Q1. You are the lead IP/MPLS network designer of a service provider called XYZ. You are leading a design discussion regarding IPv6 implementation in the XYZ MPLS network, using MPLS 6PE/6VPE techniques. Currently, XYZ provides IPv4 multicast services over an MPLS network by using MVPN, and would like to provide parallel IPv6 multicast services. Which three multicast solutions should be enabled? (Choose three.)
A. native IPv6, only for multicast services
B. MPLS 6PE/6VPE, because it provides IPv6 multicast support by default
C. an overlay model using Layer 2 MPLS tunnels
D. PIM-DM to enable IPv6 multicast in conjunction with MPLS 6PE/6VPE
E. MVPN for IPv6 multicast service
Answer: ACE
Q2. During a network design review, it is recommended that the network with a single large area should be broken up into a backbone and multiple nonbackbone areas. There are differing opinions on how many ABRs are needed for each area for redundancy. What would be the impact of having additional ABRs per area?
A. There is no impact to increasing the number of ABRs.
B. The SPF calculations are more complex.
C. The number of externals and network summaries are increased.
D. The size of the FIB is increased.
Answer: C
Q3. Which three reasons to deploy an IDS sensor in promiscuous mode when you design a security solution are true? (Choose three.)
A. Solution should be resistant to sensor failure.
B. Solution should allow for stream normalization.
C. Solution should not impact jitter and latency for voice traffic.
D. Solution should allow for signature-based pattern matching.
E. Solution should allow to deny packets inline.
Answer: ACD
Q4. What are two benefits of using BFD for failure detection in the design of a network?
(Choose two.)
A. BFD can provide failure detection in less than one second.
B. BFD can be used as a generic and consistent failure detection mechanism for EIGRP, IS-IS, and OSPF.
C. BFD eliminates router protocol hello notification.
D. BFD can be used for all types of network interfaces.
E. BFD is independent of the network protocol.
Answer: AB
Q5. You are the SAN designer for the ABC Company. Due to budget constraints, there is increased pressure by management to further optimize server utilization by implementing virtualization technologies on all servers and increase virtual machines density. Faced with some SAN challenges, the server team requests your help in the design and implementation of the SAN in the new virtualized environment.
In which two ways can NPIV be used in your proposed design? (Choose two.)
A. NPIV is used to assign multiple FCIDs to a single N Port.
B. NPIV is used to define and bind multiple virtual WWNs (VIs) to a single physical pWWN.
C. You recommend NPIV so that hosts can be members of different zones.
D. NPIV can be used to allow multiple applications on the same port to use different IDs in the same VSAN.
Answer: AD
Q6. You have been asked to design a wireless network solution that will implement context-aware services on an existing network that was initially deployed for data traffic only. Which two design principles would you follow to increase the location accuracy with the least possible impact on the current setup? (Choose two.)
A. Use directional antennas to provide better cell separation.
B. Add access points along the perimeter of the coverage area.
C. Install additional APs in monitor mode where the cochannel interference would otherwise be affected.
D. Increase the AP density to create an average interaccess point distance of less than 40 ft.
E. Fine tune the access points radio configuration to have a higher average transmission power to achieve better coverage.
Answer: BC
Q7. A Service Provider is designing a solution for a managed CE service to a number of local customers using a single CE platform and wants to have logical separation on the CE platform using Virtual Routing and Forwarding (VRF) based on IP address ranges or packet length. Which is the most scalable solution to provide this type of VRF Selection process on the CE edge device?
A. Static Routes for Route Leaking
B. Policy Based Routing
C. Multi-Protocol BGP
D. OSPF per VRF Instance
Answer: B
Q8. Your network operations team is deploying Access Control Lists (ACLs) across your Internet gateways. They wish to place an ACL inbound on the Internet gateway interface facing the core network (the "trusted" interface). Which one of these addresses would the ACL need for traffic sourced from the inside interface, to match the source address of the traffic?
A. inside local
B. outside local
C. inside global
D. outside global
Answer: A
Q9. A service provider creates a network design that runs MPLS in its WAN backbone using OSPF as the IGP routing protocol. What would be two effects of additionally implementing MPLS-TE? (Choose two.)
A. MPLS-TE is required to reroute traffic within less than 1 second in case of a link failure inside the backbone.
B. MPLS-TE is required to route different MPLS QoS service classes through different paths.
C. MPLS-TE and OSPF cannot be used together inside one MPLS network.
D. MPLS-TE cannot use OSPF for the traffic path calculation.
E. MPLS-TE is required to create backup paths independently from the IGP.
Answer: B,E
Q10. Which two options are two advantages of summarizing networks at the aggregation layer rather than at the core? (Choose two.)
A. It prevents the core from having unnecessary routes.
B. It no longer needs a core layer.
C. It prevents black hole routing.
D. It avoids network-wide impact upon VLAN changes local to the aggregation devices.
Answer: AD
Q11. Which option is a BFD design consideration?
A. BFD should not be used with RSVP-TE backup tunnels.
B. BFD echo mode may reduce convergence time.
C. BFD does not support sessions over MPLS LSPs.
D. BFD is supported on indirectly connected peers.
Answer: B
Q12. Company X will be integrating an IPv6 application into their network and wants to develop a test environment to evaluate application performance across the network. This application will require both unicast and multicast communications. The company can do this implementation only in certain areas of its existing IPv4-only network, but wants all areas to communicate with each other. When developing the design to provide connectivity between these testing locations, what tunneling technology would work in this scenario?
A. ISATAP
B. 6to4
C. DMVPN
D. 6vPE
E. 6PE
Answer: C
Q13. You are a network designer and have been asked to consult with your server operations team to further enhance the security of the network. The operations team provides you with these details about the network:
A pool of servers is accessed by numerous data centers and remote sites.
The servers are accessed via a cluster of firewalls.
The firewalls are configured properly and are not dropping traffic.
The firewalls occasionally cause asymmetric routing of traffic within the server data center.
Which technology would you recommend to enhance security by limiting traffic that could originate from a hacker compromising a workstation and redirecting flows at the servers?
A. Access control lists to limit sources of traffic that exits the server-facing interface of the firewall cluster
B. Poison certain subnets by adding static routes to Null0 on the server farm core switches.
C. Unicast Reverse Path Forwarding in strict mode
D. Unicast Reverse Path Forwarding in loose mode
Answer: D
Q14. What are two design advantages to using virtual port channel? (Choose two.)
A. enhanced system availability through multiple systems
B. reduced Spanning Tree Protocol convergence time
C. loop management without use of Spanning Tree Protocol
D. ability to use Spanning Tree Protocol blocked ports to forward traffic
E. enhanced ability to recover from Spanning Tree Protocol changes
Answer: AC
Q15. A new video multicast application is deployed in the network. The application team wants to use the 239.0.0.1 multicast group to stream the video to users. They want to know if this choice will impact the existing multicast design. What impact will their choice have on the existing multicast design?
A. Because 239.0.0.1 is a private multicast range, a flood of PIM packets that have to be processed by the CPU and hosts will be sent by the routers in the network.
B. Because 239.0.0.1 is a private multicast range, the rendezvous point has to send out constant group updates that will have to be processed by the CPU and hosts.
C. The multicast application sends too many packets into the network and the network infrastructure drops packets.
D. The 239.0.0.1 group address maps to a system MAC address, and all multicast traffic will have to be sent to the CPU and flooded out all ports.
Answer: D