Chapter 7 - Advanced Enterprise Campus Design Flashcards
What is true in the Layer 3 access layer design?
- There is no need for an FHRP.
- There is no need for VLANs in the access layer.
- VLANs can span access switches.
- The SVIs are defined in the distribution layer.
A. In the Layer 3 access layer, there is no need for an FHRP.
Which of the following methods provide workstation-to-router redundancy in the access layer? (Choose two.)
- AppleTalk Address Resolution Protocol (AARP)
- Hot Standby Router Protocol (HSRP)
- Virtual Router Redundancy Protocol (VRRP)
- Dynamic Host Configuration Protocol (DHCP)
B and C. HSRP and VRRP provide default gateway redundancy.
What is the 20/80 rule?
- 80% of the traffic is local, 20% is external
- 20% of the traffic is local, 80% is external
- 20% of the traffic is reserved for VoIP, 80% for data
- 20% of the traffic is peer-to-peer, 80% is client/server
B. 20% of traffic is local and 80% is external to the local LAN.
The summarization of routes is a best practice at which layer?
- Access layer
- Distribution layer
- Core layer
- WAN layer
B. Routes are summarized at the distribution layer.
A design uses two Layer 2 circuits interconnecting two data centers. Spanning Tree Protocol causes the second circuit to be in blocking state. What technology can you implement to use both circuits?
- Fast IP
- MST
- STP
- Toolkit EtherChannel
D. Use EtherChannel to merge the two physical units into one.
Two workstations are located on separate VLANs. They exchange data directly. What type of application is this?
- Client/server
- Client/peer
- Peer-to-peer
- Client/enterprise
C. This is a peer-to-peer application.
Which protocol is an IETF standard?
- VSS
- HSRP
- VRRP
- GLBP
C. Virtual Router Redundancy Protocol (VRRP) is an IETF standard.
Which solution allows you to expand the user capacity in the access layer without having to replace the existing switch?
- VSS
- EtherChannel
- MEC
- Stacking technology
D. Stacking switch technology allows you to increase the number of ports in the access layer while still using the same uplinks and ports in the distribution layer.
Which of the following is an example of a peer-to-peer application?
- IP phone call
- Client accessing a file server
- Web access
- Using a local server on the same segment
A. IP phone–to–IP phone communication is an example of peer-to-peer communication.
An enterprise network has grown to span multiple buildings supporting multiple departments. Clients access servers that are in local and other buildings. The company security assessment has identified policies that need to be applied. What do you recommend?
- Move all departments to a single building to prevent unauthorized access.
- Move all servers to one of the LAN client segments.
- Move all servers to a data center server segment that is separate from client LANs.
- Move all servers to the building distribution switches.
C. Create a data center server segment that enables the enforcement of security policies.
Link redundancy and infrastructure services are design considerations for which layer?
- Core layer
- Distribution layer
- Access layer
- Application layer
B. These are design considerations for the distribution layer.
Which of the following are server connectivity methods in the data center?
- Single NIC
- EtherChannel
- Content switch
- All of the above
D. All these are server connectivity options.
A campus network of four buildings is experiencing performance problems. Each building contains 400 to 600 devices, all in one IP subnet. The buildings are connected in a hub-and-spoke configuration back to Building 1 using Gigabit Ethernet with multimode fiber. All servers are located in Building 1. What do you recommend to improve performance?
- Connect all buildings in a ring topology.
- Implement multiple VLANs in each building.
- Move servers to the buildings.
- Use single-mode fiber to make the Gigabit Ethernet links faster.
B. The building subnets are too large and should be further segmented to reduce the broadcast domain.
Match each application type with its description.
- Peer-to-peer
- Client/local server
- Client/server farm
- Client/enterprise edge
- Server on the same segment
- IM
- Web access
- Client accesses database server
i = B
ii = A
iii = D
iv = C
Match each campus design model with its description.
- Routed access layer
- Traditional Layer 2 access layer
- Layer 2 access with VSS
- Hybrid access layer
- Legacy design
- Access layer using Layer 3 capabilities
- Improves Layer 2 design
- Not recommended.
i = B
ii = A
iii = C
iv = D
Which network application type is most stringent in terms of the network resources?
- Peer-to-peer
- Client/local server
- Client/data center server farm
- Client/enterprise edge
C.
Company departments are located across several buildings. These departments use several common servers. Network policy and security are important. Where should servers be placed?
- Within all department buildings, and they should duplicate the common servers in each building
- Connecting the common servers to the campus core
- The data center
- Connecting the servers to the distribution layer
C.
A large company has a campus core. What is the best practice for the core campus network?
- Use triangles.
- Use squares.
- Use rectangles.
- Use point-to-point mesh.
A. Use redundant triangle topology between the distribution and core layers.
A company has five floors. It has Layer 2 switches on each floor with servers. It plans to move servers to a new computer room and create a server farm. What should it do?
- Replace all Layer 2 switches with Layer 3 switches.
- Connect the Layer 2 switches to a Layer 3 switch in the computer room.
- Connect the Layer 2 switches to a new Layer 2 switch in the computer room.
- Connect the Layer 2 switches to each other.
B.
A link is running at 80% utilization. Business-critical applications are used. What can be done to minimize packet delay and loss?
- Implement QoS with classification and policing in the distribution layer.
- Add additional VLANs so that the business applications are used on PCs on that VLAN.
- Perform packet bit rewrites in the distribution switches.
- Classify users in the access layer with different priority bits.
A.
Which are four best practices for the access layer? (Choose four.)
- Disable trunking in host ports.
- Limit VLANs to one closet.
- Use PVST+ with multilayer switches.
- Enable trunking on host ports.
- Use VLAN spanning to speed convergence of Spanning Tree Protocol.
- Use VTP Server mode in hierarchical networks.
- Use VTP Transparent mode in hierarchical networks.
- Use RPVST+ with multilayer switches.
A, B, G, and H.
Which are three best practices for the distribution layer? (Choose three.)
- Use HSRP, VRRP, or GLBP.
- Provide fast transport.
- Use Layer 3 routing protocols to the core.
- Use Layer 2 routing protocols to the core.
- Summarize routes to the core layer.
- Summarize routes to the access layer.
A, C, and E.
Which are four best practices for the distribution layer? (Choose four.)
- Disable trunking in host ports.
- Limit VLANs to one closet.
- Use HSRP. Use GLBP.
- Use VLAN spanning to speed convergence of Spanning Tree Protocol.
- Use Layer 3 routing to the core.
- Summarize routes.
- Use RPVST+ with multilayer switches.
C, D, F, and G.