Q1. Which of the following three options represents the components of the Teleworker Solution? (Choose three.)
A. Cisco Unified IP Phone
B. Cisco 880 Series Router
C. Aironet Office Extend Access Point
D. Catalyst 3560 Series Switch
E. Cisco 2900 Series Router
F. MPLS Layer 3 VPN
G. Leased lines
Answer: A,B,E
Explanation:
A Cisco ASR is used to terminate Teleworker solutions, not a 2900 series router. Hybrid teleworker uses Aironet, Advanced teleworker uses 880, both use IP phones. google: "at_a_glance_c45-652500.pdf" for details
The Cisco Virtual Office Solution for the Enterprise Teleworker is implemented using the Cisco 800 series ISRs. Each ISR has integrated switch ports that then connect to the user’s broadband connection. The solution uses a permanent always-on IPsec VPN tunnel back to the corporate network. This architecture provides for centralized IT security management, corporate-pushed security policies, and integrated identity services. In addition, this solution supports the enterprise teleworker needs through advanced applications such as voice and video. For example, the enterprise teleworker can take advantage of toll bypass, voicemail, and advanced IP phone features not available in the PSTN.
Enterprise Teleworker Module
The enterprise teleworker module consists of a small office or a mobile user who needs to access services of the enterprise campus. As shown in Figure 2-14, mobile users connect from their homes, hotels, or other locations using dialup or Internet access lines. VPN clients are used to allow mobile users to securely access enterprise applications. The Cisco Virtual Office solution provides a solution for teleworkers that is centrally managed using small integrated service routers (ISR) in the VPN solution. IP phone capabilities are also provided in the Cisco Virtual Office solution, providing corporate voice services for mobile users.
Q2. Which three solutions are part of the Borderless Network Services? (Choose three.)
A. Wireless
B. Routing
C. TrustSec
D. MediaNet
E. Switching
F. EnergyWise
G. Next-Gen WAN
Answer: C,D,F
Q3. Which three service categories are supported by an ISR? (Choose three.)
A. voice
B. security
C. data
D. Internet
E. storage
F. satellite
Answer: A,B,C
Q4. Which protocol is the recommended first-hop redundancy protocol for an existing infrastructure that contains multiple vendors and platforms?
A. HSRP
B. VRRP
C. IGRP
D. OSPF
Answer: B
Q5. Which one of these statements describes why, from a design perspective, a managed VPN approach for enterprise teleworkers is most effective?
A. A managed VPN solution uses a cost-effective, on-demand VPN tunnel back to the enterprise.
B. This solution supports all teleworkers who do not require voice or video.
C. This architecture provides centralized management where the enterprise can apply security policies and push configurations.
D. It provides complete flexibility for remote access through a wireless hotspot or a guest network at a hotel, in addition to a home office.
Answer: C
Q6. A network engineer is using the traditional switched hierarchical design. The client has asked to increase uplink utilization from the access layer to the distribution. How can the engineer attain this new requirement without adding new physical connections?
A. enable spanning-tree portfast
B. enable VSS at the distribution layer
C. increase the MTU size on the uplink interfaces
D. ensure the root bridge priority is equal on both distribution switches
Answer: B
Q7. Which network virtualization technology involves creating virtual routers with its own individual routing tables on a physical router?
A. VSS
B. vPC
C. VRF
D. VLAN
Answer: C
Q8. When designing a new enterprise campus network, what topology should be used for maximum scalability?
A. flat
B. three-layer
C. star
D. partial mesh
E. full mesh
Answer: B
Q9. What is the most compact representation of the following IPv6 address?
2001:db8:0000:0000:cafe:0000:0000:1234
A. 2001:db8::cafe::1234
B. 2001:db8::cafe:0000:0000:1234
C. 2001:db8:0:0:cafe::1234
D. 2001:db8::cafe:0:1234
Answer: C
Q10. Which two design approaches provide management of enterprise network devices? (Choose two.)
A. in-band
B. out-of-line
C. out-of-band
D. in-line
Answer: A,C
Q11. An organization is deciding what routing protocol to use throughout their network. What must be considered if routing is to be performed at the access layer?
A. reduced scalability of the network when introducing a large number of switch blocks into the routing table
B. centralized management of access control lists at the distribution layer
C. reliability when implementing routing over spanning-tree at the access layer
D. performance differences between core, distribution and access layer equipment
Answer: D
Q12. What technology can secure data over an insecure medium and provide WAN redundancy in the event of a primary connection failure?
A. virtual private network
B. shadow PVC
C. dial-up ISDN
D. GRE Tunnel
Answer: A
Q13. DRAG DROP
Answer:
Q14. What routing protocol requires full mesh between internal peers in an enterprise network?
A. OSPF
B. EIGRP
C. BGP
D. ISIS
E. RIP
Answer: C
Q15. An organization is conducting an evaluation on the migration to IPv6 within the enterprise network and has requested clarification on recommended migration strategies. What three migration models would accomplish the organization's goal? (Choose three.)
A. Dual Stack
B. Service Block
C. Top-Down
D. Hybrid
E. Tunneled
F. Fork-Lift
Answer: A,B,D
Q16. When designing for a remote worker, which two are typical requirements? (Choose two.)
A. best-effort interactive and low-volume traffic patterns
B. connections to the enterprise edge using Layer 2 WAN technologies
C. always-on connection with SLA from ISP
D. voice and IPsec VPN support
E. high-end security devices with stateful firewall filtering
F. dual or multihoming to ISPs
Answer: C,D