivers that promote network virtualization? (Choose two)

A. traffic isolation
B. device reduction
C. multi-vendor support
D. application stability
E. reduced complexity

Correct Answer: AE
Section: (none)
Explanation

Explanation/Reference:
QUESTION 19
To which category do the following network virtualization components belong? [GRE, VLAN, Vrf-lite, MPLS, ACL]

A. Path isolation
B. Access control
C. Policy enforcement
D. Network service virtualization

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 20
Which subnet mask should you use on a point-to-point links to avoid wasting IP addresses?

A. 255.255.255.0
B. 255.255.255.252
C. 255.255.255.250
D. 255.255.255.248

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 21
Which technology combines two Nexus switches to form a single logical switch, while maintaining control plane separation between the two devices,
and requiring independent management of each device?

A. vPC
B. VSS
C. MEC
D. Cisco stackwise
Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 22
A company of 200 users want to design a cost-effective network architecture without losing resiliency and high availability characteristics. Which
method should be used?

A. Collapse the core distribution


B. Connect the access directly to the core
C. Use three tier design
D.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 23
From which DNS record can a Cisco wireless AP, running Cisco WLC version 6.0 or later, retrieve bootstrap information?

A. cisco-capwap-controller
B. the DNS A record of the controller hostname
C. the DHCP Option 43 name
D. cisco-lwapp-controller

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 24
In an EAP-enable WLAN, which component sends the EAP Request?

A. WLAN controller
B. Access point
C. Wireless client
D. ACS server

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 25
A company with many remote sites wants to design IPT solution, with call processing located at HQ. Which IPT deployment model should be used?

A. Single-site with centralized


B. Multisite WAN with centralized call processing
C. Multisite WAN with distributed call processing
D. Multisite with centralized
E. CallManager Express deployment

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 26
How to make a network topology more resilient? (Shown a redundant net arch with only a single ISP connection)

A. Redundant ISP
B.
C.
D.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 27
When designing IP addressing schemes, which options are two benefits of implementing hierarchical addressing? (Chose two)

A. Provides an optimized addressing plan


B. Provides real-time troubleshooting
C. Allows the use of overlapping addresses
D. Reduces routing table entries
E. Provides modular convergence

Correct Answer: AD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 28
The Company hires a network consultant to help implement QoS in its network. Which technique should the consultant use to identify traffic and
PORTS used by applications?

A. NBAR
B. CDP
C. Netflow
D. Ciscoworks

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 29
Which option is an example of a fixed two-level hierarchical routing protocol?
A. OSPF
B. EIGRP
C. OSPF
D. RIPv2

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 30
What is the benefit of using a triangle topology on the core layer?

A. Utilization of multiple links to its destination


B. In a case of a link failure there is no need of routing recalculation.
C.
D.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 31
Which type of router connects to two different OSPF areas?

A. Area border
B. Autonomous system boundary
C. Backbone
D. Internal

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:

QUESTION 32
Which source of route has better AD than BGP(20)?

A. OSPF – 110
B. iBGP – 200
C. RIPv2 -120
D. Connected Interface-0

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 33
Where should be VPN connection be terminated?

A. DMZ
B. Internet
C. Remote Access
D.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 34
An engineer is planning branch WAN links to support unified communications. Which DSCP value must be assigned to voice traffic?

A. EF
B. AF41
C. COS4
D. BE

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 35
During IP addressing design, which factor should be considered?

A. No of devices in each location


B. No of location available
C. Device capability
D.

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 36
Which command should you use to get [the most] information from a device?

A. Show running
B. Show cdp
C. Show tech-support
D.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:
QUESTION 37
Which format reflects that of the IPv6 global unicast address?

A. Global prefix (16 bits), subnet ID (16 bits), interface ID (64 bits)
B. Global prefix (48 bits), subnet ID (16 bits), interface ID (64 bits)
C. Global prefix (16 bits), subnet ID (64 bits), interface ID (48 bits)
D. Global prefix (16 bits), subnet ID (16 bits), interface ID (64 bits)

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 38
Which two techniques can you use to reduce the size of a network routing table? (Choose two)

A. Implement VPN
B. Implement NAT
C. Route Summarization
D. Configure static routing
E. Utilize a default route

Correct Answer: CE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 39
You want to apply QoS to an Access Point which is connected to a switch, which configuration should be used?

A. 802.1q trunk
B.
C.
D.
Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 40
An engineer wants to find all of the objects of a certain type available in the MIB. Which kind of query must be performed?

A. object-level
B. tree-level
C. class-level
D. subtree-level

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 41
You have a server hosted on the server farm module. The server is configured to listen to the TCP port 140. What NAT is best for this?

A. STATIC
B. Dynamic
C. Overload
D.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 42
Critical for availability remote office has a complete redundant link to WAN. What can improve the availability of a remote office?
A. install dual power supply
B. Use different line cards
C. Increase the speed of WAN links from 100 Mb / s to 1 Gbps
D. Replace the wired connection with the optics

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 43
Which two of the following are benefits of using a modular approach to network design? (choose two)

A. Improves flexibility
B. Facilitates implementation
C. Lowers implementation costs
D. Improves customer participation in the design process

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 44
How does the use of multiple areas in a link state routing protocol improve network scalability?

A. Reduced network bandwidth


B. Permits partial table updates
C. Enables route summarization
D. Overcomes router hop limit

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:

QUESTION 45
While designing a remote access VPN, a customer has requested three different levels of access to be granted for administrator, employees, and
partners. Which three access policies must be configured for the three groups? (choose three)

A. Partners are centrally authenticated with limited network access controller with ACLs
B. Administrative users have local credentials with full access to the internal infrastructure
C. Administrative users are centrally authenticated with full access to the internal infrastructure
D. Employees are centrally authenticated with limited network access controlled with ACLs
E. Employees are centrally authenticated with full access to the internal infrastructure
F. Partners are centrally authenticated with full access to the internal infrastructure

Correct Answer: ACD


Section: (none)
Explanation

Explanation/Reference:

QUESTION 46
Which option can hinder efficient IP address allocation?

A. VLSM
B. Classless routing protocols
C. Routing auto-summary
D. Classful routing protocols

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 47
One step in characterizing an existing network involves obtaining information such as network performance, availability, utilization and response times
Which activity generates this information?
A. Logical network mapping
B. Network health check
C. Address naming analysis
D. Wiring and media assessment

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 48
For which type of topology are modern fast-converging routing protocols designed?

A. Hub-and-spoke
B. Full mesh
C. Hierarchical
D. star

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 49
Which two major campus design models does the Cisco Unified Wireless Network support? (Choose two)

A. Local mode
B. Cisco FlexConnect
C. Deterministic
D. Dynamic

Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:

QUESTION 50
A diagram and then a configuration of access list interface shown, then which device is QoS trust boundary

A. IP Phone
B. Access switch
C. Core
D. Distribution

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 51
What is the advantage of multiple area LSP design? (Choose two)

A. Bandwidth optimization
B. Route summarization
C. Isolation of routing issues
D.

Correct Answer: BC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 52
Considering efficient utilization of IP Addressing, what mask you will use in a point to point connection?

A. 255.255.252.0
B. 255.255.255.252
C. 255.255.255.254
D.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 53
You need to modify the design of an existing network of an organization by adding something new. What do you need first from the organization?

A. the router hardware type


B. the software IOS version
C. the existing design document
D. the output of show cdp neighbors

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 54
What happens if an APIC is removed fron topology?

A. The packets are send to the other controllers


B. the fabric drops all packets
C. the fabric continues to forward packets
D. something really stupid

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 55
What type of files are most often used by APIs? (choose 2)

A. html
B. json
C. txt
D. xml

Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 56
What benefits do hierarchical IP addressing provide for an organization?

A. modular convergence
B. smaller routing tables
C. optimized address plan
D.

Correct Answer: BC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 57
Which are best-practices for ospf design? (choose 2):

A. match ospf design with stf design


B. make non-backbone areas stub areas
C. don’t remember
D. route summary

Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 58
Which subnet provides for 6 /25 subnets?

A. /19
B. /23
C. /16
D. /22

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 59
Which of the following are technology drivers for virtualization?

A. path isolation
B. multivendor support
C. decreasing the number of physical devices
D.

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 60

A.
B.
C.
D.

Correct Answer:
Section: (none)
Explanation

Explanation/Reference:

QUESTION 61
When designing IP addressing schemes, which options are two benefits of implementing hierarchical addressing? (Choose two)

A. provides real-time troubleshooting


B. allows the use of overlapping addresses
C. provides an optimized addressing plan
D. provides modular convergence
E. reduces routing table

Correct Answer: CE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 62
Which option can hinder efficient IP address allocation?

A. VLSM
B. classless routing protocols
C. classful routing protocols
D. routing auto-summary

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:
QUESTION 63
While preparing an overview of Internet facing DMZ for a customer, a consultant must identify the functionality to be placed in the DMZ. Which two
functionalities are best suited for use in a DMZ? (Choose two.)

A. enterprise NTP source


B. web load balancer
C. remote access VPN termination
D. DDOS protection
E. web security appliance

Correct Answer: CE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 64
An engineer is designing a Cisco Unfed Communications deployment for a customer with small sites across the country. Which deployment model
keeps the call control at the data center of the primary site?

A. campus deployments
B. distributed deployment
C. cloud hybrid service deployment
D. multisite deployment model with centralized call processing

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 65
While designing the LAN core to distribution infrastructure for optimum convergence, the engineer decides to use a topology using triangles. Which
benefit to the organization is true?

A. It allows device failures to occur without a recalculation of routes


B. It allows for a smaller quantity of devices in the core.
C. It utilizes multiple links to route traffic to its destination
D. It creates a topology that can grow with the organization

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 66
For which type of topology are modern fast-converging routing protocols designed?

A. star
B. hierarchical
C. full mesh
D. hub-and. Spoke

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
101

QUESTION 1
Which advantage to using route summarization is true?

A. reduces routing table size and improves convergence.


B. enables recalculation of the routing table with any update for optimum convergence
C. provides an overview of all subnets used across the infrastructure
D. enables efficient peering with other autonomous system

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 2
An organization is deciding what routing protocol to use throughout their network. What must be considered if routing is to be performed at the access
layer?

A. reduced scalability of the network when introducing a large number of switch blocks into the routing table
B. centralized management of access control lists at the distribution layer
C. reliability when implementing routing over spanning-tree at the access layer
D. performance differences between core, distribution and access layer equipment

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 3
What are two reasons discontinuous IPv4 networks hinder scalability? (Choose two.)

A. routing table bloat


B. inability to utilize automatic summarization
C. insufficient IP addresses
D. slowed packet forwarding
E. delayed interface queuing

Correct Answer: BC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 4
What is the optimal device and location to fulfill these requirements? • provide early indication of reconnaissance and scanning activities with blocking
capabilities • require fewer interfaces to inspect traffic to the DMZ and internal network

A. IPS inline outside of the firewall


B. IPS inline inside the firewall
C. Cisco IOS IPS on the border router
D. passive IPS connected to a SPAN port outside of the firewall
E. passive IPS connected to a SPAN port inside the firewall

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 5
which network element must be summarized in a multiarea OSPF deployment?

A. IP address
B. communities
C. number of routes
D. link state advertisements

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:

QUESTION 6
Which VPN tunneling technology supports IP multicast?

A. DMVPN spoke-to-spoke
B. Cisco Easy VPN
C. IPsec direct encapsulation spoke-to-spoke
D. IPsec direct encapsulation hub-and-spoke

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 7
which option contains the information required to learn the layout of network devices and the links the connect them?

A. network baseline
B. wiring and media details
C. architectural and environmental constraints
D. network topology map

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 8
An engineer wants to ensure that the Spanning Tree topology appears free while redundant switches are present. Which Layer2 technology must be
used?

A. VPC
B. PaGP
C. LACP
D. OTV

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 9
Which statement about modular network design is true?

A. Each deployed module is identical to the others, simplifying configuration


B. Each module include access, distribution, and core layers
C. It is a flexible architecture that simplifies design, management and troubleshooting
D. It is complex and should be used only in specialized situations

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 10
which network size can provide six /25 subnets while wasting the smallest number of ip addresses

A. /22
B. /19
C. /23
D. /16

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
QUESTION 11
A network engineer is tasked with summarizing the routes to a remote site. What is the optional route statement to connect to the 192.168.101.0/24
and 192.168.102.0/24 networks across the corporate WAN?

A. p route 192.168.101.0 255.255.254.0


B. ip route 192.168.100.0 255.255.255.0
C. ip route 192.168.100.0 255.255.254.0
D. ip route 192.168.100.0 255.255.252.0

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 12
Which statement about using STP in a redundant-link scenario is true?

A. It uses only one redundant link at any one time.


B. It bonds the two links and treats them as one link.
C. It provides the most efficient use of redundant links.
D. It balances traffic by transmitting packets on alternating links.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 13
A data center is reaching its power and cooling capacity. What two virtualization technologies can address the problem by directly reducing the number
of physical devices? (Choose two.)

A. virtual switching systems


B. virtual device contexts
C. virtual servers
D. virtual routing and forwarding
E. virtual port channels
F. virtual LANs

Correct Answer: BC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 14
Which option can use deep-packet examination to determine the specific nature of an attack?

A. stateful firewall
B. NetFlow collector
C. syslog server
D. network IPS

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 15
In which phase of Cisco Design Lifecycle would you identify shortfalls in the network operation teams ability to support new technologies being
introduced?

A. In the Validation stage of the Build phase


B. In the Deployment stage of the Build phase
C. In the Assessment stage of the Plane phase
D. In the Optimize stage of the Mange phase

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:
QUESTION 16
which two methods are used to reduced the mesh links required between ibgp peers in the same AS? (choose two)

A. route reflectors
B. local reference
C. confederations
D. community
E. atomic aggregate

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 17
Which mode is used to exclusively look for unauthorized access points?

A. monitor mode
B. sniffer mode
C. rogue detector mode
D. local mode

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 18
Which one of these statements is an example of how trust and identity management solutions should be deployed in the enterprise campus network?

A. Authentication validation should be deployed as close to the data center as possible.


B. Use the principle of top-down privilege, which means that each subject should have the privileges that are necessary to perform their defined tasks,
as well as all the tasks for those roles below them.
C. Mixed ACL rules, using combinations of specific sources and destinations, should be applied as close to the source as possible
D. For ease of management, practice defense in isolation - security mechanisms should be in place one time, in one place.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 19
WAN backup over the Internet is often used to provide primary connection redundancy. Which is the most important consideration when passing
corporate traffic over the public Internet?

A. security
B. static versus dynamic routing
C. bandwidth
D. QoS
E. latency

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 20
Select and Place:

Correct Answer:

Section: (none)
Explanation

Explanation/Reference:
QUESTION 21
Characterizing an existing network requires gathering as much information about the network as possible. Which of these choices describes the
preferred order for the information-gathering process?

A. site and network audits, traffic analysis, existing documentation and organizational input
B. existing documentation and organizational input, site and network audits, traffic analysis
C. traffic analysis, existing documentation and organizational input, site and network audits
D. site and network audits, existing documentation and organizational input, traffic analysis

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 22
Which two statements correctly identify the layers of the Enterprise Campus module?

Case Study Title (Case Study):


A. A is the Data Center Module and C is the Campus Core layer.
B. A is the Data Center Module and D is the Building Access layer
C. B is the Campus Core layer and C is the Building Distribution layer.
D. B is the Building Distribution layer and C is the Campus Core layer.
E. A is the Internet Connectivity layer and B is the Campus Core layer.
F. B is the Building Distribution layer and D is the Building Access layer.

Correct Answer: BC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 23
You need to connect to a remote branch office via an Internet connection. The remote office does not use Cisco equipment. This connection must be
secure and must support OSPF. Which of the following can be used to transport data to the branch office?

A. GRE over IPsec


B. IPsec
C. GRE
D. IPsec VTI

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 24
Which voice codec should you use in order to provide toll quality calls?

A. G.711
B. G.718
C. G.722
D. G.729

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
QUESTION 25
When evaluating network designs, what indicator demonstrates that the modular approach was followed?

A. ability to scale
B. follows best practices
C. redundant connectivity
D. easy to deploy

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 26
A network engineer is following the Cisco enterprise architecture model. To which network layer would a branch office connect to using a private
WAN?

A. Enterprise Campus
B. Enterprise Edge
C. SP Edge Premise
D. Remote Module

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 27
A network engineer is following the three tiered Network Hierarchical Model. At which tier is route summarization implemented?

A. core
B. distribution
C. backbone
D. access
Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 28
In which network location should an external DNS server be placed?

A. campus data center


B. enterprise branch
C. internet
D. remote access

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 29
A company has dark fiber between headquarters and its data center. It is presently configured as a 10GbE connection. Network utilization shows high
utilization on the connection. What technology can be implemented to increase capacity without acquiring another circuit?

A. MPLS
B. DWDM
C. VPLS
D. DMVPN

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 30
When designing changes to an existing network, which two options are documented to understand environmental constraints? (Choose two.)
A. utilization of network resources
B. heating and air conditioning
C. location of existing documentation
D. floor and rack space availability
E. host naming conventions

Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 31
What are two benefits of the bottom-up design approach? (Choose two.)

A. incorporates organizational requirements


B. requires little or no notation of actual organizational requirements for implementation
C. provides a broader overview to the organization and the designer
D. facilitates design that is based on previous experience
E. allows a quick response to a design request

Correct Answer: DE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 32
How many switches can be combined into a single network element using VSS?

A. 6
B. 8
C. 2
D. 4

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 33
Based on best practices, which QoS profile should be configured on the WLAN of the WLC for wireless VoIP communications?

A. Silver
B. Bronze
C. Gold
D. Platinum

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 34
Which statement about using STP in a redundant-link scenario is true?

A. It uses only one redundant link at any one time.


B. It bonds the two links and treats them as one link.
C. It provides the most efficient use of redundant links.
D. It balances traffic by transmitting packets on alternating links.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 35
Which type of router connects to two different OSPF areas?

A. Area border
B. Autonomous system boundary
C. Backbone
D. Internal

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 36
Which option is an example of a fixed two-level hierarchical routing protocol?

A. OSPF
B. RIPv2
C. EIGRP
D. static routes

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 37
While designing a remote access VPN, a customer has requested three different levels of access to be granted for administrators, employees, and
partners. Which three access policies must be configured for the three groups? (Choose three.)

A. Partners are centrally authenticated with limited network access controlled with ACLs.
B. Administrative users have local credentials with full access to the internal infrastructure.
C. Administrative users are centrally authenticated with full access to the internal infrastructure
D. Employees are centrally authenticated with limited network access controlled with ACLs
E. Employees are centrally authenticated with full access to the internal infrastructure
F. Partners are centrally authenticated with full access to the internal infrastructure

Correct Answer: ACD


Section: (none)
Explanation

Explanation/Reference:

QUESTION 38
Which two techniques can you use to reduce the size of a network routing table? (Choose two.)

A. Implement VPN
B. Route summarization
C. Implement NAT
D. Configure static routing
E. Utilize a default route

Correct Answer: BE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 39
Traditionally, the DMZ exists between which two locations? (Choose two.)

A. Building distribution
B. Building access
C. Corporate network
D. Metro Access
E. Internet

Correct Answer: CE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 40
An engineer wants to ensure that the Spanning Tree topology appears free while redundant switches are present. Which Layer2 technology must be
used?
A. VPC
B. PaGP
C. LACP
D. OTV

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 41
An engineer is planning branch WAN links to support unified communications. Which DSCP value must be assigned to voice traffic?

A. EF
B. AF41
C. COS4
D. BE

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 42
Which option best describes the high-level design document?

A. It includes specific information such as hardware models, software version, IP addressing, and routing protocols.
B. It contains the test plan to certify that the customer's network is ready for use.
C. It contains the steps needed to install and configure the network equipment and the steps that verify basic network operation.
D. It includes business and technical requirements and the proposed network architecture.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:

QUESTION 43
Which value must you configure on a Microsoft DHCP server so that Cisco wireless APs can locate the wireless controllers?

A. the Length value


B. the IP DHCP pool name
C. a vendor class identifier
D. the Type suboption code 0xe1

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 44
Which scenario is the best example of a single-homed connected infrastructure?

A. A data center that is connected to one service provider over an MPLS circuit and another service provider over an Ethernet connection.
B. A remote office that is connected to the WAN using a DSL provider and a cable provider.
C. A small office that uses a DSL link to connect to the WAN.
D. A corporate office that uses two separate routers to connect to two different service providers.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 45
Which address is the broadcast address of subnet 120.20.78.8/30?

A. 120.20.78.12
B. 120.20.78.1
C. 120.20.78.11
D. 120.20.78.8

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 46
Which two major campus design models does the Cisco Unified Wireless Network support? (Choose two.)

A. Cisco FlexConnect
B. N+N+1
C. Deterministic
D. Local Mode
E. Dynamic

Correct Answer: AD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 47
Which two protocols are classful routing protocols? (Choose two.)

A. RIPv2
B. RIPv1
C. IGRP
D. OSPF
E. BGP

Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:

QUESTION 48
From which DNS record can a Cisco wireless AP, running Cisco WLC version 6.0 or later, retrieve bootstrap information?

A. cisco-capwap-controller
B. the DNS A record of the controller hostname
C. the DHCP Option 43 name
D. cisco-lwapp-controller

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 49
When integrating services with Cisco ACI Service Graphs, which tool can be used for integrated configuration management?

A. IOS
B. REST API
C. APIC CLI
D. HTML

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 50
Which VPN tunneling technology supports IP multicast?

A. DMVPN spoke-to-spoke
B. Cisco Easy VPN
C. IPsec direct encapsulation spoke-to-spoke
D. IPsec direct encapsulation hub-and-spoke

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 51
Which format reflects that of the IPv6 global unicast address?

A. global prefix (16 bits), subnet ID (16 bits), interface ID (64 bits)
B. global prefix (48 bits), subnet ID (16 bits), interface ID (64 bits)
C. global prefix (16 bits), subnet ID (64 bits), interface ID (48 bits)
D. global prefix (64 bits), subnet ID (48 bits), interface ID (16 bits)

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 52
Which layer in the Cisco Enterprise Architecture model is highly available, has fast convergence, and should avoid packet manipulation?

A. campus distribution
B. enterprise data center
C. enterprise edge
D. campus access
E. campus core
F. remote access VPN

Correct Answer: E
Section: (none)
Explanation

Explanation/Reference:
QUESTION 53
In the traditional hierarchical LAN design, which two statements about the distribution layer are true? (Choose two.)

A. It uses Layer 2 switching only.


B. It typically is connected directly to the Internet.
C. It aggregates data from the access layer.
D. Policy is implemented at this layer.
E. It provides users direct access to the network.

Correct Answer: CD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 54
An engineer is designing a network that is divided into multiple areas and supports a mixed vendor routing environment. Which interior gateway
protocol must be selected?

A. EIGRP
B. OSPF
C. BGP
D. RIPv2

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 55
Which two benefits are realized by establishing virtualization in a campus network? (Choose two.)

A. enables path isolation


B. enhances network agility
C. consolidates applications
D. enables unlimited scalability
E. reduces network bandwidth

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 56
Which option is one of the methods that Cisco routers and switches can use to share information between directly connected devices on a regular
basis?

A. NetFlow
B. ARP
C. NHRP
D. CDP

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 57
What information should be utilized to identify network applications that are running on an existing network infrastructure?

A. customer information
B. existing documentation
C. traffic analysis
D. external feedback
E. user feedback

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:

QUESTION 58
An engineer is designing a solution for multiple multihomed to establish router between one another which design must be?

A. OSPF
B. iBGP
C. eBGP
D. EIGRP

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 59
Which application can provide AAA services for Cisco Devices?

A. IP SLA
B. Cisco TrustSec
C. TACACS+
D. Cisco FirePOWER

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 60
Consider the reservation of IP Addressing what mask you will use in a point to point connection between two Buildings?

A. 255.255.252.0
B. 255.255.255.252
C. 255.255.255.254
D.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 61

Select and Place:

Correct Answer:

Section: (none)
Explanation

Explanation/Reference:
Top Down : 1) Gives the big picture to the organizations and designer
2) Incorporates organizational requirements
Bottom-up : 1) Enables a quick response to a design request
2) Facilitates designs based on previous experience

QUESTION 62

Select and Place:

Correct Answer:

Section: (none)
Explanation

Explanation/Reference:
MST, PVST, RapidPVST

QUESTION 63
Select and Place:

Correct Answer:

Section: (none)
Explanation

Explanation/Reference:
Backbonefast, Bpdu Guard,portfast,bpdu filter,loop guard,uplinkfast,rootguard.
QUESTION 64

Select and Place:

Correct Answer:

Section: (none)
Explanation

Explanation/Reference:
Access control, path isolation, sona, service edge.

QUESTION 65
Select and Place:

Correct Answer:

Section: (none)
Explanation

Explanation/Reference:
Layer 2 switching campus design: 1) uses fhrp for high availability 2) uses VSS to provide redundancy 3) only one redundant connection between the
access switch and the distribution switch can be active.
Layer3 switching campus design :
1)Route filtering is configured on interface toward the access layer
2) inter-vlan communications are routed in the distribution layer.
QUESTION 66
Which three describe challenges that are faced when deploying an environment for teleworkers? (Choose three.)

A. supporting a mix of technically knowledgeable and nontechnical users


B. simplifying router installation and configuration
C. verifying available power at employee's house for necessary equipment
D. avoiding situations where employees might use nonstandard hardware or configurations
E. reducing daily commuting time to main office location
F. providing access to FTP servers located in main office location
G. implementing leased line connectivity between main office and employee's home location

Correct Answer: ABD


Section: (none)
Explanation

Explanation/Reference:

QUESTION 67
Which statement is true concerning the data center distribution (aggregation) layer design?

A. With Layer 3 at the aggregation layer, the physical loops in the topology must still be managed by STP.
B. The boundary between Layer 2 and Layer 3 must reside in the multilayer switches, independent of any other devices.
C. A mix of both Layer 2 and Layer 3 access is the most optimal.
D. In a small data center, the aggregation layer can connect directly to the campus core, exchanging IP routes and MAC address tables.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 68
Which subnet is the best choice for a point-to-point link?

A. 10.120.10.0/29
B. 10.120.10.0/28
C. 10.120.10.0/30
D. 10.120.10.1/32

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 69
An engineer must create a logical, isolated network for regulatory compliance. Which option is a complex access control network virtualization
scenario?

A. IT organization deploying two mpls networks with in their environment


B. IT organization providing a quarantined area of network admission control posture validation.
C. IT organization providing an isolated guest network for wired and wireless clients
D. IT organization acting as a service provider creating logical separation for business units

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 70
which feature must be configured on a switch ports that connects to a Cisco wireless access point when QOS is required?

A. Auto negotiation
B. Cisco discovery protocol
C. Dot1q trunk
D. Portfast

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:
QUESTION 71
which option do you use to provide dynamic utilization of WAN links based on latency?

A. equal cost load balancing


B. unequal cost load balancing
C. Cisco performance routing
D. policy-based routing

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 72
high availability is required for a critical remote office to an enterprise. The office has already deployed two redundant wan connections. Which action
can be done to the edge router to improve the availability of the remote office?

A. upgrade the uplinks from 100mb to 1g.


B. replace the fiber uplinks with copper
C. add dual power supplies
D. use modular line cards

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 73
which two types of files are the most common use in APIs for programmability?(choose two)

A. JSON
B. PERL
C. BASH
D. HTML
E. XML

Correct Answer: AE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 74
A startup company wants to deploy the Cisco ip telephony solution. Which two actions are appropriate design approaches? (choose two)

A. connect Cisco unified communications manager in the eternet switches of data center module
B. connect sip trunks for pstn connectivity to Ethernet switches of campus core layer
C. connect Cisco unified communication manager to the Ethernet switches of the campus core layer
D. connect ip phones to the Ethernet switch of data center module
E. connect user ip phones to the Ethernet switches of access layer

Correct Answer: CE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 75
a large corporation wants to ensure high availability for its e-commerce web sites. Which routing protocol must be used when connecting to multiple
internet services providers?

A. static routes
B. EIGRP
C. BGP
D. OSPF

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:
QUESTION 76
which two options should be considered when desiging an ospf network?

A. configure nonbackbone areas as stub areas.


B. design STP to mirror the ospf design
C. there is limit on available AS numbers
D. CDP should be incorporated
E. Ensure the address space is summarizable

Correct Answer: AE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 77
Which Cisco technology can connect more than two switches so that they behave as one switch?

A. trunking
B. EtherChannel
C. StackWise
D. VSS

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 78
which designing a high availability network.which option can be classified as fault domain?

A. every tier in the network design


B. collapsed core in the network design
C. non redundant devices in the network design
D. single power supply devices in the network design
Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 79
which two considerations are important when designing an ip address plan?

A. the speed of the connected devices


B. the number of locations
C. the type of connected devices
D. the name of the locations
E. the number of devices per location

Correct Answer: BE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 80
An engineer is designing a high availability branch network so that redundancy protocols must support automatic load balancing which protocol
satisfies this requirement?

A. HSRP
B. MLBP
C. VRPP
D. GLBP

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:
QUESTION 81
Cisco unified wireless networks supports two campus design models centralized or local mode and Cisco flexconnect. Which statement about the local
mode design model is true?

A. it is recommended for remote-site deployments


B. the wireless lan controller and access points are co-located
C. it is recommended for sites with a local wan distribution layer
D. it is recommended for sites that use less than 50 APs.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 82
which two options best describe the top-down design approach?(choose two)

A. organizational requirements should not be included.


B. the design will meet both current and future requirements
C. the approach begins with the needs of the organization
D. the approach begins with the physical layer of the osi model
E. the design is based on previous experience and allows for a quick solution.

Correct Answer: BC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 83
A small business owner has 200 staff members that occupy two floors of a building. The ownerwants to reduce the network infrastructure costs without
losing two much network resiliency andscalability. Which option meets these requirements ?

A. combine access and distribution layers into one layer and keep all others layers’
B. exclude and distribution layer switches and connect everything to redundant core switches
C. combine access and core layers in to one layer and keeping all the other layers
D. combine core and distribution layers into one layer and keep all the other layers

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 84
What kind of servers you should place in DMZ?

A. WWW
B. FTP
C. DHCP
D. TACACS+
E. NFP

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 85
which vpn technology support ip multicast?

A. ipsec direct encapsulation spoke to spoke


B. Cisco easy vpn
C. ipsec VTI
D. Ipsec direct encapsulation hub to spoke

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:
QUESTION 86
which advantage of using spanning tree protocol is true?

A. allows fast convergence after failure of a link or device


B. utilizes all available uplink bandwidth
C. prevents network loops
D. allows dual-homed servers operate in active-active mode

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 87
which two options are benefits of a modular network design? ( choose two)

A. higher scalability
B. ease of troubleshooting
C. endto end security
D. intelligent network services
E. improved fault isolation

Correct Answer: AE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 88
Which statement about VSS is true?

A. it can maintain the topology independently of STP


B. it requires HSRP
C. it requires STP for link redundancy
D. it has two control planes.
Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 89
An engineer is designing a private WAN infrastructure to support an organization and must support quality of service and multicast functionality to the
remote sites. Which technology supports this requirement?

A. MPLS
B. DMVPN
C. SSL VPN
D. IPSEC VPN

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 90
which sip feature allows an access port to bypass the learning and listening states?

A. root guard
B. loop guard
C. portfast
D. bpdu guard

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 91
Which two design decisions can improve network resiliency? (Choose two.)
A. implement redundant topology
B. implement serial device connections
C. increase data plane bandwidth
D. implement redundant links
E. reduce network size

Correct Answer: AD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 92
which two processes are included in the build phase of the Cisco design lifecycle?(choose two)

A. validation
B. assessment
C. analysis
D. deployment
E. design

Correct Answer: AD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 93
which two methods are used to reduce the mesh links required between ibgp peers in the sameAS?(choose two)

A. local preference
B. route reflectors
C. confederations
D. community
E. atomic aggregate
Correct Answer: BC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 94
Refer to the exhibit ? which result is true if a client computers connected through the interfacenamed internal and attempts to connect to an
operational tcp/443 based website?

A. the web site connection times out


B. A captive portal is displayed, which enables guest access layer
C. the traffic passes while alerting the logging system with the emergencies eventlevel
D. the traffic passes and displays the website content

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 95
in a new dmvpn deployment phase 1 completes successfully however phase 2 experience issues.Which troubleshooting step is valid in this situation?

A. remove NHRP configuration and reset the tunnels


B. verify IP routing between the external IPs of the two peers is correct
C. ensure that the nodes use the same authentication method
D. temporarily remove encryption to check if the GRE tunnel is working

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 96
traditionally the dmz exists between which two locations?(choose two)

A. corporate network
B. building access
C. building distribution
D. metro access
E. internet

Correct Answer: AE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 97
which option does a modular design approach provide?

A. efficiency
B. manageability
C. fault isolation
D. performance

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 98
In an EAP-enabled WLAN, which component sends the EAP identity request?

A. access point
B. wireless client
C. wlan controller
D. ACS server

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 99
at which layer of the network should you perform traffic filtering and QOS classification?

A. core
B. application
C. Distribution
D. session

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 100
Which routing protocol is the most scalable?

A. RIP
B. IGRP
C. RIPV2
D. OSPF

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 101
which statement about static routes is true?

A. They are ideal for a full-mesh topology


B. they must be configured manually
C. they require considerable routing protocol overhead
D. they are ideal for large networks

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
misc

QUESTION 1
Which two of these are functions of an access point in a Split MAC Network Architecture? (Choose two.)

A. EAP Authentication
B. MAC layer encryption or decryption
C. 802.1Q encapsulation
D. Process probe response

Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 2
Which two solutions are parts of the Cisco Security Management Suite? (Choose two.)

A. ASA
B. Cisco Security Agent
C. NAC Appliance
D. csm
E. pix
F. Cisco Security MARS

Correct Answer: DF
Section: (none)
Explanation

Explanation/Reference:

QUESTION 3
For the following items, which is an SP Edge module in the Enterprise Composite Network model?

A. Core layer
B. Edge distribution
C. Public Switched Telephone Network (PSTN) service
D. Server farm

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 4
Observe the following options, in which section of the network document does Cisco recommend a discussion of performance, scalability, capacity,
security, and traffic needs?

A. Design summary
B. Design solution
C. Executive summary
D. Design requirements

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 5
Which two encryption transforms will be used by both ESP and AH for authentication?

A. HMAC-MD5 or Hash Message Authentication Code-Secure Hash Algorithm-1(HMAC-SHA-1)


B. DES or 3DES
C. DES or Hash Message Authentication Code-Message Digest 5 (HMAC-MD5)
D. 3DES or MD5

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:

QUESTION 6
For the following options, which emerging WAN technology uses DSL coding and digital modulation techniques with Ethernet?

A. Cable
B. Wireless
C. SMDS
D. Long-Reach Ethernet (LRE)

Correct Answer:
Section: (none)
Explanation

Explanation/Reference:

QUESTION 7
What is SLC?

A. Standard level contracts


B. Standard level configuration
C. Service level contracts
D. Service level configuration

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 8
What does ODR stand for?

A. Open default routing


B. Optical demand routing
C. Open dedicated routing
D. On-demand routing

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 9
A common response to an attack by this device can be either to send an alert or to take corrective action. What is this device?

A. Vulnerability assessment
B. Firewall
C. Intrusion-detection system (IDS)
D. Router

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 10
For the following items, which component of the CiscoWorks product allows a network administrator to define and manage service levels?

A. Service assurance agent (SAA)


B. Service level manager (SLM)
C. Collection Manager (CM)
D. Service level agreement (SLA)

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 11
What Cisco router configuration component does an implementer use to create a floating static route?

A. Primary interface
B. Administrative distance
C. Loopback
D. Description

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 12
Examine the following protocols, which two are used for IP Security?

A. Generic Routing Encapsulation (GRE) and Internetwork Packet Exchange (IPX)(EIGRP)


B. Border Gateway Protocol (BGP) and Enhanced Interior Gateway Routing Protocol
C. Authentication Header (AH) and Encapsulating Security Payload (ESP)
D. Virtual Private Dial-Up Network (VPDN) and GRE

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 13
What is the virtual information store used within SNMP called?

A. MIB
B. RMON
C. Protocol data unit (PDU)
D. Abstract Syntax Notation One (ASN.1)

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 14
Define some of the activities, tools, and techniques used in today’s network-design process.(Choose three.)

A. Analyzing network traffic


B. Simulation of network traffic
C. Network auditing
D. Filtering incoming network traffic

Correct Answer: ACD


Section: (none)
Explanation

Explanation/Reference:

QUESTION 15
Observe the following options, what is the hierarchy for IPv6 aggregatable addresses?

A. Global, site, loop


B. Multicast, anycast, unicast
C. Public, site, interface
D. Internet, site, interface

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 16
How to reduce the size of a routing table?

A. NAT
B. Summarization
C. Static routes
D. VLAN

Correct Answer: BC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 17
What statement about EVN is true?(which option about EVN is true?)

A. support RIP
B. support OSPFV3
C. required CDP
D. support many 32 network for devices

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 18
What to do at Microsoft DHCP server for AP to allocate the controller?

A. IP DHPC pool name


B. Use the Suboption 0xe1
C. Other option
D.

Correct Answer:
Section: (none)
Explanation

Explanation/Reference:
QUESTION 19
What DNS parameter is used by a access point to determine the IP address of a WLC:

A. DNS A record
B. DHCP option 43
C. capwap-controller
D. lwapp-controller

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 20
Which option characterizes normal traffic flow and performance of a network?

A. Utilization
B. Baseline
C. Availability
D. Bandwidth

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 21
Company ABC has intermittent problems registering remote-site IP phones over the WAN with Cisco Unified CallManager at headquartes. The
Company hires a network consultant to help implement QoS in its network. Which technique should the consultant use to identify traffic and
applications that traverse the network?

A. NBAR
B. RSVP
C. Policing
D. Priority queuing
Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 22
In the traditional hierarchical LAN design,Which two statement about the distribution layer are true? (Choose two.)

A. It typically is connected directly to the internet It provides users direct access to the network
B. It uses Layer 2 switching only
C. It aggregates data from the access layer
D. Policy is implemented at this layer

Correct Answer: CD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 23
What is the MOST important in access layer? Choose 2

A. Port secutity
B. Spaning tree
C. Other
D. Other

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 24
What are two important aspects to Consider when looking at backup circuit options for a branch location ? (Choose 2 option)
A. Type of dynamic routing protocol
B. Backup MPLS Connection
C. Internet service provider diversity
D. Local exchange carrier diversity
E. Type of core switch

Correct Answer: CD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 25
A network engineer must collect application-level information of deep attack ?

A. NBAR
B. CiscoWorks
C. SNMP collector
D. NetFlow collector
E. Syslog

Correct Answer: AD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 26
A network architect working for a large financial institution is designing a vpn solution that must include encryption. which vpn type meet this
requirment?

A. Get VPN
B. L2 VPN
C. mpls VPN
D. L3 VPN
Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 27
Which two design decision can improve network resiliency? (you have to chose 2 answers)

A. Implement redundant link


B. Increase data plane bandwidth
C. Implement serial device connection
D. Reduce network size
E. Implement redundant topology

Correct Answer: AE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 28
In which phase of cisco design life cycle the validation of network infrastructure happened?

A. Assessment in plan
B. Deployment in build
C. Validation in build
D. Optimization in operat

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 29
What is the optimal device and location to fulfill these requirements?
Provide early indication of reconnaissance and scanning activities with blocking capabilities require fewer interfaces to inspect traffic to the DMZ and
internal network.

A. IPS inline outside of the firewall


B. IPS inline inside the firewall
C. Cisco IOS IPS on the border router
D. passive IPS connected to a SPAN port outside of the firewall
E. passive IPS connected to a SPAN port inside the firewall

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 30
A network engineer has finished designing and implementing a new network. What two protocols would they use to gain insight into the network and
determine the components that require optimization? (Choose two.)

A. CDP
B. NetFlow
C. ICMP Echo
D. NMAP
E. SNMP

Correct Answer: BE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 31
Which two link state routing protocols support IPv6 routing? (Choose two.)

A. BGP4+
B. OSPF
C. RIPng
D. EIGRP
E. IS-IS

Correct Answer: BE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 32
When designing using the Cisco Enterprise Architecture, in which Enterprise Campus layer does the Remote Access and VPN module establish its
connection?

A. Building Access
B. Campus Core
C. Enterprise Branch
D. Enterprise Data Center

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 33
Where in the Cisco Enterprise Architecture model does network management reside?

A. Enterprise data center module


B. Enterprise campus module
C. Enterprise edge module
D. Service Provider edge module
E. Service Provider data center module

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:

QUESTION 34
When designing the threat detection and mitigation portion for the enterprise data center network, which of the following would be the most appropriate
solution to consider?

A. 802.1x
B. ACL in the Core layer
C. Cisco Security MARS
D. Cisco Firewall Services Module

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 35
An application uses broadcast traffic to send data to IPv4 hosts. How can the application communicate using IPv6?

A. Anycast
B. Unicast
C. Broadcast
D. Multicast

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 36
Which three of these are layers in the Cisco SONA Architecture? (Choose three.)

A. Applications
B. Physical Infrastructure
C. Presentation
D. Integrated Transport
E. Core Common Services
F. Networked Infrastructure

Correct Answer: ABF


Section: (none)
Explanation

Explanation/Reference:

QUESTION 37
Which two are types of network virtualization? (Choose two.)

A. VSS: Virtual Switching System


B. VRF: Virtual Routing and Forwarding
C. VCI: Virtual Channel Identifier
D. VLSM: Variable Length Subnet Masking
E. VM: Virtual Machine
F. VMP: Virtual Memory Pool

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

S-ar putea să vă placă și