Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

When designing a WAN that will be carrying real-time traffic, what are two important reasons to consider serialization delay? (Choose two.)

A.

Serialization delays are invariable because they depend only on the line rate of the interface.

B.

Serialization delays are variable because they depend on the line rate of the interface and on the type of the packet being serialized.

C.

Serialization delay is the time required to transmit the packet on the physical media.

D.

Serialization delays are variable because they depend only on the size of the packet being serialized.

E.

Serialization delay depends not only on the line rate of the interface but also on the size of the packet.

Full Access
Question # 5

A network design includes a long signaling delay in notifying the Layer 3 control plane that an interface has failed. Which two of these actions would reduce that delay? (Choose two.)

A.

Increase network stability.

B.

Reduce the time for the network to reconverge.

C.

Increase the notification of interface flaps.

D.

Enable lower data link layer recovery systems to have an opportunity to restore the interface.

Full Access
Question # 6

What advantage of placing the IS-IS Layer 2 flooding domain boundary at the core layer in a three-layer hierarchical network is true?

A.

The Layer 1 and Layer 2 domains can easily overlap

B.

It reduces the complexity of the Layer 1 domains

C.

It can be applied to any kind of topology

D.

The Layer 2 domain is contained and more stable

Full Access
Question # 7

Which two aspects are considered when designing a dual hub dual DMVPN cloud topology? (Choose two.)

A.

will only work with single-tier headend architecture

B.

hub sites must connect to both DMVPN clouds

C.

recommended for high availability

D.

spoke-to-spoke traffic will transit the hub unless spokes exchange dynamic routing directly

E.

requires all sites to have dual Internet connections

Full Access
Question # 8

You are designing the routing design for two merging companies that have overlapping IP address space. Which of these must you consider when developing the routing and NAT design?

A.

Local to global NAT translation is done after routing

B.

Global to local NAT translation is done before routing

C.

Local to global NAT translation is done before policy-based routing

D.

Global to local NAT translation is done after policy-based routing

Full Access
Question # 9

Which action must be taken before new VoIP systems are implemented on a network to ensure that the network is ready to handle the traffic?

A.

Evaluate bandwidth utilization and connection quality

B.

Enable special requirements such as direct DID lines on pickup

C.

Make recommendations to limit the size of the half-open session table on routers

D.

Check if anomaly detection is enabled for SIP and H.323 on Layer 3 devices

Full Access
Question # 10

Which tool automates network implementation activities and shortens the implementation lifecycle?

A.

LISP

B.

Java

C.

Conclusion

D.

Python

Full Access
Question # 11

Refer to the exhibit.

As part of a redesign project, you must predict multicast behavior. What happens to the multicast traffic received on the shared tree (*,G), if it is received on the LHR interface indicated?

A.

It is dropped due to an unsuccessful RPF check against the multicast source

B.

It is switched given that no RPF check is performed

C.

It is switched due to a successful RPF check against the routing table

D.

It is dropped due to an unsuccessful RPF check against the multicast receiver.

Full Access
Question # 12

Which best practice ensures data security in the private cloud?

A.

Use IPsec for communication between unsecured network connection

B.

Encrypt data at rest and in transition.

C.

Use the same vendor for consistent encryption.

D.

Anonymize data ownership to comply with privacy rules.

Full Access
Question # 13

Which two statements describe the usage of the IS-IS overload bit technique? (Choose two.)

A.

If overload-bit is set on a Level 2 intermediate system, the other Level 2 intermediate systems in the topology will stop using the overloaded IS to forward Level 2 traffic. However, the intermediate system can still forward Level 1 traffic.

B.

It can be set in intermediate systems (IS-IS routers) to prioritize control plane CSNP packets.

C.

It can be used to automatically synchronize the link-state database between Level 1 intermediate systems.

D.

It can be set in intermediate systems (IS-IS routers) to avoid traffic black holes until routing protocols are fully converged after a reload operation.

E.

It can be set in intermediate systems (IS-IS routers) to attract transit traffic from other intermediate systems.

Full Access
Question # 14

Refer to the table.

A customer investigates connectivity options for a DCI between two production data centers to aid a large-scale migration project. The migration is estimated to take 20 months to complete but might extend an additional 10 months if issues arise. All connectivity options meet the requirements to migrate workloads. Which transport technology provides the best ROI based on cost and flexibility?

A.

CWDM over dark fiber

B.

MPLS

C.

DWDM over dark fiber

D.

Metro Ethernet

Full Access
Question # 15

Which design benefit of PortFast is true?

A.

PortFast does not generate a spanning tree topology change when a station on a port is connected or disconnected

B.

PortFast disables spanning tree on the port, which puts the port into the forwarding state immediately after it is connected

C.

PortFast allows small, unmanaged switches to be plugged into ports of access switches without risking switch loops

D.

PortFast detects one-way communications on the physical port, which prevents switch loops

E.

PortFast prevents switch loops that are caused by a unidirectional point-to-point link condition on Rapid PVST+ and MST

F.

PortFast prevents switched traffic from traversing suboptimal paths on the network

Full Access
Question # 16

Agile and Waterfall are two popular methods for organizing projects. What describes any Agile network design development process?

A.

Working design over comprehensive documentation

B.

Contract negotiation over customer collaboration

C.

Following a plan over responding to change

D.

Processes and tools over individuals and interactions over time

Full Access
Question # 17

Your company wants to deploy a new data center infrastructure. Based on the requirements you have chosen VXLAN as encapsulation technology. The customer is concerned about misconfiguration of Layer 2 devices and DC-wide outages caused by Layer 2 loops. What do you answer?

A.

VXLAN offers native loop avoidance mechanism

B.

Storm Control should be enabled on all ports

C.

VPC+ could prevent L2 loop on access ports

D.

BPDU Guard should be enabled on all VTEP access ports

Full Access
Question # 18

What is a description of a control plane action?

A.

De-encapsulating and re-encapsulating a packet in a data-link frame

B.

Matching the destination MAC address of an Ethernet frame to the MAC address table

C.

Matching the destination IP address of an IP packet to the IP routing table

D.

Hosts locating routers that reside on attached links using the IPv6 Neighbor Discovery Protocol

Full Access
Question # 19

An engineer is designing the QoS strategy for Company XYZ. A lot of scavenger traffic is traversing the 20Mb Internet link. The new design must limit scavenger traffic to 2 Mbps to avoid oversubscription during congestion. Which QoS technique can be used?

A.

Class-based traffic policing

B.

LLQ

C.

CBWFQ

D.

Class-based traffic shaping

Full Access
Question # 20

Which methodology is the leading lifecycle approach to network design and implementation?

A.

PPDIOO

B.

Waterfall model

C.

Spiral model

D.

V model

Full Access
Question # 21

Company XYZ is planning to deploy primary and secondary (disaster recovery) data center sites. Each of these sites will have redundant SAN fabrics and data protection is expected between the data center sites. The sites are 100 miles (160 km) apart and target RPO/RTO are 3 hrs and 24 hrs, respectively. Which two considerations must Company XYZ bear in mind when deploying replication in their scenario? (Choose two.)

A.

Target RPO/RTO requirements cannot be met due to the one-way delay introduced by the distance between sites.

B.

VSANs must be routed between sites to isolate fault domains and increase overall availability.

C.

Synchronous data replication must be used to meet the business requirements.

D.

Asynchronous data replication should be used in this scenario to avoid performance impact in the primary site.

E.

VSANs must be extended from the primary to the secondary site to improve performance and availability.

Full Access
Question # 22

Backups and mirror copies of data are part of RPO (Recovery Point Objective) strategies. If a business wants to reduce their CAPEX for disaster recovery, which solution is most applicable?

A.

Perform an annual cybersecurity assessment or penetration test

B.

Renew backup software annually to get the newest version

C.

Migrate parts of or all the infrastructure to the cloud

D.

Build a redundant infrastructure at another location

Full Access
Question # 23

An IT service provider is upgrading network infrastructure to comply with PCI security standards. The network team finds that 802.1X and VPN authentication based on locally-significant certificates are not available on some legacy phones. Which workaround solution meets the requirement?

A.

Replace legacy phones with new phones because the legacy phones will lose trust if the certificate is renewed.

B.

Enable phone VPN authentication based on end-user username and password.

C.

Temporarily allow fallback to TLS 1.0 when using certificates and then upgrade the software on legacy phones.

D.

Use authentication-based clear text password with no EAP-MD5 on the legacy phones.

Full Access
Question # 24

A large enterprise is planning a new WAN connection to headquarters. The current dual-homed setup with static routing is not providing consistent resiliency. Users complain when one specific link fails, while failure of the other causes no issues. The organization wants to improve resiliency and ROI.

Which solution should be recommended?

A.

Implement granular quality of service on the links

B.

Procure additional bandwidth

C.

Use dynamic routing toward the WAN

D.

Add an additional link to the WAN

Full Access
Question # 25

What best describes the difference between Automation and Orchestration?

A.

Automation refers to an automatic process for completing a single task and Orchestration refers to assembling and coordinating a set of tasks and conditions.

B.

Automation describes a hands-off configuration process while Orchestration refers to sets of automation tasks that require the network administrator to coordinate.

C.

Automation refers to an automatic process for completing multiple tasks with conditions and Orchestration refers to executing tasks in parallel.

D.

Automation refers to scripting languages (Python, Ansible etc.) and Orchestration refers to commercial products that control configuration deployment.

Full Access
Question # 26

Company XYZ has a new network based on IPv6. Some of the subnets that they are planning to use will be confidential and need an addressing scheme that confines them to the local campus network. Which type of IPv6 addresses can be used for these networks in the IPv6 addressing design?

A.

local addresses

B.

private addresses

C.

link-local addresses

D.

unique local addresses

Full Access
Question # 27

Which two mechanisms avoid suboptimal routing in a network with dynamic mutual redistribution between multiple OSPFv2 and EIGRP boundaries? (Choose two.)

A.

AD manipulation

B.

Matching OSPF external routes

C.

Route tagging

D.

Route filtering

E.

Matching EIGRP process ID

Full Access
Question # 28

Which two benefits can software defined networks provide to businesses? (Choose two.)

A.

Provides additional redundancy

B.

Decentralized management

C.

Reduced latency

D.

Enables innovation

E.

Reduction of OpEx/CapEx

F.

Meets high traffic demands

Full Access
Question # 29

Which two design solutions ensure sub-50 msec of the convergence time after a link failure in the network? (Choose two)

A.

BFD

B.

Ti-LFA

C.

Minimal BGP scan time

D.

MPLS-FRR

E.

IGP fast hello

Full Access
Question # 30

Drag and drop the FCAPS network management reference models from the left onto the correct definitions on the right.

Full Access
Question # 31

Which statement about hot-potato routing architecture design is true?

A.

Hot-potato routing is the preferred architecture when connecting to content providers

B.

Hot-potato keeps traffic under the control of the network administrator for longer

C.

OSPF uses hot-potato routing if all ASBRs use the same value for the external metric

D.

Hot-potato routing is prone to misconfiguration as well as poor coordination between two networks

Full Access
Question # 32

You are tasked to design a QoS policy for a service provider so they can include it in the design of their MPLS core network. If the design must support an MPLS network with six classes, and CEs will be managed by the service provider, which QoS policy should be recommended?

A.

map IP CoS bits into the IP Precedence field

B.

map flow-label bits into the Exp field

C.

map IP precedence bits into the DSCP field

D.

map DSCP bits into the Exp field

Full Access
Question # 33

Which three Cisco products are used in conjunction with Red Hat to provide an NFVi solution? (Choose three.)

A.

Cisco Prime Service Catalog

B.

Cisco Open Virtual Switch

C.

Cisco Nexus switches

D.

Cisco UCS

E.

Cisco Open Container Platform

F.

Cisco Virtual Network Function

Full Access
Question # 34

An MPLS service provider is offering a standard EoMPLS-based VPLS service to Customer A, providing Layer 2 connectivity between a central site and approximately 100 remote sites. Customer A wants to use the VPLS network to carry its internal multicast video feeds which are sourced at the central site and consist of 20 groups at Mbps each. Which service provider recommendation offers the most scalability?

A.

EoMPLS-based VPLS can carry multicast traffic in a scalable manner

B.

Use a mesh of GRE tunnels to carry the streams between sites

C.

Enable snooping mechanisms on the provider PE routers

D.

Replace VPLS with a Layer 3 MVPN solution to carry the streams between sites

Full Access
Question # 35

Company XYZ network runs IPv4 and IPv6 and they want to introduce a multidomain, multicast-based network. The new design should use a flavor of PIM that forwards traffic using SPT. Which technology meets this requirement?

A.

PIM-DM

B.

PIM-SM

C.

PIM-SSM

D.

BIDIR-PIM

Full Access
Question # 36

An enterprise network has two core routers that connect to 200 distribution routers and uses full-mesh IBGP peering between these routers as its routing method. The distribution routers are experiencing high CPU utilization due to the BGP process. Which design solution is the most cost effective?

A.

Implement route reflectors on the two core routers

B.

Increase the memory on the core routers

C.

Implement eBGP between the core and distribution routers

D.

Increase the memory on the distribution routers

E.

Increase bandwidth between the core routers

Full Access
Question # 37

A financial company requires that a custom TCP-based stock-trading application be prioritized over all other traffic for the business due to the associated revenue. The company also requires that VoIP be prioritized for manual trades. Which directive should be followed when a QoS strategy is developed for the business?

A.

Allow VoIP and the custom application to share the same priority queue.

B.

The custom application and VoIP must be assigned their own separate priority queue.

C.

Interleave the custom application with other TCP applications in the same CBWFQ.

D.

Avoid placing the custom application in a CBWFQ queue that contains other traffic.

Full Access
Question # 38

Which two statements about MLD snooping are true? (Choose two)

A.

When MLD snooping is enabled, QoS is automatically enabled

B.

A VLAN can support multiple active MLD snooping queriers, as long as each one is associated to a different multicast group

C.

An MLD snooping querier election occurs when any MLD snooping querier goes down or if there is an IP address change on the active querier

D.

When multiple MLD snooping queriers are enabled in a VLAN, the querier with the lowest IP address in the VLAN is elected as the active MLD snooping querier

Full Access
Question # 39

You have been tasked with designing a data center interconnect to provide business continuity. You want to encrypt the traffic over the DCI using IEEE 802.1AE MACsec to prevent the deployment of any firewall or IPS. Which two interconnect technologies support MACsec? (Choose two.)

A.

EoMPLS

B.

MPLS Layer 3 VPN

C.

DMVPN

D.

GET VPN

E.

KVPLS

Full Access
Question # 40

Company XYZ has 30 sites using MPLS L3 VPN and is concerned about data integrity. They want a centralized configuration model and minimal overhead. Which technology can be used?

A.

S-VTI

B.

DMVPN

C.

MGRE

D.

GET VPN

Full Access
Question # 41

Which MPLS TE design consideration is true?

A.

MPLS TE replaces LDP and the dependency of the IGP to identify the best path

B.

MPLS TE provides link and node protection

C.

MPLS TE optimizes the routing of IP traffic, given the constraints imposed by backbone capacity and application requirements

D.

MPLS TE requires Layer 3 VPN full-mesh topology deployment

Full Access
Question # 42

A multicast network is using Bidirectional PIM. Which two combined actions achieve high availability so that two RPs within the same network can act in a redundant manner? (Choose two)

A.

Use two phantom RP addresses

B.

Manipulate the administration distance of the unicast routes to the two RPs

C.

Manipulate the multicast routing table by creating static mroutes to the two RPs

D.

Advertise the two RP addresses in the routing protocol

E.

Use anycast RP based on MSDP peering between the two RPs

F.

Control routing to the two RPs through a longest match prefix

Full Access
Question # 43

Refer to the exhibit.

Company XYZ is currently running IPv4 but has decided to start the transition into IPv6. The initial objective is to allow communication based on IPv6 wherever possible, and there should still be support in place for devices that only support IPv4. These devices must be able to communicate to IPv6 devices as well. Which solution must be part of the design?

A.

Address family translation

B.

Dual stack

C.

Host-to-host tunneling

D.

6rd tunneling

Full Access
Question # 44

Which issue poses a challenge for security architects who want end-to-end visibility of their networks?

A.

Too many overlapping controls

B.

Too many disparate solutions and technology silos

C.

An overabundance of manual processes

D.

A network security skills shortage

Full Access
Question # 45

Which two advantages of using DWDM over traditional optical networks are true? (Choose two.)

A.

inherent topology flexibility and service protection provided without penalty through intelligent oversubscription of bandwidth reservation

B.

ability to expand bandwidth over existing optical infrastructure

C.

inherent topology flexibility with built-in service protection

D.

inherent topology flexibility with intelligent chromatic dispersion

E.

inherent topology flexibility with service protection provided through a direct integration with an upper layer protocol

Full Access
Question # 46

A multinational enterprise integrates a cloud solution with these objectives:

• Achieve seamless connectivity across different countries and regions

• Extend data center and private clouds into public clouds and provider-hosted clouds

What are two outcomes of deploying data centers and fabrics that interconnect different cloud networks? (Choose two.)

A.

Enhanced security

B.

Data and network ownership

C.

Ability to place workloads across clouds

D.

Centralized visibility

E.

Unidirectional workload mobility across the cloud

Full Access
Question # 47

As network designer, which option is your main concern with regards to virtualizing multiple network zones into a single hardware device?

A.

Fate sharing

B.

CPU resource allocation

C.

Congestion control

D.

Security

E.

Bandwidth allocation

Full Access
Question # 48

A customer with two 10 Mbps Internet links (active-active) experiences degraded performance when one fails. Static routing is used, and bandwidth upgrades aren't possible. The design must be failure-resistant without increasing CAPEX.

Which solution should be proposed?

A.

Implement quality of service on the current links

B.

Add a third link to the current router

C.

Add an additional edge router connected to a second ISP

D.

Use dynamic routing for equal-cost multipath

Full Access
Question # 49

Company XYZ wants to redesign the Layer 2 part of their network to use all uplinks for increased performance, support host reachability with conversational learning, and avoid port-channels. Which other technique can be used?

A.

TRILL

B.

LISP

C.

MSTP

D.

Switch stack

Full Access
Question # 50

You are tasked with the design of a high available network. Which two features provide fail closed environments? (Choose two.)

A.

EIGRP

B.

RPVST+

C.

MST

D.

L2MP

Full Access
Question # 51

Refer to the exhibit.

Refer to the exhibit. Two data center sites (X and Y) connect to the Internet and each other using a backdoor link. Both advertise the same IP prefix (100.75.10.0/23) to the Internet. Firewalls are behind R1 and R2.

Problem: When users attempt to reach 100.75.10.0/23, the return traffic is routed to Site-Y, regardless of where the session originated. This results in asymmetric traffic and potentially broken sessions due to firewall behavior.

Which design resolves the issue?

A.

Use BGP MED to influence Site-X return traffic. Change the IP address scheme of both sites.

B.

Change the Site-Y firewall configuration to replicate the Site-X configuration. Advertise the low MED attribute on Site-X to the Internet.

C.

Add a static route toward the Internet on Site-X. Change the DNS policy on Site-Y to block traffic.

D.

Establish control plane peering between edge routers. Have Site-X advertise an IP pool with a longer prefix.

Full Access
Question # 52

Which architecture does not require an explicit multicast signaling protocol, such as PIM or P2MP, to signal the multicast state hop-by-hop, but instead uses a link state protocol to advertise the multicast forwarding state?

A.

Binary indexed explicit routing

B.

Binary intermediate enhanced routing

C.

Bit indexed explicit replication

D.

Bi-directional implicit replication

Full Access
Question # 53

The General Bank of Greece plans to upgrade its legacy end-of-life WAN network with a new flexible, manageable, and scalable solution. The main requirements are ZTP support, end-to-end encryption, application awareness, and segmentation. The CTO states that the main goal of the bank is CAPEX reduction. Which WAN technology should be used for the solution?

A.

SD-branch

B.

DMVPN with PfR

C.

Managed SD-WAN

D.

SD-WAN

Full Access
Question # 54

A business customer deploys workloads in the public cloud but now faces governance issues related to IT traffic flow and data security. Which action helps identify the issue for further resolution?

A.

Set up a secure tunnel from customer routers to protect traffic to cloud providers.

B.

Send IPFIX telemetry data from customer routers to a centralized collector to identify traffic to cloud providers.

C.

Build a zone-based firewall policy on Internet edge firewalls that collects statistics on traffic to cloud providers.

D.

Apply workload policies that dictate security requirements for cloud workloads.

Full Access
Question # 55

A BGP route reflector in the network is taking longer than expected to converge during large network changes. Troubleshooting shows that the router cannot handle all the TCP acknowledgements during route updates. Which action can be performed to tune the device performance?

A.

Increase the size of the hold queue.

B.

Increase the size of the large buffers.

C.

Decrease the size of the small buffers.

D.

Increase the keepalive timers for each BGP neighbor.

Full Access
Question # 56

Which design consideration is valid when you contrast FabricPath and TRILL?

A.

FabricPath uses IS-IS, but TRILL uses VXLAN

B.

FabricPath permits active-active FHRP and TRILL supports anycast gateway

C.

FabricPath permits ECMP, but TRILL does not

D.

FabricPath permits active-active mode, but TRILL supports only active-standby mode

Full Access
Question # 57

You want to mitigate failures that are caused by STP loops that occur before UDLD detects the failure or that are caused by a device that is no longer sending BPDUs. Which mechanism do you use along with UDLD?

A.

Root guard

B.

BPDU guard

C.

Loop guard

D.

BPDU filtering

Full Access
Question # 58

Which option is a fate-sharing characteristic in regards to network design?

A.

A failure of a single element causes the entire service to fail

B.

It protects the network against failures in the distribution layer

C.

It acts as a stateful forwarding device

D.

It provides data sequencing and acknowledgment mechanisms

Full Access
Question # 59

Which design solution reduces the amount of IGMP state in the network?

A.

IGMP filtering

B.

IGMPv3 with PIM-SSM

C.

Multiple multicast domains

D.

One multicast group address throughout network regardless of IGMP version

Full Access
Question # 60

Which protocol does an SD-Access wireless Access Point use for its fabric data plane?

A.

GRE

B.

MPLS

C.

VXLAN

D.

LISP

E.

CAPWAP

Full Access
Question # 61

Which technology supports antispoofing and does not have any impact on encryption performance regardless of packet size?

A.

MACsec

B.

IP source guard

C.

DHCP snooping with DAI

D.

IPsec

Full Access
Question # 62

A customer has a functional requirement that states HR systems within a data center should be segmented from other systems that reside in the same data center and same VLAN. The systems run legacy applications by using hard-coded IP addresses. Which segmentation method is suitable and scalable for the customer?

A.

Data center perimeter firewalling

B.

VACLs on data center switches

C.

Transparent firewalling

D.

Routed firewalls

Full Access
Question # 63

When consumers that leverage IaaS reach 100% resource capacity, what can be used to redirect the overflow of traffic to the public cloud so there is no disruption to service?

A.

Cloud policing

B.

Cloud spill

C.

Cloud bursting

D.

Cloud shaping

Full Access
Question # 64

You want to split an Ethernet domain in two.

Which parameter must be unique in this design to keep the two domains separated?

A.

VTP domain

B.

VTP password

C.

STP type

D.

VLAN ID

Full Access
Question # 65

A senior network designer suggests that you should improve network convergence times by reducing BGP timers between your CE router and the PE router of the service provider. Which two factors should you consider to adjust the timer values? (Choose two.)

A.

service provider agreement to support tuned timers

B.

manual updates to the peer groups

C.

service provider scheduling of changes to the PE

D.

number of routes on the CE router

E.

number of VRFs on the PE router

Full Access
Question # 66

Company XYZ runs OSPF in their network. A design engineer decides to implement hot-potato routing architecture. How can this implementation be achieved?

A.

Enable iBGP and apply prepend to ensure all prefixes will have the same length of the AS path attribute value.

B.

Redistribute the external prefixes onto OSPF and ensure the total metric calculation includes only the ext value and the value is the same in all ASBRs.

C.

Enable OSPF load-balancing over unequal cost path.

D.

Redistribute the external prefixes onto OSPF and ensure that the total metric calculation includes external internal values.

Full Access
Question # 67

Which design principle improves network resiliency?

A.

Added load-balancing

B.

Added redundancy

C.

Added confidentiality

D.

Added reliability

Full Access
Question # 68

What is the most important operational driver in building a resilient and secure modular network design?

A.

Dependencies on hardware or software that is difficult to scale

B.

Minimize app downtime

C.

Reduce the frequency of failures requiring human intervention

D.

Increase time spent on developing new features

Full Access
Question # 69

In an OSPF network with routers connected together with Ethernet cabling, which topology typically takes the longest to converge?

A.

Partial mesh

B.

Full mesh

C.

Ring

D.

Squared

E.

Triangulated

Full Access
Question # 70

You are designing a new Ethernet-based metro-area network for an enterprise customer to connect 50 sites within the same city. OSPF will be the routing protocol used. The customer is primarily concerned with IPv4 address conservation and convergence time. Which two combined actions do you recommend? (Choose two)

A.

Use a multipoint Metro-E service for router connections

B.

Use a single address per router for all P2P links

C.

Use P2P links between routers in a hub-and-spoke design

D.

Configure address aggregation at each site router

E.

Determine which OSPF routers will be DR/BDR

Full Access
Question # 71

A network architect is designing a policy where database applications access the internet directly, while other traffic routes through the data center, with dynamic path switching based on performance. Which solution meets these requirements?

A.

MPLS L3VPN with QoS

B.

Cloud OnRamp for IaaS

C.

Cloud OnRamp for SaaS

D.

MPLS Direct Connect

Full Access
Question # 72

A software-defined networking (SDN) controller learns network topology information by using BGP link-state sessions with the route reflectors of an MPLS-enabled network. The controller then uses the topology information to apply on-demand traffic policies to the network through a protocol that is supported from all Layer 3 routers. Each policy is represented as a RIB entry in the control plane of the router. Which SDN model has been implemented?

A.

SDN centralized

B.

SDN traffic engineering

C.

SD-WAN

D.

SDN hybrid

Full Access
Question # 73

VPLS is implemented in a Layer 2 network with 2000 VLANs. What is the primary concern to ensure successful deployment of VPLS?

A.

Flooding is necessary to propagate MAC address reachability information

B.

PE scalability

C.

The underlying transport mechanism

D.

VLAN scalability

Full Access
Question # 74

Which two data plane hardening techniques are true? (Choose two)

A.

warning banners

B.

redundant AAA servers

C.

Control Plane Policing

D.

SNMPv3

E.

infrastructure ACLs

F.

disable unused services

G.

routing protocol authentication

Full Access
Question # 75

Which security architecture component offers streamlined security operations, ease of use, and visibility across all network security elements, independent of location or form factor?

A.

Threat-centric protection

B.

Integrated actionable intelligence

C.

Distributed enforcement

D.

Central command and control

Full Access
Question # 76

Which two actions must be taken when assessing an existing wireless network implementation for its readiness to support voice traffic? (Choose two.)

A.

Check for high roaming delay.

B.

Check for uniform radio coverage across the floors.

C.

Check for high channel utilization.

D.

Check for latency over wireless.

E.

Identify frequent TX power changes.

Full Access
Question # 77

Which two factors provide multifactor authentication for secure access to applications and data? (Choose two.)

A.

Persona-based

B.

Power-based

C.

Push-based

D.

Possession-based

E.

Pull-based

Full Access
Question # 78

A healthcare customer requested that SNMP traps must be sent over the MPLS Layer 3 VPN service. Which protocol must be enabled?

A.

SNMPv3

B.

Syslog

C.

Syslog TLS

D.

SNMPv2

E.

SSH

Full Access
Question # 79

Which feature is supported by NETCONF but is not supported by SNMP?

A.

Distinguishing between configuration data and operational data

B.

Taking administrative actions

C.

Collecting the status of specific fields

D.

Changing the configuration of specific fields

Full Access
Question # 80

Sometimes SDN leverages various overlay networking technologies to create layer(s) of network abstraction. What describes an overlay network?

A.

It transmits packets that traverse over network devices like switches and routers

B.

It encapsulates packets at source and destination, which incurs additional overhead

C.

Packet delivery and reliability occurs at Layer 3 and Layer 4

D.

It is responsible for the delivery of packets; NAT- or VRF-based segregation is required

Full Access
Question # 81

Which two design options are available to dynamically discover the RP in an IPv6 multicast network? (Choose two)

A.

Embedded RP

B.

MSDP

C.

BSR

D.

Auto-RP

E.

MLD

Full Access
Question # 82

Two enterprise networks must be connected together. Both networks are using the same private IP addresses. The client requests from both sides should be translated using hide NAT (dynamic NAT) with the overload feature to save IP addresses from the NAT pools. Which design addresses this requirement using only one Cisco IOS NAT router for both directions?

A.

This is not possible, because two Cisco IOS NAT routers are required to do dynamic NAT with overload in both directions

B.

The ip nat inside and ip nat outside commands must be configured at the interfaces with the overload option in both directions

C.

The overload feature is the default and does not have to be configured

D.

Two different NAT pools must be used for the ip nat inside source and the ip nat outside source commands for the overload feature in both directions

E.

The NAT Virtual Interface must be used to achieve this requirement

Full Access
Question # 83

Company XYZ is designing the network for IPv6 security and they have these design requirements:

    A switch or router must deny access to traffic from sources with addresses that are correct but topologically incorrect.

    Devices must block Neighbor Discovery Protocol resolution for destination addresses not found in the binding table.

Which two IPv4 security features are recommended for this company? (Choose two)

A.

IPv6 DHCP Guard

B.

IPv6 Source Guard

C.

IPv6 Destination Guard

D.

IPv6 Prefix Guard

E.

IPv6 RA Guard

Full Access
Question # 84

The controller has a global view of the network, and it can easily ensure that the network is in a consistent and optimal configuration. Which two statements describe a centralized SDN control path? (Choose two.)

A.

Scaling of the centralized controller cluster is challenging for services like DHCP and load-balancing.

B.

It is highly-available by design with no single-point-of-failure risks present.

C.

Integrating smart NIC capabilities on the local host level is made easier through REST APIs.

D.

It significantly improves the latency when performing reactive handling of PACKET_IN events.

E.

The centralized controller can support all southbound APIs, which allows for easy integration with legacy equipment.

Full Access
Question # 85

A product manufacturing organization is integrating cloud services into their IT solution. The IT team is working on the preparation phase of the implementation approach, which includes the Define Strategy step. This step defines the scope of IT, the application, and the service. What is one topic that should be considered in the Define Strategy step?

A.

Financial and governance models

B.

Innovate and align with business according to volume

C.

Due diligence and financial scenarios

D.

Contingency exit strategy steps

Full Access
Question # 86

Drag and drop the multicast protocols from the left onto the current design situation on the right.

Full Access
Question # 87

As part of workspace digitization, a large enterprise has migrated all their users to Desktop as a Service (DaaS), by hosting the backend system in their on-premises data center. Some of the branches have started to experience disconnections to the DaaS at periodic intervals, however, local users in the data center and head office do not experience this behavior. Which technology can be used to mitigate this issue?

A.

tail drop

B.

traffic shaping

C.

WRED

D.

traffic policing

Full Access
Question # 88

Refer to the exhibit.

A company named XYZ needs to apply security policies for end-user browsing by installing a secure web proxy appliance. All the web traffic must be inspected by the appliance, and the remaining traffic must be inspected by an NGFW that has been upgraded with intrusion prevention system functionality. In which two ways must the routing be performed? (Choose two)

A.

Policy-based routing on the collapsed core

B.

Policy-based routing on the internet edge

C.

Policy-based routing on firewalls

D.

Static routing on the appliance

Full Access
Question # 89

A business requirement is supplied to an architect from a car manufacturer stating their business model is changing to just-in-time manufacturing and a new network is required. The manufacturer does not produce all of the specific components in-house. Which area should the architect focus on initially?

A.

Automation

B.

Zero Trust Networking

C.

Low Latency Infrastructure

D.

Modularity

Full Access
Question # 90

Customer XYZ network consists of an MPLS core, IS-IS running as IGP, a pair of BGP route reflectors for route propagation, and a few dozen MPLS-TE tunnels for specific tactical traffic engineering requirements. The customer's engineering department has some questions about the use of the Overload Bit in the IS-IS networks and how it could be used to improve their current network design. Which two concepts about the Overload Bit are true? (Choose two.)

A.

It can be set on a router during the startup process for a fixed period of time

B.

Networks advertised within the LSPs of the respective node will become unreachable

C.

It forces the midpoint MPLS-TE node to reoptimize the primary tunnels going through the OL node.

D.

It can be set on a router until other interacting protocols have signaled convergence.

E.

It is not recommended on BGP Route Reflectors

Full Access
Question # 91

A small organization of 20 employees is looking to deliver a network design service for modernizing customer networks to support advanced solutions.

    Project scope and weekly progress should be visualized by the management.

    Always consider feedback and make changes accordingly during the project.

    Should consider flexibility to change scope at any point in time.

Which project methodology meets the requirements and has the least impact on the outcome?

A.

Scrum

B.

LEAN

C.

Kanban

D.

Six-Sigma

Full Access
Question # 92

What are two advantages of controller-based networks versus traditional networks? (Choose two.)

A.

The ability to have forwarding tables at each device

B.

More flexible configuration per device

C.

More consistent device configuration

D.

Programmatic APIs that are available per device

E.

The ability to configure the features for the network rather than per device

Full Access
Question # 93

What is a disadvantage of the traditional three-tier architecture model when east-west traffic between different pods must go through the distribution and core layers?

A.

Low bandwidth

B.

Security

C.

Scalability

D.

High latency

Full Access
Question # 94

Company XYZ wants to use the FCAPS ISO standard for network management design, focusing on minimizing outages through detection, isolation, and corrective actions. Which layer accomplishes this design requirement?

A.

Fault management

B.

Performance management

C.

Security management

D.

Accounting management

Full Access
Question # 95

Which two characteristics apply to firewall transparent mode operations in a firewall solution design? (Choose two.)

A.

Changes in the existing IP addressing and subnets are required

B.

The firewall can participate actively on spanning tree.

C.

Multicast traffic can traverse the firewall.

D.

OSPF adjacencies can be established through the firewall

E.

The firewall acts like a router hop in the network.

Full Access
Question # 96

Which design benefit of bridge assurance is true?

A.

It supposes a spanning-tree topology change upon connecting and disconnecting a station on a port

B.

It prevents switched traffic from traversing suboptimal paths on the network.

C.

It allows small, unmanaged switches to be plugged into ports of access switches without the risk of switch loops.

D.

It prevents switch loops caused by unidirectional point-to-point link condition on Rapid PVST+ and MST

Full Access
Question # 97

Which aspect of BGP-LS makes it scalable in large networks when multiarea topology information must be gathered?

A.

Transmit flow control

B.

Open-loop flow control

C.

Hardware flow control

D.

TCP-based flow control

Full Access
Question # 98

Company XYZ has implemented policy-based routing in their network. Which potential problem must be kept in mind about network reconvergence and PBR?

A.

It can limit network scalability

B.

It can create microloops during reconvergence

C.

It increases convergence time.

D.

It reduces convergence time.

Full Access
Question # 99

Which three components are part of the foundational information security principles of the CIA triad? (Choose three.)

A.

Cryptography

B.

Confidentiality

C.

Authorization

D.

Identification

E.

Integrity

F.

Availability

Full Access
Question # 100

While designing a switched topology, in which two options is UplinkFast recommended? (Choose two.)

A.

when switches of different spanning-tree types are connected (for example. 802.1d connecting to 802.1w)

B.

on distribution layer switches

C.

when hello timers are changed to more aggressive values

D.

on access layer switches

E.

on the core switches

Full Access
Question # 101

Company XYZ is running BGP as their routing protocol. An external design consultant recommends that TCP Path MTU Discovery be enabled. Which effect will this have on the network?

A.

It will enhance the performance of TCP-based applications.

B.

It will increase the convergence time.

C.

It will improve the convergence time.

D.

It will create a loop free path.

Full Access
Question # 102

An enterprise solution team is analyzing multilayer architecture and multicontroller SDN solutions for multisite deployments. The analysis focuses on the ability to run tasks on any controller via a standardized interface. Which requirement addresses this ability on a multicontroller platform?

A.

Deploy a root controller to gather a complete network-level view.

B.

Use the East-West API to facilitate replication between controllers within a cluster.

C.

Build direct physical connectivity between different controllers.

D.

Use OpenFlow to implement and adapt new protocols.

Full Access
Question # 103

A company requires an RPO of less than 10 seconds to ensure business continuity. Which technology should be deployed?

A.

Geographically dispersed data centers with asynchronous replication

B.

A single data center with duplicated infrastructure, dual PSUs, and a UPS

C.

Geographically dispersed data centers with synchronous replication

D.

A single data center with duplicated infrastructure and dual PSUs

Full Access