Q1. A network team must provide a redundant secure connection between two entities using OSPF. The primary connection will be an Ethernet Private Line and the secondary connection will be a site-to-site VPN. What needs to be configured in order to support routing requirements for over the VPN connection?
A. GRE Tunnel
B. HTTPS
C. Root Certificate
D. AAA Server
Answer: A
Q2. What is the recommended subnet between two sites that have a point-to-point connection to conserve IP addresses?
A. 255.255.255.0
B. 255.255.252.0
C. 255.255.255.252
D. 255.255.255.240
Answer: C
Q3. Which QoS mechanism uses RSVP?
A. IntServ
B. DiffServ
C. CoS
D. ToS
Answer: A
Q4. Which statement is the most accurate regarding IPsec VPN design for an Enterprise Campus environment?
A. VPN device IP addressing must align with the existing Campus addressing scheme.
B. The choice of a hub-and-spoke or meshed topology ultimately depends on the number of remotes.
C. Sizing and selection of the IPsec VPN headend devices is most affected by the throughput bandwidth requirements for the remote offices and home worker
D. Scaling considerations such as headend configuration, routing protocol choice, and topology have the broadest impact on the design.
Answer: D
Q5. Which two of these are correct regarding the recommended practice for distribution layer design? (Choose two.)
A. use a redundant link to the core
B. use a Layer 2 link between distribution switches
C. never use a redundant link to the core because of convergence issues
D. use a Layer 3 link between distribution switches with route summarization
E. use a Layer 3 link between distribution switches without route summarization
Answer: A,D
Q6. Which configuration represents resiliency at the hardware and software layers?
A. multiple connections and FHRP
B. HSRP and GLBP
C. redundant supervisor and power supplies
D. dual uplinks and switches
Answer: A
Q7. Which option does the FabricPath technology use to create loop-free Layer 2 networks?
A. STP
B. TTL
C. fabric tags
D. FSTP
Answer: B
Q8. Which three statements about Network Attached Storage are correct? (Choose three.)
A. Data is accessed using NFS or CIFS.
B. Data is accessed at the block level.
C. NAS is referred to as captive storage.
D. Storage devices can be shared between servers.
E. A NAS implementation is not as fast as a DAS implementation.
Answer: A,D,E
Q9. DRAG DROP
Answer:
Q10. An engineer is designing an address plan. Which IPv6 prefix removes any consideration regarding the number of hosts per subnet?
A. /32
B. /48
C. /64
D. /96
Answer: C