Q101. As part of the security protocol for your network design, you have designated that option 82 is enabled for DHCP snooping. When option 82 is enabled, which information will be added to the DHCP request? 

A. switch MAC address and VLAN, module, and port 

B. remote ID and circuit ID 

C. switch IP address and VLAN, module, and port 

D. switch MAC address and switch IP address 


Q102. There is an MPLS-enabled link constantly flapping on an MPLS VPN network. Given that the network runs OSPF as the IGP protocol, which design mechanism will stabilize the network and avoid constant reconvergences? 


B. IP Event Dampening 

C. OSPF fast hellos 

D. partial SPF 


Q103. When a design calls for spanning VLANs across a campus network, what are two issues that need to be addressed in the design? (Choose two.) 

A. network convergence 

B. network accessibility 

C. fault isolation 

D. application scalability 

E. user experience 

Answer: AC 

Q104. In a network design using carrier Ethernet, which three mechanisms can be used to improve Layer 2 down detection and thereby reduce routing convergence time? (Choose three.) 


B. Ethernet port debounce timers 

C. link-state tracking 

D. object tracking 

E. fast IGP hello 

Answer: ADE 

Q105. You are hired to design a solution that will improve network availability for users on a campus network with routed access. If the budget limits you to three components, which three components would you recommend in your design proposal? (Choose three.) 

A. redundant power supplies in the access routers 

B. standby route processors for SSO in the core routers 

C. standby route processors for SSO in the distribution routers 

D. standby route processors for SSO in the access routers 

E. replace copper links between devices with fiber links 

Answer: ADE 

Q106. Refer to the exhibit. 

Which two options are two characteristics of the single-tier headend architecture for DMVPN designs? (Choose two.) 

A. The mGRE and crypto functions are on the same router. 

B. Each DMVPN cloud has two different headend routers for high availability purposes. 

C. It is used in dual-cloud topologies for spoke-to-spoke connectivity. 

D. It only supports hub-and-spoke connectivity. 

E. Spokes cannot be used as RP in multicast deployments. 

Answer: AC 

Q107. A network designer has provisioned a router to use IPsec to encrypt the traffic over a GRE tunnel going to a web server at a remote location. From the router, the network designer can ping the web server, although the users in the office comment that they are unable to reach it. (Note: The DF bit is not set.) Which aspect should be changed in the design of the virtual connection? 

A. IP addresses of the GRE tunnel endpoints 

B. IPsec configuration 

C. MTU size on the GRE tunnel 

D. encapsulation of the GRE tunnel 


Q108. What are two benefits of following a structured hierarchical and modular design? (Choose two.) 

A. Each component can be designed independently for its role. 

B. Each component can be managed independently based on its role. 

C. Each component can be funded by different organizations based on its role. 

D. Each component can support multiple roles based on the requirements. 

E. Each component can provide redundancy for applications and services. 

Answer: AB 

Q109. You are designing a network to support data, voice and video. Which two main factors will you address to improve network convergence? (Choose two.) 

A. event propagation delay 

B. failure detection delay 

C. forwarding engine update delay 

D. routing table recalculation delay 

Answer: BD 

Q110. You have been hired to redesign a network due to issues with congestion. How will a router function if the QoS mechanism of congestion avoidance is integrated into the existing network design? 

A. the router handles the overflow of traffic by using FIFO B. the router handles the possible buildup of congestion by using WRED 

C. the router forces inbound and outbound traffic to stay within a defined profile by using rate limiting 

D. the router separates packets based on certain characteristics by using NBAR 

E. the router marks packets based on certain characteristics by using PBR