Q141. Which three statements about Network Attached Storage are correct? (Choose three.) 

A. Data is accessed using NFS or CIFS. 

B. Data is accessed at the block level. 

C. NAS is referred to as captive storage. 

D. Storage devices can be shared between servers. 

E. A NAS implementation is not as fast as a DAS implementation. 

Answer: A,D,E 

Q142. From a design perspective which two of the following OSPF statements are most relevant? (Choose two) 

A. OSPF stub areas can be thought of as a simple form of summarization 

B. OSPF cannot filter intra-area routes 

C. An ABR can only exist in two areas - the backbone and one adjacent area 

D. Performance issues in the Backbone area can be offset by allowing some traffic to transit a non-backbone area 

E. The size of an area (the LSDB) will be constrained by the size of the IP MTU 

Answer: A,B 

Q143. An engineer is designing an address plan. Which IPv6 prefix removes any consideration regarding the number of hosts per subnet? 

A. /32 

B. /48 

C. /64 

D. /96 


Q144. Which of these statements is correct regarding Stateful Switchover and Cisco Nonstop Forwarding? 

A. Utilizing Cisco NSF in Layer 2 environments can reduce outages to one to three seconds. 

B. Utilizing SSO in Layer 3 environments can reduce outages to one to three seconds. 

C. Distribution switches are single points of failure causing outages for the end devices. 

D. Utilizing Cisco NSF and SSO in a Layer 2 environment can reduce outages to less than one second. 

E. NSF and SSO with redundant supervisors have the most impact on outages at the access layer. 


Q145. A company requires real-time SAN replication between two remote locations. What is the standard path selection protocol for fabric routing? 






Q146. Which network virtualization plane is used to separate traffic forwarding tables? 

A. control 

B. data 

C. management 

D. access 


Q147. Which two of these are characteristics of multicast routing? (Choose two.) 

A. multicast routing uses RPF. 

B. multicast routing is connectionless. 

C. In multicast routing, the source of a packet is known. 

D. When network topologies change, multicast distribution trees are not rebuilt, but use the original path 

E. Multicast routing is much like unicast routing, with the only difference being that it has a a group of receivers rather than just one destination 

Answer: A,C 

Q148. Which authentication framework is used in wireless networks and point-to-point connections? 


B. L2TP 




Q149. A network team must provide a redundant secure connection between two entities using OSPF. The primary connection will be an Ethernet Private Line and the secondary connection will be a site-to-site VPN. What needs to be configured in order to support routing requirements for over the VPN connection? 

A. GRE Tunnel 


C. Root Certificate 

D. AAA Server 


Q150. Refer to the exhibit. 

The Cisco Nexus 1000V in the VMware vSphere solution effectively creates an additional access layer in the virtualized data center network; which of the following 1000V characteristics can the designer take advantage of? 

A. Offloads the STP requirement from the external Access layer switches 

B. If upstream access switches do not support vPC or VSS the dual-homed ESX host traffic can still be distributed using virtual port channel host mode using subgroups automatically discovered through CDP 

C. Allows transit traffic to be forwarded through the ESX host between VMNICs 

D. Can be divided into multiple virtual device contexts for service integration, enhanced 

security, administrative boundaries, and flexibility of deployment