A network engineer must collect application-level information passing through a router. What two tools can provide this information? (Choose two.)
A network engineer must collect application-level information passing through a router. What two tools can provide this information? (Choose two.)A . NBARB . CiscoWorksC . SNMP collectorD . NetFlow collectorE . SyslogView AnswerAnswer: A,D
What are the three modes of unicast reverse path forwarding? (Choose three.)
What are the three modes of unicast reverse path forwarding? (Choose three.)A . strictB . looseC . VRFD . globalE . PIMF . localView AnswerAnswer: A,B,C
Which three layers comprise the traditional hierarchical model? (Choose three.)
Which three layers comprise the traditional hierarchical model? (Choose three.)A . core layerB . distribution layerC . access layerD . aggregation layerE . network layerF . Internet layerView AnswerAnswer: A,B,C
A dynamically routed private line and a statically routed IPsec tunnel connect two offices. What routing configuration prefers the IPsec tunnel only in the event of a private line failure?
A dynamically routed private line and a statically routed IPsec tunnel connect two offices. What routing configuration prefers the IPsec tunnel only in the event of a private line failure?A . floating static entryB . EIGRP varianceC . bandwidth metricD . OSPF maximum pathsView AnswerAnswer: A
Which Cisco security mechanism has the attributes listed below?
Which Cisco security mechanism has the attributes listed below? • it is a sensor appliance • it searches for potential attacks by capturing and analyzing traffic • it is a "purpose-built device" • it is installed passively • it introduces no delay or overheadA . IKEB . PIXC . HIPSD...
Which two mechanisms are used by distance vector protocols to prevent routing loops? (Choose two.)
Which two mechanisms are used by distance vector protocols to prevent routing loops? (Choose two.)A . split horizonB . route summarizationC . route poisoningD . tuned timersView AnswerAnswer: A,C
What are three valid methods of gathering information about an existing data network? (Choose three.)
What are three valid methods of gathering information about an existing data network? (Choose three.)A . Use organizational input.B . Perform a traffic analysis.C . Analyze the user-mapping of a running application.D . Perform a packet-level audit to verify carrier service guarantees.E . Perform a network audit to gather more...
Which Cisco Wireless LAN Controller interface is used for out-of-band management?
Which Cisco Wireless LAN Controller interface is used for out-of-band management?A . service portB . management portC . controller portD . virtual portView AnswerAnswer: A
WAN backup over the Internet is often used to provide primary connection redundancy. Which is the most important consideration when passing corporate traffic over the public Internet?
WAN backup over the Internet is often used to provide primary connection redundancy. Which is the most important consideration when passing corporate traffic over the public Internet?A . securityB . static versus dynamic routingC . bandwidthD . QoSE . latencyView AnswerAnswer: A
Which option is a benefit of the modular approach to network design?
Which option is a benefit of the modular approach to network design?A . higher availabilityB . repeatable scalabilityC . increased securityD . improved resiliencyView AnswerAnswer: B