Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Your client is considering acquiring a new IPv6 address block so that all Ethernet interfaces on the network receive addresses based on their burned-in hardware addresses, with support for 600 VLANs. Which action do you recommend?

A.

Acquire a new /60 IPv6 network and subnet it into /70 networks, one per VLAN

B.

Acquire a new /58 IPv6 network and subnet it into /64 networks, one per VLAN

C.

Acquire a new /60 Ipv6 network and subnet it into /68 networks, one per VLAN

D.

Acquire a new/54 IPv6 network and subnet it into /64 networks , one per VLAN

Full Access
Question # 5

Which two options are considered risks or concerns when both the Internet and VPN service functions are on the same PE router? (Choose two.)

A.

Internet-based attacks can affect VPN customers.

B.

BGP cannot simultaneously run on the PE router that runs MPLS.

C.

MP-BGP prefixes increase routers' global routing tables, which affects network convergence.

D.

Failure on the PE router affects both VPN and Internet services.

E.

Customer performance can be affected by VPN traffic if Internet-based traffic is not prioritized on the PE

Full Access
Question # 6

What are two benefits of following a structured hierarchical and modular design? (Choose two.)

A.

Each component can be designed independently for its role.

B.

Each component can be managed independently based on its role.

C.

Each component can be funded by different organizations based on its role.

D.

Each component can support multiple roles based on the requirements.

E.

Each component can provide redundancy for applications and services.

Full Access
Question # 7

Refer to the exhibit.

Company A is running a single-area OSPF, and Company B is running RIP as the IGP with no overlapping IP address spaces. Company A has just acquired Company B and both networks must be merged. Which three design components are recommended to guarantee connectivity and redundancy between the two networks? (Choose three.)

A.

Enable mutual redistribution between OSPF and RIP on one border router.

B.

Enable mutual redistribution between OSPF and RIP on Router A and Router B using route tags.

C.

Increase the administrative distance to 130 for the OSPF external prefixes on Router A and Router B.

D.

Implement an ACL on Router A and Router B to prevent OSPF external routes from being installed in the OSPF database.

E.

Filter external routes on Router A and Router B based on route tags.

Full Access
Question # 8

A large enterprise network has two data centers and a WLAN edge with a large hub-and spoke network. The complete network is configured as a single OSPF area, and spoke routers are connected to unreliable WAN links. Which two changes should you make to deploy LSA on the spoke routers? (Choose two)

A.

Place spoke routers in stub areas

B.

Make the hub routers ABR

C.

Make the hub routers ASBR

D.

Place spoke routers in totally stubby areas

E.

Keep the spoke routers in normal areas

Full Access
Question # 9

Which two options are reasons for designing a large OSPF network with multiple areas connected to the backbone? (Choose two)

A.

Reduce the number of routes within an area

B.

Route tagging capability

C.

Simplify logical topology

D.

Enhance failure detection

E.

Reduce SPF algorithm runs

Full Access
Question # 10

An enterprise customer A with provider-independent address space is dual-homed to two ISP. Which two options , when combined, allow for customer A to efficiently achieve out-bond traffic load-balancing? ( Choose two)

A.

Advertise Customer A subnets with a shorter AS path prepend to one of the ISPs than to the other

B.

Advertise Customer A subnets with different MED values to the two ISPs

C.

Accept a default route from both ISPs

D.

Make the CE connected to both ISPs route reflector

E.

Accept the routes originated on both ISPs and their direct peers

Full Access
Question # 11

Full Access
Question # 12

Which feature must be part of the network design to wait a predetermined amount of time before notifying the routing protocol of a change in the path in the network?

A.

Transmit delay

B.

Throttle timer

C.

SPF hold time

D.

Interface dampening

Full Access
Question # 13

Refer to the exhibit.

A customer interconnected hundreds of branch offices into a single DMVPN network, with the HUB in the main data center. Due to security policies, the customer requires that the default route for all Internet traffic from the users at the branches must go through the tunnel and the only connections that are allowed to and from the branch router over the local internet circuit are the DMVPN tunnels. Which two combined actions must you take on the branch router to address these security requirements and keep the solution scalable? (Choose two)

A.

Place the WAN interface in a front-door VRF, leaving the tunnel interface in the default routing instance

B.

Protect the WAN interface by an inbound ACL that permits only IPsec-related traffic

C.

Implement a zone-based firewall that allows only IPsec-related traffic from zone UNTRUSTED to zone TRUSTED

D.

Add a host route for the public IP address of each remote branch and HUB routers that points directly to the local ISP, and add a default route that points to the tunnel

E.

Use a floating default route with the preferred path over the tunnel and a backup path over the Internet natively

Full Access
Question # 14

Refer to the exhibit.

How should you redesign this network running BGP to improve availability of the routers 1A and 1B at the core site?

A.

Deploy BGP PIC

B.

Use link bundles over multiple slots

C.

Enable graceful restart

D.

Create a multichassis system with the two routers

Full Access
Question # 15

Which two options are Loop-Free Alternate design considerations? (Choose two)

A.

MPLS TE must be enabled because it is used for building the backup paths

B.

Backup coverage and effectiveness is dependent on the network topology

C.

It can simplify the capacity planning by matching the backup path with the post-convergence path

D.

It provides an optional backup path by avoiding low bandwidth and edge links

E.

It can impact SLA-sensitive appliance by routing traffic to low bandwidth links while IGP convergence is in progress

Full Access
Question # 16

Refer to the exhibit.

As part of a redesign project, you must predict multicast behavior. What is the resultant multicast traffic receiving on the shared tree( , G), if it is received on the LHR interface indicated?

A.

It is dropped due to an unsuccessful RPF check against the multicast receiver

B.

It is switched due to a successful RPF check against the routing table

C.

It is switched given that no RPF check is performed

D.

It is dropped due to an unsuccessful RPF check against the multicast source

Full Access
Question # 17

Company ABC grew organically and now their single-area OSPF network has an unacceptably slow convergence time after a topology change. To address the slow convergence time, they want to introduce a multiarea OSPF design and implement address summarization at the area border routers, which option should be their main concern about this redesign?

A.

Routing is suboptimal

B.

SPF calculation takes longer

C.

Operations complexity is increased

D.

More memory is needed across the routers on the network

Full Access
Question # 18

You have been asked to design a high -density wireless network for a university campus. Which two principles would you apply in order to maximize the wireless network capacity? (Choose two.)

A.

Implement a four-channel design on 2.4 GHz to increase the number of available channels.

B.

Make use of the 5-GHz band to reduce the spectrum utilization on 2.4 GHz when dual-band clients are used.

C.

Choose a high minimum data rate to reduce the dory cycle.

D.

Enable 802.11n channel bonding both 2.4 GHz and 5 GHz to increase the aggregated cell throughput.

E.

Increase the number of SSIDs to load-balance the client traffic.

Full Access
Question # 19

Drag the fast Reroute mechanism on the left and drop it onto the corresponding routing protocol on the right

Full Access
Question # 20

Refer to the exhibit.

ACME Mining has four data centers in Santiago, Cape Town, Mumbai, and Beijing. They are full-mesh connected via a 400 Mb/s EVP-LAN. A 1-TB transfer occurs daily via FTP between the Santiago and Mumbai data centers. When testing, the data transfer took an ''unexpected and outrageous, with an average transfer rate of 47 KB/s. The team provided this information.

LAN bandwidth usage below 5% at both data centers during transfer.

WAN bandwidth usage was between 20-30% at both data centers during transfer.

The only QoS on WAN is KB/s strict priority configured for other types of traffic.

There is no QoS on LAN.

The ping RTT average between data centers is 378 milliseconds.

Which action improves the file transfer rate?

A.

Use SFTP instead of FTP

B.

Apply optimization techniques at both data centers.

C.

Use TFTP instead of FTP.

D.

Classify FTP transfer and use the strict priority queue on the WAN.

Full Access
Question # 21

You are redesigning a high-speed transit network due to congestion-related issues. Which congestion avoidance mechanism can you apply to the existing network?

A.

NBAR

B.

FIFO

C.

WRED

D.

Rate-limit

E.

Policy-Based Routing

Full Access
Question # 22

ACME Corporation is deploying a new HR application that requires the network infrastructure to monitor and react to certain condition in the network.

Which feature should be used to meet this design requirement?

A.

IP SLA

B.

reflect ACLs

C.

Cisco IOS Embedded Event Manager

D.

SOAP

Full Access
Question # 23

Your customer asks you to assist with their traffic policy design. They want to guarantee a minimum amount of bandwidth to certain traffic classes. Which technique would you advise them to implement?

A.

Modular QoS CLI

B.

committed access Rate

C.

policy-based routing

D.

traffic shaping

Full Access
Question # 24

Refer to the exhibit.

Which routing solution is the most scalable to connect the branches to the HQ and to connect the branches together over the internet using DMVPN?

A.

EIGRP

B.

EIGRP with the branch routers setup as stubs

C.

OSPF with each branch router as an ABR

D.

IS-IS L2 in all locations

E.

OSPF Area 0 in all locations

Full Access
Question # 25

When designing a network .Which method can be used to control the exit point for traffic an autonomous system, at the layer 3 control plane?

A.

Prepending AS path.

B.

Tuning the multi-exit discriminator.

C.

Setting the site of Origin extended community.

D.

Tuning the metric of the under-tying IGP.

Full Access
Question # 26

Which two statements about VXLAN are true? (Choose two)

A.

VXLAN is a Cisco proprietary solution

B.

VXLAN is an encapsulation method used to create a Layer 3 overlay network

C.

VXLAN can be used to enforce Layer 2 isolation in a multitenant infrastructure

D.

VXLAN uses the Spanning Tree protocol for loop prevention

E.

VXLAN overcomes the 802.1Q virtual LAN address space limitation

Full Access
Question # 27

Refer to the exhibit.

This Layer 2 ring has 10 VLANs with 1000 MAC addresses in each VLAN. Which protocol or mechanism provides the shortest traffic outage if the link marked with “X” fails?

A.

Ethernet linear protection switching

B.

PVRST

C.

MST

D.

Ethernet ring protection switching

Full Access
Question # 28

A service provider is designing a new backbone based on an IGP and MPLS what are two valid reasons for implementing MPLS-TE as well? (Choose two)

A.

MPLS-TE is required to reroute traffic within less than 1 second in case of a link failure inside the backbone

B.

MPLS-TE can detect and react to neighbor failures faster than IGPs can

C.

MPLS-TE is required to route different MPLS QoS Service classes through different paths

D.

MPLS-TE is required to create backup paths independently from the IGP

E.

MPLS-TE is a prerequisite for implementing RSVP in the backbone

Full Access
Question # 29

A network is designed to use OSPF to reach eBGP peers. For eBGP peers to stay stable in case of a link failure, what condition should be avoided?

A.

Advertise IP addresses used on eBGP statements via a normal OSPF area

B.

Use an ACL to block BGP in one direction

C.

Disable BGP synchronization

D.

Advertise IP addresses used on eBGP peer statements via eBGP

Full Access
Question # 30

When designing fast convergence on a network using loop-free alternate, on which two basis can the next-hop routes be precomputed? (Choose two)

A.

Per neighbor

B.

Per network type

C.

Per link

D.

Per prefix

E.

Per failure type

Full Access
Question # 31

Refer to the exhibit.

You are designing MPLS-TE for this network. The links form Perth to Sydney and from Perth to Adelaide share the same optical fiber in one given segment. Which feature should you implement to eliminate the risk that a backup tunnel is installed over the same optical fiber as the primary one?

A.

Shared Risk Link Groups

B.

MPLS-TE Path Protection

C.

MPLS-TE auto-tunnel backup

D.

MPLS-TE Link protection

Full Access
Question # 32

The service provider that you work for wants to offer IPv6 internet service to its customers without upgrading all of its access equipment to support IPv6, which transition technology do you recommend?

A.

NAT64

B.

CGN

C.

Dual-stack CPE

D.

6RD

Full Access
Question # 33

Which two OSPF network type combinations can you use in the design that requires spoke-to-spoke direct traffic? (Choose two.)

A.

hub as point-to-multipoint and spokes as non-broadcast

B.

hub as point-to-multipoint and spokes as point-to-point

C.

hub as broadcast and spokes as non-broadcast

D.

hub as point-to-point and spokes as point-to-point

Full Access
Question # 34

Which two functions are performed at the distribution layer of the three-layer hierarchical network design model? (Choose two)

A.

Fast transport

B.

QoS classification and marking boundary

C.

Fault isolation

D.

Redundancy and load balancing

E.

Reliability

Full Access
Question # 35

How must queue sizes be designed to ensure that an application functions correctly?

A.

The default queue sizes are good for any deployment

B.

Each individual device queuing delay in chain must be less than or equal to the application required delay

C.

The queuing delay on every device in chain must be exactly the same

D.

The sum of the queuing delay of all devices in chain must be less than or equal to the application required delay

Full Access
Question # 36

For a redesign requirement of the service provider network, summarization was implemented at multiple locations for each summary range. Now some customers of the service provider are complaining of higher latency and performance issues for a server hosted in the summarized area. Which design issues must be considered when creating the summarization?

A.

Summarization adds CPU overhead on the routers sourcing the summarized advertisement.

B.

Summarization prevents the visibility of the metric to the component subnets.

C.

Summarization causes packet loss when RPF is enabled.

D.

Summarization creates routing loops.

Full Access
Question # 37

As a part of a network design, you should tighten security to prevent man-in-the-middle. Which two security options ensure that authorized ARP responses take place according to know IP-to-MAC address mapping? (Choose two)

A.

DHCP snooping

B.

ARP spoofing

C.

ARP rate limiting

D.

Dynamic ARP Inspection

E.

Port security

Full Access