Q61. Refer to the exhibit. On which router should you configure redistribution? 

A. Router 1 

B. Router 2 

C. Router 3 

D. Router 4 

E. Router 5 

Answer:


Q62. Which two are types of network virtualization? (Choose two.) 

A. VSS: Virtual Switching System 

B. VRF: virtual routing and forwarding 

C. VCI: virtual channel identifier 

D. VLSM: variable length subnet masking 

E. VM: virtual machine 

F. VMP: Virtual Memory Pool 

Answer: A,B 

Explanation: 

Network virtualization encompasses logical isolated network segments that share the same 

physical infrastructure. Each segment operates independently and is logically separate 

from the other segments. Each network segment appears with its own privacy, security, 

independent set of policies, QoS levels, and independent routing paths. 

Here are some examples of network virtualization technologies: 

VLAN: Virtual local-area network 

VSAN: Virtual storage-area network 

VRF: Virtual routing and forwarding 

VPN: Virtual private network 

VPC: Virtual Port Channel 


Q63. Which one of these statements describes why, from a design perspective, a managed VPN approach for enterprise teleworkers is most effective? 

A. A managed VPN solution uses a cost-effective, on-demand VPN tunnel back to the enterprise. 

B. This solution supports all teleworkers who do not require voice or video. 

C. This architecture provides centralized management where the enterprise can apply security policies and push configurations. 

D. It provides complete flexibility for remote access through a wireless hotspot or a guest network at a hotel, in addition to a home office. 

Answer:


Q64. Which two methods are used to reduce the mesh links required between iBGP peers in the same AS? (Choose two.) 

A. community 

B. router reflectors 

C. local preference 

D. confederations 

E. atomic aggregate 

F. MED 

Answer: B,D 


Q65. What characteristic separates link state routing protocols from a distance vector? 

A. creates a topological view of the entire network 

B. path calculation utilizes a more granular metric 

C. does not scale well for large networks 

D. constantly shares link state updates throughout the topology 

Answer:


Q66. Characterizing an existing network requires gathering as much information about the network as possible. Which of these choices describes the preferred order for the information-gathering process? 

A. site and network audits, traffic analysis, existing documentation and organizational input 

B. existing documentation and organizational input, site and network audits, traffic analysis 

C. traffic analysis, existing documentation and organizational input, site and network audits 

D. site and network audits, existing documentation and organizational input, traffic analysis 

Answer:

Explanation: 

This section describes the steps necessary to characterize the existing network infrastructure and all sites. This process requires three steps: 

Step 1. Gather existing documentation about the network, and query the organization to discover additional information. Organization input, a network audit, and traffic analysis provide the key information you need. (Note that existing documentation may be inaccurate.) 

Step 2. Perform a network audit that adds detail to the description of the network. If possible, use traffic-analysis information to augment organizational input when you are describing the applications and protocols used in the network. 

Step 3. Based on your network characterization, write a summary report that describes the health of the network. With this information, you can propose hardware and software upgrades to support the network requirements and the organizational requirements. 


Q67. Which Cisco device has the sole function at looking at threat detection and mitigation at the Enterprise edge? 

A. Cisco IOS router 

B. Cisco ASA 

C. Cisco Catalyst FWSM 

D. Cisco IPS 

Answer:


Q68. DRAG DROP 

Answer: 


Q69. Which three service categories are supported by an ISR? (Choose three.) 

A. voice 

B. security 

C. data 

D. Internet 

E. storage 

F. satellite 

Answer: A,B,C 


Q70. What are the three primary functions of the distribution layer of the campus network design hierarchy? (Choose three.) 

A. provide end-user connectivity 

B. provide high speed transport 

C. provide QoS services 

D. enforce security policies 

E. provide WAN connections 

F. connect access devices to the core backbone 

Answer: C,D,F