Spanning Layer 2 across geographically separate data centers is a key consideration for current data center designs. Which is the name of the NX-OS technology that facilitates MAC in IP transport for Layer 2 VLANs across any IP network?
Answer : Explanation
Explanation:
Which two statements about designing the Data Center Access layer are correct? (Choose two.)
Answer : Explanation
Explanation:
User access is primarily layer 2 in nature, layer 2 clustering is possible only in layer 2
Here is the Explanation: from the Cisco press CCDA certification guide
Figure 4-8. Enterprise Data Center Infrastructure Overview
What is the primary consideration when choosing a routed network design over a traditional campus network design?
Answer : Explanation
Explanation:
Layer 3 ability at network edge should be available to leverage the benefits of routed network design.
Link: http://www.cisco.com/en/US/docs/solutions/Enterprise/Campus/campover.html
When selecting which hardware switches to use throughout an enterprise campus switched network, which consideration is not relevant?
Answer : Explanation
Explanation:
Shared media are not used in modern networks; all links are operating full-duplex
Link: http://www.cisco.com/en/US/docs/solutions/Enterprise/Campus/campover.html
Which two of these practices are considered to be best practices when designing the access layer for the enterprise campus? (Choose two.)
Answer : Explanation
Explanation:
When designing the building access layer, you must consider the number of users or ports required to size up the LAN switch. Connectivity speed for each host should also be considered. Hosts might be connected using various technologies such as Fast Ethernet, Gigabit Ethernet, or port channels. The planned VLANs enter into the design.
Performance in the access layer is also important. Redundancy and QoS features should be considered.
The following are recommended best practices for the building access layer:
-> Limit VLANs to a single closet when possible to provide the most deterministic and highly available topology.
-> Use Rapid Per-VLAN Spanning Tree Plus (RPVST+) if STP is required. It provides the faster convergence than traditional 802.1d default timers.
-> Set trunks to ON and ON with no-negotiate.
-> Manually prune unused VLANs to avoid broadcast propagation (commonly done on the distribution switch).
-> Use VLAN Trunking Protocol (VTP) Transparent mode, because there is little need for a common VLAN database in hierarchical networks.
-> Disable trunking on host ports, because it is not necessary. Doing so provides more security and speeds up PortFast.
-> Consider implementing routing in the access layer to provide fast convergence and Layer 3 load balancing.
-> Use the switchport host commands on server and end-user ports to enable PortFast and disable channeling on these ports.
-> Use Cisco STP Toolkit, which provides
-> PortFast: Bypass listening-learning phase for access ports
-> Loop GuarD. Prevents alternate or root port from becoming designated in absence of bridge protocol data units (BPDU)
Root GuarD. Prevents external switches from becoming root
The enterprise campus core layer has requirements that are unique from the distribution and access layers. Which of the following is true about the core layer?
Answer : Explanation
Explanation:
Which of these statements is true concerning the data center access layer design?
Answer : Explanation
Explanation:
Which one of these statements is true concerning the data center distribution (aggregation) layer design?
Answer : Explanation
Explanation:
DRAG DROP -
Drag the technology on the left to the type of enterprise virtualization where it is most likely to be found on the right.
Select and Place:
Answer :
Explanation:
Here is the correct answer -
Network Virtualization -
* VPC
* VLAN
* VRF
Device Virtualization -
*ASA firewall context
*IPS
*VDC
Explanation:
Network virtualization encompasses logical isolated network segments that share the same physical infrastructure. Each segment operates independently and is logically separate from the other segments. Each network segment appears with its own privacy, security, independent set of policies, QoS levels, and independent routing paths.
Here are some examples of network virtualization technologies:
-> VLAN: Virtual local-area network
-> VSAN: Virtual storage-area network
-> VRF. Virtual routing and forwarding
-> VPN: Virtual private network
-> vPC. Virtual Port Channel
allows for a single physical device to act like multiple copies of itself. Device virtualization enables many logical devices to run independently of each other on the same physical piece of hardware. The software creates virtual hardware that can function just like the physical network device. Another form of device virtualization entails using multiple physical devices to act as one logical unit.
Here are some examples of device virtualization technologies:
-> Server virtualization: Virtual machines (VM)
-> Cisco Application Control Engine (ACE) context
-> Virtual Switching System (VSS)
-> Cisco Adaptive Security Appliance (ASA) firewall context
-> Virtual device contexts (VDC)
Cisco Press CCDA 640-864 Official Certification Guide Fourth Edition, Chapter 4
Refer to the exhibit.
Answer : Explanation
Explanation:
An enterprise campus module is typically made up of four sub modules, as described by the Cisco Enterprise Architecture Model. Which two sub modules are part of this module?
Answer : Explanation
Explanation:
Which is a factor in enterprise campus design decisions?
Answer : Explanation
Explanation:
Which network virtualization technology involves creating virtual routers with its own individual routing tables on a physical router?
Answer : Explanation
Explanation:
Which protocol is the recommended first-hop redundancy protocol for an existing infrastructure that contains multiple vendors and platforms?
Answer : Explanation
Explanation: