Which three components are part of the foundational information security principles of the CIA triad? (Choose three.)
Which three components are part of the foundational information security principles of the CIA triad? (Choose three.)A . cryptographyB . confidentialityC . C. authorizationD . identificationE . integrityF . availabilityView AnswerAnswer: B,E,F
Which protocol minimizes unicast flooding during a Topology Change Notification in a Layer 2 switched network with many VLANs?
While reviewing an existing network design, you are discussing the characteristics of different STP versions. Which protocol minimizes unicast flooding during a Topology Change Notification in a Layer 2 switched network with many VLANs?A . PVRSTPB . MSTC . STPD . PVSTP+View AnswerAnswer: A
What are two examples of business goals to be considered when a network design is built? (Choose two.)
What are two examples of business goals to be considered when a network design is built? (Choose two.)A . standardize resiliencyB . minimize operational costsC . integrate endpoint postureD . ensure faster obsolescenceE . reduce complexityView AnswerAnswer: B,E
Which routing technique can the network administrator use so that the rest of the network is not affected by the flapping issue?
Refer to the exhibit. Company XYZ BGP topology is as shown in the diagram. The interface on the LA router connected toward the 10 1.5.0/24 network is faulty and is going up and down, which affects the entire routing domain. Which routing technique can the network administrator use so that...
Which effect will this have on the network?
Company XYZ is running BGP as their routing protocol. An external design consultant recommends that TCP path MTU discovery be enabled. Which effect will this have on the network?A . It will enhance the performance of TCP-based applications.B . It will increase the convergence time.C . It will improve the...
In search of a system capable of hosting, monitoring compiling and testing code in an automated way, what can be recommended to the organization?
In search of a system capable of hosting, monitoring compiling and testing code in an automated way, what can be recommended to the organization?A . JenkinsB . AnsibleC . PerlD . ChefView AnswerAnswer: A
Which routing protocol would be valid but would also be the most restrictive for the expansion of this deployment model?
A customer asks you to perform a high level review of their upcoming WAN refresh for remote sites. The review is specially focused on their retail store operations consisting of 500+ locations connected via mutlipoint IPsec VPN solution. Which routing protocol would be valid but would also be the most...
Which design benefit of bridge assurance is true?
Which design benefit of bridge assurance is true?A . It supposes a spanning-tee topology change upon connecting and disconnecting a station on a portB . It prevents switched traffic from traversing suboptimal paths on the network.C . It allows small, unmanaged switches to be plugged into ports of access switches...
Which is the most scalable solution to provide this type of VRF Selection process on the CE edge device?
A Service Provider is designing a solution for a managed CE service to a number of local customers using a single CE platform and wants to have logical separation on the CE platform using Virtual Routing and Forwarding (VRF) based on IP address ranges or packet length. Which is the...
Which two factors should you consider to adjust the timer values?
A senior network designer suggests that you should improve network convergence times by reducing BGP timers between your CE router and the PE router of the service provider. Which two factors should you consider to adjust the timer values? (Choose two.)A . service provider agreement to support tuned timersB ....