208
http://www.gratisexam.com/ Actualtests.640-864.350 questions Number : 640-864 Passing Score : 800 Time Limit : 120 min File Version : 32.8 http://www.gratisexam.com/ 640-864 Designing for Cisco Internetwork Solutions Exam Make yourself wise and talented with studies and look out for the video lectures for your exam because they are perfect to train you for the exam and its modules. It gets you study tools online for it, and thus it manages to save your time and money as well. Practice test includes online and offline study material, and labs, and the practice exercises were all time available without any time bounding.

640-864 Designing for Cisco Internetwork Solutions …...640-864 Designing for Cisco Internetwork Solutions Exam Make yourself wise and talented with studies and look out for the video

  • Upload
    others

  • View
    22

  • Download
    0

Embed Size (px)

Citation preview

http://www.gratisexam.com/

Actualtests.640-864.350 questions

Number: 640-864Passing Score: 800Time Limit: 120 minFile Version: 32.8

http://www.gratisexam.com/

640-864

Designing for Cisco Internetwork Solutions Exam

Make yourself wise and talented with studies and look out for the video lectures for your exam because they are perfect to trainyou for the exam and its modules.

It gets you study tools online for it, and thus it manages to save your time and money as well.

Practice test includes online and offline study material, and labs, and the practice exercises were all time available without anytime bounding.

http://www.gratisexam.com/

It gives you an easy but detailed review of the entire syllabus and the best thing is that their materials are designed as such soas to make you retain the maximum amount of course.

This is considered to be the best resource in the field of test preparation equipment providers. Keep up the good work!

Sections1. Describe the Methodology used to design a network2. Describe network structure and modularity3. Design Basic Enterprise Campus Networks4. Design Enterprise Edge and Remote Network Modules5. Design IP Addressing and Routing Protocols6. Design network services

http://www.gratisexam.com/

Exam A

QUESTION 1What is the acceptable amount of one-way network delay for voice and video applications?

A. 300 bytesB. 1 secC. 150 msD. 500 ms

Correct Answer: CSection: Describe the Methodology used to design a networkExplanation

Explanation/Reference:Explanation:

Delay Components in VoIP NetworksThe ITU's G.I 14 recommendation specifics that the one-way delay between endpoints should not exceed 150 ms to be acceptable, commercial voice quality. Inprivate networks, somewhat longer delays might be acceptable for economic reasons. The ITU G.114 recommendation specifics that 151- ms to 400-ms one-waydelay might be acceptable provided that organizations are aware that the transmission time will affect the quality of user applications. One-way delays of above 400ms are unacceptable for general network planning purposes.

QUESTION 2Which mode is used to exclusively look for unauthorized access points?

A. monitor modeB. sniffer modeC. rogue detector modeD. local mode

Correct Answer: CSection: Describe the Methodology used to design a networkExplanation

Explanation/Reference:Explanation:

http://www.gratisexam.com/

Interference detection and avoidance: As Cisco LWAPs monitor all channels, interference is detected by a predefined threshold (10 percent by default). Interferencecan be generated by rogue APs, microwaves, cordless telephones, Bluetooth devices, neighboring WLANs, or other electronic devices.

QUESTION 3Which three types of WAN topologies can be deployed in the Service Provider Module? (Choose three.)

A. ringB. starC. full meshD. core/edgeE. collapsed coreF. partial mesh

Correct Answer: BCFSection: Describe the Methodology used to design a networkExplanation

Explanation/Reference:Explanation:

QUESTION 4Which statement describes the recommended deployment of DNS and DHCP servers in the Cisco Network Architecture for the Enterprise?

A. Place the DHCP and DNS servers in the Enterprise Campus Access layer and Enterprise branch.

http://www.gratisexam.com/

B. Place the DHCP and DNS servers in the Enterprise Campus Server Farm layer and Enterprise branch.C. Place the DHCP server in the Enterprise Campus Core layer and Remote Access_VPN module with the DNS server in the Internet Connectivity module.D. Place the DHCP server in the Enterprise Campus Distribution layer with the DNS server in the Internet Connectivity module.

Correct Answer: BSection: Describe the Methodology used to design a networkExplanation

Explanation/Reference:Explanation:For the Enterprise Campus, DHCP and internal DNS servers should be located in the Server Farm and they should be redundant. External DNS servers can beplaced redundantly at the service provider facility and at the Enterprise branch.

http://www.gratisexam.com/

http://www.gratisexam.com/

QUESTION 5Your company's Cisco routers are operating with EIGRP. You need to join networks with an acquisition's heterogeneous routers at 3 sites, operating with EIGRPand OSPF. Which describes the best practice for routing protocol deployment?

A. Apply OSPF throughout both networks

http://www.gratisexam.com/

B. Apply one-way redistribution exclusively at each locationC. Apply two-way redistribution exclusively at each locationD. Apply two-way redistribution at each location with a route filter at only one locationE. Apply two-way redistribution at each location with a route filter at each locationF. Apply EIGRP with the same autonomous system throughout both networks

Correct Answer: ESection: Describe the Methodology used to design a networkExplanation

Explanation/Reference:Explanation:Without filters there is possibility of routing loops. Link: http://www.cisco.com/en/US/tech/tk365/technologies_tech_note09186a008009487e.shtml

QUESTION 6Which two routing protocols converge most quickly? (Choose two.)

A. RIPv1B. RIPv2C. BGPD. OSPFE. EIGRP

Correct Answer: DESection: Describe the Methodology used to design a network

http://www.gratisexam.com/

Explanation

Explanation/Reference:Explanation:

QUESTION 7Which one of these statements is an example of how trust and identity management solutions should be deployed in the enterprise campus network?

A. Authentication validation should be deployed as close to the data center as possible.B. Use the principle of top-down privilege, which means that each subject should have the privileges that are necessary to perform their defined tasks, as well as

all the tasks for those roles below them.C. Mixed ACL rules, using combinations of specific sources and destinations, should be applied as close to the source as possible.D. For ease of management, practice defense in isolation - security mechanisms should be in place one time, in one place.

Correct Answer: CSection: Describe the Methodology used to design a networkExplanation

Explanation/Reference:Explanation:Validating user authentication should be implemented as close to the source as possible, with an emphasis on strong authentication for access from untrustednetworks. Access rules should enforce policy deployed throughout the network with the following guidelines:·Source-specific rules with any type destinations should be applied as close to the source as possible. ·Destination-specific rules with any type sources should beapplied as close to the destination as possible.·Mixed rules integrating both source and destination should be used as close to the source as possible.

An integral part of identity and access control deployments is to allow only the necessary access. Highly distributed rules allow for greater granularity and scalabilitybut, unfortunately, increase the management complexity. On the other hand, centralized rule deployment eases management but lacks flexibility and scalability.

Practicing "defense in depth" by using security mechanisms that back each other up is an important concept to understand. For example, the perimeter Internetrouters should use ACLs to filter packets in addition to the firewall inspecting packets at a deeper level.

Cisco Press CCDA 640-864 Official Certification Guide Fourth Edition, Chapter 13

QUESTION 8With deterministic Wireless LAN Controller redundancy design, the different options available to the designer have their own strengths. Which one of thesestatements is an example of such a strength?

A. Dynamic load balancing, or salt-and-pepper access point design, avoids the potential impact of oversubscription on aggregate network performance.B. N+N redundancy configuration allows logically grouping access points on controllers to minimize intercontroller roaming events.

http://www.gratisexam.com/

C. N+N+1 redundancy configuration has the least impact to system management because all of the controllers are colocated in an NOC or data center.D. N+1 redundancy configuration uses Layer 3 intercontroller roaming, maintaining traffic on the same subnet for more efficiency.

Correct Answer: BSection: Describe the Methodology used to design a networkExplanation

Explanation/Reference:Explanation:With such an arrangement there is no complex mesh of access points & controllers. Link: http://www.cisco.com/web/learning/le31/le46/cln/qlm/CCDA/design/understanding-wireless- network-controller-technology-3/player.html

N+N WLC RedundancyWith N+N redundancy, shown in Figure 5-14. an equal number of controllers hack up each other. For example, a pair of WLCs on one floor serves as a backup to asecond pair on another floor. The top WLC is primary for API and AP2 and secondary for AP3 and AP4. The bottom WLC is primary for AP3 and AP4 andsecondary for API and AP2. There should be enough capacity on each controller to manage a failover situation.

N+N+1 WLC RedundancyWith N+N+1 redundancy, shown in Figure 5-15, an equal number of controllers back up each other (as with N+N), plus a backup WLC is configured as the tertiaryWLC for the APs. N+N+1 redundancy functions the same as N+N redundancy plus a tertiary controller that backs up the secondary controllers. The tertiary WLC isplaced in the data center or network operations center

http://www.gratisexam.com/

QUESTION 9You have a campus network that consists of only Cisco devices. You have been tasked to discover the device platforms, the IOS versions, and an IP address ofeach device to map the network. Which proprietary protocol will assist you with this task?

A. SNMPB. TCPC. CDPD. ICMPE. LLDP

Correct Answer: CSection: Describe the Methodology used to design a networkExplanation

Explanation/Reference:Explanation:

QUESTION 10Which three technologies are recommended to be used for WAN connectivity in today's Enterprise Edge designs? (Choose three.)

A. DWDMB. Metro EthernetC. Frame RelayD. MPLS VPNE. ISDNF. DSLG. Wireless

Correct Answer: ABDSection: Describe the Methodology used to design a networkExplanation

Explanation/Reference:Explanation:

There is some discussion about whether ISDN not DWDM should be the answer but it does say TODAYS network

QUESTION 11WAN backup over the Internet is often used to provide primary connection redundancy. Which is the most important consideration when passing corporate traffic

http://www.gratisexam.com/

over the public Internet?

A. securityB. static versus dynamic routingC. bandwidthD. QoSE. latency

Correct Answer: ASection: Describe the Methodology used to design a networkExplanation

Explanation/Reference:Explanation:

WAN Backup over the InternetAnother alternative for WAN backup is to use the Internet as the connectivity transport between sites. However, keep in mind that this type of connection does notsupport bandwidth guarantees. The enterprise also needs to work closely with the ISP to set up the tunnels and advertise the company's networks internally so thatremote offices have reachable IP destinations. Security is of great importance when you rely on the Internet for network connectivity, so a secure tunnel using IPsecneeds to be deployed to protect the data during transport.

QUESTION 12To provide Layer 2 connectivity between the primary and remote data centers, given that the two data centers are using Layer 3 routed DCIs, which NX-OStechnology can be used to facilitate this requirement?

A. VRFB. OTVC. MPLSD. SPTE. VPC

Correct Answer: BSection: Describe the Methodology used to design a networkExplanation

Explanation/Reference:Explanation:

QUESTION 13

http://www.gratisexam.com/

Which of the following is a component within the Cisco Enterprise Campus module?

A. TeleworkerB. E-CommerceC. Internet ConnectivityD. Building DistributionE. WAN/MAN Site-to-Site VPN

Correct Answer: DSection: Describe network structure and modularityExplanation

Explanation/Reference:Explanation:

QUESTION 14What are the three primary functions of the distribution layer of the campus network design hierarchy? (Choose three.)

A. provide end-user connectivityB. provide high speed transportC. provide QoS servicesD. enforce security policiesE. provide WAN connectionsF. connect access devices to the core backbone

Correct Answer: CDFSection: Describe network structure and modularityExplanation

Explanation/Reference:Explanation:

QUESTION 15Which three solutions are part of the Borderless Network Services? (Choose three.)

A. WirelessB. RoutingC. TrustSec

http://www.gratisexam.com/

D. MediaNetE. SwitchingF. EnergyWiseG. Next-Gen WAN

Correct Answer: CDFSection: Describe network structure and modularityExplanation

Explanation/Reference:Explanation:

http://www.gratisexam.com/

Topic 3, Design Basic Enterprise Campus Networks

QUESTION 16Refer to the exhibit.

Which two statements correctly identify the layers of the Enterprise Campus module? (Choose two.)

http://www.gratisexam.com/

A. A is the Data Center Module and C is the Campus Core layer.B. A is the Data Center Module and D is the Building Access layer.C. B is the Campus Core layer and C is the Building Distribution layer.D. B is the Building Distribution layer and C is the Campus Core layer.E. A is the Internet Connectivity layer and B is the Campus Core layer.F. B is the Building Distribution layer and D is the Building Access layer.

Correct Answer: BCSection: Design Basic Enterprise Campus NetworksExplanation

Explanation/Reference:Explanation:Module characteristics show to which category the blocks belong to. Link: http://www.cisco.com/en/US/docs/solutions/Enterprise/Campus/campover.html#wp708780

QUESTION 17Which layer of the OSI model does Cisco recommend to place the enterprise network core layer, when designing a network based on its switched hierarchicaldesign?

A. Layer 1B. Layer 2C. Layer 3D. Layer 4

Correct Answer: CSection: Design Basic Enterprise Campus NetworksExplanation

Explanation/Reference:Explanation:

QUESTION 18OSPF will be used as the IGP within a campus network. Which two things should you consider before deployment? (Choose two.)

A. All areas need to connect back to area 0.B. The OSPF process number on each router should match.C. NSSA areas should be used when an area cannot connect directly to area 0.

http://www.gratisexam.com/

D. Stub areas should be connected together using virtual links.E. ECMP may cause undesired results depending on the environment.

Correct Answer: AESection: Design Basic Enterprise Campus NetworksExplanation

Explanation/Reference:Explanation:

QUESTION 19Which Cisco technology using Nexus NX-OS infrastructure allows the network architect to create up to four separate control and data plane instances of the Nexuschassis?

A. virtual port-channelB. virtual routing and forwardingC. virtual switching systemD. virtual device context

Correct Answer: DSection: Design Basic Enterprise Campus NetworksExplanation

Explanation/Reference:Explanation:

VirtualizationVirtual local-area network (VLAN), virtual storage-area network (VSAN), and virtual device contexts (VDC) help to segment the LAN, SAN, and network devicesinstances. Cisco Nexus 1000V virtual switch for VMware ESX and ESXI help to deliver visibility and policy control for virtual machines (VM).Flexible networking options with support for all server form factors and vendors, including support for blade servers from Cisco, Dell, IBM, and HP with integratedEthernet and Fiber Channel switches.

QUESTION 20Which three options are valid Cisco STP tools used to ensure best-practice access layer design for the enterprise campus? (Choose three.)

A. Port fastB. UDLDC. Root GuardD. BPDU Guard

http://www.gratisexam.com/

E. Flex LinksF. SPANG. Ether Channel

Correct Answer: ACDSection: Design Basic Enterprise Campus NetworksExplanation

Explanation/Reference:Explanation:

Access layer Limit VLANs to a single closet when possible to provide the most deterministic and highly available topology.Use RPVST+ if STP is required. It provides the best convergence.Set trunks to ON and ON with no-negotiateManually prune unused VLANs to avoid broadcast propagation. Use VTP Transparent mode, because there is little need for a common VLAN database inhierarchical networks.Disable trunking on host ports, because it is not necessary. Doing so provides more security and speeds up Port Fast.Consider implementing routing in the access layer to provide fast convergence and Layer 3 load balancing.Use Cisco STP Toolkit, which provides Port Fast, Loop Guard, Root Guard, and BPDU Guard.

QUESTION 21Spanning Layer 2 across geographically separate data centers is a key consideration for current data center designs. Which is the name of the NX-OS technologythat facilitates MAC in IP transport for Layer 2 VLANs across any IP network?

A. Overlay Transport VirtualizationB. Virtual Private LAN ServicesC. Generic Routing EncapsulationD. QinQ tunneling

Correct Answer: ASection: Design Basic Enterprise Campus NetworksExplanation

Explanation/Reference:Explanation:

QUESTION 22What is the primary consideration when choosing a routed network design over a traditional campus network design?

A. Layer 3 service support at the network edge

http://www.gratisexam.com/

B. the routing protocol choice: open (OSPF) or proprietary (EIGRP)C. the routing abilities of the host devicesD. the need to control the broadcast domains within the campus core

Correct Answer: ASection: Design Basic Enterprise Campus NetworksExplanation

Explanation/Reference:Explanation:Layer 3 ability at network edge should be available to leverage the benefits of routed network design. Link: http://www.cisco.com/en/US/docs/solutions/Enterprise/Campus/campover.html

QUESTION 23When selecting which hardware switches to use throughout an enterprise campus switched network, which consideration is not relevant?

A. whether data link layer switching based upon the MAC address is requiredB. the number of shared media segmentsC. which infrastructure service capabilities are requiredD. whether to support Layer 3 services at the network edge

Correct Answer: BSection: Design Basic Enterprise Campus NetworksExplanation

Explanation/Reference:Explanation:Shared media are not used in modern networks; all links are operating full-duplex Link: http://www.cisco.com/en/US/docs/solutions/Enterprise/Campus/campover.html

QUESTION 24Which two of these practices are considered to be best practices when designing the access layer for the enterprise campus? (Choose two.)

A. Implement all of the services (QoS, security, STP, and so on) in the access layer, offloading the work from the distribution and core layers.B. Always use a Spanning Tree Protocol; preferred is Rapid PVST+.C. Use automatic VLAN pruning to prune unused VLANs from trunked interfaces to avoid broadcast propagation.D. Avoid wasted processing by disabling STP where loops are not possible.E. Use VTP transparent mode to decrease the potential for operational error.

http://www.gratisexam.com/

Correct Answer: BESection: Design Basic Enterprise Campus NetworksExplanation

Explanation/Reference:Explanation:

When designing the building access layer, you must consider the number of users or ports required to size up the LAN switch. Connectivity speed for each hostshould also be considered. Hosts might be connected using various technologies such as Fast Ethernet, Gigabit Ethernet, or port channels. The planned VLANsenter into the design.

Performance in the access layer is also important. Redundancy and QoS features should be considered. The following are recommended best practices for thebuilding access layer:

· Limit VLANs to a single closet when possible to provide the most deterministic and highly available topology.· Use Rapid Per-VLAN Spanning Tree Plus (RPVST+) if STP is required. It provides the faster convergence than traditional 802.1d default timers.· Set trunks to ON and ON with no-negotiate.· Manually prune unused VLANs to avoid broadcast propagation (commonly done on the distribution switch).· Use VLAN Trunking Protocol (VTP) Transparent mode, because there is little need for a common VLAN database in hierarchical networks.· Disable trunking on host ports, because it is not necessary. Doing so provides more security and speeds up PortFast.· Consider implementing routing in the access layer to provide fast convergence and Layer 3 load balancing.· Use the switchport host commands on server and end-user ports to enable PortFast and disable channeling on these ports.· Use Cisco STP Toolkit, which provides· PortFast: Bypass listening-learning phase for access ports · Loop GuarD. Prevents alternate or root port from becoming designated in absence of bridge protocoldata units (BPDU)· Root GuarD. Prevents external switches from becoming root · BPDU GuarD. Disables PortFast-enabled port if a BPDU is received Cisco Press CCDA 640-864Official Certification Guide Fourth Edition, Chapter 3, Page 85

QUESTION 25Which of these statements is true concerning the data center access layer design?

A. The access layer in the data center is typically built at Layer 3, which allows for better sharing of services across multiple servers.B. With Layer 2 access, the default gateway for the servers can be configured at the access or aggregation layer.C. A dual-homing NIC requires a VLAN or trunk between the two access switches to support the dual IP addresses on the two server links to two separate

switches.D. The access layer is normally not required, as dual homing is standard from the servers to the aggregation layer.

Correct Answer: BSection: Design Basic Enterprise Campus NetworksExplanation

http://www.gratisexam.com/

Explanation/Reference:Explanation:

QUESTION 26Which one of these statements is true concerning the data center distribution (aggregation) layer design?

A. With Layer 3 at the aggregation layer, the physical loops in the topology must still be managed by STP.B. The boundary between Layer 2 and Layer 3 must reside in the multilayer switches, independent of any other devices such as firewalls or content switching

devices.C. A mix of both Layer 2 and Layer 3 access is sometimes the most optimal.D. In a small data center, the aggregation layer can connect directly to the campus core, exchanging IP routes and MAC address tables.

Correct Answer: CSection: Design Basic Enterprise Campus NetworksExplanation

Explanation/Reference:Explanation:

QUESTION 27Which is a factor in enterprise campus design decisions?

A. network application characteristicsB. routing protocol characteristicsC. switching latency characteristicsD. packet filtering characteristics

Correct Answer: ASection: Design Basic Enterprise Campus NetworksExplanation

Explanation/Reference:Explanation:

QUESTION 28Which network virtualization technology involves creating virtual routers with its own individual routing tables on a physical router?

A. VSSB. vPC

http://www.gratisexam.com/

C. VRFD. VLAN

Correct Answer: CSection: Design Basic Enterprise Campus NetworksExplanation

Explanation/Reference:Explanation:

QUESTION 29Which protocol is the recommended first-hop redundancy protocol for an existing infrastructure that contains multiple vendors and platforms?

A. HSRPB. VRRPC. IGRPD. OSPF

Correct Answer: BSection: Design Basic Enterprise Campus NetworksExplanation

Explanation/Reference:Explanation:

QUESTION 30Which IGP provides the fastest convergence by default?

A. EIGRPB. OSPFC. IS-ISD. RSTPE. BGP

Correct Answer: ASection: Design Basic Enterprise Campus NetworksExplanation

Explanation/Reference:

http://www.gratisexam.com/

Explanation:

QUESTION 31Which Gigabit Ethernet media type provides the longest reach without a repeater?

A. 1000Base-CXB. 1000Base-LXC. 1000Base-SXD. 1000Base-T

Correct Answer: BSection: Design Basic Enterprise Campus NetworksExplanation

Explanation/Reference:Explanation:

QUESTION 32Which three are associated with the distribution layer within the campus design? (Choose three.)

A. access layer aggregationB. route summarizationC. network trust boundaryD. next-hop redundancyE. layer 2 switchingF. port securityG. broadcast suppression

Correct Answer: ABDSection: Design Basic Enterprise Campus NetworksExplanation

Explanation/Reference:Explanation:

QUESTION 33High availability is a key design consideration in the enterprise campus network. In a fully redundant topology, which is likely to provide faster IGP convergenceduring a failure?

http://www.gratisexam.com/

A. redundant supervisorsB. redundant supervisors with Cisco Nonstop Forwarding (NSF) and Stateful Switchover (SSO)C. single supervisors with tuned IGP timersD. single supervisors

Correct Answer: CSection: Design Basic Enterprise Campus NetworksExplanation

Explanation/Reference:Explanation:

QUESTION 34What is a characteristic of campus core designs?

A. fast transportB. securityC. summarizationD. redistribution

Correct Answer: ASection: Design Basic Enterprise Campus NetworksExplanation

Explanation/Reference:Explanation:

QUESTION 35In the enterprise data center, which are the three main components? (Choose three.)

A. Network InfrastructureB. Interactive servicesC. Data Center ManagementD. Internet servicesE. WAN servicesF. VPN and remote access

Correct Answer: ABC

http://www.gratisexam.com/

Section: Design Basic Enterprise Campus NetworksExplanation

Explanation/Reference:Explanation:

QUESTION 36Which servers that reside in the data center require direct links to all other enterprise modules?

A. network management serversB. DHCP serversC. Active Directory serversD. IP SLA serversE. web servers

Correct Answer: ASection: Design Basic Enterprise Campus NetworksExplanation

Explanation/Reference:Explanation:

QUESTION 37When designing using the Cisco Enterprise Architecture, in which Enterprise Campus layer does the Remote Access and VPN module establish its connection?

A. Building AccessB. Campus CoreC. Enterprise BranchD. Enterprise Data Center

Correct Answer: BSection: Design Enterprise Edge and Remote Network ModulesExplanation

Explanation/Reference:Explanation:

QUESTION 38Which three describe challenges that are faced when deploying an environment for teleworkers? (Choose three.)

http://www.gratisexam.com/

A. supporting a mix of technically knowledgeable and nontechnical usersB. simplifying router installation and configurationC. verifying available power at employee's house for necessary equipmentD. avoiding situations where employees might use nonstandard hardware or configurationsE. reducing daily commuting time to main office locationF. providing access to FTP servers located in main office locationG. implementing leased line connectivity between main office and employee's home location

Correct Answer: ABDSection: Design Enterprise Edge and Remote Network ModulesExplanation

Explanation/Reference:Explanation:

QUESTION 39You need to connect to a remote branch office via an Internet connection. The remote office does not use Cisco equipment. This connection must be secure andmust support OSPF. Which of the following can be used to transport data to the branch office?

A. GRE over IPsecB. IPsecC. GRED. IPsec VTI

Correct Answer: ASection: Design Enterprise Edge and Remote Network ModulesExplanation

Explanation/Reference:Explanation:

QUESTION 40Which two are characteristics of a Lightweight Access Point? (Choose two.)

A. managed via a central wireless LAN controllerB. code upgrade performed via a TFTP serverC. CAPWAP tunnels

http://www.gratisexam.com/

D. managed directly via CLI or web interfaceE. facilitates the creation of its own WLANs and port mappings

Correct Answer: ACSection: Design Enterprise Edge and Remote Network ModulesExplanation

Explanation/Reference:Explanation:

QUESTION 41Which one of these statements describes why, from a design perspective, a managed VPN approach for enterprise teleworkers is most effective?

A. A managed VPN solution uses a cost-effective, on-demand VPN tunnel back to the enterprise.B. This solution supports all teleworkers who do not require voice or video.C. This architecture provides centralized management where the enterprise can apply security policies and push configurations.D. It provides complete flexibility for remote access through a wireless hotspot or a guest network at a hotel, in addition to a home office.

Correct Answer: CSection: Design Enterprise Edge and Remote Network ModulesExplanation

Explanation/Reference:Explanation:

QUESTION 42What are three key areas that need to be considered when designing a remote data center? (Choose three.)

A. power diversityB. active directory servicesC. Cisco IOS versionsD. data storageE. applicationsF. user accessG. packet routing

Correct Answer: ADESection: Design Enterprise Edge and Remote Network Modules

http://www.gratisexam.com/

Explanation

Explanation/Reference:Explanation:

QUESTION 43Which model of ISR is utilized for the teleworker design profile?

A. Cisco 1900 SeriesB. Cisco 1800 SeriesC. Cisco 800 SeriesD. Cisco 500 Series

Correct Answer: CSection: Design Enterprise Edge and Remote Network ModulesExplanation

Explanation/Reference:Explanation:

QUESTION 44When designing a WAN backup for voice and video applications, what three types of connections should be used? (Choose three.)

A. Private WANB. internetC. ISDND. MPLSE. dial-upF. ATMG. DSL

Correct Answer: ACDSection: Design Enterprise Edge and Remote Network ModulesExplanation

Explanation/Reference:Explanation:

QUESTION 45

http://www.gratisexam.com/

Which three options represents the components of the Teleworker Solution? (Choose three.)

A. Cisco Unified IP PhoneB. Cisco 880 Series RouterC. Aironet Office Extend Access PointD. Catalyst 3560 Series SwitchE. Cisco 2900 Series RouterF. MPLS Layer 3 VPNG. Leased lines

Correct Answer: ABESection: Design Enterprise Edge and Remote Network ModulesExplanation

Explanation/Reference:Explanation:

QUESTION 46When designing for a remote worker, which two are typical requirements? (Choose two.)

http://www.gratisexam.com/

A. best-effort interactive and low-volume traffic patternsB. connections to the enterprise edge using Layer 2 WAN technologiesC. always-on connection with SLA from ISPD. voice and IPsec VPN supportE. high-end security devices with stateful firewall filteringF. dual or multihoming to ISPs

Correct Answer: CDSection: Design Enterprise Edge and Remote Network ModulesExplanation

http://www.gratisexam.com/

Explanation/Reference:Explanation:

QUESTION 47What is the maximum number of groups that is supported by GLBP?

A. 64B. 256C. 512D. 1024

Correct Answer: DSection: Design Enterprise Edge and Remote Network ModulesExplanation

Explanation/Reference:Explanation:

QUESTION 48Which two routing protocols usually converge most quickly? (Choose two.)

A. RIPv1B. RIPv2C. BGPD. OSPFE. EIGRP

Correct Answer: DESection: Design IP Addressing and Routing ProtocolsExplanation

Explanation/Reference:Explanation:

QUESTION 49Which two routing protocols operate over NBMA point-to-multipoint networks without the use of point-to-point sub interfaces? (Choose two.)

A. RIPv1

http://www.gratisexam.com/

B. RIPv2C. IS-ISD. EIGRPE. OSPF

Correct Answer: DESection: Design IP Addressing and Routing ProtocolsExplanation

Explanation/Reference:Explanation:

QUESTION 50Refer to the exhibit.

http://www.gratisexam.com/

Which three modules would typically utilize public IPv4 addressing? (Choose three.)

A. AccessB. Distribution

http://www.gratisexam.com/

C. CoreD. Data CenterE. E-CommerceF. Internet ConnectivityG. Remote Access/VPNH. WAN/MANI. BranchJ. Branch Data Center

Correct Answer: EFGSection: Design IP Addressing and Routing ProtocolsExplanation

Explanation/Reference:Explanation:

QUESTION 51Which consideration is the most important for the network designer when considering IP routing?

A. convergenceB. scalabilityC. on-demand routingD. redistribution

Correct Answer: ASection: Design IP Addressing and Routing ProtocolsExplanation

Explanation/Reference:Explanation:

QUESTION 52Your supervisor has asked you to deploy a routing protocol within the lab environment that will allow for unequal cost multipath routing. Which should you choose?

A. EIGRPB. OSPFC. IS-ISD. RIP

http://www.gratisexam.com/

Correct Answer: ASection: Design IP Addressing and Routing ProtocolsExplanation

Explanation/Reference:Explanation:

QUESTION 53Which two methods are used to reduce the mesh links required between iBGP peers in the same AS? (Choose two.)

A. communityB. router reflectorsC. local preferenceD. confederationsE. atomic aggregateF. MED

Correct Answer: BDSection: Design IP Addressing and Routing ProtocolsExplanation

Explanation/Reference:Explanation:

QUESTION 54At which layer of the network is route summarization recommended?

A. data link layerB. core layerC. distribution layerD. access layer

Correct Answer: CSection: Design IP Addressing and Routing ProtocolsExplanation

Explanation/Reference:Explanation:

http://www.gratisexam.com/

QUESTION 55Which two link state routing protocols support IPv6 routing? (Choose two.)

A. BGP4+B. OSPFC. RIPngD. EIGRPE. IS-IS

Correct Answer: BESection: Design IP Addressing and Routing ProtocolsExplanation

Explanation/Reference:Explanation:

QUESTION 56Which type of area should you use in an enterprise OSPF deployment if you want to prevent propagation of type 5 LSAs but still allow the redistribution of externalroutes?

A. stubB. totally stubbyC. backboneD. NSSAE. virtual link

Correct Answer: DSection: Design IP Addressing and Routing ProtocolsExplanation

Explanation/Reference:Explanation:

QUESTION 57Which is usually used to connect to an upstream ISP?

A. EIGRPB. OSPF

http://www.gratisexam.com/

C. BGPD. IS-ISE. RIPv2

Correct Answer: CSection: Design IP Addressing and Routing ProtocolsExplanation

Explanation/Reference:Explanation:

QUESTION 58Refer to the list of requirements. Which IP telephony design model should you implement to fulfill these requirements? - must be a single, large location with manyremote sites - must have multisite WAN connectivity - requires SRST for call processing redundancy

A. centralizedB. distributedC. clusteredD. decentralized

Correct Answer: ASection: Design network servicesExplanation

Explanation/Reference:Explanation:

QUESTION 59A campus network needs end-to-end QoS tools to manage traffic and ensure voice quality. Which three types of QoS tools are needed? (Choose three.)

A. interface queuing and schedulingB. congestion managementC. compression and fragmentationD. bandwidth provisioningE. traffic classificationF. buffer management

Correct Answer: ADE

http://www.gratisexam.com/

Section: Design network servicesExplanation

Explanation/Reference:Explanation:

QUESTION 60

Select and Place:

Correct Answer:

http://www.gratisexam.com/

Section: Describe network structure and modularityExplanation

Explanation/Reference:Explanation:

http://www.cisco.com/en/US/docs/solutions/Enterprise/Security/SAFE_RG/chap5.html#wp1090913http://www.cisco.com/en/US/docs/solutions/Enterprise/Security/SAFE_RG/chap3.html

QUESTION 61

Select and Place:

http://www.gratisexam.com/

Correct Answer:

http://www.gratisexam.com/

Section: Design Basic Enterprise Campus NetworksExplanation

Explanation/Reference:Explanation:Network virtualization encompasses logical isolated network segments that share the same physical infrastructure. Each segment operates independently and islogically separate from the other segments. Each network segment appears with its own privacy, security, independent set of policies, QoS levels, and independentrouting paths.

Here are some examples of network virtualization technologies:

Device virtualization allows for a single physical device to act like multiple copies of itself. Device virtualization enables many logical devices to run independently ofeach other on the same physical piece of hardware. The software creates virtual hardware that can function just like the physical network device. Another form ofdevice virtualization entails using multiple physical devices to act as one logical unit.

Here are some examples of device virtualization technologies:

http://www.gratisexam.com/

Cisco Press CCDA 640-864 Official Certification Guide Fourth Edition, Chapter 4

QUESTION 62

Select and Place:

Correct Answer:

http://www.gratisexam.com/

Section: Design Basic Enterprise Campus NetworksExplanation

Explanation/Reference:Explanation:Layer 2 between distribution and access layers, with a Layer 3 link between the distribution switches-> Support Layer 2 VLANs spanning multiple access layer switches across the distribution switchesLayer 2 between distribution and access layers, with a Layer 2 link between the distribution switches-> FHRP for convergence, no VLANs span between access layer switches across the distribution switchesVSS -> Convergence (FHRP) is not an issue

The following are recommended best practices at the distribution layer:

Cisco Press CCDA 640-864 Official Certification Guide Fourth Edition, Chapter 3

QUESTION 63

Select and Place:

http://www.gratisexam.com/

Correct Answer:

Section: Design Basic Enterprise Campus NetworksExplanation

http://www.gratisexam.com/

Explanation/Reference:

QUESTION 64

Select and Place:

Correct Answer:

http://www.gratisexam.com/

Section: Design Enterprise Edge and Remote Network ModulesExplanation

Explanation/Reference:

QUESTION 65Which is part of the Prepare phase of PPDIOO?

A. Obtain site contact informationB. Perform network auditC. Identify customer requirementsD. Perform gap analysis

http://www.gratisexam.com/

Correct Answer: CSection: Describe the Methodology used to design a networkExplanation

Explanation/Reference:Explanation:

Prepare PhaseThe Prepare phase establishes organization and business requirements, develops a network strategy, and proposes a high-level conceptual architecture to supportthe strategy. Technologies that support the architecture are identified. This phase creates a business case to establish a financial justification for a network strategy.

QUESTION 66Which is the purpose of the Cisco NAC Profiler?

A. Automates discovery and inventory of all LAN attached devicesB. Generates a profile based on username and groupC. Learns and creates a database of virus definitions based on LAN trafficD. A database used to map user VPN accounts

Correct Answer: ASection: Describe the Methodology used to design a networkExplanation

http://www.gratisexam.com/

Explanation/Reference:Explanation:

Cisco NAC Profiler: Enables network administrators to keep a real-time, contextual inventory of all devices in a network. It greatly facilitates the deployment andmanagement of Cisco Network Admission Control (NAC) systems by discovering and tracking the location and type of all LAN- attached endpoints, including thosethat are not capable of authenticating. It also uses the information about the device to determine the correct policies for NAC to apply.

QUESTION 67Cisco Identity-Based Networking Services relies heavily on the 802.1X protocol. Which other authentication solution is used hand-in-hand with 802.1X toauthenticate users for network access?

A. RADIUSB. LEAPC. IPsecD. TACACSE. ISAKMP

Correct Answer: ASection: Describe the Methodology used to design a networkExplanation

Explanation/Reference:Explanation:

Cisco Identity-Based Network ServicesThe Cisco Identity-Based Network Services solution is a way to authenticate host access based on policy for admission to the network. IBNS supports identityauthentication, dynamic provisioning of VLANs on a per-user basis, guest VLANs, and 802.1X with port security. The 802.1 X protocol is a standards-based protocolfor authenticating network clients by permitting or denying access to the network. The 802.1 X protocol operates between the end-user client seeking access and anEthernet switch or wireless access point (AP) providing the connection to the network. In 802.1 X terminology, clients are called supplicants, and switches and APsare called authenticates. A back-end RADIUS server such as a Cisco Access Control Server (ACS) provides the user account database used to applyauthentication and authorization. With an IBNS solution, the host uses 802.IX and Extensible Authentication Protocol over LANs (EAPoL) to send the credentialsand initiate a session to the network. After the host and switch establish LAN connectivity, username and password credentials are requested. The client host thensends the credentials to the switch, which forwards them to the RADIUS ACS. The RADIUS ACS performs a lookup on the username and password to determinethe credentials' validity. If the username and password are correct, an accept message is sent to the switch or AP to allow access to the client host. If the usernameand password are incorrect, the server sends a message to the switch or AP to block the host port.Figure 13-4 illustrates the communication flow of two hosts using 802.1X and KAPoL with the switch, AP, and back-end RADIUS server.

QUESTION 68Which protocol is used to reserve bandwidth for the transport of a particular application data flow across the network?

http://www.gratisexam.com/

A. cRTPB. IEEE 802.1PC. RSVPD. LFIE. Auto QOS

Correct Answer: CSection: Describe the Methodology used to design a networkExplanation

Explanation/Reference:Explanation:

RSVP Signaling protocol that enables end stations or applications to obtain guaranteed bandwidth and low delays for their data flows.

QUESTION 69Which four services does the architecture for Media Services contain? (Choose four.)

A. access servicesB. transport servicesC. storage servicesD. forwarding servicesE. session control servicesF. security servicesG. filtering servicesH. remote access services

Correct Answer: ABCESection: Describe the Methodology used to design a networkExplanation

Explanation/Reference:Explanation:

An architecture framework for media services supports different models of video models. As shown in Figure 14-13, the network provides service to video media inthe Media Services Framework. Those services are access services, transport services, bridging services, storage servers, and session control services, which arcprovided to endpoints.Access services provide identity of end devices, mobility, and location services. Transport services provide QoS for reliable packet delivery. Bridging services

http://www.gratisexam.com/

provide transcoding, conferencing, and recording services of media streams. Storage services provide capture and storage of media streams and contentmanagement and distribution.Session control services provide session signaling and control and gateway services.

QUESTION 70Which WAN technology is a cost-effective method to deliver 100Mb of bandwidth to multiple branch offices?

A. DSLB. DWDMC. ISDND. Metro Ethernet

Correct Answer: DSection: Design network servicesExplanation

Explanation/Reference:

http://www.gratisexam.com/

Explanation:

QUESTION 71A company is implementing an Identity Management solution with these characteristics:

1) existing AAA Server2) Cisco Catalyst switches3) minimal added investments

Which Cisco Trust and Identity Management solution would you recommend?

A. NAC ApplianceB. Cisco IBNSC. CSMD. Cisco Security MARS

Correct Answer: BSection: Design network servicesExplanation

Explanation/Reference:Explanation:

QUESTION 72When considering the three VoIP design models - single site, centralized multisite, and distributed multisite - which question below would help to eliminate one ofthe options?

A. Will the switches be required to provide inline power?B. Will users need to make offsite calls, beyond the enterprise?C. Will users require applications such as voice mail and interactive voice response?D. Are there users whose only enterprise access is via a QoS-enabled WAN?

Correct Answer: DSection: Design network servicesExplanation

Explanation/Reference:Explanation:

QUESTION 73

http://www.gratisexam.com/

Which two devices would you place in your DMZ to ensure enterprise edge security? (Choose two.)

A. IPSB. NACC. ASAD. ACSE. WCS

Correct Answer: ACSection: Design network servicesExplanation

Explanation/Reference:Explanation:

QUESTION 74Which three are security services offered through Cisco Router Security? (Choose three.)

A. Trust and IdentityB. Integrated Threat ControlC. Unified Wireless Network Security SolutionD. Secure ConnectivityE. Voice-Messaging SecurityF. Endpoint SecurityG. Virtual Security Gateway

Correct Answer: ABDSection: Design network servicesExplanation

Explanation/Reference:Explanation:

QUESTION 75According to Cisco, which four improvements are the main benefits of the PPDIOO lifecycle approach to network design? (Choose four.)

A. faster ROIB. improved business agility

http://www.gratisexam.com/

C. increased network availabilityD. faster access to applications and servicesE. lower total cost of network ownershipF. better implementation team engagement

Correct Answer: BCDESection: Describe the Methodology used to design a networkExplanation

Explanation/Reference:Explanation:

The PPDIOO life cycle provides four main benefits:

+ It improves business agility by establishing business requirements and technology strategies. + It increases network availability by producing a sound networkdesign and validating the network operation.+ It speeds access to applications and services by improving availability, reliability, security, scalability, and performance.+ It lowers the total cost of ownership by validating technology requirements and planning for infrastructure changes and resource requirements.(Reference: Cisco CCDA Official Exam Certification Guide, 3rd Edition) described in the link below. Link: http://www.ciscopress.com/articles/article.asp?p=1608131&seqNum=3

QUESTION 76During which phase of the PPDIOO model would you conduct interviews with supporting staff to develop and propose a viable solution?

A. PrepareB. PlanC. DesignD. ImplementE. OperateF. Optimize

Correct Answer: ASection: Describe the Methodology used to design a networkExplanation

Explanation/Reference:Explanation:

http://www.gratisexam.com/

Prepare PhaseThe Prepare phase establishes organization and business requirements, develops a network strategy, and proposes a high-level conceptual architecture to supportthe strategy. Technologies that support the architecture are identified. This phase creates a business case to establish a financial justification for a network strategy.

QUESTION 77Which three are considered as technical constraints when identifying network requirements? (Choose three.)

A. support for legacy applicationsB. bandwidth support for new applicationsC. limited budget allocationD. policy limitationsE. limited support staff to complete assessmentF. support for existing legacy equipmentG. limited timeframe to implement

Correct Answer: ABFSection: Describe the Methodology used to design a networkExplanation

Explanation/Reference:Explanation:

Network design might be constrained by parameters that limit the solution. Legacy applications might still exist that must be supported going forward, and these

http://www.gratisexam.com/

applications might require a legacy protocol that may limit a design. Technical constraints include the following:·Existing wiring does not support new technology.·Bandwidth might not support new applications.·The network must support exiting legacy equipment.·Legacy applications must be supported (application compatibility).

QUESTION 78Characterizing an existing network requires gathering as much information about the network as possible. Which of these choices describes the preferred order forthe information-gathering process?

A. site and network audits, traffic analysis, existing documentation and organizational inputB. existing documentation and organizational input, site and network audits, traffic analysisC. traffic analysis, existing documentation and organizational input, site and network auditsD. site and network audits, existing documentation and organizational input, traffic analysis

Correct Answer: BSection: Describe the Methodology used to design a networkExplanation

Explanation/Reference:Explanation:

This section describes the steps necessary to characterize the existing network infrastructure and all sites. This process requires three steps:

Step 1. Gather existing documentation about the network, and query the organization to discover additional information. Organization input, a network audit, andtraffic analysis provide the key information you need. (Note that existing documentation may be inaccurate.) Step 2. Perform a network audit that adds detail to thedescription of the network. If possible, use traffic-analysis information to augment organizational input when you are describing the applications and protocols usedin the network.Step 3. Based on your network characterization, write a summary report that describes the health of the network. With this information, you can propose hardwareand software upgrades to support the network requirements and the organizational requirements.

Topic 2, Describe network structure and modularity

QUESTION 79Which three terms describe the primary functions of the distribution layer of the campus network design hierarchy? (Choose three.)

A. provides end-user connectivityB. provides high speed transportC. provides QoS servicesD. enforces security policies

http://www.gratisexam.com/

E. provides WAN connectionsF. connects access devices to the core backbone

Correct Answer: CDFSection: Describe network structure and modularityExplanation

Explanation/Reference:Explanation:Link: http://www.cisco.com/en/US/docs/solutions/Enterprise/Campus/campover.html#wp708979

QUESTION 80Refer to the exhibit.

http://www.gratisexam.com/

Which statement accurately represents the characteristics of the core layer in this design?

A. QoS should only be performed only in the core.B. Load balancing should never be implemented or used.C. Access lists should be used in the core to perform packet manipulation.D. Partial mesh should be used as long as it is connected to each device by multiple paths.E. Policy-based traffic control should be implemented to enable prioritization and ensure the best performance for all time-critical applications.

Correct Answer: DSection: Describe network structure and modularity

http://www.gratisexam.com/

Explanation

Explanation/Reference:Explanation:

QUESTION 81Which two of the following are benefits of using a modular approach to network design? (Choose two.)

A. improves flexibilityB. facilitates implementationC. lowers implementation costsD. improves customer participation in the design process

Correct Answer: ABSection: Describe network structure and modularityExplanation

Explanation/Reference:Explanation:

QUESTION 82Which technology enables WLCs to peer with each other to enable roaming support?

A. WAP profilesB. roaming profilesC. mobility groupsD. peer groups

Correct Answer: CSection: Design network servicesExplanation

Explanation/Reference:Explanation:

QUESTION 83Which IP telephony component supports VoIP, PoE, and QoS?

A. client endpoints

http://www.gratisexam.com/

B. voice-enabled infrastructureC. Cisco Unified Communications ManagerD. Cisco Unified Contact Center

Correct Answer: BSection: Design network servicesExplanation

Explanation/Reference:Explanation:

QUESTION 84Which voice codec should you use in order to provide toll quality calls?

A. G.711B. G.718C. G.722D. G.729

Correct Answer: ASection: Design network servicesExplanation

Explanation/Reference:Explanation:

QUESTION 85Which Cisco device has the sole function at looking at threat detection and mitigation at the Enterprise edge?

A. Cisco IOS routerB. Cisco ASAC. Cisco Catalyst FWSMD. Cisco IPS

Correct Answer: DSection: Design network servicesExplanation

Explanation/Reference:

http://www.gratisexam.com/

Explanation:

QUESTION 86Which three of these are layers in the Cisco SONA Architecture? (Choose three.)

A. ApplicationsB. Physical InfrastructureC. PresentationD. Integrated TransportE. Core Common ServicesF. Networked Infrastructure

Correct Answer: ABESection: Design network servicesExplanation

Explanation/Reference:

QUESTION 87

Select and Place:

http://www.gratisexam.com/

Correct Answer:

http://www.gratisexam.com/

Section: Describe the Methodology used to design a networkExplanation

Explanation/Reference:Explanation:

Small Branch DesignThe small branch design is recommended for branch offices that do not require hardware redundancy and that have a small user base supporting up to 50 users.This profile consists of an access router providing WAN services and connections for the LAN services.

The Layer 3 WAN services are based on the WAN and Internet deployment model. A T1 is used for the primary link, and an ADSL secondary link is used forbackup. Other network fundamentals are supported, such as EIGRP, floating static routes, and QoS for bandwidth protection.

Medium Branch DesignThe medium branch design is recommended for branch offices of 50 to 100 users, which is similar to the small branch but with an additional access router in theWAN edge (slightly larger) allowing for redundancy services.

http://www.gratisexam.com/

Large Branch DesignThe large branch design is the largest of the branch profiles, supporting between 100 and 1000 users. This design profile is similar to the medium branch design inthat it also provides dual access routers in the WAN edge. In addition, dual Adaptive Security Appliances (ASA) are used for stateful firewall filtering, and dualdistribution switches provide the multilayer switching component. The WAN services use an MPLS deployment model with dual WAN links into the WAN cloud.

Cisco Press CCDA 640-864 Official Certification Guide Fourth Edition, Chapter 7

QUESTION 88

Select and Place:

Correct Answer:

http://www.gratisexam.com/

Section: Describe the Methodology used to design a networkExplanation

Explanation/Reference:

QUESTION 89

Select and Place:

http://www.gratisexam.com/

Correct Answer:

http://www.gratisexam.com/

Section: Describe the Methodology used to design a networkExplanation

Explanation/Reference:

QUESTION 90Drag the characteristics of the traditional campus network on the left to the most appropriate hierarchical network layer on the right.

Select and Place:

Correct Answer:

http://www.gratisexam.com/

Section: Describe network structure and modularityExplanation

Explanation/Reference:

QUESTION 91You want to gather as much detail as possible during a network audit, to include data time stamping across a large number of interfaces, customized according tointerface, with a minimal impact on the network devices themselves. Which tool would you use to meet these requirements?

A. RMONB. SNMPv3C. NetFlowD. Cisco Discovery Protocol

Correct Answer: CSection: Describe the Methodology used to design a networkExplanation

http://www.gratisexam.com/

Explanation/Reference:Explanation:

NetFlow provides extremely granular and accurate traffic measurements and a high-level collection of aggregated traffic. The output of netflow information isdisplayed via the show ip cache flow command on routers. The Table shows a description of the fields for NetFlow output.Table. Netflow Output escription

QUESTION 92You want to gather as much detail as possible during a network audit with a minimal impact on the network devices themselves. Which tool would you use toinclude data time stamping across a large number of interfaces while being customized according to each interface?

A. RMONB. SNMPv3C. NetFlowD. Cisco Discovery Protocol

http://www.gratisexam.com/

Correct Answer: CSection: Describe the Methodology used to design a networkExplanation

Explanation/Reference:Explanation:

QUESTION 93In which phase of PPDIOO are the network requirements identified?

A. DesignB. PlanC. PrepareD. ImplementE. OperateF. Optimize

Correct Answer: BSection: Describe the Methodology used to design a networkExplanation

Explanation/Reference:Explanation:

http://www.gratisexam.com/

Plan PhaseThe Plan phase identifies the network requirements based on goals, facilities, and user needs. This phase characterizes sites and assesses the network, performsa gap analysis against best-practice architectures, and looks at the operational environment. A project plan is developed to manage the tasks, responsible parties,milestones, and resources to do the design and implementation. The project plan aligns with the scope, cost, and resource parameters established with the originalbusiness requirements. This project plan is followed (and updated) during all phases of the cycle.

QUESTION 94Refer to the exhibit.

http://www.gratisexam.com/

Which layer is the distribution layer?

A. Layer AB. Layer BC. Layer CD. Layers A and B form a consolidated core and distribution layer

Correct Answer: BSection: Describe the Methodology used to design a networkExplanation

http://www.gratisexam.com/

Explanation/Reference:Explanation:

QUESTION 95Which IPv6 feature enables routing to distribute connection requests to the nearest content server?

A. Link-localB. Site-localC. AnycastD. MulticastE. Global aggregatable

Correct Answer: CSection: Describe the Methodology used to design a networkExplanation

Explanation/Reference:Explanation:Any cast is a network addressing and routing methodology in which data grams from a single sender are routed to the topologically nearest node in a group ofpotential receivers all identified by the same destination address.Link: http://en.wikipedia.org/wiki/Anycast

QUESTION 96What is the recommended spanning tree protocol to use for all Layer 2 deployments in a branch office environment?

A. CSTB. RSPTC. PVSTD. MISTPE. Rapid PVST +

Correct Answer: ESection: Describe the Methodology used to design a networkExplanation

Explanation/Reference:Explanation:

http://www.gratisexam.com/

QUESTION 97Refer to the exhibit.

A standard, Layer 2 campus network design is pictured. Which numbered box represents the distribution layer?

http://www.gratisexam.com/

A. #1B. #2C. #3D. #4

Correct Answer: BSection: Describe the Methodology used to design a networkExplanation

Explanation/Reference:Explanation:

QUESTION 98Which two are types of network virtualization? (Choose two.)

A. VSS: Virtual Switching SystemB. VRF: virtual routing and forwardingC. VCI: virtual channel identifierD. VLSM: variable length subnet maskingE. VM: virtual machineF. VMP: Virtual Memory Pool

Correct Answer: ABSection: Describe the Methodology used to design a networkExplanation

Explanation/Reference:Explanation:

Network virtualization encompasses logical isolated network segments that share the same physical infrastructure. Each segment operates independently and islogically separate from the other segments. Each network segment appears with its own privacy, security, independent set of policies, QoS levels, and independentrouting paths.Here are some examples of network virtualization technologies:

VLAN: Virtual local-area networkVSAN: Virtual storage-area networkVRF: Virtual routing and forwardingVPN: Virtual private networkVPC: Virtual Port Channel

http://www.gratisexam.com/

QUESTION 99You are tasked with designing a new branch office that will support 75 users with possible expansion in the future and will need a highly available network. Which ofthe branch design profiles should be implemented?

A. large branch designB. medium branch designC. teleworker designD. small branch design

Correct Answer: BSection: Describe the Methodology used to design a networkExplanation

Explanation/Reference:Explanation:

Medium Branch DesignThe medium branch design is recommended for branch offices of 50 to 100 users, which is similar to the small branch but with an additional access router in theWAN edge (slightly larger) allowing for redundancy services. Typically, two 2921 or 2951 routers are used to support the WAN, and separate access switches areused to provide LAN connectivity.

QUESTION 100Which two can be used as a branch office WAN solution? (Choose two.)

A. frame relayB. MPLSC. Metro EthernetD. GPRSE. dial-up modemF. 3G USB modems

Correct Answer: BCSection: Describe the Methodology used to design a networkExplanation

Explanation/Reference:Explanation:Explanation

http://www.gratisexam.com/

Frame relay is old 'shared' technology today's sites use some flavor or Metro E or MPLS/VPN

QUESTION 101Which is the North American RIR for IPv4 addresses?

A. RIPEB. ARINC. IANAD. IEEEE. APNIC

Correct Answer: BSection: Design IP Addressing and Routing ProtocolsExplanation

Explanation/Reference:Explanation:

QUESTION 102Which two statements best describe an OSPF deployment? (Choose two.)

A. ABR provides automatic classful network boundary summarization.B. ABR requires manual configuration for classful network summarization.C. External routes are propagated into the autonomous system from stub areas via ASBR.D. External routes are propagated into the autonomous system from regular areas or NSSA via ASBR.E. External routes are propagated into the autonomous system from regular areas or NSSA via ABR.

Correct Answer: BDSection: Design IP Addressing and Routing ProtocolsExplanation

Explanation/Reference:Explanation:

QUESTION 103When you are designing a large IPv6 multivendor network, which IGP does Cisco recommend that you use?

A. OSPFv3B. EIGRP for IPv6

http://www.gratisexam.com/

C. BGPD. RIPng

Correct Answer: ASection: Design IP Addressing and Routing ProtocolsExplanation

Explanation/Reference:Explanation:Topic 6, Design network services

QUESTION 104You are asked to design a new branch office that will need to support 25 users. These users will be using an ISP connection and will need to connect to the mainoffice for network services. Which two Cisco devices are the most appropriate to fulfill all of these requirements? (Choose two.)

A. Cisco IPSB. Cisco ISR G2C. Cisco ASAD. Cisco 2960E. Cisco CRS-1F. Cisco ACS

Correct Answer: BCSection: Design network servicesExplanation

Explanation/Reference:Explanation:

QUESTION 105Which is the equation used to derive a 64 Kbps bit rate?

A. 2 x 8 kHz x 4-bit code wordsB. 8 kHz x 8-bit code wordsC. 2 x 4-bit code words x 8 kHzD. 2 x 4 kHz x 8-bit code words

Correct Answer: DSection: Design network services

http://www.gratisexam.com/

Explanation

Explanation/Reference:Explanation:

QUESTION 106Which factor would be most influential in choosing multimode fiber optic connections over UTP?

A. signal attenuationB. required bandwidthC. required distanceD. electromagnetic interferenceE. cost

Correct Answer: CSection: Design network servicesExplanation

Explanation/Reference:Explanation:

QUESTION 107Which subnet address and mask would you use for all Class D multicast addresses to be matched within an access list?

A. 224.0.0.0/20B. 224.0.0.0/4C. 239.0.0.0/24D. 239.0.0.0/8E. 225.0.0.0/8

Correct Answer: BSection: Design network servicesExplanation

Explanation/Reference:Explanation:

QUESTION 108Which WLC interface is dedicated for WLAN client data?

http://www.gratisexam.com/

A. virtual interfaceB. dynamic interfaceC. management interfaceD. AP manager interfaceE. service port interface

Correct Answer: BSection: Describe the Methodology used to design a networkExplanation

Explanation/Reference:Explanation:

WLC Interface TypesA WLC has five interface types:

Management interface (static, configured at setup, mandatory) is used for in-band management, connectivity to AAA, and Layer 2 discovery and association.Service-port interface (static, configured at setup, optional) is used for out-of-band management. It is an optional interface that is statically configured.AP manager interface (static, configured at setup, mandatory except for 5508 WLC) is used for Layer 3 discovery and association. It has the source IP address ofthe AP that is statically configured. Dynamic interface (dynamic) is analogous to VLANs and is designated for WLAN client data. Virtual interface (static, configuredat setup, mandatory) is used for leaver 3 security authentication, DHCP relay support, and mobility management.

QUESTION 109Your supervisor wants you to recommend a management protocol that will allow you to track overall bandwidth utilization, utilization by traffic type, and utilization bysource and destination. Which is ideally suited for this function?

A. MRTGB. NetFlowC. RRDD. SNMP

Correct Answer: BSection: Design network servicesExplanation

Explanation/Reference:Explanation:

http://www.gratisexam.com/

QUESTION 110Which three are features of LWAPP? (Choose three.)

A. firmware synchronizationB. local management of APsC. configuration changes manually syncedD. encryption of control channelE. configuration data only on the WLCF. wireless control free operationG. replaces 802.1x for authentication in wireless connections

Correct Answer: ADESection: Design network servicesExplanation

Explanation/Reference:Explanation:

QUESTION 111

Select and Place:

http://www.gratisexam.com/

Correct Answer:

Section: Describe the Methodology used to design a networkExplanation

Explanation/Reference:

QUESTION 112Western Associated News Agency recently acquired a large news organization with several sites, which will allow it to expand to worldwide markets. The newacquisition brings with it a multitude of connectivity technologies, including Frame Relay, ATM, SONET, cable, DSL, and wireless. Which Enterprise Edge modulewill receive the most attention from a Layer 1 viewpoint?

A. ISPB. PSTNC. Internet ConnectivityD. WANE. E-CommerceF. Edge Distribution

Correct Answer: DSection: (none)Explanation

http://www.gratisexam.com/

Explanation/Reference:Explanation:

QUESTION 113A company is migrating from IPv4 to IPv6. IP addresses are assigned to workstations using DHCP.Which three options can be considered to assign addresses toworkstations using IPv6? (Choose three.)

A. DHCPv6B. DNS serverC. manual configurationD. distributed address resolutionE. link local address

Correct Answer: ACESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 114Which kind of address translation is best when the servers on the internal network with private IPv4 addresses must be visible from the public network?

A. many-to-one translation (PAT)B. many-to-one translation (Dynamic NAT)C. one-to-one translation (Static NAT)D. one-to-one translation (NAT Traversal)

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 115Which IPv4 to IPv6 transition strategy uses an intermediate device that can translate either at the transport layer or the network layer?

http://www.gratisexam.com/

A. dual-stackB. tunnelingC. DSTMD. NAT-PTE. automatic

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 116A customer requires that a network designer show proof of concept for a redesigned remote access solution that will be implemented in the Enterprise Edgefunctional area of an existing network. Budget and time constraints require testing in only a portion of the existing Remote Access module.Which kind of test will beused to show proof of concept?

A. pilotB. prototypeC. simulationD. isolated

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 117FloCzar Boats is a marine transportation company that has undergone a period of rapid growth in the past year. The company has some issues with the NetworkManagement design, and would like to enhance the information that is available about the devices. It seems that only static information can be obtained, andFloCzar would like to be able to get information that will help to perform long-term trend analysis. The company is specifically concerned with Layer 4. Whichmanagement protocol will best meet the goals?

A. RMONB. SNMP

http://www.gratisexam.com/

C. NetFlowD. CDPE. RMON2

Correct Answer: ESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 118Access to airline scheduling systems is a mission critical requirement of a new network upgrade at a travel agency. A service level agreement (SLA) is included inthe design to assure a high level of availability.Which three capabilities must be included in the network design to manage the SLA? (Choose three.)

A. the identification and isolation of the SLA devices that cause an outageB. the monitoring for conformance to the SLAC. the determination of fault when an SLA is violatedD. the restoration of the configurations of failed devices covered by the SLAE. the reporting of SLA violations and performance trends

Correct Answer: BCESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 119The two networks shown in the diagram have very different traffic patterns, as illustrated by the black arrows. Network A has two departments organized in separateVLANs. Each department VLAN contains the servers and printers that are used by the department personnel. The only common resource used by bothdepartments is the email server, located on a remote network. Network B also has two departments organized in separate VLANs. All of the applications used byboth departments are located on common database servers. The common database servers are located in a server farm on a separate network from the users.Which three statements are true about the networks in this diagram? (Choose three.)

http://www.gratisexam.com/

A. Network A is designed to accommodate file transfers from other department servers on a frequent basis.B. The design in Network B will require a higher performance Layer 3 switch.C. Network B illustrates the 20/80 rule.D. Network B is designed so that distribution layer switches concentrate users in their own VLANs.E. Network A is designed to keep 80% of the traffic within the local workgroup.F. Network A is designed have 80% of the traffic pass through the Layer 3 switches.

Correct Answer: BCESection: (none)Explanation

Explanation/Reference:

http://www.gratisexam.com/

Explanation:

QUESTION 120Which three security measures can be used to DoS attacks that are directed at exposed hosts within the E-Commerce module? (Choose three.)

A. Place the exposed hosts on isolated LANs.B. Use firewalls to block all unnecessary connections to the exposed hosts.C. Use LAN switch access-control mechanisms, such as VTP pruning, to separate hosts on the same segment.D. Use NIDSs and HIDSs to monitor individual hosts and subnets to detect signs of attack and to identify potentially successful breaches.E. Use a VPN concentrator (IPSec) to protect and verify each connection to the exposed host or hosts.

Correct Answer: ABDSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 121AAA Video operates a chain of 50 video rental stores located in the Northwestern United States. They currently have a Point-of-Sale (POS) system in which eachstore posts its daily sales data and inventory changes to a central database through dial-up communication. There is no interaction between the stores and thecentral system during business hours. The central site runs on an Ethernet LAN. The only always-on WAN link is an Internet connection using wireless broadbandto a local ISP. AAA wants to enhance their service offering by creating a new E-Commerce web site where customers can browse and search a catalog of videotitles and select the ones they want for rental. The system will instantly communicate the order to the nearest store where employees pull the order and hold it untilthe customer picks it up. The service must operate on a 24x7 basis. AAA sees this new business strategy as a means to increase revenue and expand thebusiness nationally. They see an opportunity to expand the web site in the future to video, DVD and music sales on a worldwide level. The company wants all storesto be connected to the central site through WAN links. The company is upgrading the central inventory database so that sales and rentals can be postedimmediately in real-time. An Internet- based email and instant-messaging system will be set up for all headquarters employees and store managers to use. AAAbelieves that networking the stores will improve order fulfillment processes which will improve customer satisfaction and thus, boost revenue. It will also helpcommunication with store employees. AAA wants to upgrade the local LAN to a Gigabit and Fast Ethernet system to facilitate the demands of the new andupgraded systems. They have budgeted $500,000 for the networking equipment and another $10,000/month for the WAN charges including a faster Internetconnection. They believe that 256Kbps speeds will be adequate to the stores. Since they have no staff capable of managing the new network, they will hire twoengineers that already have the training and experience. The project must be complete in 6 months when the new inventory system goes online. The IT managerhas concerns about the security of the servers and workstations on the network when all stores become connected. He doesn'nt any Internet access to or from thestores. He is depending on you to recommend an effective yet affordable solution that will protect his system from intruders.What are three technical goals of AAAVideo with regard to this network design project? (Choose three.)

A. sell merchandise through the E-Commerce siteB. real-time posting of salesC. network security measures

http://www.gratisexam.com/

D. hire two new network engineersE. upgrade to a high-performance LANF. enhance service offerings

Correct Answer: BCESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 122Which three principles should be included in a good implementation plan? (Choose three.)

A. A less-knowledgeable network engineer should be able to implement the design.B. A good implementation design is composed of multiple small, complex implementation steps.C. A good implementation plan will not have many problematic incremental implementation steps that have to be repeated if there is a failure.D. When planning for implementation, try to reduce the number of steps in order to avoid complexity.E. A good implementation plan avoids being too complex.F. Good implementation plans must consider the possibility of failure.

Correct Answer: AEFSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 123A network summary report is a valuable tool in validating gathered information. Which information should it identify?

A. new network featuresB. infrastructure shortcomingsC. actions needed to support existing network featuresD. actions needed to support the existing networkE. customer requirementsF. customer requirement modifications

http://www.gratisexam.com/

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 124The two networks shown in the diagram have very different traffic patterns, as illustrated by the black arrows. Network A in this diagram has several independentdepartments, each with its own VLAN in which printers and servers are located. The only common resource is the mail server. Network B also has severaldepartments but they use common server resources. Which network represents 80/20 rule in a campus network?

A. Network A.B. Network B.

http://www.gratisexam.com/

C. Both networks are needed to achieve an 80/20 rule effect.D. Neither network represents the 80/20 rule.E. Both networks combined represent the 80/20 rule.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 125During which stage of the PDIOO process are implementation procedures prepared in advance to expedite and clarify the actual implementation?

A. PLANB. DESIGNC. IMPLEMENTD. OPERATEE. OPTIMIZEF. RETIREMENT

Correct Answer: BSection: (none)Explanation

http://www.gratisexam.com/

Explanation/Reference:Explanation:

QUESTION 126Which two layers of the OSI model should have a topology map furnished in the Draft Design Document? (Choose two.)

A. physicalB. data linkC. sessionD. applicationE. networkF. transport

Correct Answer: AESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 127When validating gathered information, the summary report recommendations correlate which items? (Choose two.)

A. existing networkB. summary report conclusionsC. customer requirementsD. infrastructure shortcomingsE. actions neededF. new features

Correct Answer: ACSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 128Each column in the table represents characteristics of a routing protocol. Choose one protocol that matches column B and one protocol that matches column E.

http://www.gratisexam.com/

(Choose two.)

A. OSPFB. BGPC. EIGRPD. IS-ISE. RIPv2

Correct Answer: ADSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 129Which two Cisco router services perform network traffic analysis to assist in documenting a customer'isting network? (Choose two.)

A. NetFlowB. CDP

http://www.gratisexam.com/

C. MRTGD. NetMonE. SNMP MIB compiler

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 130Which factor is a social requirement that will help you to identify current and future needs of your customer as you develop a new design plan?

A. improved communicationsB. business partnershipsC. improved customer-support servicesD. the use of the network by its users as it relates to investors

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 131Which network analysis tool can produce a graph of traffic utilization on router interfaces?

A. NBARB. MRTGC. NetFlowD. Cisco NetProfiler

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

http://www.gratisexam.com/

Explanation:

QUESTION 132Which value is the most commonly accepted threshhold of acceptable network response time.

A. 1 millisecondB. 4 millisecondsC. 10 millisecondsD. 40 millisecondsE. 100 millisecondsF. 400 milliseconds

Correct Answer: ESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 133Why are the PCM codecs used in Europe and parts of Asia incompatible with those used in North America and Japan?

A. echo cancellationB. code compandingC. pulse samplingD. noise suppressionE. band limiting

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 134Refer to the exhibit. What should R1 announce as the summarized address toward its upstream router?

http://www.gratisexam.com/

A. 10.1.0.0/24B. 10.1.1.16/24C. 10.1.1.16/26D. 10.1.1.16/28E. 10.1.1.16/30F. 10.1.1.16/32

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 135BodMech is an online fitness organization that specializes in creating fitness plans for senior citizens. They recently added a health-products retail inventory to theofferings. Which E-Commerce module device will be used for customers to interface with the company so that they can buy the products that they need?

A. NIDS appliancesB. SMTP mail serversC. database serversD. application servers

http://www.gratisexam.com/

E. web serversF. public servers

Correct Answer: ESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 136Which two closely related items does a Draft Design Document require that directly influence the network design? (Choose two.)

A. customer inputB. traffic analysisC. design requirementsD. existing network infrastructureE. logical topology mapF. physical topology map

Correct Answer: CDSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 137Which three are essential elements of a network design document that is ready to be presented to a customer? (Choose three.)

A. design specificationsB. organizational chartC. implementation planD. proof of conceptE. data sources

Correct Answer: ACDSection: (none)

http://www.gratisexam.com/

Explanation

Explanation/Reference:Explanation:

QUESTION 138Each column in the table represents characteristics of a routing protocol. Choose one protocol that matches column A and one protocol that matches column D.(Choose two.)

A. OSPFB. RIPC. ODRD. EIGRPE. IS-ISF. BGP

Correct Answer: BDSection: (none)Explanation

http://www.gratisexam.com/

Explanation/Reference:Explanation:

QUESTION 139Which information needs to be included in an implementation plan to allow an engineer implementing the plan access to further details?

A. corporate policies regarding protocols, standards, vendors, and applicationsB. reference to design documentsC. availability of trained personnel within the organizationD. budgetary resource limitations

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 140The state hospital has six clinics spread throughout the state connected to the main hospital facility through dedicated links. Doctors practicing in the state haveonline access to patient diagnostic, scheduling and billing data in various hospital databases. The hospital has signed new agreements with three insuranceproviders and they are planning to open a new clinic on the opposite side of the state. The new clinic will have a trauma center which will require constantcommunication with the local emergency dispatch center. What additional information should you obtain about applications in use on the network?

A. the authentication methods used by the applicationB. the routing protocols supported by the applicationC. the application data-link layer overheadD. the applications' level of criticality

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 141Which two routing protocols should be used given these requirements? (Choose two.) Within the Enterprise network: 1. All routers are Cisco 3600 Series routersrunning the latest Cisco IOS release. 2. The fastest convergence time possible is required. 3. Unequal cost load-balancing is required. For Internet connections: 1.

http://www.gratisexam.com/

A single link is used to connect to a single ISP.

A. Use OSPF as the IGP within the Enterprise.B. Use EIGRP as the IGP within the Enterprise.C. Use Internal BGP as the IGP within the Enterprise.D. Use External BGP between the Enterprise and the ISP.E. Use EIGRP between the Enterprise and the ISP.F. Use Static/Default routing between the Enterprise and the ISP.

Correct Answer: BFSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 142Which three pieces of information should be documented in each step of each phase of a design implementation plan? (Choose three.)

A. simple implementation guidelinesB. step descriptionC. design document referencesD. easy guidelines in case of failureE. estimated rollback time in case of failureF. estimated implementation time

Correct Answer: BCFSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 143Which modules in this figure of the Enterprise Edge functional area deploy e-commerce and provide connectivity between remote sites and the central site?(Choose two.)

http://www.gratisexam.com/

A. Module AB. Module BC. Module CD. Module DE. Module E

Correct Answer: ADSection: (none)Explanation

http://www.gratisexam.com/

Explanation/Reference:Explanation:

QUESTION 144Which three statements accurately reflect this Enterprise Edge functional area diagram? (Choose three.)

A. Area B is the Internet Connectivity module.B. The WAN module is illustrated by Area B.C. The VPN/Remote Access module is reflected in Area D.

http://www.gratisexam.com/

D. The Internet Connectivity module is comprised of the ISP, PSTN, and FR/ATM modules.E. The WAN module is shown as Area D.F. Area C represents the VPN/Remote Access module.

Correct Answer: AEFSection: (none)Explanation

Explanation/Reference:Explanation:

Topic 2, BB

QUESTION 145During which stage of the PDIOO process are implementation procedures prepared in advance to expedite and clarify the actual implementation?

A. PLANB. DESIGNC. IMPLEMENTD. OPERATEE. OPTIMIZEF. RETIREMENT

Correct Answer: BSection: (none)

http://www.gratisexam.com/

Explanation

Explanation/Reference:Explanation:

QUESTION 146Which three actions are made possible by the summary report recommendations? (Choose three.)

A. classification of new network featuresB. Design Document conclusionsC. network health descriptionD. proposed upgrades to hardware and softwareE. required feature supportF. customer requirement modification

Correct Answer: DEFSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 147An administrator is assigned the task of providing a unique VLAN for the sales group that is moving into an existing building. There are presently two otherworkgroups in this building with 82 users each. Both groups have a subnet within a private class B address with a 255.255.255.128 mask. The sales group initiallyhas 30 users, with a potential for growth to 52 users. The network uses RIPv1 routing protocol.Which subnet mask should be used for this new sales VLAN?

A. 255.255.255.128B. 255.255.255.192C. 255.255.255.224D. 255.255.255.240

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

http://www.gratisexam.com/

QUESTION 148This graphic represents a common multicast situation. The switch is a Layer 2 switch. Which three considerations are important in designing a solution? (Choosethree.)

A. The problem is that the default behavior for the router forwards the multicast traffic through every interface.B. The problem that needs to be overcome is the flooding on the Layer 2 switch.C. A solution may be deployed to allow the switch to find out from the router which users are part of the multicast group.D. The key is to deploy a solution that suppresses incoming traffic by bandwidth rather than by packets per second.E. A solution may be deployed to allow the examination of the IGMP data to determine which switch ports need to participate in a multicast group.F. Static entries that specify which ports should receive broadcast traffic must be eliminated and replaced by GVRP.

Correct Answer: BCESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 149Which two descriptions are characteristics of the basic IPv6 header? (Choose two.)

A. It is twice as big as an IPv4 header, 40 octets.B. It is always encrypted and hence is more secure than IPv4.C. It carries the full 128 bit source and destination IP addresses.D. It makes fragmentation performed at routers easier.E. It allows IPv6 datagrams to go through more hops/routers than IPv4.

Correct Answer: AC

http://www.gratisexam.com/

Section: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 150AAA Video operates a chain of 50 video rental stores located in the Northwestern United States. They currently have a Point-of-Sale (POS) system in which eachstore posts its daily sales data and inventory changes to a central database through dial-up communication. There is no interaction between the stores and thecentral system during business hours. The central site runs on an Ethernet LAN. The only always-on WAN link is an Internet connection using wireless broadbandto a local ISP. AAA wants to enhance their service offering by creating a new E-Commerce web site where customers can browse and search a catalog of videotitles and select the ones they want for rental. The system will instantly communicate the order to the nearest store where employees pull the order and hold it untilthe customer picks it up. The service must operate on a 24x7 basis. AAA sees this new business strategy as a means to increase revenue and expand thebusiness nationally. They see an opportunity to expand the web site in the future to video, DVD and music sales on a worldwide level. The company wants all storesto be connected to the central site through WAN links. The company is upgrading the central inventory database so that sales and rentals can be postedimmediately in real-time. An Internet- based email and instant-messaging system will be set up for all headquarters employees and store managers to use. AAAbelieves that networking the stores will improve order fulfillment processes which will improve customer satisfaction and thus, boost revenue. It will also helpcommunication with store employees. AAA wants to upgrade the local LAN to a Gigabit and Fast Ethernet system to ilitate the demands of the new and upgradedsystems. They have budgeted $500,000 for the networking equipment and another $10,000/month for the WAN charges including a faster Internet connection.They believe that 256Kbps speeds will be adequate to the stores. Since they have no staff capable of managing the new network, they will hire two engineers thatalready have the training and experience. The project must be complete in 6 months when the new inventory system goes online. The IT manager has concernsabout the security of the servers and workstations on the network when all stores become connected. He doesn'ant any Internet access to or from the stores. He isdepending on you to recommend an effective yet affordable solution that will protect his system from intruders.What are the business goals of AAA video that applyto this network design project? Choose two.

A. boost customer satisfactionB. improve employee communicationC. increase network securityD. upgrade the existing POS systemE. install the network in 6 months

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 151Which two layers of the OSI model should have a topology map furnished in the Draft Design Document? (Choose two.)

http://www.gratisexam.com/

A. physicalB. data linkC. sessionD. applicationE. networkF. transport

Correct Answer: AESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 152A Cisco Self-Defending Network has been installed, but DoS attacks are still being directed at e- commerce hosts. The connection rate at the Internet firewall waslimited, but the problem persists.What more can be done?

A. Move the servers to the DMZ.B. Install all relevant operating system patches.C. Block the servers' TCP traffic at the Internet firewall.D. Block the servers' UDP traffic at the Internet firewall.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 153RST Corporation is planning to upgrade its current network. The chief technology officer has supplied a topology diagram and an IP addressing scheme of thecurrent network during an interview.

RST has been growing at about twenty percent per year. It has been difficult to maintain customer support at a satisfactory level. Therefore, the RST board has metwith and directed the chief technology officer to look into network improvements.

Which two items are most relevant in documenting RST's business requirements? (Choose two.)

http://www.gratisexam.com/

A. existing network topologiesB. network performance requirementsC. the IP addresses assigned by the ISPD. improved customer support requirementsE. projected growth estimates

Correct Answer: DESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 154Refer to the exhibit. Which module is the Enterprise WAN module?

http://www.gratisexam.com/

A. Enterprise AB. Enterprise BC. Enterprise FD. Enterprise CE. Enterprise DF. Enterprise E

Correct Answer: DSection: (none)Explanation

http://www.gratisexam.com/

Explanation/Reference:Explanation:

QUESTION 155Which two of these best describe the implementation of a WAN Backup design over the Internet? (Choose two.)

A. a best-effort methodB. bandwidth guaranteed based on interface configurationC. designed as an alternative to a failed WAN connectionD. implemented with a point-to-point logical link using a Layer 2 tunnelE. requires no ISP coordination or involvement

Correct Answer: ACSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 156Which two design criteria require VLANs in a proposed solution? (Choose two.)

A. the segmenting of collision domainsB. a limited corporate budgetC. the use of multivendor equipmentD. security between departmentsE. video streaming on the LANF. the segmenting of broadcast domains

Correct Answer: DFSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 157Which two methods are used to enhance VPN performance on Cisco ISRs? (Choose two.)

http://www.gratisexam.com/

A. SSL Acceleration Network ModuleB. VPN Shared Port AdapterC. VPN Acceleration ModuleD. high-performance VPN encryption AIME. VPN Service AdapterF. built-in hardware-based encryption acceleration

Correct Answer: DFSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 158Which three factors best justify WAN link redundancy between geographically dispersed sites? (Choose three.)

A. high expense of transmitting dataB. important traffic flowsC. excessive packet transmission rateD. uncertain reliabilityE. high link utilizationF. lack of speed

Correct Answer: BDFSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 159Which three pieces of information should be documented for each step of each phase in a design implementation plan? (Choose three.)

A. easy guidelines in case of failureB. estimated rollback time in case of failureC. simple implementation guidelinesD. estimated implementation time

http://www.gratisexam.com/

E. design document referencesF. step description

Correct Answer: DEFSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 160The topology map in the draft design document should cover which two layers of the OSI model? (Choose two.)

A. sessionB. data linkC. transportD. applicationE. physicalF. network

Correct Answer: EFSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 161In a Cisco CatOS switch, what is the recommended practice when configuring switch-to-switch intercommunications to carry multiple VLANs for Dynamic TrunkProtocol?

A. auto to auto_negotiateB. disable Dynamic Trunk Protocol when operating in the distribution layerC. auto to auto_no_negotiateD. desirable to desirable_no_negotiateE. on to on_negotiateF. desirable to desirable_negotiate

http://www.gratisexam.com/

Correct Answer: FSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 162What are the two most likely driving forces motivating businesses to integrate voice and data into converged networks? (Choose two.)

A. Voice networks cannot carry data unless the PRI circuits aggregate the BRI circuits.B. Their PSTNs cannot deploy features quickly enough.C. Data, voice, and video cannot converge on their current PSTN structures.D. Voice has become the primary traffic on networks.E. WAN costs can be reduced by migrating to converged networks.

Correct Answer: ACSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 163Your company's Cisco routers are operating with EIGRP. You need to join networks with an acquisition's heterogeneous routers at 3 sites, operating with EIGRPand OSPF. Which describes the best practice for routing protocol deployment?

A. apply two-way redistribution exclusively at each locationB. apply one-way redistribution exclusively at each locationC. apply two-way redistribution at each location with a route filter at each locationD. apply OSPF throughout both networksE. apply two-way redistribution at each location with a route filter at only one locationF. apply EIGRP with the same autonomous system throughout both networks

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

http://www.gratisexam.com/

Explanation:

QUESTION 164A lightweight access point is added to a working network. Which sequence will it use to associate itself with a wireless LAN controller?

A. primary, secondary, tertiary, greatest AP capacity, masterB. primary, secondary, tertiary, master, greatest AP capacityC. master, primary, secondary, tertiary, greatest AP capacityD. greatest AP capacity, primary, secondary, tertiary, master

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 165Which three mechanisms are required to deploy QoS on an IP WAN? (Choose three.)

A. queuing and schedulingB. Call Admission ControlC. traffic shapingD. link efficiency techniquesE. traffic classificationF. bandwidth provisioning

Correct Answer: BCDSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 166Which two statements best describe the implementation of Overlay VPN connectivity for remote access in the Enterprise Edge WAN module? (Choose two.)

A. Bandwidth is provisioned on a site-to-site basis.B. It uses dedicated point-to-point links.

http://www.gratisexam.com/

C. Optimum routing between customer sites requires a full mesh of virtual circuits.D. It must use Layer 2 labels to forward packetsE. The ISP actively participates in customer routing.

Correct Answer: ACSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 167A manufacturing company has decided to add a website to enhance sales. The web servers in the E- Commerce module must be accessible without compromisingnetwork security. Which two design recommendations can be made to meet these requirements? (Choose two.)

A. Move the E-Commerce servers to the WAN module.B. Use intrusion detection on the E-Commerce server farm.C. Limit the number of incoming connections to the E-Commerce module.D. Use private and public key encryption.E. Place E-Commerce servers and application servers on isolated LANs (DMZs).

Correct Answer: BESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 168After a period of rapid growth, FloCzar Boats is seeking better network management tools. Managers have developed this needs list:

Move from static to dynamic device information.Gain information to assist in long-term trend analysis.Concentrate on Layer 4 monitoring.

Which management protocol will most help FloCzar achieve its goals?

A. RMON2B. SNMP

http://www.gratisexam.com/

C. NetFlowD. RMONE. Cisco Discovery Protocol

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 169At which stage in the PPDIOO process would you analyze a customer's network in order to discover opportunities for network improvement?

A. OperateB. Implement

http://www.gratisexam.com/

C. PlanD. DesignE. PrepareF. Design Assessment

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 170A very large organization has received its IPv6 address range from its Internet Service Provider and intends to use only IPv6 addresses internally. Employees willaccess the Internet using port address translation. What is a requirement for their DNS servers?

A. There are no changes required to their DNS servers.B. Their DNS servers need to support only IPv6 addresses.C. Their DNS servers need to support only IPv4 addresses.D. They need additional DNS servers in their network just for IPv6 addresses.E. They no longer need DNS servers.F. Their DNS servers need to support both IPv4 and IPv6 addresses.

Correct Answer: FSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 171Which two statements represent advantages that the top-down network design process has over the bottom-up network design process? (Choose two.)

A. utilizes previous experienceB. identifies appropriate technologies firstC. is able to provide the big pictureD. takes less time to design a networkE. provides a design for current and future development

http://www.gratisexam.com/

Correct Answer: CESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 172Which two statements about IPv6 addresses are true? (Choose two.)

A. Two colons (::) are used to represent successive hexadecimal fields of zeros.B. Leading zeros are required.C. Two colons (::) are used to separate fields.D. A single interface will have multiple IPv6 addresses of different types.

Correct Answer: ADSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 173Which three security measures can be used to mitigate DoS attacks that are directed at exposed hosts within the E-Commerce module? (Choose three.)

A. Use NIDSs and HIPSs to detect signs of attack and to identify potentially successful breaches.B. Partition the exposed hosts into a separate LAN or VLAN.C. Use LAN switch VTP pruning to separate hosts on the same segment.D. Use a VPN concentrator (IPSec) to protect and verify each connection to the exposed host or hosts.E. Use firewalls to block all unnecessary connections to the exposed hosts.

Correct Answer: ABESection: (none)Explanation

Explanation/Reference:Explanation:

http://www.gratisexam.com/

QUESTION 174Which technology can ensure data confidentiality, data integrity, and authentication across a public IP network?

A. VSANsB. VPDNsC. VLANsD. GREE. IPsec

Correct Answer: ESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 175Which statement best describes Call Admission Control?

A. It extends QoS capabilities to protect voice from excessive data traffic.B. It protects voice from voice.C. It provides endpoint registration control.D. It provides endpoint bandwidth control.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 176A customer wishes to implement VoIP using centralized call-processing. In addition, the customer wishes to establish a balance between good voice quality andgood bandwidth utilization. Which codec would you suggest?

A. G.711B. G.729C. G.726

http://www.gratisexam.com/

D. G.723.1

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 177Which three sources does a network designer use to collect information for characterizing an existing network? (Choose three.)

A. server statisticsB. network auditC. traffic analysisD. visual inventoryE. staff input

Correct Answer: BCESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 178Which of the following Cisco router services performs network traffic analysis to assist in documenting a customer's existing network?

A. NetMonB. MRTGC. SNMP MIB compilerD. NetFlow

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

http://www.gratisexam.com/

QUESTION 179Refer to the exhibit.

A standard, Layer 2 campus network design is pictured. Which numbered box represents the distribution layer?

A. #1B. #3C. #4D. #2

http://www.gratisexam.com/

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 180Which statement identifies a benefit obtained when using a top-down network design plan?

A. provides a more detailed picture of the desired networkB. facilitates design based on previous experienceC. is less time-consuming than using a bottom-up approachD. allows quick responses to design requestsE. incorporates customer organizational requirements

Correct Answer: ESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 181Lightweight access points are being deployed in remote locations where others are already operational. The new access points are in a separate IP subnet from thewireless controller. OTAP has not been enabled at any locations. Which two methods can the AP use to locate a wireless controller? (Choose two.)

A. NV-RAM IP addressB. masterC. primary, secondary, tertiaryD. DHCPE. local subnet broadcastF. DNS

Correct Answer: DFSection: (none)Explanation

Explanation/Reference:

http://www.gratisexam.com/

Explanation:

QUESTION 182Which Cisco security solution can quarantine and prevent non-compliant end stations from accessing the network until they achieve security policy compliance?

A. Cisco Security Monitoring, Analysis, and Response SystemB. Adaptive Security ApplianceC. Network Admission ControlD. Network Intrusion Prevention SystemE. Cisco Secure ConnectivityF. Access Control Server

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 183A network design includes private addressing, but there is also a need for two or three network devices to each be assigned a unique public address so they can beaccessed from the Internet. Which technique will satisfy this requirement?

A. Static NATB. VPN tunnelingC. Dynamic NATD. DHCP

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 184A Cisco security mechanism has the following attributes:

it is a sensor appliance

http://www.gratisexam.com/

it searches for potential attacks by capturing and analyzing traffic it is a "purpose-built device"it is installed passivelyit introduces no delay or overhead

Which Cisco security mechanism is this?

A. NIDSB. PIXC. IKED. HIPSE. HMAC

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 185Which two routing protocols operate over NBMA point-to-multipoint networks without the use of point-to-point subinterfaces? (Choose two.)

A. OSPFB. EIGRPC. RIPv2D. RIPv1E. IGRPF. IS-IS

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 186Which three types of WAN topologies can be deployed in the Cisco Enterprise Architecture Enterprise Edge WAN module? (Choose three.)

http://www.gratisexam.com/

A. ringB. full meshC. partial meshD. collapsed coreE. starF. coreG. edge

Correct Answer: BDESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 187Which statement accurately describes one difference between a small office and medium office topology?

A. Medium offices commonly use integrated route and switching platforms.B. Medium offices use integrated 10/100/1000 interfaces as Layer 2 trunks.C. Medium offices use external access switches to support LAN connectivity.D. Small offices commonly use Rapid PVST+ for Layer 3 deployments.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 188Which of these is the best routing deployment for a single dedicated link to an ISP for Internet access?

A. OSPFB. StaticC. RIPD. EIGRPE. BGP

http://www.gratisexam.com/

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 189Refer to the exhibit. Which two statements correctly identify the layers of the Enterprise Campus module? (Choose two.)

http://www.gratisexam.com/

A. B is the Building Distribution layer and D is the Building Access layer.B. B is the Building Distribution layer and C is the Campus Core layer.C. B is the Campus Core layer and C is the Building Distribution layer.D. A is the Server Farm layer and C is the Campus Core layer.E. A is the Server Farm layer and D is the Building Access layer.

http://www.gratisexam.com/

F. A is the Internet Connectivity layer and B is the Campus Core layer.

Correct Answer: CESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 190A customer has the following Enterprise Campus design requirements:

at least 10 Gbps of bandwidthnetwork runs of up to 40kmno concern for transmission medium cost

Which transmission medium should you recommend to this customer?

A. unshielded twisted pairB. shielded twisted pairC. single-mode fiberD. wirelessE. multimode fiber

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 191You design a network with the following network addresses:

192.168.168.0192.168.169.0192.168.170.0192.168.171.0192.168.172.0192.168.173.0

http://www.gratisexam.com/

192.168.173.0192.168.174.0192.168.175.0

Which route address is the best summary of these network addresses?

A. 192.168.0.0/16B. 192.168.168.0/21C. 192.168.0.0/24D. 192.168.171.128/3E. 192.168.175.0/3F. None of the above

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

Route Summarization is called route aggregation. Route aggregation creates one route in the routing table represents many other routes. Summarizing routesreduces the routing update traffic and reduces the number of routes in the routing table and overall router overhead in the router receiving the routes

Example of creating Summary Route:

192.168.168.0 = 11000000 10101000 10101 000 00000000192.168.169.0 = 11000000 10101000 10101 001 00000000192.168.170.0 = 11000000 10101000 10101 010 00000000192.168.171.0 = 11000000 10101000 10101 011 00000000192.168.172.0 =11000000 10101000 10101 100 00000000192.168.173.0 = 11000000 10101000 10101 101 00000000192.168.174.0 =11000000 10101000 10101 110 00000000192.168.175.0 =11000000 10101000 10101 111 00000000

Number of Common Bits = 21Number of Non-Common Network Bits = 3Number of Host Bits = 8

So Answer 192.168.168.0/21 is correct.

QUESTION 192

http://www.gratisexam.com/

Which two of the following statements represent a preferred wireless LWAPP implementation? (Choose two.)

A. verify open ports for: Layer 2 LWAPP on ethertype OxBBBB Layer 3 LWAPP on UDP 12222 and UDP 12223B. use of Layer 3 LWAPP is preferred over Layer 2 LWAPPC. use of Layer 2 LWAPP is preferred over Layer 3 LWAPPD. verify open ports for: Layer 2 LWAPP on ethertype OxBABA Layer 3 LWAPP on UDP 12222 and TCP 12223E. verify open ports for: Layer 2 LWAPP on ethertype OxABAB Layer 3 LWAPP on TCP 12222 and TCP 12223

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 193Which two capabilities of NetFlow accounting assist designers with network planning? (Choose two.)

A. the monitoring of processor time on network devicesB. the calculation of packet and byte counts of network trafficC. the decoding and analyzing of packetsD. the presentation of a time-based view of application usage on the networkE. the monitoring of user network utilization

Correct Answer: BESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 194Which of these is the equation used to derive a 64 Kbps bit rate?

A. 2 x 4 kHz x 8-bit code wordsB. 2 x 4-bit code words x 8 kHzC. 8 kHz x 8-bit code wordsD. 2 x 8 kHz x 4-bit code words

http://www.gratisexam.com/

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 195What is the benefit of deploying a gatekeeper in an H.323 IP telephony network?

A. provides spatial redundancy through the use of HSRPB. provides load balancing via GUP when alternate gatekeepers are deployedC. reduces configuration complexity by centralizing the dial planD. increases redundancy by allowing each gateway to maintain a copy of the dial plan

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 196An organization needs a WAN Transport technology that meets these criteria:

has a low initial costprovides low-to-medium BWhas medium-to-high latency and jitter

Which technology would you suggest?

A. ISDNB. X.25C. analog modemD. DSLE. wireless

Correct Answer: D

http://www.gratisexam.com/

Section: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 197Which Cisco security solution offers protection against "day zero" attacks?

A. Cisco IOS IPSB. Cisco IOS FirewallC. Cisco Traffic Anomaly DetectorD. Cisco Adaptive Security ApplianceE. Cisco Security Agent

Correct Answer: ESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 198Which type of trunk is required in order to connect a fax machine to a PBX?

A. intra-officeB. Foreign Exchange OfficeC. central officeD. Foreign Exchange StationE. inter-office

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 199

http://www.gratisexam.com/

Which two statements best describe an OSPF deployment? (Choose two.)

A. External routes are propagated into the autonomous system from regular areas or NSSA via ABR.B. ABR requires manual configuration for classful network summarization.C. ABR provides automatic classful network boundary summarization.D. External routes are propagated into the autonomous system from regular areas or NSSA via ASBR.E. External routes are propagated into the autonomous system from stub areas via ASBR.

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:Explanation:

Topic 2, Volume B

QUESTION 200Which H.323 protocol controls call setup between endpoints?

A. RTCPB. H.245C. H.225D. RAS

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 201Which two of these represent a best practice implementation of a Split MAC LWAPP deployment in a Cisco Unified Wireless Network? (Choose two.)

A. Each wireless client authentication type maps to a unique SSID which in turn maps to a unique VLAN.B. 802.1Q trunking extends from the wired infrastructure to the access point for translation into SSID(s).C. 802.1Q trunking extends from the wired infrastructure to a wireless LAN controller for translation into SSID(s).

http://www.gratisexam.com/

D. Each wireless client authentication type maps to a shared SSID which in turn maps to a common shared VLAN.E. Each wireless client authentication type maps to a unique SSID which in turn maps to a common shared VLAN.F. 802.1Q trunking extends from the wired infrastructure to a wireless LAN controller. Then the 802.1Q packet is encapsulated in LWAPP and sent to the access

point for transmission over the SSID(s).

Correct Answer: ACSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 202Which two statements best describe intradomain route summarization? (Choose two.)

A. EIGRP and OSPF must be manually configured to summarize at non-classful boundaries.B. EIGRP and OSPF automatically summarize at classful network boundaries.C. OSPF and RIP automatically summarize at classful network boundaries.D. EIGRP and RIP automatically summarize at classful network boundaries.E. EIGRP and OSPF automatically summarize at non-classful boundaries.

Correct Answer: ADSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 203Which two VoIP characteristics are affected most by codec choice? (Choose two.)

A. voice qualityB. voice packet header sizeC. bandwidth required for voice callsD. silent packet handling

Correct Answer: ACSection: (none)

http://www.gratisexam.com/

Explanation

Explanation/Reference:Explanation:

QUESTION 204A network design document is being prepared for a customer. Which three network design elements must be included? (Choose three.)

A. proof of conceptB. data sourcesC. design detailsD. organizational policiesE. implementation plan

Correct Answer: ACESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 205Which of these accurately describes dial backup routing?

A. it always uses distance vector routing protocolsB. once the backup link is activated it will remain active even after the primary link is restoredC. it always uses permanent static routesD. it is supplied by the service provider as a secondary PVC at no additional chargeE. the router intiates the dial backup link when a failure is detected on the primary link

Correct Answer: ESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 206Which statement correctly describes queuing in environments supporting teleworkers?

http://www.gratisexam.com/

A. Queuing occurs on the outbound interface.B. Hardware queues are configured for appropriate PQ, CQ, or WFQ.C. Priority queuing guarantees some level of service to all traffic.D. WFQ is the Cisco IOS default on all WAN links regardless of speed.E. CQ is for time-sensitive protocols.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 207Which two techniques can reduce voice packet transfer delay across a link of less than 512 kbps? (Choose two.)

A. deploy LFIB. increase link bandwidthC. extend the trust boundaryD. deploy software compressionE. increase queue depth

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 208Your company uses OSPF for internal routing. The company will be connected to VendorA via a single dedicated link and to VendorB via redundant dedicated links.Both vendors also use OSPF for internal routing. Which of the following deployments describes the best intra-domain routing practice in this situation?

A. Redistribute the routes on each link between your company and the vendors to a shared EIGRP routing protocol.B. Use IBGP to reach VendorA and EBGP to reach VendorB.C. Use static routes to reach VendorA and EBGP to reach VendorB.D. Use static routes to reach both VendorA and VendorB.

http://www.gratisexam.com/

E. Connect your company to both VendorA and VendorB using existing OSPF.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 209Which statement can a network designer use to describe route summarization to an IT manager?

A. It is the grouping of ISP network addresses to minimize the number of routes to the Internet.B. It is the grouping of multiple discontiguous subnets to increase routing performance.C. It is the grouping of multiple contiguous networks and advertising as one large network.D. It is the grouping of multiple contiguous subnets into one Class A, B, or C IP address to minimize routing table size.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 210Refer to the exhibit. All primary links are T1s. The customer wants to have a backup to each remote office from the Headquarters office.

Which two types of backup links would be viable solutions? (Choose two.)

http://www.gratisexam.com/

A. dial backup routingB. shadow SVCC. permanent secondary WAN linkD. VPDN

Correct Answer: ACSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 211A Cisco SONA architecture layer is described as follows:

http://www.gratisexam.com/

The layer's IT resources are interconnected across a converged network foundation. The layer's IT resources include servers, storage, and clients. The layerrepresents how resources exist across the network. The customer objective for the layer is to have anywhere/anytime connectivity.

Which Cisco SONA architecture layer is being described?

A. ApplicationB. Integrated TransportC. PhysicalD. Networked InfrastructureE. Interactive Services

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 212Refer to the exhibit.

A standard Layer 2 campus network design is pictured. Which numbered box represents the core layer?

http://www.gratisexam.com/

A. #4B. #2C. #5D. #1E. #3

Correct Answer: ESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 213Which information should a network summary report identify?

A. actions needed to support the existing network

http://www.gratisexam.com/

B. customer requirementsC. new network featuresD. customer requirement modificationsE. actions needed to support existing network featuresF. infrastructure shortcomings

Correct Answer: FSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 214Given a VoIP network with these attributes:

Codec: G.711WAN bandwidth: 768KbpsPacket Header: 6 bytesPayload: 160 bytesCRTP: No

How many calls can be made?

A. 7 callsB. 13 callsC. 8 callsD. 9 callsE. 11 calls

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 215What are three valid methods of gathering information about an existing data network? (Choose three.)

http://www.gratisexam.com/

A. Use organizational input.B. Analyze the user-mapping of a running application.C. Perform a traffic analysis.D. Perform a packet-level audit to verify carrier service guarantees.E. Use reports that analyze the metrics of the customer's existing network.F. Perform a network audit to gather more detail about the network.

Correct Answer: ACFSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 216Which two of these are required for wireless client mobility deployment when using a Cisco Unified Wireless Network? (Choose two.)

A. matching RF powerB. matching securityC. assigned master controllerD. matching mobility group nameE. matching RF channelF. matching RF group name

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 217According to Cisco, which four improvements are the main benefits of the PPDIOO lifecycle approach to network design? (Choose four.)

A. improved business agilityB. faster access to applications and servicesC. better implementation team engagement

http://www.gratisexam.com/

D. faster ROIE. lower total cost of network ownershipF. increased network availability

Correct Answer: ABEFSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 218In the Cisco branch office design, what categorizes an office as large?

A. between 50 and 100 users and a single-tier designB. between 100 and 200 users and a three-tier designC. between 50 and 100 users and a three-tier designD. over 200 users and a two-tier designE. between 100 and 200 users and a two-tier design

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 219Which three terms describe the primary functions of the distribution layer of the campus network design hierarchy? (Choose three.)

A. connects access devices to the core backboneB. provides end-user connectivityC. enforces security policiesD. provides QoS servicesE. provides WAN connectionsF. provides high speed transport

Correct Answer: ACD

http://www.gratisexam.com/

Section: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 220Refer to the exhibit. Which two statements describe why Model A is the recommended design for routing between Building Distribution switches and Campus Coreswitches? (Choose two.)

A. It uses timer-based non-deterministic convergence.B. The Layer 3 redundant equal cost links support fast convergence.C. Routes are not summarized from distribution to the core.D. A link or box failure does not require routing protocol convergence.E. It is software-based, providing fast convergence to the remaining path.

Correct Answer: BDSection: (none)Explanation

http://www.gratisexam.com/

Explanation/Reference:Explanation:

QUESTION 221A company is designing a worldwide IPv6 network with duplicated file servers at multiple locations. Each file server contains identical reference information. WhichIPv6 address type would be used to allow each end station to send a request to the nearest file server using the same destination address, regardless of thelocation of that end station?

A. broadcastB. multicastC. anycastD. unicast

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 222When designing using the Cisco Enterprise Architecture, in which Enterprise Campus layer do the Enterprise Edge and Enterprise WAN modules establish theirconnection?

A. Building AccessB. Building DistributionC. Campus CoreD. Enterprise BranchE. Enterprise Data Center

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 223

http://www.gratisexam.com/

Which three of these describe the best practice for Cisco wireless outdoor Mesh network deployment? (Choose three.)

A. mesh hop counts of 4 or fewerB. RAP implemented with 20 or fewer MAP nodesC. client access via 802.11a and backhaul with 802.11b/gD. client access via 802.11b/g and backhaul with 802.11aE. mesh hop counts of 8 to 4F. RAP implemented with 20 to 32 MAP nodes

Correct Answer: ABDSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 224The Cisco Data Center Network Architecture comprises which two Cisco SONA layers? (Choose two.)

A. Collaboration ApplicationsB. WAN/InternetC. Interactive ServicesD. Network InfrastructureE. Business Applications

Correct Answer: CDSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 225Which two of these are scalability benefits of designing a network that utilizes VPNs? (Choose two.)

A. reduces dial infrastructure expendituresB. reduces the number of physical connectionsC. allows networks to be set up and restructured quickly

http://www.gratisexam.com/

D. simplifies the underlying structure of a customer WANE. extends the network to remote users

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 226You are designing a small branch office that requires these attributes:

support for 60 usersthe growth capacity to add another 15 users soonredundant accesshigher bandwidth between the Layer 2 switch and routing to the WAN

Which branch office topology or technology must be used?

A. EtherChannelB. loop-freeC. three-tierD. two-tierE. integrated routing and switching

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 227Western Associated News Agency recently acquired a large news organization with several sites, which will allow it to expand to worldwide markets. The newacquisition includes these connectivity technologies:

Frame RelayATMSONET

http://www.gratisexam.com/

cableDSLwireless

From a Layer 1 viewpoint, which Enterprise Edge module will be most affected?

A. Internet ConnectivityB. E-CommerceC. PSTND. Edge DistributionE. ISPF. WAN/MAN

Correct Answer: FSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 228Which two implementation plan principles best describe how to deal with potential failures? (Choose two.)

A. A table of failure points, rollback steps, and estimated rollback times.B. A good implementation plan.C. A test should be included at every step.D. A detailed rollback procedure for each implementation step.E. A successful test network test.

Correct Answer: CDSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 229Refer to the exhibit. You are documenting the existing network of a customer with a large installed Cisco network. The routers listed are in use on the network.

http://www.gratisexam.com/

Which two additional pieces of information would be the most valuable in completing your documentation of these routers? (Choose two.)

A. software revisionsB. interface optionsC. power requirementsD. error statisticsE. management protocols

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 230Which of these is the next step after the design phase in the PPDIOO process?

A. Develop a high-level migration plan.B. Develop the implementation plan in as much detail as possible.C. Create a pilot or a prototype network.D. Identify which network management protocol will be used for which function.E. Order the equipment.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

http://www.gratisexam.com/

Explanation:

QUESTION 231You are designing IPv6 into an existing IPv4 network. Which strategy can you use to allow both address schemes to coexist, thus facilitating migration?

A. redistribute between IPv6-capable and non-IPv6-capable routing protocolsB. enable anycast capability in the routing protocolC. bridge between the two networksD. run both the IPv6 and IPv4 stacks on devicesE. deploy stateful address assignments

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 232Given a VoIP network with these attributes:

Codec: G.728Bit rate: 16 KbpsWAN Bandwidth: 256 KbpsPacket Header: 6 bytesPayload: 40 bytesCRTP: Yes

How many calls can be made?

A. 14 callsB. 13 callsC. 8 callsD. 7 calls

Correct Answer: BSection: (none)Explanation

http://www.gratisexam.com/

Explanation/Reference:Explanation:

QUESTION 233A network is being designed to meet the requirements listed.

Within the enterprise network:

All routers are Cisco 3800 Series routers running the latest Cisco IOS release.The fastest convergence time possible is required.Unequal cost load-balancing is required.

For Internet connections:

A single link is used to connect to a single ISP.

Which two routing protocols should be used?(Choose two.)

A. Use Internal BGP as the IGP within the enterprise.B. Use Static (Default) routing between the enterprise and the ISP.C. Use OSPF as the IGP within the enterprise.D. Use EIGRP as the IGP within the enterprise.E. Use EIGRP between the enterprise and the ISP.F. Use External BGP between the enterprise and the ISP.

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 234Which two statements best describe Cisco Wireless LAN Guest Access in a Cisco Unified Wireless Network? (Choose two.)

A. Dedicated guest VLANs are only extended to the wireless controllers in the network to ensure path isolation.B. Guest tunnels have limitations on which wireless controllers can originate the tunnel.C. Dedicated guest VLANs are extended throughout the network to the access points for path isolation.D. Guest tunnels can originate and terminate on any wireless controller platform.

http://www.gratisexam.com/

E. Guest tunnels have limitations on which wireless controllers can terminate the tunnel.F. Dedicated guest access in the DMZ extends from the origination to the termination controllers without dedicated guest VLANs.

Correct Answer: EFSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 235For which technology is IPsec required for a site-to-site enterprise WAN/MAN architecture?

A. self-deployed MPLSB. ATMC. Frame RelayD. SP MPLS VPNE. ISP Service

Correct Answer: ESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 236A global corporation has an internal network with the following characteristics:

2,000,000+ hosts10,000+ routersInternet connectivityhigh traffic volumes with business partners and customers

Which statement best describes what a flexible IPv6 strategy would look like for this corporation?

A. Both hosts and routers would run dual stack.B. Hosts would run IPv6 and routers would run native IPv6.C. Hosts would run dual stack and routers would run IPv4 only.

http://www.gratisexam.com/

D. Hosts would run IPv4 and routers would run native IPv6.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 237Refer to the exhibit. Which statement accurately represents the characteristics of the core layer in this design?

A. Access lists should be used in the core to perform packet manipulation.B. QoS should be performed only in the core.

http://www.gratisexam.com/

C. Load balancing should never be implemented or used in the core.D. It is acceptable to use a partial mesh in the core if it is connected to each device by multiple paths.E. Policy-based traffic control is implemented in the core to enable prioritization, ensuring the best performance for all time-critical applications.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 238What does Cisco recommend as the foundation of any deployed security solution?

A. Customer needsB. Security auditC. Service-level agreementD. Corporate security policy

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 239What is the administrative distance of eBGP routes?

A. 200B. 100C. 20D. 110

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

http://www.gratisexam.com/

Explanation:

QUESTION 240Which name is for the Cisco product that provides centralized, policy-based security management?

A. IDSB. Out-of-band managementC. AAAD. CSPM

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 241Which statement represents a likely starting point for planning network changes?

A. Protocol assessmentB. Determining the design requirementsC. Determining the business needsD. Determining the application requirements

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 242What does IGMP stand for?

A. Internet Group Management ProtocolB. Interior Gateway Routing ProtocolC. Interior Group Management ProtocolD. Interior Gateway Media Protocol

http://www.gratisexam.com/

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 243ISDN is short for Integrated Services Digital Network. Under what category of WAN technologies does ISDN belong?

A. Cell-switchedB. Circuit-switchedC. Packet-switchedD. Leased lines

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 244As a network engineer, can you tell me accounting management on a network-management system allows a network manager to perform which function?

A. Assess the network's effectiveness and throughputB. Charge back to users for network resourcesC. Performance managementD. Identify problem areas in the network

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 245

http://www.gratisexam.com/

Which address type is 225.10.1.1?

A. UnicastB. AnycastC. MulticastD. Broadcast

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 246What is the length of the key used with Triple Data Encryption Standard (3DES)?

A. 64 bitsB. 168 bitsC. 128 bitsD. 56 bits

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

Topic 3, Volume C

QUESTION 247Refer to the exhibit.

http://www.gratisexam.com/

Which layer is the distribution layer?

A. Layer AB. Layer BC. Layer CD. Layers A and B form a consolidated core and distribution layer

Correct Answer: BSection: (none)

http://www.gratisexam.com/

Explanation

Explanation/Reference:Explanation:

QUESTION 248A wireless LAN or WLAN is a wireless local area network, which is the linking of two or more computers or devices without using wires. How are wireless LANsidentified?

A. Service Set Identifier (SSID)B. Internet Group Management Protocol (IGMP)C. IP networkD. Wired Equivalent Privacy (WEP) key

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 249Which IGP protocol is a common choice to EIGRP and OSPF as a routing protocol for large networks?

A. RIPv2B. IS-ISC. IGRPD. OSPFv2

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 250Which type of routing protocol will be used when connecting to an Internet service provider?

http://www.gratisexam.com/

A. Classless routing protocolB. Exterior gateway protocolC. Interior gateway protocolD. Classful routing protocol

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 251Which attack type would you expect on segments that have many servers for some well-known applications?

A. Trojan horsesB. DoS attacksC. Application-layer attacksD. Password attacks

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 252Which types of communicating devices compose RMON architecture ?(choose two)

A. RouterB. SwitchC. Management stationD. Monitor

Correct Answer: CDSection: (none)Explanation

http://www.gratisexam.com/

Explanation/Reference:Explanation:

QUESTION 253What is the name of the organization that is in charge of creating the FCAPS architecture?

A. ISPB. IOSC. ITU-TD. IEEE

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 254Define some of the activities, tools, and techniques used in today's network-design process.(Choose three.)

A. Analyzing network trafficB. Simulation of network trafficC. Network auditingD. Filtering incoming network traffic

Correct Answer: ACDSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 255Which is the remote monitoring agent in the RMON architecture called?

A. TreeB. Station

http://www.gratisexam.com/

C. AgentD. Probe

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 256Which item is not a part of the process recommended by Cisco for WAN designs?

A. Characterize the existing network.B. Analyze customer requirements.C. Configure deployed services.D. Design the new WAN topology.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 257In IS-IS networks, which routers does the backup designated router (BDR) form adjacencies to?

A. Only to the DR.B. The BDR only becomes adjacent when the DR is down.C. To all routers.D. There is no BDR in IS-IS.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

http://www.gratisexam.com/

QUESTION 258What does Compressed Real-Time Transport Protocol (CRTP) compress ?

A. RTP, TCP, and IP headersB. RTP headersC. RTP, User Datagram Protocol (UDP), and IP headersD. Real-Time Transport Control Protocol (RTCP) headers

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 259For the following protocols, which pair of routing protocols does not support VLSM or classless interdomain routing (CIDR)?

A. RIPv1 and RIPv2B. Intermediate System-to-Intermediate System (IS-IS) and Open Shortest Path First (OSPF)C. EIGRP and IGRPD. RIPv1 and IGRP

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 260Which mechanism will be often used by service providers to define their service offerings and to differentiate their services from their competitors?

A. SLMB. SLAC. SLCD. SAA

http://www.gratisexam.com/

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 261What is the virtual information store used within SNMP called?

A. MIBB. RMONC. Protocol data unit (PDU)D. Abstract Syntax Notation One (ASN.1)

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 262Which standard language will be used by SNMP to define the device information to be stored?

A. SNMPv4B. ASN.1C. MIBsD. Agents

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 263Which WAN scenario might be appropriate for queuing solutions?

http://www.gratisexam.com/

A. A newly implemented WAN connection has yet to demonstrate sufficient WAN statistics for congestion-level tracking.B. A WAN connection features consistent congestion problems, and data transfers often suffer.C. A WAN connection is rarely congested, and data transfers never suffer.D. A WAN connection features occasional periods of congestion, and data transfers have occasionally suffered as a result.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 264Your boss is interested in a wireless WAN solution which provides higher bandwidth than point-to- multipoint (p2mp) wireless. Which description is correct?

A. Service providers cannot install point-to-point (p2p) links from a p2mp hub.B. P2p wireless connections can provide up to 44 Mbps raw bandwidth.C. P2p links tend to be slower than p2mp.D. P2mp wireless connections can provide up to 1.544 Mbps raw bandwidth.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 265Examine the following protocols, which two are used for IP Security?

A. Generic Routing Encapsulation (GRE) and Internetwork Packet Exchange (IPX)(EIGRP)B. Border Gateway Protocol (BGP) and Enhanced Interior Gateway Routing ProtocolC. Authentication Header (AH) and Encapsulating Security Payload (ESP)D. Virtual Private Dial-Up Network (VPDN) and GRE

Correct Answer: CSection: (none)

http://www.gratisexam.com/

Explanation

Explanation/Reference:Explanation:

QUESTION 266What is SNMP?

A. Simple Network Management ProtocolB. Simple Network Monitoring ProtocolC. Sampling Network Management ProcessD. Simple Network Maintenance Procedure

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

http://www.gratisexam.com/

QUESTION 267When building Global network businesses , which three principles should be used?

A. Customer focus, continuous standardization, and core versus contextB. Customer focus, centralization, and core versus contextC. Customer focus, decentralization, and core versus edgeD. Customer focus, decentralization, and core versus context

Correct Answer: ASection: (none)Explanation

http://www.gratisexam.com/

Explanation/Reference:Explanation:

QUESTION 268For the following items, which component of the CiscoWorks product allows a network administrator to define and manage service levels?

A. Service assurance agent (SAA)B. Service level manager (SLM)C. Collection Manager (CM)D. Service level agreement (SLA)

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 269Which codec does Cisco recommend for WAN links?

A. G.711B. G.723C. G.728D. G.729

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 270NAT-PT is an IPv6-IPv4 translation mechanism. What is NAT-PT?

A. Network address translation?¡ìCport translation; translates RFC 1918 addresses to public IPv4 addressesB. Network address translation-protocol translation; translates between IPv4 and IPv6 addresses

http://www.gratisexam.com/

C. Next address translation?¡ìCport translationD. Network addressable transparent-port translation; translates network addresses to ports

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 271What Cisco router configuration component does an implementer use to create a floating static route?

A. Primary interfaceB. Administrative distanceC. LoopbackD. Description

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 272A common response to an attack by this device can be either to send an alert or to take corrective action. What is this device?

A. Vulnerability assessmentB. FirewallC. Intrusion-detection system (IDS)D. Router

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

http://www.gratisexam.com/

QUESTION 273How many more bits does IPv6 use for addresses than IPv4?

A. 32B. 64C. 96D. 128

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 274What does the Cisco security architecture called SAFE stand for?

A. Security Architecture for EnterpriseB. Standard Assessment for EnterpriseC. Security Analysis for EnterpriseD. Standard Architecture for Enterprise

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 275Which two encryption transforms will be used by both ESP and AH for authentication?

A. HMAC-MD5 or Hash Message Authentication Code-Secure Hash Algorithm-1(HMAC-SHA-1)B. DES or 3DESC. DES or Hash Message Authentication Code-Message Digest 5 (HMAC-MD5)D. 3DES or MD5

http://www.gratisexam.com/

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 276For the following options, which emerging WAN technology uses DSL coding and digital modulation techniques with Ethernet?

A. CableB. WirelessC. SMDSD. Long-Reach Ethernet (LRE)

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 277What is SLC?

A. Standard level contractsB. Standard level configurationC. Service level contractsD. Service level configuration

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 278Observe the following options, in which section of the network document does Cisco recommend a discussion of performance, scalability, capacity, security, and

http://www.gratisexam.com/

traffic needs?

A. Design summaryB. Design solutionC. Executive summaryD. Design requirements

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 279In telephony, the local loop is the physical link or circuit. Where is the local loop located?

A. Between the loopback interfaces of two VoIP routersB. Between phones and the central office (CO) switchC. Between two PBXsD. Between two PSTN switches

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 280Which advantage is of security systems that are part of the Cisco ecosystem?

A. There is a suite of products to choose from.B. Various partners as well as supporting products increase the effectiveness of security systems.C. There are no advantages.D. The Cisco ecosystem ensure that partners can implement the solution.

Correct Answer: B

http://www.gratisexam.com/

Section: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 281What is ASBR short for?

A. Area Border RouterB. Auxiliary System Border RouterC. Area System Border RouterD. Autonomous System Boundary Router

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 282Which queuing mechanism establishes four interface output queues that will be used for traffic scheduling?

A. Priority queuing (PQ)B. First-in, first-out (FIFO)C. Weighted fair queuing (WFQ)D. Custom queuing (CQ)

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 283For the following items, which is an SP Edge module in the Enterprise Composite Network model?

http://www.gratisexam.com/

A. Core layerB. Edge distributionC. Public Switched Telephone Network (PSTN) serviceD. Server farm

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 284Which method will be used to secure a network against man-in-the-middle attack?

A. Two-factor authenticationB. Management moduleC. EncryptionD. Firewall

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 285Refer to the exhibit.

http://www.gratisexam.com/

During which stage of the PPDIOO process are implementation procedures prepared?

A. PrepareB. PlanC. DesignD. ImplementE. OperateF. Optimize

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

http://www.gratisexam.com/

QUESTION 286Which one of the following QoS mechanisms is recommended for VoIP networks?

A. Low-latency queuing (LLQ)B. Switched-based queuingC. Fast queuingD. Custom queuing

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 287In which layer of the OSI model does Real-Time Transport Protocol (RTP) operate ?

A. NetworkB. ApplicationC. TransportD. Session

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 288Which parameters does the computation of the EIGRP composite metric use by default?

A. Bandwidth and reliabilityB. Bandwidth and loadC. Bandwidth and maximum transmission unit (MTU)D. Bandwidth and delay

http://www.gratisexam.com/

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 289Which item is not a true disadvantage of the full-mesh topology?

A. Central hub router represents a single point of failure in the network.B. High level of complexity to implement.C. Large number of packet replications required.D. High costs due to number of virtual circuits.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 290Which of the following three options represents the components of the Teleworker Solution? (Choose three.)

A. Cisco Unified IP PhoneB. Cisco 880 Series RouterC. Aironet Office Extend Access PointD. Catalyst 3560 Series SwitchE. Cisco 2900 Series RouterF. MPLS Layer 3 VPNG. Leased lines

Correct Answer: ABESection: Describe the Methodology used to design a networkExplanation

Explanation/Reference:Explanation:

http://www.gratisexam.com/

A Cisco ASR is used to terminate Teleworker solutions, not a 2900 series router. Hybrid teleworker uses Aironet, Advanced teleworker uses 880, both use IPphones.google: "at_a_glance_c45-652500.pdf" for details

The Cisco Virtual Office Solution for the Enterprise Teleworker is implemented using the Cisco 800 series ISRs. Each ISR has integrated switch ports that thenconnect to the user's broadband connection. The solution uses a permanent always-on IPsec VPN tunnel back to the corporate network. This architecture providesfor centralized IT security management, corporate-pushed security policies, and integrated identity services. In addition, this solution supports the enterpriseteleworker needs through advanced applications such as voice and video. For example, the enterprise teleworker can take advantage of toll bypass, voicemail, andadvanced IP phone features not available in the PSTN.

Enterprise Teleworker ModuleThe enterprise teleworker module consists of a small office or a mobile user who needs to access services of the enterprise campus. As shown in Figure 2-14,mobile users connect from their homes, hotels, or other locations using dialup or Internet access lines. VPN clients are used to allow mobile users to securelyaccess enterprise applications. The Cisco Virtual Office solution provides a solution for teleworkers that is centrally managed using small integrated service routers(ISR) in the VPN solution. IP phone capabilities are also provided in the Cisco Virtual Office solution, providing corporate voice services for mobile users.

QUESTION 291Which of these is the equation used to derive a 64 Kbps bit rate?

A. 2 x 8 kHz x 4-bit code wordsB. 8 kHz x 8-bit code wordsC. 2 x 4-bit code words x 8 kHz

http://www.gratisexam.com/

D. 2 x 4 kHz x 8-bit code words

Correct Answer: DSection: Describe the Methodology used to design a networkExplanation

Explanation/Reference:Explanation:While the human ear can sense sounds from 20 to 20, 000 Hz, and speech encompasses sounds from about 200 to 9000 Hz, the telephone channel was designedto operate at about 300 to 3400 Hz. This economical range carries enough fidelity to allow callers to identify the party at the far end and sense their mood. Nyquistdecided to extend the digitization to 4000 Hz, to capture higher-frequency sounds that the telephone channel may deliver. Therefore, the highest frequency for voiceis 4000 Hz. According to Nyquist theory, we must double the highest frequency, so 2x4kHz = 8kHz. Each sample will be encoded into a 8-bit code. Therefore 8kHzx 8-bit code = 64 Kbps (notice about the unit Kbps: 8kHz = 8000 samples per second so 8000 x 8-bit = 64000 bit per second = 64 Kilobit per second = 64 Kbps)Link: http://encyclopedia2.thefreedictionary.com/Nyquist+theorem

Note:Nyquist theory:"When sampling a signal (e.g., converting from an analog signal to digital), the sampling frequency must be greater than twice the bandwidth of the input signal inorder to be able to reconstruct the original perfectly from the sampled version."

QUESTION 292When designing the threat detection and mitigation portion for the enterprise data center network, which of the following would be the most appropriate solution toconsider?

A. 802.1XB. ACLs in the core layerC. Cisco Security MARSD. Cisco Firewall Services Module

Correct Answer: CSection: Describe the Methodology used to design a networkExplanation

Explanation/Reference:Explanation:

QUESTION 293Which three modular components are part of the Cisco Enterprise Edge Architecture? (Choose three.)

A. e-commerce module

http://www.gratisexam.com/

B. Internet connectivity moduleC. server farm moduleD. remote access and VPN moduleE. PSTN services moduleF. enterprise branch moduleG. building distribution module

Correct Answer: ABDSection: Describe network structure and modularityExplanation

Explanation/Reference:Explanation:

http://www.gratisexam.com/

QUESTION 294Where in the Cisco Enterprise Architecture model does network management reside?

A. Enterprise data center moduleB. Enterprise campus moduleC. Enterprise edge moduleD. Service Provider edge moduleE. Service Provider data center module

Correct Answer: BSection: Describe network structure and modularityExplanation

Explanation/Reference:Explanation:

http://www.gratisexam.com/

The network management servers reside in the campus infrastructure but have tie-ins to all the components in the enterprise network for monitoring andmanagement.

QUESTION 295The evolution of the Data Center is best represented by the 3.0 architecture component of virtualization. Which of the following is not an example of thevirtualization taking place in the Data Center?

A. Virtualized media access utilizing Fiber Channel over EthernetB. VLANs and virtual storage area networks (VSANs) provide for virtualized LAN and SAN connectivity, separating physical networks and equipment into virtual

entitiesC. Virtual Machines that run an application within the client operating system, which is further virtualized and running on common hardwareD. Storage devices virtualized into storage pools, and network devices are virtualized using device contexts

Correct Answer: ASection: Design Basic Enterprise Campus NetworksExplanation

Explanation/Reference:Explanation:

QUESTION 296When there is a need for immunity to EMI for connecting locations that are greater than 100 meters apart, which two solutions can be utilized? (Choose two.)

A. multimode fiberB. Fiber ChannelC. HVDC transmission linesD. single-mode fiberE. serial RS-232F. Gigabit Ethernet 1000BASE-CX

Correct Answer: ADSection: Design Basic Enterprise Campus NetworksExplanation

Explanation/Reference:Explanation:

QUESTION 297

http://www.gratisexam.com/

Which two statements about designing the Data Center Access layer are correct? (Choose two.)

A. Multiport NIC servers should each have their own IP address.B. Layer 3 connectivity should never be used in the access layer.C. Layer 2 connectivity is primarily implemented in the access layer.D. Multiport NIC servers should never be used in the access layer.E. Layer 2 clustering implementation requires servers to be Layer 2 adjacent.

Correct Answer: CESection: Design Basic Enterprise Campus NetworksExplanation

Explanation/Reference:Explanation:

User access is primarily layer 2 in nature, layer 2 clustering is possible only in layer 2 Here is the Explanation: from the Cisco press CCDA certification guide Figure4-8. Enterprise Data Center Infrastructure Overview

http://www.gratisexam.com/

http://www.gratisexam.com/

Defining the DC Access LayerThe data center access layer's main purpose is to provide Layer 2 and Layer 3 physical port density for various servers in the data center. In addition, data centeraccess layer switches provide high- performance, low-latency switching and can support a mix of oversubscription requirements. Both Layer 2 and Layer 3 access(also called routed access) designs are available, but most data center access layers are built using Layer 2 connectivity. The Layer 2 access design uses VLANtrunks upstream, which allows data center aggregation services to be shared across the same VLAN and across multiple switches. Other advantages of Layer 2access are support for NIC teaming and server clustering that requires network connections to be Layer 2 adjacent or on the same VLAN with one another.

CCDA 640-864 Official Certification Guide Fourth Edition, Chapter 4

QUESTION 298The enterprise campus core layer has requirements that are unique from the distribution and access layers. Which of the following is true about the core layer?

A. The core layer provides convergence using Layer 2 and Layer 3 services and features.B. The core layer provides high availability to support the distribution layer connections to the enterprise edge.C. The campus core layer is optional.D. The core layer requires high performance to manage the traffic policing across the backbone.

Correct Answer: BSection: Design Basic Enterprise Campus NetworksExplanation

Explanation/Reference:Explanation:

QUESTION 299Refer to the exhibit.Which statement is true concerning enterprise edge distribution switches?

A. The speed of switching is the most critical feature.B. Security requirements are offloaded to the other modules for performance reasons.C. Edge distribution switches are only required when using a collapsed core backbone.D. Enterprise edge distribution switches are similar to the building distribution layer.

Correct Answer: DSection: Design Basic Enterprise Campus NetworksExplanation

Explanation/Reference:Explanation:

http://www.gratisexam.com/

QUESTION 300An enterprise campus module is typically made up of four sub modules, as described by the Cisco Enterprise Architecture Model. Which two sub modules are partof this module?

A. DMZB. enterprise branchC. building distributionD. server farm/data centerE. MAN

Correct Answer: CDSection: Design Basic Enterprise Campus NetworksExplanation

Explanation/Reference:Explanation:

QUESTION 301Which three are valid Layer 2 access designs? (Choose three.)

A. Looped TriangleB. Looped SquareC. Looped UD. Loop-Free TriangleE. Loop-Free SquareF. Loop-Free U

Correct Answer: ABFSection: Design Basic Enterprise Campus NetworksExplanation

Explanation/Reference:Explanation:

QUESTION 302Which two enterprise campus layers are combined in a medium-sized LAN? (Choose two.)

A. core

http://www.gratisexam.com/

B. distributionC. accessD. backboneE. aggregation

Correct Answer: ABSection: Design Basic Enterprise Campus NetworksExplanation

Explanation/Reference:Explanation:

QUESTION 303Which two common cable management strategies are used in high-density server deployments in the data center? (Choose two.)

A. top-of-rackB. middle-of-rackC. bottom-of-rackD. beginning-of-rowE. middle-of-rowF. end-of-row

Correct Answer: AFSection: Design Basic Enterprise Campus NetworksExplanation

Explanation/Reference:Explanation:

QUESTION 304If a teleworker is required to access the branch office via a secure IPSEC VPN connection, which technology is recommended to provide the underlying transport?

A. ISDNB. Metro EthernetC. Frame RelayD. ADSLE. ATM

http://www.gratisexam.com/

Correct Answer: DSection: Design Enterprise Edge and Remote Network ModulesExplanation

Explanation/Reference:Explanation:

QUESTION 305Which three service categories are supported by an ISR? (Choose three.)

A. voiceB. securityC. dataD. InternetE. storageF. satellite

Correct Answer: ABCSection: Design Enterprise Edge and Remote Network ModulesExplanation

Explanation/Reference:Explanation:

QUESTION 306With respect to IPv6 addressing, from a design perspective, which of these statements is it important to keep in mind?

A. IPv6 addressing provides convenience of anycast addressing without any configuration requirements.B. IPv6 does not use multicast addressing.C. An IPv6 router will not forward packets from one link to other links if the packet has either a link- local source or a link-local destination address.D. Dynamic address assignment requires DHCPv6.

Correct Answer: CSection: Design IP Addressing and Routing ProtocolsExplanation

Explanation/Reference:Explanation:

http://www.gratisexam.com/

QUESTION 307A company wants to use private IP addresses for all its internal hosts. Which technology can the company use to provide access to the Internet using a single publicIP address?

A. static NATB. source routingC. ACLD. PAT

Correct Answer: DSection: Design IP Addressing and Routing ProtocolsExplanation

Explanation/Reference:Explanation:

QUESTION 308What is the most compact representation of the following IPv6 address?

http://www.gratisexam.com/

2001:db8:0000:0000:cafe:0000:0000:1234

A. 2001:db8::cafe::1234B. 2001:db8::cafe:0000:0000:1234C. 2001:db8:0:0:cafe::1234D. 2001:db8::cafe:0:1234

Correct Answer: CSection: Design IP Addressing and Routing ProtocolsExplanation

Explanation/Reference:Explanation:

http://www.gratisexam.com/

QUESTION 309Which statement describes a unique advantage of EIGRP?

A. It enables unequal-cost load balancing.B. It enables equal-cost load balancing.C. It enables source-based load balancing.D. It enables port-based load balancing.

Correct Answer: ASection: Design IP Addressing and Routing ProtocolsExplanation

Explanation/Reference:Explanation:

QUESTION 310What are the three modes of unicast reverse path forwarding? (Choose three.)

A. strictB. looseC. VRFD. globalE. PIMF. local

Correct Answer: ABCSection: Design network servicesExplanation

Explanation/Reference:Explanation:

QUESTION 311Which three statements are true regarding the virtual interface on a Cisco Wireless LAN Controller? (Choose three.)

A. supports mobility managementB. serves as a DHCP relay

http://www.gratisexam.com/

C. used for all controller to AP communicationD. supports embedded Layer 3 securityE. default for out-of-band managementF. default for in-band managementG. provides connectivity to AAA servers

Correct Answer: ABDSection: Design network servicesExplanation

Explanation/Reference:Explanation:

QUESTION 312

Select and Place:

Correct Answer:

http://www.gratisexam.com/

Section: Design Enterprise Edge and Remote Network ModulesExplanation

Explanation/Reference:Explanation:

LeasedSHARED

http://www.gratisexam.com/

QUESTION 313When designing the identity and access control portions for the enterprise campus network, which of these solutions would be the most appropriate solution toconsider?

A. 802.1XB. ACLs in the core layerC. Cisco Security MARSD. NetFlow

Correct Answer: ASection: Describe the Methodology used to design a networkExplanation

Explanation/Reference:

http://www.gratisexam.com/

Explanation:

QUESTION 314Which protocol is used for voice bearer traffic?

A. MGCPB. RTPC. SCCPD. CDPE. ICMP

Correct Answer: BSection: Describe the Methodology used to design a networkExplanation

http://www.gratisexam.com/

Explanation/Reference:Explanation:

VoIP Control and Transport ProtocolsA number of different protocols are used in a VoIP environment for call control, device provisioning, and addressing.Figure 14-15 shows those protocols focused on VoIP control and transport.

QUESTION 315Which two features are supported by single wireless controller deployments? (Choose two.)

A. automatic detection and configuration of LWAPPsB. LWAPP support across multiple floors and buildingsC. automatic detection and configuration of RF parametersD. Layer 2 and Layer 3 roamingE. controller redundancyF. mobility groups

Correct Answer: ABSection: Describe the Methodology used to design a networkExplanation

Explanation/Reference:Explanation:

QUESTION 316Observe the following options, what is the hierarchy for IPv6 aggregatable addresses?

http://www.gratisexam.com/

A. Global, site, loopB. Multicast, anycast, unicastC. Public, site, interfaceD. Internet, site, interface

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 317Which routing protocol is classful?

A. Intermediate System-to-Intermediate System (IS-IS) and OSPFB. Routing Information Protocol Version 1 (RIPv1) and RIPv2C. IGRP and RIPv1D. Enhanced Interior Gateway Routing Protocol (EIGRP) and Open Shortest Path First (OSPF)

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 318Which FCAPS function includes finding network problems that reduce availability?

A. Security managementB. Accounting managementC. Fault managementD. Performance management

Correct Answer: CSection: (none)

http://www.gratisexam.com/

Explanation

Explanation/Reference:Explanation:

QUESTION 319Which type of DSL does residential service use?

A. VDSLB. SDSLC. IDSLD. ADSL

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 320Which Cisco proprietary protocol will be used in LAN switches to control multicast traffic at the data link layer within a LAN switch?

A. MAC filtersB. Cisco Group Management Protocol (CGMP)C. Cisco Discovery Protocol (CDP)D. IGMP

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 321Which protocol will be used to exchange IP routes between autonomous systems?

A. eBGP

http://www.gratisexam.com/

B. IGMPC. IGRPD. OSPF

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 322You are a network technician, can you tell me how many IP addresses are available for hosts in the subnet 198.10.100.64/27?

A. 62B. 30C. 126D. 14

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 323What does ODR stand for?

A. Open default routingB. Optical demand routingC. Open dedicated routingD. On-demand routing

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

http://www.gratisexam.com/

Explanation:

QUESTION 324Area Border Router (ABR) is defined by which protocol?

A. Enhanced Interior Gateway Routing Protocol (EIGRP)B. OSPFC. On-Demand Routing (ODR)D. IS-IS

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 325Which option is not valid for using the public Internet as a backup WAN medium?

A. IP Security (IPSec) tunnelsB. Shared PVCC. IP routing without constraintsD. Generic Routing Encapsulation (GRE) tunnels

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 326What is important for the top-down design concept?

A. Engagement of the HR representatives during the design processB. Engagement of the top executives during the design processC. Engagement of the employees working on the top floors in the building during the design processD. Engagement of the top executives once the design process is finalized

http://www.gratisexam.com/

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

Topic 4, Volume D

QUESTION 327Developing a network design according to layers such as core and distribution is an example of which type of design methodology?

A. Flat designB. Top-downC. Hierarchical structured designD. PDIOO

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 328Which statement is true about WANs?

A. Switches or concentrators often relay information through the WAN.B. WANs typically encompass broad geographic areas.C. In general, WAN technologies function at the middle three layers of the Open System Interconnection (OSI) model.D. Users of WANs do not typically own all transmission facilities.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

http://www.gratisexam.com/

QUESTION 329You are designing a network that requires a routing protocol that will use minimal network bandwidth.Which would satisfy this requirement?

A. RIPv2B. RIPngC. OSPFD. ARPE. EGP

Correct Answer: CSection: Design IP Addressing and Routing ProtocolsExplanation

Explanation/Reference:Explanation:

QUESTION 330Which three items pertain to EIGRP? (Choose three.)

A. Can use multiple unequal paths.B. Routes are redistributed as type 2 by default.C. ASN and K values must match to form neighbors.D. Uses multicast address 224.0.0.9 for updates.E. Exchanges full routing table every 30 seconds.F. Summary routes have AD of 90.G. External routes have AD of 170.

Correct Answer: ACGSection: Design IP Addressing and Routing ProtocolsExplanation

Explanation/Reference:Explanation:

QUESTION 331A hierarchical design of the EIGRP domain facilitates which two of the following? (Choose two.)

http://www.gratisexam.com/

A. route summarizationB. faster convergenceC. unequal cost load balancingD. redistributionE. virtual links

Correct Answer: ABSection: Design IP Addressing and Routing ProtocolsExplanation

Explanation/Reference:Explanation:

QUESTION 332Which three protocols support VLSM? (Choose three.)

A. RIPv2B. RIPv1C. EIGRPD. OSPFE. IGRP

Correct Answer: ACDSection: Design IP Addressing and Routing ProtocolsExplanation

Explanation/Reference:Explanation:

QUESTION 333Which statement should the designer keep in mind when considering the advanced routing features?

A. One-way route redistribution avoids the requirement for static or default routes.B. Redistribution, summarization, and filtering are most often applied between the campus core and enterprise edge.C. Filtering only occurs on the routing domain boundary using redistribution.D. Summarize routes at the core toward the distribution layer.E. The hierarchical flexibility of IPv6 addressing avoids the requirement for routing traffic reduction using aggregation.

http://www.gratisexam.com/

Correct Answer: BSection: Design IP Addressing and Routing ProtocolsExplanation

Explanation/Reference:Explanation:

QUESTION 334When designing an EIGRP network, which two things should you take into consideration? (Choose two.)

A. ASN and K values must match.B. The neighbor command can be used to enable unicast communication.C. The neighbor diameter cannot exceed a 15-hops limit.D. NSSA areas can be used to redistribute external routes.E. Neighbor relationship can be established with non-Cisco routers.

Correct Answer: ABSection: Design IP Addressing and Routing ProtocolsExplanation

Explanation/Reference:Explanation:

QUESTION 335ACME corporation is implementing dynamic routing on the LAN at its corporate headquarters. The interior gateway protocol that they select must support theserequirements: multivendor environment, efficient subnetting, high scalability, and fast convergence. Which interior gateway protocol should they implement?

A. EIGRPB. OSPFC. RIPngD. BGP

Correct Answer: BSection: Design IP Addressing and Routing ProtocolsExplanation

Explanation/Reference:Explanation:

http://www.gratisexam.com/

QUESTION 336Which routing protocol classification should you use when full topology information is needed?

A. link-stateB. distance vectorC. statefulD. path vector

Correct Answer: ASection: Design IP Addressing and Routing ProtocolsExplanation

Explanation/Reference:Explanation:

QUESTION 337When designing the infrastructure protection portion for the enterprise edge, which solution would be the most appropriate solution to consider?

A. 802.1XB. ACLs in the core layerC. Cisco Security MARSD. AAA

Correct Answer: DSection: Design network servicesExplanation

Explanation/Reference:Explanation:

QUESTION 338Which two design approaches provide management of enterprise network devices? (Choose two.)

A. in-bandB. out-of-lineC. out-of-bandD. in-line

http://www.gratisexam.com/

Correct Answer: ACSection: Design network servicesExplanation

Explanation/Reference:Explanation:

QUESTION 339Which network access control technology is recommended to use with Layer 2 access layer switches?

A. 802.1qB. 802.1xC. 802.3afD. 802.3qE. 802.11n

Correct Answer: BSection: Design network servicesExplanation

Explanation/Reference:Explanation:

QUESTION 340

Select and Place:

http://www.gratisexam.com/

Correct Answer:

http://www.gratisexam.com/

Section: Describe network structure and modularityExplanation

Explanation/Reference:Explanation:please refer to link.Link: http://www.cisco.com/en/US/docs/solutions/Enterprise/Campus/campover.html#wp708979CCDA Study Guide: Diane Teare

QUESTION 341

http://www.gratisexam.com/

An existing Cisco customer has called for help with designing a new solution for its changing needs. The first issues the customer wants to address are security,logging, and troubleshooting. On which major functional area and which submodule of the Enterprise Composite Network Model will you be keying your efforts?

A. Enterprise Edge; Internet ConnectivityB. Enterprise Campus; Network ManagementC. Service Provider; ISPD. Campus Infrastructure; Building AccessE. Enterprise Campus; Campus InfrastructureF. Edge Distribution; Call Detail Log

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 342AAA Video operates a chain of 50 video rental stores located in the Northwestern United States. They currently have a Point-of-Sale (POS) system in which eachstore posts its daily sales data and inventory changes to a central database through dial-up communication. There is no interaction between the stores and thecentral system during business hours. The central site runs on an Ethernet LAN. The only always-on WAN link is an Internet connection using wireless broadbandto a local ISP. AAA wants to enhance their service offering by creating a new E-Commerce web site where customers can browse and search a catalog of videotitles and select the ones they want for rental. The system will instantly communicate the order to the nearest store where employees pull the order and hold it untilthe customer picks it up. The service must operate on a 24x7 basis. AAA sees this new business strategy as a means to increase revenue and expand thebusiness nationally. They see an opportunity to expand the web site in the future to video, DVD and music sales on a worldwide level. The company wants all storesto be connected to the central site through WAN links. The company is upgrading the central inventory database so that sales and rentals can be postedimmediately in real-time. An Internet-based email and instant-messaging system will be set up for all headquarters employees and store managers to use. AAAbelieves that networking the stores will improve order fulfillment processes which will improve customer satisfaction and thus, boost revenue. It will also helpcommunication with store employees. AAA wants to upgrade the local LAN to a Gigabit and Fast Ethernet system to facilitate the demands of the new andupgraded systems. They have budgeted $500,000 for the networking equipment and another $10,000/month for the WAN charges including a faster Internetconnection. They believe that 256Kbps speeds will be adequate to the stores. Since they have no staff capable of managing the new network, they will hire twoengineers that already have the training and experience. The project must be complete in 6 months when the new inventory system goes online. The IT managerhas concerns about the security of the servers and workstations on the network when all stores become connected. He doesn'ant any Internet access to or from thestores. He is depending on you to recommend an effective yet affordable solution that will protect his system from intruders.Which two are business constraintsimposed by the AAA Video Company on this new network design project? (Choose two.)

A. the $10,000/month WAN budgetB. the installation of WAN links to all storesC. the lack of any existing IT staff

http://www.gratisexam.com/

D. video sales through the global InternetE. real-time posting of store sales

Correct Answer: ACSection: (none)Explanation

Explanation/Reference:

QUESTION 343During which phase of the PDIOO process should the implementation be planned?

A. planningB. designingC. implementingD. operatingE. optimizingF. instigating

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 344Which three items should be included in a summary report that validates the findings of the information you have gathered when characterizing a network? (Choosethree.)

A. network services mapB. network problems and drawbacksC. modularized networkD. network featuresE. network applications mapF. actions that support network requirements

http://www.gratisexam.com/

Correct Answer: BDFSection: (none)Explanation

Explanation/Reference:

QUESTION 345Analysis and recommendations in a Draft Design Document are based on which two features? (Choose two.)

A. logical topology mapB. collected informationC. physical topology mapD. hardware platformE. design requirementsF. software versions

Correct Answer: BESection: (none)Explanation

Explanation/Reference:

QUESTION 346For the network backbone of a large campus environment, what are three advantages of a multilayer core switch design over a Layer 2 core switch design?(Choose three.)

A. single VLAN implementation in the backboneB. reduced distribution router peeringC. broadcast control in the backboneD. evenly distributed backbone trafficE. large scalability potential

Correct Answer: BCESection: (none)Explanation

Explanation/Reference:

http://www.gratisexam.com/

QUESTION 347Which two results of segment analysis are approximate thresholds that indicate network enhancement is desired? (Choose two.)

A. 25 percent broadcasts/multicastsB. 30 percent broadcasts/multicastsC. 1 CRC error per one million bytesD. 1 CRC error per 100,000 bytesE. 20 percent broadcasts/multicastsF. 1 CRC error per 1000 bytes

Correct Answer: CESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 348Refer to the exhibit. Which Campus Backbone Design does this most likely represent?

http://www.gratisexam.com/

A. Single VLAN Layer 2B. Split VLAN Layer 2C. Layer 3 VLAND. Dual Path Layer 3 VLAN

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 349Which organizational constraint most directly affects the social requirements of a business?

A. budgetB. personnelC. policyD. schedule

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 350An enterprise needs to connect networks at high data rates. The networks are located in different buildings with a clear line-of-sight. Which technology is a solutionfor this need?

A. broadband fixed wirelessB. cellular wirelessC. wireless LAND. Mobile IPE. ISDN

http://www.gratisexam.com/

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

http://www.gratisexam.com/