What is a use case for a two-tier L2 design for a dedicated data center?

What is a use case for a two-tier L2 design for a dedicated data center?A . Server room adjacent to campus coreB . Customers with medium-to-large data centers with application demanding requirementsC . Customers with small-to-medium data centers with less demanding requirementsD . Data Center that is located in a...

March 27, 2025 No Comments READ MORE +

In the ToR or middle of the rack cabling design, it is important to know (Select two)

In the ToR or middle of the rack cabling design, it is important to know (Select two)A . The number of fiber strands are pulled to each rowB . The fire regulationsC . The airflow directionD . The connectors the patch panels useView AnswerAnswer: A, D

March 16, 2025 No Comments READ MORE +

How many SFP28 port-groups do Aruba 8325 CX switches have?

How many SFP28 port-groups do Aruba 8325 CX switches have?A . 12 port-groups of 4 ports eachB . One port-group of 48 portsC . 4 port-groups of 8 ports eachD . 4 port-groups of 12 portsView AnswerAnswer: D

March 14, 2025 No Comments READ MORE +

In ToR or Middle of Rack switch―Ports oriented to server ports:

In ToR or Middle of Rack switch―Ports oriented to server ports:A . The airflow of the switches should be back to front (BF)B . The airflow of the switches should be front to back (FB)C . It does not matter which direction is the airflowD . It is recommended to...

March 1, 2025 No Comments READ MORE +

PVLAN (Private VLAN) defines three types of VLANs under the same SVI

PVLAN (Private VLAN) defines three types of VLANs under the same SVIA . Primary VLAN, Isolated VLAN and Customer VLANB . Secondary VLAN, Isolated VLAN and Provider VLANC . Primary VLAN, Isolated VLAN and Community VLAND . Provider VLAN Service VLAN and QinQ VLANView AnswerAnswer: C

February 28, 2025 No Comments READ MORE +

What is the underlay routing protocol run within each room?

You are designing an overlay solution for two Data Centers based on the Aruba CX platform. Each Data Center has two rooms and each room is its own fabric. What is the underlay routing protocol run within each room?A . iBGPB . eBGPC . OSPFD . IS-ISView AnswerAnswer: C

February 26, 2025 No Comments READ MORE +

How many P2P leaf-to-spine addresses are there?

In your design, you have six racks each with a pair of VSX Leaf switches and two Spine switches. How many P2P leaf-to-spine addresses are there?A . 12B . 96C . 24D . 48View AnswerAnswer: D

February 19, 2025 No Comments READ MORE +

What does a five-nines requirement in a service agreement refer to?

What does a five-nines requirement in a service agreement refer to?A . Compliance with a particular section of PCI DSSB . Unplanned downtime less than .001% of the service termC . Five layers of redundancy in the network designD . Future-proof solution designed to last five or more yearsView AnswerAnswer:...

February 19, 2025 No Comments READ MORE +

Mention two disadvantages of the End-of-Row or Middle-of-Row switches in Data Center design

Mention two disadvantages of the End-of-Row or Middle-of-Row switches in Data Center designA . More equipmentB . Higher latency for rack-to-rack traffic within the rowC . Longer, more complex cabling within the rowD . Lower port density and less scalableView AnswerAnswer: C, D

February 17, 2025 No Comments READ MORE +

What can be used to encrypt data in flight between untrusted locations?

What can be used to encrypt data in flight between untrusted locations?A . OSPF authenticationB . MACSecC . GRE tunnelsD . MD5 encryptionView AnswerAnswer: B

February 17, 2025 No Comments READ MORE +