Pre-Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Free and Premium Cisco 300-420 Dumps Questions Answers

Page: 1 / 25
Total 339 questions

Designing Cisco Enterprise Networks (ENSLD) Questions and Answers

Question 1

How is internet access provided to a WAN edge router that is connected to a MPLS transport link?

Options:

A.

OMP advertises a default route from a WAN Edge router that is connected to the MPLS and internet transport networks

B.

Internet access must be provided at the WAN Edge router through either a 4G/5G link or local Internet circuit

C.

An extranet must be provided in the MPLS transport network to allow private traffic to reach the public internet

D.

TLOC extensions are used to route traffic to a WAN Edge router that is connected to the Internet transport network

Buy Now
Question 2

A customer requires QoS to support multimedia conferencing over MPLS. The network architect chooses to use per-hop behavior. Which solution must the architect use to classify and mark traffic traveling between branch sites?

Options:

A.

BW Queue and DSCP WRED with DSCP AF3

B.

BW Queue with DSCP AF3

C.

BW Queue and DSCP WRED with DSCP AF4

D.

BW Queue with DSCP AF4

Question 3

An architect is designing a network for an enterprise site. The design must use an active/backup design for the WAN. It must guarantee the SLA for several applications regardless of which connection is used. Which deployment model should the architect choose?

Options:

A.

MPLS WAN from two separate ISPs

B.

hybrid WAN using MPLS VPN and internet VPN from a single ISP

C.

hybrid WAN using MPLS VPN and internet VPN from two separate ISPs

D.

internet WAN from two separate ISPs

Question 4

A customer plans to deploy WoL in the enterprise with these high-level design requirements:

Which two solutions must the customer select to have a successful deployment? (Choose two.) 3 A. IP directed broadcast and forward-protocol must be enabled on all the SVI or routed interlaces where the client subnets reside.

B. IP helper-addresses for the client ranges must be enabled on the SVI or routed interface where the WoL server subnet resides.

C. IP helper-addresses for the client ranges must be disabled on the SVI or routed interface where the WoL server subnet resides

D. IP helper-addresses for the WoL server must be enabled on the SVI or routed interface where the client subnets reside

E. IP directed broadcast and forward-protocol must be disabled on all the SVI or routed interfaces where the client subnets reside.

Options:

A.

DHCP services must be available.

B.

Clients BIOS settings must be set for WoL.

C.

Clients get IP addresses once online.

D.

Spanning-tree PortFast is enabled on the Layer 2 switches.

Question 5

Drag and drop the properties from the left onto the Cisco SD-WAN components that perform them on the right.

Options:

Question 6

An architect must design a QoS model for a business-critical application that Is delay-sensitive and requires high bandwidth. The company's head office hosts the application, and DMVPN tunnels protected with IPsec provide connectivity between the head office and branches. Which solution must the architect choose?

Options:

A.

RSVP

B.

IntServ

C.

WRED

D.

DiffServ

Question 7

Refer to the exhibit. Customers report low video quality and delays when having point-to-point telepresence video calls between the two locations. An architect must optimize a design so that traffic follows the same path for egress and ingress traffic flows. Which technique optimizes the design?

Options:

A.

Configure route leaking on the router in area 2.

B.

Configure route leaking on the router in area 1.

C.

Configure the high metric on the router in area 4.

D.

Configure route filter on the router in area 4.

Question 8

Refer to the exhibit A network administrator plans to announce the site subnets to the WAN using route summarization instead of announcing every subnet. What is the smallest summary route that should be used to encompass all subnets at the site?

Options:

A.

2001:DB8:ABCD:0003::/60

B.

2001:DB8::732

C.

2001:DB8:ABCD::760

D.

2001 DB8 ABCD /64

Question 9

Which design consideration must be made when using IPv6 overlay tunnels?

Options:

A.

Overlay tunnels that connect isolated IPv6 networks can be considered a final IPv6 network architecture.

B.

Overlay tunnels should only be considered as a transition technique toward a permanent solution.

C.

Overlay tunnels can be configured only between border devices and require only the IPv6 protocol stack.

D.

Overlay tunneling encapsulates IPv4 packets in IPv6 packets for delivery across an IPv6 infrastructure.

Question 10

Which two statements about VRRP advertisements are true? (Choose two.)

Options:

A.

    They are sent from the master router and standby routers.

B.

    They include VRRP timer information.

C.

    They are sent only from the master router.

D.

    They include priority information.

E.

    They are sent every three seconds by default.

Question 11

Which design consideration must be made when dual WAN Edge routers are deployed at a branch site?

Options:

A.

Use BGP AS-path prepending to influence egress traffic and use MED to influence ingress traffic from the branch.

B.

HSRP priorities must match the OMP routing policy to prefer one WAN Edge over the other.

C.

Traffic must be symmetrical as it egresses the WAN Edges and returns from remote sites for DPI to function properly.

D.

Configure BFD between WAN Edge routers to detect sub-second link failures.

Question 12

An engineer is designing a BGP solution supporting a VXLAN environment over a Layer 3 IPv4 network fabric with these requirements

    provide Layer 2 adjacency

    allow VM migration of workloads between sites

    IGP is OSPF

Which BGP address family must the engineer choose?

Options:

A.

VPNv4

B.

IPv4 unicast

C.

L2VPN VPLS-VPWS

D.

L2VPNEVPN

Question 13

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 14

Which two considerations must be made regarding the overlay network for a Cisco SD-Access architecture? (Choose two.)

Options:

A.

Virtual networks should be used for microsegmentation

B.

SGTs should be used for data plane isolation and microsegmentation

C.

Virtual networks should be used for data plane isolation only

D.

Overlapping IP addresses across different overlay networks should be used to conserve IP addresses

E.

Overlapping IP addresses across different overlay networks should be avoided for operational simplicity

Question 15

Drag and drop the descriptions from the left onto the Cisco SD-WAN component they describe on the right.

Options:

Question 16

Refer to the exhibit. A network architect is preparing a network design based on the EIGRR Routers are connected using a cat6a cable type and the inter-router connection speed is limited to 10 Mbps due to distance. During the pilot phase, a DUAL-3-SIA error message is visible. Which action must the engineer take to create a stable design?

Options:

A.

Enable poison reverse on R4.

B.

Configure STUB area on R4.

C.

Create a summary route on R2.

D.

Disable split horizon on R1.

Question 17

Which nonproprietary mechanism can be used to automate rendezvous point distribution in a large PIM domain?

Options:

A.

Embedded RP

B.

BSR

C.

Auto-RP

D.

Static RP

Question 18

What are two benefits of designing an SD-WAN network fabric with direct Internet access implemented at

every site? (Choose two.)

Options:

A.

It decreases latency to applications hosted by public cloud service provider.

B.

It decreases latency on Internet circuits.

C.

It increases the speed of delivery of site deployments through zero-touch provisioning.

D.

It increases the total available bandwidth on Internet circuits.

E.

It alleviates network traffic on MPLS circuits.

Question 19

When a network is designed using IS-IS protocol, which two circuit types are supported? (Choose two.)

Options:

A.

nonbroadcast multiaccess

B.

multiaccess

C.

point-to-multipoint

D.

nonbroadcast

E.

point-to-point

Question 20

Prior to establishing full-mesh iPsec tunnels in a typical Cisco SD-WAN deployment, which mechanism do WAN Edge routers use to exchange Key information for data plane encryption?

Options:

A.

They use vSmart controllers as key exchange servers.

B.

They use vManage as a key exchange server.

C.

They use IKEv2 when exchanging keys with each other.

D.

They use vBond as a key exchange server.

Question 21

A customer is discussing QoS requirements with a network consultant. The customer has specified that end-to-end path verification is a requirement. Which QoS solution meets this requirement?

Options:

A.

IntServ model with RSVP to support the traffic flows

B.

DiffServ model with PHB to support the traffic flows

C.

marking traffic at the access layer with DSCP to support the traffic flows

D.

marking traffic at the access layer with CoS to support the traffic flows

Question 22

Exhibit:

Options:

A.

Make R3 an L1L2 router.

B.

Make R31 an L1 router.

C.

Make Area 0 L2-only.

D.

Make R11 an L2 router.

Question 23

An architect must design an IPv6 migration solution for a corporation with remote offices to support:

* The customer has IPv4 peering with their service provider.

* IPv6 users need access to IPv4 and IPv6 resources.

* Existing content providers will migrate to IPv6 in the next two years.

* Users will be migrated in a phase-by-phase approach.

Which migration solution must the architect choose?

Options:

A.

NAT46

B.

tunneling

C.

NAT64

D.

dual-stack

Question 24

Refer to the exhibit. An architect must design a solution to connect the network behind R3 with the EIGRP network. Which mechanism should be included to avoid routing loops?

Options:

A.

split-horizon

B.

summarization

C.

down bit

D.

route tags

Question 25

An engineer must design an in-band management solution for a customer with branch sites. The solution must allow remote management of the branch sites using management protocols over an MPLS WAN. Queueing is implemented at the remote sites using these classes:

How must the solution prioritize the management traffic over the WAN?

Options:

A.

Mark the traffic with DSCP CS1 and map into Class2 with a minimum bandwidth assigned by reducing the bandwidth available to CIass3.

B.

Mark the traffic with DSCP CS6 and map into Class1 with a minimum bandwidth assigned by reducing the bandwidth available to Class2

C.

Mark the traffic with DSCP EF and map into Class1 with a minimum bandwidth assigned by reducing the bandwidth available to Class2.

D.

Mark the traffic with DSCP CS2 and map into Class2 with a minimum bandwidth assigned by reducing the bandwidth available to Class3

Question 26

A network administrator is troubleshooting a DMVPN setup between the hub and the spoke. Which action should the administrator take before troubleshooting the IPsec configuration?

Options:

A.

    Verify the GRE tunnels.

B.

    Verify ISAKMP.

C.

    Verify NHRP.

D.

    Verify crypto maps.

Question 27

Drag and drop the elements from the left onto the YANG models where they and used on the right.

Options:

Question 28

Refer to the exhibit. An engineer Is designing a multicampus Layer 3 Infrastructure using EIGRP as the routing protocol. The design must provide quick replies to queries In the event of a downlink, prevent unnecessary queries, and ensure that traffic does not unnecessarily transit the access layer. Which two actions must the engineer take for the network design? (Choose two.)

Options:

A.

Configure core layer switches as stub routers.

B.

Configure distribution layer switches to summarize routes to the core layer.

C.

Configure access layer switches as stub routers.

D.

Configure access layer and core layer switches as stub routers.

E.

Configure access layer switches to summarize routes to the distribution layer.

Question 29

An engineer is designing a network for a customer running a wireless network with a common VLAN for all APs. The customer is experiencing unicast flooding in the Layer 2 network between the aggregation and access layers. The customer wants to reduce the flooding and improve convergence time. Which solution meets these requirements?

Options:

A.

Migrate all APs to a common Layer 2 access layer switch and run Layer 3 from the aggregation layer to all remaining access layer switches.

B.

Align HSRP primary and STP root bridges and reduce ARP timers to match CAM timers on the aggregation layer switches.

C.

Migrate to a Layer 3 access campus design if the APs can run on separate VLANs.

D.

Align HSRP primary and STP root bridges if the APs cannot run on separate VLANs.

Question 30

An enterprise customer has these requirements:

    end-to-end QoS for the business-critical applications and VoIP services based on CoS marking.

    flexibility to offer services such as IPv6 and multicast without any reliance on the service provider.

    support for full-mesh connectivity at Layer 2.

Which WAN connectivity option meets these requirements?

Options:

A.

VPWS

B.

MPLS VPN

C.

DMVPN

D.

VPLS

Question 31

Refer to the exhibit. A network engineer working for a private service provider with an employee ID: 4670:71:451 must design a BGP solution based on:

    All traffic originating from AS100 must pass through AS200 to reach the NTP and DHCP server

    When a link failure occurs between R3 and R4, traffic must follow the R2-R9 link to reach the NTP and DHCP server.

Which solution must the design include?

Options:

A.

Routers R3 and R10 advertise an IGP metric into BGP during redistribution in both directions.

B.

Router R6 influences the paths of R9 and R11 to the DC with a higher AS-PATH value.

C.

Routers R3 and R10 advertise a lower local preference for outgoing traffic and a higher AS-PATH value for incoming traffic.

D.

Router R3 applies a local preference of 200 for R1. R2. R9. and R11 routers to reach the data center.

Question 32

How do endpoints inside an SD-Access network reach resources outside the fabric?

Options:

A.

a VRF fusion router is used to map resources in one VN to another VN

B.

Fabric borders use VRFs to map VNs to VRFs

C.

SD-Access transit links are used to transport encapsulated traffic from one fabric to another

D.

A fabric edge is used to de-encapsulate VXLAN traffic to normal IP traffic then transported over the outside network

Question 33

Refer to the exhibit. An architect is designing a network that requires route redistribution. The design must prevent route feedback and the creation of routing loops. The OSPF domain is using default metrics, and the IS-IS domain is using narrow metrics. Which solution must the architect select?

Options:

A.

Change the IS-IS administrative distance to 105.

B.

Change the OSPF area to a nonbackbone stub area

C.

Use route filtering with an ACL or prefix list.

D.

Use route tagging with a route map.

Question 34

An engineer is designing a QoS solution for a customer The customer's internet connection has a bandwidth of 10 Mbps. The design must ensure that traffic bursts of data do not exceed the bandwidth of the connection and that received traffic does not starve out business-critical traffic Which solution must the engineer choose?

Options:

A.

Configure the queuing default queue for shaping inbound and policing outbound.

B.

Configure the queuing default queue for shaping inbound and policing inbound.

C.

Configure the queuing default queue for shaping outbound and policing inbound.

D.

Configure the queuing default queue for shaping outbound and policing outbound.

Question 35

Which WAN connectivity technology is optimal for edge computing compared to others and why?

Options:

A.

Due to low latency, high bandwidth, and closest proximity to the user. 4G/5G connectivity is the optimal WAN technology for edge computing compared to L3 VPN MPLS connectivity, which offers native separation and security with close proximity to the data center.

B.

Due to high bandwidth, separation and security, and proximity to the data center network. DWDM Is the optimal WAN technology lor edge computing compared to 4G/5G connectivity, which offers native separation and security with close proximity to the data center.

C.

Due to low latency, high bandwidth, and closest proximity to the user, L3 VPN MPLS connectivity is the optimal WAN technology for edge computing compared to 4G/5G connectivity, which offers native separation and security with close proximity to the data center.

D.

Due to low cost, high bandwidth, low latency, and closest proximity to the edge of the network, Mero Ethernet is the optimal WAN technology for edge computing compared to MPLS, which offers native separation and security with close proximity to the data center.

Question 36

Refer to the exhibit. A network engineer must design a BGP solution based on:

    The route reflector must have one or more direct physical connections to the core routers (R3 and R4).

    The route reflector must have full redundancy and avoid a single point of failure.

    R2 to R1 link utilization is 90%. and the remaining links are less than 50% utilized.

Which two solutions must the design Include? (Choose two.)

Options:

A.

Configure R1 to be a client of R2 and R4.

B.

Configure R2 to be a client of R1 and R4.

C.

Configure R3 to be a client of R2 and R4.

D.

Configure R4 to be a client of R1 and R3.

E.

Configure R5 to be a client of R3 and R4.

Question 37

What is the main purpose of the Cisco SD-Access underlay design?

Options:

A.

to enable automated network provisioning and configuration

B.

to support advanced firewall and IPS features

C.

to optimize network traffic routing and load-balancing

D.

to provide network segmentation and isolation for security

Question 38

Refer to the exhibit. A Cisco Catalyst switch is configured to.. only one MAC address to be learned manually on interface gkjO/2. Which command must be run to dynamically learn the devices that are connected to the switch port?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 39

A company's security policy requires that all connections between sites be encrypted in a manner that does not

require maintenance of permanent tunnels. The sites are connected through a private MPLS-based service that

uses a dynamically changing key and spoke-to-spoke communication. Which type of transport encryption must

be used in this environment?

Options:

A.

GETVPN

B.

DMVPN

C.

GRE VPN

D.

standard IPsec VPN

Question 40

Refer to the exhibit. An engineer is designing a BGP solution for a client that peers with ISP1 for full Internet connectivity and with ISP2 for direct exchange of routes for several third parties. Which action, when implemented on the edge routers, enables the client network to reach the Internet through ISP1?

Options:

A.

Run an eBGP session within different VRFs for each ISP.

B.

Advertise a default route for downstream routers within the client network.

C.

Apply the AS-path prepend feature for ISP2.

D.

Apply route filtering such that the client advertises only routes originated from its own AS.

Question 41

Refer to the exhibit. A company has some offices that are connected via dark fiber in New York. A network architect must optimize the network design based on the EIGRP routing protocol. The network has hierarchical addressing between 10 and 12 routers in each office. Routing convergence time must be at the minimum. What must the network architect do to reduce the query range?

Options:

A.

Configure stub areas on non-edge routers.

B.

Implement network summarization on edge routers.

C.

Use different EIGRP processes on edge routers.

D.

Configure route filtering on non-edge routers.

Question 42

Refer to the exhibit. An architect reviews the low-level design of a company's enterprise network and advises optimizing the STP convergence time. Which functionality must be to Gi1/0/1-10 to follow the architect's recommendation?

Options:

A.

PortFast

B.

root guard

C.

UplinkFast

D.

BPDU guard

Question 43

In a Cisco SD-Access fabric, switch node Is equivalent to an access layer switch In a traditional three-tier campus network design?

Options:

A.

edge node

B.

border node

C.

intermediate node

D.

control plane node

Question 44

What are two valid scaling techniques when an EIGRP network is designed that consists of more than 1000 routers? (Choose two.)

Options:

A.

Use structured hierarchical topology with route summarization

B.

Used sub-second timers

C.

Use the distribute-list command to filter routes

D.

Modify delay parameters on the links

E.

Implement multiple EIGRP autonomous systems

Question 45

Refer to the exhibit. An engineer is planning an IPv4 to IPv6 migration solution for a customer. The routers in the network can support IPv4 and IPv6, except for the DWDM routers. The DWDM routers provide a Layer 2 link in which the routers peer directly with each other across a DWDM circuit. The circuit also provides connectivity between the mail servers. Which IPv6 migration technique must the engineer deploy?

Options:

A.

dual-stack

B.

6to4

C.

ISATAP

D.

6rd

Question 46

Refer to the exhibit. All routers currently reside in OSPF area 0. The network manager recently used R1 and R2 as aggregation routers for remote branch locations and R3 and R4 for aggregation routers for remote office locations. The network has since been suffering from outages, which are causing frequent SPF runs. To enhance stability and introduce areas to the OSPF network with the minimal number of ABRs possible, which two solutions should the network manager recommend? (Choose two.)

Options:

A.

a new OSPF area for R1 and R2 connections,with R1 and R2as ABRs

B.

a new OSPF area for R3 and R4 connections,with R5 and R6as ABRs

C.

a new OSPF area for R3 and R4 connections,with R3 and R4as ABRs

D.

a new OSPF area for R1, R2, R3, and R4 connections, with R1, R2, R3, and R4 as

ABRs

E.

a new OSPF area for R1 and R2 connections, with R5 and R6 as ABRs

Question 47

Refer to the exhibit. An architect is designing a Layer 3 campus network The design must hide network instability, reduce network overhead, and conserve critical device memory Which route summarization solution must the architect select?

Options:

A.

• The core layer must advertise a default route toward the aggregation layer

• The VLAN subnets must be summarized into 10 0 0 0.'16 at the aggregation layer and advertised to the core layer

B.

• The core layer must advertise a default route toward the aggregation layer

• The VLAN subnets must be summarized into 10 0 0 0/16 at the access layer and advertised to the aggregation layer

C.

• The aggregation layer must advertise a default route toward the access layer.

• The VLAN subnets must be summarized into 10 0.0 0/16 at the aggregation layer and advertised to the core layer

D.

• The aggregation layer must advertise a default route toward the core layer

• The VLAN subnets must be summarized into 10 0 0 0.116 at the aggregation layer and advertised to the access layer

Question 48

An engineer must design a VPN solution for a company that has multiple branches connecting to a main office. What are two advantages of using DMVPN instead of IPsec tunnels to accomplish this task? (Choose

two.)

Options:

A.

support for AES 256-bit encryption

B.

greater scalability

C.

support for anycast gateway

D.

lower traffic overhead

E.

dynamic spoke-to-spoke tunnels

Question 49

A company needs to increase access port capacity on one floor of a building. They want to leverage the existing catalyst access switch. There is no problem with uplink bandwidth capacity. However, no additional uplinks can be added because no ports are available on the distribution switches. Which solution must the company choose to provide additional access ports?

Options:

A.

VDC

B.

VSS

C.

Etherchannel

D.

Stackwise

Question 50

Which PIM mode uses a shared tree only?

Options:

A.

bidirectional

B.

sparse

C.

dense

D.

source-specific

Question 51

Refer to the exhibit.

An engineer must optimize the traffic flow of the network. Which change provides a more

efficient design between the access and the distribution layer?

Options:

A.

Add a link between access switch A and access switch B

B.

Reconfigure the distribution switch A to become the HSRP Active

C.

Change the link between distribution switch A and distribution switch B to be a routed link

D.

Create an EtherChannel link between distribution switch A and distribution switch B

Question 52

Which design element should an engineer consider when multicast is included in a Cisco SD-Access architecture?

Options:

A.

PIM SSM must run in the underlay.

B.

Multicast clients reside in the underlay, and the multicast source is outside the fabric or

in the overlay.

C.

Rendezvous points must be used in a PIM SSM deployment.

D.

Multicast traffic is transported in the overlay and the EID space for wired and wireless clients.

Question 53

Refer to the exhibit. An architect designs a BGP policy for a customer that requires load sharing of the links that connect with the upstream service provider. The customer has these requirements: • The inbound traffic destined to network 10.1.1.0/24 must transit the R3-R1 link, and if the link fails, all inbound traffic must transit the R4-R2 link.

• The inbound traffic destined to network 10.1.2.0/24 must transit the R4-R2 link, and if the link fails, all inbound traffic should transit the R3-R1 link.

Which solution must the architect choose?

Options:

A.

• R1 must announce prefix 10.1.2.0/24 with the route map applied to the neighbor using set as-path prepend 64512 64512

• R2 must announce prefix 10.1.1.0/24 with the route map applied to the neighbor using set as-path prepend 64512 64512.

B.

• R1 must announce prefix 10.1 2.0/24 with a community attribute 64513:300 and prefix 10.1.1.0/24 with a community attribute 64513:200.

• R2 must announce prefix 10.1.2.0/24 with a community attribute 64513:200 and prefix 10.1.1.0/24 with a community attribute 64513:300.

C.

• R1 must announce prefix 10.1.1.0/24 with the route map applied to the neighbor using set as-path prepend 64512 64512.

• R2 must announce prefix 10.1.2.0/24 with the route map applied to the neighbor using set as-path prepend 64512 64512.

D.

• R1 must announce prefix 10.1.2.0/24 with a community attribute 64513:200 and prefix 10.1.1.0/24 with a community attribute 64513:300.

• R2 must announce prefix 10.1.2.0/24 with a community attribute 64513:300 and prefix 10.1.1.0/24 with a community attribute 64513:200.

Question 54

Which two functions does the control plane node provide in a Cisco SD-Access architecture? (Choose two.)

Options:

A.

LISP proxy ETR

B.

host tracking database

C.

policy mapping

D.

map server

E.

endpoint registration

Question 55

An engineer must use YANG with an XML representation to configure a Cisco IOS XE switch with these specifications:

    IP address 10.10.10.10/27 configured on the interface GigabitEthernet2/1/0

    connectivity from a directly connected host 10.10.10.1/27

Which YANG data model set must the engineer choose?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 56

Refer to the exhibit.

The failover time of ISP-2 is significantly shorter than ISP-1 when an interface on the ISP router toward the campus network fails. Which solution minimizes the downtime to the sub-second?

Options:

A.

Aggressive timers

B.

Next-hop address tracking

C.

Graceful-restart

D.

BFD

Question 57

A customer with an IPv4 only network topology wants to enable IPv6 connectivity while preserving the IPv4 topology services. The customer plans to migrate IPv4 services to the IPv6 topology, then decommission the IPv4 topology. Which topology supports these requirements?

Options:

A.

dual stack

B.

6VPE

C.

6to4

D.

NAT64

Question 58

An engineer must establish a direct connection between two remote offices. The new connection must be established using a logical path, share a common broadcast domain, connect over private WAN, and have as little overhead as possible. Which technology must the engineer choose?

Options:

A.

L2VPN

B.

GET VPN

C.

IPsec

D.

GRE

Question 59

An engineer must design a solution to provide backup connectivity between two sites. The engineer plans to use an Internet connection but company policy requires the connection to be encrypted. Additionally, there are several applications that utilize multicast to deliver video streams between the sites. Which technology should the design include?

Options:

A.

GRE over IPsec

B.

IPsec direct encapsulation

C.

GETVPN

D.

DMVPN

Question 60

Refer to the exhibit. A customer has two eBGP peerings from a single CE router toward two service providers. The customer has hired an architect to design a solution to ensure certain traffic enters the customer's network through interface g¡g0/0. Which solution must the architect include in the design?

Options:

A.

Advertise a lower MED value toward the less preferred service provider.

B.

Prepend additional AS on the AS path toward the preferred service provider.

C.

Break aggregated routes into longer prefixes and advertise to the preferred service provider.

D.

Set a higher local preference to the preferred service provider path.

Question 61

A network engineer is redesigning a company's QoS solution. The company is currently using IP Precedence, but the engineer plans to move to DiffServ. It is important that the new solution provide backward compatibility with the current solution. Which technology should the design include?

Options:

A.

expedited forwarding

B.

assured forwarding

C.

class selector code points

D.

default per hop behavior

Question 62

A company has many spoke sites with two data centers. The company wants to exchange the routing information between the data centers and the spoke sites using EIGRP. All locations belong to a single AS. and auto-summarization Is disabled. Which two actions must the company choose? (Choose two.)

Options:

A.

Exchange all routes between locations

B.

Summarize the routes between the hubs.

C.

Make each spoke site router a stub router

D.

Summarize the routes from spokes to the hubs.

E.

Split the network into two separate ASs

Question 63

Refer to the exhibit.

EIGRP has been configured on all links. The spoke nodes have been configured as EIGRP stubs, and the WAN links to R3 have higher bandwidth and lower delay than the links to R4. When a link failure occurs at the R1-R2 link, what happens to traffic on R1 that is destined for a subnet attached to R2?

Options:

A.

R1 has no route to R2 and drops the traffic

B.

R1 load-balances across the paths through R3 and R4 to reach R2

C.

R1 forwards the traffic to R3, but R3 drops the traffic

D.

R1 forwards the traffic to R3 in order to reach R2

Question 64

A company requested that an architect propose a new IPv4 and IPv6 deployment strategy. The company wants a solution that is straightforward, with no information hiding or forwarding overhead. Which solution meets these requirements?

Options:

A.

LISP

B.

NAT64

C.

dual-stack

D.

GRE tunnels

Question 65

Refer to the exhibit.

An architect is designing an EIGRP solution based on these requirements:

* Traffic forwarding should use the best two paths while all links are available

* Single path failure must not impact traffic between branch and HQ

Which solution must the architect select?

Options:

A.

Maximum-paths 2

B.

Add-paths 2

C.

Metric weights 010100

D.

Variance 2

Question 66

Which type of rendezvous point deployment is standards-based and supports dynamic RP discovery?

Options:

A.

bootstrap router

B.

Anycast-RP

C.

Auto-RP

D.

static RP

Question 67

Refer to the exhibit. The connection between SW2 and SW3 is fiber and occasionally experiences unidirectional link failure. An architect must optimize the network to reduce the change of layer2 forwarding loops when the link fails. Which solution should the architect include?

Options:

A.

Utilize 8PDU filter on SW3.

B.

Utilize loop guard on SW2

C.

Utilize BPDU guard on SW1

D.

Utilize root guard on SW1.

Question 68

Drag and drop the model-driven telemetry considerations from the left onto the modes they apply to on the right.

Options:

Question 69

Refer to the exhibit. An architect is designing an IPv4 plan using the 172.16.0.0/16. The design must maximize the number of subnets while meeting these requirements:

    500 hosts within the server room

    100 hosts at the remote site

    25 hosts at the access site

Which plan must the architect choose?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 70

What is one function of the vSmart controller in an SD-WAN deployment?

Options:

A.

orchestrates vEdge and cEdge connectivity

B.

responsible for the centralized control plane of the SD-WAN network

C.

provides centralized network management and a GUI to monitor and operate the SD-WAN overlay

D.

provides a data-plane at branch offices to pass traffic through the SD-WAN network

Question 71

An engineer uses Postman and YANG to configure a router with:

    OSPF process ID 200

    network 172.16.10.128/26 enabled for Area 0

Which get-config reply verifies that the model set was designed correctly?

Options:

A.

Text, letter Description automatically generated

B.

Graphical user interface, text, letter, email Description automatically generated

C.

Text, letter Description automatically generated

D.

Text, letter Description automatically generated

Question 72

Which design consideration should be observed when EIGRP is configured on Data Center switches?

Options:

A.

Perform manual summarization on all Layer 3 interfaces to minimize the size of the routing table.

B.

Prevent unnecessary EIGRP neighborships from forming across switch virtual interfaces.

C.

Lower EIGRP hello and hold timers to their minimum settings to ensure rapid route reconvergence.

D.

Configure multiple EIGRP autonomous systems to segment Data Center services and applications.

Question 73

A global organization with several branches hired a network architect to design an overlay VPN solution. The branches communicate with each other frequently. The customer expects to add more branches in the future. To meet the customer's security requirements, the architect plans to provide traffic protection using dynamic IPsec tunnels. Which solution should the architect choose?

Options:

A.

DMVPN

B.

EasyVPN

C.

GETVPN

D.

L2TP

Question 74

Refer to the exhibit An engineer is designing a hierarchical ISIS solution for an enterprise customer with these requirements

    Users in areas 25 and 55 send and receive traffic from both backbone areas

    Link flaps in areas 35 and 45 must not impact other areas

    Routers will double within the next 12 months in areas 35 and 45

Which design must the engineer select?

Options:

A.

A series routers Level 2, B series routers Level 2, and C series routers Level 1

B.

A series routers Level 1/2 B series routers Level 2 and C series routers Level 2

C.

A series routers Level 1. B series routers Level 1/2. and C series routers Level 2

D.

A series routers Level 1.2 B series routers Level 1/2 and C series routers Level 1/2

Question 75

An architect is designing a network that will utilize the spanning tree protocol to ensure a loop-free topology. The network will support an engineering environment where it is necessary for end users to connect their own network switches for testing purposes. Which feature should the architect include in the design to ensure the spanning tree topology is not affected by these rogue switches?

Options:

A.

BPDU Skew Detection

B.

BPDU guard

C.

loop guard

D.

root guard

Question 76

An engineer is designing a multicast network for a company specializing in VoD content. Receivers are across the Internet, and for performance reasons, the multicast framework close to the receivers within each AS. For high availability, if the sources in one AS are no longer available, the receivers of that AS must be able to receive the VoD content from sources in another AS. Which feature must the design include?

Options:

A.

Bidirectional PIM

B.

SSM

C.

Anycast RP

D.

MSDP

Question 77

An existing network solution is using BFD in echo mode. Several of the network devices are experiencing high CPU utilization which an engineer has determined is related to the BFD feature. Which solution should the engineer leverage to reduce the CPU load?

Options:

A.

Implement slow timers between peers with low CPU resources.

B.

Implement BED asynchronous mode between peers with low CPU resources.

C.

Enable BFD multi-hop on the devices with low CPU resources.

D.

Utilize carrier delay on all routers in the network.

Question 78

Which OSPF area blocks LSA Type 3, 4 and 5, but allows a default summary route?

Options:

A.

normal

B.

stub

C.

NSSA

D.

totally stubby

Question 79

Refer to the exhibit An engineer is designing an OSPF solution with these requirements:

    NMS server will manage R5 and R6.

    Upon failure of R1. all NMS traffic should be routed through R4.

    Upon failure of the link between R5 and R6. all traffic destined for 10.6.6.6 should be routed through R4

Which solution must the engineer choose?

Options:

A.

Advertise 172.16.1.1 into OSPF process 1 with high cost on R1.

B.

Apply static routes on R2 and R3 with IP SLA tracking toward R5 and R6.

C.

Enable the default-Information originate command with a higher metric on R2 to R1.

D.

Redistribute OSPF process 1 into process 2 on R1 and R4.

Question 80

What is the purpose of a Cisco SD-Access underlay network?

Options:

A.

to abstract IP-based connectivity from physical connectivity

B.

to emulate LAN segments to transport Layer 2 frames over a Layer 3 network

C.

to establish physical connectivity between switches and routers

D.

to provide virtualization by encapsulating network traffic over IP tunnels

Question 81

An engineer must peer with an ISP for internet connectivity using BGP, initially, the engineer wants to receive only specific prefixes from the ISP and a default route. However, the solution must provide the flexibility to add prefixes in the future at short notice. The ISP has a two-week change process in place. Which route filtering solution must the engineer employ?

Options:

A.

Request a limited internet routing table and a default route from the ISP and configure the BGP max-limit to 1 with an access list that permits only the specific internet prefixes and blocked networks

B.

Request only the required prefixes and default route be advertised from the ISO with whitelisted networks

C.

Request a full internet routing table and a default route from the ISP and configure inbound route filtering with a prefix list that permits the default route and required prefixes

D.

Configure outbound route filtering on the enterprise and ISP so that the enterprise tell the ISP which prefixes are required

Question 82

Which two overlay network design considerations must be made for a Cisco SD-Access network? (Choose two.)

Options:

A.

LAN automation for deployment

B.

Layer 3 to the access design

C.

Reduce subnets and simplify DHCP management

D.

Dedicated IGP process for the fabric

E.

Avoid overlapping IP subnets

Question 83

A company must automate a set of complex changes aligned with DR testing in the network. These changes are specific, and the DR playbook will be adjusted in the future. The playbook has diverse routing and switching assets in scope as well as multiple vendor and hardware platforms. A developer will create a thin, web front-end microservice and integrate with an Open daylight controller to push changes to the network. Which YANG model should be used?

Options:

A.

Use a single native vendor YANG model to minimize development time

B.

Use an open YANG model to allow the reuse of code and standardize the implementation across platforms

C.

Use multiple native vendor YANG models to provide code consistency.

D.

Develop an individualized YANG model to minimize development resources and time to market.

Question 84

Which function are fabric intermediate nodes responsible for in an SD-Access Architecture?

Options:

A.

mapping EIDs to RLOCs

B.

encapsulating user traffic in a VXLAN header including the SGT

C.

registering new endpoints in the HTDB

D.

transporting IP packets between edge nodes and border nodes

Question 85

A company plans to transition to IPv6. They will link their IPv4 addresses to the lowest significant bits of the new Ipv6 addresses. A network administrator with an employee id: 4264:42:116 is preparing a mapping schema for the new IPv6 addresses. Which address does the 172.16.10.0/24 network translate to?

Options:

A.

2001:db8:abcd::ac10:a00/120

B.

2001:db8:abcd:172:16:10::/96

C.

2001:db8:abcd:11d8:a00/120

D.

2001:db8:ac10:0a00::/64

Question 86

Drag and drop the descriptions from the left onto the corresponding VPN types on the rights.

Options:

Question 87

Drag and drop the properties from the left onto the protocols they describe on the right.

Options:

Question 88

Drag and drop the descriptions from the left onto the categories they apply to on the right.

Options:

Question 89

When vEdge router redundancy is designed, which FHRP is supported?

Options:

A.

HSRP

B.

OMP

C.

GLBP

D.

VRRP

Question 90

An engineer is designing a Layer 3 campus network running EIGRP between the core, aggregation, and access layers. The access layer switches will be connected to the aggregation layer using Layer 3 copper connections. The engineer wants to improve convergence time for access layer switch failures. Which technique must the design include?

Options:

A.

enabling BFD for EIGRP on the access layer uplinks

B.

reducing the EIGRP Hello / Hold timer values

C.

EIGRP summarization from core to aggregation layer

D.

EIGRP summarization from access to aggregation layer

Question 91

Which node performs the LISP Map-Server and Map-Resolver functions in the Cisco SD-Access network architecture?

Options:

A.

control plane node

B.

fabric edge node

C.

border node

D.

intermediate node

Question 92

Refer to the exhibit.

Which solution decreases the EIGRP convergence time?

Options:

A.

Enable subsecond timers

B.

Increase the hold time value

C.

Increase the dead timer value

D.

Enable stub routing on the spokes

Question 93

An engineer is looking for a standards-driven YANG model to manage a multivendor network environment. Which model must the engineer choose?

Options:

A.

Native

B.

OpenConfig

C.

IETF

D.

IEEE NETCONF

Question 94

How is redundancy achieved among Cisco vBond Orchestrators in a Cisco SD-WAN deployment?

Options:

A.

The IP addresses of all Orchestrators are mapped to a single DNS name.

B.

The closest Orchestrator to each Cisco WAN Edge router is selected.

C.

Cisco WAN Edge routers are configured with all Orchestrators using their IP addresses and priority.

D.

A single Cisco Orchestrator is deployed in each network.

Question 95

When is it advisable to provide dedicated control plane nodes within a Cisco SD-Access design?

Options:

A.

in a small deployment where border nodes are not required

B.

in a design where fabric edge nodes are unable to provide control plane functionality

C.

in designs without Cisco DNA Center

D.

when there is a requirement for frequent roaming of endpoints across fabric edge nodes

Question 96

What is the purpose of an edge node in an SD-Access network fabric?

Options:

A.

Edge nodes identify and authenticate endpoints and register endpoint information with control plane nodes.

B.

Edge nodes track endpoint IDs to location mappings, along with IPv4, IPv6, or MAC addresses.

C.

Edge nodes are the gateway between the fabric domain and network outside of the fabric.

D.

Edge nodes resolve lookup requests from edge and border nodes to locate destination endpoint IDs.

Question 97

An engineer uses Postman and YANG to configure a router with:

    OSPF process ID 400

    network 192.168.128.128/25 enabled for Area 0

Which get-config reply verifies that the model set was designed correctly?

Options:

A.

Text Description automatically generated

B.

Text Description automatically generated

C.

Text Description automatically generated

D.

Text Description automatically generated with medium confidence

Question 98

An architect is creating a migration strategy for a large organization in which the choice made by the application between IPv6 and IPv4 is based on the DNS request. Which migration strategy does the architect choose?

Options:

A.

AFT for public web presence

B.

host-initiated tunnels

C.

dual stack

D.

site-to-site IPv6 over IPv4 tunnels

Question 99

Drag and drop the elements from the left onto the functions they perform in the Cisco SD-WAN architecture on the right.

Options:

Question 100

Refer to the exhibit. A customer is planning to onboard three new VPN partner connections in the data center. The new subnets must not overlap with the existing data center network, and the subnet size must not be bigger than necessary. The customer dedicated 10.1.8.0/21 for this design. Ho1// must the subnets be divided to meet these requirements?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 101

An engineer is designing a multicast network for a financial application Most of the multicast sources also receive multicast traffic (many-to-many deployment model). To better routing tables, the design must not use source trees. Which multicast protocol satisfies these requirements?

Options:

A.

BIRDIR-PIM

B.

PIM-SM

C.

MSDP

D.

PIM-SSM

Page: 1 / 25
Total 339 questions