Q1. Which VPN technology is tunnel-less?
A. GET VPN
B. DMVPN
C. MPLS
D. IPsec VPN
Answer: A
Q2. Which part of the Layer 3 header is used to identify a flow in NetFlow but it is not used for NBAR?
A. source port
B. ToS
C. protocol type
D. source IP
Answer: B
Q3. What two features are inherent advantages of MPLS VPN services? (Choose two.)
A. service providers can provide additional services
B. virtual private networks segment traffic and ensure privacy
C. easier to troubleshoot than Layer 2 WAN technologies
D. faster data transfer speeds at lower costs
E. functions without Cisco Express Forwarding
Answer: A,B
Q4. Which three virtualization categories are in campus networks? (Choose three.)
A. Layer 2 virtualization
B. Layer 3 clustering
C. network virtualization
D. device virtualization
E. network clustering
F. device clustering
Answer: C,D,F
Q5. A network engineer is implementing virtualization into the enterprise network. Which system should be used to address policy enforcement at the distribution layer?
A. Cisco IOS based firewall
B. multilayer switches
C. integrated firewall services
D. identity services engine
E. intrusion protection systems
Answer: C
Q6. Which two of these are characteristics of multicast routing? (Choose two.)
A. multicast routing uses RPF.
B. multicast routing is connectionless.
C. In multicast routing, the source of a packet is known.
D. When network topologies change, multicast distribution trees are not rebuilt, but use the original path
E. Multicast routing is much like unicast routing, with the only difference being that it has a a group of receivers rather than just one destination
Answer: A,C
Q7. Which technology can block interfaces and provide a loop-free topology?
A. STP
B. VSS
C. VLAN
D. vPC
Answer: D
Q8. Which multicast implementation strategy provides load sharing and redundancy by configuring intradomain RPs as MSDP peers?
A. anycast RP
B. auto-RP
C. bootstrap router
D. static RP
Answer: A
Q9. An organization is deploying a new load balancing environment to support sensitive applications. The security requirements include discrete IP segments used for VIPs and for the application hosts. What load balancer mode meets the requirements?
A. router
B. bridge
C. transparent
D. pass-through
Answer: A
Q10. When an enterprise network is designed, which protocol provides redundancy for edge devices in the event of a first-hop failure?
A. ICMP
B. HSRP
C. STP
D. HTTP
Answer: B