Q1. A customer wants to support a BYOD environment. What two products allow for posture assessment? (Choose two.)
A. ACS
B. NAC
C. ASA
D. ISE
E. WAAS
F. IDS
Answer: B,D
Q2. Which statement describes the methodology that supports the Cisco Enterprise Architecture models?
A. It divides the network into functional network modules.
B. It divides the network into role-based network modules.
C. It divides the network into regional network modules.
D. It divides the network into operational network modules.
Answer: A
Q3. Refer to the exhibit.
Which three modules would typically utilize public IPv4 addressing? (Choose three.)
A. Access
B. Distribution
C. Core
D. Data Center
E. E-Commerce
F. Internet Connectivity
G. Remote Access/VPN
H. WAN/MAN
I. Branch
J. Branch Data Center
Answer: E,F,G
Q4. Which one of these statements is true concerning the data center distribution (aggregation) layer design?
A. With Layer 3 at the aggregation layer, the physical loops in the topology must still be managed by STP.
B. The boundary between Layer 2 and Layer 3 must reside in the multilayer switches, independent of any other devices such as firewalls or content switching devices.
C. A mix of both Layer 2 and Layer 3 access is sometimes the most optimal.
D. In a small data center, the aggregation layer can connect directly to the campus core, exchanging IP routes and MAC address tables.
Answer: C
Q5. Which two routing protocols converge most quickly? (Choose two.)
A. RIPv1
B. RIPv2
C. BGP
D. OSPF
E. EIGRP
Answer: D,E
Q6. What two CoS values are used by voice traffic? (Choose two.)
A. COS1
B. COS2
C. COS3
D. COS4
E. COS5
Answer: C,E
Q7. Which is the North American RIR for IPv4 addresses?
A. RIPE
B. ARIN
C. IANA
D. IEEE
E. APNIC
Answer: B
Q8. Which statement describes a unique advantage of EIGRP?
A. It enables unequal-cost load balancing.
B. It enables equal-cost load balancing.
C. It enables source-based load balancing.
D. It enables port-based load balancing.
Answer: A
Q9. In which operation mode does the AP act as a dedicated sensor for location-based and intrusion detection services?
A. monitor mode
B. promiscuous mode
C. discovery mode
D. sniffer mode
Answer: A
Q10. A network engineer is attempting to separate routing domains using a virtualization technology. What protocol can be configured to perform this task?
A. VLAN
B. VSAN
C. VRF
D. VPC
Answer: C