service is available, how will you prevent transit traffic over the backup links?
You have been asked to establish a design that will allow your company to migrate from a WAN serviceto a
Layer 3 VPN service. In your design, you are keeping some WAN links between critical sites as a backup for
this service. You plan to use OSPF as your IGP and BGP for the PE- CE protocol. When the Layer 3 VPN
service is available, how will you prevent transit traffic over the backup links?
A. Redistribute routes at the CE as external type 1.
B. Redistribute routes at the CE as external type 2.
C. Use conditional advertisement only when the Layer 3 service is down.
D. Manually turn off the backdoor link when the Layer 3 service is up.
design considerations? (Choose two
You are designing an 802.11 wireless network to include a controller as a central configuration point and
access points across several remote sites. Which two aspects will manage the flow of the traffic to meet these
design considerations? (Choose two.)
A. WLAN local switching with VLAN mapping requires that VLAN ID that is mapped on the AP to match a
dynamic interface that is configured on the wireless LAN controller.
B. Layer 3 roaming is not supported for locally switched WLANs.
C. The 802.1x authentication for a client associated to an AP on a locally switched WLAN is always handled
at the wireless LAN controller side.
D. The access point can receive multicast traffic in the form of multicast packets from the WLC.
E. WLAN access lists can be applied only to centrally switched WLANs.
domains, how can routing loops be avoided?
When a multiprotocol environment is designed to have several routers redistribute among the routing
domains, how can routing loops be avoided?
A. by using the AS-PATH attribute
B. by using route tags
C. by activating split horizon
D. by implementing spanning tree
trunked back to the Clean Access Server from the access switch?
You are designing a NAC OOB Layer 3 Real-IP Gateway deployment for a customer. Which VLAN must be
trunked back to the Clean Access Server from the access switch?
A. untrusted VLAN
B. user VLAN
C. management VLAN
D. authentication VLAN
your network is implemented?
You have designed a network to support two offices connected by a T1. Your router serial interfaces will be
configured with encapsulation PPP. What will happen to your EIGRP neighbors if there is an LCP failure once
your network is implemented?
A. Your neighbors will drop after the EIGRP timers expire.
B. Your neighbors will stay up because the link has not gone down.
C. Your neighbors will drop immediately.
D. Your neighbors will drop and EIGRP will begin the query process.
Which two methods could be utilized? (Choose
Your firm has been awarded a contract to design a Criminal Justice Information Services Version 5.0-compliant network utilizing advanced authentication policies. Which two methods could be utilized? (Choose
two.)
A. biometric
B. PKI
C. UKI
D. password
When option 82 is enabled, which information will be added to the DHCP request?
As part of the security protocol for your network design, you have designated that option 82 is enabled for
DHCP snooping. When option 82 is enabled, which information will be added to the DHCP request?
A. switch MAC address and VLAN, module, and port
B. remote ID and circuit ID
C. switch IP address and VLAN, module, and port
D. switch MAC address and switch IP address
What are two functions of an NSSA in an OSPF network design? (Choose two
What are two functions of an NSSA in an OSPF network design? (Choose two.)
A. It overcomes issues with suboptimal routing when there are multiple exit points from the area.
B. It allows ASBRs to inject external routing information into the area.
C. An ASBR advertises Type 7 LSAs into the area.
D. An ABR advertises Type 7 LSAs into the area.
E. It uses opaque LSAs.
the switches?
Your design client has requested that you ensure that the client devices are not dynamically configured with
incorrect DNS information. When finalizing the network design, which security option must be configured on
the switches?
69
A. IGMP snooping
B. DHCP snooping
C. root guard
D. DNS snooping
consider when you adjust the timer values? (Choose three
A senior network designer suggests that you should improve network convergence times by reducing BGP
timers between your CE router and the PE router of the service provider. Which three factors should you to
consider when you adjust the timer values? (Choose three.)
A. access bandwidth
B. service provider agreement to support tuned timers
C. number of routes on the CE router
D. number of VRFs on the PE router
E. service provider scheduling of changes to the PE