Which two mechanisms are important to establish and maintaining QOS architecture?

An engineer has an implemented a QOS architecture that requires a signaling protocol to tell routers which flows of packets require special treatment. Which two mechanisms are important to establish and maintaining QOS architecture? (choose two)A . classificationB . TaggingC . packet schedulingD . admission controlE . resource reservationView AnswerAnswer:...

December 27, 2018 No Comments READ MORE +

OTV relies on which underlying protocol?

OTV relies on which underlying protocol?A . EIGRPB . IS-ISC . OSPFD . BGPView AnswerAnswer: B

December 27, 2018 No Comments READ MORE +

What location are security policies enforced in ACI?

What location are security policies enforced in ACI?A . leafB . spineC . coreD . distributionView AnswerAnswer: A

December 27, 2018 No Comments READ MORE +

Which OSPF option can you configure to connect two parts of a partitioned backbone through a nonbackbone area?

Which OSPF option can you configure to connect two parts of a partitioned backbone through a nonbackbone area?A . route summarizationB . a virtual linkC . an NSSAD . a static OSPF neighborView AnswerAnswer: B

December 26, 2018 No Comments READ MORE +

What is the outcome when RPF check passes successfully?

What is the outcome when RPF check passes successfully?A . Packet is dropped because it arrived on the interface that used to forward the packet back to source.B . Packet is dropped because it arrived on the interface that used to forward the packet back to destination.C . Packet is...

December 26, 2018 No Comments READ MORE +

Which two BGP attributes can be set with outbound policy to manipulate inbound traffic, if honoured by the remote Autonomous system? (Choose two)

Which two BGP attributes can be set with outbound policy to manipulate inbound traffic, if honoured by the remote Autonomous system? (Choose two)A . Multi-exit discriminatorB . AS pathC . Local PreferenceD . WeightView AnswerAnswer: A, B

December 25, 2018 No Comments READ MORE +

Which two capabilities are the most important to consider when assessing the headend device's scalability?

A network consultant is designing an enterprise network that includes an IPsec headend termination device. Which two capabilities are the most important to consider when assessing the headend device's scalability? (Choose two)A . Packets per second processing capabilityB . CPU capabilitiesC . Number of tunnels that can be aggregatedD ....

December 25, 2018 No Comments READ MORE +

Which statements are true regarding the first subnet?

You are given the 192.168.2.0/24 network and you should divide it in 4 subnets. Which statements are true regarding the first subnet? (Choose tree)A . 62 hosts in subnetB . 255.255.255.192 maskC . 192.168.2.62 last hostD . 255.255.255.128 maskE . 126 hosts in subnetF . 192.168.2.126 last hostView AnswerAnswer: A,...

December 24, 2018 No Comments READ MORE +

Which technology should a network designer combine with VSS to ensure a loop free topology with optimal convergence time?

Which technology should a network designer combine with VSS to ensure a loop free topology with optimal convergence time?A . PortfastB . UplinkFastC . RPVST +D . Multichassis EtherChannelView AnswerAnswer: D

December 23, 2018 No Comments READ MORE +

What is the minimum number of APICs requirement for a production ACI Fabric to continue to operate?

When APIC is down on cluster device ... What is the minimum number of APICs requirement for a production ACI Fabric to continue to operate?A . 1B . 2C . 3D . 4View AnswerAnswer: C Explanation: From Designing for Cisco Network Service Architecture Fourth Edition: The recommended minimum sizing has...

December 23, 2018 No Comments READ MORE +