Q1. Which two statements describe how including Cisco IPoDWDM proactive protection in an optical design would minimize packet loss in the event of a fiber cut? (Choose two).
A. It uses the FEC field on the OTN frame to trigger protection.
B. It uses a "not to exceed" predefined BER threshold to cause traffic redirection.
C. It reroutes the optical circuit after an event that impacts service.
D. It is effective both when you have redundant and nonredundant Layer 3 MPLS paths.
Answer: AB
Q2. Your firm has been awarded a contract to design a Criminal Justice Information Services Version 5.0-compliant network utilizing advanced authentication policies. Which two methods could be utilized? (Choose two.)
A. biometric
B. PKI
C. UKI
D. password
Answer: AB
Q3. What is the definition of the ITIL framework?
A. an ISO framework that establishes a model for network management and contains guidelines for managing objects, the management database, and the application entity
B. a five-volume framework for service management that covers design, transition, and delivery of service, and from which the ISO 20000 was developed
C. a series of tools for process improvement that uses statistical methods to reduce defects in processes and manufacturing
D. a framework for enterprise architecture that provides a comprehensive approach for designing, planning, implementing, and governing an enterprise information architecture
E. a framework for enterprise IP Address Management (IPAM) based on the IANA trusted IP lease allocation scheme
Answer: B
Q4. Refer to the exhibit.
Which two options provide the best loop protection in this topology, regardless of a bridged domain configuration? (Choose two.)
A. PVRSTP on all switches
B. REP on all switches
C. MST on all switches
D. BPDU guard on Switch A and Switch D
E. 8032 on ring A-B-C-D
Answer: BE
Q5. You have been hired by a startup company to provide optical services using MPLS-TP. Which three options describe reasons to use the MPLS-TP standard in your design? (Choose three.)
A. MPLS-TP is a newer packet transport technology that replaces SONET/SDH.
B. MPLS-TP includes extensions to native MPLS OAM for fault detection, monitoring, and propagation.
C. MPLS-TP requires a routing protocol.
D. MPLS-TP uses an IANA assigned label 13 for OAM.
E. MPLS-TP uses Ethernet Y.1731 OAM.
Answer: ABD
Q6. ACME Corporation is integrating IPv6 into their network, which relies heavily on multicast distribution of data. Which two IPv6 integration technologies support IPv6 multicast? (Choose two.)
A. 6VPE
B. 6PE
C. dual stack
D. ISATAP
E. 6to4
F. IPv6INIP
Answer: CF
Q7. What are two benefits of using BFD for failure detection in the design of a network?
(Choose two.)
A. BFD can provide failure detection in less than one second.
B. BFD can be used as a generic and consistent failure detection mechanism for EIGRP, IS-IS, and OSPF.
C. BFD eliminates router protocol hello notification.
D. BFD can be used for all types of network interfaces.
E. BFD is independent of the network protocol.
Answer: AB
Q8. Which two factors can significantly affect the OSPF network convergence time? (Choose two.)
A. the tuning of OSPF LSA timers
B. the number of OSPF routes
C. the diameter of the OSPF network
D. different processor capabilities of devices
Answer: AD
Q9. A planned EBGP network will use OSPF to reach the EBGP peer addresses. Which of these conditions should be avoided in the design that could otherwise cause the peers to flap continuously?
A. An ACL blocks TCP port 179 in one direction.
B. IP addresses used to peer are also being sent via EBGP.
C. The OSPF area used for peering is nonbackbone (not area 0).
D. The routers are peered by using a default route sent by OSPF.
Answer: B
Q10. You are designing a network that includes IP QoS. Which two architectures could be used to ensure that IP QoS is implemented properly? (Choose two.)
A. Differentiated Services, where the user, with the assistance of the RSVP signaling protocol, reserves the resources end to end before sending the data
B. Integrated Services, where the user, with the assistance of the RSVP signaling protocol, reserves the resources end to end before sending the data
C. Integrated Services, which relies on the information carried within each packet to make resource-allocation decisions at each network node
D. Differentiated Services, which relies on the information carried within each packet to make resource-allocation decisions at each network node
E. Integrated Services, where the user, with the assistance of the DSCP signaling protocol, reserves the resources end to end before sending the data
Answer: BD
Q11. When a design calls for spanning VLANs across a campus network, what are two issues that need to be addressed in the design? (Choose two.)
A. network convergence
B. network accessibility
C. fault isolation
D. application scalability
E. user experience
Answer: AC
Q12. You are the lead network designer hired by Service Provider XYZ to deploy CoS functionality on the core MPLS network (P routers). The goal of the network design is to provide a complete CoS solution to all customers that purchase services such as dedicated Internet access, MPLS L3VPN, and L2VPN (pseudowire). Service Provider XYZ has these design requirements:
The network supports four service queues with equal treatment for delay, jitter, and packet loss.
Queues are numbered 0-3, where 0 is the default queue.
Three queues have one treatment.
One queue has either one or two treatments.
If your design includes eight CoS queues on the Service Provider XYZ MPLS PE router ingress (CE facing) interface, how will customer traffic be classified as it enters the MLS P routers?
A. The eight CoS queues in the MPLS P router are remapped to the eight CoS queues.
B. Traffic is classified on the MPLS PE routers on core facing interface. The DSCP value is mapped into EXP field where multiple EXP settings (2+) will be assigned to a single queue throughout the MPLS P routers.
C. Discard the traffic from the eight CoS queues that does not match the four CoS queues of the MPLS P routers.
D. The 8 CoS queues in the MPLS P router are remapped to four 4 flow-label queues.
Answer: B
Q13. Refer to the exhibit.
A service provider using IS-IS has designed this network with all core links at the Layer 2 control plane. How will they adjust the design to reduce the flooding of update packets?
A. Change the area type of the links to be level-1-2 to allow level-1 updates.
B. Change the network type of the links from broadcast to point-to-point.
C. Use IS-IS mesh groups.
D. Configure SPF timers to be more aggressive so that updates are more quickly cleared from the queue.
Answer: C
Q14. What is a key benefit of a layered network design?
A. cost savings
B. increased security
C. increased flexibility
D. decreased broadcast
Answer: C
Q15. A Service Provider is designing a solution for a managed CE service to a number of local customers using a single CE platform and wants to have logical separation on the CE platform using Virtual Routing and Forwarding (VRF) based on IP address ranges or packet length. Which is the most scalable solution to provide this type of VRF Selection process on the CE edge device?
A. Static Routes for Route Leaking
B. Policy Based Routing
C. Multi-Protocol BGP
D. OSPF per VRF Instance
Answer: B