CCDA

Ace your homework & exams now with Quizwiz!

QUESTION 76 Which routing protocol classification should you use when full topology information is needed? A. link-state B. distance vector C. stateful D. path vector

Answer: A

QUESTION 77 When you are designing a large IPv6 multivendor network, which IGP does Cisco recommend that you use? A. OSPFv3 B. EIGRP for IPv6 C. BGP D. RIPng

Answer: A

QUESTION 95 A network engineer is using the Cisco enterprise architecture model. In what module do network management servers reside? A. Enterprise Campus B. Enterprise Edge C. Remote Modules D. SP Edge WAN/internet

Answer: A

QUESTION 11 You are designing a network that requires a routing protocol that will use minimal network bandwidth. Which would satisfy this requirement? A. RIPv2 B. RIPng C. OSPF D. ARP E. EGP

Answer: C

QUESTION 81 Refer to the list of requirements. Which IP telephony design model should you implement to fulfill these requirements? - Must be a single, large location with many remote sites - Must have multisite WAN connectivity - Requires SRST for call processing redundancy A. centralized B. distributed C. clustered D. decentralized

Answer: A

QUESTION 88 An engineer receives a resource utilization alert on a router. What command should be used to investigate the issue? A. show processes cpu B. show memory C. show running-config D. show version

Answer: A

QUESTION 92 When evaluating network designs, what indicator demonstrates that the modular approach was followed? A. ability to scale B. follows best practices C. redundant connectivity D. easy to deploy

Answer: A

QUESTION 100 During the design of a new campus network, the customer requests the ability to route overlapping IP addresses. What technology can be leveraged to meet this request? A. VRF B. VLANs C. VSS D. VPC

Answer: A

QUESTION 27 Which statement describes the methodology that supports the Cisco Enterprise Architecture models? A. It divides the network into functional network modules. B. It divides the network into role-based network modules. C. It divides the network into regional network modules. D. It divides the network into operational network modules.

Answer: A

QUESTION 31 WAN backup over the Internet is often used to provide primary connection redundancy. Which is the most important consideration when passing corporate traffic over the public Internet? A. security B. static versus dynamic routing C. bandwidth D. QoS E. latency

Answer: A

QUESTION 42 What is the primary consideration when choosing a routed network design over a traditional campus network design? A. Layer 3 service support at the network edge B. the routing protocol choice: open (OSPF) or proprietary (EIGRP) C. the routing abilities of the host devices D. the need to control the broadcast domains within the campus core

Answer: A

QUESTION 51 A dynamically routed private line and a statically routed IPsec tunnel connect two offices. What routing configuration prefers the IPsec tunnel only in the event of a private line failure? A. floating static entry B. EIGRP variance C. bandwidth metric D. OSPF maximum paths

Answer: A

QUESTION 56 Which Cisco Wireless LAN Controller interface is used for out-of-band management? A. service port B. management port C. controller port D. virtual port

Answer: A

QUESTION 57 In which operation mode does the AP act as a dedicated sensor for location-based and intrusion detection services? A. monitor mode B. promiscuous mode C. discovery mode D. sniffer mode

Answer: A

QUESTION 58 Which HSRP parameters must match, to ensure proper functionality? A. group parameters B. priority parameters C. preempt parameters D. tracking parameters

Answer: A

QUESTION 6 Which technology allows remote networks to be connected via site-to-site tunnels? A. IPsec VPN B. AnyConnect VPN C. SSL VPN D. EasyConnect VPN

Answer: A

QUESTION 64 Which IGP provides the fastest convergence by default? A. EIGRP B. OSPF C. IS-IS D. RSTP E. BGP

Answer: A

QUESTION 67 What is a characteristic of campus core designs? A. fast transport B. security C. summarization D. redistribution

Answer: A

QUESTION 68 Which servers that reside in the data center require direct links to all other enterprise modules? A. network management servers B. DHCP servers C. Active Directory servers D. IP SLA servers E. web servers

Answer: A

QUESTION 74 Which statement describes a unique advantage of EIGRP? A. It enables unequal-cost load balancing. B. It enables equal-cost load balancing. C. It enables source-based load balancing. D. It enables port-based load balancing.

Answer: A

QUESTION 22 A hierarchical design of the EIGRP domain facilitates which two of the following? (Choose two.) A. route summarization B. faster convergence C. unequal cost load balancing D. redistribution E. virtual links

Answer: AB

QUESTION 25 Which two features are supported by single wireless controller deployments? (Choose two.) A. automatic detection and configuration of LWAPPs B. LWAPP support across multiple floors and buildings C. automatic detection and configuration of RF parameters D. Layer 2 and Layer 3 roaming E. controller redundancy F. mobility groups

Answer: AB

QUESTION 66 Which two enterprise campus layers are combined in a medium-sized LAN? (Choose two.) A. core B. distribution C. access D. backbone E. aggregation

Answer: AB

QUESTION 5 Which three Cisco technologies can you use to detect and mitigate threats? (Choose three.) A. NetFlow B. FWSM C. ISE D. VRRP E. sFLOW

Answer: ABC

QUESTION 60 Which three layers comprise the traditional hierarchical model? (Choose three.) A. core layer B. distribution layer C. access layer D. aggregation layer E. network layer F. Internet layer

Answer: ABC

QUESTION 72 Which three service categories are supported by an ISR? (Choose three.) A. voice B. security C. data D. Internet E. storage F. satellite

Answer: ABC

QUESTION 82 What are the three modes of unicast reverse path forwarding? (Choose three.) A. strict B. loose C. VRF D. global E. PIM F. local

Answer: ABC

QUESTION 87 What three customer supported details identifies network requirements based on the PPDIOO design model? (Choose three.) A. goals B. budget C. user needs D. locations E. policies F. tasks

Answer: ABC

QUESTION 9 Which three options are characteristics of data center evolution? (Choose three.) A. consolidation B. virtualization C. automation D. standardization E. optimization F. modulation

Answer: ABC

QUESTION 1 Which three pieces of information should be documented for each step in a design implementation plan? (Choose three.) A. step description B. design document references C. easy guidelines in case of failure D. estimated implementation time E. simple implementation guidelines F. estimated rollback time in case of failure

Answer: ABD

QUESTION 26 Which three describe challenges that are faced when deploying an environment for teleworkers? (Choose three.) A. supporting a mix of technically knowledgeable and nontechnical users B. simplifying router installation and configuration C. verifying available power at employee's house for necessary equipment D. avoiding situations where employees might use nonstandard hardware or configurations E. reducing daily commuting time to main office location F. providing access to FTP servers located in main office location G. implementing leased line connectivity between main office and employee's home location

Answer: ABD

QUESTION 35 What are three valid methods of gathering information about an existing data network? (Choose three.) A. Use organizational input. B. Perform a traffic analysis. C. Analyze the user-mapping of a running application. D. Perform a packet-level audit to verify carrier service guarantees. E. Perform a network audit to gather more detail about the network. F. Use reports that analyze the metrics of the customer's existing network

Answer: ABE

QUESTION 70 Which three options represents the components of the Teleworker Solution? (Choose three.) A. Cisco Unified IP Phone B. Cisco 880 Series Router C. Aironet Office Extend Access Point D. Catalyst 3560 Series SwitchE. Cisco 2900 Series Router F. MPLS Layer 3 VPN G. Leased lines

Answer: ABE

QUESTION 61 Which three are considered as technical constraints when identifying network requirements? (Choose three.) A. support for legacy applications B. bandwidth support for new applications C. limited budget allocation D. policy limitations E. limited support staff to complete assessment F. support for existing legacy equipment G. limited timeframe to implement

Answer: ABF

QUESTION 65 Which three are valid Layer 2 access designs? (Choose three.) A. Looped Triangle B. Looped Square C. Looped U D. Loop-Free Triangle E. Loop-Free Square F. Loop-Free U

Answer: ABF

QUESTION 12 Which two devices would you place in your DMZ to ensure enterprise edge security? (Choose two.) A. IPS B. NAC C. ASA D. ACS E. WCS

Answer: AC

QUESTION 80 Which two design approaches provide management of enterprise network devices? (Choose two.) A. in-band B. out-of-line C. out-of-band D. in-line

Answer: AC

QUESTION 41 Which three sources does a network designer use to collect information for characterizing an existing network? (Choose three.) A. staff input B. visual inventory C. network audit D. traffic analysis E. server statistics

Answer: ACD

QUESTION 59 What three primary sources of information are needed to perform a network audit? (Choose three.) A. existing documentation B. new documentation C. existing network management software D. new network management tools E. management personnel F. technical personnel

Answer: ACD

QUESTION 73 Which three protocols support VLSM? (Choose three.) A. RIPv2 B. RIPv1 C. EIGRP D. OSPF E. IGRP

Answer: ACD

QUESTION 47 When there is a need for immunity to EMI for connecting locations that are greater than 100 meters apart, which two solutions can be utilized? (Choose two.) A. multimode fiber B. Fibre Channel C. HVDC transmission lines D. single-mode fiber E. serial RS-232 F. Gigabit Ethernet 1000BASE-CX

Answer: AD

QUESTION 96 What three design requirements are key to designing a campus core? (Choose three.) A. low latency B. access control C. traffic filtering D. high speed E. redundant links F. QoS tagging

Answer: ADE

QUESTION 28 OSPF will be used as the IGP within a campus network. Which two things should you consider before deployment? (Choose two.) A. All areas need to connect back to area 0. B. The OSPF process number on each router should match. C. NSSA areas should be used when an area cannot connect directly to area 0. D. Stub areas should be connected together using virtual links. E. ECMP may cause undesired results depending on the environment.

Answer: AE

QUESTION 62 Which two common cable management strategies are used in high-density server deployments in the data center? (Choose two.) A. top-of-rack B. middle-of-rack C. bottom-of-rack D. beginning-of-row E. middle-of-row F. end-of-row

Answer: AF

QUESTION 10 Which option is a benefit of the modular approach to network design? A. higher availability B. repeatable scalability C. increased security D. improved resiliency

Answer: B

QUESTION 15 To provide Layer 2 connectivity between the primary and remote data centers, given that the two data centers are using Layer 3 routed DCIs, which NX-OS technology can be used to facilitate this requirement? A. VRF B. OTV C. MPLS D. SPT E. vPC

Answer: B

QUESTION 2 A company is implementing an Identity Management solution with these characteristics: - existing AAA Server - Cisco Catalyst switches - minimal added investments Which Cisco Trust and Identity Management solution would you recommend? A. NAC Appliance B. Cisco IBNS C. CSM D. Cisco Security MARS

Answer: B

QUESTION 29 Which is the North American RIR for IPv4 addresses? A. RIPE B. ARIN C. IANA D. IEEE E. APNIC

Answer: B

QUESTION 33 Which protocol is used for voice bearer traffic? A. MGCP B. RTP C. SCCP D. CDP E. ICMP

Answer: B

QUESTION 4 Refer to the exhibit. On which router should you configure redistribution? A. Router 1 B. Router 2 C. Router 3 D. Router 4 E. Router 5

Answer: B

QUESTION 43 Which statement is true concerning the data center access layer design? A. The access layer in the data center is typically built at Layer 3, which allows for better sharing of services across multiple servers. B. With Layer 2 access, the default gateway for the servers can be configured at the access or aggregation layer. C. A dual-homing NIC requires a VLAN or trunk between the two access switches to support the dual IP addresses on the two server links to two separate switches. D. The access layer is normally not required, as dual homing is standard from the servers to the aggregation layer

Answer: B

QUESTION 46 With deterministic Wireless LAN Controller redundancy design, the different options available to the designer have their own strengths. Which statement is an example of such a strength? A. Dynamic load balancing, or salt-and-pepper access point design, avoids the potential impact of oversubscription on aggregate network performance. B. N+N redundancy configuration allows logically grouping access points on controllers to minimize intercontroller roaming events. C. N+N+1 redundancy configuration has the least impact to system management because all of the controllers are colocated in an NOC or data center. D. N+1 redundancy configuration

Answer: B

QUESTION 49 Application servers require load balancing and security services. Where in the data center network should these services be provisioned? A. core B. aggregation C. Layer 3 access D. distribution

Answer: B

QUESTION 52 When designing a new enterprise campus network, what topology should be used for maximum scalability? A. flat B. three-layer C. star D. partial mesh E. full mesh

Answer: B

QUESTION 63 Which protocol is the recommended first-hop redundancy protocol for an existing infrastructure that contains multiple vendors and platforms? A. HSRP B. VRRP C. IGRP D. OSPF

Answer: B

QUESTION 69 Which Gigabit Ethernet media type provides the longest reach without a repeater? A. 1000Base-CX B. 1000Base-LX C. 1000Base-SX D. 1000Base-T

Answer: B

QUESTION 75 ACME corporation is implementing dynamic routing on the LAN at its corporate headquarters. The interior gateway protocol that they select must support these requirements: multivendor environment, efficient subnetting, high scalability, and fast convergence. Which interior gateway protocol should they implement? A. EIGRP B. OSPF C. RIPng D. BGP

Answer: B

QUESTION 83 Which network access control technology is recommended to use with Layer 2 access layer switches? A. 802.1q B. 802.1x C. 802.3af D. 802.3q E. 802.11n

Answer: B

QUESTION 85 Which IP telephony component supports VoIP, PoE, and QoS? A. client endpoints B. voice-enabled infrastructure C. Cisco Unified Communications Manager D. Cisco Unified Contact Center

Answer: B

QUESTION 86 What business trend allows employees to use personal devices to access enterprise data and systems? A. ISE B. BYOD C. SAN D. IOE

Answer: B

QUESTION 91 A network engineer must implement a design where LAN clients are to connect to various access layer devices, while remaining on the same VLAN . What type of design would support this requirement? A. routed B. switched C. tunneled D. virtual

Answer: B

QUESTION 94 A network engineer is following the three tiered Network Hierarchical Model. At which tier is route summarization implemented? A. core B. distribution C. backbone D. access

Answer: B

QUESTION 97 What type of device can be installed to increase a broadcast domain? A. router B. switch C. IDS D. IPS

Answer: B

QUESTION 50 A data center is reaching its power and cooling capacity. What two virtualization technologies can address the problem by directly reducing the number of physical devices? (Choose two.) A. virtual switching systems B. virtual device contexts C. virtual servers D. virtual routing and forwarding E. virtual port channels F. virtual LANs

Answer: BC

QUESTION 23 Which three types of WAN topologies can be deployed in the Service Provider Module? (Choose three.) A. ring B. star C. full mesh D. core/edge E. collapsed core

Answer: BCF

QUESTION 40 Which two design criteria require VLANs in a proposed solution? (Choose two.) A. video streaming on the LAN B. security between departments C. the segmenting of collision domains D. the segmenting of broadcast domains E. the use of multivendor equipment F. a limited corporate budget

Answer: BD

QUESTION 101 A network engineer is attempting to separate routing domains using a virtualization technology. What protocol can be configured to perform this task? A. VLAN B. VSAN C. VRF D. VPC

Answer: C

QUESTION 14 Which mode is used to exclusively look for unauthorized access points? A. monitor mode B. sniffer mode C. rogue detector mode D. local mode

Answer: C

QUESTION 16 What is the acceptable amount of one-way network delay for voice and video applications? A. 300 bytes B. 1 sec C. 150 ms D. 500 ms

Answer: C

QUESTION 17 At which layer of the network is route summarization recommended? A. data link layer B. core layer C. distribution layer D. access layer

Answer: C

QUESTION 21 Which factor would be most influential in choosing multimode fiber optic connections over UTP? A. signal attenuation B. required bandwidth C. required distance D. electromagnetic interference E. cost

Answer: C

QUESTION 3 You want to gather as much detail as possible during a network audit with a minimal impact on the network devices themselves. Which tool would you use to include data time stamping across a large number of interfaces while being customized according to each interface? A. RMON B. SNMPv3 C. NetFlow D. Cisco Discovery Protocol

Answer: C

QUESTION 37 What is the benefit of VLSM? A. reduces configuration complexity by using the same subnet mask length B. reduces the routing table size by using automatic route summarization C. reduces the routing table size by using manual route summarization D. allows the subnet mask and classful routing updates to be advertised E. secures the hosts on a subnet by using RFC 1918 addresses

Answer: C

QUESTION 44 Which statement is true concerning the data center distribution (aggregation) layer design? A. With Layer 3 at the aggregation layer, the physical loops in the topology must still be managed by STP. B. The boundary between Layer 2 and Layer 3 must reside in the multilayer switches, independent of any other devices. C. A mix of both Layer 2 and Layer 3 access is the most optimal. D. In a small data center, the aggregation

Answer: C

QUESTION 48 Which mode is used to exclusively look for unauthorized access points? A. monitor mode B. sniffer mode C. rogue detector mode D. local mode

Answer: C

QUESTION 55 What is the maximum RIPv2 hop count for a reachable route? A. 13 B. 14 C. 15 D. 16

Answer: C

QUESTION 7 Which RFC defines the IPv6 standard? A. RFC 1918 B. RFC 2338 C. RFC 2460 D. RFC 2740

Answer: C

QUESTION 8 Which first-hop redundancy protocol dynamically distributes client traffic between multiple routers? A. HSRP B. VRRP C. GLBP D. IGRP

Answer: C

QUESTION 84 Which technology enables WLCs to peer with each other to enable roaming support? A. WAP profiles B. roaming profiles C. mobility groups D. peer groups

Answer: C

QUESTION 90 An engineer has configured a router to send level 7 messages to a syslog server. What severity level are these messages? A. error B. warning C. debug D. informational E. notice

Answer: C

QUESTION 98 To what Layer 2 technology does VRF closely compare? A. VSS B. VPC C. VLAN D. VTP

Answer: C

QUESTION 99 What network virtualization technology can be leveraged within the data center to reduce the number of physical devices? A. VLANs B. VPLS C. VDC D. VSS

Answer: C

QUESTION 30 An enterprise campus module is typically made up of four submodules, as described by the Cisco Enterprise Architecture Model. Which two submodules are part of this module? (Choose two.) A. DMZ B. enterprise branch C. building distribution D. server farm/data center E. MAN

Answer: CD

QUESTION 13 Which type of area should you use in an enterprise OSPF deployment if you want to prevent propagation of type 5 LSAs but still allow the redistribution of external routes? A. stub B. totally stubby C. backbone D. NSSA E. virtual link

Answer: D

QUESTION 18 Which WAN technology is a cost-effective method to deliver 100Mb of bandwidth to multiple branch offices? A. DSL B. DWDM C. ISDN D. Metro Ethernet

Answer: D

QUESTION 19 Which Cisco device has the sole function at looking at threat detection and mitigation at the Enterprise edge? A. Cisco IOS router B. Cisco ASA C. Cisco Catalyst FWSM D. Cisco IPS

Answer: D

QUESTION 20 If a teleworker is required to access the branch office via a secure IPSEC VPN connection, which technology is recommended to provide the underlying transport? A. ISDN B. Metro Ethernet C. Frame Relay D. ADSL E. ATM

Answer: D

QUESTION 24 Which of the following is a component within the Cisco Enterprise Campus module? A. Teleworker B. E-Commerce C. Internet Connectivity D. Building Distribution E. WAN/MAN Site-to-Site VPN

Answer: D

QUESTION 32 Which type of area should you use in an enterprise OSPF deployment if you want to prevent propagation of type 5 LSAs but still allow the redistribution of external routes? A. stub B. totally stubby C. backbone D. NSSA E. virtual link

Answer: D

QUESTION 45 When considering the three VoIP design models - single site, centralized multisite, and distributed multisite - which question below would help to eliminate one of the options? A. Will the switches be required to provide inline power? B. Will users need to make offsite calls, beyond the enterprise? C. Will users require applications such as voice mail and interactive voice response? D. Are there users whose only enterprise access is via a QoS-enabled WAN?

Answer: D

QUESTION 53 A spanning tree topology can be simplified by deploying what Cisco IOS technology in the distribution block? A. VDC B. vPC C. Rapid PVST+ D. VSS E. Flex Links

Answer: D

QUESTION 54 An organization is deciding what routing protocol to use throughout their network. What must be considered if routing is to be performed at the access layer? A. reduced scalability of the network when introducing a large number of switch blocks into the routing table B. centralized management of access control lists at the distribution layer C. reliability when implementing routing over spanning-tree at the access layer D. performance differences between core, distribution and access layer equipment

Answer: D

QUESTION 71 What is the maximum number of groups that is supported by GLBP? A. 64 B. 256 C. 512 D. 1024

Answer: D

QUESTION 78 Which is the equation used to derive a 64 Kbps bit rate? A. 2 x 8 kHz x 4-bit code words B. 8 kHz x 8-bit code words C. 2 x 4-bit code words x 8 kHz D. 2 x 4 kHz x 8-bit code words

Answer: D

QUESTION 79 When designing the infrastructure protection portion for the enterprise edge, which solution would be the most appropriate solution to consider? A. 802.1X B. ACLs in the core layer C. Cisco Security MARS D. AAA

Answer: D

QUESTION 89 What part of the network does a top-down network design focus on for solution development? A. presentation B. hardware C. session D. application E. data link F. transport

Answer: D

QUESTION 93 A network engineer is following the Cisco enterprise architecture model. To which network layer would a branch office connect to using a private WAN? A. Enterprise Campus B. Enterprise Edge C. SP Edge Premise D. Remote Module

Answer: D

QUESTION 36 Which two routing protocols converge most quickly? (Choose two.) A. RIPv1 B. RIPv2 C. BGP D. OSPF E. EIGRP

Answer: DE

QUESTION 38 Which two of these are scalability benefits of designing a network that utilizes VPNs? (Choose two.) A. extends the network to remote users B. allows networks to be set up and restructured quickly C. reduces dial infrastructure expenditures D. reduces the number of physical connections E. simplifies the underlying structure of a customer WAN

Answer: DE

QUESTION 34 Which Cisco device management feature is most suited to metering network traffic and providing data for billing network usage? A. BGP B. Cisco Discovery Protocol C. QoS D. RMON E. NetFlow

Answer: E


Related study sets

2.3 Given a scenario, configure and deploy common Ethernet switching features.

View Set

Portage Learning Anatomy & Physiology II: Module 7 Exam

View Set

Standard costing and variance analysis - Theory

View Set

Bailey Sociology Final: Quiz Questions

View Set

Personal Money Management (BFIN 1003) - Final Exam

View Set

Intercultural Communication Chapter 9 and 10

View Set