Which IETF standard technology can provide this requirement?

A green data center is being deployed and a design requirement is to be able to readily scale server virtualization. Which IETF standard technology can provide this requirement?A . Transparent Interconnection of Lots of LinksB . fabric pathC . data center bridgingD . unified fabricView AnswerAnswer: A

August 23, 2018 No Comments READ MORE +

Which address type is appropriate for the ACL that will govern the sources of traffic entering the tunnel in the inside interface?

Your company plans to implement an Internet gateway router that is performing NAT. This same gateway will be terminating various IPsec tunnels to other remote sites. Which address type is appropriate for the ACL that will govern the sources of traffic entering the tunnel in the inside interface?A . inside...

August 21, 2018 No Comments READ MORE +

Which deployment technique allows for this functionality?

When creating a design plan for IPv6 integration, you decide to use stateless encapsulation of IPv6 packets into IPv4 tunnels between subscriber CPEs and a border relay. Which deployment technique allows for this functionality?A . 6rdB . Dual-Stack LiteC . 4rdD . DSTMView AnswerAnswer: A

August 20, 2018 No Comments READ MORE +

When evaluating the network, which switch security option should you investigate to ensure that authorized ARP responses take place according to known IP-to-MAC address mapping?

You have been hired by Acme Corporation to evaluate their existing network and determine if the current network design is secure enough to prevent man-in-the-middle attacks. When evaluating the network, which switch security option should you investigate to ensure that authorized ARP responses take place according to known IP-to-MAC address...

August 20, 2018 No Comments READ MORE +

In which two ways can NPIV be used in your proposed design?

You are the SAN designer for the ABC Company. Due to budget constraints, there is increased pressure by management to further optimize server utilization by implementing virtualization technologies on all servers and increase virtual machines density. Faced with some SAN challenges, the server team requests your help in the design...

August 20, 2018 No Comments READ MORE +

The design is being proposed for use within the network. The CE devices are OSPF graceful restart-capable, and the core devices are OSPF graceful restart-aware. The WAN advertisements received from BGP are redistributed into OSPF. A forwarding supervisor failure event takes place on CE A. During this event, how will the routes learned from the WAN be seen on the core devices?

Refer to the exhibit. The design is being proposed for use within the network. The CE devices are OSPF graceful restart-capable, and the core devices are OSPF graceful restart-aware. The WAN advertisements received from BGP are redistributed into OSPF. A forwarding supervisor failure event takes place on CE A. During...

August 20, 2018 No Comments READ MORE +

Which packets should the IPS forward for BFD to work under all circumstances?

A company plans to use BFD between its routers to detect a connectivity problem inside the switched network. An IPS is transparently installed between the switches. Which packets should the IPS forward for BFD to work under all circumstances?A . IP packets with broadcast IP source addressesB . IP packets...

August 18, 2018 No Comments READ MORE +

Which statement is true about configuring keepalives for multipoint GRE tunnels?

You are designing a network using multipoint GRE tunnels and need to be able to detect when connectivity between the GRE tunnel endpoints is broken. Which statement is true about configuring keepalives for multipoint GRE tunnels?A . The keepalive timer values on the routers must have the same value.B ....

August 15, 2018 No Comments READ MORE +

Which measure helps protect encrypted user traffic from replay attacks?

You are designing a Group Encrypted Transport Virtual Private Network solution consisting of 30 group members. Which measure helps protect encrypted user traffic from replay attacks?A . counter-based anti-replayB . time-based anti-replayC . nonce payloadD . RSA-encrypted nonceE . digital certificatesView AnswerAnswer: B

August 15, 2018 No Comments READ MORE +

Which feature can be used to simplify the network design?

A company wants to connect two data center sites using a hub-and-spoke design with 2000 remote sites. One design consideration is the requirement to transfer MPLS packets over the public Internet. In addition, one router at each site should be used, and the MPLS packets must be encapsulated inside IP...

August 14, 2018 No Comments READ MORE +