62 Practice Questions & Answers
In a multi-site enterprise network, which routing protocol is most suitable for distributing routes across multiple autonomous systems while maintaining BGP path attributes and community tags?
-
A
OSPF with MPLS traffic engineering
-
B
IS-IS with multi-topology extensions
-
C
RIPv2 with route summarization
-
D
BGP with extended communities and route reflectors
✓ Correct
Explanation
BGP with extended communities allows enterprises to tag and distribute routes across multiple AS domains while maintaining complex policies. Route reflectors enable scalable BGP deployments in large networks.
What is the primary advantage of implementing VXLAN over traditional VLAN technology in data center infrastructure?
-
A
Support for up to 16 million virtual networks using 24-bit VXLAN Network Identifier
✓ Correct
-
B
Elimination of the spanning tree protocol entirely
-
C
Direct replacement of Layer 3 routing
-
D
Increased bandwidth utilization on trunk ports
Explanation
VXLAN uses a 24-bit identifier allowing 16 million virtual networks compared to VLAN's 12-bit limit of 4094 networks, enabling massive scale in data centers.
An enterprise implements QoS using MPLS DiffServ-TE. Which of the following best describes how traffic classes are mapped in this architecture?
-
A
Traffic is classified at ingress, DSCP marked, and EXP bits set at label imposition based on LSP Class of Service
✓ Correct
-
B
Only IP Precedence can be used; DSCP is incompatible with MPLS
-
C
EXP bits take precedence and override any IP layer markings during transit
-
D
DSCP values are directly translated to EXP bits in the MPLS label stack
Explanation
In DiffServ-TE, traffic is classified and marked with DSCP at the edge, then EXP bits in the MPLS label are set according to the LSP's Class of Service definition at label imposition.
Which statement correctly describes the relationship between EIGRP feasible distance and advertised distance?
-
A
Feasible distance determines if a route qualifies as a successor
-
B
Advertised distance is the metric reported by a neighbor; feasible distance is the best metric through that neighbor including the local link cost
✓ Correct
-
C
Feasible distance is always equal to advertised distance from the neighbor
-
D
Advertised distance is only used for equal-cost load balancing decisions
Explanation
In EIGRP, advertised distance (reported metric) is the cost from the neighbor to the destination. Feasible distance includes the neighbor's advertised distance plus the local link cost to that neighbor.
An enterprise deploys BGP with MPLS for VPN services. What is the primary purpose of using Route Distinguishers (RDs) in BGPv4 VPN implementations?
-
A
To uniquely identify VPN routes and allow overlapping address spaces across different customers
✓ Correct
-
B
To encrypt VPN traffic at the provider edge routers
-
C
To establish encryption keys between customer sites
-
D
To reduce the number of BGP advertisements required
Explanation
RDs prepend a unique identifier to customer routes, creating VPN-IPv4 addresses that allow the same subnet to exist in multiple VPNs without route collisions.
In implementing a redundant WAN architecture using MPLS TE Fast Reroute (FRR), what is the role of a Point of Local Repair (PLR)?
-
A
PLR performs backup label switching when primary tunnel fails, creating loop-free alternative paths
✓ Correct
-
B
PLR manages customer VPN routing tables
-
C
PLR monitors tunnel health and initiates reoptimization
-
D
PLR is the destination router that receives rerouted traffic
Explanation
The PLR (typically an upstream router) detects primary LSP failure and immediately switches traffic to pre-computed backup LSPs, providing sub-50ms convergence without involving the head-end router.
An enterprise network experiences suboptimal BGP path selection. Which of the following is the correct order of BGP best path selection criteria?
-
A
Weight, Local Preference, AS Path length, Origin, MED, IGP cost, Router ID
✓ Correct
-
B
Weight, Local Preference, EBGP over IBGP, AS Path length, Origin, MED, IGP cost
-
C
AS Path length, MED, Local Preference, Weight, Origin, IGP cost, Router ID
-
D
Local Preference, Weight, AS Path length, MED, Origin, IGP cost, EBGP over IBGP
Explanation
BGP uses this precise order: Weight (Cisco proprietary), Local Preference, originated locally vs. learned, AS Path length, Origin, MED, IGP cost to next hop, then Router ID for tiebreaker.
Which IPv6 transition mechanism allows enterprises to run IPv6 over existing IPv4 infrastructure without requiring native IPv6 connectivity on intermediate networks?
-
A
NAT64 translation
-
B
Dual-stack deployment
-
C
DHCPv6 Prefix Delegation
-
D
6to4 automatic tunneling
✓ Correct
Explanation
6to4 encapsulates IPv6 packets within IPv4 packets for transmission across IPv4-only networks, using the IPv4 address embedded in the IPv6 address for automatic tunnel endpoint discovery.
In a highly available network design, what is the primary function of an Automatic Route Optimization (ARO) protocol in conjunction with Equal Cost Multi-Path (ECMP)?
-
A
To ensure all traffic uses the shortest path only
-
B
To prevent routing loops by limiting hop count
-
C
To dynamically adjust link weights and redistribute traffic across equal-cost paths based on real-time congestion
✓ Correct
-
D
To authenticate routing updates between neighbors
Explanation
ARO mechanisms monitor link utilization and dynamically adjust metrics to balance traffic across ECMP paths, preventing congestion on any single link while utilizing available bandwidth efficiently.
An organization implements OSPF in a large network with multiple areas. Which statement about OSPF area types is correct?
-
A
Backbone area can only connect directly to stub areas
-
B
NSSA areas allow redistribution of external routes while limiting type 5 LSA propagation by using type 7 LSAs
✓ Correct
-
C
Stub areas block external routes using type 5 LSAs and external summary routes via type 3 LSAs
-
D
Totally stubby areas originate default routes and prevent flooding of type 5 and selected type 3 LSAs
Explanation
NSSA (Not-So-Stubby Area) allows external route redistribution while maintaining stub area benefits. External routes are advertised as type 7 LSAs within the NSSA and converted to type 5 at the NSSA border.
What is the correct behavior when a BGP speaker receives an UPDATE message with the AS_Path containing its own AS number?
-
A
The route is silently discarded to prevent routing loops, regardless of the EBGP or IBGP session type
✓ Correct
-
B
The route is accepted but marked as ineligible for announcement to external peers
-
C
The route is accepted and used for load balancing calculations
-
D
The route is rejected only if received via EBGP
Explanation
BGP's loop prevention mechanism rejects any route containing the local AS in its AS_Path, preventing accidental routing loops regardless of session type.
In implementing Segment Routing (SR), how does a router determine the next hop for a packet carrying an SR label?
-
A
It performs a lookup in the routing table using the packet's destination IP address
-
B
It consults the BGP table to find segment routes
-
C
It relies on the packet's QoS markings to determine forwarding
-
D
It performs a lookup in the Segment ID (SID) index to determine the next hop based on the label value
✓ Correct
Explanation
In Segment Routing, each label value corresponds to a Segment ID (SID) that maps to a specific topological node or service. Routers use the SID value directly to determine the next hop without maintaining state for each flow.
An enterprise network uses PIM Sparse Mode for multicast distribution. What is the purpose of a Rendezvous Point (RP) in this topology?
-
A
To forward all multicast traffic at line rate to all interfaces
-
B
To provide encryption for multicast streams
-
C
To store multicast source addresses temporarily
-
D
To serve as the meeting point where sources register and receivers join, establishing the multicast tree
✓ Correct
Explanation
In PIM-SM, the RP is the central point where sources send register messages and receivers send joins. It builds the shared tree until an optimal SPT is established.
Which access control mechanism provides the most granular control for enforcing security policies in a modern enterprise network infrastructure?
-
A
Port-based access control lists only
-
B
IP-based routing policies
-
C
MAC address filtering
-
D
Role-based access control with application-aware policy engines and context-driven decisions
✓ Correct
Explanation
Role-based and context-aware access control allows policies based on user identity, device posture, application type, and threat levels, providing significantly more control than traditional network-based methods.
In a Cisco SD-WAN deployment, what is the primary function of the vSmart controller?
-
A
To provide web-based management interface for end users
-
B
To authenticate vEdge devices during initial bootstrap
-
C
To aggregate WAN telemetry and apply centralized routing policies across the overlay network
✓ Correct
-
D
To encrypt user data traffic at the source edge device
Explanation
The vSmart controller distributes centralized network policies and routing information to vEdge devices, enabling dynamic routing decisions based on application performance and WAN link conditions.
An enterprise implements NetFlow v9 for network monitoring. Which of the following best describes the advantage of flexible NetFlow v9 over NetFlow v5?
-
A
NetFlow v9 eliminates the need for flow statistics altogether
-
B
NetFlow v9 increases flow export overhead due to additional packet headers
-
C
NetFlow v9 uses template-based records allowing customizable fields and support for IPv6, MPLS, and BGP community values
✓ Correct
-
D
NetFlow v9 supports only IPv4 traffic analysis
Explanation
NetFlow v9's template-based architecture allows operators to export only relevant fields and support emerging protocols like IPv6 and MPLS, providing flexibility that fixed v5 records cannot match.
In implementing a highly secure enterprise network, what is the primary security advantage of deploying a Zero Trust Architecture model compared to traditional perimeter-based security?
-
A
Complete elimination of firewalls from the network
-
B
Automatic encryption of all traffic without policy management
-
C
Continuous verification of every device, user, and request regardless of network location, preventing lateral movement by authenticated insiders
✓ Correct
-
D
Simplified network design with fewer security zones
Explanation
Zero Trust assumes breach and verifies every access request through identity, device posture, and behavior analysis. This prevents lateral movement even if an insider or compromised account attempts unauthorized access.
Which statement correctly describes the operation of HSRP (Hot Standby Routing Protocol) in a redundant gateway scenario?
-
A
Both active and standby routers share the same MAC address and forward traffic simultaneously
-
B
HSRP requires manual failover intervention from network administrators
-
C
The active router uses a virtual IP and MAC address; the standby takes over if the active fails, verified through hello messages sent every 3 seconds
✓ Correct
-
D
The standby router discards all traffic destined for the virtual gateway address
Explanation
HSRP creates a virtual gateway with a shared MAC address. The active router owns and responds to this address. If hellos are missed within the hold timer (default 10 seconds), the standby assumes the virtual IP.
In a large-scale OSPF deployment with multiple areas, which of the following correctly describes the purpose and function of an Area Border Router (ABR)?
-
A
ABR is optional and only needed when areas exceed 100 routers
-
B
ABR connects area 0 to other areas, summarizes routes between areas using type 3 LSAs, and maintains full topology of only connected areas
✓ Correct
-
C
ABR prevents all external routes from entering its area
-
D
ABR exchanges detailed LSAs with all other ABRs in the network
Explanation
ABRs must attach to the backbone (area 0), maintain separate topology databases for each connected area, and generate summary type 3 LSAs to advertise routes between areas while filtering detailed topology information.
What is the primary operational difference between using LDP (Label Distribution Protocol) and RSVP-TE for MPLS label establishment in an enterprise network?
-
A
LDP is used only for VPN services; RSVP-TE is for general traffic
-
B
RSVP-TE is simpler and requires less configuration than LDP
-
C
LDP discovers paths dynamically and distributes labels based on routing table; RSVP-TE allows explicit path control with bandwidth reservations and traffic engineering
✓ Correct
-
D
LDP supports IPv6 while RSVP-TE does not
Explanation
LDP automatically follows IGP routing and distributes labels to all destinations. RSVP-TE allows explicit path definition, bandwidth reservation, and fast reroute capabilities essential for traffic engineering.
An organization implements redundant WAN links with a backup satellite connection. Which dynamic routing protocol behavior would be most appropriate for failover scenarios?
-
A
Load balancing equally across all links regardless of cost or latency characteristics
-
B
Static routing only to eliminate protocol overhead
-
C
Disabling all IGP updates on backup links to prevent unnecessary convergence
-
D
Using higher administrative distance on the backup link to prefer primary paths, with automatic failover when primary becomes unavailable
✓ Correct
Explanation
Using higher administrative distance on backup links ensures they are used only when primary paths fail. IGP convergence detects failures and automatically shifts traffic without manual intervention.
In implementing Cisco ACI (Application Centric Infrastructure), how does the policy model differ from traditional network configuration approaches?
-
A
ACI defines network behavior through application-centric policies (EPGs, contracts) rather than per-device configurations, enabling dynamic microsegmentation
✓ Correct
-
B
ACI eliminates the need for any network configuration
-
C
ACI still uses VLAN-based segmentation exclusively
-
D
ACI only works with overlay networks and cannot use underlay
Explanation
ACI's policy-based architecture defines communication through Application Policy Infrastructure Groups (EPGs) and contracts specifying allowed traffic flows, automatically implementing rules across the fabric infrastructure.
Which statement accurately describes the operation of BFD (Bidirectional Forwarding Detection) in rapid failure detection scenarios?
-
A
BFD can only detect failures when running alongside BGP
-
B
BFD is a lightweight protocol providing subsecond link failure detection independent of routing protocols, requiring separate configuration and timers
✓ Correct
-
C
BFD is a replacement for all routing protocol hello mechanisms
-
D
BFD eliminates the need for hello packets in OSPF
Explanation
BFD operates independently at Layer 2-3, detecting failures in milliseconds through echo mechanisms and timers separate from routing protocols. It can work with any routing protocol or circuit-based system.
In a complex enterprise WAN with multiple MPLS VPN sites, what is the primary function of a Route Target (RT) extended community in BGPv4?
-
A
To replace the need for Route Distinguishers
-
B
To define which VPN routes are imported into a specific customer VRF
✓ Correct
-
C
To encrypt traffic between VPN sites
-
D
To control bandwidth allocation per VPN
Explanation
RTs act as import/export filters on PE routers. VPN routes are tagged with export RTs at one PE; other PEs selectively import routes matching their configured import RTs, enabling flexible VPN connectivity patterns.
An enterprise network must prioritize critical application traffic during congestion. Which QoS mechanism provides the most effective control in this scenario?
-
A
Implement traffic policing and strict priority queuing for critical applications with dedicated bandwidth allocation
✓ Correct
-
B
Disable QoS entirely to avoid processing overhead
-
C
Mark all traffic with the same DSCP value
-
D
Drop random frames when buffer reaches threshold
Explanation
Combining policing (rate limiting non-critical traffic) with strict priority queuing ensures critical applications get immediate service. Dedicated bandwidth guarantees prevent starvation of important flows.
What is the correct behavior of a BGP route reflector when it receives an UPDATE message from a client peer?
-
A
The route is reflected to non-originating clients and non-clients, with local AS prepended
-
B
The route is advertised only to other client peers of the same route reflector
-
C
The route is discarded to prevent routing loops
-
D
The route is reflected to all clients except the originating client, and to all non-client peers
✓ Correct
Explanation
Route reflectors forward routes from client peers to all other clients (except originating) and to non-client peers, reducing the full-mesh IBGP requirement while preventing loops through originator tracking.
Which routing protocol is most suitable for a large enterprise network with multiple autonomous systems and requires the most control over path selection?
-
A
Intermediate System-to-Intermediate System (IS-IS)
-
B
Border Gateway Protocol (BGP)
✓ Correct
-
C
OSPF
-
D
Routing Information Protocol (RIPv2)
Explanation
BGP is the exterior gateway protocol designed for inter-autonomous system routing and provides superior control over path selection through attributes like AS-PATH and LOCAL-PREFERENCE, making it ideal for large enterprise networks with complex routing policies.
What is the primary advantage of implementing Virtual Routing and Forwarding (VRF) in an enterprise network?
-
A
VRF automatically compresses all routing protocols into a single unified protocol
-
B
VRF allows multiple independent routing instances on a single physical router, enabling network segmentation and multi-tenancy
✓ Correct
-
C
VRF eliminates the need for access control lists entirely
-
D
VRF reduces the memory consumption of routing tables by 50%
Explanation
VRF (Virtual Routing and Forwarding) enables the creation of multiple isolated routing instances on a single physical router, which is essential for network segmentation, multi-tenancy scenarios, and service provider deployments without requiring separate hardware.
In a multi-site enterprise network using MPLS, which component is responsible for assigning and distributing label mappings between routers?
-
A
Frame Relay Label Switching Protocol
-
B
Border Gateway Protocol extensions with label fields
-
C
Open Shortest Path First label management extensions
-
D
Label Distribution Protocol (LDP) or targeted LDP sessions
✓ Correct
Explanation
LDP is the standard protocol used in MPLS networks to dynamically assign and distribute labels between LSRs (Label Switching Routers), enabling hop-by-hop forwarding along label-switched paths.
Which QoS queuing mechanism provides the most granular control over bandwidth allocation and is recommended for voice, video, and data convergence scenarios?
-
A
Priority Queuing (PQ)
-
B
Round-Robin scheduling
-
C
First-In-First-Out (FIFO) queuing
-
D
Class-Based Weighted Fair Queuing (CBWFQ) with Low Latency Queuing (LLQ)
✓ Correct
Explanation
CBWFQ with LLQ provides the most control by allocating guaranteed bandwidth to traffic classes while allowing strict priority for critical flows like VoIP, making it ideal for converged networks running voice, video, and data simultaneously.
What is the correct order of steps when implementing a new VLAN in a switched enterprise network?
-
A
Create VLAN → assign switch ports → configure VLAN interface IP → enable routing between VLANs
✓ Correct
-
B
Enable routing between VLANs → create VLAN → configure VLAN interface IP → assign switch ports
-
C
Configure VLAN interface IP → create VLAN → enable routing between VLANs → assign switch ports
-
D
Assign switch ports → create VLAN → enable routing between VLANs → configure VLAN interface IP
Explanation
The correct implementation sequence involves creating the VLAN definition first, assigning the appropriate switch ports to that VLAN, configuring the logical VLAN interface with an IP address, and finally enabling inter-VLAN routing through a Layer 3 device.
In a Cisco enterprise network using Spanning Tree Protocol (STP), what is the primary function of Bridge Protocol Data Units (BPDUs)?
-
A
BPDUs are used to elect the root bridge and calculate the lowest-cost path to it, preventing switching loops
✓ Correct
-
B
BPDUs manage VLAN membership across trunk ports
-
C
BPDUs carry application-level data across the network
-
D
BPDUs authenticate switches during network initialization
Explanation
BPDUs are control frames used by STP to elect a root bridge and determine the lowest-cost spanning tree topology, ensuring loop-free switching by blocking redundant paths while maintaining connectivity.
Which High Availability feature allows a primary and secondary router to share a virtual IP address for transparent failover in an enterprise environment?
-
A
Both HSRP and VRRP accomplish this equally well in all scenarios
✓ Correct
-
B
Hot Standby Routing Protocol (HSRP)
-
C
Gateway Load Balancing Protocol (GLBP)
-
D
Virtual Router Redundancy Protocol (VRRP)
Explanation
Both HSRP (Cisco proprietary) and VRRP (standards-based) provide transparent failover using a virtual IP address shared between redundant routers. HSRP is Cisco-specific while VRRP works across multiple vendors, but both achieve the same transparent failover functionality.
What is the primary difference between a managed and unmanaged switch in terms of enterprise network infrastructure?
-
A
Managed switches cost significantly less than unmanaged switches
-
B
Managed switches can only operate at Layer 2, while unmanaged switches support Layer 3 routing
-
C
Unmanaged switches provide better performance for large-scale deployments
-
D
Managed switches support VLAN configuration, STP control, port security, and monitoring capabilities, while unmanaged switches simply forward frames
✓ Correct
Explanation
Managed switches provide configuration options for VLANs, STP, QoS, port security, and SNMP monitoring—essential for enterprise networks—whereas unmanaged switches operate as simple plug-and-play forwarding devices without any administrative control.
In implementing a network access control solution, which technology allows devices to be automatically quarantined if they do not meet security compliance requirements?
-
A
Simple Network Management Protocol (SNMP) traps
-
B
Dynamic VLAN assignment with network admission control
✓ Correct
-
C
Port security with MAC address limits
-
D
Posture Assessment
Explanation
Dynamic VLAN assignment combined with Network Admission Control (NAC) evaluates device posture, and if non-compliant, automatically assigns devices to a remediation VLAN where they cannot access production resources until compliance is achieved.
Which encryption protocol is recommended for securing management traffic on enterprise network devices?
-
A
HTTP with SSL certificates
-
B
Telnet with password protection
-
C
Secure Shell (SSH) with strong cryptographic algorithms
✓ Correct
-
D
Simple Network Management Protocol version 1
Explanation
SSH provides encrypted management access with strong cryptographic authentication, replacing insecure protocols like Telnet. It should be configured with strong algorithms (SSH version 2, not version 1) for securing administrative access to routers, switches, and servers.
What is the primary purpose of implementing Network Address Translation (NAT) in a corporate network with multiple office locations?
-
A
NAT increases network performance by 200% across all WAN links
-
B
NAT eliminates the need for routing protocols entirely
-
C
NAT conserves public IP address space and provides a layer of security by hiding internal IP addresses from external networks
✓ Correct
-
D
NAT automatically encrypts all network traffic traversing the border
Explanation
NAT conserves limited public IP address space by allowing multiple internal devices to share public addresses, and provides security obscurity by hiding internal network topology from external observers.
In a large datacenter environment, which switching architecture best minimizes latency and maximizes throughput for east-west traffic?
-
A
Traditional three-tier hierarchical architecture with access, distribution, and core layers
-
B
Spine-and-leaf (or Clos) architecture with equal path lengths between any two endpoints
✓ Correct
-
C
Ring-based topology with redundant rings for high availability
-
D
Star topology with all devices connected to a central switch
Explanation
Spine-and-leaf architecture provides equal path lengths, consistent latency, and nearly full mesh connectivity for east-west traffic, making it ideal for modern datacenters with high server-to-server communication and containerized applications.
What does the term 'convergence' refer to in routing protocol contexts?
-
A
The process of reducing bandwidth consumption on WAN links
-
B
The time required for all routers in a network to reach agreement on optimal paths after a topology change
✓ Correct
-
C
The encryption of routing advertisements sent between routers
-
D
The automatic merging of multiple routing protocols into a single unified protocol
Explanation
Convergence is the critical time period during which all routers in a network update their routing tables following a topology change (link failure, router addition, etc.). Faster convergence means quicker recovery from failures and is a key metric for routing protocol efficiency.
Which Enterprise Infrastructure component is responsible for maintaining time synchronization across all network devices and servers?
-
A
Simple Network Management Protocol (SNMP)
-
B
Domain Name System (DNS)
-
C
Dynamic Host Configuration Protocol (DHCP)
-
D
Network Time Protocol (NTP) or Precision Time Protocol (PTP)
✓ Correct
Explanation
NTP and PTP are protocols designed to synchronize system clocks across network devices with high accuracy, essential for logging, security auditing, Kerberos authentication, and cluster operations in enterprise environments.
In a disaster recovery scenario, what is the primary difference between RPO and RTO?
-
A
RPO is the maximum acceptable data loss; RTO is the maximum acceptable downtime before service restoration
✓ Correct
-
B
RTO is measured in gigabytes; RPO is measured in milliseconds
-
C
RPO and RTO are identical metrics used interchangeably
-
D
RPO measures network bandwidth; RTO measures latency
Explanation
Recovery Point Objective (RPO) defines how much data loss is acceptable (e.g., last 4 hours), while Recovery Time Objective (RTO) defines how quickly service must be restored (e.g., 2 hours). Both are critical for business continuity planning.
Which protocol allows enterprise administrators to remotely manage network devices with encrypted credentials and command execution?
-
A
Simple Network Management Protocol version 3 (SNMPv3)
✓ Correct
-
B
Address Resolution Protocol (ARP)
-
C
Simple Network Management Protocol version 2 (SNMPv2c)
-
D
Network Time Protocol (NTP)
Explanation
SNMPv3 provides encrypted management with strong authentication and privacy features, allowing secure remote monitoring and configuration of network devices. SNMPv2c uses only community strings which lack encryption, making SNMPv3 the secure choice.
What is the primary function of implementing IP Source Guard in an enterprise network environment?
-
A
IP Source Guard encrypts all IP traffic at the network layer
-
B
IP Source Guard prevents DHCP spoofing and IP spoofing attacks by validating the source IP and MAC address bindings against DHCP snooping database entries
✓ Correct
-
C
IP Source Guard fragments oversized packets to prevent transmission errors
-
D
IP Source Guard automatically compresses IP packet headers to reduce bandwidth consumption
Explanation
IP Source Guard leverages DHCP snooping to maintain a database of valid IP-to-MAC bindings, then blocks traffic from invalid sources, effectively preventing DHCP starvation attacks, IP spoofing, and man-in-the-middle attacks on switched networks.
In implementing Multicast in an enterprise network, which protocol is used for multicast group membership management?
-
A
Multicast Listener Discovery (MLD)
-
B
Protocol Independent Multicast (PIM)
-
C
Both IGMP for IPv4 and MLD for IPv6 environments
✓ Correct
-
D
Internet Group Management Protocol (IGMP)
Explanation
IGMP manages multicast group membership for IPv4 hosts, while MLD serves the same function for IPv6. PIM is a routing protocol that determines how multicast traffic is forwarded. Both membership protocols are essential for multicast operation in their respective IP versions.
Which WAN optimization technology reduces bandwidth consumption by identifying and eliminating redundant data transmission?
-
A
Quality of Service (QoS) traffic prioritization
-
B
Data Deduplication with intelligent caching
✓ Correct
-
C
Multiprotocol Label Switching (MPLS)
-
D
Virtual Private Network (VPN) encryption
Explanation
Data deduplication and intelligent caching reduce WAN bandwidth by storing frequently transmitted data locally and sending only changed portions (delta sync), significantly reducing bandwidth for backup, file transfer, and application traffic across expensive WAN links.
What is the primary security risk associated with implementing Point-to-Point Protocol (PPP) authentication without additional encryption mechanisms?
-
A
PPP reduces network throughput by 75% due to authentication overhead
-
B
PPP causes excessive packet fragmentation across WAN links
-
C
PPP authentication credentials can be captured via protocol analyzers; additional encryption like IPSEC should be implemented
✓ Correct
-
D
PPP automatically disables all routing protocols
Explanation
While PPP authentication (PAP/CHAP) validates endpoints, it does not encrypt credentials or data. PPP should always be combined with IPsec or other encryption to protect authentication credentials from packet capture attacks and to ensure confidentiality of transmitted data.
In a multi-area OSPF enterprise network, which router type is responsible for connecting different OSPF areas?
-
A
Backbone router
-
B
Autonomous System Border Router (ASBR)
-
C
Internal router
-
D
Area Border Router (ABR)
✓ Correct
Explanation
Area Border Routers (ABRs) connect different OSPF areas and maintain databases for each area, summarizing routes between areas. ASBRs connect to external routing domains. ABRs are essential for hierarchical OSPF deployments in large enterprise networks.
Which command-line interface feature allows network administrators to verify the correctness of configuration changes before committing them in Cisco IOS XE devices?
-
A
Configuration preview with syntax validation only
-
B
Dry-run mode that simulates configuration changes without applying them
-
C
Commit confirmed with automatic rollback on timeout if not re-confirmed
✓ Correct
-
D
Configuration rollback with atomic transactions
Explanation
Commit confirmed is a transaction-based feature in IOS XE that allows administrators to apply changes with an automatic rollback timer. If the change breaks connectivity or causes issues, the configuration automatically reverts unless explicitly confirmed, preventing accidental outages.
What is the primary advantage of implementing Software-Defined Wide Area Network (SD-WAN) in an enterprise with multiple branch offices?
-
A
SD-WAN automatically encrypts all traffic without requiring additional security appliances
-
B
SD-WAN guarantees zero packet loss across all network links
-
C
SD-WAN provides centralized control, improved application performance, and reduces WAN costs by using multiple transport types including broadband and 4G/LTE intelligently
✓ Correct
-
D
SD-WAN eliminates the need for routing protocols entirely
Explanation
SD-WAN uses centralized controllers to manage branch connectivity, intelligently directing traffic across multiple WAN transports (MPLS, broadband, 4G), improving application performance while reducing reliance on expensive MPLS circuits and improving cost-efficiency for enterprises.
In implementing a network monitoring solution, which metric indicates the percentage of network packets successfully transmitted from source to destination?
-
A
Jitter variation in packet arrival times
-
B
Latency measurement in milliseconds
-
C
Packet loss rate or packet delivery ratio
✓ Correct
-
D
Bandwidth utilization percentage
Explanation
Packet loss rate (or conversely, packet delivery ratio) measures the percentage of packets successfully reaching their destination. High packet loss indicates network issues, congestion, or quality problems and is critical for monitoring application performance.
Which protocol-independent mechanism ensures that all router interfaces within a network segment are synchronized to the same clock reference for precise timestamp generation?
-
A
Border Gateway Protocol timestamp extensions
-
B
Network Time Protocol with stratum-based hierarchy
✓ Correct
-
C
Simple Network Management Protocol synchronization
-
D
Kerberos time server coordination
Explanation
NTP uses a stratum hierarchy to synchronize all network devices to accurate time sources, with stratum 1 servers (atomic clocks) feeding stratum 2 and lower. This ensures consistent timestamps across the enterprise for logging, security, and cluster operations.
What is the correct approach to implement end-to-end encryption for email traffic in an enterprise environment while maintaining centralized security controls?
-
A
Disable encryption and rely on network perimeter security only
-
B
Implement opportunistic TLS encryption between mail servers without certificate validation
-
C
Use insecure SMTP with password-based authentication
-
D
Implement mandatory TLS with certificate pinning and manage trusted CA certificates centrally through infrastructure
✓ Correct
Explanation
Mandatory TLS with centrally managed certificate validation ensures email is encrypted in transit while allowing IT to maintain security policies. This prevents man-in-the-middle attacks and ensures compliance, unlike opportunistic TLS which lacks validation or perimeter-only approaches.
When implementing a multi-site enterprise network, which routing protocol is most suitable for managing BGP communities across interconnected data centers with different administrative domains?
-
A
IS-IS with level-2 domain routing only
-
B
BGP with community-based path selection and route tagging
✓ Correct
-
C
RIP version 2 with extended metrics
-
D
OSPF with route filtering
Explanation
BGP communities provide flexible, scalable mechanisms for policy-based routing across multiple autonomous systems and administrative domains, making them ideal for multi-site enterprise networks. OSPF, RIP, and IS-IS lack the policy flexibility needed for complex inter-domain scenarios.
In a QoS implementation for enterprise voice over IP, which queuing mechanism best prevents low-priority traffic from starving critical voice packets during congestion?
-
A
Round-robin scheduling without priority differentiation
-
B
Tail drop with aggressive timeout reduction
-
C
Weighted Fair Queuing (WFQ) with strict priority classes
✓ Correct
-
D
FIFO queuing with TCP window scaling
Explanation
Weighted Fair Queuing combined with strict priority queuing ensures voice traffic (highest priority) cannot be starved by background traffic, while still providing fair allocation to other traffic classes. FIFO offers no differentiation, round-robin lacks strictness, and tail drop is a congestion management technique, not a primary queuing mechanism.
What is the maximum number of VLANs that can be configured on a typical enterprise switch using standard 802.1Q tagging?
-
A
1024 VLANs
-
B
256 VLANs
-
C
4096 VLANs
✓ Correct
-
D
65536 VLANs
Explanation
The 802.1Q VLAN tag uses a 12-bit field to represent VLAN IDs, allowing for a maximum of 4096 VLANs (0-4095), though VLAN 0 and 4095 are reserved, leaving 4094 usable VLANs. The other options do not reflect the actual bit allocation in the VLAN tag.
An enterprise needs to implement graceful restart capabilities for BGP to minimize convergence time during router maintenance. Which feature ensures loop-free alternate paths are preserved during the restart window?
-
A
MPLS Fast Reroute with pre-calculated backup tunnels
-
B
BGP Graceful Restart with helper mode supporting stale routes
✓ Correct
-
C
BGP Route Refresh with standard convergence timers
-
D
Route dampening to suppress transient route flaps
Explanation
BGP Graceful Restart with helper mode allows neighboring routers to preserve stale routes during a restarting router's recovery period, maintaining loop-free forwarding and reducing packet loss. Standard Route Refresh lacks the timing preservation needed, route dampening addresses instability rather than graceful transitions, and MPLS FRR is a different technology layer.
When designing an enterprise network with MPLS Traffic Engineering, which mechanism is used to establish explicit label-switched paths with guaranteed bandwidth?
-
A
LDP with auto-discovery of LSP parameters
-
B
RSVP-TE with constraint-based routing
✓ Correct
-
C
BGP Flowspec for dynamic path selection
-
D
Static label bindings with manual hop configuration
Explanation
RSVP-TE (Resource Reservation Protocol with Traffic Engineering) enables explicit path setup with bandwidth reservations and constraint-based routing to satisfy QoS requirements. LDP uses hop-by-hop routing without explicit constraints, BGP Flowspec is for DDoS mitigation, and static labels lack dynamic constraint awareness.
In an enterprise environment, what is the primary advantage of using VXLAN over traditional VLANs for data center overlay networking?
-
A
Elimination of spanning tree protocol requirements completely
-
B
Extended Layer 2 segment scaling beyond the 4096 VLAN limit using 24-bit VNI
✓ Correct
-
C
Reduced switch memory consumption by eliminating MAC table entries
-
D
Native support for hardware encryption without software overhead
Explanation
VXLAN uses a 24-bit VNET Identifier (VNI) allowing over 16 million virtual networks compared to VLAN's 4096 limit, enabling massive-scale virtualized data centers. While VXLAN offers other benefits, the primary architectural advantage for enterprise scaling is the expanded address space. STP is still needed for underlay fabric, and encryption requires additional configuration.
An enterprise implements First Hop Redundancy Protocol (FHRP) across multiple subnets. Which statement about HSRP virtual MAC address assignment is correct?
-
A
The virtual MAC is automatically learned from the active router's real MAC address
-
B
Multiple virtual MACs are assigned one per physical interface regardless of HSRP group
-
C
The virtual MAC is derived as 0000.0C07.ACxx where xx is the HSRP group number in hexadecimal
✓ Correct
-
D
The virtual MAC is statically configured to 0000.5E00.0001 plus the VLAN ID
Explanation
HSRP uses a reserved virtual MAC address format 0000.0C07.ACxx where xx represents the HSRP group number in hexadecimal. This allows clients to ARP for a stable MAC address independent of which physical router is active. The other options incorrectly describe MAC assignment behavior in HSRP.
When implementing IPv6 in an enterprise network with existing IPv4 infrastructure, which transition mechanism allows communication between IPv6-only hosts and IPv4-only hosts without dual-stack intermediate systems?
-
A
6to4 tunneling without stateful translation requirements
-
B
IPv6 link-local address configuration with static ARP entries
-
C
Dual-stack configuration on all network devices
-
D
NAT64 with DNS64 for transparent protocol translation
✓ Correct
Explanation
NAT64 combined with DNS64 provides stateless or stateful translation enabling IPv6-only clients to communicate with IPv4-only servers without requiring intermediate systems to be dual-stack. Dual-stack defeats the purpose of transition, 6to4 requires tunnel endpoints, and link-local addressing doesn't solve cross-version communication.
An enterprise network experiences asymmetric routing where return traffic follows a different path than outbound traffic. In what scenario would this behavior NOT negatively impact TCP-based applications?
-
A
When outbound and return paths use different ISP providers with equivalent speeds
-
B
When stateful inspection is not required and routing policies allow asymmetric flows
✓ Correct
-
C
When return packets take longer than 100 milliseconds in latency difference
-
D
When stateless firewalls inspect both directions of traffic independently with identical policies
Explanation
Asymmetric routing is acceptable when stateful inspection is not required, as TCP's three-way handshake and sequence numbers function independently of path symmetry. However, stateful firewalls will block return traffic, latency differences still cause performance issues, and multi-ISP routing inherently creates asymmetry problems that TCP must handle.
In enterprise network design, which Access Control List (ACL) optimization technique reduces CPU processing overhead on routers handling high-throughput traffic?
-
A
Converting standard ACLs to extended ACLs for better granularity
-
B
Using zone-based firewalls with stateful hardware acceleration instead of traditional ACLs
-
C
Ordering ACL entries by frequency of use and placing most-matched rules first
✓ Correct
-
D
Distributing ACL evaluation across multiple route processors in parallel
Explanation
ACL processing scans rules sequentially until a match is found, so placing frequently-matched rules first reduces average lookup time and CPU cycles. Extended ACLs provide more features but don't reduce processing overhead, and while hardware acceleration helps, rule ordering is a fundamental optimization technique independent of ACL type.