Q1. You work for a large company that has just acquired another smaller company. You have been asked to lead a group of SAN experts from both companies to design the integration plan that will be used to interconnect the SANs and migrate the data from the newly acquired company to the main storage arrays. The first thing that the team discovers is that the two SANs have the same domain IDs.
As the SAN team lead, what would you advise your team to do so that you can interconnect the two SANs while minimizing disruption?
A. Use FCIP with Write Acceleration and IVR version 1 with a transit VSAN to expedite the data transfer between the two SANs.
B. Change the domain IDs on both SANs so that they are both unique and then connect ISLs between the SANs.
C. Use IVR NAT with a transit VSAN between the SANs.
D. The two SANs cannot be merged without disruption.
Answer: C
Q2. You have been hired by a startup company to provide optical services using MPLS-TP. Which three options describe reasons to use the MPLS-TP standard in your design? (Choose three.)
A. MPLS-TP is a newer packet transport technology that replaces SONET/SDH.
B. MPLS-TP includes extensions to native MPLS OAM for fault detection, monitoring, and propagation.
C. MPLS-TP requires a routing protocol.
D. MPLS-TP uses an IANA assigned label 13 for OAM.
E. MPLS-TP uses Ethernet Y.1731 OAM.
Answer: ABD
Q3. You are tasked with implementing a 1000-phone remote access solution, where phones will traverse a WAN edge router. Assuming all of the following features are supported in a hardware-assisted manner, which of the following will have the most detrimental impact on the delay of the packet?
A. encryption
B. stateful firewall
C. MPLS encapsulation
D. GRE encapsulation
Answer: A
Q4. When adding an IPSec headend termination device to your network design, which two performance indicators are the most accurate to determine device scalability? (Choose two.)
A. CPU capabilities
B. bandwidth capabilities
C. packets per second capabilities
D. maximum tunnel termination capabilities
Answer: CD
Q5. What are two benefits of using BFD for failure detection in the design of a network?
(Choose two.)
A. BFD can provide failure detection in less than one second.
B. BFD can be used as a generic and consistent failure detection mechanism for EIGRP, IS-IS, and OSPF.
C. BFD eliminates router protocol hello notification.
D. BFD can be used for all types of network interfaces.
E. BFD is independent of the network protocol.
Answer: AB
Q6. A metro service provider is planning Resilient Ethernet Protocol for his backbone. Which two aspects must be considered before the network design is finalized? (Choose two.)
A. Two Resilient Ethernet Protocol segments can be connected redundantly at two points. One connection will be blocked, using the Spanning Tree Protocol defined in IEEE 802.1D.
B. UniDirectional Link Detection Protocol can be enabled on Resilient Ethernet Protocol interfaces to detect unidirectional failures.
C. The guaranteed convergence recovery time is less than 50 ms for the local segment.
D. A Resilient Ethernet Protocol segment is limited to a maximum of seven devices.
E. VLAN load balancing for optimal bandwidth usage is supported in any Resilient Ethernet Protocol segment.
Answer: BE
Q7. ACME Corporation is integrating IPv6 into their network, which relies heavily on multicast distribution of data. Which two IPv6 integration technologies support IPv6 multicast? (Choose two.)
A. 6VPE
B. 6PE
C. dual stack
D. ISATAP
E. 6to4
F. IPv6INIP
Answer: CF
Q8. Refer to the exhibit.
In this network design, where should summarization occur to provide the best summarization and optimal paths during a single-failure incident as well as during normal operation?
A. a single identical summary for all the branch offices placed on routers 1A, 1B, 2A, and 2B
B. two summaries on 1A and 1B, and two summaries on 2A and 2B
C. a single identical summary on 3A and 3B
D. a single summary on each aggregation device for the branches connected to them
Answer: C
Q9. You are a network designer and have been asked to consult with your server operations team to further enhance the security of the network. The operations team provides you with these details about the network:
A pool of servers is accessed by numerous data centers and remote sites.
The servers are accessed via a cluster of firewalls.
The firewalls are configured properly and are not dropping traffic.
The firewalls occasionally cause asymmetric routing of traffic within the server data center.
Which technology would you recommend to enhance security by limiting traffic that could originate from a hacker compromising a workstation and redirecting flows at the servers?
A. Access control lists to limit sources of traffic that exits the server-facing interface of the firewall cluster
B. Poison certain subnets by adding static routes to Null0 on the server farm core switches.
C. Unicast Reverse Path Forwarding in strict mode
D. Unicast Reverse Path Forwarding in loose mode
Answer: D
Q10. A network design includes a long signaling delay in notifying the Layer 3 control plane that an interface has failed. Which two of these actions would reduce that delay? (Choose two.)
A. Enable lower data link layer recovery systems to have an opportunity to restore the interface.
B. Increase the notification of interface flaps.
C. Reduce the time for the network to reconverge.
D. Increase network stability.
Answer: AD