Which technology achieves this goals?

An engineer wants to have a resilient access layer in data center so that switches on the access layer have separate physical connections to a pair of redundant distribution switches. Which technology achieves this goals?A . PaGPB . LACPC . VSLD . EVPCE . VSSF . ECMPView AnswerAnswer: E

September 16, 2018 No Comments READ MORE +

Seven sites are connected via OTV, what is the best practice to connect more than three sites using OTV?

Seven sites are connected via OTV, what is the best practice to connect more than three sites using OTV?A . Filter MAC address at the join interfaceB . Use multicast-enabled transportC . Use Unicast-only transportD . Configure one edge device for each data centreView AnswerAnswer: B

September 16, 2018 No Comments READ MORE +

What needs to be taken into account for optimal results?

EIGRP configured on access switch level. What needs to be taken into account for optimal results?A . Configure stub networksB . configuring switch-to-switchC . carry multiple VLANsD . fixed-configuration switchesView AnswerAnswer: A

September 15, 2018 No Comments READ MORE +

Which security feature can help prevent spoofed packets on the network?

Which security feature can help prevent spoofed packets on the network?A . uRPFB . ACLsC . DAID . DHCP spoofingView AnswerAnswer: A

September 14, 2018 No Comments READ MORE +

Which two design fulfill this requirement?

A network engineer designing an access layer that requires all uplinks to be active, furthermore, VLANs must span across the entire switch block. Which two design fulfill this requirement? (Choose two)A . Layer 2 Flex LinksB . Layer 2 loop-free inverted UC . Layer 2 loop squareD . Layer 2...

September 14, 2018 No Comments READ MORE +

Which two protocols support simple plaintext and MD5 authentication? (Choose two)

Which two protocols support simple plaintext and MD5 authentication? (Choose two)A . RIPB . IPv6C . EIGRPD . BGPE . OSPFView AnswerAnswer: AE Explanation: Simple password authentication (also called plain text authentication) - supported by Integrated-System to Integrated-System (IS-IS), Open Shortest Path First (OSPF) and Routing Information Protocol Version 2...

September 14, 2018 No Comments READ MORE +

At which layer in the ACI fabric are policies enforced?

At which layer in the ACI fabric are policies enforced?A . leafB . spineC . APICD . endpointView AnswerAnswer: C

September 13, 2018 1 Comment READ MORE +

Which two options regarding the Cisco TrustSec Security Group Tag are true? (Choose Two.)

Which two options regarding the Cisco TrustSec Security Group Tag are true? (Choose Two.)A . It is assigned by the Cisco ISE to the user or endpoint session upon loginB . Best practice dictates it should be statically created on the switchC . It is removed by the Cisco ISE...

September 11, 2018 No Comments READ MORE +

What needs to be configured to control unwanted transit traffic to not be routed to remote branches that have multiple WAN connections?

What needs to be configured to control unwanted transit traffic to not be routed to remote branches that have multiple WAN connections?A . route weightingB . route taggingC . route filteringD . route prioritisingView AnswerAnswer: C

September 10, 2018 No Comments READ MORE +

What QoS technology allows traffic to pass even though it has exceeded the bandwidth limit but will be queued later?

What QoS technology allows traffic to pass even though it has exceeded the bandwidth limit but will be queued later?A . ShapingB . PolicingC . Weighted Fair QueuingD . Low Latency QueuingView AnswerAnswer: A

September 10, 2018 No Comments READ MORE +