Q1. What business trend allows employees to use personal devices to access enterprise data and systems?
A. ISE
B. BYOD
C. SAN
D. IOE
Answer: B
Q2. Which voice codec should you use in order to provide toll quality calls?
A. G.711
B. G.718
C. G.722
D. G.729
Answer: A
Q3. What are three valid methods of gathering information about an existing data network? (Choose three.)
A. Use organizational input.
B. Perform a traffic analysis.
C. Analyze the user-mapping of a running application.
D. Perform a packet-level audit to verify carrier service guarantees.
E. Perform a network audit to gather more detail about the network.
F. Use reports that analyze the metrics of the customer's existing network.
Answer: A,B,E
Q4. Refer to the exhibit.
Which statement is true concerning enterprise edge distribution switches?
A. The speed of switching is the most critical feature.
B. Security requirements are offloaded to the other modules for performance reasons.
C. Edge distribution switches are only required when using a collapsed core backbone.
D. Enterprise edge distribution switches are similar to the building distribution layer.
Answer: D
Q5. Which factor would be most influential in choosing multimode fiber optic connections over UTP?
A. signal attenuation
B. required bandwidth
C. required distance
D. electromagnetic interference
E. cost
Answer: C
Q6. When designing the threat detection and mitigation portion for the enterprise data center network, which of the following would be the most appropriate solution to consider?
A. 802.1X
B. ACLs in the core layer
C. Cisco Security MARS
D. Cisco Firewall Services Module
Answer: C
Q7. You are designing a network that requires a routing protocol that will use minimal network bandwidth. Which would satisfy this requirement?
A. RIPv2
B. RIPng
C. OSPF
D. ARP
E. EGP
Answer: C
Q8. Which servers that reside in the data center require direct links to all other enterprise modules?
A. network management servers
B. DHCP servers
C. Active Directory servers
D. IP SLA servers
E. web servers
Answer: A
Q9. The evolution of the Data Center is best represented by the 3.0 architecture component of virtualization. Which of the following is not an example of the virtualization taking place in the Data Center?
A. Virtualized media access utilizing Fiber Channel over Ethernet
B. VLANs and virtual storage area networks (VSANs) provide for virtualized LAN and SAN connectivity, separating physical networks and equipment into virtual entities
C. Virtual Machines that run an application within the client operating system, which is further virtualized and running on common hardware
D. Storage devices virtualized into storage pools, and network devices are virtualized using device contexts
Answer: A
Q10. What significant advantage does EIGRP have over OSPF?
A. easy summarization
B. shorter convergence times
C. single area operation
D. low processor utilization
Answer: B
Q11. What characteristic separates link state routing protocols from a distance vector?
A. creates a topological view of the entire network
B. path calculation utilizes a more granular metric
C. does not scale well for large networks
D. constantly shares link state updates throughout the topology
Answer: A
Q12. Which HSRP parameters must match, to ensure proper functionality?
A. group parameters
B. priority parameters
C. preempt parameters
D. tracking parameters
Answer: A
Q13. What IPv4 addressing technique allows for the division of addresses into subnets of different sizes?
A. VLSM
B. RIR
C. CIDR
D. NAT
Answer: A
Q14. Which statement describes the methodology that supports the Cisco Enterprise Architecture models?
A. It divides the network into functional network modules.
B. It divides the network into role-based network modules.
C. It divides the network into regional network modules.
D. It divides the network into operational network modules.
Answer: A
Q15. Which two routing protocols usually converge most quickly? (Choose two.)
A. RIPv1
B. RIPv2
C. BGP
D. OSPF
E. EIGRP
Answer: D,E
Q16. What is the primary advantage of implementing a wireless LAN controller in a wireless LAN design?
A. roaming between APs
B. RADIUS user authentication
C. radio resource management
D. accelerated data transfer
Answer: C