Q1. DRAG DROP
Answer:
Q2. What is the benefit of VLSM?
A. reduces configuration complexity by using the same subnet mask length
B. reduces the routing table size by using automatic route summarization
C. reduces the routing table size by using manual route summarization
D. allows the subnet mask and classful routing updates to be advertised
E. secures the hosts on a subnet by using RFC 1918 addresses
Answer: C
Q3. A hierarchical design of the EIGRP domain facilitates which two of the following? (Choose two.)
A. route summarization
B. faster convergence
C. unequal cost load balancing
D. redistribution
E. virtual links
Answer: A,B
Q4. When designing the infrastructure protection portion for the enterprise edge, which solution would be the most appropriate solution to consider?
A. 802.1X
B. ACLs in the core layer
C. Cisco Security MARS
D. AAA
Answer: D
Q5. Which network access control technology is recommended to use with Layer 2 access layer switches?
A. 802.1q
B. 802.1x
C. 802.3af
D. 802.3q
E. 802.11n
Answer: B
Q6. Your supervisor wants you to recommend a management protocol that will allow you to track overall bandwidth utilization, utilization by traffic type, and utilization by source and destination. Which is ideally suited for this function?
A. MRTG
B. NetFlow
C. RRD
D. SNMP
Answer: B
Q7. Which three of these are layers in the Cisco SONA Architecture? (Choose three.)
A. Applications
B. Physical Infrastructure
C. Presentation
D. Integrated Transport
E. Core Common Services
F. Networked Infrastructure
Answer: A,B,E
Q8. You need to connect to a remote branch office via an Internet connection. The remote office does not use Cisco equipment. This connection must be secure and must support OSPF. Which of the following can be used to transport data to the branch office?
A. GRE over IPsec
B. IPsec
C. GRE
D. IPsec VTI
Answer: A
Q9. Refer to the exhibit.
Which statement is true concerning enterprise edge distribution switches?
A. The speed of switching is the most critical feature.
B. Security requirements are offloaded to the other modules for performance reasons.
C. Edge distribution switches are only required when using a collapsed core backbone.
D. Enterprise edge distribution switches are similar to the building distribution layer.
Answer: D
Q10. Which two mechanisms are used by distance vector protocols to prevent routing loops? (Choose two.)
A. split horizon
B. route summarization
C. route poisoning
D. tuned timers
Answer: A,C
Q11. Which three are valid Layer 2 access designs? (Choose three.)
A. Looped Triangle
B. Looped Square
C. Looped U
D. Loop-Free Triangle
E. Loop-Free Square
F. Loop-Free U
Answer: A,B,F
Q12. A network engineer is following the three tiered Network Hierarchical Model. At which tier is
route summarization implemented?
A. core
B. distribution
C. backbone
D. access
Answer: B
Q13. An organization is deciding what routing protocol to use throughout their network. What must be considered if routing is to be performed at the access layer?
A. reduced scalability of the network when introducing a large number of switch blocks into the routing table
B. centralized management of access control lists at the distribution layer
C. reliability when implementing routing over spanning-tree at the access layer
D. performance differences between core, distribution and access layer equipment
Answer: D
Q14. What characteristic separates link state routing protocols from a distance vector?
A. creates a topological view of the entire network
B. path calculation utilizes a more granular metric
C. does not scale well for large networks
D. constantly shares link state updates throughout the topology
Answer: A
Q15. Which voice codec should you use in order to provide toll quality calls?
A. G.711
B. G.718
C. G.722
D. G.729
Answer: A
Q16. You are designing a network that requires a routing protocol that will use minimal network bandwidth. Which would satisfy this requirement?
A. RIPv2
B. RIPng
C. OSPF
D. ARP
E. EGP
Answer: C