Pre-Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > Cisco > CCNP Enterprise > 300-420

300-420 Designing Cisco Enterprise Networks (ENSLD) Question and Answers

Question # 4

Drag and drop the Cisco SD-WAN components from the left onto their definitions on the right.

Full Access
Question # 5

In an SD-WAN architecture, which methods are used to bootstrap a vEdge router?

A.

DHCP options or manual configuration

B.

vManage or DNS records

C.

ZTP or manual configuration

D.

DNS records or DHCP options

Full Access
Question # 6

Drag and drop the characteristics from the left onto the Yang model they describe on the right.

Select and Place:

Full Access
Question # 7

What is the purpose of a border node in a Cisco SD-Access fabric?

A.

connect devices to a network

B.

perform traffic encapsulation and de-encapsulation

C.

perform network virtualization

D.

expand a network

Full Access
Question # 8

What are two characteristics of a migration from an IP-VPN service to a Cisco SD-WAN architecture? (Choose two.)

A.

increased solution complexity

B.

increased security

C.

increased scalability

D.

centralized application policies

E.

distributed control plane

Full Access
Question # 9

Drag and drop the description from the left onto the corresponding WAN connectivity types and categories on the right.

Full Access
Question # 10

When expanding an existing Cisco SD-Access network, in addition to the control plane, which two device roles are needed to create an additional fabric site? (Choose two.)

A.

leaf

B.

cEdge

C.

WLC

D.

edge

E.

border

Full Access
Question # 11

Refer to the exhibit. Currently, the network uses a single-homed solution for connecting to the internet. An engineer must design a more resilient WAN using the internet circuits at each site. The design must provide failover connectivity, support load-sharing of traffic, and QoS. Which solution must the engineer choose?

A.

Get VPN

B.

DMVPN

C.

SD-WAN

D.

IPsec tunnels

Full Access
Question # 12

An architect is designing a multicast solution for a network that contains over 100 routers. The architect plans to create several multicast domains and balance the PIM-SM traffic within the network. Which technology should the architect include in the design?

A.

DVMRP

B.

IGMP

C.

MOSPF

D.

MSDP

Full Access
Question # 13

Refer to the exhibit. An architect is developing a solution to consolidate networks while retaining device redundancy. The routing protocol for the WAN routers must be open standard, ensure high availability, and provide the fastest convergence time. Which solution must the design include?

A.

both routers running EIGRP

B.

one router running OSPFv2 and other OSPF v3

C.

one router running ISIS and other OSPF v3

D.

both routers running OSPFv2

Full Access
Question # 14

Drag and drop the descriptions from the left onto the Cisco SD-WAN component they describe on the right.

Full Access
Question # 15

Refer to the exhibit.

EIGRP has been configured on all links. The spoke nodes have been configured as EIGRP stubs, and the WAN links to R3 have higher bandwidth and lower delay than the links to R4. When a link failure occurs at the R1-R2 link, what happens to traffic on R1 that is destined for a subnet attached to R2?

A.

R1 has no route to R2 and drops the traffic

B.

R1 load-balances across the paths through R3 and R4 to reach R2

C.

R1 forwards the traffic to R3, but R3 drops the traffic

D.

R1 forwards the traffic to R3 in order to reach R2

Full Access
Question # 16

Refer to the exhibit. An engineer proposed this solution for a company that requires a loop-free. Layer 2 network design. The network will run 802.1W, and all links will be 1 Gbps. If all interfaces are up as point- to-point adjacencies, what are the expected port end states based on the design?

A.

Eth1/2 on SW2 and SW3 will be in a Desg FWD state

B.

Eth1/3 on SW2 and SW3 will be m an Attn BLK state

C.

Eth1/2 on SW3 and SW4 will be m an Attn BLKbtate.

D.

Eth1/1 on SW1 and SW2 will be in a Root FWD state.

Full Access
Question # 17

Refer to the exhibit.

C0FD9 F48C9ACDC725EA850EC2476EE1E

An architect must design a solution that uses the direct link between R1 and R2 for traffic from 10.10.10.0/24

toward network 10.10.20.0/24. Which solution should the architect include in the design?

A.

Configure the OSPF cost of the link to a value lower than 30.

B.

Lower the Administrative Distance for OSPF area 0.

C.

Place the link into area 2 and install a new link between R1 and R2 in area 0.

D.

Configure the link to provide multiarea adjacency.

Full Access
Question # 18

Which component of Cisco SD-Access integrates with Cisco DNA Center to perform policy segmentation and enforcement through the use of security group access control lists and security group tags?

A.

Cisco Application Policy Infrastructure Controller Enterprise Module

B.

Cisco Network Data Platform

C.

Cisco Identity Services Engine

D.

Cisco TrustSec

Full Access
Question # 19

Which control-plane technology allows the same subnet to exist across multiple network locations?

A.

LISP

B.

VXLAN

C.

FabricPath

D.

ISE mobility services

Full Access
Question # 20

Refer to the exhibit. A company has some offices that are connected via dark fiber in New York. A network architect must optimize the network design based on the EIGRP routing protocol. The network has hierarchical addressing between 10 and 12 routers in each office. Routing convergence time must be at the minimum. What must the network architect do to reduce the query range?

A.

Configure stub areas on non-edge routers.

B.

Implement network summarization on edge routers.

C.

Use different EIGRP processes on edge routers.

D.

Configure route filtering on non-edge routers.

Full Access
Question # 21

What is the purpose of a control plane node in a Cisco SD-Access network fabric?

A.

to maintain the endpoint database and mapping between endpoints and edge nodes

B.

to detect endpoints in the fabric and inform the host tracking database of EID-to-fabric-edge node bindings

C.

to identify and authenticate endpoints within the network fabric

D.

to act as the network gateway between the network fabric and outside networks

Full Access
Question # 22

A company requested that an architect propose a new IPv4 and IPv6 deployment strategy. The company wants a solution that is straightforward, with no information hiding or forwarding overhead. Which solution meets these requirements?

A.

LISP

B.

NAT64

C.

dual-stack

D.

GRE tunnels

Full Access
Question # 23

A company is planning to open two new branches and allocate the 2a01:c30:16:7009::3800/118 IPv6 network for the region. Each branch should have the capacity to accommodate maximum of 200 hosts. Which two networks should the company use? (Choose two.)

A.

2a01:0c30:0016:7009::3a00/120

B.

2a01:0c30:0016:7009::3b00/121

C.

2a01:0c30:0016:7009::3a80/121

D.

2a01:0c30:0016:7009::3b00/120

E.

2a01:0c30:0016:7009::3c00/120

Full Access
Question # 24

An engineer must propose a solution for a campus network that includes the capability to create multiple Layer 3 virtual networks. Each network must have its own addressing structure and routing table for data forwarding. The solution must be scalable to support hundreds of virtual networks and allow simple configuration and management with minimal administrative overhead. Which solution does the engineer recommend?

A.

hop-by-hop EVN

B.

multihop MPLS core

C.

multihop IPsec tunneling

D.

hop-by-hop VRF-Lite

Full Access
Question # 25

A company uses cloud-based applications for voice and video calls, file sharing, content sharing, and messaging. During business hours, these applications randomly become slow and unresponsive. However, other applications work smoothly with the current applied QoS polices. Which solution must the company choose to resolve the issue?

A.

Identify the applications with NBAR2 and allocate the required bandwidth accordingly.

B.

Identify the port used by each application and apply a minimum bandwidth guarantee.

C.

Identify the applications and reserve the required bandwidth on the perimeter routers.

D.

Identify the application ports, create groupings, and rate-limit the required bandwidth.

Full Access
Question # 26

Refer to the exhibit. An architect must design a solution to connect bank site A with bank site B and support:

    network operation center monitoring end-to-end L3VPN and L2VPN traffic

    company adding thousands of routes in the next two years

Which two BGP solutions must the design include? (Choose two.)

A.

Establish full mesh IBGP peering with ail routers in different IGP domains.

B.

Redistribute different IGP domain routes in a BGP IPv4 routing instance.

C.

Transport site routes using a BGP VPNv4 address family on the PE routers.

D.

Apply BGP policies on all routers to filter out ABR and PE loopback IP addresses.

E.

Connect multiple IGP'LDP domains using a BGP IPv4 unicast family on the ABR.

Full Access
Question # 27

A customer’s environment includes hosts that support IPv6-only. Several of these hosts must communicate with a public web server that has only IPv4 domain name resolution. Which solution should the customer use in this environment?

A.

utilize NAT64 to translate the addresses

B.

Implement NAT44 at the edge of the customer network

C.

use 6to4 and a tunnel to translate the addresses

D.

implement 6PE to resolve hostname resolution

Full Access
Question # 28

What are two advantages of the Cisco SD-WAN technology9 (Choose two)

A.

Improved application experience

B.

Easier deployment

C.

Optimized cloud connectivity

D.

Proactive network management

E.

Consistent connectivity

Full Access
Question # 29

An enterprise customer has these requirements:

    end-to-end QoS for the business-critical applications and VoIP services based on CoS marking.

    flexibility to offer services such as IPv6 and multicast without any reliance on the service provider.

    support for full-mesh connectivity at Layer 2.

Which WAN connectivity option meets these requirements?

A.

VPWS

B.

MPLS VPN

C.

DMVPN

D.

VPLS

Full Access
Question # 30

At which layer does Cisco Express Forwarding use adjacency tables to populate addressing information?

A.

    Layer4

B.

    Layer 2

C.

    Layer 1

D.

    Layer 3

Full Access
Question # 31

In Cisco SD-Access. virtual networks create segmentation that allows for separation of users and resources. How is this type of segmentation described?

A.

macro

B.

inter-VN

C.

micro

D.

stretctied

Full Access
Question # 32

An engineer is designing a network for a customer running a wireless network with a common VLAN for all APs. The customer is experiencing unicast flooding in the Layer 2 network between the aggregation and access layers. The customer wants to reduce the flooding and improve convergence time. Which solution meets these requirements?

A.

Migrate all APs to a common Layer 2 access layer switch and run Layer 3 from the aggregation layer to all remaining access layer switches.

B.

Align HSRP primary and STP root bridges and reduce ARP timers to match CAM timers on the aggregation layer switches.

C.

Migrate to a Layer 3 access campus design if the APs can run on separate VLANs.

D.

Align HSRP primary and STP root bridges if the APs cannot run on separate VLANs.

Full Access
Question # 33

Refer to the exhibit. The full EIGRP routing table is advertised throughout the network. Currently, users experience data loss when any one link in the network fails. An architect optimizes the network to reduce the impact when a link fails. Which solution should the architect include in the design?

A.

Run BFD on the inter links between EIGRP neighbors.

B.

Summarize the access layer networks from each access layer switch toward the aggregation layer.

C.

Reduce the default EIGRP hello interval and hold time.

D.

Summarize the access layer networks from the aggregation layer toward the core layer.

Full Access
Question # 34

Which information update is carried by OMP and enables the Cisco SD-WAN to build a secure overlay fabric on top of any public or private transport without regard for the actual link IP?

A.

TLOC

B.

RLOC

C.

LISP PITR

D.

DTLS

Full Access
Question # 35

Refer to the exhibit. An architect must create a stable and scalable EIGRP solution for a customer. The design must:

•conserve bandwidth, memory, and CPU processing

•prevent suboptimal routing

•avoid any unnecessary queries

Which two solutions must the architect select? (Choose two.)

A.

route summarization

B.

prefix lists

C.

distribute lists

D.

stub routing

E.

static redistribution

Full Access
Question # 36

Drag and drop the Cisco Catalyst SD-WAN components from the left to their definitions on the nght

Full Access
Question # 37

An engineer must design a scalable QoS architecture that allows the separation of the traffic into classes on predefined business requirements. The design must also utilize the differentiated services code points as the QoS priority descriptor value and support at least 10 levels of classification. Which QoS technology should the engineer include in the design?

A.

RSVP

B.

Diffserv

C.

Best effort

D.

Interserv

Full Access
Question # 38

Which type of rendezvous point deployment is standards-based and support dynamic RP discovery?

A.

Auto-RP

B.

Anycast-RP

C.

bootstrap router

D.

static RP

Full Access
Question # 39

Drag and drop the characteristics from the left onto the configuration protocols they describe on the right.

Full Access
Question # 40

Which control plane protocol is responsible for ElD-to-RLOC mapping concerning SO-Access Architecture?

A.

GBAC

B.

LISP

C.

CEF

D.

VXLAN

Full Access
Question # 41

Which two border nodes are available in the Cisco SD-Access architecture? (Choose two.)

A.

extended border

B.

edge border

C.

internal border

D.

anywhere border

E.

intermediate border

Full Access
Question # 42

A network solution is being designed for a company that connects to multiple Internet service providers. Which Cisco proprietary BGP path attribute will influence outbound traffic flow?

A.

Local Preference

B.

MED

C.

Weight

D.

AS Path

E.

Community

Full Access
Question # 43

A customer plans to adopt distributed QoS in their enterprise WAN. The policy must allow for individual packet marking according to the type of treatment required and for forwarding based on hop-by-hop treatment locally defined on each device. Which technology must the customer select?

A.

CBWFQ

B.

LLQ

C.

Diffserv

D.

IntServ

Full Access
Question # 44

A company needs to increase access port capacity on one floor of a building. They want to leverage the existing catalyst access switch. There is no problem with uplink bandwidth capacity. However, no additional uplinks can be added because no ports are available on the distribution switches. Which solution must the company choose to provide additional access ports?

A.

VDC

B.

VSS

C.

Etherchannel

D.

Stackwise

Full Access
Question # 45

Refer to the exhibit. An architect with an employee ID: 4542:60:170 is designing a campus Layer 2 infrastructure. The design requires a PoE power budget that varies from 30-60 W. In addition, power must be provided continuously to some endpoints and must be supported even during the reloading of edge switches. Which solution must the architect select?

A.

PoE Plus

B.

Fast PoE

C.

Universal PoE

D.

Perpetual PoE

Full Access
Question # 46

An engineer must design an in-band management solution for a customer with branch sites. The solution must allow remote management of the branch sites using management protocols over an MPLS WAN. Queueing is implemented at the remote sites using these classes:

How must the solution prioritize the management traffic over the WAN?

A.

Mark the traffic with DSCP CS1 and map into Class2 with a minimum bandwidth assigned by reducing the bandwidth available to CIass3.

B.

Mark the traffic with DSCP CS6 and map into Class1 with a minimum bandwidth assigned by reducing the bandwidth available to Class2

C.

Mark the traffic with DSCP EF and map into Class1 with a minimum bandwidth assigned by reducing the bandwidth available to Class2.

D.

Mark the traffic with DSCP CS2 and map into Class2 with a minimum bandwidth assigned by reducing the bandwidth available to Class3

Full Access
Question # 47

An engineer is tasked with designing a dual BGP peering solution with a service provider. The design must meet these conditions:

    The routers will not learn any prefix with a subnet mask greater than /24.

    The routers will determine the routes to include in the routing table based on the length of the mask alone.

    The routers will make this selection regardless of the service provider configuration.

Which solution should the engineer include in the design?

A.

Use a route map and access list to block the desired networks, and apply the route map to BGP neighbors inbound.

B.

Use a route map and prefix list to block the desired networks, and apply the route map to BGP neighbors outbound.

C.

Use an IP prefix list to block the desired networks and apply the IP prefix list to BGP neighbors outbound.

D.

Use an IP prefix list to block the desired networks and apply the IP prefix list to BGP neighbors inbound.

Full Access
Question # 48

An enterprise needs to enhance its WAN availability after a recent outage with its only MPLS provider. The proposed solution must have a quick deployment, be affordable, be reliable, and work as a backup for the enterprise's primary MPLS connection. Which solution meets these requirements?

A.

Contract an internet connection and deploy DMVPN.

B.

Deploy BFD echo mode and probe provider PE

C.

Deploy an additional WAN router and use a floating static route

D.

Contract another MPLS provider and deploy GET VPN.

Full Access
Question # 49

An engineer must design a VPN solution for a company that has multiple branches connecting to a main office. What are two advantages of using DMVPN instead of IPsec tunnels to accomplish this task? (Choose

two.)

A.

support for AES 256-bit encryption

B.

greater scalability

C.

support for anycast gateway

D.

lower traffic overhead

E.

dynamic spoke-to-spoke tunnels

Full Access
Question # 50

What is the purpose of a Cisco SD-Access underlay network?

A.

to abstract IP-based connectivity from physical connectivity

B.

to emulate LAN segments to transport Layer 2 frames over a Layer 3 network

C.

to establish physical connectivity between switches and routers

D.

to provide virtualization by encapsulating network traffic over IP tunnels

Full Access
Question # 51

An engineer is designing a QoS solution for a customer The customer's internet connection has a bandwidth of 10 Mbps. The design must ensure that traffic bursts of data do not exceed the bandwidth of the connection and that received traffic does not starve out business-critical traffic Which solution must the engineer choose?

A.

Configure the queuing default queue for shaping inbound and policing outbound.

B.

Configure the queuing default queue for shaping inbound and policing inbound.

C.

Configure the queuing default queue for shaping outbound and policing inbound.

D.

Configure the queuing default queue for shaping outbound and policing outbound.

Full Access
Question # 52

A company’s branch location uses redundant routers and links for connectivity to the headquarters. Also, to use the entire available bandwidth, the branch uses a dynamic routing protocol. An architect must design a multicast streaming solution to avoid RPF check failures because of the current network design. Which deployment model must the architect choose?

A.

PIM-SM

B.

BIDIR-PIM

C.

PIM-BSR

D.

PIM-SSM

Full Access
Question # 53

An engineer is working with NETCONF and Cisco NX-OS based devices. The engineer needs a YANG model that supports a specific feature relevant only to Cisco NX-OS. Which model must the engineer choose?

A.

Native

B.

IEEE

C.

OpenConfig

D.

IETF

Full Access
Question # 54

What is a benefit of using VRRPv3 as compared to VRRPv2?

A.

VRRPv3 supports IPv4 and IPv6

B.

VRRPv3 supports authentication

C.

VRRPv3 supports preemption

D.

VRRPv3 supports stateful switchover

Full Access
Question # 55

What is one function of the vSmart controller in an SD-WAN deployment?

A.

orchestrates vEdge and cEdge connectivity

B.

responsible for the centralized control plane of the SD-WAN network

C.

provides centralized network management and a GUI to monitor and operate the SD-WAN overlay

D.

provides a data-plane at branch offices to pass traffic through the SD-WAN network

Full Access
Question # 56

Which two functions are provided by the Cisco SD-WAN orchestration plane? (Choose two.)

A.

centralized provisioning

B.

primary authentication point

C.

NAT traversal facilitation

D.

Zero Touch Provisioning

E.

troubleshooting and monitoring

Full Access
Question # 57

A network engineer must design a multicast solution to prevent the spoofing of multicast streams and ensure efficient bandwidth utilization. The network will be merged with another multicast domain in the future, and the merge must require minimum effort. Which two solutions meet the customer requirements? (Choose two.)

A.

PIM-SSM

B.

IGMPv3

C.

IGMPv2

D.

PIM-SM

E.

MSDP

Full Access
Question # 58

Which two functions does the control plane node provide in a Cisco SD-Access architecture? (Choose two.)

A.

LISP proxy ETR

B.

host tracking database

C.

policy mapping

D.

map server

E.

endpoint registration

Full Access
Question # 59

An engineer must use YANG with an XML representation to configure a Cisco IOS XE switch with these specifications:

    IP address 10.10.10.10/27 configured on the interface GigabitEthernet2/1/0

    connectivity from a directly connected host 10.10.10.1/27

Which YANG data model set must the engineer choose?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 60

Which feature minimizes HOC connections and reduces strain on the vSmart controller m an SO-WAN architecture?

A.

control-connections

B.

corrtroWirection

C.

color

D.

affinity

Full Access
Question # 61

Refer to the exhibit. An engineer Is designing a redistribution solution for a customer. The customer recently acquired another company and decided to integrate the new network running RlPv1 with the company's existing network. Which redistribution technique must the engineer select to ensure the multipoint two-way redistribution does not cause routing loops?

A.

distribute-lists inbound under the EIGRP process denying RIPv1 learned prefixes

B.

distribute-lists outbound under the EIGRP process denying RIPv1 learned prefixes

C.

distribute-lists outbound under the RIPv1 process denying EIGRP learned prefixes

D.

distribute-lists inbound under the RIPv1 process denying EIGRP learned prefixes

Full Access
Question # 62

Drag and drop the characteristics from the left onto the YANG models they describe on the right. Not all options are used.

Full Access
Question # 63

Which two statements describe source trees in a multicast environment? (Choose two.)

A.

Source trees guarantee the minimum amount of network latency for forwarding multicast traffic

B.

Source trees create an optimal path between the source and the receivers

C.

Source trees use a single common root placed at some chosen point in the network

D.

Source trees can introduce latency in packet delivery

E.

Source trees can create suboptimal paths between the source and the receivers

Full Access
Question # 64

An architect is designing a network solution for a customer The network is IPv6-only with 1000 hosts. The design must provide external access to up to 10 concurrent IPv6 hosts to allow communication with legacy IPv4 devices on an adjacent network. The customer set aside 10 IPv4 addresses to allow for one-to-one communication between hosts. Which solution must the architect select?

A.

stateful NAT64

B.

static NAT-PT

C.

dynamic NPTv6

D.

dynamic NAT-PT

Full Access
Question # 65

Drag and drop the descriptions from the left onto the corresponding VPN types on the rights.

Full Access
Question # 66

A network architect Is enabling TV services In the LAN. The source will be streaming to the 239.1.1.1 group IP address. Dense mode Is not allowed In the network. Multicast has already been enabled on all network devices In the LAN segment. Which action must the architect take to finalize the design?

A.

Enable PIM SSM.

B.

Enable PIM Auto-RP.

C.

Enable PIM Anycast RP

D.

Enable PIM BSR.

Full Access
Question # 67

Drag and drop the components in a Cisco SD-Access architecture from the left onto their descriptions on the right.

Full Access
Question # 68

Refer to the exhibit. A network engineer working for a private service provider with an employee ID: 4670:71:451 must design a BGP solution based on:

    All traffic originating from AS100 must pass through AS200 to reach the NTP and DHCP server

    When a link failure occurs between R3 and R4, traffic must follow the R2-R9 link to reach the NTP and DHCP server.

Which solution must the design include?

A.

Routers R3 and R10 advertise an IGP metric into BGP during redistribution in both directions.

B.

Router R6 influences the paths of R9 and R11 to the DC with a higher AS-PATH value.

C.

Routers R3 and R10 advertise a lower local preference for outgoing traffic and a higher AS-PATH value for incoming traffic.

D.

Router R3 applies a local preference of 200 for R1. R2. R9. and R11 routers to reach the data center.

Full Access
Question # 69

What is an advantage of designing an out-of-band network management solution?

A.

In the event of a production network outage, network devices can still be managed.

B.

There is no separation between the production network and the management network.

C.

In the event of a production network outage, it can be used as a backup network path.

D.

It is less expensive than an in-band management solution

Full Access
Question # 70

Which design consideration must be made when dual WAN Edge routers are deployed at a branch site?

A.

Use BGP AS-path prepending to influence egress traffic and use MED to influence ingress traffic from the branch.

B.

HSRP priorities must match the OMP routing policy to prefer one WAN Edge over the other.

C.

Traffic must be symmetrical as it egresses the WAN Edges and returns from remote sites for DPI to function properly.

D.

Configure BFD between WAN Edge routers to detect sub-second link failures.

Full Access
Question # 71

Drag and drop the characteristics from the left onto the correct telemetry mode on the right.

Full Access
Question # 72

Refer to the exhibit.

A network engineer must improve the current IS-IS environment. The Catalyst switch is equipped with dual supervisors. Each time a stateful switchover occurs, the network experiences unnecessary route recomputation. Which solution addresses this issue if the upstream router does not understand graceful restart messaging?

A.

Enable IS-IS remote LFA FRR on both devices.

B.

Enable NSR on the switch.

C.

Enable NSF on the switch.

D.

Configure ISIS aggressive timers on both devices.

Full Access
Question # 73

A large chain of stores currently uses MPLS-based T1 lines to connect their stores to their data center. An architect must design a new solution to improve availability and reduce costs while keeping these considerations in mind:

» The company uses multicast to deliver training to the stores.

» The company uses dynamic routing protocols and has implemented QoS.

» To simplify deployments, tunnels should be created dynamically on the hub when additional stores open.

Which solution should be included in this design?

A.

VPLS

B.

GET VPN

C.

DMVPN

D.

IPsec

Full Access
Question # 74

Refer to the exhibit. An engineer is designing an OSPF solution for a customer. The design must take into consideration:

    Application load balancers D. E. and F are in different geographical locations and are OSPF-enabled.

    Hosts A, B. and C connect to an application through the load balancers using IP address 10.1.1.1/32.

    In the event of a failure of one of the load balancers, hosts must still have access to the application.

Which solution must the engineer choose?

A.

All load balancers to be co-located in area 0.

B.

X, Y, and Z to be configured as different areas

C.

At least one load balancer to be in area 0.

D.

X, Y and Z to be configured as the same area

Full Access
Question # 75

A global organization with several branches hired a network architect to design an overlay VPN solution. The branches communicate with each other frequently. The customer expects to add more branches in the future. To meet the customer's security requirements, the architect plans to provide traffic protection using dynamic IPsec tunnels. Which solution should the architect choose?

A.

DMVPN

B.

EasyVPN

C.

GETVPN

D.

L2TP

Full Access
Question # 76

Refer to the exhibit.

An engineer must optimize the traffic flow of the network. Which change provides a more

efficient design between the access and the distribution layer?

A.

Add a link between access switch A and access switch B

B.

Reconfigure the distribution switch A to become the HSRP Active

C.

Change the link between distribution switch A and distribution switch B to be a routed link

D.

Create an EtherChannel link between distribution switch A and distribution switch B

Full Access
Question # 77

A company has many spoke sites with two data centers. The company wants to exchange the routing information between the data centers and the spoke sites using EIGRP. All locations belong to a single AS. and auto-summarization Is disabled. Which two actions must the company choose? (Choose two.)

A.

Exchange all routes between locations

B.

Summarize the routes between the hubs.

C.

Make each spoke site router a stub router

D.

Summarize the routes from spokes to the hubs.

E.

Split the network into two separate ASs

Full Access
Question # 78

What is a feature of the SaaS subscription model?

A.

web connection not required

B.

access to industrial-strength storage and computing power

C.

autonomy and control over hardware

D.

tower initial costs

Full Access
Question # 79

A company wants to enable several third-party video conferencing networks based on multicast services. The video conferencing platform can accommodate numerous and dispersed senders and receivers in third-party networks The interior routing protocol is OSPF and the exterior routing protocol is BGP Which multicast mode must be selected to achieve this goal?

A.

Enable MP-BGP

B.

Enable BIDIR-PIM

C.

Configure MSDP

D.

Set IGMPv2.

Full Access
Question # 80

Which protocol is deployed through LAN automation to build node-to-node underlay adjacencies in SDA?

A.

IS-IS

B.

OLISP

C.

OSPF

D.

VXLAN

Full Access
Question # 81

Which element in a Cisco SD-WAN architecture maintains a centralized routing table?

A.

WAN Edge router

B.

vSmart Controller

C.

vManage NMS

D.

vBond Orchestrator

Full Access
Question # 82

Drag and drop the model driven telemetry characteristics from the left onto the mode they belong to on the right.

Full Access
Question # 83

A network engineer prepares a script to configure a loopback interface with IP address 172.16.15.12/32. To comply with the company security policies, 'Content-type':

‘application/yang-data+json‘ is added to the script. Connection to the network devices must be secured. Which code snippet must the network engineer use to meet this requirement?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 84

A customer with an IPv4 only network topology wants to enable IPv6 connectivity while preserving the IPv4 topology services. The customer plans to migrate IPv4 services to the IPv6 topology, then decommission the IPv4 topology. Which topology supports these requirements?

A.

dual stack

B.

6VPE

C.

6to4

D.

NAT64

Full Access
Question # 85

Which two routing protocols allow for unequal cost load balancing? (Choose two.)

A.

EIGRP

B.

IS-IS

C.

BGP

D.

OSPF

E.

RIPng

Full Access
Question # 86

What does the fabric data plane leverage in SD-Access Architecture?

A.

LISP protocol to resolve endpoint-to-location mapping

B.

IS-IS protocol to exchange link-state routing information

C.

MAC-in-IP encapsulation method to transport of the Layer 2 frame

D.

BGP protocol to advertise endpoint prefixes outside of the fabric

Full Access
Question # 87

Which function are fabric intermediate nodes responsible for in an SD-Access Architecture?

A.

mapping EIDs to RLOCs

B.

encapsulating user traffic in a VXLAN header including the SGT

C.

registering new endpoints in the HTDB

D.

transporting IP packets between edge nodes and border nodes

Full Access
Question # 88

Which design element should an engineer consider when multicast is included in a Cisco SD-Access architecture?

A.

PIM SSM must run in the underlay.

B.

Multicast clients reside in the underlay, and the multicast source is outside the fabric or

in the overlay.

C.

Rendezvous points must be used in a PIM SSM deployment.

D.

Multicast traffic is transported in the overlay and the EID space for wired and wireless clients.

Full Access
Question # 89

Refer to the exhibit. A customer experienced an unexpected network outage when the link between R1 and R2 went down. An architect must design a solution to ensure network continuity in the event the link fails again. Which solution should the design include?

A.

Make R31 an L1 router.

B.

Make R3 an L1L2 router

C.

Make Area 0 L2-only

D.

Make R11 an L2 router.

Full Access
Question # 90

Refer to the exhibit. The connection between SW2 and SW3 is fiber and occasionally experiences unidirectional link failure. An architect must optimize the network to reduce the change of layer2 forwarding loops when the link fails. Which solution should the architect include?

A.

Utilize 8PDU filter on SW3.

B.

Utilize loop guard on SW2

C.

Utilize BPDU guard on SW1

D.

Utilize root guard on SW1.

Full Access
Question # 91

A customer requested that a guaranteed service line be enabled for a manufacturing business in different countries. On the customer side, the QoS-aware application is used to process large data chunks. The application cannot tolerate drops and latency should be as low as possible. Which QoS model must an engineer employ to use the minimum required resources on the ISP network nodes?

A.

Implement a group-based QoS strategy with FECs enabled

B.

Enable a flow-based QoS strategy with queuing elements.

C.

Implement an end-to-end QoS strategy with SLA.

D.

Configure a domain-based QoS strategy with PHB behavior.

Full Access
Question # 92

Drag and drop the characteristics from the left onto the telemetry mode they apply to on the right.

Full Access
Question # 93

Which two considerations must be made regarding the overlay network for a Cisco SD-Access architecture? (Choose two.)

A.

Virtual networks should be used for microsegmentation

B.

SGTs should be used for data plane isolation and microsegmentation

C.

Virtual networks should be used for data plane isolation only

D.

Overlapping IP addresses across different overlay networks should be used to conserve IP addresses

E.

Overlapping IP addresses across different overlay networks should be avoided for operational simplicity

Full Access
Question # 94

A network engineer must segregate three interconnected campus networks using IS-IS routing. A two-layer hierarchy must be used to support large routing domains and to avoid more specific routes from each campus network being advertised to other campus network routers automatically. Which two actions does the engineer take to accomplish this segregation? (Choose two.)

A.

Designate two IS-IS routers as BDR routers at the edge of each campus, and configure one BDR for all Level 1 routers and one BDR for all Level 2 routers.

B.

Designate two IS-IS routers from each campus to act as Level 1/Level 2 backbone routers at the edge of each campus network.

C.

Assign the same IS-IS NET value for each campus, and configure internal campus routers with Level 1/ Level 2 routing.

D.

Utilize different MTU values for each campus network segment. Level 2 backbone routers must utilize a larger MTU size of 9216.

E.

Assign a unique IS-IS NET value for each campus, and configure internal campus routers with Level 1 routing.

Full Access
Question # 95

Refer to the exhibit. An engineer is designing an OSPF network for a client. Requirements dictate that the routers in Area 1 should receive all routes belonging to the network, including EIGRP, except the ones originated in the RIP domain. Which action should the engineer take?

A.

Make area 1 a NSSA.

B.

Make area 1 a stub.

C.

Make area 1 a standard OSPF area.

D.

Make the area 1 routers part of area 0.

Full Access
Question # 96

Refer to the exhibit An engineer with an employee ID: 1234 56:789 must design a WoL deployment for a client, and the design must ensure that the Windows PCs are responsive to the WoL magic packets with no delays when the server-side initiates the instruction Which action must the engineer choose?

A.

Spanning-tree PortFast must be enabled on all interfaces where clients reside.

B.

WoL must be enabled on the networking card and disabled in the Windows PCs BIOS.

C.

IP-directed broadcast must be disabled on all interfaces where clients reside.

D.

IP forward protocol must be disabled on all interfaces where clients reside

Full Access
Question # 97

What is the purpose of the fabric control plane in a Cisco SD-Access architecture?

A.

create, propagate, and enforce G6AC policies in the fabric

B.

create a transit node with BGP route reflector functionality

C.

extend multiple subnets to one RLOC

D.

create and resolve endpoint-to-location mapping

Full Access
Question # 98

An engineer must propose a QoS architecture model that allows an application to inform the network of its traffic profile and to request a particular type of service to support its bandwidth and delay requirements. The application requires consistent and dedicated bandwidth end to end. Which QoS architecture model meets these requirements?

A.

DiffServ

B.

LLQ

C.

WRED

D.

IntServ

Full Access
Question # 99

Refer to the exhibit. Which method must an architect use to provide connectivity between the mail servers?

A.

ISATAP

B.

6to4

C.

IPv4 compaliDie

D.

6rd

Full Access
Question # 100

A branch office has a primary L3VPN MPLS connection back to the main office and an IPSEC VPN tunnel that serves as backup. Which design ensures that data is sent over the backup connection only if the primary MPLS circuit is down?

A.

Use EIGRP to establish a neighbor relationship with the main office via

B.

L3VPN MPLS and the IPSEC VPN tunnel.

C.

Use BGP with the multipath feature enabled to force traffic via the primary path when available.

D.

Use static routes tied to an IP SLA to prefer the primary path while a floating static route points to the backup connection.

E.

Use OSPF with a passive-interface command on the backup connection.

Full Access
Question # 101

Refer to the exhibit. Which two points in the network must an engineer configure the ports for explicit trust when using a DiffServ model?

A.

B and E

B.

F and G

C.

A and D

D.

C and D

Full Access