Complete Text CCDA
Complete Text CCDA
A. Utilization
B. Baseline
C. Availability
D. Bandwidth
Answer: A
2. When a VSS configuration is reviewed,it is determined that the nodes are not
detecting each other. Which option is the issue with the switches?
Answer: A
3. Based on best practices , which QoS profile should be configured on the WLAN of
the WLC for wireless VoIP communications?
A. Platinum
B. Gold
C. Bronze
D. Silver
Answer: A
4. How many switches can be combined into a single network element using VSS?
A. 4
B. 8
C. 6
D. 2
Answer: D
Answer: C
Answer: C
Answer: C
9. Which two methods are used to reduce the mesh links required between iBGP peers
in the same AS? (Choose two.)
A. Community
B. Route reflectors
C. Local preference
D. Confederations
E. Atomic aggregate
Answer: BD
Answer: D
11. Which connection provides cost effective backup connectivity for a branch
network?
A. Frame Relay
B. MPLS
C. ATM
D. Internet VPN
Answer: D
12. A network engineer is implementing a new mesh WAN topology. The solution
support synchronous bandwidth and allow for future growth? Which solution is best
suited to meet these requirements?
A. DMVPN over business class modem
B. SSL VPN over business class cable modem
C. Bonded T1s
D. MPLS over Ethernet
Answer: A
13. Traditionally, the DMZ exists between which two locations? (Choose two.)
A. Metro Access
B. Corporate Network
C. Building access
D. Building distribution
E. Internet
Answer: BE
14. What branch connection type supports SLAs,Full-Mesh connectivity and QoS?
A. Frame Relay
B. MPLS
C. Internet VPN
D. Point-to-Point
Answer: B
Answer: C
Answer: BE
16. Company ABC has intermittent problems registering remote-site IP phones over
the WAN with Cisco Unified CallManager at headquartes. The Company hires a network
consultant to help implement QoS in its network. Which technique should the
consultant use to identify traffic and applications that traverse the network?
A. NBAR
B. RSVP
C. Policing
D. Priority queuing
Answer: A
Answer: C
Answer: C
19. Which option is an object instance than an API identifies using information
model-based architecture?
A. DN
B. Class
C. Method
D. MO
Answer: A
Answer: D
21. For a VLAN that requires 60 hosts, which subnet is the most efficient?
A. 10.0.0.1/20
B. 172.31.17.0/27
C. 10.10.10.0/26
D. 192.168.15.0/24
Answer: C
22. Which option is an advantage of a Layer 3 access model over the traditional
Layer 2 access model?
A. Increased neighbor adjacencies
B. Faster convergence
C. Reduced resources on the router
D. Reduced size of routing table
Answer: B
23. Which data center connection supports QoS , full mesh deployment and typically
offers SLAs?
A. Internet VPN
B. MPLS
C. DMVPN
D. Frame Relay
Answer: B
24. In Cisco ACI, which option is the unified point of automation , management ,
monitoring and programmable?
A. Python
B. REST
C. APIC
D. Postman
Answer: C
25. In the traditional hierarchical LAN design,Which two statement about the
distribution layer are true? (Choose two.)
A. It typically is connected directly to the internet It provides users direct
access to the network
B. It uses Layer 2 switching only
C. It aggregates data from the access layer
D. Policy is implemented at this layer
Answer: D
26. Which level needed to be set on Cisco WLC for VolP traffic:
A. PLATINUM
B. GOLD
C. SILVER
D. BRONZE
Answer: A
27. Choose considerations for access layer design? (Choose two.)
A. QoS
B. Routing
C. Port security
D. Load balance
E. HSRP
Answer: AC
28. Which cisco technology can connect more than two switches so that they behave
as one switch?
A. Etherchannel
B. Trunking
C. VSS
D. Stackwise
Answer: D
29. Which two processes are included in the Build phase of the Cisco Design Life
Cycle? (Choose two.)
A. Design
B. Validation
C. Analysis
D. Deployment
E. Assessment
Answer: BD
Answer: AB
31. When designing changes to an existing network, which two options are documented
to understand environmental constraint? (Choose two.)
A. Utilization of network resources
B. Floor and rack space availability
C. Host naming conventions
D. Heating and Air conditioning
E. Location of existing documentation
Answer: BD
32. In layer 2 design approach, how you can describe STP redundancy?
A. It use the most efficiency of redundant link
B. Only one link is active per time
C. It redistribute the traffic between links
D. Other
Answer: B
33. When you make change on Network, what the consideration of environment Data
center network network?
A. Location
B. Air condition and cooling
C. storage and rack
D. Floor &
Answer: B
Answer: BC
Answer: AB
Answer: A
37. For a VLAN that requires 60 hosts, which subnets is most efficient?
A. 172.31.17.0/27
B. 10.10.10.0/26
C. 10.0.0.1/20
D. 192.168.15.0/24
Answer: B
Answer: AB
39. A consultant at company XYZ connects to the guest wireless network but cannot
reach the mgmt vlan to complete an audit.other users can connect to the mgmt vlan
without any issues. why is the consultant unable to access the MGMT VLAN.
A. The access is not permitted
B. AP is offline
C. The WLC is offline
D. The MGMT VLAN is down
Answer: A
Answer: D
41. What are two important aspects to Consider when looking at backup circuit
options for a branch location ? (Choose 2 option)
A. Type of dynamic routing protocol
B. Backup MPLS Connection
C. Internet service provider diversity
D. Local exchange carrier diversity
E. Type of core switch
Answer: CD
Answer: D
Answer: D
Answer: D
45. Which two design decision can improve network resiliency? (you have to chose 2
answers)
A. Implement redundant link
B. Increase data plane bandwidth
C. Implement serial device connection
D. Reduce network size
E. Implement redundant topology
Answer: AB
46. In which phase of cisco design life cycle the validation of network
infrastructure happened?
A. Assessment in plan
B. Deployment in build
C. Validation in build
D. Optimization in operat
Answer: C
Answer : A
Answer: AC
49. A network engineer must connect two sites. Each sites has a different
autonomous number. Which method do you use to exchange Routing information between
the sites?
A. BGP
B. IGP
C. EIGRP
D. OSPFv3
E. Static Route
Answer: A
Answer: A
51. What is the technology that allow you to combine more than two switches?
A. Stackwize
B. Vss
C. Vpc
D. Etherchannel
Answer: A
52. What is the technology that allow you to combine more than two switches?
A. Stackwize
B. Vss
C. Vpc
D. Etherchannel
Answer: A
53. Which network virtualization technique can you implement without disrupting the
existing network design and infrastructure?
A. VRF-Lite
B. EVN
C. MPLS
D. VNET tags
Answer: A
54. When designing a hierarchical network design, in which layer DAI and DHCP
snooping take place?
A. Core layer
B. Application
C. Distribution layer
D. Enterprise Edge
E. Access layer
F. Network layer
Answer: E
55. What are two components of the Build phase in Cisco design life cycle? (choose
two)
A. Assessment
B. Validation
C. Deployment
D. Design
E. Analysis
Answer: BC
Answer: A
57. In which two modes can you deploy Cisco IPS appliances? (Choose two.)
A. Inline
B. Promiscuous
C. VTP group
D. Threat mitigation
E. Threat detection
Answer: AB
58. According to Cisco best practices, which traffic control should you apply to
the strict priority queue?
A. Bandwidth should be limited to one-third of the link capacity
B. Bandwidth should be limited to 768 kbps
C. Limits should be applied to non-real-time traffic and all real-time traffic
should be permitted
D. The link serialization delay should be set to less than 100 ms
Answer: A
Answer: A
60. Which benefit is an advantage of route summarization?
A. It reduces the size of the routing table
B. It causes routes to be updated more frequently
C. It lowers the cost metric
D. It enables neighbor discovery
Answer: A
61. Which two states are RSTP port states? (Choose two.)
A. Discarding
B. Learning
C. Blocking
D. Listening
E. Disabled
Answer: AB
62. What are two components of the Build phase in the Cisco Design Lifecycle?
(Choose two.)
A. Migration
B. Deployement
C. Optimization
D. Design
E. Configuration
Answer: AB
63. Which design enables easy and flexible scaling in the Cisco Enterprise
Architecture model?
A. Modular
B. Top-down
C. Bottom-up
D. Full-mesh
Answer: A
64. Drag the term on the left to the matching deployment scenario on the right.
Select and Place:
Answer:
65. Drag the term on the left to the matching deployment scenario on the right.
Select and Place:
Answer:
66. Drag the technology on the left to the matching routing protocol on the right.
Select and Place:
Answer:
67. Drag the security term on the left to the matching description on the right.
Select and Place:
Answer:
68. Which DHCP option do you need to configure to ensure that an LWAP can
communicate with the Cisco WLC in a different subnet?
A. 7
B. 19
C. 43
D. 150
Answer: C
69. Which two options can be virtual networking devices? (Choose two.)
A. ESX host
B. VM
C. Switches
D. Routers
E. Hyper-V host
Answer: CD
70. Drag the STP toolkit term on the left to the definition on the right.
Select and Place:
Answer:
71. You are designing routing between building distribution switches and campus
core switches. Assuming that all links have the same speed, which statement about
these designs is true?
A. Option A has more fault tolerance but slower convergence than Option B
B. Option A has more fault tolerance and faster convergence than Option B
C. Option B has more fault tolerance but slower convergence than Option A
D. Option B has more fault tolerance and faster convergence than Option A
Answer: B
Answer: A
73. A network engineer needs to create a controller-based, high-density RF design.
Which two factors determine the cell size? (Choose two.)
A. Antenna type
B. ClientLink support
C. TPC threshold setting
D. QoS setting
E. Free space path loss
Answer: AC
74. Which IP address can be routed to cross the public Internet?
A. 10.31.1.1
B. 192.168.32.1
C. 172.32.1.1
D. 169.254.32.1
Answer: C
75. A remote worker for a sales company must submit daily updates via the company
email system. The employee does not have a company-issued laptop, so which VPN
method is used for connectivity to the company email server?
A. DMVPN
B. SSL VPN
C. IPsec VPN
D. GET VPN
Answer: B
76. Which functionality must be enabled on router A to connect two networks for
translating private addresses into "legal" public addresses on a one-for-one basis?
A. PAT
B. NAT
C. VLAN
D. GARP
E. PPP
Answer: B
77. GRE has been used to establish a routing-protocol neighbor relationship between
two routers, across the public Internet. Which technology can you use to encrypt
this communication channel?
A. Access lists
B. IPsec
C. CBAC
D. IPS
Answer: B
78. Which option is a benefit of Cisco Discovery Protocol?
A. Provides information about directly connected Cisco devices
B. Provides greater detail about collected data, including time stamping
C. Combines with the network layer data that is gathered by NetFlow when using a
NetFlow collector
D. Part of the IEEE 802.1ab standard
Answer: A
79. Which three QoS levels should VoIP clients be set to on a Cisco WLC? (Choose
three.)
A. Platinium
B. Bronze
C. Gold
D. Silver
E. Premier
F. Critical
Answer: ACD
80. What is the optimal device and location to fulfill these requirements?
A. IPS inline
B. IPS inline inside of the firewall
C. Cisco IOS IPS on the border router
D. passive IPS connected to a SPAN port outside of the firewall
E. passive IPS connected to a SPAN port inside of the firewall
Answer: A
81. What are two benefits of a structured IPv4 addressing scheme? (Choose two.)
A. reduces routing table size
B. Provides increased security
C. Allows for address translation to be performed
D. Improves manageability and troubleshooting
E. Increases high availability
Answer: AD
82. What are two reasons discontinuous IPv4 networks hinder scalability? (Choose
two.)
A. Routing table bloat
B. Inability to utilize automatic summarization
C. Insufficient IP addresses
D. Slowed packet forwarding
E. Delayed interface queuing
Answer: AB
83. An organization is redesigning a 3-tier hierarchical network into a collapsed
core. What design issue is a primary concern per Cisco best practices?
A. Services delineation
B. Port density
C. Feature availability
D. Resource utilization
Answer: D
84. What three design best practices are key functions of the distribution layer?
(Choose three.)
A. Fault domain isolation
B. Admission control
C. Access switch aggregation
D. QoS tagging
E. Address summarization
F. End user and application isolation
Answer: ACE
85. A network engineer is tasked to upgrade and expand a large existing production
network. From the IOS CLI, what two protocols can be used to build a topology map
of the existing network? (Choose two.)
A. SNMP
B. IP SLA
C. ICMP Echo
D. LLDP
E. Traceroute
Answer: DE
86. A network engineer has finished designing and implementing a new network. What
two protocols would they use to gain insight into the network and determine the
components that require optimization? (Choose two.)
A. CDP
B. NetFlow
C. ICMP Echo
D. NMAP
E. SNMP
Answer: BE
87. A wireless LAN client is sending traffic to the wired LAN client. What path
will the packet take to reach the destination endpoint in a lightweight wireless
deployment?
A. Switch > controller > ap > client
B. Controller > ap > switch > client
C. AP > controller > switch > client
D. Switch > ap > controller > client
Answer: C
88. You design a network with the following network addresses:
192.168.168.0
192.168.169.0
192.168.170.0
192.168.171.0
192.168.172.0
192.168.173.0
192.168.174.0
192.168.175.0
Which route address is the best summary of these network addresses?
A. 192.168.0.0/24
B. 192.168.171.128/3
C. 192.168.168.0/21
D. 192.168.175.0/3
E. 192.168.0.0/16
Answer: C
89. Which option is an advantage of the bottom-up design model?
A. Focuses on the needs of user communities
B. Includes a thorough analysis of customer requirements
C. Facilitates a quick response to client requests
D. Produces a "big-picture" of the desired outcome
Answer: C
90. A large company requests a hierarchical design model. What tier should be free
of physically connected hosts?
A. Core
B. Access
C. Aggregation
D. Distribution
Answer: A
91. A company has dark fiber between headquarters and its data center. It is
presently configured as a 10GbE connection. Network utilization shows high
utilization on the connection. What technology can be implemented to increase
capacity without acquiring another circuit?
A. MPLS
B. DWDM
C. VPLS
D. DMVPN
Answer: B
92. What wireless authentication option requires a Public Key Infrastructure?
A. EAP-TLS
B. PEAP
C. LEAP
D. EAP-FAST
Answer: A
93. What two access point modes support the transmission of user traffic over a
LWAPP/CAPWAP tunnel? (Choose two.)
A. Local
B. H-REAP
C. Rogue detector
D. Monitor
E. Sniffer
F. Standalone
Answer: AB
94. What is the primary advantage of implementing a wireless LAN controller in a
wireless LAN design?
A. Roaming between APs
B. RADIUS user authentication
C. Radio resource management
D. accelerated data transfer
Answer: C
95. Which two devices would you place in your DMZ to ensure enterprise edge
security? (Choose two.)
A. IPS
B. NAC
C. ASA
D. ACS
E. WCS
Answer: AC
96. Which three are security services offered through Cisco Router Security?
(Choose three.)
A. Trust and Identity
B. Integrated Threat Control
C. Unified Wireless Network Security Solution
D. Secure Connectivity
E. Voice-Messaging Security
F. Endpoint Security
G. Virtual Security Gateway
Answer: ABD
97. Which voice codec should you use in order to provide toll quality calls?
A. G.711
B. G.718
C. G.722
D. G.729
Answer: A
98. Which three are features of LWAPP? (Choose three.)
A. Firmware synchronization
B. Local management of APs
C. Configuration changes manually synced
D. Encryption of control channel
E. Configuration data only on the WLC
F. Wireless control free operation
G. Replaces 802.1x for authentication in wireless connections
Answer: ADE
99. Which three statements are true regarding the virtual interface on a Cisco
Wireless LAN Controller? (Choose three.)
A. Support mobility management
B. Serves as DHCP relay
C. Used for all controller to AP communication
D. Supports embedded Layer 3 security
E. Default for out-of-band management
F. Default for in-band management
G. Provides connectivity to AAA servers
Answer: ABD
100. A campus network needs end-to-end QoS tools to manage traffic and ensure voice
quality. Which three types of QoS tools are needed? (Choose three.)
A. Interface queuing and scheduling
B. Congestion management
C. Compression and fragmentation
D. Bandwidth provisioning
E. Traffic classification
F. Buffer management
Answer: ADE
101. Your supervisor wants you to recommend a management protocol that will allow
you to track overall bandwidth utilization, utilization by traffic type, and
utilization by source and destination. Which is ideally suited for this function?
A. MRTG
B. NetFlow
C. RRD
D. SNMP
Answer: B
102. Which subnet address and mask would you use for all Class D multicast
addresses to be matched within an access list?
A. 224.0.0.0/20
B. 224.0.0.0/4
C. 239.0.0.0/24
D. 239.0.0.0/8
E. 225.0.0.0/8
Answer: B
103. Which statement should the designer keep in mind when considering the advanced
routing features?
A. One-way route redistribution avoids the requirement for static or default routes
B. Redistribution, summarization, and filtering are most often applied between the
campus core and enterprise edge
C. Filtering only occurs on the routing domain boundary using redistribution
D. Summarize routes at the core toward the distribution layer
E. The hierarchical flexibility of IPv6 addressing avoids the requirement for
routing traffic reduction using aggregation
Answer: B
104. When designing an EIGRP network, which two things should you take into
consideration? (Choose two.)
A. ASN and K values must match
B. The neighbor command can be used to enable unicast communication
C. The neighbor diameter cannot exceed a 15-hops limit
D. NSSA areas can be used to redistribute external routes
E. Neighbor relationship can be established with non-Cisco routers
Answer: AB
105. You are asked to design a new branch office that will need to support 25
users. These users will be using an ISP connection and will need to connect to the
main office for network services. Which two Cisco devices are the most appropriate
to fulfill all of these requirements? (Choose two.)
A. Cisco IPS
B. Cisco ISR G2
C. Cisco ASA
D. Cisco 2960
E. Cisco CRS-1
F. Cisco ACS
Answer: BC
106. Which is usually used to connect to an upstream ISP?
A. EIGRP
B. OSPF
C. BGP
D. IS-IS
E. RIPv2
Answer: C
107. You are designing a network that requires a routing protocol that will use
minimal network bandwidth. Which would satisfy this requirement?
A. RIPv2
B. RIPng
C. OSPF
D. ARP
E. EGP
Answer: C
108. Which two statements best describe an OSPF deployment? (Choose two.)
A. ABR provides automatic classful network boundary summarization
B. ABR requires manual configuration for classful network summarization
C. External routes are propagated into the autonomous system from stub areas via
ASBR
D. External routes are propagated into the autonomous system from regular areas or
NSSA via ASBR
E. External routes are propagated into the autonomous system from regular areas or
NSSA via ABR
Answer: BD
109. Which three items pertain to EIGRP? (Choose three.)
A. Can use multiple unequal paths
B. Routes are redistributed as type 2 by default
C. ASN and K values must match to form neighbors
D. Uses multicast address 224.0.0.9 for updates
E. Exchanges full routing table every 30 seconds
F. Summary routes have AD of 90
G. External routes have AD of 170
Answer: ACG
110. A company wants to use private IP addresses for all its internal hosts. Which
technology can the company use to provide access to the Internet using a single
public IP address?
A. Static NAT
B. Source routing
C. ACL
D. PAT
Answer: D
111. Which two link state routing protocols support IPv6 routing? (Choose two.)
A. BGP4+
B. OSPF
C. RIPng
D. EIGRP
E. IS-IS
Answer: BE
112. What is the most compact representation of the following IPv6 address:
2001:db8:0000:0000:cafe:0000:0000:1234 ?
A. 2001:db8::cafe::1234
B. 2001:db8::cafe:0000:0000:1234
C. 2001:db8:0:0:cafe::1234
D. 2001:db8::cafe:0:1234
Answer: C
113. With respect to IPv6 addressing, from a design perspective, which of these
statements is it important to keep in mind?
A. IPv6 addressing provides convenience of anycast addressing without any
configuration requirements
B. IPv6 does not use multicast addressing
C. An IPv6 router will not forward packets from one link to other links if the
packet has either a link-local source or a link-local destination address
D. Dynamic address assignment requires DHCPv6
Answer: C
114. Which consideration is the most important for the network designer when
considering IP routing?
A. Convergence
B. Scalability
C. On-demand routing
D. Redistribution
Answer: A
115. Your supervisor has asked you to deploy a routing protocol within the lab
environment that will allow for unequal cost multipath routing. Which should you
choose?
A. EIGRP
B. OSPF
C. IS-IS
D. RIP
Answer: A
116. Which two methods are used to reduce the mesh links required between iBGP
peers in the same AS? (Choose two.)
A. Community
B. Router reflectors
C. Local preferences
D. Confederations
E. Atomic Aggregate
F. MED
Answer: BD
117. When designing a WAN backup for voice and video applications, what three types
of connections should be used? (Choose three.)
A. Private WAN
B. Internet
C. ISDN
D. MPLS
E. Dial-up
F. ATM
G. DSL
Answer: ACD
118. When designing for a remote worker, which two are typical requirements?
(Choose two.)
A. Best-effort interactive and low-volume traffic patterns
B. Connections to the enterprise edge using Layer 2 WAN technologies
C. Always-on connection with SLA from ISP
D. Voice and IPsec VPN support
E. High-end security devices with stateful firewall filtering
F. Dual or multihoming to ISPs
Answer: CD
119. Which two routing protocols operate over NBMA point-to-multipoint networks
without the use of point-to-point sub interfaces? (Choose two.)
A. RIPv1
B. RIPv2
C. IS-IS
D. EIGRP
E. OSPF
Answer: DE
120. Which three modules would typically utilize public IPv4 addressing? (Choose
three.)
A. Access
B. Distribution
C. Core
D. Data Center
E. E-Commerce
F. Internet Connectivity
G. Remote Access/VPN
H. WAN/MAM
I. Branch
J. Branch Data Center
Answer: EFG
121. Which two are characteristics of a Lightweight Access Point? (Choose two.)
A. Managed via a central wireless LAN controller
B. Code upgrade performed via a TFTP server
C. CAPWAP tunnels
D. Managed directly via CLI or web interface
Answer: AC
122. Which one of these statements describes why, from a design perspective, a
managed VPN approach for enterprise teleworkers is most effective?
A. A managed VPN solution uses a cost-effective, on-demand VPN tunnel back to the
enterprise
B. This solution supports all teleworkers who do not require voice or video
C. This architecture provides centralized management where the enterprise can apply
security policies and push configurations
D. It provides complete flexibility for remote access through a wireless hotspot or
a guest network at a hotel, in addition to a home office
Answer: C
123. What are three key areas that need to be considered when designing a remote
data center? (Choose three.)
A. Power diversity
B. Active Directory services
C. Cisco IOS versions
D. Data storage
E. Applications
F. User access
G. Packet routing
Answer: ADE
124. Which model of ISR is utilized for the teleworker design profile?
A. Cisco 1900 Series
B. Cisco 1800 Series
C. Cisco 800 Series
D. Cisco 500 Series
Answer: C
125. When designing using the Cisco Enterprise Architecture, in which Enterprise
Campus layer does the Remote Access and VPN module establish its connection?
A. Building Access
B. Campus Core
C. Enterprise Branch
D. Enterprise Data Center
Answer: B
126. Drag the WAN technology on the left to the most appropriate category on the
right.
Select and Place:
Answer:
127. You need to connect to a remote branch office via an Internet connection. The
remote office does not use Cisco equipment. This connection must be secure and must
support OSPF.
Which of the following can be used to transport data to the branch office?
A. GRE over IPsec
B. IPsec
C. GRE
D. IPsec VTI
Answer: A
128. Which three are associated with the distribution layer within the campus
design? (Choose three.)
A. Access layer aggregation
B. Route summarization
C. Network trust boundary
D. Next-hop redundancy
E. Layer-2 switching
F. Port security
G. Broadcast suppression
Answer: ABD
129. High availability is a key design consideration in the enterprise campus
network. In a fully redundant topology, which is likely to provide faster IGP
convergence during a failure?
A. Redundant supervisors
B. Redundant supervisors with Cisco Nonstop Forwarding (NSF) and Stateful
Switchover (SSO)
C. Single supervisors with tuned IGP timers
D. Single supervisors
Answer: C
130. In the enterprise data center, which are the three main components? (Choose
three.)
A. Network Infrastructure
B. Interactive services
C. Data Center Management
D. Internet services
E. WAN services
F. VPN and remote access
Answer: ABC
131. Drag the associated virtualization tool or solution on the left to the
appropriate design requirement on the right.
Select and Place:
Answer:
132. Which statement is true concerning enterprise edge distribution switches?
A. The speed of switching is the most critical feature
B. Security requirements are offloaded to the other modules for performance reasons
C. Edge distribution switches are only required when using a collapsed core
backbone
D. Enterprise edge distribution switches are similar to the building distribution
layer
Answer: D
133. Which is a factor in enterprise campus design decisions?
A. Network application characteristics
B. Routing protocol characteristics
C. Switching latency characteristics
D. Packet filtering characteristics
Answer: A
134. Which network virtualization technology involves creating virtual routers with
its own individual routing tables on a physical router?
A. VSS
B. vPC
C. VRF
D. VLAN
Answer: C
135. Drag the network characteristic on the left to the design method on the right
which will best ensure redundancy at the building distribution layer.
Select and Place:
Answer:
136. Drag the technology on the left to the type of enterprise virtualization
where it is most likely to be found on the right.
Select and Place:
Answer:
137. When selecting which hardware switches to use throughout an enterprise campus
switched network, which consideration is not relevant?
A. Whether data link layer switching based upon the MAC address is required
B. The number of shared media segments
C. Which infrastructure service capabilities are required
D. Whether to support Layer 3 services at the network edge
Answer: B
138. Which two of these practices are considered to be best practices when
designing the access layer for the enterprise campus? (Choose two.)
A. Implement all of the services (QoS, security, STP, and so on) in the access
layer, offloading the work from the distribution and core layers.
B. Always use a Spanning Tree Protocol; preferred is Rapid PVST+.
C. Use automatic VLAN pruning to prune unused VLANs from trunked interfaces to
avoid broadcast propagation.
D. Avoid wasted processing by disabling STP where loops are not possible.
E. Use VTP transparent mode to decrease the potential for operational error.
Answer: BE
139. The enterprise campus core layer has requirements that are unique from the
distribution and access layers. Which of the following is true about the core
layer?
A. The core layer provides convergence using Layer 2 and Layer 3 services and
features
B. The core layer provides high availability to support the distribution layer
connections to the enterprise edge
C. The campus core layer is optional
D. The core layer requires high performance to manage the traffic policing across
the backbone
Answer: B
140. Which three options are valid Cisco STP tools used to ensure best-practice
access layer design for the enterprise campus? (Choose three.)
A. PortFast
B. UDLD
C. Root Guard
D. BPDU Guard
E. Flex Links
F. SPAN
G. EtherChannel
Answer: ACD
141. Spanning Layer 2 across geographically separate data centers is a key
consideration for current data center designs. Which is the name of the NX-OS
technology that facilitates MAC in IP transport for Layer 2 VLANs across any IP
network?
A. Overlay Transport Virtualization (OTV)
B. Virtual Private LAN Services (VPLS)
C. Generic Routing Encapsulation (GRE)
D. Q-in-Q tunneling
Answer: A
142. Which three solutions are part of the Borderless Network Services? (Choose
three.)
A. Wireless
B. Routing
C. TrustSec
D. MediaNet
E. Swicthing
F. EnergyWise
G. Next-Gen WAN
Answer: CDF
143. The evolution of the Data Center is best represented by the 3.0 architecture
component of virtualization. Which of the following is not an example of the
virtualization taking place in the Data Center?
A. Virtualized media access utilizing Fiber Channel over Ethernet
B. VLANs and virtual storage area networks (VSANs) provide for virtualized LAN and
SAN connectivity, separating physical networks and equipment into virtual entities
C. Virtual Machines that run an application within the client operating system,
which is further virtualized and running on common hardware
D. Storage devices virtualized into storage pools, and network devices are
virtualized using device contexts
Answer: A
144. Which layer of the OSI model does Cisco recommend to place the enterprise
network core layer, when designing a network based on its switched hierarchical
design?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
Answer: C
145. Which Cisco technology using Nexus NX-OS infrastructure allows the network
architect to create up to four separate control and data plane instances of the
Nexus chassis?
A. vPC (Virtual port-channel)
B. VRF (Virtual Routing and Forwarding)
C. VSS (Virtual Switching System)
D. VDC (Virtual Device Context)
Answer: D
146. Drag the characteristics of the traditional campus network on the left to the
most appropriate hierarchical network layer on the right.
Select and Place:
Answer:
147. Drag the network function on the left to the functional area or module where
it is most likely to be performed in the enterprise campus infrastructure on the
right.
Select and Place:
Answer:
148. Where in the Cisco Enterprise Architecture model does network management
reside?
A. Enterprise data center module
B. Enterprise campus module
C. Enterprise edge module
D. Service Provider edge module
E. Service Provider data center module
Answer: B
149. Drag the security prevision on the left to the appropriate Network module on
the right.
Select and Place:
Answer:
150. Drag the description or characteristic on the left to the appropriate
technology or protocol on the right.
Select and Place:
Answer:
151. Click and drag the phases of the PPDIOO network lifecycle approach on the left
to their order on the right.
Select and Place:
Answer:
152. Characterizing an existing network requires gathering as much information
about the network as possible. Which of these choices describes the preferred order
for the information-gathering process?
A. Site and network audits, traffic analysis, existing documentation and
organizational input
B. Existing documentation and organizational input, site and network audits,
traffic analysis
C. Traffic analysis, existing documentation and organizational input, site and
network audits
D. Site and network audits, existing documentation and organizational input,
traffic analysis
Answer: B
153. Which statement accurately represents the characteristics of the core layer in
this design?
A. QoS should only be performed only in the core
B. Load balancing should never be implemented or used
C. Access lists should be used in the core to perform packet manipulation
D. Partial mesh should be used as long as it is connected to each device by
multiple paths
E. Policy-based traffic control should be implemented to enable prioritization and
ensure the best performance for all time-critical applications
Answer: D
154. Which three modular components are part of the Cisco Enterprise Edge
Architecture? (Choose three.)
A. E-commerce module
B. Internet connectivity module
C. Server farm module
D. Remote access and VPN module
E. PSTN services module
F. Enterprise branch module
G. Building distribution module
Answer: ABD
155. Which WLC interface is dedicated for WLAN client data?
A. Virtual interface
B. Dynamic interface
C. Management interface
D. AP manager interface
E. Service port interface
Answer: B
156. The first phase of PPDIOO entails identifying customer requirements.
Drag the example on the left to the associated requirement on the right.
Select and Place:
Answer:
157. During which phase of the PPDIOO model would you conduct interviews with
supporting staff to develop and propose a viable solution?
A. Prepare
B. Plan
C. Design
D. Implement
E. Operate
F. Optimize
Answer: A
158. Which one of these statements is an example of how trust and identity
management solutions should be deployed in the enterprise campus network?
A. Authentication validation should be deployed as close to the data center as
possible.
B. Use the principle of top-down privilege, which means that each subject should
have the privileges that are necessary to perform their defined tasks, as well as
all the tasks for those roles below them.
C. Mixed ACL rules, using combinations of specific sources and destinations, should
be applied as close to the source as possible.
D. For ease of management, practice defense in isolation � security mechanisms
should be in place one time, in one place.
Answer: C
159. When designing the threat detection and mitigation portion for the enterprise
data center network, which of the following would be the most appropriate solution
to consider?
A. 802.1x
B. ACL in the Core layer
C. Cisco Security MARS
D. Cisco Firewall Services Module
Answer: C
160. You have a campus network that consists of only Cisco devices. You have been
tasked to discover the device platforms, the IOS versions, and an IP address of
each device to map the network.
Which proprietary protocol will assist you with this task?
A. SNMP
B. TCP
C. CDP
D. ICMP
E. LLDP
Answer: C
161. Which three technologies are recommended to be used for WAN connectivity in
today�s Enterprise Edge designs? (Choose three.)
A. DWDM
B. Metro Ethernet
C. Frame relay
D. MPLS VPN
E. ISDN
F. DSL
G. Wireless
Answer: ABD
162. You are tasked with designing a new branch office that will support 75 users
with possible expansion in the future and will need a highly available network.
Which of the branch design profiles should be implemented?
A. Large branch design
B. Medium branch design
C. Teleworker design
D. Small branch design
Answer: B
163. Which two can be used as a branch office WAN solution? (Choose two.)
A. Frame Relay
B. MPLS
C. Metro Ethernet
D. GPRS
E. Dial-up modem
F. 3G USB modems
Answer: BC
164. Drag the WAN characteristics on the left to the branch office model where it
would most likely to be used on the right.
Select and Place:
Answer:
165. Your company�s Cisco routers are operating with EIGRP. You need to join
networks with an acquisition�s heterogeneous routers at 3 sites, operating with
EIGRP and OSPF.
Which describes the best practice for routing protocol deployment?
A. Apply OSPF throughout both networks
B. Apply one-way redistribution exclusively at each location
C. Apply two-way redistribution exclusively at each location
D. Apply two-way redistribution at each location with a route filter at only one
location
E. Apply two-way redistribution at each location with a route filter at each
location
F. Apply EIGRP with the same autonomous system throughout both networks
Answer: E
166. Which four services does the architecture for Media Services contain? (Choose
four.)
A. Access services
B. Transport services
C. Storage services
D. Forwarding services
E. Session control services
F. Security services
G. Filtering services
H. Remote access services
Answer: ABCE
167. Which IPv6 feature enables routing to distribute connection requests to the
nearest content server?
A. Link-local
B. Site-local
C. Anycast
D. Multicast
E. Global aggregatable
Answer: C
168. What is the recommended spanning tree protocol to use for all Layer 2
deployments in a branch office environment?
A. CST
B. RSPT
C. PVST
D. MISTP
E. Rapid PVST+
Answer: E
169. Which two are types of network virtualization? (Choose two.)
A. VSS: Virtual Switching System
B. VRF: Virtual Routing and Forwarding
C. VCI: Virtual Channel Identifier
D. VLSM: Variable Length Subnet Masking
E. VM: Virtual Machine
F. VMP: Virtual Memory Pool
Answer: AB
170. Which is the purpose of the Cisco NAC Profiler?
A. Automates discovery and inventory of all LAN attached devices
B. Generates a profile based on username and group
C. Learns and creates a database of virus definitions based on LAN traffic
D. A database used to map user VPN accounts
Answer: A
171. Cisco Identity-Based Networking Services relies heavily on the 802.1x
protocol. Which other authentication solution is used hand-in-hand with 802.1x to
authenticate users for network access?
A. RADIUS
B. LEAP
C. IPsec
D. TACACS
E. ISAKMP
Answer: A
172. Which protocol is used to reserve bandwidth for the transport of a particular
application data flow across the network?
A. cRTP
B. IEEE 802.1P
C. RSVP
D. LFI
E. Auto QoS
Answer: C
173. When designing the identity and access control portions for the enterprise
campus network, which of these solutions would be the most appropriate solution to
consider?
A. 802.1x
B. ACL in the Core Layer
C. Cisco Security MARS
D. NetFlow
Answer: A
174. Refer to the exhibit.
Assuming that a network will grow exponentially for the next 24 months, what is the
main limitation that must be addressed?
A. scalability
B. serviceability
C. redundancy
D. resiliency
Answer: A
175. Which item is the fundamental basis of a virtual network?
A. a VRF instance
B. a MIB database
C. a GRE tunnel
D. redundant hardware
Answer: A
176. Which network virtualization technique can you implement without disrupting
the existing network design and infrastructure?
A. VRF-Lite
B. EVN
C. MPLS
D. VNET tags
Answer: A
177. According to fundamental design principles, which location is best for
implementing Cisco QoS policies?
A. hardware
B. software
C. Cisco 3900 Series Integrated Services Routers running IOS software
D. WAN routers running IOS software
Answer: A
178. According to Cisco best practices, which traffic control should you apply to
the strict priority queue?
A. Bandwidth should be limited to one-third of the link capacity.
B. Bandwidth should be limited to 768 kbps.
C. Limits should be applied to non-real-time traffic and all real-time traffic
should be permitted.
D. The link serialization delay should be set to less than 100 ms.
Answer: A
179. When is the Cisco FlexConnect design model recommended?
A. when remote-site APs are centrally managed
B. when each remote site has its own wireless controller
C. when each remote site runs VSS
D. when the remote sites use WAN optimization
Answer: A
180. In which two modes can you deploy Cisco IPS appliances? (Choose two.)
A. inline
B. promiscuous
C. VTP group
D. threat mitigation
E. threat detection
Answer: AB
181. Which benefit is an advantage of route summarization?
A. It reduces the size of the routing table.
B. It causes routes to be updated more frequently.
C. It lowers the cost metric.
D. It enables neighbor discovery.
Answer: A
182. Which two states are RSTP port states? (Choose two.)
A. discarding
B. learning
C. blocking
D. listening
E. disabled
Answer: AB
183. If two routing protocols have the same route and prefix, which effect do they
have on the routing table?
A. Only the route with the lowest administrative distance is added.
B. Only the route with the highest administrative distance is added.
C. Both routes are added.
D. Neither route is added, and a loop is formed.
Answer: A
184. For a VLAN that requires 70 hosts, which subnet is the most efficient?
A. 10.0.0.1/8
B. 172.31.17.0/26
C. 192.168.1.0/25
D. 192.168.15.0/24
Answer: C
185. Which two issues are typical challenges to network stability and reliability?
(Choose two.)
A. hardware failures
B. layer 1 link failures
C. application failures
D. core layer failures
E. distribution layer failures
Answer: AB
186. Which design enables easy and flexible scaling in the Cisco Enterprise
Architecture model?
A. modular
B. top-down
C. bottom-up
D. full-mesh
Answer: A
187. What are two components of the Build phase in the Cisco Design Lifecycle?
(Choose two.)
A. Migration
B. Deployment
C. Optimization
D. Design
E. Configuration
Answer: AB
188. Drag the term on the left to the matching deployment scenario on the right.
Select and Place:
189. Drag the security term on the left to the matching description on the right.
Select and Place:
190. Drag the technology on the left to the matching routing protocol on the right.
Select and Place:
191. Drag the characteristic on the left to the correct campus design model on the
right.
Select and Place:
192. Drag the STP toolkit term on the left to the definition on the right.
Select and Place:
193. Which two options can be virtual networking devices? (Choose two.)
A. ESX host
B. VM
C. switches
D. routers
E. Hyper-V host
Answer: CD
194. Which DHCP option do you need to configure to ensure that an LWAP can
communicate with the Cisco WLC in a different subnet?
A. 7
B. 19
C. 43
D. 150
Answer: C
195. Which IP address can be routed to cross the public Internet?
A. 10.31.1.1
B. 192.168.32.1
C. 172.32.1.1
D. 169.254.32.1
Answer: C
196. A network engineer needs to create a controller-based, high-density RF design.
Which two factors determine the cell size? (Choose two.)
A. antenna type
B. ClientLink support
C. TPC threshold setting
D. QoS setting
E. free space path loss
Answer: AC
197. Which WAN technology is a cost-effective method to deliver 100 Mb of bandwidth
to multiple branch offices?
A. DSL
B. DWDM
C. ISDN
D. Metro Ethernet
Answer: D
198. Which technology should a company use to connect a branch office to
headquarters via an Internet connection while maintaining confidentiality and the
flexibility to run a routing protocol between the two locations?
A. GRE over IPsec
B. IPsec
C. GRE
D. SSL VPN
Answer: A
.
199. You are designing routing between building distribution switches and campus
core switches. Assuming that all links have the same speed, which statement about
these designs is true?
A. Option A has more fault tolerance but slower convergence than Option B.
B. Option A has more fault tolerance and faster convergence than Option B.
C. Option B has more fault tolerance but slower convergence than Option A.
D. Option B has more fault tolerance and faster convergence than Option A.
Answer: B
200.Which functionality must be enabled on router A to connect two networks for
translating private addresses into �legal� public addresses on a one-for-one basis?
A. PAT
B. NAT
C. VLAN
D. GARP
E. PPP
Answer: B
201. What are the three models that are required in the systematic approach of the
top-down design methodology? (Choose three.)
A. logical
B. physical
C. layered
D. network components
E. technological
F. protocols
G. virtual
Answer: ABC
202. A remote worker for a sales company must submit daily updates via the company
email system. The employee does not have a company-issued laptop, so which VPN
method is used for connectivity to the company email server?
A. DMVPN
B. SSL VPN
C. IPsec VPN
D. GET VPN
Answer: B
.
203. Which location is best for placing a monitor-only IPS that has visibility into
the most data center traffic?
A. (A) inline before the firewall
B. (B) inline after the firewall
C. (C) passive off the firewall
D. (D) passive off the internal switch
Answer: D
204. What is the optimal device and location to fulfill these requirements?
. provide early indication of reconnaissance and scanning activities with blocking
capabilities
. require fewer interfaces to inspect traffic to the DMZ and internal network
A. IPS inline outside of the firewall
B. IPS inline inside the firewall
C. Cisco IOS IPS on the border router
D. passive IPS connected to a SPAN port outside of the firewall
E. passive IPS connected to a SPAN port inside the firewall
Answer: A
205. Which three QoS levels should VoIP clients be set to on a Cisco WLC? (Choose
three.)
A. Platinum
B. Bronze
C. Gold
D. Silver
E. Premier
F. Critical
Answer: ACD
Refer to the exhibit.
206. The red lines refer to STP blocked ports. What happens if the HSRP active
moves to the right distribution, and the STP root remains on the left distribution?
A. The STP root becomes the gateway.
B. The interdistribution link is used for transit.
C. The HSRP standby becomes the gateway.
D. The interaccess link is used for transit.
E. Host traffic is unable to reach the HSRP active.
Answer: B
207. What are two purposes of route redundancy? (Choose two.)
A. minimize the effect of link failures
B. minimize the effect of internetworking device failures
C. minimize the convergence time of STP
D. reduce router CPU utilization
E. save network costs
Answer: AB
208. In which two places is redundancy recommended in an enterprise campus network
design? (Choose two.)
A. building distribution
B. campus core
C. building access
D. e-commerce
E. Internet connectivity
Answer: AB
209. Which option is an example of physical device virtualization?
A. VSS
B. VPN
C. VRF
D. VLAN
Answer: A
210. Which option is a benefit of Cisco Discovery Protocol?
A. provides information about directly connected Cisco devices
B. provides greater detail about collected data, including time stamping
C. combines with the network layer data that is gathered by NetFlow when using a
NetFlow collector
D. part of the IEEE 802.1ab standard
Answer: A
211. GRE has been used to establish a routing-protocol neighbor relationship
between two routers, across the public Internet. Which technology can you use to
encrypt this communication channel?
A. access lists
B. IPsec
C. CBAC
D. IPS
Answer: B
Answer: C
213. What are two reasons discontinuous IPv4 networks hinder scalability? (Choose
two.)
A. routing table bloat
B. inability to utilize automatic summarization
C. insufficient IP addresses
D. slowed packet forwarding
E. delayed interface queuing
Answer: AB
214. What are two benefits of a structured IPv4 addressing scheme? (Choose two.)
A. reduces routing table size
B. provides increased security
C. allows for address translation to be performed
D. improves manageability and troubleshooting
E. increases high availability
Answer: AD
215. A network engineer has finished designing and implementing a new network. What
two protocols would they use to gain insight into the network and determine the
components that require optimization? (Choose two.)
A. CDP
B. NetFlow
C. ICMP Echo
D. NMAP
E. SNMP
Answer: BE
216. A network engineer is tasked to upgrade and expand a large existing production
network. From the IOS CLI, what two protocols can be used to build a topology map
of the existing network? (Choose two.)
A. SNMP
B. IP SLA
C. ICMP Echo
D. LLDP
E. Traceroute
Answer: DE
217. A network engineer requires that an OSPF ASBR must only flood external LSAs
only within its own area. What OSPF area type should be configured?
A. Backbone Area
B. Totally Stub Area
C. Not So Stubby Area
D. Stub Area
Answer: C
218. What design requirement is necessary for campus network access layer
switching?
A. high cost per port
B. high availability
C. high scalability
D. high performance
Answer: C
219. What three design best practices are key functions of the distribution layer?
(Choose three.)
A. fault domain isolation
B. admission control
C. access switch aggregation
D. QoS tagging
E. address summarization
F. end user and application isolation
Answer: ACE
220. A network engineer is using the traditional switched hierarchical design. The
client has asked to increase uplink utilization from the access layer to the
distribution. How can the engineer attain this new requirement without adding new
physical connections?
A. enable spanning-tree portfast
B. enable VSS at the distribution layer
C. increase the MTU size on the uplink interfaces
D. ensure the root bridge priority is equal on both distribution switches
Answer: B
221. An organization is redesigning a 3-tier hierarchical network into a collapsed
core. What design issue is a primary concern per Cisco best practices?
A. services delineation
B. port density
C. feature availability
D. resource utilization
Answer: D
222. Which two options are benefits of using a modular network architecture?
(Choose two.)
A. facilitates troubleshooting
B. accurate monitoring
C. consistent documentation
D. increased flexibility
E. reduced cabling requirements
Answer: AD
223. A large company requests a hierarchical design model. What tier should be free
of physically connected hosts?
A. core
B. access
C. aggregation
D. distribution
Answer: A
224. Which option is an advantage of the bottom-up design model?
A. focuses on the needs of user communities
B. includes a thorough analysis of customer requirements
C. facilitates a quick response to client requests
D. produces a �big-picture� of the desired outcome
Answer: C
225. A network engineer must collect application-level information passing through
a router. What two tools can provide this information? (Choose two.)
A. NBAR
B. CiscoWorks
C. SNMP collector
D. NetFlow collector
E. Syslog
Answer: AD
226. You design a network with the following network addresses:
192.168.168.0
192.168.169.0
192.168.170.0
192.168.171.0
192.168.172.0
192.168.173.0
192.168.174.0
192.168.175.0
Which route address is the best summary of these network addresses?
A. 192.168.0.0/24
B. 192.168.171.128/3
C. 192.168.168.0/21
D. 192.168.175.0/3
E. 192.168.0.0/16
Answer: C
227. Your company uses OSPF for internal routing. The company will be connected to
VendorA via a single dedicated link and to VendorB via redundant dedicated links.
Both vendors also use OSPF for internal routing.
Which of the following deployments describes the best intra-domain routing practice
in this situation?
A. Connect your company to both VendorA and VendorB using existing OSPF.
B. Redistribute the routes on each link between your company and the vendors to a
shared EIGRP routing protocol.
C. Use IBGP to reach VendorA and EBGP to reach VendorB.
D. Use static routes to reach VendorA and EBGP to reach VendorB.
E. Use static routes to reach both VendorA and VendorB.
Answer: D
228. A routing protocol neighbor relationship has been established between two
routers across the public Internet using GRE. What technology can be used to
encrypt this communication channel?
A. access lists
B. IP security
C. context based access
D. intrusion prevention system
Answer: B
229. An organization is deciding what routing protocol to use throughout their
network. What must be considered if routing is to be performed at the access layer?
A. reduced scalability of the network when introducing a large number of switch
blocks into the routing table
B. centralized management of access control lists at the distribution layer
C. reliability when implementing routing over spanning-tree at the access layer
D. performance differences between core, distribution and access layer equipment
Answer: D
230. A spanning tree topology can be simplified by deploying what Cisco IOS
technology in the distribution block?
A. VDC
B. vPC
C. Rapid PVST+
D. VSS
E. Flex Links
Answer: D
231. When designing a new enterprise campus network, what topology should be used
for maximum scalability?
A. flat
B. three-layer
C. star
D. partial mesh
E. full mesh
Answer: B
232. A dynamically routed private line and a statically routed IPsec tunnel connect
two offices. What routing configuration prefers the IPsec tunnel only in the event
of a private line failure?
A. floating static entry
B. EIGRP variance
C. bandwidth metric
D. OSPF maximum paths
Answer: A
233. A data center is reaching its power and cooling capacity. What two
virtualization technologies can address the problem by directly reducing the number
of physical devices? (Choose two.)
A. virtual switching systems
B. virtual device contexts
C. virtual servers
D. virtual routing and forwarding
E. virtual port channels
F. virtual LANs
Answer: BC
234. Application servers require load balancing and security services. Where in the
data center network should these services be provisioned?
A. core
B. aggregation
C. Layer 3 access
D. distribution
Answer: B
235. What two SAN protocols will allow a customer to utilize 10GbE for SAN access?
(Choose two.)
A. ISCSI
B. FCoE
C. SATA
D. Fiber Channel
E. AoE
Answer: AB
236. Multicast has been enabled and configured in the Enterprise, and PIM Sparse-
mode has been enabled on all VLANs. What feature is required to stop multicast
traffic from being broadcasted on the access layer switches?
A. IGMP snooping
B. Multicast boundary filter
C. PIM dense-mode
D. Dynamic ARP inspection
Answer: A
237. A network engineer is using the traditional switched hierarchical design. The
client has asked to increase uplink utilization from the access layer to the
distribution. How can the engineer attain this new requirement without adding new
physical connections?
A. enable spanning-tree portfast
B. enable VSS at the distribution layer
C. increase the MTU size on the uplink interfaces
D. ensure the root bridge priority is equal on both distribution switches
Answer: B
238. What are two advantages of employing scalability when designing a campus
network? (Choose two.)
A. reduces operational cost
B. higher port density
C. investment protection
D. consistent operation
E. improved fault tolerance
Answer: DE
239. Where in the network hierarchy should network access control be performed?
A. backbone
B. core
C. access
D. distribution
Answer: C
240. A network engineer has been asked to follow a top down design approach. What
layer of the OSI model is used to start the design?
A. physical
B. network
C. transport
D. application
Answer: D
241. Which interior routing protocol has the most preferable administrative
distance by default?
A. RIP
B. OSPF
C. EIGRP
D. BGP
E. IS-IS
Answer: C
242. Which two mechanisms are used by distance vector protocols to prevent routing
loops? (Choose two.)
A. split horizon
B. route summarization
C. route poisoning
D. tuned timers
Answer: AC
243. Router A has three feasible successors to the 192.168.1.0/24 network, which
are listed here:
Option 1 has a metric of 8123228.
Option 2 has a metric of 2195467.
Option 3 has a metric of 8803823.
The variance 4 command was issued on Router A. How many active entries does Router
A have in its routing table for the 192.168.1.0/24 network?
A. 0
B. 1
C. 2
D. 3
Answer: C
244. Which statement describes an advantage of the Layer 2 access model over the
Layer 3 access model in the data center?
A. It enables NIC teaming.
B. It removes STP dependency.
C. It increases scalability.
D. It decreases convergence.
Answer: A
245. Which design is the recommended geometric design for routed topologies?
A. linear
B. triangular
C. rectangular
D. circular
Answer: B
246. Which statement describes the methodology that supports the Cisco Enterprise
Architecture models?
A. It divides the network into functional network modules.
B. It divides the network into role-based network modules.
C. It divides the network into regional network modules.
D. It divides the network into operational network modules.
Answer: A
247. Which option is a benefit of the modular approach to network design?
A. higher availability
B. repeatable scalability
C. increased security
D. improved resiliency
Answer: B
248. Which three options are characteristics of data center evolution? (Choose
three.)
A. consolidation
B. virtualization
C. automation
D. standardization
E. optimization
F. modulation
Answer: ABC
249. Which first-hop redundancy protocol dynamically distributes client traffic
between multiple routers?
A. HSRP
B. VRRP
C. GLBP
D. IGRP
Answer: C
250. Which three layers comprise the traditional hierarchical model? (Choose
three.)
A. core layer
B. distribution layer
C. access layer
D. aggregation layer
E. network layer
F. Internet layer
Answer: ABC
251. What three primary sources of information are needed to perform a network
audit? (Choose three.)
A. existing documentation
B. new documentation
C. existing network management software
D. new network management tools
E. management personnel
F. technical personnel
Answer: ACD
252. Which HSRP parameters must match, to ensure proper functionality?
A. group parameters
B. priority parameters
C. preempt parameters
D. tracking parameters
Answer: A
253. In which operation mode does the AP act as a dedicated sensor for location-
based and intrusion detection services?
A. monitor mode
B. promiscuous mode
C. discovery mode
D. sniffer mode
Answer: A
254. Which Cisco Wireless LAN Controller interface is used for out-of-band
management?
A. service port
B. management port
C. controller port
D. virtual port
Answer: A
255. What is the maximum RIPv2 hop count for a reachable route?
A. 13
B. 14
C. 15
D. 16
Answer: C
256. Which RFC defines the IPv6 standard?
A. RFC 1918
B. RFC 2338
C. RFC 2460
D. RFC 2740
Answer: C
257. Which technology allows remote networks to be connected via site-to-site
tunnels?
A. IPsec VPN
B. AnyConnect VPN
C. SSL VPN
D. EasyConnect VPN
Answer: A
258. Which three Cisco technologies can you use to detect and mitigate threats?
(Choose three.)
A. NetFlow
B. FWSM
C. ISE
D. VRRP
E. sFLOW
Answer: ABC
259. Refer to the exhibit. On which router should you configure redistribution?
A. Router 1
B. Router 2
C. Router 3
D. Router 4
E. Router 5
Answer: B
260. What is the benefit of VLSM?
A. reduces configuration complexity by using the same subnet mask length
B. reduces the routing table size by using automatic route summarization
C. reduces the routing table size by using manual route summarization
D. allows the subnet mask and classful routing updates to be advertised
E. secures the hosts on a subnet by using RFC 1918 addresses
Answer: C
261. What are three valid methods of gathering information about an existing data
network? (Choose three.)
A. Use organizational input.
B. Perform a traffic analysis.
C. Analyze the user-mapping of a running application.
D. Perform a packet-level audit to verify carrier service guarantees.
E. Perform a network audit to gather more detail about the network.
F. Use reports that analyze the metrics of the customer�s existing network.
Answer: ABE
262. Which Cisco device management feature is most suited to metering network
traffic and providing data for billing network usage?
A. BGP
B. Cisco Discovery Protocol
C. QoS
D. RMON
E. NetFlow
Answer: E
263. Which three pieces of information should be documented for each step in a
design implementation plan? (Choose three.)
A. step description
B. design document references
C. easy guidelines in case of failure
D. estimated implementation time
E. simple implementation guidelines
F. estimated rollback time in case of failure
Answer: ABD
264. Which Cisco security mechanism has the attributes listed below?
. It is a sensor appliance
. It searches for potential attacks by capturing and analyzing traffic
. It is a �purpose-built device�
. It is installed passively
. It introduces no delay or overhead
A. IKE
B. PIX
C. HIPS
D. NIDS
E. HMAC
Answer: D
265. Which three sources does a network designer use to collect information for
characterizing an existing network? (Choose three.)
A. staff input
B. visual inventory
C. network audit
D. traffic analysis
E. server statistics
Answer: ACD
266. Which two design criteria require VLANs in a proposed solution? (Choose two.)
A. video streaming on the LAN
B. security between departments
C. the segmenting of collision domains
D. the segmenting of broadcast domains
E. the use of multivendor equipment
F. a limited corporate budget
Answer: BD
267. Refer to the exhibit.
A standard Layer 2 campus network design is pictured. Which numbered box represents
the core layer?
A. #1
B. #2
C. #3
D. #4
E. #5
Answer: C
268. Which two of these are scalability benefits of designing a network that
utilizes VPNs? (Choose two.)
A. extends the network to remote users
B. allows networks to be set up and restructured quickly
C. reduces dial infrastructure expenditures
D. reduces the number of physical connections
E. simplifies the underlying structure of a customer WAN
Answer: DE
269. An organization needs a WAN Transport technology that meets these criteria:
. has a low initial cost
. provides low-to-medium BW
. has medium-to-high latency and jitter
Which technology should the organization use?
A. DSL
B. X.25
C. ISDN
D. wireless
E. analog modem
Answer: A
270. What Cisco product is designed to improve the performance of Windows file and
exchange services in remote data centers?
A. Application Control Engine
B. Wide Area Application Services
C. Cisco Application Policy Infrastructure Controller
D. Cisco Prime Network Services Controller
Answer: B
271. A wireless LAN client is sending traffic to the wired LAN client. What path
will the packet take to reach the destination endpoint in a lightweight wireless
deployment?
A. switch > controller > ap > client
B. controller > ap > switch > client
C. ap > controller > switch > client
D. switch > ap > controller > client
Answer: C
272. What is the primary advantage of implementing a wireless LAN controller in a
wireless LAN design?
A. roaming between APs
B. RADIUS user authentication
C. radio resource management
D. accelerated data transfer
Answer: C
273. What two access point modes support the transmission of user traffic over a
LWAPP/CAPWAP tunnel? (Choose two.)
A. local
B. H-REAP
C. rogue detector
D. monitor
E. sniffer
F. standalone
Answer: AB
274. What wireless authentication option requires a Public Key Infrastructure?
A. EAP-TLS
B. PEAP
C. LEAP
D. EAP-FAST
Answer: A
275. A client wants to deploy a video conferencing platform in a multisite WAN
environment. What two design considerations need to be evaluated? (Choose two.)
A. CODECs supported by the video units
B. buffer sizes on the routers
C. POE capabilities of the switches
D. number of current calls
E. number of hops between sites
Answer: AD
276. What two CoS values are used by voice traffic? (Choose two.)
A. COS1
B. COS2
C. COS3
D. COS4
E. COS5
Answer: CE
277. A customer wants to support a BYOD environment. What two products allow for
posture assessment? (Choose two.)
A. ACS
B. NAC
C. ASA
D. ISE
E. WAAS
F. IDS
Answer: BD
278. A customer requests a filtering design based on the need to scan all internet
traffic, including remote workers. What solution meets these requirements?
A. Cisco Cloud Web Security
B. Cisco Network Admission Control
C. Cisco Identity Services Engine
D. Cisco Adaptive Security Appliance
Answer: A
279. What is the first step when creating a network security policy?
A. define what should be protected
B. investigate how likely an attack is to occur
C. implement measures to protect assets
D. hire a security firm to perform penetration tests
Answer: A
280. What routing configuration can prevent routing loops between IGPs?
A. route filters
B. route reflectors
C. auto summarization
D. virtual links
Answer: A
281. A company must deploy an IGP routing protocol on an Enterprise Network. Where
should route summarization be implemented?
A. distribution
B. core
C. access
D. backbone
Answer: A
282. What characteristic separates link state routing protocols from a distance
vector?
A. creates a topological view of the entire network
B. path calculation utilizes a more granular metric
C. does not scale well for large networks
D. constantly shares link state updates throughout the topology
Answer: A
283. By default, how does EIGRP�s metric differ from OSPF?
A. hops
B. cost
C. bandwidth
D. delay
Answer: D
284. What three considerations should be taken into account when selecting a
routing protocol? (Choose three.)
A. classful routing
B. scalability
C. default route origination
D. multi vendor support
E. link load balancing
F. hop count
Answer: BDE
285. What routing protocol requires full mesh between internal peers in an
enterprise network?
A. OSPF
B. EIGRP
C. BGP
D. ISIS
E. RIP
Answer: C
286. What significant advantage does EIGRP have over OSPF?
A. easy summarization
B. shorter convergence times
C. single area operation
D. low processor utilization
Answer: B
187. An application uses broadcast traffic to send data to IPv4 hosts. How can the
application communicate using IPv6????
A. Anycast
B. Unicast
C. Broadcast
D. Multicast
Answer: A
288. An organization is conducting an evaluation on the migration to IPv6 within
the enterprise network and has requested clarification on recommended migration
strategies. What three migration models would accomplish the organization�s goal?
(Choose three.)
A. Dual Stack
B. Service Block
C. Top-Down
D. Hybrid
E. Tunneled
F. Fork-Lift
Answer: ABD
289. What IPv4 addressing technique allows for the division of addresses into
subnets of different sizes?
A. VLSM
B. RIR
C. CIDR
D. NAT
Answer: A
290. A client wants to consolidate applications that are currently housed at
multiple sites to a remote data center. What two design requirements are unique to
this scenario? (Choose two.)
A. bandwidth
B. security
C. latency
D. storage
E. availability
Answer: AC
291. What technology can secure data over an insecure medium and provide WAN
redundancy in the event of a primary connection failure?
A. virtual private network
B. shadow PVC
C. dial-up ISDN
D. GRE Tunnel
Answer: A
292. What two features are advantages of adding a secondary WAN link at the
enterprise edge? (Choose two.)
A. provides additional bandwidth and load balancing capabilities
B. acts as a backup link in event the primary link fails
C. reduces capital and operational costs
D. improves security and prevents against denial of service attacks
E. distributes traffic proactively based on link utilization
Answer: AB
293. A remote office has a T1 WAN link to headquarters and a T1 Internet
connection. The client requests WAN redundancy to headquarters with similar
bandwidth. What two connection types satisfy this requirement? (Choose two.)
A. Secondary T1 WAN circuit
B. ISDN BRI
C. IPSec Tunnel over the Internet
D. DWDM l
E. POTS Line T1 WAN
Answer: AC
294. A network engineer is designing an enterprise managed VPN solution for a large
number of remote offices that do not have on-site IT support and communicate only
with the home office. What type of VPN solution should be implemented?
A. VPLS
B. GRE
C. IPsec
D. EVPN
E. DMVPN
F. SSL client
Answer: D
295. What branch design supports 100 to 1000 users and integrates ASA firewalls?
A. small
B. medium
C. large
D. extra large
Answer: C
296. A secure WAN design requires dynamic routing and IP multicast. What two VPN
protocols meet these requirements? (Choose two.)
A. Standard IPsec
B. P2P GRE over IPsec
C. DMVPN
D. AnyConnect
E. PPTP
F. Easy VPN
G. SSL/TLS
Answer: BC
297. A company has dark fiber between headquarters and its data center. It is
presently configured as a 10GbE connection. Network utilization shows high
utilization on the connection. What technology can be implemented to increase
capacity without acquiring another circuit?
A. MPLS
B. DWDM
C. VPLS
D. DMVPN
Answer: B
298. A circuit order has been placed for Gigabit Ethernet and is 80KM from the
carrier equipment. What type of SFP will be required?
A. TX
B. SX
C. ZX
D. LX
Answer: C
299. A company requires a managed WAN solution that supports Layer 2 adjacency
across remote offices for applications and services. What solution should be
selected?
A. DMVPN
B. MPLS
C. VPLS
D. FR
Answer: C
300. What submodule is found within the Enterprise Edge module?
A. enterprise WAN
B. remote branch
C. campus IPS
D. building distribution
Answer: A
301. In which network location should an external DNS server be placed?
A. campus data center
B. enterprise branch
C. internet
D. remote access
Answer: C
302. What two performance considerations must be taken into account when designing
a remote worker access solution? (Choose two.)
A. simultaneous VPN connections
B. port density
C. throughput capacity
D. packet size
E. latency
Answer: AC
303. What device virtualization technology allows for a single point of management
and a centralized routing instance?
A. ACE
B. VSS
C. VDC
D. VM
Answer: B
304. A network engineer is attempting to separate routing domains using a
virtualization technology. What protocol can be configured to perform this task?
A. VLAN
B. VSAN
C. VRF
D. VPC
Answer: C
305. During the design of a new campus network, the customer requests the ability
to route overlapping IP addresses. What technology can be leveraged to meet this
request?
A. VRF
B. VLANs
C. VSS
D. VPC
Answer: A
306. What network virtualization technology can be leveraged within the data center
to reduce the number of physical devices?
A. VLANs
B. VPLS
C. VDC
D. VSS
Answer: C
307. To what Layer 2 technology does VRF closely compare?
A. VSS
B. VPC
C. VLAN
D. VTP
Answer: C
308. What type of device can be installed to increase a broadcast domain?
A. router
B. switch
C. IDS
D. IPS
Answer: B
309. What three design requirements are key to designing a campus core? (Choose
three.)
A. low latency
B. access control
C. traffic filtering
D. high speed
E. redundant links
F. QoS tagging
Answer: ADE
310. A network engineer is using the Cisco enterprise architecture model. In what
module do network management servers reside?
A. Enterprise Campus
B. Enterprise Edge
C. Remote Modules
D. SP Edge WAN/internet
Answer: A
311. A network engineer is following the three tiered Network Hierarchical Model.
At which tier is route summarization implemented?
A. core
B. distribution
C. backbone
D. access
Answer: B
312. A network engineer is following the Cisco enterprise architecture model. To
which network layer would a branch office connect to using a private WAN?
A. Enterprise Campus
B. Enterprise Edge
C. SP Edge Premise
D. Remote Module
Answer: D
313. When evaluating network designs, what indicator demonstrates that the modular
approach was followed?
A. ability to scale
B. follows best practices
C. redundant connectivity
D. easy to deploy
Answer: A
314. A network engineer must implement a design where LAN clients are to connect to
various access layer devices, while remaining on the same VLAN. What type of design
would support this requirement?
A. routed
B. switched
C. tunneled
D. virtual
Answer: B
315. An engineer has configured a router to send level 7 messages to a syslog
server. What severity level are these messages?
A. error
B. warning
C. debug
D. informational
E. notice
Answer: C
316. What part of the network does a top-down network design focus on for solution
development?
A. presentation
B. hardware
C. session
D. application
E. data link
F. transport
Answer: D
317. An engineer receives a resource utilization alert on a router. What command
should be used to investigate the issue?
A. show processes cpu
B. show memory
C. show running-config
D. show version
Answer: A
318. What three customer supported details identifies network requirements based on
the PPDIOO design model? (Choose three.)
A. goals
B. budget
C. user needs
D. locations
E. policies
F. tasks
Answer: ABC
319. Which three of these are layers in the Cisco SONA Architecture? (Choose
three.)
A. Applications
B. Physical Infrastructure
C. Presentation
D. Integrated Transport
E. Core Common Services
F. Networked Infrastructure
Answer: ABE
320. Which Cisco device has the sole function at looking at threat detection and
mitigation at the Enterprise edge?
A. Cisco IOS router
B. Cisco ASA
C. Cisco Catalyst FWSM
D. Cisco IPS
Answer: D
321. Which three are features of LWAPP? (Choose three.)
A. firmware synchronization
B. local management of APs
C. configuration changes manually synced
D. encryption of control channel
E. configuration data only on the WLC
F. wireless control free operation
G. replaces 802.1x for authentication in wireless connections
Answer: ADE
322. What business trend allows employees to use personal devices to access
enterprise data and systems?
A. ISE
B. BYOD
C. SAN
D. IOE
Answer: B
323. Which voice codec should you use in order to provide toll quality calls?
A. G.711
B. G.718
C. G.722
D. G.729
Answer: A
324. Which three are security services offered through Cisco Router Security?
(Choose three.)
A. Trust and Identity
B. Integrated Threat Control
C. Unified Wireless Network Security Solution
D. Secure Connectivity
E. Voice-Messaging Security
F. Endpoint Security
G. Virtual Security Gateway
Answer: ABD
325. Which two devices would you place in your DMZ to ensure enterprise edge
security? (Choose two.)
A. IPS
B. NAC
C. ASA
D. ACS
E. WCS
Answer: AC
326. When considering the three VoIP design models � single site, centralized
multisite, and distributed multisite � which question below would help to eliminate
one of the options?
A. Will the switches be required to provide inline power?
B. Will users need to make offsite calls, beyond the enterprise?
C. Will users require applications such as voice mail and interactive voice
response?
D. Are there users whose only enterprise access is via a QoS-enabled WAN?
Answer: D
327. A company is implementing an Identity Management solution with these
characteristics:
1) existing AAA Server
2) Cisco Catalyst switches
3) minimal added investments
Which Cisco Trust and Identity Management solution would you recommend?
A. NAC Appliance
B. Cisco IBNS
C. CSM
D. Cisco Security MARS
Answer: B
328. Which subnet address and mask would you use for all Class D multicast
addresses to be matched within an access list?
A. 224.0.0.0/20
B. 224.0.0.0/4
C. 239.0.0.0/24
D. 239.0.0.0/8
E. 225.0.0.0/8
Answer: B
329. Which WAN technology is a cost-effective method to deliver 100Mb of bandwidth
to multiple branch offices?
A. DSL
B. DWDM
C. ISDN
D. Metro Ethernet
Answer: D
330. Which factor would be most influential in choosing multimode fiber optic
connections over UTP?
A. signal attenuation
B. required bandwidth
C. required distance
D. electromagnetic interference
E. cost
Answer: C
331. Your supervisor wants you to recommend a management protocol that will allow
you to track overall bandwidth utilization, utilization by traffic type, and
utilization by source and destination. Which is ideally suited for this function?
A. MRTG
B. NetFlow
C. RRD
D. SNMP
Answer: B
332. Which IP telephony component supports VoIP, PoE, and QoS?
A. client endpoints
B. voice-enabled infrastructure
C. Cisco Unified Communications Manager
D. Cisco Unified Contact Center
Answer: B
333. Which technology enables WLCs to peer with each other to enable roaming
support?
A. WAP profiles
B. roaming profiles
C. mobility groups
D. peer groups
Answer: C
334. A campus network needs end-to-end QoS tools to manage traffic and ensure voice
quality. Which three types of QoS tools are needed? (Choose three.)
A. interface queuing and scheduling
B. congestion management
C. compression and fragmentation
D. bandwidth provisioning
E. traffic classification
F. buffer management
Answer: ADE
335. Which three statements are true regarding the virtual interface on a Cisco
Wireless LAN Controller? (Choose three.)
A. supports mobility management
B. serves as a DHCP relay
C. used for all controller to AP communication
D. supports embedded Layer 3 security
E. default for out-of-band management
F. default for in-band management
G. provides connectivity to AAA servers
Answer: ABD
336. Which is the equation used to derive a 64 Kbps bit rate?
A. 2 x 8 kHz x 4-bit code words
B. 8 kHz x 8-bit code words
C. 2 x 4-bit code words x 8 kHz
D. 2 x 4 kHz x 8-bit code words
Answer: D
337. Refer to the list of requirements. Which IP telephony design model should you
implement to fulfill these requirements?
. must be a single, large location with many remote sites
. must have multisite WAN connectivity
. requires SRST for call processing redundancy
A. centralized
B. distributed
C. clustered
D. decentralized
Answer: A
338. Which network access control technology is recommended to use with Layer 2
access layer switches?
A. 802.1q
B. 802.1x
C. 802.3af
D. 802.3q
E. 802.11n
Answer: B
339. What are the three modes of unicast reverse path forwarding? (Choose three.)
A. strict
B. loose
C. VRF
D. global
E. PIM
F. local
Answer: ABC
340. You are asked to design a new branch office that will need to support 25
users. These users will be using an ISP connection and will need to connect to the
main office for network services. Which two Cisco devices are the most appropriate
to fulfill all of these requirements? (Choose two.)
A. Cisco IPS
B. Cisco ISR G2
C. Cisco ASA
D. Cisco 2960
E. Cisco CRS-1
F. Cisco ACS
Answer: BC
341. Which two design approaches provide management of enterprise network devices?
(Choose two.)
A. in-band
B. out-of-line
C. out-of-band
D. in-line
Answer: AC
342. When designing the infrastructure protection portion for the enterprise edge,
which solution would be the most appropriate solution to consider?
A. 802.1X
B. ACLs in the core layer
C. Cisco Security MARS
D. AAA
Answer: D
343. When you are designing a large IPv6 multivendor network, which IGP does Cisco
recommend that you use?
A. OSPFv3
B. EIGRP for IPv6
C. BGP
D. RIPng
Answer: A
344. Which routing protocol classification should you use when full topology
information is needed?
A. link-state
B. distance vector
C. stateful
D. path vector
Answer: A
345. ACME Corporation is implementing dynamic routing on the LAN at its corporate
headquarters. The interior gateway protocol that they select must support these
requirements: multivendor environment, efficient subnetting, high scalability, and
fast convergence. Which interior gateway protocol should they implement?
A. EIGRP
B. OSPF
C. RIPng
D. BGP
Answer: B
346. Which statement describes a unique advantage of EIGRP?
A. It enables unequal-cost load balancing.
B. It enables equal-cost load balancing.
C. It enables source-based load balancing.
D. It enables port-based load balancing.
Answer: A
347. When designing an EIGRP network, which two things should you take into
consideration? (Choose two.)
A. ASN and K values must match.
B. The neighbor command can be used to enable unicast communication.
C. The neighbor diameter cannot exceed a 15-hops limit.
D. NSSA areas can be used to redistribute external routes.
E. Neighbor relationship can be established with non-Cisco routers.
Answer: AB
348. Which statement should the designer keep in mind when considering the advanced
routing features?
A. One-way route redistribution avoids the requirement for static or default
routes.
B. Redistribution, summarization, and filtering are most often applied between the
campus core and enterprise edge.
C. Filtering only occurs on the routing domain boundary using redistribution.
D. Summarize routes at the core toward the distribution layer.
E. The hierarchical flexibility of IPv6 addressing avoids the requirement for
routing traffic reduction using aggregation.
Answer: B
349. Which three protocols support VLSM? (Choose three.)
A. RIPv2
B. RIPv1
C. EIGRP
D. OSPF
E. IGRP
Answer: ACD
350. A hierarchical design of the EIGRP domain facilitates which two of the
following? (Choose two.)
A. route summarization
B. faster convergence
C. unequal cost load balancing
D. redistribution
E. virtual links
Answer: AB
351. Which three items pertain to EIGRP? (Choose three.)
A. Can use multiple unequal paths.
B. Routes are redistributed as type 2 by default.
C. ASN and K values must match to form neighbors.
D. Uses multicast address 224.0.0.9 for updates.
E. Exchanges full routing table every 30 seconds.
F. Summary routes have AD of 90.
G. External routes have AD of 170.
Answer: ACG
352. Which two statements best describe an OSPF deployment? (Choose two.)
A. ABR provides automatic classful network boundary summarization.
B. ABR requires manual configuration for classful network summarization.
C. External routes are propagated into the autonomous system from stub areas via
ASBR.
D. External routes are propagated into the autonomous system from regular areas or
NSSA via ASBR.
E. External routes are propagated into the autonomous system from regular areas or
NSSA via ABR.
Answer: BD
353. You are designing a network that requires a routing protocol that will use
minimal network bandwidth. Which would satisfy this requirement?
A. RIPv2
B. RIPng
C. OSPF
D. ARP
E. EGP
Answer: C
354. Which is usually used to connect to an upstream ISP?
A. EIGRP
B. OSPF
C. BGP
D. IS-IS
E. RIPv2
Answer: C
355. Which type of area should you use in an enterprise OSPF deployment if you want
to prevent propagation of type 5 LSAs but still allow the redistribution of
external routes?
A. stub
B. totally stubby
C. backbone
D. NSSA
E. virtual link
Answer: D
356. What is the most compact representation of the following IPv6 address?
2001:db8:0000:0000:cafe:0000:0000:1234
A. 2001:db8::cafe::1234
B. 2001:db8::cafe:0000:0000:1234
C. 2001:db8:0:0:cafe::1234
D. 2001:db8::cafe:0:1234
Answer: C
357. Which is the North American RIR for IPv4 addresses?
A. RIPE
B. ARIN
C. IANA
D. IEEE
E. APNIC
Answer: B
358. Which two link state routing protocols support IPv6 routing? (Choose two.)
A. BGP4+
B. OSPF
C. RIPng
D. EIGRP
E. IS-IS
Answer: BE
359. At which layer of the network is route summarization recommended?
A. data link layer
B. core layer
C. distribution layer
D. access layer
Answer: C
360. A company wants to use private IP addresses for all its internal hosts. Which
technology can the company use to provide access to the Internet using a single
public IP address?
A. static NAT
B. source routing
C. ACL
D. PAT
Answer: D
361. Which two methods are used to reduce the mesh links required between iBGP
peers in the same AS? (Choose two.)
A. community
B. router reflectors
C. local preference
D. confederations
E. atomic aggregate
F. MED
Answer: BD
362. Your supervisor has asked you to deploy a routing protocol within the lab
environment that will allow for unequal cost multipath routing. Which should you
choose?
A. EIGRP
B. OSPF
C. IS-IS
D. RIP
Answer: A
363. Which consideration is the most important for the network designer when
considering IP routing?
A. convergence
B. scalability
C. on-demand routing
D. redistribution
Answer: A
364. With respect to IPv6 addressing, from a design perspective, which of these
statements is it important to keep in mind?
A. IPv6 addressing provides convenience of anycast addressing without any
configuration requirements.
B. IPv6 does not use multicast addressing.
C. An IPv6 router will not forward packets from one link to other links if the
packet has either a link-local source or a link-local destination address.
D. Dynamic address assignment requires DHCPv6.
Answer: C
365. Refer to the exhibit.
Which three modules would typically utilize public IPv4 addressing? (Choose three.)
A. Access
B. Distribution
C. Core
D. Data Center
E. E-Commerce
F. Internet Connectivity
G. Remote Access/VPN
H. WAN/MAN
I. Branch
J. Branch Data Center
Answer: EFG
366. Which two routing protocols operate over NBMA point-to-multipoint networks
without the use of point-to-point sub interfaces? (Choose two.)
A. RIPv1
B. RIPv2
C. IS-IS
D. EIGRP
E. OSPF
Answer: DE
367. Which two routing protocols usually converge most quickly? (Choose two.)
A. RIPv1
B. RIPv2
C. BGP
D. OSPF
E. EIGRP
Answer: DE
368. Match the bandwidth usage optimization technique on the left with its
definition on the right.
Select and Place:
Answer:
Explanation/Reference:
Explanation:
+ limits the number of frames transmitted before an acknowledgement is received:
window size+ reduces data size to save transmission time, optimizing the use of WAN
bandwidth: data compression+ allows network administrators to manage the varying
demands generated by applications: queuing+ discards packets or modifies some
aspect of them (such as IP precedence): traffic policing
369. What is the maximum number of groups that is supported by GLBP?
A. 64
B. 256
C. 512
D. 1024
Answer: D
370. When designing for a remote worker, which two are typical requirements?
(Choose two.)
A. best-effort interactive and low-volume traffic patterns
B. connections to the enterprise edge using Layer 2 WAN technologies
C. always-on connection with SLA from ISP
D. voice and IPsec VPN support
E. high-end security devices with stateful firewall filtering
F. dual or multihoming to ISPs
Answer: CD
371. Which three service categories are supported by an ISR? (Choose three.)
A. voice
B. security
C. data
D. Internet
E. storage
F. satellite
Answer: ABC
372. Which three options represents the components of the Teleworker Solution?
(Choose three.)
A. Cisco Unified IP Phone
B. Cisco 880 Series Router
C. Aironet Office Extend Access Point
D. Catalyst 3560 Series Switch
E. Cisco 2900 Series Router
F. MPLS Layer 3 VPN
G. Leased lines
Answer: ABC
373. When designing a WAN backup for voice and video applications, what three types
of connections should be used? (Choose three.)
A. Private WAN
B. internet
C. ISDN
D. MPLS
E. dial-up
F. ATM
G. DSL
Answer: ACD
374. Which model of ISR is utilized for the teleworker design profile?
A. Cisco 1900 Series
B. Cisco 1800 Series
C. Cisco 800 Series
D. Cisco 500 Series
Answer: C
375. If a teleworker is required to access the branch office via a secure IPSEC VPN
connection, which technology is recommended to provide the underlying transport?
A. ISDN
B. Metro Ethernet
C. Frame Relay
D. ADSL
E. ATM
Answer: D
376. What are three key areas that need to be considered when designing a remote
data center? (Choose three.)
A. power diversity
B. active directory services
C. Cisco IOS versions
D. data storage
E. applications
F. user access
G. packet routing
Answer: ADE
377. Which one of these statements describes why, from a design perspective, a
managed VPN approach for enterprise teleworkers is most effective?
A. A managed VPN solution uses a cost-effective, on-demand VPN tunnel back to the
enterprise.
B. This solution supports all teleworkers who do not require voice or video.
C. This architecture provides centralized management where the enterprise can apply
security policies and push configurations.
D. It provides complete flexibility for remote access through a wireless hotspot or
a guest network at a hotel, in addition to a home office.
Answer: C
378. Which two are characteristics of a Lightweight Access Point? (Choose two.)
A. managed via a central wireless LAN controller
B. code upgrade performed via a TFTP server
C. CAPWAP tunnels
D. managed directly via CLI or web interface
E. facilitates the creation of its own WLANs and port mappings
Answer: AC
379. You need to connect to a remote branch office via an Internet connection. The
remote office does not use Cisco equipment. This connection must be secure and must
support OSPF. Which of the following can be used to transport data to the branch
office?
A. GRE over IPsec
B. IPsec
C. GRE
D. IPsec VTI
Answer: A
380. Which three describe challenges that are faced when deploying an environment
for teleworkers? (Choose three.)
A. supporting a mix of technically knowledgeable and nontechnical users
B. simplifying router installation and configuration
C. verifying available power at employee�s house for necessary equipment
D. avoiding situations where employees might use nonstandard hardware or
configurations
E. reducing daily commuting time to main office location
F. providing access to FTP servers located in main office location
G. implementing leased line connectivity between main office and employee�s home
location
Answer: ABD
381. Drag the WAN technology on the left to the most appropriate category on the
right.
Select and Place:
Answer:
Explanation/Reference:
Explanation:
Leased
. TDM
. SONET
SHARED
. Frame-Relay
. MPLS
382. When designing using the Cisco Enterprise Architecture, in which Enterprise
Campus layer does the Remote Access and VPN module establish its connection?
A. Building Access
B. Campus Core
C. Enterprise Branch
D. Enterprise Data Center
Answer: B
383. Drag the associated virtualization tool or solution on the left to the
appropriate design requirement on the right.
Select and Place:
Answer:
Explanation/Reference:
384. Which servers that reside in the data center require direct links to all other
enterprise modules?
A. network management servers
B. DHCP servers
C. Active Directory servers
D. IP SLA servers
E. web servers
Answer: A
385. Which two common cable management strategies are used in high-density server
deployments in the data center? (Choose two.)
A. top-of-rack
B. middle-of-rack
C. bottom-of-rack
D. beginning-of-row
E. middle-of-row
F. end-of-row
Answer: AF
386. In the enterprise data center, which are the three main components? (Choose
three.)
A. Network Infrastructure
B. Interactive services
C. Data Center Management
D. Internet services
E. WAN services
F. VPN and remote access
Answer: ABC
387. What is a characteristic of campus core designs?
A. fast transport
B. security
C. summarization
D. redistribution
Answer: A
388. Which two enterprise campus layers are combined in a medium-sized LAN? (Choose
two.)
A. core
B. distribution
C. access
D. backbone
E. aggregation
Answer: AB
389. High availability is a key design consideration in the enterprise campus
network. In a fully redundant topology, which is likely to provide faster IGP
convergence during a failure?
A. redundant supervisors
B. redundant supervisors with Cisco Nonstop Forwarding (NSF) and Stateful
Switchover (SSO)
C. single supervisors with tuned IGP timers
D. single supervisors
Answer: C
390. Which three are associated with the distribution layer within the campus
design? (Choose three.)
A. access layer aggregation
B. route summarization
C. network trust boundary
D. next-hop redundancy
E. layer 2 switching
F. port security
G. broadcast suppression
Answer: ABD
391. Drag the network characteristic on the left to the design method on the right
which will best ensure redundancy at the building distribution layer.
Select and Place:
Answer:
Explanation/Reference:
Explanation:
Layer 2 between distribution and access layers, with a Layer 3 link between the
distribution switches
-> Support Layer 2 VLANs spanning multiple access layer switches across the
distribution switches
Layer 2 between distribution and access layers, with a Layer 2 link between the
distribution switches
-> FHRP for convergence, no VLANs span between access layer switches across the
distribution switches
VSS -> Convergence (FHRP) is not an issue
The following are recommended best practices at the distribution layer:
. Use First-Hop Redundancy Protocols. Hot Standby Router Protocol (HSRP) or Gateway
Load Balancing Protocol (GLBP) should be used if you implement Layer 2 links
between the Layer 2 access switches and the distribution layer.
. Use Layer 3 routing protocols between the distribution and core switches to allow
for fast convergence and load balancing.
. Use the distribution switches to connect Layer 2 VLANs that span multiple access
layer switches.
. Use Virtual Switching System (VSS) to eliminate the use of STP and the need for
HSRP.
Cisco Press CCDA 640-864 Official Certification Guide Fourth Edition, Chapter 3
392. Which Gigabit Ethernet media type provides the longest reach without a
repeater?
A. 1000Base-CX
B. 1000Base-LX
C. 1000Base-SX
D. 1000Base-T
Answer: B
393. Which three are valid Layer 2 access designs? (Choose three.)
A. Looped Triangle
B. Looped Square
C. Looped U
D. Loop-Free Triangle
E. Loop-Free Square
F. Loop-Free U
Answer: ABF
394. Which IGP provides the fastest convergence by default?
A. EIGRP
B. OSPF
C. IS-IS
D. RSTP
E. BGP
Answer: A
395. Which protocol is the recommended first-hop redundancy protocol for an
existing infrastructure that contains multiple vendors and platforms?
A. HSRP
B. VRRP
C. IGRP
D. OSPF
Answer: B
396. Which network virtualization technology involves creating virtual routers with
its own individual routing tables on a physical router?
A. VSS
B. vPC
C. VRF
D. VLAN
Answer: C
397. Which is a factor in enterprise campus design decisions?
A. network application characteristics
B. routing protocol characteristics
C. switching latency characteristics
D. packet filtering characteristics
Answer: A
398. An enterprise campus module is typically made up of four sub modules, as
described by the Cisco Enterprise Architecture Model. Which two sub modules are
part of this module?
A. DMZ
B. enterprise branch
C. building distribution
D. server farm/data center
E. MAN
Answer: CD
399. Which statement is true concerning enterprise edge distribution switches?
Answer: D
400. Drag the technology on the left to the type of enterprise virtualization where
it is most likely to be found on the right.
Select and Place:
Answer:
Explanation/Reference:
Explanation:
Here is the correct answer
Network Virtualization
* VPC
* VLAN
* VRF
Device Virtualization
*ASA firewall context
*IPS
*VDC
Explanation:
Network virtualization encompasses logical isolated network segments that share the
same physical infrastructure. Each segment operates independently and is logically
separate from the other segments. Each network segment appears with its own
privacy, security, independent set of policies, QoS levels, and independent routing
paths.
Here are some examples of network virtualization technologies:
. VLAN: Virtual local-area network
. VSAN: Virtual storage-area network
. VRF. Virtual routing and forwarding
. VPN: Virtual private network
. vPC. Virtual Port Channel
Device virtualization allows for a single physical device to act like multiple
copies of itself. Device virtualization enables many logical devices to run
independently of each other on the same physical piece of hardware. The software
creates virtual hardware that can function just like the physical network device.
Another form of device virtualization entails using multiple physical devices to
act as one logical unit.
Here are some examples of device virtualization technologies:
. Server virtualization: Virtual machines (VM)
. Cisco Application Control Engine (ACE) context
. Virtual Switching System (VSS)
. Cisco Adaptive Security Appliance (ASA) firewall context
. Virtual device contexts (VDC)
Cisco Press CCDA 640-864 Official Certification Guide Fourth Edition, Chapter 4
401. Which one of these statements is true concerning the data center distribution
(aggregation) layer design?
A. With Layer 3 at the aggregation layer, the physical loops in the topology must
still be managed by STP.
B. The boundary between Layer 2 and Layer 3 must reside in the multilayer switches,
independent of any other devices such as firewalls or content switching devices.
C. A mix of both Layer 2 and Layer 3 access is sometimes the most optimal.
D. In a small data center, the aggregation layer can connect directly to the campus
core, exchanging IP routes and MAC address tables.
Answer: C
402. Which of these statements is true concerning the data center access layer
design?
A. The access layer in the data center is typically built at Layer 3, which allows
for better sharing of services across multiple servers.
B. With Layer 2 access, the default gateway for the servers can be configured at
the access or aggregation layer.
C. A dual-homing NIC requires a VLAN or trunk between the two access switches to
support the dual IP addresses on the two server links to two separate switches.
D. The access layer is normally not required, as dual homing is standard from the
servers to the aggregation layer.
Answer: B
403. The enterprise campus core layer has requirements that are unique from the
distribution and access layers. Which of the following is true about the core
layer?
A. The core layer provides convergence using Layer 2 and Layer 3 services and
features.
B. The core layer provides high availability to support the distribution layer
connections to the enterprise edge.
C. The campus core layer is optional.
D. The core layer requires high performance to manage the traffic policing across
the backbone.
Answer: B
404. Which two of these practices are considered to be best practices when
designing the access layer for the enterprise campus? (Choose two.)
A. Implement all of the services (QoS, security, STP, and so on) in the access
layer, offloading the work from the distribution and core layers.
B. Always use a Spanning Tree Protocol; preferred is Rapid PVST+.
C. Use automatic VLAN pruning to prune unused VLANs from trunked interfaces to
avoid broadcast propagation.
D. Avoid wasted processing by disabling STP where loops are not possible.
E. Use VTP transparent mode to decrease the potential for operational error.
Answer: BE
405. When selecting which hardware switches to use throughout an enterprise campus
switched network, which consideration is not relevant?
A. whether data link layer switching based upon the MAC address is required
B. the number of shared media segments
C. which infrastructure service capabilities are required
D. whether to support Layer 3 services at the network edge
Answer: B
406. What is the primary consideration when choosing a routed network design over a
traditional campus network design?
A. Layer 3 service support at the network edge
B. the routing protocol choice: open (OSPF) or proprietary (EIGRP)
C. the routing abilities of the host devices
D. the need to control the broadcast domains within the campus core
Answer: A
407. Which two statements about designing the Data Center Access layer are correct?
(Choose two.)
A. Multiport NIC servers should each have their own IP address.
B. Layer 3 connectivity should never be used in the access layer.
C. Layer 2 connectivity is primarily implemented in the access layer.
D. Multiport NIC servers should never be used in the access layer.
E. Layer 2 clustering implementation requires servers to be Layer 2 adjacent.
Answer: CE
408. Spanning Layer 2 across geographically separate data centers is a key
consideration for current data center designs. Which is the name of the NX-OS
technology that facilitates MAC in IP transport for Layer 2 VLANs across any IP
network?
A. Overlay Transport Virtualization
B. Virtual Private LAN Services
C. Generic Routing Encapsulation
D. QinQ tunneling
Answer: A
409. Which three options are valid Cisco STP tools used to ensure best-practice
access layer design for the enterprise campus? (Choose three.)
A. Port fast
B. UDLD
C. Root Guard
D. BPDU Guard
E. Flex Links
F. SPAN
G. Ether Channel
Answer: ACD
410. Which Cisco technology using Nexus NX-OS infrastructure allows the network
architect to create up to four separate control and data plane instances of the
Nexus chassis?
A. virtual port-channel
B. virtual routing and forwarding
C. virtual switching system
D. virtual device context
Answer: D
411. OSPF will be used as the IGP within a campus network. Which two things should
you consider before deployment? (Choose two.)
A. All areas need to connect back to area 0.
B. The OSPF process number on each router should match.
C. NSSA areas should be used when an area cannot connect directly to area 0.
D. Stub areas should be connected together using virtual links.
E. ECMP may cause undesired results depending on the environment.
Answer: AE
412. Which layer of the OSI model does Cisco recommend to place the enterprise
network core layer, when designing a network based on its switched hierarchical
design?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
Answer: C
413. When there is a need for immunity to EMI for connecting locations that are
greater than 100 meters apart, which two solutions can be utilized? (Choose two.)
A. multimode fiber
B. Fiber Channel
C. HVDC transmission lines
D. single-mode fiber
E. serial RS-232
F. Gigabit Ethernet 1000BASE-CX
Answer: AD
414. The evolution of the Data Center is best represented by the 3.0 architecture
component of virtualization. Which of the following is not an example of the
virtualization taking place in the Data Center?
A. Virtualized media access utilizing Fiber Channel over Ethernet
B. VLANs and virtual storage area networks (VSANs) provide for virtualized LAN and
SAN connectivity, separating physical networks and equipment into virtual entities
C. Virtual Machines that run an application within the client operating system,
which is further virtualized and running on common hardware
D. Storage devices virtualized into storage pools, and network devices are
virtualized using device contexts
Answer: A
415. Which two statements correctly identify the layers of the Enterprise Campus
module? (Choose two.)
Answer: BC
416. Which three solutions are part of the Borderless Network Services? (Choose
three.)
A. Wireless
B. Routing
C. TrustSec
D. MediaNet
E. Switching
F. EnergyWise
G. Next-Gen WAN
Answer: CDF
417. Drag the security prevision on the left to the appropriate Network module on
the right.
Select and Place:
Answer:
Explanation/Reference:
418. Where in the Cisco Enterprise Architecture model does network management
reside?
A. Enterprise data center module
B. Enterprise campus module
C. Enterprise edge module
D. Service Provider edge module
E. Service Provider data center module
Answer: B
419. Drag the network function on the left to the functional area or module where
it is most likely to be performed in the enterprise campus infrastructure on the
right.
Select and Place:
Answer:
420. Drag the characteristics of the traditional campus network on the left to the
most appropriate hierarchical network layer on the right.
Select and Place:
Answer:
421. What are the three primary functions of the distribution layer of the campus
network design hierarchy? (Choose three.)
A. provide end-user connectivity
B. provide high speed transport
C. provide QoS services
D. enforce security policies
E. provide WAN connections
F. connect access devices to the core backbone
Answer: CD
422. Which of the following is a component within the Cisco Enterprise Campus
module?
A. Teleworker
B. E-Commerce
C. Internet Connectivity
D. Building Distribution
E. WAN/MAN Site-to-Site VPN
Answer: D
423. Which three modular components are part of the Cisco Enterprise Edge
Architecture? (Choose three.)
A. e-commerce module
B. Internet connectivity module
C. server farm module
D. remote access and VPN module
E. PSTN services module
F. enterprise branch module
G. building distribution module
Answer: ABD
424. Which two of the following are benefits of using a modular approach to network
design? (Choose two.)
A. improves flexibility
B. facilitates implementation
C. lowers implementation costs
D. improves customer participation in the design process
Answer: AB
Refer to the exhibit.
425. Which statement accurately represents the characteristics of the core layer in
this design?
A. QoS should only be performed only in the core.
B. Load balancing should never be implemented or used.
C. Access lists should be used in the core to perform packet manipulation.
D. Partial mesh should be used as long as it is connected to each device by
multiple paths.
E. Policy-based traffic control should be implemented to enable prioritization and
ensure the best performance for all time-critical applications.
Answer: D
426. Which three terms describe the primary functions of the distribution layer of
the campus network design hierarchy? (Choose three.)
A. provides end-user connectivity
B. provides high speed transport
C. provides QoS services
D. enforces security policies
E. provides WAN connections
F. connects access devices to the core backbone
Answer: CDF
427. Characterizing an existing network requires gathering as much information
about the network as possible. Which of these choices describes the preferred order
for the information-gathering process?
A. site and network audits, traffic analysis, existing documentation and
organizational input
B. existing documentation and organizational input, site and network audits,
traffic analysis
C. traffic analysis, existing documentation and organizational input, site and
network audits
D. site and network audits, existing documentation and organizational input,
traffic analysis
Answer: B
428. Click and drag the phases of the PPDIOO network lifecycle approach on the left
to their order on the right.
Select and Place:
Answer:
Answer:
430. Which three are considered as technical constraints when identifying network
requirements? (Choose three.)
A. support for legacy applications
B. bandwidth support for new applications
C. limited budget allocation
D. policy limitations
E. limited support staff to complete assessment
F. support for existing legacy equipment
G. limited timeframe to implement
Answer: ABF
431. Which three are considered as technical constraints when identifying network
requirements? (Choose three.)
A. support for legacy applications
B. bandwidth support for new applications
C. limited budget allocation
D. policy limitations
E. limited support staff to complete assessment
F. support for existing legacy equipment
G. limited timeframe to implement
Answer: ABF
432. The first phase of PPDIOO entails identifying customer requirements. Drag the
example on the left to the associated requirement on the right.
Select and Place:
Answer:
433. According to Cisco, which four improvements are the main benefits of the
PPDIOO lifecycle approach to network design? (Choose four.)
A. faster ROI
B. improved business agility
C. increased network availability
D. faster access to applications and services
E. lower total cost of network ownership
F. better implementation team engagement
Answer: BCDE
434. To provide Layer 2 connectivity between the primary and remote data centers,
given that the two data centers are using Layer 3 routed DCIs, which NX-OS
technology can be used to facilitate this requirement?
A. VRF
B. OTV
C. MPLS
D. SPT
E. VPC
Answer: B
435. Which WLC interface is dedicated for WLAN client data?
A. virtual interface
B. dynamic interface
C. management interface
D. AP manager interface
E. service port interface
Answer: B
436. WAN backup over the Internet is often used to provide primary connection
redundancy. Which is the most important consideration when passing corporate
traffic over the public Internet?
A. security
B. static versus dynamic routing
C. bandwidth
D. QoS
E. latency
Answer: A
437. Which three technologies are recommended to be used for WAN connectivity in
today�s Enterprise Edge designs? (Choose three.)
A. DWDM
B. Metro Ethernet
C. Frame Relay
D. MPLS VPN
E. ISDN
F. DSL
G. Wireless
Answer: ABD
438. You have a campus network that consists of only Cisco devices. You have been
tasked to discover the device platforms, the IOS versions, and an IP address of
each device to map the network. Which proprietary protocol will assist you with
this task?
A. SNMP
B. TCP
C. CDP
D. ICMP
E. LLDP
Answer: C
439. When designing the threat detection and mitigation portion for the enterprise
data center network, which of the following would be the most appropriate solution
to consider?
A. 802.1X
B. ACLs in the core layer
C. Cisco Security MARS
D. Cisco Firewall Services Module
Answer: C
440. With deterministic Wireless LAN Controller redundancy design, the different
options available to the designer have their own strengths. Which one of these
statements is an example of such a strength?
A. Dynamic load balancing, or salt-and-pepper access point design, avoids the
potential impact of oversubscription on aggregate network performance.
B. N+N redundancy configuration allows logically grouping access points on
controllers to minimize intercontroller roaming events.
C. N+N+1 redundancy configuration has the least impact to system management because
all of the controllers are colocated in an NOC or data center.
D. N+1 redundancy configuration uses Layer 3 intercontroller roaming, maintaining
traffic on the same subnet for more efficiency.
Answer: B
441. Which one of these statements is an example of how trust and identity
management solutions should be deployed in the enterprise campus network?
A. Authentication validation should be deployed as close to the data center as
possible.
B. Use the principle of top-down privilege, which means that each subject should
have the privileges that are necessary to perform their defined tasks, as well as
all the tasks for those roles below them.
C. Mixed ACL rules, using combinations of specific sources and destinations, should
be applied as close to the source as possible.
D. For ease of management, practice defense in isolation � security mechanisms
should be in place one time, in one place.
Answer: C
442. Which of these is the equation used to derive a 64 Kbps bit rate?
A. 2 x 8 kHz x 4-bit code words
B. 8 kHz x 8-bit code words
C. 2 x 4-bit code words x 8 kHz
D. 2 x 4 kHz x 8-bit code words
Answer: D
443. Which two routing protocols converge most quickly? (Choose two.)
A. RIPv1
B. RIPv2
C. BGP
D. OSPF
E. EIGRP
Answer: DE
444. Your company�s Cisco routers are operating with EIGRP. You need to join
networks with an acquisition�s heterogeneous routers at 3 sites, operating with
EIGRP and OSPF. Which describes the best practice for routing protocol deployment?
A. Apply OSPF throughout both networks
B. Apply one-way redistribution exclusively at each location
C. Apply two-way redistribution exclusively at each location
D. Apply two-way redistribution at each location with a route filter at only one
location
E. Apply two-way redistribution at each location with a route filter at each
location
F. Apply EIGRP with the same autonomous system throughout both networks
Answer: E
445. Which statement describes the recommended deployment of DNS and DHCP servers
in the Cisco Network Architecture for the Enterprise?
A. Place the DHCP and DNS servers in the Enterprise Campus Access layer and
Enterprise branch.
B. Place the DHCP and DNS servers in the Enterprise Campus Server Farm layer and
Enterprise branch.
C. Place the DHCP server in the Enterprise Campus Core layer and Remote Access_VPN
module with the DNS server in the Internet Connectivity module.
D. Place the DHCP server in the Enterprise Campus Distribution layer with the DNS
server in the Internet Connectivity module.
Answer: B
446. Drag the WAN characteristics on the left to the branch office model where it
would most likely to be used on the right.
Select and Place:
Answer:
447. Which three types of WAN topologies can be deployed in the Service Provider
Module? (Choose three.)
A. ring
B. star
C. full mesh
D. core/edge
E. collapsed core
F. partial mesh
Answer: BCF
448. Which of the following three options represents the components of the
Teleworker Solution? (Choose three.)
A. Cisco Unified IP Phone
B. Cisco 880 Series Router
C. Aironet Office Extend Access Point
D. Catalyst 3560 Series Switch
E. Cisco 2900 Series Router
F. MPLS Layer 3 VPN
G. Leased lines
Answer: ABE
449. Which mode is used to exclusively look for unauthorized access points?
A. monitor mode
B. sniffer mode
C. rogue detector mode
D. local mode
Answer: C
450. What is the acceptable amount of one-way network delay for voice and video
applications?
A. 300 bytes
B. 1 sec
C. 150 ms
D. 500 ms
Answer: C
451. Which two can be used as a branch office WAN solution? (Choose two.)
A. frame relay
B. MPLS
C. Metro Ethernet
D. GPRS
E. dial-up modem
F. 3G USB modems
Answer: BC
452. You are tasked with designing a new branch office that will support 75 users
with possible expansion in the future and will need a highly available network.
Which of the branch design profiles should be implemented?
A. large branch design
B. medium branch design
C. teleworker design
D. small branch design
Answer: B
453. Which two are types of network virtualization? (Choose two.)
A. VSS: Virtual Switching System
B. VRF: virtual routing and forwarding
C. VCI: virtual channel identifier
D. VLSM: variable length subnet masking
E. VM: virtual machine
F. VMP: Virtual Memory Pool
Answer: AB
454. Refer to the exhibit.
Answer: B
455. What is the recommended spanning tree protocol to use for all Layer 2
deployments in a branch office environment?
A. CST
B. RSPT
C. PVST
D. MISTP
E. Rapid PVST +
Answer: E
456. Which IPv6 feature enables routing to distribute connection requests to the
nearest content server?
A. Link-local
B. Site-local
C. Anycast
D. Multicast
E. Global aggregatable
Answer: C
457. Refer to the exhibit.
Answer: B
458. Which four services does the architecture for Media Services contain? (Choose
four.)
A. access services
B. transport services
C. storage services
D. forwarding services
E. session control services
F. security services
G. filtering services
H. remote access services
Answer: ABCE
459. Which two features are supported by single wireless controller deployments?
(Choose two.)
A. automatic detection and configuration of LWAPPs
B. LWAPP support across multiple floors and buildings
C. automatic detection and configuration of RF parameters
D. Layer 2 and Layer 3 roaming
E. controller redundancy
F. mobility groups
Answer: AB
460. Which protocol is used to reserve bandwidth for the transport of a particular
application data flow across the network?
A. cRTP
B. IEEE 802.1P
C. RSVP
D. LFI
E. Auto QOS
Answer: C
461. Which protocol is used for voice bearer traffic?
A. MGCP
B. RTP
C. SCCP
D. CDP
E. ICMP
Answer: B
462. Cisco Identity-Based Networking Services relies heavily on the 802.1X
protocol. Which other authentication solution is used hand-in-hand with 802.1X to
authenticate users for network access?
A. RADIUS
B. LEAP
C. IPsec
D. TACACS
E. ISAKMP
Answer: A
463. Which is the purpose of the Cisco NAC Profiler?
A. Automates discovery and inventory of all LAN attached devices
B. Generates a profile based on username and group
C. Learns and creates a database of virus definitions based on LAN traffic
D. A database used to map user VPN accounts
Answer: A
464. When designing the identity and access control portions for the enterprise
campus network, which of these solutions would be the most appropriate solution to
consider?
A. 802.1X
B. ACLs in the core layer
C. Cisco Security MARS
D. NetFlow
Answer: A
465. Which is part of the Prepare phase of PPDIOO?
A. Obtain site contact information
B. Perform network audit
C. Identify customer requirements
D. Perform gap analysis
Answer: C
466. In which phase of PPDIOO are the network requirements identified?
A. Design
B. Plan
C. Prepare
D. Implement
E. Operate
F. Optimize
Answer: B
467. You want to gather as much detail as possible during a network audit with a
minimal impact on the network devices themselves. Which tool would you use to
include data time stamping across a large number of interfaces while being
customized according to each interface?
A. RMON
B. SNMPv3
C. NetFlow
D. Cisco Discovery Protocol
Answer: C
468. You want to gather as much detail as possible during a network audit, to
include data time stamping across a large number of interfaces, customized
according to interface, with a minimal impact on the network devices themselves.
Which tool would you use to meet these requirements?
A. RMON
B. SNMPv3
C. NetFlow
D. Cisco Discovery Protocol
Answer: C