Q1. You are designing a Group Encrypted Transport Virtual Private Network solution consisting of 30 group members. Which measure helps protect encrypted user traffic from replay attacks?
A. counter-based anti-replay
B. time-based anti-replay
C. nonce payload
D. RSA-encrypted nonce
E. digital certificates
Answer: B
Q2. You have been tasked with designing a data center interconnect to provide business continuity. You want to encrypt the traffic over the DCI using IEEE 802.1AE MACsec to prevent the deployment of any firewall or IPS. Which two interconnect technologies support MACsec? (Choose two.)
A. EoMPLS
B. MPLS Layer 3 VPN
C. DMVPN
D. OTV
E. VPLS
F. GET VPN
Answer: AE
Q3. A network designer is redesigning an enterprise campus network to ensure that Ethernet switches proactively attempt to reconnect after a fiber cut. In the design, they will have to address areas where fiber cuts exist on campus from past troubleshooting, where a single fiber is disconnected in the fiber pair, leading to looping. Which feature could be implemented in the design to allow the Spanning Tree Protocol on the switches to be protected?
A. loop guard
B. UniDirectional Link Detection
C. UniDirectional Link Detection aggressive mode
D. root guard
Answer: C
Q4. Refer to the exhibit.
In this network design, where should summarization occur to provide the best summarization and optimal paths during a single-failure incident as well as during normal operation?
A. a single identical summary for all the branch offices placed on routers 1A, 1B, 2A, and 2B
B. two summaries on 1A and 1B, and two summaries on 2A and 2B
C. a single identical summary on 3A and 3B
D. a single summary on each aggregation device for the branches connected to them
Answer: C
Q5. Refer to the exhibit.
Acme Corporation hired you as a network designer to upgrade their network so that it supports IPv4 and IPv6 multicast. Which two protocols are needed on the LAN switch? (Choose two.)
A. PIM sparse mode
B. IGMP snooping
C. PIM snooping
D. Source Specific Multicast
E. MLD snooping
Answer: BE
Q6. You are a network designer and are responsible for ensuring that the network you design is secure. How do you plan to prevent infected devices on your network from sourcing random DDoS attacks using forged source addresses?
A. ACL-based forwarding
B. ACL filtering by destination
C. Unicast RPF loose mode
D. Unicast RPF strict mode
Answer: D
Q7. Refer to the exhibit.
This diagram depicts the design of a small network that will run EIGRP on R1 and R2, and EIGRP Stub on R3. In which two ways will this network be impacted if there is link instability between R1 and R2? (Choose two.)
A. R1 will have routes in its routing table that originate from R2 and R3.
B. R3 will have routes in its routing table that originate from R1 and R2.
C. R2 will have routes in its routing table that originate from R1 and R3.
D. R3 will be transit for traffic between R1 and R2.
E. R3 will not be transit for traffic between R1 and R2.
Answer: BE
Q8. In a large enterprise network with multiple data centers and thousands of access devices, OSPF is becoming unstable due to link flapping. The current design has the access devices multihomed to large aggregation routers at each of the data centers. How would you redesign the network to improve stability?
A. Add a layer of regional Layer 3 aggregation devices, but leave the ABR function on the data center aggregation routers.
B. Add a layer of regional Layer 2 aggregation devices, but leave the ABR function on the data center aggregation routers.
C. Add a layer of regional Layer 3 aggregation devices and move the ABR function to the regional aggregation device.
D. Add a layer of regional Layer 2 aggregation devices and move the ABR function to the regional aggregation device.
Answer: C
Q9. Refer to the exhibit.
If IEEE 802.1w is in use for this network design, what are two locations where spanning-tree root can be placed to ensure the least-disruptive Layer 2 failover for clients within VLANs 3 and 4? (Choose two.)
A. Switch A
B. Switch B
C. Switch C
D. Switch D
Answer: CD
Q10. Which statement about the behavior of OSPF on a hub-and-spoke topology is true?
A. Additional host routes are added to the routing table on a NBMA network type.
B. The DR and BDR election occurs regardless of the underlying OSPF network type.
C. The DR election is a challenge unless a point-to-point network type is used.
D. Traffic does not need to traverse the hub to reach the spokes.
Answer: C
Q11. A network designer wants to improve a company network design due to multiple network crashes. Which technology would allow for the restore of a network connection without informing the Layer 3 protocol?
A. Bidirectional Forwarding Detection
B. automatic protection switching
C. UniDirectional Link Detection
D. Ethernet OAM
Answer: B
Q12. You are redesigning an OSPF v2 network and must migrate some links. You are concerned that there are different subnet masks. Which two link types will still form an OSPF adjacency even if there are subnet mask mismatches? (Choose two.)
A. virtual
B. broadcast
C. point-to-multipoint
D. non-broadcast
E. point-to-point
Answer: AE
Q13. Refer to the exhibit.
Company A is running a single-area OSPF, and Company B is running RIP as the IGP with no overlapping IP address spaces. Company A has just acquired Company B and both networks must be merged. Which three design components are recommended to guarantee connectivity and redundancy between the two networks? (Choose three.)
A. Enable mutual redistribution between OSPF and RIP on one border router.
B. Enable mutual redistribution between OSPF and RIP on Router A and Router B using route tags.
C. Increase the administrative distance to 130 for the OSPF external prefixes on Router A and Router B.
D. Implement an ACL on Router A and Router B to prevent OSPF external routes from being installed in the OSPF database.
E. Filter external routes on Router A and Router B based on route tags.
Answer: BCE
Q14. Your company experienced a number of network incidents that had a significant impact on business operations. Because a root cause cannot be identified, your CTO asks you to help the network management team implement the FCAPS framework. On which two areas would you provide guidance to the network management team? (Choose two.)
A. change management
B. accounting management
C. service level management
D. fault management
Answer: BD
Q15. Your company is designing a service provider network management solution in which customers are billed for 95th percentile network utilization. The service provider requires that an IETF standard be utilized to collect the data. Which method should be used to collect the data?
A. IPFIX
B. NETFLOW
C. RMON
D. IPFLOW
E. NBAR
Answer: A