Designing for Cisco Internetwork Solutions v1.0 (200-310)

Page:    1 / 37   
Total 558 questions

Spanning Layer 2 across geographically separate data centers is a key consideration for current data center designs. Which is the name of the NX-OS technology that facilitates MAC in IP transport for Layer 2 VLANs across any IP network?

  • A. Overlay Transport Virtualization
  • B. Virtual Private LAN Services
  • C. Generic Routing Encapsulation
  • D. QinQ tunneling A


Answer : Explanation

Explanation:

Which two statements about designing the Data Center Access layer are correct? (Choose two.)

  • A. Multiport NIC servers should each have their own IP address.
  • B. Layer 3 connectivity should never be used in the access layer.
  • C. Layer 2 connectivity is primarily implemented in the access layer.
  • D. Multiport NIC servers should never be used in the access layer.
  • E. Layer 2 clustering implementation requires servers to be Layer 2 adjacent. CE


Answer : Explanation

Explanation:
User access is primarily layer 2 in nature, layer 2 clustering is possible only in layer 2
Here is the Explanation: from the Cisco press CCDA certification guide
Figure 4-8. Enterprise Data Center Infrastructure Overview




Defining the DC Access Layer -
The data center access layer"™s main purpose is to provide Layer 2 and Layer 3 physical port density for various servers in the data center. In addition, data center access layer switches provide high-performance, low-latency switching and can support a mix of oversubscription requirements. Both Layer 2 and Layer 3 access
(also called routed access) designs are available, but most data center access layers are built using Layer 2 connectivity. The Layer 2 access design uses VLAN trunks upstream, which allows data center aggregation services to be shared across the same VLAN and across multiple switches. Other advantages of Layer 2 access are support for NIC teaming and server clustering that requires network connections to be Layer 2 adjacent or on the same VLAN with one another.
CCDA 640-864 Official Certification Guide Fourth Edition, Chapter 4

What is the primary consideration when choosing a routed network design over a traditional campus network design?

  • A. Layer 3 service support at the network edge
  • B. the routing protocol choice: open (OSPF) or proprietary (EIGRP)
  • C. the routing abilities of the host devices
  • D. the need to control the broadcast domains within the campus core A


Answer : Explanation

Explanation:
Layer 3 ability at network edge should be available to leverage the benefits of routed network design.
Link: http://www.cisco.com/en/US/docs/solutions/Enterprise/Campus/campover.html

When selecting which hardware switches to use throughout an enterprise campus switched network, which consideration is not relevant?

  • A. whether data link layer switching based upon the MAC address is required
  • B. the number of shared media segments
  • C. which infrastructure service capabilities are required
  • D. whether to support Layer 3 services at the network edge B


Answer : Explanation

Explanation:
Shared media are not used in modern networks; all links are operating full-duplex
Link: http://www.cisco.com/en/US/docs/solutions/Enterprise/Campus/campover.html

Which two of these practices are considered to be best practices when designing the access layer for the enterprise campus? (Choose two.)

  • A. Implement all of the services (QoS, security, STP, and so on) in the access layer, offloading the work from the distribution and core layers.
  • B. Always use a Spanning Tree Protocol; preferred is Rapid PVST+.
  • C. Use automatic VLAN pruning to prune unused VLANs from trunked interfaces to avoid broadcast propagation.
  • D. Avoid wasted processing by disabling STP where loops are not possible.
  • E. Use VTP transparent mode to decrease the potential for operational error. BE


Answer : Explanation

Explanation:
When designing the building access layer, you must consider the number of users or ports required to size up the LAN switch. Connectivity speed for each host should also be considered. Hosts might be connected using various technologies such as Fast Ethernet, Gigabit Ethernet, or port channels. The planned VLANs enter into the design.
Performance in the access layer is also important. Redundancy and QoS features should be considered.
The following are recommended best practices for the building access layer:
-> Limit VLANs to a single closet when possible to provide the most deterministic and highly available topology.
-> Use Rapid Per-VLAN Spanning Tree Plus (RPVST+) if STP is required. It provides the faster convergence than traditional 802.1d default timers.
-> Set trunks to ON and ON with no-negotiate.
-> Manually prune unused VLANs to avoid broadcast propagation (commonly done on the distribution switch).
-> Use VLAN Trunking Protocol (VTP) Transparent mode, because there is little need for a common VLAN database in hierarchical networks.
-> Disable trunking on host ports, because it is not necessary. Doing so provides more security and speeds up PortFast.
-> Consider implementing routing in the access layer to provide fast convergence and Layer 3 load balancing.
-> Use the switchport host commands on server and end-user ports to enable PortFast and disable channeling on these ports.
-> Use Cisco STP Toolkit, which provides
-> PortFast: Bypass listening-learning phase for access ports
-> Loop GuarD. Prevents alternate or root port from becoming designated in absence of bridge protocol data units (BPDU)
Root GuarD. Prevents external switches from becoming root


-> BPDU GuarD. Disables PortFast-enabled port if a BPDU is received
Cisco Press CCDA 640-864 Official Certification Guide Fourth Edition, Chapter 3, Page 85

The enterprise campus core layer has requirements that are unique from the distribution and access layers. Which of the following is true about the core layer?

  • A. The core layer provides convergence using Layer 2 and Layer 3 services and features.
  • B. The core layer provides high availability to support the distribution layer connections to the enterprise edge.
  • C. The campus core layer is optional.
  • D. The core layer requires high performance to manage the traffic policing across the backbone. B


Answer : Explanation

Explanation:

Which of these statements is true concerning the data center access layer design?

  • A. The access layer in the data center is typically built at Layer 3, which allows for better sharing of services across multiple servers.
  • B. With Layer 2 access, the default gateway for the servers can be configured at the access or aggregation layer.
  • C. A dual-homing NIC requires a VLAN or trunk between the two access switches to support the dual IP addresses on the two server links to two separate switches.
  • D. The access layer is normally not required, as dual homing is standard from the servers to the aggregation layer. B


Answer : Explanation

Explanation:

Which one of these statements is true concerning the data center distribution (aggregation) layer design?

  • A. With Layer 3 at the aggregation layer, the physical loops in the topology must still be managed by STP.
  • B. The boundary between Layer 2 and Layer 3 must reside in the multilayer switches, independent of any other devices such as firewalls or content switching devices.
  • C. A mix of both Layer 2 and Layer 3 access is sometimes the most optimal.
  • D. In a small data center, the aggregation layer can connect directly to the campus core, exchanging IP routes and MAC address tables. C


Answer : Explanation

Explanation:

DRAG DROP -
Drag the technology on the left to the type of enterprise virtualization where it is most likely to be found on the right.
Select and Place:




Answer :

Explanation:

Here is the correct answer -

Network Virtualization -
* VPC
* VLAN
* VRF

Device Virtualization -
*ASA firewall context
*IPS
*VDC
Explanation:
Network virtualization encompasses logical isolated network segments that share the same physical infrastructure. Each segment operates independently and is logically separate from the other segments. Each network segment appears with its own privacy, security, independent set of policies, QoS levels, and independent routing paths.
Here are some examples of network virtualization technologies:
-> VLAN: Virtual local-area network
-> VSAN: Virtual storage-area network
-> VRF. Virtual routing and forwarding
-> VPN: Virtual private network
-> vPC. Virtual Port Channel
allows for a single physical device to act like multiple copies of itself. Device virtualization enables many logical devices to run independently of each other on the same physical piece of hardware. The software creates virtual hardware that can function just like the physical network device. Another form of device virtualization entails using multiple physical devices to act as one logical unit.
Here are some examples of device virtualization technologies:
-> Server virtualization: Virtual machines (VM)
-> Cisco Application Control Engine (ACE) context
-> Virtual Switching System (VSS)
-> Cisco Adaptive Security Appliance (ASA) firewall context
-> Virtual device contexts (VDC)
Cisco Press CCDA 640-864 Official Certification Guide Fourth Edition, Chapter 4

Refer to the exhibit.



Which statement is true concerning enterprise edge distribution switches?

  • A. The speed of switching is the most critical feature.
  • B. Security requirements are offloaded to the other modules for performance reasons.
  • C. Edge distribution switches are only required when using a collapsed core backbone.
  • D. Enterprise edge distribution switches are similar to the building distribution layer. D


Answer : Explanation

Explanation:

An enterprise campus module is typically made up of four sub modules, as described by the Cisco Enterprise Architecture Model. Which two sub modules are part of this module?

  • A. DMZ
  • B. enterprise branch
  • C. building distribution
  • D. server farm/data center
  • E. MAN CD


Answer : Explanation

Explanation:

Which is a factor in enterprise campus design decisions?

  • A. network application characteristics
  • B. routing protocol characteristics
  • C. switching latency characteristics
  • D. packet filtering characteristics A


Answer : Explanation

Explanation:

Which network virtualization technology involves creating virtual routers with its own individual routing tables on a physical router?

  • A. VSS
  • B. vPC
  • C. VRF
  • D. VLAN C


Answer : Explanation

Explanation:

Which protocol is the recommended first-hop redundancy protocol for an existing infrastructure that contains multiple vendors and platforms?

  • A. HSRP
  • B. VRRP
  • C. IGRP
  • D. OSPF B


Answer : Explanation

Explanation:

Which IGP provides the fastest convergence by default?

  • A. EIGRP
  • B. OSPF
  • C. IS-IS
  • D. RSTP
  • E. BGP A


Answer : Explanation

Explanation:

Page:    1 / 37   
Total 558 questions