Q1. What are three key design principles when using a classic hierarchical network model? (Choose three.)
A. The core layer controls access to resources for security.
B. The core layer should be configured with minimal complexity.
C. The core layer is designed first, followed by the distribution layer and then the access layer.
D. A hierarchical network design model aids fault isolation.
E. The core layer provides server access in a small campus.
F. A hierarchical network design facilitates changes.
Answer: BDF
Q2. What are two benefits of following a structured hierarchical and modular design? (Choose two.)
A. Each component can be designed independently for its role.
B. Each component can be managed independently based on its role.
C. Each component can be funded by different organizations based on its role.
D. Each component can support multiple roles based on the requirements.
E. Each component can provide redundancy for applications and services.
Answer: AB
Q3. Which three factors slow down network convergence? (Choose three.)
A. constant interface flapping
B. lack of redundant paths
C. inconsistent topology states between routers
D. transport network failing to generate LoS
E. wrong summarization in ABRs
Answer: ACD
Q4. A new video multicast application is deployed in the network. The application team wants to use the 239.0.0.1 multicast group to stream the video to users. They want to know if this choice will impact the existing multicast design. What impact will their choice have on the existing multicast design?
A. Because 239.0.0.1 is a private multicast range, a flood of PIM packets that have to be processed by the CPU and hosts will be sent by the routers in the network.
B. Because 239.0.0.1 is a private multicast range, the rendezvous point has to send out constant group updates that will have to be processed by the CPU and hosts.
C. The multicast application sends too many packets into the network and the network infrastructure drops packets.
D. The 239.0.0.1 group address maps to a system MAC address, and all multicast traffic will have to be sent to the CPU and flooded out all ports.
Answer: D
Q5. What is a design aspect regarding multicast transport for MPLS Layer 3 VPNs using the Rosen Draft implementation?
A. LDP is the multicast control plane protocol.
B. Multicast traffic is forwarded over GRE tunnels.
C. Multicast traffic is forwarded over LDP or RSVP signaled LSPs.
D. Using the MDT SAFI in BGP ensures that PIM can be disabled in the core.
Answer: B
Q6. Your company experienced a number of network incidents that had a significant impact on business operations. Because a root cause cannot be identified, your CTO asks you to help the network management team implement the FCAPS framework. On which two areas would you provide guidance to the network management team? (Choose two.)
A. change management
B. accounting management
C. service level management
D. fault management
Answer: BD
Q7. What are two design advantages to using virtual port channel? (Choose two.)
A. enhanced system availability through multiple systems
B. reduced Spanning Tree Protocol convergence time
C. loop management without use of Spanning Tree Protocol
D. ability to use Spanning Tree Protocol blocked ports to forward traffic
E. enhanced ability to recover from Spanning Tree Protocol changes
Answer: AC
Q8. A network design includes a long signaling delay in notifying the Layer 3 control plane that an interface has failed. Which two of these actions would reduce that delay? (Choose two.)
A. Enable lower data link layer recovery systems to have an opportunity to restore the interface.
B. Increase the notification of interface flaps.
C. Reduce the time for the network to reconverge.
D. Increase network stability.
Answer: AD
Q9. You are designing a core MPLS-based network with a single OSPF area with no external routes. Which two mechanisms can be used to improve convergence time during a failure? (Choose two.)
A. incremental SPF
B. route filtering
C. graceful restart
D. BFD
Answer: AD
Q10. As part of a new network design, you are helping the Network Management Team to develop a proactive report to identify places in the network where problems may happen. The network management tool can poll the network devices only via SNMP GET operations. Which two threshold-crossing metrics should you include in this report? (Choose two.)
A. packet loss
B. CPU utilization
C. heat dissipation
D. IP reachability
E. energy consumption
F. link bandwidth utilization
Answer: BF
Q11. Refer to the exhibit.
You must ensure that both core A and core B devices have only the minimum information required for reaching the spoke routers yet maintain full reachability during network failures.
Which of the following design solutions accomplishes these requirements?
A. Route summarization, with specific route leaking on hubs A and B
B. Route summarization, with GRE tunnel on hubs A and B
C. Implement PfR enhancements on hubs A and B.
D. Implement ODR for hub-to-spoke routing.
Answer: B
Q12. When creating a network design that routes an IGP over L2VPNs, with which device does the remote CE router form an IGP adjacency?
A. the hub site PE router
B. the hub site CE router
C. the directly connected PE router
D. The IGP will not establish adjacency over the MPLS network.
Answer: B
Q13. Which option is a benefit of using N-Port Virtualization?
A. reduces the amount of domain IDs that are used in the fabric
B. does not need to create zoning
C. reduces latency when using local switching on Fibre Channel ports
D. allows trunking to the upstream switch
E. does not need to configure the upstream switches
Answer: A
Q14. A Service Provider network designer is considering the use of the G.8032 Ethernet Ring Protection mechanism in order to provide resiliency in the network. Which three concepts will be supported with the implementation G.8032? (Choose three.)
A. Ring Protection Link (RPL)
B. Ring Automatic Protection Switching (R-APS)
C. Multi-Router Automatic Protection Switching (MR-APS)
D. Automatic Protection Switching (APS) Channel
Answer: ABD
Q15. You are the lead network designer hired by Service Provider XYZ to deploy CoS functionality on the core MPLS network (P routers). The goal of the network design is to provide a complete CoS solution to all customers that purchase services such as dedicated internet access, MPLS L3VPN, and L2VPN (pseudowire). Service Provider XYZ has these design requirements:
The network supports four service queues with equal treatment for delay, jitter, and packet loss.
Queues are numbered 0-3, where 0 is the default queue.
Three queues have one treatment.
One queue has either one or two treatments.
How would you design your solution to map the DSCP value properly so that the traffic is assigned to the respective queues in the Service Provider XYZ MPLS core network?
A. Classify traffic according to DSCP value into appropriate P router queues.
B. Map the appropriate DSCP value into the EXP field based on the number of queues in the MPLS P routers.
C. Map the appropriate DSCP value into the EXP field based on the number of queues in the MPLS PE routers.
D. Based on the DSCP value, traffic is mapped automatically into appropriate queues in the MPLS CE routers.
Answer: C