Professional Documents
Culture Documents
Which action should be taken to enable routing across area boundaries in this environment?
A. Assign Level 1 router interfaces to different areas
B. Assign Level 2 routers to different areas
C. Assign Level 1 routers to different areas
D. Assign Level 2 router interfaces to different areas
E. Assign Level 2 router interface to the backbone area
F. Assign Level 1 router interface to the backbone area
Which two options are advantages of having a modular design instead of an EOR design in a
data center? (Choose two.)
A. cooling constraints
B. cable bulk
C. decreased STP processing
D. redundancy options
E. cost minimization
F. low-skilled manager
An engineer is designing a new data center network so that the topology maintains fewer
uplinks to the aggregation layer to reduce STP processing requirements. What data center
topology meets the RFP requirements?
A. mesh
B. top of rack
C. star
D. end of row
Which virtualization technology uses Layer 3 BFD to detect network failures between network
devices?
A. VTP
B. VSS
C. vPC
D. Cisco Fabric Path
While troubleshooting an Application Centric network cluster, an engineer sees that an APIC
has gone offline. What is the minimum number of APICs required for a production ACI fabric to
continue to operate?
A. 1
B. 2
C. 3
D. 4
A company wants to configure BGP on a router so that other BGP neighbors cannot influence
the path of a particular route.
Which action must be taken to accomplish this configuration?
A. Configure a low router ID for the route.
B. Configure a high local preference for the route.
C. Configure a high weight for the route.
D. Configure a low MED for the route.
A company requires redundancy for its multihomed BGP external connections. What two
features can be configured on the WAN routers to automate failover for both outbound and
inbound traffic? (Choose two.)
A. AS path prepending
B. local preference
C. floating static route
D. HSRP
E. MED
F. weight
What is the next action taken by the Cisco NAC Appliance after it identifies a vulnerability on a
client device?
A. denies the client network resource access
B. repairs the effected devices
C. generates a Syslog message
D. permits the client but limits to guest access
A network engineer has implemented a looped triangle switch block design. What element
must be included in the design?
A. first hop redundancy protocol
B. Layer 2 links between access switches
C. single uplinks between access and distribution switches
D. VLANs that span access switches
E. Layer 3 links between distribution switches
Which two design concerns must be addressed when designing a multicast implementation?
(Choose two)
A. only the low-order 23 bits of the MAC address are used to map IP addresses
B. only the low-order 24 bits of the MAC address are used to map IP addresses
C. only the high-order 23 bits of the MAC address are used to map IP addresses
D. only the low-order 23 bits of the IP address are used to map MAC addresses
E. the 0x01004f MAC address prefix is used for mapping IP addresses to MAC addresses
F. the 0x01005e MAC address prefix is used for mapping IP addresses to MAC addresses
A network engineer designing an access layer that requires all uplinks to be active,
furthermore, VLANs must span across the entire switch block. Which two design fulfill this
requirement?
A. MPLS
B. VPLS
C. EoMPLS
An engineer has to increase the security in the core network. What needs to be implemented
to be sure that the IP traffic is originating from the correct network segment?
A. IPS
B. ACL
C. VLAN access lists
D. ARP inspection
In Internet edge topology where is the best place to put NTP server so users can easily access
to it?
A. Private network
B. Internal network
C. Private DMZ
D. External DMZ
A slow performance router installed on Wan Edge to ensure connectivity with branches, how
to configure BGP? (choose two)
A outsource call center has very strict NAT policies and they have customer X. Which method
allows call center agents to access the internal resource?
Company acquired another company and their IP addressing is overlapping with yours. What
can you do to allow users from acquired company to access your resources?