Q1. Application servers require load balancing and security services. Where in the data center network should these services be provisioned?
A. core
B. aggregation
C. Layer 3 access
D. distribution
Answer: B
Q2. A secure WAN design requires dynamic routing and IP multicast. What two VPN protocols meet these requirements? (Choose two.)
A. Standard IPsec
B. P2P GRE over IPsec
C. DMVPN
D. AnyConnect
E. PPTP
F. Easy VPN
G. SSL/TLS
Answer: B,C
Q3. Which three modular components are part of the Cisco Enterprise Edge Architecture? (Choose three.)
A. e-commerce module
B. Internet connectivity module
C. server farm module
D. remote access and VPN module
E. PSTN services module
F. enterprise branch module
G. building distribution module
Answer: A,B,D
Q4. Which three protocols support VLSM? (Choose three.)
A. RIPv2
B. RIPv1
C. EIGRP
D. OSPF
E. IGRP
Answer: A,C,D
Q5. Which statement describes the methodology that supports the Cisco Enterprise Architecture models?
A. It divides the network into functional network modules.
B. It divides the network into role-based network modules.
C. It divides the network into regional network modules.
D. It divides the network into operational network modules.
Answer: A
Q6. Which three statements are true regarding the virtual interface on a Cisco Wireless LAN Controller? (Choose three.)
A. supports mobility management
B. serves as a DHCP relay
C. used for all controller to AP communication
D. supports embedded Layer 3 security
E. default for out-of-band management
F. default for in-band management
G. provides connectivity to AAA servers
Answer: A,B,D
Q7. Refer to the exhibit.
A standard Layer 2 campus network design is pictured. Which numbered box represents the core layer?
A. #1
B. #2
C. #3
D. #4
E. #5
Answer: C
Q8. Which three are considered as technical constraints when identifying network requirements? (Choose three.)
A. support for legacy applications
B. bandwidth support for new applications
C. limited budget allocation
D. policy limitations
E. limited support staff to complete assessment
F. support for existing legacy equipment
G. limited timeframe to implement
Answer: A,B,F
Explanation:
Network design might be constrained by parameters that limit the solution. Legacy applications might still exist that must be supported going forward, and these applications might require a legacy protocol that may limit a design. Technical constraints include the following:
.Existing wiring does not support new technology.
.Bandwidth might not support new applications.
.The network must support exiting legacy equipment.
.Legacy applications must be supported (application compatibility).
Q9. Which consideration is the most important for the network designer when considering IP routing?
A. convergence
B. scalability
C. on-demand routing
D. redistribution
Answer: A
Q10. Which two are types of network virtualization? (Choose two.)
A. VSS: Virtual Switching System
B. VRF: virtual routing and forwarding
C. VCI: virtual channel identifier
D. VLSM: variable length subnet masking
E. VM: virtual machine
F. VMP: Virtual Memory Pool
Answer: A,B
Explanation:
Network virtualization encompasses logical isolated network segments that share the same
physical infrastructure. Each segment operates independently and is logically separate
from the other segments. Each network segment appears with its own privacy, security,
independent set of policies, QoS levels, and independent routing paths.
Here are some examples of network virtualization technologies:
VLAN: Virtual local-area network
VSAN: Virtual storage-area network
VRF: Virtual routing and forwarding
VPN: Virtual private network
VPC: Virtual Port Channel
Q11. What business trend allows employees to use personal devices to access enterprise data and systems?
A. ISE
B. BYOD
C. SAN
D. IOE
Answer: B
Q12. A company must deploy an IGP routing protocol on an Enterprise Network. Where should route summarization be implemented?
A. distribution
B. core
C. access
D. backbone
Answer: A
Q13. Your company's Cisco routers are operating with EIGRP. You need to join networks with an acquisition's heterogeneous routers at 3 sites, operating with EIGRP and OSPF. Which describes the best practice for routing protocol deployment?
A. Apply OSPF throughout both networks
B. Apply one-way redistribution exclusively at each location
C. Apply two-way redistribution exclusively at each location
D. Apply two-way redistribution at each location with a route filter at only one location
E. Apply two-way redistribution at each location with a route filter at each location
F. Apply EIGRP with the same autonomous system throughout both networks
Answer: E
Explanation: Without filters there is possibility of routing loops.
Link:
http://www.cisco.com/en/US/tech/tk365/technologies_tech_note09186a008009487e.shtml
Q14. In which phase of PPDIOO are the network requirements identified?
A. Design
B. Plan
C. Prepare
D. Implement
E. Operate
F. Optimize
Answer: B
Explanation:
Plan Phase
The Plan phase identifies the network requirements based on goals, facilities, and user needs. This phase characterizes sites and assesses the network, performs a gap analysis against best-practice architectures, and looks at the operational environment. A project plan is developed to manage the tasks, responsible parties, milestones, and resources to do the design and implementation. The project plan aligns with the scope, cost, and resource parameters established with the original business requirements. This project plan is followed (and updated) during all phases of the cycle.
Q15. What two access point modes support the transmission of user traffic over a LWAPP/CAPWAP tunnel? (Choose two.)
A. local
B. H-REAP
C. rogue detector
D. monitor
E. sniffer
F. standalone
Answer: A,B
Q16. DRAG DROP
Answer: