CCDE Interview Questions:
A very large
enterprise customer is migrating from EIGRP to IS-IS .which option is your main
concern to avoid changes in the packets take?
A) The areas sizes
B) The redistribution points
C) The bandwidth and metrics of the
links
D) The number of prefixes
Which option describes benefit of Bridge Assurance?
A) It allows small, unmanaged switches to be plugged into ports of access
switches without the risk of switch loops
B) It makes the port go immediately into the forwarding state after being
connected
C) It does not generate a spanning-tree topology change upon connecting and
disconnecting a station on a port
D) It prevents switched traffic from traversing suboptiomal paths on the
network
E) It prevents switch loops caused by unidirectional point-to-point link
condition on Rapid PVST+ and MST
F) It prevents switch loops by detecting one-way communications on the
physical port
An
network is designed to use OSPF to reach eBGP peers. Which condition should be
avoided in the design to potentially prevent the eBGP peers to flap
continuously in case of link failure?
A) Advertise via a non-backbone OSPF area IP addresses used on eBGP peer
statement.
B) Advertise via eBGP IP addresses used on eBGPpeer statements.
C) Use an ACL to block BGP in one direction.
D) Disable BGP synchronization.
Which
two options are reasons for designing a large OSPF network with multiple areas
connected to the backbone? (Choose two)
A) Reduce the number of routes within an area
B) Route tagging capability
C) Simplify logical topology
D) Enhance failure detection
E) Reduce SPF algorithm runs
Which
statement about DHCPv6 Guard feature design is true?
A) DHPv6 client
requests can be filtered to protect the data plane
B) DHCPv6
client requests can be rate-limited to protect the control plane
C) A
certificate must be installed on the DHCPv6 server and relay agent
D) Rouge DHCPv6
servers cannot assign IPv6 addresses to clients
The
service provider that you work for wants to offer IPv6 internet service to its
customers without upgrading all of its access equipment to support IPv6, which
transition technology do you recommend?
A) NAT64
B) CGN
C) Dual-stack CPE
D) 6RD
A mobile network operator is designing an NGN
backhaul and plans to migrate their legacy SDH and SONET-based transport
network to a packet-based transport network. The NGN network must achieve
similar failover and failback times on the new packet-based network?
A) BPDU
B) E-OAM
C) BFD
D) UDLD
A company wants to prioritize voice traffic at
their network edges and ensure that it has reserved some minimum bandwidth and
treated with priority in the core. Qos is not currently implemented in
the core, but MPLS with RSVP as the signaling protocol is already enabled.
Which three actions do you recommend to optimize voice traffic in the core with
minimal changes? (Choose Three)
A) Create GRE tunnels through the core and configure PBR to forward the
voice traffic into those tunnels
B) Enable LDP throughout the core and configure PHB queueing policies
based on the MPLS EXP flied
C) Perform class-based tunnel selection to forward voice packets
through MPLS tunnels in the core based on DSCP value
D) Configure PHB queueing policies on every core node based DSCP
value
E) Mark the voice traffic at the network edge with a specific DSCP value
You
are implementing a one-to-many multicast solution for a large service provider
network. Which technology offers optimal routing of multicast traffic?
A) PIM sparse mode
B) PIM SSM
C) Anycast RP
D) MSDP
E) Bidirectional PIM.
You
are designing an optical network. Your goal is to ensure that your design
contains the highest degree of resiliency. In which two ways should you
leverage a wavelength-switched optical network solution in your network design?
(Choose two.)
A) a wavelength-switched optical network guarantees restoration based
strictly on the shortest path available
B) a wavelength-switched optical network provides fault tolerance for
single failures only
C) a wavelength-switched optical network takes linear and nonlinear optical
impairment calculation into account
D) a wavelength-switched optical network assigns routing and wavelength
information
E) a wavelength-switched optical network eliminates the need for dispersion
compensating units in a network
You
are designing a WAN network solution with EIGRP based on VPLS. The interface
speed is 10Mb/s, but the access rate of the WAN connection is 256 Kb/s. What
should you include in the network design, in order to avoid potential issues
with EIGRP?
A) Limit EIGRP traffic to the access rate with a policer
B) Tag outbound EIGRP traffic and have the WAN provider add it to the
priority queue
C) Limit traffic to the access rate with interface traffic shaping
D) Set the interface bandwidth to match the access rate
After
a large EIGRP network had automatic summarization enabled throughout, it
started experiencing routing loops. Which action should you take to quickly
resolve the routing loops yet to perform summarization?
A) Redistribute connected routes at major IP networks boundaries
B) Redesign the IP addressing scheme
C) Increase the AD of the automatically summarized routes
D) Replace the automatic summarization with more specific summary routes
Which
two IEEE standards are commonly used at the data link layer for an access
network, in an loT environment? (Choose two)
A) 802.11
B) 802.15.4
C) 802.16
D) 1901.2 NB-PLC
E) 802.22
Which
two components are the responsibility of the customers in a platform as a
Service offering? (Choose two)
A) Applications
B) Infrastructure
connectivity
C) Hardware
D) Data
E) APIs
You
are designing a FabriPath network that connects to a spine-and-leaf topology
using Layer 2 IS-IS as the IGP. The solution should be able to detect changes
in the network topology and calculate loop-free paths to other nodes in the
network that are being used as top-of-rack switches. Which four options are
characteristics of this FabricPath design solution? (Choose four)
A) FabricPath Layer 2 IS-IS uses the standard IS-IS functionality to
populate up to 16 routes for a given destination switch
B) The FabricPath domain should be replaced because it does not run STP
C) The interfaces in a FabricPath network run only the FabricPath Layer 2
IS-IS protocol with FTags disabled
D) Each switch computes its shortest path to every other switch in the
network using the SPF algorithm
E) To use the basic FabricPath functionality, you must configure IS-IS on
every interface between the leaf-and-spine switches
F) The switch operating system uses multiple equal-cost, parallel links
that provide ECMP
G) This path is used for forwarding unicast FabricPath frames
Company
ABC is using an Ethernet virtual circuit as its provider’s DCI solution. A goal
is to reduce the time to detect the link failure. Which protocol accomplishes
this goal?
A) UDLD
B) Spanning tree bridge assurance
C) Link aggregation group
D) Ethernet OAM
When
designing large networks, what is the benefit of route summarization when there
are multiple paths to the same destination?
A) It is a way to discard unwanted routes
B) It is a feature used to load balance traffic across multiple links
C) It is a feature used to prevent routing loops
D) It is used to reduce the EIGRP querying domain to create stability and
faster convergence
What
is a design consideration of policy-based routing?
A) It should be implemented at both ends of a GRE tunnel
B) It can limit the network scalability
C) It decreases failure detection time
D) It can create microloops during network reconvergence
A
multinational enterprise company has many branches in Americas, Europe, and
Asia Pacific with headquarters in London. Branch offices use Ethernet
(bandwidth range from 1 Mb/s to 10 Mb/s) as access technology to connect to the
headquarters and the regional hubs. The company is currently implementing VoIP
and QoS in all their locations, and they are worried about jitter between their
branches and the headquarters. Which options reduces the effect of jitter?
A) Buffering at endpoints
B) Increase the bandwidth of the links
C) WRED
D) Call admission Control
Which
technology allows QoS-marked traffic to be sent over a dedicated link?
A) Policy-based routing
B) Traffic policing
C) Q-in-Q tunneling
D) MPLS
How
should you compensate for jitter on an IP network so it carries real-time VoIP
traffic with acceptable voice transmission quality?
A) Change CODEC from G.729 to G.711
B) Deploy RSVP for dynamic VoIP packet classification
C) Set up VAD to replace gaps on speech with comfort noise
D) Set up a playout buffer to play back the voice stream
You
are creating a scalability solution for a large BGP network with dedicated
route reflectors. These route reflectors are not in the data forwarding path of
the network design. Which method should you recommend to ensure that BGP routes
are advertised from the route reflectors but are not installed to the router
reflector RIB and FIB?
A) Distribute list
B) Outbound route filtering
C) AS path filtering
D) Selective route download
Which
two solutions provide an active/active alternative to spanning tree? (Choose
two)
A) MST
B) RSTP
C) TRILL
D) Shortest Path Bridging
E) Ethernet Ring protection Switching
A hosted service provider is
designing an IPS solution to protect its DMZ segment. The goal is to detect and
prevent anomalous activities and, at the same time the security operations team
visibility into any attempted attacks against the organization. Which IPS
solution should you deploy in the Internet perimeter to accomplish this goal?
A) Deploy IPs as promiscuous mode between the firewall and the servers
B) Deploy IPs as inline mode between the firewall and the servers
C) Deploy IPs as promiscuous mode between the firewall and the internet
gateway
D) Deploy IPs as inline mode between the firewall and the internet
gateway
In
a network design using carrier Ethernet, which three mechanisms can be used to
improve Layer 2 down detection and thereby reduce routing convergence time?
A) Loop free alternative
B) Link-state tracking
C) Ethernet debounce timer
D) Fast Hello
A
service provider hires you to design its new managed CE offering to meet these
requirements
· The CEs cannot run a routing protocol with the PE
· Provide support for IPv6 customer routes
· Scale up to 250,000 CE devices per customer
· Provide low operational management to scale customer growth
· Utilize low-end (inexpensive) routing platforms for CE functionality
Which tunneling technology do you
recommend?
A) LISP
B) Point-to-point GRE
C) FlexVPN
D) DMVPN
Which
option is a critical mechanism to optimize convergence speed when using MPLS
FRR?
A) IGP timers
B) Bandwidth reservation
C) Shared risk link groups
D) Down detection
Which
option is best suited to maintain Layer 3 separation in a multitenant data
center design?
A) VXLAN
B) VRF
C) VDC
D) VLAN
A
service provider wants to use a controller to automate the provisioning of
service function chaining. Which two overlay technologies can be used
with EVPN MP-BGP to create the service chains in the data center? (Choose
two)
A) VXLAN
B) MPLSoGRE
C) MPLS L2VPN
D) Provider Backbone Bridging EVPN
E) 802.1Q
A
company plans to implement route summarization in their network. Which two
statements are benefits to implementing route summarization in the network?
(Choose two)
A) The LSA type changes for OSPF summaries
B) Summary configuration must be consistent at all summary boundaries
C) Specific routes no longer appear in the routing table, so traffic can go
along alternative paths that carry a more specific route
D) A summary route has a composite or user-defined single metric for all
routes that it represents
E) The routing table takes up less memory
F) If a route that is part of a summary flaps, other routers beyond the
summarization point not see a change in the route
You
are designing a GET VPN solution for an existing branch network. The
existing network has the following characteristics:
· 50 remote sites (with an additional 30 remote sites expected over the
next 3 year )
· Connectivity between all sites is via MPLS Layer 3 service from a single
provider
· OSPF is the routing protocol used between provider edge and
customer edge routers
· The customer edge routers will become group members performing the
encryption between sites
Which additional routing protocol, if
any should use for the overplay routing between the group members?
A) RIPv2
B) OSPF (with a different process ID)
C) eBGP
D) EIGRP