Which two routing protocols converge most quickly? (Choose two.)
Which two routing protocols converge most quickly? (Choose two.)A . RIPv1B . RIPv2C . BGPD . OSPFE . EIGRPView AnswerAnswer: D,E
Which statement describes an advantage of the Layer 2 access model over the Layer 3 access model in the data center?
Which statement describes an advantage of the Layer 2 access model over the Layer 3 access model in the data center?A . It enables NIC teaming.B . It removes STP dependency.C . It increases scalability.D . It decreases convergence.View AnswerAnswer: A
Which first-hop redundancy protocol dynamically distributes traffic across multiple gateways?
Which first-hop redundancy protocol dynamically distributes traffic across multiple gateways?A . HSRPB . GLBPC . VRRPD . IBGPView AnswerAnswer: B
What IPv4 addressing technique is used for proper address planning to reduce the number of entries in a routing table?
What IPv4 addressing technique is used for proper address planning to reduce the number of entries in a routing table?A . filteringB . tunnelingC . summarizationD . translationE . supernettingView AnswerAnswer: C
Which statement is true concerning the data center distribution (aggregation) layer design?
Which statement is true concerning the data center distribution (aggregation) layer design?A . With Layer 3 at the aggregation layer, the physical loops in the topology must still be managed by STC . The boundary between Layer 2 and Layer 3 must reside in the multilayer switches, independent of any...
What two components are used when creating an endpoint's modified EUI-64 format IPv6 address? (Choose two.)
What two components are used when creating an endpoint's modified EUI-64 format IPv6 address? (Choose two.)A . IPv6 PrefixB . 64-bit MAC addressC . 48-bit MAC addressD . IPv4 AddressE . Link Local SuffixView AnswerAnswer: A,C
Application servers require load balancing and security services. Where in the data center network should these services be provisioned?
Application servers require load balancing and security services. Where in the data center network should these services be provisioned?A . coreB . aggregationC . Layer 3 accessD . distributionView AnswerAnswer: B
What three primary sources of information are needed to perform a network audit? (Choose three.)
What three primary sources of information are needed to perform a network audit? (Choose three.)A . existing documentationB . new documentationC . existing network management softwareD . new network management toolsE . management personnelF . technical personnelView AnswerAnswer: A,C,D
With deterministic Wireless LAN Controller redundancy design, the different options available to the designer have their own strengths. Which statement is an example of such a strength?
With deterministic Wireless LAN Controller redundancy design, the different options available to the designer have their own strengths. Which statement is an example of such a strength?A . Dynamic load balancing, or salt-and-pepper access point design, avoids the potential impact of oversubscription on aggregate network performance.B . N+N redundancy configuration...
In which operation mode does the AP act as a dedicated sensor for location-based and intrusion detection services?
In which operation mode does the AP act as a dedicated sensor for location-based and intrusion detection services?A . monitor modeB . promiscuous modeC . discovery modeD . sniffer modeView AnswerAnswer: A