Q1. Which type of area should you use in an enterprise OSPF deployment if you want to prevent propagation of type 5 LSAs but still allow the redistribution of external routes?
A. stub
B. totally stubby
C. backbone
D. NSSA
E. virtual link
Answer: D
Q2. You need to connect to a remote branch office via an Internet connection. The remote office does not use Cisco equipment. This connection must be secure and must support OSPF. Which of the following can be used to transport data to the branch office?
A. GRE over IPsec
B. IPsec
C. GRE
D. IPsec VTI
Answer: A
Q3. When you are designing a large IPv6 multivendor network, which IGP does Cisco recommend that you use?
A. OSPFv3
B. EIGRP for IPv6
C. BGP
D. RIPng
Answer: A
Q4. DRAG DROP
Answer:
Q5. What is the maximum number of groups that is supported by GLBP?
A. 64
B. 256
C. 512
D. 1024
Answer: D
Q6. Refer to the exhibit.
Which layer is the distribution layer?
A. Layer A
B. Layer B
C. Layer C
D. Layers A and B form a consolidated core and distribution layer
Answer: B
Q7. A campus network needs end-to-end QoS tools to manage traffic and ensure voice quality. Which three types of QoS tools are needed? (Choose three.)
A. interface queuing and scheduling
B. congestion management
C. compression and fragmentation
D. bandwidth provisioning
E. traffic classification
F. buffer management
Answer: A,D,E
Q8. A network engineer must implement a design where LAN clients are to connect.to various access layer devices, while remaining on the same VLAN . What type of design would support this requirement?
A. routed
B. switched
C. tunneled
D. virtual
Answer: B
Q9. Which two enterprise campus layers are combined in a medium-sized LAN? (Choose two.)
A. core
B. distribution
C. access
D. backbone
E. aggregation
Answer: A,B
Q10. Which voice codec should you use in order to provide toll quality calls?
A. G.711
B. G.718
C. G.722
D. G.729
Answer: A
Q11. Which two statements about designing the Data Center Access layer are correct? (Choose two.)
A. Multiport NIC servers should each have their own IP address.
B. Layer 3 connectivity should never be used in the access layer.
C. Layer 2 connectivity is primarily implemented in the access layer.
D. Multiport NIC servers should never be used in the access layer.
E. Layer 2 clustering implementation requires servers to be Layer 2 adjacent.
Answer: C,E
Explanation:
User access is primarily layer 2 in nature, layer 2 clustering is possible only in layer 2 Here is the Explanation: from the Cisco press CCDA certification guide Figure 4-8. Enterprise Data Center Infrastructure Overview
Defining the DC Access Layer
The data center access layer’s main purpose is to provide Layer 2 and Layer 3 physical port density for various servers in the data center. In addition, data center access layer switches provide high-performance, low-latency switching and can support a mix of oversubscription requirements. Both Layer 2 and Layer 3 access (also called routed access) designs are available, but most data center access layers are built using Layer 2 connectivity. The Layer 2 access design uses VLAN trunks upstream, which allows data center aggregation services to be shared across the same VLAN and across multiple switches. Other advantages of Layer 2 access are support for NIC teaming and server clustering that requires network connections to be Layer 2 adjacent or on the same VLAN with one another.
CCDA 640-864 Official Certification Guide Fourth Edition, Chapter 4
Q12. In the enterprise data center, which are the three main components? (Choose three.)
A. Network Infrastructure
B. Interactive services
C. Data Center Management
D. Internet services
E. WAN services
F. VPN and remote access
Answer: A,B,C
Q13. Which three terms describe the primary functions of the distribution layer of the campus network design hierarchy? (Choose three.)
A. provides end-user connectivity
B. provides high speed transport
C. provides QoS services
D. enforces security policies
E. provides WAN connections
F. connects access devices to the core backbone
Answer: C,D,F
Explanation: Link: http://www.cisco.com/en/US/docs/solutions/Enterprise/Campus/campover.html#wp708979
Q14. Which three Cisco technologies can you use to detect and mitigate threats? (Choose three.)
A. NetFlow
B. FWSM
C. ISE
D. VRRP
E. sFLOW
Answer: A,B,C
Q15. What device virtualization technology allows for a single point of management and a centralized routing instance?
A. ACE
B. VSS
C. VDC
D. VM
Answer: B
Q16. What is the recommended spanning tree protocol to use for all Layer 2 deployments in a branch office environment?
A. CST
B. RSPT
C. PVST
D. MISTP
E. Rapid PVST +
Answer: E