Q1. A company's virtualization team wants to transfer control of network switching and policy
management for VMware virtual servers to the networking team. What Cisco network virtualization solution should be implemented?
A. Unified Computing System
B. Nexus distributed virtual switch
C. virtual network agent
D. Nexus unified fabric switch
Answer: B
Q2. Which two modes does LACP support? (Choose two.)
A. on
B. passive
C. associated
D. link
Answer: A,B
Q3. A company has hired an entry-level network administrator for its new data center. The company CIO wants to give the administrator limited access on the newly configured Cisco Nexus 7000. Which feature should be used to allow limited access?
A. NAC
B. VDC
C. RBAC
D. vPC
Answer: C
Q4. Which two WAN technologies support IEEE 802.1Q, site-to-site connectivity, and point-to-point connectivity between two offices? (Choose two.)
A. Ethernet over MPLS
B. VPLS
C. Layer 3 MPLS
D. DSL
E. cable
Answer: A,B
Q5. Which option is a common cause of congestion found in a campus network?
A. input serialization delay
B. output serialization delay
C. Rx-queue starvation
D. Tx-queue starvation
Answer: D
Q6. What network technology provides Layer 2 high availability between the access and distribution layers?
A. HSRP
B. MEC
C. EIGRP
D. GLBP
Answer: B
Q7. A network engineer has implemented a looped triangle switch block design. What element must be included in the design?
A. first hop redundancy protocol
B. Layer 2 links between access switches
C. single uplinks between access and distribution switches
D. VLANs that span access switches
E. Layer 3 links between distribution switches
Answer: A
Q8. What data center network layer provides service module integration, Layer 2 domain definitions, and default gateway redundancy?
A. core
B. aggregation
C. access
D. edge
Answer: B
Q9. Summary address blocks can be used to support which network application?
A. QoS
B. IPsec tunneling
C. Cisco TrustSec
D. NAT
E. DiffServ
Answer: D
Q10. What are two characteristics of Server Load Balancing router mode? (Choose two.)
A. The design supports multiple server subnets.
B. An end-user sees the IP address of the real server.
C. SLB routes between the outside and inside subnets.
D. The source or destination MAC address is rewritten, but the IP addresses left alone.
E. SLB acts as a "bump in the wire" between servers and upstream firewall or Layer 3 devices.
Answer: A,C
Q11. What WAN feature can prioritize real-time, IP-based applications when circuits may be saturated?
A. FRTS
B. LLQ
C. CBWFQ
D. WFQ
Answer: B
Q12. Which of the following is true concerning best design practices at the switched Access layer of the traditional layer2 Enterprise Campus Network?
A. Cisco NSF with SSO and redundant supervisors has the most impact on the campus in the Access layer
B. Provide host-level redundancy by connecting each end device to 2 separate Access switches
C. Offer default gateway redundancy by using dual connections from Access switches to redundant Distribution layer switches using a FHRP
D. Include a link between two Access switches to support summarization of routing information from the Access to the Distribution layer
Answer: A
Q13. Which algorithm does IS-IS use to determine the shortest path through a network?
A. Bellman-Ford routing algorithm
B. Johnson's.algorithm
C. Dijkstra's algorithm
D. Floyd-Warshall algorithm
Answer: C
Q14. What is the recommended subnet between two sites that have a point-to-point connection to conserve IP addresses?
A. 255.255.255.0
B. 255.255.252.0
C. 255.255.255.252
D. 255.255.255.240
Answer: C
Q15. Which two types of authentication mechanisms can be used by VRRP for security? (Choose two.)
A. SHA-1
B. MD5
C. SHA-256
D. plaintext authentication
E. PEAP
Answer: B,D