CCDA Flashcards _ Quizlet

Download as pdf or txt
Download as pdf or txt
You are on page 1of 295

CCDA

STUDY

Flashcards

Learn

Write

Spell

Test

PLAY

Match

Gravity

Created by

justinjcox20
Terms in this set (644)

You want to gather as much Correct Answer: C


detail as possible during a
network audit, to include data
time stamping across a
large number of interfaces,
customized according to
interface, with a minimal impact
on the network devices
themselves. Which tool would
you use to meet these
requirements?
A. RMON
B. SNMPv3
C. NetFlow
D. Cisco Discovery Protocol

You want to gather as much Correct Answer: C


detail as possible during a
network audit with a minimal
impact on the network
devices themselves. Which tool
would you use to include data
time stamping across a large
number of
interfaces while being
customized according to each
interface?
A. RMON
B. SNMPv3
C. NetFlow
D. Cisco Discovery Protocol

In which phase of PPDIOO are Correct Answer: B


the network requirements
identified?
A. Design
B. Plan
C. Prepare
D. Implement
E. Operate
F. Optimize

Which is part of the Prepare Correct Answer: C


phase of PPDIOO?
A. Obtain site contact
information
B. Perform network audit
C. Identify customer
requirements
D. Perform gap analysis
When designing the identity and Correct Answer: A
access control portions for the
enterprise campus network,
which of these
solutions would be the most
appropriate solution to
consider?
A. 802.1X
B. ACLs in the core layer
C. Cisco Security MARS
D. NetFlow

Which is the purpose of the Correct Answer: A


Cisco NAC Profiler?
A. Automates discovery and
inventory of all LAN attached
devices
B. Generates a profile based on
username and group
C. Learns and creates a
database of virus definitions
based on LAN traffic
D. A database used to map user
VPN accounts
Upgrade to remove ads Only $1/month

Cisco Identity-Based Correct Answer: A


Networking Services relies
heavily on the 802.1X protocol.
Which other authentication
solution is used hand-in-hand
with 802.1X to authenticate users
for network access?
A. RADIUS
B. LEAP
C. IPsec
D. TACACS
E. ISAKMP

Which protocol is used for voice Correct Answer: B


bearer traffic?
A. MGCP
B. RTP
C. SCCP
D. CDP
E. ICMP
Which protocol is used to Correct Answer: C
reserve bandwidth for the
transport of a particular
application data flow across the
network?
A. cRTP
B. IEEE 802.1P
C. RSVP
D. LFI
E. Auto QOS

Which two features are Correct Answer: AB


supported by single wireless
controller deployments?
(Choose two.)
A. automatic detection and
configuration of LWAPPs
B. LWAPP support across
multiple floors and buildings
C. automatic detection and
configuration of RF parameters
D. Layer 2 and Layer 3 roaming
E. controller redundancy
F. mobility groups
Which four services does the Correct Answer: ABCE
architecture for Media Services
contain? (Choose four.)
A. access services
B. transport services
C. storage services
D. forwarding services
E. session control services
F. security services
G. filtering services
H. remote access services

Refer to the exhibit. Correct Answer: B


Which layer is the distribution
layer?
A. Layer A
B. Layer B
C. Layer C
D. Layers A and B form a
consolidated core and
distribution layer

Which IPv6 feature enables Correct Answer: C


routing to distribute connection
requests to the nearest content
server?
A. Link-local
B. Site-local
C. Anycast
D. Multicast
E. Global aggregatable

What is the recommended Correct Answer: E


spanning tree protocol to use
for all Layer 2 deployments in a
branch office
environment?
A. CST
B. RSPT
C. PVST
D. MISTP
E. Rapid PVST +

Refer to the exhibit. Correct Answer: B


A standard, Layer 2 campus
network design is pictured.
Which numbered box represents
the distribution layer?
A. #1
B. #2
C. #3
D. #4
Which two are types of network Correct Answer: AB
virtualization? (Choose two.)
A. VSS: Virtual Switching System
B. VRF: virtual routing and
forwarding
C. VCI: virtual channel identifier
D. VLSM: variable length subnet
masking
E. VM: virtual machine
F. VMP: Virtual Memory Pool

You are tasked with designing a Correct Answer: B


new branch office that will
support 75 users with possible
expansion in the
future and will need a highly
available network. Which of the
branch design profiles should be
implemented?
A. large branch design
B. medium branch design
C. teleworker design
D. small branch design
Which two can be used as a Correct Answer: BC
branch office WAN solution?
(Choose two.)
A. frame relay
B. MPLS
C. Metro Ethernet
D. GPRS
E. dial-up modem
F. 3G USB modems

Upgrade to remove ads Only $1/month

What is the acceptable amount Correct Answer: C


of one-way network delay for
voice and video applications?
A. 300 bytes
B. 1 sec
C. 150 ms
D. 500 ms

Which mode is used to Correct Answer: C


exclusively look for
unauthorized access points?
A. monitor mode
B. sniffer mode
C. rogue detector mode
D. local mode

Which of the following three Correct Answer: ABC


options represents the
components of the Teleworker
Solution? (Choose three.)
A. Cisco Unified IP Phone
B. Cisco 880 Series Router
C. Aironet Office Extend Access
Point
D. Catalyst 3560 Series Switch
E. Cisco 2900 Series Router
F. MPLS Layer 3 VPN
G. Leased lines

Which three types of WAN Correct Answer: BCF


topologies can be deployed in
the Service Provider Module?
(Choose three.)
A. ring
B. star
C. full mesh
D. core/edge
E. collapsed core
F. partial mesh

Drag the WAN characteristics on a


the left to the branch office
model where it would most
likely to be used on the
right.

Which statement describes the Correct Answer: B


recommended deployment of
DNS and DHCP servers in the
Cisco Network
Architecture for the Enterprise?
A. Place the DHCP and DNS
servers in the Enterprise Campus
Access layer and Enterprise
branch.
B. Place the DHCP and DNS
servers in the Enterprise Campus
Server Farm layer and Enterprise
branch.
C. Place the DHCP server in the
Enterprise Campus Core layer
and Remote Access_VPN
module with the
DNS server in the Internet
Connectivity module.
D. Place the DHCP server in the
Enterprise Campus Distribution
layer with the DNS server in the
Internet
Connectivity module.

Your company's Cisco routers Correct Answer: E


are operating with EIGRP. You
need to join networks with an
acquisition's
heterogeneous routers at 3 sites,
operating with EIGRP and OSPF.
Which describes the best
practice for
routing protocol deployment?
A. Apply OSPF throughout both
networks
B. Apply one-way redistribution
exclusively at each location
C. Apply two-way redistribution
exclusively at each location
D. Apply two-way redistribution
at each location with a route
filter at only one location
E. Apply two-way redistribution
at each location with a route
filter at each location
F. Apply EIGRP with the same
autonomous system throughout
both networks

Which two routing protocols Correct Answer: DE


converge most quickly? (Choose
two.)
A. RIPv1
B. RIPv2
C. BGP
D. OSPF
E. EIGRP

Which of these is the equation Correct Answer: D


used to derive a 64 Kbps bit
rate?
A. 2 x 8 kHz x 4-bit code words
B. 8 kHz x 8-bit code words
C. 2 x 4-bit code words x 8 kHz
D. 2 x 4 kHz x 8-bit code words

Which one of these statements is Correct Answer: C


an example of how trust and
identity management solutions
should be
deployed in the enterprise
campus network?
A. Authentication validation
should be deployed as close to
the data center as possible.
B. Use the principle of top-down
privilege, which means that each
subject should have the
privileges that are
necessary to perform their
defined tasks, as well as all the
tasks for those roles below them.
C. Mixed ACL rules, using
combinations of specific sources
and destinations, should be
applied as close to the
source as possible.
D. For ease of management,
practice defense in isolation -
security mechanisms should be
in place one time,
in one place.
With deterministic Wireless LAN Correct Answer: B
Controller redundancy design,
the different options available to
the designer
have their own strengths. Which
one of these statements is an
example of such a strength?
A. Dynamic load balancing, or
salt-and-pepper access point
design, avoids the potential
impact of
oversubscription on aggregate
network performance.
B. N+N redundancy
configuration allows logically
grouping access points on
controllers to minimize
intercontroller roaming events.
C. N+N+1 redundancy
configuration has the least
impact to system management
because all of the controllers
are colocated in an NOC or data
center.
D. N+1 redundancy configuration
uses Layer 3 intercontroller
roaming, maintaining traffic on
the same subnet
for more efficiency.
When designing the threat Correct Answer: C
detection and mitigation portion
for the enterprise data center
network, which of the
following would be the most
appropriate solution to
consider?
A. 802.1X
B. ACLs in the core layer
C. Cisco Security MARS
D. Cisco Firewall Services
Module

Upgrade to remove ads Only $1/month

You have a campus network that Correct Answer: C


consists of only Cisco devices.
You have been tasked to
discover the device
platforms, the IOS versions, and
an IP address of each device to
map the network. Which
proprietary protocol
will assist you with this task?
A. SNMP
B. TCP
C. CDP
D. ICMP
E. LLDP

Which three technologies are Correct Answer: ABD


recommended to be used for
WAN connectivity in today's
Enterprise Edge
designs? (Choose three.)
A. DWDM
B. Metro Ethernet
C. Frame Relay
D. MPLS VPN
E. ISDN
F. DSL
G. Wireless

WAN backup over the Internet is Correct Answer: A


often used to provide primary
connection redundancy. Which
is the most
important consideration when
passing corporate traffic over
the public Internet?
A. security
B. static versus dynamic routing
C. bandwidth
D. QoS
E. latency

To provide Layer 2 connectivity Correct Answer: B


between the primary and
remote data centers, given that
the two data centers
are using Layer 3 routed DCIs,
which NX-OS technology can
be used to facilitate this
requirement?
A. VRF
B. OTV
C. MPLS
D. SPT
E. VPC

Which WLC interface is Correct Answer: B


dedicated for WLAN client data?
A. virtual interface
B. dynamic interface
C. management interface
D. AP manager interface
E. service port interface

According to Cisco, which four Correct Answer: BCDE


improvements are the main
benefits of the PPDIOO lifecycle
approach to
network design? (Choose four.)
A. faster ROI
B. improved business agility
C. increased network availability
D. faster access to applications
and services
E. lower total cost of network
ownership
F. better implementation team
engagement

DRAG DROP a
The first phase of PPDIOO
entails identifying customer
requirements. Drag the example
on the left to the
associated requirement on the
right.

During which phase of the Correct Answer: A


PPDIOO model would you
conduct interviews with
supporting staff to develop and
propose a viable solution?
A. Prepare
B. Plan
C. Design
D. Implement
E. Operate
F. Optimize

Which three are considered as Correct Answer: ABF


technical constraints when
identifying network
requirements? (Choose three.)
A. support for legacy
applications
B. bandwidth support for new
applications
C. limited budget allocation
D. policy limitations
E. limited support staff to
complete assessment
F. support for existing legacy
equipment
G. limited timeframe to
implement

DRAG DROP a
Drag the description or
characteristic on the left to the
appropriate technology or
protocol on the right.

DRAG DROP a
Click and drag the phases of the
PPDIOO network lifecycle
approach on the left to their
order on the right.

Characterizing an existing Correct Answer: B


network requires gathering as
much information about the
network as possible.
Which of these choices
describes the preferred order
for the information-gathering
process?
A. site and network audits, traffic
analysis, existing documentation
and organizational input
B. existing documentation and
organizational input, site and
network audits, traffic analysis
C. traffic analysis, existing
documentation and
organizational input, site and
network audits
D. site and network audits,
existing documentation and
organizational input, traffic
analysis

Upgrade to remove ads Only $1/month

Which three terms describe the Correct Answer: CDF


primary functions of the
distribution layer of the campus
network design
hierarchy? (Choose three.)
A. provides end-user
connectivity
B. provides high speed transport
C. provides QoS services
D. enforces security policies
E. provides WAN connections
F. connects access devices to
the core backbone

Refer to the exhibit. Correct Answer: D


Which statement accurately
represents the characteristics of
the core layer in this design?
A. QoS should only be
performed only in the core.
B. Load balancing should never
be implemented or used.
C. Access lists should be used in
the core to perform packet
manipulation.
D. Partial mesh should be used
as long as it is connected to
each device by multiple paths.
E. Policy-based traffic control
should be implemented to
enable prioritization and ensure
the best performance
for all time-critical applications.
Which two of the following are Correct Answer: AB
benefits of using a modular
approach to network design?
(Choose two.)
A. improves flexibility
B. facilitates implementation
C. lowers implementation costs
D. improves customer
participation in the design
process

Which three modular Correct Answer: ABD


components are part of the
Cisco Enterprise Edge
Architecture? (Choose three.)
A. e-commerce module
B. Internet connectivity module
C. server farm module
D. remote access and VPN
module
E. PSTN services module
F. enterprise branch module
G. building distribution module

Which of the following is a Correct Answer: D


component within the Cisco
Enterprise Campus module?
A. Teleworker
B. E-Commerce
C. Internet Connectivity
D. Building Distribution
E. WAN/MAN Site-to-Site VPN

What are the three primary Correct Answer: CDF


functions of the distribution
layer of the campus network
design hierarchy? (Choose
three.)
A. provide end-user connectivity
B. provide high speed transport
C. provide QoS services
D. enforce security policies
E. provide WAN connections
F. connect access devices to the
core backbone

DRAG DROP a
Drag the characteristics of the
traditional campus network on
the left to the most appropriate
hierarchical
network layer on the right.

DRAG DROP a
Drag the network function on
the left to the functional area or
module where it is most likely to
be performed in
the enterprise campus
infrastructure on the right.

Where in the Cisco Enterprise Correct Answer: B


Architecture model does
network management reside?
A. Enterprise data center
module
B. Enterprise campus module
C. Enterprise edge module
D. Service Provider edge
module
E. Service Provider data center
module

DRAG DROP a
Drag the security prevision on
the left to the appropriate
Network module on the right.

Which three solutions are part of Correct Answer: CDF


the Borderless Network
Services? (Choose three.)
A. Wireless
B. Routing
C. TrustSec
D. MediaNet
E. Switching
F. EnergyWise
G. Next-Gen WAN

Which two statements correctly Correct Answer: BC


identify the layers of the
Enterprise Campus module?
(Choose two.)
A. A is the Data Center Module
and C is the Campus Core layer.
B. A is the Data Center Module
and D is the Building Access
layer.
C. B is the Campus Core layer
and C is the Building Distribution
layer.
D. B is the Building Distribution
layer and C is the Campus Core
layer.
E. A is the Internet Connectivity
layer and B is the Campus Core
layer.
F. B is the Building Distribution
layer and D is the Building
Access layer.

Upgrade to remove ads Only $1/month

The evolution of the Data Center Correct Answer: A


is best represented by the 3.0
architecture component of
virtualization. Which
of the following is not an
example of the virtualization
taking place in the Data Center?
A. Virtualized media access
utilizing Fiber Channel over
Ethernet
B. VLANs and virtual storage
area networks (VSANs) provide
for virtualized LAN and SAN
connectivity,
separating physical networks
and equipment into virtual
entities
C. Virtual Machines that run an
application within the client
operating system, which is
further virtualized and
running on common hardware
D. Storage devices virtualized
into storage pools, and network
devices are virtualized using
device contexts

When there is a need for Correct Answer: AD


immunity to EMI for connecting
locations that are greater than
100 meters apart,
which two solutions can be
utilized? (Choose two.)
A. multimode fiber
B. Fiber Channel
C. HVDC transmission lines
D. single-mode fiber
E. serial RS-232
F. Gigabit Ethernet 1000BASE-CX
Which layer of the OSI model Correct Answer: C
does Cisco recommend to place
the enterprise network core
layer, when
designing a network based on
its switched hierarchical design?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4

OSPF will be used as the IGP Correct Answer: AE


within a campus network. Which
two things should you consider
before
deployment? (Choose two.)
A. All areas need to connect
back to area 0.
B. The OSPF process number on
each router should match.
C. NSSA areas should be used
when an area cannot connect
directly to area 0.
D. Stub areas should be
connected together using virtual
links.
E. ECMP may cause undesired
results depending on the
environment.

Which Cisco technology using Correct Answer: D


Nexus NX-OS infrastructure
allows the network architect to
create up to four
separate control and data plane
instances of the Nexus chassis?
A. virtual port-channel
B. virtual routing and forwarding
C. virtual switching system
D. virtual device context

Which three options are valid Correct Answer: ACD


Cisco STP tools used to ensure
best-practice access layer
design for the
enterprise campus? (Choose
three.)
A. Port fast
B. UDLD
C. Root Guard
D. BPDU Guard
E. Flex Links
F. SPAN
G. Ether Channel

Spanning Layer 2 across Correct Answer: A


geographically separate data
centers is a key consideration for
current data center
designs. Which is the name of
the NX-OS technology that
facilitates MAC in IP transport
for Layer 2 VLANs
across any IP network?
A. Overlay Transport
Virtualization
B. Virtual Private LAN Services
C. Generic Routing
Encapsulation
D. QinQ tunneling

Which two statements about Correct Answer: CE


designing the Data Center
Access layer are correct?
(Choose two.)
A. Multiport NIC servers should
each have their own IP address.
B. Layer 3 connectivity should
never be used in the access
layer.
C. Layer 2 connectivity is
primarily implemented in the
access layer.
D. Multiport NIC servers should
never be used in the access
layer.
E. Layer 2 clustering
implementation requires servers
to be Layer 2 adjacent.

What is the primary Correct Answer: A


consideration when choosing a
routed network design over a
traditional campus network
design?
A. Layer 3 service support at the
network edge
B. the routing protocol choice:
open (OSPF) or proprietary
(EIGRP)
C. the routing abilities of the
host devices
D. the need to control the
broadcast domains within the
campus core

When selecting which hardware Correct Answer: B


switches to use throughout an
enterprise campus switched
network, which
consideration is not relevant?
A. whether data link layer
switching based upon the MAC
address is required
B. the number of shared media
segments
C. which infrastructure service
capabilities are required
D. whether to support Layer 3
services at the network edge

Which two of these practices are Correct Answer: BE


considered to be best practices
when designing the access layer
for the
enterprise campus? (Choose
two.)
A. Implement all of the services
(QoS, security, STP, and so on) in
the access layer, offloading the
work from
the distribution and core layers.
B. Always use a Spanning Tree
Protocol; preferred is Rapid
PVST+.
C. Use automatic VLAN pruning
to prune unused VLANs from
trunked interfaces to avoid
broadcast
propagation.
D. Avoid wasted processing by
disabling STP where loops are
not possible.
E. Use VTP transparent mode to
decrease the potential for
operational error.

The enterprise campus core Correct Answer: B


layer has requirements that are
unique from the distribution and
access layers.
Which of the following is true
about the core layer?
A. The core layer provides
convergence using Layer 2 and
Layer 3 services and features.
B. The core layer provides high
availability to support the
distribution layer connections to
the enterprise edge.
C. The campus core layer is
optional.
D. The core layer requires high
performance to manage the
traffic policing across the
backbone.

Which of these statements is Correct Answer: B


true concerning the data center
access layer design?
A. The access layer in the data
center is typically built at Layer
3, which allows for better
sharing of services
across multiple servers.
B. With Layer 2 access, the
default gateway for the servers
can be configured at the access
or aggregation
layer.
C. A dual-homing NIC requires a
VLAN or trunk between the two
access switches to support the
dual IP
addresses on the two server
links to two separate switches.
D. The access layer is normally
not required, as dual homing is
standard from the servers to the
aggregation
layer.

Which one of these statements is Correct Answer: C


true concerning the data center
distribution (aggregation) layer
design?
A. With Layer 3 at the
aggregation layer, the physical
loops in the topology must still
be managed by STP.
VCEConvert.com
B. The boundary between Layer
2 and Layer 3 must reside in the
multilayer switches, independent
of any other
devices such as firewalls or
content switching devices.
C. A mix of both Layer 2 and
Layer 3 access is sometimes the
most optimal.
D. In a small data center, the
aggregation layer can connect
directly to the campus core,
exchanging IP routes
and MAC address tables.

DRAG DROP a
Drag the technology on the left
to the type of enterprise
virtualization where it is most
likely to be found on the
right.

Refer to the exhibit. Correct Answer: D


Which statement is true
concerning enterprise edge
distribution switches?
A. The speed of switching is the
most critical feature.
B. Security requirements are
offloaded to the other modules
for performance reasons.
C. Edge distribution switches are
only required when using a
collapsed core backbone.
D. Enterprise edge distribution
switches are similar to the
building distribution layer.
An enterprise campus module is Correct Answer: CD
typically made up of four sub
modules, as described by the
Cisco Enterprise
Architecture Model. Which two
sub modules are part of this
module?
A. DMZ
B. enterprise branch
C. building distribution
D. server farm/data center
E. MAN

Which is a factor in enterprise Correct Answer: A


campus design decisions?
A. network application
characteristics
B. routing protocol
characteristics
C. switching latency
characteristics
D. packet filtering characteristics

Which network virtualization Correct Answer: C


technology involves creating
virtual routers with its own
individual routing tables on
a physical router?
A. VSS
B. vPC
C. VRF
D. VLAN

Which protocol is the Correct Answer: B


recommended first-hop
redundancy protocol for an
existing infrastructure that
contains
multiple vendors and platforms?

A. HSRP
B. VRRP
C. IGRP
D. OSPF

Which IGP provides the fastest Correct Answer: A


convergence by default?
A. EIGRP
B. OSPF
C. IS-IS
D. RSTP
E. BGP

Which three are valid Layer 2 Correct Answer: ABF


access designs? (Choose three.)
A. Looped Triangle
B. Looped Square
C. Looped U
D. Loop-Free Triangle
E. Loop-Free Square
F. Loop-Free U

Which Gigabit Ethernet media Correct Answer: B


type provides the longest reach
without a repeater?
A. 1000Base-CX
B. 1000Base-LX
C. 1000Base-SX
D. 1000Base-T

DRAG DROP a
Drag the network characteristic
on the left to the design method
on the right which will best
ensure redundancy
at the building distribution layer.
Which three are associated with Correct Answer: ABD
the distribution layer within the
campus design? (Choose three.)
A. access layer aggregation
B. route summarization
C. network trust boundary
D. next-hop redundancy
E. layer 2 switching
F. port security
G. broadcast suppression

High availability is a key design Correct Answer: C


consideration in the enterprise
campus network. In a fully
redundant topology,
which is likely to provide faster
IGP convergence during a
failure?
A. redundant supervisors
B. redundant supervisors with
Cisco Nonstop Forwarding
(NSF) and Stateful Switchover
(SSO)
C. single supervisors with tuned
IGP timers
D. single supervisors
Which two enterprise campus Correct Answer: AB
layers are combined in a
medium-sized LAN? (Choose
two.)
A. core
B. distribution
C. access
D. backbone

E. aggregation

What is a characteristic of Correct Answer: A


campus core designs?
A. fast transport
B. security
C. summarization
D. redistribution

In the enterprise data center, Correct Answer: ABC


which are the three main
components? (Choose three.)
A. Network Infrastructure
B. Interactive services
C. Data Center Management
D. Internet services
E. WAN services
F. VPN and remote access

Which two common cable Correct Answer: AF


management strategies are used
in high-density server
deployments in the data
center? (Choose two.)
A. top-of-rack
B. middle-of-rack
C. bottom-of-rack
D. beginning-of-row
E. middle-of-row
F. end-of-row

Which servers that reside in the Correct Answer: A


data center require direct links
to all other enterprise modules?
A. network management servers
B. DHCP servers
C. Active Directory servers
D. IP SLA servers
E. web servers
DRAG DROP a
Drag the associated
virtualization tool or solution on
the left to the appropriate
design requirement on the right.

When designing using the Cisco Correct Answer: B


Enterprise Architecture, in which
Enterprise Campus layer does
the Remote
Access and VPN module
establish its connection?
A. Building Access
B. Campus Core
C. Enterprise Branch
D. Enterprise Data Center

DRAG DROP a
Drag the WAN technology on
the left to the most appropriate
category on the right.

Which three describe challenges Correct Answer: ABD


that are faced when deploying
an environment for teleworkers?
(Choose
three.)
A. supporting a mix of
technically knowledgeable and
nontechnical users
B. simplifying router installation
and configuration
C. verifying available power at
employee's house for necessary
equipment
D. avoiding situations where
employees might use
nonstandard hardware or
configurations
E. reducing daily commuting
time to main office location
F. providing access to FTP
servers located in main office
location
G. implementing leased line
connectivity between main
office and employee's home
location

You need to connect to a Correct Answer: A


remote branch office via an
Internet connection. The remote
office does not use
Cisco equipment. This
connection must be secure and
must support OSPF. Which of the
following can be used
to transport data to the branch
office?
A. GRE over IPsec
B. IPsec
C. GRE
D. IPsec VTI

Which two are characteristics of Correct Answer: AC


a Lightweight Access Point?
(Choose two.)
A. managed via a central
wireless LAN controller
B. code upgrade performed via
a TFTP server
C. CAPWAP tunnels
D. managed directly via CLI or
web interface
E. facilitates the creation of its
own WLANs and port mappings

Which one of these statements Correct Answer: C


describes why, from a design
perspective, a managed VPN
approach for
enterprise teleworkers is most
effective?
A. A managed VPN solution uses
a cost-effective, on-demand
VPN tunnel back to the
enterprise.
B. This solution supports all
teleworkers who do not require
voice or video.
C. This architecture provides
centralized management where
the enterprise can apply security
policies and
push configurations.
D. It provides complete
flexibility for remote access
through a wireless hotspot or a
guest network at a hotel, in
addition to a home office.

What are three key areas that Correct Answer: ADE


need to be considered when
designing a remote data center?
(Choose three.)
A. power diversity
B. active directory services
VCEConvert.com
C. Cisco IOS versions
D. data storage
E. applications
F. user access
G. packet routing

If a teleworker is required to Correct Answer: D


access the branch office via a
secure IPSEC VPN connection,
which technology is
recommended to provide the
underlying transport?
A. ISDN
B. Metro Ethernet
C. Frame Relay
D. ADSL
E. ATM

Which model of ISR is utilized Correct Answer: C


for the teleworker design
profile?
A. Cisco 1900 Series
B. Cisco 1800 Series
C. Cisco 800 Series
D. Cisco 500 Series

When designing a WAN backup Correct Answer: ACD


for voice and video applications,
what three types of connections
should be
used? (Choose three.)
A. Private WAN
B. internet
C. ISDN
D. MPLS
E. dial-up
F. ATM
G. DSL

Which three options represents Correct Answer: ABC


the components of the
Teleworker Solution? (Choose
three.)
A. Cisco Unified IP Phone
B. Cisco 880 Series Router
C. Aironet Office Extend Access
Point
D. Catalyst 3560 Series Switch
E. Cisco 2900 Series Router
F. MPLS Layer 3 VPN
G. Leased lines

Which three service categories Correct Answer: ABC


are supported by an ISR?
(Choose three.)
A. voice
B. security
C. data
D. Internet
E. storage
F. satellite

When designing for a remote Correct Answer: CD


worker, which two are typical
requirements? (Choose two.)
A. best-effort interactive and
low-volume traffic patterns
B. connections to the enterprise
edge using Layer 2 WAN
technologies
C. always-on connection with
SLA from ISP
D. voice and IPsec VPN support
E. high-end security devices with
stateful firewall filtering
F. dual or multihoming to ISPs

What is the maximum number of Correct Answer: D


groups that is supported by
GLBP?
A. 64
B. 256
C. 512
D. 1024

DRAG DROP a
Match the bandwidth usage
optimization technique on the
left with its definition on the
right.

Which two routing protocols Correct Answer: DE


usually converge most quickly?
(Choose two.)
A. RIPv1
B. RIPv2
C. BGP
D. OSPF
E. EIGRP

Which two routing protocols Correct Answer: DE


operate over NBMA point-to-
multipoint networks without the
use of point-to-point
sub interfaces? (Choose two.)
A. RIPv1
B. RIPv2
C. IS-IS
D. EIGRP
E. OSPF

Refer to the exhibit. Correct Answer: EFG


Which three modules would
typically utilize public IPv4
addressing? (Choose three.)
A. Access
B. Distribution
C. Core
D. Data Center
E. E-Commerce
F. Internet Connectivity
G. Remote Access/VPN
H. WAN/MAN
I. Branch
J. Branch Data Center

With respect to IPv6 addressing, Correct Answer: C


from a design perspective,
which of these statements is it
important to keep in
mind?
A. IPv6 addressing provides
convenience of anycast
addressing without any
configuration requirements.
B. IPv6 does not use multicast
addressing.
C. An IPv6 router will not
forward packets from one link to
other links if the packet has
either a link-local source
or a link-local destination
address.
D. Dynamic address assignment
requires DHCPv6.

Which consideration is the most Correct Answer: A


important for the network
designer when considering IP
routing?
A. convergence
B. scalability
C. on-demand routing
D. redistribution

Your supervisor has asked you Correct Answer: A


to deploy a routing protocol
within the lab environment that
will allow for unequal
cost multipath routing. Which
should you choose?
A. EIGRP
B. OSPF
C. IS-IS
D. RIP

Which two methods are used to Correct Answer: BD


reduce the mesh links required
between iBGP peers in the same
AS? (Choose
two.)
A. community
B. router reflectors
C. local preference
D. confederations
E. atomic aggregate
F. MED
A company wants to use private Correct Answer: D
IP addresses for all its internal
hosts. Which technology can the
company use
to provide access to the Internet
using a single public IP address?
A. static NAT
B. source routing
C. ACL
D. PAT

At which layer of the network is Correct Answer: C


route summarization
recommended?
A. data link layer
B. core layer
C. distribution layer
D. access layer

Which two link state routing Correct Answer: BE


protocols support IPv6 routing?
(Choose two.)
A. BGP4+
B. OSPF
C. RIPng
D. EIGRP
E. IS-IS

Which is the North American RIR Correct Answer: B


for IPv4 addresses?
A. RIPE
B. ARIN
C. IANA
D. IEEE
E. APNIC

What is the most compact Correct Answer: C


representation of the following
IPv6 address?
2001:db8:0000:0000:cafe:0000:0
000:1234
A. 2001:db8::cafe::1234
B. 2001:db8::cafe:0000:0000:1234
C. 2001:db8:0:0:cafe::1234
D. 2001:db8::cafe:0:1234

Which type of area should you Correct Answer: D


use in an enterprise OSPF
deployment if you want to
prevent propagation of
type 5 LSAs but still allow the
redistribution of external routes?
A. stub
B. totally stubby
C. backbone
D. NSSA
E. virtual link

Which is usually used to connect Correct Answer: C


to an upstream ISP?
A. EIGRP
B. OSPF
C. BGP
D. IS-IS
E. RIPv2

You are designing a network that Correct Answer: C


requires a routing protocol that
will use minimal network
bandwidth. Which
would satisfy this requirement?
A. RIPv2
B. RIPng
C. OSPF
D. ARP
E. EGP

Which two statements best Correct Answer: BD


describe an OSPF deployment?
(Choose two.)
A. ABR provides automatic
classful network boundary
summarization.
B. ABR requires manual
configuration for classful
network summarization.
C. External routes are
propagated into the
autonomous system from stub
areas via ASBR.
D. External routes are
propagated into the
autonomous system from
regular areas or NSSA via ASBR.
E. External routes are
propagated into the
autonomous system from
regular areas or NSSA via ABR.

Which three items pertain to Correct Answer: ACG


EIGRP? (Choose three.)
A. Can use multiple unequal
paths.
B. Routes are redistributed as
type 2 by default.
C. ASN and K values must match
to form neighbors.
D. Uses multicast address
224.0.0.9 for updates.
E. Exchanges full routing table
every 30 seconds.
F. Summary routes have AD of
90.
G. External routes have AD of
170.

A hierarchical design of the Correct Answer: AB


EIGRP domain facilitates which
two of the following? (Choose
two.)
A. route summarization
B. faster convergence
C. unequal cost load balancing
D. redistribution
E. virtual links

Which three protocols support Correct Answer: ACD


VLSM? (Choose three.)
A. RIPv2
B. RIPv1
C. EIGRP
D. OSPF
E. IGRP

Which statement should the Correct Answer: B


designer keep in mind when
considering the advanced
routing features?
A. One-way route redistribution
avoids the requirement for static
or default routes.
B. Redistribution, summarization,
and filtering are most often
applied between the campus
core and enterprise
edge.
C. Filtering only occurs on the
routing domain boundary using
redistribution.
D. Summarize routes at the core
toward the distribution layer.
E. The hierarchical flexibility of
IPv6 addressing avoids the
requirement for routing traffic
reduction using
aggregation.

When designing an EIGRP Correct Answer: AB


network, which two things
should you take into
consideration? (Choose two.)
A. ASN and K values must match.
B. The neighbor command can
be used to enable unicast
communication.
C. The neighbor diameter cannot
exceed a 15-hops limit.
D. NSSA areas can be used to
redistribute external routes.
E. Neighbor relationship can be
established with non-Cisco
routers.

Which statement describes a Correct Answer: A


unique advantage of EIGRP?
A. It enables unequal-cost load
balancing.
B. It enables equal-cost load
balancing.
C. It enables source-based load
balancing.
D. It enables port-based load
balancing.

ACME Corporation is Correct Answer: B


implementing dynamic routing
on the LAN at its corporate
headquarters. The interior
gateway protocol that they
select must support these
requirements: multivendor
environment, efficient
subnetting, high scalability, and
fast convergence. Which interior
gateway protocol should they
implement?
A. EIGRP
B. OSPF
C. RIPng
D. BGP

Which routing protocol Correct Answer: A


classification should you use
when full topology information
is needed?

A. link-state
B. distance vector
C. stateful
D. path vector

When you are designing a large Correct Answer: A


IPv6 multivendor network, which
IGP does Cisco recommend that
you use?
A. OSPFv3
B. EIGRP for IPv6
C. BGP
D. RIPng

When designing the Correct Answer: D


infrastructure protection portion
for the enterprise edge, which
solution would be the most
appropriate solution to
consider?
A. 802.1X
B. ACLs in the core layer
C. Cisco Security MARS
D. AAA

Which two design approaches Correct Answer: AC


provide management of
enterprise network devices?
(Choose two.)
A. in-band
B. out-of-line
C. out-of-band
D. in-line

You are asked to design a new Correct Answer: BC


branch office that will need to
support 25 users. These users
will be using an
ISP connection and will need to
connect to the main office for
network services. Which two
Cisco devices are
the most appropriate to fulfill all
of these requirements? (Choose
two.)
A. Cisco IPS
B. Cisco ISR G2
C. Cisco ASA
D. Cisco 2960
E. Cisco CRS-1
F. Cisco ACS
What are the three modes of Correct Answer: ABC
unicast reverse path forwarding?
(Choose three.)
A. strict
B. loose
C. VRF
D. global
E. PIM
F. local

Which network access control Correct Answer: B


technology is recommended to
use with Layer 2 access layer
switches?
A. 802.1q
B. 802.1x
C. 802.3af
D. 802.3q
E. 802.11n

Refer to the list of requirements. Correct Answer: A


Which IP telephony design
model should you implement to
fulfill these
requirements?
must be a single, large location
with many remote sites
must have multisite WAN
connectivity
requires SRST for call processing
redundancy
A. centralized
B. distributed
C. clustered
D. decentralized

Which is the equation used to Correct Answer: D


derive a 64 Kbps bit rate?
A. 2 x 8 kHz x 4-bit code words
B. 8 kHz x 8-bit code words
C. 2 x 4-bit code words x 8 kHz
D. 2 x 4 kHz x 8-bit code words

Which three statements are true Correct Answer: ABD


regarding the virtual interface
on a Cisco Wireless LAN
Controller? (Choose
three.)
A. supports mobility
management
B. serves as a DHCP relay
C. used for all controller to AP
communication
D. supports embedded Layer 3
security
E. default for out-of-band
management
F. default for in-band
management
G. provides connectivity to AAA
servers

A campus network needs end- Correct Answer: ADE


to-end QoS tools to manage
traffic and ensure voice quality.
Which three types of QoS tools
are needed? (Choose three.)
A. interface queuing and
scheduling
B. congestion management
C. compression and
fragmentation
D. bandwidth provisioning
E. traffic classification
F. buffer management

Which technology enables Correct Answer: C


WLCs to peer with each other to
enable roaming support?
A. WAP profiles
B. roaming profiles
C. mobility groups
D. peer groups

Which IP telephony component Correct Answer: B


supports VoIP, PoE, and QoS?
A. client endpoints
B. voice-enabled infrastructure
C. Cisco Unified
Communications Manager
D. Cisco Unified Contact Center

Your supervisor wants you to Correct Answer: B


recommend a management
protocol that will allow you to
track overall bandwidth
utilization, utilization by traffic
type, and utilization by source
and destination. Which is ideally
suited for this
function?
A. MRTG
B. NetFlow
C. RRD
D. SNMP

Which factor would be most Correct Answer: C


influential in choosing
multimode fiber optic
connections over UTP?
A. signal attenuation
B. required bandwidth
C. required distance
D. electromagnetic interference
E. cost

Which WAN technology is a Correct Answer: D


cost-effective method to deliver
100Mb of bandwidth to multiple
branch offices?
A. DSL
B. DWDM
C. ISDN
D. Metro Ethernet

Which subnet address and mask Correct Answer: B


would you use for all Class D
multicast addresses to be
matched within an
access list?
A. 224.0.0.0/20
B. 224.0.0.0/4
C. 239.0.0.0/24
D. 239.0.0.0/8
E. 225.0.0.0/8

A company is implementing an Correct Answer: B


Identity Management solution
with these characteristics:
1) existing AAA Server
2) Cisco Catalyst switches
3) minimal added investments
Which Cisco Trust and Identity
Management solution would
you recommend?
A. NAC Appliance
B. Cisco IBNS
C. CSM
D. Cisco Security MARS

When considering the three Correct Answer: D


VoIP design models - single site,
centralized multisite, and
distributed multisite -
which question below would
help to eliminate one of the
options?
A. Will the switches be required
to provide inline power?
B. Will users need to make
offsite calls, beyond the
enterprise?
C. Will users require applications
such as voice mail and
interactive voice response?
D. Are there users whose only
enterprise access is via a QoS-
enabled WAN?

Which two devices would you Correct Answer: AC


place in your DMZ to ensure
enterprise edge security?
(Choose two.)
A. IPS
B. NAC
C. ASA
D. ACS
E. WCS

Which three are security Correct Answer: ABD


services offered through Cisco
Router Security? (Choose three.)
A. Trust and Identity
B. Integrated Threat Control
C. Unified Wireless Network
Security Solution
D. Secure Connectivity
E. Voice-Messaging Security
F. Endpoint Security
G. Virtual Security Gateway

Which voice codec should you Correct Answer: A


use in order to provide toll
quality calls?
A. G.711
B. G.718
C. G.722
D. G.729

QUESTION 147 Correct Answer: ADE


Which three are features of
LWAPP? (Choose three.)
A. firmware synchronization
B. local management of APs
C. configuration changes
manually synced
D. encryption of control channel
E. configuration data only on the
WLC
F. wireless control free operation
G. replaces 802.1x for
authentication in wireless
connections

Which Cisco device has the sole Correct Answer: D


function at looking at threat
detection and mitigation at the
Enterprise edge?
A. Cisco IOS router
B. Cisco ASA
C. Cisco Catalyst FWSM
D. Cisco IPS

Which three of these are layers Correct Answer: ABE


in the Cisco SONA Architecture?
(Choose three.)
A. Applications
B. Physical Infrastructure
C. Presentation
D. Integrated Transport
E. Core Common Services
F. Networked Infrastructure
What business trend allows Correct Answer: B
employees to use personal
devices to access enterprise
data and systems?
A. ISE
B. BYOD
C. SAN
D. IOE

What three customer supported Correct Answer: ABC


details identifies network
requirements based on the
PPDIOO design model?
(Choose three.)
A. goals
B. budget
C. user needs
D. locations
E. policies
F. tasks

An engineer receives a resource Correct Answer: A


utilization alert on a router. What
command should be used to
investigate the
issue?
A. show processes cpu
B. show memory
C. show running-config
D. show version

What part of the network does a Correct Answer: D


top-down network design focus
on for solution development?
A. presentation
B. hardware
C. session
D. application
E. data link
F. transport

An engineer has configured a Correct Answer: C


router to send level 7 messages
to a syslog server. What severity
level are these
messages?
A. error
B. warning
C. debug
D. informational
E. notice
A network engineer must Correct Answer: B
implement a design where LAN
clients are to connect to various
access layer devices,
while remaining on the same
VLAN . What type of design
would support this requirement?
A. routed
B. switched
C. tunneled
D. virtual

When evaluating network Correct Answer: A


designs, what indicator
demonstrates that the modular
approach was followed?
A. ability to scale
B. follows best practices
C. redundant connectivity
D. easy to deploy

A network engineer is following Correct Answer: D


the Cisco enterprise architecture
model. To which network layer
would a branch
office connect to using a private
WAN?
A. Enterprise Campus
B. Enterprise Edge
C. SP Edge Premise
D. Remote Module

A network engineer is following Correct Answer: B


the three tiered Network
Hierarchical Model. At which tier
is route
summarization implemented?
A. core
B. distribution
C. backbone
D. access

A network engineer is using the Correct Answer: A


Cisco enterprise architecture
model. In what module do
network management
servers reside?
A. Enterprise Campus
B. Enterprise Edge
C. Remote Modules
D. SP Edge WAN/internet
What three design requirements Correct Answer: ADE
are key to designing a campus
core? (Choose three.)
A. low latency
B. access control
C. traffic filtering
D. high speed
E. redundant links
F. QoS tagging

What type of device can be Correct Answer: B


installed to increase a broadcast
domain?
A. router
B. switch
C. IDS
D. IPS

To what Layer 2 technology Correct Answer: C


does VRF closely compare?
A. VSS
B. VPC
C. VLAN
D. VTP
What network virtualization Correct Answer: C
technology can be leveraged
within the data center to reduce
the number of
physical devices?
A. VLANs
B. VPLS
C. VDC
D. VSS

During the design of a new Correct Answer: A


campus network, the customer
requests the ability to route
overlapping IP
addresses. What technology can
be leveraged to meet this
request?
A. VRF
B. VLANs
C. VSS
D. VPC

A network engineer is Correct Answer: C


attempting to separate routing
domains using a virtualization
technology. What protocol
can be configured to perform
this task?
A. VLAN
B. VSAN
C. VRF
D. VPC

What device virtualization Correct Answer: B


technology allows for a single
point of management and a
centralized routing
instance?
A. ACE
B. VSS
C. VDC
D. VM

What two performance Correct Answer: AC


considerations must be taken
into account when designing a
remote worker access
solution? (Choose two.)
A. simultaneous VPN
connections
B. port density
C. throughput capacity
D. packet size
E. latency

In which network location Correct Answer: C


should an external DNS server
be placed?
A. campus data center
B. enterprise branch
C. internet
D. remote access

What submodule is found within Correct Answer: A


the Enterprise Edge module?
A. enterprise WAN
B. remote branch
C. campus IPS
D. building distribution

A company requires a managed Correct Answer: C


WAN solution that supports
Layer 2 adjacency across remote
offices for
applications and services. What
solution should be selected?
A. DMVPN
B. MPLS
C. VPLS
D. FR

A circuit order has been placed Correct Answer: C


for Gigabit Ethernet and is 80KM
from the carrier equipment.
What type of SFP
will be required?
A. TX
B. SX
C. ZX
D. LX

A company has dark fiber Correct Answer: B


between headquarters and its
data center. It is presently
configured as a 10GbE
connection. Network utilization
shows high utilization on the
connection. What technology
can be implemented
to increase capacity without
acquiring another circuit?
A. MPLS
B. DWDM
C. VPLS
D. DMVPN

A secure WAN design requires Correct Answer: BC


dynamic routing and IP
multicast. What two VPN
protocols meet these
requirements? (Choose two.)
A. Standard IPsec
B. P2P GRE over IPsec
C. DMVPN
D. AnyConnect
E. PPTP
F. Easy VPN
G. SSL/TLS

What branch design supports Correct Answer: C


100 to 1000 users and integrates
ASA firewalls?
A. small
B. medium
C. large
D. extra large
A network engineer is designing Correct Answer: D
an enterprise managed VPN
solution for a large number of
remote offices that
do not have on-site IT support
and communicate only with the
home office. What type of VPN
solution should
be implemented?
A. VPLS
B. GRE
C. IPsec
D. EVPN
E. DMVPN
F. SSL client

A remote office has a T1 WAN Correct Answer: AC


link to headquarters and a T1
Internet connection. The client
requests WAN
redundancy to headquarters
with similar bandwidth. What two
connection types satisfy this
requirement?
(Choose two.)
A. Secondary T1 WAN circuit
B. ISDN BRI
C. IPSec Tunnel over the Internet
D. DWDM l
E. POTS Line T1 WAN

What two features are Correct Answer: AB


advantages of adding a
secondary WAN link at the
enterprise edge? (Choose two.)
A. provides additional
bandwidth and load balancing
capabilities
B. acts as a backup link in event
the primary link fails
C. reduces capital and
operational costs
D. improves security and
prevents against denial of
service attacks
E. distributes traffic proactively
based on link utilization

What technology can secure Correct Answer: A


data over an insecure medium
and provide WAN redundancy in
the event of a
primary connection failure?
A. virtual private network
B. shadow PVC
C. dial-up ISDN
D. GRE Tunnel

A client wants to consolidate Correct Answer: AC


applications that are currently
housed at multiple sites to a
remote data center.
What two design requirements
are unique to this scenario?
(Choose two.)
A. bandwidth
B. security
C. latency
D. storage
E. availability

What IPv4 addressing technique Correct Answer: A


allows for the division of
addresses into subnets of
different sizes?
A. VLSM
B. RIR
C. CIDR
D. NAT
An organization is conducting Correct Answer: ABD
an evaluation on the migration
to IPv6 within the enterprise
network and has
requested clarification on
recommended migration
strategies. What three migration
models would accomplish
the organization's goal? (Choose
three.)
A. Dual Stack
B. Service Block
C. Top-Down
D. Hybrid
E. Tunneled
F. Fork-Lift

An application uses broadcast Correct Answer: D


traffic to send data to IPv4 hosts.
How can the application
communicate using
IPv6?
A. Anycast
B. Unicast
C. Broadcast
D. Multicast

What significant advantage does Correct Answer: B


EIGRP have over OSPF?
A. easy summarization
B. shorter convergence times
C. single area operation
D. low processor utilization

What routing protocol requires Correct Answer: C


full mesh between internal peers
in an enterprise network?
A. OSPF
B. EIGRP
C. BGP
D. ISIS
E. RIP

What three considerations Correct Answer: BDE


should be taken into account
when selecting a routing
protocol? (Choose three.)
A. classful routing
B. scalability
C. default route origination
D. multi vendor support
E. link load balancing
F. hop count

By default, how does EIGRP's Correct Answer: D


metric differ from OSPF?
A. hops
B. cost
C. bandwidth
D. delay

What characteristic separates Correct Answer: A


link state routing protocols from
a distance vector?
A. creates a topological view of
the entire network
B. path calculation utilizes a
more granular metric
C. does not scale well for large
networks
D. constantly shares link state
updates throughout the
topology

A company must deploy an IGP Correct Answer: A


routing protocol on an
Enterprise Network. Where
should route summarization
be implemented?
A. distribution
B. core
C. access
D. backbone

What routing configuration can Correct Answer: A


prevent routing loops between
IGPs?
A. route filters
B. route reflectors
C. auto summarization
D. virtual links

What is the first step when Correct Answer: A


creating a network security
policy?
A. define what should be
protected
B. investigate how likely an
attack is to occur
C. implement measures to
protect assets
D. hire a security firm to perform
penetration tests

A customer requests a filtering Correct Answer: A


design based on the need to
scan all internet traffic, including
remote workers.
What solution meets these
requirements?
A. Cisco Cloud Web Security
B. Cisco Network Admission
Control
C. Cisco Identity Services Engine
D. Cisco Adaptive Security
Appliance

A customer wants to support a Correct Answer: BD


BYOD environment. What two
products allow for posture
assessment? (Choose
two.)
A. ACS
B. NAC
C. ASA
D. ISE
E. WAAS
F. IDS

What two CoS values are used Correct Answer: CE


by voice traffic? (Choose two.)
A. COS1
B. COS2
C. COS3
D. COS4
E. COS5

A client wants to deploy a video Correct Answer: AD


conferencing platform in a
multisite WAN environment.
What two design
considerations need to be
evaluated? (Choose two.)
A. CODECs supported by the
video units
B. buffer sizes on the routers
C. POE capabilities of the
switches
D. number of current calls
E. number of hops between sites
What wireless authentication Correct Answer: A
option requires a Public Key
Infrastructure?
A. EAP-TLS
B. PEAP
C. LEAP
D. EAP-FAST

What two access point modes Correct Answer: AB


support the transmission of user
traffic over a LWAPP/CAPWAP
tunnel?
(Choose two.)
A. local
B. H-REAP
C. rogue detector
D. monitor
E. sniffer
F. standalone

What is the primary advantage Correct Answer: C


of implementing a wireless LAN
controller in a wireless LAN
design?
A. roaming between APs
B. RADIUS user authentication
C. radio resource management
D. accelerated data transfer

A wireless LAN client is sending Correct Answer: C


traffic to the wired LAN client.
What path will the packet take to
reach the
destination endpoint in a
lightweight wireless
deployment?
A. switch > controller > ap >
client
B. controller > ap > switch >
client
C. ap > controller > switch >
client
D. switch > ap > controller >
client

What Cisco product is designed Correct Answer: B


to improve the performance of
Windows file and exchange
services in remote
data centers?
A. Application Control Engine
B. Wide Area Application
Services
C. Cisco Application Policy
Infrastructure Controller
D. Cisco Prime Network Services
Controller

An organization needs a WAN Correct Answer: A


Transport technology that meets
these criteria:
has a low initial cost
provides low-to-medium BW
has medium-to-high latency and
jitter
Which technology should the
organization use?
A. DSL
B. X.25
C. ISDN
D. wireless
E. analog modem

Which two of these are Correct Answer: DE


scalability benefits of designing
a network that utilizes VPNs?
(Choose two.)
A. extends the network to
remote users
B. allows networks to be set up
and restructured quickly
C. reduces dial infrastructure
expenditures
D. reduces the number of
physical connections
E. simplifies the underlying
structure of a customer WAN

Refer to the exhibit. Correct Answer: C


A standard Layer 2 campus
network design is pictured.
Which numbered box represents
the core layer?
A. #1
B. #2
C. #3
D. #4
E. #5

Which two design criteria Correct Answer: BD


require VLANs in a proposed
solution? (Choose two.)
A. video streaming on the LAN
B. security between
departments
C. the segmenting of collision
domains
D. the segmenting of broadcast
domains
E. the use of multivendor
equipment
F. a limited corporate budget

Which three sources does a Correct Answer: ACD


network designer use to collect
information for characterizing an
existing network?
(Choose three.)
A. staff input
B. visual inventory
C. network audit
D. traffic analysis
E. server statistics

Which Cisco security mechanism Correct Answer: D


has the attributes listed below?
It is a sensor appliance
It searches for potential attacks
by capturing and analyzing
traffic
It is a "purpose-built device"
It is installed passively
It introduces no delay or
overhead
A. IKE
B. PIX
C. HIPS
D. NIDS
E. HMAC

Which three pieces of Correct Answer: ABD


information should be
documented for each step in a
design implementation plan?
(Choose three.)
A. step description
B. design document references
C. easy guidelines in case of
failure
D. estimated implementation
time
E. simple implementation
guidelines
F. estimated rollback time in
case of failure
Which Cisco device Correct Answer: E
management feature is most
suited to metering network
traffic and providing data for
billing
network usage?
A. BGP
B. Cisco Discovery Protocol
C. QoS
D. RMON
E. NetFlow

What are three valid methods of Correct Answer: ABE


gathering information about an
existing data network? (Choose
three.)
A. Use organizational input.
B. Perform a traffic analysis.
C. Analyze the user-mapping of
a running application.
D. Perform a packet-level audit
to verify carrier service
guarantees.
E. Perform a network audit to
gather more detail about the
network.
F. Use reports that analyze the
metrics of the customer's
existing network.

What is the benefit of VLSM? Correct Answer: C


A. reduces configuration
complexity by using the same
subnet mask length
B. reduces the routing table size
by using automatic route
summarization
C. reduces the routing table size
by using manual route
summarization
D. allows the subnet mask and
classful routing updates to be
advertised
E. secures the hosts on a subnet
by using RFC 1918 addresses

Refer to the exhibit. On which Correct Answer: B


router should you configure
redistribution?
A. Router 1
B. Router 2
C. Router 3
D. Router 4
E. Router 5

Which three Cisco technologies Correct Answer: ABC


can you use to detect and
mitigate threats? (Choose three.)
A. NetFlow
B. FWSM
C. ISE
D. VRRP
E. sFLOW

Which technology allows Correct Answer: A


remote networks to be
connected via site-to-site
tunnels?
A. IPsec VPN
B. AnyConnect VPN
C. SSL VPN
D. EasyConnect VPN

Which RFC defines the IPv6 Correct Answer: C


standard?
A. RFC 1918
B. RFC 2338
C. RFC 2460
D. RFC 2740

What is the maximum RIPv2 hop Correct Answer: C


count for a reachable route?
A. 13
B. 14
C. 15
D. 16

Which Cisco Wireless LAN Correct Answer: A


Controller interface is used for
out-of-band management?
A. service port
B. management port
C. controller port
D. virtual port

In which operation mode does Correct Answer: A


the AP act as a dedicated sensor
for location-based and intrusion
detection
services?
A. monitor mode
B. promiscuous mode
C. discovery mode
D. sniffer mode

Which HSRP parameters must Correct Answer: A


match, to ensure proper
functionality?
A. group parameters
B. priority parameters
C. preempt parameters
D. tracking parameters

What three primary sources of Correct Answer: ACD


information are needed to
perform a network audit?
(Choose three.)
A. existing documentation
B. new documentation
C. existing network management
software
D. new network management
tools
E. management personnel
F. technical personnel
Which three layers comprise the Correct Answer: ABC
traditional hierarchical model?
(Choose three.)
A. core layer
B. distribution layer
C. access layer
D. aggregation layer
E. network layer
F. Internet layer

Which first-hop redundancy Correct Answer: C


protocol dynamically distributes
client traffic between multiple
routers?
A. HSRP
B. VRRP
C. GLBP
D. IGRP

Which three options are Correct Answer: ABC


characteristics of data center
evolution? (Choose three.)
A. consolidation
B. virtualization
C. automation
D. standardization
E. optimization
F. modulation

Which option is a benefit of the Correct Answer: B


modular approach to network
design?
A. higher availability
B. repeatable scalability
C. increased security
D. improved resiliency

Which statement describes the Correct Answer: A


methodology that supports the
Cisco Enterprise Architecture
models?
A. It divides the network into
functional network modules.
B. It divides the network into
role-based network modules.
C. It divides the network into
regional network modules.
D. It divides the network into
operational network modules.
Which design is the Correct Answer: B
recommended geometric
design for routed topologies?
A. linear
B. triangular
C. rectangular
D. circular

Which statement describes an Correct Answer: A


advantage of the Layer 2 access
model over the Layer 3 access
model in the
data center?
A. It enables NIC teaming.
B. It removes STP dependency.
C. It increases scalability.
D. It decreases convergence.

Router A has three feasible Correct Answer: C


successors to the 192.168.1.0/24
network, which are listed here:
Option 1 has a metric of 8123228.
Option 2 has a metric of
2195467.
Option 3 has a metric of
8803823.
The variance 4 command was
issued on Router A. How many
active entries does Router A
have in its routing
table for the 192.168.1.0/24
network?
A. 0
B. 1
C. 2
D. 3

Which two mechanisms are used Correct Answer: AC


by distance vector protocols to
prevent routing loops? (Choose
two.)
A. split horizon
B. route summarization
C. route poisoning
D. tuned timers

Which interior routing protocol Correct Answer: C


has the most preferable
administrative distance by
default?
A. RIP
B. OSPF
C. EIGRP
D. BGP
E. IS-IS

A network engineer has been Correct Answer: D


asked to follow a top down
design approach. What layer of
the OSI model is used
to start the design?
A. physical
B. network
C. transport
D. application

Where in the network hierarchy Correct Answer: C


should network access control
be performed?
A. backbone
B. core
C. access
D. distribution

What are two advantages of Correct Answer: DE


employing scalability when
designing a campus network?
(Choose two.)
A. reduces operational cost
B. higher port density
C. investment protection
D. consistent operation
E. improved fault tolerance

A network engineer is using the Correct Answer: B


traditional switched hierarchical
design. The client has asked to
increase uplink
utilization from the access layer
to the distribution. How can the
engineer attain this new
requirement without
adding new physical
connections?
A. enable spanning-tree portfast
B. enable VSS at the distribution
layer
C. increase the MTU size on the
uplink interfaces
D. ensure the root bridge
priority is equal on both
distribution switches
Multicast has been enabled and Correct Answer: A
configured in the Enterprise, and
PIM Sparse-mode has been
enabled on all
VLANs. What feature is required
to stop multicast traffic from
being broadcasted on the
access layer switches?
A. IGMP snooping
B. Multicast boundary filter
C. PIM dense-mode
D. Dynamic ARP inspection

What two SAN protocols will Correct Answer: AB


allow a customer to utilize
10GbE for SAN access? (Choose
two.)
A. ISCSI
B. FCoE
C. SATA
D. Fiber Channel
E. AoE

Application servers require load Correct Answer: B


balancing and security services.
Where in the data center
network should
these services be provisioned?
A. core
B. aggregation
C. Layer 3 access
D. distribution

A data center is reaching its Correct Answer: BC


power and cooling capacity.
What two virtualization
technologies can address the
problem by directly reducing
the number of physical devices?
(Choose two.)
A. virtual switching systems
B. virtual device contexts
C. virtual servers
D. virtual routing and forwarding
E. virtual port channels
F. virtual LANs

A dynamically routed private Correct Answer: A


line and a statically routed IPsec
tunnel connect two offices. What
routing
configuration prefers the IPsec
tunnel only in the event of a
private line failure?
A. floating static entry
B. EIGRP variance
C. bandwidth metric
D. OSPF maximum paths

When designing a new Correct Answer: B


enterprise campus network,
what topology should be used
for maximum scalability?
A. flat
B. three-layer
C. star
D. partial mesh
E. full mesh

A spanning tree topology can Correct Answer: D


be simplified by deploying what
Cisco IOS technology in the
distribution block?
A. VDC
B. vPC
C. Rapid PVST+
D. VSS
E. Flex Links
An organization is deciding what Correct Answer: D
routing protocol to use
throughout their network. What
must be considered if
routing is to be performed at the
access layer?
A. reduced scalability of the
network when introducing a
large number of switch blocks
into the routing table
B. centralized management of
access control lists at the
distribution layer
C. reliability when implementing
routing over spanning-tree at
the access layer
D. performance differences
between core, distribution and
access layer equipment

A routing protocol neighbor Correct Answer: B


relationship has been
established between two routers
across the public Internet
using GRE. What technology can
be used to encrypt this
communication channel?
A. access lists
B. IP security
C. context based access
D. intrusion prevention system

Your company uses OSPF for Correct Answer: D


internal routing. The company
will be connected to VendorA
via a single
dedicated link and to VendorB
via redundant dedicated links.
Both vendors also use OSPF for
internal routing.
Which of the following
deployments describes the best
intra-domain routing practice in
this situation?
A. Connect your company to
both VendorA and VendorB
using existing OSPF.
B. Redistribute the routes on
each link between your
company and the vendors to a
shared EIGRP routing
protocol.
C. Use IBGP to reach VendorA
and EBGP to reach VendorB.
D. Use static routes to reach
VendorA and EBGP to reach
VendorB.
E. Use static routes to reach
both VendorA and VendorB.

You design a network with the Correct Answer: C


following network addresses:
192.168.168.0
192.168.169.0
192.168.170.0
192.168.171.0
192.168.172.0
192.168.173.0
192.168.174.0
192.168.175.0
Which route address is the best
summary of these network
addresses?
A. 192.168.0.0/24
B. 192.168.171.128/3
C. 192.168.168.0/21
D. 192.168.175.0/3
E. 192.168.0.0/16
A network engineer must collect Correct Answer: AD
application-level information
passing through a router. What
two tools can
provide this information?
(Choose two.)
A. NBAR
B. CiscoWorks
C. SNMP collector
D. NetFlow collector
E. Syslog

Which option is an advantage of Correct Answer: C


the bottom-up design model?
A. focuses on the needs of user
communities
B. includes a thorough analysis
of customer requirements
C. facilitates a quick response to
client requests
D. produces a "big-picture" of
the desired outcome

A large company requests a Correct Answer: A


hierarchical design model. What
tier should be free of physically
connected hosts?
A. core
B. access
C. aggregation
D. distribution

Which two options are benefits Correct Answer: AD


of using a modular network
architecture? (Choose two.)
A. facilitates troubleshooting
B. accurate monitoring
C. consistent documentation
D. increased flexibility
E. reduced cabling requirements

An organization is redesigning a Correct Answer: D


3-tier hierarchical network into a
collapsed core. What design
issue is a
primary concern per Cisco best
practices?
A. services delineation
B. port density
C. feature availability
D. resource utilization
Which two features are available Correct Answer: BD
in the Cisco STP Toolkit?
(Choose two.)
A. FHRP
B. loop guard
C. AutoQoS
D. PortFast
E. GLBP

What three design best Correct Answer: ACE


practices are key functions of
the distribution layer? (Choose
three.)
A. fault domain isolation
B. admission control
C. access switch aggregation
D. QoS tagging
E. address summarization
F. end user and application
isolation

What design requirement is Correct Answer: C


necessary for campus network
access layer switching?
A. high cost per port
B. high availability
C. high scalability
D. high performance

A network engineer requires that Correct Answer: C


an OSPF ASBR must only flood
external LSAs only within its own
area. What
OSPF area type should be
configured?
A. Backbone Area
B. Totally Stub Area
C. Not So Stubby Area
D. Stub Area

A network engineer is tasked to Correct Answer: DE


upgrade and expand a large
existing production network.
From the IOS CLI,
what two protocols can be used
to build a topology map of the
existing network? (Choose two.)
A. SNMP
B. IP SLA
C. ICMP Echo
D. LLDP
E. Traceroute

A network engineer has finished Correct Answer: BE


designing and implementing a
new network. What two
protocols would they
use to gain insight into the
network and determine the
components that require
optimization? (Choose two.)
A. CDP
B. NetFlow
C. ICMP Echo
D. NMAP
E. SNMP

What are two benefits of a Correct Answer: AD


structured IPv4 addressing
scheme? (Choose two.)
A. reduces routing table size
B. provides increased security
C. allows for address translation
to be performed
D. improves manageability and
troubleshooting
E. increases high availability
What are two reasons Correct Answer: AB
discontinuous IPv4 networks
hinder scalability? (Choose two.)
A. routing table bloat
B. inability to utilize automatic
summarization
C. insufficient IP addresses
D. slowed packet forwarding
E. delayed interface queuing

What is a benefit of IPv6 over Correct Answer: C


IPv4 addresses?
A. shorter addresses
B. automatic summarization
C. hierarchal global address
space
D. faster IGP convergence

GRE has been used to establish Correct Answer: B


a routing-protocol neighbor
relationship between two
routers, across the public
Internet. Which technology can
you use to encrypt this
communication channel?
A. access lists
B. IPsec
C. CBAC
D. IPS

Which option is a benefit of Correct Answer: A


Cisco Discovery Protocol?
A. provides information about
directly connected Cisco
devices
B. provides greater detail about
collected data, including time
stamping
C. combines with the network
layer data that is gathered by
NetFlow when using a NetFlow
collector
D. part of the IEEE 802.1ab
standard

Which option is an example of Correct Answer: A


physical device virtualization?
A. VSS
B. VPN
C. VRF
D. VLAN
In which two places is Correct Answer: AB
redundancy recommended in an
enterprise campus network
design? (Choose two.)
A. building distribution
B. campus core
C. building access
D. e-commerce
E. Internet connectivity

What are two purposes of route Correct Answer: AB


redundancy? (Choose two.)
A. minimize the effect of link
failures
B. minimize the effect of
internetworking device failures
C. minimize the convergence
time of STP
D. reduce router CPU utilization
E. save network costs

Refer to the exhibit. Correct Answer: B


The red lines refer to STP
blocked ports. What happens if
the HSRP active moves to the
right distribution, and
the STP root remains on the left
distribution?
A. The STP root becomes the
gateway.
B. The interdistribution link is
used for transit.
C. The HSRP standby becomes
the gateway.
D. The interaccess link is used for
transit.
E. Host traffic is unable to reach
the HSRP active.

Which three QoS levels should Correct Answer: ACD


VoIP clients be set to on a Cisco
WLC? (Choose three.)
A. Platinum
B. Bronze
C. Gold
D. Silver
E. Premier
F. Critical

What is the optimal device and Correct Answer: A


location to fulfill these
requirements?
provide early indication of
reconnaissance and scanning
activities with blocking
capabilities
require fewer interfaces to
inspect traffic to the DMZ and
internal network
A. IPS inline outside of the
firewall
B. IPS inline inside the firewall
C. Cisco IOS IPS on the border
router
D. passive IPS connected to a
SPAN port outside of the
firewall
E. passive IPS connected to a
SPAN port inside the firewall

Refer to the exhibit. Correct Answer: D


Which location is best for
placing a monitor-only IPS that
has visibility into the most data
center traffic?
A. (A) inline before the firewall
B. (B) inline after the firewall
C. (C) passive off the firewall
D. (D) passive off the internal
switch

A remote worker for a sales Correct Answer: B


company must submit daily
updates via the company email
system. The employee
does not have a company-
issued laptop, so which VPN
method is used for connectivity
to the company email
server?
A. DMVPN
B. SSL VPN
C. IPsec VPN
D. GET VPN

What are the three models that Correct Answer: ABC


are required in the systematic
approach of the top-down
design methodology?
(Choose three.)
A. logical
B. physical
C. layered
D. network components
E. technological
F. protocols
G. virtual

Refer to the exhibit. Correct Answer: B


Which functionality must be
enabled on router A to connect
two networks for translating
private addresses into
"legal" public addresses on a
one-for-one basis?
A. PAT
B. NAT
C. VLAN
D. GARP
E. PPP

Refer to the exhibit. Correct Answer: B


You are designing routing
between building distribution
switches and campus core
switches. Assuming that all
links have the same speed,
which statement about these
designs is true?
A. Option A has more fault
tolerance but slower
convergence than Option B.
B. Option A has more fault
tolerance and faster
convergence than Option B.
C. Option B has more fault
tolerance but slower
convergence than Option A.
D. Option B has more fault
tolerance and faster
convergence than Option A.

Which technology should a Correct Answer: A


company use to connect a
branch office to headquarters
via an Internet connection
while maintaining confidentiality
and the flexibility to run a
routing protocol between the
two locations?
A. GRE over IPsec
B. IPsec
C. GRE
D. SSL VPN
Which WAN technology is a Correct Answer: D
cost-effective method to deliver
100 Mb of bandwidth to multiple
branch offices?
A. DSL
B. DWDM
C. ISDN
D. Metro Ethernet

A network engineer needs to Correct Answer: AC


create a controller-based, high-
density RF design. Which two
factors determine
the cell size? (Choose two.)
A. antenna type
B. ClientLink support
C. TPC threshold setting
D. QoS setting
E. free space path loss

Which IP address can be routed Correct Answer: C


to cross the public Internet?
A. 10.31.1.1
B. 192.168.32.1
C. 172.32.1.1
D. 169.254.32.1
Which DHCP option do you Correct Answer: C
need to configure to ensure that
an LWAP can communicate with
the Cisco WLC
in a different subnet?
A. 7
B. 19
C. 43
D. 150

Which two options can be virtual Correct Answer: CD


networking devices? (Choose
two.)
A. ESX host
B. VM
C. switches
D. routers
E. Hyper-V host

DRAG DROP a
Drag the STP toolkit term on the
left to the definition on the right.
DRAG DROP a
Drag the technology on the left
to the matching routing protocol
on the right.

DRAG DROP a
Drag the technology on the left
to the matching routing protocol
on the right.

DRAG DROP a
Drag the security term on the
left to the matching description
on the right.

DRAG DROP a
Drag the term on the left to the
matching deployment scenario
on the right.

What are two components of the Correct Answer: AB


Build phase in the Cisco Design
Lifecycle? (Choose two.)
A. Migration
B. Deployment
C. Optimization
D. Design
E. Configuration

Which design enables easy and Correct Answer: A


flexible scaling in the Cisco
Enterprise Architecture model?
A. modular
B. top-down
C. bottom-up
D. full-mesh

Which two issues are typical Correct Answer: AB


challenges to network stability
and reliability? (Choose two.)
A. hardware failures
B. layer 1 link failures
C. application failures
D. core layer failures
E. distribution layer failures

For a VLAN that requires 70 Correct Answer: C


hosts, which subnet is the most
efficient?
A. 10.0.0.1/8
B. 172.31.17.0/26
C. 192.168.1.0/25
D. 192.168.15.0/24

If two routing protocols have Correct Answer: A


the same route and prefix, which
effect do they have on the
routing table?
A. Only the route with the lowest
administrative distance is added.
B. Only the route with the
highest administrative distance is
added.
C. Both routes are added.
D. Neither route is added, and a
loop is formed.

Which benefit is an advantage of Correct Answer: A


route summarization?
A. It reduces the size of the
routing table.
B. It causes routes to be
updated more frequently.
C. It lowers the cost metric.
D. It enables neighbor discovery.
Which two states are RSTP port Correct Answer: AB
states? (Choose two.)
A. discarding
B. learning
C. blocking
D. listening
E. disabled

When is the Cisco FlexConnect Correct Answer: A


design model recommended?
A. when remote-site APs are
centrally managed
B. when each remote site has its
own wireless controller
C. when each remote site runs
VSS
D. when the remote sites use
WAN optimization

In which two modes can you Correct Answer: AB


deploy Cisco IPS appliances?
(Choose two.)
A. inline
B. promiscuous
C. VTP group
D. threat mitigation
E. threat detection

According to Cisco best Correct Answer: A


practices, which traffic control
should you apply to the strict
priority queue?
A. Bandwidth should be limited
to one-third of the link capacity.
B. Bandwidth should be limited
to 768 kbps.
VCEConvert.com
C. Limits should be applied to
non-real-time traffic and all real-
time traffic should be permitted.
D. The link serialization delay
should be set to less than 100
ms.

According to fundamental Correct Answer: A


design principles, which location
is best for implementing Cisco
QoS policies?
A. hardware
B. software
C. Cisco 3900 Series Integrated
Services Routers running IOS
software
D. WAN routers running IOS
software

Which item is the fundamental Correct Answer: A


basis of a virtual network?
A. a VRF instance
B. a MIB database
C. a GRE tunnel
D. redundant hardware

Which network virtualization Correct Answer: A


technique can you implement
without disrupting the existing
network design and
infrastructure?
A. VRF-Lite
B. EVN
C. MPLS
D. VNET tags

Assuming that a network will Correct Answer: A


grow exponentially for the next
24 months, what is the main
limitation that must be
addressed?
A. scalability
B. serviceability
C. redundancy
D. resiliency

Directory services and Correct Answer: C


electronic messaging are
performed at which layer of the
OSI model?
A. transport
B. session
C. application
D. network

Company ABC has intermittent Correct Answer: B


problems registering remote-
site IP phones over the WAN
with Cisco Unified
CallManager at headquarters.
The company hires a network
consultant to help implement
QoS in its network.
Which technique should the
consultant use to identify traffic
and applications that traverse
the network?
A. policing
B. NBAR
C. RSVP
D. priority queuing

In an enterprise Layer 2 Correct Answer: B


switched network, which
protocol must be running to
enable link redundancy?
A. CDP
B. STP
C. LACP
D. PAGP

Which option is the greatest Correct Answer: C


concern when a network design
requires corporate traffic to pass
the public
Internet?
A. redundancy
B. bandwidth
C. security
D. delay
Which two descriptions of Cisco Correct Answer: CD
Application Centric
Infrastructure are true? (Choose
two.)
A. utilizes RMON for
management of the ACI fabric
B. capable of supporting virtual
devices only
C. utilizes a spine and leaf
topology
D. allows for network
programming based on
application requirements
E. utilizes NetFlow for
management of the ACI fabric

Which statement about VSS is Correct Answer: D


true?
A. It has two control planes.
B. It requires STP for link
redundancy.
C. It requires HSRP.
D. It can maintain the topology
independently of STP.
Which two processes are Correct Answer: AB
included in the Build phase of
the Cisco Design Lifecycle?
(Choose two.)
A. Deployment
B. Validation
C. Design
D. Analysis
E. Assessment

Which two statements are true Correct Answer: DE


regarding a hierarchical
network? (Choose two.)
A. complicates manageability
because of the added security
B. limits redundancy at the
distribution layer
C. facilitates choosing the type
of routing protocols to be used
in the network
D. provides better performance
as network resources are
efficiently utilized
E. provides scalability without
affecting other layers and
functionality
Which two options best Correct Answer: BC
describe the top-down design
approach? (Choose two.)
A. Organizational requirements
should not be included.
B. The approach begins with the
needs of the organization.
C. The design will meet both
current and future requirements.
D. The approach begins with the
physical layer of the OSI model.
E. The design is based on
previous experience and allows
for a quick solution.

A network engineer is tasked Correct Answer: D


with summarizing the routes to a
remote site. What is the optional
route
statement to connect to the
192.168.101.0/24 and
192.168.102.0/24 networks across
the corporate WAN?
A. ip route 192.168.101.0
255.255.254.0
B. ip route 192.168.100.0
255.255.255.0
C. ip route 192.168.100.0
255.255.254.0
D. ip route 192.168.100.0
255.255.252.0

Why would an engineer Correct Answer: A


implement variable-length
subnet masks?
A. to prevent wasting IP
addresses
B. to expand an existing subnet
C. to make a subnet public
D. to make a subnet its own
VLAN

Which option can use deep- Correct Answer: D


packet examination to determine
the specific nature of an attack?
A. stateful firewall
B. NetFlow collector
C. syslog server
D. network IPS

Which two design decisions can Correct Answer: AD


improve
A. implement redundant
topology
B. implement serial device
connections
C. increase data plane
bandwidth
D. implement redundant links
E. reduce network size

Which two considerations are Correct Answer: AB


important when designing the
access layer? (Choose two.)
A. port security
B. QoS services
C. routing between VLANs
D. HSRP implementation
E. load balancing

A network architect working for Correct Answer: C


a large financial institution is
designing VPN solution that
must include
encryption. Which option meets
this requirement?
A. L2VPN
B. GRE tunnel
C. GETVPN
D. L3VPN

Under which phase of the Cisco Correct Answer: B


Design Lifecycle would you
evaluate the network
infrastructure for its
adherence to best practices and
corporate policies?
A. Manage
B. Build
C. Plan
D. Validate

Refer to the exhibit. Which next Correct Answer: D


hop will the router select if given
an IP packet with the destination
address
19.48.254.3?
A. Interface 0
B. Router 1
C. Interface 1
D. Router 2
Which technology allows Correct Answer: A
multiple instances of a routing
table to coexist on the same
router at the same time?
A. VRF
B. VSS
C. vPC
D. Cisco virtual router

For a VLAN that requires 60 Correct Answer: C


hosts, which subnet is the most
efficient?
A. 192.168.15.0/24
B. 10.0.0.1/20
C. 10.10.10.0/26
D. 172.31.17.0/27

Which Cisco technology can Correct Answer: C


connect more than two switches
so that they behave as one
switch?
A. trunking
B. EtherChannel
C. StackWise
D. VSS
Which option is an advanced Correct Answer: A
congestion management
mechanism that schedules
interactive traffic to the front
of the queue and fairly shares
the remaining bandwidth among
high bandwidth flows?
A. weighted fair queuing
B. policing
C. header compression
D. payload compression

A consultant at Company XYZ Correct Answer: C


connects to the Guest wireless
network but cannot reach the
MGMT VLAN to
complete an audit. Other users
can connect to the MGMT VLAN
without any issues. Why is the
consultant
unable to access the MGMT
VLAN?
A. The WLC is offline.
B. The MGMT VLAN is down.
C. The access is not permitted.
D. The AP is offline.
What are two important aspects Correct Answer: BD
to consider when looking at
backup circuit options for a
branch location?
(Choose two.)
A. type of dynamic routing
protocol
B. Internet service provider
diversity
C. type of core switch
D. local exchange carrier
diversity
E. backup MPLS connection

When designing changes to an Correct Answer: BD


existing network, which two
options are documented to
understand
environmental constraints?
(Choose two.)
A. utilization of network
resources
B. heating and air conditioning
C. location of existing
documentation
D. floor and rack space
availability
E. host naming conventions

Which two network services Correct Answer: BE


should you host on the DMZ?
(Choose two.)
A. NFS
B. FTP
C. TACACS+
D. DHCP
E. WWW

Which network layer is the best Correct Answer: E


fit for security features such as
DAI and DHCP snooping?
A. remote-access VPN
B. enterprise data center
C. campus core
D. campus distribution
E. campus access
F. enterprise edge

Which two features are Cisco Correct Answer: BD


recommended best practices for
user access interfaces? (Choose
two.)
A. trunk mode
B. PortFast
C. VTP transparent mode
D. BPDU guard
E. root guard

Which statement about modular Correct Answer: D


network design in true?
A. Each deployed module is
identical to the others,
simplifying configuration
B. It is complex and should be
used only in specialized
situations.
C. Each module includes access,
distribution, and core layers.
D. It is a flexible architecture that
simplifies design, management
and troubleshooting.

What are two benefits of the Correct Answer: DE


bottom-up design approach?
(Choose two.)
A. incorporates organizational
requirements
B. requires little or no notation
of actual organizational
requirements for implementation
C. provides a broader overview
to the organization and the
designer
D. facilitates design that is based
on previous experience
E. allows a quick response to a
design request

Which two considerations are Correct Answer: AD


important when designing the
core layer? (Choose two.)
A. low latency
B. access list requirements
C. port security
D. redundancy
E. PoE

How many switches can be Correct Answer: C


combined into a single network
element using VSS?
A. 6
B. 8
C. 2
D. 4

Which option is an advantage of Correct Answer: D


a Layer 3 access model over the
traditional Layer 2 access
model?
A. reduced size of routing table
B. increased neighbor
adjacencies
C. reduced resources on the
router
D. faster convergence

Based on best practices, which Correct Answer: D


QoS profile should be
configured on the WLAN of the
WLC for wireless VoIP
communications?
A. Silver
B. Bronze
C. Gold
D. Platinum
Which statement about using Correct Answer: A
STP in a redundant-link scenario
is true?
A. It uses only one redundant
link at any one time.
B. It bonds the two links and
treats them as one link.
C. It provides the most efficient
use of redundant links.
D. It balances traffic by
transmitting packets on
alternating links.

A company is using a Correct Answer: A


dynamically routed private line
and a statically routed IPsec
tunnel to connect two offices.
What routing configuration can
be used so that the IPsec tunnel
is preferred only in the event of
a private line
failure?
A. floating static route with a
higher administrative distance
B. EIGRP variance
C. bandwidth metric
D. OSPF maximum paths
A network engineer must Correct Answer: D
connect two sites. Each site has
a different autonomous system
number. Which
method do you use to exchange
routing information between the
sites?
A. OSPFv3
B. IGP
C. EIGRP
D. BGP

Which IPv4 addressing Correct Answer: D


technique can be used with
proper address planning to
reduce the number of entries in
a routing table?
A. translation
B. filtering
C. tunneling
D. summarization

Refer to the exhibit. Where Correct Answer: B


should routes in the routing
table be aggregated or
summarized?
A. in the distribution toward the
access
B. in the distribution toward the
core
C. in the core toward the data
center
D. in the core toward the
distribution

A remote user for a company Correct Answer: C


must periodically connect to the
company network to access
internal resources
using a company laptop with
software that was preinstalled
by the IT department. Which
VPN method is used
for connectivity?
A. DMVPN
B. SSL VPN
C. IPsec VPN
D. GET VPN

An engineer is designing a Correct Answer: A


private WAN infrastructure to
support an organization and
must support quality of
service and multicast
functionality to the remote sites.
Which WAN technology
supports this requirement?
A. MPLS
B. IPsec VPN
C. DMVPN
D. SSL VPN

Which type of router connects Correct Answer: A


to two different OSPF areas?
A. Area border
B. Autonomous system
boundary
C. Backbone
D. Internal

Which routing protocol provides Correct Answer: D


the fastest convergence and
greatest flexibility within a
campus environment?
A. IS-IS
B. BGP
C. OSPF
D. EIGRP

How does the use of multiple Correct Answer: C


areas in a link state routing
protocol improve network
scalability?
A. Reduces network bandwidth
B. Permits partial table updates
C. Enables route summarization
D. Overcomes router hop limit

Which protocol is an example of Correct Answer: A


a fixed two-level hierarchical
routing protocol?
A. OSPF
B. RIPv2
C. EIGRP
D. static routes

Which virtualization solution Correct Answer: D


provides redundancy using a
pair of switches that appear as
one logical switch and
removes the need for a First Hop
Redundancy Protocol?
A. VDC
B. VRRP
C. vPC
D. VSS

An engineer wants to find all of Correct Answer: A


the objects of a certain type
available in the MIB. Which kind
of query must be
performed?
A. Object-level
B. Tree-level
C. Class-level
D. Subtree-level

At which layer of the network Correct Answer: B


should you perform traffic
filtering and QoS classification?
A. Session
B. Distribution
C. Application
D. Core

While designing a remote access Correct Answer: ACD


VPN, a customer has requested
three different levels of access
to be granted
for administrators, employees,
and partners. Which three
access policies must be
configured for the three
groups? (Choose three.)
A. Partners are centrally
authenticated with limited
network access controlled with
ACLs.
B. Administrative users have
local credentials with full access
to the internal infrastructure.
C. Administrative users are
centrally authenticated with full
access to the internal
infrastructure.
D. Employees are centrally
authenticated with limited
network access controlled with
ACLs.
E. Employees are centrally
authenticated with full access to
the internal infrastructure.
F. Partners are centrally
authenticated with full access to
the internal infrastructure.
Which two techniques can you Correct Answer: BE
use to reduce the size of a
network routing table? (Choose
two.)
A. Implement VPN
B. Route summarization
C. Implement NAT
D. Configure static routing
E. Utilize a default route

Traditionally, the DMZ exists Correct Answer: CE


between which two locations?
(Choose two.)
A. building distribution
B. building access
C. corporate network
D. metro Access
E. internet

An engineer wants to ensure Correct Answer: A


that the Spanning Tree topology
appears free while redundant
switches are
present. Which Layer2
technology must be used?
A. VPC
B. PaGP
C. LACP
D. OTV

An engineer is planning branch Correct Answer: A


WAN links to support unified
communications. Which DSCP
value must be
assigned to voice traffic?
A. EF
B. AF41
C. COS4
D. BE

Which option best describes the Correct Answer: D


high-level design document?
A. It includes specific
information such as hardware
models, software version, IP
addressing, and routing
protocols.
B. It contains the test plan to
certify that the customer's
network is ready for use.
C. It contains the steps needed
to install and configure the
network equipment and the
steps that verify basic
network operation.
D. It includes business and
technical requirements and the
proposed network architecture.

Which value must you configure Correct Answer: C


on a Microsoft DHCP server so
that Cisco wireless APs can
locate the
wireless controllers?
A. the Length value
B. the IP DHCP pool name
C. a vendor class identifier
D. the Type suboption code 0xe1

Which tool captures network Correct Answer: B


traffic, decodes the protocols in
the captured packets, and
provides statistics to
characterize errors, and
response time?
A. continuity tester
B. protocol analyzer
C. spectrum analyzer
D. bit error rate tester

Which statement about using Correct Answer: A


VSS on a pair of switches is true?
A. It enables the pair to operate
as one logical switch.
B. It requires HSRP.
C. It enables the administrator to
manage each switch separately.
D. It blocks traffic on the
redundant link to prevent loops.

Which scenario is the best Correct Answer: C


example of a single-homed
connected infrastructure?
A. A data center that is
connected to one service
provider over an MPLS circuit
and another service provider
over an Ethernet connection.
B. A remote office that is
connected to the WAN using a
DSL provider and a cable
provider.
C. A small office that uses a DSL
link to connect to the WAN.
D. A corporate office that uses
two separate routers to connect
to two different service
providers.

Which address is the broadcast Correct Answer: C


address of subnet
120.20.78.8/30?
A. 120.20.78.12
B. 120.20.78.1
C. 120.20.78.11
D. 120.20.78.8

Which two major campus design Correct Answer: AD


models does the Cisco Unified
Wireless Network support?
(Choose two.)
A. Cisco FlexConnect
B. N+N+1
C. Deterministic
D. Local Mode
E. Dynamic
Which two protocols are classful Correct Answer: BC
routing protocols? (Choose
two.)
A. RIPv2
B. RIPv1
C. IGRP
D. OSPF
E. BGP

From which DNS record can a Correct Answer: A


Cisco wireless AP, running Cisco
WLC version 6.0 or later, retrieve
bootstrap
information?
A. cisco-capwap-controller
B. the DNS A record of the
controller hostname
C. the DHCP Option 43 name
D. cisco-lwapp-controller

When integrating services with Correct Answer: B


Cisco ACI Service Graphs, which
tool can be used for integrated
configuration
management?
A. IOS
B. REST API
C. APIC CLI
D. HTML

Which VPN tunneling Correct Answer: A


technology supports IP
multicast?
A. DMVPN spoke-to-spoke
B. Cisco Easy VPN
C. IPsec direct encapsulation
spoke-to-spoke
D. IPsec direct encapsulation
hub-and-spoke

Refer to the exhibit. Correct Answer: D


Which IPS location is best for
reducing false positive because
traffic has already been filtered?
A. passive off the firewall
B. inline after the firewall
C. inline before the firewall
D. passive off the internal switch

Which format reflects that of the Correct Answer: B


IPv6 global unicast address?
A. global prefix (16 bits), subnet
ID (16 bits), interface ID (64 bits)
B. global prefix (48 bits), subnet
ID (16 bits), interface ID (64 bits)
C. global prefix (16 bits), subnet
ID (64 bits), interface ID (48 bits)
D. global prefix (64 bits), subnet
ID (48 bits), interface ID (16 bits)

Which layer in the Cisco Correct Answer: E


Enterprise Architecture model is
highly available, has fast
convergence, and should
avoid packet manipulation?
A. campus distribution
B. enterprise data center
C. enterprise edge
D. campus access
E. campus core
F. remote access VPN

Which connection provides cost Correct Answer: D


effective backup connectivity for
a branch network?
A. MPLS
B. ATM
C. Frame Relay
D. Internet VPN

In the traditional hierarchical Correct Answer: CD


LAN design, which two
statements about the
distribution layer are true?
(Choose
two.)
A. It uses Layer 2 switching only.
B. It typically is connected
directly to the Internet.
C. It aggregates data from the
access layer.
D. Policy is implemented at this
layer.
E. It provides users direct access
to the network.

Refer to the exhibit. Correct Answer: B


Based on the following output
from the access switch, which
option is the trust boundary for
QoS?
A. IP phone
B. access
C. core
D. endpoint
E. distribution

An engineer is designing a Correct Answer: B


network that is divided into
multiple areas and supports a
mixed vendor routing
environment. Which interior
gateway protocol must be
selected?
A. EIGRP
B. OSPF
C. BGP
D. RIPv2

Which two benefits are realized Correct Answer: AB


by establishing virtualization in a
campus network? (Choose two.)
A. enables path isolation
B. enhances network agility
C. consolidates applications
D. enables unlimited scalability
E. reduces network bandwidth
Which option is one of the Correct Answer: D
methods that Cisco routers and
switches can use to share
information between
directly connected devices on a
regular basis?
A. NetFlow
B. ARP
C. NHRP
D. CDP

Which statement correctly Correct Answer: B


describes queuing in
environments supporting
teleworkers?
A. CQ is for time-sensitive
protocols.
B. Queuing occurs on the
outbound interface.
C. Priority queuing guarantees
some level of service to all
traffic.
D. Hardware queues are
configured for appropriate PQ,
CQ, or WFQ.
E. WFQ is the Cisco IOS default
on all WAN links regardless of
speed.

Which first-hop redundancy Correct Answer: B


protocol dynamically distributes
traffic across multiple gateways?
A. HSRP
B. GLBP
C. VRRP
D. IBGP

What information should be Correct Answer: C


utilized to identify network
applications that are running on
an existing network
infrastructure?
A. customer information
B. existing documentation
C. traffic analysis
D. external feedback
E. user feedback

A design engineer must send Correct Answer: A


management information
messages across the public
internet. What solution
provides a secure and
encrypted method for passing
these messages?
A. SNMP v3
B. NetFlow v9
C. Syslog Traps
D. Secure Shell v2
E. SNMP v2

A network engineer is designing Correct Answer: B


a solution that will monitor IP
traffic through corporate routers
with the ability to
export the flows to a collection
engine without using network
probes. What technology meets
this requirement?
A. RMON
B. NetFlow
C. SNMP
D. Syslog
E. IP SLA

A network engineer is following Correct Answer: A


the Cisco enterprise architecture
model. Where are aggregation
switches
found?
A. Enterprise Campus
B. Enterprise Edge
C. SP Edge WAN
D. Remote Module

What design feature should be Correct Answer: B


considered when accessing
resources from a remote data
center over a WAN
connection?
A. security
B. bandwidth
C. reliability
D. management

hat two addresses are defined Correct Answer: BD


under RFC 1918? (Choose two.)
A. 19.22.37.1
B. 10.1.7.19
C. 127.0.0.1
D. 172.31.1.1
E. 239.15.12.1
What two components are used Correct Answer: AC
when creating an endpoint's
modified EUI-64 format IPv6
address? (Choose
two.)
A. IPv6 Prefix
B. 64-bit MAC address
C. 48-bit MAC address
D. IPv4 Address
E. Link Local Suffix

What two factors should be Correct Answer: BC


considered when deploying an
enterprise campus network?
(Choose two.)
A. employees
B. geography
C. applications
D. administration
E. throughput

The spanning tree topology can Correct Answer: B


be simplified by deploying what
Cisco NX-OS technology in the
distribution and
access layer?
A. VDC
B. vPC
C. Rapid PVST+
D. VSS
E. Flex Links

What network technology Correct Answer: B


consolidates network and
storage traffic in the data
center?
A. virtual storage-area network
B. unified fabric
C. unified computing system
D. virtual switching system

What type of topology supports Correct Answer: A


WAN redundancy when a
balance is required between
cost, high availability,
and performance?
A. partial meshed
B. full meshed
C. star
D. ring
E. hub-and-spoke
F. bus
G. point-to-point

What is the key limitation of Correct Answer: B


using Internet circuits as a
backup to a private enterprise
WAN?
A. circuit bandwidth
B. prioritization
C. security
D. operational expense

network design engineer is Correct Answer: A


seeking a dynamic routing
protocol that supports fast
convergence in a Cisco
environment. What protocol
allows for this?
A. EIGRP
B. OSPF
C. RIP
D. BGP
E. IS-IS
Directory services and Correct Answer: B
electronic messaging are
performed at which layer of the
network?
A. core
B. application
C. distribution
D. network

Refer to the exhibit. Which Correct Answer: A


configuration can be used to
implement FHRP protocol and
load balancing at the
same time?
A. R1
Interface Ethernet0
ip address 171.16.6.5
255.255.255.0 standby 1 preempt
standby 1 ip 171.16.6.100
standby 1 track Serial0
standby 2 preempt
standby 2 ip 171.16.6.200
standby 2 track serial 0
standby 2 priority 95
!
!
R2
interface Ethernet0
ip address 171.16.6.6
255.255.255.0
standby 1 preempt
standby 1 ip 171.16.6.100
standby 1 track Serial0
standby 1 priority 95
VCEConvert.com
standby 2 preempt
standby 2 ip 171.16.6.200
standby 2 track serial 0
B. R1
Interface Ethernet0
ip address 171.16.6.5
255.255.255.0 standby 1 preempt
standby 1 ip 171.16.6.100
standby 1 track Serial0
standby 1 priority 95
!
!
R2
interface Ethernet0
ip address 171.16.6.6
255.255.255.0 standby 1 preempt
standby 1 ip 171.16.6.100
standby 1 track Serial0
standby 1 priority 95
C. R1
Interface Ethernet0
ip address 171.16.6.5
255.255.255.0 standby 1 preempt
standby 1 ip 171.16.6.100 standby 1
track Serial0 standby 1 priority
95 standby 2 preempt
standby 2 ip 171.16.6.200 standby
2 track serial 0 standby 2 priority
95
!
!
R2
interface Ethernet0
ip address 171.16.6.6
255.255.255.0 standby 1 preempt
standby 1 ip 171.16.6.100 standby 1
track Serial0 standby 2 preempt
standby 2 ip 171.16.6.200 standby
2 track serial 0
D. R1
Interface Ethernet0
ip address 171.16.6.5
255.255.255.0 standby 1 preempt
standby 1 ip 171.16.6.100 standby 1
track Serial0 standby 1 priority
95
!
!
R2
interface Ethernet0
ip address 171.16.6.6
255.255.255.0 standby 1 preempt
standby 1 ip 171.16.6.100

Cisco FabricPath brings the Correct Answer: AB


benefits of routing protocols to
Layer 2 network Ethernet
environments. What are
two advantages of using Cisco
FabricPath technology? (Choose
two.)
A. Cisco FabricPath provides
MAC address scalability with
conversational learning.
VCEConvert.com
B. Loop mitigation is provided
by the TTL field in the frame.
C. Cisco FabricPath technology
is supported in all Cisco
platforms and can replace
legacy Ethernet in all
campus networks.
D. Cisco FabricPath relies on
OSPF to support Layer 2
forwarding between switches,
which allows load
balancing between redundant
paths.
E. Cisco FabricPath is IETF-
standard and is not used with
Cisco products.

A network design shows two Correct Answer: B


routers that are directly
connected to an Ethernet switch
using optical connections.
There is an OSPF adjacency
between the routers. In this
design, which solution ensures
that interface-down
detection is reported as quickly
as possible to the IGP?
A. optimized OSPF SPF timers
B. Bidirectional Forwarding
Detection
C. automatic protection
switching
D. optimized OSPF LSA timers
E. Ethernet OAM CFM
monitoring
Which statement is true about Correct Answer: C
using a DNS server to discover a
controller IP?
A. The AP sends a discovery
request to the first controller on
the list and then goes down the
list
chronologically until it receives a
discovery response.
B. The AP sends a discovery
request to the last controller on
the list and then goes up the list
chronologically
until it receives a discovery
response.
C. The AP sends a discovery
request to all controllers on the
list simultaneously.
D. Multiple controller IP
addresses in a DNS response
are not supported.

Refer to the exhibit. A network Correct Answer: C


engineer at a technical call
center receives a call from a
customer complaining
that only 56 kbps of data can be
transferred over the T1 Frame
Relay WAN circuit at a remote
site. The
engineer checks the Frame
Relay switch and confirms that
only 56 kbps is being transferred
over the circuit.
The engineer requests the router
configuration of the customer
headquarters site router. What is
causing this
issue to occur?
A. The wrong CIR is configured.
B. The BECN configuration is
causing this issue.
C. The class name is spelled
wrong under the interface.
D. The wrong DLCI number is
assigned to the interface.

A data center is being deployed, Correct Answer: A


and one design requirement is
to be able to readily scale
server virtualization.
Which IETF standard technology
can provide this requirement?
A. Transparent Interconnection
of Lots of Links
B. Cisco FabricPath
C. data center bridging
D. Cisco Unified Fabric

A company would like to Correct Answer: C


distribute a VM hosting cluster
between three data centers with
the capability to move
VMs between sites. The
connectivity between data
centers is IP only, and the new
design should use the
existing WAN. Which Layer 2
tunneling technology should be
used?
A. VPLS
B. L2TPv3
C. OTV
D. AToM

Which two Cisco data center Correct Answer: AC


devices can participate in Cisco
FabricPath? (Choose two.)
A. Cisco Nexus 5500 Series
Switches
B. Cisco Nexus 1000V Series
Switches
C. Cisco Nexus 7000 Series
Switches
D. Cisco Nexus 4900 Series
Switches
E. Cisco MDS 9500 Series
Multilayer Directors

Which option is used by OSPF to Correct Answer: D


reduce the flooding domain of
database updates in a network?
A. hello packets
B. virtual links
C. interface cost
D. areas

Refer to the exhibit. Which three Correct Answer: ACE


OSPF routers are the only
routers that may perform
summarization with the
current network layout?
(Choose three.)
A. Router 2
B. Router 3
C. Router 4
D. Router 5
E. Router 7
F. Router 8

Which two options should be Correct Answer: AB


used to achieve fast
convergence in an OSPF
network? (Choose two.)
A. Bidirectional Forwarding
Detection
B. fast hellos
C. LSA retransmission interval
D. SPF throttle timers
E. LSA group pacing

Refer to the exhibit. In this Correct Answer: C


suboptimal design of a
homogeneous Cisco network,
which version of spanning tree
provides the fastest
convergence?
A. PVST+
B. CST
C. RPVST
D. VSTP
E. PVST
Refer to the exhibit. Correct Answer: C
The organization is migrating
away from FHRP. VSS has been
implemented on a pair of Cisco
Catalyst 6500
Series Switches. In order to
avoid changes to end hosts, the
default gateway is carried over
to the SVI on the
VSS. Why does the
implementation plan require a
four-hour wait after removing
the FHRP configuration?
A. The VLAN interface MAC
address and the FHRP MAC
address are different. It takes
four hours for the
VLAN interface to come up.
B. The SVI IP address and the
FHRP IP address are different. It
takes four hours for the SVI to
come up.
C. The VLAN interface MAC
address and the FHRP MAC
address are different. It takes
four hours for the ARP
cache to time out.
D. The VLAN interface IP
address and the FHRP IP
address are different. It takes
four hours for the VLAN
interface to come up.
E. The VLAN interface IP address
and the FHRP IP address are
different. It takes four hours for
the ARP
cache to time out.

Which command is correct for Correct Answer: C


creating a virtual interface on a
Cisco wireless controller?
A. config create interface
B. tag interface
C. config interface address
D. untag interface

Which three series of Cisco Correct Answer: BDE


wireless controllers support
wireless Bidirectional Rate
Limiting? (Choose three.)
A. Cisco 2500 Series Wireless
Controllers
B. Cisco 5500 Series Wireless
Controllers
C. Cisco 5700 Series Wireless
Controllers
D. Cisco 7500 Series Wireless
Controllers
E. Cisco 8500 Series Wireless
Controllers
F. Cisco 7200 Series Wireless
Controllers

Which statement is true about Correct Answer: A


the Cisco NAC Appliance?
A. recognizes users, their
devices, and their roles in the
network
B. does not offer audit and
reporting features
C. must be placed inline with
other network devices
D. does not recognize guest
users

Which two Cisco products can Correct Answer: BC


be used in a data center to
support OTV technology?
(Choose two.)
A. Cisco Nexus 5500 Series
Switches
B. Cisco Nexus 7000 Series
Switches
C. Cisco ASR 1000 Series
Routers
D. Cisco ASR 9000 Series
Routers
E. Cisco Nexus 3000 Series
Switches

Which IETF standard technology Correct Answer: A


can be used with data center
design to readily scale server
virtualization?
A. Transparent Interconnection
of Lots of Links
B. OTV
C. vPC
D. FCoE

Which three options are Correct Answer: ACD


examples of network logical
virtualization? (Choose three.)
A. virtual PortChannel
B. virtual machine
C. Virtual Device Context
D. Virtual Switching System
E. virtual device driver

Which type of structure consists Correct Answer: A


of the addressing, routing
protocols, QoS, and security
components?
A. logical
B. physical
C. layered
D. virtual

What phase of Cisco's PPDIOO Correct Answer: A


is the final test of the
appropriateness of the design?
A. Operate
B. Optimize
C. Design
D. Implement

What phase of Cisco's PPDIOO Correct Answer: A


includes the identification and
resolution of issues prior to
moving the entire
network to production?
A. Optimize
B. Operate
C. Implementation
D. Design

What is the maximum switch in Correct Answer: A


VSS?
A. 2
B. 4
C. 6
D. 8

What is the technology that Correct Answer: A


allows you to combine more
than two switches?
A. stackwize
B. vss
C. vpc
D. etherchannel

Which phase of cisco design life Correct Answer: C


cycle the validation of network
infrastructure happened?
A. Assessment in plan
B. deployment in build
C. Validation in build
D. optimization in operate

What is the benefit of using Correct Answer: A


VLSM?
A. To save a wested ip address
B. To expand a subnet

In layer 2 design approach, how Correct Answer: B


you can describe STP
redundancy?
A. It uses the most efficiency of
redundant link
B. Only one link is active per
time
C. It redistributes the traffic
between links

What is the vlan subnet that can Correct Answer: D


handle 60 hosts?
A. /21
B. /24
C. /25
D. /26
When you make change on Correct Answer: B
Network, what the consideration
of environment Data center
network network?
A. Location
B. Air condition and cooling
C. storage and rack
D. Floor &

Which QOS level should VOIP Correct Answer: A


set on WLC?
A. Platinum
B. Gold
C. premier
D. critical

Which level needed to be set on Correct Answer: A


Cisco WLC for VoIP traffic:
A. PLATINUM
B. GOLD
C. SILVER
D. BRONZE
Choose considerations for Correct Answer: AC
access layer design? (Choose
two.)
A. QOS
B. Routing
C. Port security
D. Load balance
E. HSRP

Which data center connection Correct Answer: B


supports QoS, full mesh
deployment and typically offers
SLAs?
A. Internet VPN
B. MPLS
C. DMVPN
D. Frame Relay

In Cisco ACI, which option is the Correct Answer: C


unified point of automation,
management, monitoring and
programmable?
A. Python
B. REST
C. APIC
D. Postman
An engineer is designing a Correct Answer: C
solution for multiple multihomed
to establish router between one
another which
design must be?
A. OSPF
B. iBGP
C. eBGP
D. EIGRP

Which option is an object Correct Answer: A


instance than an API identifies
using information model-based
architecture?
A. DN
B. Class
C. Method
D. MO

A consulting engineer is tasked Correct Answer: D


with designing a company LAN
Network Infrastructure. Two
requirements are
the ability for fast convergence
summarization anywhere in the
network, independent of router
location or role.
Which routing protocol supports
this effort?
A. OSPF
B. RIP
C. BGP
D. EIGRP

What branch connection type Correct Answer: B


supports SLAs, Full-Mesh
connectivity and QoS?
A. Frame Relay
B. MPLS
C. Internet VPN
D. Point-to-Point

A network engineer is Correct Answer: A


implementing a new mesh WAN
topology. The solution support
synchronous bandwidth
and allow for future growth.
Which solution is best suited to
meet these requirements?
A. DMVPN over business class
modem
B. SSL VPN over business class
cable modem
C. Bonded T1s
D. MPLS over Ethernet

Which application can provide Correct Answer: C


AAA services for Cisco Devices?
A. IP SLA
B. Cisco TrustSec
C. TACACS+
D. Cisco FirePOWER

Which option characterizes Correct Answer: A


normal traffic flow and
performance of a network?
A. Utilization
B. Baseline
C. Availability
D. Bandwidth

Refer to the exhibit. When a VSS Correct Answer: A


configuration is reviewed, it is
determined that the nodes are
not detecting
each other. Which option is the
issue with the switches?
A. The Switch virtual domains
incorrect
B. The switches have not been
restarted after the VSS
configuration application
C. Additional port-channel links
are required
D. 10GB Ethernet must be
confirmed

What does IGMP stand for? Correct Answer: A


A. Internet Group Management
Protocol
B. Interior Gateway Routing
Protocol
C. Interior Group Management
Protocol
D. Interior Gateway Media
Protocol

ISDN is short for Integrated Correct Answer: B


Services Digital Network. Under
what category of WAN
technologies does ISDN
belong?
A. Cell-switched
B. Circuit-switched
C. Packet-switched
D. Leased lines

As a network engineer, can you Correct Answer: B


tell me accounting management
on a network-management
system allows a
network manager to perform
which function?
A. Assess the network's
effectiveness and throughput
B. Charge back to users for
network resources
C. Performance management
D. Identify problem areas in the
network

Which address type is 225.10.1.1? Correct Answer: C


A. Unicast
B. Anycast
C. Multicast
D. Broadcast
What is the length of the key Correct Answer: B
used with Triple Data Encryption
Standard (3DES)?
A. 64 bits
B. 168 bits
C. 128 bits
D. 56 bits

A wireless LAN or WLAN is a Correct Answer: A


wireless local area network,
which is the linking of two or
more computers or
devices without using wires.
How are wireless LANs
identified?
A. Service Set Identifier (SSID)
B. Internet Group Management
Protocol (IGMP)
C. IP network
D. Wired Equivalent Privacy
(WEP) key

Observe the following options, Correct Answer: C


what is the hierarchy for IPv6
aggregatable addresses?
A. Global, site, loop
B. Multicast, anycast, unicast
C. Public, site, interface
D. Internet, site, interface

Which IGP protocol is a Correct Answer: B


common choice to EIGRP and
OSPF as a routing protocol for
large networks?
A. RIPv2
B. IS-IS
C. IGRP
D. OSPFv2

Which type of routing protocol Correct Answer: B


will be used when connecting to
an Internet service provider?
A. Classless routing protocol
B. Exterior gateway protocol
C. Interior gateway protocol
D. Classful routing protocol

Which routing protocol is Correct Answer: C


classful?
A. Intermediate System-to-
Intermediate System (IS-IS) and
OSPF
B. Routing Information Protocol
Version 1 (RIPv1) and RIPv2
C. IGRP and RIPv1
D. Enhanced Interior Gateway
Routing Protocol (EIGRP) and
Open Shortest Path First (OSPF)

Which attack type would you Correct Answer: C


expect on segments that have
many servers for some well-
known applications?
A. Trojan horses
B. DoS attacks
C. Application-layer attacks
D. Password attacks

Which types of communicating Correct Answer: CD


devices compose RMON
architecture? (Choose two.)
A. Router
B. Switch
C. Management station
D. Monitor
Which FCAPS function includes Correct Answer: C
finding network problems that
reduce availability?
A. Security management
B. Accounting management
C. Fault management
D. Performance management

What is the name of the Correct Answer: C


organization that is in charge of
creating the FCAPS
architecture?
A. ISP
B. IOS
C. ITU-T
D. IEEE

Define some of the activities, Correct Answer: ACD


tools, and techniques used in
today's network-design process.
(Choose three.)
A. Analyzing network traffic
B. Simulation of network traffic
C. Network auditing
D. Filtering incoming network
traffic
Which is the remote monitoring Correct Answer: D
agent in the RMON architecture
called?
A. Tree
B. Station
C. Agent
D. Probe

Which type of DSL does Correct Answer: D


residential service use?
A. VDSL
B. SDSL
C. IDSL
D. ADSL

Which item is not a part of the Correct Answer: C


process recommended by Cisco
for WAN designs?
A. Characterize the existing
network.
B. Analyze customer
requirements.
C. Configure deployed services.
D. Design the new WAN
topology.

In IS-IS networks, which routers Correct Answer: D


does the backup designated
router (BDR) form adjacencies
to?
A. Only to the DR.
B. The BDR only becomes
adjacent when the DR is down.
C. To all routers.
D. There is no BDR in IS-IS.

What does Compressed Real- Correct Answer: C


Time Transport Protocol (CRTP)
compress?
A. RTP, TCP, and IP headers
B. RTP headers
C. RTP, User Datagram Protocol
(UDP), and IP headers
D. Real-Time Transport Control
Protocol (RTCP) headers

Which mechanism will be often Correct Answer: B


used by service providers to
define their service offerings
and to differentiate
their services from their
competitors?
A. SLM
B. SLA
C. SLC
D. SAA

What is the virtual information Correct Answer: A


store used within SNMP called?
A. MIB
B. RMON
C. Protocol data unit (PDU)
D. Abstract Syntax Notation One
(ASN.1)

Which standard language will be Correct Answer: B


used by SNMP to define the
device information to be stored?
A. SNMPv4
B. ASN.1
C. MIBs
D. Agents

Which WAN scenario might be Correct Answer: D


appropriate for queuing
solutions?
A. A newly implemented WAN
connection has yet to
demonstrate sufficient WAN
statistics for congestion-level
tracking.
B. A WAN connection features
consistent congestion problems,
and data transfers often suffer.
C. A WAN connection is rarely
congested, and data transfers
never suffer.
D. A WAN connection features
occasional periods of
congestion, and data transfers
have occasionally
suffered as a result.

Your boss is interested in a Correct Answer: B


wireless WAN solution which
provides higher bandwidth than
point- to-multipoint
(p2mp) wireless. Which
description is correct?
A. Service providers cannot
install point-to-point (p2p) links
from a p2mp hub.
B. P2p wireless connections can
provide up to 44 Mbps raw
bandwidth.
C. P2p links tend to be slower
than p2mp.
D. P2mp wireless connections
can provide up to 1.544 Mbps
raw bandwidth.

Examine the following Correct Answer: C


protocols, which two are used
for IP Security?
A. Generic Routing
Encapsulation (GRE) and
Internetwork Packet Exchange
(IPX)(EIGRP)
B. Border Gateway Protocol
(BGP) and Enhanced Interior
Gateway Routing Protocol
C. Authentication Header (AH)
and Encapsulating Security
Payload (ESP)
D. Virtual Private Dial-Up
Network (VPDN) and GRE

What is SNMP? Correct Answer: A


A. Simple Network Management
Protocol
B. Simple Network Monitoring
Protocol
C. Sampling Network
Management Process
D. Simple Network Maintenance
Procedure

When building Global network Correct Answer: A


businesses, which three
principles should be used?
A. Customer focus, continuous
standardization, and core versus
context
B. Customer focus,
centralization, and core versus
context
C. Customer focus,
decentralization, and core
versus edge
D. Customer focus,
decentralization, and core
versus context

For the following items, which Correct Answer: B


component of the CiscoWorks
product allows a network
administrator to define
and manage service levels?
A. Service assurance agent
(SAA)
B. Service level manager (SLM)
C. Collection Manager (CM)
D. Service level agreement (SLA)

NAT-PT is an IPv6-IPv4 Correct Answer: B


translation mechanism. What is
NAT-PT?
A. addresses
B. Network address translation-
protocol translation; translates
between IPv4 and IPv6
addresses
C. Next address translation-port
translation
D. Network addressable
transparent-port translation;
translates network addresses to
ports

What Cisco router configuration Correct Answer: B


component does an
implementer use to create a
floating static route?
A. Primary interface
B. Administrative distance
C. Loopback
D. Description

Which Cisco proprietary Correct Answer: B


protocol will be used in LAN
switches to control multicast
traffic at the data link layer
within a LAN switch?
A. MAC filters
B. Cisco Group Management
Protocol (CGMP)
C. Cisco Discovery Protocol
(CDP)
D. IGMP

A common response to an Correct Answer: C


attack by this device can be
either to send an alert or to take
corrective action. What
is this device?
A. Vulnerability assessment
B. Firewall
C. Intrusion-detection system
(IDS)
D. Router

How many more bits does IPv6 Correct Answer: C


use for addresses than IPv4?
A. 32
B. 64
C. 96
D. 128

Which protocol will be used to Correct Answer: A


exchange IP routes between
autonomous systems?
A. eBGP
B. IGMP
C. IGRP
D. OSPF

What does the Cisco security Correct Answer: A


architecture called SAFE stand
for?
A. Security Architecture for
Enterprise
B. Standard Assessment for
Enterprise
C. Security Analysis for
Enterprise
D. Standard Architecture for
Enterprise

You are a network technician. Correct Answer: B


Can you tell me how many IP
addresses are available for hosts
in the subnet
198.10.100.64/27?
A. 62
B. 30
C. 126
D. 14

Which two encryption Correct Answer: A


transforms will be used by both
ESP and AH for authentication?
A. HMAC-MD5 or Hash
Message Authentication Code-
Secure Hash Algorithm-
1(HMAC-SHA-1)
B. DES or 3DES
C. DES or Hash Message
Authentication Code-Message
Digest 5 (HMAC-MD5)
D. 3DES or MD5

For the following options, which Correct Answer: D


emerging WAN technology uses
DSL coding and digital
modulation techniques
with Ethernet?
A. Cable
B. Wireless
C. SMDS
D. Long-Reach Ethernet (LRE)

What is SLC? Correct Answer: C


A. Standard level contracts
B. Standard level configuration
C. Service level contracts
D. Service level configuration

What does ODR stand for? Correct Answer: D


A. Open default routing
B. Optical demand routing
C. Open dedicated routing
D. On-demand routing
Observe the following options, Correct Answer: B
in which section of the network
document does Cisco
recommend a discussion
of performance, scalability,
capacity, security, and traffic
needs?
A. Design summary
B. Design solution
C. Executive summary
D. Design requirements

In telephony, the local loop is Correct Answer: B


the physical link or circuit. Where
is the local loop located?
A. Between the loopback
interfaces of two VoIP routers
B. Between phones and the
central office (CO) switch
C. Between two PBXs
D. Between two PSTN switches

Which advantage is of security Correct Answer: B


systems that are part of the
Cisco ecosystem?
A. There is a suite of products to
choose from.
B. Various partners as well as
supporting products increase
the effectiveness of security
systems.
C. There are no advantages.
D. The Cisco ecosystem ensure
that partners can implement the
solution.

What is ASBR short for? Correct Answer: D


A. Area Border Router
B. Auxiliary System Border
Router
C. Area System Border Router
D. Autonomous System
Boundary Router

Area Border Router (ABR) is Correct Answer: B


defined by which protocol?
A. Enhanced Interior Gateway
Routing Protocol (EIGRP)
B. OSPF
C. On-Demand Routing (ODR)
D. IS-IS
Which queuing mechanism Correct Answer: A
establishes four interface output
queues that will be used for
traffic scheduling?
A. Priority queuing (PQ)
B. First-in, first-out (FIFO)
C. Weighted fair queuing (WFQ)
D. Custom queuing (CQ)

Which option is not valid for Correct Answer: B


using the public Internet as a
backup WAN medium?
A. IP Security (IPSec) tunnels
B. Shared PVC
C. IP routing without constraints
D. Generic Routing
Encapsulation (GRE) tunnels

For the following items, which is Correct Answer: C


an SP Edge module in the
Enterprise Composite Network
model?
A. Core layer
B. Edge distribution
C. Public Switched Telephone
Network (PSTN) service
D. Server farm

Which method will be used to Correct Answer: C


secure a network against man-
in-the-middle attack?
A. Two-factor authentication
B. Management module
C. Encryption
D. Firewall

What is important for the top- Correct Answer: B


down design concept?
A. Engagement of the HR
representatives during the
design process
B. Engagement of the top
executives during the design
process
C. Engagement of the
employees working on the top
floors in the building during the
design process
D. Engagement of the top
executives once the design
process is finalized

Which one of the following QoS Correct Answer: A


mechanisms is recommended
for VoIP networks?
A. Low-latency queuing (LLQ)
B. Switched-based queuing
C. Fast queuing
D. Custom queuing

In which layer of the OSI model Correct Answer: C


does Real-Time Transport
Protocol (RTP) operate?
A. Network
B. Application
C. Transport
D. Session

design methodology? Correct Answer: C


A. Flat design
B. Top-down
C. Hierarchical structured design
D. PDIOO
Which parameters does the Correct Answer: D
computation of the EIGRP
composite metric use by
default?
A. Bandwidth and reliability
VCEConvert.com
B. Bandwidth and load
C. Bandwidth and maximum
transmission unit (MTU)
D. Bandwidth and delay

Which statement is true about Correct Answer: B


WANs?
A. Switches or concentrators
often relay information through
the WAN.
B. WANs typically encompass
broad geographic areas.
C. In general, WAN technologies
function at the middle three
layers of the Open System
Interconnection (OSI)
model.
D. Users of WANs do not
typically own all transmission
facilities.
Which item is not a true Correct Answer: A
disadvantage of the full-mesh
topology?
A. Central hub router represents
a single point of failure in the
network.
B. High level of complexity to
implement.
C. Large number of packet
replications required.
D. High costs due to number of
virtual circuits.

Which IPv4 field are the Correct Answer: B


precedence bits located in?
A. IP destination address
B. Type-of-service field
C. IP options field
D. IP protocol field

Which hierarchical layer has Correct Answer: B


functions such as High
availability, port security, and
rate limiting?
A. Core
B. Access
C. Network
D. Distribution

With which of the following Correct Answer: A


capabilities does RIPv2 improve
RIPv1?
A. Multicast updates,
authentication, variable-length
subnet mask (VLSM)
B. Authentication, VLSM, hop
count
C. Multicast updates,
authentication, hop count
D. Multicast updates, hop count

Which is the maximum segment Correct Answer: D


distance for Fast Ethernet over
unshielded twisted-pair (UTP)?
A. 285 feet
B. 100 feet
C. 500 feet
D. 100 meters

Which term accurately describes Correct Answer: A


a specific measure of delay
often used to describe voice
and video networks?
A. Jitter
B. Flux
C. Latency
D. Reliability

Which layer is in charge of fast Correct Answer: D


transport in the hierarchical
network model?
A. Network
B. Distribution
C. Access
D. Core

SNMP is short for Simple Correct Answer: C


Network Management Protocol.
Which version or versions of
SNMP specify security
extensions as part of the
protocol definition?
A. SNMPv2
B. SNMPv4
C. SNMPv3
D. SNMPv1
What is the reason for switching Correct Answer: A
preferred on shared segments?
A. Switched segments provide a
collision domain for each host.
B. Switched segments provide a
broadcast domain for each host
C. Shared segments provide a
broadcast domain for each host.
D. Shared segments provide a
collision domain for each host.

Study the following options Correct Answer: A


carefully. The corporate Internet
is part of which functional area?
A. Enterprise Edge
B. Enterprise Campus
C. Service Provider (SP) Edge
D. Enterprise

Which H.323 protocol is in Correct Answer: D


charge of call setup and
signaling?
A. RTCP
B. H.245
C. G.711
D. H.225

How often does a RIPv1 router Correct Answer: B


broadcast its routing table by
default?
A. Every 90 seconds.
B. Every 30 seconds.
C. Every 60 seconds.
D. RIPv1 does not broadcast
periodically.

For the following protocols, Correct Answer: A


which one maps names to IPv6
addresses?
A. Domain Name System (DNS)
B. DNSv2
C. Address Resolution Protocol
(ARP)
D. Neighbor discovery (ND)

What does CDP stand for? Correct Answer: D


A. Collection Device Protocol
B. Campus Discovery Protocol
C. Cisco Device Protocol
D. Cisco Discovery Protocol
For the following options, which Correct Answer: B
International Telecommunication
Union (ITU) standard provides a
framework
for multimedia protocols for the
transport of voice, video, and
data over packet-switched
networks?
A. Weighted fair queuing (WFQ)
B. H.323
C. Voice over IP (VoIP)
D. Session Initiation Protocol
(SIP)

Which feature will not transfer Correct Answer: B


packets when there is silence?
A. Ear and mouth (E&M)
B. Voice Activity Detection (VAD)
C. Digital Silence Suppressor
(DSS)
D. Dial peers

What does the Cisco SLM define Correct Answer: C


as the component used to
specify expected performance
between a pair of
devices connected by a
network?
A. CM
B. SLC
C. SLA
D. SAA

In a network with Enhanced Correct Answer: A


Interior Gateway Routing
Protocol (EIGRP) and IGRP using
the same autonomous
system number, what will
happen on the router
configured with both protocols?
A. Redistribution occurs
automatically.
B. Redistribution is not
necessary.
C. EIGRP assumes IGRP is a less
capable protocol and overtakes
it.
D. Redistribution does not occur
automatically.

What is the acronym PDIOO Correct Answer: D


short for?
A. Purpose, design, install,
operation, optimization
B. Purpose, design, implement,
operate, optimize
C. Plan, design, install,
operation, optimization
D. Plan, design, implement,
operate, optimize

Which item is not an SNMP Correct Answer: B


operation?
A. GetNext
B. Community
C. Trap
D. Set

Which packet-switching Correct Answer: D


topology approach typically
requires the greatest level of
expertise to implement?
A. Hub and spoke
B. Point-to-point
C. Star
D. Partial mesh
The network-design process is Correct Answer: B
limited by many external
constraints. Which origins are of
these constraints?
A. Technological, worldwide
standards, social, and
managerial
B. Technological, political,
social, and economical
C. Technological, cost, social,
and economical
D. Managerial, political, social,
and economical

What does FCAPS stand for? Correct Answer: B


A. Fault, caching, application,
production, security
B. Fault, configuration,
accounting, performance,
security
C. Fiscal, communication,
application, production, security
D. Fault, consolidation,
accounting, performance,
security
What is DHCP? Correct Answer: A
A. Dynamic Host Configuration
Protocol
B. Dedicated Host Configuration
Protocol
C. Dynamic Host Control
Protocol
D. Predecessor to BOOTP

Which answer is correct about Correct Answer: B


routing metrics?
A. If the metric is cost, the path
with the highest cost is selected.
B. If the metric is bandwidth, the
path with the highest bandwidth
is selected.
C. If the metric is bandwidth, the
path with the lowest bandwidth
is selected.
D. If the metric is bandwidth, the
highest sum of the bandwidth is
used to calculate the highest

Where do you put DNS and Correct Answer: AD


DHCP on Enterprise model?
(Choose two.)
A. Enterprise campus Server
Farm Module
B. Enterprise edge
C. SP Edge Premise
D. Enterprise Branch

Which two of these are functions Correct Answer: BD


of an access point in a Split MAC
Network Architecture? (Choose
two.)
A. EAP Authentication
B. MAC layer encryption or
decryption
C. 802.1Q encapsulation
D. Process probe response

Data link switching is typically Correct Answer: C


used in which Enterprise
Campus Module layer?
A. Server Farm
B. Campus Core
C. Building Access
D. Building Distribution
E. Internet Connectivity
Which three of these are Correct Answer: ACE
components of the North
American Numbering Plan?
(Choose three.)
A. Numbering Plan Area
B. country code
C. prefix
D. zone
E. line number
F. trunk channel

Which two statements about the Correct Answer: AC


Enterprise Data Center
Aggregation submodule are
correct? (Choose two.)
A. it provides Layer 4-7 services
B. it should never support STP
C. it is the critical point for
control and application services
D. it typically provides Layer 2
connectivity from the data
center to the core

Which network management Correct Answer: D


protocol allows a network
device to have vendor-specific
objects for
management?
A. SNMP v1
B. SNMP v2
C. SNMP v3
D. MIB
E. RMON1
F. RMON2

Which two solutions are parts of Correct Answer: DF


the Cisco Security Management
Suite? (Choose two.)
A. ASA
B. Cisco Security Agent
C. NAC Appliance
D. csm
E. pix
F. Cisco Security MARS

When monitoring voice traffic Correct Answer: ABC


on a converged network, which
are the three most important
QoS characteristics
to pay attention to? (Choose
three.)
A. delay
B. jitter
C. packet loss
D. bit error rate
E. CRTP hop configuration

An internal network has servers Correct Answer: C


with private IPv4 addresses that
must be visible from the public
network. Which
kind of address translation
should be used to ensure this?
A. many-to-one translation (PAT)
B. many-to-one translation
(Dynamic NAT)
C. one-to-one translation (Static
NAT)
D. one-to-one translation (NAT
Traversal)

Which two of these are the most Correct Answer: BD


accurate characteristics of
EIGRP deployment? (Choose
two.)
A. Provides features for most
Ethernet, Frame Relay, and dial-
up network deployment types.
B. Provides routing for IPv4,
IPv6, Appletalk, and IPX.
C. Provides default hierarchical
routing and summarization of a
VLSM IP address deployment.
D. Provides quick convergence
through neighbor relationships
and topology backup routes.
E. Provides the best route
selection on combined default
metrics of active bandwidth,
delay, load, reliability,
and MTU parameters.

Which of the following is a Correct Answer: D


modular component within the
Cisco Enterprise Campus
module in the Cisco
Enterprise Architecture
framework?
A. Teleworker
B. E-Commerce
C. Internet Connectivity
D. Building Distribution
E. WAN/MAN Site-to-Site VPN
Which two design methodology Correct Answer: AB
steps relate, at least in part, to
the implement phase of the
PPDIOO process?
(Choose two.)
A. verifying the network
B. testing design
C. determining customer
requirements
D. characterizing the existing
network
E. establishing the organizational
requirements

Which H.323 protocol monitors Correct Answer: D


calls for factors such as packet
counts, packet loss, and arrival
jitter?
A. H.225
B. H.245
C. RAS
D. RTCP

When designing using the Cisco Correct Answer: E


Enterprise Architecture, in which
Enterprise Campus layer does
the Enterprise
Teleworker module establish its
connection?
A. Building Core
B. Building Access
C. Enterprise Branch
D. Enterprise Data Center
E. WAN/Internet

The BodMech online fitness Correct Answer: D


organization specializes in
creating fitness plans for senior
citizens. The company
recently added a health-
products retail inventory. Which
E-Commerce module device will
allow customers to
interact with the company and
purchase products?
A. application server
B. database server
C. public server
D. web server
E. NIDS appliance
F. SMTP mail server
Which two wireless attributes Correct Answer: BD
should be considered during a
wireless site survey procedure?
(Choose two.)
A. encryption
B. channel
C. authentication
D. power
E. SSID

You are performing an audit of a Correct Answer: B


customer's existing network and
need to obtain the following
router
information:
Interfaces
running processes
IOS image being executed
Which command should you
use?
A. show version
B. show tech-support
C. show startup-config
D. show running-config
E. show processes memory
hich of these domain-of-trust Correct Answer: D
security statements is correct?
A. Segments within a network
should have the same trust
models.
B. An administrator should apply
consistent security controls
between segments.
C. Communication between
trusted entities needs to be
carefully managed and
controlled.
D. Segment security policy
decisions are based on trust.

When collecting information Correct Answer: AE


about a customer's existing
network, which two sources will
provide the most
accurate data? (Choose two.)
A. traffic analysis
B. customer interview
C. customer-supplied server list
D. existing network topology
diagram
E. configurations obtained from
network equipment

Which modules are found in the Correct Answer: BDEF


Enterprise Edge functional area
of the Cisco Enterprise
Architecture? Select all
that apply.
A. Teleworker
B. WAN/MAN
C. Server Farm
D. E-Commerce
E. Internet Connectivity
F. Remote Access/VPN

Which H.323 protocol is Correct Answer: B


responsible for the exchanging
of capabilities and the opening
and closing of logical
channels?
A. H.225
B. H.245
C. RAS
D. RTCP

Which one of the following Correct Answer: A


represent correct IPv6 Global
Unicast address format?
A. 48bit(Global
Prefix)+16bit(Subnet
ID)+64bit(Interface ID)
B. 16bit(Subnet ID)+ 48bit(Global
Prefix)+64bit(Interface ID)
C. 64bit(Interface
ID)+16bit(Subnet ID)+
48bit(Global Prefix)
D. 64bit(Interface ID)+
48bit(Global Prefix)+16bit(Subnet
ID)

What is the maximum number of Correct Answer: A


switches in VSS?
A. 2
B. 4
C. 6
D. 8

What DNS entry to use for WLC Correct Answer: C


with firmware version 6.0 or later
so an Access Point can
determine the
controller's IP address?
A. DNS A record with
controller's hostname
B. DHCP option 43
C. cisco-capwap-controller
D. cisco-lwapp-controller

Two companies that want to Correct Answer: A


connect with multiple providers
vendors, what protocol is the
proper one to use?
A. BGP
B. IS-IS
C. OSPF
D. EIGRP

Which subnet mask should you Correct Answer: A


use on point-to-point links to
avoid wasting IP addresses?
A. 255.255.255.252
B. 255.255.255.250
C. 255.255.255.0
D. 255.255.255.248

Which virtualization deployment Correct Answer: B


an engineer will execute to
separate to accomplish security
policies?
A. Same corporate Network with
NAC capabilities.
B. Something using VLANs

What statement about EVN is Correct Answer: D


true?
A. Support RIP
B. Support OSPFV3
C. Required LDP
D. Support as many as 32 virtual
networks per device

Consider the reservation of IP Correct Answer: B


Addressing what mask you will
use in a point to point
connection between two
Buildings?
A. 255.255.252.0
B. 255.255.255.252
C. 255.255.255.254

What describes the link Correct Answer: A


performance?
A. Bandwidth
B. Utilization
C. Availability

What tool would you use to Correct Answer: B


capture, segregate and analyse
IP traffic?
A. Protocol Analyser
B. NetFlow

What tool would you use to Correct Answer: A


decode protocols?
A. Protocol Analyser
B. NetFlow
C. Spectrum Analyser

What should be considered Correct Answer: BCF


when scaling EIGRP? (Choose
three)
A. CPU
B. Peers
C. Query scope
D. Interface Bandwidth
E. Memory
F. IP Address
Which two high-level design Correct Answer: AB
components are included in
Unified Wireless network?
A. Local
B. Cisco FlexConnect
C. Deterministic
D. N+1
E. Dynamic

How to reduce the size of a Correct Answer: AB


routing table? (Choose two):
A. NAT
B. Summarization
C. Static routes
D. VLAN

What query should you make if Correct Answer: C


you want to find all objects of a
particular type in an MIT tree?
A. mid-tree-level
B. class-level
C. object-level
D. tree-level
What will extend a trust Correct Answer: D
boundary (there is switch
interface configuration with
separate voice VLAN and data
VLAN configured where the
phone is connected to, also
small diagram showing endpoint
(host), IP Phone,
Access Switch, Distribution
Switch, Core Switch and Data
Centre Aggregation switch)?
A. Multiple layers PC
B. IP Phone
C. Access Switch
D. Distribution Switch
E. Core Switch

What kind of servers you should Correct Answer: AB


place in DMZ?
A. WWW
B. FTP
C. DHCP
D. TACACS+
E. NFP

What access policies to set up Correct Answer: ABC


for remote VPN access (Choose
three)?
A. Admins are centrally
authenticated with full network
access
B. Partners are centrally
authenticated with access
limited by use of ACLs
C. Employees are centrally
authenticated with access
limited by use of ACLs
D. Admins are locally
authenticated with full network
access
E. Partners are centrally
authenticated with full access
F. Employees are centrally
authenticated with full access

An organization needs to Correct Answer: A


implement isolated logical
structure due to compliance
regulations. What complex
access control network
virtualization method can it use?
A. The IT organization creates a
quarantine network for end
points that do not meet the
posture assessment
requirements
B. The IT organization creates a
separate guest network for
wireless and wired clients
C. The IT organization acts as a
client serving different, isolated
departments

What are two advantages of a Correct Answer: AC


modular design? (Choose two)
A. Increased scalability
B. Security can be implemented
at every module
C. Increased redundancy as you
can add modules
D. Hierarchy included in design

What is the best point to deploy Correct Answer: B


the IPS, not to have false
positives, since the traffic is
already filtered?
A. Inline before the firewall
B. Inline after the firewall
C. Passive of the firewall
D. Passive of the Switch

What VPN tunneling technology Correct Answer: A


supports multicast?
A. DMVPN spoke-to-spoke
B. IPSec direct tunnelling hub-
and-spoke
C. Easy VPN
D. IPSec direct tunnelling spoke-
to-spoke

Which one of the following is Correct Answer: B


"synchronous link" design?
A. SSL VPN over serial cable
modem
B. Bonded T1s
C. Internet VPN
D. MPLS VPN

Refer to the exhibit. Which Correct Answer: D


element or elements of the
existing network infrastructure
does this network map
emphasize?
A. network services
B. network protocols
C. the OSI data link layer
D. network applications

While designing the LAN core to Correct Answer: A


distribution infrastructure for
optimum convergence, the
engineer decides to
use a topology using triangles.
Which benefit to the
organization is true?
A. It utilizes multiple links to
route traffic to its destination.
B. It allows device failures to
occur without a recalculation of
routes.
C. It creates a topology that can
grow with the organization.
D. It allows for a smaller quantity
of devices in the core.

When designing a high Correct Answer: C


availability network, which
option can be classified as a
fault domain?
A. single power supply devices
in a network design
B. nonredundant devices in the
network design
C. every tier in the network
design
D. collapsed core in a network
design

Which two options should be Correct Answer: BE


considered when designing an
OSPF network? (Choose two.)
A. CDP should be incorporated.
B. Ensure the address space is
summarizable.
C. There is a limit on available AS
numbers.
D. Design STP to mirror the
OSPF design.
E. Configure nonbackbone areas
as stub areas.

Which feature must be Correct Answer: C


configured on a switch port that
connects to a Cisco Wireless
Access Point when QoS
is required?
A. Portfast
B. Cisco Discovery Protocol
C. Dot1q Trunk
D. Auto Negotiation

When designing IP addressing Correct Answer: AD


schemes, which two features are
benefits of implementing
hierarchical
addressing? (Choose two.)
A. provides an optimized
addressing plan
B. provides real-time
troubleshooting
C. allows the use of overlapping
addresses
D. reduces routing table entries
E. provides modular
convergence

Which protocol is best when Correct Answer: C


there are circuit connections
with two different ISPs in a
multihoming scenario?
A. SSL
B. IPsec
C. BGP
D. VRRP

In an EAP-enabled WLAN, which Correct Answer: A


component sends the EAP
identity request?
A. WLAN controller
B. ACS server
C. access point
D. wireless client

Which option can hinder Correct Answer: D


efficient IP address allocation?
A. VLSM
B. classless routing protocols
C. routing auto-summary
D. classful routing protocols

Which technology can help Correct Answer: D


prevent attacks from the Internet
against a corporate network?
A. Cisco AnyConnect Secure
Mobility Client
B. Metro Ethernet
C. Cisco IDS
D. Cisco IPS

One step in characterizing an Correct Answer: B


existing network involves
obtaining information such as
network performance,
availability, utilization and
response times. Which activity
generates this information?
A. logical network mapping
B. network health check
C. address and naming analysis
D. wiring and media assessment

Which STP feature allows an Correct Answer: B


access port to bypass the
learning and listening states?
A. Root Guard
B. PortFast
C. Loop Guard
D. BPDU Guard

In which phase of the Cisco Correct Answer: B


Design Lifecycle would you
identify shortfalls in the network
operation team's ability
to support new technologies
being introduced?
A. In the Deployment stage of
the Build phase.
B. In the Assessment stage of the
Plan phase
C. In the Optimize stage of the
Manage phase
D. In the Validation stage of the
Build phase.

As you assign QoS priorities, Correct Answer: B


which Cisco tool can you use to
identify the TCP and UDP ports
that an
application uses?
A. Cisco Configuration
Professional
B. NBAR
C. NetFlow
D. CiscoWorks

Which technology combines two Correct Answer: D


Nexus switches to form a single
logical switch, while maintaining
control plane
separation between the two
devices, and requiring
independent management of
each device?
A. vPC
B. Cisco StackWise
C. MEC
D. VSS

For which type of topology are Correct Answer: C


modern fast-converging routing
protocols designed?
A. hub-and-spoke
B. full mesh
C. hierarchical
D. star

While designing a highly resilient Correct Answer: D


infrastructure, which layer is
typically a single point of
failure?
A. internet
B. WAN
C. distribution
D. access

What virtualization technology is Correct Answer: B


used to provide device
virtualization on the Cisco Nexus
7000 series switch?
A. VRF
B. VDC
C. vPC
D. VSS

Which VPN tunneling Correct Answer: C


technology supports IP
multicast?
A. IPsec direct encapsulation
spoke-to-spoke
B. IPsec direct encapsulation
hub-to-spoke
C. IPsec VTI
D. Cisco Easy VPN

Which two options are features Correct Answer: DE


offered by NetFlow? (Choose
two.)
A. gathering platform and
capability information about
neighbors
B. validating or reclassifying ToS
marking
C. identifying and classifying
traffic
D. collecting data for usage-
based network billing
E. warehousing data for later
retrieval and analysis

What two industry drivers that Correct Answer: AE


promote network virtualization?
(Choose two.)
A. device reduction
B. application stability
C. traffic isolation
D. multi-vendor support
E. reduced complexity

While preparing an overview of Correct Answer: DE


Internet facing DMZ for a
customer, a consultant must
identify the functionality
to be placed in the DMZ. Which
two functionalities are best
suited for use in a DMZ?
(Choose two.)
A. enterprise NTP source
B. DDOS protection
C. remote access VPN
termination
D. web load balancer
E. web security appliance

A customer is using a "guest" Correct Answer: D


VLAN at a remote site to
provide access for onsite guests
or visitors to access
the Internet, while prohibiting
them from accessing internal
sites. Which network technology
isolates guest
traffic while utilizing the existing
corporate network?
A. vPC
B. frame relay
C. DMVPN
D. GRE tunnel
An engineer is designing a Correct Answer: B
solution for a client that has a
web server on their internal
network that is configured
to listen for web traffic on TCP
port 140.Which NAT solution
allows traffic to be properly
directed?
A. dynamic NAT
B. static NAT
C. overloading
D. static with dynamic NAT

Which Cisco tool provides Correct Answer: B


network accounting, monitoring,
and routing information?
A. NBAR
B. NetFlow
C. Cisco Prime Collaboration
Deployment
D. CiscoWorks

Which Cisco tool can prevent Correct Answer: B


attacks from malware, viruses,
and other malicious traffic?
A. Cisco ISE
B. Cisco IPS
C. Cisco Secure ACS
D. Cisco IDS

What two design best practices Correct Answer: AB


are key functions of the
distribution layer? (Choose two.)
A. address summarization
B. fault domain isolation
C. end user and application
isolation
D. admission control
E. QoS tagging

Which subnet is the best choice Correct Answer: D


for a point-to-point link?
A. 10.120.10.0/29
B. 10.120.10.0/28
C. 10.120.10.1/32
D. 10.120.10.0/30

Refer to the exhibit. Which action Correct Answer: A


can be taken in this network
design to make it more resilient?
A. Add carrier redundancy
B. Add additional Layer 2 trunks
between core/distribution
switches
C. Add additional Layer 2 trunks
between access switches
D. Extend Layer 3 connectivity to
access layer using dynamic
routing protocol

A startup company wants to Correct Answer: AE


deploy the Cisco IP Telephony
solution. Which two actions are
appropriate design
approaches? (Choose two.)
A. Connect user IP phones to
the Ethernet switches of access
layer.
B. Connect IP phones to the
Ethernet switches of data center
module.
C. Connect Cisco Unified
Communications manager to the
Ethernet switches of data center
module.
D. Connect SIP trunks for PSTN
connectivity to Ethernet
switches of campus core layer.
E. Connect Cisco Unified
Communications Manager to the
Ethernet switches of the campus
core layer.

DRAG DROP a
Drag and drop the network
virtualization features from the
left onto the correct functions
on the right.

DRAG DROP a
Drag and drop the phases of the
lifecycle of a standard network
from the left into the order in
which they occur
on the right.

Refer to the exhibit. Which Correct Answer: D


component of network
virtualization architecture is
shown?
A. access control
B. network services virtualization
C. policy enforcement
D. path isolation

Which two devices support Correct Answer: DE


context virtualization? (Choose
two.)
A. Cisco ASR 1000 Series
Aggregation Services Router
B. Cisco 5520 Series Wireless
LAN Controller
C. Cisco ASA
D. Cisco Catalyst 9500 Series
Switch
E. Cisco Nexus 7000 Series
Switch

Which option do you use to Correct Answer: D


provide dynamic utilization of
WAN links based on latency?
A. policy-based routing
B. equal cost load balancing
C. unequal cost load balancing
D. Cisco Performance Routing

An engineer is trying to collect Correct Answer: C


information about the customer
router before a design change.
Which command
provides the most information
about this device?
A. show cdp neighbors
B. show controllers
C. show tech-support
D. show running-config

In which module do you place a Correct Answer: C


VPN submodule when designing
an enterprise network?
A. service provider edge
B. enterprise campus
C. remote
D. enterprise edge

High availability is required for a Correct Answer: B


critical remote office of an
enterprise. The office has
already deployed two
redundant WAN connections.
Which action can be done to the
edge router to improve the
availability of the
remote office?
A. Replace the fiber uplinks with
copper
B. Use modular line cards
C. Add dual power supplies
D. Upgrade the uplinks from
100MB to 1G.

Which two benefits are achieved Correct Answer: BE


from utilizing the Cisco Lifecycle
approach when designing
enterprise
networks? (Choose two.)
A. identifies power consumption
costs
B. increases business agility
C. allows extended access to
business partners
D. increases network ownership
E. improves network availability

An engineer is designing a new Correct Answer: C


modular network topology.
Which option is an advantage to
using a hierarchical
design?
A. It provides additional fault
tolerance.
B. It manually controls failover.
C. It enables the network to
scale.
D. It supports unequal cost
paths.

DRAG DROP a
Drag the descriptions on the left
to the matching design category
on the right.

Which two considerations are Correct Answer: BD


important when designing an IP
address plan? (Choose two.)
A. the type of connected
devices
B. the number of locations
C. the name of the locations
D. the number of devices per
location
E. the speed of the connected
devices

country. Which deployment Correct Answer: D


model keeps the call control at
the data center of the primary
site?
A. campus deployments
B. distributed deployment
C. cloud hybrid service
deployment
D. multisite deployment model
with centralized call processing

Which advantage of using Correct Answer: B


Spanning Tree Protocol is true?
A. allows fast convergence after
failure of a link or device
B. prevents network loops
C. utilizes all available uplink
bandwidth
D. allows dual-homed servers
operate in active-active mode

QUESTION 595 Correct Answer: D


A customer is questioning the
additional infrastructure that is
needed to design a three-tiered,
hierarchical
network. Which option is a
benefit of the distribution layer
in a traditional design?
A. provides additional security
services against unauthorized
access
B. extends the Layer 2 and Layer
3 boundary to the core layer
C. isolation of faults between the
access and core layers
D. creates access layer resiliency

Which two features are benefits Correct Answer: BC


of a modular network design?
(Choose two.)
A. improved fault isolation
B. higher scalability
C. ease of troubleshooting
D. intelligent network services
E. end-to-end security

Which feature enables the Correct Answer: D


VRRP-enabled router to regain
the master VRRP status upon
recovery from a
failure?
A. priority
B. tracking
C. delay
D. preemption

Which issue is a possible result Correct Answer: C


of using the bottom-up
approach to network design?
A. The designer is unable to
draw on previous experience.
B. The network QoS policies
might be configured improperly.
C. The resulting design might fail
to meet the requirements of the
organization.
D. The design process can be
extremely time consuming.

A small business owner has 200 Correct Answer: A


staff members that occupy two
floors of a building. The owner
wants to reduce
the network infrastructure costs
without losing too much network
resiliency and scalability. Which
option meets
these requirements?
A. Combine core and
distribution layers into one layer
and keep all other layers.
B. Combine access and
distribution layers into one layer
and keep all other layers.
C. Combine access and core
layers into one layer and
keeping all other layers.
D. Exclude access and
distribution layer switches and
connect everything to
redundant core switches.

Which key feature does a Correct Answer: B


modular design approach
provide?
A. fault isolation
B. efficiency
C. performance
D. manageability

Which route source has a lower Correct Answer: A


administrative cost than BGP?
A. a connected interface
B. an IBGP route
C. RIP
D. OSPF

faster network convergence Correct Answer: C


B. improved service availability
C. timely threat detection
D. decreased network latency

Which advantage to using route Correct Answer: D


summarization is true?
A. enables efficient peering with
other autonomous systems
B. provides an overview of all
subnets used across the
infrastructure
C. enabled recalculation of the
routing table with any update for
optimum convergence
D. reduces routing table size and
improves convergence

When designing enterprise Correct Answer: AC


networks, which two elements
help to achieve IP routing
efficiency? (Choose two.)
A. supernetting
B. using two different IGP
protocols
C. hierarchical addressing
D. dynamic IP addressing
E. static routing

DRAG DROP a
Drag the spanning-tree protocol
on the left to the recommended
deployment environment on the
right.Correct Answer: AC

Which type of router connects Correct Answer: C


to two different OSPF areas?
A. autonomous system boundry
B. backbone
C. area border
D. internal

Which statement about route Correct Answer: C


summarization is true?
A. Summarization is supported
by every routing protocol.
B. EIGRP can be configured to
automatically summarize VLSM
networks.
C. When it is implemented,
routing tables are smaller.
D. ACLs can be applied to
automatically summarize routes.

Cisco Unified Wireless networks Correct Answer: D


support two campus design
models: Centralized or Local
Mode and Cisco
FlexConnect. Which statement
about the Local Mode design
model is true?
A. The wireless LAN controller
and access points are co-
located
B. It is recommended for
remote-site deployments
C. It is recommended for sites
that use less than 50 APs
D. It is recommended for sites
with a local WAN distribution
layer
An engineer must design a new Correct Answer: B
data center network and must
reduce hardware costs while
allowing for the
benefits of a hierarchical
network model. Which layer is
combined with the distribution
layer by a single device
to accomplish this goal?
A. campus
B. access
C. DMZ
D. core

Which two characteristics are Correct Answer: BD


advantages of the top-down
approach to network design?
(Choose two.)
A. Generally is the fastest
approach.
B. The resulting design is
optimized for the business
requirements of the
organization.
C. The designer can delay
testing until the end of the
project.
D. The resulting design can meet
both current and future
requirements.
E. Does not require a thorough
initial need analysis.

Which two types of files are the Correct Answer: DE


most common used in APIs for
programmability? (Choose two.)
A. HTML
B. PERL
C. BASH
D. JSON
E. XML

An engineer must build an Correct Answer: AE


enterprise network that can
operate with a limited amount of
employees. In which
two ways can the engineer use
the Cisco Design Lifecycle?
(Choose two.)
A. manage
B. share
C. learn
D. operate
E. build

Which type of WAN connection Correct Answer: B


do you use for a low-latency
application that is only available
across a WAN?
A. IPsec over the Internet
B. MPLS VPN
C. dialup
D. unencrypted GRE over the
Internet

A customer is deploying a Correct Answer: C


centralized communications
infrastructure to a small, remote
construction site that
has satellite-based internet
connectivity. If the expected
latency is about 500 ms, which
description of the user
experience is true?
A. minimal delay and
conversation overlap
B. Phones will not complete
registration to the centralized
cluster
C. significant delay and
conversation overlap
D. no delay or conversation
overlap

What occurs to traffic when a Correct Answer: A


Cisco APIC is removed from the
data path of a Cisco ACI?
A. The fabric continues to
forward the traffic.
B. The traffic is lost during
convergence.
C. The traffic is queued during
convergence.
D. The fabric reroutes the traffic
to another APIC.

Which network size can provide Correct Answer: C


six /25 subnets while wasting the
smallest number of IP
addresses?
A. /19
B. /16
C. /22
D. /23
Refer to the exhibit. Which result Correct Answer: D
is true if a client computer
connects through the interface
named Internal and
attempts to connect to an
operational tcp/443 based
website?
A captive portal is displayed
which enabled guest access
layer.
B. The traffic passes while
alerting the logging system with
the Emergencies event level.
C. The traffic passes and displays
the website content.
D. The website connection times
out.

Which network element must be Correct Answer: D


summarized in a multiarea OSPF
deployment?
A. IP address
B. number of routes
C. communities
D. link state advertisements
Which are two strategies in keep Correct Answer: BE
in mind when designing an OSPF
network? (Choose two.)
A. Design STP to mirror the
OSPF design
B. Configure nonbackbone areas
as stub areas
C. CDP should be incorporated
D. There is a limit on available AS
numbers
E. Ensure the address space is
summarizable

DRAG DROP a
An engineer is performing a
basic server load balance. Drag
and drop the tasks from the left
into the correct
order on the right.

Which design feature must be Correct Answer: A


considered when the WAN
bandwidth consumption and the
number of wireless
clients are growing in a
centralized wireless network?
A. FlexConnect
B. bridging
C. high density
D. remove APs

An engineer is configuring NAC Correct Answer: B


to use SNMP to control switches
and set VLAN assignments for
ports. Which
mode must be used to
accomplish this configuration?
A. server
B. out-of-band mode
C. real IP gateway mode
D. virtual bridge mode

Refer to the exhibit. To optimize Correct Answer: B


routing table size, a design
engineer must create the
summarization for
subnets in their central office.
Which summary IP address is
most efficient?
A. 10.20.0.0/15
B. 10.21.0.0/17
C. 10.21.128.0/17
D. 10.21.0.0/16

What are three valid BGP Correct Answer: ACE


attributes? (Choose three.)
A. AS path
B. neighbor
C. next hop
D. bandwidth
E. origin
F. delay

An engineer is designing an Correct Answer: AC


OSPF infrastructure for an
organization. Which two
approaches reduce the impact
of a topology change? (Choose
two.)
A. maintaining areas with a small
number of neighbors
B. designing the Area Border
Routers to be in four areas
C. applying summarization at the
area border routers
D. tuning the hello and hold
timers on each router
E. provisioning a single area for
the infrastructure

Which feature is improved by Correct Answer: B


utilizing network modularity
while designing a new enterprise
network?
A. fault isolation
B. configuration management
C. number of devices required
D. cost

Which two methods that Cisco Correct Answer: DE


routers and switches use to
share information between
directly connected
devices on a regular basis?
(Choose two.)
A. NetFlow
B. ARP
C. NHRP
D. CDP
E. LLDP

Refer to the exhibit. An engineer Correct Answer: ABD


is upgrading a customer Internet
connection that currently
supports 100
internal users. The engineer
suggests the pictured customer
design to support an additional
500 staff. Which
three considerations about this
new design must the customer
be made aware of? (Choose
three.)
A. If VRRP or HSRP on the Layer
3 is used, then access layer
switches are needed.
B. The firewalls must be
configured in a high availability
mode.
C. A routing protocol is
configured between the Layer 3
switches and the firewalls.
D. The new design supports
redundancy from the access
layer right next to the ISP.
E. A high-availability cluster
allows the client to load balance
Internet connections.
F. The recommended license for
the firewall must support a
minimum of 600 clients.
An engineer wants to transport Correct Answer: C
Layer 2 packets over an MPLS-
based WAN network. If
encryption is a
requirement, which solution
must the engineer use?
A. HQoS
B. EoMPLS
C. IPsec
D. VPLS

A startup company is Correct Answer: C


developing applications to
provide e-commerce services. A
network architect is consulted
to recommend the best solution
in terms of security and
scalability. Which solution
should he recommend?
A. Connect the Internet directly
to the core Ethernet switches
hosting e-commerce application
servers to avoid
any firewall requirements.
B. Host e-commerce application
servers in the Internet
Connectivity Edge module to
save costs and all for
expansion.
C. Deploy a new Enterprise
Edge module for e-commerce
services with appropriate the
application
segregation and include
firewalls.
D. Install firewall software in
each e-commerce server and
also deploy a firewall module in
each of the
distribution and core switches.

While analyzing the network Correct Answer: AC


addressing scheme for an
organization, a network engineer
identifies private and
public network addressing.
Which two summary addresses
require that NAT communicates
with the Internet?
(Choose two.)
A. 172.20.0.0/16
B. 172.32.0.0/12
C. 10.160.0.0/12
D. 131.184.0.0/16
E. 131.176.0.0/12

DRAG DROP a

Refer to the exhibit. Correct Answer: A


An engineer is designing a
hierarchical LAN design for an
enterprise campus. Drag and
drop the function from
the left onto the correct layer on
the right.
Which component of network
virtualization architecture is
shown?
A. access control
B. path isolation
C. network services virtualization
D. policy enforcement

An engineer is designing secure Correct Answer: A


access for a WLAN. Which
security framework creates a
virtual port for each
WLAN client at the AP?
A. 802.1x
B. WPA
C. WPA2
D. LEAP

Which two benefits of using a Correct Answer: CE


modular enterprise network
design are true? (Choose two.)
A. easy IOS services
configuration
B. ease of implementation
C. allows unplanned network
growth
D. supports VRF for end-to-end
on-net security
E. scalable and flexible model

A corporation has asked for a Correct Answer: AD


new design of a branch office
consisting of 50 workers and 30
phones that need
continual connectivity. Which
two items can be included in the
design to offer high availability?
(Choose two.)
A. backup configuration of
branch router
B. backup configuration of
corporate router
C. single uplink to WAN
D. dual uplinks to WAN
E. always be on the most up-to-
date router code

Which feature do you use to Correct Answer: B


identify which network nodes
exchange the most traffic?
A. interface counter
B. SNMP
C. NetFlow
D. ACL counter

A small ISP migrating to iBGP for Correct Answer: D


their routing core and wants to
reduce the iBGP mesh
requirement into
smaller subautonomous systems.
Which method must be used?
A. areas
B. route reflectors
C. stub areas
D. confederations

The customer network design Correct Answer: ADE


consists of PCs, a Layer 3 switch,
and an ASA firewall connected
to an ISP.
Points A, B, and C represent
connections in the network.
Which three design parameters
are impacted at each
point in the network? (Choose
three.)
A. point A: speed/duplex
settings
B. point B: PC MAC addresses
C. point C: private addressing
D. point C: public addresses
E. point B: NAT translations
F. point A: NAT translations

When designing a new OSPF Correct Answer: D


network, which type of router is
used to control flooding of link
state
advertisements between logical
groups of routers?
A. Backbone Router
B. Autonomous System Border
Router
C. Internal Router
D. Area Border Router

Which benefit of hiding network Correct Answer: A


information by using
aggregation is true?
A. It speeds up convergence.
B. It provides an optimal path to
a destination.
C. It limits traffic directed to
unknown networks.
D. It provides specific
knowledge of the network.

A design engineer has four Correct Answer: C


available subnets. Which
network accommodates 354
user hosts most efficiently?
A. 10.12.128.0/21
B. 10.78.96.0/22
C. 10.35.18.0/23
D. 10.53.19.0/24
IS-IS is which type of routing Correct Answer: A
protocol?
A. link-state
B. distance-vector
C. spanning-tree
D. static

While designing a campus Correct Answer: A


access layer, a network engineer
is determining where to place
the Layer 3
connectivity and begin the Layer
2 connectivity so that the VLANs
span across access switches.
Which design
satisfies this requirement?

OTHER SETS BY THIS CREATOR

C173 Version 3 C268 WGU


Language Agnostic 27 Terms
88 Terms
justinjcox20 justinjcox20

C173 Ultimate Study Scripting and Programming -


Guide Foundations - C173
222 Terms 95 Terms

justinjcox20 justinjcox20

1/2

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy