Which two items must be included in an RFP include? (Choose two.)
Which two items must be included in an RFP include? (Choose two.)A . A list of design requirements.B . The new design of the network.C . An analysis of application behavior in the network.D . The types of solutions the design must provide.View AnswerAnswer: AD
Which name is used by a service provider to identify the edge device inside the central office facing the customer?
Which name is used by a service provider to identify the edge device inside the central office facing the customer?A . LSRB . PEC . CED . PView AnswerAnswer: B
Which two technologies can you recommend for the design?
Your customers new network contains network devices from multiple vendors. You have been asked to propose two technologies that will work among all the vendors' networking equipment. Which two technologies can you recommend for the design? (Choose two.)A . DVMRPB . PIMC . IGMPv2D . DTPView AnswerAnswer: BC
Which design boundary is caused by the customer's existing physical environment?
Which design boundary is caused by the customer's existing physical environment?A . Marketing users are not permitted access to the company's financial servers.B . Current infrastructure lacks the media to interconnect buildings with each other.C . Key stakeholders disagree on how the funding for the project should be spent.D ....
Which two statements describe how you would meet the business managers’ objectives?
Your customer is deploying a new unified communications (UC) solution and business managers want to ensure that network users adopt and use the new solution. Which two statements describe how you would meet the business managers’ objectives? (Choose two.)A . Ensure that the solution is easy to manage for the...
Which type of area should you use in an enterprise OSPF deployment if you want to prevent propagation of type 5 LSAs but still allow the redistribution of external routes?
Which type of area should you use in an enterprise OSPF deployment if you want to prevent propagation of type 5 LSAs but still allow the redistribution of external routes?A . stubB . totally stubbyC . backboneD . NSSAView AnswerAnswer: D
What should be the third item in your network design checklist?
What should be the third item in your network design checklist?A . A validation process for analyzing customer's existing environment.B . A process for selecting protocols, address schemes, naming conventions, and so forth.C . A process for understanding the customer's business and technical goals.D . The steps for designing a...
What should you do to accomplish this task?
You are designing a network design in which access between different groups must be tightly restricted. What should you do to accomplish this task?A . A Layer 7 IDPB . A Layer 3 switchC . A Layer 4 firewallD . A Layer 2 switchView AnswerAnswer: C
Which two statements are true in regards to the technical specifications section of an RFP? (Choose two.)
Which two statements are true in regards to the technical specifications section of an RFP? (Choose two.)A . It should contain the logical and physical topology design requirements.B . It is likely to be read by all decision makers.C . It should contain the bill of materials.D . It should...
What are two aspects of brownfield projects? (Choose two.)
What are two aspects of brownfield projects? (Choose two.)A . New networks with few or no restraints to consider.B . Old equipment that should be replaced.C . Legacy applications that are no longer used.D . Next-generation networks created from the ground up.View AnswerAnswer: BC