Which IPv6 feature enables routing to distribute connection requests to the nearest content server?


What is the recommended spanning tree protocol to use for all Layer 2 deployments in a branch officeenvironment. ...


Which two are types of network virtualization. (Choose two.)


You are tasked with designing a new branch office that will support 75 users with possible expansion in the


Which two can be used as a branch office WAN solution. (Choose two.)


What is the acceptable amount of one way network delay for voice and video applications.


Which mode is used to exclusively look for unauthorized access points.


Which of the following three options represents the components of the Teleworker Solution. (Choose
th ...


Which three types of WAN topologies can be deployed in the Service Provider Module. (Choose three.)
...


Which two routing protocols converge most quickly. (Choose two.)


Which of these is the equation used to derive a 64 Kbps bit rate.


Which one of these statements is an example of how trust and identity management solutions should be
de ...


With deterministic Wireless LAN Controller redundancy design, the different options available to the
de ...


When designing the threat detection and mitigation portion for the enterprise data center network, which of


You have a campus network that consists of only Cisco devices. You have been tasked to discover the
dev ...


WAN backup over the Internet is often used to provide primary connection redundancy. Which is the most
...


To provide Layer 2 connectivity between the primary and remote data centers, given that the two data
ce ...


Which WLC interface is dedicated for WLAN client data.


According to Cisco, which four improvements are the main benefits of the PPDIOO lifecycle approach to
n ...


During which phase of the PPDIOO model would you conduct interviews with supporting staff to develop
an ...


Which three are considered as technical constraints when identifying network requirements. (Choose
th ...


Characterizing an existing network requires gathering as much information about the network as possible.
...


Which three terms describe the primary functions of the distribution layer of the campus network design
...


Which two of the following are benefits of using a modular approach to network design. (Choose two.)
...


Which three modular components are part of the Cisco Enterprise Edge Architecture. (Choose three.)
...


Which of the following is a component within the Cisco Enterprise Campus module.


What are the three primary functions of the distribution layer of the campus network design hierarchy.
...


Where in the Cisco Enterprise Architecture model does network management reside.


Which three solutions are part of the Borderless Network Services. (Choose three.)


The evolution of the Data Center is best represented by the 3.0 architecture component of virtualization.


When there is a need for immunity to EMI for connecting locations that are greater than 100 meters apart,


Which layer of the OSI model does Cisco recommend to place the enterprise network core layer, when
desi ...


OSPF will be used as the IGP within a campus network. Which two things should you consider before
deplo ...


Which Cisco technology using Nexus NX OS infrastructure allows the network architect to create up to four


Which three options are valid Cisco STP tools used to ensure best practice access layer design for the
...


Spanning Layer 2 across geographically separate data centers is a key consideration for current data center


Which two statements about designing the Data Center Access layer are correct. (Choose two.)


What is the primary consideration when choosing a routed network design over a traditional campus
netwo ...


When selecting which hardware switches to use throughout an enterprise campus switched network, which
c ...


Which two of these practices are considered to be best practices when designing the access layer for the
...


The enterprise campus core layer has requirements that are unique from the distribution and access layers.


Which of these statements is true concerning the data center access layer design.


Which one of these statements is true concerning the data center distribution (aggregation) layer design.


An enterprise campus module is typically made up of four sub modules, as described by the Cisco
Enterpr ...


Which is a factor in enterprise campus design decisions.


Which network virtualization technology involves creating virtual routers with its own individual routing tabl ...


Which protocol is the recommended first hop redundancy protocol for an existing infrastructure that
co ...


Which IGP provides the fastest convergence by default.


Which three are valid Layer 2 access designs. (Choose three.)


Which Gigabit Ethernet media type provides the longest reach without a repeater.


Which three are associated with the distribution layer within the campus design. (Choose three.)


High availability is a key design consideration in the enterprise campus network. In a fully redundant
...


Which two enterprise campus layers are combined in a medium sized LAN. (Choose two.)


What is a characteristic of campus core designs.


In the enterprise data center, which are the three main components. (Choose three.)


Which two common cable management strategies are used in high density server deployments in the data
c ...


Which servers that reside in the data center require direct links to all other enterprise modules.
...


When designing using the Cisco Enterprise Architecture, in which Enterprise Campus layer does the
Remot ...


Which three describe challenges that are faced when deploying an environment for teleworkers. (Choose
...


You need to connect to a remote branch office via an Internet connection. The remote office does not use
...


Which two are characteristics of a Lightweight Access Point. (Choose two.)


Which one of these statements describes why, from a design perspective, a managed VPN approach for
ente ...


What are three key areas that need to be considered when designing a remote data center. (Choose
thre ...


If a teleworker is required to access the branch office via a secure IPSEC VPN connection, which
techno ...


Which model of ISR is utilized for the teleworker design profile.


When designing a WAN backup for voice and video applications, what three types of connections should be
...


Which three options represents the components of the Teleworker Solution. (Choose three.)


Which three service categories are supported by an ISR. (Choose three.)


When designing for a remote worker, which two are typical requirements. (Choose two.)


What is the maximum number of groups that is supported by GLBP.


Which two routing protocols usually converge most quickly. (Choose two.)


Which two routing protocols operate over NBMA point to multipoint networks without the use of point topoint ...


With respect to IPv6 addressing, from a design perspective, which of these statements is it important to
...


Which consideration is the most important for the network designer when considering IP routing.


Your supervisor has asked you to deploy a routing protocol within the lab environment that will allow for


Which two methods are used to reduce the mesh links required between iBGP peers in the same AS.
(Choo ...


A company wants to use private IP addresses for all its internal hosts. Which technology can the company
...


At which layer of the network is route summarization recommended.


Which two link state routing protocols support IPv6 routing. (Choose two.)


Which is the North American RIR for IPv4 addresses.


What is the most compact representation of the following IPv6 address.
2001:db8:0000:0000:cafe:0000:0 ...


type 5 LSAs but still allow the redistribution of external routes.


Which is usually used to connect to an upstream ISP.


You are designing a network that requires a routing protocol that will use minimal network bandwidth. Which


Which two statements best describe an OSPF deployment. (Choose two.)


Which three items pertain to EIGRP. (Choose three.)


A hierarchical design of the EIGRP domain facilitates which two of the following. (Choose two.)


Which three protocols support VLSM. (Choose three.)


Which statement should the designer keep in mind when considering the advanced routing features.


When designing an EIGRP network, which two things should you take into consideration. (Choose two.)
...


Which statement describes a unique advantage of EIGRP.


ACME Corporation is implementing dynamic routing on the LAN at its corporate headquarters. The interior
...


Which routing protocol classification should you use when full topology information is needed.


When you are designing a large IPv6 multivendor network, which IGP does Cisco recommend that you
use. ...


When designing the infrastructure protection portion for the enterprise edge, which solution would be the


Which two design approaches provide management of enterprise network devices. (Choose two.)


You are asked to design a new branch office that will need to support 25 users. These users will be using


What are the three modes of unicast reverse path forwarding. (Choose three.)


Which network access control technology is recommended to use with Layer 2 access layer switches.


Refer to the list of requirements. Which IP telephony design model should you implement to fulfill these
...


Which is the equation used to derive a 64 Kbps bit rate.


Which three statements are true regarding the virtual interface on a Cisco Wireless LAN Controller.
( ...


A campus network needs end to end QoS tools to manage traffic and ensure voice quality. Which three
t ...


Which technology enables WLCs to peer with each other to enable roaming support.


Which IP telephony component supports VoIP, PoE, and QoS.


Your supervisor wants you to recommend a management protocol that will allow you to track overall
bandw ...


Which factor would be most influential in choosing multimode fiber optic connections over UTP.


Which WAN technology is a cost effective method to deliver 100Mb of bandwidth to multiple branch
offic ...


Which subnet address and mask would you use for all Class D multicast addresses to be matched withinan access lis ...


A company is implementing an Identity Management solution with these characteristics:
1) existing AAA S ...


When considering the three VoIP design models single site, centralized multisite, and distributed multisite ...


Which two devices would you place in your DMZ to ensure enterprise edge security. (Choose two.)


Which three are security services offered through Cisco Router Security. (Choose three.)


Which voice codec should you use in order to provide toll quality calls.


Which three are features of LWAPP. (Choose three.)


Which Cisco device has the sole function at looking at threat detection and mitigation at the Enterprise
...


Which three of these are layers in the Cisco SONA Architecture. (Choose three.)


What business trend allows employees to use personal devices to access enterprise data and systems.
...


What three customer supported details identifies network requirements based on the PPDIOO design
model. ...


An engineer receives a resource utilization alert on a router. What command should be used to investigate


What part of the network does a top down network design focus on for solution development.


An engineer has configured a router to send level 7 messages to a syslog server. What severity level are
...


A network engineer must implement a design where LAN clients are to connect to various access layer
dev ...


When evaluating network designs, what indicator demonstrates that the modular approach was followed.
...


A network engineer is following the Cisco enterprise architecture model. To which network layer would a
...


A network engineer is following the three tiered Network Hierarchical Model. At which tier is route
sum ...


A network engineer is using the Cisco enterprise architecture model. In what module do network
manageme ...


What three design requirements are key to designing a campus core. (Choose three.)


What type of device can be installed to increase a broadcast domain.


To what Layer 2 technology does VRF closely compare.


What network virtualization technology can be leveraged within the data center to reduce the number of physica ...


During the design of a new campus network, the customer requests the ability to route overlapping IP addresses. W ...


A network engineer is attempting to separate routing domains using a virtualization technology. What protocol can ...


What device virtualization technology allows for a single point of management and a centralized routing instance. ...


What two performance considerations must be taken into account when designing a remote worker access solution. ...


In which network location should an external DNS server be placed.


What submodule is found within the Enterprise Edge module.


A company requires a managed WAN solution that supports Layer 2 adjacency across remote offices for applications ...


A circuit order has been placed for Gigabit Ethernet and is 80KM from the carrier equipment. What type of SFP wil ...


A company has dark fiber between headquarters and its data center. It is presently configured as a 10GbE connecti ...


A secure WAN design requires dynamic routing and IP multicast. What two VPN protocols meet these requirements. ...


What branch design supports 100 to 1000 users and integrates ASA firewalls.


A network engineer is designing an enterprise managed VPN solution for a large number of remote offices that do n ...


A remote office has a T1 WAN link to headquarters and a T1 Internet connection. The client requests WAN redundanc ...


What two features are advantages of adding a secondary WAN link at the enterprise edge. (Choose two.)


What technology can secure data over an insecure medium and provide WAN redundancy in the event of a primary conn ...


A client wants to consolidate applications that are currently housed at multiple sites to a remote data center. W ...


What IPv4 addressing technique allows for the division of addresses into subnets of different sizes.


An application uses broadcast traffic to send data to IPv4 hosts. How can the application communicate using IPv6. ...



What routing protocol requires full mesh between internal peers in an enterprise network.


What three considerations should be taken into account when selecting a routing protocol. (Choose three.)



What characteristic separates link state routing protocols from a distance vector.


A company must deploy an IGP routing protocol on an Enterprise Network. Where should route summarization be imple ...


What routing configuration can prevent routing loops between IGPs.


What is the first step when creating a network security policy.


A customer requests a filtering design based on the need to scan all internet traffic, including remote workers. ...


A customer wants to support a BYOD environment. What two products allow for posture assessment. (Choose two.) ...


What two CoS values are used by voice traffic. (Choose two.)


A client wants to deploy a video conferencing platform in a multisite WAN environment. What two design considerat ...


What wireless authentication option requires a Public Key Infrastructure.


What two access point modes support the transmission of user traffic over a LWAPP/CAPWAP tunnel. (Choose two.) ...


What is the primary advantage of implementing a wireless LAN controller in a wireless LAN design.


destination endpoint in a lightweight wireless deployment.


What Cisco product is designed to improve the performance of Windows file and exchange services in remote data ce ...


An organization needs a WAN Transport technology that meets these criteria: has a low initial cost provides low ...


Which two of these are scalability benefits of designing a network that utilizes VPNs. (Choose two.)


Which two design criteria require VLANs in a proposed solution. (Choose two.)


Which three sources does a network designer use to collect information for characterizing an existing network. ...


Which Cisco security mechanism has the attributes listed below. It is a sensor appliance It searches for ...


Which three pieces of information should be documented for each step in a design implementation plan. (Choose t ...


Which Cisco device management feature is most suited to metering network traffic and providing data for billing n ...


What are three valid methods of gathering information about an existing data network. (Choose three.)


What is the benefit of VLSM.


Which three Cisco technologies can you use to detect and mitigate threats. (Choose three.)


Which technology allows remote networks to be connected via site to site tunnels.


Which RFC defines the IPv6 standard.


What is the maximum RIPv2 hop count for a reachable route.


Which Cisco Wireless LAN Controller interface is used for out of band management.


services.


Which HSRP parameters must match, to ensure proper functionality.


What three primary sources of information are needed to perform a network audit. (Choose three.)


Which three layers comprise the traditional hierarchical model. (Choose three.)


Which first hop redundancy protocol dynamically distributes client traffic between multiple routers.


Which three options are characteristics of data center evolution. (Choose three.)


Which option is a benefit of the modular approach to network design.


Which statement describes the methodology that supports the Cisco Enterprise Architecture models.


Which design is the recommended geometric design for routed topologies.


Which statement describes an advantage of the Layer 2 access model over the Layer 3 access model in the data cent ...


Router A has three feasible successors to the 192.168.1.0/24 network, which are listed here: Option 1 has a metri ...


Which two mechanisms are used by distance vector protocols to prevent routing loops. (Choose two.)


Which interior routing protocol has the most preferable administrative distance by default.


A network engineer has been asked to follow a top down design approach. What layer of the OSI model is used to st ...


Where in the network hierarchy should network access control be performed.


What are two advantages of employing scalability when designing a campus network. (Choose two.)


A network engineer is using the traditional switched hierarchical design. The client has asked to increase uplink ...


Multicast has been enabled and configured in the Enterprise, and PIM Sparse mode has been enabled on all VLANs. ...


What two SAN protocols will allow a customer to utilize 10GbE for SAN access. (Choose two.)


Application servers require load balancing and security services. Where in the data center network should these s ...


A data center is reaching its power and cooling capacity. What two virtualization technologies can address the pr ...


A dynamically routed private line and a statically routed IPsec tunnel connect two offices. What routing configur ...


When designing a new enterprise campus network, what topology should be used for maximum scalability.


A spanning tree topology can be simplified by deploying what Cisco IOS technology in the distribution block. ...


An organization is deciding what routing protocol to use throughout their network. What must be considered if rou ...


A routing protocol neighbor relationship has been established between two routers across the public Internet usin ...


Your company uses OSPF for internal routing. The company will be connected to VendorA via a single dedicated link ...


You design a network with the following network addresses: 192.168.168.0 192.168.169.0 192.168.170.0 192.168.171. ...


A network engineer must collect application level information passing through a router. What two tools can provi ...


Which option is an advantage of the bottom up design model.


A large company requests a hierarchical design model. What tier should be free of physically connected hosts. ...


Which two options are benefits of using a modular network architecture. (Choose two.)


An organization is redesigning a 3 tier hierarchical network into a collapsed core. What design issue is a prima ...


Which two features are available in the Cisco STP Toolkit. (Choose two.)


What three design best practices are key functions of the distribution layer. (Choose three.)


What design requirement is necessary for campus network access layer switching.


A network engineer requires that an OSPF ASBR must only flood external LSAs only within its own area. What OSPF a ...


A network engineer is tasked to upgrade and expand a large existing production network. From the IOS CLI, what tw ...


A network engineer has finished designing and implementing a new network. What two protocols would they use to ga ...


What are two benefits of a structured IPv4 addressing scheme. (Choose two.)


What are two reasons discontinuous IPv4 networks hinder scalability. (Choose two.)


What is a benefit of IPv6 over IPv4 addresses.


GRE has been used to establish a routing protocol neighbor relationship between two routers, across the public I ...


Which option is a benefit of Cisco Discovery Protocol.


Which option is an example of physical device virtualization.


In which two places is redundancy recommended in an enterprise campus network design. (Choose two.)


What are two purposes of route redundancy. (Choose two.)



What is the optimal device and location to fulfill these requirements. # provide early indication of reconnais ...


A remote worker for a sales company must submit daily updates via the company email system. The employee does not ...


methodology. (Choose three.)


Which technology should a company use to connect a branch office to headquarters via an Internet connection while ...


A network engineer needs to create a controller based, high density RF design. Which two factors determine the ...


Which IP address can be routed to cross the public Internet.


Which DHCP option do you need to configure to ensure that an LWAP can communicate with the Cisco WLC in a differe ...


Which two options can be virtual networking devices. (Choose two.)


What are two components of the Build phase in the Cisco Design Lifecycle. (Choose two.)


Which design enables easy and flexible scaling in the Cisco Enterprise Architecture model.


Which two issues are typical challenges to network stability and reliability. (Choose two.)


For a VLAN that requires 70 hosts, which subnet is the most efficient.


If two routing protocols have the same route and prefix, which effect do they have on the routing table.


Which benefit is an advantage of route summarization.


Which two states are RSTP port states. (Choose two.)


When is the Cisco FlexConnect design model recommended.


In which two modes can you deploy Cisco IPS appliances. (Choose two.)


According to Cisco best practices, which traffic control should you apply to the strict priority queue.


According to fundamental design principles, which location is best for implementing Cisco QoS policies.


Which item is the fundamental basis of a virtual network.


Which network virtualization technique can you implement without disrupting the existing network design and infra ...


Directory services and electronic messaging are performed at which layer of the OSI model.


Company ABC has intermittent problems registering remote site IP phones over the WAN with Cisco Unified CallMana ...


In an enterprise Layer 2 switched network, which protocol must be running to enable link redundancy.


Which option is the greatest concern when a network design requires corporate traffic to pass the public Internet ...


Which two descriptions of Cisco Application Centric Infrastructure are true. (Choose two.)


Which statement about VSS is true.


Which two processes are included in the Build phase of the Cisco Design Lifecycle. (Choose two.)


Which two statements are true regarding a hierarchical network. (Choose two.)


Which two options best describe the top down design approach. (Choose two.)


statement to connect to the 192.168.101.0/24 and 192.168.102.0/24 networks across the corporate WAN.


Why would an engineer implement variable length subnet masks.


Which option can use deep packet examination to determine the specific nature of an attack.


Which two design decisions can improve network resiliency. (Choose two.)


Which two considerations are important when designing the access layer. (Choose two.)


A network architect working for a large financial institution is designing VPN solution that must include encrypt ...


adherence to best practices and corporate policies.


time.


For a VLAN that requires 60 hosts, which subnet is the most efficient.


Which Cisco technology can connect more than two switches so that they behave as one switch.


Which option is an advanced congestion management mechanism that schedules interactive traffic to the front of th ...


A consultant at Company XYZ connects to the Guest wireless network but cannot reach the MGMT VLAN to complete an ...


What are two important aspects to consider when looking at backup circuit options for a branch location. (Choos ...


When designing changes to an existing network, which two options are documented to understand environmental const ...


Which two network services should you host on the DMZ. (Choose two.)


Which network layer is the best fit for security features such as DAI and DHCP snooping.


Which two features are Cisco recommended best practices for user access interfaces. (Choose two.)


Which statement about modular network design in true.


What are two benefits of the bottom up design approach. (Choose two.)


Which two considerations are important when designing the core layer. (Choose two.)


How many switches can be combined into a single network element using VSS.


Which option is an advantage of a Layer 3 access model over the traditional Layer 2 access model.


Based on best practices, which QoS profile should be configured on the WLAN of the WLC for wireless VoIP communic ...


Which statement about using STP in a redundant link scenario is true.


A company is using a dynamically routed private line and a statically routed IPsec tunnel to connect two offices. ...


Refer to the exhibit. Which next hop will the router select if given an IP packet with the destination address ...


Refer to the exhibit. Assuming that a network will grow exponentially for the next 24 months, what is the main l ...


Refer to the exhibit. You are designing routing between building distribution switches and campus core switches. ...


Refer to the exhibit. Which functionality must be enabled on router A to connect two networks for translating pr ...


Refer to the exhibit. Which location is best for placing a monitor only IPS that has visibility into the most d ...


Refer to the exhibit. The red lines refer to STP blocked ports. What happens if the HSRP active moves to the rig ...


Refer to the exhibit. On which router should you configure redistribution.


Refer to the exhibit. A standard Layer 2 campus network design is pictured. Which numbered box represents the co ...


Refer to the exhibit. Which statement is true concerning enterprise edge distribution switches.


Refer to the exhibit. Which two statements correctly identify the layers of the Enterprise Campus module. (Cho ...


Refer to the exhibit. Which statement accurately represents the characteristics of the core layer in this design ...


Refer to the exhibit. Which layer is the distribution layer.


A network engineer must connect two sites. Each site has a different autonomous system number. Which method do yo ...


Which IPv4 addressing technique can be used with proper address planning to reduce the number of entries in a rou ...


Refer to the exhibit. Where should routes in the routing table be aggregated or summarized.


A remote user for a company must periodically connect to the company network to access internal resources using a ...


An engineer is designing a private WAN infrastructure to support an organization and must support quality of serv ...


Which type of router connects to two different OSPF areas.


Which routing protocol provides the fastest convergence and greatest flexibility within a campus environment. ...


How does the use of multiple areas in a link state routing protocol improve network scalability.


Which protocol is an example of a fixed two level hierarchical routing protocol.


Which virtualization solution provides redundancy using a pair of switches that appear as one logical switch and ...


An engineer wants to find all of the objects of a certain type available in the MI


At which layer of the network should you perform traffic filtering and QoS classification.


While designing a remote access VPN, a customer has requested three different levels of access to be granted for ...


Which two techniques can you use to reduce the size of a network routing table. (Choose two.)


Traditionally, the DMZ exists between which two locations. (Choose two.)


An engineer wants to ensure that the Spanning Tree topology appears free while redundant switches are present. Wh ...


An engineer is planning branch WAN links to support unified communications. Which DSCP value must be assigned to ...


Which option best describes the high level design document.


Which value must you configure on a Microsoft DHCP server so that Cisco wireless APs can locate the wireless cont ...


Which tool captures network traffic, decodes the protocols in the captured packets, and provides statistics to ch ...


Which statement about using VSS on a pair of switches is true.


Which scenario is the best example of a single homed connected infrastructure.


Which address is the broadcast address of subnet 120.20.78.8/30.


Which two major campus design models does the Cisco Unified Wireless Network support. (Choose two.)


Which two protocols are classful routing protocols. (Choose two.)


From which DNS record can a Cisco wireless AP, running Cisco WLC version 6.0 or later, retrieve bootstrap informa ...


When integrating services with Cisco ACI Service Graphs, which tool can be used for integrated configuration mana ...


Which VPN tunneling technology supports IP multicast.


Refer to the exhibit. Which IPS location is best for reducing false positive because traffic has already been fi ...


Which format reflects that of the IPv6 global unicast address.


Which layer in the Cisco Enterprise Architecture model is highly available, has fast convergence, and should avoi ...


Which connection provides cost effective backup connectivity for a branch network.


In the traditional hierarchical LAN design, which two statements about the distribution layer are true. (Choose ...


Refer to the exhibit. Based on the following output from the access switch, which option is the trust boundary f ...


An engineer is designing a network that is divided into multiple areas and supports a mixed vendor routing enviro ...


Which two benefits are realized by establishing virtualization in a campus network. (Choose two.)


Which option is one of the methods that Cisco routers and switches can use to share information between directly ...


Which statement correctly describes queuing in environments supporting teleworkers.


Which first hop redundancy protocol dynamically distributes traffic across multiple gateways.


What information should be utilized to identify network applications that are running on an existing network infr ...


A design engineer must send management information messages across the public internet. What solution provides a ...


ability to export the flows to a collection engine without using network probes. What technology meets this requi ...


What design feature should be considered when accessing resources from a remote data center over a WAN connection ...


What two addresses are defined under RFC 1918. (Choose two.)