Which two routing protocols converge most quickly? (Choose two.)

Which two routing protocols converge most quickly? (Choose two.)A . RIPv1B . RIPv2C . BGPD . OSPFE . EIGRPView AnswerAnswer: D,E

July 21, 2018 No Comments READ MORE +

Which statement describes an advantage of the Layer 2 access model over the Layer 3 access model in the data center?

Which statement describes an advantage of the Layer 2 access model over the Layer 3 access model in the data center?A . It enables NIC teaming.B . It removes STP dependency.C . It increases scalability.D . It decreases convergence.View AnswerAnswer: A

July 21, 2018 No Comments READ MORE +

Which first-hop redundancy protocol dynamically distributes traffic across multiple gateways?

Which first-hop redundancy protocol dynamically distributes traffic across multiple gateways?A . HSRPB . GLBPC . VRRPD . IBGPView AnswerAnswer: B

July 9, 2018 No Comments READ MORE +

What IPv4 addressing technique is used for proper address planning to reduce the number of entries in a routing table?

What IPv4 addressing technique is used for proper address planning to reduce the number of entries in a routing table?A . filteringB . tunnelingC . summarizationD . translationE . supernettingView AnswerAnswer: C

July 9, 2018 No Comments READ MORE +

Which statement is true concerning the data center distribution (aggregation) layer design?

Which statement is true concerning the data center distribution (aggregation) layer design?A . With Layer 3 at the aggregation layer, the physical loops in the topology must still be managed by STC . The boundary between Layer 2 and Layer 3 must reside in the multilayer switches, independent of any...

July 1, 2018 No Comments READ MORE +

What two components are used when creating an endpoint's modified EUI-64 format IPv6 address? (Choose two.)

What two components are used when creating an endpoint's modified EUI-64 format IPv6 address? (Choose two.)A . IPv6 PrefixB . 64-bit MAC addressC . 48-bit MAC addressD . IPv4 AddressE . Link Local SuffixView AnswerAnswer: A,C

June 22, 2018 No Comments READ MORE +

Application servers require load balancing and security services. Where in the data center network should these services be provisioned?

Application servers require load balancing and security services. Where in the data center network should these services be provisioned?A . coreB . aggregationC . Layer 3 accessD . distributionView AnswerAnswer: B

May 30, 2018 No Comments READ MORE +

What three primary sources of information are needed to perform a network audit? (Choose three.)

What three primary sources of information are needed to perform a network audit? (Choose three.)A . existing documentationB . new documentationC . existing network management softwareD . new network management toolsE . management personnelF . technical personnelView AnswerAnswer: A,C,D

May 19, 2018 No Comments READ MORE +

With deterministic Wireless LAN Controller redundancy design, the different options available to the designer have their own strengths. Which statement is an example of such a strength?

With deterministic Wireless LAN Controller redundancy design, the different options available to the designer have their own strengths. Which statement is an example of such a strength?A . Dynamic load balancing, or salt-and-pepper access point design, avoids the potential impact of oversubscription on aggregate network performance.B . N+N redundancy configuration...

May 16, 2018 No Comments READ MORE +

In which operation mode does the AP act as a dedicated sensor for location-based and intrusion detection services?

In which operation mode does the AP act as a dedicated sensor for location-based and intrusion detection services?A . monitor modeB . promiscuous modeC . discovery modeD . sniffer modeView AnswerAnswer: A

May 6, 2018 No Comments READ MORE +