Q31. Which two ways to support secure transport of multicast traffic are true? (Choose two.) 

A. Use spoke-to-spoke design. 

B. Use IPsec over GRE tunnel. 

C. Use GET VPN. 

D. Use NBMA instead of broadcast. 

E. Disable encryption for multicast traffic. 

Answer: B,C 


Q32. The network designer needs to consider the number of multicast applications and sources in the network to provide the most robust network possible. Which of the following is a consideration the designer must also address? 

A. The IGPs should utilize authentication to avoid being the most vulnerable component 

B. With SSM source or receiver attacks are not possible 

C. With Shared Trees access control is always applied at the RP 

D. Limit the rate of Register messages to the RP to prevent specific hosts from being attacked on a PIM-SM network 

Answer:


Q33. To which switch or switches should you provide redundant links in order to achieve high availability with reliable fast convergence in the enterprise campus? 

A. to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 2 link 

B. to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 3 link 

C. to two core switches from redundant distribution switches connected with a Layer 2 link 

D. to two core switches from redundant distribution switches connected with a Layer 3 link 

E. to two core switches running Cisco NSF and SSO from two redundant distribution switches running Cisco NSF and SSO 

Answer:


Q34. Which feature set enables the full OSPF routing process when using a Cisco Catalyst 3750X Switch? 

A. LAN base 

B. IP base 

C. IP services 

D. enterprise access 

Answer:


Q35. Which of the following is true regarding the effect of EIGRP queries on the network design? 

A. EIGRP queries will be the most significant issue with respect to stability and convergence 

B. EIGRP queries are not a consideration as long as EIGRP has a feasible successor with a next hop AD that is greater than the FD of the current successor route 

C. EIGRP queries will only increase the convergence time when there are no EIGRP stubs designed in the network 

Answer:


Q36. A network engineer is implementing virtualization into the enterprise network. Which system should be used to address policy enforcement at the distribution layer? 

A. Cisco IOS based firewall 

B. multilayer switches 

C. integrated firewall services 

D. identity services engine 

E. intrusion protection systems 

Answer:


Q37. Which option is a method of restricting access for users based on user roles and locales? A. RBAC 

B. ACE 

C. LDAP 

D. RADIUS 

Answer:


Q38. What is the primary benefit of implementing Virtual Device Contexts on Nexus hardware In a multi-tenant environment? 

A. resource isolation 

B. software partitioning 

C. resource allocation 

D. granular monitoring 

Answer:


Q39. An HSRP design requirement states that preemption must be enabled for the active switch, which is a Cisco 4507R. Assume a boot time of 300 seconds. Which setting of the preemption delay timer minimizes the loss of traffic? 

A. 50 seconds 

B. 100 seconds 

C. 150 seconds 

D. 200 seconds 

Answer:


Q40. Which routing protocol provides the fastest convergence and greatest flexibility within a campus environment? 

A. OSPF 

B. IS-IS 

C. BGP 

D. EIGRP 

Answer: