What is the function of the aggregation tier in a traditional three tier Layer 2 network environment?
A. The aggregation tier interfaces with lower tier Layer devices and provides a high-speed interconnect with the north-bound WAN edge device.
B. The aggregation tier relays packets between the lower tier Layer 2 devices and functions as the gateway to the upper tier Layer 2 device.
C. The aggregation tier provides network connectivity to end-user devices and other hosts and enforces network access policy.
D. The aggregation tier connects to the Internet and with lower tier Layer 2 devices to provide Layer 3 gateway services for the network.
You are consulting in a network architect role for a multinational corporation. As part of your contract, you have been asked to propose an update to the company’s network design. You have completed the initial design draft.
Which statement describes what you should do next in your project?
A. Begin to plan for a proof-of-concept demonstration to show why your design is superior to the current network.
B. Schedule a time with the board of directors to present the proposed solution.
C. Schedule the first phase of implementation.
D. Share the design with the other network administrators and solicit feedback.
What are three ways to secure a customer’s network that includes several retail stores? (Choose three.)
A. Isolate sensitive data from devices that access the network using security zones.
B. Ensure that the network meets PCI compliance.
C. Use 802.11g to isolate sensitive data from devices that access the network.
D. Secure cashier access from branch locations by requiring BYOD.
E. Provide guest access on a separate VLAN protected by NAC.
Your customer frequently hosts visitors who are not employees of the organization. The visitors typically request Internet access but do not require access to corporate resources. Network security is the customer’s primary concern.
Which solution should you include in your design proposal?
Your customer is a government organization with strict security requirements. They want to expand their Layer 2 infrastructure between multiple buildings within the same campus environment. They also want to ensure that no unauthorized devices are connected between the switches in the different buildings.
Which solution ensures data security in this environment?
A. Use PNAC on all inter-switch connections.
B. Use LLDP on all inter-switch connections.
C. Use LACP on all inter-switch connections.
D. Use MACsec on all inter-switch connections.
You are working on a campus design for a customer who has acquired a building across the street from the main facility. The recently acquired building was built in 1979 and has not been updated to support the demands of current network technologies. The building must support high-speed network connections for all users working at the location.
Which two elements would you consider when analyzing connectivity and throughput requirements for this new location? (Choose two.)
A. the hierarchical modules used within each group at the new location
B. the data received from a traffic analysis
C. the condition of the physical media at the new location
D. the type of business the customer is in
Your customer is experiencing problems with session drops and high response time. You are asked to provide redesign suggestions to minimize these problems. You examine the applications that are supported by your customer’s network to try to identify problem factors.
Which two factors are important from an application-driven network impact perspective? (Choose two.)
A. presence of elephant flows
B. IGP protocols in use
C. use of HTTPS protocols by the application
D. short timers
You are asked to examine the infrastructure requirements needed to provision a new network build in support of a customer who wants to take advantage of their service provider’s MPLS/VPN offering.
Which three considerations would be relevant to this work? (Choose three.)
A. supplicant roles in the current network layout
B. server hypervisor and host OS selection
C. backdoor connectivity requirements
D. IGP protocols deployed in the customer environment
E. site-to-site versus site-to-hub communications