Beruflich Dokumente
Kultur Dokumente
notes.
The second part of the document contains ccda-rider101Q and some of helpful feedback
from shirokuma.
I also recommend reading the OCG [there’s a huge amount of content in it, I know, but
maybe try focusing on the Key Topics which are clearly marked]
PART I from the Posters on the Forum Nov 2018 through Jan 2019
Answer = c
Answer = A, C
Answer = B
Answer = BC
5. In VRRP /FHRP/ if you want the master switch to take over and continue its master role
after coming up from failure which option should be used
a. Interface tracking
b. Priority
c. Preemption
6. What 4 benefits are gained by following the cisco PPDIOO life cycle model?
a. faster ROI
B. improved business agility
C. increased network availability
D. faster access to applications and services
E. lower total cost of network ownership
F. better implementation team engagement
BCDE
7. Which two high -level design components are included in Cisco Unified Wireless
Network? (Choose two)
a. Local mode
b. Cisco FlexConnect
c. Deterministic
d. Dynamic
AB
8. Designing of WAN links, with latency which method should be used to efficiently utilize
the link?
a. Policy based routing
b. Cisco performance routing
9. While designing a highly resilient infrastructure, which layer is typically a single point of
failure?
a. Internet
b. Distribution
c. Access
d. WAN
10. What functional components should be placed in a DMZ network that has internet
connection?
a. DDOS
b. ASA
c. Web load balancer
d. Web server
CD
11. When designing a high availability network, which option can be classified as a fault
domain?
a. Every tier in the network design
b. Single power supply devices in a network design
c. Collapsed core in a network design
d. Non-redundant devices in the network design
12. What is the benefit of distribution layer (mentioned 3 Tier Hierarchical & Campus in Q
too I think)?
13. Which two benefits are realized by establishing virtualization in a campus network?
(Choose two)
a. Enables path isolation
b. Enhances network agility
c. Consolidates applications
d. Enables unlimited scalability
e. Reduces network bandwidth
AB
14. Which cisco tool is used for network accounting, monitoring and routing?
a. Cisco Prime (collaboration)
b. Сiscoworks
c. NBAR
d. Netflow
15. When integrating services with Cisco ACI Service Graphs, which tool can be used for
integrated Configuration management?
a. IOS
b. REST API
c. APIC CLI
d. HTML
16. At which layer of the network should you perform traffic filtering and QoS Classification?
a. Session
b. Distribution
c. Application
d. Core
18. Which of the following are industry drivers for network virtualizations? (Choose two)
What are two industry drivers that promote network virtualization? (Choose two)
A. traffic isolation
B. device reduction
C. multi-vendor support
D. application stability
E. reduced complexity
A and E
20. Which subnet mask should you use on a point-to-point links to avoid wasting IP
addresses?
a. 255.255.255.0
b. 255.255.255.252
c. 255.255.255.250
d. 255.255.255.248
21. Which technology combines two Nexus switches to form a single logical switch, while
maintaining control plane separation between the two devices, and requiring independent
management of each device?
a. vPC
b. VSS
c. MEC
d. Cisco stackwise
22. A company of 200 users want to design a cost-effective network architecture without
losing resiliency and high availability characteristics. Which method should be used?
a. Collapse the core distribution [I think they word the answer and join the layers, rather
than collapse, I chose this option anyway too]
b. Connect the access directly to the core
c. Use three tier design
23. From which DNS record can a Cisco wireless AP, running Cisco WLC version 6.0 or later,
retrieve bootstrap information?
a. cisco-capwap-controller
b. the DNS A record of the controller hostname
c. the DHCP Option 43 name
d. cisco-lwapp-controller
25. A company with many remote sites wants to design IPT solution, with call processing
located at HQ. Which IPT deployment model should be used?
a. Single-site with centralized
b. Multisite WAN with centralized call processing
c. Multisite WAN with distributed call processing
d. Multisite with centralized
e. CallManager Express deployment
26. How to make a network topology more resilient? (Shown a redundant net arch with only
a single ISP connection)
a. Redundant ISP
27. When designing IP addressing schemes, which options are two benefits of implementing
hierarchical addressing? (Chose two)
a. Provides an optimized addressing plan
b. Provides real-time troubleshooting
c. Allows the use of overlapping addresses
d. Reduces routing table entries
e. Provides modular convergence
AD
28. The Company hires a network consultant to help implement QoS in its network. Which
technique should the consultant use to identify traffic and PORTS used by applications?
a. NBAR
b. CDP
c. Netflow
d. Ciscoworks
30. What is the benefit of using a triangle topology on the core layer?
a. Utilization of multiple links to its destination
b. In a case of a link failure there is no need of routing recalculation.
I think A was the only sensible option here, but B was suggested in forum originally.
34. An engineer is planning branch WAN links to support unified communications. Which
DSCP value must be assigned to voice traffic?
a. EF
b. AF41
c. COS4
d. BE
A
35. During IP addressing design, which factor should be considered?
a. No of devices in each location
b. No of location available
c. Device capability
AB
36. Which command should you use to get [the most] information from a device? /not
clearly stated/
a. Show running
b. Show cdp
c. Show tech-support
37. Which format reflects that of the IPv6 global unicast address?
a. Global prefix (16 bits), subnet ID (16 bits), interface ID (64 bits)
b. Global prefix (48 bits), subnet ID (16 bits), interface ID (64 bits)
c. Global prefix (16 bits), subnet ID (64 bits), interface ID (48 bits)
d. Global prefix (16 bits), subnet ID (16 bits), interface ID (64 bits)
38. Which two techniques can you use to reduce the size of a network routing table?
(Choose two)
a. Implement VPN
b. Implement NAT
c. Route Summarization
d. Configure static routing
e. Utilize a default route
CE
39. You want to apply QoS to an Access Point which is connected to a switch, which
configuration should be used?
a. 802.1q trunk
40. An engineer wants to find all of the objects of a certain type available in the MIB. Which
kind of query must be performed?
a. object-level
b. tree-leve
c. class-level
d. subtree-level
I went for a. object level but original forum poster suggested c….
41. You have a server hosted on the server farm module. The server is configured to listen
to the TCP port 140. What NAT is best for this?
a. STATIC
b. Dynamic
c. Overload
42. Critical for availability remote office has a complete redundant link to WAN. What can
improve the availability of a remote office?
a. install dual power supply
b. Use different line cards
c. Increase the speed of WAN links from 100 Mb / s to 1 Gbps
d. Replace the wired connection with the optics
I went for A, dual PSU [the original forum poster said B, but I don’t agree]
43. Which two of the following are benefits of using a modular approach to network design?
(choose two)
a. Improves flexibility
b. Facilitates implementation
c. Lowers implementation costs
d. Improves customer participation in the design process
AB
44. How does the use of multiple areas in a link state routing protocol improve network
scalability?
a. Reduced network bandwidth
b. Permits partial table updates
c. Enables route summarization
d. Overcomes router hop limit
45. While designing a remote access VPN, a customer has requested three different levels of
access to be granted for administrator, employees, and partners. Which three access
policies must be configured for the three groups? (choose three)
a. Partners are centrally authenticated with limited network access controller with
ACLs.
b. Administrative users have local credentials with full access to the internal infrastructure
c. Administrative users are centrally authenticated with full access to the internal
infrastructure
d. Employees are centrally authenticated with limited network access controlled with ACLs
e. Employees are centrally authenticated with full access to the internal infrastructure
f. Partners are centrally authenticated with full access to the internal infrastructure
ACD
47. One step in characterizing an existing network involves obtaining information such as
network performance, availability, utilization and response times Which activity generates
this information?
a. Logical network mapping
b. Network health check
c. Address naming analysis
d. Wiring and media assessment
48. For which type of topology are modern fast-converging routing protocols designed?
a. Hub-and-spoke
b. Full mesh
c. Hierarchical
d. star
Answer is C: [I have corrected this from original forum poster, I found it in OCG]
49. Which two major campus design models does the Cisco Unified Wireless Network
support? (Choose two)
a. Local mode
b. Cisco FlexConnect
c. Deterministic
d. Dynamic
AB
50. A diagram and then a configuration of access list interface shown, then which device is
QoS trust boundary
a. IP Phone
b. Access switch
c. Core
d. Distribution
A
51. What is the advantage of multiple area LSP design? (Choose two)
a. Bandwidth optimization
b. Route summarization
C:Isolation of routing issues
52. Considering efficient utilization of IP Addressing, what mask you will use in a point to
point connection?
a. 255.255.252.0
b. 255.255.255.252
c. 255.255.255.254
53. Examples of questions (i remember only the idea, so the actual wording may differ):
Answer: C
54. What happens if an APIC is removed fron topology?
a The packets are send to the other controllers
b the fabric drops all packets
c the fabric continues to forward packets
d somthing really stupid
Answer: c
55. What type of files are most often used by APIs? (choose 2)
a html
b json
c txt
d xml
Answer: b,d
I chose b and d
Answer: d (/22) but note that other people’s answers suggest /19 but please check yourself.
http://jodies.de/ipcalc?host=192.168.0.1&mask1=22&mask2=25
60. I went for a and c. note that original forum poster answer was b,c (decreasing complexity
either)
Learn difference between Virtualisation, Device versus Network (see below from OCG)
61. When designing IP addressing schemes, which options are two benefits of implementing
hierarchical addressing? (Choose two)
CE
63. While preparing an overview of Internet facing DMZ for a customer, a consultant must
identify the functionality to be placed in the DMZ. Which two functionalities are best suited
for use in a DMZ? (Choose two.)
A. enterprise NTP source
B. web load balancer
C. remote access VPN termination
D. DDOS protection
E. web security appliance
C and E
64. An engineer is designing a Cisco Unfed Communications deployment for a customer with
small sites across the country. Which deployment model keeps the call control at the data
center of the primary site?
A. campus deployments
B. distributed deployment
C. cloud hybrid service deployment
D. multisite deployment model with centralized call processing
Answer = D
65. While designing the LAN core to distribution infrastructure for optimum convergence, the
engineer decides to use a topology using triangles. Which benefit to the organization is
true?
A. It allows device failures to occur without a recalculation of routes
B. It allows for a smaller quantity of devices in the core.
C. It utilizes multiple links to route traffic to its destination
D. It creates a topology that can grow with the organization
Answer = C
66. For which type of topology are modern fast-converging routing protocols designed?
A. star
B. hierarchical
C. full mesh
D. hub-and. Spoke
Just my own notes, Learn Hierarchical Network Design Section off to help with exam, there
seems to be a bit of extra focus on this topic in the Qs I
PART II from the poster CCDA-Rider 101qs and shirokuma
Answer : a
2. An organization is deciding what routing protocol to use throughout their network. What must be
considered if routing is to be performed at the access layer?
A. reduced scalability of the network when introducing a large number of switch blocks into the
routing table
B. centralized management of access control lists at the distribution layer
C. reliability when implementing routing over spanning-tree at the access layer
D. performance differences between core, distribution and access layer equipment
Answer: D
3. What are two reasons discontinuous IPv4 networks hinder scalability? (Choose two.)
A. routing table bloat
B. inability to utilize automatic summarization
C. insufficient IP addresses
D. slowed packet forwarding
E. delayed interface queuing
Answer: B ,C
4. What is the optimal device and location to fulfill these requirements? • provide early indication of
reconnaissance and scanning activities with blocking capabilities • require fewer interfaces to
inspect traffic to the DMZ and internal network
A. IPS inline outside of the firewall
B. IPS inline inside the firewall
C. Cisco IOS IPS on the border router
D. passive IPS connected to a SPAN port outside of the firewall
E. passive IPS connected to a SPAN port inside the firewall
Answer: A
5. which network element must be summarized in a multiarea OSPF deployment?
a. IP address
b. communities
c. number of routes
d. link state advertisements
Anwer : C
6. Which VPN tunneling technology supports IP multicast?
A. DMVPN spoke-to-spoke
B. Cisco Easy VPN
C. IPsec direct encapsulation spoke-to-spoke
D. IPsec direct encapsulation hub-and-spoke
Answer: A
7.which option contains the information required to learn the layout of network devices and the
links the connect them?
a. network baseline
b. wiring and media details
c. architectural and environmental constraints
d. network topology map
Answer : d
8. An engineer wants to ensure that the Spanning Tree topology appears free while redundant
switches are present. Which Layer2 technology must be used?
A. VPC
B. PaGP
C. LACP
D. OTV
Answer: A
10. which network size can provide six/25 subnets while wasting the smallest number of ip
addresses
a./22
b./19
c./23
d./16
11. A network engineer is tasked with summarizing the routes to a remote site. What is the optional
route statement to connect to the 192.168.101.0/24 and 192.168.102.0/24 networks across the
corporate WAN?
A. ip route 192.168.101.0 255.255.254.0
B. ip route 192.168.100.0 255.255.255.0
C. ip route 192.168.100.0 255.255.254.0
D. ip route 192.168.100.0 255.255.252.0
Answer: D
Answer: A
13. A data center is reaching its power and cooling capacity. What two virtualization technologies
can address the problem by directly reducing the number of physical devices? (Choose two.)
A. virtual switching systems
B. virtual device contexts
C. virtual servers
D. virtual routing and forwarding
E. virtual port channels
F. virtual LANs
Answer: B,C
14. Which option can use deep-packet examination to determine the specific nature of an attack?
A. stateful firewall
B. NetFlow collector
C. syslog server
D. network IPS
Answer: D
15. In which phase of Cisco Design Lifecycle would you identify shortfalls in the network operation
teams ability to support new technologies being introduced?
A. In the Validation stage of the Build phase
B. In the Deployment stage of the Build phase
C. In the Assessment stage of the Plane phase
D. In the Optimize stage of the Mange phase
Answer: C
16. which two methods are used to reduced the mesh links required between ibgp peers in the same
AS? (choose two)
a. route reflectors
b. local reference
c. confederations
d. community
e. atomic aggregate
Answer : a,c
17. Which mode is used to exclusively look for unauthorized access points?
A. monitor mode
B. sniffer mode
C. rogue detector mode
D. local mode
Answer : C
18. Which one of these statements is an example of how trust and identity management solutions
should be deployed in the enterprise campus network?
A. Authentication validation should be deployed as close to the data center as possible.
B. Use the principle of top-down privilege, which means that each subject should have the privileges
that are necessary to perform their defined tasks, as well as all the tasks for those roles below them.
C. Mixed ACL rules, using combinations of specific sources and destinations, should be applied as
close to the source as possible.
D. For ease of management, practice defense in isolation - security mechanisms should be in place
one time, in one place.
Answer: C
19. WAN backup over the Internet is often used to provide primary connection redundancy. Which is
the most important consideration when passing corporate traffic over the public Internet?
A. security
B. static versus dynamic routing
C. bandwidth
D. QoS
E. latency
Answer: A
20. DND-1
21. Characterizing an existing network requires gathering as much information about the network as
possible. Which of these choices describes the preferred order for the information-gathering
process?
A. site and network audits, traffic analysis, existing documentation and organizational input
B. existing documentation and organizational input, site and network audits, traffic analysis
C. traffic analysis, existing documentation and organizational input, site and network audits
D. site and network audits, existing documentation and organizational input, traffic analysis
Answer: B
23. You need to connect to a remote branch office via an Internet connection. The remote office
does not use Cisco equipment. This connection must be secure and must support OSPF. Which of the
following can be used to transport data to the branch office?
Answer: A
24. Which voice codec should you use in order to provide toll quality calls?
A. G.711
B. G.718
C. G.722
D. G.729
Answer: A
25. When evaluating network designs, what indicator demonstrates that the modular approach was
followed?
A. ability to scale
B. follows best practices
C. redundant connectivity
D. easy to deploy
Answer: A
26. A network engineer is following the Cisco enterprise architecture model. To which network layer
would a branch office connect to using a private WAN?
A. Enterprise Campus
B. Enterprise Edge
C. SP Edge Premise
D. Remote Module
Answer: D
27. A network engineer is following the three tiered Network Hierarchical Model. At which tier is
route summarization implemented?
A. core
B. distribution
C. backbone
D. access
Answer : A
29. A company has dark fiber between headquarters and its data center. It is presently configured as
a 10GbE connection. Network utilization shows high utilization on the connection. What technology
can be implemented to increase capacity without acquiring another circuit?
A. MPLS
B. DWDM
C. VPLS
D. DMVPN
Answer: B
30. When designing changes to an existing network, which two options are documented to
understand environmental constraints? (Choose two.)
A. utilization of network resources
B. heating and air conditioning
C. location of existing documentation
D. floor and rack space availability E. host naming conventions
Answer: BD
31. What are two benefits of the bottom-up design approach? (Choose two.)
A. incorporates organizational requirements
B. requires little or no notation of actual organizational requirements for implementation
C. provides a broader overview to the organization and the designer
D. facilitates design that is based on previous experience
E. allows a quick response to a design request
Answer: DE
32. How many switches can be combined into a single network element using VSS?
A. 6
B. 8
C. 2
D. 4
Answer: C
33. Based on best practices, which QoS profile should be configured on the WLAN of the WLC for
wireless VoIP communications?
A. Silver
B. Bronze
C. Gold
D. Platinum
Answer: D
Answer: A
Answer: A
37. While designing a remote access VPN, a customer has requested three different levels of access
to be granted for administrators, employees, and partners. Which three access policies must be
configured for the three groups? (Choose three.)
A. Partners are centrally authenticated with limited network access controlled with ACLs.
B. Administrative users have local credentials with full access to the internal infrastructure.
C. Administrative users are centrally authenticated with full access to the internal infrastructure.
D. Employees are centrally authenticated with limited network access controlled with ACLs.
E. Employees are centrally authenticated with full access to the internal infrastructure.
F. Partners are centrally authenticated with full access to the internal infrastructure.
Answer: ACD
38. Which two techniques can you use to reduce the size of a network routing table? (Choose two.)
A. Implement VPN
B. Route summarization
C. Implement NAT
D. Configure static routing
E. Utilize a default route
Answer: BE
39. Traditionally, the DMZ exists between which two locations? (Choose two.)
A. Building distribution
B. Building access
C. Corporate network
D. Metro Access
E. Internet
Answer: CE
40. An engineer wants to ensure that the Spanning Tree topology appears free while redundant
switches are present. Which Layer2 technology must be used?
A. VPC
B. PaGP
C. LACP
D. OTV
Answer: A
41. An engineer is planning branch WAN links to support unified communications. Which DSCP value
must be assigned to voice traffic?
A. EF
B. AF41
C. COS4
D. BE
Answer: A
Answer: D
43. Which value must you configure on a Microsoft DHCP server so that Cisco wireless APs can locate
the wireless controllers?
A. the Length value
B. the IP DHCP pool name
C. a vendor class identifier
D. the Type suboption code 0xe1
Answer: C
Answer: C
Answer: C
46. Which two major campus design models does the Cisco Unified Wireless Network support?
(Choose two.)
A. Cisco FlexConnect
B. N+N+1
C. Deterministic
D. Local Mode
E. Dynamic
Answer: AD
47. Which two protocols are classful routing protocols? (Choose two.)
A. RIPv2
B. RIPv1
C. IGRP
D. OSPF
E. BGP
Answer: BC
48. From which DNS record can a Cisco wireless AP, running Cisco WLC version 6.0 or later, retrieve
bootstrap information?
A. cisco-capwap-controller
B. the DNS A record of the controller hostname
C. the DHCP Option 43 name
D. cisco-lwapp-controller
Answer: A
49. When integrating services with Cisco ACI Service Graphs, which tool can be used for integrated
configuration management?
A. IOS
B. REST API
C. APIC CLI
D. HTML
Answer: B
A. DMVPN spoke-to-spoke
B. Cisco Easy VPN
C. IPsec direct encapsulation spoke-to-spoke
D. IPsec direct encapsulation hub-and-spoke
Answer: A
51. Which format reflects that of the IPv6 global unicast address?
A. global prefix (16 bits), subnet ID (16 bits), interface ID (64 bits)
B. global prefix (48 bits), subnet ID (16 bits), interface ID (64 bits)
C. global prefix (16 bits), subnet ID (64 bits), interface ID (48 bits)
D. global prefix (64 bits), subnet ID (48 bits), interface ID (16 bits)
Answer: B
52. Which layer in the Cisco Enterprise Architecture model is highly available, has fast convergence,
and should avoid packet manipulation?
A. campus distribution
B. enterprise data center
C. enterprise edge
D. campus access
E. campus core
F. remote access VPN
Answer: E
53. In the traditional hierarchical LAN design, which two statements about the distribution layer are
true? (Choose two.)
A. It uses Layer 2 switching only.
B. It typically is connected directly to the Internet.
C. It aggregates data from the access layer.
D. Policy is implemented at this layer.
E. It provides users direct access to the network.
Answer: CD
54. An engineer is designing a network that is divided into multiple areas and supports a mixed
vendor routing environment. Which interior gateway protocol must be selected?
A. EIGRP
B. OSPF
C. BGP
D. RIPv2
Answer: B
55. Which two benefits are realized by establishing virtualization in a campus network? (Choose
two.)
A. enables path isolation
B. enhances network agility
C. consolidates applications
D. enables unlimited scalability
E. reduces network bandwidth
Answer: AB
56. Which option is one of the methods that Cisco routers and switches can use to share information
between directly connected devices on a regular basis?
A. NetFlow
B. ARP
C. NHRP
D. CDP
Answer: D
57. What information should be utilized to identify network applications that are running on an
existing network infrastructure?
A. customer information
B. existing documentation
C. traffic analysis
D. external feedback
E. user feedback
Correct Answer: C
58. An engineer is designing a solution for multiple multihomed to establish router between one
another which design must be?
A. OSPF
B. iBGP
C. eBGP
D. EIGRP
Answer: C
59. Which application can provide AAA services for Cisco Devices?
A. IP SLA
B. Cisco TrustSec
C. TACACS+
D. Cisco FirePOWER
Answer: C
60. Consider the reservation of IP Addressing what mask you will use in a point to point connection
between two Buildings?
A. 255.255.252.0
B. 255.255.255.252
C. 255.255.255.254
Answer: B
61.
Answer : Top Down : 1) Gives the big picture to the organizations and designer
2) Incorporates organizational requirements
Botoom-up : 1) Enables a quick response to a design request
2) Facilitates designs based on previous experience
62.
65.
Answer : Layer 2 switching campus design: 1) uses fhrp for high availability 2) uses VSS to provide
redundancy 3) only one redundant connection between the access switch and the distribution
switch can be active.
Layer3 switching campus design :
1)Route filtering is configured on interface toward the access layer
2) inter-vlan communications are routed in the distribution layer.
66. Which three describe challenges that are faced when deploying an environment for teleworkers?
(Choose three.)
A. supporting a mix of technically knowledgeable and nontechnical users
B. simplifying router installation and configuration
C. verifying available power at employee's house for necessary equipment
D. avoiding situations where employees might use nonstandard hardware or configurations
E. reducing daily commuting time to main office location
F. providing access to FTP servers located in main office location
G. implementing leased line connectivity between main office and employee's home location
Answer: ABD
67. Which statement is true concerning the data center distribution (aggregation) layer design?
A. With Layer 3 at the aggregation layer, the physical loops in the topology must still be managed by
STP.
B. The boundary between Layer 2 and Layer 3 must reside in the multilayer switches, independent
of any other devices.
C. A mix of both Layer 2 and Layer 3 access is the most optimal.
D. In a small data center, the aggregation layer can connect directly to the campus core, exchanging
IP routes and MAC address tables.
Answer: C
69. An engineer must create a logical, isolated network for regulatory compliance. Which option is a
complex access control network virtualization scenario?
a. IT organization deploying two mpls networks with in their environment.
b. IT organization providing a quarantined area of network admission control posture validation.
c. IT organization providing an isolated guest network for wired and wireless clients
d. IT organization acting as a service provider creating logical separation for business units
Answer : B
70. which feature must be configured on a switch ports that connects to a Cisco wireless access
point when QOS is required?
a. Auto negotiation
b. Cisco discovery protocol
c. Dot1q trunk
d. Portfast
Answer : C
71. which option do you use to provide dynamic utilization of WAN links based on latency?
a. equal cost load balancing
b. unequal cost load balancing
c. Cisco performance routing
d. policy-based routing
Answer : C
72. high availability is required for a critical remote office to an enterprise. The office has already
deployed two redundant wan connections. Which action can be done to the edge router to improve
the availability of the remote office?
a. upgrade the uplinks from 100mb to 1g.
b. replace the fiber uplinks with copper
c. add dual power supplies
d. use modular line cards
Answer : C
73. which two types of files are the most common use in APIs for programmability?(choose two)
a. JSON
b. PERL
c. BASH
d. HTML
e.XML
Answer : A,E
74. A startup company wants to deploy the Cisco ip telephony solution. Which two actions are
appropriate design approaches? (choose two)
a. connect Cisco unified communications manager in the eternet switches of data center module
b. connect sip trunks for pstn connectivity to Ethernet switches of campus core layer
c. connect Cisco unified communication manager to the Ethernet switches of the campus core layer
d. connect ip phones to the Ethernet switch of data center module
e. connect user ip phones to the Ethernet switches of access layer
Answer : C,E
75. a large corporation wants to ensure high availability for its e-commerce web sites. Which routing
protocol must be used when connecting to multiple internet services providers?
a. static routes
b. EIGRP
c. BGP
d. OSPF
Answer : C
76. which two options should be considered when desiging an ospf network?
a. configure nonbackbone areas as stub areas.
b. design STP to mirror the ospf design
c. there is limit on available AS numbers
d. CDP should be incorporated
e. Ensure the address space is summarizable
Answer : A,E
77. Which Cisco technology can connect more than two switches so that they behave as one switch?
A. trunking
B. EtherChannel
C. StackWise
D. VSS
Answer: C
78. which designing a high availability network.which option can be classified as fault domain?
a. every tier in the network design
b. collapsed core in the network design
c. non redundant devices in the network design
d. single power supply devices in the network design
Answer : A
79. which two considerations are important when designing an ip address plan?
Answer : B,E
80. An engineer is designing a high availability branch network so that redundancy protocols must
support automatic load balancing which protocol satisfies this requirement?
a. HSRP
b. MLBP
c. VRPP
d. GLBP
Answer : D
81. Cisco unified wireless networks supports two campus design models centralized or local mode
and Cisco flexconnect. Which statement about the local mode design model is true?
a. it is recommended for remote-site deployments
b. the wireless lan controller and access points are co-located
c. it is recommended for sites with a local wan distribution layer
d. it is recommended for sites that use less than 50 APs.
Answer : C
82. which two options best describe the top-down design approach?(choose two)
a. organizational requirements should not be included.
b. the design will meet both current and future requirements
c. the approach begins with the needs of the organization
d. the approach begins with the physical layer of the osi model
e. the design is based on previous experience and allows for a quick solution.
Answer : B,C
83. A small business owner has 200 staff members that occupy two floors of a building. The owner
wants to reduce the network infrastructure costs without losing two much network resiliency and
scalability. Which option meets these requirements ?
a. combine access and distribution layers into one layer and keep all others layers’
b. exclude and distribution layer switches and connect everything to redundant core switches
c. combine access and core layers in to one layer and keeping all the other layers
d. combine core and distribution layers into one layer and keep all the other layers
Answer : D
Answer: AB
Answer : C
Answer : C
87. which two options are benefits of a modular network design? ( choose two)
a. higher scalability
b. ease of troubleshooting
c. endto end security
d. intelligent network services
e. improved fault isolation
Answer : A,E
Answer: A
89.An engineer is designing a private WAN infrastructure to support an organization and must
support quality of service and multicast functionality to the remote sites. Which technology supports
this requirement?
a. MPLS
b. DMVPN
c. SSL VPN
d. IPSEC VPN
Answer : A
90. which sip feature allows an access port to bypass the learning and listening states?
a. root guard
b. loop guard
c. portfast
d. bpdu guard
Answer : C
91. Which two design decisions can improve network resiliency? (Choose two.)
A. implement redundant topology
B. implement serial device connections
C. increase data plane bandwidth
D. implement redundant links
E. reduce network size
Answer: AD
92. which two processes are included in the build phase of the Cisco design lifecycle?(choose two)
a. validation
b. assessment
c. analysis
d. deployment
e. design
Answer : A,D
93. which two methods are used to reduce the mesh links required between ibgp peers in the same
AS?(choose two)
a. local preference
b. route reflectors
c. confederations
d. community
e. atomic aggregate
Answer : B,C
94. Refer to the exhibit ? which result is true if a client computers connected through the interface
named internal and attempts to connect to an operational tcp/443 based website?
Answer : A
95. in a new dmvpn deployment phase 1 completes successfully however phase 2 experience issues.
Which troubleshooting step is valid in this situation?
Answer : D
96. traditionally the dmz exists between which two locations?(choose two)
a. corporate network
b. building access
c. building distribution
d.metro access
e. internet
Answer : A,E
Answer : B
98. In an EAP-enabled WLAN, which component sends the EAP identity request?
a. access point
b. wireless client
c. wlan controller
d. ACS server
Answer : C
99. at which layer of the network should you perform traffic filtering and QOS classification?
a. core
b. application
c. Distribution
d. session
Answer : C
Answer : D
Canary
Q. Site uses Cisco Unified Communications Manager, remote sites have 500ms latency limitations
delivered via Satellite connections. What kind of issues would be present with this deployment?
A. No significant issues
B. minimal service problems and overlap
C. significant problems and overlap
D. phones would not register"
B.
2) Something about Cisco IPT call-processing deployment ; Single-site deployment, Multisite WAN
with centralized call processing, Multisite WAN with distributed call processing
5) Cisco device that support Device Contexts. Below is from OCG. Better memorize it
*in Exam question, I got ASA and Nexus 7000 (chose them)
6) Company ABC has intermittent problems registering remote-site IP phones over the WAN with
Cisco Unified CallManager at headquarters. The company hires a network consultant to help
implement QoS in its network. Which technique should the consultant use to identify traffic and
applications that traverse the network?
A. priority queuing
B. RSVP
C. NBAR
D. policing
Answer = C.
7)In VRRP /FHRP/ if you want the master switch to take over and continue its master role after
coming up from failure which option should be used
a. Interface tracking
b. Priority
c. Preemption
I chose C, Preemption – this checks out with VRRP I found within Cisco Press.