1.
What are two expected features of modern enterprise networks? (Choose two.)
Correct Answer(s)
B. Support for critical applications
E. Support for converged network traffic
Explanation
Modern enterprise networks are expected to have support for critical applications, as these applications are essential for the smooth functioning of the organization. These applications may include email systems, customer relationship management (CRM) software, and financial systems. Additionally, modern enterprise networks are also expected to support converged network traffic, which means they can handle various types of data traffic such as voice, video, and data on a single network infrastructure. This allows for efficient communication and collaboration within the organization.
2.
What network design would contain the scope of disruptions on a network should a failure occur?
Correct Answer
D. The deployment of distribution later switches in pairs and the division of access layer switch connections between them
Explanation
The deployment of distribution layer switches in pairs and the division of access layer switch connections between them would contain the scope of disruptions on a network should a failure occur. This design ensures redundancy and fault tolerance by having two distribution layer switches that can take over if one fails. By dividing the access layer switch connections between them, the network traffic is distributed and balanced, reducing the impact of a failure on the network.
3.
Which action should be taken when planning for redundancy on a hierarchical network design?
Correct Answer
D. Add alternate pHysical paths for data to traverse the networks
Explanation
When planning for redundancy on a hierarchical network design, it is important to add alternate physical paths for data to traverse the networks. This means creating multiple physical connections between devices to ensure that if one path fails, data can still flow through an alternate path. This improves network reliability and minimizes downtime in case of a failure.
4.
Which design feature will limit the size of a failure domain in an enterprise network?
Correct Answer
B. The use of the building switch block approach
Explanation
The use of the building switch block approach will limit the size of a failure domain in an enterprise network. This approach involves dividing the network into smaller blocks or segments, with each block having its own switch. By doing so, any network failure or issue will be confined to that specific block and will not affect the entire network. This helps in isolating and containing failures, minimizing their impact and making troubleshooting and maintenance easier.
5.
Which devices exist in the failure domain when switch S3 loses power?
Correct Answer
A. PC_3 and AP_2
Explanation
When switch S3 loses power, the devices that exist in the same failure domain are PC_3 and AP_2. This means that if switch S3 fails, these devices will also be affected and lose connectivity. The other options, S4 and PC_2 or S1 and S4, do not fall within the same failure domain as switch S3.
6.
What are two benefits of extending access layer connectivity to users through a wireless medium? (Choose two.)
Correct Answer(s)
A. Increased flexibility
C. Reduced costs
Explanation
Extending access layer connectivity to users through a wireless medium provides increased flexibility as it allows users to connect to the network from anywhere within the coverage area without the need for physical cables. This enables mobility and the ability to work from different locations. Additionally, it reduces costs as there is no need for extensive cabling infrastructure and the associated expenses.
7.
A network administrator is planning redundant devices and cabling in a switched network to support high availability. Which benefit will implementing the Spanning Tree Protocol provide to this design?
Correct Answer
B. Redundant paths can be available without causing logical Layer 2 loops.
Explanation
Implementing the Spanning Tree Protocol (STP) in a switched network design will provide the benefit of having redundant paths available without causing logical Layer 2 loops. STP prevents network loops by blocking redundant paths and only allowing one active path at a time. This ensures that there are backup paths available in case of link failures, while also maintaining a loop-free topology to prevent broadcast storms and other issues that can occur with loops.
8.
Which two features of enterprise class equipment assists an enterprise network in maintaining 99.999 percent up-time? (Choose two.)
Correct Answer(s)
A. Failover capabilities
B. Redundant power supplies
Explanation
Failover capabilities and redundant power supplies are two features of enterprise class equipment that assist in maintaining 99.999 percent up-time. Failover capabilities ensure that if one component or system fails, another one automatically takes over, minimizing downtime. Redundant power supplies provide backup power sources, ensuring uninterrupted operation even if one power supply fails. These features enhance the reliability and availability of the network, reducing the risk of downtime and maximizing up-time.
9.
What capability is provided by the use of application-specific integrated circuits in Cisco multilayer switches?
Correct Answer
A. Aggregating pHysical ports into a single logical interface
Explanation
Application-specific integrated circuits (ASICs) in Cisco multilayer switches provide the capability of aggregating physical ports into a single logical interface. This means that multiple physical ports can be combined and treated as a single entity, allowing for increased bandwidth and improved network efficiency. By consolidating multiple ports into one logical interface, the switch can handle higher volumes of data traffic and provide better performance for network applications. This capability is particularly useful in scenarios where there is a need for high-speed data transfer and efficient utilization of network resources.
10.
Which statement describes a characteristic of Cisco Meraki switches?
Correct Answer
B. They are cloud-managed access switches that enable virtual stacking of switches.
Explanation
Cisco Meraki switches are characterized as cloud-managed access switches that enable virtual stacking of switches. This means that these switches can be managed and configured through a cloud-based dashboard, providing ease of management and scalability. Additionally, virtual stacking allows multiple switches to be managed as a single logical unit, simplifying network management and reducing operational complexity.
11.
In which situation would a network administrator install a Cisco Nexus Series or Cisco Catalyst 6500 Series switch to promote infrastructure scalability?
Correct Answer
C. On a data center network to provide expansion and transport flexibility
Explanation
The Cisco Nexus Series or Cisco Catalyst 6500 Series switch would be installed on a data center network to provide expansion and transport flexibility. These switches are designed to handle high traffic volumes and provide scalability for growing data centers. They offer features such as high port density, high performance, and support for various protocols, allowing for easy expansion and flexibility in network design. Additionally, these switches offer advanced features like virtualization support, modular design, and high availability, making them ideal for data center environments.
12.
Which statement describes a characteristic of Cisco Catalyst 2960 switches?
Correct Answer
D. New Cisco Catalyst 2960-C switches support PoE pass-through.
Explanation
The given correct answer states that the new Cisco Catalyst 2960-C switches support PoE pass-through. This means that these switches have the capability to transmit power over Ethernet to connected devices, allowing them to receive power without the need for a separate power source. This feature is beneficial in scenarios where power outlets may be limited or difficult to access, as it simplifies the deployment of network devices.
13.
What are three access layer switch features that are considered when designing a network? (Choose three.)
Correct Answer(s)
C. Forwarding rate
D. Port density
E. Power over Ethernet
Explanation
When designing a network, three important features to consider for access layer switches are forwarding rate, port density, and Power over Ethernet. Forwarding rate refers to the speed at which the switch can process and forward data packets, ensuring efficient network performance. Port density refers to the number of available ports on the switch, allowing for connectivity to multiple devices. Power over Ethernet (PoE) enables the switch to provide power to connected devices, such as IP phones or wireless access points, eliminating the need for separate power sources. These features are crucial for an effective and scalable network design.
14.
What are two functions of a router? (Choose two.)
Correct Answer(s)
A. It connects multiple IP networks
B. It determines the best path to send packets
Explanation
A router is a networking device that connects multiple IP networks by forwarding data packets between them. It examines the destination IP address of each packet and determines the best path or route to send the packet to its destination. This process is known as routing. Therefore, the two functions of a router mentioned in the answer are accurate.
15.
A network engineer is reviewing a network design that uses a fixed configuration enterprise router that supports both LAN and WAN connections. However, the engineer realizes that the router does not have enough interfaces to support growth and network expansion. Which type of device should be used as a​​ replacement?
Correct Answer
D. A modular router
Explanation
A modular router should be used as a replacement because it allows for expansion and growth by providing the ability to add or remove interface modules as needed. This will ensure that the network can accommodate future LAN and WAN connections without the limitation of a fixed number of interfaces.
16.
When a Cisco IOS device is being selected or upgraded, which option indicates the capabilities of the Cisco IOS device?
Correct Answer
A. Feature set
Explanation
The feature set of a Cisco IOS device indicates the capabilities it possesses. It refers to the specific features and functionalities that are available on the device. The feature set determines the level of support for various protocols, services, and applications. Upgrading or selecting a Cisco IOS device based on its feature set ensures that it meets the specific requirements and needs of the network. The release number, version number, and platform are also important factors to consider, but they do not directly indicate the capabilities of the device like the feature set does.
17.
Immediately after a router completes its boot sequence, the network administrator wants to check the routers configuration. From privileged EXEC mode, which of the following commands can the administrator use for this purpose? (Choose two.)
Correct Answer(s)
B. Show startup-config
D. Show running-config
Explanation
The network administrator can use the "show startup-config" command to check the router's configuration immediately after the boot sequence. This command displays the configuration that is stored in the NVRAM, which is where the startup configuration is saved. Additionally, the administrator can use the "show running-config" command to view the currently running configuration of the router. This command displays the configuration that is currently active in the router's memory.
18.
Which command was issued on a Cisco switch that resulted in the exhibited output?
Correct Answer
B. Show port-security address
Explanation
The command "show port-security address" was issued on a Cisco switch, which resulted in the exhibited output. This command is used to display the secure MAC addresses and their corresponding interface on the switch. It provides information about the port security configuration on the switch, including the MAC addresses that have been dynamically learned or manually configured on secure ports.
19.
What is a characteristic of in-band device management?
Correct Answer
C. It is used to monitor and make configuration changes to a network device over a network connection.
Explanation
In-band device management is a method used to monitor and make configuration changes to a network device over a network connection. This means that the device can be accessed and managed remotely, without the need for a direct physical connection. It allows administrators to monitor the device's performance, troubleshoot issues, and make necessary configuration changes, all through a network connection. This method is convenient and efficient as it eliminates the need for physical access to the device and enables remote management.
20.
Which two requirements must always be met to use in-band management to configure a network device? (Choose two.)
Correct Answer(s)
C. At least one network interface that is connected and operational
E. Telnet, SSH, or HTTP access to the device
Explanation
To use in-band management to configure a network device, two requirements must always be met. First, there should be at least one network interface that is connected and operational. This means that the device must be connected to a network and have a functioning network interface to receive management commands. Second, the device should have Telnet, SSH, or HTTP access enabled. These protocols allow remote access to the device for configuration purposes. Therefore, both these requirements are necessary to use in-band management effectively.
21.
Which type of information is displayed by the show ip protocols command that is issued from a router command prompt?
Correct Answer
A. The configured routing protocols and the networks that the router is advertising
Explanation
The show ip protocols command displays the configured routing protocols and the networks that the router is advertising. This command provides information about the routing protocols that are being used by the router and the networks that are being advertised to other routers. It is useful for troubleshooting and verifying the routing configuration on the router.
22.
A network technician needs to connect a PC to a Cisco network device for initial configuration. What is required to perform this device configuration?
Correct Answer
B. Telnet access
Explanation
To perform the initial configuration of a Cisco network device, the network technician requires Telnet access. Telnet is a protocol that allows remote access to a device's command-line interface (CLI). By using Telnet, the technician can establish a connection between the PC and the Cisco device, enabling them to configure the device's settings and parameters. This access is crucial for setting up the device and ensuring its proper functioning within the network.
23.
What is the function of ASICs in a multilayer switch?
Correct Answer
B. They streamline forwarding of IP packets in a multilayer switch by bypassing the CPU.
Explanation
ASICs (Application-Specific Integrated Circuits) in a multilayer switch are responsible for streamlining the forwarding of IP packets. They achieve this by bypassing the CPU, allowing for faster and more efficient packet forwarding. By offloading this task to the ASICs, the CPU is freed up to perform other essential functions, improving overall network performance. This feature is particularly important in multilayer switches that handle a large volume of network traffic and require fast packet processing capabilities.
24.
What is the function of PoE pass-through?
Correct Answer
A. Allows switches, pHones, and wireless access points to receive power over existing Ethernet cables from an upstream switch
Explanation
PoE pass-through enables switches, phones, and wireless access points to receive power over existing Ethernet cables from an upstream switch. This eliminates the need for separate power cables and simplifies the installation process. By utilizing the existing infrastructure, devices can be powered and connected to the network simultaneously, providing convenience and flexibility.
25.
What term is used to express the thickness or height of a switch?
Correct Answer
A. Rack unit
Explanation
The term "rack unit" is used to express the thickness or height of a switch. A rack unit is a standard measurement for the height of equipment in a server rack. It represents the vertical space occupied by the switch in the rack.
26.
What are two ways to access a Cisco switch for out-of-band management? (Choose two.)
Correct Answer(s)
C. A connection that uses the console port
D. A connection that uses the AUX port
Explanation
Two ways to access a Cisco switch for out-of-band management are through a connection that uses the console port and a connection that uses the AUX port. The console port allows direct access to the switch's command-line interface (CLI) through a serial connection, while the AUX port provides an additional out-of-band management interface for remote connectivity. These two methods are commonly used for initial configuration, troubleshooting, and managing the switch when network connectivity is not available or compromised.
27.
How can an enterprise network be designed to optimize bandwidth?
Correct Answer
C. By organizing the network to control traffic patterns
Explanation
To optimize bandwidth in an enterprise network, the network can be designed by organizing it to control traffic patterns. This involves implementing techniques such as traffic shaping, quality of service (QoS), and prioritizing critical data to ensure that bandwidth is efficiently utilized and allocated. By controlling the flow of network traffic, unnecessary congestion and bottlenecks can be minimized, resulting in improved network performance and optimized bandwidth utilization.
28.
As the network administrator you have been asked to implement EtherChannel on the corporate network. What does this configuration consist of?
Correct Answer
B. Grouping multiple pHysical ports to increase bandwidth between two switches
Explanation
EtherChannel is a configuration that involves grouping multiple physical ports together to increase the bandwidth between two switches. By combining these ports, the network administrator can effectively create a higher-capacity link between the switches, allowing for increased data transfer rates and improved network performance. This configuration helps to optimize network traffic and improve overall network efficiency.
29.
In the Cisco Enterprise Architecture, which two functional parts of the network are combined to form a collapsed core design? (Choose two.)
Correct Answer(s)
A. Core layer
E. Distribution later
Explanation
In the Cisco Enterprise Architecture, the collapsed core design combines the core layer and the distribution layer. The core layer is responsible for high-speed switching and routing within the network, while the distribution layer provides connectivity between the access layer and the core layer. By combining these two functional parts, the collapsed core design simplifies the network architecture, reduces complexity, and improves scalability and performance.