Terms in this set (83)
According to Cisco, which four improvements are the main benefits of the PPDIOO lifecycle
approach to network design
- Improved business agility.
- Increased network availability.
-Faster access to applications and services.
-Lower total cost of network ownership.
Characterizing an existing network requires gathering as much information about the network as
possible.Which of these choices describes the preferred order for the information-gathering
Existing documentation and organizational input, site and network audits, traffic analysis.
You want to gather as much detail as possible during a network audit with a minimal impact on the
network devices themselves.
Which tool would you use to include data time stamping across a large number of interfaces while
being customized according to each interface?
Which three are considered as technical constraints when identifying network requirements?
-Support for legacy applications.
-Bandwidth support for new applications.
-Support for existing legacy equipment.
In which phase of PPDIOO are the network requirements identified?
Which is part of the Prepare phase of PPDIOO?
Identity customer requirements.
During which phase of the PPDIOO model would you conduct interviews with supporting staff to
develop and propose a viable solution?
Which statement accurately represents the characteristics of the core layer in this design?
Partial mesh should be used as long as it is connected to each device by multiple paths.
What are the three primary functions of the distribution layer of the campus network design
-Provide Q.o.S. services.
-Enforce security policies.
-Connect access devices to the core backbone.
Which of the following is a component within the Cisco Enterprise Campus module?
Which two of the following are benefits of using a modular approach to network design?
Which three solutions are part of the Borderless Network Services?
Which three modular components are part of the Cisco Enterprise Edge Architecture?
-Internet connectivity module.
-Remote access and VPN module.
Where in the Cisco Enterprise Architecture model does network management reside?
Enterprise campus module
Which two statements about designing the Data Center Access layer are correct?
-Layer 2 connectivity is primarily implemented in the access layer.
-Layer 2 clustering implementation requires servers to be Layer 2 adjacent.
Which two statements correctly identify the layers of the Enterprise Campus module?
-A is the Data center Module and D is the Building Access layer.
-B is the Campus Core layer and C is the Building Distribution layer.
What is the primary consideration when choosing a routed network design over a traditional
campus network design?
Layer 3 services support at the network edge.
The evolution of the Data Center is best represented by the 3.0 architecture component of
virtualization. Which of the following is not an example of the virtualization taking place in the Data
Virtualized media access utilizing Fibre Channel over Ethernet.
When selecting which hardware switches to use throughout an enterprise campus switched
network, which consideration is not relevant?
The number of shared media segments.
Which two of these practices are considered to be best practices when designing the access layer
for the enterprise campus?(
Always use a Spanning Tree Protocol; preferred is Rapid PVST+.
Use VTP transparent mode to decrease the potential for operational error.
The enterprise campus core layer has requirements that are unique from the distribution and
access layers.Which of the following is true about the core layer?
The campus core layer is optional.
When there is a need for immunity to EMI for connecting locations that are greater than 100
meters apart, which two solutions can be utilized?
Which of these statements is true concerning the data center access layer design?
with Layer 2 access, the default gateway for the servers can be configured at the access or aggregation layer.
Which layer of the OSI model does Cisco recommend to place the enterprise network core layer,
when designing a network based on its switched hierarchical design?
Which one of these statements is true concerning the data center distribution (aggregation) layer
A mix of both Layer 2 and Layer 3 access is sometimes the most optimal.
Which factor would be most influential in choosing multimode fiber optic connections over UTP?
Which three are associated with the distribution layer within the campus design?
-Access layer aggregation.
Which statement is true concerning enterprise edge distribution switches?
Enterprise edge distribution switches are similar to the building distribution layer.
OSPF will be used as the IGP within a campus network. Which two things should you consider
-All areas need to connect back to area 0.
- ECMP may cause undesired results depending on the environment.
High availability is a key design consideration in the enterprise campus network. In a fully
redundant topology, which is likely to provide faster IGP convergence during a failure?
Single supervisor with tuned IGP timers.
Which Cisco technology using Nexus NX-OS infrastructure allows the network architect to create
up to four separate control and data plane instances of the Nexus chassis?
Virtual device context.
An enterprise campus module is typically made up of four submodules, as described by the Cisco
Enterprise Architecture Model. Which two submodulesare part of this module?
-Server farm/data center
Which three options are valid Cisco STP tools used to ensure best-practice access layer design
for the enterprise campus?
Which is a factor in enterprise campus design decisions?
Network application characteristics
Spanning Layer 2 across geographically separate data centers is a key consideration for current
data center designs. Which is the name of the NX-OS technology that facilitates MAC in IP
transport for Layer 2 VLANs across any IP network?
Overlay Transport Virtualization
Which network virtualization technology involves creating virtual routers with its own individual
routing tables on a physical router?
VRF (virtual routing forwarding)
In the enterprise data center, which are the three main components?
-Data Center Management
Which one of these statements describes why, from a design perspective, a managed VPN
approach for enterprise teleworkers is most effective?
This architecture provides centralized management where the enterprise can apply security policies and push configurations.
When designing using the Cisco Enterprise Architecture, in which Enterprise Campus layer does
the Remote Access and VPN module establish its connection?
What are three key areas that need to be considered when designing a remote data center?
If a teleworker is required to access the branch office via a secure IPSEC VPN connection, which
technology is recommended to provide the underlying transport?
Which three describe challenges that are faced when deploying an environment for teleworkers?
-Supporting a mix of technically knowledgeable and nontechnical users.
-Simplifying router installation and configuration.
-avoiding situations where employees might use nonstandard hardware or configurations.
Which model of ISR is utilized for the teleworker design profile?
Cisco 800 series
You need to connect to a remote branch office via an Internet connection. The remote office does
not use Cisco equipment. This connection must be secure and must support OSPF.
Which of the following can be used to transport data to the branch office?
GRE over IPsec
When designing a WAN backup for voice and video applications, what three types of connections
should be used?
Which two are characteristics of a Lightweight Access Point?
-Managed via a central wireless LAN controlled.
Which two link state routing protocols support IPv6 routing?
Which two statements best describe an OSPF deployment?
-ABR requires manual configuration for classful network summarization.
-External routes are propagated into the autonomous system from regular areas of NSSA via ASBR.
Which one of these statements should the designer keep in mind when considering the advanced
Redistribution, summarization, and filtering are most often applied between the campus core and enterprise edge.
Which two routing protocols operate over NBMA point-to-multipoint networks without the use of
When designing an EIGRP network, which two things should you take into consideration?
-ASN and K values must match.
- The neighbor command can be used to enable unicast communication.
Which three modules would typically utilize public IPv4 addressing?
Which is the North American RIR for IPv4 addresses?
With respect to IPv6 addressing, from a design perspective, which of these statements is it
important to keep in mind?
-An IPv6 router will not forward packets from one link to other links if the packets has either a link-local source or a link-local destination address.
What is the most compact representation of the following IPv6 address?
Which consideration is the most important for the network designer when considering IP routing?
Which subnet address and mask would you use for all Class D multicast addresses to be matched
within an access list?
Which three items pertain to EIGRP?
-Can use multiple unequal paths.
-ASN and K values must match to form neighbors.
-External routes have AD of 170.
Which type of area should you use in an enterprise OSPF deployment if you want to prevent
propagation of type 5 LSAs but still allow the redistribution of external routes?
Your supervisor has asked you to deploy a routing protocol within the lab environment that will
allow for unequal cost multipath routing. Which should you choose?
A hierarchical design of the EIGRP domain facilitates which two of the following?
Which two methods are used to reduce the mesh links required between iBGP peers in the same
Which is usually used to connect to an upstream ISP?
A company wants to use private IP addresses for all its internal hosts. Which technology can the
company use to provide access to the Internet using a single public IP address?
You are designing a network that requires a routing protocol that will use minimal network
bandwidth. Which would satisfy this requirement?
At which layer of the network is route summarization recommended?
When designing the identity and access control portions for the enterprise campus network, which
of these solutions would be the most appropriate solution to consider?
A company is implementing an Identity Management solution with these characteristics:
Which Cisco Trust and Identity Management solution would you recommend?
A campus network needs end-to-end QoS tools to manage traffic and ensure voice quality. Which
three types of QoS tools are needed?
-interface queuing and scheduling.
When considering the three VoIP design models - single site, centralized multisite, and distributed
multisite which question below would help to eliminate one of the options?
Are there users whose only enterprise access is via a QoS-enabled WAN?
Which three statements are true regarding the virtual interface on a Cisco Wireless LAN
-supports mobility management.
-serves as a DHCP relay.
-supports embedded Layer 3 security.
When designing the infrastructure protection portion for the enterprise edge, which of these
solutions would be the most appropriate solution to consider?
Which is the purpose of the Cisco NAC Profiler?
automates discovery and inventory of all LAN attached devices
Which protocol is used for voice bearer traffic?
Cisco Identity-Based Networking Services relies heavily on the 802.1X protocol. Which other
authentication solution is used hand-in-hand with 802.1X to authenticate users for network access?
Which two devices would you place in your DMZ to ensure enterprise edge security?
Which three are security services offered through Cisco Router Security?
-Trust and Identity.
-Integrated Threat Control.
Which protocol is used to reserve bandwidth for the transport of a particular application data flow
across the network?
Which voice codec should you use in order to provide toll quality calls?
Which two features are supported by single wireless controller deployments?
-automatic detection and configuration of LWAPPs.
-LWAPP support across multiple floors and buildings.
Which three are features of LWAPP?
-encryption of control channel.
-configuration data only on the WLC.
Which four services does the architecture for Media Services contain?
-session control services
Which Cisco device has the sole function at looking at threat detection and mitigation at the
YOU MIGHT ALSO LIKE...
Test Preparation TOEIC, SAT, TOEFL
CCDP Study Guide
CCNA3 ch 1
CCDA - Test Exam
THIS SET IS OFTEN IN FOLDERS WITH...
CCDA 200-310 Practice Questions
CCDA - Design
CCDA - Chapter 1
CCDA - Chapter 2