New Questions Flashcards
How many virtual routers can GLBP support?
1024
If you need multivendor FHRP what do you use?
VRRP
What gigabit ethernet technology reaches the furthest without a repeater?
1000BASE-LX
What three L2 designs are used for the access layer? looped square loop free square looped U loop free U looped triangle loop-free triangle
Looped square
Looped triangle
Loop free U
What servers from the data center block need direct connection to all other blocks?
network mgmt servers
web server
AD server
dhcp server
network mgmt servers
- Data Center cable management with high server density, the options where:
- Top of Rack (X)
- End of Row (X)
Which module of enterprise contains the following: dns/http/smtp servers, firewall?
Internet connectivity
A campus network needs end-to-end QoS tools to manage traffic and ensure voice quality. Which three types of QoS tools are needed? (A) interface queuing and scheduling (B) congestion management (C) compression and fragmentation (D) bandwidth provisioning (E) traffic classification (F) buffer management
A, D, E
Which layers are usually collapsed in medium sized networks? Access Core Distribution DC Layer
Core
ISR features question
INSERT
VoIP configuration names
single site, centralized multisite, and distributed multisite
What IPT component supports QoS, PoE, VoIP? (A) Client endpoints (B) Call processing (C) Service applications (D) Voice-enabled Infrastructure
Voice-enabled infrastructure
What are the major benefits of using a VPN?
Flexibility, cost, and scalability
VDCS
INSERT
Which mechanisms are required to deploy QoS on an IP WAN? (A) queuing and scheduling (B) Call admission Control (C) traffic shaping (D) link efficiency techniques (E) traffic classification
Answer = B,C,D
What two devices are used in the teleworker solution?
880 router
ISR G2
Which one of these statements should the designer keep in mind when considering the advanced routing features?
A.
one-way router redistribution avoids the requirement for state or default routes.
B.
Redistribution, summarization, and filtering are most often applied between the campus core and enterprise edge.
C.
Filtering only occurs on the routing domain boundary using redistribution.
D.
Summarize routes at the core toward the distribution layer.
E.
The hierarchical flexibility of IPv6 addressing avoids the requirements for routing traffic reduction using aggregation.
Answer A is incorrect as a default route is still required Answer B & D are incorrect as Redistribution, summarization, and filtering are used in the Distribution Layer Cisco Press CCDA 640-864 Official Certification Guide Fourth Edition, Chapter 1, Page 36 37
Answer C is incorrect as route filter can occur at either a routing domain boundary or at a routing redistribution point. Cisco Press CCDA 640-864 Official Certification Guide Fourth Edition, Chapter Answer E is correct as IPv6 allow the aggregation (summarization) of routing prefixes to reduction of the number of routes in the global routing table. Cisco Press CCDA 640-864 Official Certification Guide Fourth Edition, Chapter 9
Note: Core Layer
The core layer is the network’s high-speed switching backbone that is crucial to corporate communications. It is also referred as the backbone. The core layer should have the following characteristics:
Distribution Layer
The network’s distribution layer is the isolation point between the network’s access and core layers. The distribution layer can have many roles, including implementing the following functions:
You can use several Cisco IOS Software features to implement policy at the distribution layer:
Route Filtering
Filtering of routes can occur on either a redistribution point or in the routing domain to prevent some parts of the network from accessing other sections of the network.
Filtering at a redistribution point provides the following:
Global Aggregatable IPv6 Address
Global aggregatable unicast addresses allow the aggregation of routing prefixes. This allows a reduction of the number of routes in the global routing table. These addresses are used in links to aggregate (summarize) routes upwards to the core in large organizations or to ISPs. Global aggregatable addresses are identified by the fixed prefix of 2000:/3. As shown in Figure 9-5, the format of the global aggregatable IPv6 address is a global routing prefix starting with binary 001, followed by the subnet ID and then the 64-bit interface identifier (ID). The device MAC address is normally used as the interface ID.
Which one of these statements is true about addressing redundancy within the WAN environment?
A.
The reliability and speed of DSL allow for cost savings by not including redundant links.
B.
CAMDM and dark fiber offer advanced redundancy features such as automatic backup and repair mechanism to cope system faults.
C.
An SLA is one way to eliminate the need for redundancy.
D.
The failure of a single SONET/SDH link or network element does not lead to failure of the entire network.
D
Which one of these statements is true concerning the enterprise data center?
A.
It can be located either at the enterprise campus or at a remote branch.
B.
Remote data center connectivity requirements align with the small office design.
C.
The data center designs will differ substantially depending on whether the location is on campus or remote.
D.
A remote branch with a data center becomes the enterprise campus.
C
According to Cisco, which four improvements are the main benefits of the PPDIOO lifecycle approach to network design? (Choose four)
A.
faster ROI
B.
improved business availability
C.
increased network availability
D.
faster access to applications and services
E.
lower total cost of network ownership
F.
better implementation team engagement
B C D E
Which two statements best describe an OSPF deployment? (Choose two)
A.
ABR provides automatic classful network boundary summarization.
B.
ABR requires manual configuration for classful network summarization
C.
External routes are propagated into the autonomous system from stub areas via ASBR.
D.
External routes are propagated into the autonomous system from regular areas or NSSA via ASBR.
E.
External routes are propagated into the autonomous system from regular areas or NSSA via ABR.
B D
A large enterprise requires sensitive information be transmitted over a public infrastructure. It requires confidentiality integrity, and authenticity. Which security solution best meets these requirements?
A.
Cisco IOS Firewall
B.
Intrusion Prevention
C.
IPSEC
D.
AAA
E.
Traffic Guard Protector
F.
SECURE CONECTIVITY
C
Which statement describes the recommended deployments of IPv4 addressing in the Cisco Network Architecture for the Enterprise?
A.
private addressing throughout with public addressing n the Internet Connectivity module
B.
private addressing throughout with public addressing n the Internet Connectivity and E- Commerce modules
C.
private addressing throughout with public addressing m the Internet Connectivity, E-Commerce, and Remote Access and VPN modules
D.
private addressing throughout with public addressing in the Internet Connectivity, E-Commerce, and Enterprise Branch modules
C
Which network scenario is static routing most appropriate?
A.
parallel WAN links
B.
IPSec VPN
C.
expanding networks
D.
hierarchical routing
B
Which of these is the equation used to derive a 64 Kbps bit rate?
A.
2 x 8 kHz x 4-bit code words
B.
8 kHz x 8-bit code words
C.
2 x 4-bit code words x 8 kHz
D.
2×4 kHz x 8-bit code words
D
Which three terms describe the primary functions of the distribution layer of the campus network design hierarchy? (Chose three)
A.
provides end-user connectivity
B.
provides high speed transport
C.
provides QoS services
D.
enforces security policies
E.
provides WAN connection
F.
connects access devices to the core backbone
C D F
Which codec does Cisco recommend tor WAN link?
A.
G.711
B.
G 723
C.
G 728
D.
G 729
D
Which two of these best describe the implementation of a WAN Backup design over the Internet? (Choose two.)
A.
a best-effort method
B.
bandwidth guaranteed based on interface configuration
C.
designed as an alternative to a failed WAN connection
D.
implemented with a point-to-point logical link using a Layer 2 tunnel
E.
requires no ISP coordination or involvement
A C`
Which three pieces of information should be documented for each step of each phase in a design implementation plan? (Choose three.)
A.
easy guidelines in case of failure
B.
estimated rollback time in case of failure
C.
simple implementation guidelines
D.
estimated implementation time
E.
design document references
F.
step description
D.
estimated implementation time
E.
design document references
F.
step description
Which three types of WAN topologies can be deployed in the Cisco Enterprise Architecture Enterprise Edge WAN module? (Choose three.)
A.
ring
B.
full mesh
C.
partial mesh
D.
collapsed core
E.
star
F.
core
G.
edge
B C E
What are the modes of unicast reverse path forwarding?
A) Strict Mode B) Loose Mode C) VRF Mode D) Global E) Local
A B C
This:
SNMP – Defines how information is exchanged…
RMON – provides complete network visibility from physical to application
CDP – runs over data link layer…
Netflow – processes larger ACLs efficiently…
Other side.
There was a network topology diagram (configured with EIGRP and OSPF) and the question was on which router will the redistribution be performed.
– Router2 (between OSPF and
EIGRP areas).
Advantage of colocating datacenter
(Ans.improved redundancy)
Netflow can do what?
– processes larger ACLs efficiently…
What are three basic design approaches for packet-switched networks? (Choose three.)
Fully meshed, partially meshed, hub and spoke
- Which three parameters can you identify by using a traffic analyzer? (Choose three.)
protocol specification (IP protocol ID, TCP/UDP port number)
average bit rate and packet rate
QoS requirements
importance of the application
devices that use a specific protocol and their addresses
1,b,e
What are the benefits of PPDIOO
Lowers total cost of ownership
Increases network availability
Improves business agility
Speeds up access to applications and services
Which item is not an SNMP opeartion GetNext Community Trap Set
Community
During which phase of the PPDIOO model would you conduct interviews with supporting staff to develp and propose a viable solution
Prepare
What are the two most likely driving forces motivating businesses to integrate voice and data into converged networks?
Data, voice, and video cannot converge on their current PSTN structures
WAN costs can be reduced by migrating to converged networks
During which stage of the PPDIOO process are implementation procedures prepared?
Design
Which three solutions are part of the borderless network services?
Wireless Routing TrustSec MediaNet Switching EnergyWise Next-Gen WAN
TrustSec
MediaNet
EnergyWise
Which three mechanisms are required to deploy QoS on an IP WAN?
queuing and scheduling Call Admission Control Traffic shaping link efficiency techniques Traffic classification bandwidth provisioning
C, D, E
What is part of the prepare phase of PPDIOO?
Obtain site contact info
Perform network audit
Identifiy customer requirements
Perform gap analysis
Identify customer requirements
When designing a WAN backup for voice and video applications what types of connections should be used?
Private WAN internet ISDN MPLS dial-up ATM DSL
Private WAN
ISDN
MPLS
Observe the following options in which section of the network document does CIsco recommend a discussion of performance, scalability, capacity, security, and traffic needs? Design summary design solution executive summary design requirements
design requirements
Which aspect would most likely be found in the draft design document
A list of QoS requirements
a note that thre are no segments with more than 70% broadcast or multicast traffic
the level of redundancy or high availabilty that currently exits or is required in the netowkr
the list of network infrastructure services which are in use such as voice and video
a list of QoS requirements
Which of the following three options represents the components of the teleworker solution?
Cisco Unified IP Phone Cisco 880 Series router Aironet Office Extend Access Point Catalyst 3560 Series Switch Cisco 2900 Series Router MPLS Layer 3 VPN Leased Lines
ABC
At which stage in the PPDIOO process would you analyze a customer’s network in order to discover opportunities for network improvement?
Operate Implement Plan Design Prepare Design Assessment
Design
Which information should a network summary report identify?
actions needed to support the existing network
customer requirements
new network features
customer requirement modifications
actions needed to support existing network features
infrastructure shortcomings
infrastructure shortcomings
Which two capabilities of NetFlow accounting assist designers with network planning?
the monitoring of processor time on network devices
the calculation of packet and byte counts of network traffic
the decoding and analyzing of packets
the presentation of a time-based view of application usage on the network
the monitoring of user network utilization
B
E
When designing using the Cisco enterprise architecture, in which enterprise campus layer do the enterprise edge and enterprise wan modules establish their connection?
Building access building distribution campus core enterprise branch enterprise data center
campus core
Which types of communicating devices compose RMON architecture? router switch management station monitor
management station
monitor
Which Cisco technology using Nexus NX-OS infrastructure allows the network architect to create up to four separate control and data plane instances of the Nexus chassis?
virtual port-channel
virtual routing and forwarding
virtual switching system
virtual device context
virtual device context
Which two techniques can reduce voice packet transfer delay across a link of less than 512 kbps
deploy lfi increase link bandwidth extend the trust boundray deploy software compression increase queue depth
deploy LFI
increase link bandwidth
Which three statements are true regarding the virtual interface on a Cisco Wireless LAN controller
supports mobility management serves as a DHCP relay used for all controller to AP communication supports embedded Layer 3 security default for out-of-band management default for in-band management provides connectivity to AAA servers
ABD
Spanning layer 2 across geographically separate data centers is a key consideration for current data center designs. Which is the name of the NX-OS technology that facilitates MAC in IP transport for Layer 2 VLANs across any IP network
overlay transport virtualizations
For the following options which emerging wan technology uses DSL coding and digital modulation techniques with ethernet
cable
wireless
smds
long-reach ethernet(LRE)
long reach ethernet
The cisco data center network architecture comprisis which two cisco SONA layers
collaboration applications wan/internet interactive services network infrastructure business applications
interactive services
network infrastructure
High availability is a key design consideration in the enterprise campus network. In a fully redundant topology, which is likely to provide faster IGP convergence during a failure.
redundant supervisors
redundant supervisors with cisco nonstop forwarding and stateful switchover
single supervisors with tuned igp timers
single supervisors
single supervisors with tuned IGP timers
Which three are security services offered through cisco router security
trust and identity integrated threat control unified wireless network security solution secure connectivity voice-messaging security endpoint security virtual security gateway
ABD
You are asked to design a new branch office that will need to support 25 users. These users will be using an ISP connection and will need to connect to the main office for network services. Which two cisco devices are the most appropriate to fulfill all these requirements?
cisco ips cisco ISR G2 Cisco ASA Cisco 2960 Cisco CRS-1 Cisco ACS
BC
Which one of these statements should the designer keep in mind when considering the advanced routing features?
one way router redistribution avoids the requirement for state or default routes
redistribution, summarization and filtering are most often applied between campus core and enterprise edge
filtering only occurs on the routing domain boundary using redisturbition
summarize routes at the core towoard the distribution layer
the hierarchical flexibility of IPv6 addressing avoids the requirement for routing traffic reduction using aggregation
B
Which two encryption transforms will be used by both ESP and AH for authentication?
HMAC-MD5 or Hash Message Authentication Code-Secure Hash ALgorithm
Which standard language will be used by SNMP to define the device information to be stored
ASN.1
What is SLC
service level contract
Which is the remote monitoring agent in the RMON architecture called?
Tree
Station
Agent
Probe
Probe
Which three are features of LWAPP? (Choose three.)
A. firmware synchronization B. local management of APs C. configuration changes manually synced D. encryption of control channel E. configuration data only on the WLC F. wireless control free operation G. replaces 802.1x for authentication in wireless connections
ADE
Which of these statement is true concerning the data center access layer design
the access layer in the data center is typically built at layer 3 which allows for better shaping of services across multiple servers
with layer 2 access the default gateway for the servers can be configured at the access or aggregation layer
a dual homing nic requires a vlan or trunk between the two access switches to support the dual ip address onthe two server links to two separate switches
the access layer is normally not required as dual homing is standard from the servers to the aggregation layer
B
Which two statements about the data center aggregation layer are correct
layer 4 through layer 7 services are provided in that layer
stp should never be support in that layer
that layer is the critical point for application services
layer 2 connectivity is provided in that layer from the data center to the core
a c
When building global network businesses which three principles should be used
customer focus continuous standardization and core versus context
Which is the purpose of the NAC profiler
automates discovery and inventory of all lan attached devices
generates a profile based on username and group
learns and creates a database of virus definnotions based on lan traffic
a database used to map user vpn accounts
A
Which two design methodology steps relate, at least in port, to the implment phase of the PPDIOO process?
verifying the network testing design determining customer requirements characterizing the existing network establishing the organizational requriments
AB
Which WLC interface is dedicated for WLAN client data?
virtual interface dynamic interface management interface AP manager interface service port interface
dynamic interface
Which two solutions are parts of the Cisco security management suite
asa cisco security agent NAC appliance CSM PIX Cisco Security MARS
DF
What does ODR stand for?
On demand routing
What is primary consideration when choosing a routed netowrk design over a traditional campus network design
layer 3 service support at the network edge
the routing protocol choice open ospf or proprietary eigrp
the routing abilities of the host devices
the need to control the broadcast domains within the campus core
a
Your boss is interested in a wireless WAN solution which provides higher bandwidth than point-to-multipoint (pmp) wireless. Which description is correct?
Service providers cannot install point-to-point (p2p) links from a p2mp hub
P2p wireless connections can provide up to 44 Mbps raw bandwidth
P2p links tend to be slower than p2mp
P2mp wireless connections can provide up to 1.544 Mbps raw bandwidth
B
Which two statements best describe the implementation of Overlay VPN connectivity for remote access in the Enterprise Edge WAN module? (Choose two.)
A.
It must use Layer 2 labels to forward packets
B.
It uses dedicated point-to-point links.
C.
Bandwidth is provisioned on a site-to-site basis.
D.
The ISP actively participates in customer routing.
E.
Optimum routing between customer sites requires a full mesh of virtual circuits.
A C
Which advantage is of security systems that are part of the Cisco ecosystem?
A.
There is a suite of products to choose from.
B.
Various partners as well as supporting products increase the effectiveness of security systems.
C.
There are no advantages.
D.
The Cisco ecosystem ensure that partners can implement the solution.
B
Which two features are supported by single wireless controller deployments?
A. automatic detection and configuration of LWAPPs
B. LWAPP support across multiple floors and buildings
C. automatic detection and configuration of RF parameters
D. Layer 2 and Layer 3 roaming
E. controller redundancy
F. mobility groups
AB
Which one of these statements describes why, from a design perspective, a managed VPN approach for enterprise teleworkers is a most effective?
A.
A managed VPN solution uses a cost effective, on-demand VPN tunnel back to the enterprise
B.
This solution supports all teleworkers who do not require voce or video
C.
This architecture provides centralized management where the enterprise can apply security policies and push configurations.
D.
It provides complete flexibility for remote access through a wireless hotspot or a guest network at a host, in addition to a home office.
C
When designing using the cisco enterpries architecture in which enterprise campus layer does the remote access and vpn module establish its connection
building access
campus core
enterprise branch
enterprise data center
campus core
In the enterprise data center, which are the three main components?
network infrastructure interactive services data center management internet services wan services vpn and remote access
ABC
Which three technologies are recommended to be used for WAN connectivity in today’s Enterprise Edge designs? (Choose three.)
A. DWDM B. Metro Ethernet C. Frame Relay D. MPLS VPN E. ISDN F. DSL G. Wireless
ABD
In which phase of PPDIOO are the network requirements identified?
Plan
What is the benefit of deploying a gatekeeper in an H.323 IP telephony network?
provides spatial redundancy through the use of HSRP
provides load balancing via GUP when alternate gatekeepers are deployed
reduces configuration complexity by centralizing the dial plan
increases redundancy by allowing each gateway to maintain a copy of the dial plan
C
When designing for a remote worker, which are two typical requirements?
best effort interactive and low volume traffic patterns
connections to the enterprise edge using layer 2 wan technologies
alyways-on connection with sla from isp
voice and ipsec vpn support
high-end security devices with stateful firewall filtering
dual or multihoming to isps
always-on connection with sla from isp
voice and ipsec vpn support
The network-design process is limited by many external constraints. which origins are of these constraints
technological, political, social, economical
Where in the cisco enterprise architecture does network management reside?
enterprise campus module
Which is a factor in enterprise campus design decisions? network application characteristics routing protocol characteristics switching latency characteristics packet filtering characteristics
network application characteristics
When considering the three VoIP design models single site, centralized multisite, and distributed multisite which question below would help to eliminate one of these questions?
A.
Will the switches be required to provide inline power?
B.
Will users need to make off site calls, beyond the enterprise?
C.
Will users require applications such as voice mail and interactive voice response?
D.
Are there users whose only enterprise access is via a QoS-enabled WAN?
D
What are three valid methods of gathering information about an existing data network? (Choose three.)
A.
Use organizational input.
B.
Analyze the user-mapping of a running application.
C.
Perform a traffic analysis.
D.
Perform a packet-level audit to verify carrier service guarantees.
E.
Use reports that analyze the metrics of the customer’s existing network.
F.
Perform a network audit to gather more detail about the network.
CEF
Where do you put DNS and DHCP on enterprise model. select two
enterprise campus server farm module
enterprise edge
sp edge premise
enterprise branch
AD
As a network engineer can you tell me accounting managmenet on network management system allows a network manager to perform which function
assess the networks effectiveness and throughput
charge back to users for network resources
performance managament
identify problem areas in the network
charge back to users for network resources
The evolution of the Data Center is best represented by the 3.0 architecture component of virtualization. Which of the following is not an example of the virtualization taking place in the Data Center ?
a) VLANs and VSANs provide for virtualized LAN and SAN connectivity, separating physical networks and equipment into virtual entities.
b) Virtual machines that run on application within the client operating system, is future virtualized and running on common hardware.
c) Storage devices virtualized into Storage pools, and network devices are virtualized using device contexts
d) virtualized media access utilizing Fibre Channel over Ethernet.
B