You are on page 1of 4

What are two components of the Build phase in the Cisco Design Lifecycle?

A. Migration
B. Deployment
C. Optimization
D. Design
E. Configuration

What should be considered when scaling EIGRP ( Choose 3)


a. CPU
b. Peers
c. Query scope
d. Interface Bandwidth
e. Memory
f. IP Address

New question: what is a classful routing protocol


Answer
1.rip

2:igrp

Question 2: what is considered single homed


Answer
1.dsl connect to WAN

QUESTION 3:what voice protocol should you use (something similar)


Answe
1.EF

1-The tool for Cisco ACI to integrate l4-l7 service into the Service Graph
REST API

2-What to do at Microsoft DHCP server for AP to allocate the controller


Use the Suboption 0xe1

3-What should be considered when scaling eigrp


Peers
Query scope
IP Address

4-What is included in High Level Design documentation


included busineed, design architecture � do not have step by step configurations �

5-What statement about EVN is true


supports up to 32 VNET

6-What query should you make if you want to find all objects of a particular type
in an MIT tree
class-level

7-Which two high-level design components are included in Unified Wireless network
local
Cisco FlexConnect

8-What are two advantages of a modular design


Increased scalability because modules can be increased with growth
Increased redundancy as you can add modules
9-n organization needs to implement isolated logical structure due to compliance
regulations. What complex access control network virtualization method can it use
The IT organization creates a quarantine network for end points that do not meet
the posture assessment requirements

10-What is the DCSP value for voice traffic


EF

11-QoS trust Boundary (there is a diagram)


Cisco IP Phone

12-Tool to decode protocols


protocol analyzer

13-What is the IPV6 global unicast address format


48 bit(Global Prefix)16bit(Subnet)64bit(Interface)

14-What are 2 ?Class-FULL?


RIP
IGRP

15-VPN access policies


Central authenticated full access -> admins
Central authenticated controlled (limited) access -> partners
Central authenticated controlled (limited) access -> employees

16-How to reduce the size of a routing table


NAT
Summarization

17-VPN tunnelling technology for multicast


DMVPN spoke-to-spoke

18-What DNS parameter is used by an access point to determine the IP address of a


WLC
capwap-controller

19- 323 What is the normal condition of traffic flow and performances
utilization

20-why would an engineer implement variable-length subnet mask


to prevent waiting ip address

21-Which two are documented to understand environmental constraint


floor and rack space availability
heat and air conditioning

22- 279 Which two design decision can improve network resiliency
implement redundant link
implement redundant topology

23- 287 Which two network services should you host on the dmz
www
ftp

24-which statement about using stp in a redundant link scenario is true


it uses only one redundant link at any one time

25- 282 what are two important aspects to consider when looking at backup circut
optopns for branch location
internet service provide diversity
type of dynamic routing protocol

26- 326 How many switches can be combined into a single network element using VSS
2

27- 324 When a VSS configuration is reviewed,it is determined that the nodes are
not detecting each other. Which option is the issue with the switche
The Switch virtual domains incorrect

28- 315-Which statement about VSS is true


It can maintain the topology independently of STP

29- 316 Which two methods are used to reduce the mesh links required between iBGP
peers in the same AS
Route reflectors
Confederations

30-Which address is the broadcast address of subnet 120.20.78.8/30


120.20.78.11

31- 319 A network engineer is implementing a new mesh WAN topology. The solution
support synchronous bandwidth and allow for future growth? Which solution is best
suited to meet these requirements
DMVPN over business class modem

32- 311 raditionally, the DMZ exists between which two locations
Internet
Corporate Network

33- 313 which statement about using STP in a redundant-link scenario is true
It uses only one redundant link at any one time

34- 314-Company ABC has intermittent problems registering remote-site IP phones


over the WAN with Cisco Unified CallManager at headquartes. The Company hires a
network consultant to help implement QoS in its network. Which technique should the
consultant use to identify traffic and applications that traverse the network
NBAR

35- 308 Which statement about modular network design is true


It is flexible architecture that simplify design,management and troubleshooting

36- It is flexible architecture that simplify design,management and troubleshooting


DN

37- 306 In Cisco ACI, which option is the unified point of automation ,
management , monitoring and programmable
APIC

38-Choose considerations for access layer design


QoS
Port security

39- 284 Which cisco technology can connect more than two switches so that they
behave as one switch
Stackwise

40-Which two processes are included in the Build phase of the Cisco Design Life
Cycle
Validation
Deployment

41-When you make change on Network, what the consideration of environment Data
center network network
Air condition and cooling

42-In an enterprise Layer 2 switched network, which protocol must ne running to


enable link redundance
STP

43-A network architect working for a large financial institution is designing a vpn
solution that must include encryption. which vpn type meet this requirment
GETVPN

44-three design best of the distribution layer


domain isolation
aggregation
summarization

45-What router between two areas


area border

46-What option is a fixed two layer routing protocols


EIGRP

47-A consultant at company XYZ connects to the guest wireless network but cannot
reach the MGMT VLAN to complete an audit. Other users can connect to the MGMT VLAN
without any issues. Why is the consultant unable to access the MGMT VLAN
The access is not permitted

48-In which phase of cisco design life cycle the validation of network
infrastructure happened
Validation in build

49-What will extend a ((�>trust boundaryQoScost<� effective backup connectivity for


a branch network
VPN over Internet

53-What is the best point to deploy the IPS, not to have false positives, since the
traffic is already filtered
Passive of the Switch

54-How to reduce the size of a routing table? (Choose two):


Summarization
NAT

55-What are two classful routing protocols? (Choose two):


IGRP
RIP

56-Under which phase of the Cisco Design Lifecycle would you evaluate the network
infrastructure for its adherence to best polices and corporate policies
In the Validation stage of the Build phase

57-Which option is an advantage of a Layer 3 access model over the traditional


Layer 2 access model
faster convergence

You might also like