Q1. A client wants to consolidate applications that are currently housed at multiple sites to a remote data center. What two design requirements are unique to this scenario? (Choose two.)
A. bandwidth
B. security
C. latency
D. storage
E. availability
Answer: A,C
Q2. Which mode is used to exclusively look for unauthorized access points?
A. monitor mode
B. sniffer mode
C. rogue detector mode
D. local mode
Answer: C
Explanation:
Interference detection and avoidance: As Cisco LWAPs monitor all channels, interference is detected by a predefined threshold (10 percent by default). Interference can be generated by rogue APs, microwaves, cordless telephones, Bluetooth devices, neighboring WLANs, or other electronic devices.
Q3. A company wants to use private IP addresses for all its internal hosts. Which technology can the company use to provide access to the Internet using a single public IP address?
A. static NAT
B. source routing
C. ACL
D. PAT
Answer: D
Q4. What technology can secure data over an insecure medium and provide WAN redundancy in the event of a primary connection failure?
A. virtual private network
B. shadow PVC
C. dial-up ISDN
D. GRE Tunnel
Answer: A
Q5. Which of these statements is true concerning the data center access layer design?
A. The access layer in the data center is typically built at Layer 3, which allows for better sharing of services across multiple servers.
B. With Layer 2 access, the default gateway for the servers can be configured at the access or aggregation layer.
C. A dual-homing NIC requires a VLAN or trunk between the two access switches to support the dual IP addresses on the two server links to two separate switches.
D. The access layer is normally not required, as dual homing is standard from the servers to the aggregation layer.
Answer: B
Q6. Which servers that reside in the data center require direct links to all other enterprise modules?
A. network management servers
B. DHCP servers
C. Active Directory servers
D. IP SLA servers
E. web servers
Answer: A
Q7. You need to connect to a remote branch office via an Internet connection. The remote office does not use Cisco equipment. This connection must be secure and must support OSPF. Which of the following can be used to transport data to the branch office?
A. GRE over IPsec
B. IPsec
C. GRE
D. IPsec VTI
Answer: A
Q8. DRAG DROP
Answer:
Q9. A spanning tree topology can be simplified by deploying what Cisco IOS technology in the distribution block?
A. VDC
B. vPC
C. Rapid PVST+
D. VSS
E. Flex Links
Answer: D
Q10. When designing the infrastructure protection portion for the enterprise edge, which solution would be the most appropriate solution to consider?
A. 802.1X
B. ACLs in the core layer
C. Cisco Security MARS
D. AAA
Answer: D