Q1. Refer to the exhibit.
The design is being proposed for use within the network. The CE devices are OSPF graceful restart-capable, and the core devices are OSPF graceful restart-aware. The WAN advertisements received from BGP are redistributed into OSPF. A forwarding supervisor failure event takes place on CE A. During this event, how will the routes learned from the WAN be seen on the core devices?
A. via CE A and CE B
B. via CE A
C. via CE B
D. no WAN routes will be accessible
Answer: C
Q2. During a corporate merger, a network designer is asked for a solution that will provide connectivity between the two enterprise networks. The solution must have the ability to support video sessions so that the CEO can message merger activities to the employees. The designer decides to consider multicast as a transport with MSDP to provide redundancy. Which transport feature does the network designer need to apply to the interconnecting firewall to ensure that Source-Active messages between the MSDP peers can be sent in both enterprise networks?
A. unicast over a UDP connection
B. multicast over a UDP connection
C. unicast over a TCP connection
D. multicast over a TCP connection
Answer: C
Q3. You are designing a large Frame Relay WAN for a customer. The routing protocol is OSPF. What is the effect on the routing table if the WAN interfaces are configured as point-to-multipoint?
A. Only a route for the DR will be present in the routing table.
B. Configuring point-to-multipoint has no effect on the routing table. The route that is configured with the area command will be seen in the routing table.
C. Multipoint interfaces dynamically add the network of the connected interface.
D. Multipoint interfaces dynamically add a /32 route for each neighbor in the WAN.
Answer: D
Q4. You are deploying a nationwide intranet solution for a company with 4 data centers and 400 remote branches connected via a provider-based solution. As part of the network design, you must ensure efficient content distribution of training material to remote sites. Which two VPN technologies leverage replication in the network core and provide for efficient bandwidth optimization? (Choose two.)
A. VPLS
B. EoMPLS
C. MPLS Layer 3 VPN
D. GRE
E. GET VPN
Answer: CE
Q5. You are the lead network designer for an enterprise company called ABC, and you are leading design discussions regarding IPv6 implementation into their existing network. A question is raised regarding older Layer 2 switches that exist in the network, and if any changes are required to these Layer 2 switches for successful IPv6 implementation. Which two responses should you give? (Choose two.)
A. IPv6 is transparent on Layer 2 switches, so there is no need to make any changes to the Layer 2 switches.
B. If IPv6 anycast deployment is planned, then make sure that Layer 2 switches support ICMPv6 snooping at Layer 2 switches.
C. If IPv6 anycast deployment is planned, then make sure that Layer 2 switches support DHCPv6 snooping at Layer 2 switches.
D. If IPv6 multicast deployment is planned, then make sure that Layer 2 switches support MLD snooping at Layer 2 switches.
E. If IPv6 anycast deployment is planned, then make sure that Layer 2 switches support ND snooping at Layer 2 switches.
Answer: AD
Q6. Which option is a benefit of using N-Port Virtualization?
A. reduces the amount of domain IDs that are used in the fabric
B. does not need to create zoning
C. reduces latency when using local switching on Fibre Channel ports
D. allows trunking to the upstream switch
E. does not need to configure the upstream switches
Answer: A
Q7. When network summaries are created for access networks in a network design, how does it change the behavior of the Shortest Path First (SPF) running in a backbone area?
A. There would be fewer incremental SPFs.
B. There would be fewer partial SPFs.
C. There would be fewer full SPFs.
D. There would be no change with the SPFs.
Answer: B
Q8. As part of the security protocol for your network design, you have designated that option 82 is enabled for DHCP snooping. When option 82 is enabled, which information will be added to the DHCP request?
A. switch MAC address and VLAN, module, and port
B. remote ID and circuit ID
C. switch IP address and VLAN, module, and port
D. switch MAC address and switch IP address
Answer: A
Q9. You are identifying performance management requirements for a VoIP migration. What three key performance indicators would you use to track media quality? (Choose three.)
A. delay
B. trunk group usage
C. jitter
D. packet loss
E. call processing (call detail records)
F. call processing (performance counters)
G. echo
H. crosstalk
Answer: ACD
Q10. You are designing a NAC OOB Layer 3 Real-IP Gateway deployment for a customer. Which VLAN must be trunked back to the Clean Access Server from the access switch?
A. untrusted VLAN
B. user VLAN
C. management VLAN
D. authentication VLAN
Answer: A
Q11. A company wants a design that would support OSPF through a service provider ATM network. Which two OSPF network types should the designer use to establish OSPF neighborship between OSPF routers through the ATM network? (Choose two.)
A. A broadcast network will always work through ATM networks.
B. A broadcast network will work when the broadcast support is explicitly configured at the ATM network.
C. Explicit neighbor statements are required when a nonbroadcast network is configured.
D. Explicit neighbor statements are required when a point-to-multipoint network is configured.
E. A nonbroadcast network does not require DR selection.
Answer: BC
Q12. Refer to the exhibit.
Your junior design engineer presents this configuration design. What is the next-hop router for CE3, and why?
A. CE1. BGP weight is higher than CE2.
B. CE2. EBGP administrative distance is lower than RIP.
C. CE2. The link between CE2 and PE1 has more bandwidth than CE1-to-PE1.
D. CE1. HSRP on CE1 is in active state.
Answer: D
Q13. You are the SAN designer for the ABC Company. Due to budget constraints, there is increased pressure by management to further optimize server utilization by implementing virtualization technologies on all servers and increase virtual machines density. Faced with some SAN challenges, the server team requests your help in the design and implementation of the SAN in the new virtualized environment.
In which two ways can NPIV be used in your proposed design? (Choose two.)
A. NPIV is used to assign multiple FCIDs to a single N Port.
B. NPIV is used to define and bind multiple virtual WWNs (VIs) to a single physical pWWN.
C. You recommend NPIV so that hosts can be members of different zones.
D. NPIV can be used to allow multiple applications on the same port to use different IDs in the same VSAN.
Answer: AD
Q14. You are the lead IP network designer for a new service provider called XYZ, and you are working closely with the CTO to finalize design requirements. The CTO informs you that they want to transport IPv6 prefixes of customers through the XYZ network at this time; however, they need your advice on whether to deploy dual stack or MPLS 6PE/6VPE. Which two options do you recommend? (Choose two.)
A. Build a dual-stack network. Enable BGP in the core. Redistribute EBGP routes into IGP.
B. Use MPLS 6PE to simplify the operation and keep a BGP-free core. When the LDPv6 becomes available, change to 4PE or keep the core using both IPv4 and IPv6. The main goal is to keep the core BGP-free and ensure that IPv4, IPv6, VPNv4, and VPNv6 are all label-switched.
C. Use MPLS 6VPE to simplify the operation and keep a BGP-free core. When the LDPv6 becomes available, change to 4PE or keep the core using both IPv4 and IPv6. The main goal is to keep the core BGP-free and ensure that IPv4, IPv6, VPNv4, and VPNv6 are all label-switched.
D. Prepare the dual-stack infrastructure from the beginning, even if BGP prefixes would have to be announced via IPv4 in case you decide to maintain the BGP-free core.
Answer: BD
Q15. Refer to the exhibit.
You are designing a network using the Multiple Spanning Tree Protocol for loop avoidance. VLAN trunking is not allowed due to security requirements. Which option describes how you can design this Layer 2 network while using untagged interfaces between both switches?
A. Assign VLAN 100 and VLAN 200 to the IST instance.
B. Assign VLAN 100 and VLAN 200 to instance 1.
C. Assign VLAN 100 to instance 1 and VLAN 200 to instance 2.
D. Assign VLAN 100 to the IST instance and VLAN 200 to instance 1.
Answer: C