What is the acceptable amount of one-way network delay for voice and video applications?
What is the acceptable amount of one-way network delay for voice and video applications?A . 300 bytesB . 1 secC . 150 msD . 500 msView AnswerAnswer: C Explanation: Delay Components in VoIP Networks The ITU's G.I 14 recommendation specifics that the one-way delay between endpoints should not exceed 150...
Which two statements about designing the Data Center Access layer are correct? (Choose two.)
Which two statements about designing the Data Center Access layer are correct? (Choose two.)A . Multiport NIC servers should each have their own IP address.B . Layer 3 connectivity should never be used in the access layer.C . Layer 2 connectivity is primarily implemented in the access layer.D . Multiport...
Which is the most important consideration when passing corporate traffic over the public Internet?
WAN backup over the Internet is often used to provide primary connection redundancy. Which is the most important consideration when passing corporate traffic over the public Internet?A . securityB . static versus dynamic routingC . bandwidthD . QoSE . latencyView AnswerAnswer: A Explanation: WAN Backup over the Internet Another alternative...
What should you do next?
You are the global administrator for an Azure Active Directory (Azure AD) tenant named adatum.com. From the Azure Active Directory blade, you assign the Conditional Access Administrator role to a user You need to ensure that Admin1 has just-in-time access as a conditional access administrator. What should you do next?A...
Which one of these statements describes why, from a design perspective, a managed VPN approach for enterprise teleworkers is most effective?
Which one of these statements describes why, from a design perspective, a managed VPN approach for enterprise teleworkers is most effective?A . A managed VPN solution uses a cost-effective, on-demand VPN tunnel back to the enterprise.B . This solution supports all teleworkers who do not require voice or video.C ....
Which of these statements is true concerning the data center access layer design?
Which of these statements is true concerning the data center access layer design?A . The access layer in the data center is typically built at Layer 3, which allows for better sharing of services across multiple servers.B . With Layer 2 access, the default gateway for the servers can be...
Drag the security prevision on the left to the appropriate Network module on the right
DRAG DROP Drag the security prevision on the left to the appropriate Network module on the right. View AnswerAnswer: Explanation: Reference: http://www.ciscopress.com/articles/article.asp?p=1073230&seqNum=2 http://www.cisco.com/en/US/docs/solutions/Enterprise/Security/SAFE_RG/chap5.html#wp1090913 http://www.cisco.com/en/US/docs/solutions/Enterprise/Security/SAFE_RG/chap3.html
Which other authentication solution is used hand-in-hand with 802.1X to authenticate users for network access?
Cisco Identity-Based Networking Services relies heavily on the 802.1X protocol. Which other authentication solution is used hand-in-hand with 802.1X to authenticate users for network access?A . RADIUSB . LEAPC . IPsecD . TACACSE . ISAKMPView AnswerAnswer: A Explanation: Cisco Identity-Based Network Services The Cisco Identity-Based Network Services solution is a...
Which three are considered as technical constraints when identifying network requirements? (Choose three.)
Which three are considered as technical constraints when identifying network requirements? (Choose three.)A . support for legacy applicationsB . bandwidth support for new applicationsC . limited budget allocationD . policy limitationsE . limited support staff to complete assessmentF . support for existing legacy equipmentG . limited timeframe to implementView AnswerAnswer:...
Which four services does the architecture for Media Services contain? (Choose four.)
Which four services does the architecture for Media Services contain? (Choose four.)A . access servicesB . transport servicesC . storage servicesD . forwarding servicesE . session control servicesF . security servicesG . filtering servicesH . remote access servicesView AnswerAnswer: ABCE Explanation: An architecture framework for media services supports different models...