Q1. To what Layer 2 technology does VRF closely compare?
A. VSS
B. VPC
C. VLAN
D. VTP
Answer: C
Q2. Which network access control technology is recommended to use with Layer 2 access layer switches?
A. 802.1q
B. 802.1x
C. 802.3af
D. 802.3q
E. 802.11n
Answer: B
Q3. Which two common cable management strategies are used in high-density server deployments in the data center? (Choose two.)
A. top-of-rack
B. middle-of-rack
C. bottom-of-rack
D. beginning-of-row
E. middle-of-row
F. end-of-row
Answer: A,F
Q4. Which is a factor in enterprise campus design decisions?
A. network application characteristics
B. routing protocol characteristics
C. switching latency characteristics
D. packet filtering characteristics
Answer: A
Q5. Which is the equation used to derive a 64 Kbps bit rate?
A. 2 x 8 kHz x 4-bit code words
B. 8 kHz x 8-bit code words
C. 2 x 4-bit code words x 8 kHz
D. 2 x 4 kHz x 8-bit code words
Answer: D
Q6. Which RFC defines the IPv6 standard?
A. RFC 1918
B. RFC 2338
C. RFC 2460
D. RFC 2740
Answer: C
Q7. What are the three modes of unicast reverse path forwarding? (Choose three.)
A. strict
B. loose
C. VRF
D. global
E. PIM
F. local
Answer: A,B,C
Q8. With respect to IPv6 addressing, from a design perspective, which of these statements is it important to keep in mind?
A. IPv6 addressing provides convenience of anycast addressing without any configuration requirements.
B. IPv6 does not use multicast addressing.
C. An IPv6 router will not forward packets from one link to other links if the packet has either a link-local source or a link-local destination address.
D. Dynamic address assignment requires DHCPv6.
Answer: C
Q9. Which two of these practices are considered to be best practices when designing the access layer for the enterprise campus? (Choose two.)
A. Implement all of the services (QoS, security, STP, and so on) in the access layer, offloading the work from the distribution and core layers.
B. Always use a Spanning Tree Protocol; preferred is Rapid PVST+.
C. Use automatic VLAN pruning to prune unused VLANs from trunked interfaces to avoid broadcast propagation.
D. Avoid wasted processing by disabling STP where loops are not possible.
E. Use VTP transparent mode to decrease the potential for operational error.
Answer: B,E
Explanation:
When designing the building access layer, you must consider the number of users or ports required to size up the LAN switch. Connectivity speed for each host should also be considered. Hosts might be connected using various technologies such as Fast Ethernet, Gigabit Ethernet, or port channels. The planned VLANs enter into the design.
Performance in the access layer is also important. Redundancy and QoS features should be considered.
The following are recommended best practices for the building access layer:
. Limit VLANs to a single closet when possible to provide the most deterministic and highly available topology.
. Use Rapid Per-VLAN Spanning Tree Plus (RPVST+) if STP is required. It provides the faster convergence than traditional 802.1d default timers.
. Set trunks to ON and ON with no-negotiate.
. Manually prune unused VLANs to avoid broadcast propagation (commonly done on the distribution switch).
. Use VLAN Trunking Protocol (VTP) Transparent mode, because there is little need for a common VLAN database in hierarchical networks.
. Disable trunking on host ports, because it is not necessary. Doing so provides more security and speeds up PortFast.
. Consider implementing routing in the access layer to provide fast convergence and Layer 3 load balancing.
. Use the switchport host commands on server and end-user ports to enable PortFast and disable channeling on these ports.
. Use Cisco STP Toolkit, which provides
. PortFast: Bypass listening-learning phase for access ports
. Loop GuarD. Prevents alternate or root port from becoming designated in absence of bridge protocol data units (BPDU)
. Root GuarD. Prevents external switches from becoming root
. BPDU GuarD. Disables PortFast-enabled port if a BPDU is received Cisco Press CCDA 640-864 Official Certification Guide Fourth Edition, Chapter 3, Page 85
Q10. Refer to the exhibit.
A standard Layer 2 campus network design is pictured. Which numbered box represents the core layer?
A. #1
B. #2
C. #3
D. #4
E. #5
Answer: C
Q11. Which statement should the designer keep in mind when considering the advanced routing features?
A. One-way route redistribution avoids the requirement for static or default routes.
B. Redistribution, summarization, and filtering are most often applied between the campus core and enterprise edge.
C. Filtering only occurs on the routing domain boundary using redistribution.
D. Summarize routes at the core toward the distribution layer.
E. The hierarchical flexibility of IPv6 addressing avoids the requirement for routing traffic reduction using aggregation.
Answer: B
Q12. DRAG DROP
Answer:
Q13. A circuit order has been placed for Gigabit Ethernet and is 80KM from the carrier equipment. What type of SFP will be required?
A. TX
B. SX
C. ZX
D. LX
Answer: C
Q14. An organization needs a WAN Transport technology that meets these criteria:
. has a low initial cost
. provides low-to-medium BW
. has medium-to-high latency and jitter
Which technology should the organization use?
A. DSL
B. X.25
C. ISDN
D. wireless
E. analog modem
Answer: A
Q15. Which is the purpose of the Cisco NAC Profiler?
A. Automates discovery and inventory of all LAN attached devices
B. Generates a profile based on username and group
C. Learns and creates a database of virus definitions based on LAN traffic
D. A database used to map user VPN accounts
Answer: A
Explanation:
Cisco NAC Profiler: Enables network administrators to keep a real-time, contextual inventory of all devices in a network. It greatly facilitates the deployment and management of Cisco Network Admission Control (NAC) systems by discovering and tracking the location and type of all LAN-attached endpoints, including those that are not capable of authenticating. It also uses the information about the device to determine the correct policies for NAC to apply.
Q16. Which protocol is used for voice bearer traffic?
A. MGCP
B. RTP
C. SCCP
D. CDP
E. ICMP
Answer: B
Explanation:
VoIP Control and Transport Protocols
A number of different protocols are used in a VoIP environment for call control, device provisioning, and addressing.
Figure 14-15 shows those protocols focused on VoIP control and transport.