Which technology provides a layer 2 loop free and does not contain a port state named "Blocking"?
Which technology provides a layer 2 loop free and does not contain a port state named "Blocking"?A . RPVST+B . PVST+C . MSTD . CSTView AnswerAnswer: A
Which VPN technology supports dynamic creation of spoke-to-spoke VPN tunnels to provide a scalable design?
Which VPN technology supports dynamic creation of spoke-to-spoke VPN tunnels to provide a scalable design?A . IPsecB . GRE over IPsecC . DMVPND . GREView AnswerAnswer: C
Which two actions can improve network performance?
A network design team is experiencing sustained congestion on access and distribution uplinks. QoS has already been implemented and optimized, and it is no longer effective in ensuring optimal network performance. Which two actions can improve network performance? (Choose two)A . Reconfigure QoS based on the IntServ modelB . Configure...
What is the most important consideration when selecting a VPN termination device?
What is the most important consideration when selecting a VPN termination device?A . CPU cycles per secondB . VPN sessions per interfaceC . Packets per secondD . Bits per secondView AnswerAnswer: C
Which protocol is use by DMVPN to achive this goal?
A network manager wants all remote sites to be designed to communicate dynamically with each other using DMVPN technology without requiring much configuration on the spoke routers. Which protocol is use by DMVPN to achive this goal?A . GREB . NHRPC . SSHD . ARPView AnswerAnswer: B
What is an advantage of using the VPC feature in data center environment?
What is an advantage of using the VPC feature in data center environment?A . All available uplinks bandwidth is used.B . FHRP is not requiredC . A single IP is used for management of both devicesD . The two switches form a single control planeView AnswerAnswer: A
What are two point-to-multipoint overlay tunneling strategies that are used in transitioning to IPv6 (choose two)?
What are two point-to-multipoint overlay tunneling strategies that are used in transitioning to IPv6 (choose two)?A . ISATAPB . 6to4C . Nat64D . Dual-stackView AnswerAnswer: A, B Explanation: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/interface/configuration/xe-3s/ir-xe-3s-book/ip6-6to4-tunlsxe.html "The key difference between automatic 6to4 tunnels and manually configured tunnels is that the tunnel is not point-to-point; it is point-to-multipoint."...
Which 2 options must be considered?
An engineer is designing a multi cluster BGP network, each cluster has two Route Reflectors and four Route Reflector clients. Which 2 options must be considered? (Choose two)A . Clients from all clusters should peer with all Route ReflectorsB . All Route Reflectors should be non-client peers in a partially...
Which two ways to support secure transport of multicast traffic are true? (Choose two.)
Which two ways to support secure transport of multicast traffic are true? (Choose two.)A . Use spoke-to-spoke design.B . Use IPsec over GRE tunnel.C . Use GET VPE . Use NBMA instead of broadcast.F . Disable encryption for multicast traffic.View AnswerAnswer: B, C Explanation: GET VPN = Group Encrypted Transport...
For which engine an IPS can use its reputation awareness? (Choose two)
For which engine an IPS can use its reputation awareness? (Choose two)A . Reputation filteringB . Reputation subscriptionsC . Correlation rulesD . Global correlation inspectionView AnswerAnswer: A, C Explanation: https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-guide-v60/Correlation_Policies.html Correlation rules -> Connection Tracker -> URL Reputation