What is the acceptable amount of one-way network delay for voice and video applications?

What is the acceptable amount of one-way network delay for voice and video applications?A . 300 bytesB . 1 secC . 150 msD . 500 msView AnswerAnswer: C Explanation: Delay Components in VoIP Networks The ITU's G.I 14 recommendation specifics that the one-way delay between endpoints should not exceed 150...

September 21, 2019 No Comments READ MORE +

Which two statements about designing the Data Center Access layer are correct? (Choose two.)

Which two statements about designing the Data Center Access layer are correct? (Choose two.)A . Multiport NIC servers should each have their own IP address.B . Layer 3 connectivity should never be used in the access layer.C . Layer 2 connectivity is primarily implemented in the access layer.D . Multiport...

September 21, 2019 No Comments READ MORE +

Which is the most important consideration when passing corporate traffic over the public Internet?

WAN backup over the Internet is often used to provide primary connection redundancy. Which is the most important consideration when passing corporate traffic over the public Internet?A . securityB . static versus dynamic routingC . bandwidthD . QoSE . latencyView AnswerAnswer: A Explanation: WAN Backup over the Internet Another alternative...

September 20, 2019 No Comments READ MORE +

What should you do next?

You are the global administrator for an Azure Active Directory (Azure AD) tenant named adatum.com. From the Azure Active Directory blade, you assign the Conditional Access Administrator role to a user You need to ensure that Admin1 has just-in-time access as a conditional access administrator. What should you do next?A...

September 20, 2019 No Comments READ MORE +

Which one of these statements describes why, from a design perspective, a managed VPN approach for enterprise teleworkers is most effective?

Which one of these statements describes why, from a design perspective, a managed VPN approach for enterprise teleworkers is most effective?A . A managed VPN solution uses a cost-effective, on-demand VPN tunnel back to the enterprise.B . This solution supports all teleworkers who do not require voice or video.C ....

September 20, 2019 No Comments READ MORE +

Which of these statements is true concerning the data center access layer design?

Which of these statements is true concerning the data center access layer design?A . The access layer in the data center is typically built at Layer 3, which allows for better sharing of services across multiple servers.B . With Layer 2 access, the default gateway for the servers can be...

September 20, 2019 No Comments READ MORE +

Drag the security prevision on the left to the appropriate Network module on the right

DRAG DROP Drag the security prevision on the left to the appropriate Network module on the right. View AnswerAnswer: Explanation: Reference: http://www.ciscopress.com/articles/article.asp?p=1073230&seqNum=2 http://www.cisco.com/en/US/docs/solutions/Enterprise/Security/SAFE_RG/chap5.html#wp1090913 http://www.cisco.com/en/US/docs/solutions/Enterprise/Security/SAFE_RG/chap3.html

September 20, 2019 No Comments READ MORE +

Which other authentication solution is used hand-in-hand with 802.1X to authenticate users for network access?

Cisco Identity-Based Networking Services relies heavily on the 802.1X protocol. Which other authentication solution is used hand-in-hand with 802.1X to authenticate users for network access?A . RADIUSB . LEAPC . IPsecD . TACACSE . ISAKMPView AnswerAnswer: A Explanation: Cisco Identity-Based Network Services The Cisco Identity-Based Network Services solution is a...

September 20, 2019 No Comments READ MORE +

Which three are considered as technical constraints when identifying network requirements? (Choose three.)

Which three are considered as technical constraints when identifying network requirements? (Choose three.)A . support for legacy applicationsB . bandwidth support for new applicationsC . limited budget allocationD . policy limitationsE . limited support staff to complete assessmentF . support for existing legacy equipmentG . limited timeframe to implementView AnswerAnswer:...

September 20, 2019 No Comments READ MORE +

Which four services does the architecture for Media Services contain? (Choose four.)

Which four services does the architecture for Media Services contain? (Choose four.)A . access servicesB . transport servicesC . storage servicesD . forwarding servicesE . session control servicesF . security servicesG . filtering servicesH . remote access servicesView AnswerAnswer: ABCE Explanation: An architecture framework for media services supports different models...

September 20, 2019 No Comments READ MORE +