Q121. Which protocol will not adhere to the design requirement of the control plane being either separated or combined within a virtualization technology?
A. FHRP
B. STP
C. CEF
D. NSF with SSO
Answer: B
Q122. Which statement about Fibre Channel communications is correct?
A. N_Port to N_Port connections use logical node connection points.
B. Flow control is only provided by QoS.
C. It must be implemented in an arbitrated loop.
D. Communication methods are similar to those of an Ethernet bus.
Answer: A
Q123. Which two benefits are achieved if a network is designed properly with a structured addressing scheme? (Choose two.)
A. efficient ACLs
B. improved redundancy
C. hardened security
D. easier troubleshooting
E. added resiliency
Answer: A,D
Q124. Which VRF component ensures control plane separation between the different Layer 3 VPNs?
A. FIB
B. routing protocol instance
C. RIB
D. a subset of the router interfaces
Answer: B
Q125. Which three of these Metro service types map to E-Line (versus E-LAN) services that are defined by the Metro Ethernet Forum (MEF)? (Choose three.)
A. Ethernet Private Line
B. Ethernet Wire Service
C. Ethernet Relay Service
D. Ethernet Multipoint Service
E. Ethernet Relay Multipoint Service
Answer: A,B,C
Q126. Which IPv6 transition model should be utilized when two or more independent transition mechanisms are required?
A. tunneling
B. dual stack
C. service block
D. hybrid
E. manual
Answer: D
Q127. Which two WAN technologies support IEEE 802.1Q, site-to-site connectivity, and point-to-point connectivity between two offices? (Choose two.)
A. Ethernet over MPLS
B. VPLS
C. Layer 3 MPLS
D. DSL
E. cable
Answer: A,B
Q128. Which two options are VRF components. (Choose two.)
A. RIB
B. VSS
C. FIB
D. HSRP
Answer: A,C
Q129. A network designer wants to improve security at the edge of the network and allow routing protocols to communicate without any additional configuration. What firewall mode meets the design requirements?
A. routed
B. zoned
C. context
D. transparent
Answer: D
Q130. A network manager wants to securely connect a new remote site to the existing headquarters site using a VPN technology that meets security requirements. Which VPN technology should be used?
A. GRE
B. IPsec
C. remote-access VPN
D. L2TP VPN
Answer: B