Jump to content

[Offer]- CCDE dump that needs fixes


keje

Recommended Posts

11 minutes ago, cciede11sure said:

Agree A and E.

here is link for E - 

This is the hidden content, please

 

14 hours ago, keje said:

I think this is the correct answer now. before it was A and E

image.png.5e7aae9813d14139b87ffb68b3a73a3d.png

 

This is the hidden content, please

Correct Ans is A and E.. Refer below bold remarks meet both the condition mention in question...and definition is from above cisco link

IPv6 Prefix Guard Overview
The IPv6 Prefix Guard feature works within the IPv6 Source Guard feature, enabling the device to deny traffic originated from nontopologically correct addresses. IPv6 prefix guard is often used when IPv6 prefixes are delegated to devices (for example, home gateways) using DHCP prefix delegation. The feature discovers ranges of addresses assigned to the link and blocks any traffic sourced with an address outside this range.

IPv6 Destination Guard Overview
The IPv6 Destination Guard feature works with IPv6 neighbor discovery to ensure that the device performs address resolution only for those addresses that are known to be active on the link. It relies on the address glean functionality to populate all destinations active on the link into the binding table and then blocks resolutions before they happen when the destination is not found in the binding table.

  • Like 24
  • Thanks 6
  • Confused 2
Link to comment
Share on other sites

Company XYZ, a global content provider, owns data centers on different continents. Their data center design involves a standard three-layer design with a Layer 3-only core. HSRP is used as the FHRP. They require VLAN extension across access switches in all data centers, and they plan to purchase a Layer 2 interconnection between two of their data centers in Europe. In the absence of other business or technical constraints, which termination point is optimal for the layer 2 interconnection?
A. at the access layer because the STP root bridge does not need to align with the HSRP active node
B. at the core layer, to offer the possibility to isolate STP domains
C. at the core layer because all external connections must terminate there for security reasons
D. at the aggregation layer because it is the Layer 2 to Layer 3 demarcation point

 

Please comment on this one..

I will go with B because Core is only Layer 3 device which host the SVI for all the vlans, it means connecting the L2 link on Core switches will ensure gateway reachability from other DC.

Edited by cciede11sure
  • Thanks 1
Link to comment
Share on other sites

Which purpose of a dynamically created tunnel interface on the design of IPv6 multicast services is true?
A. first-hop router registration to the RP
B. multicast client registration to the RP
C. multicast source registration to the RP
D. Transport of all IPv6 multicast traffic.

 

Any suggestion on this one ?

Edited by cciede11sure
Link to comment
Share on other sites

Which two application requirements are mandatory for traffic to receive proper treatment when placed in the priority queue? (Choose two.)
A. intolerance to jitter
B. TCP-based application
C. FC WRED drop treatment
D. small transactions (HTTP-like behavior)
E. tolerance to packet loss

 

Agree with A...but couldn't find second option. 

E could be second option because LLQ also allows queue depths to be specified to determine when the router should drop packets if too many packets are waiting in any particular class queue. 

Edited by cciede11sure
  • Like 1
  • Thanks 1
Link to comment
Share on other sites

As part of workspace digitization, a large enterprise has migrated all their users to Desktop as a Service (DaaS) by hosting the backend system in their on-premises data center. Some of the branches have started to experience disconnections to the DaaS at periodic intervals, however, local users in the data center and head office do not experience this behavior. Which technology can be used to mitigate this issue?
A. WRED
B. tall drop
C. traffic policing
D. Traffic shaping

Any suggestion...

 

  • Like 2
Link to comment
Share on other sites

23 hours ago, keje said:

Thanks for the update changed answer in vce, as we work through them all i will share the final version again, go team!

7 is correct Ans because  In broadcast network...Router can either be DR or BDR or NON-DR/NON-BDR, NON-DR/NON-BDR router can become neighbor with another NON-DR/NON-BDR router but their state stop at 2-way not full.
All NON-DR/NON-BDR router will have full neighborship with DR/BDR. So we have 3 NON-DR/NON-BDR Router in question which will have full neighborship with DR and BDR so 6 Full Neighborship and one more full neighborship between DR and BDR so total is 7

  • Like 3
Link to comment
Share on other sites

On 3/16/2022 at 9:14 AM, bluechief said:

Question: How many fully established neighbor relationships exist on an Ethernet with five routers running OSPF as network type broadcast?

Answer as provided is 10. It is wrong. Correct answer is 7.

Reference:

This is the hidden content, please

7 is correct Ans because  In broadcast network...Router can either be DR or BDR or NON-DR/NON-BDR, NON-DR/NON-BDR router can become neighbor with another NON-DR/NON-BDR router but their state stop at 2-way not full.
All NON-DR/NON-BDR router will have full neighborship with DR/BDR. So we have 3 NON-DR/NON-BDR Router in question which will have full neighborship with DR and BDR so 6 Full Neighborship and one more full neighborship between DR and BDR so total is 7

  • Like 29
  • Thanks 4
Link to comment
Share on other sites

4 hours ago, cciede11sure said:

Company XYZ, a global content provider, owns data centers on different continents. Their data center design involves a standard three-layer design with a Layer 3-only core. HSRP is used as the FHRP. They require VLAN extension across access switches in all data centers, and they plan to purchase a Layer 2 interconnection between two of their data centers in Europe. In the absence of other business or technical constraints, which termination point is optimal for the layer 2 interconnection?
A. at the access layer because the STP root bridge does not need to align with the HSRP active node
B. at the core layer, to offer the possibility to isolate STP domains
C. at the core layer because all external connections must terminate there for security reasons
D. at the aggregation layer because it is the Layer 2 to Layer 3 demarcation point

 

Please comment on this one..

I will go with B because Core is only Layer 3 device which host the SVI for all the vlans, it means connecting the L2 link on Core switches will ensure gateway reachability from other DC.

B is correct, this would be similar to a DCI link which terminates on the core and not on access or aggregation switches

Link to comment
Share on other sites

1 hour ago, cciede11sure said:

As part of workspace digitization, a large enterprise has migrated all their users to Desktop as a Service (DaaS) by hosting the backend system in their on-premises data center. Some of the branches have started to experience disconnections to the DaaS at periodic intervals, however, local users in the data center and head office do not experience this behavior. Which technology can be used to mitigate this issue?
A. WRED
B. tall drop
C. traffic policing
D. Traffic shaping

Any suggestion...

 

My second thought was shaping outbound to keep the traffic smooth and consistent from the remote side but that does nothing if not applied to the DC side as well

  • Like 2
  • Thanks 1
Link to comment
Share on other sites

3 hours ago, bluechief said:

Document suggests A. That is incorrect. Correct answer should be C.

In a PIM-SM network, sources must send their traffic to the RP. In sparse mode, a router assumes that other routers do not want to forward multicast packets for a group, unless there is an explicit request for the traffic. When hosts join a multicast group, the directly connected routers send PIM Join messages toward the RP. The RP keeps track of multicast groups. Hosts that send multicast packets are registered with the RP by the first hop router of that host. The RP then sends Join messages toward the source. At this point, packets are forwarded on a shared distribution tree. If the multicast traffic from a specific source is sufficient, the first hop router of the host may send Join messages toward the source to build a source-based distribution tree.

Automatic Multicast Tunneling (AMT) provides a method to tunnel multicast data over a unicast network. The tunneling is performed between AMT relays and AMT gateways, using User Datagram Protocol (UDP) encapsulation. AMT enables service providers and their customers to participate in delivering multicast traffic even in the absence of end-to-end multicast connectivity.

please provide link for reference

  • Like 1
Link to comment
Share on other sites

I'd like to thank everyone providing feedback with references to the corrected answers. updating the file and will share as vce and pdf in the next day or 2. If there are anymore spotted please provide answer with reference link.

 

lets knock this one out!

  • Like 3
  • Thanks 1
Link to comment
Share on other sites

A healthcare customer requested the SNMP traps must be sent over the MPLS Layer 3 VPN service, which protocol must be enabled?

A.      SNMPV3

B.      Syslog

C.      Syslog TLS

D.      SNMPV2

E.       SSH

My Answer: A

Is it correct

  • Like 1
  • Thanks 1
Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...