A network engineer must collect application-level information passing through a router. What two tools can provide this information? (Choose two.)

A network engineer must collect application-level information passing through a router. What two tools can provide this information? (Choose two.)A . NBARB . CiscoWorksC . SNMP collectorD . NetFlow collectorE . SyslogView AnswerAnswer: A,D

December 10, 2018 No Comments READ MORE +

What are the three modes of unicast reverse path forwarding? (Choose three.)

What are the three modes of unicast reverse path forwarding? (Choose three.)A . strictB . looseC . VRFD . globalE . PIMF . localView AnswerAnswer: A,B,C

December 1, 2018 No Comments READ MORE +

Which three layers comprise the traditional hierarchical model? (Choose three.)

Which three layers comprise the traditional hierarchical model? (Choose three.)A . core layerB . distribution layerC . access layerD . aggregation layerE . network layerF . Internet layerView AnswerAnswer: A,B,C

November 26, 2018 No Comments READ MORE +

A dynamically routed private line and a statically routed IPsec tunnel connect two offices. What routing configuration prefers the IPsec tunnel only in the event of a private line failure?

A dynamically routed private line and a statically routed IPsec tunnel connect two offices. What routing configuration prefers the IPsec tunnel only in the event of a private line failure?A . floating static entryB . EIGRP varianceC . bandwidth metricD . OSPF maximum pathsView AnswerAnswer: A

November 26, 2018 No Comments READ MORE +

Which Cisco security mechanism has the attributes listed below?

Which Cisco security mechanism has the attributes listed below? • it is a sensor appliance • it searches for potential attacks by capturing and analyzing traffic • it is a "purpose-built device" • it is installed passively • it introduces no delay or overheadA . IKEB . PIXC . HIPSD...

November 23, 2018 No Comments READ MORE +

Which two mechanisms are used by distance vector protocols to prevent routing loops? (Choose two.)

Which two mechanisms are used by distance vector protocols to prevent routing loops? (Choose two.)A . split horizonB . route summarizationC . route poisoningD . tuned timersView AnswerAnswer: A,C

November 21, 2018 No Comments READ MORE +

What are three valid methods of gathering information about an existing data network? (Choose three.)

What are three valid methods of gathering information about an existing data network? (Choose three.)A . Use organizational input.B . Perform a traffic analysis.C . Analyze the user-mapping of a running application.D . Perform a packet-level audit to verify carrier service guarantees.E . Perform a network audit to gather more...

November 2, 2018 No Comments READ MORE +

Which Cisco Wireless LAN Controller interface is used for out-of-band management?

Which Cisco Wireless LAN Controller interface is used for out-of-band management?A . service portB . management portC . controller portD . virtual portView AnswerAnswer: A

October 28, 2018 No Comments READ MORE +

WAN backup over the Internet is often used to provide primary connection redundancy. Which is the most important consideration when passing corporate traffic over the public Internet?

WAN backup over the Internet is often used to provide primary connection redundancy. Which is the most important consideration when passing corporate traffic over the public Internet?A . securityB . static versus dynamic routingC . bandwidthD . QoSE . latencyView AnswerAnswer: A

October 28, 2018 No Comments READ MORE +

Which option is a benefit of the modular approach to network design?

Which option is a benefit of the modular approach to network design?A . higher availabilityB . repeatable scalabilityC . increased securityD . improved resiliencyView AnswerAnswer: B

October 21, 2018 No Comments READ MORE +