Q1. Refer to the exhibit.
A new IPv4 multicast-based video-streaming service is being provisioned. During the design-validation tests, you realize that the link between the two buildings is carrying multicast traffic even when there are no receivers connected to the switch in Building B and despite IGMP snooping being enabled on both Layer 2 switches and IGMPv2 runs on the hosts. Which design change will prevent the multicast traffic from being unnecessarily flooded throughout the campus network?
A. Enable PIM snooping on both Layer 2 switches.
B. Enable multicast storm control on the link between Switch 1 and Switch 2.
C. Use static Layer 2 MAC forwarding entries on Switch 1.
D. Change the IPv4 multicast group address such that it excludes the usage of link-local MAC addresses.
E. Ensure that Switch 1 is an IGMP querier.
Answer: D
Q2. You work for a large company that has just acquired another smaller company. You have been asked to lead a group of SAN experts from both companies to design the integration plan that will be used to interconnect the SANs and migrate the data from the newly acquired company to the main storage arrays. The first thing that the team discovers is that the two SANs have the same domain IDs.
As the SAN team lead, what would you advise your team to do so that you can interconnect the two SANs while minimizing disruption?
A. Use FCIP with Write Acceleration and IVR version 1 with a transit VSAN to expedite the data transfer between the two SANs.
B. Change the domain IDs on both SANs so that they are both unique and then connect ISLs between the SANs.
C. Use IVR NAT with a transit VSAN between the SANs.
D. The two SANs cannot be merged without disruption.
Answer: C
Q3. Which two options are characteristics of firewall transparent mode operations in a firewall solution design? (Choose two.)
A. The firewall acts like a router hop in the network.
B. OSPF adjacencies can be established through the firewall.
C. Changes in the existing IP addressing and subnets are required.
D. Multicast traffic can traverse the firewall.
E. The firewall can participate actively on spanning tree.
Answer: BD
Q4. Service provider XYZ plans to provide dedicated Internet access and MPLS L3VPN services to business customers. XYZ has these design specifications:
. MP-BGP running on the core MPLS P routers with external Internet routes.
. The core network will include 16 Point of Presence IP POPs throughout the Asia-Pacific region. . An additional nine non-P routers will use EBGP peering with multiple providers for Internet traffic. . An additional 50 PE routers will provide end customers with dedicated Internet access and L3VPN services throughout the Asia-Pacific region.
In what two ways can the MP-BGP be removed from the MPLS P core routers and still provide dedicated Internet access and MPLS L3VPN services? (Choose two.)
A. Disable BGP from the MPLS core P routers and have the MPLS core P routers run OSPF and LDP.
B. Enable separate BGP control plane routers using a route reflector server concept that will be fully meshed with peer route reflector servers and have clients as MPLS PE routers and EBGP peering routers.
C. Enable all EBGP routers as route reflector servers and MPLS PE routers as their clients.
D. It is not possible to disable BGP from the MPLS core P routers without impacting the dedicated Internet access and MPLS L3VPN services.
Answer: BC
Q5. Network designers plan to interconnect two geographically separated data centers using an Ethernet-over-MPLS pseudowire. Within that design, the link between the sites is stable, there are no apparent loops in the topology, and the root bridges for the respective VLANs are stable and unchanging. What additional aspect of the design should be adjusted to mitigate the chance of connectivity issues to the peer data center when the connection takes place?
A. Enable 802.1d on one data center, and 802.1w on the other.
B. Ensure that the spanning tree diameter for one or more VLANs is not too large.
C. Enable UDLD on the link between the data centers.
D. Enable root guard on the link between the data centers.
Answer: B
Q6. A network administrator is in charge of multiple IPsec VPN headend devices that service thousands of remote connectivity, point-to-point, IPsec/GRE tunnels. During a recent power outage, in which it was found that a backup power supply in one of those headend devices was faulty, one of the headend routers suffered a complete shutdown event. When the router was successfully recovered, remote users found intermittent connectivity issues that went away after several hours. Network operations staff accessed the headend devices and found that the recently recovered unit was near 100% CPU for a long period of time. How would you redesign the network VPN headend devices to prevent this from happening again in the future?
A. Move the tunnels more evenly across the headend devices.
B. Implement Call Admission Control.
C. Use the scheduler allocate command to curb CPU usage.
D. Change the tunnels to DMVPN.
Answer: B
Q7. A customer is using a service provider to provide a WAN backbone for a 30-site network. In establishing the network, the customer must work within these constraints:
The customer has a self-managed MPLS backbone.
The VPLS WAN backbone of the service provider does not support PIM snooping.
Multicast VPN must be used for multicast support inside some VRFs.
What can the customer do so that multicast traffic is NOT flooded to all sites?
A. Configure static GRE tunnels and run the MPLS and multicast VPN inside these GRE tunnels.
B. Use Label Switched Multicast for the multicast transport.
C. Use PIM-SSM as the multicast routing protocol with IETF Rosen Draft multicast VPN.
D. Configure a static mapping between multicast addresses and MAC addresses.
E. Use GET VPN to encrypt the multicast packets inside the WAN.
Answer: A
Q8. You are the lead network designer hired by Service Provider XYZ to deploy CoS functionality on the core MPLS network (P routers). The goal of the network design is to provide a complete CoS solution to all customers that purchase services such as dedicated internet access, MPLS L3VPN, and L2VPN (pseudowire). Service Provider XYZ has these design requirements:
The network supports four service queues with equal treatment for delay, jitter, and packet loss.
Queues are numbered 0-3, where 0 is the default queue.
Three queues have one treatment.
One queue has either one or two treatments.
How would you design your solution to map the DSCP value properly so that the traffic is assigned to the respective queues in the Service Provider XYZ MPLS core network?
A. Classify traffic according to DSCP value into appropriate P router queues.
B. Map the appropriate DSCP value into the EXP field based on the number of queues in the MPLS P routers.
C. Map the appropriate DSCP value into the EXP field based on the number of queues in the MPLS PE routers.
D. Based on the DSCP value, traffic is mapped automatically into appropriate queues in the MPLS CE routers.
Answer: C
Q9. A multicast network is using bidirectional PIM. Which two actions, when combined, can achieve high availability so that two RPs within the same network can act in a redundant manner? (Choose two.)
A. Use Anycast RP based on MSDP peering between the two RPs.
B. Use a phantom RP address.
C. Advertise routes for the two RPs with the same subnet mask through the unicast routing protocol.
D. Advertise routes for the two RPs with different subnet mask lengths through the unicast routing protocol.
E. Manipulate the administrative distance of the unicast routes to the two RPs.
F. Manipulate the multicast routing table by creating static mroutes to the two RPs.
Answer: BD
Q10. Refer to the exhibit.
The design is being proposed for use within the network. The CE devices are OSPF graceful restart-capable, and the core devices are OSPF graceful restart-aware. The WAN advertisements received from BGP are redistributed into OSPF. A forwarding supervisor failure event takes place on CE A. During this event, how will the routes learned from the WAN be seen on the core devices?
A. via CE A and CE B
B. via CE A
C. via CE B
D. no WAN routes will be accessible
Answer: C
Q11. As part of a new network design, you are helping the Network Management Team to develop a proactive report to identify places in the network where problems may happen. The network management tool can poll the network devices only via SNMP GET operations. Which two threshold-crossing metrics should you include in this report? (Choose two.)
A. packet loss
B. CPU utilization
C. heat dissipation
D. IP reachability
E. energy consumption
F. link bandwidth utilization
Answer: BF
Q12. A designer is working with a large bank to redesign their network. The designer wants to minimize complaints regarding slow application response times across the WAN. It is suspected that currently traffic is not being classified and marked correctly somewhere in the network. Which tool should the designer recommend to validate quality of service mappings and use?
A. SNMP
B. IPFIX
C. IP SLA
D. protocol analyzer
E. NBAR
Answer: B
Q13. A new video multicast application is deployed in the network. The application team wants to use the 239.0.0.1 multicast group to stream the video to users. They want to know if this choice will impact the existing multicast design. What impact will their choice have on the existing multicast design?
A. Because 239.0.0.1 is a private multicast range, a flood of PIM packets that have to be processed by the CPU and hosts will be sent by the routers in the network.
B. Because 239.0.0.1 is a private multicast range, the rendezvous point has to send out constant group updates that will have to be processed by the CPU and hosts.
C. The multicast application sends too many packets into the network and the network infrastructure drops packets.
D. The 239.0.0.1 group address maps to a system MAC address, and all multicast traffic will have to be sent to the CPU and flooded out all ports.
Answer: D
Q14. A Service Provider network designer is considering the use of the G.8032 Ethernet Ring Protection mechanism in order to provide resiliency in the network. Which three concepts will be supported with the implementation G.8032? (Choose three.)
A. Ring Protection Link (RPL)
B. Ring Automatic Protection Switching (R-APS)
C. Multi-Router Automatic Protection Switching (MR-APS)
D. Automatic Protection Switching (APS) Channel
Answer: ABD
Q15. You are tasked with implementing a 1000-phone remote access solution, where phones will traverse a WAN edge router. Assuming all of the following features are supported in a hardware-assisted manner, which of the following will have the most detrimental impact on the delay of the packet?
A. encryption
B. stateful firewall
C. MPLS encapsulation
D. GRE encapsulation
Answer: A