What should be used in the multicast routing design?

Company XYZ connects its sites over a private WAN. Their overlay network is running a DMVPN setup where the headquarters site is the hub. The company is planning on implementing multicast routing on the network. What should be used in the multicast routing design?A . PIM dense mode with RP...

April 18, 2023 No Comments READ MORE +

Which DCI technology utilizes a “flood and learn” technique to populate the Layer2 forwarding table?

Which DCI technology utilizes a “flood and learn” technique to populate the Layer2 forwarding table?A . LISP B. OTV C. VPLS D. EVPNView AnswerAnswer: C

April 18, 2023 No Comments READ MORE +

In search of a system capable of hosting, monitoring compiling and testing code in an automated way, what can be recommended to the organization?

In search of a system capable of hosting, monitoring compiling and testing code in an automated way, what can be recommended to the organization?A . Jenkins B. Ansible C. Perl D. ChefView AnswerAnswer: A

April 18, 2023 No Comments READ MORE +

As a network designer you need to support an enterprise with hundreds of remote sites connected over a single WAN network that carries different types of traffic, including VoIP, video, and data applications which of following design considerations will not impact design decision?

As a network designer you need to support an enterprise with hundreds of remote sites connected over a single WAN network that carries different types of traffic, including VoIP, video, and data applications which of following design considerations will not impact design decision?A . Focus on the solution instead of...

April 18, 2023 No Comments READ MORE +

Which best practice ensures data security in the private cloud?

Which best practice ensures data security in the private cloud?A . Use IPsec for communication between unsecured network connection B. Encrypt data at rest and in transition. C. Use the same vendor for consistent encryption. D. Anonymize data ownership to comply with privacy rules.View AnswerAnswer: B

April 18, 2023 No Comments READ MORE +

How must the redistribution strategy be designed for this network?

Company XYZ has two routing domains in their network, EIGRP and OSPF. The company wants to provide full reachability between the two domains by implementing redistribution on a router running both protocols. They need to design the redistribution in a way that the OSPF routers will see link costs added...

April 18, 2023 No Comments READ MORE +

Aware services for location tracking changes must be applied to the existing wireless network to increase the location accuracy?

An existing wireless network was designed to support data traffic only. You must nowinstall context. Aware services for location tracking changes must be applied to the existing wireless network to increase the location accuracy? (Chose two)A . Add access points along the perimeter of the coverage area. B. Increase the...

April 18, 2023 No Comments READ MORE +

Which routing protocol would be valid but would also be the most restrictive for the expansion of this deployment model?

A customer asks you to perform a high level review of their upcoming WAN refresh for remote sites. The review is specially focused on their retail store operations consisting of 500+ locations connected via mutlipoint IPsec VPN solution. Which routing protocol would be valid but would also be the most...

April 17, 2023 No Comments READ MORE +

Which design benefit of bridge assurance is true?

Which design benefit of bridge assurance is true?A . It supposes a spanning-tee topology change upon connecting and disconnecting a station on a port B. It prevents switched traffic from traversing suboptimal paths on the network. C. It allows small, unmanaged switches to be plugged into ports of access switches...

April 17, 2023 No Comments READ MORE +

What are two top cloud-native security challenges faced by today's cloud-oriented organizations? (Choose two)

What are two top cloud-native security challenges faced by today's cloud-oriented organizations? (Choose two)A . establishing user roles B. polymorphism C. lack of visibility and tracking D. increased attack surface E. user credential validationView AnswerAnswer: C,D

April 17, 2023 No Comments READ MORE +