Which one of these addresses would the ACL need for traffic sourced from the inside interface, to match the source address of the traffic?

Your network operations team is deploying Access Control Lists (ACLs) across your Internet gateways. They wish to place an ACL inbound on the Internet gateway interface facing the core network (the "trusted" interface). Which one of these addresses would the ACL need for traffic sourced from the inside interface, to...

January 19, 2019 No Comments READ MORE +

Which design change will prevent the multicast traffic from being unnecessarily flooded throughout the campus network?

Refer to the exhibit. A new IPv4 multicast-based video-streaming service is being provisioned. During the design-validation tests, you realize that the link between the two buildings is carrying multicast traffic even when there are no receivers connected to the switch in Building B and despite IGMP snooping being enabled on...

January 18, 2019 No Comments READ MORE +

If IEEE 802.1w is in use for this network design, what are two locations where spanning-tree root can be placed to ensure the least-disruptive Layer 2 failover for clients within VLANs 3 and 4?

Refer to the exhibit. If IEEE 802.1w is in use for this network design, what are two locations where spanning-tree root can be placed to ensure the least-disruptive Layer 2 failover for clients within VLANs 3 and 4? (Choose two.)A . Switch AB . Switch BC . Switch CD ....

January 17, 2019 No Comments READ MORE +

In what two ways can the MP-BGP be removed from the MPLS P core routers and still provide dedicated Internet access and MPLS L3VPN services?

Service provider XYZ plans to provide dedicated Internet access and MPLS L3VPN services to business customers. XYZ has these design specifications: . MP-BGP running on the core MPLS P routers with external Internet routes. . The core network will include 16 Point of Presence IP POPs throughout the Asia-Pacific region....

January 17, 2019 No Comments READ MORE +

As part of the network design for this application, which multicast address should be used, according to best practices outlined in RFC 2365?

A many-to-many enterprise messaging application is using multicast as a transport mechanism. As part of the network design for this application, which multicast address should be used, according to best practices outlined in RFC 2365?A . 224.0.0.60B . 232.192.0.60C . 239.128.0.60D . 239.193.0.60View AnswerAnswer: D

January 14, 2019 No Comments READ MORE +

Which technology would allow for the restore of a network connection without informing the Layer 3 protocol?

A network designer wants to improve a company network design due to multiple network crashes. Which technology would allow for the restore of a network connection without informing the Layer 3 protocol?A . Bidirectional Forwarding DetectionB . automatic protection switchingC . UniDirectional Link DetectionD . Ethernet OAMView AnswerAnswer: B

January 14, 2019 No Comments READ MORE +

Which two responses should you give?

You are the lead network designer for an enterprise company called ABC, and you are leading design discussions regarding IPv6 implementation into their existing network. A question is raised regarding older Layer 2 switches that exist in the network, and if any changes are required to these Layer 2 switches...

January 13, 2019 No Comments READ MORE +

What will be the impact on convergence if there is a break in the end-to-end Layer 2 connectivity within the service provider network?

You are designing a network that will run EIGRP over a Metro Ethernet service that does not employ a link-loss technology. What will be the impact on convergence if there is a break in the end-to-end Layer 2 connectivity within the service provider network?A . The routers will immediately lose...

January 13, 2019 No Comments READ MORE +

If endpoint 1 tries to send 1500-byte IP packets to endpoint 2, in what three ways will the network design handle the fragmentation in three different possible network configurations?

Refer to the exhibit. You are planning the design of an encrypted WAN. IP packets will be transferred over encrypted GRE tunnels between routers B and C. The packet size is limited to a maximum of 1500 bytes inside the WAN between routers B and C. If endpoint 1 tries...

January 13, 2019 No Comments READ MORE +

In which two ways will interface dampening benefit your overall network design?

In order to meet your service level agreement, your network designer created a design solution that includes interface dampening. In which two ways will interface dampening benefit your overall network design? (Choose two.)A . Interface dampening uses an exponential backoff algorithm to suppress event reporting to the upper-level protocols.B ....

January 10, 2019 No Comments READ MORE +