Which is the most scalable solution to provide this type of VRF Selection process on the CE edge device?
A Service Provider is designing a solution for a managed CE service to a number of local customers using a single CE platform and wants to have logical separation on the CE platform using Virtual Routing and Forwarding (VRF) based on IP address ranges or packet length. Which is the...
Which action can be performed to tune the device performance?
A BGP route reflector in the network is taking longer than expected to coverage during large network changes. Troubleshooting shows that the router cannot handle all the TCP acknowledgements during route updates. Which action can be performed to tune the device performance?A . Increase the size of the hold queue....
Which design solution reduces the amount of IGMP state in the network?
Which design solution reduces the amount of IGMP state in the network?A . IGMP filtering B. IGMPv3 with PIM-SSM C. multiple multicast domains D. one multicast group address thorough network regardless of IGMP versionView AnswerAnswer: B
Which two conditions must be met for EIGRP to maintain an alternate loop-free path to a remote network? (Choose two.)
Which two conditions must be met for EIGRP to maintain an alternate loop-free path to a remote network? (Choose two.)A . The Reported Distance from a successor is lower than the local Feasible Distance. B. The Reported Distance from a successor is higher than the local Feasible Distance. C. The...
Which DCI technology utilizes a “flood and learn” technique to populate the Layer2 forwarding table?
Which DCI technology utilizes a “flood and learn” technique to populate the Layer2 forwarding table?A . LISP B. OTV C. VPLS D. EVPNView AnswerAnswer: B
Which three elements help network designers to construct secure systems that protect information and resources (such as devices, communication, and data) from unauthorized access, modification, inspection, or destruction? (Choose three.)
Which three elements help network designers to construct secure systems that protect information and resources (such as devices, communication, and data) from unauthorized access, modification, inspection, or destruction? (Choose three.)A . confidential B. serviceability C. reliability D. availability E. integrity F. scalabilityView AnswerAnswer: A,D,E
Which routing protocol would be valid but would also be the most restrictive for the expansion of this deployment model?
A customer asks you to perform a high level review of their upcoming WAN refresh for remote sites. The review is specially focused on their retail store operations consisting of 500+ locations connected via mutlipoint IPsec VPN solution. Which routing protocol would be valid but would also be the most...
Which two interconnect technologies support MACsec?
You have been tasked with designing a data center interconnect to provide business continuity You want to encrypt the traffic over the DCI using IEEE 802 1AE MACsec to prevent the deployment of any firewall or IPS. Which two interconnect technologies support MACsec? (Choose two.)A . EoMPLS B. MPLS Layer...
Which two actions must merchants do to be compliant with the Payment Card Industry Data Security Standard? (Choose two.)
Which two actions must merchants do to be compliant with the Payment Card Industry Data Security Standard? (Choose two.)A . conduct risk analyses B. install firewalls C. use antivirus software D. establish monitoring policies E. establish risk management policiesView AnswerAnswer: B,C
Which platform is well-suited as a state-aware orchestration system?
An international media provider is an early adopter of Docker and micro services and is using an open-source homegrown container orchestration system. A few years ago, they migrated from on-premises data centers to the cloud Now they are faced with challenges related to management of the deployed services with their...