Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

Backupsand mirror-copies of data are an essential part of RPO solutions If a business wants to reduce their CAPEX for disaster recovery, which of the following solutions are applicable?

A.

Perform an annual cyber security assessment or penetration test

B.

Renew backup software annually to get the newest version of the console and stay protected

C.

Migrate parts of or all the infrastructure to the cloud

D.

Build a redundant infrastructure for business continuity / disaster recovery purposes at another location

Full Access
Question # 5

Which two control plane policer designs must be considered to achieve high availability? (Choose two.)

A.

Control plane policers are enforced in hardware to protect the software path, but they are hardware platform dependent in terms of classification ability.

B.

Control plane policers are really needed only on externally facing devices.

C.

Control plane policers can cause the network management systems to create false alarms.

D.

Control plane policers must be processed before a forwarding decision is made.

E.

Control plane policers require that adequate protocols overhead are factored in to allow protocol convergence.

Full Access
Question # 6

Which design benefit of bridge assurance is true?

A.

It supposes a spanning-tee topology change upon connecting and disconnecting a station on a port

B.

It prevents switched traffic from traversing suboptimal paths on the network.

C.

It allows small, unmanaged switches to be plugged into ports of access switches without the risk of switch loops.

D.

It prevents switch loops caused by unidirectional point-to-point link condition on Rapid PVST + and MST

Full Access
Question # 7

Retefto the exhibit.

This network is running OSPF and EIGRP as the routing protocols Mutual redistribution of the routing protocols has been contoured on the appropriate ASBRs The OSPF network must be designed so that flapping routes m EIGRP domains do not affect the SPF runs within OSPF The design solution must not affect the way EIGRP routes are propagated into the EIGRP domains Which technique accomplishes the requirement?

A.

route summarization the ASBR interfaces facing the OSPF domain

B.

route summarization on the appropriate ASBRS.

C.

route summarization on the appropriate ABRS.

D.

route summarization on EIDRP routers connecting toward the ASBR

Full Access
Question # 8

While reviewing an existing network design, you are discussing the characteristics of different STP versions. Which protocol minimizes unicast flooding during a Topology Change Notification in a Layer 2 switched network with many VLANs?

A.

PVRSTP

B.

MST

C.

STP

D.

PVSTP+

Full Access
Question # 9

Which three items do you recommend for control plane hardening of an infrastructure device? (Choose three.)

A.

routing protocol authentication

B.

SNMPv3

C.

Control Plane Policing

D.

redundant AAA servers

E.

warning banners

F.

to enable unused services

Full Access
Question # 10

Which two possible drawbacks should you consider when introducing Network Functions Virtualization in a network design? (Choose two)

A.

Bandwidth utilization increases

B.

Traffic flows are suboptimal

C.

High-end routers are required to support NFV

D.

OpenFlow must be supported in the network

E.

An SDN orchestration layer is required to support NFV

Full Access
Question # 11

The major business applications of an enterprise are largely monolithic and hard-coded As part of a major modernization and overhaul of the applications the goal is to move to a modular and containerized application architecture mode At the same time decoupling from the hardware is desired to move to an on-demand provisioning However the CyberOps team mandated that the final architecture must provide the same security levels as an air-gapped data center. Which cloud architecture meets these requirements?

A.

laaS

B.

private cloud

C.

PaaS

D.

hybrid cloud

E.

public cloud

Full Access
Question # 12

An engineer must design a network for a company that uses OSPF LFA to reduce loops. Which type of loop would be reduced by using this design?

A.

DTP

B.

micro loops

C.

STP

D.

REP

Full Access
Question # 13

Refer to the exhibit.

An engineer has been asked to redesign the traffic flow toward AS 111 coming from AS 500.Traffic destined to AS 111 network 91 7 0.0/16 should come in via AS 100. while traffic destined to all other networks in AS 111 should continue to use the existing path Which BGP attributes are best suited to control this inbound traffic coming from BGP AS 500 Into the 91.7.0.0/16 network?

A.

Prepend AS path for the 91.7.0.0/16 network and set it for neighbor in AS 200.

B.

Use extended community for the 91.7.0.0/16 network, not advertising it to the bi-lateral peer.

C.

Use local preference on R1 for the networks that AS 500 advertises to AS 111.

D.

Set higher MED for neighbor in AS 100 to influence incoming traffic for the 91. 7.0.0/16 network.

Full Access
Question # 14

You are designing the QoS policy for a company that is running many TCP-based applications. The company is experiencing tail drops for these applications. The company wants to use a congestion avoidance technique for these applications. Which QoS strategy can be used to fulfill the requirement?

A.

weighted fair queuing

B.

weighted random early detection

C.

low-latency queuing

D.

first-in first-out

Full Access
Question # 15

Drag and drop the end-to-end network virtualization elements from the left onto the correct network areas on the right.

Full Access
Question # 16

The Layer 3 control plane is the intelligence over the network that steers traffic toward its intended destination. Which two techniques can be used in service provider-style networks to offer a more dynamic, flexible, controlled, and secure control plane design? (Choose two.)

A.

access control lists

B.

firewalls

C.

QoS policy propagation with BGP

D.

remote black-holing trigger

E.

prefix lists

Full Access
Question # 17

Refer to the exhibit.

ACME Mining has four data centers in Santiago. Cape Town. Mumbai, and Beijing, full-mesh connected via a 400 Mb/s EVP-LAN They want to deploy a new mission-critical application with these

requirements:

    clusterheartbeat2Mb/s continuous (250 KB/s)

    cluster heartbeat one-way maximum latency 100 ms

These are the current ping tests results between the four data centers:

Which hosting data center pair can host the new application?

A.

Mumbai and Beijing

B.

Santiago and Cape Town

C.

Santiago and Mumbai

D.

Cape Town and Mumbai

E.

Cape Town and Beijing

F.

Santiago and Beijing

Full Access
Question # 18

Sometimes SDN leverages various overlay networking technologies to create layer(s) of network abstraction. What describes an overlay network?

A.

It transmits packets that traverse over network devices like switches and routers

B.

It encapsulates packets at source and destination, which incurs additional overhead

C.

Packet delivery and reliability occurs at Layer 3 and Layer 4

D.

It is responsible for the delivery of packets; NAT- or VRF-based segregation is required

Full Access
Question # 19

The Company XYZ network is experiencing attacks against their router. Which type of Control Plane Protection must be used on the router to protect all control plane IP traffic that is destined directly for one of the router interfaces?

A.

Control Plane Protection host subinterface

B.

Control Plane Protection main interface

C.

Control Plane Protection transit subinterface

D.

Control Plane Protection CEF-exception subinterface

Full Access
Question # 20

Two companies need to implement an extranet overlay network solution by using a VPN tunnel over the internet to use each other's HTTP REST APIs The solution must only provide data integrity because data confidentiality will be covered at the application layer The existing firewall devices will be used as VPN endpoints for the tunnel but they have limited available resources Which type of VPN tunnel must be deployed for the extranet service?

A.

GRE tunnel

B.

GREolPsec

C.

IPsecESP

D.

IPsec AH

Full Access
Question # 21

A company requires an RPO of less than 10 seconds to ensure business continuity. Which technology should be deployed?

A.

geographically dispersed data centers with asynchronous replication

B.

a single data center with duplicated infrastructure, dual PSUs, and a UPS

C.

geographically dispersed data centers with synchronous replication

D.

a single data center with duplicated infrastructure and dual PSUs

Full Access
Question # 22

When designing a WAN that will be carrying real-time traffic, what are two important reasons to consider serialization delay? (Choose two )

A.

Serialization delays are invariable because they depend only on the line rate of the interface

B.

Serialization delays are variable because they depend on the line rate of the interface and on the type of the packet being serialized.

C.

Serialization delay is the time required to transmit the packet on the physical media.

D.

Serialization delays are variable because they depend only on the size of the packet being serialized

E.

Serialization delay depends not only on the line rate of the interface but also on the size of the packet

Full Access
Question # 23

The network designer needs to use GLOP IP address in order make them unique within their ASN, which

multicast address range will be considered?

A.

239.0.0.0 to 239.255.255.255

B.

224.0.0.0 to 224.0.0.255

C.

233.0.0.0 to 233.255.255.255

D.

232.0.0.0 to 232.255.255.255

Full Access
Question # 24

A product manufacturing organization is integrating cloud services into their IT solution The IT team is working on the preparation phase of the implementation approach, which includes the Define Strategy step. This step defines the scope of IT, the application, and the service What is one topic that should be considered in the Define Strategy step?

A.

financial and governance models

B.

innovate and align with business according to volume

C.

due diligence and financial scenarios

D.

contingency exit strategy steps

Full Access
Question # 25

As technologies such as big data, cloud, and loT continue to grow, so will the demand for network bandwidth Business strategies must be flexible to accommodate these changes when it comes to priorities and direction and the network design strategy also must be agile and adaptable Drag and drop the benefits from the left onto the corresponding strategic approaches on the right as they relate to network design and management.

Full Access
Question # 26

The SD-WAN architecture is composed of separate orchestration management, control, and data planes Which activity happens at the orchestration plane?

A.

automatic onboarding of the SD-WAN routers into the SD-WAN overlay

B.

decision-making process on where traffic flows

C.

packet forwarding

D.

central configuration and monitoring

Full Access
Question # 27

A company created an IPv6 adoption plan for its campus network that requires dual-stack connectivity on the network Campus users must have IPv6 connectivity to an HR management application which is the first IPv6-only application hosted in the company s data center. Which two security mechanisms can be used to prevent a malicious user from masquerading as the IPv6 gateway? (Choose two)

A.

IPv6 RA guard

B.

IPv6 snooping

C.

IPv6 device tracking

D.

IPv6 address glean

E.

port ACLs

Full Access
Question # 28

An enterprise wants to migrate an on-premises network to a cloud network, and the design team is finalizing the overall migration process. Drag and drop the options from the left into the correct order on the right.

Full Access
Question # 29

Which design solution reduces the amount of IGMP state in the network?

A.

IGMP filtering

B.

IGMPv3 with PIM-SSM

C.

multiple multicast domains

D.

one multicast group address thorough network regardless of IGMP version

Full Access
Question # 30

What is a characteristic of a secure cloud architecture model?

A.

limited access to job function

B.

dedicated and restricted workstations

C.

multi-factor authentication

D.

software-defined network segmentation

Full Access
Question # 31

Your network operations team is deploying Access Control Lists (ACLs) across your Internet gateways They wish to place an ACL inbound on the Internet gateway interface facing the core network (the "trusted" interface). Which IP address would the ACL need for traffic sourced from the inside interface, to match the source address of the traffic?

A.

inside global

B.

outside global

C.

inside local

D.

outside local

Full Access
Question # 32

Refer to the exhibit.

A customer needs to implement a connectivity model by using one active link for inbound and outbound traffic and a second link for backup The backup link is low speed and is required only during outages of the primary link. Which design solution should be implemented?

A.

Advertise a higher local preference to ISP 2 Increase the AS PATH inbound from ISP 1

B.

Advertise a longer AS PATH to ISP 2 Increase the MED to ISP 2.

C.

Advertise more specific routes to ISP 1 Increase the local preference attribute of inbound BGP from ISP1

D.

Advertise less specific routes to ISP 2 Increase the AS PATH inbound from ISP 1

Full Access
Question # 33

An engineer must redesign the QoS strategy for Company XYZ The current network is experiencing many dropped packets due to oversubscription of the guaranteed bandwidth allocated by the service provider. Company XYZ wants a design with a QoS strategy that controls the traffic flow leaving the Edge router to minimize packet drops Which QoS technique can be recommended as a solution?

A.

LLQ

B.

traffic shaping

C.

rate-limiting

D.

policing

Full Access
Question # 34

A business wants to centralize services via VDI technology and to replace remote WAN desktop PCs with thin client-type machines to reduce operating costs Which consideration supports the new business requirement?

A.

VDI servers should be contained centrally within a DMZ

B.

The thin client traffic should be placed in a WAN QoS priority queue

C.

VDI servers should be contained within dedicated VLANs in each branch location

D.

The WAN should offer low latency and be resized

Full Access
Question # 35

Refer to the exhibit. An architect must design an enterprise WAN that connects the headquarters with 22 branch offices. The number of remote sites is expected to triple in the next three years. The final solution must comply with these requirements:

    Only the loopback address of each of the enterprise CE X and Y routers must be advertised to the interconnecting service provider cloud network.

    The transport layer must carry the VPNv4 label and VPN payload over the MP-BGP control plane.

    The transport layer must not be under service provider control.

Which enterprise WAN transport virtualization technique meets the requirements?

A.

EIGRP Over the Top

B.

MPLS over BGP over multipoint GRE

C.

DMVPN per VRF

D.

point-to-point GRE per VRF

Full Access
Question # 36

Refer to the exhibit.

After a network audit a network engineer must optimize the current network convergence time The proposed solution must consider link layer and control plane failures. Which solution meets the requirements?

A.

Configure debounce timers

B.

Increase fast hello timers

C.

Implement BFD

D.

Enable LSP fast flood

Full Access
Question # 37

In a redundant hub and spoke "wheel" design, all spokes are connected to the hub, and spokes are connected to other spokes as well. During failure on one spoke link, the traffic from that site can be sent to a neighboring site for it to be forwarded to the hub site. But during peak hours, a link is overloaded and traffic is re-routed to a neighbor, which subsequently becomes overloaded. This overload results in network traffic oscillation as the load varies at each spoke site. This design provides more redundancy but not more resiliency because the routing protocol must process many alternate paths to determine the lowest cost path. Which two design

changes help to improve resilience in this case? (Choose two.)

A.

Increase the number of redundant paths considered during the routing convergence calculation.

B.

Eliminate links between every spoke.

C.

Increase routing protocol convergence timers.

D.

Increase unequal-cost parallel paths.

E.

Use two links to each remote site instead of one.

Full Access
Question # 38

A network uses an SDN architecture with switches and a centralized controller What should be on the switches but not on the controller?

A.

control plane functions

B.

a southbound interface

C.

data plane functions

D.

a northbound interface

Full Access
Question # 39

You have been tasked with designing a data center interconnect as part of business continuity You want to use FCoE over this DCI to support synchronous replication. Which two technologies allow for FCoE via lossless Ethernet or data center bridging? (Choose two.)

A.

DWDM

B.

EoMPLS

C.

SONET/SDH

D.

Multichassis EtherChannel over Pseudowire

E.

VPLS

Full Access
Question # 40

Which two advantages of using DWDM over traditional optical networks are true? (Choose two.)

A.

inherent topology flexibility and service protection provided without penalty through intelligent oversubscription of bandwidth reservation

B.

ability to expand bandwidth over existing optical Infrastructure

C.

inherent topology flexibility with built-in service protection

D.

inherent topology flexibility with intelligent chromatic dispersion

E.

inherent topology flexibility with a service protection provided through a direct integration with an upper layer protocol

Full Access
Question # 41

Refer to the exhibit.

For Company XYZ Bangkok is using ECMP to reach the 172 20 2 0/24 network The company wants a design that would allow them to forward traffic from 172 16 2 0/24 toward 172 20 2 0/24 via the Singapore router as the preferred route The rest of the traffic should continue to use ECMP Which technology fulfills this design requirement?

A.

policy-based routing

B.

route summarization

C.

unequal-cost load balancing using variance

D.

LFA

Full Access
Question # 42

While computer networks and sophisticated applications have allowed individuals to be more productive the need to prepare for security threats has increased dramatically A six-step methodology on security incident handling has been adopted by many organizations including service providers enterprises, and government organizations to ensure that organizations are aware of significant security incidents and act quickly to stop the attacker, minimize damage caused, and prevent follow on attacks or similar incidents in the future Drag and drop the actions on the left to the targets on the right in the correct order.

Full Access
Question # 43

Most security monitoring systems use a signature-based approach to detect threats In which two instances are systems based on Network Behavior Anomaly Detection better than signature-based systems when it comes to detecting security threat vectors'? (Choose two.)

A.

malware detection

B.

encrypted threat traffic

C.

spyware detection

D.

intrusion threat detection

E.

new zero-day attacks

Full Access
Question # 44

Refer to the exhibit.

The WAN network of the General Bank of Greece has experienced several outages It takes too long to activate a new branch site The networking department of the bank plans to upgrade the legacy end-of-life WAN network with a new flexible manageable, and scalable in-house solution The number of branches will increase exponentially in the next fiscal year The CTO states that the bank’s mam goal is OPEX reduction The network engineering team prepares a table to evaluate the available options Which WAN technology can be used for the solution?

A.

DMVPN over L3VPN

B.

Managed SD-WAN

C.

SD-WAN over L3VPN

D.

SD-WAN over L2VPN

Full Access
Question # 45

What are two common approaches to analyzing and designing networks? (Choose two.)

A.

bottom-up approach

B.

high-low security approach

C.

top-down approach

D.

left-right approach

E.

three-tier approach

Full Access
Question # 46

Which two characteristics are associated with 802 1s? (Choose two)

A.

802.1s supports up to 1024 instances of 802.1

B.

802.1 s is a Cisco enhancement to 802.1w.

C.

802.1s provides for faster convergence over 802 1D and PVST+.

D.

CPU and memory requirements are the highest of all spanning-tree STP implementations.

E.

802.1s maps multiple VLANs to the same spanning-tree instance

Full Access
Question # 47

An engineer is designing a DMVPN network where OSPF has been chosen as the routing protocol A spoke-to-spoke 'J

A.

Configure all the sites as network type broadcast

B.

The network type on all sites should be point-to-multipoint

C.

The network type should be point-to-multipoint for the hub and point-to-point for the spokes.

D.

The hub should be set as the DR by specifying the priority to 255.

E.

The hub should be the DR by changing the priority of the spokes to 0.

Full Access
Question # 48

You have been asked to design a high-density wireless network for a university campus. Which two principles would you apply in order to maximize the wireless network capacity? (Choose two.)

A.

Implement a four-channel design on 2.4 GHz to increase the number of available channels

B.

Choose a high minimum data rate to reduce the duty cycle.

C.

increases the number of SSlDs to load-balance the client traffic.

D.

Make use of the 5-GHz band to reduce the spectrum utilization on 2.4 GHz when dual-band clients are used.

E.

Enable 802.11n channel bonding on both 2.4 GHz and 5 GHz to increase the maximum aggregated cell throughput.

Full Access
Question # 49

Network operators have many options available, from fully centralized to fully distributed control planes, and each approach has its own set of characteristics. Drag and drop the characteristics from the left onto the corresponding approach on the right.

Full Access
Question # 50

Which two benefits can software defined networks provide to businesses? (Choose two.)

A.

provides additional redundancy

B.

decentralized management

C.

reduced latency

D.

enables innovation

E.

reduction of OpEx/CapEx

F.

meets high traffic demands

Full Access
Question # 51

An architect receives a business requirement from a CTO that states the RTO and RPO for a new system should be as close as possible to zero. Which replication method and data center technology should be used?

A.

asynchronous replication over dual data centers via DWDM

B.

synchronous replication over geographically dispersed dual data centers via MPLS

C.

synchronous replication over dual data centers via Metro Ethernet

D.

asynchronous replication over geographically dispersed dual data centers via CWDM

Full Access
Question # 52

Company XYZ uses an office model where the employees can use any open desk and plug their laptops in. They want to authenticate the end users using their domain username and password before allowing them access to the network. The design must also accommodate the ability of controlling traffic within the same group or subnet if a macro (or micro) segmentation-based model is adopted in the future. Which protocol can be recommended for this design to authenticate end users?

A.

LDAP

B.

EAP

C.

TACACS+

D.

RADIUS

Full Access
Question # 53

Company XYZ wants to redesign the Layer 2 part of their network and wants to use all available uplinks for increased performance. They also want to have end host reachability supporting conversational learning. However, due to design constraints, they cannot implement port-channel on the uplinks. Which other technique can be used to make sure the uplinks are in active/active state?

A.

TRILL

B.

LISP

C.

MSTP

D.

switch stack

Full Access
Question # 54

A network engineering team is in the process of designing a lab network for a customer demonstration. The design engineer wants to show that the resiliency of the MPLS traffic Engineering Fast Reroute solution has the same failover/failback times as a traditional SONET/SDH network (around 50MSEC). In order to address both link failure and node failure within the lab typology network, which type of the MPLS TE tunnels must be considered for this demonstration?

A.

TE backup tunnel

B.

Next-hop (NHop) tunnel

C.

FRR Backup tunnel

D.

next-next-hop (NNHop) tunnel

Full Access
Question # 55

Which issue poses a challenge for security architects who want end-to-end visibility of their networks?

A.

too many overlapping controls

B.

too many disparate solutions and technology silos

C.

an overabundance of manual processes

D.

a network security skills shortage

Full Access
Question # 56

Which solution component helps to achieve comprehensive threat protection and compliance for migration to multicloud SDX architectures?

A.

system-oriented architecture

B.

OSASE architecture

C.

platform-oriented architecture

D.

SASE architecture

Full Access
Question # 57

An enterprise network has two core routers that connect to 200 distribution routers and uses full-mesh IBGP peering between these routers as its routing method. The distribution routers are experiencing high CPU utilization due to the BGP process. Which design solution is the most cost effective?

A.

Implement route reflectors on the two core routers

B.

Increase the memory on the core routers

C.

Implement e BGP between the core and distribution routers

D.

Increase the memory on the distribution routers

E.

Increase bandwidth between the core routers

Full Access
Question # 58

Company XYZ is running SNMPv1 in their network and understands that it has some flaws. They want to change the security design to implement SNMPv3 in the network Which network threat is SNMPv3 effective against?

A.

man-in-the-middle attack

B.

masquerade threats

C.

DDoS attack

D.

brute force dictionary attack

Full Access
Question # 59

Company XYZwants to implement an IPS device to detect and block well-known attacks against their network They want a design solution where all packets that are forwarded to the network are checked against a signature database before being allowed through This check must be done with the minimum effect on performance. Which design is recommended?

A.

Deploy an IPS behind the firewall in promiscuous mode

B.

Deploy an IPS in front of the firewall in promiscuous mode

C.

Deploy an IPS behind the firewall in in-line mode

D.

Deploy and IPS in front of the firewall in in-line mode

Full Access
Question # 60

The controller has a global view of the network, and it can easily ensure that the network is in a consistent and optimal configuration. Which two statements describe a centralized SDN control path? (Choose two.)

A.

Scaling of the centralized controller cluster is challenging for services like DHCP and load-balancing.

B.

It is highly-available by design with no single-point-of-failure risks present.

C.

Integrating smart NIC capabilities on the local host level is made easier through rest APIs.

D.

It significantly improves the latency when performing reactive handling of PACKET_IN events.

E.

It centralized controller can support all southbound APIs, which allows for easy integration with legacy equipment.

Full Access
Question # 61

What is a country-specific requirement that data is subject to the laws of the country in which it is collected or processed and must remain within its borders?

A.

data sovereignty

B.

data rationality

C.

data inheritance

D.

data replication

Full Access
Question # 62

A network security team uses a purpose-built tool to actively monitor the campus network, applications, and user activity. The team also analyzes enterprise telemetry data from IPFIX data records that are received from devices in the campus network. Which action can be taken based on the augmented data?

A.

reduction in time to detect and respond to threats

B.

integration with an incident response plan

C.

adoption and improvement of threat-detection response

D.

asset identification and grouping decisions

Full Access
Question # 63

Which two statements about MLD snooping are true? (Choose two)

A.

When MLD snooping is enabled, QoS is automatically enabled.

B.

A VLAN can support multiple active MLD snooping queries, as long as each one is associated to a different

multicast group.

C.

AN MLD snooping querier election occurs when any MLD snooping querier goes down or if there is an IP

address change on the active querier.

D.

When multiple MLD snooping queriers are enabled in a VLAN, the querier with the lowest IP address in the

VLAN is elected as the active MLD snooping querier.

Full Access
Question # 64

Which service abstracts away the management of the operating system, middleware, and runtime?

A.

laaS

B.

PaaS

C.

SaaS

D.

BMaaS

Full Access
Question # 65

An architect receives a functional requirement for a NAC system from a customer security policy stating that if a corporate Wi-Fi device does not meet current AV definitions, then it cannot access the corporate network until the definitions are updated. Which component should be built into the NAC design?

A.

posture assessment with remediation VLAN

B.

quarantine SGTs

C.

dACLs with SGTs

D.

quarantine VLAN

Full Access
Question # 66

As a network designer you need to support an enterprise with hundreds of remote sites connected over a single WAN network that carries different types of traffic, including VoIP, video, and data applications which of following design considerations will not impact design decision?

A.

Focus on the solution instead of the problem, which helps to reduce downtime duration

B.

The location of the data collection

C.

What direction the data or flows should be metered

D.

Identify traffic types and top talkers over this link

Full Access
Question # 67

Refer to the exhibit.

This network is running OSPF as the routing protocol. The internal networks are being advertised in OSPF London and Rome are using the direct link to reach each other although the transfer rates are better via Barcelona Which OSPF design change allows OSPF to calculate the proper costs?

A.

Change the OSPF reference bandwidth to accommodate faster links.

B.

Filter the routes on the link between London and Rome

C.

Change the interface bandwidth on all the links.

D.

Implement OSPF summarisation to fix the issue

Full Access
Question # 68

Which layer of the SDN architecture orchestrates how the applications are given the resources available in the network?

A.

orchestration layer

B.

southbound API

C.

northbound API

D.

control layer

Full Access
Question # 69

An enterprise that runs numerous proprietary applications has major issues with its on-premises server estate hardware, to the point where business-critical functions are compromised. The enterprise accelerates plans to migrate services to the cloud. Which cloud service should be used if the enterprise wants to avoid hardware issues yet have control of its applications and operating system?

A.

SaaS

B.

PaaS

C.

laaS

D.

hybrid cloud

Full Access
Question # 70

The General Bank of Greece plans to upgrade its legacy end-of-life WAN network with a new flexible, manageable, and scalable solution. The mam requirements are ZTP support, end-to-end encryption application awareness and segmentation. The CTO states that the main goal of the bank is CAPEX reduction. Which WAN technology should be used for the solution?

A.

SD-branch

B.

DMVPN with PfR

C.

managed SD-WAN

D.

SD-WAN

Full Access
Question # 71

In the wake of a security compromise incident where the internal networks were breached by an outside attacker at the perimeter of the infrastructure, an enterprise is now evaluating potential measures that can help protect against the same type of incident in the future. What are two design options that can be employed? (Choose two)

A.

microzoning

B.

segmentation

C.

domain fencing

D.

virtualization

E.

microperimeters

Full Access
Question # 72

Company XYZIs runningaredundant private WAN network using OSPF as the underlay protocol The current design accommodates for redundancy In the network, but it Is taking over 30 seconds for the network to reconverge upon failure Which technique can be Implemented In the design to detect such a failure in a subsecond?

A.

STP

B.

fate sharing

C.

OSPF LFA

D.

BFD

E.

flex links

Full Access
Question # 73

Company XYZhas two offices connected to each other over unequal redundant paths and they are running OSPF as the routing protocol An external network architect recommends BFD for OSPF Which effect would BFD have in the case of a link failure?

A.

It would drop the dead per detection time to a single hello

B.

It would keep an alternate path ready in case of a link failure

C.

It would optimize the route summarization feature of OSPF

D.

It would detect that the neighbor is down in a subsecond manner

Full Access
Question # 74

In an OSPF network with routers connected together with Ethernet cabling, which topology typically takes the longest to converge?

A.

partial mesh

B.

full mesh

C.

ring

D.

squared

E.

triangulated

Full Access
Question # 75

A green data center is being deployed and a design requirement is to be able to readily scale server virtualization Which IETF standard technology can provide this requirement?

A.

data center bridging

B.

unified fabric

C.

Transparent Interconnection of Lots of Links

D.

fabric path

Full Access
Question # 76

Refer to the exhibit.

Which impact of using three or more ABRs between the backbone area and area 1 is true?

A.

In a large-scale network LSA replication by all ABRs can cause serious scalability issues

B.

Multiple ABRs reduce the CPU processing on each A6R due to splitting prefix advertisement

C.

In a large-scale network multiple ABRs can create microloops.

D.

Prefixes from the non-backbone area are advertised by one ABR to the backbone

Full Access
Question # 77

Which two technologies enable multilayer segmentation? (Choose two.)

A.

policy-based routing

B.

segment routing

C.

data plane markings

D.

firewalls

E.

filter lists

Full Access
Question # 78

In search of a system capable of hosting, monitoring compiling. and testing code in an automated way, what can be recommended to the organization?

A.

Jenkins

B.

Ansible

C.

Perl

D.

Chef

Full Access
Question # 79

Which tool automates network implementation activities and shortens the implementation lifecycle?

A.

LISP

B.

Java

C.

Conclusion

D.

Python

Full Access
Question # 80

Company XYZasksfor design recommendationsfor Layer2redundancy. Thecompanywants to prioritize fast convergence and resiliency elements. In the design. Which two technologies are recommended? (Choose two.)

A.

Design MLAG/MC-LAG into the network wherever possible.

B.

Configure DHCP snooping on the switches.

C.

Use root guard.

D.

Use BPDU guard.

E.

Use UniDirectional Link Detection.

Full Access
Question # 81

Which two statements explain the operation of BFD asynchronous mode? (Choose two )

A.

BFD asynchronous mode with echo packets combines the control packets and echo packets into a single packet.

B.

BFD asynchronous mode without echo packets uses control packets, and BFD asynchronous mode with echo packets does not.

C.

BFD asynchronous mode with and without echo packets use control packets.

D.

BFD asynchronous without echo packets has control packets sent back to the originating router, which echoes the control packet to detect failures.

E.

BFD asynchronous mode with echo packets uses separate control packets and echo packets.

Full Access
Question # 82

Your company utilizes many different types of network transports and you want to increase the efficiency of the network Which solution can be used to improve network efficiency over PPPoE IPsec, and GRE networks'?

A.

PMTUD

B.

OATM

C.

IRDP

D.

Host Discovery Protocol

Full Access
Question # 83

Drag and drop the multicast protocols from the left onto the current design situation on the right.

Full Access
Question # 84

Drag and drop the characteristics from the left onto the corresponding network management options on the right.

Full Access
Question # 85

Which three characteristics of the Single Tier and the Dual Tier Headend Architectures for DMVPN designs are true? (Choose three.)

A.

A Dual Tier Headend Architecture is required when using dual cloud topologies with spoke-to-spoke connectivity

B.

In a Single Tier Headend Architecture there is a single headend router per DMVPN cloud topology

C.

A Single Tier Headend Architecture is required when using dual cloud topologies with spoke-to-spoke connectivity

D.

In a Dual Tier Headend Architecture, there are two different headend routers per DMVPN cloud for high availability purposes

E.

In a Single Tier Headend Architecture, the GRE tunnel endpoint and encryption endpoint functionalities are on the same router

F.

In a Dual Tier Headend Architecture, the GRE tunnel endpoint and encryption endpoint functionalities are on different routers

Full Access
Question # 86

What is a connection service inside a data center that provides direct connectivity to a cloud provider?

A.

Cloud onRamp

B.

Cloud gateway

C.

Cloud direct connect

D.

Carrier-neutral facility

Full Access
Question # 87

Company XYZis runningOSPFin their network. They have merged with another company that is running EIGRP as the routing protocol. Company XYZ now needs the two domains to talk to each other with redundancy, while maintaining a loop free environment. The solution must scale when new networks are added into the network in the near future. Which technology can be used to meet these requirements?

A.

multipoint route-redistribution with route filtering using ACLs

B.

DUMP multipoint route-redistribution with route filtering using route tags

C.

DUMPS single point route-redistribution with route filtering using route tags

D.

DUMPS single point route-redistribution with route filtering using ACLs

Full Access
Question # 88

Which BGP feature provides fast convergence?

A.

BGP PIC |

B.

BGP-EVPN

C.

BGP FlowSpec

D.

BGP-LS

Full Access
Question # 89

Which security architecture component offers streamlined security operations, ease of use, and visibility across all network security elements, independent of location or form factor?

A.

threat-centric protection

B.

integrated actionable intelligence

C.

distributed enforcement

D.

central command and control

Full Access
Question # 90

A European national bank considers migrating its on-premises systems to a private cloud offering in a non-European location to significantly reduce IT costs. What is a primary factor prior to migration?

A.

data governance

B.

additional latency

C.

security

D.

cloud connectivity

Full Access
Question # 91

Refer to the table.

A customer investigates connectivity options for a DCI between two production data centers to aid a large-scale migration project. The migration is estimated to take 20 months to complete but might extend an additional 10 months if issues arise. All connectivity options meet the requirements to migrate workloads. Which transport technology provides the best ROI based on cost and flexibility?

A.

CWDM over dark fiber

B.

MPLS

C.

DWDM over dark fiber

D.

Metro Ethernet

Full Access
Question # 92

Drag and drop the design use cases from the left onto the correct uRPF techniques used to prevent spoofing attacks Not all options are used.

Full Access
Question # 93

Company XYZ has two routing domains in their network, EIGRP and OSPF. The company wants to provide full reachability between the two domains by implementing redistribution on a router running both protocols. They need to design the redistribution in a way that the OSPF routers will see link costs added to external routes. How must the redistribution strategy be designed for this network?

A.

Redistribute using metric type 2 into OSPF.

B.

Redistribute using metric type 1 into OSPF.

C.

Redistribute using metric type 1 into EIGRP.

D.

Redistribute using metric type 2 into EIGRP.

Full Access
Question # 94

Refer to the exhibit.

This network is running EIGRP as the routing protocol and the internal networks are being advertised in EIGRP. Based on the link speeds, all traffic between London and Rome is getting propagated via Barcelona and the direct link between London and Rome is not being utilized under normal working circumstances. The EIGRP design should allow for efficiency in the routing table by minimizing the routes being exchanged. The link between London and Rome should be utilized for specific routes. Which two steps accomplish this task? (Choose two.)

A.

Configure EIGRP route summarization on all the interfaces to summarize the internal LAN routes

B.

Filter the routes on the link between London and Barcelona

C.

Filter the routes on the link between London and Rome

D.

Configure route leaking of summary routes on the link between London and Rome

Full Access
Question # 95

An enterprise wants to provide low-cost delivery of network systems that can be scaled on business demand, followed by an initiative to reduce capital expenses for new IT equipment. Which technology meets these goals'?

A.

laaS within a private cloud

B.

laaS within an on-premises location

C.

PaaS within a public cloud

D.

SaaS within an on-premises location

Full Access
Question # 96

The Agile release train workflow focuses on tasks which can be accomplished reliably and efficiently Scrum and Kanban are two of the most popular Agile frameworks, but both have a specific use case based on the implementation requirements In which two situations are Kanban the ideal framework to use”? (Choose two.)

A.

acquisition of automation tools

B.

carrier lead times

C.

network configuration design

D.

physical hardware deployment

E.

logical topology deployment

Full Access
Question # 97

The CIA triad is foundational to information security, and one can be certain that one or more of the principles within the CIA triad has been violated when data is leaked or a system is attacked Drag and drop the countermeasures on the left to the appropriate principle section on the right in any order

Full Access
Question # 98

Traditionally, infrastructure is not managed using code, but instead it is managed and provisioned manually which can cause potential issues On the other side, infrastructure as code brings several advantages What is a benefit of infrastructure as code?

A.

declarative pipelines

B.

configuration drift

C.

agent monitoring

D.

repeatable deployments

Full Access
Question # 99

A business wants to refresh its legacy Frame Relay WAN. It currently has product specialists in each of its 200 branches but plans to reduce and consolidate resources. The goal is to have product specialists available via video link when customers visit the nationwide branch offices. Which technology should be used to meet this objective?

A.

DMVPN phase 1 network over the Internet

B.

Layer 3 MPLS VPN hub and spoke

C.

Layer2VPLS

D.

Layer 3 MPLS VPN full mesh

Full Access
Question # 100

Which action must be taken before new VoIP systems are implemented on a network to ensure that the network is ready to handle the traffic?

A.

Evaluate bandwidth utilization and connection quality

B.

Enable special requirements such as direct DID lines on pickup

C.

Make recommendations to limit the size of the half-open session table on routers

D.

Check if anomaly detection is enabled for SIP and H.323 on Layer 3 devices

Full Access
Question # 101

Which two actions ensure voice quality in a branch location with a low-speed, high-latency WAN connection? (Choose two.)

A.

Increase WAN bandwidth

B.

Increase memory branch switch.

C.

Fragment data packets.

D.

Replace any electrical links with optical links

E.

Prioritize voice packets

Full Access
Question # 102

You have been asked to design a remote access VPN solution to support up to 2000 devices. You must ensure that only corporate assets are allowed to connect to the VPN, and users must authenticate to gain access of their based on their user role. Users must use a password that they are already using to access existing applications . A user may not always use the same device to access the VPN. Which two options combined meet the requirements? (Choose two)

A.

Use local usernames and passwords on the VPN device

B.

Deploy a central authentication directory that users can be authenticated and authorized against

C.

Deploy certificates that are unique to each user

D.

Deploy an IPsec VPN solution

E.

Deploy certificates that are unique to each device

F.

Deploy a SSL VPN solution

Full Access
Question # 103

An IT service provider is upgrading network infrastructure to comply with PCI security standards. The network team finds that 802.1X and VPN authentication based on locally-significant certificates are not available on some legacy phones.

Which workaround solution meets the requirement?

A.

Replace legacy phones with new phones because the legacy phones will lose trust if the certificate is renewed.

B.

Enable phone VPN authentication based on end-user username and password.

C.

Temporarily allow fallback to TLS 1.0 when using certificates and then upgrade the software on legacy phones.

D.

Use authentication-based clear text password with no EAP-MD5 on the legacy phones.

Full Access
Question # 104

An external edge router provides connectivity from a service provider to an enterprise Which two Internet edge best practices meet compliance regulations'? (Choose two )

A.

Implement filtering to control traffic that is sourced from the infrastructure IP space.

B.

Enable and use only secure protocols.

C.

Send logs to a centralized logging collection server.

D.

Implement EBGP to advertise all owned IP blocks.

E.

Use login banners and interface access lists to restrict administrative access to the system

Full Access
Question # 105

Various teams in different organizations within an enterprise are preparing low-level design documents to capture network parameters using a Waterfall project model:

• hardware sizing and power consumption

• Layer 2 and layer 3 services parameters

• configuration of all control plane protocols

Input from relevant stakeholders was captured at the start of the project, and the project scope has been defined based on the parameters above. What impact will it have on documentation and project deliverables if the stakeholders ask to have changes carried out in the network before the information has been captured?

A.

This provides more opportunity to think outside the box.

B.

Rework is expected before the delivery.

C.

Significant effort and time are required.

D.

This provides a flexible approach to incorporate changes.

Full Access
Question # 106

An engineer is designing the QoS strategy for Company XYZ. Based on initial analysis, a lot of scavenger type of traffic is traversing the network's 20Mb Internet link toward the service provider. The new design must use a QoS technique that limits scavenger traffic to 2 Mbps, which helps avoid oversubscription of the link during times of congestion. Which QoS technique can be used to facilitate this requirement?

A.

class-based traffic policing

B.

LLQ

C.

CBWFQ

D.

class-based traffic shaping

Full Access
Question # 107

An architect designs a multi-controller network architecture with these requirements:

    Achieve fast failover to control traffic when controllers fail.

    Yield a short distance and high resiliency in the connection between the switches and the controller.

    Reduce connectivity loss and enable smart recovery to improve the SDN survivability.

    Improve connectivity by adding path diversity and capacity awareness for controllers.

Which control plane component of the multi-controller must be built to meet the requirements?

A.

control node reliability

B.

controller stale consistency

C.

control path reliability

D.

controller clustering

Full Access
Question # 108

Company XYZ wants to prevent switch loops caused by unidirectional point-point-link condition on Rapid FVST + and MST. Which technology can be used in the design to meet this requirement?

A.

STPBPDU guard

B.

STP bridge assurance

C.

MSTP

D.

TRILL

Full Access
Question # 109

As part of a new network design documentation, you are required to explain the reason for choosing cisco FabricPath for Layer 2 loop avoidance.

Which two elements help Cisco FabricPath mitigate Layer 2 loops if they happen in the Layer 2 MP network?

(Choose two)

A.

MAC tunneling

B.

IS-IS multipath

C.

RPF check

D.

TTL header

Full Access
Question # 110

A thorough examination of the curant network infrastructure has revealed that several devices have an unusual high CPU load A traffic analysis indicates that control plane protocols and management traffic are affected as the devices are busy processing inbound traffic The networking team is working on updating their design for the entre network to handle situations like this Which feature or technology can be added to help mitigate the problem?

A.

control plane policing

B.

deep uterface buffers

C.

TCAM carving

D.

modular QoS

Full Access
Question # 111

Which two statements describe the usage of the IS-IS overload bit technique? (Choose two )

A.

lf overload-bit is set on a Level 2 intermediate system, the other Level 2 intermediate systems in the topology will stop using the overloaded IS to forward Level 2 traffic However, the intermediate system can still forward Level 1 traffic

B.

It can be set in intermediate systems (IS-IS routers) to prioritize control plane CSNP packets.

C.

It can be used to automatically synchronize the link-state database between Level 1 intermediate systems

D.

It can be set in intermediate systems (IS-IS routers) to avoid traffic black holes until routing protocols are fully converged after a reload operation.

E.

It can be set in intermediate systems (IS-IS routers) to attract transit traffic from other intermediate systems

Full Access
Question # 112

A key to maintaining a highly available network is building in the appropriate redundancy to protect against failure. This redundancy is carefully balanced with the inherent complexity of redundant systems. Which design consideration is relevant for enterprise WAN use cases when it comes to resiliency?

A.

Design in a way that expects outages and attacks on the network and its protected resources

B.

The design approach should consider simple and centralized management aspect

C.

Design in a way that it simplifies and improves ease of deployment

D.

Design automation tools wherever it is appropriate for greater visibility

Full Access
Question # 113

Company XYZ branch offices connect to the headquarter sites using two links, MPLS and Internet. The company wants to design the traffic flow so that voice traffic goes through the MPLS link and all other traffic uses either the MPLS link or the Internet link. Which technique can the company use in their design to ensure that the traffic is not process switched?

A.

policy-based routing

B.

virtual links

C.

visualization

D.

floating static route

Full Access
Question # 114

Which two features are advantages of SD-WAN compared to MPLS-based connectivity? (Choose two.)

A.

uses FEC constructs for traffic forwarding, thereby improving efficiency

B.

separates infrastructure and policy

C.

uses policy-based forwarding of real-time traffic with less complexity

D.

unifies the WAN backbone

E.

manages failures through backup links

Full Access
Question # 115

Company ABC uses IPv4-only. Recently they started deploying new endpoint devices. For operational reasons, IPv6 cannot be disabled on these new endpoint devices. Which security measure prevents the new endpoint from learning an IPv6 prefix from an attacker?

A.

Source Guard and Prefix Guard

B.

Router Advertisement Guard

C.

Prefix Guard

D.

Secure Neighbor Discovery

Full Access
Question # 116

Enterprise XYZ wants to implement fast convergence on their network and optimize timers for OSPF However they also want to prevent excess flooding of LSAs if there is a constantly flapping link on the network Which timers can help prevent excess flooding of LSAs for OSPF?

A.

OSPF propagation timers

B.

OSPF throttling timers

C.

OSPF delay timers

D.

OSPF flooding timers

Full Access
Question # 117

Drag and drop the correct mitigation methods from the left onto the corresponding types of attack on the right

Full Access
Question # 118

Company XYZ is connecting its sites over a private WAN The company is planningon implementing multicast routing on the network. The company has a mixture ofroutersfromdifferentvendorsWhichtechniquecanbeusedinthemulticastroutingdesigntominimize PIMsparsemodeconfigurations?

A.

PIM dense mode with RP using Auto-RP to announce itself

B.

PIM sparse mode with RP using Auto-RP to announce itself

C.

PIM dense mode with RP using BSR to announce itself

D.

PIM sparse mode with RP using BSR to announce itself

Full Access