Which technology achieves this goals?
An engineer wants to have a resilient access layer in data center so that switches on the access layer have separate physical connections to a pair of redundant distribution switches. Which technology achieves this goals?A . PaGPB . LACPC . VSLD . EVPCE . VSSF . ECMPView AnswerAnswer: E
Seven sites are connected via OTV, what is the best practice to connect more than three sites using OTV?
Seven sites are connected via OTV, what is the best practice to connect more than three sites using OTV?A . Filter MAC address at the join interfaceB . Use multicast-enabled transportC . Use Unicast-only transportD . Configure one edge device for each data centreView AnswerAnswer: B
What needs to be taken into account for optimal results?
EIGRP configured on access switch level. What needs to be taken into account for optimal results?A . Configure stub networksB . configuring switch-to-switchC . carry multiple VLANsD . fixed-configuration switchesView AnswerAnswer: A
Which security feature can help prevent spoofed packets on the network?
Which security feature can help prevent spoofed packets on the network?A . uRPFB . ACLsC . DAID . DHCP spoofingView AnswerAnswer: A
Which two design fulfill this requirement?
A network engineer designing an access layer that requires all uplinks to be active, furthermore, VLANs must span across the entire switch block. Which two design fulfill this requirement? (Choose two)A . Layer 2 Flex LinksB . Layer 2 loop-free inverted UC . Layer 2 loop squareD . Layer 2...
Which two protocols support simple plaintext and MD5 authentication? (Choose two)
Which two protocols support simple plaintext and MD5 authentication? (Choose two)A . RIPB . IPv6C . EIGRPD . BGPE . OSPFView AnswerAnswer: AE Explanation: Simple password authentication (also called plain text authentication) - supported by Integrated-System to Integrated-System (IS-IS), Open Shortest Path First (OSPF) and Routing Information Protocol Version 2...
At which layer in the ACI fabric are policies enforced?
At which layer in the ACI fabric are policies enforced?A . leafB . spineC . APICD . endpointView AnswerAnswer: C
Which two options regarding the Cisco TrustSec Security Group Tag are true? (Choose Two.)
Which two options regarding the Cisco TrustSec Security Group Tag are true? (Choose Two.)A . It is assigned by the Cisco ISE to the user or endpoint session upon loginB . Best practice dictates it should be statically created on the switchC . It is removed by the Cisco ISE...
What needs to be configured to control unwanted transit traffic to not be routed to remote branches that have multiple WAN connections?
What needs to be configured to control unwanted transit traffic to not be routed to remote branches that have multiple WAN connections?A . route weightingB . route taggingC . route filteringD . route prioritisingView AnswerAnswer: C
What QoS technology allows traffic to pass even though it has exceeded the bandwidth limit but will be queued later?
What QoS technology allows traffic to pass even though it has exceeded the bandwidth limit but will be queued later?A . ShapingB . PolicingC . Weighted Fair QueuingD . Low Latency QueuingView AnswerAnswer: A