10/217 questions · Unlock full access
Q1

A financial institution is designing a new data center network using Cisco ACI. A key requirement is to provide shared L3Out connectivity for multiple tenants while maintaining strict traffic isolation between them. The design must also ensure that routing tables are not shared between tenants using the common L3Out. Which ACI construct and configuration is required to meet these requirements?

Q2Multiple answers

A global enterprise is deploying a Cisco SD-WAN solution. They have two main data centers (DC1, DC2) and multiple regional hubs. For business-critical applications, they require that traffic from branch sites prefers DC1, but fails over to DC2 if DC1 becomes unreachable. Additionally, if the preferred path to DC1 experiences a 20% packet loss, traffic should also be rerouted to DC2. Which two SD-WAN policies are required to implement this design? (Select TWO)

Q3

True or False: In a Cisco SD-Access fabric, the LISP (Locator/ID Separation Protocol) control plane is primarily responsible for tracking the location of endpoints (EIDs) by mapping them to their current physical location (RLOCs) on the fabric edge nodes.

Q4

A large university is redesigning its campus network to support increasing BYOD and IoT device onboarding while enforcing strict security segmentation. The current network relies on multiple SSIDs and complex ACLs, which has become an operational burden. The primary business goals are to simplify network operations, automate policy enforcement, and ensure that a compromised IoT device cannot access sensitive research data. The proposed solution is a Cisco SD-Access fabric. The design includes fabric edge nodes, intermediate nodes, border nodes, and control plane nodes (running on Cisco DNA Center). Wireless connectivity will be provided by fabric-enabled Access Points. To achieve the security goals, all devices will be profiled upon connection. User-owned devices (BYOD) will be placed in a 'BYOD_Users' group. University-owned research computers will be in the 'Research_Computers' group, and IoT devices like security cameras will be in the 'IoT_Devices' group. The security policy dictates that IoT_Devices should only be able to communicate with the central video management server and should be completely isolated from all other groups. Which SD-Access components are most critical for dynamically assigning devices to groups and enforcing this access policy between groups?

Q5

A network architect is designing a BGP solution for a large enterprise with two internet connections from different service providers (AS 65100 and AS 65200). The enterprise uses its own public AS (AS 65300). The primary business requirement is to use the link to AS 65100 as the primary path for all outbound traffic. The link to AS 65200 should only be used if the primary link fails. Which BGP attribute should be manipulated on the enterprise edge routers to influence outbound traffic path selection and meet this requirement? ``` ! Router R1 (connected to AS 65100 - Primary) router bgp 65300 neighbor 198.51.100.1 remote-as 65100 ! ! Router R2 (connected to AS 65200 - Backup) router bgp 65300 neighbor 203.0.113.1 remote-as 65200 ```

Q6

A retail company is migrating its e-commerce application to a hybrid cloud environment. The on-premises data center hosts the product database, while the front-end web servers are deployed in AWS. For PCI compliance, the connection between AWS and the on-premises data center must be private and encrypted, with a minimum bandwidth of 1 Gbps. The business requires a solution that minimizes latency and provides consistent performance. Which connectivity model best satisfies these business and technical requirements?

Q7

A project manager is defining the requirements for a new network deployment. The business stakeholders have specified a Recovery Time Objective (RTO) of 15 minutes and a Recovery Point Objective (RPO) of 1 hour. What do these two metrics imply for the network design?

Q8

When designing a multicast network using PIM-SM (Protocol Independent Multicast - Sparse Mode), what is the primary function of the Rendezvous Point (RP)?

Q9

An architect is designing a QoS policy for a converged enterprise network that carries voice, video, and data traffic. The business requires that voice traffic receive the highest priority to ensure call quality. According to Cisco best practices, which Per-Hop Behavior (PHB) and DSCP value should be assigned to voice bearer traffic (RTP)? ``` ┌──────────┬───────────────────────┬──────────┐ │ Traffic │ Description │ Priority │ ├──────────┼───────────────────────┼──────────┤ │ Voice │ RTP Voice Bearer │ Highest │ │ Video │ Video Conferencing │ High │ │ Data │ Best Effort │ Low │ └──────────┴───────────────────────┴──────────┘ ```

Q10Multiple answers

A network designer is evaluating WAN connectivity options for a new branch office. The project manager has stated that the decision must be based on a Total Cost of Ownership (TCO) analysis over a 3-year period. Which two factors are components of Operational Expenditure (OPEX) in this TCO analysis? (Select TWO)