Which design principal improves network resiliency?
Which design principal improves network resiliency?A . Added load-balancingB . Added redundancyC . Added confidentialityD . Added reliabilityView AnswerAnswer: B
Which IPsec tunneling feature can they enable to optimize the data flow while ensuring that the headers contain no duplicate IP addresses?
Company XYZ has designed their network to run GRE over IPsec on their Internet-based VPN to connect two sites. Which IPsec tunneling feature can they enable to optimize the data flow while ensuring that the headers contain no duplicate IP addresses?A . Transport Mode in IPsec Phase IB . Transport...
Which routing protocol would be valid but would also be the most restrictive for the expansion of this deployment model?
A customer asks you to perform a high level review of their upcoming WAN refresh for remote sites. The review is specially focused on their retail store operations consisting of 500+ locations connected via mutlipoint IPsec VPN solution. Which routing protocol would be valid but would also be the most...
In an OSPF network with routers connected together with Ethernet cabling, which topology typically takes the longest to converge?
In an OSPF network with routers connected together with Ethernet cabling, which topology typically takes the longest to converge?A . partial meshB . full meshC . ringD . squaredE . triangulatedView AnswerAnswer: C
How must the redistribution strategy be designed for this network?
Company XYZ has two routing domains in their network, EIGRP and OSPF. The company wants to provide full reachability between the two domains by implementing redistribution on a router running both protocols. They need to design the redistribution in a way that the OSPF routers will see link costs added...
Which best practice should organizations follow to ensure data security in the private cloud?
Hybrid cloud computing allows organizations to like advantage of public and private cloud models. Which best practice should organizations follow to ensure data security in the private cloud?A . Use standard protocols for data transmission over the network.B . Encrypt data when it is at rest and in motionC ....
What is a description of a control plane action?
What is a description of a control plane action?A . de-encapsulating and re-encapsulating a packet in a data-link frameB . matching the destination MAC address of an Ethernet frame to the MAC address tableC . matching the destination IP address of an IP packet to the IP routing tableD ....
Which mechanism do you use along with UDLD?
You want to mitigate failures that are caused by STP loops that occur before UDLD detects the failure or that are caused by a device that is no longer sending BPDUs. Which mechanism do you use along with UDLD?A . Root guardB . BPDU guardC . Loop guardD . BPDU...
Which actions are performed at the distribution layer of the three-layer hierarchical network design model? (Choose two)
Which actions are performed at the distribution layer of the three-layer hierarchical network design model? (Choose two)A . Fast transportB . ReliabilityC . QoS classification and marking boundaryD . Fault isolationE . Redundancy and load balancingView AnswerAnswer: C,E
Which cloud service should be used if the enterprise wants to avoid hardware issues yet have control of its applications and operating system?
An enterprise that runs numerous proprietary applications has major issues with its on-premises server estate hardware, to the point where business-critical functions are compromised. The enterprise accelerates plans to migrate services to the cloud. Which cloud service should be used if the enterprise wants to avoid hardware issues yet have...