Which network virtualization technology provides logical isolation of network traffic at Layer 3?

Which network virtualization technology provides logical isolation of network traffic at Layer 3?A . VSSB . VLANC . VRF-LiteD . MECView AnswerAnswer: C

April 17, 2018 No Comments READ MORE +

What technology can allow traffic to be routed in a more informed manner to utilize transport characteristics such as delay, loss, or link load?

Recently, the WAN links between the headquarters and branch offices have been slow under peak congestion, yet multiple alternate WAN paths exist that are not always congested. What technology can allow traffic to be routed in a more informed manner to utilize transport characteristics such as delay, loss, or link...

April 17, 2018 No Comments READ MORE +

distribution uplink?

Which option is the Cisco recommendation for data oversubscription for access ports on the access-to distribution uplink?A . 4 to 1B . 20 to 1C . 16 to 1D . 10 to 1View AnswerAnswer: B

April 16, 2018 No Comments READ MORE +

What is the most important consideration when selecting a VPN termination device?

What is the most important consideration when selecting a VPN termination device?A . CPU cycles per secondB . VPN sessions per interfaceC . Packets per secondD . Bits per secondView AnswerAnswer: C

April 16, 2018 No Comments READ MORE +

What is the correct oversubscription ratio between aggregation and core layer? (E)

What is the correct oversubscription ratio between aggregation and core layer? (E)A . 1 to 2B . 1 to 4C . 1 to 8D . 1 to 10View AnswerAnswer: B Explanation: Network oversubscription refers to a point of bandwidth consolidation where the ingress bandwidth is greater than the egress bandwidth....

April 16, 2018 No Comments READ MORE +

Drag & Drop question with regards to Cisco Application-Centric Infrastructure ACI

DRAG DROP Drag & Drop question with regards to Cisco Application-Centric Infrastructure ACI. View AnswerAnswer:

April 14, 2018 No Comments READ MORE +

Which of the following facts must be considered when designing for IP telephony within an Enterprise Campus network?

Which of the following facts must be considered when designing for IP telephony within an Enterprise Campus network?A . Because the IP phone is a three-port switch, IP telephony extends the network edge, impacting the Distribution layer.B . Video and voice are alike in being bursty and bandwidth intensive, and...

April 13, 2018 No Comments READ MORE +

What feature is required to stop multicast traffic from being broadcasted on the access layer switches?

Multicast has been configured and enabled within an Enterprise network. PIM spare-mode has been enabled on all VLANs. What feature is required to stop multicast traffic from being broadcasted on the access layer switches?A . Multicast boundary filterB . PIM Dense-ModeC . IGMP snoopingD . Dynamic ARP inspectionView AnswerAnswer: C...

April 12, 2018 No Comments READ MORE +

Which three statements about the first subnet that you create are true?

You are assigned the network of 192.168.1.0/24. You want to split the network into four subnets that are all the same size. Which three statements about the first subnet that you create are true? (Choose three.)A . The subnet mask is 255.255.255.192B . The last host IP address is 192.168.164C...

April 12, 2018 No Comments READ MORE +

Which option helps to avoid rogue route injection, unwanted peering, and malicious BGP activities?

A network engineer must reduce the security risks on a BGP network. Which option helps to avoid rogue route injection, unwanted peering, and malicious BGP activities?A . Apply route maps and policies in route redistribution events.B . Apply MD5 authentication between all BGP peers.C . Encrypt all traffic with IPsec...

April 11, 2018 No Comments READ MORE +