Q1. Which three options are benefits of using VRFs within an enterprise network? (Choose three.)
A. simplifies configuration and troubleshooting
B. enables partitioning of network resources
C. enhances security between user groups
D. provides additional redundancy at Layer 3
E. allows for routing and forwarding separation
F. improves routing protocol convergence
Answer: B,C,E
Q2. Which three options are recommended practices when configuring VTP? (Choose three.)
A. Set the switch to transparent mode.
B. Set the switch to server mode.
C. Enable VLAN pruning.
D. Disable VLAN pruning.
E. Specify a domain name.
F. Clear the domain name.
Answer: A,D,E
Q3. Summary address blocks can be used to support which network application?
A. QoS
B. IPsec tunneling
C. Cisco TrustSec
D. NAT
E. DiffServ
Answer: D
Q4. DRAG DROP
Answer:
Q5. Voice and video-conferencing applications that support multistreaming use which protocol?
A. TCP
B. RTP
C. Multipath TCP
D. SCTP
Answer: D
Q6. What is one reason to implement Control Plane Policing?
A. allow OSPF routing protocol to advertise routes
B. protect the network device route processor from getting overloaded by rate limiting the incoming control plane packets
C. allow network devices to generate and receive packets
D. protect the data plane packets
Answer: B
Q7. Which authentication framework is used in wireless networks and point-to-point connections?
A. EAP
B. L2TP
C. TKIP
D. PPP
Answer: A
Q8. In which.OSI layer does.IS-IS operate?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
Answer: C
Q9. What two sensor types exist in an IDS/IPS solution? (Choose two.)
A. host
B. anomaly based
C. policy based
D. network based
E. signature
Answer: A,D
Q10. A network engineer is building a LAN design that includes Cisco NAC. What two characteristics of an out-of-band NAC deployment are important to consider when evaluating it for the design? (Choose two.)
A. supported by a limited number of switch models
B. never in-line with user traffic
C. aggregate client traffic is constrained to NAC server port speed
D. recommended if sharing ports between IP phones and PCs
E. supports real IP gateway (routed mode)
Answer: A,D
Q11. Which of the following two statements about Cisco NSF and SSO are the most relevant to the network designer? (Choose two.)
A. You can reduce outages to 1 to 3 seconds by using SSO in a Layer 2 environment or Cisco NSF with SSO in a Layer 3 environment.
B. SSO and NSF each require the devices to either be graceful restart-capable or graceful restart-aware.
C. In a fully redundant topology adding redundant supervisors with NSF and SSO may cause longer convergence times than single supervisors with tuned IGP timers
D. The primary deployment scenario for Cisco NSF with SSO is in the Distribution and Core layers.
E. Cisco NSF-aware neighbor relationships are independent of any tuned IGP timers
Answer: A,C
Q12. Which two options are VRF components. (Choose two.)
A. RIB
B. VSS
C. FIB
D. HSRP
Answer: A,C
Q13. When a Cisco ASA adaptive security appliance is configured for active/standby failover, which MAC address is used for the active unit?
A. the MAC address of the primary unit
B. the MAC address of the secondary unit
C. the virtual MAC address
D. the standby MAC address
Answer: A
Q14. What data center network layer provides service module integration, Layer 2 domain definitions, and default gateway redundancy?
A. core
B. aggregation
C. access
D. edge
Answer: B
Q15. Which two types of authentication mechanisms can be used by VRRP for security? (Choose two.)
A. SHA-1
B. MD5
C. SHA-256
D. plaintext authentication
E. PEAP
Answer: B,D