Which of these components does LACP use to create the system ID?

A network designer is working with a company to improve convergence at the Layer 2 control plane and decides to use LACP. Which of these components does LACP use to create the system ID?A . LACP system priority and switch MAC addressB . LACP port priority and switch MAC addressC...

March 14, 2019 No Comments READ MORE +

What limitations exist in this design, given that the access layer devices are expected to steadily increase by two devices per week for the next year?

Refer to the exhibit. What limitations exist in this design, given that the access layer devices are expected to steadily increase by two devices per week for the next year?A . scalabilityB . serviceabilityC . redundancyD . resiliencyView AnswerAnswer: A

March 14, 2019 No Comments READ MORE +

Which L3VPN feature needs to be configured on the PE routers to support the design requirement?

Refer to the exhibit. You are designing an IPv4 unicast Layer 3 VPN load-balancing solution. Which L3VPN feature needs to be configured on the PE routers to support the design requirement?A . nonmatching route distinguishersB . matching route target valuesC . disable split horizon on PE2 and PE3D . matching...

March 13, 2019 No Comments READ MORE +

What will be configured on the links between the networks to support their design requirements?

A company requests that you consult with them regarding the design of their production, development, and test environments. They indicate that the environments must communicate effectively, but they must be kept separate due to the inherent failures on the development network. What will be configured on the links between the...

March 12, 2019 No Comments READ MORE +

How would you adjust the design to improve convergence on the network?

Refer to the exhibit. How would you adjust the design to improve convergence on the network?A . Add an intra-POP link between routers 1A and 1B, and enable IP LFA FRC . Use an IP SLA between the end stations to detect path failures.D . Enable SSO-NSF on routers 1A...

March 11, 2019 No Comments READ MORE +

Which measure helps protect encrypted user traffic from replay attacks?

You are designing a Group Encrypted Transport Virtual Private Network solution consisting of 30 group members. Which measure helps protect encrypted user traffic from replay attacks?A . counter-based anti-replayB . time-based anti-replayC . nonce payloadD . RSA-encrypted nonceE . digital certificatesView AnswerAnswer: B

March 10, 2019 No Comments READ MORE +

Which technology would allow for the restore of a network connection without informing the Layer 3 protocol?

A network designer wants to improve a company network design due to multiple network crashes. Which technology would allow for the restore of a network connection without informing the Layer 3 protocol?A . Bidirectional Forwarding DetectionB . automatic protection switchingC . UniDirectional Link DetectionD . Ethernet OAMView AnswerAnswer: B

March 9, 2019 No Comments READ MORE +

What three key performance indicators would you use to track media quality?

You are identifying performance management requirements for a VoIP migration. What three key performance indicators would you use to track media quality? (Choose three.)A . delayB . trunk group usageC . jitterD . packet lossE . call processing (call detail records)F . call processing (performance counters)G . echoH . crosstalkView...

March 7, 2019 No Comments READ MORE +

You have been tasked to create a Layer 2 network design that uses vPC to provide resiliency and avoid loops. vPC removes Layer 2 loops while providing redundancy through which mechanism?

You have been tasked to create a Layer 2 network design that uses vPC to provide resiliency and avoid loops. vPC removes Layer 2 loops while providing redundancy through which mechanism?A . dual-active detectionB . address synchronizationC . strict forwarding rulesD . Bridge AssuranceView AnswerAnswer: C

March 7, 2019 No Comments READ MORE +

From a design perspective, what was not taken into account prior to implementing the solution?

After the recent implementation of a new design that incorporated GRE tunnels into the network, the network operations staff is seeing the following syslog message in multiple routers on the network - %TUN-5-RECURDOWN: Tunnel0 temporarily disabled due to recursive routing. From a design perspective, what was not taken into account...

March 6, 2019 No Comments READ MORE +