Topic 5
For which two reasons do you choose L2TPv3 over other technologies for a VPN solution? (Choose two.)
B E
Topic 5
You are redesigning an OSPF network that currently uses RFC 1918 Class A address space to optimize its convergence
time. The entire network consists of point-to-point interfaces between routers. Which reason is the best reason to implement
topology summarization in this network?
D
Topic 5
A large enterprise company is redesigning their WAN infrastructure and has these design requirements:
The Frame Relay WAN infrastructure will be replaced with an MPLS VPN service.
BGP is the PE-CE routing protocol adopted for this scenario.
There are 3000 routes in the routing database of the distribution routers.
All 3000 routes will be advertised from the access routers through the MPLS network.
The service provider that provides this MPLS VPN service supports only 1000 prefixes per VRF.
Which two design solutions ensure that the enterprise access routers reach all devices in this enterprise network? (Choose
two.)
C E
Topic 5
Which two pain points are the most common for container technology adoption? (Choose two.)
B C
Topic 5
An enterprise campus is adopting a network virtualization design solution with these requirements:
It must include the ability to virtualize the data plane and control plane by using VLANs and VRFs.
It must maintain an end-to-end logical path transport separation across the network. Resources available grouped at
the access edge.
In which two primary models can this network virtualization design be categorized? (Choose two.)
B D
Topic 5
Which DCI technology utilizes a flood and learn technique to populate the Layer 2 forwarding table?
C
Topic 5
Which feature must be part of the network design in order for the router to wait a predetermined amount of time before
notifying the routing protocol of a change in the path in the network?
B
Topic 5
A large enterprise network has two data centers and a WAN edge in a hub-and-spoke network topology. The entire network
is in a single OSPF area. Spoke routers are connected to unreliable WAN links. Which two changes must be made to deploy
LSA filtering on the spoke routers? (Choose two.)
C D
Topic 5
Which design consideration of policy-based routing is true?
D
Topic 5
A network designer decides to connect two labs together to test multicast features interoperability. Before the networks are
connected together, the network administrator mentions that overlapping multicast IP addresses between the two labs will
cause issues because all the routers on the network are provisioned for Source-Specific Multicast using IGMPv3. Which
statement about the connectivity of both multicast domains is true?
A