Which protocol is used in an in-band network and why?
Which protocol is used in an in-band network and why?A . UDP, because it is connectionlessB . SSH, because the username and password are encryptedC . Telnet, because the username and password are sent in clearD . MSDP, because it uses TCP as its transport protocolView AnswerAnswer: B
Which setting of the preemption delay timer minimizes the loss of traffic?
An HSRP design requirement states that preemption must be enabled for the active switch, which is a Cisco 4507R. Assume a boot time of 300 seconds. Which setting of the preemption delay timer minimizes the loss of traffic?A . 50 secondsB . 100 secondsC . 150 secondsD . 200 secondsView...
Which option can be implemented to manipulate the election of PIM DR to force multicast traffic to a certain path?
Which option can be implemented to manipulate the election of PIM DR to force multicast traffic to a certain path?A . Assign a lower PIM DR priority to the PIM DR interface.B . Assign a lower IP address to the PIM DR interface.C . Assign a higher PIM DR priority...
What firewall design is the best fit for this scenario?
Refer to the exhibit. A customer requires a web application implementation, but the web server has communication only to the application server and users, and the database server has communication only to the application server. What firewall design is the best fit for this scenario?A . transparent mode with the...
What is the maximum number of neighbors that a router should have in an OSPF area?
What is the maximum number of neighbors that a router should have in an OSPF area?A . 5B . 30C . 60D . 99View AnswerAnswer: C
Which protocol should be run on the LAN side of two edge routers (that are terminating primary and backup WAN circuits) to provide quick failover in case of primary WAN circuit failure?
Which protocol should be run on the LAN side of two edge routers (that are terminating primary and backup WAN circuits) to provide quick failover in case of primary WAN circuit failure?A . VTPB . STPC . VRRPD . RIPView AnswerAnswer: C
Which algorithm does IS-IS use to determine the shortest path through a network?
Which algorithm does IS-IS use to determine the shortest path through a network?A . Bellman-Ford routing algorithmB . Johnson's algorithmC . Dijkstra's algorithmD . Floyd-Warshall algorithmView AnswerAnswer: C
Which option lists the EIGRP minimum timer settings for hello and dead timers in seconds?
Which option lists the EIGRP minimum timer settings for hello and dead timers in seconds?A . 4 and 6B . 2 and 4C . 2 and 6D . both 6View AnswerAnswer: C
Which VPN technology is tunnel-less?
Which VPN technology is tunnel-less?A . GET VPNB . DMVPNC . MPLSD . IPsec VPNView AnswerAnswer: A
For multicast traffic, where must the filtering be placed to fulfill that requirement?
Refer to the exhibit. The network engineer wants to ensure that receiver A does not receive traffic from the video conference. For multicast traffic, where must the filtering be placed to fulfill that requirement?A . R1B . Video ConferenceC . AD . S1E . R2View AnswerAnswer: D