the ATM network? (Choose two
A company wants a design that would support OSPF through a service provider ATM network. Which two
OSPF network types should the designer use to establish OSPF neighborship between OSPF routers through
the ATM network? (Choose two.)
A. A broadcast network will always work through ATM networks.
B. A broadcast network will work when the broadcast support is explicitly configured at the ATM network.
C. Explicit neighbor statements are required when a nonbroadcast network is configured.
D. Explicit neighbor statements are required when a point-to-multipoint network is configured.
E. A nonbroadcast network does not require DR selection.
you need to configure QoS preclassify?
You are designing the QoS features for a large enterprise network that includes DMVPN. When
48
would you need to configure QoS preclassify?
A. when you are marking packets with the DSCP bits
B. when you are marking packets with the TOS bits
C. when your service provider requires the DSCP bits be set
D. when the QoS policy cannot be based on DSCP ToS bits
Which IETF standard technology can provide this requirement?
A green data center is being deployed and a design requirement is to be able to readily scale server
virtualization. Which IETF standard technology can provide this requirement?
A. Transparent Interconnection of Lots of Links
B. fabric path
C. data center bridging
D. unified fabric
eliminate the additional tunnel and routing overhead found in DMVPN?
You are designing a multisite VPN solution for a customer and you are concerned with the additional overhead
of point-to-point tunnels and the associated overlay routing with DMVPN. How does a GDOI-based VPN
eliminate the additional tunnel and routing overhead found in DMVPN?
A. The GDOI-based VPN requires overlaying a secondary routing infrastructure through the tunnels.
B. In a GDOI-based VPN, all group members share a common security association.
C. The GDOI-based VPN requires the provisioning of a complex connectivity mesh.
D. The GDOI-based VPN leverages the routing protocol to find its peer for tunnel setup.
vPC removes Layer 2 loops while providing redundancy through which mechanism?
You have been tasked to create a Layer 2 network design that uses vPC to provide resiliency and avoid loops.
vPC removes Layer 2 loops while providing redundancy through which mechanism?
47
A. dual-active detection
B. address synchronization
C. strict forwarding rules
D. Bridge Assurance
configured on the PE routers to support the design requirement?
Refer to the exhibit.
You are designing an IPv4 unicast Layer 3 VPN load-balancing solution. Which L3VPN feature needs to be
configured on the PE routers to support the design requirement?
A. nonmatching route distinguishers
B. matching route target values
C. disable split horizon on PE2 and PE3
D. matching route distinguishers
considered before the network design is finalized? (Choose two
A metro service provider is planning Resilient Ethernet Protocol for his backbone. Which two aspectsmust be
considered before the network design is finalized? (Choose two.)
A. Two Resilient Ethernet Protocol segments can be connected redundantly at two points. One connection
will be blocked, using the Spanning Tree Protocol defined in IEEE 802.1D.
B. UniDirectional Link Detection Protocol can be enabled on Resilient Ethernet Protocol interfaces to detect
unidirectional failures.
C. The guaranteed convergence recovery time is less than 50 ms for the local segment.
D. A Resilient Ethernet Protocol segment is limited to a maximum of seven devices.
E. VLAN load balancing for optimal bandwidth usage is supported in any Resilient Ethernet Protocol
segment.
VRF, but then configuring nonidentical route distinguisher across multiple PE devices?
In an MPLS-VPN environment, what is the effect of configuring an identical set of route targets for a particular
VRF, but then configuring nonidentical route distinguisher across multiple PE devices?
A. The routes will be correctly handled by the control plane, but there will be instances where routes take up
twice as much memory.
B. The routes will propagate to the remote PE, but the PE will never install them in its forwarding table.
C. The routes will be rejected by the remote PE because they have a different RD than its routes.
D. The routes will not even be sent to any remote PE with a different RD.
Protocol should be used to support the design requirements?
Tesla Radio GmbH is going to build a new research lab network based on a set of switches that would connect
to their existing enterprise network. They are considering a design that would guarantee loop-free behavior
within the set of switches. The design would also allow the group of switches to seem like a single switch to
the enterprise network, because it is owned by a separate administrative group. Which Spanning Tree
Protocol should be used to support the design requirements?
45
A. IEEE 802.1w
B. IEEE 802.1D
C. IEEE 802.1s
D. IEEE 802.1p
Which measure helps protect encrypted user traffic from replay attacks?
You are designing a Group Encrypted Transport Virtual Private Network solution consisting of 30 group
members. Which measure helps protect encrypted user traffic from replay attacks?
A. counter-based anti-replay
B. time-based anti-replay
C. nonce payload
D. RSA-encrypted nonce
E. digital certificates