Q1. In which operation mode does the AP act as a dedicated sensor for location-based and intrusion detection services?
A. monitor mode
B. promiscuous mode
C. discovery mode
D. sniffer mode
Answer: A
Q2. Which one of these statements describes why, from a design perspective, a managed VPN approach for enterprise teleworkers is most effective?
A. A managed VPN solution uses a cost-effective, on-demand VPN tunnel back to the enterprise.
B. This solution supports all teleworkers who do not require voice or video.
C. This architecture provides centralized management where the enterprise can apply security policies and push configurations.
D. It provides complete flexibility for remote access through a wireless hotspot or a guest network at a hotel, in addition to a home office.
Answer: C
Q3. When designing the threat detection and mitigation portion for the enterprise data center network, which of the following would be the most appropriate solution to consider?
A. 802.1X
B. ACLs in the core layer
C. Cisco Security MARS
D. Cisco Firewall Services Module
Answer: C
Q4. Which Cisco Wireless LAN Controller interface is used for out-of-band management?
A. service port
B. management port
C. controller port
D. virtual port
Answer: A
Q5. What is the acceptable amount of one-way network delay for voice and video applications?
A. 300 bytes
B. 1 sec C. 150 ms
D. 500 ms
Answer: C
Explanation:
Delay Components in VoIP Networks The ITU's G.I 14 recommendation specifics that the one-way delay between endpoints should not exceed 150 ms to be acceptable, commercial voice quality. In private networks, somewhat longer delays might be acceptable for economic reasons. The ITU G.114 recommendation specifics that 151-ms to 400-ms one-way delay might be acceptable provided that organizations are aware that the transmission time will affect the quality of user applications. One-way delays of above 400 ms are unacceptable for general network planning purposes.
Q6. To what Layer 2 technology does VRF closely compare?
A. VSS
B. VPC
C. VLAN
D. VTP
Answer: C
Q7. What three considerations should be taken into account when selecting a routing protocol? (Choose three.)
A. classful routing
B. scalability
C. default route origination
D. multi vendor support
E. link load balancing
F. hop count
Answer: B,D,E
Q8. Which type of area should you use in an enterprise OSPF deployment if you want to prevent propagation of type 5 LSAs but still allow the redistribution of external routes?
A. stub
B. totally stubby
C. backbone
D. NSSA
E. virtual link
Answer: D
Q9. Characterizing an existing network requires gathering as much information about the network as possible. Which of these choices describes the preferred order for the information-gathering process?
A. site and network audits, traffic analysis, existing documentation and organizational input
B. existing documentation and organizational input, site and network audits, traffic analysis
C. traffic analysis, existing documentation and organizational input, site and network audits
D. site and network audits, existing documentation and organizational input, traffic analysis
Answer: B
Explanation:
This section describes the steps necessary to characterize the existing network infrastructure and all sites. This process requires three steps:
Step 1. Gather existing documentation about the network, and query the organization to discover additional information. Organization input, a network audit, and traffic analysis provide the key information you need. (Note that existing documentation may be inaccurate.)
Step 2. Perform a network audit that adds detail to the description of the network. If possible, use traffic-analysis information to augment organizational input when you are describing the applications and protocols used in the network.
Step 3. Based on your network characterization, write a summary report that describes the health of the network. With this information, you can propose hardware and software upgrades to support the network requirements and the organizational requirements.
Q10. When there is a need for immunity to EMI for connecting locations that are greater than 100 meters apart, which two solutions can be utilized? (Choose two.)
A. multimode fiber
B. Fiber Channel
C. HVDC transmission lines
D. single-mode fiber
E. serial RS-232
F. Gigabit Ethernet 1000BASE-CX
Answer: A,D
Q11. Which three are features of LWAPP? (Choose three.)
A. firmware synchronization
B. local management of APs
C. configuration changes manually synced
D. encryption of control channel
E. configuration data only on the WLC
F. wireless control free operation
G. replaces 802.1x for authentication in wireless connections
Answer: A,D,E
Q12. Which two enterprise campus layers are combined in a medium-sized LAN? (Choose two.)
A. core
B. distribution
C. access
D. backbone
E. aggregation
Answer: A,B
Q13. Refer to the exhibit.
A standard, Layer 2 campus network design is pictured. Which numbered box represents the distribution layer?
A. #1
B. #2
C. #3
D. #4
Answer: B
Q14. Which Gigabit Ethernet media type provides the longest reach without a repeater?
A. 1000Base-CX
B. 1000Base-LX
C. 1000Base-SX
D. 1000Base-T
Answer: B
Q15. A remote office has a T1 WAN link to headquarters and a T1 Internet connection. The client requests WAN redundancy to headquarters with similar bandwidth. What two connection types satisfy this requirement? (Choose two.)
A. Secondary T1 WAN circuit
B. ISDN BRI
C. IPSec Tunnel over the Internet
D. DWDM l
E. POTS Line T1 WAN
Answer: A,C
Q16. In which network location should an external DNS server be placed?
A. campus data center
B. enterprise branch
C. internet
D. remote access
Answer: C