Which three items do you recommend for control plane hardening of an infrastructure device? (Choose three.)
Which three items do you recommend for control plane hardening of an infrastructure device? (Choose three.)A . redundant AAA servers B. Control Plane Policing C. warning banners D. to enable unused. services E. SNMPv3 F. routing protocol authenticationView AnswerAnswer: A BF
Which design solution reduces the amount of IGMP state in the network?
Which design solution reduces the amount of IGMP state in the network?A . IGMP filtering B. IGMPv3 with PIM-SSM C. multiple multicast domains D. one multicast group address thorough network regardless of IGMP versionView AnswerAnswer: B
The network team in XYZ Corp wants to modernize their infrastructure and is evaluating an implementation and migration plan to allow integration MPLS-based, Layer 2 Ethernet services managedby a service provider to connect branches and remote offices. To decrease OpEx and improveresponse times when network components fail, XYZ Corp decided to acquire and deploy new routers. The network currently is operated over E1 leased lines (2 Mbps) with a managed CE service provided by the telco
DRAG DROP The network team in XYZ Corp wants to modernize their infrastructure and is evaluating an implementation and migration plan to allow integration MPLS-based, Layer 2 Ethernet services managedby a service provider to connect branches and remote offices. To decrease OpEx and improveresponse times when network components fail, XYZ...
Which actions are performed at the distribution layer of the three-layer hierarchical network design model? (Choose two)
Which actions are performed at the distribution layer of the three-layer hierarchical network design model? (Choose two)A . Fast transport B. Reliability C. QoS classification and marking boundary D. Fault isolation E. Redundancy and load balancingView AnswerAnswer: C,E
Which BGP attributes are best suited to control this inbound traffic coming from BGP AS 500 Intothe 91.7.0.0/16 network?
Refer to the exhibit. An engineer has been asked to redesign the traffic flow toward AS 111 coming from AS 500.Traffic destined to AS 111 network 91 7 0.0/16 should come in via AS 100. while traffic destined to all other networks in AS 111 should continue to use the...
Drag and drop the optical technology design characteristics on the left to the correct optical technologies on the right
DRAG DROP Drag and drop the optical technology design characteristics on the left to the correct optical technologies on the right. Not all options are used View AnswerAnswer: Explanation: 1 - target 4 2 - target 5 3 - target 1 4 - target 6 5 - target 2 6...
Which best practice ensures data security in the private cloud?
Which best practice ensures data security in the private cloud?A . Use IPsec for communication between unsecured network connection B. Encrypt data at rest and in transition. C. Use the same vendor for consistent encryption. D. Anonymize data ownership to comply with privacy rules.View AnswerAnswer: B
Which segmentation method is suitable and scalable for the customer?
A customer has a functional requirement that states HR systems within a data center should be segmented from other systems that reside in the same data center and same VLAN. The systems run legacy applications by using hard-coded IP addresses. Which segmentation method is suitable and scalable for the customer?A...
Which enterprise WAN transport virtualization technique meets the requirements?
Refer to the exhibit. An architect must design an enterprise WAN that connects the headquarters with 22 branch offices. The number of remote sites is expected to triple in the next three years. The final solution must comply with these requirements: ✑ Only the loopback address of each of the...
Which two combined actions achieve high availability so that two RPs within the same network can act in a redundant manner?
A multicast network is sing Bidirectional PIM. Which two combined actions achieve high availability so that two RPs within the same network can act in a redundant manner? (Choose two)A . Use two phantom RP addresses B. Manipulate the administration distance of the unicast routes to the two RPs C....