Which two technologies allow for FCoE via lossless Ethernet or data center bridging?

You have been tasked with designing a data center interconnect as part of business continuity. You want to use FCoE over this DCI to support synchronous replication. Which two technologies allow for FCoE via lossless Ethernet or data center bridging? (Choose two.)A . DWDM B. EoMPLS C. SONET/SDH D. Multichassis...

August 24, 2023 No Comments READ MORE +

Which QoS strategy can be used to fulfill the requirement?

Company XYZ is redesigning their QoS policy. Some of the applications used by the company are real-time applications. The QoS design must give these applications preference in terms of transmission. Which QoS strategy can be used to fulfill the requirement?A . weighted fair queuing B. weighted random early detection C....

August 24, 2023 No Comments READ MORE +

What best describes the difference between Automation and Orchestration?

What best describes the difference between Automation and Orchestration?A . Automation refers to an automatic process for completing a single task and Orchestration refers to assembling and coordinating a set of tasks and conditions. B. Automation describes a hands-off configuration process while Orchestration refers to sets of automation tasks that...

August 24, 2023 No Comments READ MORE +

Which IPsec tunneling feature can they enable to optimize the data flow while ensuring that the headers contain no duplicate IP addresses?

Company XYZ has designed their network to run GRE over IPsec on their Internet-based VPN to connect two sites. Which IPsec tunneling feature can they enable to optimize the data flow while ensuring that the headers contain no duplicate IP addresses?A . Transport Mode in IPsec Phase I B. Transport...

August 24, 2023 No Comments READ MORE +

Which two principles would you apply in order to maximize the wireless network capacity?

You have been asked to design a high-density wireless network for a university campus. Which two principles would you apply in order to maximize the wireless network capacity? (Choose two.)A . Implement a four-channel design on 2.4 GHz to increase the number of availablechannels B. Choose a high minimum data...

August 23, 2023 No Comments READ MORE +

Which two combined actions achieve high availability so that two RPs within the same network can act in a redundant manner?

A multicast network is sing Bidirectional PIM. Which two combined actions achieve high availability so that two RPs within the same network can act in a redundant manner? (Choose two)A . Use two phantom RP addresses B. Manipulate the administration distance of the unicast routes to the two RPs C....

August 23, 2023 No Comments READ MORE +

Which effect will this have on the network?

Company XYZ is running BGP as their routing protocol. An external design consultant recommends that TCP path MTU discovery be enabled. Which effect will this have on the network?A . It will enhance the performance of TCP-based applications. B. It will increase the convergence time. C. It will improve the...

August 23, 2023 No Comments READ MORE +

Which effect of using ingress filtering to prevent spoofed addresses on a network design is true?

Which effect of using ingress filtering to prevent spoofed addresses on a network design is true?A . It reduces the effectiveness of DDoS attacks when associated with DSCP remarking toScavenger. B. It protects the network Infrastructure against spoofed DDoS attacks. C. It Classifies bogon traffic and remarks it with DSCP...

August 23, 2023 No Comments READ MORE +

Drag and drop the design characteristics from the left onto the correct network filter techniques on the right. Not all options are used

DRAG DROP Drag and drop the design characteristics from the left onto the correct network filter techniques on the right. Not all options are used. View AnswerAnswer:

August 22, 2023 No Comments READ MORE +

Which two options combined meet the requirements?

You have been asked to design a remote access VPN solution to support up to 2000 devices. You must ensure that only corporate assets are allowed to connect to the VPN, and users must authenticate to gain access of their based on their user role. Users must use a password...

August 22, 2023 No Comments READ MORE +