Which network virtualization technology provides logical isolation of network traffic at Layer 3?
Which network virtualization technology provides logical isolation of network traffic at Layer 3?A . VSSB . VLANC . VRF-LiteD . MECView AnswerAnswer: C
What technology can allow traffic to be routed in a more informed manner to utilize transport characteristics such as delay, loss, or link load?
Recently, the WAN links between the headquarters and branch offices have been slow under peak congestion, yet multiple alternate WAN paths exist that are not always congested. What technology can allow traffic to be routed in a more informed manner to utilize transport characteristics such as delay, loss, or link...
distribution uplink?
Which option is the Cisco recommendation for data oversubscription for access ports on the access-to distribution uplink?A . 4 to 1B . 20 to 1C . 16 to 1D . 10 to 1View AnswerAnswer: B
What is the most important consideration when selecting a VPN termination device?
What is the most important consideration when selecting a VPN termination device?A . CPU cycles per secondB . VPN sessions per interfaceC . Packets per secondD . Bits per secondView AnswerAnswer: C
What is the correct oversubscription ratio between aggregation and core layer? (E)
What is the correct oversubscription ratio between aggregation and core layer? (E)A . 1 to 2B . 1 to 4C . 1 to 8D . 1 to 10View AnswerAnswer: B Explanation: Network oversubscription refers to a point of bandwidth consolidation where the ingress bandwidth is greater than the egress bandwidth....
Drag & Drop question with regards to Cisco Application-Centric Infrastructure ACI
DRAG DROP Drag & Drop question with regards to Cisco Application-Centric Infrastructure ACI. View AnswerAnswer:
Which of the following facts must be considered when designing for IP telephony within an Enterprise Campus network?
Which of the following facts must be considered when designing for IP telephony within an Enterprise Campus network?A . Because the IP phone is a three-port switch, IP telephony extends the network edge, impacting the Distribution layer.B . Video and voice are alike in being bursty and bandwidth intensive, and...
What feature is required to stop multicast traffic from being broadcasted on the access layer switches?
Multicast has been configured and enabled within an Enterprise network. PIM spare-mode has been enabled on all VLANs. What feature is required to stop multicast traffic from being broadcasted on the access layer switches?A . Multicast boundary filterB . PIM Dense-ModeC . IGMP snoopingD . Dynamic ARP inspectionView AnswerAnswer: C...
Which three statements about the first subnet that you create are true?
You are assigned the network of 192.168.1.0/24. You want to split the network into four subnets that are all the same size. Which three statements about the first subnet that you create are true? (Choose three.)A . The subnet mask is 255.255.255.192B . The last host IP address is 192.168.164C...
Which option helps to avoid rogue route injection, unwanted peering, and malicious BGP activities?
A network engineer must reduce the security risks on a BGP network. Which option helps to avoid rogue route injection, unwanted peering, and malicious BGP activities?A . Apply route maps and policies in route redistribution events.B . Apply MD5 authentication between all BGP peers.C . Encrypt all traffic with IPsec...