Q81. Refer to the exhibit. 

Assume that no multicast optimization is done on LAN switches A and B. Which feature can be used to optimize multicast traffic forwarding in this situation? 

A. Enable IGMP snooping querier on both switches. 

B. Configure a static MAC entry for the multicast server. 

C. Disable IGMP snooping on both switches. 

D. Disable the IGMP query election process. 

E. Enable PIM Snooping on both switches. 

Answer:


Q82. Acme Corporation wants to minimize the risk of users plugging unauthorized switches and hubs into the network. Which two features can be used on the LAN access ports to support this design requirement? (Choose two.) 

A. BPDU Guard 

B. PortFast 

C. Loop Guard 

D. Port Security 

E. UDLD 

Answer: AD 


Q83. You are the lead network designer hired by Service Provider XYZ to deploy CoS functionality on the core MPLS network (P routers). The goal of the network design is to provide a complete CoS solution to all customers that purchase services such as dedicated Internet access, MPLS L3VPN, and L2VPN (pseudowire). Service Provider XYZ has these design requirements: 

The network supports four service queues with equal treatment for delay, jitter, and packet loss. 

Queues are numbered 0-3, where 0 is the default queue. 

Three queues have one treatment. 

One queue has either one or two treatments. 

If your design includes eight CoS queues on the Service Provider XYZ MPLS PE router ingress (CE facing) interface, how will customer traffic be classified as it enters the MLS P routers? 

A. The eight CoS queues in the MPLS P router are remapped to the eight CoS queues. 

B. Traffic is classified on the MPLS PE routers on core facing interface. The DSCP value is mapped into EXP field where multiple EXP settings (2+) will be assigned to a single queue throughout the MPLS P routers. 

C. Discard the traffic from the eight CoS queues that does not match the four CoS queues of the MPLS P routers. 

D. The 8 CoS queues in the MPLS P router are remapped to four 4 flow-label queues. 

Answer:


Q84. You are designing a traffic monitoring and analysis system for a customer. Which traffic monitoring technique would you recommend to place the least amount of burden on the network infrastructure? 

A. SPAN monitor ports 

B. NetFlow 

C. IP NBAR 

D. passive taps 

Answer:


Q85. A switched network is being designed to support a manufacturing factory. Due to cost constraints, fiber-based connectivity is not an option. Which design allows for a stable network when there is a risk of interference from the manufacturing hardware in use on the factory floor? 

A. Design the network to include UDLD to detect unidirectional links and take them out of service. 

B. Design the network to include EtherChannel bundles to prevent a single-link failure from taking down a switch interconnection point. 

C. Design the network to include loop guard to prevent a loop in the switched network when a link has too much interference. 

D. Design the network to include BackboneFast on all devices to accelerate failure convergence times. 

Answer:


Q86. A company wants to connect two data center sites using a hub-and-spoke design with 2000 remote sites. One design consideration is the requirement to transfer MPLS packets over the public Internet. In addition, one router at each site should be used, and the MPLS packets must be encapsulated inside IP packets because the public Internet cannot transfer native MPLS packets. Which feature can be used to simplify the network design? 

A. GET VPN can be used to encrypt the MPLS packets with IPsec. 

B. DMVPN can be used to build up GRE tunnels dynamically with MPLS encapsulation inside. 

C. L2TPv3 can be used to encapsulate the MPLS packets. 

D. Site-to-site IPsec without GRE can be used to encapsulate the MPLS packets. 

E. PPPoE can be used to encapsulate the MPLS packets. 

Answer:


Q87. You are designing a network using multipoint GRE tunnels and need to be able to detect when connectivity between the GRE tunnel endpoints is broken. Which statement is true about configuring keepalives for multipoint GRE tunnels? 

A. The keepalive timer values on the routers must have the same value. 

B. Both routers must support GRE tunnel keepalives. 

C. No configuration is required to detect when connectivity is broken between the GRE tunnel endpoints. 

D. GRE tunnel keepalives will not detect when connectivity is broken between the GRE tunnel endpoints. 

Answer:


Q88. A service provider has a Resilient Ethernet Protocol ring running as a metro backbone between its locations in one city. A customer wants to connect one site with one box redundant to theResilient Ethernet Protocol ring at two different service provider locations. How can this be done without producing any Layer 2 loops within the network design? 

A. Spanning tree at the service provider side only must be enabled. 

B. Spanning tree at the customer side only must be enabled. 

C. Flex Links at the service provider side only must be enabled. 

D. Flex Links at the customer side only must be enabled. 

E. EtherChannel at the service provider side and the customer side must be enabled. 

F. Spanning tree at the service provider side and the customer side must be enabled. 

G. Flex Links at the service provider side and the customer side must be enabled. 

Answer:


Q89. Acme Corporation indicates that their network design must support the ability to scale to support a high number of remote sites. Which IGP is considered to scale better for a hub-and-spoke topology? 

A. BGP 

B. OSPF 

C. IS-IS 

D. EIGRP 

Answer:


Q90. A company wants to use an external appliance between its data center and WAN to optimize email and HTTP communications. The traffic flow must pass this appliance in both directions. The appliance is connected with only one interface to a Cisco IOS router and has a single IP address. Which two adjustments can you make to the network design so that the appliance is added into the traffic path? (Choose two.) 

A. Configure static routes to route the traffic to the appliance. 

B. Adjust the dynamic routing to route the traffic to the appliance. 

C. Configure NAT to force the traffic to the appliance. 

D. Configure a route map at the data center-side interface to forward the traffic to the appliance IP address. 

E. Configure a route map at the appliance-facing interface to forward the traffic to the appliance IP address. 

F. Configure a route map at the WAN-side interface to forward the traffic to the appliance IP address. 

Answer: DF