Cisco Certification

CCIE — Enterprise Infrastructure Study Guide

62 practice questions with correct answers and detailed explanations. Use this guide to review concepts before taking the practice exam.

▶ Take Practice Exam 62 questions  ·  Free  ·  No registration

About the CCIE Exam

The Cisco Enterprise Infrastructure (CCIE) certification validates professional expertise in Cisco technologies. This study guide covers all 62 practice questions from our CCIE practice test, complete with correct answers and explanations to help you understand each concept thoroughly.

Review each question and explanation below, then test yourself with the full interactive practice exam to measure your readiness.

62 Practice Questions & Answers

Q1 Hard

In a multi-site enterprise network, which routing protocol is most suitable for distributing routes across multiple autonomous systems while maintaining BGP path attributes and community tags?

  • A OSPF with MPLS traffic engineering
  • B IS-IS with multi-topology extensions
  • C RIPv2 with route summarization
  • D BGP with extended communities and route reflectors ✓ Correct
Explanation

BGP with extended communities allows enterprises to tag and distribute routes across multiple AS domains while maintaining complex policies. Route reflectors enable scalable BGP deployments in large networks.

Q2 Medium

What is the primary advantage of implementing VXLAN over traditional VLAN technology in data center infrastructure?

  • A Support for up to 16 million virtual networks using 24-bit VXLAN Network Identifier ✓ Correct
  • B Elimination of the spanning tree protocol entirely
  • C Direct replacement of Layer 3 routing
  • D Increased bandwidth utilization on trunk ports
Explanation

VXLAN uses a 24-bit identifier allowing 16 million virtual networks compared to VLAN's 12-bit limit of 4094 networks, enabling massive scale in data centers.

Q3 Hard

An enterprise implements QoS using MPLS DiffServ-TE. Which of the following best describes how traffic classes are mapped in this architecture?

  • A Traffic is classified at ingress, DSCP marked, and EXP bits set at label imposition based on LSP Class of Service ✓ Correct
  • B Only IP Precedence can be used; DSCP is incompatible with MPLS
  • C EXP bits take precedence and override any IP layer markings during transit
  • D DSCP values are directly translated to EXP bits in the MPLS label stack
Explanation

In DiffServ-TE, traffic is classified and marked with DSCP at the edge, then EXP bits in the MPLS label are set according to the LSP's Class of Service definition at label imposition.

Q4 Medium

Which statement correctly describes the relationship between EIGRP feasible distance and advertised distance?

  • A Feasible distance determines if a route qualifies as a successor
  • B Advertised distance is the metric reported by a neighbor; feasible distance is the best metric through that neighbor including the local link cost ✓ Correct
  • C Feasible distance is always equal to advertised distance from the neighbor
  • D Advertised distance is only used for equal-cost load balancing decisions
Explanation

In EIGRP, advertised distance (reported metric) is the cost from the neighbor to the destination. Feasible distance includes the neighbor's advertised distance plus the local link cost to that neighbor.

Q5 Medium

An enterprise deploys BGP with MPLS for VPN services. What is the primary purpose of using Route Distinguishers (RDs) in BGPv4 VPN implementations?

  • A To uniquely identify VPN routes and allow overlapping address spaces across different customers ✓ Correct
  • B To encrypt VPN traffic at the provider edge routers
  • C To establish encryption keys between customer sites
  • D To reduce the number of BGP advertisements required
Explanation

RDs prepend a unique identifier to customer routes, creating VPN-IPv4 addresses that allow the same subnet to exist in multiple VPNs without route collisions.

Q6 Hard

In implementing a redundant WAN architecture using MPLS TE Fast Reroute (FRR), what is the role of a Point of Local Repair (PLR)?

  • A PLR performs backup label switching when primary tunnel fails, creating loop-free alternative paths ✓ Correct
  • B PLR manages customer VPN routing tables
  • C PLR monitors tunnel health and initiates reoptimization
  • D PLR is the destination router that receives rerouted traffic
Explanation

The PLR (typically an upstream router) detects primary LSP failure and immediately switches traffic to pre-computed backup LSPs, providing sub-50ms convergence without involving the head-end router.

Q7 Hard

An enterprise network experiences suboptimal BGP path selection. Which of the following is the correct order of BGP best path selection criteria?

  • A Weight, Local Preference, AS Path length, Origin, MED, IGP cost, Router ID ✓ Correct
  • B Weight, Local Preference, EBGP over IBGP, AS Path length, Origin, MED, IGP cost
  • C AS Path length, MED, Local Preference, Weight, Origin, IGP cost, Router ID
  • D Local Preference, Weight, AS Path length, MED, Origin, IGP cost, EBGP over IBGP
Explanation

BGP uses this precise order: Weight (Cisco proprietary), Local Preference, originated locally vs. learned, AS Path length, Origin, MED, IGP cost to next hop, then Router ID for tiebreaker.

Q8 Medium

Which IPv6 transition mechanism allows enterprises to run IPv6 over existing IPv4 infrastructure without requiring native IPv6 connectivity on intermediate networks?

  • A NAT64 translation
  • B Dual-stack deployment
  • C DHCPv6 Prefix Delegation
  • D 6to4 automatic tunneling ✓ Correct
Explanation

6to4 encapsulates IPv6 packets within IPv4 packets for transmission across IPv4-only networks, using the IPv4 address embedded in the IPv6 address for automatic tunnel endpoint discovery.

Q9 Hard

In a highly available network design, what is the primary function of an Automatic Route Optimization (ARO) protocol in conjunction with Equal Cost Multi-Path (ECMP)?

  • A To ensure all traffic uses the shortest path only
  • B To prevent routing loops by limiting hop count
  • C To dynamically adjust link weights and redistribute traffic across equal-cost paths based on real-time congestion ✓ Correct
  • D To authenticate routing updates between neighbors
Explanation

ARO mechanisms monitor link utilization and dynamically adjust metrics to balance traffic across ECMP paths, preventing congestion on any single link while utilizing available bandwidth efficiently.

Q10 Medium

An organization implements OSPF in a large network with multiple areas. Which statement about OSPF area types is correct?

  • A Backbone area can only connect directly to stub areas
  • B NSSA areas allow redistribution of external routes while limiting type 5 LSA propagation by using type 7 LSAs ✓ Correct
  • C Stub areas block external routes using type 5 LSAs and external summary routes via type 3 LSAs
  • D Totally stubby areas originate default routes and prevent flooding of type 5 and selected type 3 LSAs
Explanation

NSSA (Not-So-Stubby Area) allows external route redistribution while maintaining stub area benefits. External routes are advertised as type 7 LSAs within the NSSA and converted to type 5 at the NSSA border.

Q11 Medium

What is the correct behavior when a BGP speaker receives an UPDATE message with the AS_Path containing its own AS number?

  • A The route is silently discarded to prevent routing loops, regardless of the EBGP or IBGP session type ✓ Correct
  • B The route is accepted but marked as ineligible for announcement to external peers
  • C The route is accepted and used for load balancing calculations
  • D The route is rejected only if received via EBGP
Explanation

BGP's loop prevention mechanism rejects any route containing the local AS in its AS_Path, preventing accidental routing loops regardless of session type.

Q12 Hard

In implementing Segment Routing (SR), how does a router determine the next hop for a packet carrying an SR label?

  • A It performs a lookup in the routing table using the packet's destination IP address
  • B It consults the BGP table to find segment routes
  • C It relies on the packet's QoS markings to determine forwarding
  • D It performs a lookup in the Segment ID (SID) index to determine the next hop based on the label value ✓ Correct
Explanation

In Segment Routing, each label value corresponds to a Segment ID (SID) that maps to a specific topological node or service. Routers use the SID value directly to determine the next hop without maintaining state for each flow.

Q13 Medium

An enterprise network uses PIM Sparse Mode for multicast distribution. What is the purpose of a Rendezvous Point (RP) in this topology?

  • A To forward all multicast traffic at line rate to all interfaces
  • B To provide encryption for multicast streams
  • C To store multicast source addresses temporarily
  • D To serve as the meeting point where sources register and receivers join, establishing the multicast tree ✓ Correct
Explanation

In PIM-SM, the RP is the central point where sources send register messages and receivers send joins. It builds the shared tree until an optimal SPT is established.

Q14 Hard

Which access control mechanism provides the most granular control for enforcing security policies in a modern enterprise network infrastructure?

  • A Port-based access control lists only
  • B IP-based routing policies
  • C MAC address filtering
  • D Role-based access control with application-aware policy engines and context-driven decisions ✓ Correct
Explanation

Role-based and context-aware access control allows policies based on user identity, device posture, application type, and threat levels, providing significantly more control than traditional network-based methods.

Q15 Medium

In a Cisco SD-WAN deployment, what is the primary function of the vSmart controller?

  • A To provide web-based management interface for end users
  • B To authenticate vEdge devices during initial bootstrap
  • C To aggregate WAN telemetry and apply centralized routing policies across the overlay network ✓ Correct
  • D To encrypt user data traffic at the source edge device
Explanation

The vSmart controller distributes centralized network policies and routing information to vEdge devices, enabling dynamic routing decisions based on application performance and WAN link conditions.

Q16 Medium

An enterprise implements NetFlow v9 for network monitoring. Which of the following best describes the advantage of flexible NetFlow v9 over NetFlow v5?

  • A NetFlow v9 eliminates the need for flow statistics altogether
  • B NetFlow v9 increases flow export overhead due to additional packet headers
  • C NetFlow v9 uses template-based records allowing customizable fields and support for IPv6, MPLS, and BGP community values ✓ Correct
  • D NetFlow v9 supports only IPv4 traffic analysis
Explanation

NetFlow v9's template-based architecture allows operators to export only relevant fields and support emerging protocols like IPv6 and MPLS, providing flexibility that fixed v5 records cannot match.

Q17 Hard

In implementing a highly secure enterprise network, what is the primary security advantage of deploying a Zero Trust Architecture model compared to traditional perimeter-based security?

  • A Complete elimination of firewalls from the network
  • B Automatic encryption of all traffic without policy management
  • C Continuous verification of every device, user, and request regardless of network location, preventing lateral movement by authenticated insiders ✓ Correct
  • D Simplified network design with fewer security zones
Explanation

Zero Trust assumes breach and verifies every access request through identity, device posture, and behavior analysis. This prevents lateral movement even if an insider or compromised account attempts unauthorized access.

Q18 Medium

Which statement correctly describes the operation of HSRP (Hot Standby Routing Protocol) in a redundant gateway scenario?

  • A Both active and standby routers share the same MAC address and forward traffic simultaneously
  • B HSRP requires manual failover intervention from network administrators
  • C The active router uses a virtual IP and MAC address; the standby takes over if the active fails, verified through hello messages sent every 3 seconds ✓ Correct
  • D The standby router discards all traffic destined for the virtual gateway address
Explanation

HSRP creates a virtual gateway with a shared MAC address. The active router owns and responds to this address. If hellos are missed within the hold timer (default 10 seconds), the standby assumes the virtual IP.

Q19 Medium

In a large-scale OSPF deployment with multiple areas, which of the following correctly describes the purpose and function of an Area Border Router (ABR)?

  • A ABR is optional and only needed when areas exceed 100 routers
  • B ABR connects area 0 to other areas, summarizes routes between areas using type 3 LSAs, and maintains full topology of only connected areas ✓ Correct
  • C ABR prevents all external routes from entering its area
  • D ABR exchanges detailed LSAs with all other ABRs in the network
Explanation

ABRs must attach to the backbone (area 0), maintain separate topology databases for each connected area, and generate summary type 3 LSAs to advertise routes between areas while filtering detailed topology information.

Q20 Hard

What is the primary operational difference between using LDP (Label Distribution Protocol) and RSVP-TE for MPLS label establishment in an enterprise network?

  • A LDP is used only for VPN services; RSVP-TE is for general traffic
  • B RSVP-TE is simpler and requires less configuration than LDP
  • C LDP discovers paths dynamically and distributes labels based on routing table; RSVP-TE allows explicit path control with bandwidth reservations and traffic engineering ✓ Correct
  • D LDP supports IPv6 while RSVP-TE does not
Explanation

LDP automatically follows IGP routing and distributes labels to all destinations. RSVP-TE allows explicit path definition, bandwidth reservation, and fast reroute capabilities essential for traffic engineering.

Q21 Medium

An organization implements redundant WAN links with a backup satellite connection. Which dynamic routing protocol behavior would be most appropriate for failover scenarios?

  • A Load balancing equally across all links regardless of cost or latency characteristics
  • B Static routing only to eliminate protocol overhead
  • C Disabling all IGP updates on backup links to prevent unnecessary convergence
  • D Using higher administrative distance on the backup link to prefer primary paths, with automatic failover when primary becomes unavailable ✓ Correct
Explanation

Using higher administrative distance on backup links ensures they are used only when primary paths fail. IGP convergence detects failures and automatically shifts traffic without manual intervention.

Q22 Hard

In implementing Cisco ACI (Application Centric Infrastructure), how does the policy model differ from traditional network configuration approaches?

  • A ACI defines network behavior through application-centric policies (EPGs, contracts) rather than per-device configurations, enabling dynamic microsegmentation ✓ Correct
  • B ACI eliminates the need for any network configuration
  • C ACI still uses VLAN-based segmentation exclusively
  • D ACI only works with overlay networks and cannot use underlay
Explanation

ACI's policy-based architecture defines communication through Application Policy Infrastructure Groups (EPGs) and contracts specifying allowed traffic flows, automatically implementing rules across the fabric infrastructure.

Q23 Medium

Which statement accurately describes the operation of BFD (Bidirectional Forwarding Detection) in rapid failure detection scenarios?

  • A BFD can only detect failures when running alongside BGP
  • B BFD is a lightweight protocol providing subsecond link failure detection independent of routing protocols, requiring separate configuration and timers ✓ Correct
  • C BFD is a replacement for all routing protocol hello mechanisms
  • D BFD eliminates the need for hello packets in OSPF
Explanation

BFD operates independently at Layer 2-3, detecting failures in milliseconds through echo mechanisms and timers separate from routing protocols. It can work with any routing protocol or circuit-based system.

Q24 Hard

In a complex enterprise WAN with multiple MPLS VPN sites, what is the primary function of a Route Target (RT) extended community in BGPv4?

  • A To replace the need for Route Distinguishers
  • B To define which VPN routes are imported into a specific customer VRF ✓ Correct
  • C To encrypt traffic between VPN sites
  • D To control bandwidth allocation per VPN
Explanation

RTs act as import/export filters on PE routers. VPN routes are tagged with export RTs at one PE; other PEs selectively import routes matching their configured import RTs, enabling flexible VPN connectivity patterns.

Q25 Medium

An enterprise network must prioritize critical application traffic during congestion. Which QoS mechanism provides the most effective control in this scenario?

  • A Implement traffic policing and strict priority queuing for critical applications with dedicated bandwidth allocation ✓ Correct
  • B Disable QoS entirely to avoid processing overhead
  • C Mark all traffic with the same DSCP value
  • D Drop random frames when buffer reaches threshold
Explanation

Combining policing (rate limiting non-critical traffic) with strict priority queuing ensures critical applications get immediate service. Dedicated bandwidth guarantees prevent starvation of important flows.

Q26 Hard

What is the correct behavior of a BGP route reflector when it receives an UPDATE message from a client peer?

  • A The route is reflected to non-originating clients and non-clients, with local AS prepended
  • B The route is advertised only to other client peers of the same route reflector
  • C The route is discarded to prevent routing loops
  • D The route is reflected to all clients except the originating client, and to all non-client peers ✓ Correct
Explanation

Route reflectors forward routes from client peers to all other clients (except originating) and to non-client peers, reducing the full-mesh IBGP requirement while preventing loops through originator tracking.

Q27 Medium

Which routing protocol is most suitable for a large enterprise network with multiple autonomous systems and requires the most control over path selection?

  • A Intermediate System-to-Intermediate System (IS-IS)
  • B Border Gateway Protocol (BGP) ✓ Correct
  • C OSPF
  • D Routing Information Protocol (RIPv2)
Explanation

BGP is the exterior gateway protocol designed for inter-autonomous system routing and provides superior control over path selection through attributes like AS-PATH and LOCAL-PREFERENCE, making it ideal for large enterprise networks with complex routing policies.

Q28 Medium

What is the primary advantage of implementing Virtual Routing and Forwarding (VRF) in an enterprise network?

  • A VRF automatically compresses all routing protocols into a single unified protocol
  • B VRF allows multiple independent routing instances on a single physical router, enabling network segmentation and multi-tenancy ✓ Correct
  • C VRF eliminates the need for access control lists entirely
  • D VRF reduces the memory consumption of routing tables by 50%
Explanation

VRF (Virtual Routing and Forwarding) enables the creation of multiple isolated routing instances on a single physical router, which is essential for network segmentation, multi-tenancy scenarios, and service provider deployments without requiring separate hardware.

Q29 Medium

In a multi-site enterprise network using MPLS, which component is responsible for assigning and distributing label mappings between routers?

  • A Frame Relay Label Switching Protocol
  • B Border Gateway Protocol extensions with label fields
  • C Open Shortest Path First label management extensions
  • D Label Distribution Protocol (LDP) or targeted LDP sessions ✓ Correct
Explanation

LDP is the standard protocol used in MPLS networks to dynamically assign and distribute labels between LSRs (Label Switching Routers), enabling hop-by-hop forwarding along label-switched paths.

Q30 Medium

Which QoS queuing mechanism provides the most granular control over bandwidth allocation and is recommended for voice, video, and data convergence scenarios?

  • A Priority Queuing (PQ)
  • B Round-Robin scheduling
  • C First-In-First-Out (FIFO) queuing
  • D Class-Based Weighted Fair Queuing (CBWFQ) with Low Latency Queuing (LLQ) ✓ Correct
Explanation

CBWFQ with LLQ provides the most control by allocating guaranteed bandwidth to traffic classes while allowing strict priority for critical flows like VoIP, making it ideal for converged networks running voice, video, and data simultaneously.

Q31 Easy

What is the correct order of steps when implementing a new VLAN in a switched enterprise network?

  • A Create VLAN → assign switch ports → configure VLAN interface IP → enable routing between VLANs ✓ Correct
  • B Enable routing between VLANs → create VLAN → configure VLAN interface IP → assign switch ports
  • C Configure VLAN interface IP → create VLAN → enable routing between VLANs → assign switch ports
  • D Assign switch ports → create VLAN → enable routing between VLANs → configure VLAN interface IP
Explanation

The correct implementation sequence involves creating the VLAN definition first, assigning the appropriate switch ports to that VLAN, configuring the logical VLAN interface with an IP address, and finally enabling inter-VLAN routing through a Layer 3 device.

Q32 Medium

In a Cisco enterprise network using Spanning Tree Protocol (STP), what is the primary function of Bridge Protocol Data Units (BPDUs)?

  • A BPDUs are used to elect the root bridge and calculate the lowest-cost path to it, preventing switching loops ✓ Correct
  • B BPDUs manage VLAN membership across trunk ports
  • C BPDUs carry application-level data across the network
  • D BPDUs authenticate switches during network initialization
Explanation

BPDUs are control frames used by STP to elect a root bridge and determine the lowest-cost spanning tree topology, ensuring loop-free switching by blocking redundant paths while maintaining connectivity.

Q33 Hard

Which High Availability feature allows a primary and secondary router to share a virtual IP address for transparent failover in an enterprise environment?

  • A Both HSRP and VRRP accomplish this equally well in all scenarios ✓ Correct
  • B Hot Standby Routing Protocol (HSRP)
  • C Gateway Load Balancing Protocol (GLBP)
  • D Virtual Router Redundancy Protocol (VRRP)
Explanation

Both HSRP (Cisco proprietary) and VRRP (standards-based) provide transparent failover using a virtual IP address shared between redundant routers. HSRP is Cisco-specific while VRRP works across multiple vendors, but both achieve the same transparent failover functionality.

Q34 Easy

What is the primary difference between a managed and unmanaged switch in terms of enterprise network infrastructure?

  • A Managed switches cost significantly less than unmanaged switches
  • B Managed switches can only operate at Layer 2, while unmanaged switches support Layer 3 routing
  • C Unmanaged switches provide better performance for large-scale deployments
  • D Managed switches support VLAN configuration, STP control, port security, and monitoring capabilities, while unmanaged switches simply forward frames ✓ Correct
Explanation

Managed switches provide configuration options for VLANs, STP, QoS, port security, and SNMP monitoring—essential for enterprise networks—whereas unmanaged switches operate as simple plug-and-play forwarding devices without any administrative control.

Q35 Hard

In implementing a network access control solution, which technology allows devices to be automatically quarantined if they do not meet security compliance requirements?

  • A Simple Network Management Protocol (SNMP) traps
  • B Dynamic VLAN assignment with network admission control ✓ Correct
  • C Port security with MAC address limits
  • D Posture Assessment
Explanation

Dynamic VLAN assignment combined with Network Admission Control (NAC) evaluates device posture, and if non-compliant, automatically assigns devices to a remediation VLAN where they cannot access production resources until compliance is achieved.

Q36 Easy

Which encryption protocol is recommended for securing management traffic on enterprise network devices?

  • A HTTP with SSL certificates
  • B Telnet with password protection
  • C Secure Shell (SSH) with strong cryptographic algorithms ✓ Correct
  • D Simple Network Management Protocol version 1
Explanation

SSH provides encrypted management access with strong cryptographic authentication, replacing insecure protocols like Telnet. It should be configured with strong algorithms (SSH version 2, not version 1) for securing administrative access to routers, switches, and servers.

Q37 Medium

What is the primary purpose of implementing Network Address Translation (NAT) in a corporate network with multiple office locations?

  • A NAT increases network performance by 200% across all WAN links
  • B NAT eliminates the need for routing protocols entirely
  • C NAT conserves public IP address space and provides a layer of security by hiding internal IP addresses from external networks ✓ Correct
  • D NAT automatically encrypts all network traffic traversing the border
Explanation

NAT conserves limited public IP address space by allowing multiple internal devices to share public addresses, and provides security obscurity by hiding internal network topology from external observers.

Q38 Hard

In a large datacenter environment, which switching architecture best minimizes latency and maximizes throughput for east-west traffic?

  • A Traditional three-tier hierarchical architecture with access, distribution, and core layers
  • B Spine-and-leaf (or Clos) architecture with equal path lengths between any two endpoints ✓ Correct
  • C Ring-based topology with redundant rings for high availability
  • D Star topology with all devices connected to a central switch
Explanation

Spine-and-leaf architecture provides equal path lengths, consistent latency, and nearly full mesh connectivity for east-west traffic, making it ideal for modern datacenters with high server-to-server communication and containerized applications.

Q39 Medium

What does the term 'convergence' refer to in routing protocol contexts?

  • A The process of reducing bandwidth consumption on WAN links
  • B The time required for all routers in a network to reach agreement on optimal paths after a topology change ✓ Correct
  • C The encryption of routing advertisements sent between routers
  • D The automatic merging of multiple routing protocols into a single unified protocol
Explanation

Convergence is the critical time period during which all routers in a network update their routing tables following a topology change (link failure, router addition, etc.). Faster convergence means quicker recovery from failures and is a key metric for routing protocol efficiency.

Q40 Medium

Which Enterprise Infrastructure component is responsible for maintaining time synchronization across all network devices and servers?

  • A Simple Network Management Protocol (SNMP)
  • B Domain Name System (DNS)
  • C Dynamic Host Configuration Protocol (DHCP)
  • D Network Time Protocol (NTP) or Precision Time Protocol (PTP) ✓ Correct
Explanation

NTP and PTP are protocols designed to synchronize system clocks across network devices with high accuracy, essential for logging, security auditing, Kerberos authentication, and cluster operations in enterprise environments.

Q41 Medium

In a disaster recovery scenario, what is the primary difference between RPO and RTO?

  • A RPO is the maximum acceptable data loss; RTO is the maximum acceptable downtime before service restoration ✓ Correct
  • B RTO is measured in gigabytes; RPO is measured in milliseconds
  • C RPO and RTO are identical metrics used interchangeably
  • D RPO measures network bandwidth; RTO measures latency
Explanation

Recovery Point Objective (RPO) defines how much data loss is acceptable (e.g., last 4 hours), while Recovery Time Objective (RTO) defines how quickly service must be restored (e.g., 2 hours). Both are critical for business continuity planning.

Q42 Medium

Which protocol allows enterprise administrators to remotely manage network devices with encrypted credentials and command execution?

  • A Simple Network Management Protocol version 3 (SNMPv3) ✓ Correct
  • B Address Resolution Protocol (ARP)
  • C Simple Network Management Protocol version 2 (SNMPv2c)
  • D Network Time Protocol (NTP)
Explanation

SNMPv3 provides encrypted management with strong authentication and privacy features, allowing secure remote monitoring and configuration of network devices. SNMPv2c uses only community strings which lack encryption, making SNMPv3 the secure choice.

Q43 Hard

What is the primary function of implementing IP Source Guard in an enterprise network environment?

  • A IP Source Guard encrypts all IP traffic at the network layer
  • B IP Source Guard prevents DHCP spoofing and IP spoofing attacks by validating the source IP and MAC address bindings against DHCP snooping database entries ✓ Correct
  • C IP Source Guard fragments oversized packets to prevent transmission errors
  • D IP Source Guard automatically compresses IP packet headers to reduce bandwidth consumption
Explanation

IP Source Guard leverages DHCP snooping to maintain a database of valid IP-to-MAC bindings, then blocks traffic from invalid sources, effectively preventing DHCP starvation attacks, IP spoofing, and man-in-the-middle attacks on switched networks.

Q44 Hard

In implementing Multicast in an enterprise network, which protocol is used for multicast group membership management?

  • A Multicast Listener Discovery (MLD)
  • B Protocol Independent Multicast (PIM)
  • C Both IGMP for IPv4 and MLD for IPv6 environments ✓ Correct
  • D Internet Group Management Protocol (IGMP)
Explanation

IGMP manages multicast group membership for IPv4 hosts, while MLD serves the same function for IPv6. PIM is a routing protocol that determines how multicast traffic is forwarded. Both membership protocols are essential for multicast operation in their respective IP versions.

Q45 Medium

Which WAN optimization technology reduces bandwidth consumption by identifying and eliminating redundant data transmission?

  • A Quality of Service (QoS) traffic prioritization
  • B Data Deduplication with intelligent caching ✓ Correct
  • C Multiprotocol Label Switching (MPLS)
  • D Virtual Private Network (VPN) encryption
Explanation

Data deduplication and intelligent caching reduce WAN bandwidth by storing frequently transmitted data locally and sending only changed portions (delta sync), significantly reducing bandwidth for backup, file transfer, and application traffic across expensive WAN links.

Q46 Hard

What is the primary security risk associated with implementing Point-to-Point Protocol (PPP) authentication without additional encryption mechanisms?

  • A PPP reduces network throughput by 75% due to authentication overhead
  • B PPP causes excessive packet fragmentation across WAN links
  • C PPP authentication credentials can be captured via protocol analyzers; additional encryption like IPSEC should be implemented ✓ Correct
  • D PPP automatically disables all routing protocols
Explanation

While PPP authentication (PAP/CHAP) validates endpoints, it does not encrypt credentials or data. PPP should always be combined with IPsec or other encryption to protect authentication credentials from packet capture attacks and to ensure confidentiality of transmitted data.

Q47 Medium

In a multi-area OSPF enterprise network, which router type is responsible for connecting different OSPF areas?

  • A Backbone router
  • B Autonomous System Border Router (ASBR)
  • C Internal router
  • D Area Border Router (ABR) ✓ Correct
Explanation

Area Border Routers (ABRs) connect different OSPF areas and maintain databases for each area, summarizing routes between areas. ASBRs connect to external routing domains. ABRs are essential for hierarchical OSPF deployments in large enterprise networks.

Q48 Hard

Which command-line interface feature allows network administrators to verify the correctness of configuration changes before committing them in Cisco IOS XE devices?

  • A Configuration preview with syntax validation only
  • B Dry-run mode that simulates configuration changes without applying them
  • C Commit confirmed with automatic rollback on timeout if not re-confirmed ✓ Correct
  • D Configuration rollback with atomic transactions
Explanation

Commit confirmed is a transaction-based feature in IOS XE that allows administrators to apply changes with an automatic rollback timer. If the change breaks connectivity or causes issues, the configuration automatically reverts unless explicitly confirmed, preventing accidental outages.

Q49 Hard

What is the primary advantage of implementing Software-Defined Wide Area Network (SD-WAN) in an enterprise with multiple branch offices?

  • A SD-WAN automatically encrypts all traffic without requiring additional security appliances
  • B SD-WAN guarantees zero packet loss across all network links
  • C SD-WAN provides centralized control, improved application performance, and reduces WAN costs by using multiple transport types including broadband and 4G/LTE intelligently ✓ Correct
  • D SD-WAN eliminates the need for routing protocols entirely
Explanation

SD-WAN uses centralized controllers to manage branch connectivity, intelligently directing traffic across multiple WAN transports (MPLS, broadband, 4G), improving application performance while reducing reliance on expensive MPLS circuits and improving cost-efficiency for enterprises.

Q50 Easy

In implementing a network monitoring solution, which metric indicates the percentage of network packets successfully transmitted from source to destination?

  • A Jitter variation in packet arrival times
  • B Latency measurement in milliseconds
  • C Packet loss rate or packet delivery ratio ✓ Correct
  • D Bandwidth utilization percentage
Explanation

Packet loss rate (or conversely, packet delivery ratio) measures the percentage of packets successfully reaching their destination. High packet loss indicates network issues, congestion, or quality problems and is critical for monitoring application performance.

Q51 Medium

Which protocol-independent mechanism ensures that all router interfaces within a network segment are synchronized to the same clock reference for precise timestamp generation?

  • A Border Gateway Protocol timestamp extensions
  • B Network Time Protocol with stratum-based hierarchy ✓ Correct
  • C Simple Network Management Protocol synchronization
  • D Kerberos time server coordination
Explanation

NTP uses a stratum hierarchy to synchronize all network devices to accurate time sources, with stratum 1 servers (atomic clocks) feeding stratum 2 and lower. This ensures consistent timestamps across the enterprise for logging, security, and cluster operations.

Q52 Hard

What is the correct approach to implement end-to-end encryption for email traffic in an enterprise environment while maintaining centralized security controls?

  • A Disable encryption and rely on network perimeter security only
  • B Implement opportunistic TLS encryption between mail servers without certificate validation
  • C Use insecure SMTP with password-based authentication
  • D Implement mandatory TLS with certificate pinning and manage trusted CA certificates centrally through infrastructure ✓ Correct
Explanation

Mandatory TLS with centrally managed certificate validation ensures email is encrypted in transit while allowing IT to maintain security policies. This prevents man-in-the-middle attacks and ensures compliance, unlike opportunistic TLS which lacks validation or perimeter-only approaches.

Q53 Hard

When implementing a multi-site enterprise network, which routing protocol is most suitable for managing BGP communities across interconnected data centers with different administrative domains?

  • A IS-IS with level-2 domain routing only
  • B BGP with community-based path selection and route tagging ✓ Correct
  • C RIP version 2 with extended metrics
  • D OSPF with route filtering
Explanation

BGP communities provide flexible, scalable mechanisms for policy-based routing across multiple autonomous systems and administrative domains, making them ideal for multi-site enterprise networks. OSPF, RIP, and IS-IS lack the policy flexibility needed for complex inter-domain scenarios.

Q54 Hard

In a QoS implementation for enterprise voice over IP, which queuing mechanism best prevents low-priority traffic from starving critical voice packets during congestion?

  • A Round-robin scheduling without priority differentiation
  • B Tail drop with aggressive timeout reduction
  • C Weighted Fair Queuing (WFQ) with strict priority classes ✓ Correct
  • D FIFO queuing with TCP window scaling
Explanation

Weighted Fair Queuing combined with strict priority queuing ensures voice traffic (highest priority) cannot be starved by background traffic, while still providing fair allocation to other traffic classes. FIFO offers no differentiation, round-robin lacks strictness, and tail drop is a congestion management technique, not a primary queuing mechanism.

Q55 Easy

What is the maximum number of VLANs that can be configured on a typical enterprise switch using standard 802.1Q tagging?

  • A 1024 VLANs
  • B 256 VLANs
  • C 4096 VLANs ✓ Correct
  • D 65536 VLANs
Explanation

The 802.1Q VLAN tag uses a 12-bit field to represent VLAN IDs, allowing for a maximum of 4096 VLANs (0-4095), though VLAN 0 and 4095 are reserved, leaving 4094 usable VLANs. The other options do not reflect the actual bit allocation in the VLAN tag.

Q56 Hard

An enterprise needs to implement graceful restart capabilities for BGP to minimize convergence time during router maintenance. Which feature ensures loop-free alternate paths are preserved during the restart window?

  • A MPLS Fast Reroute with pre-calculated backup tunnels
  • B BGP Graceful Restart with helper mode supporting stale routes ✓ Correct
  • C BGP Route Refresh with standard convergence timers
  • D Route dampening to suppress transient route flaps
Explanation

BGP Graceful Restart with helper mode allows neighboring routers to preserve stale routes during a restarting router's recovery period, maintaining loop-free forwarding and reducing packet loss. Standard Route Refresh lacks the timing preservation needed, route dampening addresses instability rather than graceful transitions, and MPLS FRR is a different technology layer.

Q57 Hard

When designing an enterprise network with MPLS Traffic Engineering, which mechanism is used to establish explicit label-switched paths with guaranteed bandwidth?

  • A LDP with auto-discovery of LSP parameters
  • B RSVP-TE with constraint-based routing ✓ Correct
  • C BGP Flowspec for dynamic path selection
  • D Static label bindings with manual hop configuration
Explanation

RSVP-TE (Resource Reservation Protocol with Traffic Engineering) enables explicit path setup with bandwidth reservations and constraint-based routing to satisfy QoS requirements. LDP uses hop-by-hop routing without explicit constraints, BGP Flowspec is for DDoS mitigation, and static labels lack dynamic constraint awareness.

Q58 Medium

In an enterprise environment, what is the primary advantage of using VXLAN over traditional VLANs for data center overlay networking?

  • A Elimination of spanning tree protocol requirements completely
  • B Extended Layer 2 segment scaling beyond the 4096 VLAN limit using 24-bit VNI ✓ Correct
  • C Reduced switch memory consumption by eliminating MAC table entries
  • D Native support for hardware encryption without software overhead
Explanation

VXLAN uses a 24-bit VNET Identifier (VNI) allowing over 16 million virtual networks compared to VLAN's 4096 limit, enabling massive-scale virtualized data centers. While VXLAN offers other benefits, the primary architectural advantage for enterprise scaling is the expanded address space. STP is still needed for underlay fabric, and encryption requires additional configuration.

Q59 Medium

An enterprise implements First Hop Redundancy Protocol (FHRP) across multiple subnets. Which statement about HSRP virtual MAC address assignment is correct?

  • A The virtual MAC is automatically learned from the active router's real MAC address
  • B Multiple virtual MACs are assigned one per physical interface regardless of HSRP group
  • C The virtual MAC is derived as 0000.0C07.ACxx where xx is the HSRP group number in hexadecimal ✓ Correct
  • D The virtual MAC is statically configured to 0000.5E00.0001 plus the VLAN ID
Explanation

HSRP uses a reserved virtual MAC address format 0000.0C07.ACxx where xx represents the HSRP group number in hexadecimal. This allows clients to ARP for a stable MAC address independent of which physical router is active. The other options incorrectly describe MAC assignment behavior in HSRP.

Q60 Hard

When implementing IPv6 in an enterprise network with existing IPv4 infrastructure, which transition mechanism allows communication between IPv6-only hosts and IPv4-only hosts without dual-stack intermediate systems?

  • A 6to4 tunneling without stateful translation requirements
  • B IPv6 link-local address configuration with static ARP entries
  • C Dual-stack configuration on all network devices
  • D NAT64 with DNS64 for transparent protocol translation ✓ Correct
Explanation

NAT64 combined with DNS64 provides stateless or stateful translation enabling IPv6-only clients to communicate with IPv4-only servers without requiring intermediate systems to be dual-stack. Dual-stack defeats the purpose of transition, 6to4 requires tunnel endpoints, and link-local addressing doesn't solve cross-version communication.

Q61 Medium

An enterprise network experiences asymmetric routing where return traffic follows a different path than outbound traffic. In what scenario would this behavior NOT negatively impact TCP-based applications?

  • A When outbound and return paths use different ISP providers with equivalent speeds
  • B When stateful inspection is not required and routing policies allow asymmetric flows ✓ Correct
  • C When return packets take longer than 100 milliseconds in latency difference
  • D When stateless firewalls inspect both directions of traffic independently with identical policies
Explanation

Asymmetric routing is acceptable when stateful inspection is not required, as TCP's three-way handshake and sequence numbers function independently of path symmetry. However, stateful firewalls will block return traffic, latency differences still cause performance issues, and multi-ISP routing inherently creates asymmetry problems that TCP must handle.

Q62 Medium

In enterprise network design, which Access Control List (ACL) optimization technique reduces CPU processing overhead on routers handling high-throughput traffic?

  • A Converting standard ACLs to extended ACLs for better granularity
  • B Using zone-based firewalls with stateful hardware acceleration instead of traditional ACLs
  • C Ordering ACL entries by frequency of use and placing most-matched rules first ✓ Correct
  • D Distributing ACL evaluation across multiple route processors in parallel
Explanation

ACL processing scans rules sequentially until a match is found, so placing frequently-matched rules first reduces average lookup time and CPU cycles. Extended ACLs provide more features but don't reduce processing overhead, and while hardware acceleration helps, rule ordering is a fundamental optimization technique independent of ACL type.

Ready to test your knowledge?

You've reviewed all 62 questions. Take the interactive practice exam to simulate the real test environment.

▶ Start Practice Exam — Free