Sie sind auf Seite 1von 40

Information is copied from Forums Nov 2018 through Jan 2019 - extracted and added own

notes.

The second part of the document contains ccda-rider101Q and some of helpful feedback
from shirokuma.

I also recommend reading the OCG [there’s a huge amount of content in it, I know, but
maybe try focusing on the Key Topics which are clearly marked]

PART I from the Posters on the Forum Nov 2018 through Jan 2019

1. What is the advantage of STP?


a. Load balancing
b. High availability
c. Redundant link utilization
d.

Answer = c

2. What are two advantages of a modular design (Choose two)?


a. Increased scalability because modules can be increased with growth
b. Security can be implemented at every module
c. Increased redundancy as you can add modules
d. Hierarchy included in design

Answer = A, C

3. Which option are benefits of the modular approach to network design?


a. higher availability
b. repeatable scalability
c. increased security
d. improved resiliency

Answer = B

4. Which two Cisco products supports virtual contexts? (Choose two.)


a. ASR 1000
b. ASA
c. Cisco Nexus 7000 Series Switches

Answer = BC

5. In VRRP /FHRP/ if you want the master switch to take over and continue its master role
after coming up from failure which option should be used
a. Interface tracking
b. Priority
c. Preemption

6. What 4 benefits are gained by following the cisco PPDIOO life cycle model?
a. faster ROI
B. improved business agility
C. increased network availability
D. faster access to applications and services
E. lower total cost of network ownership
F. better implementation team engagement

BCDE

7. Which two high -level design components are included in Cisco Unified Wireless
Network? (Choose two)
a. Local mode
b. Cisco FlexConnect
c. Deterministic
d. Dynamic

AB

8. Designing of WAN links, with latency which method should be used to efficiently utilize
the link?
a. Policy based routing
b. Cisco performance routing

9. While designing a highly resilient infrastructure, which layer is typically a single point of
failure?
a. Internet
b. Distribution
c. Access
d. WAN

10. What functional components should be placed in a DMZ network that has internet
connection?
a. DDOS
b. ASA
c. Web load balancer
d. Web server
CD

11. When designing a high availability network, which option can be classified as a fault
domain?
a. Every tier in the network design
b. Single power supply devices in a network design
c. Collapsed core in a network design
d. Non-redundant devices in the network design

12. What is the benefit of distribution layer (mentioned 3 Tier Hierarchical & Campus in Q
too I think)?

a. Security against unauthorised users


b.Fault isolation between Core and Access Layers
c.Access Resiliency
d. Extend boundary L2 L3

Answer I chose was B

13. Which two benefits are realized by establishing virtualization in a campus network?
(Choose two)
a. Enables path isolation
b. Enhances network agility
c. Consolidates applications
d. Enables unlimited scalability
e. Reduces network bandwidth

AB

14. Which cisco tool is used for network accounting, monitoring and routing?
a. Cisco Prime (collaboration)
b. Сiscoworks
c. NBAR
d. Netflow

15. When integrating services with Cisco ACI Service Graphs, which tool can be used for
integrated Configuration management?
a. IOS
b. REST API
c. APIC CLI
d. HTML

16. At which layer of the network should you perform traffic filtering and QoS Classification?
a. Session
b. Distribution
c. Application
d. Core

17. An engineer is designing a private WAN infrastructure to support an organization and


must support quality of service and multicast functionality to the remote sites. Which WAN
technology supports this requirement?
a. DMVPN
b. MPLS
c. IPsec VPN
d. SSL VPN

18. Which of the following are industry drivers for network virtualizations? (Choose two)

What are two industry drivers that promote network virtualization? (Choose two)

A. traffic isolation
B. device reduction
C. multi-vendor support
D. application stability
E. reduced complexity

A and E

19. To which category do the following network virtualization components belong?


[GRE, VLAN, Vrf-lite, MPLS, ACL]
a. Path isolation
b. Access control
c. Policy enforcement
d. Network service virtualization

20. Which subnet mask should you use on a point-to-point links to avoid wasting IP
addresses?
a. 255.255.255.0
b. 255.255.255.252
c. 255.255.255.250
d. 255.255.255.248

21. Which technology combines two Nexus switches to form a single logical switch, while
maintaining control plane separation between the two devices, and requiring independent
management of each device?
a. vPC
b. VSS
c. MEC
d. Cisco stackwise

22. A company of 200 users want to design a cost-effective network architecture without
losing resiliency and high availability characteristics. Which method should be used?
a. Collapse the core distribution [I think they word the answer and join the layers, rather
than collapse, I chose this option anyway too]
b. Connect the access directly to the core
c. Use three tier design

23. From which DNS record can a Cisco wireless AP, running Cisco WLC version 6.0 or later,
retrieve bootstrap information?
a. cisco-capwap-controller
b. the DNS A record of the controller hostname
c. the DHCP Option 43 name
d. cisco-lwapp-controller

24. In an EAP-enable WLAN, which component sends the EAP Request?


a. WLAN controller
b. Access point
c. Wireless client
d. ACS server

25. A company with many remote sites wants to design IPT solution, with call processing
located at HQ. Which IPT deployment model should be used?
a. Single-site with centralized
b. Multisite WAN with centralized call processing
c. Multisite WAN with distributed call processing
d. Multisite with centralized
e. CallManager Express deployment

26. How to make a network topology more resilient? (Shown a redundant net arch with only
a single ISP connection)
a. Redundant ISP

27. When designing IP addressing schemes, which options are two benefits of implementing
hierarchical addressing? (Chose two)
a. Provides an optimized addressing plan
b. Provides real-time troubleshooting
c. Allows the use of overlapping addresses
d. Reduces routing table entries
e. Provides modular convergence

AD

28. The Company hires a network consultant to help implement QoS in its network. Which
technique should the consultant use to identify traffic and PORTS used by applications?
a. NBAR
b. CDP
c. Netflow
d. Ciscoworks

29. Which option is an example of a fixed two-level hierarchical routing protocol?


a. OSPF
b. EIGRP
c. OSPF
d. RIPv2

30. What is the benefit of using a triangle topology on the core layer?
a. Utilization of multiple links to its destination
b. In a case of a link failure there is no need of routing recalculation.

I think A was the only sensible option here, but B was suggested in forum originally.

31. Which type of router connects to two different OSPF areas?


a. Area border
b. Autonomous system boundary
c. Backbone
d. Internal

32. Which source of route has better AD than BGP(20)?


a. OSPF – 110
b. iBGP – 200
c. RIPv2 -120
d. Connected Interface-0

33. Where should be VPN connection be terminated?


a. DMZ
b. Internet
c. Remote Access

34. An engineer is planning branch WAN links to support unified communications. Which
DSCP value must be assigned to voice traffic?
a. EF
b. AF41
c. COS4
d. BE

A
35. During IP addressing design, which factor should be considered?
a. No of devices in each location
b. No of location available
c. Device capability

AB

36. Which command should you use to get [the most] information from a device? /not
clearly stated/
a. Show running
b. Show cdp
c. Show tech-support

Yes, agree answer = C

37. Which format reflects that of the IPv6 global unicast address?
a. Global prefix (16 bits), subnet ID (16 bits), interface ID (64 bits)
b. Global prefix (48 bits), subnet ID (16 bits), interface ID (64 bits)
c. Global prefix (16 bits), subnet ID (64 bits), interface ID (48 bits)
d. Global prefix (16 bits), subnet ID (16 bits), interface ID (64 bits)

38. Which two techniques can you use to reduce the size of a network routing table?
(Choose two)
a. Implement VPN
b. Implement NAT
c. Route Summarization
d. Configure static routing
e. Utilize a default route

CE

39. You want to apply QoS to an Access Point which is connected to a switch, which
configuration should be used?
a. 802.1q trunk

40. An engineer wants to find all of the objects of a certain type available in the MIB. Which
kind of query must be performed?
a. object-level
b. tree-leve
c. class-level
d. subtree-level
I went for a. object level but original forum poster suggested c….

41. You have a server hosted on the server farm module. The server is configured to listen
to the TCP port 140. What NAT is best for this?
a. STATIC
b. Dynamic
c. Overload

42. Critical for availability remote office has a complete redundant link to WAN. What can
improve the availability of a remote office?
a. install dual power supply
b. Use different line cards
c. Increase the speed of WAN links from 100 Mb / s to 1 Gbps
d. Replace the wired connection with the optics

I went for A, dual PSU [the original forum poster said B, but I don’t agree]

43. Which two of the following are benefits of using a modular approach to network design?
(choose two)
a. Improves flexibility
b. Facilitates implementation
c. Lowers implementation costs
d. Improves customer participation in the design process

AB

44. How does the use of multiple areas in a link state routing protocol improve network
scalability?
a. Reduced network bandwidth
b. Permits partial table updates
c. Enables route summarization
d. Overcomes router hop limit

45. While designing a remote access VPN, a customer has requested three different levels of
access to be granted for administrator, employees, and partners. Which three access
policies must be configured for the three groups? (choose three)
a. Partners are centrally authenticated with limited network access controller with
ACLs.
b. Administrative users have local credentials with full access to the internal infrastructure
c. Administrative users are centrally authenticated with full access to the internal
infrastructure
d. Employees are centrally authenticated with limited network access controlled with ACLs
e. Employees are centrally authenticated with full access to the internal infrastructure
f. Partners are centrally authenticated with full access to the internal infrastructure
ACD

46. Which option can hinder efficient IP address allocation?


a. VLSM
b. Classless routing protocols
c. Routing auto-summary
d. Classful routing protocols

47. One step in characterizing an existing network involves obtaining information such as
network performance, availability, utilization and response times Which activity generates
this information?
a. Logical network mapping
b. Network health check
c. Address naming analysis
d. Wiring and media assessment

48. For which type of topology are modern fast-converging routing protocols designed?
a. Hub-and-spoke
b. Full mesh
c. Hierarchical
d. star

Answer is C: [I have corrected this from original forum poster, I found it in OCG]

49. Which two major campus design models does the Cisco Unified Wireless Network
support? (Choose two)
a. Local mode
b. Cisco FlexConnect
c. Deterministic
d. Dynamic

AB

50. A diagram and then a configuration of access list interface shown, then which device is
QoS trust boundary
a. IP Phone
b. Access switch
c. Core
d. Distribution

A
51. What is the advantage of multiple area LSP design? (Choose two)
a. Bandwidth optimization
b. Route summarization
C:Isolation of routing issues

B, C (I added C from Cisco Press Books R&S essentials.

LSP = Link State Protocols (OSPF, IS-IS)

52. Considering efficient utilization of IP Addressing, what mask you will use in a point to
point connection?
a. 255.255.252.0
b. 255.255.255.252
c. 255.255.255.254

Additional Extracted information from another Forum Poster.

53. Examples of questions (i remember only the idea, so the actual wording may differ):

You need to modify the design of an existing network of an organization by adding


something new. What do you need first from the organization?
a the router hardware type
b the software IOS version
c the existing design document
d the output of show cdp neighbors

Answer: C
54. What happens if an APIC is removed fron topology?
a The packets are send to the other controllers
b the fabric drops all packets
c the fabric continues to forward packets
d somthing really stupid

Answer: c

55. What type of files are most often used by APIs? (choose 2)
a html
b json
c txt
d xml

Answer: b,d

56. What benefits do hierarchical IP addressing provide for an organization?


a modular convergence
b smaller routing tables
c optimised address plan
d?

Answer I went for was b and C

57. Which are best-practices for ospf design? (choose 2):


a match ospf design with stf design
b make non-backbone areas stub areas
c don’t remember
d route summary

I chose b and d

58. Which subnet provides for 6 /25 subnets?


a /19
b /23
c /16
d /22

Answer: d (/22) but note that other people’s answers suggest /19 but please check yourself.

http://jodies.de/ipcalc?host=192.168.0.1&mask1=22&mask2=25

59. Which of the following are technology drivers for virtualization?


a path isolation
b multivendor support
c decreasing the number of physical devices
d

60. I went for a and c. note that original forum poster answer was b,c (decreasing complexity
either)

Learn difference between Virtualisation, Device versus Network (see below from OCG)
61. When designing IP addressing schemes, which options are two benefits of implementing
hierarchical addressing? (Choose two)

A. provides real-time troubleshooting


B. allows the use of overlapping addresses
C. provides an optimized addressing plan
D. provides modular convergence
E. reduces routing table

CE

62. Which option can hinder efficient IP address allocation?


A. VLSM
B. classless routing protocols
C. classful routing protocols
D. routing auto-summary

63. While preparing an overview of Internet facing DMZ for a customer, a consultant must
identify the functionality to be placed in the DMZ. Which two functionalities are best suited
for use in a DMZ? (Choose two.)
A. enterprise NTP source
B. web load balancer
C. remote access VPN termination
D. DDOS protection
E. web security appliance

C and E

64. An engineer is designing a Cisco Unfed Communications deployment for a customer with
small sites across the country. Which deployment model keeps the call control at the data
center of the primary site?
A. campus deployments
B. distributed deployment
C. cloud hybrid service deployment
D. multisite deployment model with centralized call processing
Answer = D

65. While designing the LAN core to distribution infrastructure for optimum convergence, the
engineer decides to use a topology using triangles. Which benefit to the organization is
true?
A. It allows device failures to occur without a recalculation of routes
B. It allows for a smaller quantity of devices in the core.
C. It utilizes multiple links to route traffic to its destination
D. It creates a topology that can grow with the organization

Answer = C

66. For which type of topology are modern fast-converging routing protocols designed?
A. star
B. hierarchical
C. full mesh
D. hub-and. Spoke

Answer from OCG = B

Just my own notes, Learn Hierarchical Network Design Section off to help with exam, there
seems to be a bit of extra focus on this topic in the Qs I
PART II from the poster CCDA-Rider 101qs and shirokuma

1. Which advantage to using route summarization is true?


a. reduces routing table size and improves convergence.
b. enables recalculation of the routing table with any update for optimum convergence
c. provides an overview of all subnets used across the infrastructure
d. enables efficient peering with other autonomous system

Answer : a

2. An organization is deciding what routing protocol to use throughout their network. What must be
considered if routing is to be performed at the access layer?

A. reduced scalability of the network when introducing a large number of switch blocks into the
routing table
B. centralized management of access control lists at the distribution layer
C. reliability when implementing routing over spanning-tree at the access layer
D. performance differences between core, distribution and access layer equipment

Answer: D

3. What are two reasons discontinuous IPv4 networks hinder scalability? (Choose two.)
A. routing table bloat
B. inability to utilize automatic summarization
C. insufficient IP addresses
D. slowed packet forwarding
E. delayed interface queuing
Answer: B ,C

4. What is the optimal device and location to fulfill these requirements? • provide early indication of
reconnaissance and scanning activities with blocking capabilities • require fewer interfaces to
inspect traffic to the DMZ and internal network
A. IPS inline outside of the firewall
B. IPS inline inside the firewall
C. Cisco IOS IPS on the border router
D. passive IPS connected to a SPAN port outside of the firewall
E. passive IPS connected to a SPAN port inside the firewall

Answer: A
5. which network element must be summarized in a multiarea OSPF deployment?
a. IP address
b. communities
c. number of routes
d. link state advertisements
Anwer : C
6. Which VPN tunneling technology supports IP multicast?
A. DMVPN spoke-to-spoke
B. Cisco Easy VPN
C. IPsec direct encapsulation spoke-to-spoke
D. IPsec direct encapsulation hub-and-spoke

Answer: A

7.which option contains the information required to learn the layout of network devices and the
links the connect them?
a. network baseline
b. wiring and media details
c. architectural and environmental constraints
d. network topology map

Answer : d

8. An engineer wants to ensure that the Spanning Tree topology appears free while redundant
switches are present. Which Layer2 technology must be used?

A. VPC
B. PaGP
C. LACP
D. OTV

Answer: A

9. Which statement about modular network design is true?


A. Each deployed module is identical to the others, simplifying configuration
B. Each module include access, distribution, and core layers
C. It is a flexible architecture that simplifies design, management and troubleshooting
D. It is complex and should be used only in specialized situations
Answer: C

10. which network size can provide six/25 subnets while wasting the smallest number of ip
addresses
a./22
b./19
c./23
d./16

Answer : think it could be /22 as it can be subnetted to 8, ccda-rider says B…


http://jodies.de/ipcalc?host=192.168.0.1&mask1=22&mask2=25

11. A network engineer is tasked with summarizing the routes to a remote site. What is the optional
route statement to connect to the 192.168.101.0/24 and 192.168.102.0/24 networks across the
corporate WAN?
A. ip route 192.168.101.0 255.255.254.0
B. ip route 192.168.100.0 255.255.255.0
C. ip route 192.168.100.0 255.255.254.0
D. ip route 192.168.100.0 255.255.252.0

Answer: D

12. Which statement about using STP in a redundant-link scenario is true?


A. It uses only one redundant link at any one time.
B. It bonds the two links and treats them as one link.
C. It provides the most efficient use of redundant links.
D. It balances traffic by transmitting packets on alternating links.

Answer: A

13. A data center is reaching its power and cooling capacity. What two virtualization technologies
can address the problem by directly reducing the number of physical devices? (Choose two.)
A. virtual switching systems
B. virtual device contexts
C. virtual servers
D. virtual routing and forwarding
E. virtual port channels
F. virtual LANs

Answer: B,C

14. Which option can use deep-packet examination to determine the specific nature of an attack?
A. stateful firewall
B. NetFlow collector
C. syslog server
D. network IPS
Answer: D
15. In which phase of Cisco Design Lifecycle would you identify shortfalls in the network operation
teams ability to support new technologies being introduced?
A. In the Validation stage of the Build phase
B. In the Deployment stage of the Build phase
C. In the Assessment stage of the Plane phase
D. In the Optimize stage of the Mange phase
Answer: C

16. which two methods are used to reduced the mesh links required between ibgp peers in the same
AS? (choose two)
a. route reflectors
b. local reference
c. confederations
d. community
e. atomic aggregate

Answer : a,c

17. Which mode is used to exclusively look for unauthorized access points?
A. monitor mode
B. sniffer mode
C. rogue detector mode
D. local mode

Answer : C
18. Which one of these statements is an example of how trust and identity management solutions
should be deployed in the enterprise campus network?
A. Authentication validation should be deployed as close to the data center as possible.
B. Use the principle of top-down privilege, which means that each subject should have the privileges
that are necessary to perform their defined tasks, as well as all the tasks for those roles below them.
C. Mixed ACL rules, using combinations of specific sources and destinations, should be applied as
close to the source as possible.
D. For ease of management, practice defense in isolation - security mechanisms should be in place
one time, in one place.
Answer: C

19. WAN backup over the Internet is often used to provide primary connection redundancy. Which is
the most important consideration when passing corporate traffic over the public Internet?
A. security
B. static versus dynamic routing
C. bandwidth
D. QoS
E. latency
Answer: A

20. DND-1

21. Characterizing an existing network requires gathering as much information about the network as
possible. Which of these choices describes the preferred order for the information-gathering
process?
A. site and network audits, traffic analysis, existing documentation and organizational input
B. existing documentation and organizational input, site and network audits, traffic analysis
C. traffic analysis, existing documentation and organizational input, site and network audits
D. site and network audits, existing documentation and organizational input, traffic analysis

Answer: B

22. QUESTION 35 Refer to the exhibit.


A. A is the Data Center Module and C is the
Campus Core layer.

B. A is the Data Center Module and D is the


Building Access layer.

C. B is the Campus Core layer and C is the


Building Distribution layer.

D. B is the Building Distribution layer and C is


the Campus Core layer.

E. A is the Internet Connectivity layer and B is


the Campus Core layer.

F. B is the Building Distribution layer and D is


the Building Access layer.
Which two statements correctly identify the layers of the Enterprise Campus module? (Choose two.)
Answer: BC

23. You need to connect to a remote branch office via an Internet connection. The remote office
does not use Cisco equipment. This connection must be secure and must support OSPF. Which of the
following can be used to transport data to the branch office?

A. GRE over IPsec


B. IPsec
C. GRE
D. IPsec VTI

Answer: A

24. Which voice codec should you use in order to provide toll quality calls?
A. G.711
B. G.718
C. G.722
D. G.729

Answer: A

25. When evaluating network designs, what indicator demonstrates that the modular approach was
followed?
A. ability to scale
B. follows best practices
C. redundant connectivity
D. easy to deploy
Answer: A

26. A network engineer is following the Cisco enterprise architecture model. To which network layer
would a branch office connect to using a private WAN?
A. Enterprise Campus
B. Enterprise Edge
C. SP Edge Premise
D. Remote Module

Answer: D

27. A network engineer is following the three tiered Network Hierarchical Model. At which tier is
route summarization implemented?
A. core
B. distribution
C. backbone
D. access

Answer : A

28. In which network location should an external DNS server be placed?

A. campus data center


B. enterprise branch
C. internet
D. remote access
Correct Answer: C

29. A company has dark fiber between headquarters and its data center. It is presently configured as
a 10GbE connection. Network utilization shows high utilization on the connection. What technology
can be implemented to increase capacity without acquiring another circuit?
A. MPLS
B. DWDM
C. VPLS
D. DMVPN

Answer: B

30. When designing changes to an existing network, which two options are documented to
understand environmental constraints? (Choose two.)
A. utilization of network resources
B. heating and air conditioning
C. location of existing documentation
D. floor and rack space availability E. host naming conventions

Answer: BD

31. What are two benefits of the bottom-up design approach? (Choose two.)
A. incorporates organizational requirements
B. requires little or no notation of actual organizational requirements for implementation
C. provides a broader overview to the organization and the designer
D. facilitates design that is based on previous experience
E. allows a quick response to a design request
Answer: DE

32. How many switches can be combined into a single network element using VSS?
A. 6
B. 8
C. 2
D. 4

Answer: C

33. Based on best practices, which QoS profile should be configured on the WLAN of the WLC for
wireless VoIP communications?
A. Silver
B. Bronze
C. Gold
D. Platinum

Answer: D

34. Which statement about using STP in a redundant-link scenario is true?

A. It uses only one redundant link at any one time.


B. It bonds the two links and treats them as one link.
C. It provides the most efficient use of redundant links.
D. It balances traffic by transmitting packets on alternating links.
Answer: A

35. Which type of router connects to two different OSPF areas?


A. Area border
B. Autonomous system boundary
C. Backbone
D. Internal

Answer: A

36. Which option is an example of a fixed two-level hierarchical routing protocol?


A. OSPF
B. RIPv2
C. EIGRP
D. static routes

Answer: A

37. While designing a remote access VPN, a customer has requested three different levels of access
to be granted for administrators, employees, and partners. Which three access policies must be
configured for the three groups? (Choose three.)
A. Partners are centrally authenticated with limited network access controlled with ACLs.
B. Administrative users have local credentials with full access to the internal infrastructure.
C. Administrative users are centrally authenticated with full access to the internal infrastructure.
D. Employees are centrally authenticated with limited network access controlled with ACLs.
E. Employees are centrally authenticated with full access to the internal infrastructure.
F. Partners are centrally authenticated with full access to the internal infrastructure.
Answer: ACD

38. Which two techniques can you use to reduce the size of a network routing table? (Choose two.)
A. Implement VPN
B. Route summarization
C. Implement NAT
D. Configure static routing
E. Utilize a default route

Answer: BE

39. Traditionally, the DMZ exists between which two locations? (Choose two.)
A. Building distribution
B. Building access
C. Corporate network
D. Metro Access
E. Internet

Answer: CE

40. An engineer wants to ensure that the Spanning Tree topology appears free while redundant
switches are present. Which Layer2 technology must be used?
A. VPC
B. PaGP
C. LACP
D. OTV
Answer: A

41. An engineer is planning branch WAN links to support unified communications. Which DSCP value
must be assigned to voice traffic?
A. EF
B. AF41
C. COS4
D. BE

Answer: A

42. Which option best describes the high-level design document?


A. It includes specific information such as hardware models, software version, IP addressing, and
routing protocols.
B. It contains the test plan to certify that the customer's network is ready for use.
C. It contains the steps needed to install and configure the network equipment and the steps that
verify basic network operation.
D. It includes business and technical requirements and the proposed network architecture.

Answer: D

43. Which value must you configure on a Microsoft DHCP server so that Cisco wireless APs can locate
the wireless controllers?
A. the Length value
B. the IP DHCP pool name
C. a vendor class identifier
D. the Type suboption code 0xe1
Answer: C

44. Which scenario is the best example of a single-homed connected infrastructure?


A. A data center that is connected to one service provider over an MPLS circuit and another service
provider over an Ethernet connection.
B. A remote office that is connected to the WAN using a DSL provider and a cable provider.
C. A small office that uses a DSL link to connect to the WAN.
D. A corporate office that uses two separate routers to connect to two different service providers.

Answer: C

45. Which address is the broadcast address of subnet 120.20.78.8/30?


A. 120.20.78.12
B. 120.20.78.1
C. 120.20.78.11
D. 120.20.78.8

Answer: C

46. Which two major campus design models does the Cisco Unified Wireless Network support?
(Choose two.)
A. Cisco FlexConnect
B. N+N+1
C. Deterministic
D. Local Mode
E. Dynamic
Answer: AD
47. Which two protocols are classful routing protocols? (Choose two.)
A. RIPv2
B. RIPv1
C. IGRP
D. OSPF
E. BGP

Answer: BC

48. From which DNS record can a Cisco wireless AP, running Cisco WLC version 6.0 or later, retrieve
bootstrap information?
A. cisco-capwap-controller
B. the DNS A record of the controller hostname
C. the DHCP Option 43 name
D. cisco-lwapp-controller

Answer: A
49. When integrating services with Cisco ACI Service Graphs, which tool can be used for integrated
configuration management?
A. IOS
B. REST API
C. APIC CLI
D. HTML
Answer: B

50. Which VPN tunneling technology supports IP multicast?

A. DMVPN spoke-to-spoke
B. Cisco Easy VPN
C. IPsec direct encapsulation spoke-to-spoke
D. IPsec direct encapsulation hub-and-spoke

Answer: A

51. Which format reflects that of the IPv6 global unicast address?
A. global prefix (16 bits), subnet ID (16 bits), interface ID (64 bits)
B. global prefix (48 bits), subnet ID (16 bits), interface ID (64 bits)
C. global prefix (16 bits), subnet ID (64 bits), interface ID (48 bits)
D. global prefix (64 bits), subnet ID (48 bits), interface ID (16 bits)

Answer: B
52. Which layer in the Cisco Enterprise Architecture model is highly available, has fast convergence,
and should avoid packet manipulation?
A. campus distribution
B. enterprise data center
C. enterprise edge
D. campus access
E. campus core
F. remote access VPN
Answer: E

53. In the traditional hierarchical LAN design, which two statements about the distribution layer are
true? (Choose two.)
A. It uses Layer 2 switching only.
B. It typically is connected directly to the Internet.
C. It aggregates data from the access layer.
D. Policy is implemented at this layer.
E. It provides users direct access to the network.

Answer: CD

54. An engineer is designing a network that is divided into multiple areas and supports a mixed
vendor routing environment. Which interior gateway protocol must be selected?
A. EIGRP
B. OSPF
C. BGP
D. RIPv2

Answer: B

55. Which two benefits are realized by establishing virtualization in a campus network? (Choose
two.)
A. enables path isolation
B. enhances network agility
C. consolidates applications
D. enables unlimited scalability
E. reduces network bandwidth
Answer: AB

56. Which option is one of the methods that Cisco routers and switches can use to share information
between directly connected devices on a regular basis?
A. NetFlow
B. ARP
C. NHRP
D. CDP

Answer: D
57. What information should be utilized to identify network applications that are running on an
existing network infrastructure?
A. customer information
B. existing documentation
C. traffic analysis
D. external feedback
E. user feedback

Correct Answer: C

58. An engineer is designing a solution for multiple multihomed to establish router between one
another which design must be?

A. OSPF
B. iBGP
C. eBGP
D. EIGRP

Answer: C
59. Which application can provide AAA services for Cisco Devices?
A. IP SLA
B. Cisco TrustSec
C. TACACS+
D. Cisco FirePOWER

Answer: C
60. Consider the reservation of IP Addressing what mask you will use in a point to point connection
between two Buildings?
A. 255.255.252.0
B. 255.255.255.252
C. 255.255.255.254

Answer: B
61.
Answer : Top Down : 1) Gives the big picture to the organizations and designer
2) Incorporates organizational requirements
Botoom-up : 1) Enables a quick response to a design request
2) Facilitates designs based on previous experience

62.

Answer : MST, PVST, RapidPVST


63.
Answer : Backbonefast, Bpdu Guard,portfast,bpdu filter,loop guard,uplinkfast,rootguard.
64.

Answer : Access control, path isolation, sona, service edge.

65.

Answer : Layer 2 switching campus design: 1) uses fhrp for high availability 2) uses VSS to provide
redundancy 3) only one redundant connection between the access switch and the distribution
switch can be active.
Layer3 switching campus design :
1)Route filtering is configured on interface toward the access layer
2) inter-vlan communications are routed in the distribution layer.

66. Which three describe challenges that are faced when deploying an environment for teleworkers?
(Choose three.)
A. supporting a mix of technically knowledgeable and nontechnical users
B. simplifying router installation and configuration
C. verifying available power at employee's house for necessary equipment
D. avoiding situations where employees might use nonstandard hardware or configurations
E. reducing daily commuting time to main office location
F. providing access to FTP servers located in main office location
G. implementing leased line connectivity between main office and employee's home location

Answer: ABD

67. Which statement is true concerning the data center distribution (aggregation) layer design?
A. With Layer 3 at the aggregation layer, the physical loops in the topology must still be managed by
STP.
B. The boundary between Layer 2 and Layer 3 must reside in the multilayer switches, independent
of any other devices.
C. A mix of both Layer 2 and Layer 3 access is the most optimal.
D. In a small data center, the aggregation layer can connect directly to the campus core, exchanging
IP routes and MAC address tables.

Answer: C

68. Which subnet is the best choice for a point-to-point link?


a. 10.120.10.0/29
b. 10.120.10.0/28
c. 10.120.10.0/30
d. 10.120.10.1/32
Answer : C

69. An engineer must create a logical, isolated network for regulatory compliance. Which option is a
complex access control network virtualization scenario?
a. IT organization deploying two mpls networks with in their environment.
b. IT organization providing a quarantined area of network admission control posture validation.
c. IT organization providing an isolated guest network for wired and wireless clients
d. IT organization acting as a service provider creating logical separation for business units

Answer : B

70. which feature must be configured on a switch ports that connects to a Cisco wireless access
point when QOS is required?
a. Auto negotiation
b. Cisco discovery protocol
c. Dot1q trunk
d. Portfast

Answer : C

71. which option do you use to provide dynamic utilization of WAN links based on latency?
a. equal cost load balancing
b. unequal cost load balancing
c. Cisco performance routing
d. policy-based routing
Answer : C

72. high availability is required for a critical remote office to an enterprise. The office has already
deployed two redundant wan connections. Which action can be done to the edge router to improve
the availability of the remote office?
a. upgrade the uplinks from 100mb to 1g.
b. replace the fiber uplinks with copper
c. add dual power supplies
d. use modular line cards

Answer : C

73. which two types of files are the most common use in APIs for programmability?(choose two)
a. JSON
b. PERL
c. BASH
d. HTML
e.XML

Answer : A,E

74. A startup company wants to deploy the Cisco ip telephony solution. Which two actions are
appropriate design approaches? (choose two)
a. connect Cisco unified communications manager in the eternet switches of data center module
b. connect sip trunks for pstn connectivity to Ethernet switches of campus core layer
c. connect Cisco unified communication manager to the Ethernet switches of the campus core layer
d. connect ip phones to the Ethernet switch of data center module
e. connect user ip phones to the Ethernet switches of access layer
Answer : C,E

75. a large corporation wants to ensure high availability for its e-commerce web sites. Which routing
protocol must be used when connecting to multiple internet services providers?
a. static routes
b. EIGRP
c. BGP
d. OSPF

Answer : C

76. which two options should be considered when desiging an ospf network?
a. configure nonbackbone areas as stub areas.
b. design STP to mirror the ospf design
c. there is limit on available AS numbers
d. CDP should be incorporated
e. Ensure the address space is summarizable

Answer : A,E

77. Which Cisco technology can connect more than two switches so that they behave as one switch?

A. trunking
B. EtherChannel
C. StackWise
D. VSS

Answer: C

78. which designing a high availability network.which option can be classified as fault domain?
a. every tier in the network design
b. collapsed core in the network design
c. non redundant devices in the network design
d. single power supply devices in the network design

Answer : A

79. which two considerations are important when designing an ip address plan?

a. the speed of the connected devices


b. the number of locations
c. the type of connected devices
d. the name of the locations
e. the number of devices per location

Answer : B,E

80. An engineer is designing a high availability branch network so that redundancy protocols must
support automatic load balancing which protocol satisfies this requirement?

a. HSRP
b. MLBP
c. VRPP
d. GLBP
Answer : D

81. Cisco unified wireless networks supports two campus design models centralized or local mode
and Cisco flexconnect. Which statement about the local mode design model is true?
a. it is recommended for remote-site deployments
b. the wireless lan controller and access points are co-located
c. it is recommended for sites with a local wan distribution layer
d. it is recommended for sites that use less than 50 APs.

Answer : C

82. which two options best describe the top-down design approach?(choose two)
a. organizational requirements should not be included.
b. the design will meet both current and future requirements
c. the approach begins with the needs of the organization
d. the approach begins with the physical layer of the osi model
e. the design is based on previous experience and allows for a quick solution.

Answer : B,C

83. A small business owner has 200 staff members that occupy two floors of a building. The owner
wants to reduce the network infrastructure costs without losing two much network resiliency and
scalability. Which option meets these requirements ?

a. combine access and distribution layers into one layer and keep all others layers’
b. exclude and distribution layer switches and connect everything to redundant core switches
c. combine access and core layers in to one layer and keeping all the other layers
d. combine core and distribution layers into one layer and keep all the other layers
Answer : D

84. What kind of servers you should place in DMZ?


A. WWW
B. FTP
C. DHCP
D. TACACS+
E. NFP

Answer: AB

85. which vpn technology support ip multicast?


a. ipsec direct encapsulation spoke to spoke
b. Cisco easy vpn
c. ipsec VTI
d. Ipsec direct encapsulation hub to spoke

Answer : C

86. which advantage of using spanning tree protocol is true?

a. allows fast convergence after failure of a link or device


b. utilizes all available uplink bandwidth
c. prevents network loops
d. allows dual-homed servers operate in active-active mode

Answer : C

87. which two options are benefits of a modular network design? ( choose two)

a. higher scalability
b. ease of troubleshooting
c. endto end security
d. intelligent network services
e. improved fault isolation

Answer : A,E

88. Which statement about VSS is true?


A. it can maintain the topology independently of STP
B. it requires HSRP.
C. it requires STP for link redundancy
D. it has two control planes.

Answer: A

89.An engineer is designing a private WAN infrastructure to support an organization and must
support quality of service and multicast functionality to the remote sites. Which technology supports
this requirement?

a. MPLS
b. DMVPN
c. SSL VPN
d. IPSEC VPN
Answer : A

90. which sip feature allows an access port to bypass the learning and listening states?
a. root guard
b. loop guard
c. portfast
d. bpdu guard

Answer : C

91. Which two design decisions can improve network resiliency? (Choose two.)
A. implement redundant topology
B. implement serial device connections
C. increase data plane bandwidth
D. implement redundant links
E. reduce network size
Answer: AD

92. which two processes are included in the build phase of the Cisco design lifecycle?(choose two)
a. validation
b. assessment
c. analysis
d. deployment
e. design

Answer : A,D

93. which two methods are used to reduce the mesh links required between ibgp peers in the same
AS?(choose two)
a. local preference
b. route reflectors
c. confederations
d. community
e. atomic aggregate

Answer : B,C

94. Refer to the exhibit ? which result is true if a client computers connected through the interface
named internal and attempts to connect to an operational tcp/443 based website?

a. the web site connection times out


b. A captive portal is displayed, which enables guest access layer
c. the traffic passes while alerting the logging system with the emergencies eventlevel
d. the traffic passes and displays the website content

Answer : A

95. in a new dmvpn deployment phase 1 completes successfully however phase 2 experience issues.
Which troubleshooting step is valid in this situation?

a.remove NHRP configuration and reset the tunnels


b. verify IP routing between the external IPs of the two peers is correct
c. ensure that the nodes use the same authentication method
d. temporarily remove encryption to check if the GRE tunnel is working

Answer : D

96. traditionally the dmz exists between which two locations?(choose two)
a. corporate network
b. building access
c. building distribution
d.metro access
e. internet

Answer : A,E

97. which option does a modular design approach provide?


a. efficiency
b. manageability
c. fault isolation
d. performance

Answer : B

98. In an EAP-enabled WLAN, which component sends the EAP identity request?

a. access point
b. wireless client
c. wlan controller
d. ACS server
Answer : C

99. at which layer of the network should you perform traffic filtering and QOS classification?
a. core
b. application
c. Distribution
d. session

Answer : C

100. Which routing protocol is the most scalable?


a. RIP
b. IGRP
c. RIPV2
d. OSPF

Answer : D

101. which statement about static routes is true?

a. They are ideal for a full-mesh topology


b. they must be configured manually
c. they require considerable routing protocol overhead
d. they are ideal for large networks
Answer : B

****NEW *** Supplementary Questions:

Canary

Q. Site uses Cisco Unified Communications Manager, remote sites have 500ms latency limitations
delivered via Satellite connections. What kind of issues would be present with this deployment?

A. No significant issues
B. minimal service problems and overlap
C. significant problems and overlap
D. phones would not register"

C as the latency exceeds the Design Guides from cisco

Q. What are the benefits from using Cisco IPS inline


A. Performance
B. Timely threat detection.
C. ..
D. ..

B.

2) Something about Cisco IPT call-processing deployment ; Single-site deployment, Multisite WAN
with centralized call processing, Multisite WAN with distributed call processing

3) IP routing efficiency (choose two)


a) Hierarchical
b) Dynamic
c) Supernet
d) Static
e) Use two difference IGP

Canary: I went for A and C… please check this yourself.

4) Vlan/.1Q, MPLS, ACL, GRE ; What is this


a) Network virtualization service
b) service edge
c) path isolation
d) Don’t remember

Answer is C, Path Isolation

5) Cisco device that support Device Contexts. Below is from OCG. Better memorize it

Cisco Nexus 7000 series switches (VDC)


Cisco Adaptive Security Appliance (ASA) firewall
Cisco Catalyst 6500 ASA Services Module (ASA SM)
Cisco intrusion prevention system (IPS)

*in Exam question, I got ASA and Nexus 7000 (chose them)

6) Company ABC has intermittent problems registering remote-site IP phones over the WAN with
Cisco Unified CallManager at headquarters. The company hires a network consultant to help
implement QoS in its network. Which technique should the consultant use to identify traffic and
applications that traverse the network?
A. priority queuing
B. RSVP
C. NBAR
D. policing

Answer = C.

7)In VRRP /FHRP/ if you want the master switch to take over and continue its master role after
coming up from failure which option should be used
a. Interface tracking
b. Priority
c. Preemption

I chose C, Preemption – this checks out with VRRP I found within Cisco Press.

Das könnte Ihnen auch gefallen