Q1. When is a first-hop redundancy protocol needed in the distribution layer?
A. when the design implements Layer 2 between the access and distribution blocks
B. when multiple vendor devices need to be supported
C. when preempt tuning of the default gateway is needed
D. when a robust method of backing up the default gateway is needed
E. when the design implements Layer 2 between the access switch and the distribution blocks
Answer: A
Q2. A company requires real-time SAN replication between two remote locations. What is the standard path selection protocol for fabric routing?
A. FSPF
B. FICON
C. FCOE
D. SCSI
Answer: A
Q3. Which two design recommendations are most appropriate when EIGRP is the data center core routing protocol? (Choose two.)
A. Summarize data center subnets.
B. Advertise a default route into the data center core from the aggregation layer.
C. Tune the EIGRP timers to enable EIGRP to achieve quicker convergence.
D. Adjust the default bandwidth value to ensure proper bandwidth on all links.
Answer: A,B
Q4. There are 3 steps to confirm whether a range of IP addresses can be summarized. Which of the following is used in each of these 3 steps?
A. The first number in the contiguous block of addresses
B. The last number in the contiguous block of addresses
C. The size of the contiguous block of addresses
D. The subnet mask of the original network address
Answer: C
Q5. Which feature supports multiple routing tables with overlapping networks on a single device?
A. VRF
B. Metro Ethernet
C. RSTP
D. VSS
Answer: A
Q6. Which four Cisco proprietary Spanning Tree Protocol enhancements are supported with rapid per-VLAN Spanning-Tree plus? (Choose four.)
A. PortFast
B. UplinkFast
C. loop guard
D. root guard
E. BPDU guard
F. BackboneFast
Answer: A,C,D,E
Q7. Which option is the preferred and most versatile model to deploy IPv6 in existing IPv4 environments?
A. hybrid
B. service block
C. dual stack
D. processes
Answer: C
Q8. The network designer needs to consider the number of multicast applications and sources in the network to provide the most robust network possible. Which of the following is a consideration the designer must also address?
A. The IGPs should utilize authentication to avoid being the most vulnerable component
B. With SSM source or receiver attacks are not possible
C. With Shared Trees access control is always applied at the RP
D. Limit the rate of Register messages to the RP to prevent specific hosts from being attacked on a PIM-SM network
Answer: B
Q9. Refer to the exhibit.
The network engineer wants to ensure that receiver A does not receive traffic from the video conference.
For multicast traffic, where must the filtering be placed to fulfill that requirement?
A. R1
B. Video Conference
C. A
D. S1
E. R2
Answer: D