Q1. A service provider creates a network design that runs MPLS in its WAN backbone using OSPF as the IGP routing protocol. What would be two effects of additionally implementing MPLS-TE? (Choose two.)
A. MPLS-TE is required to reroute traffic within less than 1 second in case of a link failure inside the backbone.
B. MPLS-TE is required to route different MPLS QoS service classes through different paths.
C. MPLS-TE and OSPF cannot be used together inside one MPLS network.
D. MPLS-TE cannot use OSPF for the traffic path calculation.
E. MPLS-TE is required to create backup paths independently from the IGP.
Answer: B,E
Q2. In an OSPF network, users in a particular OSPF non-backbone area are complaining about slow access speeds to a shared corporate resource in another OSPF area. Traceroutes show that theusers are taking a suboptimal default route to the destinations. Which solution will improve access speed?
A. Make the area totally stubby so that the default can be followed along the best path.
B. Create a virtual link between the areas so that traffic can shortcut directly between them.
C. Implement policy routing to channel the traffic in the optimal direction.
D. Leak specific summaries on the ABRs for the remote subnets in addition to the default.
Answer: D
Q3. Your customer asks you to assist with their traffic policy design. They want to guarantee a minimum amount of bandwidth to certain traffic classes. Which technique would you advise them to implement?
A. Modular QoS CLI
B. committed accessrRate
C. policy-based routing
D. traffic shaping
Answer: A
Q4. You are designing a network to support data, voice and video. Which two main factors will you address to improve network convergence? (Choose two.)
A. event propagation delay
B. failure detection delay
C. forwarding engine update delay
D. routing table recalculation delay
Answer: BD
Q5. As part of a new network design, you are helping the Network Management Team to develop a proactive report to identify places in the network where problems may happen. The network management tool can poll the network devices only via SNMP GET operations. Which two threshold-crossing metrics should you include in this report? (Choose two.)
A. packet loss
B. CPU utilization
C. heat dissipation
D. IP reachability
E. energy consumption
F. link bandwidth utilization
Answer: BF
Q6. Refer to the exhibit.
You are developing a migration plan to enable IPv6 in your IPv4 network. Starting at R3 and assuming default IS-IS operations, what is likely to happen when you enable IPv6 routing on the link from R3 to R2?
A. Only R3 and R2 have IPv4 and IPv6 reachability.
B. R2 receives an IPv6 default route from R3.
C. Loopback reachability between all routers for IPv4 is lost.
D. All routers except R2 are reachable through IPv4.
E. R3 advertises the link from R3-R2 to R1, R4 and R5 only.
Answer: C
Q7. You have been asked to establish a design that will allow your company to migrate from a WAN service to a Layer 3 VPN service. In your design, you are keeping some WAN links between critical sites as a backup for this service. You plan to use OSPF as your IGP and BGP for the PE-CE protocol. When the Layer 3 VPN service is available, how will you prevent transit traffic over the backup links?
A. Redistribute routes at the CE as external type 1.
B. Redistribute routes at the CE as external type 2.
C. Use conditional advertisement only when the Layer 3 service is down.
D. Manually turn off the backdoor link when the Layer 3 service is up.
Answer: D
Q8. A company has these requirements for access to their wireless and wired corporate LANs using 802.1x:
. Client devices that are corporate assets and have been joined to the Active
Directory domain are allowed access.
. Personal devices must not be allowed access.
. Clients and access servers must be mutually authenticated.
Which solution meets these requirements?
A. Protected Extensible Authentication Protocol/Microsoft Challenge Handshake Authentication Protocol Version 2 with user authentication
B. Extensible Authentication Protocol-Transport Layer Security with machine authentication
C. Extensible Authentication Protocol-Transport Layer Security with user authentication
D. Protected Extensible Authentication Protocol/Microsoft Challenge Handshake Authentication Protocol Version 2 with machine authentication
Answer: B
Q9. Your company experienced a number of network incidents that had a significant impact on business operations. Because a root cause cannot be identified, your CTO asks you to help the network management team implement the FCAPS framework. On which two areas would you provide guidance to the network management team? (Choose two.)
A. change management
B. accounting management
C. service level management
D. fault management
Answer: BD
Q10. When designing a large full mesh network running OSPF, how would you reduce LSA repetition?
A. Elect a DR and BDR.
B. Use access control lists to control outbound advertisements.
C. Choose one or two routers to re-flood LSA information.
D. Put each of the point-to-point links in your full mesh networking into a separate area.
Answer: C