Which one of these statements is true concerning the data center distribution (aggregation) layer design?
A. With Layer 3 at the aggregation layer, the physical loops in the topology must still be managed by STP.
B. The boundary between Layer 2 and Layer 3 must reside in the multilayer switches, independent of any other devices such as firewalls or content switching devices.
C. A mix of both Layer 2 and Layer 3 access is sometimes the most optimal.
D. In a small data center, the aggregation layer can connect directly to the campus core, exchanging IP routes and MAC address tables.
Correct Answer: C
When designing the threat detection and mitigation portion for the enterprise data center network, which of the following would be the most appropriate solution to consider?
B. ACLs in the core layer
C. Cisco Security MARS
D. Cisco Firewall Services Module
Correct Answer: C
A Cisco Self-Defending Network has been installed, but DoS attacks are still being directed at e- commerce hosts. The connection rate at the Internet firewall was limited, but the problem persists. What more can be done?
A. Move the servers to the DMZ.
B. Install all relevant operating system patches.
C. Block the servers’ TCP traffic at the Internet firewall.
D. Block the servers’ UDP traffic at the Internet firewall.
Correct Answer: B
RST Corporation is planning to upgrade its current network. The chief technology officer has supplied a topology diagram and an IP addressing scheme of the current network during an interview. RST has been growing at about twenty percent per year. It has been difficult to maintain customer support at a satisfactory level. Therefore, the RST board has met with and directed the chief technology officer to look into network improvements. Which two items are most relevant in documenting RST’s business requirements? (Choose two.)
A. existing network topologies
B. network performance requirements
C. the IP addresses assigned by the ISP
D. improved customer support requirements
E. projected growth estimates
Correct Answer: DE
Which two of these best describe the implementation of a WAN Backup design over the Internet? (Choose two.)
A. a best-effort method
B. bandwidth guaranteed based on interface configuration
C. designed as an alternative to a failed WAN connection
D. implemented with a point-to-point logical link using a Layer 2 tunnel
E. requires no ISP coordination or involvement
Correct Answer: AC
Which two design criteria require VLANs in a proposed solution? (Choose two.)
A. the segmenting of collision domains
B. a limited corporate budget
C. the use of multivendor equipment
D. security between departments
E. video streaming on the LAN
F. the segmenting of broadcast domains
Correct Answer: DF
Which two methods are used to enhance VPN performance on Cisco ISRs? (Choose two.)
A. SSL Acceleration Network Module
B. VPN Shared Port Adapter
C. VPN Acceleration Module
D. high-performance VPN encryption AIM
E. VPN Service Adapter
F. built-in hardware-based encryption acceleration
Correct Answer: DF
Which three factors best justify WAN link redundancy between geographically dispersed sites? (Choose three.)
A. high expense of transmitting data
B. important traffic flows
C. excessive packet transmission rate
D. uncertain reliability
E. high link utilization
F. lack of speed
Correct Answer: BDF
Which three pieces of information should be documented for each step of each phase in a design implementation plan? (Choose three.)
A. easy guidelines in case of failure
B. estimated rollback time in case of failure
C. simple implementation guidelines
D. estimated implementation time
E. design document references
F. step description
Correct Answer: DEF
The topology map in the draft design document should cover which two layers of the OSI model? (Choose two.)
B. data link
Correct Answer: EF
Download Latest CCDA 640-864 Real Free Tests , help you to pass exam 100%.