What describes any Agile network design development process?

Agile and Waterfall are two popular methods for organizing projects. What describes any Agile network design development process?A . working design over comprehensive documentation B. contract negotiation over customer collaboration C. following a plan over responding to change D. processes and tools over individuals and interactions over timeView AnswerAnswer: A

August 19, 2023 No Comments READ MORE +

Which two characteristics apply to firewall transparent mode operations in a firewall solution design? (Choose two.)

Which two characteristics apply to firewall transparent mode operations in a firewall solution design? (Choose two.)A . Changes in the existing IP addressing and subnets are required B. The firewall can participate actively on spanning tree. C. Multicast traffic can traverse the firewall. D. OSPF adjacencies can be established through...

August 19, 2023 No Comments READ MORE +

When designing a WAN that will be carrying real-time traffic, what are two important reasons to consider serialization delay? (Choose two)

When designing a WAN that will be carrying real-time traffic, what are two important reasons to consider serialization delay? (Choose two)A . Serialization delays are invariable because they depend only on the line rate of the interface B. Serialization delays are variable because they depend on the line rate of...

August 18, 2023 No Comments READ MORE +

If the design must support an MPLS network with six classes, and CEs will be managed by the service provider, which QoS policy should be recommended?

You are tasked to design a QoS policy for a service provider so they can include it in the design of their MPLS core network. If the design must support an MPLS network with six classes, and CEs will be managed by the service provider, which QoS policy should be...

August 18, 2023 No Comments READ MORE +

Which tunneling technology do you recommend?

A service provider hires you to design its new managed CE offering to meet these requirements • The CEs cannot run a routing protocol with the PE • Provide the ability for equal or unequal ingress load balancing in dual-homed CE scenarios. • Provide support for IPv6 customer routes •...

August 18, 2023 No Comments READ MORE +

Which protocol must be enabled?

A healthcare customer requested that SNMP traps must be sent over the MPLS Layer 3 VPN service. Which protocol must be enabled?A . SNMPv3 B. Syslog C. Syslog TLS D. SNMPv2 E. SSHView AnswerAnswer: A

August 18, 2023 No Comments READ MORE +

Which technology is the best fit for this purpose?

Company XYZ has a multicast domain that spans across multiple autonomous systems. The company wants to choose a technology that provides simplified and controlled approach to interconnecting the multicast domains. Which technology is the best fit for this purpose?A . MSDP B. PIM SSM C. MPLS D. PIM sparse modeView...

August 18, 2023 No Comments READ MORE +

Which routing technique can the network administrator use so that the rest of the network is not affected by the flapping issue?

Refer to the exhibit. Company XYZ BGP topology is as shown in the diagram. The interface on the LA router connected toward the 10 1.5.0/24 network is faulty and is going up and down, which affects the entire routing domain. Which routing technique can the network administrator use so that...

August 17, 2023 No Comments READ MORE +

Which two factors must be considered for high availability in campus LAN designs to mitigate concerns about unavailability of network resources? (Choose two.)

Which two factors must be considered for high availability in campus LAN designs to mitigate concerns about unavailability of network resources? (Choose two.)A . device resiliency B. device type C. network type D. network resiliency E. network sizeView AnswerAnswer: A,D

August 17, 2023 No Comments READ MORE +

Which technology can be used to prevent these types of attacks?

Company XYZ wants to improve the security design of their network to include protection from reconnaissance and DoS attacks on their sub interfaces destined toward next hop routers. Which technology can be used to prevent these types of attacks?A . MPP B. CPPr C. CoPP D. DPPView AnswerAnswer: C Explanation:...

August 17, 2023 No Comments READ MORE +