Q1. Which design is the recommended geometric design for routed topologies?
A. linear
B. triangular
C. rectangular
D. circular
Answer: B
Q2. Refer to the exhibit.
Which three modules would typically utilize public IPv4 addressing? (Choose three.)
A. Access
B. Distribution
C. Core
D. Data Center
E. E-Commerce
F. Internet Connectivity
G. Remote Access/VPN
H. WAN/MAN
I. Branch
J. Branch Data Center
Answer: E,F,G
Q3. What is the acceptable amount of one-way network delay for voice and video applications?
A. 300 bytes
B. 1 sec C. 150 ms
D. 500 ms
Answer: C
Explanation:
Delay Components in VoIP Networks The ITU's G.I 14 recommendation specifics that the one-way delay between endpoints should not exceed 150 ms to be acceptable, commercial voice quality. In private networks, somewhat longer delays might be acceptable for economic reasons. The ITU G.114 recommendation specifics that 151-ms to 400-ms one-way delay might be acceptable provided that organizations are aware that the transmission time will affect the quality of user applications. One-way delays of above 400 ms are unacceptable for general network planning purposes.
Q4. Which two mechanisms are used by distance vector protocols to prevent routing loops? (Choose two.)
A. split horizon
B. route summarization
C. route poisoning
D. tuned timers
Answer: A,C
Q5. Which WAN technology is a cost-effective method to deliver 100Mb of bandwidth to multiple branch offices?
A. DSL
B. DWDM
C. ISDN
D. Metro Ethernet
Answer: D
Q6. Spanning Layer 2 across geographically separate data centers is a key consideration for current data center designs. Which is the name of the NX-OS technology that facilitates MAC in IP transport for Layer 2 VLANs across any IP network?
A. Overlay Transport Virtualization
B. Virtual Private LAN Services
C. Generic Routing Encapsulation
D. QinQ tunneling
Answer: A
Q7. When designing a WAN backup for voice and video applications, what three types of connections should be used? (Choose three.)
A. Private WAN
B. internet
C. ISDN
D. MPLS
E. dial-up
F. ATM
G. DSL
Answer: A,C,D
Q8. During which phase of the PPDIOO model would you conduct interviews with supporting staff to develop and propose a viable solution?
A. Prepare
B. Plan
C. Design
D. Implement
E. Operate
F. Optimize
Answer: A
Explanation:
Prepare Phase The Prepare phase establishes organization and business requirements, develops a network strategy, and proposes a high-level conceptual architecture to support the strategy. Technologies that support the architecture are identified. This phase creates a business case to establish a financial justification for a network strategy.
Q9. What Cisco product is designed to improve the performance of Windows file and exchange services in remote data centers?
A. Application Control Engine
B. Wide Area Application Services
C. Cisco Application Policy Infrastructure Controller
D. Cisco Prime Network Services Controller
Answer: B
Q10. DRAG DROP
Drag the characteristics of the traditional campus network on the left to the most appropriate hierarchical network layer on the right.
Answer:
Q11. A company is implementing an Identity Management solution with these characteristics:
1) existing AAA Server
2) Cisco Catalyst switches
3) minimal added investments
Which Cisco Trust and Identity Management solution would you recommend?
A. NAC Appliance
B. Cisco IBNS
C. CSM
D. Cisco Security MARS
Answer: B
Q12. Characterizing an existing network requires gathering as much information about the network as possible. Which of these choices describes the preferred order for the information-gathering process?
A. site and network audits, traffic analysis, existing documentation and organizational input
B. existing documentation and organizational input, site and network audits, traffic analysis
C. traffic analysis, existing documentation and organizational input, site and network audits
D. site and network audits, existing documentation and organizational input, traffic analysis
Answer: B
Explanation:
This section describes the steps necessary to characterize the existing network infrastructure and all sites. This process requires three steps:
Step 1. Gather existing documentation about the network, and query the organization to discover additional information. Organization input, a network audit, and traffic analysis provide the key information you need. (Note that existing documentation may be inaccurate.)
Step 2. Perform a network audit that adds detail to the description of the network. If possible, use traffic-analysis information to augment organizational input when you are describing the applications and protocols used in the network.
Step 3. Based on your network characterization, write a summary report that describes the health of the network. With this information, you can propose hardware and software upgrades to support the network requirements and the organizational requirements.
Q13. Which first-hop redundancy protocol dynamically distributes client traffic between multiple routers?
A. HSRP
B. VRRP
C. GLBP
D. IGRP
Answer: C
Q14. Which two of these are scalability benefits of designing a network that utilizes VPNs? (Choose two.)
A. extends the network to remote users
B. allows networks to be set up and restructured quickly
C. reduces dial infrastructure expenditures
D. reduces the number of physical connections
E. simplifies the underlying structure of a customer WAN
Answer: D,E
Q15. Which two methods are used to reduce the mesh links required between iBGP peers in the same AS? (Choose two.)
A. community
B. router reflectors
C. local preference
D. confederations
E. atomic aggregate
F. MED
Answer: B,D
Q16. What three design requirements are key to designing a campus core? (Choose three.)
A. low latency
B. access control
C. traffic filtering
D. high speed
E. redundant links
F. QoS tagging
Answer: A,D,E