Documente Academic
Documente Profesional
Documente Cultură
Number: 000-000
Passing Score: 800
Time Limit: 120 min
File Version: 1.0
66
QUESTION 1
What is the advantage of STP?
A. Load balancing
B. High availability
C. Redundant link utilization
D.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 2
What are two advantages of a modular design (Choose two)?
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 3
Which option are benefits of the modular approach to network design?
A. higher availability
B. repeatable scalability
C. increased security
D. improved resiliency
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 4
Which two Cisco products supports virtual contexts? (Choose two.)
A. ASR 1000
B. ASA
C. Cisco Nexus 7000 Series Switches
D.
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 5
In VRRP /FHRP/ if you want the master switch to take over and continue its master role after coming up from failure which option should be used
A. Interface tracking
B. Priority
C. Preemption
D.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 6
What 4 benefits are gained by following the cisco PPDIOO life cycle model?
A. faster ROI
B. improved business agility
C. increased network availability
D. faster access to applications and services
E. lower total cost of network ownership
F. better implementation team engagement
Explanation/Reference:
QUESTION 7
Which two high -level design components are included in Cisco Unified Wireless Network? (Choose two)
A. Local mode
B. Cisco FlexConnect
C. Deterministic
D. Dynamic
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 8
Designing of WAN links, with latency which method should be used to efficiently utilizethe link?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 9
While designing a highly resilient infrastructure, which layer is typically a single point of failure?
A. Internet
B. Distribution
C. Access
D. WAN
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 10
What functional components should be placed in a DMZ network that has internet connection?
A. DDOS
B. ASA
C. Web load balancer
D. Web server
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 11
When designing a high availability network, which option can be classified as a fault domain?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 12
What is the benefit of distribution layer (mentioned 3 Tier Hierarchical & Campus in Q too I think)?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 13
Which two benefits are realized by establishing virtualization in a campus network? (Choose two)
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 14
Which cisco tool is used for network accounting, monitoring and routing?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 15
When integrating services with Cisco ACI Service Graphs, which tool can be used for integrated Configuration management?
A. IOS
B. REST API
C. APIC CLI
D. HTML
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 16
At which layer of the network should you perform traffic filtering and QoS Classification?
A. Session
B. Distribution
C. Application
D. Core
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 17
An engineer is designing a private WAN infrastructure to support an organization and must support quality of service and multicast functionality to the
remote sites. Which WAN technology supports this requirement?
A. DMVPN
B. MPLS
C. IPsec VPN
D. SSL VPN
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 18
What are two industry drivers that promote network virtualization? (Choose two)
A. traffic isolation
B. device reduction
C. multi-vendor support
D. application stability
E. reduced complexity
Correct Answer: AE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 19
To which category do the following network virtualization components belong? [GRE, VLAN, Vrf-lite, MPLS, ACL]
A. Path isolation
B. Access control
C. Policy enforcement
D. Network service virtualization
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 20
Which subnet mask should you use on a point-to-point links to avoid wasting IP addresses?
A. 255.255.255.0
B. 255.255.255.252
C. 255.255.255.250
D. 255.255.255.248
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 21
Which technology combines two Nexus switches to form a single logical switch, while maintaining control plane separation between the two devices,
and requiring independent management of each device?
A. vPC
B. VSS
C. MEC
D. Cisco stackwise
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 22
A company of 200 users want to design a cost-effective network architecture without losing resiliency and high availability characteristics. Which
method should be used?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 23
From which DNS record can a Cisco wireless AP, running Cisco WLC version 6.0 or later, retrieve bootstrap information?
A. cisco-capwap-controller
B. the DNS A record of the controller hostname
C. the DHCP Option 43 name
D. cisco-lwapp-controller
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 24
In an EAP-enable WLAN, which component sends the EAP Request?
A. WLAN controller
B. Access point
C. Wireless client
D. ACS server
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 25
A company with many remote sites wants to design IPT solution, with call processing located at HQ. Which IPT deployment model should be used?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 26
How to make a network topology more resilient? (Shown a redundant net arch with only a single ISP connection)
A. Redundant ISP
B.
C.
D.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 27
When designing IP addressing schemes, which options are two benefits of implementing hierarchical addressing? (Chose two)
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 28
The Company hires a network consultant to help implement QoS in its network. Which technique should the consultant use to identify traffic and
PORTS used by applications?
A. NBAR
B. CDP
C. Netflow
D. Ciscoworks
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 29
Which option is an example of a fixed two-level hierarchical routing protocol?
A. OSPF
B. EIGRP
C. OSPF
D. RIPv2
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 30
What is the benefit of using a triangle topology on the core layer?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 31
Which type of router connects to two different OSPF areas?
A. Area border
B. Autonomous system boundary
C. Backbone
D. Internal
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 32
Which source of route has better AD than BGP(20)?
A. OSPF – 110
B. iBGP – 200
C. RIPv2 -120
D. Connected Interface-0
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 33
Where should be VPN connection be terminated?
A. DMZ
B. Internet
C. Remote Access
D.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 34
An engineer is planning branch WAN links to support unified communications. Which DSCP value must be assigned to voice traffic?
A. EF
B. AF41
C. COS4
D. BE
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 35
During IP addressing design, which factor should be considered?
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 36
Which command should you use to get [the most] information from a device?
A. Show running
B. Show cdp
C. Show tech-support
D.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 37
Which format reflects that of the IPv6 global unicast address?
A. Global prefix (16 bits), subnet ID (16 bits), interface ID (64 bits)
B. Global prefix (48 bits), subnet ID (16 bits), interface ID (64 bits)
C. Global prefix (16 bits), subnet ID (64 bits), interface ID (48 bits)
D. Global prefix (16 bits), subnet ID (16 bits), interface ID (64 bits)
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 38
Which two techniques can you use to reduce the size of a network routing table? (Choose two)
A. Implement VPN
B. Implement NAT
C. Route Summarization
D. Configure static routing
E. Utilize a default route
Correct Answer: CE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 39
You want to apply QoS to an Access Point which is connected to a switch, which configuration should be used?
A. 802.1q trunk
B.
C.
D.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 40
An engineer wants to find all of the objects of a certain type available in the MIB. Which kind of query must be performed?
A. object-level
B. tree-level
C. class-level
D. subtree-level
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 41
You have a server hosted on the server farm module. The server is configured to listen to the TCP port 140. What NAT is best for this?
A. STATIC
B. Dynamic
C. Overload
D.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 42
Critical for availability remote office has a complete redundant link to WAN. What can improve the availability of a remote office?
A. install dual power supply
B. Use different line cards
C. Increase the speed of WAN links from 100 Mb / s to 1 Gbps
D. Replace the wired connection with the optics
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 43
Which two of the following are benefits of using a modular approach to network design? (choose two)
A. Improves flexibility
B. Facilitates implementation
C. Lowers implementation costs
D. Improves customer participation in the design process
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 44
How does the use of multiple areas in a link state routing protocol improve network scalability?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 45
While designing a remote access VPN, a customer has requested three different levels of access to be granted for administrator, employees, and
partners. Which three access policies must be configured for the three groups? (choose three)
A. Partners are centrally authenticated with limited network access controller with ACLs
B. Administrative users have local credentials with full access to the internal infrastructure
C. Administrative users are centrally authenticated with full access to the internal infrastructure
D. Employees are centrally authenticated with limited network access controlled with ACLs
E. Employees are centrally authenticated with full access to the internal infrastructure
F. Partners are centrally authenticated with full access to the internal infrastructure
Explanation/Reference:
QUESTION 46
Which option can hinder efficient IP address allocation?
A. VLSM
B. Classless routing protocols
C. Routing auto-summary
D. Classful routing protocols
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 47
One step in characterizing an existing network involves obtaining information such as network performance, availability, utilization and response times
Which activity generates this information?
A. Logical network mapping
B. Network health check
C. Address naming analysis
D. Wiring and media assessment
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 48
For which type of topology are modern fast-converging routing protocols designed?
A. Hub-and-spoke
B. Full mesh
C. Hierarchical
D. star
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 49
Which two major campus design models does the Cisco Unified Wireless Network support? (Choose two)
A. Local mode
B. Cisco FlexConnect
C. Deterministic
D. Dynamic
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 50
A diagram and then a configuration of access list interface shown, then which device is QoS trust boundary
A. IP Phone
B. Access switch
C. Core
D. Distribution
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 51
What is the advantage of multiple area LSP design? (Choose two)
A. Bandwidth optimization
B. Route summarization
C. Isolation of routing issues
D.
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 52
Considering efficient utilization of IP Addressing, what mask you will use in a point to point connection?
A. 255.255.252.0
B. 255.255.255.252
C. 255.255.255.254
D.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 53
You need to modify the design of an existing network of an organization by adding something new. What do you need first from the organization?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 54
What happens if an APIC is removed fron topology?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 55
What type of files are most often used by APIs? (choose 2)
A. html
B. json
C. txt
D. xml
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 56
What benefits do hierarchical IP addressing provide for an organization?
A. modular convergence
B. smaller routing tables
C. optimized address plan
D.
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 57
Which are best-practices for ospf design? (choose 2):
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 58
Which subnet provides for 6 /25 subnets?
A. /19
B. /23
C. /16
D. /22
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 59
Which of the following are technology drivers for virtualization?
A. path isolation
B. multivendor support
C. decreasing the number of physical devices
D.
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 60
A.
B.
C.
D.
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
QUESTION 61
When designing IP addressing schemes, which options are two benefits of implementing hierarchical addressing? (Choose two)
Correct Answer: CE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 62
Which option can hinder efficient IP address allocation?
A. VLSM
B. classless routing protocols
C. classful routing protocols
D. routing auto-summary
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 63
While preparing an overview of Internet facing DMZ for a customer, a consultant must identify the functionality to be placed in the DMZ. Which two
functionalities are best suited for use in a DMZ? (Choose two.)
Correct Answer: CE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 64
An engineer is designing a Cisco Unfed Communications deployment for a customer with small sites across the country. Which deployment model
keeps the call control at the data center of the primary site?
A. campus deployments
B. distributed deployment
C. cloud hybrid service deployment
D. multisite deployment model with centralized call processing
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 65
While designing the LAN core to distribution infrastructure for optimum convergence, the engineer decides to use a topology using triangles. Which
benefit to the organization is true?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 66
For which type of topology are modern fast-converging routing protocols designed?
A. star
B. hierarchical
C. full mesh
D. hub-and. Spoke
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
101
QUESTION 1
Which advantage to using route summarization is true?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 2
An organization is deciding what routing protocol to use throughout their network. What must be considered if routing is to be performed at the access
layer?
A. reduced scalability of the network when introducing a large number of switch blocks into the routing table
B. centralized management of access control lists at the distribution layer
C. reliability when implementing routing over spanning-tree at the access layer
D. performance differences between core, distribution and access layer equipment
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 3
What are two reasons discontinuous IPv4 networks hinder scalability? (Choose two.)
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 4
What is the optimal device and location to fulfill these requirements? • provide early indication of reconnaissance and scanning activities with blocking
capabilities • require fewer interfaces to inspect traffic to the DMZ and internal network
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 5
which network element must be summarized in a multiarea OSPF deployment?
A. IP address
B. communities
C. number of routes
D. link state advertisements
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 6
Which VPN tunneling technology supports IP multicast?
A. DMVPN spoke-to-spoke
B. Cisco Easy VPN
C. IPsec direct encapsulation spoke-to-spoke
D. IPsec direct encapsulation hub-and-spoke
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 7
which option contains the information required to learn the layout of network devices and the links the connect them?
A. network baseline
B. wiring and media details
C. architectural and environmental constraints
D. network topology map
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 8
An engineer wants to ensure that the Spanning Tree topology appears free while redundant switches are present. Which Layer2 technology must be
used?
A. VPC
B. PaGP
C. LACP
D. OTV
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 9
Which statement about modular network design is true?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 10
which network size can provide six /25 subnets while wasting the smallest number of ip addresses
A. /22
B. /19
C. /23
D. /16
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 11
A network engineer is tasked with summarizing the routes to a remote site. What is the optional route statement to connect to the 192.168.101.0/24
and 192.168.102.0/24 networks across the corporate WAN?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 12
Which statement about using STP in a redundant-link scenario is true?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 13
A data center is reaching its power and cooling capacity. What two virtualization technologies can address the problem by directly reducing the number
of physical devices? (Choose two.)
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 14
Which option can use deep-packet examination to determine the specific nature of an attack?
A. stateful firewall
B. NetFlow collector
C. syslog server
D. network IPS
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 15
In which phase of Cisco Design Lifecycle would you identify shortfalls in the network operation teams ability to support new technologies being
introduced?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 16
which two methods are used to reduced the mesh links required between ibgp peers in the same AS? (choose two)
A. route reflectors
B. local reference
C. confederations
D. community
E. atomic aggregate
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 17
Which mode is used to exclusively look for unauthorized access points?
A. monitor mode
B. sniffer mode
C. rogue detector mode
D. local mode
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 18
Which one of these statements is an example of how trust and identity management solutions should be deployed in the enterprise campus network?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 19
WAN backup over the Internet is often used to provide primary connection redundancy. Which is the most important consideration when passing
corporate traffic over the public Internet?
A. security
B. static versus dynamic routing
C. bandwidth
D. QoS
E. latency
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 20
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
QUESTION 21
Characterizing an existing network requires gathering as much information about the network as possible. Which of these choices describes the
preferred order for the information-gathering process?
A. site and network audits, traffic analysis, existing documentation and organizational input
B. existing documentation and organizational input, site and network audits, traffic analysis
C. traffic analysis, existing documentation and organizational input, site and network audits
D. site and network audits, existing documentation and organizational input, traffic analysis
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 22
Which two statements correctly identify the layers of the Enterprise Campus module?
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 23
You need to connect to a remote branch office via an Internet connection. The remote office does not use Cisco equipment. This connection must be
secure and must support OSPF. Which of the following can be used to transport data to the branch office?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 24
Which voice codec should you use in order to provide toll quality calls?
A. G.711
B. G.718
C. G.722
D. G.729
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 25
When evaluating network designs, what indicator demonstrates that the modular approach was followed?
A. ability to scale
B. follows best practices
C. redundant connectivity
D. easy to deploy
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 26
A network engineer is following the Cisco enterprise architecture model. To which network layer would a branch office connect to using a private
WAN?
A. Enterprise Campus
B. Enterprise Edge
C. SP Edge Premise
D. Remote Module
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 27
A network engineer is following the three tiered Network Hierarchical Model. At which tier is route summarization implemented?
A. core
B. distribution
C. backbone
D. access
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 28
In which network location should an external DNS server be placed?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 29
A company has dark fiber between headquarters and its data center. It is presently configured as a 10GbE connection. Network utilization shows high
utilization on the connection. What technology can be implemented to increase capacity without acquiring another circuit?
A. MPLS
B. DWDM
C. VPLS
D. DMVPN
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 30
When designing changes to an existing network, which two options are documented to understand environmental constraints? (Choose two.)
A. utilization of network resources
B. heating and air conditioning
C. location of existing documentation
D. floor and rack space availability
E. host naming conventions
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 31
What are two benefits of the bottom-up design approach? (Choose two.)
Correct Answer: DE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 32
How many switches can be combined into a single network element using VSS?
A. 6
B. 8
C. 2
D. 4
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 33
Based on best practices, which QoS profile should be configured on the WLAN of the WLC for wireless VoIP communications?
A. Silver
B. Bronze
C. Gold
D. Platinum
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 34
Which statement about using STP in a redundant-link scenario is true?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 35
Which type of router connects to two different OSPF areas?
A. Area border
B. Autonomous system boundary
C. Backbone
D. Internal
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 36
Which option is an example of a fixed two-level hierarchical routing protocol?
A. OSPF
B. RIPv2
C. EIGRP
D. static routes
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 37
While designing a remote access VPN, a customer has requested three different levels of access to be granted for administrators, employees, and
partners. Which three access policies must be configured for the three groups? (Choose three.)
A. Partners are centrally authenticated with limited network access controlled with ACLs.
B. Administrative users have local credentials with full access to the internal infrastructure.
C. Administrative users are centrally authenticated with full access to the internal infrastructure
D. Employees are centrally authenticated with limited network access controlled with ACLs
E. Employees are centrally authenticated with full access to the internal infrastructure
F. Partners are centrally authenticated with full access to the internal infrastructure
Explanation/Reference:
QUESTION 38
Which two techniques can you use to reduce the size of a network routing table? (Choose two.)
A. Implement VPN
B. Route summarization
C. Implement NAT
D. Configure static routing
E. Utilize a default route
Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 39
Traditionally, the DMZ exists between which two locations? (Choose two.)
A. Building distribution
B. Building access
C. Corporate network
D. Metro Access
E. Internet
Correct Answer: CE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 40
An engineer wants to ensure that the Spanning Tree topology appears free while redundant switches are present. Which Layer2 technology must be
used?
A. VPC
B. PaGP
C. LACP
D. OTV
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 41
An engineer is planning branch WAN links to support unified communications. Which DSCP value must be assigned to voice traffic?
A. EF
B. AF41
C. COS4
D. BE
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 42
Which option best describes the high-level design document?
A. It includes specific information such as hardware models, software version, IP addressing, and routing protocols.
B. It contains the test plan to certify that the customer's network is ready for use.
C. It contains the steps needed to install and configure the network equipment and the steps that verify basic network operation.
D. It includes business and technical requirements and the proposed network architecture.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 43
Which value must you configure on a Microsoft DHCP server so that Cisco wireless APs can locate the wireless controllers?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 44
Which scenario is the best example of a single-homed connected infrastructure?
A. A data center that is connected to one service provider over an MPLS circuit and another service provider over an Ethernet connection.
B. A remote office that is connected to the WAN using a DSL provider and a cable provider.
C. A small office that uses a DSL link to connect to the WAN.
D. A corporate office that uses two separate routers to connect to two different service providers.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 45
Which address is the broadcast address of subnet 120.20.78.8/30?
A. 120.20.78.12
B. 120.20.78.1
C. 120.20.78.11
D. 120.20.78.8
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 46
Which two major campus design models does the Cisco Unified Wireless Network support? (Choose two.)
A. Cisco FlexConnect
B. N+N+1
C. Deterministic
D. Local Mode
E. Dynamic
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 47
Which two protocols are classful routing protocols? (Choose two.)
A. RIPv2
B. RIPv1
C. IGRP
D. OSPF
E. BGP
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 48
From which DNS record can a Cisco wireless AP, running Cisco WLC version 6.0 or later, retrieve bootstrap information?
A. cisco-capwap-controller
B. the DNS A record of the controller hostname
C. the DHCP Option 43 name
D. cisco-lwapp-controller
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 49
When integrating services with Cisco ACI Service Graphs, which tool can be used for integrated configuration management?
A. IOS
B. REST API
C. APIC CLI
D. HTML
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 50
Which VPN tunneling technology supports IP multicast?
A. DMVPN spoke-to-spoke
B. Cisco Easy VPN
C. IPsec direct encapsulation spoke-to-spoke
D. IPsec direct encapsulation hub-and-spoke
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 51
Which format reflects that of the IPv6 global unicast address?
A. global prefix (16 bits), subnet ID (16 bits), interface ID (64 bits)
B. global prefix (48 bits), subnet ID (16 bits), interface ID (64 bits)
C. global prefix (16 bits), subnet ID (64 bits), interface ID (48 bits)
D. global prefix (64 bits), subnet ID (48 bits), interface ID (16 bits)
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 52
Which layer in the Cisco Enterprise Architecture model is highly available, has fast convergence, and should avoid packet manipulation?
A. campus distribution
B. enterprise data center
C. enterprise edge
D. campus access
E. campus core
F. remote access VPN
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
QUESTION 53
In the traditional hierarchical LAN design, which two statements about the distribution layer are true? (Choose two.)
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 54
An engineer is designing a network that is divided into multiple areas and supports a mixed vendor routing environment. Which interior gateway
protocol must be selected?
A. EIGRP
B. OSPF
C. BGP
D. RIPv2
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 55
Which two benefits are realized by establishing virtualization in a campus network? (Choose two.)
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 56
Which option is one of the methods that Cisco routers and switches can use to share information between directly connected devices on a regular
basis?
A. NetFlow
B. ARP
C. NHRP
D. CDP
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 57
What information should be utilized to identify network applications that are running on an existing network infrastructure?
A. customer information
B. existing documentation
C. traffic analysis
D. external feedback
E. user feedback
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 58
An engineer is designing a solution for multiple multihomed to establish router between one another which design must be?
A. OSPF
B. iBGP
C. eBGP
D. EIGRP
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 59
Which application can provide AAA services for Cisco Devices?
A. IP SLA
B. Cisco TrustSec
C. TACACS+
D. Cisco FirePOWER
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 60
Consider the reservation of IP Addressing what mask you will use in a point to point connection between two Buildings?
A. 255.255.252.0
B. 255.255.255.252
C. 255.255.255.254
D.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 61
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
Top Down : 1) Gives the big picture to the organizations and designer
2) Incorporates organizational requirements
Bottom-up : 1) Enables a quick response to a design request
2) Facilitates designs based on previous experience
QUESTION 62
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
MST, PVST, RapidPVST
QUESTION 63
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
Backbonefast, Bpdu Guard,portfast,bpdu filter,loop guard,uplinkfast,rootguard.
QUESTION 64
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
Access control, path isolation, sona, service edge.
QUESTION 65
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
Layer 2 switching campus design: 1) uses fhrp for high availability 2) uses VSS to provide redundancy 3) only one redundant connection between the
access switch and the distribution switch can be active.
Layer3 switching campus design :
1)Route filtering is configured on interface toward the access layer
2) inter-vlan communications are routed in the distribution layer.
QUESTION 66
Which three describe challenges that are faced when deploying an environment for teleworkers? (Choose three.)
Explanation/Reference:
QUESTION 67
Which statement is true concerning the data center distribution (aggregation) layer design?
A. With Layer 3 at the aggregation layer, the physical loops in the topology must still be managed by STP.
B. The boundary between Layer 2 and Layer 3 must reside in the multilayer switches, independent of any other devices.
C. A mix of both Layer 2 and Layer 3 access is the most optimal.
D. In a small data center, the aggregation layer can connect directly to the campus core, exchanging IP routes and MAC address tables.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 68
Which subnet is the best choice for a point-to-point link?
A. 10.120.10.0/29
B. 10.120.10.0/28
C. 10.120.10.0/30
D. 10.120.10.1/32
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 69
An engineer must create a logical, isolated network for regulatory compliance. Which option is a complex access control network virtualization
scenario?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 70
which feature must be configured on a switch ports that connects to a Cisco wireless access point when QOS is required?
A. Auto negotiation
B. Cisco discovery protocol
C. Dot1q trunk
D. Portfast
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 71
which option do you use to provide dynamic utilization of WAN links based on latency?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 72
high availability is required for a critical remote office to an enterprise. The office has already deployed two redundant wan connections. Which action
can be done to the edge router to improve the availability of the remote office?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 73
which two types of files are the most common use in APIs for programmability?(choose two)
A. JSON
B. PERL
C. BASH
D. HTML
E. XML
Correct Answer: AE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 74
A startup company wants to deploy the Cisco ip telephony solution. Which two actions are appropriate design approaches? (choose two)
A. connect Cisco unified communications manager in the eternet switches of data center module
B. connect sip trunks for pstn connectivity to Ethernet switches of campus core layer
C. connect Cisco unified communication manager to the Ethernet switches of the campus core layer
D. connect ip phones to the Ethernet switch of data center module
E. connect user ip phones to the Ethernet switches of access layer
Correct Answer: CE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 75
a large corporation wants to ensure high availability for its e-commerce web sites. Which routing protocol must be used when connecting to multiple
internet services providers?
A. static routes
B. EIGRP
C. BGP
D. OSPF
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 76
which two options should be considered when desiging an ospf network?
Correct Answer: AE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 77
Which Cisco technology can connect more than two switches so that they behave as one switch?
A. trunking
B. EtherChannel
C. StackWise
D. VSS
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 78
which designing a high availability network.which option can be classified as fault domain?
Explanation/Reference:
QUESTION 79
which two considerations are important when designing an ip address plan?
Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 80
An engineer is designing a high availability branch network so that redundancy protocols must support automatic load balancing which protocol
satisfies this requirement?
A. HSRP
B. MLBP
C. VRPP
D. GLBP
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 81
Cisco unified wireless networks supports two campus design models centralized or local mode and Cisco flexconnect. Which statement about the local
mode design model is true?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 82
which two options best describe the top-down design approach?(choose two)
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 83
A small business owner has 200 staff members that occupy two floors of a building. The ownerwants to reduce the network infrastructure costs without
losing two much network resiliency andscalability. Which option meets these requirements ?
A. combine access and distribution layers into one layer and keep all others layers’
B. exclude and distribution layer switches and connect everything to redundant core switches
C. combine access and core layers in to one layer and keeping all the other layers
D. combine core and distribution layers into one layer and keep all the other layers
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 84
What kind of servers you should place in DMZ?
A. WWW
B. FTP
C. DHCP
D. TACACS+
E. NFP
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 85
which vpn technology support ip multicast?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 86
which advantage of using spanning tree protocol is true?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 87
which two options are benefits of a modular network design? ( choose two)
A. higher scalability
B. ease of troubleshooting
C. endto end security
D. intelligent network services
E. improved fault isolation
Correct Answer: AE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 88
Which statement about VSS is true?
Explanation/Reference:
QUESTION 89
An engineer is designing a private WAN infrastructure to support an organization and must support quality of service and multicast functionality to the
remote sites. Which technology supports this requirement?
A. MPLS
B. DMVPN
C. SSL VPN
D. IPSEC VPN
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 90
which sip feature allows an access port to bypass the learning and listening states?
A. root guard
B. loop guard
C. portfast
D. bpdu guard
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 91
Which two design decisions can improve network resiliency? (Choose two.)
A. implement redundant topology
B. implement serial device connections
C. increase data plane bandwidth
D. implement redundant links
E. reduce network size
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 92
which two processes are included in the build phase of the Cisco design lifecycle?(choose two)
A. validation
B. assessment
C. analysis
D. deployment
E. design
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 93
which two methods are used to reduce the mesh links required between ibgp peers in the sameAS?(choose two)
A. local preference
B. route reflectors
C. confederations
D. community
E. atomic aggregate
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 94
Refer to the exhibit ? which result is true if a client computers connected through the interfacenamed internal and attempts to connect to an
operational tcp/443 based website?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 95
in a new dmvpn deployment phase 1 completes successfully however phase 2 experience issues.Which troubleshooting step is valid in this situation?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 96
traditionally the dmz exists between which two locations?(choose two)
A. corporate network
B. building access
C. building distribution
D. metro access
E. internet
Correct Answer: AE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 97
which option does a modular design approach provide?
A. efficiency
B. manageability
C. fault isolation
D. performance
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 98
In an EAP-enabled WLAN, which component sends the EAP identity request?
A. access point
B. wireless client
C. wlan controller
D. ACS server
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 99
at which layer of the network should you perform traffic filtering and QOS classification?
A. core
B. application
C. Distribution
D. session
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 100
Which routing protocol is the most scalable?
A. RIP
B. IGRP
C. RIPV2
D. OSPF
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 101
which statement about static routes is true?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
misc
QUESTION 1
Which two of these are functions of an access point in a Split MAC Network Architecture? (Choose two.)
A. EAP Authentication
B. MAC layer encryption or decryption
C. 802.1Q encapsulation
D. Process probe response
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 2
Which two solutions are parts of the Cisco Security Management Suite? (Choose two.)
A. ASA
B. Cisco Security Agent
C. NAC Appliance
D. csm
E. pix
F. Cisco Security MARS
Correct Answer: DF
Section: (none)
Explanation
Explanation/Reference:
QUESTION 3
For the following items, which is an SP Edge module in the Enterprise Composite Network model?
A. Core layer
B. Edge distribution
C. Public Switched Telephone Network (PSTN) service
D. Server farm
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 4
Observe the following options, in which section of the network document does Cisco recommend a discussion of performance, scalability, capacity,
security, and traffic needs?
A. Design summary
B. Design solution
C. Executive summary
D. Design requirements
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 5
Which two encryption transforms will be used by both ESP and AH for authentication?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 6
For the following options, which emerging WAN technology uses DSL coding and digital modulation techniques with Ethernet?
A. Cable
B. Wireless
C. SMDS
D. Long-Reach Ethernet (LRE)
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
QUESTION 7
What is SLC?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 8
What does ODR stand for?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 9
A common response to an attack by this device can be either to send an alert or to take corrective action. What is this device?
A. Vulnerability assessment
B. Firewall
C. Intrusion-detection system (IDS)
D. Router
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 10
For the following items, which component of the CiscoWorks product allows a network administrator to define and manage service levels?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 11
What Cisco router configuration component does an implementer use to create a floating static route?
A. Primary interface
B. Administrative distance
C. Loopback
D. Description
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 12
Examine the following protocols, which two are used for IP Security?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 13
What is the virtual information store used within SNMP called?
A. MIB
B. RMON
C. Protocol data unit (PDU)
D. Abstract Syntax Notation One (ASN.1)
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 14
Define some of the activities, tools, and techniques used in today’s network-design process.(Choose three.)
Explanation/Reference:
QUESTION 15
Observe the following options, what is the hierarchy for IPv6 aggregatable addresses?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 16
How to reduce the size of a routing table?
A. NAT
B. Summarization
C. Static routes
D. VLAN
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 17
What statement about EVN is true?(which option about EVN is true?)
A. support RIP
B. support OSPFV3
C. required CDP
D. support many 32 network for devices
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 18
What to do at Microsoft DHCP server for AP to allocate the controller?
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
QUESTION 19
What DNS parameter is used by a access point to determine the IP address of a WLC:
A. DNS A record
B. DHCP option 43
C. capwap-controller
D. lwapp-controller
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 20
Which option characterizes normal traffic flow and performance of a network?
A. Utilization
B. Baseline
C. Availability
D. Bandwidth
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 21
Company ABC has intermittent problems registering remote-site IP phones over the WAN with Cisco Unified CallManager at headquartes. The
Company hires a network consultant to help implement QoS in its network. Which technique should the consultant use to identify traffic and
applications that traverse the network?
A. NBAR
B. RSVP
C. Policing
D. Priority queuing
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 22
In the traditional hierarchical LAN design,Which two statement about the distribution layer are true? (Choose two.)
A. It typically is connected directly to the internet It provides users direct access to the network
B. It uses Layer 2 switching only
C. It aggregates data from the access layer
D. Policy is implemented at this layer
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 23
What is the MOST important in access layer? Choose 2
A. Port secutity
B. Spaning tree
C. Other
D. Other
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 24
What are two important aspects to Consider when looking at backup circuit options for a branch location ? (Choose 2 option)
A. Type of dynamic routing protocol
B. Backup MPLS Connection
C. Internet service provider diversity
D. Local exchange carrier diversity
E. Type of core switch
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 25
A network engineer must collect application-level information of deep attack ?
A. NBAR
B. CiscoWorks
C. SNMP collector
D. NetFlow collector
E. Syslog
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 26
A network architect working for a large financial institution is designing a vpn solution that must include encryption. which vpn type meet this
requirment?
A. Get VPN
B. L2 VPN
C. mpls VPN
D. L3 VPN
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 27
Which two design decision can improve network resiliency? (you have to chose 2 answers)
Correct Answer: AE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 28
In which phase of cisco design life cycle the validation of network infrastructure happened?
A. Assessment in plan
B. Deployment in build
C. Validation in build
D. Optimization in operat
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 29
What is the optimal device and location to fulfill these requirements?
Provide early indication of reconnaissance and scanning activities with blocking capabilities require fewer interfaces to inspect traffic to the DMZ and
internal network.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 30
A network engineer has finished designing and implementing a new network. What two protocols would they use to gain insight into the network and
determine the components that require optimization? (Choose two.)
A. CDP
B. NetFlow
C. ICMP Echo
D. NMAP
E. SNMP
Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 31
Which two link state routing protocols support IPv6 routing? (Choose two.)
A. BGP4+
B. OSPF
C. RIPng
D. EIGRP
E. IS-IS
Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 32
When designing using the Cisco Enterprise Architecture, in which Enterprise Campus layer does the Remote Access and VPN module establish its
connection?
A. Building Access
B. Campus Core
C. Enterprise Branch
D. Enterprise Data Center
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 33
Where in the Cisco Enterprise Architecture model does network management reside?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 34
When designing the threat detection and mitigation portion for the enterprise data center network, which of the following would be the most appropriate
solution to consider?
A. 802.1x
B. ACL in the Core layer
C. Cisco Security MARS
D. Cisco Firewall Services Module
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 35
An application uses broadcast traffic to send data to IPv4 hosts. How can the application communicate using IPv6?
A. Anycast
B. Unicast
C. Broadcast
D. Multicast
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 36
Which three of these are layers in the Cisco SONA Architecture? (Choose three.)
A. Applications
B. Physical Infrastructure
C. Presentation
D. Integrated Transport
E. Core Common Services
F. Networked Infrastructure
Explanation/Reference:
QUESTION 37
Which two are types of network virtualization? (Choose two.)
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference: