What are the consequences of virtualization? (Choose two)
In the three-component element of network design, which phase involves proactive monitoring of the network to identify and resolve issues before they affect the organization as well as fine-tuning the infrastructure and applications on an ongoing basis to maximize network performance?
Which protocols naturally hide the information? (Choose two)
Which is a recommended practice when migrating to a MST network?
Suppose you have decided to use a Layer 3 design but are required to support legacy systems, such as traditional access points and sensors, which require contiguous Layer 2 domain throughout the network. What kind of design will best suit your needs?
Select a statement that is true about the failure domains.
Knowing that CPU, memory, and link overutilization are the usual suspects when it comes to poor performance, which tool can you use to monitor the behavior of a router that is connected to the Internet?
Enterprise edge functional area is composed of what modules? (Choose three)
Which options describe the updated Layer 2 access? (Choose three)
What are the benefits of implementing a Layer 3 routed access layer? (Choose two)
Select the statement that applies to port aggregation considerations.
Which business drivers can affect the network architecture? (Choose three)
Where should you hide the information?
Which are STP considerations? (Choose three)
Why would you modularize? (Choose two)
Which of the following tasks are parts of characterizing an existing network? (Choose two)
What are the characteristics of the access layer? (Choose two)
Select the statements that apply to managing bandwidth within a campus network. (Choose two)
In the three-component element of network design, which phase involves setting the expectations correctly, developing an architectural strategy, building the transformational roadmap and design, and defining a plan for tracking results and impacts?
Which common project deliverable document contains network topology and hardware platform; hardware and software protocols and functions; addressing and routing strategy; scalability and redundancy; and security considerations?
There are a number of ways in which hiding information can be achieved. What method performs information hiding by design?
Select accurate statements about STP and its alignment of STP with FHRP. (Choose two)
Why would a two layer hierarchy (collapsed core) not be enough? (Choose two)
Which of the following options describe VSS considerations? (Choose three)
Which options describe Layer 3 access? (Choose three)
How can scalability be achieved through modular design? (Choose two)
Which tool can help you to identify traffic types and figure out how much traffic each type accounts for within the network?
Select statements that are true about VTP considerations and practices. (Choose three)
After you create a complete design and implementation plan, a draft design documentation is updated to a final design document. Which of the following items should the design document include? (Choose three)
What options describe small and medium campus design options? (Choose three)
It is important to understand the concept of the network convergence before discussing modular network design. What options describe network convergence? (Choose two)
When considering information hiding and its considerations, what do you call the time between the moment a problem appears and the moment when it is removed, or the network failing and you, as the network administrator, finding a solution and implementing it?
Why is hub-and-spoke topology the basis for hierarchical design? (Choose two)
What options accurately describe the traditional Layer 2 access? (Choose two)
You want to redesign the routing of an existing network. Unfortunately, the existing network documentation is incomplete and the network topology map has not been updated for a long time. The first step of your design should be updating the network map. What is the quickest solution to update the network map?
Which mechanism improves STP performance by configuring the access port to transition directly to the forwarding state?
Which feature best describes EtherChannel?
A design that introduces IPSec encryption and authentication is required for the WAN module of an existing network. Which network would you use to verify the design?
Which options describe the top-down approach to network design? (Choose two)
Which of the following options describe the considerations for switch stacking? (Choose three)
Which statements apply to end-to-end VLAN design? (Choose two)
Which options should be included in the development of a good network design to ensure interoperability between an existing and an anticipated network? (Choose three)
Suppose you have implemented the VSS virtualization technique to ensure that Layer 3 switches appear as one single switch, hiding information from end devices, so that if any Layer 3 switch fails, end clients will still have connectivity. What is this an example of?
Which port aggregation method requires configuration of the switches mode to be set to "On" in order to successfully form an EtherChannel bundle?
Virtualization became a general term to describe various different technologies that are not what? (Choose two)
Which feature of MST is incorrect?
What are the sources of information that can be used in the auditing process? (Choose three)
What is the cost of a 100 Mbps link?
Select statements that are true about UDLD. (Choose two)
Identify the use cases for the virtualization in networks. (Choose two)
In the three-component element of network design, which phase involves integrating devices into the existing network with minimal disruption, and then testing operations for appropriateness of the design?
Select statements that are true about VLAN and Trunk considerations. (Choose three)
Which option best describes the problem with unidirectional links?
What describes STP stability mechanism recommendations? (Choose three)
What is the best way to ensure that a switch always remains the root bridge?