Q1. You want to gather as much detail as possible during a network audit with a minimal impact on the network devices themselves. Which tool would you use to include data time stamping across a large number of interfaces while being customized according to each interface?
A. RMON
B. SNMPv3
C. NetFlow
D. Cisco Discovery Protocol
Answer: C
Q2. WAN backup over the Internet is often used to provide primary connection redundancy. Which is the most important consideration when passing corporate traffic over the public Internet?
A. security
B. static versus dynamic routing
C. bandwidth
D. QoS
E. latency
Answer: A
Explanation:
WAN Backup over the Internet Another alternative for WAN backup is to use the Internet as the connectivity transport between sites. However, keep in mind that this type of connection does not support bandwidth guarantees. The enterprise also needs to work closely with the ISP to set up the tunnels and advertise the company's networks internally so that remote offices have reachable IP destinations. Security is of great importance when you rely on the Internet for network connectivity, so a secure tunnel using IPsec needs to be deployed to protect the data during transport.
Q3. In which network location should an external DNS server be placed?
A. campus data center
B. enterprise branch
C. internet
D. remote access
Answer: C
Q4. Which Cisco device management feature is most suited to metering network traffic and providing data for billing network usage?
A. BGP
B. Cisco Discovery Protocol
C. QoS
D. RMON
E. NetFlow
Answer: E
Q5. Which two are types of network virtualization? (Choose two.)
A. VSS: Virtual Switching System
B. VRF: virtual routing and forwarding
C. VCI: virtual channel identifier
D. VLSM: variable length subnet masking
E. VM: virtual machine
F. VMP: Virtual Memory Pool
Answer: A,B
Explanation:
Network virtualization encompasses logical isolated network segments that share the same
physical infrastructure. Each segment operates independently and is logically separate
from the other segments. Each network segment appears with its own privacy, security,
independent set of policies, QoS levels, and independent routing paths.
Here are some examples of network virtualization technologies:
VLAN: Virtual local-area network
VSAN: Virtual storage-area network
VRF: Virtual routing and forwarding
VPN: Virtual private network
VPC: Virtual Port Channel
Q6. Which statement describes a unique advantage of EIGRP?
A. It enables unequal-cost load balancing.
B. It enables equal-cost load balancing.
C. It enables source-based load balancing.
D. It enables port-based load balancing.
Answer: A
Q7. A client wants to deploy a video conferencing platform in a multisite WAN environment. What two design considerations need to be evaluated? (Choose two.)
A. CODECs supported by the video units
B. buffer sizes on the routers
C. POE capabilities of the switches
D. number of current calls
E. number of hops between sites
Answer: A,D
Q8. A spanning tree topology can be simplified by deploying what Cisco IOS technology in the distribution block?
A. VDC
B. vPC
C. Rapid PVST+
D. VSS
E. Flex Links
Answer: D
Q9. Which protocol is used for voice bearer traffic?
A. MGCP
B. RTP
C. SCCP
D. CDP
E. ICMP
Answer: B
Explanation:
VoIP Control and Transport Protocols
A number of different protocols are used in a VoIP environment for call control, device provisioning, and addressing.
Figure 14-15 shows those protocols focused on VoIP control and transport.
Q10. Refer to the exhibit.
A standard, Layer 2 campus network design is pictured. Which numbered box represents the distribution layer?
A. #1
B. #2
C. #3
D. #4
Answer: B
Q11. A network engineer has been asked to follow a top down design approach. What layer of the OSI model is used to start the design?
A. physical
B. network
C. transport
D. application
Answer: D
Q12. Which three modular components are part of the Cisco Enterprise Edge Architecture? (Choose three.)
A. e-commerce module
B. Internet connectivity module
C. server farm module
D. remote access and VPN module
E. PSTN services module
F. enterprise branch module
G. building distribution module
Answer: A,B,D
Q13. What three customer supported details identifies network requirements based on the PPDIOO design model? (Choose three.)
A. goals
B. budget
C. user needs
D. locations
E. policies
F. tasks
Answer: A,B,C
Q14. Which three solutions are part of the Borderless Network Services? (Choose three.)
A. Wireless
B. Routing
C. TrustSec
D. MediaNet
E. Switching
F. EnergyWise
G. Next-Gen WAN
Answer: C,D,F
Q15. Which two of these practices are considered to be best practices when designing the access layer for the enterprise campus? (Choose two.)
A. Implement all of the services (QoS, security, STP, and so on) in the access layer, offloading the work from the distribution and core layers.
B. Always use a Spanning Tree Protocol; preferred is Rapid PVST+.
C. Use automatic VLAN pruning to prune unused VLANs from trunked interfaces to avoid broadcast propagation.
D. Avoid wasted processing by disabling STP where loops are not possible.
E. Use VTP transparent mode to decrease the potential for operational error.
Answer: B,E
Explanation:
When designing the building access layer, you must consider the number of users or ports required to size up the LAN switch. Connectivity speed for each host should also be considered. Hosts might be connected using various technologies such as Fast Ethernet, Gigabit Ethernet, or port channels. The planned VLANs enter into the design.
Performance in the access layer is also important. Redundancy and QoS features should be considered.
The following are recommended best practices for the building access layer:
. Limit VLANs to a single closet when possible to provide the most deterministic and highly available topology.
. Use Rapid Per-VLAN Spanning Tree Plus (RPVST+) if STP is required. It provides the faster convergence than traditional 802.1d default timers.
. Set trunks to ON and ON with no-negotiate.
. Manually prune unused VLANs to avoid broadcast propagation (commonly done on the distribution switch).
. Use VLAN Trunking Protocol (VTP) Transparent mode, because there is little need for a common VLAN database in hierarchical networks.
. Disable trunking on host ports, because it is not necessary. Doing so provides more security and speeds up PortFast.
. Consider implementing routing in the access layer to provide fast convergence and Layer 3 load balancing.
. Use the switchport host commands on server and end-user ports to enable PortFast and disable channeling on these ports.
. Use Cisco STP Toolkit, which provides
. PortFast: Bypass listening-learning phase for access ports
. Loop GuarD. Prevents alternate or root port from becoming designated in absence of bridge protocol data units (BPDU)
. Root GuarD. Prevents external switches from becoming root
. BPDU GuarD. Disables PortFast-enabled port if a BPDU is received Cisco Press CCDA 640-864 Official Certification Guide Fourth Edition, Chapter 3, Page 85
Q16. Which network access control technology is recommended to use with Layer 2 access layer switches?
A. 802.1q
B. 802.1x
C. 802.3af
D. 802.3q
E. 802.11n
Answer: B