Q1. What is the first step when creating a network security policy?
A. define what should be protected
B. investigate how likely an attack is to occur
C. implement measures to protect assets
D. hire a security firm to perform penetration tests
Answer: A
Q2. When you are designing a large IPv6 multivendor network, which IGP does Cisco recommend that you use?
A. OSPFv3
B. EIGRP for IPv6
C. BGP
D. RIPng
Answer: A
Q3. Which technology enables WLCs to peer with each other to enable roaming support?
A. WAP profiles
B. roaming profiles
C. mobility groups
D. peer.groups
Answer: C
Q4. What are the three primary functions of the distribution layer of the campus network design hierarchy? (Choose three.)
A. provide end-user connectivity
B. provide high speed transport
C. provide QoS services
D. enforce security policies
E. provide WAN connections
F. connect access devices to the core backbone
Answer: C,D,F
Q5. A data center is reaching its power and cooling capacity. What two virtualization
technologies can address the problem by directly reducing the number of physical devices? (Choose two.)
A. virtual switching systems
B. virtual device contexts
C. virtual servers
D. virtual routing and forwarding
E. virtual port channels
F. virtual LANs
Answer: B,C
Q6. Which two of the following are benefits of using a modular approach to network design? (Choose two.)
A. improves flexibility
B. facilitates implementation
C. lowers implementation costs
D. improves customer participation in the design process
Answer: A,B
Q7. You need to connect to a remote branch office via an Internet connection. The remote office does not use Cisco equipment. This connection must be secure and must support OSPF. Which of the following can be used to transport data to the branch office?
A. GRE over IPsec
B. IPsec
C. GRE
D. IPsec VTI
Answer: A
Q8. A company must deploy an IGP routing protocol on an Enterprise Network. Where should route summarization be implemented?
A. distribution
B. core
C. access
D. backbone
Answer: A
Q9. A company is implementing an Identity Management solution with these characteristics:
1) existing AAA Server
2) Cisco Catalyst switches
3) minimal added investments
Which Cisco Trust and Identity Management solution would you recommend?
A. NAC Appliance
B. Cisco IBNS
C. CSM
D. Cisco Security MARS
Answer: B
Q10. By default, how does EIGRP's metric differ from OSPF?
A. hops
B. cost
C. bandwidth
D. delay
Answer: D
Q11. In which operation mode does the AP act as a dedicated sensor for location-based and intrusion detection services?
A. monitor mode
B. promiscuous mode
C. discovery mode
D. sniffer mode
Answer: A
Q12. Your supervisor has asked you to deploy a routing protocol within the lab environment that will allow for unequal cost multipath routing. Which should you choose?
A. EIGRP
B. OSPF
C. IS-IS
D. RIP
Answer: A
Q13. Which interior routing protocol has the most preferable administrative distance by default?
A. RIP
B. OSPF
C. EIGRP
D. BGP
E. IS-IS
Answer: C
Q14. DRAG DROP
Answer:
Q15. Which two routing protocols operate over NBMA point-to-multipoint networks without the use of point-to-point sub interfaces? (Choose two.)
A. RIPv1
B. RIPv2
C. IS-IS
D. EIGRP
E. OSPF
Answer: D,E
Q16. Refer to the exhibit. On which router should you configure redistribution?
A. Router 1
B. Router 2
C. Router 3
D. Router 4
E. Router 5
Answer: B