Q11. When a multiprotocol environment is designed to have several routers redistribute among the routing domains, how can routing loops be avoided?
A. by using the AS-PATH attribute
B. by using route tags
C. by activating split horizon
D. by implementing spanning tree
Answer: B
Q12. You are designing an 802.11 wireless network to include a controller as a central configuration point and access points across several remote sites. Which two aspects will manage the flow of the traffic to meet these design considerations? (Choose two.)
A. WLAN local switching with VLAN mapping requires that VLAN ID that is mapped on the AP to match a dynamic interface that is configured on the wireless LAN controller.
B. Layer 3 roaming is not supported for locally switched WLANs.
C. The 802.1x authentication for a client associated to an AP on a locally switched WLAN is always handled at the wireless LAN controller side.
D. The access point can receive multicast traffic in the form of multicast packets from the WLC.
E. WLAN access lists can be applied only to centrally switched WLANs.
Answer: BE
Q13. A Service Provider is designing a solution for a managed CE service to a number of local customers using a single CE platform and wants to have logical separation on the CE platform using Virtual Routing and Forwarding (VRF) based on IP address ranges or packet length. Which is the most scalable solution to provide this type of VRF Selection process on the CE edge device?
A. Static Routes for Route Leaking
B. Policy Based Routing
C. Multi-Protocol BGP
D. OSPF per VRF Instance
Answer: B
Q14. On a VoIP solution design, which option shows one-way latency, packet loss, and jitter measurements that ensure acceptable voice quality?
A. Latency: 110 ms Packet loss: 1% Jitter: 40 ms
B. Latency: 130 ms Packet loss: 0.5% Jitter: 30 ms
C. Latency: 150 ms Packet loss: 1.25% Jitter: 20 ms
D. Latency: 170 ms Packet loss: 0.75% Jitter: 10 ms
Answer: B
Q15. You have been hired by Acme Corporation to evaluate their existing network and determine if the current network design is secure enough to prevent man-in-the-middle attacks. When evaluating the network, which switch security option should you investigate to ensure that authorized ARP responses take place according to known IP-to-MAC address mapping?
A. ARP rate limiting
B. DHCP snooping
C. Dynamic ARP Inspections
D. IP Source Guard
Answer: C
Q16. As part of a new network design, you are helping the Network Management Team to develop a proactive report to identify places in the network where problems may happen. The network management tool can poll the network devices only via SNMP GET operations. Which two threshold-crossing metrics should you include in this report? (Choose two.)
A. packet loss
B. CPU utilization
C. heat dissipation
D. IP reachability
E. energy consumption
F. link bandwidth utilization
Answer: BF
Q17. Refer to the exhibit.
Which two options provide the best loop protection in this topology, regardless of a bridged domain configuration? (Choose two.)
A. PVRSTP on all switches
B. REP on all switches
C. MST on all switches
D. BPDU guard on Switch A and Switch D
E. 8032 on ring A-B-C-D
Answer: BE
Q18. Which restriction prevents a designer from using a GDOI-based VPN to secure traffic that traverses the Internet?
A. Enterprise host IP addresses are typically not routable.
B. GDOI is less secure than traditional IPsec.
C. Network address translation functions interfere with tunnel header preservation.
D. The use of public addresses is not supported with GDOI.
Answer: C
Q19. Your design client has requested that you ensure that the client devices are not dynamically configured with incorrect DNS information. When finalizing the network design, which security option must be configured on the switches?
A. IGMP snooping
B. DHCP snooping
C. root guard
D. DNS snooping
Answer: B
Q20. A network design includes a long signaling delay in notifying the Layer 3 control plane that an interface has failed. Which two of these actions would reduce that delay? (Choose two.)
A. Enable lower data link layer recovery systems to have an opportunity to restore the interface.
B. Increase the notification of interface flaps.
C. Reduce the time for the network to reconverge.
D. Increase network stability.
Answer: AD