Which technique can be Implemented In the design to detect such a failure in a subsecond?

Company XYZ Is running a redundant private WAN network using OSPF as the underlay protocol. The current design accommodates for redundancy In the network, but it Is taking over 30 seconds for the network to reconverge upon failure. Which technique can be Implemented In the design to detect such a...

April 22, 2023 No Comments READ MORE +

What advantage of placing the IS-IS layer 2 flooding domain boundary at the core Layer in a three-layer hierarchical network is true?

What advantage of placing the IS-IS layer 2 flooding domain boundary at the core Layer in a three-layer hierarchical network is true?A . The Layer 1 and Layer 2 domains can easily overlap B. It reduces the complexity of the Layer 1 domains C. It can be applied to any...

April 21, 2023 No Comments READ MORE +

Which directive should be followed when a QoS strategy is developed for the business?

A financial company requires that a custom TCP-based stock-trading application beprioritized over all other traffic for the business due to the associated revenue. The company also requires that VoIP be prioritized for manual trades. Which directive should be followed when a QoS strategy is developed for the business?A . Allow...

April 21, 2023 No Comments READ MORE +

How must the queue sizes be designed to ensure that an application functions correctly?

How must the queue sizes be designed to ensure that an application functions correctly?A . Each individual device queuing delay in the chain must be less than or equal to the application required delay. B. The queuing delay on every device in the chain must be exactly the same to...

April 21, 2023 No Comments READ MORE +

Which tool automates network implementation activities and shortens the implementation lifecycle?

Which tool automates network implementation activities and shortens the implementation lifecycle?A . LISP B. Java C. Conclusion D. PythonView AnswerAnswer: D

April 21, 2023 No Comments READ MORE +

Which protocol must be enabled?

A healthcare customer requested that SNMP traps must be sent over the MPLS Layer 3 VPN service. Which protocol must be enabled?A . SNMPv3 B. Syslog C. Syslog TLS D. SNMPv2 E. SSHView AnswerAnswer: A

April 21, 2023 No Comments READ MORE +

Which two features can be used on the LAN access ports to support this design requirement?

Company ABC wants to minimize the risk of users plugging unauthorized switches and hubs into the network. Which two features can be used on the LAN access ports to support this design requirement? (Choose two.)A . Loop Guard B. PortFast C. DTF D. Root Guard E. BPDU GuardView AnswerAnswer: B,E

April 20, 2023 No Comments READ MORE +

Which IPsec tunneling feature can they enable to optimize the data flow while ensuring that the headers contain no duplicate IP addresses?

Company XYZ has designed their network to run GRE over IPsec on their Internet-based VPN to connect two sites. Which IPsec tunneling feature can they enable to optimize the data flow while ensuring that the headers contain no duplicate IP addresses?A . Transport Mode in IPsec Phase I B. Transport...

April 20, 2023 No Comments READ MORE +

As network designer, which option is your main concern with regards to virtualizing multiple network zones into a single hardware device?

As network designer, which option is your main concern with regards to virtualizing multiple network zones into a single hardware device?A . Fate sharing B. CPU resource allocation C. Congestion control D. Security E. Bandwidth allocationView AnswerAnswer: A

April 20, 2023 No Comments READ MORE +

Which three elements help network designers to construct secure systems that protect information and resources (such as devices, communication, and data) from unauthorized access, modification, inspection, or destruction? (Choose three.)

Which three elements help network designers to construct secure systems that protect information and resources (such as devices, communication, and data) from unauthorized access, modification, inspection, or destruction? (Choose three.)A . confidential B. serviceability C. reliability D. availability E. integrity F. scalabilityView AnswerAnswer: A,D,E

April 20, 2023 No Comments READ MORE +