Create an account
Which consideration is the most important for the network designer when considering IP routing?
You want to gather as much detail as possible during a network audit, to data time stamping across a large number of interfaces, customized include according to interface, with a minimal impact on the network devices themselves. Which tool would you use to meet these requirements?
Cisco Discovery Protocol
DataQuirk is a web-based medical transcription company for exotic-animal veterinarians. The company recently added a third ISP for international business. They are organizing the enterprise network into a fully operational Enterprise Edge. Which two modules will the three ISPs be directly related?
E-Commerce; Internet Connectivity
Which tow of these practices are considered to be best practices when designing the access layer for the enterprise campus?
Always use a Spanning Tree Protocol, preferred is Rapid PVST+; Use automatic VLAN pruning to prune unused VLANs from trunked interface to avoid broadcast propagation
With deterministic wireless LAN Controller redundancy design, the different options available to the designer have their own strengths. Which one of these statements is an example of such a strength?
N+N redundancy configuration allows logically grouping access points on controllers to minimize intercontroller roaming events.
Which of these statements is true concerning the data center access layer design?
With Layer 2 access, the default gateway for the servers can be configured at the access or aggregation layer
Which one of these statements should the designer keep in mind when considering the advanced routing features?
Redistributions, summarization and filtering are most often applied between the campus core and enterprise edge.
Which two statements about designing the data center are correct?
Layer 2 connectivity is primarily implemented in the access layer; Layer 2 clustering implementation requires servers to be Layer 2 adjacent
Which IPv6 feature enables routing to distribute connection requests to the nearest content server?
Which one of these statements is true about addressing redundancy within the WAN environment?
The failure of a single SONET/SDH link or network element does not lead to failure of the entire network.
Which one of these statements is true concerning the enterprise data center?
The data center designs will differ substantially depending on whether the location is on campus or remote.
Which Cisco security management solution provides the means to identify, isolate and counter security threats to the network?
Cisco Security Monitoring, Analysis, and Response System
A global corporation has an internal network with the following characteristics:
- 2,000,000+ hosts
- 10,000 + routers
- Internal connectivity
- High traffic volumes with business partner and customers
A: Both hosts and routers would run dual stack.
Which of these is the best routing deployment for a single dedicated link to an ISP for internal access?
In terms of remote office design, which one of these statement is a characteristics only of a small remote office (up to 50 users), and not of medium or remote offices?
Link redundancy to access layer switches is not possible with an integrated design.
Which two statements about the data center aggregation layer are correct?
Layer 4 through layer 7 services are provided in that layer.
That layer is the critical point for control and application services
According to Cisco, which four improvements are the main benefits of the PPDIOO lifecycle approach to network design?
Improved business availability
Increased network availability
Faster access to applications and services
Lower total cost of network ownership
Which respect to IPv6 addressing, from a design perspective, which of these statements is it important to keep in mind?
An IPv6 router will not forward packets from one link to other links if the packet has either a link-local source or a link-call destination address.
When designing the infrastructure protection portion of the enterprise edge, which of these solutions would be the most appropriate solution to consider?
Cisco Security MARS
What is primary consideration when choosing a routed network design over a traditional campus network design?
The need to control the broadcast domains within the campus core
Which two statements best describe an OSPF deployment?
ABR requires manual configuration for classful network summarization; External routes are propagated into the autonomous system from regular areas or NSSA via ASBR.
A large enterprise requires sensitive information be transmitted over a public infrastructure. It requires confidentiality integrity, and authenticity. Which security solution best meets these requirements?
Drag the WAN Technology to the appropriate category on the right.
Frame Re-lay --> Leased; TDM --> Leased; SONET --> Shared; MPLS --> Shared
There are a number of advantages to using virtualization within the data center module. Which of the following two are samples of these advantages?
Virtualization compartmentalizes a single device into a few high-performance devices, providing a more efficient utilization of hardware and increasing the price/performance ratio.
Virtualization separates user via different physical networks into groups with visibility into only their logical network.
When selecting which hardware switch to use through put an enterprise campus switched network, which consideration is not relevant?
The number of shared media segments
Which one of these statements describes why, from a design perspective, a managed VPN approach for enterprise teleworkers is most effective?
This architectures provides centralized management where the enterprise can apply security policies and push configurations.
Which one of these statements is true when considering the design of voice video service for the campus network?
Access layer switches should support 802.10 trunking and 802.1p for Layer 2 ports with IP phones connected.
Drag the WAN characteristic on the left to the branch office model where it would most likely be used on the right.
Redundant Devices --> Large/Medium Branch Design; MPLS Deployment --> Large Branch Design; Redundant Links --> Small Branch Design; Redundant Links and Devices --> Large Design; Private WAN Deployment --> Medium Branch Design; Internet Deployment Model --> Small Branch Design
Drag the security provision on the left to the appropriate Network module on the right.
Protect the endpoints using Network based intrusion prevention --> Access Layer; Filter and Rate-limit control plane traffic --> Distribution; Protects against inadvertent loops --> Access; Does not perform security functions to mitigate transit threats --> Core; Protect the infrastructure using NFP best practices --> Access; Protect network services including DHCP, ARP, and IP spoofing protection --> Distribution
Drag and Drop
Device Virtualization --> ASA Firewall
Device Virtualization --> IPS
Device Virtualization --> VRF
Network Virtualization --> vPC
Network Virtualization --> VLAN
Network Virtualization --> VDC
Which statement describes the recommended deployments of IPv4 addressing in the Cisco Network Architecture for the Enterprise?
Private addressing throughout with public addressing m the Internet Connectivity, E-Commerce, and Remote Access and VPN modules.
When considering the three VoIP design model single site, centralized multisite, and distributed multisite which question below would help to eliminate one of these questions?
Are there users whose only enterprise access is via a QoS enabled WAN?
Which aspect would most likely be found in the draft design document?
The level of redundancy or high availability that currently exists or is required in the network
Your company's Cisco Routers are operating with EIGRP. You need to join the network with an acquisition's heterogeneous routers at 3 sites, operating with EIGRP and OSPF. Which describes the best practice for routing protocol deployment?
Apply two way redistribution exclusively at each location
When considering the enterprise campus design, which network application category most influences the network design?
When describing wireless portion of an enterprise campus network, which one of these statements should serve as a strict guideline?
Wireless controllers should be distributed throughout the budding distribution layers
When designing using the Cisco Enterprise Architecture, in which Enterprise Campus layer does the remote Access and VPN module establish its connection?
Which of these statements is an example of how trust and identity management solutions should be deployed in the enterprise campus network?
Mixed ACL rules, using combinations of specific sources and destinations, should be applied as close to the source as possible
Which one of these statements best describes the challenge the designer when dealing with IP routing?
Effective scalability with OSPF requires the designer to pay strict attention to the hierarchical network structure, localizing topology changes.
When designing the identity and access control portions for the enterprise campus network, which of these solutions would be the most appropriate solution to consider?
Which three terms describe the primary functions of the distribution layer of the campus network design hierarchy?
Provides QoS services; Enforces security policies; Connects access devices to the core backbone
Drag and Drop
Support layer 2 VLANs spanning multiple access layer switches across the distribution switches --> Layer 2 between distribution and access layers, with a layer 3 link between the distribution switches; Convergence (FHRP) is not an issue --> Layer 2 between distribution and access layers, with a layer 3 link between the distribution switches; FHRP for convergence, no VLANs span between access layer switches across the distribution switches --> VSS
A Cisco self-defending network has been installed, but DoS attacks are still being directed at e-commerce hosts. The connection rate at the Internet firewall was limited, but the problem persists. What more can be done?
Install all relevant operating system patches
Which two items are most relevant in documenting RST's business requirements?
Improved customer support requirements; Projected growth estimates
Which two of these best describe the implementation of a WAN backup design over the Internet?
A Best-effort method; Designed as an alternative to a failed WAN connection
Which two design criteria require VLANs in a proposed solution?
Security between departments; The segmenting of broadcast domains
Which two methods are used to enhance VPN performance on Cisco's ISRs?
High-performance VPN encryption AIM; Built-in hardware-based encryption acceleration
Which three factors best justify WAN link redundancy between geographically dispersed sites?
Important Traffic Flows; Uncertain reliability; Lack of speed
Which three pieces of information should be documented for each step of each phase in a design implementation plan?
Estimated implementation time; Design document references; Step description
The topology map in the draft design document should cover which two layers of the OSI model?
In a Cisco Cat OS switch, what is the recommended practice when configuring switch-to-switch intercommunications to carry multiple VLANs for Dynamic Truck Protocol?
Desirable to desirable negotiate
What are the two most likely driving forces motivating businesses to integrate voice and data into converged networks?
Voice networks cannot carry data unless the PRI circuits aggregate the BRI circuits; Data, Voice and video cannot converge on the current PSTN structures.
A light weight access point is added to a work network. Which sequence will it use to associate itself with a wireless LAN controller?
Primary, secondary, tertiary, master, greatest AP capacity
Which three mechanisms are required to deploy QoS on and IP WAN?
Call Admission Control; Traffic Shaping; Link Efficiency techniques
Which two statements best describe the implementation of Overlay VPN connectivity for remote access in the Enterprise Edge WAN module?
Bandwidth is provisioned on a site to site basis; Optimum routing between customer sites requires a full mesh of virtual circuits
Drag and Drop -Click and drag the QoS feature type on the left to the category of QoS mechanism on the right
Classification and Marking --> ACLs; Congestion avoidance --> WRED; Traffic conditioners --> CAR; Congestion Management --> LLQ; Link efficiency --> LFI
A manufacturing company has decided to add a website to enhance sales. The web servers in the E-commerce module must be accessible without compromising network security. Which two design recommendations can be made to meet these requirements?
Use intrusion detection on the E-commerce server farm.; Place E-Commerce servers and application servers on isolated LANs. (DMZ)
Which Sate in the PPDIOO process would you analyze a customer's network in order to discover opportunities for network improvement?
A large organization has received its IPv6 address range from its ISP and intends to use on IPv6 addresses internally. Employees will access the Internet using port address translation. What is a requirement for their DNS servers?
Their DNS servers need to support both IPv4 and IPv6 addresses
Which two statements represent advantages that the top-down network design process has over the bottom-up network design process?
Is able to provide the big picture; Provides a design for current and future development
Which two statements about IPv6 addresses are true?
Two colons (::) are used to represent successive hexadecimal fields of zeros; A single interface will have multiple IPv6 addresses of different types.
Which three security measures can be used to mitigate DoS attacks that are directed at exposed hosts with the E-Commerce module?
Use NIDs and HIPs to detect signs of attack and to identify potentially successful breaches; Partition the exposed hosts into a separate LAN or VLAN; Use firewalls to block all unnecessary connections to the exposed hosts
Which technology can ensure data confidentially, data integrity and authentication across a public IP network?
A customer wishes to implement VoIP using centralized call-processing. In addition, the customer whishes to increase quality and good bandwidth utilization. Which codec would you suggest?
Drag and Drop - Drag the Cisco Self-defending Network term on the left to the SDN description on the right. Not all terms will be used.
Trust Identity Management --> provides secure network access, isolates and control infected devices attempting access; Secure Connectivity --> uses encryption and authentication to provide secure transport across untrusted networks; Threat Defense --> uses security integrated into routers, switches, and appliances to defend against attacks;
Cisco Self-Defending Network --> integrates security into the network to identify, prevent and adapt to threats.
Which three sources does a network designer use to collect information for characterizing an existing network?
Network Audit; Traffic Analysis; Staff Input
Which of the following Cisco router services performs network traffic analysis to assist in documenting a customer's existing network?
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Click the icon above to update your browser permissions and try again
Reload the page to try again!Reload
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together