option
Cuestiones
ayuda
daypo
buscar.php

Prueba01

COMENTARIOS ESTADÍSTICAS RÉCORDS
REALIZAR TEST
Título del Test:
Prueba01

Descripción:
Arquitectura

Fecha de Creación: 2020/01/09

Categoría: Otros

Número Preguntas: 195

Valoración:(1)
COMPARTE EL TEST
Nuevo ComentarioNuevo Comentario
Comentarios
NO HAY REGISTROS
Temario:

An engineer is designing a QoS architecture for a small organization and must meet these criteria: •Guarantees resources for a new traffic flow prior to sending Polices traffic when the flow does not conform Which QoS architecture model will accomplish this?. auto quality of service. integrated services. differentiated services. modular quality of service.

What is one function of the key server in a Cisco GETVPN deployment?. maintaining security policies. sending the RSA certificate. providing the group ID. providing the preshared key.

Multicast has been configured and enabled within an Enterprise network. PIM Sparse-mode has been enabled on all VLANs. What feature is required to stop multicast traffic from being broadcasted on the access layer switches?. Multicast boundary filter. PIM dense-mode. Dynamic ARP inspection. IGMP snooping.

An engineer is designing a multicluster BGP network where each cluster has two route reflectors and four Route Reflector clients. Which two options must be considered in this design? (Choose two.). Clients from all clusters should peer with all route reflectors. All route reflectors must be nonclient peers in a fully meshed topology. Clients must not peer with iBGP speakers outside the client cluster. Clients should peer with at least one other client outside of its own cluster. All route reflectors should be nonclient peers and the topology is partially meshed.

An engineer is designing an IP addressing scheme for a local company that requires multicast for its applications. For security reasons, only explicitly configured devices can be permitted to transmit across the network. Which multicast technology and address range must the engineer select?. SSM: 223.0.0.0/. PIM-SM: 232.0.0.0/8. ASM: 232.0.0.0/8. SSM: 232.0.0.0/8.

A network engineer wants to segregate three interconnected campus networks via isis routing. A two-layer hierarchy must be used to support large routing domains to avoid more specific routes from each campus network being advertised to other campus network routers automatically. What two actions should be taken to accomplish this segregation? (Choose two.). Designate two ISIS routers as BDR routers at the edge of each campus. Assign similar router IDs to all routers within each campus. Designate two isis routers from each campus to act as a Layer 1/ layer 2 backbone routers at the edge of each campus network. Assign a unique isis NET value for each campus and configure internal campus routers with Level 1 routing. Change the MTU sized of the interface of each campus network router with a different value.

Which two characteristics of the 802.1X standard are true? (Choose two.). It was created by IETF. Its EAP messages always require underlying PPP protocol. It was created by IEEE. This standard supports only wired LANs. It can package EAP messages in Ethernet frames and not use PPP.

An engineer is designing a Layer 3-enabled access layer. Which design recommendation must the engineer consider when deploying EIGRP routing within the access layer?. Implement floating static routes on access switches for redundant links. Configure all edge access layer switches to use a stub routing feature. Use the First Hop Redundancy Protocol on access layer switches. Enable multiple uplinks from each access switch stack to the distribution swithches.

Which two options regarding the Cisco TrustSec Security Group Tag are true? (Choose two.). It is removed by the Cisco ISE before reaching the endpoint. It is assigned by the Cisco ISE to the user or endpoint session upon login. Best Practice dictates that deployments should include a guest group allowing access to minimal services. Best Practice dictates that deployments should include a security group for common services such as DNS and DHCP. Best practice dictates it should be statically created on the switch.

Which two options are characteristics of bidirectional PIM? (Choose two.). It is ideal for many-to-many host applications. The creation of a source tree is required. A registration process is required. It enables scalability with a large number of sources. A designated forwarder is not required.

In what situation must spanning-tree be implemented?. when a VLAN spans access layer switches. when fast convergence is required for link failures. when redundant Layer 2 links, that are not part of a single EtherChannel or bundle, exist between distribution switches. when trunks need to extend multiple VLANs across access switches.

An engineering team must design a firewall solution with shared hardware resources but separation of features such as ACLs, NATs, and management between the external business partners of the organization. Which ASA deployment mode meets these requirements?. transparent mode. routed mode. multicontext mode. clustering mode.

Which two statements about 802.1 X are true? (Choose two.). It works only with wired devices. It can allow and deny port access based on user identity. By default, it allows devices that lack 802.1 support. It can allow and deny port access based on device identity. It is a Cisco proprietary standard.

A network engineer is designing a network that must incorporate active-active redundancy to eliminate disruption when a link failure occurs between the core and distribution layer. What two technologies will allow this? (Choose two). Equal Cost Multi-Path (ECMP). Rapid Spanning Tree Protocol Plus (RSTP+). Hot Standby Routing Protocol (HSRP). Rapid Spanning Tree Protocol (RSTP). EtherChannel (MEC).

A client's security policy requires separate management and control planes for different divisions within the company. Which technology can be used to achieve this requirement while minimizing the number of physical devices?. virtual routing and forwarding. virtual switching system. virtual device contexts. virtual port channels.

Which two technologies can be used to interconnect data centers over an IP network and provide layer 2 LAN extension? (Choose two.). TRILL. ISIS. VXLAN. FabricPath. OTV.

An engineer must add a new firewall in front of the public web server infrastructure in an ACI network. Which ACI function is used to accomplish this requirement?. Application Network Profile. Service chaining. Static binding. Layer 4-7 services.

Refer to the exhibit. A customer discovers router R1 remains active even when the R1 uplink (F0/1) is down. Which two commands can be applied to R1 to allow R2 to take over as the HSRP active? (Choose two.). standby 10 track 50. standby 10 track 50 decrement 20. track 50 Ip route 10.10.10.0/24 reachability. standby 10 track 50 shutdown. track 50 interface Fa0/1 ip routing.

During the design of a new data center, a company requires that access switches be placed near servers without requiring a one-to-one ratio of switches to network racks. Which switch layout must be used?. Integrated. top of rack. end of row. centralized.

An engineer is designing a multi-tenant network that requires separate management access and must share a single physical firewall. Which two feature support this design? (Choose two.). multicast routing. quality of service. site-to-site VPN. unified communications. threat detection. dynamic routing protocols.

An organization is acquiring another company and merging the two company networks. No subnets overlap, but the engineer must limit the networks advertised to the new organization. Which feature implements this requirement?. interface ACl. passive interface. stub area. route filtering.

An engineer is designing an infrastructure to use a 40 Gigabit link as the primary uplink and a 10 Gigabit uplink as the alternate path.Which routing protocol allows for unequal cost load balancing?. IS-IS. EIGRP. RIP. OSPF. BGP.

A network engineer wants to connect two sites via a WAN technology and to securely pas multicast traffic over this WAN technology. Which WAN technology should be configured?. GRE. IPsec. GRE overf Psec. Pure MPLS.

Which security feature can help prevent spoofed packets on the network by verifying the validity of the source's IP address ?. 802.1x. DAI. uRPF. DHCP spoofing.

A network team must provide a redundant secure connect on between two entities using OSPF. The primary connection will be an Ethernet Private line and the secondary connection will be a site to site VPN. What needs to be configured in order to support routing requirements for over the VPN connection?. HTTPS. AAA Server. Root Certificate. GRE Tunnel.

Which technology should a network designer combine with VSS to ensure a loop free topology with optimal convergence time?. RPVST+. Multihassis EtherChannel. UplinkFast. Portfast.

When designing a layer 2 STP-based LAN with Layer 3 FHRP, which design recommendation should be followed?. Avoid configuring router preemption. Assign the native VLAN to thelowest number in use. Align the STP root with the active FHRP device. Avoid modifying default STP and FHRP timers.

An engineer has implemented a QoS architecture that requires a signaling protocol to tell routers which flows of packets require special treatment.Which two mechanisms are important building blocks to establish and maintain QoS in this architecture? (Choose two.). tagging. packet scheduling. resource reservation. admission control. classification.

Refer to the exhibit.An engineer is designing a new firewall for an organization and must provision Network Address Translation. This new firewall must support basic Internet access for the organization as well as provide inbound connectivity to the mail server. The infrastructure has only one public IP address available for use on the new firewall. Which two forms of NAT must be configured? (Choose two.). dynamic NAT for the inbound traffic on port 25. NAT overloading for the outbound traffic. Dynamic NAT forthe outbound traffic. Static NAT for the inbound traffic on port 25.

A company is running BGP on the edge with multiple service providers in a primary and secondary role. The company wants to speed up convergence time if a failure were to occur with the primary, but they are concerned about router resources.Which method best achieves this goal?. Utilize BFD and keep the default BGP timers. Decrease the BGP keep alive timer. Ut lize BFD andlower BGP helloInterval. Utilize BFD and tune the multiplier to 50.

A network link is going up and down rapidly, and it is hindering network performance and routing table stability. Which option can be configured to insulate against the performance impact of interface or link failure throughout the network. route summarization. secondary IP addressing. distributed Cisco Express Forwarding switching. default route propagation.

What is the preferred protocol for a router t!hat is running in an IPv4 and IPv6 dual stack configuration?. IPX. IPv4. Microsoft NetBIOS. IPv6.

After an incident caused by a DDoS attack on a router,an engineer must ensure that the router is accessible and protected from future attacks without making any changes to traffic passing through the router. Which security function can be utilized to protect the router?. access control lists. class maps. control plane policing. tone-based policy firewall.

When designing data centers for multitenancy. Which two benefits are provided by the implementation of VSANs and zoning? (Choose two.). Zones allow an administrator to control which initiators can see which targets. VSAN provides a means of restricting visibility and connectivity among devices connected to a zone. VSAN have their own set or services and address space,which prevents an issue in one VSAM from affecting others. Zones provide the abilitv to create many logical SAN fabrics on a single Cisco MOS 9100 family switch. VSANs and zones use separate fabrics.

A client request includes a network design that ensures all connections between the access layer and distribution layer a reactive and forwarding traffic at all times. Which design approach achieves this request?. Enable backbone fast on the two distributions switches and create a port channel between each access layer switch and both distribution switches. Configure Rapid PVST+ and adjust the timers for faster convergence. Configure HSRP for all VLANs and adjust the hello timer for raster convergence. Create a VSS between the two distribution switches and also create MEC between the VSS and each access layer switch.

While planning a new WAN design, an engineering team is asked to use software defined networking as part of the wide area network strategy.Which SDN controller allows for applications iWAN control, Plug and Play, and Enterprise Service Automation?. APIC. Wide Area Application Service. Enterprise NFV. APIC-EM.

A network consultant is designing an Internet Edge solution and is providing the details around the flows supporting a local Internet Proxy. How is on·premised web filtering supported ?. A Cisco ASA redirects HTTP and HTTPS traffic to the WSA using WCCP. A Cisco ASA redirects HTTP and HTTPS traffic to CWS with a Web Security Connector. A Cisco ASA connects to the Web Security Appliance via TLS to monitor HTTP and HTTPS traffic. A Cisco ASA uses an IPS module to inspect HTTP and HTTPS frame.

What is one limitation of MPLS layer 3 VPN networks?. PE routers are under utilized. They require the customer to control routing. They support only IP traffic. They require less powerful routers with limited capabilities.

A customer is discussing QoS requirements with a network consultant. The customer has specified that end-to-end path verification is a requirement. Which QoS architecture is most appropriate for the requested design?. marking traffic at the access layer with CoS to support the traffic flows. DiffServ model with PHB to support the traffic flows. marking traffic at the access layer with DSCP 10 support the traffic flows. InServ model with RSVP to support the traffic flows.

Refer to the exhibit. A customer wants to use HSRP as a First Hop Redundancy Protocol. Both routers are currently running and all interfaces are active. Which factor determines which router becomes the active HSRP device?. the router with the highest MAC address for the respective group. the router with the highest interface bandwidth for the respective group. the router that boots up last. the router with the highest IP address for the respective group.

An OSPF router should have a maximum of how many adjacent neighbors?. 80. 50. 60. 100.

Refer to the exhibit. An engineer must provide a redesign for the distribution and access layers of the network. Which correction allows for a more efficient design?. Change the link between Distribution Switch A and Distribution Switch B to be a routed link. Reconfigure the Distribution Switch A to become the HSRP Active. Create an EtherChannel link between Distribution Switch A and Distribution Switch B. Add a link between Access Switch A and Access Switch B.

A network designer needs to explain the advantages of route summarization to a client. Which two options are advantages that should be included in the explanation? (Choose two). Increases security by advertising fake networks. Reduces routing table size. Advertises detailed routing tables. Utilizes the routers full CPU capacity. Reduces the upstream impact of a flapping interface.

A network Engineer is designing a hierarchical design and needs to optimize WAN design. On what group of devices can a network engineer summarise routes to remote WAN sites?. Core. Distribution. Data Center Distribution WAN Edge. WAN Edge. Campus access distribution layer.

Which option is the unique requirement when supporting IP Multicast packet when designing IPsec VPNs?. IPsec forwarding using transport mode. IPsec forwarding using tunnel mode. encapsulation of traffic with GRE ot VTI. additional bandwidth far headend.

A network engineer is using OTV to connect six data centers. Which option is preferred when deploying OTV to more than three sites?. Use multicast enabled transport. Use unicast only transport. Filter MAC addresses at the join interface. Avoid multi-homing.

What is an advantage of using the vPC feature in a data center environment?. The two switches from a single control plane. All available uplink bandwidth is utilized. FHRP is not required. A single IP is used for management of both devices.

A network engineer must use an Internet connection to provide backup connectivity between two sites. The backup connection must be encrypted and support multicast. Which technology must be used?. GETVPN. GRE over IPsec. IPsec direct encapsulation. DMVPN.

Which two BGP attributes can be set with outbound policy to manipulate inbound traffic? (Choose two.). local preference. weight. multi-exit discriminator. AS path. Next hop.

An engineer is designing a multichassis EtherChannel using VSS. Which network topology is the result?. ring. star. looped. hybrid.

What is the primary benefit of deployment MPLS over the WAN as opposed to extending VRF-lite across the WAN?. Convergence time. Low operating expense (OpEx). Low latency. Dynamic fault-tolerance.

When a site has Internet connectivity with two different isP's, which two strategies are recommended to avoid becoming a BGP transit site? (Choose two). Use a single service provider. Filter routes outbound to the ISPs. Accept all inbound routes from the ISPs. Filter routes inbound from the ISPs. Advertise all routes to both ISPs.

Which two features can you implement to control which networks are advertised by a BGP router? (Choose two.). crypto maps. prefix lists. policy maps. router SNMP statements. route maps.

While designing a wide area network, the network team wants to avoid undesired transit traffic through remote branch sites with multiple WAN connections. Which option can be used to manage traffic flows in the remote network?. route filtering. route leaking. route weighting. route tagging.

Which two values does EIGRP use to calculate the metric of a route in a converged EIGRP topology? (Choose two.). bandwidth. redundancy. detay. cost. hops.

Which option is an advantage of using PIM sparse mode instead of PIM dense mode?. There is reduces congestion in the network. IGMP is not required. No RP is required. lt floods multicast traffic throughout the network.

An engineer must design a Cisco VSS-based configuration within a customer campus network. The two VSS switches are provisioned for the campus distribution layer and each one has a single supervisor and multiple 10 gigabit line cards. Which option is the primary reason to avoid plugging both VSL links into the supervisor ports?. The implementation creates a loop. limited bandwidth is available for VSS convergence. The design lacks optimal hardware diversity. QoS is required on the VSL links.

An engineer wants to have a resilient access layer in a data center so that switches on the access layer have separate physical connections to a pair of redundant distribution switches. Which technology achieves this goal?. EVPC. VSL. ECMP. VSS. LACP. PaGP.

An OSPF router should particlpate in a maximum of how many areas?. 1. 3. 4. 2.

An engineer is configuring QoS to meet the following requirement: - all traffic that exceeds the allocated bandwidth will still traverse the infrastructure but will be forwarded later What will be requirements?. Per-Hop behaviors. Weighted Fair Queuing. IP Precedence. Shaping.

Which type olfVPN has a backbone hub-and-spoke topology but supports direct spoke-to-spoke connectivity?. IPsec direct encapsulation. DMVPN. VTI. GRE over IPsec.

A company has asked for an OOB management network design. Which option is one Cisco best practice parameter that must be followed?. Data networks must never traverse the management network. Data networks can traverse the management network as a backup path. Data networks must be limited to SSH, NTP, FTP, SNMP, and TACACS+ protocols. Data networks and management networks must be in the routing table.

Drag and drop the ACI objects from the left onto the definition of the right. application profiles. contracts. tenant. private networks. endpoint groups. bridge domains.

An engineer must provide segmentation for a shop floor environment that has only a single /24 network available. Each area of machinery needs to have its own subnet. Drag and drop the subnet from the left onto the corresponding IP addressing design on the right. Not all options are used. 10.3.3.96/28. 10.3.3.64/27. 10.3.3.0/26. 10.3.3.112/29. 10.3.3.64/26. 10.3.3.16/27. 10.3.3.8/28.

Drag the IS-IS fast convergence components on the left to the order in which they occur on the right. failure detection time. event propagation time. SPF run time. RIB FIB update time.

Which option simplifies encryption management?. GET VPN. MPLS VPN. IPsec VPN. Cisco Easy VPN.

Which two options describe how Taboo contracts differ from regular contracts in Cisco ACI? (Choose two). Taboo contract entries are looked up with higher priority than entries in regular contracts. Taboo contract entries are looked up with lower priority than entries in regular contracts. They are not associated with one EPG. They are associated with one EPG. Taboo contract entries are looked up based on administrator configured priority. They are associated with pair of EPGs.

A company is multihomed to diferent service providers running BGP. Which action ensures that the company AS does not become a transit AS?. Create a prefix list that matches the company prefix(es) and applies to both BGP neighbor definitions in the outbound direction. Create a distribute list that filters all routes except the default route and applies to both BGP neighbor interfaces in the inbound direction. Create a distribute list that filters all routes except the default route and applies to a single BGP neighbor in the outbound direction. Create a route map that matches the provider BGP communities and networks and applies to both BGP neighbor interface in the outbound direction.

When you configure a multi-chassis setup with VSS, which link must be configured to extend the backplane between the two switches?. VSL. ISL. LCAP. PaGP.

A network engineer must create a backup network connection between two corporate sites over the Internet using the costing company ASA firewalls. Which VPN technology best satisfies this corporate need?. VPLS. OTV. DMVPN. IPSec. GETVPN. MPLS.

A network engineer wants to limit the EIFRP query scope to avoid high CPU and memory utilization on low-end routers as limiting the possibility of a stuck-in-active routing event between HQ and branch offices. Which action is the best way to achieve these goals?. Configure all routers at branch offices as EIGRP stub. Configure all routers at HQ and branch offices as EIGRP stub. Configure all routers at branch offices as EIGRP stub and allow only directly connected networks at branch offices to be advertised to HQ. Configure different autonomous systems numbers per each branch office and HQ and redistribute routes between autonomous systems.

A network manager wants all remote sites to be designed to communicate dynamically with each other using DMVPN technology without requiring much configuration on the spoke routers. DMVPN uses which protocol to achieve this goal?. GRE. NHRP. SSH. ARP.

A large scale IP SLA deployment is causing memory and CPU shortages on the routers in an enterprise network. Which solution can be implemented to mitigate these issues?. a CPE device that is managed by the network provider. a shadow router. an offline router for disaster recovery. a standby router for failover operation.

Cisco FabrlcPath brings the benefits of routing protocols to layer 2 network Ethernet environments. What are two advantages of using Cisco FabricPath technology? (Choose two.). Cisco FabricPath provides MAC address scalability with conversational learning. Cisco FabricPath technology is supported all Cisco platforms and can replace legacy Ethernet in all campus networks. Cisco FabricPath relies on OSPF to support Layer 2 forwarding between switches, which allows load balancing between redundant paths. Loop mitigation is provided by the TTL field in the frame. Cisco FabricPath brings the benefits of routing protocols to Layer 2 network Ethernet environments.

Which two protocols support simple plain text and MD5 authentication? (Choose two.). BGP. IPv6. EIGRP. OSPF. RIP.

What is the most important consideration when selecting a VPN termination device?. VPN sessions per interface. CPU cycles per second. bits per second. packets per second.

An organization is creating a detailed QoS plan that limits bandwidth to specific rates. Which three parameters can be configured when attempting to police traffic within the network? (Choose three.). shaping rate. bursting. committed information rate. conforming. exceeding. peak information rate. violating.

An engineer is designing a network using RSTP. Several devices on the network support only legacy STP. Which outcome occurs?. RSTP and STP inter operate and fast convergence is achieved. RSTP and STP inter operate but the fast convergence is not used. RSTP and STP choose the protocol with the best performance. RSTP and STP are not compatible and legacy port error disable.

Which option is a design recommendation for route summarizations?. defensive route filtering for defense against inappropriate routing traffic. routing protocol stub areas. Filtered redistribution for the prevention of re-advertising of routes. Route summarization for scalable routing and addressing design. Route summarization to support greater volumes of transit traffic.

An engineer is considering uplink bandwidth over subscription in a Layer 3 network design. Which option is the Cisco recommend ed over subscription ratio for uplinks between the distribution and core layers?. 3 to 1. 4 to 1. 6 to 1. 8 to 1.

A network consultant is designing an enterprise network that includes an IPsec headend termination device.Which two capabilities are the most important to consider when accessing the headend device's scalability? (Choose two.). memory capabilities. bandwidth capabilities. number of tunnels that can be aggregated. CPU capabilities. Packets per second processing capability.

What is the result of a successful RFP check?. The packet is forwarded because if arrived on the interface used to route traffic back to the source address. The packet is forwarded because if arrived on the interface used to route traffic to the destination address. The packet is dropped because if arrived on the interface used to route traffic to the destination address. The packet is dropped because if arrived om the interface used to route traffic back to the source address.

A customer has several small to medium·sized remote branches and with these spec ific per site requirements • WAN link redundancy • no need for consisten!end to-end QoS (QoS is applied to the edge routers.} • low cost for WAN links • no strlct SLA requlrements for the WAN llnks Which type of WAN edge connectivity design does an engineer propose?. dual-homed WAN MPLS and internet inks via dual edge routers. dual-homed Internet with dual edge routers running a hub-and-spoke VPN topology. dual-homed WAN MPLS with single edge router. dual-homed Internet with a single edge router running a site-to-site VPN topology.

An engineer is designing a redundant dual·homed BGP solution that should prefer one specific carrier under normal conditions. Traffic should automatically fail over to secondary carrier in case or a failure. Which BGP attributes can be used to achieve this goal for inbound trafic? (Choose two). MED. Weight. AS-PATH. Local preference. Origin.

An engineer is trying to minimize the number of EIGRP routes within an infrastructure. Which command achieves automatic summarization?. area 0 range 10.0.0.0 255.0.0.0.0. router eigrp 1. ip summary-address eigrp 1 10.0.0.0 255.0.0.0. ip summary-address 10.0.0.0 255.0.0.0. eigrp stub.

At which layer in the ACI fabric are policies enforced?. End Point. Spine. Leaf. APIC.

An engineer is working for a large scale cable TV provider that requires multicast on multisourced streaming video, but must not use any rendezvous point mechanism. Which multicast protocol must be configured?. ASM. PIM-SM. BIDR-PIM. SSM.

A network engineer must reduce security risk in BGP. Which option help to avoid rogue route injection, unwanted peering and malicious BGP activities?. Apply MD5 authentication between all BGP peers. Use GRE tunnel. Encrypt all traffic. Apply route maps and policies in route redistribution events.

The network engineering team for a large university must increase the security within the core for network by ensuring that IP traffic only originates form a network segment that is assigned to that interface in the routing table, which technology must be chosen to accomplish this requirement?. VLAN access control List. ARP inspection. lntrusion prevention system. Unicast Reverse Path forwarding.

Which security function is inherent in an application centric infrastructure network?. intrusion Prevention. intrusion Detection. default lnter-EPG connectivity. default Denial Network.

Refer to the exhibit. An engineering team is analyzing the WAN connection for a site that has a 50 Mbps Ethernet circuit. Which technology should be used to keep the router from overrunning the carrier's 50 Mbps rate? GigabitEthernet0/0 is up, line protocol is up Hardware is CN Gigabit Ethernet, address is 4c00.8200.0000 (bia 4c00.8200.0000) Internet address is 10.3.3.3/24 MTU 1500 bytes, BW 50000 Kbit/sec, DLY 10 usec, reliability 255/255, txload 5/255, rxload 9/255 Full Duplex, 1Gbps, media type is RJ45. Committed Information Rate. Access Control List. Policing. Shaping. Rate-Limit.

The Cisco ACI fabric consists of which design at the physical layer?. collapsed core network. three-tier core, aggregation and access. full mesh. spine-and-leaf.

A customer with 30 branch offices requires dynamic IGP routing protocols, IP multlcast, and non IP protocol support. Which solution satisfies these requirements?. P2P GRE. DMVPN hub andspoke. VTI. IPsec direct encapsufation. DMVPN spoke-to-spoke.

How does stub routing affect transit routes in EIGRP?. It is designed to prevent the distribution of external routes. It prevents the hub router from adverting network learned from the spokes. Transit routes are filtered from stub networks to the network hub. Transit routes are passed from stub network to a hub network.

A customer would like to implement a firewall to secure an enterprise network, however the customer is unable to allocate any new subnets. What type of firewall mode must be implemented?. transparent. active/standby. zone based. virtual. active/active. routed.

Which two hashing distribution algorithms are available for an engineer when working with multichassis EtherChannets? (Choose two.). srcdst-mac. round-robin. fixed. src-dst-port. adaptive.

An engineer is designing a network with OSPF and must filter ingress routes from apartner network that is also running OSPF. Which two design options are available for this configuration? (Choose two.). Configure a different OSPF area that would prevent any unwanted routes from entering the network. Use a distribute list in the OSPF process to filter out the routes. Use a different routing protocol such as EIGRP between the networks. Use acoess list on the ingress interface to prevent the routes from entering the networks. Design a filter using prefix lists to ensure that routes are filtered out at the redistribution point.

Which option is a fundament process of thc Cisco TrustSec technology?. detection. propagation. marking. prioritization.

Which design technology allows two Cisco Catatyst chassis to use SSO and NSF to provide nonstop communication even if one of the member chassis fails?. peer gateway. VSS. vPC. auto chassisdetect.

Which Cisco NX-OS feature can be used to build highly scalable Layer 2 multi-path networks without utilizing the Spanning Tree Protocol?. MST. FabrioPath. OTV. vPC.

A data center is being deployed, and one design requirement is to be able to readily scale server virtualization. Which IETF standard technology can provide this requirement?. Transparent Interconnection of Lots of Links. Cisco Unified Fabric. Data Center Bridging. Cisco FabricPath.

During the integration of a new company, a network engineering team discovers that IP address space overlaps between the two company networks. Which two technologies can be used to allow overlapping IP addresses to coexist on shared network infrastructure? (Choose two.). VRF. VPN. NAT. OTV. HSRP.

Which designing a QoS policy for an organization, a network engineer is determining the method to limit the output rate of traffic within the real-time queue. How must the limiting of traffic within the real time queue occur?. The traffic must be shaped to allow for it to be transmitted after the tokens have been replenished. The traffic must be remarked to a lower priority to and allowed to pass. The traffic within the real-time queue must not be limited. The traffic must be policed and not allowed to pass.

While designing a backup BGP solution, a network engineer wants to ensure that a single router with multiple connections prefers the routes from a specific connection over all others. Which BGP path selection attribute is considered first when selecting a route?. MED. WEIGHT. AS-LENGTH. local preference. link bandwidth.

An engineer must create this design: • Restrict certain networks from being advertised to remote branches connected via eBGP. • Prohibit advertisement of the specific prefix to external peers only. Which BGP community must be configured to meet these requirements?. Internet. gshut. no-advertise. local-as. no-export.

An engineer is redesigning the infrastructure for a campus environment. The engineer must maximize the use of the links between the core and distribution layer. By which two method scan this usage be maximized? {Choose two.). Design the links between the core and distribution layers to use RPVSTP+. Design the links between the core and distribution layers to use HSRP. Design with multiple equal cost links between the core and distribution layers. Design the links between the core and distribution layers to use an IGP. Design with multiple unequal-cost links between the core and distribution layers.

Which two modes for deploying Cisco TrustSec are valid? (Choose two.). low-impact. cascade. open. monitor. high availability.

While configuring QoS policy, analysis of the switching infrastructure indicates that the switches support 1P3Q3T egress queuing. Which option describes the egress queuing in the infrastructure?. The threshold configuration allows for inter-queue QoS by utilizing buffers. The 1P3Q3T indicates one priority queue, three standard queues, and three thresholds. The priority queue should use less than 20% of the total bandwidth. The priority queue must contain real-time traffic and network management traffic.

A company security policy states that their data center network must be segmented from the layer 3 perspective. The segmentation must separate various network security zones so that they do not exchange routing information and their traffic path must be completely segregated. which technology achieves this goal?. VPC. VXLAN. VRF. VDC.

A network team is designing a Layer 3 Data Center Interconnect between two data centers. There is a requirement for all links of equal bandwidth be utilized have automatic failover and not use any bundling technology. Which routing function must be used to achieve this requirement?. BGP router reflectors. Equal cost multipath routing. Virtual private LAN service. Virtual links. Policy-based routing.

Refer to the exhibit. HSRP is running between distribution Switch A and distribution Switch B. Distribution Switch B, Port Gig4/2 to Access Switch, port Gig2/0/1. Core switch A, port Gig2/1 to Distribution Switch A, port Gig3/1. Core switch B, port Gig2/2 to Distribution Switch B, Port Gig3/2. Core switch A, port Gig1/1 to Core Switch B, port Gig1/2. Distribution Switch A, port Gig5/1 to Distribution Switch B, port Gig5/2. Distribution Switch A, port Gig4/1 to Access Switch, port Gig 1/0/1.

A data center has several business partners who want to have their compute resources installed. The data center uses one VLAN to support vendor equipment and requires limited visibility and connectivity between vendor servers. Which segmentation concept satisfies these requirements?. IP NAT. Private vlans. Lan to lan vpn. Protected vlans.

An engineer set up a multicast network design using all three Cisco supported PIM modes. Which are two characteristics of Bidirectional PIM in this situation are true? (Choose two). In Bidirectional PIM, the RP IP address does not need to be a router. In Bidirectional PIM, the RP IP address can be shared with any other router interface. A Cisco router cannot support all three PIM modes simultaneously. Membership to a bidirectional group is signaled via explicit join messages. Bidirectional PIM is deigned to be used for one-to-many applications.

A customer has an existing Wan circuit with a capacity 10 mbps. The circuit has 6 Mbps of various user traffic and 5 mbps of real-time audio traffic on average. Which two measures could be taken to avoid loss of real time Traffic? (Choose Two). Police the traffic to 5 Mbps and allow excess traffic to be remarked to the default queue. Configure congestion avoidance mechanism WRED within the priority queue. Policy the traffic to 3.3 Mbps and allow excess traffic to be remarked to the default queue. Increase the wan circuit bandwidth. Ensure that real time traffic is prioritized over other traffic.

An engineer is implementing VXLAN to extend layer 2 traffic at three geographically diverse data centers.Which feature is required at each data center to extend traffic?. VTEP. VLSM. VRRP. VPLS. VRF.

Which action should be taken when implementing a preferred IPS design?. Place the management interface on a separate VLAN. Place all sensors on PVLAN community ports. Place the management interface on the same VLAN. Place the monitoring interface on the inside network.

Which two types of authentication mechanisms can be used by VRRP for security? (Chose two). PEAP. SHA-1. SHA-256. plaintext authentication. MD5.

A LAN infrastructure consists of switches from multiple vendors. Spanning Tree is used as a Layer 2 loop prevention mechanism. All configured VLANs must be grouped in two STP instances. Which standards-based Spanning Tree technology must be used?. MSTP. Rapid PVST. STP. RSTP.

An engineer wants to ensure that common services communicate to several applications in various EPGs. Which two features within Cisco ACI accomplish this goal? (Choose two.). contract. filter. bridge domain. tenant. application profile.

Which two options are features of a scalable cluster design utilizing Cisco ASA firewalls? (Choose two.). The design supports up to 1 Terabyte of aggregate traffic. Each cluster supports up to 10 ASA devices. The design supports up to 100 Gbps of aggregate traffic. The ASA cluster activetly load balances traffic flows. Each member of the cluster can forward every traffic flow.

Refer to the exhibit An engineer must apply IP addressing to five new WAN sites and chooses the new subnets pictured. The previous administrator applied the addressing at Headquarters. Which option is the minimum summary range to cover the existing WAN sites while also allowing for three additional WAN sites of the same size, for future growth?. 10.0.60.0/18. 10.0.64.0/21. 10.0.64.0/17. 10.0.0.0/17. 10.0.64.0/18.

An engineer wants to assure that host can locate routers that can be used as a gateway to reach IP based devices on other networks. Which first hop redundancy protocol accomplishes this goal?. VRRP. GLBP. IRDP. HSRP.

An engineer is seeking to improve access layer convergence. Which two actions accomplish this goal? (Choose two). Configure storm control. Utilize Rapid PVST+. Implement MST. Propagate all VLANs to switches. Prune unused VLANs to switches.

What added enforcement feature is available on IDS-based devices to terminate active malicious traffic?. Signature detection. TCP reset. SNMP alert. Layer 4 filtering.

Where should loop guard the implemented in a campus network design?. Ports configured with port fast. Alternate ports only. Ports configured with root guard. Alternate, backup and root ports.

An engineer has been asked to purpose a solution for a campus network that offers the capability to create multiple Layer 3 virtual networks. Each network must have its own addressing structure and routing table for data forwarding. The proposed design must be scalable to support a high number of virtual networks allowing simple configuration and management with minimal administrative overhead. Which technology does the engineer recommend?. hop-by-hop VRF-Lite. multihop IPsec tunneling. multihop MPLS core. hop-by-hop easy virtual network.

What is the outcome when RPF check passes successfully?. Packet is dropped because if arrived on the interface that used to forward the packet back to source. Packet is dropped because if arrived on the interface that used to forward the packet back to destination. Packet is forwarded because if arrived on the interface that used to forward the packet back to destination. Packet is forwarded because if arrived on the interface that used to forward the packet back to source.

How does OTV provide STP isolation?. By using STP root optimization. By using BPDU guard. By dropping BPDU packets. By using BPDU filtering.

An engineer is working on an OSPF network design and wants to minimize the failure detection time and the impact on the router CPU. Witch technology accomplishes this goal?. LSA pacing. LSA delay interval. BFD. Fast hellos.

An engineer has been requested to utilize a method in an ACI network that will ensure only permitted communications are transmitted between End Point Group tier in a three tier application. Which element would be utilized to accomplish within the fabric?. Contract. Filter. Subject. Label.

While designing quality of services policies, which two of traffic must be prioritized as management traffic? (choose two). RADIUS. SSH. HTTPS. ICMP. SCP.

How many multicast groups can one multicast MAC address represent?. 128. 16. 1. 32.

When a new data center fabric is designed, which to protocols can be replaced when using FabricPath to create a loop-free topology? (Choose two). STP. GLBP. LACP. HSRP. MST.

What are the two main elements used by RBAC to provide secure access within an Enterprise? (Choose two). User Privileges. User Roles. User Profile. User Domains. User Locales.

An engineer is considering time of convergence in a new Layer 3 environment design. Which two attributes must be considered? (Choose two). Addition of a valid forwarding path. Loss of a valid forwarding path. SPT timers update. OSPF database updates. Forwarding table updates.

Which first hop redundancy protocols ensures that loading occurs over multiple routers using a single virtual ip address and multiple MAC address?. GLBP. IRDP. HSRP. VRRP.

Which IPv6 migration strategy supports IPv4 and IPv6 on the same router?. IPv6 tunneling. dual-stack. NAT. IPv6 translation.

An engineer has been asked to design a LAN topology with high Availability and the loop-free features of STP. It must also support Etherchannel between multiple chassis and a separate control plane for each switch terminating these multiple connections. Which technology should the engineer recommend to be deployment on the upstream switches?. VSS. StackWise. VPC. VDC.

Which STP feature can prevent other switches on the network from becoming the root switch, but still allow that interface to participate in STP otherwise?. UDLD. Bridge Assurance. BPDU Guard. Root Guard.

A company must acquire registered IP address space from a regional Internet authority and multi-home their Internet connection to multiple Internet service providers. Due to limited IPv4 address availability, the company was able to allocate only a /24 address block. Which method must be used to ensure that the primary data center receives all traffic unless It is offline?. BGP, Advertise two /25 address blocks to each ISP at the secondary DC and a /24 at the primary DC. EIGRP, Advertise two /25 address blocks to each ISP at the primary DC and a /24 at the secondary DC. BGP, AS prepend at the secondary DC. OSPF, AS prepend at the secondary DC.

A company is building a large data center. About 80% of ints traffic will be North to South an the other 20% will be East to West. The company is also expecting a significant amount of data center growth over the next 5-10 years but wants to keep the cost of growth low. Which data center design is the best suited to meet these goals?. Two-tier design with the layer 2 termination on data center core. A Spine and leaf design with layer 2/3 termination on the leaf nodes. A Spine and leaf design with layer 2/3 termination on the spine nodes. A three-tier design with the layer 3 termination on data center core.

A legacy OSPF network design solution historically included a large number of routers in a single backbone area 0. The network currently has over 300 OSPF routers. How is this network redesigned to further expansion?. Implement route summarization on the routers in backbone area. Use EIGRP routing protocol instead of OSPF. Adjust OSPF timers to smaller values. Break down area 0 into smaller non-backbone areas.

Which feature regarding a FlexLink design is true?. It optimized the access switch density. It permits VLANs to extend across access switches that connect to a common aggregation module. All of the uplinks are in active state. The aggregation layers aware of FlexLinks.

A dual-homed office is opposed to using path optimization by flows. Which feature helps application resiliency?. ATM. CEF. PfR. MLPPP.

Which mechanism is enabled by default in the OTV technology to conserve bandwidth?. Unknown unicast flooding suppressed over the OTV link. Control plane traffic is prevented from traversing the OTV link. BPDUs are allowed to traverse the OTV link. Data plane traffic is prevented from traversing the OTV link.

During an upgrade of an existing data center, a network team must design segmentation into existing networks, Due to legacy applications, the IP address cannot change. Which firewall deployment model meets these requirements?. multicontext mode. cluster mode. routed mode. transparent mode.

An engineer must optimize a single-homed connection in a small branch office. Which technology accomplishes this goal?. DMVPN. MPLS. WAE. MSE.

Drag and drop the WAN characteristics from the left onto the correct WAN technology categories on the right. used for layer 2 point-to-point interconnections. requires a full mesh of layer 2 interconnections. provides scalable layer 2 WAN connectivity. offers low const WAN connectivity with relatively high bandwidth.

Refer to the exhibit. The branch routers have external connectivity to an upstream Area 0 router. An engineer has been asked to propose a simplified OSPF routing design that provisions only a default route to the branches. The branch routers must receive noother routers from the upstream router. Which type of OSPF area does the engineer implement for the branches?. normal area. stubby area. not-so-stubby area. totally stubby area.

An outsourced call center is using SIP VoIP telephony that imposes restrictions on the use of NAT. the company expects the number of call center staff to grow from 100 to 200 people. Which two design solutions ensure the most cost efficient and scalable way for call center staff to access internal corporate applications? (Choose two.). Request that the call center use public IP addresses for agent workstations. Implement 1-to-1 NAT translation for each of the agent workstations. Provide the call center with a/24 private IP subnet that is unique on both sides. Utilize NAT pool to translate IP addresses provided by the call center. Configure a single IP address to create dynamic port translations for agent workstations.

An engineer is integrating a recently acquired company's network that has overlapping IP address spaces. Users of the new acquisition must have access to corporate applications. Which action is the most efficient way to provide this access?. Build 1-to-1 NAT translation for users that need access. Use a single IP address to create overload NAT. Create NAT translation by utilizing a pool of NAT IP addresses. Re-IP overlapping address space in the acquired company.

Which two security measures must an engineer follow when implementing Layer 2 and Layer 3 network design? (Choose two). Utilize the native VLAN only on trunk ports to reduce the risk of an Double-Tagged 802.1q VLAN hopping attack. Utilize an access list to prevent the use of ARP to modify entries to the table. Utilize DHCP snooping on a per VLAN basis and apply ip dhcp snooping untrusted on all ports. Utilize the ARP inspection feature to help prevent the misuse of gARP. Utilize private VLANs an ensure that all ports are part of the isolated port group.

On which type of port is STP disabled ?. Etherchannel. P2P Edge. Portfast. Flexlink.

An engineer is creating an IPv6 migration strategy with a transition mechanism to provide the best performance possible. It should use native forwarding in hardware (if supported by the platform) and should not add any encapsulation overhead. Which mechanism meets this requirement?. 6to4. dual stack. IPv6 Rapid Deployment. TEREDO.

An engineer has proposed the deployment of a Cisco ACI fabric solution to introduce automation and zero- touch operation experience to a DC network. Which type of virtualization technology is utilized by the Cisco ACI to encapsulate the traffic inside the fabric and to virtualize the physical infrastructure?. STP. IPSec. VXLAN. NSX.

An engineer is designing an IBGP solution and must mitigate the full-mesh requirement without increasing the number of BGP neighbor relationships. Which IGBP feature helps the engineer achieve this goal?. confederation. AS path prepend. directly connected IBGP peers. route reflector.

Which two actions can be taken on Cisco LAN switches to provide basic denial-of-service protection? (Choose two.). Disable PortFast. Enable IP Source Guard. Enable DHCP Snooping. Enable BPDU Guard. Disable Spanning Tree Protocol.

An engineer is working on a design solution for a large hub-and-spoke EIGRP network. Which feature helps to make this design more stable white also reducing resource utilization?. QoS. route filter. network summarization. stub routing.

Management has chosen to Implement a top of the rack data center design. Which two benefits of moving to this model are true? (Choose two.). decreased cabling costs. easier per rack upgrades. directly connected racks in the row. fewer ports required in the aggregation. fewer switches to manage.

Which VPN is the be choice when multivendor interoperability is required?. DMVPN. Cisco Easy VPN. IPsec VPN. GET VPN.

A network architect is designing a VPN solution far a client with these requirements: • multicast supported • 80% oltraffic Is spoke-to-spoke • minlmalconfiguratlon Which VPN type is the best choice?. DMVPN. IPsec direct encapsulation. GRE overIPsec. VTI.

A company has a regulatory requirement that all connections between their sites must be encrypted in a manner that does not require maintenance of permanent tunnels. The remote offices are connected by a private MPLS-based service that requires a dynamically changing key, spoke-to-spoke communication, and reuse of the existing IP header. Which type of transport encryption must be used?. GETVPN. GRE VPN. DMVPN. Sandard IPsec VPN.

Management has requested that all web traffic be filtered through a proxy without the client's knowledge. Which mode does an engineer use to design the web proxy to accomplish this task without additional configuration of the web browser?. explicit mode without PAC files. explicit mode with PAC files. transparent mode with WCCP. transparent mode without WCCP.

You are using the MST protocol. Which standard protocol is used inside each MST instance to provide fast convergence?. 802.1d. 802.1q. 802.1s. 802.1w.

An engineer is using communities to control the routinginformation among BGP peers. A specific route must be known by iBGP peers, but it must not be propagated to any upstream eBGP peers. Which BGP community accomplishes this goal?. no-export. no-export-subconfed. no-peer. no-advertise.

An engineer must create a BGP clesign that allows traffic load balancing. Which BGP feature must be enabled manually to achieve this design?. extended communities. maximum-prefix. maximum-paths. confederations.

Refer to the exhibit. Router A and Router B are route reflectors. The other five routers are route reflector clients of both Router A and Router'B. How many BGP peering sessions are needed to create full connectivity inside the network?. 6. 10. 11. 21.

Drag and drop the Data Center traffic flow characteristics from the left onto the correct traffic flow types on the right. smaller percentage of total data center traffic volume. access to a Web server from an end user. externally sourced client-server traffic. virtual machine migration. synchronous storage replication. state replication between servers in the same cluster.

class-map match-all Video_Class match ip dscp af41 class-map match-all Voice_Class match ip dscp ef class-map match-all Signaling_Class match ip dscp cs3 ! policy-map Collaboration class Video_Class police 500000 8000 conform-action transmit exceed-action set-dscp-transmit csl class Signaling_ Class police 48000 8000 conform-action transmit exceed-action set-clos-transmit 1 class Voice_Class police 289000 8000 conform-action transmit exceed-action drop class class-default set dscp default ! interface gig0/1 service-policy output Collaboration Refer to the exhibit. How does the network treat excess SIP traffic when congestion occurs?. It queues the traffic by using a DSCP value of CS1. It transmits the traffic by using a QoS value of 1. It assigns the default DSCP value to the traffic. It drops the traffic.

Which Cisco technology uses the IS-IS protocol to avoid STP in the data center?. FabricPath. TRILL. VPC. VSS.

Which two characteristics of MSDP when designing an inter-domain multicast network are true? (Choose two.). MSDP is a mechanism that allows RPs to share information about active sources. Any network utilizing iBGP or eBGP can use MSDP. In the PIM-SM model, multicast sources and receivers must register with their local RP. RPs in other domains have full knowledge of sources located in other domains. The MSDP speaker periodically sends SAs that include all sources in all discovered domains.

An engineer is configuring BGP as the routing protocol between the CE router of an enterprise and the PE router of the service provider. The interconnection between the CE and PE is direct and is provided through a Metro Ethernet link The engineer notices that attempts to hijack the established eBGP peering session have been made by a network segment that is not between the eBGP peers. Which BGP mechanism can be deployed to protect the session from this type of attack?. BGP outbound route filters. BGP TTL security check. BGP AS path length limiting. BGP communities.

router bgp 100 network 1.0.0.0 neighbor 20.20.20.20 remote-as 200 neighbor 20.20.20.20 route-map localonly out neighbor 30.30.30.30 remote-as 300 neighbor 30.30.30.30 route-map localonly out route-sap localonly permit 10 match as-path X ip as-path access-list 11 deny 20.20.20.20 ip as-path access-list 11 deny 30.30.30.30 ip as-path access-list 11 permit 1.0.0.0 0.255.255.255 ip as-path access-list 12 deny ^200$ ip as-path access-list 12 deny ^300$ ip as-path access-list 12 deny ^200_300$ ip as-path access-list 12 deny ^300_200$ ip as-path access-list 12 permit .* ip as-path access-list 13 permit ^$ ip as-path access-list 14 deny ^100$ Refer to the exhibit. You must deny your service providers from using your network as a transit AS. The solution must ensure that the network remains reachable. Which AS path access list do you use in the local only route map?. 11. 12. 13. 14.

When designing a Data Center Interconnect solution, which two statements describe benefits of utilizing a VPLS for Layer 2 extension? (Choose two.). Redundancy is addressed without enabling Spanning Tree Protocol in the core. The overlay of the Layer 2 connection on the Layer 3 transport hides any physical convergence. Integrated Layer 3 technology responds upon failure. A-VPLS utilizes the Cisco Catalyst 6500 Series VSS feature to provide native dual-homing. A-VPLS provides flow-based load balancing over equal-cost multipath paths.

An ISP is offering two MPLS circuits to an office when one of the links fails. Which routing feature provides the fastest possible convergence to the failover link?. BFD. UDLD. TTL. Multipath.

An engineer is responsible for the network security design of a small branch. Which security segment does the engineer propose to host the public services of the enterprise such as DNS, email, and web?. remote access VPN. service provider edge. public access DMZ. external public network.

Refer to the exhibit. An engineer is integrating a new partner company and has discovered an IP address overlap. Which configuration allows the organizations to communicate without changing the IP addressing scheme?. ip nat pool NAT-Outside 10.10.10.1 10.10.10.254 prefix-length 25 type match-host. ip nat inside source list NAT-List pool NAT-Outside overload type match-host. ip nat pool NAT-Outside 10.10.10.1 10.10.10.254 255.255.255.0 type match-host. ip nat pool NAT-Outside 10.10.10.1 10.10.10.254 netmask 255.255.225.0 type match-host.

An engineer is designing an OSPF network with multiple nonbackbone areas connected to the backbone area via a hub-and-spoke topology. Each hub-and-spoke area has a large number of spoke routers connected to the hub that is functioning as an ABR to provide better segmentation. Which two actions improve the stability of this design? (Choose two.). Configure hub-and-spoke areas as stub. Use External Type 2 metric: across the OSPF domain. Configure hub-and-spoke areas as totally stubby. Implement summarization on the ABR routers of hub-and-spoke areas. Implement summarization on the ASBR routers in the backbone area.

A network engineer is evaluating an architecture that utilizes VSS for the data center module. Which two advantages of using VSS technology are true? (Choose two.). It removes the need for Hot Standby Router Protocol. It removes the need to configure redundant switches with identical policies. Each switch has a separate control plane. It is capable of supporting live migration of virtual machines as they move from one physical server to another. It adds arbitrary forwarding topologies on top of a fixed routed underlay topology.

An office has requested to set up a backup link to the internet. Which routing protocol helps to achieve multihoming with two different ISPs?. iBGP. IS-IS. eBGP. EIGRP.

Refer to the exhibit. The voice class uses 200 Mb of bandwidth and the stowing Oats uses 50 Mb of bandwidth. What happens to the unused bendweith? class-map match-all Video_Class match ip dscp af41 class-map match-all Voice_Class match ip dscp ef class-map match-all Signaling_Class match ip dscp cs3 ! policy-map Collaboration class Video_Class police 5000000 8000 conform-action transmit exceed-action drop class Signaling_Class bandwidth 100000 class Voice_Class priority 300000 class class-default set dscp default ! interface gig0/1 service-policy output Collaboration. It is shared by other classes. It is reserved for the voice class. It is used by the video class. It is reserved for the signaling class.

Drag and drop the network campus design requirements or characteristics from the left onto the correct hierarchical design architectures on the right Not all options are used. Large enterprise campus network with several buildings. Maximized performance and network availability. Network expected to grow over time. Small remote campus with several floors within a building. Cost effective solution for campus networks. Collapses the core and distribution layers.

A network engineer must propose a scalable enterprise campus access distribution design model. Which two scaling factors are the most important to be considered for the Virtual Switching System model? (Choose two.). VSS stops VLAN spanning to the access switches. Both VSS nodes are active from control-plane perspective. STP must be implemented as a loop avoidance mechanism. VSS eliminates the need to implement FHRP for each VLAN. SW root and FHRP primary must be tuned at the same node.

An enterprise EIGRP network has been growing rapidly. After several recent outages, the network must be redesigned to facilitate further growth and address scalability concerns. Which two actions must be performed to accomplish this redesign? (Choose two.). Replace the routers with newer models. Utilize authentication between the peers. Increase bandwidth capacity between the peers. Break down routing domain into multiple autonomous systems. Implement route summarization.

A customer has several remote sites connected with the HQ via microwave links. An engineer has been asked to propose a backup WAN connectivity for these sites with these requirements • Physical WAN connectivity is not available for most of these sites • A low-cost and fast-to implement backup solution must be deployed. • Bandwidth needs for the backup link are low • Users can tolerate a WAN outage of up to 2 hours Which backup WAN link type does the engineer recommend?. laser link. 802.15.1 Bluetooth. LTE 802.16. WiMAX.

Which two steps does a router take to do an RPF check? (Choose two.). The router looks up the destination address in the unicast routing table to determine if the packet has arrived on the interface that is on the reverse path back to the source. If the packet has not arrived on the interface leading back to the source, the packet is forwarded. If the packet has arrived on the interface leading back to the source, the packet is dropped. if the packet has not arrived on the interface leading back to the source, the packet is dropped. The router looks up the source address in the unicast routing table to determine if the packet has arrived on the interface that is on the reverse path back to the source.

Which description of how virtual MAC addresses are assigned to the members of a GLBP group is true?. Each device assigns its own address. The AVG assigns the addresses. The AVF assigns the addresses. The device that has the highest IP address assigns the addresses.

Which multicast technology improves management of multiple multicast domains?. IGMP. PIM-DM. PIM-SP. MSDP.

An engineer is designing an OSPF network with multiple non backbone areas connected to the backbone area via a hub-and-spoke topology. Each hub-and-spoke area has a large number of spoke routers connected to the hub that is functioning as an ABR to provide better segmentation. Which two actions improve the stability of this design? (Choose two.). Configure hub-and-spoke areas as stub. Use External Type 2 metric across the OSPF domain. Implement summarization on the ASBR routers in the backbone area. Configure hub-and-spoke areas as totally stubby. Implement summarization on the ABR routers of hub-and-spoke areas.

Refer to the exhibit. The network uses STP. All switches use the default priority and have the same bandwidth. Which description of the network is true?. S3 is elected as the root bridge. S2 is elected as the root bridge. Host A can always reach host B through S1. The redundant links between the switches are blocked.

Which benefit of using VRRPv3 as compared to VRRPv2 is true?. supports authentication. supports preemption. supports stateful switchover. supports IPv4 and IPv6 in separate VRRP groups.

A network consultant must propose a scalable access distribution model where an alternative to STP technology is used to prevent Layer 2 loops. The proposed model must include these features: - VIANs that span across the access switches - eliminate the need for a FHRP protocol - multichassis Ethernet technology to provide fast convergence in case of link failure Which design model does the consultant propose?. multitier looped square access model. multitier looped triangle access model. routed access model. virtual switch model.

An engineer must ensure Layer 2 extension capabilities over any transport infrastructure. Which interconnective data center functionality satisfies this requirement?. Private line. OTV. EoMPLS. VPLS.

You are designing a scalable cluster that contains a combination of Cisco APIC-M and APIC-I. controllers. Which controller provides the scalability used in the cluster?. APIC-M. APIC-EM. APIC-L. combination of APIC-M and APIC4.

Drag and drop the Data Center traffic flow characteristics from the left onto the correct traffic flow types on the right. access to a web server from end user. externally sourced client server traffic. externally sourced client server traffic North-south traffic Smaller percentage of total data center traffic volume. Virtual machine migration. Synchronous storage replication. State replication between servers in the same cluster.

Denunciar Test