Q1. Refer to the exhibit.
What limitations exist in this design, given that the access layer devices are expected to steadily increase by two devices per week for the next year?
A. scalability
B. serviceability
C. redundancy
D. resiliency
Answer: A
Q2. You are using iSCSI to transfer files between a 10 Gigabit Ethernet storage system and a 1 Gigabit Ethernet server. The performance is only approximately 700 Mb/s and output drops are occurring on the server switch port. Which action will improve performance in a cost-effective manner?
A. Use a WRED random drop policy.
B. Increase the queue to at least 1 GB.
C. Enable the TCP Nagle algorithm on the receiver.
D. Change the protocol to CIFS.
Answer: A
Q3. Which multicast technology provides a large, many-to-many connectivity for a new application while minimizing load on the existing network infrastructure?
A. Bidirectional PIM
B. PIM Sparse Mode
C. Any-source Multicast
D. Source Specific Multicast
Answer: A
Q4. Your firm has been awarded a contract to design a Criminal Justice Information Services Version 5.0-compliant network utilizing advanced authentication policies. Which two methods could be utilized? (Choose two.)
A. biometric
B. PKI
C. UKI
D. password
Answer: AB
Q5. What is a key design aspect to be considered when designing an IP network that will be carrying real-time VoIP traffic?
A. Minimizing total bidirectional end-to-end delay to 0-150 ms
B. Minimizing total unidirectional end-to-end delay to 150-500 ms
C. Minimizing total bidirectional end-to-end delay to 0-50 ms
D. Minimizing total unidirectional end-to-end delay to 0-150 ms
Answer: D
Q6. A network designer has provisioned a router to use IPsec to encrypt the traffic over a GRE tunnel going to a web server at a remote location. From the router, the network designer can ping the web server, although the users in the office comment that they are unable to reach it. (Note: The DF bit is not set.) Which aspect should be changed in the design of the virtual connection?
A. IP addresses of the GRE tunnel endpoints
B. IPsec configuration
C. MTU size on the GRE tunnel
D. encapsulation of the GRE tunnel
Answer: C
Q7. You are tasked with implementing a 1000-phone remote access solution, where phones will traverse a WAN edge router. Assuming all of the following features are supported in a hardware-assisted manner, which of the following will have the most detrimental impact on the delay of the packet?
A. encryption
B. stateful firewall
C. MPLS encapsulation
D. GRE encapsulation
Answer: A
Q8. When creating a network design that routes an IGP over L2VPNs, with which device does the remote CE router form an IGP adjacency?
A. the hub site PE router
B. the hub site CE router
C. the directly connected PE router
D. The IGP will not establish adjacency over the MPLS network.
Answer: B
Q9. A company is planning to deploy high-availability cluster support for their servers in a collapsed core data center design. Which issue should be a concern with this design?
A. NIC teaming
B. MAC address aging
C. Layer 3 domain sizing
D. Layer 2 domain sizing
Answer: D
Q10. You are the lead IP network designer for a new service provider called XYZ, and you are working closely with the CTO to finalize design requirements. The CTO informs you that they want to transport IPv6 prefixes of customers through the XYZ network at this time; however, they need your advice on whether to deploy dual stack or MPLS 6PE/6VPE. Which two options do you recommend? (Choose two.)
A. Build a dual-stack network. Enable BGP in the core. Redistribute EBGP routes into IGP.
B. Use MPLS 6PE to simplify the operation and keep a BGP-free core. When the LDPv6 becomes available, change to 4PE or keep the core using both IPv4 and IPv6. The main goal is to keep the core BGP-free and ensure that IPv4, IPv6, VPNv4, and VPNv6 are all label-switched.
C. Use MPLS 6VPE to simplify the operation and keep a BGP-free core. When the LDPv6 becomes available, change to 4PE or keep the core using both IPv4 and IPv6. The main goal is to keep the core BGP-free and ensure that IPv4, IPv6, VPNv4, and VPNv6 are all label-switched.
D. Prepare the dual-stack infrastructure from the beginning, even if BGP prefixes would have to be announced via IPv4 in case you decide to maintain the BGP-free core.
Answer: BD
Q11. What are three key design principles when using a classic hierarchical network model? (Choose three.)
A. The core layer controls access to resources for security.
B. The core layer should be configured with minimal complexity.
C. The core layer is designed first, followed by the distribution layer and then the access layer.
D. A hierarchical network design model aids fault isolation.
E. The core layer provides server access in a small campus.
F. A hierarchical network design facilitates changes.
Answer: BDF
Q12. When network summaries are created for access networks in a network design, how does it change the behavior of the Shortest Path First (SPF) running in a backbone area?
A. There would be fewer incremental SPFs.
B. There would be fewer partial SPFs.
C. There would be fewer full SPFs.
D. There would be no change with the SPFs.
Answer: B
Q13. Which three methods allow storage access across an IP network? (Choose three.)
A. FCIP
B. Fiber Channel over GRE
C. Fiber Channel over L2TPv3
D. iSCSI
E. NFS
Answer: ADE
Q14. A company plans to establish a new network using Cisco Catalyst switches for its multicast applications. What is the disadvantage when two multicast applications are using the multicast IP addresses 234.17.4.5 and 234.145.4.5 inside the same network?
A. Multicast packets from both applications are flooded to all Layer 2 ports in a segment where a multicast receiver is located.
B. Multicast packets from both applications are flooded to ports where one multicast receiver from one application is located.
C. Only one multicast stream is received at the port where the receivers from both applications are located.
D. Both multicast senders will always receive the multicast packets from the other multicast application.
E. The routers doing PIM-SM cannot distinguish between the two multicast applications.
Answer: B
Q15. In an MPLS-VPN environment, what is the effect of configuring an identical set of route targets for a particular VRF, but then configuring nonidentical route distinguisher across multiple PE devices?
A. The routes will be correctly handled by the control plane, but there will be instances where routes take up twice as much memory.
B. The routes will propagate to the remote PE, but the PE will never install them in its forwarding table.
C. The routes will be rejected by the remote PE because they have a different RD than its routes.
D. The routes will not even be sent to any remote PE with a different RD.
Answer: A