Which three components are part of the foundational information security principles of the CIA triad? (Choose three.)
Which three components are part of the foundational information security principles of the CIA triad? (Choose three.)A . cryptography B. confidentiality C. C. authorization D. identification E. integrity F. availabilityView AnswerAnswer: B,E,F
Which routing technique can the network administrator use so that the rest of the network is not affected by the flapping issue?
Refer to the exhibit. Company XYZ BGP topology is as shown in the diagram. The interface on the LA router connected toward the 10 1.5.0/24 network is faulty and is going up and down, which affects the entire routing domain. Which routing technique can the network administrator use so that...
Which directive should be followed when a QoS strategy is developed for the business?
A financial company requires that a custom TCP-based stock-trading application be prioritized over all other traffic for the business due to the associated revenue. The company also requires that VoIP be prioritized for manual trades. Which directive should be followed when a QoS strategy is developed for the business?A ....
Which enterprise WAN transport virtualization technique meets the requirements?
Refer to the exhibit. An architect must design an enterprise WAN that connects the headquarters with 22 branch offices. The number of remote sites is expected to triple in the next three years. The final solution must comply with these requirements: ✑ Only the loopback address of each of the...
As network designer, which option is your main concern with regards to virtualizing multiple network zones into a single hardware device?
As network designer, which option is your main concern with regards to virtualizing multiple network zones into a single hardware device?A . Fate sharing B. CPU resource allocation C. Congestion control D. Security E. Bandwidth allocationView AnswerAnswer: A
Which challenge is solved by SDN for cloud service providers?
SDN emerged as a technology trend that attracted many industries to move from traditional networks to SDN. Which challenge is solved by SDN for cloud service providers?A . need for intelligent traffic monitoring B. exponential growth of resource-intensive application C. complex and distributed management flow D. higher operating expense and...
What is the next step to control such events after the security team verifies all users in Zero Trust modeling?
A network security team observes phishing attacks on a user machine from a remote location. The organization has a policy of saving confidential data on two different systems using different types of authentication. What is the next step to control such events after the security team verifies all users in...
What should be used in the multicast routing design?
Company XYZ connects its sites over a private WAN. Their overlay network is running a DMVPN setup where the headquarters site is the hub. The company is planning on implementing multicast routing on the network. What should be used in the multicast routing design?A . PIM dense mode with RP...
Which two benefits can software defined networks provide to businesses? (Choose two.)
Which two benefits can software defined networks provide to businesses? (Choose two.)A . provides additional redundancy B. decentralized management C. reduced latency D. enables innovation E. reduction of OpEx/CapEx F. meets high traffic demandsView AnswerAnswer: D,E
Which technology can be used to prevent these types of attacks?
Company XYZ wants to improve the security design of their network to include protection from reconnaissance and DoS attacks on their sub interfaces destined toward next hop routers. Which technology can be used to prevent these types of attacks?A . MPP B. CPPr C. CoPP D. DPPView AnswerAnswer: B Explanation:...