Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Cisco > CCNP Enterprise > 300-420

300-420 Designing Cisco Enterprise Networks (ENSLD) v1.1 Question and Answers

Question # 4

Refer to the exhibit. ISP_C is enabling IPTV services to ISP_A and ISP_B. IPTV services are launched with GLOP IP address range 233.3.1.0/24. PIM-SM already has been enabled globally in each ISP network. RP functions have been configured on edge routers in each autonomous system. ISP_C must implement a connection based on RFC 3618. Which solution achieves this goal?

A.

Configure MSDP.

B.

Set PIM SSM.

C.

Enable MP-BGP.

D.

Enable BIDIR-PIM.

Full Access
Question # 5

Refer to the exhibit. An architect is designing a BGP solution to connect a remote branch to a service provider. There are several prefixes within the branch that the company does not want to be advertised to the internet. Which solution should the architect use to accomplish this?

A.

Set the BGP Internet community for all prefixes.

B.

Implement the NOPEER community.

C.

Use the BGP No-Advertise community for the prefixes to exclude.

D.

Attach the No-Export community with the prefixes to exclude

Full Access
Question # 6

Refer to the exhibit. A customer needs to apply QoS to the network management traffic passing through the GigabitEthernet0/2 interface. All eight queuing classes are in use, so the new requirement must be integrated into the existing policy. Which solution must the customer choose?

A.

Mark traffic to DSCP CS5 and assign it to the SIGNALLING class. Then, baseline existing queue sizes to determine if additional bandwidth can be provisioned to the SIGNALLING class.

B.

Mark the traffic to DSCP CS4 and assign it to the SIGNALLING class. Then, prioritize traffic within the class.

C.

Mark the traffic to DSCP CS6 and assign it to the ROUTING class Then, prioritize traffic within the class.

D.

Mark the traffic to DSCP CS2 and assign it to the ROUTING class Then, baseline existing queue sizes to determine if additional bandwidth can be provisioned to the ROUTING class

Full Access
Question # 7

A network engineer must design a multicast solution based on these requirements:

    interactive communication

    must not use source trees

    users must register

    100 multicast sources

Which solution must the company choose?

A.

MSDP

B.

PIM-DM

C.

any-source multicast

D.

BIDIR PIM

Full Access
Question # 8

An architect must design a QoS model for a business-critical application that Is delay-sensitive and requires high bandwidth. The company ' s head office hosts the application, and DMVPN tunnels protected with IPsec provide connectivity between the head office and branches. Which solution must the architect choose?

A.

RSVP

B.

IntServ

C.

WRED

D.

DiffServ

Full Access
Question # 9

An engineer is designing an EIGRP network for a small branch site where there is only one Layer 3 router. The engineer wants the router to advertise the local LAN network to remote EIGRP neighbors without sending any unnecessary multicast messages on the local LAN. Which action should the engineer take?

A.

Use a static default route for this site instead of EIGRP

B.

Advertise the local LAN using the network command and the passive-interface feature

C.

Redistribute the local LAN network using the redistribute connected command

D.

Advertise the local LAN subnet as a stub network

Full Access
Question # 10

A router running ISIS is showing high CPU and bandwidth utilization. An engineer discovers that the router is configured as L1/L2 and has L1 and L2 neighbors. Which step optimizes the design to address the issue?

A.

Make this router a DIS for each of the interfaces

B.

Disable the default behavior of advertising the default route on the L1/L2 router

C.

Configure the router to be either L1 or L2

D.

Configure each interface as either L1 or L2 circuit type

Full Access
Question # 11

An architect must design a network solution for a regional medical center that will provide interconnectivity between regionally dispersed data centers and a new colocation. The design must:

    utilize point-to-point connectivity

    utilize existing VLAN infrastructure

    increase performance for data center synchronization and backup processes

    reduce configuration complexity

Which solution must the engineer choose?

A.

L3VPN

B.

GRE

C.

DMVPN

D.

L2VPN

Full Access
Question # 12

An engineer working for a service provider with an employee ID: 4863:43:939 must design a solution to provide remote connectivity over the public internet. The design must:

    securely connect multiple remote sites to the central site

    provide redundant paths to the central site

    allow auto path selection based on failure and connection quality

    support IP multicast

    minimal configuration at remote sites

Which solution must the engineer choose?

A.

MPLS provided service with BGP

B.

dual DMVPN with EIGRP routing

C.

full mesh OSPF with IPsec tunnels

D.

full mesh ISIS with GRE tunnels and IPsec

Full Access
Question # 13

Refer to the exhibit An engineer is designing a hierarchical ISIS solution for an enterprise customer with these requirements

    Users in areas 25 and 55 send and receive traffic from both backbone areas

    Link flaps in areas 35 and 45 must not impact other areas

    Routers will double within the next 12 months in areas 35 and 45

Which design must the engineer select?

A.

A series routers Level 2, B series routers Level 2, and C series routers Level 1

B.

A series routers Level 1/2 B series routers Level 2 and C series routers Level 2

C.

A series routers Level 1. B series routers Level 1/2. and C series routers Level 2

D.

A series routers Level 1.2 B series routers Level 1/2 and C series routers Level 1/2

Full Access
Question # 14

Which design consideration must be made when dual WAN Edge routers are deployed at a branch site?

A.

Use BGP AS-path prepending to influence egress traffic and use MED to influence ingress traffic from the branch.

B.

HSRP priorities must match the OMP routing policy to prefer one WAN Edge over the other.

C.

Traffic must be symmetrical as it egresses the WAN Edges and returns from remote sites for DPI to function properly.

D.

Configure BFD between WAN Edge routers to detect sub-second link failures.

Full Access
Question # 15

Full Access
Question # 16

Refer to the exhibit. An architect is designing a hierarchical ISIS solution for a customer with these requirements:

    Routers will double In all areas within the next 24 months.

    Link flaps within areas 20 and 30 must not impact the backbone area.

    Traffic originating from A201 and A302 routers must connect to application servers in the backbone.

Which design must the architect select?

A.

C201 Level 1/2, A301 Level 1/2 and A102 Level 1/2

B.

C101 Level 1/2. A201 Level 1, and A101 Level 2

C.

C102 Level 2. A202 Level 2, and A102 Level 1

D.

C302 Level 2. A302 Level 1/2. and A101 Level 2

Full Access
Question # 17

Refer to the exhibit. An architect is designing a Layer 3 campus network The design must hide network instability, reduce network overhead, and conserve critical device memory Which route summarization solution must the architect select?

A.

• The core layer must advertise a default route toward the aggregation layer

• The VLAN subnets must be summarized into 10 0 0 0. ' 16 at the aggregation layer and advertised to the core layer

B.

• The core layer must advertise a default route toward the aggregation layer

• The VLAN subnets must be summarized into 10 0 0 0/16 at the access layer and advertised to the aggregation layer

C.

• The aggregation layer must advertise a default route toward the access layer.

• The VLAN subnets must be summarized into 10 0.0 0/16 at the aggregation layer and advertised to the core layer

D.

• The aggregation layer must advertise a default route toward the core layer

• The VLAN subnets must be summarized into 10 0 0 0.116 at the aggregation layer and advertised to the access layer

Full Access
Question # 18

Drag and drop the elements from the left onto the functions they perform in the Cisco SD-WAN architecture on the right.

Full Access
Question # 19

Which QoS feature responds to network congestion by dropping lower priority packets?

A.

CBWFQ

B.

tail drop

C.

WRED

D.

strict priority

Full Access
Question # 20

A company must automate a set of complex changes aligned with DR testing in the network. These changes are specific, and the DR playbook will be adjusted in the future. The playbook has diverse routing and switching assets in scope as well as multiple vendor and hardware platforms. A developer will create a thin, web front-end microservice and integrate with an Open daylight controller to push changes to the network. Which YANG model should be used?

A.

Use a single native vendor YANG model to minimize development time

B.

Use an open YANG model to allow the reuse of code and standardize the implementation across platforms

C.

Use multiple native vendor YANG models to provide code consistency.

D.

Develop an individualized YANG model to minimize development resources and time to market.

Full Access
Question # 21

What is the purpose of a TLOC extension in a Cisco SD-WAN network fabric?

A.

to facilitate WAN Edge router redundancy within a site

B.

to identify the physical interface where a WAN Edge router connects to the WAN transport network

C.

to expand the number of colors that are potentially applied to a network transport interface

D.

to aggregate multiple physical interfaces into a single logical Interface

Full Access
Question # 22

Currently, inter-VRF routing between the global routing table and VRF-A is accomplished on the client firewall, but the customer wants to do this on the core network layer. The customer does not want to run BGP, VRF-Lite : or static routing Which mechanism meets the requirements?

A.

policy-based routing with the global set statement in a route map

B.

route map that matches access lists and prefix lists with the import feature

C.

inter-VRF can only be used on an external device with a link in each VRF

D.

VRF receive feature under the global routing interfaces

Full Access
Question # 23

What are two advantages of the Cisco SD-WAN technology 9 (Choose two)

A.

Improved application experience

B.

Easier deployment

C.

Optimized cloud connectivity

D.

Proactive network management

E.

Consistent connectivity

Full Access
Question # 24

Refer to the exhibit. A customer experienced an unexpected network outage when the link between R1 and R2 went down. An architect must design a solution to ensure network continuity in the event the link fails again. Which solution should the design include?

A.

Make R31 an L1 router.

B.

Make R3 an L1L2 router

C.

Make Area 0 L2-only

D.

Make R11 an L2 router.

Full Access
Question # 25

Refer to the exhibit. Which method must an architect use to provide connectivity between the mail servers?

A.

ISATAP

B.

6to4

C.

IPv4 compaliDie

D.

6rd

Full Access
Question # 26

Which two best practices must be followed when designing an out-of-band management network? (Choose two.)

A.

    Enforce access control

B.

    Facilitate network integration

C.

    Back up data using the management network

D.

    Ensure that the management network is a backup to the data network

E.

    Ensure network isolation

Full Access
Question # 27

Refer to the exhibit. An engineer Is designing a multicampus Layer 3 Infrastructure using EIGRP as the routing protocol. The design must provide quick replies to queries In the event of a downlink, prevent unnecessary queries, and ensure that traffic does not unnecessarily transit the access layer. Which two actions must the engineer take for the network design? (Choose two.)

A.

Configure core layer switches as stub routers.

B.

Configure distribution layer switches to summarize routes to the core layer.

C.

Configure access layer switches as stub routers.

D.

Configure access layer and core layer switches as stub routers.

E.

Configure access layer switches to summarize routes to the distribution layer.

Full Access
Question # 28

Which PIM mode uses a shared tree only?

A.

bidirectional

B.

sparse

C.

dense

D.

source-specific

Full Access
Question # 29

Refer to the exhibit.

A customer is running HSRP on the core routers. Over time the company has grown and requires more

network capacity. In the current environment, some of the downstream interfaces are almost fully utilized, but

others are not. Which solution improves the situation?

A.

Make router R2 active for half of the VLANs.

B.

Add more interfaces to R1 and R2.

C.

Configure port channel toward downstream switches.

D.

Enable RSTP on the downstream switches.

Full Access
Question # 30

Which nonproprietary mechanism can be used to automate rendezvous point distribution in a large PIM domain?

A.

Embedded RP

B.

BSR

C.

Auto-RP

D.

Static RP

Full Access
Question # 31

Refer to the exhibit. A network engineer is designing an OSPF solution to connect a company ' s remote to a newly provisioned MPLS VPN backbone. Some of the branches have a direct dark fiber connection between each other. The engineer wants to ensure that the dark fibers are used only when the MPLS core is unavailable. Which solution must the engineer choose?

A.

Stub area

B.

Sham link

C.

Virtual link

D.

NSSA

Full Access
Question # 32

A company is planning to open two new branches and allocate the 2a01:c30:16:7009::3800/118 IPv6 network for the region. Each branch should have the capacity to accommodate maximum of 200 hosts. Which two networks should the company use? (Choose two.)

A.

2a01:0c30:0016:7009::3a00/120

B.

2a01:0c30:0016:7009::3b00/121

C.

2a01:0c30:0016:7009::3a80/121

D.

2a01:0c30:0016:7009::3b00/120

E.

2a01:0c30:0016:7009::3c00/120

Full Access
Question # 33

An engineer must design a solution to connect a customer to the Internet. The solution will include a Layer 3 circuit with a CIR of 50 Mbps from the service provider. The hand-off from the provider ' s switch to the customer ' s router is 1Gbps. Which solution should the engineer include to prevent potential issues with choppy voice traffic?

A.

Reduce the bandwidth of the connection to the router.

B.

Implement hierarchical QoS with a parent policing policy.

C.

Implement hierarchical QoS with a parent shaping policy.

D.

Add a bandwidth statement to the router interface.

Full Access
Question # 34

Which two overlay network design considerations must be made for a Cisco SD-Access network? (Choose two.)

A.

LAN automation for deployment

B.

Layer 3 to the access design

C.

Reduce subnets and simplify DHCP management

D.

Dedicated IGP process for the fabric

E.

Avoid overlapping IP subnets

Full Access
Question # 35

An engineer must design a management network for a customer ' s enterprise network. The design must:

    provide the ability to grant and revoke access privileges

    allow only protocols SSH, NTP, FTP, and SNMP

    restrict access to management Interfaces

Which solution must the engineer choose to meet the requirements?

A.

in-band

B.

enterprise internal private

C.

out-of-band

D.

mGRE

Full Access
Question # 36

An engineer must design a management network that enables SSH, NTP, FTP, and SNMP over the production network. The design requires the management of routers and switches that exist across different networks. Which feature must the design include?

A.

Management Plane Protection

B.

dedicated management console connection per device

C.

terminal server

D.

dedicated management VRF connection per device

Full Access
Question # 37

Which two options can you use to configure an EIGRP stub router? (Choose two)

A.

    summary-only

B.

    receive-only

C.

    external

D.

    summary

E.

    totally-stubby

F.

    not-so-stubby

Full Access
Question # 38

Refer to the exhibit.

Which solution decreases the EIGRP convergence time?

A.

Enable subsecond timers

B.

Increase the hold time value

C.

Increase the dead timer value

D.

Enable stub routing on the spokes

Full Access
Question # 39

In PIM sparse mode, if an RPF check is successful on a multicast-enabled device, what happens to the multicast packet?

A.

It is forwarded to all interfaces within the OIL.

B.

It is forwarded to all interfaces except for the receiving interface.

C.

Forwarded packets are dropped to prevent looping.

D.

It is forwarded to all PIM-enabled interfaces.

Full Access
Question # 40

An existing network solution is using BFD in echo mode. Several of the network devices are experiencing high CPU utilization which an engineer has determined is related to the BFD feature. Which solution should the engineer leverage to reduce the CPU load?

A.

Implement slow timers between peers with low CPU resources.

B.

Implement BED asynchronous mode between peers with low CPU resources.

C.

Enable BFD multi-hop on the devices with low CPU resources.

D.

Utilize carrier delay on all routers in the network.

Full Access
Question # 41

A company is running BGP on a single router, which has two connections to the same ISP. Which BGP

feature ensures traffic is load balanced across the two links to the ISP?

A.

Multihop

B.

Multipath Load Sharing

C.

Next-Hop Address Tracking

D.

AS-Path Prepending

Full Access
Question # 42

Which function do reverse path forwarding mechanisms perform in a multicast deployment?

A.

They notify the upstream router of multicast traffic.

B.

They send PIM prune message toward multicast sources.

C.

They eliminate overlapping multicast addresses

D.

They prevent loops and duplicate packets.

Full Access
Question # 43

A large company is building a new branch office, and the network architect already determined that the branch office will need a /24 network. The architect assigned a network engineer to clean the rest of the addressing plan. The engineer’s solution must support:

A.

192.168.64.0/26

B.

192.168.128.0/25

C.

192.168.16.0/28

D.

192.168.32.0/27

Full Access
Question # 44

An engineer is designing a networking solution to allow two hosts to communicate—one host located within the company A network and the other within the company B network. The two companies have no other plans for future additional connections. Both companies want to use a single secure and encrypted internet connection, and the configuration must be as simple as possible. Which network solution must the engineer choose?

A.

single DMVPN with EIGRP routing

B.

routed IPsec tunnel with OSPF routing

C.

policy-based IPsec tunnel with static routing

D.

MPLS VPN provided service with BGP routing

Full Access
Question # 45

Which control-plane technology allows the same subnet to exist across multiple network locations?

A.

LISP

B.

VXLAN

C.

FabricPath

D.

ISE mobility services

Full Access
Question # 46

Which resource is required for the vBond orchestrator to onboard a WAN Edge router via manual configuration?

A.

vSmart hostname

B.

domain name

C.

NAT

D.

organization name

Full Access
Question # 47

An engineer is working for a large cable TV provider that requires multiple sources streaming video on different channels using multicast with no rendezvous point. Which multicast protocol meets these requirements?

A.

PIM-SM

B.

PIM-SSM

C.

any-source multicast

D.

BIDIR-PIM

Full Access
Question # 48

A company needs to increase access port capacity on one floor of a building. They want to leverage the existing catalyst access switch. There is no problem with uplink bandwidth capacity. However, no additional uplinks can be added because no ports are available on the distribution switches. Which solution must the company choose to provide additional access ports?

A.

VDC

B.

VSS

C.

Etherchannel

D.

Stackwise

Full Access
Question # 49

Refer to the exhibit. The distribution switches serve as the layer 3 boundary. HSRP preemption is enabled. When the primary switch comes back after a failure, traffic is initially dropped. Which solution must be implemented to improve the design?

A.

Increase the hello timers on both HSRP devices

B.

Use the preempt delay feature on the primary HSRP device.

C.

Use the preempt delay feature on the backup HSRP device

D.

Configure a higher mac-refresh interval on both HSRP devices

Full Access
Question # 50

What are two characteristics of a migration from an IP-VPN service to a Cisco SD-WAN architecture? (Choose two.)

A.

increased solution complexity

B.

increased security

C.

increased scalability

D.

centralized application policies

E.

distributed control plane

Full Access
Question # 51

Drag and drop the characteristics from the left onto the Yang model they describe on the right.

Select and Place:

Full Access
Question # 52

A customer requires QoS to support multimedia conferencing over MPLS. The network architect chooses to use per-hop behavior. Which solution must the architect use to classify and mark traffic traveling between branch sites?

A.

BW Queue and DSCP WRED with DSCP AF3

B.

BW Queue with DSCP AF3

C.

BW Queue and DSCP WRED with DSCP AF4

D.

BW Queue with DSCP AF4

Full Access
Question # 53

Refer to the exhibit.

A network engineer must improve the current IS-IS environment. The Catalyst switch is equipped with dual supervisors. Each time a stateful switchover occurs, the network experiences unnecessary route recomputation. Which solution addresses this issue if the upstream router does not understand graceful restart messaging?

A.

Enable IS-IS remote LFA FRR on both devices.

B.

Enable NSR on the switch.

C.

Enable NSF on the switch.

D.

Configure ISIS aggressive timers on both devices.

Full Access
Question # 54

What is the purpose of a Cisco SD-Access underlay network?

A.

to abstract IP-based connectivity from physical connectivity

B.

to emulate LAN segments to transport Layer 2 frames over a Layer 3 network

C.

to establish physical connectivity between switches and routers

D.

to provide virtualization by encapsulating network traffic over IP tunnels

Full Access
Question # 55

Which component of Cisco SD-Access integrates with Cisco DNA Center to perform policy segmentation and enforcement through the use of security group access control lists and security group tags?

A.

Cisco Application Policy Infrastructure Controller Enterprise Module

B.

Cisco Network Data Platform

C.

Cisco Identity Services Engine

D.

Cisco TrustSec

Full Access
Question # 56

Which two routing protocols allow for unequal cost load balancing? (Choose two.)

A.

EIGRP

B.

IS-IS

C.

BGP

D.

OSPF

E.

RIPng

Full Access
Question # 57

Which component is part of the Cisco SD-Access overlay architecture?

A.

border node

B.

spine node

C.

leaf node

D.

Cisco DNA Center

Full Access
Question # 58

A customer has several remote sites connected with their headquarters through microwave links. An engineer must propose a backup WAN solution based on these conditions:

Which backup WAN link type the engineer recommend?

A.

LTE

B.

802.16 WiMAX

C.

Laser link

D.

802.15.1 Bluetooth

Full Access
Question # 59

A company plans to deploy a new application across the campus network and asks an engineer to create a QoS policy. The application has these characteristics:

    UDP-based

    inelastic flows

    sensitive to delay over 100 milliseconds

    sensitive to jitter over 50 milliseconds

The appropriate bandwidth is allocated and assigned to the queues. Which mechanism must the engineer use to manage the flows that exceed the configured threshold?

A.

policing

B.

scheduling

C.

remarking

D.

shaping

Full Access
Question # 60

An engineer must connect a new remote site to an existing OSPF network. The new site consists of two low-end routers, one for WAN, and one for LAN. There is no demand for traffic to pass through this area. Which area type does the engineer choose to provide minimal router resources utilization, while still allowing for full connectivity to the rest of the network?

A.

not so stubby

B.

totally not so stubby

C.

totally stubby area

D.

stubby area

Full Access
Question # 61

Which node performs the LISP Map-Server and Map-Resolver functions in the Cisco SD-Access network architecture?

A.

control plane node

B.

fabric edge node

C.

border node

D.

intermediate node

Full Access
Question # 62

What is a benefit of using VRRPv3 as compared to VRRPv2?

A.

VRRPv3 supports IPv4 and IPv6

B.

VRRPv3 supports authentication

C.

VRRPv3 supports preemption

D.

VRRPv3 supports stateful switchover

Full Access
Question # 63

Refer to the exhibit. An architect designs a BGP policy for a customer that requires load sharing of the links that connect with the upstream service provider. The customer has these requirements: • The inbound traffic destined to network 10.1.1.0/24 must transit the R3-R1 link, and if the link fails, all inbound traffic must transit the R4-R2 link.

• The inbound traffic destined to network 10.1.2.0/24 must transit the R4-R2 link, and if the link fails, all inbound traffic should transit the R3-R1 link.

Which solution must the architect choose?

A.

• R1 must announce prefix 10.1.2.0/24 with the route map applied to the neighbor using set as-path prepend 64512 64512

• R2 must announce prefix 10.1.1.0/24 with the route map applied to the neighbor using set as-path prepend 64512 64512.

B.

• R1 must announce prefix 10.1 2.0/24 with a community attribute 64513:300 and prefix 10.1.1.0/24 with a community attribute 64513:200.

• R2 must announce prefix 10.1.2.0/24 with a community attribute 64513:200 and prefix 10.1.1.0/24 with a community attribute 64513:300.

C.

• R1 must announce prefix 10.1.1.0/24 with the route map applied to the neighbor using set as-path prepend 64512 64512.

• R2 must announce prefix 10.1.2.0/24 with the route map applied to the neighbor using set as-path prepend 64512 64512.

D.

• R1 must announce prefix 10.1.2.0/24 with a community attribute 64513:200 and prefix 10.1.1.0/24 with a community attribute 64513:300.

• R2 must announce prefix 10.1.2.0/24 with a community attribute 64513:300 and prefix 10.1.1.0/24 with a community attribute 64513:200.

Full Access
Question # 64

A company has many spoke sites with two data centers. The company wants to exchange the routing information between the data centers and the spoke sites using EIGRP. All locations belong to a single AS. and auto-summarization Is disabled. Which two actions must the company choose? (Choose two.)

A.

Exchange all routes between locations

B.

Summarize the routes between the hubs.

C.

Make each spoke site router a stub router

D.

Summarize the routes from spokes to the hubs.

E.

Split the network into two separate ASs

Full Access
Question # 65

Refer to the exhibit. An architect with an employee ID: 4542:60:170 is designing a campus Layer 2 infrastructure. The design requires a PoE power budget that varies from 30-60 W. In addition, power must be provided continuously to some endpoints and must be supported even during the reloading of edge switches. Which solution must the architect select?

A.

PoE Plus

B.

Fast PoE

C.

Universal PoE

D.

Perpetual PoE

Full Access
Question # 66

An engineer must use YANG with an XML representation to configure a Cisco IOS XE switch with these specifications:

    IP address 10.10.10.10/27 configured on the interface GigabitEthernet2/1/0

    connectivity from a directly connected host 10.10.10.1/27

Which YANG data model set must the engineer choose?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 67

Which function are fabric intermediate nodes responsible for in an SD-Access Architecture?

A.

mapping EIDs to RLOCs

B.

encapsulating user traffic in a VXLAN header including the SGT

C.

registering new endpoints in the HTDB

D.

transporting IP packets between edge nodes and border nodes

Full Access
Question # 68

Refer to the exhibit. An architect must design a solution to connect bank site A with bank site B and support:

    network operation center monitoring end-to-end L3VPN and L2VPN traffic

    company adding thousands of routes in the next two years

Which two BGP solutions must the design include? (Choose two.)

A.

Establish full mesh IBGP peering with ail routers in different IGP domains.

B.

Redistribute different IGP domain routes in a BGP IPv4 routing instance.

C.

Transport site routes using a BGP VPNv4 address family on the PE routers.

D.

Apply BGP policies on all routers to filter out ABR and PE loopback IP addresses.

E.

Connect multiple IGP ' LDP domains using a BGP IPv4 unicast family on the ABR.

Full Access
Question # 69

Refer to the exhibit.

EIGRP has been configured on all links. The spoke nodes have been configured as EIGRP stubs, and the WAN links to R3 have higher bandwidth and lower delay than the links to R4. When a link failure occurs at the R1-R2 link, what happens to traffic on R1 that is destined for a subnet attached to R2?

A.

R1 has no route to R2 and drops the traffic

B.

R1 load-balances across the paths through R3 and R4 to reach R2

C.

R1 forwards the traffic to R3, but R3 drops the traffic

D.

R1 forwards the traffic to R3 in order to reach R2

Full Access
Question # 70

Which design consideration must be made when using IPv6 overlay tunnels?

A.

Overlay tunnels that connect isolated IPv6 networks can be considered a final IPv6 network architecture.

B.

Overlay tunnels should only be considered as a transition technique toward a permanent solution.

C.

Overlay tunnels can be configured only between border devices and require only the IPv6 protocol stack.

D.

Overlay tunneling encapsulates IPv4 packets in IPv6 packets for delivery across an IPv6 infrastructure.

Full Access
Question # 71

In a multicast network, which condition must be met for an RPF check to be performed on the RP address ' ?

A.

The PIM DM device receives a multicast packet and has no directly connected members

B.

The PIM router or multilayer switch has a shared-tree state

C.

The PIM router or multilayer switch has a source-tree state

D.

The PIM DM device receives a multicast packet and has no directly connected PIM neighbor

Full Access
Question # 72

Exhibit:

A.

Make R3 an L1L2 router.

B.

Make R31 an L1 router.

C.

Make Area 0 L2-only.

D.

Make R11 an L2 router.

Full Access
Question # 73

Refer to the exhibit A network administrator plans to announce the site subnets to the WAN using route summarization instead of announcing every subnet. What is the smallest summary route that should be used to encompass all subnets at the site?

A.

2001:DB8:ABCD:0003::/60

B.

2001:DB8::732

C.

2001:DB8:ABCD::760

D.

2001 DB8 ABCD /64

Full Access
Question # 74

An infrastructure team is concerned about the shared memory utilization of a device, and for this reason, they need to monitor the device state. Which solution limits impact on the device and provides the required data?

A.

IPFIX

B.

static telemetry

C.

on-change subscription

D.

periodic subscription

Full Access
Question # 75

An engineer is designing a QoS solution for a campus. The design must guarantee real-time traffic delivery during congestion, minimize the bandwidth consumption for possible virus or worm attacks, and reduce flooding of excessive traffic during times of congestion. Which two solutions must the engineer select? (Choose two.)

A.

Create a shaping policy to drop excessive traffic and a strict queue for real-time traffic.

B.

Apply queuing on the distribution to core links

C.

Create a policing policy to drop excessive traffic and a strict queue for real-time traffic.

D.

Create a scavenger queue for excessive traffic and a strict queue for real-time traffic

E.

Apply queuing on the access to distribution links.

Full Access
Question # 76

How does OMP behave in a Cisco Catalyst SD-WAN architecture if no policy is defined?

A.

To allow a hub-and-spoke topology for WAN Edge routers to communicate via the central location

B.

To allow a point-to-point topology for WAN Edge routers to communicate from the central location to remote locations

C.

To allow all WAN Edge routers to communicate using a full mesh topology

D.

To block all communication between WAN Edge routers

Full Access
Question # 77

How do IETF. OpenConfig and Cisco nativo YANG models differ when used to configuro the same feature on an infrastructure device?

A.

OpenConfig models are more comprehensive than IETF.

B.

Cisco native models are less comprehensive than OpenConfig.

C.

Cisco native models are less comprehensive than IETF.

D.

IETF models are more comprehensive than OpenConfig.

Full Access
Question # 78

Which protocol is the Cisco SD-Access data plane based on?

A.

OMP

B.

VXLAN

C.

NHRP

D.

LISP

Full Access
Question # 79

Which two steps can be taken to improve convergence in an OSPF network? (Choose two.)

A.

Use Bidirectional Forwarding Detection

B.

Merge all the areas into one backbone area

C.

Tune OSPF parameters

D.

Make all non-backbone areas stub areas

E.

Span the same IP network across multiple areas.

Full Access
Question # 80

Refer to the exhibit.

An architect is designing a routing solution for a company. The new design will add a circuit routers C and D to protect against loss of connectivity to 10.0.4.0/24 during a link failure between routers B and D. Which solution must the architect choose?

A.

Stub connected

B.

Stub redistributed

C.

Stub receive-only

D.

Stub leak-map

Full Access
Question # 81

When is it advisable to provide dedicated control plane nodes within a Cisco SD-Access design?

A.

in a small deployment where border nodes are not required

B.

in a design where fabric edge nodes are unable to provide control plane functionality

C.

in designs without Cisco DNA Center

D.

when there is a requirement for frequent roaming of endpoints across fabric edge nodes

Full Access
Question # 82

An engineer must use YANG with an XML representation to configure a Cisco IOS XE switch with these specifications:

    IP address 10.10.10.10/27 configured on the interface GigabitEthernet2/1/0

    connectivity from a directly connected host 10.10.10.1/27

Which YANG data model set must the engineer choose?

A.

B.

C.

D.

Full Access
Question # 83

A company requires a private WAN design that allows remote sites to connect to HQ. The design must ensure that:

    traffic is always encrypted

    forwarding overhead is reduced

    management of security is centralized

    multicast traffic is supported

Which technology must the company select?

A.

IPsec P2P

B.

mGRE

C.

DMVPN Phase 3

D.

GET VPN

Full Access
Question # 84

A company with multiple service providers wants to speed up BGP convergence time in the event a failure occurs with their primary link. Which approach achieves this goal and does not impact router CPU utilization?

A.

Utilize BFD and tune the multiplier to 50

B.

Lower the BGP hello interval

C.

Decrease the BGP keepalive timer

D.

Utilize BFD and keep the default BGP timers

Full Access
Question # 85

Drag and drop the characteristics from the left onto the configuration protocols they describe on the right.

Full Access
Question # 86

Drag and drop the characteristics from the left onto the correct telemetry mode on the right.

Full Access
Question # 87

In a Cisco SD-Access fabric, which node facilities connectivity between the fabric and networks external to the fabric?

A.

intermediate

B.

edge

C.

control plane

D.

border

Full Access
Question # 88

Drag and drop the descriptions from the left onto the Cisco SD-WAN component they describe on the right.

Full Access
Question # 89

An engineer uses Postman and YANG to configure a router with:

Which get-config replay verifies that the model set was designed correctly?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 90

When expanding an existing Cisco SD-Access network, in addition to the control plane, which two device roles are needed to create an additional fabric site? (Choose two.)

A.

leaf

B.

cEdge

C.

WLC

D.

edge

E.

border

Full Access
Question # 91

Which routes does the overlay management protocol advertise in an SD-WAN overlay?

A.

underlay, MPLS, and overlay

B.

primary, backup, and load-balanced

C.

prefix, TLOC, and service

D.

Internet, MPLS, and backup

Full Access
Question # 92

Drag and drop the model driven telemetry characteristics from the left onto the mode they belong to on the right.

Full Access
Question # 93

Refer to the exhibit. A mid-size company that produces media content has four offices across the country connected via MPLS Layer 3 service, which is provided by a local ISP. The network uses static routing. In anticipation of future growth, the engineering team must review and recommend design improvements in accordance with RFC 5340 requirements. The solution must optimize the routing table and reduce the number of routing updates exchanged between routers. The updated routing design must also be reliable and avoid routing loops. Which implementation meets the requirements?

A.

EIGRP with multiple AS numbers

B.

OSPF with stub areas

C.

BGP with a unique address family for each location

D.

OMP with stub-area routers

Full Access
Question # 94

Refer to the exhibit A customer requires maximum uptime for the data plane between R1 and R3 running OSPF Which solution must the design include for high availability if the routing process on R2 requires maintenance?

A.

BFD on all routers

B.

nonstop forwarding on R1 and R3

C.

nonstop forwarding on R3 only

D.

graceful restart on all routers

Full Access
Question # 95

A customer with an IPv4 only network topology wants to enable IPv6 connectivity while preserving the IPv4 topology services. The customer plans to migrate IPv4 services to the IPv6 topology, then decommission the IPv4 topology. Which topology supports these requirements?

A.

dual stack

B.

6VPE

C.

6to4

D.

NAT64

Full Access
Question # 96

Refer to the exhibit. An architect must design a solution to connect the two ASs. To optimize bandwidth, the design will implement load sharing between router R6 and router R4. Which solution should the design include?

A.

Use update-source to specify the Loopback interface.

B.

Use next-hop-serf attributes only for routes that are learned from eBGP peers.

C.

Configure the eBGP TTL to support eBGP multihop.

D.

Use maximum-paths to install multiple paths in the routing table.

Full Access
Question # 97

Drag and drop the elements from the left onto the YANG models where they and used on the right.

Full Access
Question # 98

When vEdge router redundancy is designed, which FHRP is supported?

A.

HSRP

B.

OMP

C.

GLBP

D.

VRRP

Full Access
Question # 99

What is the function of the multicast Reverse Path Forwarding check?

A.

It allows for a loop-free distribution tree from the source to receivers.

B.

It serves as an Auto RP Mapping agent.

C.

It prevents bootstrap messages from reaching all routers.

D.

It is used to discover and announce RP-set information.

Full Access
Question # 100

When designing interdomain multicast, which two protocols are deployed to achieve communication between multicast sources and receivers? (Choose two.)

A.

IGMPv2

B.

BIDIR-PIM

C.

MP-BGP

D.

MSDP

E.

MLD

Full Access
Question # 101

A customer requested that a guaranteed service line be enabled for a manufacturing business in different countries. On the customer side, the QoS-aware application is used to process large data chunks. The application cannot tolerate drops and latency should be as low as possible. Which QoS model must an engineer employ to use the minimum required resources on the ISP network nodes?

A.

Implement a group-based QoS strategy with FECs enabled

B.

Enable a flow-based QoS strategy with queuing elements.

C.

Implement an end-to-end QoS strategy with SLA.

D.

Configure a domain-based QoS strategy with PHB behavior.

Full Access
Question # 102

Drag and drop the elements from the left onto the protocols where they are used on the right.

Full Access
Question # 103

In an SD-WAN architecture, which methods are used to bootstrap a vEdge router?

A.

DHCP options or manual configuration

B.

vManage or DNS records

C.

ZTP or manual configuration

D.

DNS records or DHCP options

Full Access
Question # 104

Which two statements about VRRP object tracking are true? (Choose two)

A.

The priority of a VRRP device can change in accordance with the up or down status of a VRRP object

B.

The VRRP interface priority must be manually configured by the administrator

C.

A VRRP group can track only one object at a time

D.

VRRP can track the status of interfaces and routes

E.

VRRP supports only interface tracking

Full Access
Question # 105

What does the fabric data plane leverage in SD-Access Architecture?

A.

LISP protocol to resolve endpoint-to-location mapping

B.

IS-IS protocol to exchange link-state routing information

C.

MAC-in-IP encapsulation method to transport of the Layer 2 frame

D.

BGP protocol to advertise endpoint prefixes outside of the fabric

Full Access
Question # 106

What is the role of a control-plane node in a Cisco SD-Access architecture?

A.

fabric device that connects wired endpoints to the SD-Access fabric

B.

map system that manages endpoint to device relationships

C.

fabric device that connects APs and wireless endpoints to the SD-Access fabric

D.

map system that manages External Layer 3 networks

Full Access
Question # 107

How is redundancy achieved among Cisco vBond Orchestrators in a Cisco SD-WAN deployment?

A.

The IP addresses of all Orchestrators are mapped to a single DNS name.

B.

The closest Orchestrator to each Cisco WAN Edge router is selected.

C.

Cisco WAN Edge routers are configured with all Orchestrators using their IP addresses and priority.

D.

A single Cisco Orchestrator is deployed in each network.

Full Access
Question # 108

Refer to the exhibit. An engineer must connect the IPv6 island to the IPv4-only network to provide IPv6 hosts access to file servers and DNS services in the IPv4 network. Which NAT should the engineer choose?

A.

stateless NAT66

B.

stateful NAT66

C.

static NAT-PT

D.

dynamic NAT-PT

Full Access
Question # 109

Which two considerations must be made regarding the overlay network for a Cisco SD-Access architecture? (Choose two.)

A.

Virtual networks should be used for microsegmentation

B.

SGTs should be used for data plane isolation and microsegmentation

C.

Virtual networks should be used for data plane isolation only

D.

Overlapping IP addresses across different overlay networks should be used to conserve IP addresses

E.

Overlapping IP addresses across different overlay networks should be avoided for operational simplicity

Full Access
Question # 110

Which integration capability does gRPC provide?

A.

leveraging the LDAP protocol for authentication and directory services ensuring secure access control in RPC communications

B.

leveraging the XMPP protocol for real-time messaging and collaboration between client and server applications

C.

leveraging protocol buffers to provide efficient serialization and deserialization of structured data over the network

D.

leveraging GRAPH-API for network monitoring and management providing comprehensive visibility into RPC-related metrics and performance statistics

Full Access
Question # 111

Which information update is carried by OMP and enables the Cisco SD-WAN to build a secure overlay fabric on top of any public or private transport without regard for the actual link IP?

A.

TLOC

B.

RLOC

C.

LISP PITR

D.

DTLS

Full Access
Question # 112

A network administrator is troubleshooting a DMVPN setup between the hub and the spoke. Which action should the administrator take before troubleshooting the IPsec configuration?

A.

    Verify the GRE tunnels.

B.

    Verify ISAKMP.

C.

    Verify NHRP.

D.

    Verify crypto maps.

Full Access
Question # 113

Which protocol is deployed through LAN automation to build node-to-node underlay adjacencies in SDA?

A.

IS-IS

B.

OLISP

C.

OSPF

D.

VXLAN

Full Access