Friday, October 7, 2022

CCDE Interview Questions: Deep Dive learning

 CCDE Interview Questions:

     A very large enterprise customer is migrating from EIGRP to IS-IS .which option is your main concern to avoid changes in the packets take?

A)     The areas sizes

B)     The redistribution points

C)     The bandwidth and metrics of the links

D)     The number of prefixes

   Which option describes benefit of Bridge Assurance?

A)     It allows small, unmanaged switches to be plugged into ports of access switches without the risk of switch loops

B)     It makes the port go immediately into the forwarding state after being connected

C)     It does not generate a spanning-tree topology change upon connecting and disconnecting a station on a port

D)     It prevents switched traffic from traversing suboptiomal paths on the network

E)     It prevents switch loops caused by unidirectional point-to-point link condition on Rapid PVST+ and MST

F)     It prevents switch loops by detecting one-way communications on the physical port

 

An network is designed to use OSPF to reach eBGP peers. Which condition should be avoided in the design to potentially prevent the eBGP peers to flap continuously in case of link failure?

A)     Advertise via a non-backbone OSPF area IP addresses used on eBGP peer statement.

B)     Advertise via eBGP IP addresses used on eBGPpeer statements.

C)     Use an ACL to block BGP in one direction.

D)     Disable BGP synchronization.

 

Which two options are reasons for designing a large OSPF network with multiple areas connected to the backbone? (Choose two)

A)     Reduce the number of routes within an area

B)     Route tagging capability

C)     Simplify logical topology

D)     Enhance failure detection

E)     Reduce SPF algorithm runs

 

Which statement about DHCPv6 Guard feature design is true?

A)     DHPv6 client requests can be filtered to protect the  data plane

B)     DHCPv6 client requests can be rate-limited to protect the control plane

C)     A certificate must be installed on the DHCPv6 server and relay agent

D)     Rouge DHCPv6 servers cannot assign IPv6 addresses to clients

The service provider that you work for wants to offer IPv6 internet service to its customers without upgrading all of its access equipment to support IPv6, which transition technology do you recommend?

A)     NAT64

B)     CGN

C)     Dual-stack CPE

D)     6RD

 

  A mobile network operator is designing an NGN backhaul and plans to migrate their legacy SDH and SONET-based transport network to a packet-based transport network. The NGN network must achieve similar failover and failback times on the new packet-based network?

A)     BPDU

B)     E-OAM

C)     BFD

D)     UDLD

       A company wants to prioritize voice traffic at their network edges and ensure that it has reserved some minimum bandwidth and treated with priority in the core.  Qos is not currently implemented in the core, but MPLS with RSVP as the signaling protocol is already enabled. Which three actions do you recommend to optimize voice traffic in the core with minimal changes? (Choose Three)

A)     Create GRE tunnels through the core and configure PBR to forward the voice traffic into those tunnels

B)     Enable LDP throughout the core and configure PHB queueing  policies based on the MPLS EXP flied

C)     Perform class-based tunnel selection to forward  voice packets through MPLS tunnels in the core based on DSCP value

D)     Configure PHB queueing policies on every core node based DSCP  value

E)     Mark the voice traffic at the network edge with a specific DSCP value

 

You are implementing a one-to-many multicast solution for a large service provider network. Which technology offers optimal routing of multicast traffic?

A)     PIM sparse mode

B)     PIM SSM

C)     Anycast RP

D)     MSDP

E)     Bidirectional PIM.

You are designing an optical network. Your goal is to ensure that your design contains the highest degree of resiliency. In which two ways should you leverage a wavelength-switched optical network solution in your network design? (Choose two.)

A)     a wavelength-switched optical network guarantees restoration based strictly on the shortest path available

B)     a wavelength-switched optical network provides fault tolerance for single failures only

C)     a wavelength-switched optical network takes linear and nonlinear optical impairment calculation into account

D)     a wavelength-switched optical network assigns routing and wavelength information

E)     a wavelength-switched optical network eliminates the need for dispersion compensating units in a network

 

 

You are designing a WAN network solution with EIGRP based on VPLS. The interface speed is 10Mb/s, but the access rate of the WAN connection is 256 Kb/s. What should you include in the network design, in order to avoid potential issues with EIGRP?

A)     Limit EIGRP traffic to the access rate with a policer

B)     Tag outbound EIGRP traffic and have the WAN provider add it to the priority queue

C)     Limit traffic to the access rate with interface traffic shaping

D)     Set the interface bandwidth to match the access rate

 

 

After a large EIGRP network had automatic summarization enabled throughout, it started experiencing routing loops. Which action should you take to quickly resolve the routing loops yet to perform summarization?

A)     Redistribute connected routes at major IP networks boundaries

B)     Redesign the IP addressing scheme

C)     Increase the AD of the automatically summarized routes

D)     Replace the automatic summarization with more specific summary routes

 

Which two IEEE standards are commonly used at the data link layer for an access network, in an loT environment? (Choose two)

A)     802.11

B)     802.15.4

C)     802.16

D)     1901.2 NB-PLC

E)     802.22

 

Which two components are the responsibility of the customers in a platform as a Service offering? (Choose two)

A)     Applications

B)     Infrastructure connectivity

C)     Hardware

D)     Data

E)     APIs

 

 

 

You are designing a FabriPath network that connects to a spine-and-leaf topology using Layer 2 IS-IS as the IGP. The solution should be able to detect changes in the network topology and calculate loop-free paths to other nodes in the network that are being used as top-of-rack switches. Which four options are characteristics of this FabricPath design solution? (Choose four)

A)     FabricPath Layer 2 IS-IS uses the standard IS-IS functionality to populate up to 16 routes for a given destination switch

B)     The FabricPath domain should be replaced because it does not run STP

C)     The interfaces in a FabricPath network run only the FabricPath Layer 2 IS-IS protocol with FTags disabled

D)     Each switch computes its shortest path to every other switch in the network using the SPF algorithm

E)     To use the basic FabricPath functionality, you must configure IS-IS on every interface between the leaf-and-spine switches

F)     The switch operating system uses multiple equal-cost, parallel links that provide ECMP

G)    This path is used for forwarding unicast FabricPath frames

 

Company ABC is using an Ethernet virtual circuit as its provider’s DCI solution. A goal is to reduce the time to detect the link failure. Which protocol accomplishes this goal?

A)     UDLD

B)     Spanning tree bridge assurance

C)     Link aggregation group

D)     Ethernet OAM

 

When designing large networks, what is the benefit of route summarization when there are multiple paths to the same destination?

A)     It is a way to discard unwanted routes

B)     It is a feature used to load balance traffic across multiple links

C)     It is a feature used to prevent routing loops

D)     It is used to reduce the EIGRP querying domain to create stability and faster convergence

 

 

What is a design consideration of policy-based routing?

A)     It should be implemented at both ends of a GRE tunnel

B)     It can limit the network scalability

C)     It decreases failure detection time

D)     It can create microloops during network reconvergence

A multinational enterprise company has many branches in Americas, Europe, and Asia Pacific with headquarters in London. Branch offices use Ethernet (bandwidth range from 1 Mb/s to 10 Mb/s) as access technology to connect to the headquarters and the regional hubs. The company is currently implementing VoIP and QoS in all their locations, and they are worried about jitter between their branches and the headquarters. Which options reduces the effect of jitter?

A)     Buffering at endpoints

B)     Increase the bandwidth of the links

C)     WRED

D)     Call admission Control

 

Which technology allows QoS-marked traffic to be sent over a dedicated link?

A)     Policy-based routing

B)     Traffic policing

C)     Q-in-Q tunneling

D)     MPLS

 

How should you compensate for jitter on an IP network so it carries real-time VoIP traffic with acceptable voice transmission quality?

A)     Change CODEC from G.729 to G.711

B)     Deploy RSVP for dynamic VoIP packet classification

C)     Set up VAD to replace gaps on speech with comfort noise

D)     Set up a playout buffer to play back the voice stream

  

You are creating a scalability solution for a large BGP network with dedicated route reflectors. These route reflectors are not in the data forwarding path of the network design. Which method should you recommend to ensure that BGP routes are advertised from the route reflectors but are not installed to the router reflector RIB and FIB?

A)     Distribute list

B)     Outbound route filtering

C)     AS path filtering

D)     Selective route download

Which two solutions provide an active/active alternative to spanning tree? (Choose two)

A)     MST

B)     RSTP

C)     TRILL

D)     Shortest Path Bridging

E)     Ethernet Ring protection Switching

 A hosted service provider is designing an IPS solution to protect its DMZ segment. The goal is to detect and prevent anomalous activities and, at the same time the security operations team visibility into any attempted attacks against the organization. Which IPS solution should you deploy in the Internet perimeter to accomplish this goal?

 

A)     Deploy IPs as promiscuous mode between the firewall and the servers

B)     Deploy IPs as inline mode between the firewall and the servers

C)     Deploy IPs as promiscuous mode between the firewall and the internet gateway

D)     Deploy IPs as inline mode between the firewall and the internet gateway 

In a network design using carrier Ethernet, which three mechanisms can be used to improve Layer 2 down detection and thereby reduce routing convergence time?

A)     Loop free alternative

B)     Link-state tracking

C)     Ethernet debounce timer

D)     Fast Hello

 

A service provider hires you to design its new managed CE offering to meet these requirements

·         The CEs cannot run a routing protocol with the PE

·         Provide support for IPv6 customer routes

·         Scale up to 250,000 CE devices per customer

·         Provide low operational management to scale customer growth

·         Utilize low-end (inexpensive) routing platforms for CE functionality

Which tunneling technology do you recommend?

A)     LISP

B)     Point-to-point GRE

C)     FlexVPN

D)     DMVPN

 

Which option is a critical mechanism to optimize convergence speed when using MPLS FRR?

A)     IGP timers

B)     Bandwidth reservation

C)     Shared risk link groups

D)     Down detection

 

Which option is best suited to maintain Layer 3 separation in a multitenant data center design?      

A)     VXLAN

B)     VRF

C)     VDC

D)     VLAN

A service provider wants to use a controller to automate the provisioning of service function  chaining. Which two overlay technologies can be used with EVPN MP-BGP to create the service  chains in the data center? (Choose two)

A)     VXLAN

B)     MPLSoGRE

C)     MPLS L2VPN

D)     Provider Backbone Bridging EVPN

E)     802.1Q

 

A company plans to implement route summarization in their network. Which two statements are benefits to implementing route summarization in the network? (Choose two)

A)     The LSA type changes for OSPF summaries

B)     Summary configuration must be consistent at all summary boundaries

C)     Specific routes no longer appear in the routing table, so traffic can go along alternative paths that carry a more specific route

D)     A summary route has a composite or user-defined single metric for all routes that it represents

E)     The routing table takes up less memory

F)     If a route that is part of a summary flaps, other routers beyond the summarization point not see a change in the route

 

You are designing a GET VPN solution  for an existing branch network. The existing network has the following characteristics:

·         50 remote sites (with an additional 30 remote sites expected over the next 3 year )

·         Connectivity between all sites is via MPLS Layer 3 service from a single provider

·         OSPF is the routing protocol used between provider  edge  and customer edge routers

·         The customer edge routers will become group members performing the encryption between sites

Which additional routing protocol, if any should use for the overplay routing between the group members?

A)     RIPv2

B)     OSPF (with a different process ID)

C)     eBGP

D)     EIGRP

 


Clouds & AI Technologies