Q1. What two CoS values are used by voice traffic? (Choose two.)
A. COS1
B. COS2
C. COS3
D. COS4
E. COS5
Answer: C,E
Q2. When designing a new enterprise campus network, what topology should be used for maximum scalability?
A. flat
B. three-layer
C. star
D. partial mesh
E. full mesh
Answer: B
Q3. Which statement describes the methodology that supports the Cisco Enterprise Architecture models?
A. It divides the network into functional network modules.
B. It divides the network into role-based network modules.
C. It divides the network into regional network modules.
D. It divides the network into operational network modules.
Answer: A
Q4. A network engineer is following the three tiered Network Hierarchical Model. At which tier is
route summarization implemented?
A. core
B. distribution
C. backbone
D. access
Answer: B
Q5. You want to gather as much detail as possible during a network audit, to include data time stamping across a large number of interfaces, customized according to interface, with a minimal impact on the network devices themselves. Which tool would you use to meet these requirements?
A. RMON
B. SNMPv3
C. NetFlow
D. Cisco Discovery Protocol
Answer: C
Explanation:
NetFlow provides extremely granular and accurate traffic measurements and a high-level collection of aggregated traffic. The output of netflow information is displayed via the show ip cache flow command on routers. The Table shows a description of the fields for NetFlow output.
Table. Netflow Output escription
Q6. What is the benefit of VLSM?
A. reduces configuration complexity by using the same subnet mask length
B. reduces the routing table size by using automatic route summarization
C. reduces the routing table size by using manual route summarization
D. allows the subnet mask and classful routing updates to be advertised
E. secures the hosts on a subnet by using RFC 1918 addresses
Answer: C
Q7. A network engineer is attempting to separate routing domains using a virtualization technology. What protocol can be configured to perform this task?
A. VLAN
B. VSAN
C. VRF
D. VPC
Answer: C
Q8. An organization is deciding what routing protocol to use throughout their network. What must be considered if routing is to be performed at the access layer?
A. reduced scalability of the network when introducing a large number of switch blocks into the routing table
B. centralized management of access control lists at the distribution layer
C. reliability when implementing routing over spanning-tree at the access layer
D. performance differences between core, distribution and access layer equipment
Answer: D
Q9. Which subnet address and mask would you use for all Class D multicast addresses to be
matched within an access list?
A. 224.0.0.0/20
B. 224.0.0.0/4
C. 239.0.0.0/24
D. 239.0.0.0/8
E. 225.0.0.0/8
Answer: B
Q10. Spanning Layer 2 across geographically separate data centers is a key consideration for current data center designs. Which is the name of the NX-OS technology that facilitates MAC in IP transport for Layer 2 VLANs across any IP network?
A. Overlay Transport Virtualization
B. Virtual Private LAN Services
C. Generic Routing Encapsulation
D. QinQ tunneling
Answer: A