Q1. A company has dark fiber between headquarters and its data center. It is presently configured as a 10GbE connection. Network utilization shows high utilization on the connection. What technology can be implemented to increase capacity without acquiring another circuit?
A. MPLS
B. DWDM
C. VPLS
D. DMVPN
Answer: B
Q2. Which model of ISR is utilized for the teleworker design profile? A. Cisco 1900 Series
B. Cisco 1800 Series
C. Cisco 800 Series
D. Cisco 500 Series
Answer: C
Q3. Which of these statements is true concerning the data center access layer design?
A. The access layer in the data center is typically built at Layer 3, which allows for better sharing of services across multiple servers.
B. With Layer 2 access, the default gateway for the servers can be configured at the access or aggregation layer.
C. A dual-homing NIC requires a VLAN or trunk between the two access switches to support the dual IP addresses on the two server links to two separate switches.
D. The access layer is normally not required, as dual homing is standard from the servers to the aggregation layer.
Answer: B
Q4. Which factor would be most influential in choosing multimode fiber optic connections over UTP?
A. signal attenuation
B. required bandwidth
C. required distance
D. electromagnetic interference
E. cost
Answer: C
Q5. An application uses broadcast traffic to send data to IPv4 hosts. How can the application communicate using IPv6?
A. Anycast
B. Unicast
C. Broadcast
D. Multicast
Answer: A
Q6. To what Layer 2 technology does VRF closely compare?
A. VSS
B. VPC
C. VLAN
D. VTP
Answer: C
Q7. Which three are valid Layer 2 access designs? (Choose three.)
A. Looped Triangle
B. Looped Square
C. Looped U
D. Loop-Free Triangle
E. Loop-Free Square
F. Loop-Free U
Answer: A,B,F
Q8. Which mode is used to exclusively look for unauthorized access points?
A. monitor mode
B. sniffer mode
C. rogue detector mode
D. local mode
Answer: C
Explanation:
Interference detection and avoidance: As Cisco LWAPs monitor all channels, interference is detected by a predefined threshold (10 percent by default). Interference can be generated by rogue APs, microwaves, cordless telephones, Bluetooth devices, neighboring WLANs, or other electronic devices.
Q9. A wireless LAN client is sending traffic to the wired LAN client. What path will the packet take to reach the destination endpoint in a lightweight wireless deployment?
A. switch > controller > ap > client
B. controller > ap > switch > client
C. ap > controller > switch > client
D. switch > ap > controller > client
Answer: C
Q10. What two features are advantages of adding a secondary WAN link at the enterprise edge? (Choose two.)
A. provides additional bandwidth and load balancing capabilities
B. acts as a backup link in event the primary link fails
C. reduces capital and operational costs
D. improves security and prevents against denial of service attacks
E. distributes traffic proactively based on link utilization
Answer: A,B