Q1. A Mobile Service Provider would like to design and deploy an Ethernet service which has similar physical link failover/failback characteristics on the active/backup links as the APS/MSP SONET properties. Which Layer 2 services should be considered to address this design feature?
A. Port-Channel
B. MLPPP
C. Flex Link
D. Ethernet Pseudowires
Answer: C
Q2. You are working on a network design for Customer A. This design should consider fast convergence features, and it was agreed that BFD should be used for faster link-transition detection. Which three options apply to the use of the echo function in BFD? (Choose three.)
A. It can be used with asynchronous mode.
B. BFD control packets are not required.
C. It can be enabled individually in each direction.
D. It has the advantage of testing the forwarding path on the remote system.
E. The rate of periodic transmission of BFD control packets should be increased.
Answer: ACD
Q3. A company plans to establish a new network using Cisco Catalyst switches for its multicast applications. What is the disadvantage when two multicast applications are using the multicast IP addresses 234.17.4.5 and 234.145.4.5 inside the same network?
A. Multicast packets from both applications are flooded to all Layer 2 ports in a segment where a multicast receiver is located.
B. Multicast packets from both applications are flooded to ports where one multicast receiver from one application is located.
C. Only one multicast stream is received at the port where the receivers from both applications are located.
D. Both multicast senders will always receive the multicast packets from the other multicast application.
E. The routers doing PIM-SM cannot distinguish between the two multicast applications.
Answer: B
Q4. Refer to the exhibit.
A customer runs OSPF with Area 5 between its aggregation router and an internal router. When a network change occurs in the backbone, Area 5 starts having connectivity issues due to the SPF algorithm recalculating an abnormal number of times in Area 5. You are tasked to redesign this network to increase resiliency on the customer network with the caveat that Router B does not support the stub area. How can you accomplish this task?
A. Set Area 5 to stubby at the ABR anyway.
B. Increase the bandwidth on the connection between Router A and Router B.
C. Turn on LSA throttling on all devices in Area 5.
D. Implement LSA filtering on the ABR, allowing summary routes and preventing more specific routes into Area 5.
E. Create a virtual link to Area 0 from Router B to the ABR.
Answer: D
Q5. To meet specific business requirements, QoS-marked traffic must be sent over a dedicated link. Which technology fulfills this requirement?
A. MPLS
B. Q-in-Q tunneling
C. policy-based routing
D. EIGRP with modified metrics
Answer: C
Q6. Which restriction prevents a designer from using a GDOI-based VPN to secure traffic that traverses the Internet?
A. Enterprise host IP addresses are typically not routable.
B. GDOI is less secure than traditional IPsec.
C. Network address translation functions interfere with tunnel header preservation.
D. The use of public addresses is not supported with GDOI.
Answer: C
Q7. You are the SAN designer for the ABC Company. Due to budget constraints, there is increased pressure by management to further optimize server utilization by implementing virtualization technologies on all servers and increase virtual machines density. Faced with some SAN challenges, the server team requests your help in the design and implementation of the SAN in the new virtualized environment.
In which two ways can NPIV be used in your proposed design? (Choose two.)
A. NPIV is used to assign multiple FCIDs to a single N Port.
B. NPIV is used to define and bind multiple virtual WWNs (VIs) to a single physical pWWN.
C. You recommend NPIV so that hosts can be members of different zones.
D. NPIV can be used to allow multiple applications on the same port to use different IDs in the same VSAN.
Answer: AD
Q8. Which mechanism provides a Layer 2 fault isolation between data centers?
A. TRILL
B. LISP
C. advanced VPLS
D. OTV
E. fabric path
Answer: D
Q9. There is an MPLS-enabled link constantly flapping on an MPLS VPN network. Given that the network runs OSPF as the IGP protocol, which design mechanism will stabilize the network and avoid constant reconvergences?
A. BFD
B. IP Event Dampening
C. OSPF fast hellos
D. partial SPF
Answer: B
Q10. A company is planning to connect its 30 sites with a VPLS WAN backbone. A router at each site should establish neighborships with all other routers using the OSPF routing protocol. Which three points must be considered regarding DR and BDR when different router platforms are used? (Choose three.)
A. It is a best practice that the routers with the most powerful hardware should take the role of the DR and BDR.
B. If the IP OSPF priority is the same for all routers, the highest loopback IP address and router ID will decide which routers will take the DR and BDR role during the selection process.
C. To select the DR and BDR, the IP OSPF priority must be set to a higher value than the default value at the DR and BDR during the selection process.
D. To select the DR and BDR, the IP OSPF priority must be set to a lower value than the default value at the DR and BDR during the selection process.
E. The role for the DR and BDR will be selected when a new OSPF router comes up.
F. To force two routers to become a DR and a BDR, the IP OSPF priority can be set to zero at all other OSPF routers.
Answer: ABF
Q11. Refer to the exhibit.
In this BGP design, what is the next hop for 10.1.1.0/24 on R8 and R7?
A. The next hop for 10.1.1.0/24 on R7 is R8 and the next hop for R8 is R7.
B. The next hop for 10.1.1.0/24 on R7 is R5 and the next hop for R8 is R6.
C. The next hop for 10.1.1.0/24 on R7 is R6 and the next hop for R8 is R5.
D. The next hop for 10.1.1.0/24 on R7 is R3 and the next hop for R8 is R4.
Answer: A
Q12. Refer to the exhibit.
Which two options provide the best loop protection in this topology, regardless of a bridged domain configuration? (Choose two.)
A. PVRSTP on all switches
B. REP on all switches
C. MST on all switches
D. BPDU guard on Switch A and Switch D
E. 8032 on ring A-B-C-D
Answer: BE
Q13. A customer wants to understand the benefits of a proposed network design that utilizes SNMPv3. Which two network threats is SNMPv3 effective against? (Choose two.)
A. modification of information threats
B. masquerade threats
C. denial of service threats
D. traffic analysis threats
Answer: AB
Q14. Your organization is working on a design solution for a new Internet-based remote access virtual private network that has 1000 remote sites. A network administrator recommends GETVPN as the model because the network of today uses DMVPN, which results in a lot of background NHRP control traffic. What is a potential problem with using GETVPN for this design solution?
A. GETVPN would require a high level of background traffic to maintain its IPsec SAs.
B. GETVPN is not scalable to a large number of remote sites.
C. GETVPN and DMVPN will not interoperate.
D. GETVPN key servers would be on public, hacker-reachable space and need higher security.
Answer: D
Q15. Refer to the exhibit.
Your company designed a network to allow server VLANs to span all access switches in a data center. In the design, Layer 3 VLAN interfaces and HSRP are configured on the aggregation switches. Which two features will improve STP stability within the network design? (Choose two.)
A. BPDU guard on access ports
B. Edge port on access ports
C. Root guard on access ports
D. BPDU guard on the aggregation switch downlinks toward access switches
E. Root guard on the aggregation switch downlinks toward access switches
F. Access switch pairs are explicitly determined to be root and backup root bridges
Answer: AE