Q1. When designing a network, which two security features should be added to the design to protect hosts from potential IPv6 neighbor discovery denial of service attacks at the access layer? (Choose two.)
A. SEND
B. RA Guard
C. IKEv2
D. IPsec
E. DMVPNv6
Answer: AB
Q2. You are designing a network that includes IP QoS. Which two architectures could be used to ensure that IP QoS is implemented properly? (Choose two.)
A. Differentiated Services, where the user, with the assistance of the RSVP signaling protocol, reserves the resources end to end before sending the data
B. Integrated Services, where the user, with the assistance of the RSVP signaling protocol, reserves the resources end to end before sending the data
C. Integrated Services, which relies on the information carried within each packet to make resource-allocation decisions at each network node
D. Differentiated Services, which relies on the information carried within each packet to make resource-allocation decisions at each network node
E. Integrated Services, where the user, with the assistance of the DSCP signaling protocol, reserves the resources end to end before sending the data
Answer: BD
Q3. In a network design using carrier Ethernet, which three mechanisms can be used to improve Layer 2 down detection and thereby reduce routing convergence time? (Choose three.)
A. BFD
B. Ethernet port debounce timers
C. link-state tracking
D. object tracking
E. fast IGP hello
Answer: ADE
Q4. A designer is working with a large bank to redesign their network. The designer wants to minimize complaints regarding slow application response times across the WAN. It is suspected that currently traffic is not being classified and marked correctly somewhere in the network. Which tool should the designer recommend to validate quality of service mappings and use?
A. SNMP
B. IPFIX
C. IP SLA
D. protocol analyzer
E. NBAR
Answer: B
Q5. Which statement about the behavior of OSPF on a hub-and-spoke topology is true?
A. Additional host routes are added to the routing table on a NBMA network type.
B. The DR and BDR election occurs regardless of the underlying OSPF network type.
C. The DR election is a challenge unless a point-to-point network type is used.
D. Traffic does not need to traverse the hub to reach the spokes.
Answer: C
Q6. You are working on a network design for Customer A. This design should consider fast convergence features, and it was agreed that BFD should be used for faster link-transition detection. Which three options apply to the use of the echo function in BFD? (Choose three.)
A. It can be used with asynchronous mode.
B. BFD control packets are not required.
C. It can be enabled individually in each direction.
D. It has the advantage of testing the forwarding path on the remote system.
E. The rate of periodic transmission of BFD control packets should be increased.
Answer: ACD
Q7. When a design calls for spanning VLANs across a campus network, what are two issues that need to be addressed in the design? (Choose two.)
A. network convergence
B. network accessibility
C. fault isolation
D. application scalability
E. user experience
Answer: AC
Q8. An IBGP mesh design is being scoped, and in the discussions, one of the design engineers proposes the use of route reflectors. Which limitation is valid when using route reflectors in this design?
A. The configuration complexity on the routers will be increased.
B. Route reflectors will limit the total number of routes in the topology.
C. Multipath information is difficult to propagate in a route reflector topology.
D. Route reflectors will cause an opportunity to create routing loops.
Answer: C
Q9. You have been hired to redesign a network due to issues with congestion. How will a router function if the QoS mechanism of congestion avoidance is integrated into the existing network design?
A. the router handles the overflow of traffic by using FIFO B. the router handles the possible buildup of congestion by using WRED
C. the router forces inbound and outbound traffic to stay within a defined profile by using rate limiting
D. the router separates packets based on certain characteristics by using NBAR
E. the router marks packets based on certain characteristics by using PBR
Answer: B
Q10. There is an MPLS-enabled link constantly flapping on an MPLS VPN network. Given that the network runs OSPF as the IGP protocol, which design mechanism will stabilize the network and avoid constant reconvergences?
A. BFD
B. IP Event Dampening
C. OSPF fast hellos
D. partial SPF
Answer: B
Q11. You are tasked with implementing a 1000-phone remote access solution, where phone calls will traverse a WAN edge router. Assuming all of the following features are supported in a hardware-assisted manner, which of the following will have the most negative impact
on the delay of the packet?
A. encryption
B. stateful firewall
C. MPLS encapsulation
D. GRE encapsulation
Answer: A
Q12. Which mechanism should be added to a network design to identify unidirectional Spanning Tree Protocol failures through BPDU loss?
A. UDLD
B. loop guard
C. BPDU guard?
D. root guard
Answer: B
Q13. Refer to the exhibit.
An enterprise is migrating its single-area OSPF network from a Frame Relay WAN service to an MPLS L3VPN service. Frame Relay will remain in only a few sites that require increased resiliency via two different WAN connections.
Which feature could be used in the ?MPLS VPN service provider network to support the design requirement by ensuring that during normal operation, intersite traffic will only use the MPLS VPN service and not the old Frame Relay service?
A. virtual links
B. sham links
C. multiple stub areas
D. super backbone
Answer: B
Q14. In a large enterprise network with multiple data centers and thousands of access devices, OSPF is becoming unstable due to link flapping. The current design has the access devices multihomed to large aggregation routers at each of the data centers. How would you redesign the network to improve stability?
A. Add a layer of regional Layer 3 aggregation devices, but leave the ABR function on the data center aggregation routers.
B. Add a layer of regional Layer 2 aggregation devices, but leave the ABR function on the data center aggregation routers.
C. Add a layer of regional Layer 3 aggregation devices and move the ABR function to the regional aggregation device.
D. Add a layer of regional Layer 2 aggregation devices and move the ABR function to the regional aggregation device.
Answer: C
Q15. Which two options are characteristics of firewall transparent mode operations in a firewall solution design? (Choose two.)
A. The firewall acts like a router hop in the network.
B. OSPF adjacencies can be established through the firewall.
C. Changes in the existing IP addressing and subnets are required.
D. Multicast traffic can traverse the firewall.
E. The firewall can participate actively on spanning tree.
Answer: BD