Which two features can protect and mitigate the damage of the attacks?
A Layer 2 switch in the network has recently started broadcasting traffic out of every port and is impacting network performance. The engineering department determines that a MAC overflow attack is the cause. Which two features can protect and mitigate the damage of the attacks? (Choose two.)A . Storm ControlB...
Which feature can be used in the Cisco Nexus 7000 to create a snapshot of the current configuration?
Which feature can be used in the Cisco Nexus 7000 to create a snapshot of the current configuration?A . Cisco FabricPathB . HSRPC . RollbackD . vPCView AnswerAnswer: C
What is an advantage of having an out-of-band management?
What is an advantage of having an out-of-band management?A . It is less expensive to have an out-of-band management.B . Network devices can still be managed, even in case of network outage.C . There is no separation between the production network and the management network.D . SSH protocol must be...
Which routing protocol provides the fastest convergence and greatest flexibility within a campus environment?
Which routing protocol provides the fastest convergence and greatest flexibility within a campus environment?A . OSPFB . IS-ISC . BGPD . EIGRPView AnswerAnswer: D
What is the purpose of an OTV edge device?
What is the purpose of an OTV edge device?A . connect to other data centersB . connect to the access layerC . connect to the end usersD . connect to mobile devicesView AnswerAnswer: A Explanation: https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Data_Center/DCI/whitepaper/DCI3_OTV_Intro/DCI_1.html "Edge Device The edge device (Figure 1-1) performs OTV functions: it receives the Layer...
Which option is a benefit of the vPC+ feature?
Which option is a benefit of the vPC+ feature?A . Cisco FabricPath is not required in the network domain.B . This feature provides fault domain separation.C . Nonfabric devices, such as a server or a classic Ethernet switch, can be connected to two fabric switches that are configured with vPE...
Which option is a primary requirement for the deployment of an IPv6-enabled network via the native method (dual-stack model) within the enterprise campus environment?
Which option is a primary requirement for the deployment of an IPv6-enabled network via the native method (dual-stack model) within the enterprise campus environment?A . hardware-based switching support for IPv6 forwarding on all campus switchesB . restriction of IPv6-enabled devices to the core layerC . manual implementation of tunneling between...
What deployment model should be used if the team requests that the NAC be logically inline with clients?
The network engineering team is interested in deploying NAC within the enterprise network to enhance security. What deployment model should be used if the team requests that the NAC be logically inline with clients?A . Layer 2 in-bandB . Layer 2 out-of-bandC . Layer 3 in-bandD . Layer 3 out-of-bandView...
Which two ways to manage scalability issues inside an IBGP domain with 20 or more routers are recommended? (Choose two.)
Which two ways to manage scalability issues inside an IBGP domain with 20 or more routers are recommended? (Choose two.)A . Configure route reflectors.B . Use OSPF instead of EIGRP as an underlying routing protocol.C . Create a full mesh at Layer 1.D . Configure confederations.E . Configure static routes...
Which VPN technology should be used?
A network manager wants to securely connect a new remote site to the existing headquarters site using a VPN technology that meets security requirements. Which VPN technology should be used?A . GREB . IPsecC . remote-access VPND . L2TP VPNView AnswerAnswer: B