Q1. Refer to the exhibit.
Acme Corporation hired you as a network designer to upgrade their network so that it supports IPv4 and IPv6 multicast. Which two protocols are needed on the LAN switch? (Choose two.)
A. PIM sparse mode
B. IGMP snooping
C. PIM snooping
D. Source Specific Multicast
E. MLD snooping
Answer: BE
Q2. Refer to the exhibit.
Your company designed a network to allow server VLANs to span all access switches in a data center. In the design, Layer 3 VLAN interfaces and HSRP are configured on the aggregation switches. Which two features will improve STP stability within the network design? (Choose two.)
A. BPDU guard on access ports
B. Edge port on access ports
C. Root guard on access ports
D. BPDU guard on the aggregation switch downlinks toward access switches
E. Root guard on the aggregation switch downlinks toward access switches
F. Access switch pairs are explicitly determined to be root and backup root bridges
Answer: AE
Q3. An IBGP mesh design is being scoped, and in the discussions, one of the design engineers proposes the use of route reflectors. Which limitation is valid when using route reflectors in this design?
A. The configuration complexity on the routers will be increased.
B. Route reflectors will limit the total number of routes in the topology.
C. Multipath information is difficult to propagate in a route reflector topology.
D. Route reflectors will cause an opportunity to create routing loops.
Answer: C
Q4. When network summaries are created for access networks in a network design, how does it change the behavior of the Shortest Path First (SPF) running in a backbone area?
A. There would be fewer incremental SPFs.
B. There would be fewer partial SPFs.
C. There would be fewer full SPFs.
D. There would be no change with the SPFs.
Answer: B
Q5. Which mechanism provides a Layer 2 fault isolation between data centers?
A. TRILL
B. LISP
C. advanced VPLS
D. OTV
E. fabric path
Answer: D
Q6. Your organization is working on a design solution for a new Internet-based remote access virtual private network that has 1000 remote sites. A network administrator recommends GETVPN as the model because the network of today uses DMVPN, which results in a lot of background NHRP control traffic. What is a potential problem with using GETVPN for this design solution?
A. GETVPN would require a high level of background traffic to maintain its IPsec SAs.
B. GETVPN is not scalable to a large number of remote sites.
C. GETVPN and DMVPN will not interoperate.
D. GETVPN key servers would be on public, hacker-reachable space and need higher security.
Answer: D
Q7. You are designing a Group Encrypted Transport Virtual Private Network solution consisting of 30 group members. Which measure helps protect encrypted user traffic from replay attacks?
A. counter-based anti-replay
B. time-based anti-replay
C. nonce payload
D. RSA-encrypted nonce
E. digital certificates
Answer: B
Q8. A company would like to distribute a virtual machine (VM) hosting cluster between three data centers with the capability to move VMs between sites. The connectivity between data centers is IP only and the new design should use the existing WAN. Which Layer 2 tunneling technology do you recommend?
A. VPLS
B. L2TPv3
C. OTV
D. AToM
Answer: C
Q9. Which two OSPF design considerations should you implement to support the eventual growth of a network, so that CPU and memory are unaffected by the size and complexity of the link-state database in a large service provider network? (Choose two.)
A. Turn on route dampening.
B. Create network summaries.
C. Turn on the Incremental SPF feature.
D. Add more memory.
E. Turn on packet pacing.
F. Add redundancy between critical locations.
Answer: CE
Q10. In which two ways is a network design improved by the inclusion of IP Event Dampening? (Choose two.)
A. reduces processing load
B. provides sub-second convergence
C. improves network stability
D. prevents routing loops
E. quickly detects network failures
Answer: AC
Q11. Which two options are characteristics of firewall transparent mode operations in a firewall solution design? (Choose two.)
A. The firewall acts like a router hop in the network.
B. OSPF adjacencies can be established through the firewall.
C. Changes in the existing IP addressing and subnets are required.
D. Multicast traffic can traverse the firewall.
E. The firewall can participate actively on spanning tree.
Answer: BD
Q12. When designing a large full mesh network running OSPF, how would you reduce LSA repetition?
A. Elect a DR and BDR.
B. Use access control lists to control outbound advertisements.
C. Choose one or two routers to re-flood LSA information.
D. Put each of the point-to-point links in your full mesh networking into a separate area.
Answer: C
Q13. Which design concern should be accounted for in all Layer 3 virtualization technologies?
A. Layer 3 redundancy
B. packet sizing
C. application usage
D. Layer 3 stability
Answer: B
Q14. Which mechanism should be added to a network design to identify unidirectional Spanning Tree Protocol failures through BPDU loss?
A. UDLD
B. loop guard
C. BPDU guard?
D. root guard
Answer: B
Q15. A network administrator is in charge of multiple IPsec VPN headend devices that service thousands of remote connectivity, point-to-point, IPsec/GRE tunnels. During a recent power outage, in which it was found that a backup power supply in one of those headend devices was faulty, one of the headend routers suffered a complete shutdown event. When the router was successfully recovered, remote users found intermittent connectivity issues that went away after several hours. Network operations staff accessed the headend devices and found that the recently recovered unit was near 100% CPU for a long period of time. How would you redesign the network VPN headend devices to prevent this from happening again in the future?
A. Move the tunnels more evenly across the headend devices.
B. Implement Call Admission Control.
C. Use the scheduler allocate command to curb CPU usage.
D. Change the tunnels to DMVPN.
Answer: B