Q1. Acme Corporation wants to minimize the risk of users plugging unauthorized switches and hubs into the network. Which two features can be used on the LAN access ports to support this design requirement? (Choose two.)
A. BPDU Guard
B. PortFast
C. Loop Guard
D. Port Security
E. UDLD
Answer: AD
Q2. Which two techniques are used in a network design to slow down the distribution of topology information caused by a rapidly flapping link? (Choose two.)
A. Bidirectional Forwarding Detection
B. IP event dampening
C. link-state incremental SPF
D. link-state partial SPF
E. LSA throttling
F. SPF throttling
Answer: BE
Q3. While reviewing an existing network design, you are discussing the characteristics of different STP versions. Which protocol minimizes unicast flooding during TCN in a Layer 2 switched network with many VLANs?
A. STP
B. MST
C. PVRSTP
D. PVSTP+
Answer: D
Q4. Your company is designing a service provider network management solution in which customers are billed for 95th percentile network utilization. The service provider requires that an IETF standard be utilized to collect the data. Which method should be used to collect the data?
A. IPFIX
B. NETFLOW
C. RMON
D. IPFLOW
E. NBAR
Answer: A
Q5. The network administrator of a branch office network has decided to deploy Unicast RPF at the access layer. He insists that the design must guarantee that all the packets arriving on the router interfaces are assigned to the same interface subnet.
Which mode of Unicast RPF would you recommend as the lead network designer?
A. uRPF strict mode
B. uRPF loose mode
C. uRPF VRF mode
D. RPF feasible mode
Answer: A
Q6. You are redesigning an OSPF v2 network and must migrate some links. You are concerned that there are different subnet masks. Which two link types will still form an OSPF adjacency even if there are subnet mask mismatches? (Choose two.)
A. virtual
B. broadcast
C. point-to-multipoint
D. non-broadcast
E. point-to-point
Answer: AE
Q7. A service provider has a Resilient Ethernet Protocol ring running as a metro backbone between its locations in one city. A customer wants to connect one site with one box redundant to theResilient Ethernet Protocol ring at two different service provider locations. How can this be done without producing any Layer 2 loops within the network design?
A. Spanning tree at the service provider side only must be enabled.
B. Spanning tree at the customer side only must be enabled.
C. Flex Links at the service provider side only must be enabled.
D. Flex Links at the customer side only must be enabled.
E. EtherChannel at the service provider side and the customer side must be enabled.
F. Spanning tree at the service provider side and the customer side must be enabled.
G. Flex Links at the service provider side and the customer side must be enabled.
Answer: D
Q8. Refer to the exhibit.
An enterprise is migrating its single-area OSPF network from a Frame Relay WAN service to an MPLS L3VPN service. Frame Relay will remain in only a few sites that require increased resiliency via two different WAN connections.
Which feature could be used in the ?MPLS VPN service provider network to support the design requirement by ensuring that during normal operation, intersite traffic will only use the MPLS VPN service and not the old Frame Relay service?
A. virtual links
B. sham links
C. multiple stub areas
D. super backbone
Answer: B
Q9. A metro service provider is planning Resilient Ethernet Protocol for his backbone. Which two aspects must be considered before the network design is finalized? (Choose two.)
A. Two Resilient Ethernet Protocol segments can be connected redundantly at two points. One connection will be blocked, using the Spanning Tree Protocol defined in IEEE 802.1D.
B. UniDirectional Link Detection Protocol can be enabled on Resilient Ethernet Protocol interfaces to detect unidirectional failures.
C. The guaranteed convergence recovery time is less than 50 ms for the local segment.
D. A Resilient Ethernet Protocol segment is limited to a maximum of seven devices.
E. VLAN load balancing for optimal bandwidth usage is supported in any Resilient Ethernet Protocol segment.
Answer: BE
Q10. A junior engineer is implementing one of your optical designs and asks about CWDM (Coarse Wavelength Division Multiplexing). Which two features describe CWDM? (Choose two.)
A. typically used over long distances, but requires optical amplification
B. allows up to 32 optical carriers to be multiplexed onto a single fiber
C. shares the same transmission window as DWDM
D. uses the 850-nm band
E. Passive CWDM devices require no electrical power.
Answer: CE
Q11. Your company experienced a number of network incidents that had a significant impact on business operations. Because a root cause cannot be identified, your CTO asks you to help the network management team implement the FCAPS framework. On which two areas would you provide guidance to the network management team? (Choose two.)
A. change management
B. accounting management
C. service level management
D. fault management
Answer: BD
Q12. Company X will be integrating an IPv6 application into their network and wants to develop a test environment to evaluate application performance across the network. This application will require both unicast and multicast communications. The company can do this implementation only in certain areas of its existing IPv4-only network, but wants all areas to communicate with each other. When developing the design to provide connectivity between these testing locations, what tunneling technology would work in this scenario?
A. ISATAP
B. 6to4
C. DMVPN
D. 6vPE
E. 6PE
Answer: C
Q13. A company is planning to deploy high-availability cluster support for their servers in a collapsed core data center design. Which issue should be a concern with this design?
A. NIC teaming
B. MAC address aging
C. Layer 3 domain sizing
D. Layer 2 domain sizing
Answer: D
Q14. Which two mechanisms ensure that a network design provides fast path failure detection? (Choose two.)
A. BFD
B. fast hello packets
C. UDLD
D. IP Cisco Express Forwarding
Answer: AB
Q15. You are designing a solution to eliminate the risk of high CPU utilization on a core network composed of CRS-1 devices. Which option would eliminate the risk of high CPU utilization across the network?
A. Use Local Packet Transport Services (LPTS) to manage hardware SNMP flow rate.
B. Use the in-band control plane policy feature to reduce the SNMP flow rate.
C. Use the control plane policy feature and reduce SNMP flow rate.
D. Use control-plane management-plane in-band and reduce the SNMP flow rate.
E. Use the control-plane management-plane out-of-band feature to reduce the SNMP flow rate.
Answer: A