Enterprise LAN Design and Tech Questions
What are four benefits of hierarchical network design?
Cost Savings, ease of understanding, easy network growth (scalable), and improved fault isolation
True or false: Small to medium campus networks must always implement three layers of hierarchical design.
F
True or false: The core layer of the hierarchical model does security filtering and media translation.
False
True or false: You can implement a full-mesh network to increase redundancy and reduce a WAN's costs.
False
True or false: The access layer provides high availability and port security.
True
How many links are required for a full mesh of six sites?
Use n(n − 1)/2, where n = 6. 6(6 − 1)/2 = (6 × 5)/2 = 30/2 = 15.
How many full-mesh links do you need for a network with 10 routers?
Use the formula n(n − 1)/2, where n = 10. 10(10 − 1)/2 = 90/2 = 45 links.
Which are key features of the distribution layer? (Choose two.) a. Aggregates access layer switches b. Provides a routing boundary between the access and core layers c. Provides connectivity to end devices d. Provides fast switching e. Provides transport to the enterprise edge f. Provides VPN termination
a. Aggregates access layer switches b. Provides a routing boundary between the access and core layers c. Provides connectivity to end devices
What is correct regarding Spanning Tree Protocol stability mechanisms? a. Apply PortFast to all end-user ports. Apply RootGuard to all ports where a root is never expected. b. Apply RootGuard to all end-user ports. Apply PortFast to all ports where a root is never expected c. Apply PortFast to all end-user ports. Apply RootGuard to all ports where a root is expected. d. Apply Loop Guard to all end-user ports. Apply RootGuard to all ports.
a. Apply PortFast to all end-user ports. Apply RootGuard to all ports where a root is never expected.
Which layers provide redundancy? (Choose two.) a. Core layer b. Distribution layer c. Access layer d. Data link layer
a. Core layer b. Distribution layer
Which are best practices for the access layer? (Choose four.) a. Disable trunking in host ports. b. Limit VLANs to one closet. c. Use PVST+ with multilayer switches. d. Enable trunking on host ports. e. Use VLAN spanning to speed convergence of Spanning Tree Protocol. f. Use VTP Server mode in hierarchical networks. g. Use VTP Transparent mode in hierarchical networks. h. Use RPVST+ as the Spanning Tree Protocol with multilayer switches.
a. Disable trunking in host ports. b. Limit VLANs to one closet. g. Use VTP Transparent mode in hierarchical networks. h. Use RPVST+ as the Spanning Tree Protocol with multilayer switches.
Which of the following describe the core layer? (Choose two.) a. High-speed data transport b. Applies network policies c. Performs network aggregation d. Concentrates user access e. Provides PoE f. Avoids data manipulation
a. High-speed data transport f. Avoids data manipulation
42. Which statement is correct regarding Local VLANs? (select 2) a. It is the preferred design. b. Users are grouped into VLANs depending on their physical location. c. VLAN membership does not change if the user moves to another building within the campus. d. VLANs are dispersed throughout the campus.
a. It is the preferred design. b. Users are grouped into VLANs depending on their physical location.
Which Cisco STP Toolkit mechanisms are recommended on user access ports? a. PortFast b. RootGuard c. UplinkFast d. Loop Guard e. BPDU Guard
a. PortFast e. BPDU Guard
Which of the following is a core layer best practice? a. Reduce switch peering and routing. b. Use HSRP and summarize routes. c. Disable trunking and use RPVST+. d. Offload SSL sessions and use load balancers.
a. Reduce switch peering and routing.
What is the recommended method to connect the distribution switches to the core? a. Redundant triangle links b. Redundant cross-connect links c. Redundant Layer 3 squares d. Redundant Layer 2 links
a. Redundant triangle links
Which are two benefits of using a modular approach? (Choose two.) a. Simplifies the network design b. Reduces the amount of network traffic on the network c. Often reduces the cost and complexity of the network d. Simplifies the network by using full-mesh topologies
a. Simplifies the network design c. Often reduces the cost and complexity of the network
What is an advantage of using the updated Layer 2 access layer design over the traditional model? a. There is an increase in uplink bandwidth. b. The updated model adds routing between the distribution and access layers. c. The access layer switch needs to be able to route. d. Layer 3 load balancing is enabled.
a. There is an increase in uplink bandwidth.
A network has two distribution switches, A and B, connected via a Layer 2 trunk. Distribution A switch is the Spanning Tree Protocol root, and distribution B is the active HSRP gateway. Layer 2 links are used to connect access layer switches to both distribution switches. Which statement is true? a. Traffic will transit from the access switches through distribution switch A through the Layer 2 trunk to distribution switch B. b. A Spanning Tree Protocol loop will be created. c. The access switches will not be able to communicate. d. Loop Guard will prevent the loop from being created
a. Traffic will transit from the access switches through distribution switch A through the Layer 2 trunk to distribution switch B.
Which are best practices for the distribution layer? (Choose three.) a. Use HSRP or GLBP. b. Provide fast transport. c. Use Layer 3 routing protocols to the core. d. Use Layer 2 routing protocols to the core. e. Summarize routes to the core layer. f. Summarize routes to the access layer.
a. Use HSRP or GLBP. c. Use Layer 3 routing protocols to the core. e. Summarize routes to the core layer.
Which are best practices for the core layer? (Choose three.) a. Use routing with no Layer 2 loops. b. Limit VLANs to one closet. c. Use HSRP. d. Use GLBP. e. Use Layer 3 switches with fast forwarding. f. Use Layer 3 routing to the core. g. Use two equal-cost paths to every destination network. h. Use RPVST+ with multilayer switches.
a. Use routing with no Layer 2 loops. e. Use Layer 3 switches with fast forwarding. g. Use two equal-cost paths to every destination network.
Which of the following describe the distribution layer? (Choose two.) a. High-speed data transport b. Applies network policies c. Performs network aggregation d. Concentrates user access e. Provides PoE f. Avoids data manipulation
b. Applies network policies c. Performs network aggregation
Which statement regarding campus design is correct? a. Connect access switches directly to summarize via the uplinks. b. Build using triangles rather than squares. c. Configure a security ACL in the core. d. Avoid summarization at the distribution layer.
b. Build using triangles rather than squares.
Which layer performs routing between VLANs, filtering, and load balancing? a. Core layer b. Distribution layer c. Access layer d. Application layer
b. Distribution layer
Which layer provides routing between VLANs and security filtering? a. Access layer b. Distribution layer c. Enterprise edge d. WAN module
b. Distribution layer
Which statement is true regarding hierarchical network design? a. It makes the network harder since there are many submodules to use. b. It provides better performance and network scalability. c. It prepares the network for migration from IPv4 to IPv6. d. It secures the network with access filters in all layers.
b. It provides better performance and network scalability.
Which is true in regard to using UDLD? (Choose three.) a. It is used instead of Loop Guard. b. It should be used in aggressive mode. c. It should be enabled in global configuration mode. d. It prevents blackholing and loops. e. It should be used only on UTP links. f. It cannot protect against miswiring.
b. It should be used in aggressive mode. c. It should be enabled in global configuration mode. d. It prevents blackholing and loops.
Which topology is best used for connectivity in the building distribution layer? a. Full mesh b. Partial mesh c. Hub and spoke d. Dual ring e. EtherChannel
b. Partial mesh
A network has two distribution switches, A and B, connected via a Layer 2 trunk. Distribution A switch is the HSRP active gateway and Spanning Tree Protocol root. Layer 2 links are used to connect access layer switches to both distribution switches. Which version of spanning tree is recommended? a. PVST+ b. Rapid PVST+ c. MST d. VSS
b. Rapid PVST+
Which of the following is a distribution layer best practice? a. Reduce switch peering and routing. b. Use HSRP and summarize routes. c. Disable trunking and use RPVST+. d. Offload SSL sessions and use load balancers.
b. Use HSRP and summarize routes
Which Cisco solution allows a pair of switches to act as a single logical switch? a. HSRP b. VSS c. Spanning Tree Protocol d. GLB
b. VSS
Which layer performs port security and DHCP snooping? a. Core layer b. Distribution layer c. Access layer d. Application layer
c. Access layer
Which layer performs rate limiting, network access control, and broadcast suppression? a. Core layer b. Distribution layer c. Access layer d. Data link layer
c. Access layer
What is the minimum cable requirement for Cisco UPOE+? a. CAT 5 b. CAT 5e c. CAT 6a d. CAT 7
c. CAT 6a
What are the three layers of the hierarchical model? (Choose three.) a. WAN layer b. LAN layer c. Core layer d. Aggregation layer e. Access layer f. Distribution layer g. Edge layer
c. Core layer e. Access layer f. Distribution layer
Which of the following is an access layer best practice? a. Reduce switch peering and routing. b. Use HSRP and summarize routes. c. Disable trunking and use RPVST+. d. Offload SSL sessions and use load balancers.
c. Disable trunking and use RPVST+.
You need to connect a building access switch to the distribution switch. The cable distance is 135 meters. What type of cable do you recommend? a. UTP b. Coaxial cable c. Multimode fiber d. Single-mode fiber
c. Multimode fiber
What is a major requirement if you use a Layer 3 access layer design? a. The distribution switches are configured as a VSS pair. b. The core switches need to support EIGRP. c. The access layer switch needs to be able to route. d. HSRP is configured on the distribution switches.
c. The access layer switch needs to be able to route.
What is true regarding Spanning Tree Protocol design? a. Best practice is for the network to determine the root bridge. b. All ports should be configured with PortFast to enable root bridge selection. c. The root bridge and HSRP primary router should be on the same distribution switch d. It is best practice to disable the toolkit when setting the root bridge
c. The root bridge and HSRP primary router should be on the same distribution switch
Which is the recommended design geometry for routed networks? a. Linear point-to-point networks b. Rectangular networks c. Triangular networks d. Circular networks
c. Triangular networks
You need to power a PD that requires 50 watts. Which solution is preferred? a. PoE b. PoE+ c. UPOE d. UPOE+
c. UPOE
You want to enable physical device virtualization. Which feature provides that? a. VLAN b. VFR c. VSS d. VPN
c. VSS
An administrator requests a way to do remote maintenance on desktops. What solution would allow the administrator to power up end devices to do maintenance? a. PoE b. ON switch c. WoL d. Cisco UPOE
c. WoL
Which layer handles Active Directory and messaging? a. Core layer b. Distribution layer c. Access layer d. Application layer
d. Application layer
Which of the following describe the access layer? (Choose two.) a. High-speed data transport b. Applies network policies c. Performs network aggregation d. Concentrates user access e. Provides PoE f. Avoids data manipulation
d. Concentrates user access e. Provides PoE
Which topology allows for maximum growth? a. Triangles b. Collapsed core-distribution c. Full mesh d. Core-distribution-access
d. Core-distribution-access
Match each campus design model with its description. a. Routed access layer b. Traditional Layer 2 access layer c. Layer 2 access with VSS d. Hybrid access layer i. Legacy design ii. Access layer using Layer 3 capabilities iii. Layer 2 design improvement iv. Not recommended
i. Legacy design b. Traditional Layer 2 access layer ii. Access layer using Layer 3 capabilities a. Routed access layer iii. Layer 2 design improvement c. Layer 2 access with VSS iv. Not recommended d. Hybrid access layer