Which 2 two capabilities of Netflow accounting assist designers with network planning?
the calculation of packet and byte counts of network traffic
the monitoring of user network utilization
What is the benefit of deploying a gatekeeper in an H.323 IP telephony network?
reduces configuration complexity by centralizing the dial plan
An organization needs a WAN Transport technology that meets these criteria:
- Has low initial cost
- Provides low-to-medium BW
- Has medium-to-high- latency and jitter
Which technology would you suggest?
Which Cisco security offers protection against "day zero" attacks?
Cisco Security Agent
Which type of trunk is required in order to connect a fax machine to a PBX?
Foreign exchange station
Which H.323 protocol controls call setup between endpoints?
Which two of these represent a best practice implementation of a split MAC LWAPP deployment in a cisco unified wireless network?
each wireless client authentication type maps to a unique SSID which in turn maps to a unique VLAN
802.1Q trunking extends from the wired infrastructure to a wireless LAN controller for translation into SSID
Which two statements best describe intradomain route summarization?
EIGRP and OSPF must be manually configured to summarize at non-classful boundaries
EIGRP and RIP automatically summarize at classful network boundaries
Which two VoIP characteristics are affected most by codec choice?
bandwidth required for voice calls
A network design document is being prepared for a customer. which three network design elements must be included?
proof of concept
Which of these accurately describes dial backup routing?
a router initiates the dial backup link when a failure is detected on the primary link
Which statement correctly describes queing in environments supporting teleworkers?
queuing occurs on the outbound interface
Which two techniques can reduce voice packet transfer delay across a link of less than 512 kbps
increase link bandwidth
Your company uses OSPF for internal routing. The company will be connected to a Vendor A via a single dedicated link and to Vendor B via redundant dedicated link. Both vendors also use OSPF for internal routing. Which of the following deployments describes the best intra-domain routing practice in this situation?
use static routes to reach vendorA and EBGP to reach vendorB
Which statement can a network designer use to describe route summarization to an IT manager
it is the grouping of multiple continuous networks and advertising as one large network
Cisco SONA architecture layer is described as follows:
The layers IT resources include servers, storage, and clients. The layer represents how resources exist across the network.
The customer objective for the layer is to have anywhere/ anytime connectivity. Which Cisco SONA architecture layer is being described?
Which information should a network summary report identify?
Given VoIP with these attributes:
WAN BW: 769 Kbps
Packet Header: 6 bytes
Payload: 160 bytes
How many calls can be made?
What are three valid methods of gathering information about and existing data network?
perform traffic analysis
use reports that analyze the metrics of the customers existing network
perform a network audit to gather more detail about thenetwork
Which two of these are required for wireless client mobility deployment when using a cisco unified wireless network?
matching mobility group name
In the cisco branch office design, what categorizes an office as large?
between 100 and 200 users and a three tier design
A company is designing a worldwide IPv6 network with duplicated file servers at multiple locations. Each file server contains identical reference information.
Which IPv6 address type would be used to allow each end station to send a request to the nearest files server using the same destination address, regardless of the location of that end station?
When designing using the Cisco Enterprise Architecture, which enterprise campus layer do the enterprise edge and enterprise WAN modules establish their connections?
Which 3 of these best describe the best practice for Cisco wireless outdoor mesh network deployment??
mesh hop counts of 4 or fewer
client access via 802.11b/g and backhaul with 802.11a
RAP implemented with 20-32 MAP nodes
The cisco data center network architecture comprises which 2 cisco SONA layers?
Which 2 of these scalability benefits of designing a network that utilizes VPNs??
reduces dial infrastructure expenditures
reduces the number of physical connections
You are designing a small branch office that requires these attributes:
support of 60 users
the growth capacity to add another 15 users soon
higher bandwidth between layer 2 switching and routing to the WAN
Which branch office topology or technology must be used?
Western associated news agency recently acquired a large news organization with several sites, which will allow it to expand worldwide markets. The new aquisition includes these connectivity technologies:
From a layer 1 viewpoint, which enterprise edge module will be most affected?
Which 2 implementation plan principles best describe how to deal with potential failures?
a test should be included at every step
a detailed rollback procedure for each implementation step
which of these is the next step after the design phase in the PPDIOO process??
develop implementation plan in as much detail as possible
You are designing IPv6 into and existing IPv4 network. which 2 strategies can you use to allow both address schemes to coexist, thus facilitating migration?
translate on protocol into another
encapsulate IPv6 packets within IPv4 packets
A network is being designed to meet the requirements listed within the enterprise network:
all routers are cusco 3800 series running the latest cisco ios release
the fastest convergence time possible is required
unequal cost load-balancing is required
For internet connections:
a single link is used to connect to a single ISP
Which 2 routing protocols should be used?
use static (default) routing between the enterprise and the ISP
use EIGRP as the IGP within the enterprise
which 2 statements best describe Cisco wireless guest access in a cisco unified wireless network?
guest tunnels have limitations on which wireless controllers can terminate the tunnel
dedicated guest access in the DMZ extends from the origination to the termination controllers without dedicated guest VLANS
for which technology is the IPsec required for site to site enterprise WAN/MAN architecture
what does cisco recommend as the foundation of any deployed security solution?
corporate secutiy policy
what is the administrative distance if eBGP routes??
which name is for the cisco product that provide centralized, policy based security management?
which statement represents a likely starting point for planning network changes?/
determining application requirements
what does IGMP stands for?
Internet Group Management Protocol
ISDN is short for integrated service digital network. under what category of WAN technologies does the ISDN belong?
as a network engineer can you tel me accounting management on a network management system allows a network manager to perform which function?
charge back to users for network resources
which address type is 188.8.131.52??
what is the length of the key used with Triple Data encryption standard 3DES?
a wireless LAN or WLAN is a wireless local area network which is linking of two or more computers or devices without using wires. how are WLANs identifies?
service set identifier (SSID)
Observe the following options, whiat is the hierarcy for the IPv6 aggregatable addresses?
Public, Site, interface
which IGP is a common choise to EIGRP and OSPF as a routing protocal for large networks?
Which type of routing protocol is classful?
IGRP and RIPv1
which attack type would you expect on segments that have many servers for some well-known applications?
Application layer attacks
Which type of communicating device compose of RMON architecture?
which FCAPS function include finding network problems that reduce availability?
what is the name of the organization that is in charge of creating the FCAPS architecture?
Define some of the activitys, tools, and techniques used in todays network design process
analyze network traffic
filtering incoming network traffice
what is the remote monitoring agent in the RMON architecture called?
what type of DSL does residential service use?
what item is not part of the process recommended by cisco for WAN designs?
configure deployed services
in the IS-IS network, what router does the backup designated router (BDR) form adjacencies to?
There is no BDR in IS-IS
What does the compressed real time trandsport protocol (crtp) compress?
RTP, user datagram protocol (UDP) and IP headers
Which mechanism will be often used by service providers to define their service offerings and to differentiate their service from their competitors?
What is the virtual information store used withing SNMP called?
which standard language will be used by SNMP to defines the device information to be stored?
which WAN scenario might be approprate for queuing solutions?
a WAN connection features occasional periods of congestion, and data transfers have occasionally suffered as a result
your boss is interested in a wireless WAN solution which provides higher bandwidth than point to multipoint (p2mp) wireless. which description is correct?
p2p wireless connections can provide up to 44Mbps raw bandwidth
Examine the following protocols, which 2 are used for IP security?
authentication header (AH) and Encapsulating Security Payload (ESP)
what is SNMP?
Simple network management protocol
when building global network business, which 3 principles should be used?
Customer focus, continuous standardization, and core versus context
for the following items, which component of the Cisco Works product allows a network administrator to define the mange service levels?
service level manager (SLM)
NAT-PT is an IPv6-IPv4 translation mechanism. what is NAT-PT?
network address translation protocol translation; tranlates between IPv4 and IPv6 addresses
What cisco router configuration component does an implementer use to create a floating static route?
Which cisco proprietary protocol will be used in LAN switches to control multicast traffic at the data link layer withing a LAN switch?
Cisco group management protocol (CGMP)
A common response to an attack by this device can be either to send an alert or to take corrective action.
What is the device?
Intrusion-detection system (IDS)
how many more bits does IPv6 use for adresses than IPv4?
Which protocol will be used to exchange IP routes between autonomous systems?
what does the cisco security architecture caled SAFE stand for?
security architecture for enterprise
you are a network technician, can you tel me how may IP addresses are available for hosts in the subnet 184.108.40.206/27
which 2 encryption transforms will be used by both ESP and AH for authentication?
HMAC-MD5 or Hash Authentication Code-Secure Hash algorithm-1 ( HMAC-SHA-1)
For the following options, which emerging WAN technology used DSL coding and digital modulation techniques with ethernet?
Long-reach ethernet (LRE)
what is SLC?
service level contracts
wat does ODR stand for?
observe the following options, in which section of the network document does cisco recomment a discussion of performance, scalability, capacity, security, and traffic needs?
In telephony, the local loop is the physical link or circuit. where is the local loop located?
between the phone and the central office (CO) switch
which advantage is of security systems that are part of the cisco ecosystem?
various partners as well as supporting products increase the effectiveness of the security system
what is ASBR short for?
autonomous system boundary router
area border router (ABR) is defined by which protocol?
Which queuing mechanism establishes four interface output queues that will be used for traffic scheduling?
priority queuing (PQ)
which option is not valid for using the public internet as a backup WAN medium?
for the following items, which is an SP edge module in the enterprise composite network model?
public switched telephone network (PSTN) service
which method will be used to secure a network against man-in-the-middle attack?
what is important for the top down design concept?
engagement of the top executives during the design process
which on of the following QoS mechanisms is recommended for VoIP networks?
low- latency queuing (LLQ)
In which layer of the IOS model does real time transport protocol (RTP) operate
Developing a network design according to the layers such as core and distribution is an example of which type of design methodology?
Hierarchical structured design
Which consideration is the most important for the network designer when considering IP routing?
You want to gatehr as much detail as possible during a network audit, to include data, time stamping across a large number of interfaces, customized according to interface, with a minimal impact on the network devices themselves. which tool would you use to meet these requirements?
Data quirk is a web based medical transcription company for exotic animal veterians. The company recently added a third ISP for international business. They are organizing the enterprise network into a fully operational enterprise edge.
Which two modules will the three ISP's be directly related?
Which 2 of these practices are considered to be the best practices when designing the access layer for the enterprise campus?
always use spanning tree protocol; preferred is Rapid PVST+
Use VTP transparent mode to decrease the potential for operational error
Which deterministic wireless LAN controller redundancy design, the different options available to the designer have their own strengths. Which one of these statements is an ex of such a strength?
N+N redundancy configuration allows logically grouping access points on controllers to minimize
Which of these statements is true concerning the data center access layer design?
With layer 2 access, the default gateways for the server can be configured at the access or aggregation layer
Which of these statements should the designer keep in mind when considering the advanced routing features?
The hierarchical flexibility of IPv6 addressing avoids the requirements of routing traffic using aggregation
which 2 statements about designing the data center access layer are correct?
layer 2 connectivity is primarily implemented in the access layer
layer 2 clustering implementation requires servers to be layer 2 adjacent
which IPv6 feature enables routing to distribute connection requests to the nearest content server?
Which of these statements is true about addressing redundancy within the WAN environment?
The failure of a single SONET/SDH link or network element does not lead to failure of the entire network
Which one of these statements is tru concerning the enterprise data center?
the data center designs will differe substantially depending on whether the location is on campus or remote
Which cisco security management solution provides the means to identify, isolate, and counter security threats to the network?
Cisco security monitoring, analysis, and response system
A global corporation as an international network with the following characteristics:
10,000 + routeres
high traffic volumes with business partners and customers
Which statement best describes what a flexible IPv6 strategy wouldlook like for this corporation?
both host and routers would run dual stack
Which of these is the best routing deployment for a single dedicated link to an ISP for internet access?
In terms of remote office design, which one of these statements is a characteristic only of a small remote office ( up to 50 users) and not of medium or remote offices?
a collapsed access and distribution layer is required
Which 2 statements about the data center aggregation layer are correct?
layer 4 through 7 services are provided in that layer
that layer is critical point for the application services
According to cisco, which 4 improvements are the main benefits of the PPDIOO life cycles approach to network design?
improved business agility
increased network availability
faster access to applications and services
lower total cost of ownership
With respect to IPv6 addressing, from a design perspective, which statement is it important to keep in mind?
An IPv6 router will not forward packets from one link to other links if the packet has either a link-local source or a link-local destination
when designing the infrastructure protection portion for the enterprise edge, which of these solutions would be most appropriate solution to consider?
what is a primary consideration when choosing a routed network design over a traditional campus network design?
layer 3 service support at the network edge
which 2 statements best describe the OSPF deployment?
ABR requires manual configuration for clasful network summarization
external routes are propagated into autonomous system from regular areas or NSSA via ASBR
A large enterprise requires sensitive information to be transmitted over a public infrastructure. It requires confidentiality, integrity, and authenticity. Which security solution best meets these requirements?
there are a number of advantages to using virtualization within the data center module. Which of the following two are examples of these advantages?
virtualization consolidates many low performance devices into a few high performance devices, providing a more efficient utilization of hardware and increasing the price/ performance ratio
virtualization compartmentalizes a single device into a few high performance devices, providing a more efficient utilization of hardware and increasing the price/ performance ratio
When selecting which hardware switches to use throughout an enterprise campus switched network, which consideration is NOT relevant?
the number of shared media segments
layer 2 switching is exclusively used in which enterprise campus module layer?
which of these statements describes why, from a design perspective, a managed VPN approach for enterprise teleworkers is most effective?
this architecture provides centralized management where the enterprise can apply security policies and push configurations
which one of these statements is true when considering the design of voice and video services for the enterprise campus network?
access layer switches should support 802.1q trunking and 802.1p for layer 2 CoS packet marking
Which statement describes the recommended deployments of IPv4 addressing in the cisco network architecture for the enterprise?
private addressing throughout with public addressing in the internet connectivity, E- commerce, and remote access and VPN modules
For which network scenario is static routing most appropriate?
When considering the 3 VoIP design models single site, centralized multisite, and distributed myltisite which question below would help eliminate one of these questions?
are there users whose only enterprise access is via a QoS- enabled WAN
Which aspect would most likely be found in the draft design document?
the level of redundancy or high availability that currently exists or is required in the network
your company's cisco routers are operating with EIGRP. you need to join networks with an acquisition's heterogeneous routers at 3 sites, operating with EIGRP and OSPF. which describes the best practice for routing protocol deployment?
apply two-way redistribution at each location with a route filter at each location
when considering the enterprise campus design, which network application category most influences the network design?
which two link state routing protocols support IPv6 routing?
When designing the wireless portion of an enterprise campus network, which one of these statements should serve as a strict guideline?
wireless controllers should be centralized in the core layer
When designing using the cisco enterprise architecture, in which enterprise campus layer does the remote access and VPN module establish its connection?
which one of these statements is an example of how trust and identity management solutions should be deployed in the enterprise campus network?
Mixed ACL rules, using combinations of specific sources and destination, should be applied as close to the source as possible
which of these is the equation used to derive 64 Kbps bit rate?
2x4 kHz x 8-bit code words
which one of these statements best describes the challenge of the designer when dealing with IP routing?
Effective scalability with OSPF requires the designer to pay strict attention to the hierarchical network
when designing the identity and access control portions for the enterprise campus network, which of these solutions would be the most appropriate solution to consider?
which 3 terms describe the primary functions of the distribution layer of the campus network design hierarcy?
provides QoS services
enforces security policies
connects access devices to the core backbone
which codec does cisco recommend for WAN link?
the enterprise campus core layer has requirments that are unique from the distribution and access layers. which of the following is true about the core layer?
the campus core layer is optional
which one of these statements is true concerning the data center distribution (aggregation) layer design?
a mix of both layer 2 and layer 3 access is sometimes the most optimal
when designing the treat detection and mitigation portion for the enterprise data center network, which of the following would be the most appropriate solution to consider?
Cisco security MARS
A cisco self defending network has been installed, but DoS attacks are still being directed at e- commerce host. the connection rate at the internet firewall was limited, but the problem persist. What more can be done?
Install all relevant operating system patches
RST corporation is planning to upgrade its current network. the chief technology officer has supplied a topology diagram and an IP addressing scheme of the current network during an interview. RST has been growing at about 20% per year. It has been difficult to maintain customer support at a satisfactory level. Therefore, the RST board has met with and directed the cheif technology officer to look into network improvements.
Which 2 items are most relevant in documenting RST's business requirements?
improved customer support requirements
projected growth estimate
Which of these best describe the implementation of a WAN Backup design over the internet?
best effort method
designed as an alternative to a failed WAN connection
Which 2 design criteria require VLANs in a proposed solution?
security between departments
the segmenting of broadcast domains
Which 2 methods are used to enhance VPN performance on Cisco ISRs?
high performance VPN encryption AIM
built-in hardware-based encryption acceleration
Which three factors best justify WAN link redundancy between geographically dispersed sites?
important traffic flow
lack of speed
Which three peices of information should be documented for each phase in a design implementation plan?
design document reference
the topology map in the draft design document should cover which two layers of the OSI model?
In a cisco CatOS switch, what is the recommended practice when configuring switch- to switch intercommunication to carry multiple VLANs for dynamic trunk protocol
on to on_negotiate
what are the two most likely driving forces motivating businesses to integrate voice and data into converged networks?
data, voice, and video cannot converge on their current PTSN structures.
WAN costs can be reduced by migrating to converged networks
A lightweight access point is added to a working network. which sequence will it use to associate itself with a wireless LAN controller?
primary, secondary, tertiary, master, greatest AP capacity
Which 3 mechanisms are required to deploy QoS on an IP WAN?
link efficiency techniques
Which two statements best describe the implementation of Overlay VPN connectivity for remote access in the enterprise edge WAN module?
Bandwidth is provisioned on a site-to-site basis
optimum routing between customer sites requires a full mesh of vertical circuits
A manufacturing company has decided to add a website to enhance sales. The web servers in the E-commerce module must be accessible without compromising network security. Which two design recommendations can be made to meet these requirements?
use intrusion detection on the e-commerce server farm
place e commerce servers and application servers on isolated LANs
After a period of rapid growth, Floczar Boats is seeking better network management tools. Managers have developed this needs list:
move from static to dynamic device informatio
gain information to assist in long term trend analysis
concentrate on layer 4 monitoring
A very large organization has received it IPv6 address range from its internet service provider and intends to use only IPv6 addresses internally. Employees will access the internet using port address translation. what is a requirement for their DSN servers?
Their DSN servers need to support both IPv4 and IPv6
Which two statements represent advantages that the top-down network design process has over the bottom-up network design process?
is able to provide the big picture
provides a design for current and future development
Which two statements of IPv6 statements are true?
two colons (::) are used to represent the hexadecimal fields of zeros
a single interface will have multiple IPv6 addresses of different types
which technology can ensure data confidentiality, data integrity and authentication across a public IP network?
Which statement best describes call admission control?
it protects voice from voice
which three sources does a network designer use to collect information for characterizing an existing network?
Which of the following cisco router services performs network traffic analysis to assist in documenting a customer's existing network
what statement identifies a benefit of top-down network design plan?
incorporates customer organization requirements
lightweight access points are being deployed in remote locations where others are already operational. the new access points are in a seperate IP subnet from the wireless controller. OTAP has not been enabled at any locations. Which two methods can the AP use to locate a wireless controller?
Which cisco security solution can quarantine a prevent non-compliant end stations from accessing the network until they achieve security policy compliance?
Network admission control
Network design includes private addressing, but there is also a need for two or three network devices to each be assigned a unique public address so they can be accessed from the internet. Which technique will satisfy the requirement?
A cisco security mechanism has the following attributes:
it a sensor appliance
it searches for potential attacks by capturing an analyzing traffic
it is a purpose built device
it is installed passively
it introduces no delay or overhead
which cisco security mechanism is this?
Which three types of WAN topologies can be deployed in the Cisco enterprise architecture enterprise edge WAN module?
Which statement accurately describes one difference between a small office and medium office topology?
medium offices use external access switches to support LAN connectivity
a customer has the following enterprise campus design requirements:
at least 10 Gbps of bandwidth
network runs of up to 40km
no concern for transmission medium cost
which transmission medium should you reccomend to this customer?
you design a network with the following network addresses:
which route address is bet summary of these network addresses?
which two of the following statements represent a preferred wireless LWAPP implementation?
varify open ports for:
layer 2 LWAPP on ethertype OxBBBB
layer 3 LWAPP on UDP 12222 and UDP 12223
use of layer 3 LWAPP is preferred over Layer 2 LWAPP
which statement is true about WANs?
WANs typically encompass broad geographic areas
which item is not a true advantage of the full-mesh topology?
central hub represents a single point of failure in the network
which IPv4 field are the precedence bits located in?
which hierarchical layer has functions such as high availability, port security, and rate limiting?
with which of the following capabilities does RIPv2 improve RIPv1?
if the metric is bandwidth, the path with the highest bandwidth is selected
where do you put the DNS and DHCP on enterprise model? select two
enterprise campus server farm module
Which two of these are functions of an access point in a Split MAC Network Architecture?
MAC layer encryption or decryption
process probe responce
Data link switching is typically used in which enterprise campus module layer?
which three of these are components of the North American Numbering Plan?
numbering plan area
Which two statements about the enterprise data center aggregation submodule are correct?
it provides layer4-7 services
it is the critical point of control and application services
which network management protocol allows a network device to have vendor specific objects for management?
which two solutions are parts of the Cisco Security Management Suite?
cisco security MARS
when monitoring voice traffic on a converged network, which are the three most important QoS characteristics to pay attention to?
an internal network has servers with private IPv4 addresses that much be visible from the public network. which kind of address translation should be used to ensure this?
one-to-one translation (static NAt)
Which two of these are the most accurate characteristics of EIGRP deployment?
provides routing for IPv4, IPv6, Appletalk, and IPX
provides quick convergence through neighbor relationships and topology backup routes
which of the following is a modular component within the cisco enterprise campus module in the cisco enterprise architecture framework?
a company is implementing an identity management solution with these characteristics:
existing cisco ACS 4.0
cisco catlyst switches
minimal added investments
which cisco trust and identity solution would you recommend?
which two design methodology steps relate, at least in part, to the implement phase of the PPDIOO process?
verifying the networkk
which H.323 protocol monitors calls for factors such as packet counts, packet loss, and arrical jitter?
Tje BodMech online fitness organization specializes in creating fitness plans for senior citizens. The company recently added a health-products retail inventory. which e commerce module device will allow customers to interact with the company and purchase products?
Which two of the following are benefits of using a modular approach to network design?
which statement describes the recommended deployment and DNS and DHCP servers in the cisco enterprise architecture model?
Place the DHCP and DNS servers in the enterprise campus server farm layer and enterprise branch
which two routing protocols usually converge the most quickly?
which two wireless attributes should be considered during a wireless site survey procedure?
when designing using the cisco enterprise architecture, in which enterprise campus layer does the enterprise teleworker module establish its connection?
which three are layers in the Cisco SONA architecture?
what is the benefit of VLSM?
reduces routing table size by using manual rout summarization
you are performing an audit of a customers existing network and need to obtain the following router information:
IOS image being executed
which command should you use?
what is the recommended spanning tree protocol for all layer 2 deployments in the branch office environment?
which cisco device management feature is most suited to metering traffic and providing data for billing network usage?
which of these domain of trust security statements is correct?
segment security policy decisions are based on trust
when collecting information about customers existing network, which two sources wil provide the most accurate data?
configurations obtained from network equipment
A campus network needs end-to-end QoS tools to manage traffic and ensure voice quality. which three types of QoS tools are needed?
interface queuing and scheduling
Which H.323 protocol is responsible for exchanging the capabilities and the opening and closing of logical channels?
When designingan EIGRP network, which two things should you take into consideration?
ASN and K values must match
The neighborhood command can be used to enable unicast communications
Identify the 3 items that pertain to EIGRP
can use multiple unequal paths
ASN and K values must match to form neighbors
external routes have AD of 170
OSPF will be used as the IGP within a campus network. Which two things should you consider before deployment?
All areas need to connect back to area 0
ECMP may cause undesired results depending on the environment
What are the three key areas that need to be considered when designing a remote data center?
which is the north american RIP for IPv4 addresses?
in which phase of PPDIOO are the network requirements identified?
what is the mostcompact representation of the following IPv6 address?
your supervisor has asked you to deploy a routing protocol within the lab environment that will allow for unequal cost multipath routing. which should you choose?
where in the Cisco enterprise architecturemodels does network management reside?
Enterprise campus module
which is a factor in enterprise campus design decissions?
network application chracteristics
which 3 statements are true regarding the virtual interface on a cisco wireless LAN controller?
support mobility management
serves as a DHCP relay
Supports embedded layer 3 security
when there is a need for immunity to EMI for connecting locations that are greater than 100 meters apart, which two solutions can be utilized?
which three security services offered through cisco Router Security?
Trust and identity
integrated threat control
which layer of the OSI model does cisco recommend to place the enterprise network core layer, when designing a network based on its switched hierarchical design?
which is the purpose of the Cisco NAC profiler?
automates discovery and inventory of all LAN attached devices
in the enterprise data center, which are the three main components?
data center management
you have a campus network that consist of only cisco devices. you have been tasked to discover the device platforms, the IOS versions, and the IP address of each device to map the network. Which proprietary protocol will assist you with this task?
Which two are types of network virtualization?
VSS: Virtual switching system
VRF: virtual routing and forwarding
Which 3 modular components are part of the cisco enterprise edge architecture?
internet connectivity module
remote access and VPN module
you are tasked with designing a new branch office that will support 75 users with possible expansion in the future and will need a highly available network. which branch design profiles should be implemented?
medium branch design
which three solutions are part of the borderless network service?
which model of the ISR is utilized for the teleworker design profile?
Cisco 800 series
which cisco technology using the Nexus NX-OS infrastructure allows the network architect to create up to four seperate control and data plane instances of the nexus chassis?
virtual device context
which two can be used as a branch office WAN solution?
high availability is a key design consideration in the enterprise campus network. In a fully redundant topology, which is likely to provide faster IGPconvergence during a failure?
single supervisor with tuned IGP timers
when designing for a remote worker, which two are typical requirements?
always-on connection with SLA from ISP
voice and IPsec VPN support
which three options are valid Cisco STP tools used to ensure best-practice access layer design for the enterprise campus?
when designing a WAN backup for voice and video applications, what three types of connections should be used?
Spanning layer 2 accross geographically seperate data centers is a key consideration for current data center design. which is the name of the NX-OS technology that facilitates MAC in IP transport layer 2 VLANs across any IP network?
overlay transport virtualization
A company wants to use private IP addresses for all its internal hosts. Which technology can the company use to provide access to the internet using a single public IP address?
Which three technologies are recommended to be used for WAN connectivity in today enterprise edge designs?
Which is usually used to connec to an upstream ISP?
An enterprise campus module is typically made up of four submodules, as described by the Cisco Enterprise architectual model. which two submodules are part of this module?
server farm/ data center
At which layer of the network is rout summarization recommended?
Which WAN technology is a cost effective method to deliver 100Mb of bandwidth to multiple branch offices?
Which cisco device has the sole function at looking at threat detection and mitigation at the enterprise edge?
if a teleworker is required access the branch office via a secure IPSEC VPN connection, which technology is recommended to provide the underlying transport?
You are asked to design a new branch office that will need to support 25 users. These users will be using an ISP connection and will need to connect to the main office for network service. Which two cisco devices are the most appropriate to fulfill all these requirements?
Cisco ISR G2
WAN backup over the internet is often used to provide primary connection redundancy. which is the most important consideration when passing corporate traffic over the public internet?
which four services does the architecture for media services contain
session control services
to provide layer 2 connectivity between the primary and remote data centers, given that two data centers are using layer 3 routed DCIs, which NX-OS technology can be used to facilitate this requirement?
What is the acceptable amount of one-way network delay for voice and video applications?
which subnet address and mask would you used for all Class D multicast addresses to be matched within an access list?
Which three features of LWAPP?
encryption of control channel
configuration data only on WLC
which type of are should you used in an enterprise OSPF deployment if you want to prevent propagation of type 5 LSAs but still allow the redistribution of external routes?
which mode is used to exclusively look for unauthorized access points?
rogue detector mode
Cisco identity-based networking services relied heavily on the 802.1x protocol. which other authentication solution is used hand-in-hand which 802.1x to authenticate users for network access?
you are designing a network that requires a routing protocol that will use mnimal network bandwidth. which would satisfy this requirement?
Which two devices wuld you plan in your DMZ to ensure enterprise edge security?
During which phase of the PPDIOO model would you conduct interviews with supporting staff to develop and propose a viable solution?
Which protocol is used for bearer traffic?
Your supervisor wants you to recommend a management protocol that will allow you to track overall bandwidth utilization, utilization by traffice type, and utilization by source and destination. Which is ideally suited for this function?
Wich WLC interface is dedicated for WLAN client data?
Which factor would be most influencial in choosing multimode fiber optic connections over UTP?
a hierarchical design of EIGRP domain facilitates which two of the following?
Which are associated with teh distribution layer within a campus design?
access layer aggregation
which network virtualization technology involved creating virtual routers with its own individual routing tables on a physical router?
Which of the following three options represents the components of the teleworker solution?
cisco unified IP phones
Cisco 880 Series router
cisco 2900 series router
which two features are supported by single wireless controller deployment?
automatic detection and configuration of LWAPPs
LWAPP support across multiple floors and building
which three described challenges that are faces when deploying an environment for teleworkers?
supporting a mix of technically knowledgeable and nontechnical users
simplifying router installation and configuration
avoiding situation where employees might use nonstandard hardware or configurations
which three are considered as technical constraints when identifying network requirements?
support for legacy applications
bandwidth support for existing legacy equipment
support for existing legacy equipment
Characterizing an existing network requires gathering as much information about the entwork as possible. which of these choices describes the preferred order for the information- gathering process?
existing documentation and organizational input, site and network audits, traffic analysis
which of the following is a component within the cisco enterprise campus model?
the evolution of the data center is best represented by the 3.0 architecture component of virtualization. which of the following is not an example of virtualizzation taking place in the data center?
virtualized media access utilizing fibre channell over ethernet
which three types of WAN typologies can be deployed in the service provide module?
you need to connect to a remote bracnh office via and internet connection. the remote office does not use cisco equipment. this connection must be secure and must support OSPF. Which of the following can be used to transport data to the branch office?
GRE over IPsec
Want to see the other 289 Flashcards in elsa study c?JOIN TODAY FOR FREE!