Q1. A switched network is being designed to support a manufacturing factory. Due to cost constraints, fiber-based connectivity is not an option. Which design allows for a stable network when there is a risk of interference from the manufacturing hardware in use on the factory floor? A. Design the network to include UDLD to detect unidirectional links and take them out…
Q1. Refer to the exhibit. You must ensure that both core A and core B devices have only the minimum information required for reaching the spoke routers yet maintain full reachability during network failures. Which of the following design solutions accomplishes these requirements? A. Route summarization, with specific route leaking on hubs A and B B. Route summarization, with GRE tunnel on hubs A…
Q1. Refer to the exhibit. The design is being proposed for use within the network. The CE devices are OSPF graceful restart-capable, and the core devices are OSPF graceful restart-aware. The WAN advertisements received from BGP are redistributed into OSPF. A forwarding supervisor failure event takes place on CE A. During this event, how will the routes learned from the WAN…
Q1. Network designers plan to interconnect two geographically separated data centers using an Ethernet-over-MPLS pseudowire. Within that design, the link between the sites is stable, there are no apparent loops in the topology, and the root bridges for the respective VLANs are stable and unchanging. What additional aspect of the design should be adjusted to mitigate the chance of connectivity…
Q1. You are designing a Group Encrypted Transport Virtual Private Network solution consisting of 30 group members. Which measure helps protect encrypted user traffic from replay attacks? A. counter-based anti-replay B. time-based anti-replay C. nonce payload D. RSA-encrypted nonce E. digital certificates View AnswerAnswer: B Q2. You have been tasked with designing a data center interconnect to provide business continuity. You want to encrypt the traffic over…
Q1. Your enterprise customer has asked where they should deploy flow monitoring in their network to monitor traffic between branch offices. What is your design recommendation? A. at the edge of the network so that user traffic will be seen B. at the central site, because all traffic from the remotes will be seen there. C. in the core, because all traffic will…
Q1. AS100 and AS200 each have two peering points in different parts of their network. AS100 would like to use one of the links and keep the other link as backup. What should be changed for the design inside AS100 for prefixes received from AS200? A. MED B. weight C. AS-PATH D. local preference View AnswerAnswer: D Q2. Refer to the exhibit. You are designing an IPv4…
Q1. Which three factors slow down network convergence? (Choose three.) A. constant interface flapping B. lack of redundant paths C. inconsistent topology states between routers D. transport network failing to generate LoS E. wrong summarization in ABRs View AnswerAnswer: ACD Q2. You are hired to design a solution that will improve network availability for users on a campus network with routed access. If the budget limits you…
Q1. Which two features can be used to extend VRFs across a campus? (Choose two.) A. 802.1q trunks B. LDP C. MPLS TE D. GRE E. port channels View AnswerAnswer: AD Q2. You are the lead network designer hired by Service Provider XYZ to deploy CoS functionality on the core MPLS network (P routers). The goal of the network design is to provide a complete CoS solution…
Q1. A junior engineer is implementing one of your optical designs and asks about CWDM (Coarse Wavelength Division Multiplexing). Which two features describe CWDM? (Choose two.) A. typically used over long distances, but requires optical amplification B. allows up to 32 optical carriers to be multiplexed onto a single fiber C. shares the same transmission window as DWDM D. uses the 850-nm band E. Passive…
Q1. Service provider XYZ plans to provide dedicated Internet access and MPLS L3VPN services to business customers. XYZ has these design specifications: . MP-BGP running on the core MPLS P routers with external Internet routes. . The core network will include 16 Point of Presence IP POPs throughout the Asia-Pacific region. . An additional nine non-P routers will use EBGP peering with…
Q1. You are designing an Out of Band Cisco Network Admission Control, Layer 3 Real-IP Gateway deployment for a customer. Which VLAN must be trunked back to the Clean Access Server from the access switch? A. untrusted VLAN B. user VLAN C. management VLAN D. authentication VLAN View AnswerAnswer: A Q2. A service provider has a Resilient Ethernet Protocol ring running as a metro backbone between…
Q1. A customer wants to understand the benefits of a proposed network design that utilizes SNMPv3. Which two network threats is SNMPv3 effective against? (Choose two.) A. modification of information threats B. masquerade threats C. denial of service threats D. traffic analysis threats View AnswerAnswer: AB Q2. Refer to the exhibit. Service Provider A and Service Provider B have agreed to a strategic interconnect relationship that will…
Q1. Which two statements describe how including Cisco IPoDWDM proactive protection in an optical design would minimize packet loss in the event of a fiber cut? (Choose two). A. It uses the FEC field on the OTN frame to trigger protection. B. It uses a "not to exceed" predefined BER threshold to cause traffic redirection. C. It reroutes the optical circuit after an…
Q1. A network designer has provisioned a router to use IPsec to encrypt the traffic over a GRE tunnel going to a web server at a remote location. From the router, the network designer can ping the web server, although the users in the office comment that they are unable to reach it. (Note: The DF bit is not set.)…
Q1. A data center provider has designed a network using these requirements: Two data center sites are connected to the public Internet. Both data centers are connected to different Internet providers. Both data centers are also directly connected with a private connection for the internal traffic, and public Internet traffic can also be routed at this direct connection. The data center provider has only…
Q1. What are three key design principles when using a classic hierarchical network model? (Choose three.) A. The core layer controls access to resources for security. B. The core layer should be configured with minimal complexity. C. The core layer is designed first, followed by the distribution layer and then the access layer. D. A hierarchical network design model aids fault isolation. E. The core…
Q1. As part of the network design, ACME Corporation requires the ability to export IPv6 information to better manage its network. Which version of NetFlow records is required to export this information? A. 5 B. 6 C. 7 D. 8 E. 9 View AnswerAnswer: E Q2. A company wants to use SSM as the multicast routing protocol inside its network. Some of its multicast applications do not…
Q1. Refer to the exhibit. Acme Corporation hired you as a network designer to upgrade their network so that it supports IPv4 and IPv6 multicast. Which two protocols are needed on the LAN switch? (Choose two.) A. PIM sparse mode B. IGMP snooping C. PIM snooping D. Source Specific Multicast E. MLD snooping View AnswerAnswer: BE Q2. Refer to the exhibit. Your company designed a network to allow server…
Q1. When designing a WAN that will be carrying real-time traffic, what are two important reasons to consider serialization delay? (Choose two.) A. Serialization delays are variable because they depend on the line rate of the interface and on the type of the packet being serialized. B. Serialization delay depends not only on the line rate of the interface but also on…
Q1. When designing a network, which two security features should be added to the design to protect hosts from potential IPv6 neighbor discovery denial of service attacks at the access layer? (Choose two.) A. SEND B. RA Guard C. IKEv2 D. IPsec E. DMVPNv6 View AnswerAnswer: AB Q2. You are designing a network that includes IP QoS. Which two architectures could be used to ensure that IP…
Q1. You have been hired by a startup company to provide optical services using MPLS-TP. Which three options describe reasons to use the MPLS-TP standard in your design? (Choose three.) A. MPLS-TP is a newer packet transport technology that replaces SONET/SDH. B. MPLS-TP includes extensions to native MPLS OAM for fault detection, monitoring, and propagation. C. MPLS-TP requires a routing protocol. D. MPLS-TP uses…
Q1. Refer to the exhibit. What limitations exist in this design, given that the access layer devices are expected to steadily increase by two devices per week for the next year? A. scalability B. serviceability C. redundancy D. resiliency View AnswerAnswer: A Q2. You are using iSCSI to transfer files between a 10 Gigabit Ethernet storage system and a 1 Gigabit Ethernet server. The performance is only…
Q1. You are designing an IPv4 any source multicast redundancy solution. Which technology ensures the quickest RP convergence? A. Auto-RP B. Embedded RP C. bootstrap router D. MSDP anycast RP View AnswerAnswer: D Q2. You have designed a network to support two offices connected by a T1. Your router serial interfaces will be configured with encapsulation PPP. What will happen to your EIGRP neighbors if there…
Q1. You are the lead network designer hired by Service Provider XYZ to deploy CoS functionality on the core MPLS network (P routers). The goal of the network design is to provide a complete CoS solution to all customers that purchase services such as dedicated internet access, MPLS L3VPN, and L2VPN (pseudowire). Service Provider XYZ has these design requirements: The network…
Q1. You are the lead IP/MPLS network designer of a service provider called XYZ. You are leading a design discussion regarding IPv6 implementation in the XYZ MPLS network, using MPLS 6PE/6VPE techniques. Currently, XYZ provides IPv4 multicast services over an MPLS network by using MVPN, and would like to provide parallel IPv6 multicast services. Which three multicast solutions should be…
Q1. In which two ways is IPv4 and IPv6 traffic handled in a network design that uses QoS deployment options? (Choose two.) A. IPv6 and IPv4 traffic is treated in the same way by using a single QoS policy that classifies and matches on both protocols. B. IPv6 traffic is treated differently than IPv4 by using the flow-label field, which is built…
Q1. A metro service provider is planning Resilient Ethernet Protocol for his backbone. Which two aspects must be considered before the network design is finalized? (Choose two.) A. Two Resilient Ethernet Protocol segments can be connected redundantly at two points. One connection will be blocked, using the Spanning Tree Protocol defined in IEEE 802.1D. B. UniDirectional Link Detection Protocol can be enabled…
Q1. You are designing the QoS features for a large enterprise network that includes DMVPN. When would you need to configure QoS preclassify? A. when you are marking packets with the DSCP bits B. when you are marking packets with the TOS bits C. when your service provider requires the DSCP bits be set D. when the QoS policy cannot be based on DSCP…
Q1. Which two statements describe how including Cisco IPoDWDM proactive protection in an optical design would minimize packet loss in the event of a fiber cut? (Choose two). A. It uses the FEC field on the OTN frame to trigger protection. B. It uses a "not to exceed" predefined BER threshold to cause traffic redirection. C. It reroutes the optical circuit after an…
Q1. Acme Corporation wants to minimize the risk of users plugging unauthorized switches and hubs into the network. Which two features can be used on the LAN access ports to support this design requirement? (Choose two.) A. BPDU Guard B. PortFast C. Loop Guard D. Port Security E. UDLD View AnswerAnswer: AD Q2. Which two techniques are used in a network design to slow down the distribution…
Q1. You are designing a network for a branch office. In order to improve convergence time, you are required to use the BFD feature. Which four routing protocols can you use to facilitate this? (Choose four.) A. EIGRP B. IS-IS C. BGP D. static E. RIP View AnswerAnswer: ABCD Q2. What are two benefits of following a structured hierarchical and modular design? (Choose two.) A. Each component can…
Q1. You are designing a NAC OOB Layer 3 Real-IP Gateway deployment for a customer. Which VLAN must be trunked back to the Clean Access Server from the access switch? A. untrusted VLAN B. user VLAN C. management VLAN D. authentication VLAN View AnswerAnswer: A Q2. When you design a network, when would it be required to leak routes into a Level 1 area? A. when a…
Q1. A Mobile Service Provider would like to design and deploy an Ethernet service which has similar physical link failover/failback characteristics on the active/backup links as the APS/MSP SONET properties. Which Layer 2 services should be considered to address this design feature? A. Port-Channel B. MLPPP C. Flex Link D. Ethernet Pseudowires View AnswerAnswer: C Q2. You are working on a network design for Customer A.…
Q1. You are using iSCSI to transfer files between a 10 Gigabit Ethernet storage system and a 1 Gigabit Ethernet server. The performance is only approximately 700 Mb/s and output drops are occurring on the server switch port. Which action will improve performance in a cost-effective manner? A. Use a WRED random drop policy. B. Increase the queue to at least 1…
Q1. Refer to the exhibit. A new IPv4 multicast-based video-streaming service is being provisioned. During the design-validation tests, you realize that the link between the two buildings is carrying multicast traffic even when there are no receivers connected to the switch in Building B and despite IGMP snooping being enabled on both Layer 2 switches and IGMPv2 runs on the hosts.…