Q1. What is an advantage of using the Cisco FabricPath feature in a data center environment?
A. VSS does not have to be configured.
B. Transparent Interconnection of Lots of Links can be configured simultaneously.
C. Equal-Cost Multipath can be used to choose the forwarding path.
D. The control plane and management plane remain separate.
Answer: C
Q2. Which technology can block interfaces and provide a loop-free topology?
A. STP
B. VSS
C. VLAN
D. vPC
Answer: D
Q3. When considering the design of the E-Commerce topology which of the following are true?
A. One-armed SLB design with multiple security contexts removes the need for a separate firewall in the core layer
B. Two-firewall-layer SLB design considers the aggregation and access layers to be trusted zones, requiring no security between the web, application, and database zones
C. One-armed SLB design with two firewall layers ensures that non load-balanced traffic still traverses the ACE so that the health and performance of the servers is still being monitored
D. In all cases there will be configuration requirements for direct access to any servers or for nonload-balanced sessions initiated by the servers
Answer: A
Q4. A network manager wants to securely connect a new remote site to the existing headquarters site using a VPN technology that meets security requirements. Which VPN technology should be used?
A. GRE
B. IPsec
C. remote-access VPN
D. L2TP VPN
Answer: B
Q5. What is the maximum number of routers that each OSPF area (including the backbone) should contain?
A. 30
B. 10
C. 50
D. 100
Answer: C
Q6. Which of the following two are effective and simple means of employing route summarization within the Enterprise Campus network? (Choose two)
A. A default route (0.0.0.0 /0) advertised dynamically into the rest of the network
B. Route filtering to manage traffic flows in the network, avoid inappropriate transit traffic through remote nodes, and provide a defense against inaccurate or inappropriate routing updates
C. Use manual split horizon
D. Use a structured hierarchical topology to control the propagation of EIGRP queries
E. Open Shortest Path First (OSPF) stub areas
Answer: A,E
Q7. Which VPN technology supports dynamic creation of spoke-to-spoke VPN tunnels to provide a scalable design?
A. IPsec
B. GRE over IPsec
C. DMVPN
D. GRE
Answer: C
Q8. The network designer needs to consider the number of multicast applications and sources in the network to provide the most robust network possible. Which of the following is a consideration the designer must also address?
A. The IGPs should utilize authentication to avoid being the most vulnerable component
B. With SSM source or receiver attacks are not possible
C. With Shared Trees access control is always applied at the RP
D. Limit the rate of Register messages to the RP to prevent specific hosts from being attacked on a PIM-SM network
Answer: B
Q9. What are three primary components in IS-IS fast convergence? (Choose three.)
A. event propagation
B. LSP flooding
C. fast hellos
D. matching MTUs
E. updating RIB and FIB
F. SPF calculation
Answer: A,E,F