Which technique can be Implemented In the design to detect such a failure in a subsecond?
Company XYZ Is running a redundant private WAN network using OSPF as the underlay protocol. The current design accommodates for redundancy In the network, but it Is taking over 30 seconds for the network to reconverge upon failure. Which technique can be Implemented In the design to detect such a...
What advantage of placing the IS-IS layer 2 flooding domain boundary at the core Layer in a three-layer hierarchical network is true?
What advantage of placing the IS-IS layer 2 flooding domain boundary at the core Layer in a three-layer hierarchical network is true?A . The Layer 1 and Layer 2 domains can easily overlap B. It reduces the complexity of the Layer 1 domains C. It can be applied to any...
Which directive should be followed when a QoS strategy is developed for the business?
A financial company requires that a custom TCP-based stock-trading application beprioritized over all other traffic for the business due to the associated revenue. The company also requires that VoIP be prioritized for manual trades. Which directive should be followed when a QoS strategy is developed for the business?A . Allow...
How must the queue sizes be designed to ensure that an application functions correctly?
How must the queue sizes be designed to ensure that an application functions correctly?A . Each individual device queuing delay in the chain must be less than or equal to the application required delay. B. The queuing delay on every device in the chain must be exactly the same to...
Which tool automates network implementation activities and shortens the implementation lifecycle?
Which tool automates network implementation activities and shortens the implementation lifecycle?A . LISP B. Java C. Conclusion D. PythonView AnswerAnswer: D
Which protocol must be enabled?
A healthcare customer requested that SNMP traps must be sent over the MPLS Layer 3 VPN service. Which protocol must be enabled?A . SNMPv3 B. Syslog C. Syslog TLS D. SNMPv2 E. SSHView AnswerAnswer: A
Which two features can be used on the LAN access ports to support this design requirement?
Company ABC wants to minimize the risk of users plugging unauthorized switches and hubs into the network. Which two features can be used on the LAN access ports to support this design requirement? (Choose two.)A . Loop Guard B. PortFast C. DTF D. Root Guard E. BPDU GuardView AnswerAnswer: B,E
Which IPsec tunneling feature can they enable to optimize the data flow while ensuring that the headers contain no duplicate IP addresses?
Company XYZ has designed their network to run GRE over IPsec on their Internet-based VPN to connect two sites. Which IPsec tunneling feature can they enable to optimize the data flow while ensuring that the headers contain no duplicate IP addresses?A . Transport Mode in IPsec Phase I B. Transport...
As network designer, which option is your main concern with regards to virtualizing multiple network zones into a single hardware device?
As network designer, which option is your main concern with regards to virtualizing multiple network zones into a single hardware device?A . Fate sharing B. CPU resource allocation C. Congestion control D. Security E. Bandwidth allocationView AnswerAnswer: A
Which three elements help network designers to construct secure systems that protect information and resources (such as devices, communication, and data) from unauthorized access, modification, inspection, or destruction? (Choose three.)
Which three elements help network designers to construct secure systems that protect information and resources (such as devices, communication, and data) from unauthorized access, modification, inspection, or destruction? (Choose three.)A . confidential B. serviceability C. reliability D. availability E. integrity F. scalabilityView AnswerAnswer: A,D,E