Which benefit is offered by a cloud infrastructure deployment but is lacking in an on-premises deployment?

Which benefit is offered by a cloud infrastructure deployment but is lacking in an on-premises deployment?A . efficient scalabilityB . virtualizationC . storage capacityD . supported systemsView AnswerAnswer: A

March 26, 2021 No Comments READ MORE +

In an SD-WAN deployment, which action in the vSmart controller responsible for?

In an SD-WAN deployment, which action in the vSmart controller responsible for?A . handle, maintain, and gather configuration and status for nodes within the SD -WAN fabricB . onboard vEdge nodes into the SD-WAN fabricC . gather telemetry data from vEdge routersD . distribute policies that govern data forwarding performed...

March 25, 2021 No Comments READ MORE +

Which protocol is responsible for data plane forwarding in a Cisco SD -Access deployment?

Which protocol is responsible for data plane forwarding in a Cisco SD -Access deployment?A . VXLANB . IS-ISC . OSPFD . LISPView AnswerAnswer: A

March 25, 2021 No Comments READ MORE +

How to make DSW1 the primary root for VLAN 10?

Refer to the exhibit. How to make DSW1 the primary root for VLAN 10? (Choose two)A . DWS1(config-if)#spanning-tree port-priority 0B . DSW2(config-if)#spanning-tree port-priority 16C . DSW1(config-if)#interface gi1/3D . DSW2(config-if)#interface gi1/3E . DSW2(config-if)#spanning-tree port-priority 128View AnswerAnswer: A C (?)

March 25, 2021 No Comments READ MORE +

What are two device roles in Cisco SD-Access fabric? (Choose two)

What are two device roles in Cisco SD-Access fabric? (Choose two)A . core switchB . vBond controllerC . edge nodeD . access switchE . border nodeView AnswerAnswer: C E

March 25, 2021 No Comments READ MORE +

In a three-tier hierarchical campus network design, which action is a design best-practice for the core layer?

In a three-tier hierarchical campus network design, which action is a design best-practice for the core layer?A . provide QoS prioritization services such as marking, queueing, and classification for critical network trafficB . provide advanced network security features such as 802. IX, DHCP snooping, VACLs, and port securityC . provide...

March 25, 2021 No Comments READ MORE +

What is the differences between TCAM and the MAC address table?

What is the differences between TCAM and the MAC address table?A . Router prefix lookups happens in CAB . MAC address table lookups happen in TCAMC . The MAC address table supports partial matches. TCAM requires an exact matchD . The MAC address table is contained in CAE . ACL...

March 25, 2021 No Comments READ MORE +

What is an emulated machine that has dedicated compute, memory, and storage resources and a fully installed operating system?

What is an emulated machine that has dedicated compute, memory, and storage resources and a fully installed operating system?A . hostB . virtual machineC . containerD . mainframeView AnswerAnswer: B

March 25, 2021 No Comments READ MORE +

To configure the employee WLAN, which two Layer 2 security policies should be used?

A customer has completed the installation of a Wi-Fi 6 greenfield deployment at their new campus. They want to leverage Wi-Fi 6 enhanced speeds on the trusted employee WLAN. To configure the employee WLAN, which two Layer 2 security policies should be used? (Choose two)A . WPA (AES)B . WPA2...

March 25, 2021 No Comments READ MORE +

Which two actions, when applied in the LAN network segment, will facilitate Layer 3 CAPWAP discovery for lightweight AP? (Choose two)

Which two actions, when applied in the LAN network segment, will facilitate Layer 3 CAPWAP discovery for lightweight AP? (Choose two)A . Utilize DHCP option 17B . Utilize DHCP option 43C . Configure WLC IP address on LAN switchD . Enable port security on the switch portE . Configure an...

March 25, 2021 No Comments READ MORE +