web analytics

Which tool would you use to meet these requirements?

You want to gather as much detail as possible during a network audit, to include data time stamping across a large number of interfaces, customized according to interface, with a

Which tool would you use to include data time stamping across a large number of interfaces while being customized according to each interface?

You want to gather as much detail as possible during a network audit with a minimal impact on the network devices themselves. Which tool would you use to include data

In which phase of PPDIOO are the network requirements identified?

In which phase of PPDIOO are the network requirements identified? A. Design B. Plan C. Prepare D. Implement E. Operate F. Optimize Correct Answer: B

Which is part of the Prepare phase of PPDIOO?

Which is part of the Prepare phase of PPDIOO? A. Obtain site contact information B. Perform network audit C. Identify customer requirements D. Perform gap analysis Correct Answer: C

Which of these solutions would be the most appropriate solution to consider?

When designing the identity and access control portions for the enterprise campus network, which of these solutions would be the most appropriate solution to consider? A. 802.1X B. ACLs in

Which is the purpose of the Cisco NAC Profiler?

Which is the purpose of the Cisco NAC Profiler? A. Automates discovery and inventory of all LAN attached devices B. Generates a profile based on username and group C. Learns

Which other authentication solution is used hand-in-hand with 802.1X to authenticate users for network access?

Cisco Identity-Based Networking Services relies heavily on the 802.1X protocol. Which other authentication solution is used hand-in-hand with 802.1X to authenticate users for network access? A. RADIUS B. LEAP C.

Which protocol is used for voice bearer traffic?

Which protocol is used for voice bearer traffic? A. MGCP B. RTP C. SCCP D. CDP E. ICMP Correct Answer: B

Which protocol is used to reserve bandwidth for the transport of a particular application data flow across the network?

Which protocol is used to reserve bandwidth for the transport of a particular application data flow across the network? A. cRTP B. IEEE 802.1P C. RSVP D. LFI E. Auto

Which two features are supported by single wireless controller deployments?

Which two features are supported by single wireless controller deployments? (Choose two.) A. automatic detection and configuration of LWAPPs B. LWAPP support across multiple floors and buildings C. automatic detection

Which four services does the architecture for Media Services contain?

Which four services does the architecture for Media Services contain? (Choose four.) A. access services B. transport services C. storage services D. forwarding services E. session control services F. security

Which IPv6 feature enables routing to distribute connection requests to the nearest content server?

Which IPv6 feature enables routing to distribute connection requests to the nearest content server? A. Link-local B. Site-local C. Anycast D. Multicast E. Global aggregatable Correct Answer: C

What is the recommended spanning tree protocol to use for all Layer 2 deployments in a branch office environment?

What is the recommended spanning tree protocol to use for all Layer 2 deployments in a branch office environment? A. CST B. RSPT C. PVST D. MISTP E. Rapid PVST

Which two are types of network virtualization?

Which two are types of network virtualization? (Choose two.) A. VSS: Virtual Switching System B. VRF: virtual routing and forwarding C. VCI: virtual channel identifier D. VLSM: variable length subnet

Which of the branch design profiles should be implemented?

You are tasked with designing a new branch office that will support 75 users with possible expansion in the future and will need a highly available network. Which of the

Which two can be used as a branch office WAN solution?

Which two can be used as a branch office WAN solution? (Choose two.) A. frame relay B. MPLS C. Metro Ethernet D. GPRS E. dial-up modem F. 3G USB modems

What is the acceptable amount of one-way network delay for voice and video applications?

What is the acceptable amount of one-way network delay for voice and video applications? A. 300 bytes B. 1 sec C. 150 ms D. 500 ms Correct Answer: C

Which mode is used to exclusively look for unauthorized access points?

Which mode is used to exclusively look for unauthorized access points? A. monitor mode B. sniffer mode C. rogue detector mode D. local mode Correct Answer: C

Which of the following three options represents the components of the Teleworker Solution?

Which of the following three options represents the components of the Teleworker Solution? (Choose three.) A. Cisco Unified IP Phone B. Cisco 880 Series Router C. Aironet Office Extend Access

Which three types of WAN topologies can be deployed in the Service Provider Module?

Which three types of WAN topologies can be deployed in the Service Provider Module? (Choose three.) A. ring B. star C. full mesh D. core/edge E. collapsed core F. partial

Which statement describes the recommended deployment of DNS and DHCP servers in the Cisco Network Architecture for the Enterprise?

Which statement describes the recommended deployment of DNS and DHCP servers in the Cisco Network Architecture for the Enterprise? A. Place the DHCP and DNS servers in the Enterprise Campus

Which describes the best practice for routing protocol deployment?

Your company’s Cisco routers are operating with EIGRP. You need to join networks with an acquisition’s heterogeneous routers at 3 sites, operating with EIGRP and OSPF. Which describes the best

Which two routing protocols converge most quickly?

Which two routing protocols converge most quickly? (Choose two.) A. RIPv1 B. RIPv2 C. BGP D. OSPF E. EIGRP Correct Answer: DE

Which of these is the equation used to derive a 64 Kbps bit rate?

Which of these is the equation used to derive a 64 Kbps bit rate? A. 2 x 8 kHz x 4-bit code words B. 8 kHz x 8-bit code words

Which one of these statements is an example of how trust and identity management solutions should be deployed in the enterprise campus network?

Which one of these statements is an example of how trust and identity management solutions should be deployed in the enterprise campus network? A. Authentication validation should be deployed as

Which one of these statements is an example of such a strength?

With deterministic Wireless LAN Controller redundancy design, the different options available to the designer have their own strengths. Which one of these statements is an example of such a strength?

When designing the threat detection and mitigation portion for the enterprise data center network, which of the following would be the most appropriate solution to consider?

When designing the threat detection and mitigation portion for the enterprise data center network, which of the following would be the most appropriate solution to consider? A. 802.1X B. ACLs

Which proprietary protocol will assist you with this task?

You have a campus network that consists of only Cisco devices. You have been tasked to discover the device platforms, the IOS versions, and an IP address of each device

Which three technologies are recommended to be used for WAN connectivity in today’s Enterprise Edge designs?

Which three technologies are recommended to be used for WAN connectivity in today’s Enterprise Edge designs? (Choose three.) A. DWDM B. Metro Ethernet C. Frame Relay D. MPLS VPN E.

Which is the most important consideration when passing corporate traffic over the public Internet?

WAN backup over the Internet is often used to provide primary connection redundancy. Which is the most important consideration when passing corporate traffic over the public Internet? A. security B.

Which WLC interface is dedicated for WLAN client data?

Which WLC interface is dedicated for WLAN client data? A. virtual interface B. dynamic interface C. management interface D. AP manager interface E. service port interface Correct Answer: B

Which NX-OS technology can be used to facilitate this requirement?

To provide Layer 2 connectivity between the primary and remote data centers, given that the two data centers are using Layer 3 routed DCIs, which NX-OS technology can be used

Which four improvements are the main benefits of the PPDIOO lifecycle approach to network design?

According to Cisco, which four improvements are the main benefits of the PPDIOO lifecycle approach to network design? (Choose four.) A. faster ROI B. improved business agility C. increased network

During which phase of the PPDIOO model would you conduct interviews with supporting staff to develop and propose a viable solution?

During which phase of the PPDIOO model would you conduct interviews with supporting staff to develop and propose a viable solution? A. Prepare B. Plan C. Design D. Implement E.

Which three are considered as technical constraints when identifying network requirements?

Which three are considered as technical constraints when identifying network requirements? (Choose three.) A. support for legacy applications B. bandwidth support for new applications C. limited budget allocation D. policy

Which of these choices describes the preferred order for the information-gathering process?

Characterizing an existing network requires gathering as much information about the network as possible. Which of these choices describes the preferred order for the information-gathering process? A. site and network

Which three terms describe the primary functions of the distribution layer of the campus network design hierarchy?

Which three terms describe the primary functions of the distribution layer of the campus network design hierarchy? (Choose three.) A. provides end-user connectivity B. provides high speed transport C. provides

Which two of the following are benefits of using a modular approach to network design?

Which two of the following are benefits of using a modular approach to network design? (Choose two.) A. improves flexibility B. facilitates implementation C. lowers implementation costs D. improves customer

Which three modular components are part of the Cisco Enterprise Edge Architecture?

Which three modular components are part of the Cisco Enterprise Edge Architecture? (Choose three.) A. e-commerce module B. Internet connectivity module C. server farm module D. remote access and VPN

Which of the following is a component within the Cisco Enterprise Campus module?

Which of the following is a component within the Cisco Enterprise Campus module? A. Teleworker B. E-Commerce C. Internet Connectivity D. Building Distribution E. WAN/MAN Site-to-Site VPN Correct Answer: D

What are the three primary functions of the distribution layer of the campus network design hierarchy?

What are the three primary functions of the distribution layer of the campus network design hierarchy? (Choose three.) A. provide end-user connectivity B. provide high speed transport C. provide QoS

Where in the Cisco Enterprise Architecture model does network management reside?

Where in the Cisco Enterprise Architecture model does network management reside? A. Enterprise data center module B. Enterprise campus module C. Enterprise edge module D. Service Provider edge module E.

Which three solutions are part of the Borderless Network Services?

Which three solutions are part of the Borderless Network Services? (Choose three.) A. Wireless B. Routing C. TrustSec D. MediaNet E. Switching F. EnergyWise G. Next-Gen WAN Correct Answer: CDF

Which of the following is not an example of the virtualization taking place in the Data Center?

The evolution of the Data Center is best represented by the 3.0 architecture component of virtualization. Which of the following is not an example of the virtualization taking place in

Which two solutions can be utilized?

When there is a need for immunity to EMI for connecting locations that are greater than 100 meters apart, which two solutions can be utilized? (Choose two.) A. multimode fiber

When designing a network based on its switched hierarchical design?

Which layer of the OSI model does Cisco recommend to place the enterprise network core layer, when designing a network based on its switched hierarchical design? A. Layer 1 B.

Which two things should you consider before deployment?

OSPF will be used as the IGP within a campus network. Which two things should you consider before deployment? (Choose two.) A. All areas need to connect back to area

Which Cisco technology using Nexus NX-OS infrastructure allows the network architect to create up to four separate control and data plane instances of the Nexus chassis?

Which Cisco technology using Nexus NX-OS infrastructure allows the network architect to create up to four separate control and data plane instances of the Nexus chassis? A. virtual port-channel B.

Which three options are valid Cisco STP tools used to ensure best-practice access layer design for the enterprise campus?

Which three options are valid Cisco STP tools used to ensure best-practice access layer design for the enterprise campus? (Choose three.) A. Port fast B. UDLD C. Root Guard D.

Which is the name of the NX-OS technology that facilitates MAC in IP transport for Layer 2 VLANs across any IP network?

Spanning Layer 2 across geographically separate data centers is a key consideration for current data center designs. Which is the name of the NX-OS technology that facilitates MAC in IP