Q1. Which three are considered as technical constraints when identifying network requirements? (Choose three.)
A. support for legacy applications
B. bandwidth support for new applications
C. limited budget allocation
D. policy limitations
E. limited support staff to complete assessment
F. support for existing legacy equipment
G. limited timeframe to implement
Answer: A,B,F
Explanation:
Network design might be constrained by parameters that limit the solution. Legacy applications might still exist that must be supported going forward, and these applications might require a legacy protocol that may limit a design. Technical constraints include the following:
.Existing wiring does not support new technology.
.Bandwidth might not support new applications.
.The network must support exiting legacy equipment.
.Legacy applications must be supported (application compatibility).
Q2. A remote office has a T1 WAN link to headquarters and a T1 Internet connection. The client requests WAN redundancy to headquarters with similar bandwidth. What two connection types satisfy this requirement? (Choose two.)
A. Secondary T1 WAN circuit
B. ISDN BRI
C. IPSec Tunnel over the Internet
D. DWDM l
E. POTS Line T1 WAN
Answer: A,C
Q3. Which statement describes a unique advantage of EIGRP?
A. It enables unequal-cost load balancing.
B. It enables equal-cost load balancing.
C. It enables source-based load balancing.
D. It enables port-based load balancing.
Answer: A
Q4. Which mode is used to exclusively look for unauthorized access points?
A. monitor mode
B. sniffer mode
C. rogue detector mode
D. local mode
Answer: C
Explanation:
Interference detection and avoidance: As Cisco LWAPs monitor all channels, interference is detected by a predefined threshold (10 percent by default). Interference can be generated by rogue APs, microwaves, cordless telephones, Bluetooth devices, neighboring WLANs, or other electronic devices.
Q5. What three design requirements are key to designing a campus core? (Choose three.)
A. low latency
B. access control
C. traffic filtering
D. high speed
E. redundant links
F. QoS tagging
Answer: A,D,E
Q6. Which three are associated with the distribution layer within the campus design? (Choose three.)
A. access layer aggregation
B. route summarization
C. network trust boundary
D. next-hop redundancy
E. layer 2 switching
F. port security
G. broadcast suppression
Answer: A,B,D
Q7. What is the maximum number of groups that is supported by GLBP?
A. 64
B. 256
C. 512
D. 1024
Answer: D
Q8. A company wants to use private IP addresses for all its internal hosts. Which technology can the company use to provide access to the Internet using a single public IP address?
A. static NAT
B. source routing
C. ACL
D. PAT
Answer: D
Q9. What is the maximum RIPv2 hop count for a reachable route?
A. 13
B. 14
C. 15
D. 16
Answer: C
Q10. What two CoS values are used by voice traffic? (Choose two.)
A. COS1
B. COS2
C. COS3
D. COS4
E. COS5
Answer: C,E
Q11. What three considerations should be taken into account when selecting a routing protocol? (Choose three.)
A. classful routing
B. scalability
C. default route origination
D. multi vendor support
E. link load balancing
F. hop count
Answer: B,D,E
Q12. What three primary sources of information are needed to perform a network audit? (Choose three.)
A. existing documentation
B. new documentation
C. existing network management software
D. new network management tools
E. management personnel
F. technical personnel
Answer: A,C,D
Q13. Which statement describes an advantage of the Layer 2 access model over the Layer 3 access model in the data center?
A. It enables NIC teaming.
B. It removes STP dependency.
C. It increases scalability.
D. It decreases convergence.
Answer: A
Q14. When designing the identity and access control portions for the enterprise campus network, which of these solutions would be the most appropriate solution to consider?
A. 802.1X
B. ACLs in the core layer
C. Cisco Security MARS
D. NetFlow
Answer: A
Q15. When evaluating network designs, what indicator demonstrates that the modular approach was followed?
A. ability to scale
B. follows best practices
C. redundant connectivity
D. easy to deploy
Answer: A
Q16. When selecting which hardware switches to use throughout an enterprise campus switched network, which consideration is not relevant?
A. whether data link layer switching based upon the MAC address is required
B. the number of shared media segments
C. which infrastructure service capabilities are required
D. whether to support Layer 3 services at the network edge
Answer: B
Explanation: Shared media are not used in modern networks; all links are operating full-duplex Link: http://www.cisco.com/en/US/docs/solutions/Enterprise/Campus/campover.html