Q31. Which two ways to support secure transport of multicast traffic are true? (Choose two.)
A. Use spoke-to-spoke design.
B. Use IPsec over GRE tunnel.
C. Use GET VPN.
D. Use NBMA instead of broadcast.
E. Disable encryption for multicast traffic.
Q32. The network designer needs to consider the number of multicast applications and sources in the network to provide the most robust network possible. Which of the following is a consideration the designer must also address?
A. The IGPs should utilize authentication to avoid being the most vulnerable component
B. With SSM source or receiver attacks are not possible
C. With Shared Trees access control is always applied at the RP
D. Limit the rate of Register messages to the RP to prevent specific hosts from being attacked on a PIM-SM network
Q33. To which switch or switches should you provide redundant links in order to achieve high availability with reliable fast convergence in the enterprise campus?
A. to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 2 link
B. to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 3 link
C. to two core switches from redundant distribution switches connected with a Layer 2 link
D. to two core switches from redundant distribution switches connected with a Layer 3 link
E. to two core switches running Cisco NSF and SSO from two redundant distribution switches running Cisco NSF and SSO
Q34. Which feature set enables the full OSPF routing process when using a Cisco Catalyst 3750X Switch?
A. LAN base
B. IP base
C. IP services
D. enterprise access
Q35. Which of the following is true regarding the effect of EIGRP queries on the network design?
A. EIGRP queries will be the most significant issue with respect to stability and convergence
B. EIGRP queries are not a consideration as long as EIGRP has a feasible successor with a next hop AD that is greater than the FD of the current successor route
C. EIGRP queries will only increase the convergence time when there are no EIGRP stubs designed in the network
Q36. A network engineer is implementing virtualization into the enterprise network. Which system should be used to address policy enforcement at the distribution layer?
A. Cisco IOS based firewall
B. multilayer switches
C. integrated firewall services
D. identity services engine
E. intrusion protection systems
Q37. Which option is a method of restricting access for users based on user roles and locales? A. RBAC
Q38. What is the primary benefit of implementing Virtual Device Contexts on Nexus hardware In a multi-tenant environment?
A. resource isolation
B. software partitioning
C. resource allocation
D. granular monitoring
Q39. An HSRP design requirement states that preemption must be enabled for the active switch, which is a Cisco 4507R. Assume a boot time of 300 seconds. Which setting of the preemption delay timer minimizes the loss of traffic?
A. 50 seconds
B. 100 seconds
C. 150 seconds
D. 200 seconds
Q40. Which routing protocol provides the fastest convergence and greatest flexibility within a campus environment?