Q21. After the recent implementation of a new design that incorporated GRE tunnels into the network, the network operations staff is seeing the following syslog message in multiple routers on the network - %TUN-5-RECURDOWN: Tunnel0 temporarily disabled due to recursive routing. 

From a design perspective, what was not taken into account prior to implementing the solution? 

A. The neighboring routers cannot respond within the specified hold time. 

B. The interface on the router that is the source of the tunnel is down. 

C. The interface on the neighboring router that is the source of the tunnel is down. 

D. The router is learning the route to the tunnel destination address using the tunnel interface. 

E. The tunnel interface on the router is not receiving any keepalives within the specified hold time. 

Answer:


Q22. Your design plan includes mutual redistribution of two OSPF networks at multiple locations, with connectivity to all locations in both networks. How is this accomplished without creating routing loops? 

A. Use route maps on the ASBRs to allow only internal routes to be redistributed. 

B. Use route maps on the ASBRs to allow internal and external routes to be redistributed. 

C. Use route maps on the ASBRs to set tags for redistributed routes. 

D. Use route maps on the ASBRs to filter routes with tags so they are not redistributed. 

Answer:


Q23. You are a network designer and have been asked to consult with your server operations team to further enhance the security of the network. The operations team provides you with these details about the network: 

A pool of servers is accessed by numerous data centers and remote sites. 

The servers are accessed via a cluster of firewalls. 

The firewalls are configured properly and are not dropping traffic. 

The firewalls occasionally cause asymmetric routing of traffic within the server data center. 

Which technology would you recommend to enhance security by limiting traffic that could originate from a hacker compromising a workstation and redirecting flows at the servers? 

A. Access control lists to limit sources of traffic that exits the server-facing interface of the firewall cluster 

B. Poison certain subnets by adding static routes to Null0 on the server farm core switches. 

C. Unicast Reverse Path Forwarding in strict mode 

D. Unicast Reverse Path Forwarding in loose mode 

Answer:


Q24. When adding an IPSec headend termination device to your network design, which two performance indicators are the most accurate to determine device scalability? (Choose two.) 

A. CPU capabilities 

B. bandwidth capabilities 

C. packets per second capabilities 

D. maximum tunnel termination capabilities 

Answer: CD 


Q25. What should be taken into consideration when designing IPsec networks using Authentication Header (AH)? 

A. NAT 

B. transform set 

C. crypto maps 

D. ISAKMP 

Answer:


Q26. In order to meet your service level agreement, your network designer created a design solution that includes interface dampening. In which two ways will interface dampening benefit your overall network design? (Choose two.) 

A. Interface dampening uses an exponential backoff algorithm to suppress event reporting to the upper-level protocols. 

B. When the interface is dampened, further link events are not reported to the upper protocol modules. 

C. When the interface is dampened, further link events are reported to the upper protocol module. 

D. Periodic interface flapping that affects the routing system as a whole should have a period shorter than the system convergence time. 

Answer: AB 


Q27. A designer is working with a large bank to redesign their network. The designer wants to minimize complaints regarding slow application response times across the WAN. It is suspected that currently traffic is not being classified and marked correctly somewhere in the network. Which tool should the designer recommend to validate quality of service mappings and use? 

A. SNMP 

B. IPFIX 

C. IP SLA 

D. protocol analyzer 

E. NBAR 

Answer:


Q28. As part of the network design, ACME Corporation requires the ability to export IPv6 information to better manage its network. Which version of NetFlow records is required to export this information? 

A. 5 

B. 6 

C. 7 

D. 8 

E. 9 

Answer:


Q29. Which multicast technology provides a large, many-to-many connectivity for a new application while minimizing load on the existing network infrastructure? 

A. Bidirectional PIM 

B. PIM Sparse Mode 

C. Any-source Multicast 

D. Source Specific Multicast 

Answer:


Q30. You are designing a network for a branch office. In order to improve convergence time, you are required to use the BFD feature. Which four routing protocols can you use to facilitate this? (Choose four.) 

A. EIGRP 

B. IS-IS 

C. BGP 

D. static 

E. RIP 

Answer: ABCD