Which option can meet this design requirement?
As a service provider you must support a Layer 2 virtualization protocol that does not include the use of label
switching. Which option can meet this design requirement?
A. VPLS
B. VRF-Lite
C. QinQ
D. 802.3ad
Which protocol minimizes unicast flooding during TCN in a Layer 2 switched network with many VLANs?
While reviewing an existing network design, you are discussing the characteristics of different STP versions.
Which protocol minimizes unicast flooding during TCN in a Layer 2 switched network with many VLANs?
55
A. STP
B. MST
C. PVRSTP
D. PVSTP+
are the most accurate to determine device scalability? (Choose two
When adding an IPSec headend termination device to your network design, which two performance indicators
are the most accurate to determine device scalability? (Choose two.)
A. CPU capabilities
B. bandwidth capabilities
C. packets per second capabilities
D. maximum tunnel termination capabilities
prevent broadcast traffic exposure?
When creating a network design, which one of these options provides for basic Layer 2 client isolation to
prevent broadcast traffic exposure?
A. SVI
B. VLAN
C. routed port
D. edge port
Which two aspects are considered when designing a dual hub, dual DMVPN cloud topology? (Choose two
Which two aspects are considered when designing a dual hub, dual DMVPN cloud topology? (Choose two.)
A. recommended for high availability
54
B. requires all sites to have dual Internet connections
C. spoke-to-spoke traffic will transit the hub unless spokes exchange dynamic routing directly
D. hub sites must connect to both DMVPN clouds
E. will only work with single-tier headend architecture
addressed in the design? (Choose two
When a design calls for spanning VLANs across a campus network, what are two issues that need to be
addressed in the design? (Choose two.)
A. network convergence
B. network accessibility
C. fault isolation
D. application scalability
E. user experience
network design handle the fragmentation in three different possible network configurations? (Choose three
You are planning the design of an encrypted WAN. IP packets will be transferred over encrypted GRE tunnels
between routers B and C. The packet size is limited to a maximum of 1500 bytes inside the WAN between
routers B and C. If endpoint 1 tries to send 1500-byte IP packets to endpoint 2, in what three ways will the
network design handle the fragmentation in three different possible network configurations? (Choose three.)
A. When router B fragments packets after the encryption, router C must reassemble these fragmented
packets.
B. When router B fragments packets before the encryption, router C must reassemble these fragmented
packets.
C. When router B fragments packets after the encryption, the endpoint 2 must reassemble these fragmented
packets.
D. When router B fragments packets before the encryption, endpoint 2 must reassemble these fragmented
packets.
E. When router A fragments packets, router C must reassemble these fragmented packets.
F. When router A fragments packets, endpoint 2 must reassemble these fragmented packets.
outlined in RFC 2365?
A many-to-many enterprise messaging application is using multicast as a transport mechanism. As partof the
network design for this application, which multicast address should be used, according to best practices
outlined in RFC 2365?
A. 224.0.0.60
B. 232.192.0.60
C. 239.128.0.60
D. 239.193.0.60
Which design concern should be accounted for in all Layer 3 virtualization technologies?
Which design concern should be accounted for in all Layer 3 virtualization technologies?
A. Layer 3 redundancy
B. packet sizing
C. application usage
D. Layer 3 stability
5 inside the same network?
A company plans to establish a new network using Cisco Catalyst switches for its multicast applications. What
is the disadvantage when two multicast applications are using the multicast IP addresses 234.17.4.5 and
234.145.4.5 inside the same network?
A. Multicast packets from both applications are flooded to all Layer 2 ports in a segment where a multicast
receiver is located.
B. Multicast packets from both applications are flooded to ports where one multicast receiver from one
application is located.
C. Only one multicast stream is received at the port where the receivers from both applications are located.
D. Both multicast senders will always receive the multicast packets from the other multicast application.
E. The routers doing PIM-SM cannot distinguish between the two multicast applications.