Q1. Refer to the exhibit.
A network engineer manually reconfigures the BGP configuration on newly upgraded router R1. However, the BGP neighbor relationship does not come up with the directly connected neighbor router. What is causing the failure of the BGP neighbor relationship between routers R1 and R2?
A. An incorrect neighbor IP address for router R2 is configured on router R1.
B. An incorrect neighbor AS number is configured on router R1 for router R2.
C. The wrong BGP authentication password is configured on router R1.
D. Router R1 must configure the R2 loopback address as the neighbor IP address.
Answer: C
Q2. Which option is the Cisco preferred, most versatile, and highest-performance way to deploy IPv6 in existing IPv4 environments?
A. dual stack
B. hybrid
C. service block
D. dual service
Answer: A
Q3. Which technology allows multiple instances of a routing table to coexist on the same router simultaneously?
A. VRF
B. Cisco virtual router
C. instanced virtual router
D. IS-IS
Answer: A
Q4. Which option is a benefit of the vPC+ feature?
A. Cisco FabricPath is not required in the network domain.
B. This feature provides fault domain separation.
C. Nonfabric devices, such as a server or a classic Ethernet switch, can be connected to two fabric switches that are configured with vPC.
D. The control plane and management plane are combined into one logical plane.
Answer: C
Q5. When a Cisco ASA adaptive security appliance is configured for active/standby failover, which MAC address is used for the active unit?
A. the MAC address of the primary unit
B. the MAC address of the secondary unit
C. the virtual MAC address
D. the standby MAC address
Answer: A
Q6. Which IPv6 transition model should be utilized when two or more independent transition mechanisms are required?
A. tunneling
B. dual stack
C. service block
D. hybrid
E. manual
Answer: D
Q7. Which of the following is a result when designing multiple EIGRP autonomous systems within the Enterprise Campus network?
A. Improves scalability by dividing the network using summary routes at AS boundaries
B. Decreases complexity since EIGRP redistribution is automatically handled in the background
C. Reduces the volume of EIGRP queries by limiting them to one EIGRP AS
D. Scaling is improved when a unique AS is run at the Access, Distribution, and Core layers of the network
Answer: A
Q8. When considering the design of the E-Commerce topology which of the following are true?
A. One-armed SLB design with multiple security contexts removes the need for a separate firewall in the core layer
B. Two-firewall-layer SLB design considers the aggregation and access layers to be trusted zones, requiring no security between the web, application, and database zones
C. One-armed SLB design with two firewall layers ensures that non load-balanced traffic still traverses the ACE so that the health and performance of the servers is still being monitored
D. In all cases there will be configuration requirements for direct access to any servers or for nonload-balanced sessions initiated by the servers
Answer: A
Q9. Which of the following facts must be considered when designing for IP telephony within an Enterprise Campus network?
A. Because the IP phone is a three-port switch, IP telephony extends the network edge, impacting the Distribution layer.
B. Video and voice are alike in being bursty and bandwidth intensive, and thus impose requirements to be lossless, and have minimized delay and jitter.
C. IP phones have no voice and data VLAN separation, so security policies must be based on upper layer traffic characteristics.
D. Though multi-VLAN access ports are set to dot1q and carry more than two VLANs they are not trunk ports.
Answer: D
Q10. An engineer is attempting to improve OSPF network performance and discovers that the entire SPT recomputes.whenever a type 1 or type 2 LSA is received within an area.
Which action can optimize SPT operations?
A. Tune LSA throttling thresholds.
B. Enable incremental SPF.
C. Configure totally stubby areas throughout the domain.
D. Summarize networks on all ABRs.
Answer: B
Q11. Which two of these are correct regarding the recommended practice for distribution layer design? (Choose two.)
A. use a redundant link to the core
B. use a Layer 2 link between distribution switches
C. never use a redundant link to the core because of convergence issues
D. use a Layer 3 link between distribution switches with route summarization
E. use a Layer 3 link between distribution switches without route summarization
Answer: A,D
Q12. Which protocol will not adhere to the design requirement of the control plane being either separated or combined within a virtualization technology?
A. FHRP
B. STP
C. CEF
D. NSF with SSO
Answer: B
Q13. Which QoS mechanism uses RSVP?
A. IntServ
B. DiffServ
C. CoS
D. ToS
Answer: A
Q14. Which of the following is most accurate with respect to designing high availability within the Enterprise Campus network?
A. High availability at and between the Distribution and Access layers is as simple as redundant switches and redundant Layer 3 connections
B. Non-deterministic traffic patterns require a highly available modular topology design
C. Distribution layer high availability design includes redundant switches and Layer 3 equal-cost load sharing connections to the switched Access and routed Core layers, with a Layer 3 link between the Distribution switches to support summarization of routing information from the Distribution to the Core
D. Default gateway redundancy allows for the failure of a redundant Distribution switch without affecting endpoint connectivity
Answer: D
Q15. Which VPN technology supports dynamic creation of spoke-to-spoke VPN tunnels to provide a scalable design?
A. IPsec
B. GRE over IPsec
C. DMVPN
D. GRE
Answer: C